Home
last modified time | relevance | path

Searched refs:keys (Results 1 – 200 of 404) sorted by relevance

123

/linux-4.1.27/drivers/input/keyboard/
Dipaq-micro-keys.c46 struct ipaq_micro_keys *keys = data; in micro_key_receive() local
53 input_report_key(keys->input, keys->codes[key], down); in micro_key_receive()
54 input_sync(keys->input); in micro_key_receive()
58 static void micro_key_start(struct ipaq_micro_keys *keys) in micro_key_start() argument
60 spin_lock(&keys->micro->lock); in micro_key_start()
61 keys->micro->key = micro_key_receive; in micro_key_start()
62 keys->micro->key_data = keys; in micro_key_start()
63 spin_unlock(&keys->micro->lock); in micro_key_start()
66 static void micro_key_stop(struct ipaq_micro_keys *keys) in micro_key_stop() argument
68 spin_lock(&keys->micro->lock); in micro_key_stop()
[all …]
DMakefile7 obj-$(CONFIG_KEYBOARD_ADP5520) += adp5520-keys.o
8 obj-$(CONFIG_KEYBOARD_ADP5588) += adp5588-keys.o
9 obj-$(CONFIG_KEYBOARD_ADP5589) += adp5589-keys.o
14 obj-$(CONFIG_KEYBOARD_BFIN) += bf54x-keys.o
27 obj-$(CONFIG_KEYBOARD_IPAQ_MICRO) += ipaq-micro-keys.o
35 obj-$(CONFIG_KEYBOARD_LPC32XX) += lpc32xx-keys.o
58 obj-$(CONFIG_KEYBOARD_SUN4I_LRADC) += sun4i-lradc-keys.o
Dsh_keysc.c91 DECLARE_BITMAP(keys, SH_KEYSC_MAXKEYS); in sh_keysc_isr()
103 bitmap_zero(keys, SH_KEYSC_MAXKEYS); in sh_keysc_isr()
119 __set_bit(n + k, keys); in sh_keysc_isr()
128 bitmap_complement(keys, keys, SH_KEYSC_MAXKEYS); in sh_keysc_isr()
129 bitmap_and(keys1, keys1, keys, SH_KEYSC_MAXKEYS); in sh_keysc_isr()
130 bitmap_or(keys0, keys0, keys, SH_KEYSC_MAXKEYS); in sh_keysc_isr()
132 sh_keysc_map_dbg(&pdev->dev, keys, "keys"); in sh_keysc_isr()
Dlm8333.c82 u8 keys[LM8333_FIFO_TRANSFER_SIZE]; in lm8333_key_handler() local
87 LM8333_FIFO_TRANSFER_SIZE, keys); in lm8333_key_handler()
94 for (i = 0; i < LM8333_FIFO_TRANSFER_SIZE && keys[i]; i++) { in lm8333_key_handler()
95 pressed = keys[i] & 0x80; in lm8333_key_handler()
96 code = keys[i] & 0x7f; in lm8333_key_handler()
DKconfig23 be called adp5520-keys.
33 module will be called adp5588-keys.
43 module will be called adp5589-keys.
106 The PrecisionBook has five keys that conflict with those used by most
152 module will be called bf54x-keys.
224 for keys connected through TCA6416/TCA6408A IO expanders.
226 Say Y here if your device has keys connected to
243 for keys connected through TCA8418 keypad decoder.
245 Say Y here if your device has keys connected to
356 module will be called lpc32xx-keys.
[all …]
/linux-4.1.27/drivers/input/misc/
Ddm355evm_keys.c107 struct dm355evm_keys *keys = _keys; in dm355evm_keys_irq() local
120 dev_dbg(keys->dev, "input high err %d\n", in dm355evm_keys_irq()
128 dev_dbg(keys->dev, "input low err %d\n", in dm355evm_keys_irq()
157 ke = sparse_keymap_entry_from_scancode(keys->input, event); in dm355evm_keys_irq()
159 dev_dbg(keys->dev, in dm355evm_keys_irq()
164 input_report_key(keys->input, keycode, 1); in dm355evm_keys_irq()
165 input_sync(keys->input); in dm355evm_keys_irq()
166 input_report_key(keys->input, keycode, 0); in dm355evm_keys_irq()
167 input_sync(keys->input); in dm355evm_keys_irq()
177 struct dm355evm_keys *keys; in dm355evm_keys_probe() local
[all …]
/linux-4.1.27/drivers/md/bcache/
Dbtree.c165 if (b->level && b->keys.nsets) in bch_btree_init_next()
166 bch_btree_sort(&b->keys, &b->c->sort); in bch_btree_init_next()
168 bch_btree_sort_lazy(&b->keys, &b->c->sort); in bch_btree_init_next()
171 bch_bset_init_next(&b->keys, write_block(b), in bch_btree_init_next()
209 iter->b = &b->keys; in bch_btree_node_read_done()
216 b->written < btree_blocks(b) && i->seq == b->keys.set[0].data->seq; in bch_btree_node_read_done()
244 if (i != b->keys.set[0].data && !i->keys) in bch_btree_node_read_done()
254 bset_sector_offset(&b->keys, i) < KEY_SIZE(&b->key); in bch_btree_node_read_done()
256 if (i->seq == b->keys.set[0].data->seq) in bch_btree_node_read_done()
259 bch_btree_sort_and_fix_extents(&b->keys, iter, &b->c->sort); in bch_btree_node_read_done()
[all …]
Ddebug.c43 sorted = b->c->verify_data->keys.set->data; in bch_btree_verify()
44 inmemory = b->keys.set->data; in bch_btree_verify()
49 v->keys.ops = b->keys.ops; in bch_btree_verify()
63 sorted = v->keys.set->data; in bch_btree_verify()
65 if (inmemory->keys != sorted->keys || in bch_btree_verify()
75 bch_dump_bset(&b->keys, inmemory, 0); in bch_btree_verify()
78 bch_dump_bset(&v->keys, sorted, 0); in bch_btree_verify()
85 bch_dump_bset(&b->keys, i, block); in bch_btree_verify()
91 for (j = 0; j < inmemory->keys; j++) in bch_btree_verify()
153 struct keybuf keys; member
[all …]
Djournal.c314 int ret = 0, keys = 0, entries = 0; in bch_journal_replay() local
341 keys++; in bch_journal_replay()
353 keys, entries, end); in bch_journal_replay()
544 j->cur->data->keys = 0; in bch_journal_next()
692 sectors = __set_blocks(w->data, w->data->keys + nkeys, in journal_wait_for_write()
713 BUG_ON(!w->data->keys); in journal_wait_for_write()
751 struct keylist *keys, in bch_journal() argument
760 w = journal_wait_for_write(c, bch_keylist_nkeys(keys)); in bch_journal()
762 memcpy(bset_bkey_last(w->data), keys->keys, bch_keylist_bytes(keys)); in bch_journal()
763 w->data->keys += bch_keylist_nkeys(keys); in bch_journal()
[all …]
Dbset.h252 #define set_bytes(i) __set_bytes(i, i->keys)
257 __set_blocks(i, (i)->keys, block_bytes)
383 #define bset_bkey_last(i) bkey_idx((struct bkey *) (i)->d, (i)->keys)
463 struct bkey *keys; member
483 l->keys = k; in bch_keylist_init_single()
500 return l->top == l->keys; in bch_keylist_empty()
505 l->top = l->keys; in bch_keylist_reset()
Dextents.c125 static void bch_bkey_dump(struct btree_keys *keys, const struct bkey *k) in bch_bkey_dump() argument
127 struct btree *b = container_of(keys, struct btree, keys); in bch_bkey_dump()
167 struct btree *b = container_of(bk, struct btree, keys); in bch_btree_ptr_invalid()
205 struct btree *b = container_of(bk, struct btree, keys); in bch_btree_ptr_bad()
230 struct btree *b = container_of(bk, struct btree, keys); in bch_btree_ptr_insert_fixup()
326 struct cache_set *c = container_of(b, struct btree, keys)->c; in bch_extent_insert_fixup()
499 struct btree *b = container_of(bk, struct btree, keys); in bch_extent_invalid()
535 struct btree *b = container_of(bk, struct btree, keys); in bch_extent_bad()
580 struct btree *b = container_of(bk, struct btree, keys); in bch_extent_merge()
Dbtree.h136 struct btree_keys keys; member
178 return b->keys.set->data; in btree_bset_first()
183 return bset_tree_last(&b->keys)->data; in btree_bset_last()
188 return bset_sector_offset(&b->keys, i) >> b->c->block_bits; in bset_block_offset()
Dbset.c27 (unsigned) ((u64 *) k - i->d), i->keys); in bch_dump_bset()
158 struct bkey *k = l->keys; in bch_keylist_pop()
171 l->top_p -= bkey_u64s(l->keys); in bch_keylist_pop_front()
173 memmove(l->keys, in bch_keylist_pop_front()
174 bkey_next(l->keys), in bch_keylist_pop_front()
565 ? bset_bkey_idx(t->data, t->data->keys - bkey_u64s(&t->end)) in make_bfloat()
628 i->keys = 0; in bch_bset_init_next()
806 __set_bytes(t->data, t->data->keys + bkey_u64s(insert)) > in bch_bset_insert()
813 t->data->keys += bkey_u64s(insert); in bch_bset_insert()
1174 out->keys = last ? (uint64_t *) bkey_next(last) - out->d : 0; in btree_mergesort()
[all …]
Dwriteback.c142 struct keylist keys; in write_dirty_finish() local
144 bch_keylist_init(&keys); in write_dirty_finish()
146 bkey_copy(keys.top, &w->key); in write_dirty_finish()
147 SET_KEY_DIRTY(keys.top, false); in write_dirty_finish()
148 bch_keylist_push(&keys); in write_dirty_finish()
153 ret = bch_btree_insert(dc->disk.c, &keys, NULL, &w->key); in write_dirty_finish()
444 RB_EMPTY_ROOT(&dc->writeback_keys.keys)) { in bch_writeback_thread()
Dsuper.c112 sb->keys = le16_to_cpu(s->keys); in read_super()
118 sb->version, sb->flags, sb->seq, sb->keys); in read_super()
128 if (sb->keys > SB_JOURNAL_BUCKETS) in read_super()
196 for (i = 0; i < sb->keys; i++) in read_super()
201 if (sb->first_bucket + sb->keys > sb->nbuckets) in read_super()
254 out->keys = cpu_to_le16(sb->keys); in __write_super()
256 for (i = 0; i < sb->keys; i++) in __write_super()
1667 ca->sb.keys = clamp_t(int, ca->sb.nbuckets >> 7, in run_cache_set()
1670 for (j = 0; j < ca->sb.keys; j++) in run_cache_set()
/linux-4.1.27/drivers/net/ethernet/cisco/enic/
Denic_clsf.c20 int enic_addfltr_5t(struct enic *enic, struct flow_keys *keys, u16 rq) in enic_addfltr_5t() argument
25 switch (keys->ip_proto) { in enic_addfltr_5t()
36 data.u.ipv4.src_addr = ntohl(keys->src); in enic_addfltr_5t()
37 data.u.ipv4.dst_addr = ntohl(keys->dst); in enic_addfltr_5t()
38 data.u.ipv4.src_port = ntohs(keys->port16[0]); in enic_addfltr_5t()
39 data.u.ipv4.dst_port = ntohs(keys->port16[1]); in enic_addfltr_5t()
161 if (tpos->keys.src == k->src && in htbl_key_search()
162 tpos->keys.dst == k->dst && in htbl_key_search()
163 tpos->keys.ports == k->ports && in htbl_key_search()
164 tpos->keys.ip_proto == k->ip_proto && in htbl_key_search()
[all …]
Denic_ethtool.c351 switch (n->keys.ip_proto) { in enic_grxclsrule()
363 fsp->h_u.tcp_ip4_spec.ip4src = n->keys.src; in enic_grxclsrule()
366 fsp->h_u.tcp_ip4_spec.ip4dst = n->keys.dst; in enic_grxclsrule()
369 fsp->h_u.tcp_ip4_spec.psrc = n->keys.port16[0]; in enic_grxclsrule()
372 fsp->h_u.tcp_ip4_spec.pdst = n->keys.port16[1]; in enic_grxclsrule()
Denic_clsf.h9 int enic_addfltr_5t(struct enic *enic, struct flow_keys *keys, u16 rq);
/linux-4.1.27/net/core/
Dflow_dissector.c283 static inline u32 __flow_hash_from_keys(struct flow_keys *keys) in __flow_hash_from_keys() argument
288 if (((__force u32)keys->dst < (__force u32)keys->src) || in __flow_hash_from_keys()
289 (((__force u32)keys->dst == (__force u32)keys->src) && in __flow_hash_from_keys()
290 ((__force u16)keys->port16[1] < (__force u16)keys->port16[0]))) { in __flow_hash_from_keys()
291 swap(keys->dst, keys->src); in __flow_hash_from_keys()
292 swap(keys->port16[0], keys->port16[1]); in __flow_hash_from_keys()
295 hash = __flow_hash_3words((__force u32)keys->dst, in __flow_hash_from_keys()
296 (__force u32)keys->src, in __flow_hash_from_keys()
297 (__force u32)keys->ports); in __flow_hash_from_keys()
304 u32 flow_hash_from_keys(struct flow_keys *keys) in flow_hash_from_keys() argument
[all …]
/linux-4.1.27/tools/perf/scripts/python/Perf-Trace-Util/lib/Perf/Trace/
DCore.py35 keys = flag_fields[event_name][field_name]['values'].keys()
36 keys.sort()
37 for idx in keys:
54 keys = symbolic_fields[event_name][field_name]['values'].keys()
55 keys.sort()
56 for idx in keys:
77 keys = trace_flags.keys()
79 for idx in keys:
/linux-4.1.27/drivers/mfd/
Ducb1x00-assabet.c44 struct gpio_keys_platform_data keys; in ucb1x00_assabet_add() local
49 memset(&keys, 0, sizeof(keys)); in ucb1x00_assabet_add()
58 keys.buttons = buttons; in ucb1x00_assabet_add()
59 keys.nbuttons = ARRAY_SIZE(buttons); in ucb1x00_assabet_add()
60 keys.poll_interval = 50; in ucb1x00_assabet_add()
61 keys.name = "ucb1x00"; in ucb1x00_assabet_add()
64 &keys, sizeof(keys)); in ucb1x00_assabet_add()
Dadp5520.c256 if (pdata->keys) { in adp5520_probe()
258 chip->id, pdata->keys, sizeof(*pdata->keys)); in adp5520_probe()
/linux-4.1.27/drivers/md/persistent-data/
Ddm-btree.c47 uint64_t mid_key = le64_to_cpu(n->keys[mid]); in bsearch()
96 array_insert(node->keys, sizeof(*node->keys), nr_entries, index, &key_le); in insert_at()
342 *result_key = le64_to_cpu(ro_node(s)->keys[i]); in btree_lookup_raw()
349 uint64_t *keys, void *value_le) in dm_btree_lookup() argument
371 r = btree_lookup_raw(&spine, root, keys[level], in dm_btree_lookup()
376 if (rkey != keys[level]) { in dm_btree_lookup()
451 memcpy(rn->keys, ln->keys + nr_left, nr_right * sizeof(rn->keys[0])); in btree_split_sibling()
473 le64_to_cpu(rn->keys[0]), &location); in btree_split_sibling()
477 if (key < le64_to_cpu(rn->keys[0])) { in btree_split_sibling()
547 memcpy(ln->keys, pn->keys, nr_left * sizeof(pn->keys[0])); in btree_split_beneath()
[all …]
Ddm-btree.h110 uint64_t *keys, void *value_le);
116 uint64_t *keys, void *value, dm_block_t *new_root)
125 uint64_t *keys, void *value, dm_block_t *new_root,
135 uint64_t *keys, dm_block_t *new_root);
159 int (*fn)(void *context, uint64_t *keys, void *leaf),
Ddm-btree-internal.h41 __le64 keys[0]; member
110 return n->keys + index; in key_ptr()
115 return &n->keys[le32_to_cpu(n->header.max_entries)]; in value_base()
Ddm-btree-remove.c227 *key_ptr(parent, r->index) = right->keys[0]; in __rebalance2()
285 *key_ptr(parent, r->index) = right->keys[0]; in delete_center_node()
340 *key_ptr(parent, c->index) = center->keys[0]; in redistribute3()
341 *key_ptr(parent, r->index) = right->keys[0]; in redistribute3()
491 (le64_to_cpu(n->keys[i]) != key)) in do_leaf()
553 uint64_t *keys, dm_block_t *new_root) in dm_btree_remove() argument
567 root, keys[level], (unsigned *)&index); in dm_btree_remove()
/linux-4.1.27/Documentation/security/
D00-INDEX15 keys-ecryptfs.txt
16 - description of the encryption keys for the ecryptfs filesystem.
17 keys-request-key.txt
19 keys-trusted-encrypted.txt
20 - info on the Trusted and Encrypted keys in the kernel key ring service.
21 keys.txt
Dkeys-trusted-encrypted.txt4 key ring service. Both of these new types are variable length symmetric keys,
5 and in both cases all keys are created in the kernel, and user space sees,
11 Trusted Keys use a TPM both to generate and to seal the keys. Keys are sealed
15 (future) PCR values, so keys are easily migrated to new pcr values, such as
19 By default, trusted keys are sealed under the SRK, which has the default
43 TPM_STORED_DATA format. The key length for new keys are always in bytes.
47 Encrypted keys do not depend on a TPM, and are faster, as they use AES for
48 encryption/decryption. New keys are created from kernel generated random
51 disadvantage of encrypted keys is that if they are not rooted in a trusted key,
56 The decrypted portion of encrypted keys can contain either a simple symmetric
[all …]
Dkeys.txt5 This service allows cryptographic keys, authentication tokens, cross-domain
10 other keys. Processes each have three standard keyring subscriptions that a
11 kernel service can search for relevant keys.
36 In this context, keys represent units of cryptographic data, authentication
58 kernel by a kernel service (such as a filesystem) before keys of that type
64 Should a type be removed from the system, all the keys of that type will
79 actual "key". In the case of a keyring, this is a list of keys to which
124 The key service provides a number of features besides keys:
130 Keyrings are special keys that contain a list of other keys. Keyring
148 separated from the rest of the description by a ':'. "logon" keys can
[all …]
Dkeys-ecryptfs.txt1 Encrypted keys for the eCryptfs filesystem
22 filesystem. Encrypted keys of the newly introduced format store an
31 The eCryptfs filesystem may really benefit from using encrypted keys in that the
Dkeys-request-key.txt6 Documentation/security/keys.txt). This document explains more fully how
56 The two async in-kernel calls may return keys that are still in the process of
158 (2) It considers all the non-keyring keys within that keyring and, if any key
164 (3) It then considers all the keyring-type keys in the keyring it's currently
/linux-4.1.27/drivers/crypto/nx/
Dnx-aes-xcbc.c76 u8 keys[2][AES_BLOCK_SIZE]; in nx_xcbc_empty() local
88 memset(keys[0], 0x01, sizeof(keys[0])); in nx_xcbc_empty()
89 memset(keys[1], 0x03, sizeof(keys[1])); in nx_xcbc_empty()
91 len = sizeof(keys); in nx_xcbc_empty()
93 in_sg = nx_build_sg_list(nx_ctx->in_sg, (u8 *) keys, &len, in nx_xcbc_empty()
96 if (len != sizeof(keys)) in nx_xcbc_empty()
99 out_sg = nx_build_sg_list(nx_ctx->out_sg, (u8 *) keys, &len, in nx_xcbc_empty()
102 if (len != sizeof(keys)) in nx_xcbc_empty()
115 keys[1][0] ^= 0x80; in nx_xcbc_empty()
117 len = sizeof(keys[1]); in nx_xcbc_empty()
[all …]
/linux-4.1.27/security/keys/
DKconfig10 access keys in the kernel.
12 It also includes provision of methods by which such keys might be
17 a searchable sequence of keys. Each process is equipped with access
41 bool "Large payload keys"
45 This option provides support for holding large keys within the kernel
59 keys in the kernel. Trusted keys are random number symmetric keys,
60 generated and RSA-sealed by the TPM. The TPM only unseals the keys,
76 This option provides support for create/encrypting/decrypting keys
77 in the kernel. Encrypted keys are kernel generated random numbers,
Dkeyring.c151 assoc_array_init(&keyring->keys); in keyring_instantiate()
397 assoc_array_destroy(&keyring->keys, &keyring_assoc_array_ops); in keyring_destroy()
411 if (keyring->keys.nr_leaves_on_tree != 0) in keyring_describe()
412 seq_printf(m, ": %lu", keyring->keys.nr_leaves_on_tree); in keyring_describe()
463 nr_keys = keyring->keys.nr_leaves_on_tree; in keyring_read()
479 ret = assoc_array_iterate(&keyring->keys, keyring_read_iterator, &ctx); in keyring_read()
600 object = assoc_array_find(&keyring->keys, in search_keyring()
605 return assoc_array_iterate(&keyring->keys, ctx->iterator, ctx); in search_keyring()
678 ptr = ACCESS_ONCE(keyring->keys.root); in search_nested_keyrings()
944 object = assoc_array_find(&keyring->keys, &keyring_assoc_array_ops, in find_key_to_update()
[all …]
Dgc.c127 static noinline void key_gc_unused_keys(struct list_head *keys) in key_gc_unused_keys() argument
129 while (!list_empty(keys)) { in key_gc_unused_keys()
131 list_entry(keys->next, struct key, graveyard_link); in key_gc_unused_keys()
DMakefile28 obj-$(CONFIG_ENCRYPTED_KEYS) += encrypted-keys/
/linux-4.1.27/net/sched/
Dact_pedit.c40 struct tc_pedit_key *keys = NULL; in tcf_pedit_init() local
64 keys = kmalloc(ksize, GFP_KERNEL); in tcf_pedit_init()
65 if (keys == NULL) { in tcf_pedit_init()
79 keys = kmalloc(ksize, GFP_KERNEL); in tcf_pedit_init()
80 if (keys == NULL) in tcf_pedit_init()
88 if (keys) { in tcf_pedit_init()
90 p->tcfp_keys = keys; in tcf_pedit_init()
93 memcpy(p->tcfp_keys, parm->keys, ksize); in tcf_pedit_init()
103 struct tc_pedit_key *keys = p->tcfp_keys; in tcf_pedit_cleanup() local
104 kfree(keys); in tcf_pedit_cleanup()
[all …]
Dsch_sfb.c290 struct flow_keys keys; in sfb_enqueue() local
315 keys.src = salt; in sfb_enqueue()
316 keys.dst = 0; in sfb_enqueue()
317 keys.ports = 0; in sfb_enqueue()
319 skb_flow_dissect(skb, &keys); in sfb_enqueue()
324 sfbhash = jhash_3words((__force u32)keys.dst, in sfb_enqueue()
325 (__force u32)keys.src, in sfb_enqueue()
326 (__force u32)keys.ports, in sfb_enqueue()
359 sfbhash = jhash_3words((__force u32)keys.dst, in sfb_enqueue()
360 (__force u32)keys.src, in sfb_enqueue()
[all …]
Dsch_fq_codel.c73 struct flow_keys keys; in fq_codel_hash() local
76 skb_flow_dissect(skb, &keys); in fq_codel_hash()
77 hash = jhash_3words((__force u32)keys.dst, in fq_codel_hash()
78 (__force u32)keys.src ^ keys.ip_proto, in fq_codel_hash()
79 (__force u32)keys.ports, q->perturbation); in fq_codel_hash()
Dsch_hhf.c182 struct flow_keys keys; in skb_hash() local
188 skb_flow_dissect(skb, &keys); in skb_hash()
189 hash = jhash_3words((__force u32)keys.dst, in skb_hash()
190 (__force u32)keys.src ^ keys.ip_proto, in skb_hash()
191 (__force u32)keys.ports, q->perturbation); in skb_hash()
Dsch_sfq.c164 struct flow_keys keys; member
176 const struct flow_keys *keys = &sfq_skb_cb(skb)->keys; in sfq_hash() local
179 hash = jhash_3words((__force u32)keys->dst, in sfq_hash()
180 (__force u32)keys->src ^ keys->ip_proto, in sfq_hash()
181 (__force u32)keys->ports, q->perturbation); in sfq_hash()
200 skb_flow_dissect(skb, &sfq_skb_cb(skb)->keys); in sfq_classify()
Dsch_choke.c145 u8 keys[QDISC_CB_PRIV_LEN - 3]; member
180 memcpy(&choke_skb_cb(skb1)->keys, &temp, CHOKE_K_LEN); in choke_match_flow()
186 memcpy(&choke_skb_cb(skb2)->keys, &temp, CHOKE_K_LEN); in choke_match_flow()
189 return !memcmp(&choke_skb_cb(skb1)->keys, in choke_match_flow()
190 &choke_skb_cb(skb2)->keys, in choke_match_flow()
Dcls_flow.c290 u32 keys[FLOW_KEY_MAX + 1]; in flow_classify() local
303 keys[n] = flow_key_get(skb, key, &flow_keys); in flow_classify()
307 classid = jhash2(keys, f->nkeys, f->hashrnd); in flow_classify()
309 classid = keys[0]; in flow_classify()
/linux-4.1.27/Documentation/devicetree/bindings/input/
Dinput-reset.txt3 A simple binding to represent a set of keys as described in
4 include/uapi/linux/input.h. This is to communicate a sequence of keys to the
5 sysrq driver. Upon holding the keys for a specified amount of time (if
8 Key sequences are global to the system but all the keys in a set must be coming
12 a set of keys.
18 timeout-ms: duration keys must be pressed together in milliseconds before
Dsun4i-lradc-keys.txt1 Allwinner sun4i low res adc attached tablet keys
5 - compatible: "allwinner,sun4i-a10-lradc-keys"
10 Each key is represented as a sub-node of "allwinner,sun4i-a10-lradc-keys":
23 compatible = "allwinner,sun4i-a10-lradc-keys";
Dgpio-keys-polled.txt4 - compatible = "gpio-keys-polled";
11 Each button (key) is represented as a sub-node of "gpio-keys-polled":
28 compatible = "gpio-keys-polled";
Dgpio-keys.txt4 - compatible = "gpio-keys";
10 Each button (key) is represented as a sub-node of "gpio-keys":
34 compatible = "gpio-keys";
Dimx-keypad.txt4 or 3-point contact keys. The KPP is designed to simplify the software task
6 and decoding one or multiple keys pressed simultaneously on a keypad.
Dmatrix-keymap.txt2 defining the keys in the scope of linux key codes since that is a stable and
Dst-keyscan.txt19 - linux,keymap: The keymap for keys as described in the binding document
/linux-4.1.27/security/keys/encrypted-keys/
DMakefile5 obj-$(CONFIG_ENCRYPTED_KEYS) += encrypted-keys.o
7 encrypted-keys-y := encrypted.o ecryptfs_format.o
10 encrypted-keys-y += $(masterkey-y) $(masterkey-m-m)
/linux-4.1.27/include/trace/events/
Dbcache.h247 __field(unsigned, keys )
253 __entry->keys = b->keys.set[b->keys.nsets].data->keys;
343 TP_PROTO(struct btree *b, unsigned keys),
344 TP_ARGS(b, keys),
348 __field(unsigned, keys )
353 __entry->keys = keys;
356 TP_printk("bucket %zu keys %u", __entry->bucket, __entry->keys)
360 TP_PROTO(struct btree *b, unsigned keys),
361 TP_ARGS(b, keys)
365 TP_PROTO(struct btree *b, unsigned keys),
[all …]
/linux-4.1.27/tools/perf/scripts/python/
Dcheck-perf-trace.py71 keys = unhandled.keys()
72 if not keys:
81 for event_name in keys:
Dfailed-syscalls-by-pid.py68 comm_keys = syscalls.keys()
70 pid_keys = syscalls[comm].keys()
73 id_keys = syscalls[comm][pid].keys()
76 ret_keys = syscalls[comm][pid][id].keys()
Dnetdev-times.py132 if 'comm' in event.keys():
137 elif 'handle' in event.keys():
303 if cpu not in irq_dic.keys():
310 if cpu not in irq_dic.keys():
317 if 'event_list' in irq_record.keys():
322 if cpu not in irq_dic.keys() \
326 if 'event_list' in irq_record.keys():
342 if cpu in irq_dic.keys():
345 if cpu in net_rx_dic.keys():
358 if cpu in net_rx_dic.keys():
[all …]
Dsyscall-counts-by-pid.py66 comm_keys = syscalls.keys()
68 pid_keys = syscalls[comm].keys()
71 id_keys = syscalls[comm][pid].keys()
Dnet_dropmonitor.py53 for i in drop_log.keys():
/linux-4.1.27/drivers/net/wireless/orinoco/
Dwext.c34 kzfree(priv->keys[index].key); in orinoco_set_key()
35 kzfree(priv->keys[index].seq); in orinoco_set_key()
38 priv->keys[index].key = kzalloc(key_len, GFP_ATOMIC); in orinoco_set_key()
39 if (!priv->keys[index].key) in orinoco_set_key()
42 priv->keys[index].key = NULL; in orinoco_set_key()
45 priv->keys[index].seq = kzalloc(seq_len, GFP_ATOMIC); in orinoco_set_key()
46 if (!priv->keys[index].seq) in orinoco_set_key()
49 priv->keys[index].seq = NULL; in orinoco_set_key()
51 priv->keys[index].key_len = key_len; in orinoco_set_key()
52 priv->keys[index].seq_len = seq_len; in orinoco_set_key()
[all …]
Dhw.c828 struct orinoco_key keys[ORINOCO_MAX_KEYS]; in __orinoco_hw_setup_wepkeys() local
830 memset(&keys, 0, sizeof(keys)); in __orinoco_hw_setup_wepkeys()
832 int len = min(priv->keys[i].key_len, in __orinoco_hw_setup_wepkeys()
834 memcpy(&keys[i].data, priv->keys[i].key, len); in __orinoco_hw_setup_wepkeys()
836 keys[i].len = cpu_to_le16(LARGE_KEY_SIZE); in __orinoco_hw_setup_wepkeys()
838 keys[i].len = cpu_to_le16(SMALL_KEY_SIZE); in __orinoco_hw_setup_wepkeys()
840 keys[i].len = cpu_to_le16(0); in __orinoco_hw_setup_wepkeys()
845 &keys); in __orinoco_hw_setup_wepkeys()
862 keylen = priv->keys[priv->tx_key].key_len; in __orinoco_hw_setup_wepkeys()
879 memcpy(key, priv->keys[i].key, in __orinoco_hw_setup_wepkeys()
[all …]
/linux-4.1.27/scripts/kconfig/
Dmconf.c290 int *keys, int *vscroll, int *hscroll,
361 int *keys; member
378 data->keys[k] = key; in update_text()
388 data->keys[k] = 0; in update_text()
436 int keys[JUMP_NB + 1], i; in search_conf() local
440 .keys = keys, in search_conf()
447 str_get(&res), 0, 0, keys, &vscroll, in search_conf()
451 for (i = 0; i < JUMP_NB && keys[i]; i++) in search_conf()
452 if (dres == keys[i]) { in search_conf()
757 *keys, int *vscroll, int *hscroll, update_text_fn in show_textbox_ext() argument
[all …]
/linux-4.1.27/security/integrity/
DKconfig28 to "lock" certain keyring to prevent adding new keys.
29 This is useful for evm and module keyrings, when keys are
33 bool "Enable asymmetric keys support"
42 asymmetric keys.
/linux-4.1.27/crypto/
Dauthenc.c55 int crypto_authenc_extractkeys(struct crypto_authenc_keys *keys, const u8 *key, in crypto_authenc_extractkeys() argument
69 keys->enckeylen = be32_to_cpu(param->enckeylen); in crypto_authenc_extractkeys()
74 if (keylen < keys->enckeylen) in crypto_authenc_extractkeys()
77 keys->authkeylen = keylen - keys->enckeylen; in crypto_authenc_extractkeys()
78 keys->authkey = key; in crypto_authenc_extractkeys()
79 keys->enckey = key + keys->authkeylen; in crypto_authenc_extractkeys()
91 struct crypto_authenc_keys keys; in crypto_authenc_setkey() local
94 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in crypto_authenc_setkey()
100 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in crypto_authenc_setkey()
110 err = crypto_ablkcipher_setkey(enc, keys.enckey, keys.enckeylen); in crypto_authenc_setkey()
Dauthencesn.c65 struct crypto_authenc_keys keys; in crypto_authenc_esn_setkey() local
68 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in crypto_authenc_esn_setkey()
74 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in crypto_authenc_esn_setkey()
84 err = crypto_ablkcipher_setkey(enc, keys.enckey, keys.enckeylen); in crypto_authenc_esn_setkey()
/linux-4.1.27/arch/arm/boot/dts/
Dbcm47081-buffalo-wzr-900dhp.dts26 gpio-keys {
27 compatible = "gpio-keys";
Dbcm4708-luxul-xwc-1000.dts49 gpio-keys {
50 compatible = "gpio-keys";
Dbcm4709-netgear-r8000.dts54 gpio-keys {
55 compatible = "gpio-keys";
Dbcm47081-asus-rt-n18u.dts60 gpio-keys {
61 compatible = "gpio-keys";
Dbcm4708-netgear-r6300-v2.dts60 gpio-keys {
61 compatible = "gpio-keys";
Dbcm4708-netgear-r6250.dts70 gpio-keys {
71 compatible = "gpio-keys";
Ds3c6410-mini6410.dts71 gpio-keys {
72 compatible = "gpio-keys";
207 gpio_keys: gpio-keys {
Dbcm47081-buffalo-wzr-600dhp2.dts93 gpio-keys {
94 compatible = "gpio-keys";
Dbcm4708-buffalo-wzr-1750dhp.dts93 gpio-keys {
94 compatible = "gpio-keys";
Dste-nomadik-s8815.dts130 gpio-keys {
131 compatible = "gpio-keys";
Dkirkwood-mv88f6281gtw-ge.dts56 pmx_keys: pmx-keys {
106 compatible = "gpio-keys";
Dimx6q-gk802.dts40 gpio-keys {
41 compatible = "gpio-keys";
Dkirkwood-netxbig.dtsi55 gpio-keys {
56 compatible = "gpio-keys";
Dtegra30-colibri-eval-v3.dts136 gpio-keys {
137 compatible = "gpio-keys";
Dimx51-apf51dev.dts59 gpio-keys {
60 compatible = "gpio-keys";
Drk3066a-bqcurie2.dts37 gpio-keys {
38 compatible = "gpio-keys";
Dimx53-ard.dts65 gpio-keys {
66 compatible = "gpio-keys";
Dsama5d35ek.dts46 compatible = "gpio-keys";
Dkirkwood-ts219-6281.dts36 compatible = "gpio-keys";
Dmpa1600.dts69 compatible = "gpio-keys";
Dorion5x-maxtor-shared-storage-2.dts36 gpio-keys {
37 compatible = "gpio-keys";
Dkirkwood-iomega_ix2_200.dts147 gpio-keys {
148 compatible = "gpio-keys";
Dorion5x-lacie-ethernet-disk-mini-v2.dts42 gpio-keys {
43 compatible = "gpio-keys";
Dimx28-apf28dev.dts221 gpio-keys {
222 compatible = "gpio-keys";
Dkirkwood-b3.dts152 gpio-keys {
153 compatible = "gpio-keys";
Dkirkwood-ts219-6282.dts46 compatible = "gpio-keys";
Drk3066a-rayeager.dts61 keys: gpio-keys { label
62 compatible = "gpio-keys";
370 keys {
Drk3288-firefly.dtsi63 keys: gpio-keys { label
64 compatible = "gpio-keys";
385 keys {
Dimx53-smd.dts24 gpio-keys {
25 compatible = "gpio-keys";
Dtegra30-apalis-eval.dts186 gpio-keys {
187 compatible = "gpio-keys";
Dkirkwood-netgear_readynas_duo_v2.dts159 gpio-keys {
160 compatible = "gpio-keys";
Dkirkwood-ns2-common.dtsi56 compatible = "gpio-keys";
Domap3-overo-palo43-common.dtsi35 compatible = "gpio-keys";
Domap3-overo-gallop43-common.dtsi35 compatible = "gpio-keys";
Dusb_a9g20-dab-mmx.dtsi68 compatible = "gpio-keys";
Dimx27-apf27dev.dts39 gpio-keys {
40 compatible = "gpio-keys";
Dkirkwood-netgear_readynas_nv+_v2.dts171 gpio-keys {
172 compatible = "gpio-keys";
Drk3288-evb.dtsi63 gpio-keys {
64 compatible = "gpio-keys";
Dkirkwood-cloudbox.dts59 compatible = "gpio-keys";
Domap3-overo-chestnut43-common.dtsi35 compatible = "gpio-keys";
Dkirkwood-dir665.dts189 gpio-keys {
190 compatible = "gpio-keys";
Dorion5x-lacie-d2-network.dts36 gpio-keys {
37 compatible = "gpio-keys";
Dkirkwood-ts419.dtsi42 compatible = "gpio-keys";
Domap3-overo-alto35-common.dtsi42 compatible = "gpio-keys";
Dusb_a9260_common.dtsi110 compatible = "gpio-keys";
Domap4-var-om44customboard.dtsi33 gpio-keys {
34 compatible = "gpio-keys";
Darmada-xp-axpwifiap.dts152 compatible = "gpio-keys";
170 keys_pin: keys-pin {
Dmoxart-uc7112lx.dts63 compatible = "gpio-keys-polled";
Dimx53-qsb-common.dtsi57 gpio-keys {
58 compatible = "gpio-keys";
Dste-href-stuib.dtsi16 compatible = "gpio-keys";
Dusb_a9263.dts138 compatible = "gpio-keys";
Demev2-kzm9d.dts32 compatible = "gpio-keys";
Dkizbox.dts132 compatible = "gpio-keys";
Dimx6qdl-cubox-i.dtsi110 gpio-keys {
111 compatible = "gpio-keys";
Drk3188-radxarock.dts26 gpio-keys {
27 compatible = "gpio-keys";
Darmada-370-rd.dts144 gpio-keys {
145 compatible = "gpio-keys";
Dtegra114-tn7.dts288 gpio-keys {
289 compatible = "gpio-keys";
Dimx28-eukrea-mbmx28lc.dtsi31 compatible = "gpio-keys";
44 compatible = "gpio-keys";
Dat91-foxg20.dts156 compatible = "gpio-keys";
Dkirkwood-nsa3x0-common.dtsi74 compatible = "gpio-keys";
Dpm9g45.dts157 compatible = "gpio-keys";
Dste-href-family-pinctrl.dtsi636 /* SKE keys on position 2 in an 8x8 matrix */
694 * SKE keys on position 1 and "other C1" combi giving
695 * six rows of six keys.
Danimeo_ip.dts150 compatible = "gpio-keys";
Dkirkwood-ib62x0.dts59 compatible = "gpio-keys";
Dbcm911360_entphn.dts56 compatible = "gpio-keys";
Dat91-qil_a9260.dts178 compatible = "gpio-keys";
Darmada-370-netgear-rn104.dts241 gpio-keys {
242 compatible = "gpio-keys";
Ds5pv210-aquila.dts252 gpio-keys {
253 compatible = "gpio-keys";
Dimx6qdl-sabrelite.dtsi58 gpio-keys {
59 compatible = "gpio-keys";
Darmada-370-netgear-rn102.dts219 gpio-keys {
220 compatible = "gpio-keys";
Dimx6qdl-nitrogen6x.dtsi59 gpio-keys {
60 compatible = "gpio-keys";
/linux-4.1.27/Documentation/video4linux/
DREADME.ir30 layer, i.e. you'll see the keys of the remote as normal key strokes
40 is, check whenever pressing keys on the remote actually generates
56 XFree86 likely can be configured to recognise the remote keys. Once I
58 device, which had the effect that XFree86 recognised some of the keys
/linux-4.1.27/security/integrity/ima/
DKconfig126 bool "Require all keys on the .ima keyring be signed"
131 This option requires that all keys added to the .ima
139 File signature verification is based on the public keys
140 loaded on the .ima trusted keyring. These public keys are
148 default "/etc/keys/x509_ima.der"
/linux-4.1.27/fs/nilfs2/
Dbmap.c113 __u64 keys[NILFS_BMAP_SMALL_HIGH + 1]; in nilfs_bmap_do_insert() local
121 bmap, keys, ptrs, NILFS_BMAP_SMALL_HIGH + 1); in nilfs_bmap_do_insert()
125 bmap, key, ptr, keys, ptrs, n); in nilfs_bmap_do_insert()
168 __u64 keys[NILFS_BMAP_LARGE_LOW + 1]; in nilfs_bmap_do_delete() local
176 bmap, keys, ptrs, NILFS_BMAP_LARGE_LOW + 1); in nilfs_bmap_do_delete()
180 bmap, key, keys, ptrs, n); in nilfs_bmap_do_delete()
Ddirect.c215 __u64 *keys, __u64 *ptrs, int nitems) in nilfs_direct_gather_data() argument
227 keys[n] = key; in nilfs_direct_gather_data()
236 __u64 key, __u64 *keys, __u64 *ptrs, int n) in nilfs_direct_delete_and_convert() argument
255 if ((j < n) && (i == keys[j])) { in nilfs_direct_delete_and_convert()
Dbtree.c176 const __u64 *keys, const __u64 *ptrs) in nilfs_btree_node_init() argument
189 dkeys[i] = cpu_to_le64(keys[i]); in nilfs_btree_node_init()
1681 __u64 *keys, __u64 *ptrs, int nitems) in nilfs_btree_gather_data() argument
1719 keys[i] = le64_to_cpu(dkeys[i]); in nilfs_btree_gather_data()
1785 const __u64 *keys, const __u64 *ptrs, in nilfs_btree_commit_convert_and_insert() argument
1813 nilfs_btree_node_init(node, 0, 1, n, ncblk, keys, ptrs); in nilfs_btree_commit_convert_and_insert()
1827 &keys[0], &tmpptr); in nilfs_btree_commit_convert_and_insert()
1835 keys, ptrs); in nilfs_btree_commit_convert_and_insert()
1857 const __u64 *keys, const __u64 *ptrs, int n) in nilfs_btree_convert_and_insert() argument
1881 nilfs_btree_commit_convert_and_insert(btree, key, ptr, keys, ptrs, n, in nilfs_btree_convert_and_insert()
/linux-4.1.27/drivers/crypto/qat/qat_common/
Dqat_algs.c283 struct crypto_authenc_keys *keys) in qat_alg_aead_init_enc_session() argument
291 sizeof(struct icp_qat_hw_auth_setup) + keys->enckeylen); in qat_alg_aead_init_enc_session()
301 memcpy(cipher->aes.key, keys->enckey, keys->enckeylen); in qat_alg_aead_init_enc_session()
308 if (qat_alg_do_precomputes(hash, ctx, keys->authkey, keys->authkeylen)) in qat_alg_aead_init_enc_session()
324 cipher_cd_ctrl->cipher_key_sz = keys->enckeylen >> 3; in qat_alg_aead_init_enc_session()
363 struct crypto_authenc_keys *keys) in qat_alg_aead_init_dec_session() argument
386 memcpy(cipher->aes.key, keys->enckey, keys->enckeylen); in qat_alg_aead_init_dec_session()
394 if (qat_alg_do_precomputes(hash, ctx, keys->authkey, keys->authkeylen)) in qat_alg_aead_init_dec_session()
410 cipher_cd_ctrl->cipher_key_sz = keys->enckeylen >> 3; in qat_alg_aead_init_dec_session()
521 struct crypto_authenc_keys keys; in qat_alg_aead_init_sessions() local
[all …]
/linux-4.1.27/net/wireless/
Dwext-compat.c444 if (!wdev->wext.keys) { in __cfg80211_set_encryption()
445 wdev->wext.keys = kzalloc(sizeof(*wdev->wext.keys), in __cfg80211_set_encryption()
447 if (!wdev->wext.keys) in __cfg80211_set_encryption()
450 wdev->wext.keys->params[i].key = in __cfg80211_set_encryption()
451 wdev->wext.keys->data[i]; in __cfg80211_set_encryption()
499 memset(wdev->wext.keys->data[idx], 0, in __cfg80211_set_encryption()
500 sizeof(wdev->wext.keys->data[idx])); in __cfg80211_set_encryption()
501 wdev->wext.keys->params[idx].key_len = 0; in __cfg80211_set_encryption()
502 wdev->wext.keys->params[idx].cipher = 0; in __cfg80211_set_encryption()
529 wdev->wext.keys->params[idx] = *params; in __cfg80211_set_encryption()
[all …]
Dwext-sme.c36 if (wdev->wext.keys) { in cfg80211_mgd_wext_connect()
37 wdev->wext.keys->def = wdev->wext.default_key; in cfg80211_mgd_wext_connect()
38 wdev->wext.keys->defmgmt = wdev->wext.default_mgmt_key; in cfg80211_mgd_wext_connect()
46 if (wdev->wext.keys) { in cfg80211_mgd_wext_connect()
47 ck = kmemdup(wdev->wext.keys, sizeof(*ck), GFP_KERNEL); in cfg80211_mgd_wext_connect()
Dibss.c287 if (wdev->wext.keys) { in cfg80211_ibss_wext_join()
288 wdev->wext.keys->def = wdev->wext.default_key; in cfg80211_ibss_wext_join()
289 wdev->wext.keys->defmgmt = wdev->wext.default_mgmt_key; in cfg80211_ibss_wext_join()
294 if (wdev->wext.keys) { in cfg80211_ibss_wext_join()
295 ck = kmemdup(wdev->wext.keys, sizeof(*ck), GFP_KERNEL); in cfg80211_ibss_wext_join()
/linux-4.1.27/Documentation/crypto/
Dasymmetric-keys.txt9 - Accessing asymmetric keys.
19 The "asymmetric" key type is designed to be a container for the keys used in
71 only keys of the specified subtype (e.g. tpm) will be matched. For
76 Looking in /proc/keys, the last 8 hex digits of the key fingerprint are
86 For general access to asymmetric keys from within the kernel, the following
91 This gives access to functions for dealing with asymmetric / public keys.
165 Asymmetric keys have a subtype that defines the set of operations that can be
175 #include <keys/asymmetric-subtype.h>
189 Asymmetric keys point to this with their type_data[0] member.
198 Mandatory. This allows the subtype to display something in /proc/keys
[all …]
/linux-4.1.27/Documentation/laptops/
Dsonypi.txt19 - Fn keys
21 - programmable keys, back, help, zoom, thumbphrase buttons, etc.
84 programmable keys events). The default event mask is
107 keyboard reporting the pressing of the special keys.
126 Fn-keys which put the laptop in sleeping state, or switch the
128 driver disables all APM management for those keys, by enabling the
130 you have one of those laptops with working Fn keys and want to
Dthinkpad-acpi.txt168 Hot keys
189 The driver will generate events over the input layer for hot keys and
194 The hot key bit mask allows some control over which hot keys generate
201 modified do anything. Not all hot keys can be individually controlled
209 Note that unmasking some keys prevents their default behavior. For
223 echo 0xffffffff > /proc/acpi/ibm/hotkey -- enable all hot keys
224 echo 0 > /proc/acpi/ibm/hotkey -- disable all possible hot keys
249 Returns the hot keys mask when thinkpad-acpi was loaded.
250 Upon module unload, the hot keys mask will be restored
264 (see above). Returns the current status of the hot keys
[all …]
/linux-4.1.27/drivers/net/wireless/ipw2x00/
Dlibipw_wx.c412 memcpy(sec.keys[key], keybuf, erq->length); in libipw_wx_set_encode()
414 memset(sec.keys[key] + erq->length, 0, in libipw_wx_set_encode()
417 key, len, sec.keys[key], in libipw_wx_set_encode()
421 (*crypt)->ops->set_key(sec.keys[key], len, NULL, in libipw_wx_set_encode()
431 len = (*crypt)->ops->get_key(sec.keys[key], WEP_KEY_LEN, in libipw_wx_set_encode()
437 memset(sec.keys[key], 0, 13); in libipw_wx_set_encode()
438 (*crypt)->ops->set_key(sec.keys[key], 13, NULL, in libipw_wx_set_encode()
505 memcpy(keybuf, sec->keys[key], len); in libipw_wx_get_encode()
652 memcpy(sec.keys[idx], ext->key, ext->key_len); in libipw_wx_set_encodeext()
723 memcpy(ext->key, sec->keys[idx], ext->key_len); in libipw_wx_get_encodeext()
/linux-4.1.27/net/sctp/
Dobjcnt.c56 SCTP_DBG_OBJCNT(keys);
72 SCTP_DBG_OBJCNT_ENTRY(keys),
Dauth.c68 SCTP_DBG_OBJCNT_DEC(keys); in sctp_auth_key_put()
88 SCTP_DBG_OBJCNT_INC(keys); in sctp_auth_create_key()
121 void sctp_auth_destroy_keys(struct list_head *keys) in sctp_auth_destroy_keys() argument
126 if (list_empty(keys)) in sctp_auth_destroy_keys()
129 key_for_each_safe(ep_key, tmp, keys) { in sctp_auth_destroy_keys()
/linux-4.1.27/Documentation/
Dmodule-signing.txt9 - Generating signing keys.
10 - Public keys in the kernel.
30 This facility uses X.509 ITU-T standard certificates to encode the public keys
146 The kernel contains a ring of public keys that can be viewed by root. They're
149 [root@deneb ~]# cat /proc/keys
160 Further, the architecture code may take public keys from a hardware store and
163 Finally, it is possible to add additional public keys by doing:
171 Note, however, that the kernel will only permit keys to be added to
Dbraille-console.txt21 review mode. In review mode, the arrow keys permit to browse in the VT content,
22 page up/down keys go at the top/bottom of the screen, and the home key goes back
Dassoc_array.txt40 (3) Objects require index keys to locate them within the array.
42 (4) Index keys must be unique. Inserting an object with the same key as one
45 (5) Index keys can be of any length and can be of different lengths.
47 (6) Index keys should encode the length early on, before any variation due to
50 (7) Index keys can include a hash to scatter objects throughout the array.
165 (4) Diff the index keys of two objects.
349 This will cause leaves with different length keys to scatter away from each
350 other - and those with the same length keys to cluster together.
435 So, for instance, keys with the following example index keys will be found in
465 In the above example list of index keys, node A will contain:
Dstatic-keys.txt8 Static keys allows the inclusion of seldom used features in
43 kernel code paths should be able to make use of the static keys facility.
71 the basis for the static keys facility.
166 5) Static keys / jump label analysis, results (x86_64):
/linux-4.1.27/net/ethernet/
Deth.c126 struct flow_keys keys; in eth_get_headlen() local
133 if (!__skb_flow_dissect(NULL, &keys, data, in eth_get_headlen()
135 return max_t(u32, keys.thoff, sizeof(*eth)); in eth_get_headlen()
138 return min_t(u32, __skb_get_poff(NULL, data, &keys, len), len); in eth_get_headlen()
/linux-4.1.27/Documentation/ABI/testing/
Devm20 loading existing trusted/encrypted keys, refer to:
21 Documentation/keys-trusted-encrypted.txt. (A sample dracut
Dsysfs-driver-hid-roccat-ryos24 Description: When written, this file lets one set the default of all keys for
35 function keys for a specific profile. Profile index is included
45 keys for a specific profile. Profile index is included in
55 thumbster keys for a specific profile. Profile index is included
65 capslock and function keys for a specific profile. Profile index
75 easyzone keys for a specific profile. Profile index is included
84 Description: When written, this file lets one deactivate certain keys like
85 windows and application keys, to prevent accidental presses.
Dsysfs-driver-hid-roccat-isku23 Description: When written, this file lets one deactivate certain keys like
24 windows and application keys, to prevent accidental presses.
45 easyzone keys for a specific profile. Profile number is included
55 function keys for a specific profile. Profile number is included
65 keys for a specific profile. Profile number is included in
75 keys for a specific profile. Profile number is included in
85 thumbster keys for a specific profile. Profile number is included
Dsysfs-driver-hid-roccat-arvo15 several modifier keys internally.
34 Description: The keyboard lets the user deactivate 5 certain keys like the
35 windows and application keys, to protect the user from the outcome
Dsysfs-driver-toshiba_acpi152 In the "Normal Operation" mode, the F{1-12} keys are as usual
154 In the "Special Functions" mode, the F{1-12} keys trigger the
155 hotkey and the F{1-12} keys are accessed via FN-F{1-12}.
Dsysfs-driver-sunxi-sid9 HDMI-HDCP key and some custom keys. Below a quick overview, for
/linux-4.1.27/net/mac802154/
Dllsec.c40 INIT_LIST_HEAD(&sec->table.keys); in mac802154_llsec_init()
68 list_for_each_entry_safe(key, kn, &sec->table.keys, list) { in mac802154_llsec_destroy()
228 list_for_each_entry(pos, &sec->table.keys, list) { in mac802154_llsec_key_add()
264 list_add_rcu(&new->list, &sec->table.keys); in mac802154_llsec_key_add()
278 list_for_each_entry(pos, &sec->table.keys, list) { in mac802154_llsec_key_del()
344 list_for_each_entry_safe(pos, pn, &dev->dev.keys, list) { in llsec_dev_free()
375 INIT_LIST_HEAD(&entry->dev.keys); in mac802154_llsec_dev_add()
414 list_for_each_entry_rcu(devkey, &dev->dev.keys, list) { in llsec_devkey_find()
445 list_add_tail_rcu(&devkey->devkey.list, &dev->dev.keys); in mac802154_llsec_devkey_add()
566 list_for_each_entry_rcu(key_entry, &sec->table.keys, list) { in llsec_lookup_key()
[all …]
/linux-4.1.27/tools/perf/Documentation/
Dperf-report.txt68 Sort histogram entries by given key(s) - multiple keys can be specified
69 in CSV format. Following sort keys are available:
97 By default, comm, dso and symbol keys are used.
100 If --branch-stack option is used, following sort keys are also
112 And default sort keys are changed to comm, dso_from, symbol_from, dso_to
117 Specify output field - multiple keys can be specified in CSV format.
122 By default, every sort keys not specified in -F will be appended
125 If --mem-mode option is used, following sort keys are also available
138 And default sort keys are changed to local_weight, mem, sym, dso,
/linux-4.1.27/drivers/staging/panel/
DKconfig49 int "Keypad type (0=none, 1=old 6 keys, 2=new 6 keys, 3=Nexcom 4 keys)"
54 The keys will be read from character device 10,185. Valid values are :
57 1 : old 6 keys keypad
58 2 : new 6 keys keypad, as used on the server at www.ant-computing.com
59 3 : Nexcom NSA1045's 4 keys keypad
62 supports simultaneous keys pressed when the keypad supports them.
/linux-4.1.27/net/mac80211/
Dkey.c262 key = key_mtx_dereference(sdata->local, sdata->keys[idx]); in __ieee80211_set_default_key()
292 key = key_mtx_dereference(sdata->local, sdata->keys[idx]); in __ieee80211_set_default_mgmt_key()
357 rcu_assign_pointer(sdata->keys[idx], new); in ieee80211_key_replace()
628 old_key = key_mtx_dereference(sdata->local, sdata->keys[idx]); in ieee80211_key_link()
745 struct list_head *keys) in ieee80211_free_keys_iface() argument
759 list_add_tail(&key->list, keys); in ieee80211_free_keys_iface()
772 LIST_HEAD(keys); in ieee80211_free_keys()
778 ieee80211_free_keys_iface(sdata, &keys); in ieee80211_free_keys()
782 ieee80211_free_keys_iface(vlan, &keys); in ieee80211_free_keys()
785 if (!list_empty(&keys) || force_synchronize) in ieee80211_free_keys()
[all …]
/linux-4.1.27/include/net/
Dip.h362 struct flow_keys keys; in inet_set_txhash() local
364 keys.src = inet->inet_saddr; in inet_set_txhash()
365 keys.dst = inet->inet_daddr; in inet_set_txhash()
366 keys.port16[0] = inet->inet_sport; in inet_set_txhash()
367 keys.port16[1] = inet->inet_dport; in inet_set_txhash()
369 sk->sk_txhash = flow_hash_from_keys(&keys); in inet_set_txhash()
Dflow_keys.h42 u32 flow_hash_from_keys(struct flow_keys *keys);
Dipv6.h717 struct flow_keys keys; in ip6_set_txhash() local
719 keys.src = (__force __be32)ipv6_addr_hash(&np->saddr); in ip6_set_txhash()
720 keys.dst = (__force __be32)ipv6_addr_hash(&sk->sk_v6_daddr); in ip6_set_txhash()
721 keys.port16[0] = inet->inet_sport; in ip6_set_txhash()
722 keys.port16[1] = inet->inet_dport; in ip6_set_txhash()
724 sk->sk_txhash = flow_hash_from_keys(&keys); in ip6_set_txhash()
Dieee802154_netdev.h296 struct list_head keys; member
324 struct list_head keys; member
/linux-4.1.27/include/uapi/linux/
Dbcache.h202 __u16 keys; member
279 __u32 keys; member
353 __u32 keys; member
/linux-4.1.27/include/crypto/
Dauthenc.h34 int crypto_authenc_extractkeys(struct crypto_authenc_keys *keys, const u8 *key,
/linux-4.1.27/net/bluetooth/hidp/
Dcore.c175 unsigned char *keys = session->keys; in hidp_input_report() local
191 if (keys[i] > 3 && memscan(udata + 2, keys[i], 6) == udata + 8) { in hidp_input_report()
192 if (hidp_keycode[keys[i]]) in hidp_input_report()
193 input_report_key(dev, hidp_keycode[keys[i]], 0); in hidp_input_report()
195 BT_ERR("Unknown key (scancode %#x) released.", keys[i]); in hidp_input_report()
198 if (udata[i] > 3 && memscan(keys + 2, udata[i], 6) == keys + 8) { in hidp_input_report()
206 memcpy(keys, udata, 8); in hidp_input_report()
Dhidp.h171 unsigned char keys[8]; member
/linux-4.1.27/drivers/staging/media/lirc/
Dlirc_zilog.c546 unsigned char keys, ndiffs, id; in get_key_data() local
573 if (!read_uint8(&data, endp, &keys) || in get_key_data()
575 ndiffs > TX_BLOCK_SIZE || keys == 0) in get_key_data()
600 if (keys == 1) in get_key_data()
605 if (!skip(&data, endp, (keys - 1) * (ndiffs + 1))) in get_key_data()
609 for (base = 0, lim = keys - 1; lim; lim >>= 1) { in get_key_data()
847 unsigned char keys; in fw_load() local
855 !read_uint8(&data, tx_data->endp, &keys) || in fw_load()
857 ndiffs > TX_BLOCK_SIZE || keys == 0) in fw_load()
874 (ndiffs + 1) * (keys - 1))) in fw_load()
/linux-4.1.27/include/uapi/linux/tc_act/
Dtc_pedit.h30 struct tc_pedit_key keys[0]; member
/linux-4.1.27/scripts/kconfig/lxdialog/
Dtextbox.c57 int initial_width, int *keys, int *_vscroll, int *_hscroll, in dialog_textbox() argument
250 for (i = 0; keys[i]; i++) { in dialog_textbox()
251 if (key == keys[i]) { in dialog_textbox()
/linux-4.1.27/drivers/staging/rtl8192u/ieee80211/
Dieee80211_wx.c390 memcpy(sec.keys[key], keybuf, erq->length); in ieee80211_wx_set_encode()
392 memset(sec.keys[key] + erq->length, 0, in ieee80211_wx_set_encode()
395 key, escape_essid(sec.keys[key], len), in ieee80211_wx_set_encode()
398 (*crypt)->ops->set_key(sec.keys[key], len, NULL, in ieee80211_wx_set_encode()
408 len = (*crypt)->ops->get_key(sec.keys[key], WEP_KEY_LEN, in ieee80211_wx_set_encode()
417 memset(sec.keys[key], 0, 13); in ieee80211_wx_set_encode()
418 (*crypt)->ops->set_key(sec.keys[key], 13, NULL, in ieee80211_wx_set_encode()
/linux-4.1.27/arch/s390/kvm/
Dkvm-s390.c747 uint8_t *keys; in kvm_s390_get_skeys() local
763 keys = kmalloc_array(args->count, sizeof(uint8_t), in kvm_s390_get_skeys()
765 if (!keys) in kvm_s390_get_skeys()
766 keys = vmalloc(sizeof(uint8_t) * args->count); in kvm_s390_get_skeys()
767 if (!keys) in kvm_s390_get_skeys()
782 keys[i] = curkey; in kvm_s390_get_skeys()
785 r = copy_to_user((uint8_t __user *)args->skeydata_addr, keys, in kvm_s390_get_skeys()
790 kvfree(keys); in kvm_s390_get_skeys()
796 uint8_t *keys; in kvm_s390_set_skeys() local
807 keys = kmalloc_array(args->count, sizeof(uint8_t), in kvm_s390_set_skeys()
[all …]
/linux-4.1.27/security/
DMakefile5 obj-$(CONFIG_KEYS) += keys/
/linux-4.1.27/drivers/staging/rtl8192e/
Drtllib_wx.c404 memcpy(sec.keys[key], keybuf, erq->length); in rtllib_wx_set_encode()
406 memset(sec.keys[key] + erq->length, 0, in rtllib_wx_set_encode()
409 key, escape_essid(sec.keys[key], len), in rtllib_wx_set_encode()
412 (*crypt)->ops->set_key(sec.keys[key], len, NULL, in rtllib_wx_set_encode()
423 len = (*crypt)->ops->get_key(sec.keys[key], WEP_KEY_LEN, in rtllib_wx_set_encode()
430 memset(sec.keys[key], 0, 13); in rtllib_wx_set_encode()
431 (*crypt)->ops->set_key(sec.keys[key], 13, NULL, in rtllib_wx_set_encode()
/linux-4.1.27/Documentation/blackfin/
Dbfin-gpio-notes.txt57 Some drivers, like gpio-keys, need this behavior. Kernel only print out
59 bfin-gpio: GPIO 24 is already reserved by gpio-keys: BTN0, and you are
/linux-4.1.27/drivers/hid/
Dhid-wiimote-modules.c65 static void wiimod_keys_in_keys(struct wiimote_data *wdata, const __u8 *keys) in wiimod_keys_in_keys() argument
68 !!(keys[0] & 0x01)); in wiimod_keys_in_keys()
70 !!(keys[0] & 0x02)); in wiimod_keys_in_keys()
72 !!(keys[0] & 0x04)); in wiimod_keys_in_keys()
74 !!(keys[0] & 0x08)); in wiimod_keys_in_keys()
76 !!(keys[0] & 0x10)); in wiimod_keys_in_keys()
78 !!(keys[1] & 0x01)); in wiimod_keys_in_keys()
80 !!(keys[1] & 0x02)); in wiimod_keys_in_keys()
82 !!(keys[1] & 0x04)); in wiimod_keys_in_keys()
84 !!(keys[1] & 0x08)); in wiimod_keys_in_keys()
[all …]
/linux-4.1.27/drivers/crypto/
Dixp4xx_crypto.c1151 struct crypto_authenc_keys keys; in aead_setkey() local
1153 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in aead_setkey()
1156 if (keys.authkeylen > sizeof(ctx->authkey)) in aead_setkey()
1159 if (keys.enckeylen > sizeof(ctx->enckey)) in aead_setkey()
1162 memcpy(ctx->authkey, keys.authkey, keys.authkeylen); in aead_setkey()
1163 memcpy(ctx->enckey, keys.enckey, keys.enckeylen); in aead_setkey()
1164 ctx->authkey_len = keys.authkeylen; in aead_setkey()
1165 ctx->enckey_len = keys.enckeylen; in aead_setkey()
Dpicoxcell_crypto.c498 struct crypto_authenc_keys keys; in spacc_aead_setkey() local
501 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in spacc_aead_setkey()
504 if (keys.enckeylen > AES_MAX_KEY_SIZE) in spacc_aead_setkey()
507 if (keys.authkeylen > sizeof(ctx->hash_ctx)) in spacc_aead_setkey()
512 err = spacc_aead_aes_setkey(tfm, keys.enckey, keys.enckeylen); in spacc_aead_setkey()
514 err = spacc_aead_des_setkey(tfm, keys.enckey, keys.enckeylen); in spacc_aead_setkey()
519 memcpy(ctx->hash_ctx, keys.authkey, keys.authkeylen); in spacc_aead_setkey()
520 ctx->hash_key_len = keys.authkeylen; in spacc_aead_setkey()
Dtalitos.c683 struct crypto_authenc_keys keys; in aead_setkey() local
685 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in aead_setkey()
688 if (keys.authkeylen + keys.enckeylen > TALITOS_MAX_KEY_SIZE) in aead_setkey()
691 memcpy(ctx->key, keys.authkey, keys.authkeylen); in aead_setkey()
692 memcpy(&ctx->key[keys.authkeylen], keys.enckey, keys.enckeylen); in aead_setkey()
694 ctx->keylen = keys.authkeylen + keys.enckeylen; in aead_setkey()
695 ctx->enckeylen = keys.enckeylen; in aead_setkey()
696 ctx->authkeylen = keys.authkeylen; in aead_setkey()
/linux-4.1.27/arch/powerpc/crypto/
DMakefile13 aes-ppc-spe-y := aes-spe-core.o aes-spe-keys.o aes-tab-4k.o aes-spe-modes.o aes-spe-glue.o
/linux-4.1.27/net/ceph/
Dauth_x_protocol.h45 __le32 keys; member
/linux-4.1.27/fs/ecryptfs/
DKconfig21 for userspace to wrap/unwrap file encryption keys by other
/linux-4.1.27/drivers/crypto/ux500/
DKconfig13 AES-ECB, CBC and CTR with keys sizes of 128, 192 and 256 bit sizes.
/linux-4.1.27/arch/x86/crypto/sha-mb/
Dsha1_mb_mgr_datastruct.S64 #FIELD _keys, 8, 8 # pointer to keys
/linux-4.1.27/Documentation/device-mapper/
Dpersistent-data.txt78 of nested btrees, and take multiple keys. For example, the
84 64bits, although nesting allows you to use multiple keys.
Ddm-crypt.txt28 keys (for example IV seed) so the key contains more parts concatenated
32 Multi-key compatibility mode. You can define <keycount> keys and
/linux-4.1.27/Documentation/filesystems/nfs/
D00-INDEX24 - information for configuring request-keys to be used by idmapper
/linux-4.1.27/Documentation/input/
Datarikbd.txt40 The two shift keys return different scan codes in this mode. The ENTER key
54 keyboard keys.
151 for the appropriate cursor motion keys. The trigger or fire buttons of the
170 keys. Any keys down at power-up are presumed to be stuck, and their BREAK
207 ikbd will then scan the key matrix for any stuck (closed) keys. Any keys found
220 ; mss=100, mouse buttons act like keys
225 When buttons act like keys, LEFT=0x74 & RIGHT=0x75.
236 were keyboard keys.
356 N.B. If the mouse buttons have been commanded to act like keyboard keys, this
/linux-4.1.27/scripts/
Ddiffconfig127 new = sorted(b.keys())
/linux-4.1.27/include/net/sctp/
Dauth.h84 void sctp_auth_destroy_keys(struct list_head *keys);
/linux-4.1.27/tools/perf/
Dbuiltin-lock.c248 struct lock_key keys[] = { variable
265 for (i = 0; keys[i].name; i++) { in select_key()
266 if (!strcmp(keys[i].name, sort_key)) { in select_key()
267 compare = keys[i].key; in select_key()
/linux-4.1.27/Documentation/networking/
Dopenvswitch.txt13 table" that userspace populates with "flows" that map from keys based
64 How flow keys evolve over time is important to making this work, so
147 Basic rule for evolving flow keys
239 The other rules for flow keys are much less subtle:
247 compare entire flow keys that it may not be able to fully
Ddns_resolver.txt105 The kernel maintains an internal keyring in which it caches looked up keys.
146 See <file:Documentation/security/keys-request-key.txt> for further
/linux-4.1.27/drivers/staging/speakup/
Dspkguide.txt123 Most of the Speakup review keys are located on the keypad at the far
162 the speech with keypad enter, or use any of the Speakup review keys.
164 Here are some basic Speakup review keys, and a short description of what
184 keys in combination with it. For example, repeatedly holding keypad
207 through the list of available commands using the cursor keys. The list
212 You can also just explore by typing keyboard keys. Pressing keys will
218 You'll notice that some commands do not have keys assigned to them.
223 You'll also notice that some commands have two keys assigned to them.
228 numeric keypad is defined as the keys in the j k l area of the keyboard.
236 laptop. So you may choose which set of Speakup keys to use. Some
[all …]
/linux-4.1.27/include/linux/mfd/
Dadp5520.h278 struct adp5520_keys_platform_data *keys; member

123