/linux-4.1.27/drivers/input/keyboard/ |
D | ipaq-micro-keys.c | 46 struct ipaq_micro_keys *keys = data; in micro_key_receive() local 53 input_report_key(keys->input, keys->codes[key], down); in micro_key_receive() 54 input_sync(keys->input); in micro_key_receive() 58 static void micro_key_start(struct ipaq_micro_keys *keys) in micro_key_start() argument 60 spin_lock(&keys->micro->lock); in micro_key_start() 61 keys->micro->key = micro_key_receive; in micro_key_start() 62 keys->micro->key_data = keys; in micro_key_start() 63 spin_unlock(&keys->micro->lock); in micro_key_start() 66 static void micro_key_stop(struct ipaq_micro_keys *keys) in micro_key_stop() argument 68 spin_lock(&keys->micro->lock); in micro_key_stop() [all …]
|
D | Makefile | 7 obj-$(CONFIG_KEYBOARD_ADP5520) += adp5520-keys.o 8 obj-$(CONFIG_KEYBOARD_ADP5588) += adp5588-keys.o 9 obj-$(CONFIG_KEYBOARD_ADP5589) += adp5589-keys.o 14 obj-$(CONFIG_KEYBOARD_BFIN) += bf54x-keys.o 27 obj-$(CONFIG_KEYBOARD_IPAQ_MICRO) += ipaq-micro-keys.o 35 obj-$(CONFIG_KEYBOARD_LPC32XX) += lpc32xx-keys.o 58 obj-$(CONFIG_KEYBOARD_SUN4I_LRADC) += sun4i-lradc-keys.o
|
D | sh_keysc.c | 91 DECLARE_BITMAP(keys, SH_KEYSC_MAXKEYS); in sh_keysc_isr() 103 bitmap_zero(keys, SH_KEYSC_MAXKEYS); in sh_keysc_isr() 119 __set_bit(n + k, keys); in sh_keysc_isr() 128 bitmap_complement(keys, keys, SH_KEYSC_MAXKEYS); in sh_keysc_isr() 129 bitmap_and(keys1, keys1, keys, SH_KEYSC_MAXKEYS); in sh_keysc_isr() 130 bitmap_or(keys0, keys0, keys, SH_KEYSC_MAXKEYS); in sh_keysc_isr() 132 sh_keysc_map_dbg(&pdev->dev, keys, "keys"); in sh_keysc_isr()
|
D | lm8333.c | 82 u8 keys[LM8333_FIFO_TRANSFER_SIZE]; in lm8333_key_handler() local 87 LM8333_FIFO_TRANSFER_SIZE, keys); in lm8333_key_handler() 94 for (i = 0; i < LM8333_FIFO_TRANSFER_SIZE && keys[i]; i++) { in lm8333_key_handler() 95 pressed = keys[i] & 0x80; in lm8333_key_handler() 96 code = keys[i] & 0x7f; in lm8333_key_handler()
|
D | Kconfig | 23 be called adp5520-keys. 33 module will be called adp5588-keys. 43 module will be called adp5589-keys. 106 The PrecisionBook has five keys that conflict with those used by most 152 module will be called bf54x-keys. 224 for keys connected through TCA6416/TCA6408A IO expanders. 226 Say Y here if your device has keys connected to 243 for keys connected through TCA8418 keypad decoder. 245 Say Y here if your device has keys connected to 356 module will be called lpc32xx-keys. [all …]
|
/linux-4.1.27/drivers/input/misc/ |
D | dm355evm_keys.c | 107 struct dm355evm_keys *keys = _keys; in dm355evm_keys_irq() local 120 dev_dbg(keys->dev, "input high err %d\n", in dm355evm_keys_irq() 128 dev_dbg(keys->dev, "input low err %d\n", in dm355evm_keys_irq() 157 ke = sparse_keymap_entry_from_scancode(keys->input, event); in dm355evm_keys_irq() 159 dev_dbg(keys->dev, in dm355evm_keys_irq() 164 input_report_key(keys->input, keycode, 1); in dm355evm_keys_irq() 165 input_sync(keys->input); in dm355evm_keys_irq() 166 input_report_key(keys->input, keycode, 0); in dm355evm_keys_irq() 167 input_sync(keys->input); in dm355evm_keys_irq() 177 struct dm355evm_keys *keys; in dm355evm_keys_probe() local [all …]
|
/linux-4.1.27/drivers/md/bcache/ |
D | btree.c | 165 if (b->level && b->keys.nsets) in bch_btree_init_next() 166 bch_btree_sort(&b->keys, &b->c->sort); in bch_btree_init_next() 168 bch_btree_sort_lazy(&b->keys, &b->c->sort); in bch_btree_init_next() 171 bch_bset_init_next(&b->keys, write_block(b), in bch_btree_init_next() 209 iter->b = &b->keys; in bch_btree_node_read_done() 216 b->written < btree_blocks(b) && i->seq == b->keys.set[0].data->seq; in bch_btree_node_read_done() 244 if (i != b->keys.set[0].data && !i->keys) in bch_btree_node_read_done() 254 bset_sector_offset(&b->keys, i) < KEY_SIZE(&b->key); in bch_btree_node_read_done() 256 if (i->seq == b->keys.set[0].data->seq) in bch_btree_node_read_done() 259 bch_btree_sort_and_fix_extents(&b->keys, iter, &b->c->sort); in bch_btree_node_read_done() [all …]
|
D | debug.c | 43 sorted = b->c->verify_data->keys.set->data; in bch_btree_verify() 44 inmemory = b->keys.set->data; in bch_btree_verify() 49 v->keys.ops = b->keys.ops; in bch_btree_verify() 63 sorted = v->keys.set->data; in bch_btree_verify() 65 if (inmemory->keys != sorted->keys || in bch_btree_verify() 75 bch_dump_bset(&b->keys, inmemory, 0); in bch_btree_verify() 78 bch_dump_bset(&v->keys, sorted, 0); in bch_btree_verify() 85 bch_dump_bset(&b->keys, i, block); in bch_btree_verify() 91 for (j = 0; j < inmemory->keys; j++) in bch_btree_verify() 153 struct keybuf keys; member [all …]
|
D | journal.c | 314 int ret = 0, keys = 0, entries = 0; in bch_journal_replay() local 341 keys++; in bch_journal_replay() 353 keys, entries, end); in bch_journal_replay() 544 j->cur->data->keys = 0; in bch_journal_next() 692 sectors = __set_blocks(w->data, w->data->keys + nkeys, in journal_wait_for_write() 713 BUG_ON(!w->data->keys); in journal_wait_for_write() 751 struct keylist *keys, in bch_journal() argument 760 w = journal_wait_for_write(c, bch_keylist_nkeys(keys)); in bch_journal() 762 memcpy(bset_bkey_last(w->data), keys->keys, bch_keylist_bytes(keys)); in bch_journal() 763 w->data->keys += bch_keylist_nkeys(keys); in bch_journal() [all …]
|
D | bset.h | 252 #define set_bytes(i) __set_bytes(i, i->keys) 257 __set_blocks(i, (i)->keys, block_bytes) 383 #define bset_bkey_last(i) bkey_idx((struct bkey *) (i)->d, (i)->keys) 463 struct bkey *keys; member 483 l->keys = k; in bch_keylist_init_single() 500 return l->top == l->keys; in bch_keylist_empty() 505 l->top = l->keys; in bch_keylist_reset()
|
D | extents.c | 125 static void bch_bkey_dump(struct btree_keys *keys, const struct bkey *k) in bch_bkey_dump() argument 127 struct btree *b = container_of(keys, struct btree, keys); in bch_bkey_dump() 167 struct btree *b = container_of(bk, struct btree, keys); in bch_btree_ptr_invalid() 205 struct btree *b = container_of(bk, struct btree, keys); in bch_btree_ptr_bad() 230 struct btree *b = container_of(bk, struct btree, keys); in bch_btree_ptr_insert_fixup() 326 struct cache_set *c = container_of(b, struct btree, keys)->c; in bch_extent_insert_fixup() 499 struct btree *b = container_of(bk, struct btree, keys); in bch_extent_invalid() 535 struct btree *b = container_of(bk, struct btree, keys); in bch_extent_bad() 580 struct btree *b = container_of(bk, struct btree, keys); in bch_extent_merge()
|
D | btree.h | 136 struct btree_keys keys; member 178 return b->keys.set->data; in btree_bset_first() 183 return bset_tree_last(&b->keys)->data; in btree_bset_last() 188 return bset_sector_offset(&b->keys, i) >> b->c->block_bits; in bset_block_offset()
|
D | bset.c | 27 (unsigned) ((u64 *) k - i->d), i->keys); in bch_dump_bset() 158 struct bkey *k = l->keys; in bch_keylist_pop() 171 l->top_p -= bkey_u64s(l->keys); in bch_keylist_pop_front() 173 memmove(l->keys, in bch_keylist_pop_front() 174 bkey_next(l->keys), in bch_keylist_pop_front() 565 ? bset_bkey_idx(t->data, t->data->keys - bkey_u64s(&t->end)) in make_bfloat() 628 i->keys = 0; in bch_bset_init_next() 806 __set_bytes(t->data, t->data->keys + bkey_u64s(insert)) > in bch_bset_insert() 813 t->data->keys += bkey_u64s(insert); in bch_bset_insert() 1174 out->keys = last ? (uint64_t *) bkey_next(last) - out->d : 0; in btree_mergesort() [all …]
|
D | writeback.c | 142 struct keylist keys; in write_dirty_finish() local 144 bch_keylist_init(&keys); in write_dirty_finish() 146 bkey_copy(keys.top, &w->key); in write_dirty_finish() 147 SET_KEY_DIRTY(keys.top, false); in write_dirty_finish() 148 bch_keylist_push(&keys); in write_dirty_finish() 153 ret = bch_btree_insert(dc->disk.c, &keys, NULL, &w->key); in write_dirty_finish() 444 RB_EMPTY_ROOT(&dc->writeback_keys.keys)) { in bch_writeback_thread()
|
D | super.c | 112 sb->keys = le16_to_cpu(s->keys); in read_super() 118 sb->version, sb->flags, sb->seq, sb->keys); in read_super() 128 if (sb->keys > SB_JOURNAL_BUCKETS) in read_super() 196 for (i = 0; i < sb->keys; i++) in read_super() 201 if (sb->first_bucket + sb->keys > sb->nbuckets) in read_super() 254 out->keys = cpu_to_le16(sb->keys); in __write_super() 256 for (i = 0; i < sb->keys; i++) in __write_super() 1667 ca->sb.keys = clamp_t(int, ca->sb.nbuckets >> 7, in run_cache_set() 1670 for (j = 0; j < ca->sb.keys; j++) in run_cache_set()
|
/linux-4.1.27/drivers/net/ethernet/cisco/enic/ |
D | enic_clsf.c | 20 int enic_addfltr_5t(struct enic *enic, struct flow_keys *keys, u16 rq) in enic_addfltr_5t() argument 25 switch (keys->ip_proto) { in enic_addfltr_5t() 36 data.u.ipv4.src_addr = ntohl(keys->src); in enic_addfltr_5t() 37 data.u.ipv4.dst_addr = ntohl(keys->dst); in enic_addfltr_5t() 38 data.u.ipv4.src_port = ntohs(keys->port16[0]); in enic_addfltr_5t() 39 data.u.ipv4.dst_port = ntohs(keys->port16[1]); in enic_addfltr_5t() 161 if (tpos->keys.src == k->src && in htbl_key_search() 162 tpos->keys.dst == k->dst && in htbl_key_search() 163 tpos->keys.ports == k->ports && in htbl_key_search() 164 tpos->keys.ip_proto == k->ip_proto && in htbl_key_search() [all …]
|
D | enic_ethtool.c | 351 switch (n->keys.ip_proto) { in enic_grxclsrule() 363 fsp->h_u.tcp_ip4_spec.ip4src = n->keys.src; in enic_grxclsrule() 366 fsp->h_u.tcp_ip4_spec.ip4dst = n->keys.dst; in enic_grxclsrule() 369 fsp->h_u.tcp_ip4_spec.psrc = n->keys.port16[0]; in enic_grxclsrule() 372 fsp->h_u.tcp_ip4_spec.pdst = n->keys.port16[1]; in enic_grxclsrule()
|
D | enic_clsf.h | 9 int enic_addfltr_5t(struct enic *enic, struct flow_keys *keys, u16 rq);
|
/linux-4.1.27/net/core/ |
D | flow_dissector.c | 283 static inline u32 __flow_hash_from_keys(struct flow_keys *keys) in __flow_hash_from_keys() argument 288 if (((__force u32)keys->dst < (__force u32)keys->src) || in __flow_hash_from_keys() 289 (((__force u32)keys->dst == (__force u32)keys->src) && in __flow_hash_from_keys() 290 ((__force u16)keys->port16[1] < (__force u16)keys->port16[0]))) { in __flow_hash_from_keys() 291 swap(keys->dst, keys->src); in __flow_hash_from_keys() 292 swap(keys->port16[0], keys->port16[1]); in __flow_hash_from_keys() 295 hash = __flow_hash_3words((__force u32)keys->dst, in __flow_hash_from_keys() 296 (__force u32)keys->src, in __flow_hash_from_keys() 297 (__force u32)keys->ports); in __flow_hash_from_keys() 304 u32 flow_hash_from_keys(struct flow_keys *keys) in flow_hash_from_keys() argument [all …]
|
/linux-4.1.27/tools/perf/scripts/python/Perf-Trace-Util/lib/Perf/Trace/ |
D | Core.py | 35 keys = flag_fields[event_name][field_name]['values'].keys() 36 keys.sort() 37 for idx in keys: 54 keys = symbolic_fields[event_name][field_name]['values'].keys() 55 keys.sort() 56 for idx in keys: 77 keys = trace_flags.keys() 79 for idx in keys:
|
/linux-4.1.27/drivers/mfd/ |
D | ucb1x00-assabet.c | 44 struct gpio_keys_platform_data keys; in ucb1x00_assabet_add() local 49 memset(&keys, 0, sizeof(keys)); in ucb1x00_assabet_add() 58 keys.buttons = buttons; in ucb1x00_assabet_add() 59 keys.nbuttons = ARRAY_SIZE(buttons); in ucb1x00_assabet_add() 60 keys.poll_interval = 50; in ucb1x00_assabet_add() 61 keys.name = "ucb1x00"; in ucb1x00_assabet_add() 64 &keys, sizeof(keys)); in ucb1x00_assabet_add()
|
D | adp5520.c | 256 if (pdata->keys) { in adp5520_probe() 258 chip->id, pdata->keys, sizeof(*pdata->keys)); in adp5520_probe()
|
/linux-4.1.27/drivers/md/persistent-data/ |
D | dm-btree.c | 47 uint64_t mid_key = le64_to_cpu(n->keys[mid]); in bsearch() 96 array_insert(node->keys, sizeof(*node->keys), nr_entries, index, &key_le); in insert_at() 342 *result_key = le64_to_cpu(ro_node(s)->keys[i]); in btree_lookup_raw() 349 uint64_t *keys, void *value_le) in dm_btree_lookup() argument 371 r = btree_lookup_raw(&spine, root, keys[level], in dm_btree_lookup() 376 if (rkey != keys[level]) { in dm_btree_lookup() 451 memcpy(rn->keys, ln->keys + nr_left, nr_right * sizeof(rn->keys[0])); in btree_split_sibling() 473 le64_to_cpu(rn->keys[0]), &location); in btree_split_sibling() 477 if (key < le64_to_cpu(rn->keys[0])) { in btree_split_sibling() 547 memcpy(ln->keys, pn->keys, nr_left * sizeof(pn->keys[0])); in btree_split_beneath() [all …]
|
D | dm-btree.h | 110 uint64_t *keys, void *value_le); 116 uint64_t *keys, void *value, dm_block_t *new_root) 125 uint64_t *keys, void *value, dm_block_t *new_root, 135 uint64_t *keys, dm_block_t *new_root); 159 int (*fn)(void *context, uint64_t *keys, void *leaf),
|
D | dm-btree-internal.h | 41 __le64 keys[0]; member 110 return n->keys + index; in key_ptr() 115 return &n->keys[le32_to_cpu(n->header.max_entries)]; in value_base()
|
D | dm-btree-remove.c | 227 *key_ptr(parent, r->index) = right->keys[0]; in __rebalance2() 285 *key_ptr(parent, r->index) = right->keys[0]; in delete_center_node() 340 *key_ptr(parent, c->index) = center->keys[0]; in redistribute3() 341 *key_ptr(parent, r->index) = right->keys[0]; in redistribute3() 491 (le64_to_cpu(n->keys[i]) != key)) in do_leaf() 553 uint64_t *keys, dm_block_t *new_root) in dm_btree_remove() argument 567 root, keys[level], (unsigned *)&index); in dm_btree_remove()
|
/linux-4.1.27/Documentation/security/ |
D | 00-INDEX | 15 keys-ecryptfs.txt 16 - description of the encryption keys for the ecryptfs filesystem. 17 keys-request-key.txt 19 keys-trusted-encrypted.txt 20 - info on the Trusted and Encrypted keys in the kernel key ring service. 21 keys.txt
|
D | keys-trusted-encrypted.txt | 4 key ring service. Both of these new types are variable length symmetric keys, 5 and in both cases all keys are created in the kernel, and user space sees, 11 Trusted Keys use a TPM both to generate and to seal the keys. Keys are sealed 15 (future) PCR values, so keys are easily migrated to new pcr values, such as 19 By default, trusted keys are sealed under the SRK, which has the default 43 TPM_STORED_DATA format. The key length for new keys are always in bytes. 47 Encrypted keys do not depend on a TPM, and are faster, as they use AES for 48 encryption/decryption. New keys are created from kernel generated random 51 disadvantage of encrypted keys is that if they are not rooted in a trusted key, 56 The decrypted portion of encrypted keys can contain either a simple symmetric [all …]
|
D | keys.txt | 5 This service allows cryptographic keys, authentication tokens, cross-domain 10 other keys. Processes each have three standard keyring subscriptions that a 11 kernel service can search for relevant keys. 36 In this context, keys represent units of cryptographic data, authentication 58 kernel by a kernel service (such as a filesystem) before keys of that type 64 Should a type be removed from the system, all the keys of that type will 79 actual "key". In the case of a keyring, this is a list of keys to which 124 The key service provides a number of features besides keys: 130 Keyrings are special keys that contain a list of other keys. Keyring 148 separated from the rest of the description by a ':'. "logon" keys can [all …]
|
D | keys-ecryptfs.txt | 1 Encrypted keys for the eCryptfs filesystem 22 filesystem. Encrypted keys of the newly introduced format store an 31 The eCryptfs filesystem may really benefit from using encrypted keys in that the
|
D | keys-request-key.txt | 6 Documentation/security/keys.txt). This document explains more fully how 56 The two async in-kernel calls may return keys that are still in the process of 158 (2) It considers all the non-keyring keys within that keyring and, if any key 164 (3) It then considers all the keyring-type keys in the keyring it's currently
|
/linux-4.1.27/drivers/crypto/nx/ |
D | nx-aes-xcbc.c | 76 u8 keys[2][AES_BLOCK_SIZE]; in nx_xcbc_empty() local 88 memset(keys[0], 0x01, sizeof(keys[0])); in nx_xcbc_empty() 89 memset(keys[1], 0x03, sizeof(keys[1])); in nx_xcbc_empty() 91 len = sizeof(keys); in nx_xcbc_empty() 93 in_sg = nx_build_sg_list(nx_ctx->in_sg, (u8 *) keys, &len, in nx_xcbc_empty() 96 if (len != sizeof(keys)) in nx_xcbc_empty() 99 out_sg = nx_build_sg_list(nx_ctx->out_sg, (u8 *) keys, &len, in nx_xcbc_empty() 102 if (len != sizeof(keys)) in nx_xcbc_empty() 115 keys[1][0] ^= 0x80; in nx_xcbc_empty() 117 len = sizeof(keys[1]); in nx_xcbc_empty() [all …]
|
/linux-4.1.27/security/keys/ |
D | Kconfig | 10 access keys in the kernel. 12 It also includes provision of methods by which such keys might be 17 a searchable sequence of keys. Each process is equipped with access 41 bool "Large payload keys" 45 This option provides support for holding large keys within the kernel 59 keys in the kernel. Trusted keys are random number symmetric keys, 60 generated and RSA-sealed by the TPM. The TPM only unseals the keys, 76 This option provides support for create/encrypting/decrypting keys 77 in the kernel. Encrypted keys are kernel generated random numbers,
|
D | keyring.c | 151 assoc_array_init(&keyring->keys); in keyring_instantiate() 397 assoc_array_destroy(&keyring->keys, &keyring_assoc_array_ops); in keyring_destroy() 411 if (keyring->keys.nr_leaves_on_tree != 0) in keyring_describe() 412 seq_printf(m, ": %lu", keyring->keys.nr_leaves_on_tree); in keyring_describe() 463 nr_keys = keyring->keys.nr_leaves_on_tree; in keyring_read() 479 ret = assoc_array_iterate(&keyring->keys, keyring_read_iterator, &ctx); in keyring_read() 600 object = assoc_array_find(&keyring->keys, in search_keyring() 605 return assoc_array_iterate(&keyring->keys, ctx->iterator, ctx); in search_keyring() 678 ptr = ACCESS_ONCE(keyring->keys.root); in search_nested_keyrings() 944 object = assoc_array_find(&keyring->keys, &keyring_assoc_array_ops, in find_key_to_update() [all …]
|
D | gc.c | 127 static noinline void key_gc_unused_keys(struct list_head *keys) in key_gc_unused_keys() argument 129 while (!list_empty(keys)) { in key_gc_unused_keys() 131 list_entry(keys->next, struct key, graveyard_link); in key_gc_unused_keys()
|
D | Makefile | 28 obj-$(CONFIG_ENCRYPTED_KEYS) += encrypted-keys/
|
/linux-4.1.27/net/sched/ |
D | act_pedit.c | 40 struct tc_pedit_key *keys = NULL; in tcf_pedit_init() local 64 keys = kmalloc(ksize, GFP_KERNEL); in tcf_pedit_init() 65 if (keys == NULL) { in tcf_pedit_init() 79 keys = kmalloc(ksize, GFP_KERNEL); in tcf_pedit_init() 80 if (keys == NULL) in tcf_pedit_init() 88 if (keys) { in tcf_pedit_init() 90 p->tcfp_keys = keys; in tcf_pedit_init() 93 memcpy(p->tcfp_keys, parm->keys, ksize); in tcf_pedit_init() 103 struct tc_pedit_key *keys = p->tcfp_keys; in tcf_pedit_cleanup() local 104 kfree(keys); in tcf_pedit_cleanup() [all …]
|
D | sch_sfb.c | 290 struct flow_keys keys; in sfb_enqueue() local 315 keys.src = salt; in sfb_enqueue() 316 keys.dst = 0; in sfb_enqueue() 317 keys.ports = 0; in sfb_enqueue() 319 skb_flow_dissect(skb, &keys); in sfb_enqueue() 324 sfbhash = jhash_3words((__force u32)keys.dst, in sfb_enqueue() 325 (__force u32)keys.src, in sfb_enqueue() 326 (__force u32)keys.ports, in sfb_enqueue() 359 sfbhash = jhash_3words((__force u32)keys.dst, in sfb_enqueue() 360 (__force u32)keys.src, in sfb_enqueue() [all …]
|
D | sch_fq_codel.c | 73 struct flow_keys keys; in fq_codel_hash() local 76 skb_flow_dissect(skb, &keys); in fq_codel_hash() 77 hash = jhash_3words((__force u32)keys.dst, in fq_codel_hash() 78 (__force u32)keys.src ^ keys.ip_proto, in fq_codel_hash() 79 (__force u32)keys.ports, q->perturbation); in fq_codel_hash()
|
D | sch_hhf.c | 182 struct flow_keys keys; in skb_hash() local 188 skb_flow_dissect(skb, &keys); in skb_hash() 189 hash = jhash_3words((__force u32)keys.dst, in skb_hash() 190 (__force u32)keys.src ^ keys.ip_proto, in skb_hash() 191 (__force u32)keys.ports, q->perturbation); in skb_hash()
|
D | sch_sfq.c | 164 struct flow_keys keys; member 176 const struct flow_keys *keys = &sfq_skb_cb(skb)->keys; in sfq_hash() local 179 hash = jhash_3words((__force u32)keys->dst, in sfq_hash() 180 (__force u32)keys->src ^ keys->ip_proto, in sfq_hash() 181 (__force u32)keys->ports, q->perturbation); in sfq_hash() 200 skb_flow_dissect(skb, &sfq_skb_cb(skb)->keys); in sfq_classify()
|
D | sch_choke.c | 145 u8 keys[QDISC_CB_PRIV_LEN - 3]; member 180 memcpy(&choke_skb_cb(skb1)->keys, &temp, CHOKE_K_LEN); in choke_match_flow() 186 memcpy(&choke_skb_cb(skb2)->keys, &temp, CHOKE_K_LEN); in choke_match_flow() 189 return !memcmp(&choke_skb_cb(skb1)->keys, in choke_match_flow() 190 &choke_skb_cb(skb2)->keys, in choke_match_flow()
|
D | cls_flow.c | 290 u32 keys[FLOW_KEY_MAX + 1]; in flow_classify() local 303 keys[n] = flow_key_get(skb, key, &flow_keys); in flow_classify() 307 classid = jhash2(keys, f->nkeys, f->hashrnd); in flow_classify() 309 classid = keys[0]; in flow_classify()
|
/linux-4.1.27/Documentation/devicetree/bindings/input/ |
D | input-reset.txt | 3 A simple binding to represent a set of keys as described in 4 include/uapi/linux/input.h. This is to communicate a sequence of keys to the 5 sysrq driver. Upon holding the keys for a specified amount of time (if 8 Key sequences are global to the system but all the keys in a set must be coming 12 a set of keys. 18 timeout-ms: duration keys must be pressed together in milliseconds before
|
D | sun4i-lradc-keys.txt | 1 Allwinner sun4i low res adc attached tablet keys 5 - compatible: "allwinner,sun4i-a10-lradc-keys" 10 Each key is represented as a sub-node of "allwinner,sun4i-a10-lradc-keys": 23 compatible = "allwinner,sun4i-a10-lradc-keys";
|
D | gpio-keys-polled.txt | 4 - compatible = "gpio-keys-polled"; 11 Each button (key) is represented as a sub-node of "gpio-keys-polled": 28 compatible = "gpio-keys-polled";
|
D | gpio-keys.txt | 4 - compatible = "gpio-keys"; 10 Each button (key) is represented as a sub-node of "gpio-keys": 34 compatible = "gpio-keys";
|
D | imx-keypad.txt | 4 or 3-point contact keys. The KPP is designed to simplify the software task 6 and decoding one or multiple keys pressed simultaneously on a keypad.
|
D | matrix-keymap.txt | 2 defining the keys in the scope of linux key codes since that is a stable and
|
D | st-keyscan.txt | 19 - linux,keymap: The keymap for keys as described in the binding document
|
/linux-4.1.27/security/keys/encrypted-keys/ |
D | Makefile | 5 obj-$(CONFIG_ENCRYPTED_KEYS) += encrypted-keys.o 7 encrypted-keys-y := encrypted.o ecryptfs_format.o 10 encrypted-keys-y += $(masterkey-y) $(masterkey-m-m)
|
/linux-4.1.27/include/trace/events/ |
D | bcache.h | 247 __field(unsigned, keys ) 253 __entry->keys = b->keys.set[b->keys.nsets].data->keys; 343 TP_PROTO(struct btree *b, unsigned keys), 344 TP_ARGS(b, keys), 348 __field(unsigned, keys ) 353 __entry->keys = keys; 356 TP_printk("bucket %zu keys %u", __entry->bucket, __entry->keys) 360 TP_PROTO(struct btree *b, unsigned keys), 361 TP_ARGS(b, keys) 365 TP_PROTO(struct btree *b, unsigned keys), [all …]
|
/linux-4.1.27/tools/perf/scripts/python/ |
D | check-perf-trace.py | 71 keys = unhandled.keys() 72 if not keys: 81 for event_name in keys:
|
D | failed-syscalls-by-pid.py | 68 comm_keys = syscalls.keys() 70 pid_keys = syscalls[comm].keys() 73 id_keys = syscalls[comm][pid].keys() 76 ret_keys = syscalls[comm][pid][id].keys()
|
D | netdev-times.py | 132 if 'comm' in event.keys(): 137 elif 'handle' in event.keys(): 303 if cpu not in irq_dic.keys(): 310 if cpu not in irq_dic.keys(): 317 if 'event_list' in irq_record.keys(): 322 if cpu not in irq_dic.keys() \ 326 if 'event_list' in irq_record.keys(): 342 if cpu in irq_dic.keys(): 345 if cpu in net_rx_dic.keys(): 358 if cpu in net_rx_dic.keys(): [all …]
|
D | syscall-counts-by-pid.py | 66 comm_keys = syscalls.keys() 68 pid_keys = syscalls[comm].keys() 71 id_keys = syscalls[comm][pid].keys()
|
D | net_dropmonitor.py | 53 for i in drop_log.keys():
|
/linux-4.1.27/drivers/net/wireless/orinoco/ |
D | wext.c | 34 kzfree(priv->keys[index].key); in orinoco_set_key() 35 kzfree(priv->keys[index].seq); in orinoco_set_key() 38 priv->keys[index].key = kzalloc(key_len, GFP_ATOMIC); in orinoco_set_key() 39 if (!priv->keys[index].key) in orinoco_set_key() 42 priv->keys[index].key = NULL; in orinoco_set_key() 45 priv->keys[index].seq = kzalloc(seq_len, GFP_ATOMIC); in orinoco_set_key() 46 if (!priv->keys[index].seq) in orinoco_set_key() 49 priv->keys[index].seq = NULL; in orinoco_set_key() 51 priv->keys[index].key_len = key_len; in orinoco_set_key() 52 priv->keys[index].seq_len = seq_len; in orinoco_set_key() [all …]
|
D | hw.c | 828 struct orinoco_key keys[ORINOCO_MAX_KEYS]; in __orinoco_hw_setup_wepkeys() local 830 memset(&keys, 0, sizeof(keys)); in __orinoco_hw_setup_wepkeys() 832 int len = min(priv->keys[i].key_len, in __orinoco_hw_setup_wepkeys() 834 memcpy(&keys[i].data, priv->keys[i].key, len); in __orinoco_hw_setup_wepkeys() 836 keys[i].len = cpu_to_le16(LARGE_KEY_SIZE); in __orinoco_hw_setup_wepkeys() 838 keys[i].len = cpu_to_le16(SMALL_KEY_SIZE); in __orinoco_hw_setup_wepkeys() 840 keys[i].len = cpu_to_le16(0); in __orinoco_hw_setup_wepkeys() 845 &keys); in __orinoco_hw_setup_wepkeys() 862 keylen = priv->keys[priv->tx_key].key_len; in __orinoco_hw_setup_wepkeys() 879 memcpy(key, priv->keys[i].key, in __orinoco_hw_setup_wepkeys() [all …]
|
/linux-4.1.27/scripts/kconfig/ |
D | mconf.c | 290 int *keys, int *vscroll, int *hscroll, 361 int *keys; member 378 data->keys[k] = key; in update_text() 388 data->keys[k] = 0; in update_text() 436 int keys[JUMP_NB + 1], i; in search_conf() local 440 .keys = keys, in search_conf() 447 str_get(&res), 0, 0, keys, &vscroll, in search_conf() 451 for (i = 0; i < JUMP_NB && keys[i]; i++) in search_conf() 452 if (dres == keys[i]) { in search_conf() 757 *keys, int *vscroll, int *hscroll, update_text_fn in show_textbox_ext() argument [all …]
|
/linux-4.1.27/security/integrity/ |
D | Kconfig | 28 to "lock" certain keyring to prevent adding new keys. 29 This is useful for evm and module keyrings, when keys are 33 bool "Enable asymmetric keys support" 42 asymmetric keys.
|
/linux-4.1.27/crypto/ |
D | authenc.c | 55 int crypto_authenc_extractkeys(struct crypto_authenc_keys *keys, const u8 *key, in crypto_authenc_extractkeys() argument 69 keys->enckeylen = be32_to_cpu(param->enckeylen); in crypto_authenc_extractkeys() 74 if (keylen < keys->enckeylen) in crypto_authenc_extractkeys() 77 keys->authkeylen = keylen - keys->enckeylen; in crypto_authenc_extractkeys() 78 keys->authkey = key; in crypto_authenc_extractkeys() 79 keys->enckey = key + keys->authkeylen; in crypto_authenc_extractkeys() 91 struct crypto_authenc_keys keys; in crypto_authenc_setkey() local 94 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in crypto_authenc_setkey() 100 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in crypto_authenc_setkey() 110 err = crypto_ablkcipher_setkey(enc, keys.enckey, keys.enckeylen); in crypto_authenc_setkey()
|
D | authencesn.c | 65 struct crypto_authenc_keys keys; in crypto_authenc_esn_setkey() local 68 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in crypto_authenc_esn_setkey() 74 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in crypto_authenc_esn_setkey() 84 err = crypto_ablkcipher_setkey(enc, keys.enckey, keys.enckeylen); in crypto_authenc_esn_setkey()
|
/linux-4.1.27/arch/arm/boot/dts/ |
D | bcm47081-buffalo-wzr-900dhp.dts | 26 gpio-keys { 27 compatible = "gpio-keys";
|
D | bcm4708-luxul-xwc-1000.dts | 49 gpio-keys { 50 compatible = "gpio-keys";
|
D | bcm4709-netgear-r8000.dts | 54 gpio-keys { 55 compatible = "gpio-keys";
|
D | bcm47081-asus-rt-n18u.dts | 60 gpio-keys { 61 compatible = "gpio-keys";
|
D | bcm4708-netgear-r6300-v2.dts | 60 gpio-keys { 61 compatible = "gpio-keys";
|
D | bcm4708-netgear-r6250.dts | 70 gpio-keys { 71 compatible = "gpio-keys";
|
D | s3c6410-mini6410.dts | 71 gpio-keys { 72 compatible = "gpio-keys"; 207 gpio_keys: gpio-keys {
|
D | bcm47081-buffalo-wzr-600dhp2.dts | 93 gpio-keys { 94 compatible = "gpio-keys";
|
D | bcm4708-buffalo-wzr-1750dhp.dts | 93 gpio-keys { 94 compatible = "gpio-keys";
|
D | ste-nomadik-s8815.dts | 130 gpio-keys { 131 compatible = "gpio-keys";
|
D | kirkwood-mv88f6281gtw-ge.dts | 56 pmx_keys: pmx-keys { 106 compatible = "gpio-keys";
|
D | imx6q-gk802.dts | 40 gpio-keys { 41 compatible = "gpio-keys";
|
D | kirkwood-netxbig.dtsi | 55 gpio-keys { 56 compatible = "gpio-keys";
|
D | tegra30-colibri-eval-v3.dts | 136 gpio-keys { 137 compatible = "gpio-keys";
|
D | imx51-apf51dev.dts | 59 gpio-keys { 60 compatible = "gpio-keys";
|
D | rk3066a-bqcurie2.dts | 37 gpio-keys { 38 compatible = "gpio-keys";
|
D | imx53-ard.dts | 65 gpio-keys { 66 compatible = "gpio-keys";
|
D | sama5d35ek.dts | 46 compatible = "gpio-keys";
|
D | kirkwood-ts219-6281.dts | 36 compatible = "gpio-keys";
|
D | mpa1600.dts | 69 compatible = "gpio-keys";
|
D | orion5x-maxtor-shared-storage-2.dts | 36 gpio-keys { 37 compatible = "gpio-keys";
|
D | kirkwood-iomega_ix2_200.dts | 147 gpio-keys { 148 compatible = "gpio-keys";
|
D | orion5x-lacie-ethernet-disk-mini-v2.dts | 42 gpio-keys { 43 compatible = "gpio-keys";
|
D | imx28-apf28dev.dts | 221 gpio-keys { 222 compatible = "gpio-keys";
|
D | kirkwood-b3.dts | 152 gpio-keys { 153 compatible = "gpio-keys";
|
D | kirkwood-ts219-6282.dts | 46 compatible = "gpio-keys";
|
D | rk3066a-rayeager.dts | 61 keys: gpio-keys { label 62 compatible = "gpio-keys"; 370 keys {
|
D | rk3288-firefly.dtsi | 63 keys: gpio-keys { label 64 compatible = "gpio-keys"; 385 keys {
|
D | imx53-smd.dts | 24 gpio-keys { 25 compatible = "gpio-keys";
|
D | tegra30-apalis-eval.dts | 186 gpio-keys { 187 compatible = "gpio-keys";
|
D | kirkwood-netgear_readynas_duo_v2.dts | 159 gpio-keys { 160 compatible = "gpio-keys";
|
D | kirkwood-ns2-common.dtsi | 56 compatible = "gpio-keys";
|
D | omap3-overo-palo43-common.dtsi | 35 compatible = "gpio-keys";
|
D | omap3-overo-gallop43-common.dtsi | 35 compatible = "gpio-keys";
|
D | usb_a9g20-dab-mmx.dtsi | 68 compatible = "gpio-keys";
|
D | imx27-apf27dev.dts | 39 gpio-keys { 40 compatible = "gpio-keys";
|
D | kirkwood-netgear_readynas_nv+_v2.dts | 171 gpio-keys { 172 compatible = "gpio-keys";
|
D | rk3288-evb.dtsi | 63 gpio-keys { 64 compatible = "gpio-keys";
|
D | kirkwood-cloudbox.dts | 59 compatible = "gpio-keys";
|
D | omap3-overo-chestnut43-common.dtsi | 35 compatible = "gpio-keys";
|
D | kirkwood-dir665.dts | 189 gpio-keys { 190 compatible = "gpio-keys";
|
D | orion5x-lacie-d2-network.dts | 36 gpio-keys { 37 compatible = "gpio-keys";
|
D | kirkwood-ts419.dtsi | 42 compatible = "gpio-keys";
|
D | omap3-overo-alto35-common.dtsi | 42 compatible = "gpio-keys";
|
D | usb_a9260_common.dtsi | 110 compatible = "gpio-keys";
|
D | omap4-var-om44customboard.dtsi | 33 gpio-keys { 34 compatible = "gpio-keys";
|
D | armada-xp-axpwifiap.dts | 152 compatible = "gpio-keys"; 170 keys_pin: keys-pin {
|
D | moxart-uc7112lx.dts | 63 compatible = "gpio-keys-polled";
|
D | imx53-qsb-common.dtsi | 57 gpio-keys { 58 compatible = "gpio-keys";
|
D | ste-href-stuib.dtsi | 16 compatible = "gpio-keys";
|
D | usb_a9263.dts | 138 compatible = "gpio-keys";
|
D | emev2-kzm9d.dts | 32 compatible = "gpio-keys";
|
D | kizbox.dts | 132 compatible = "gpio-keys";
|
D | imx6qdl-cubox-i.dtsi | 110 gpio-keys { 111 compatible = "gpio-keys";
|
D | rk3188-radxarock.dts | 26 gpio-keys { 27 compatible = "gpio-keys";
|
D | armada-370-rd.dts | 144 gpio-keys { 145 compatible = "gpio-keys";
|
D | tegra114-tn7.dts | 288 gpio-keys { 289 compatible = "gpio-keys";
|
D | imx28-eukrea-mbmx28lc.dtsi | 31 compatible = "gpio-keys"; 44 compatible = "gpio-keys";
|
D | at91-foxg20.dts | 156 compatible = "gpio-keys";
|
D | kirkwood-nsa3x0-common.dtsi | 74 compatible = "gpio-keys";
|
D | pm9g45.dts | 157 compatible = "gpio-keys";
|
D | ste-href-family-pinctrl.dtsi | 636 /* SKE keys on position 2 in an 8x8 matrix */ 694 * SKE keys on position 1 and "other C1" combi giving 695 * six rows of six keys.
|
D | animeo_ip.dts | 150 compatible = "gpio-keys";
|
D | kirkwood-ib62x0.dts | 59 compatible = "gpio-keys";
|
D | bcm911360_entphn.dts | 56 compatible = "gpio-keys";
|
D | at91-qil_a9260.dts | 178 compatible = "gpio-keys";
|
D | armada-370-netgear-rn104.dts | 241 gpio-keys { 242 compatible = "gpio-keys";
|
D | s5pv210-aquila.dts | 252 gpio-keys { 253 compatible = "gpio-keys";
|
D | imx6qdl-sabrelite.dtsi | 58 gpio-keys { 59 compatible = "gpio-keys";
|
D | armada-370-netgear-rn102.dts | 219 gpio-keys { 220 compatible = "gpio-keys";
|
D | imx6qdl-nitrogen6x.dtsi | 59 gpio-keys { 60 compatible = "gpio-keys";
|
/linux-4.1.27/Documentation/video4linux/ |
D | README.ir | 30 layer, i.e. you'll see the keys of the remote as normal key strokes 40 is, check whenever pressing keys on the remote actually generates 56 XFree86 likely can be configured to recognise the remote keys. Once I 58 device, which had the effect that XFree86 recognised some of the keys
|
/linux-4.1.27/security/integrity/ima/ |
D | Kconfig | 126 bool "Require all keys on the .ima keyring be signed" 131 This option requires that all keys added to the .ima 139 File signature verification is based on the public keys 140 loaded on the .ima trusted keyring. These public keys are 148 default "/etc/keys/x509_ima.der"
|
/linux-4.1.27/fs/nilfs2/ |
D | bmap.c | 113 __u64 keys[NILFS_BMAP_SMALL_HIGH + 1]; in nilfs_bmap_do_insert() local 121 bmap, keys, ptrs, NILFS_BMAP_SMALL_HIGH + 1); in nilfs_bmap_do_insert() 125 bmap, key, ptr, keys, ptrs, n); in nilfs_bmap_do_insert() 168 __u64 keys[NILFS_BMAP_LARGE_LOW + 1]; in nilfs_bmap_do_delete() local 176 bmap, keys, ptrs, NILFS_BMAP_LARGE_LOW + 1); in nilfs_bmap_do_delete() 180 bmap, key, keys, ptrs, n); in nilfs_bmap_do_delete()
|
D | direct.c | 215 __u64 *keys, __u64 *ptrs, int nitems) in nilfs_direct_gather_data() argument 227 keys[n] = key; in nilfs_direct_gather_data() 236 __u64 key, __u64 *keys, __u64 *ptrs, int n) in nilfs_direct_delete_and_convert() argument 255 if ((j < n) && (i == keys[j])) { in nilfs_direct_delete_and_convert()
|
D | btree.c | 176 const __u64 *keys, const __u64 *ptrs) in nilfs_btree_node_init() argument 189 dkeys[i] = cpu_to_le64(keys[i]); in nilfs_btree_node_init() 1681 __u64 *keys, __u64 *ptrs, int nitems) in nilfs_btree_gather_data() argument 1719 keys[i] = le64_to_cpu(dkeys[i]); in nilfs_btree_gather_data() 1785 const __u64 *keys, const __u64 *ptrs, in nilfs_btree_commit_convert_and_insert() argument 1813 nilfs_btree_node_init(node, 0, 1, n, ncblk, keys, ptrs); in nilfs_btree_commit_convert_and_insert() 1827 &keys[0], &tmpptr); in nilfs_btree_commit_convert_and_insert() 1835 keys, ptrs); in nilfs_btree_commit_convert_and_insert() 1857 const __u64 *keys, const __u64 *ptrs, int n) in nilfs_btree_convert_and_insert() argument 1881 nilfs_btree_commit_convert_and_insert(btree, key, ptr, keys, ptrs, n, in nilfs_btree_convert_and_insert()
|
/linux-4.1.27/drivers/crypto/qat/qat_common/ |
D | qat_algs.c | 283 struct crypto_authenc_keys *keys) in qat_alg_aead_init_enc_session() argument 291 sizeof(struct icp_qat_hw_auth_setup) + keys->enckeylen); in qat_alg_aead_init_enc_session() 301 memcpy(cipher->aes.key, keys->enckey, keys->enckeylen); in qat_alg_aead_init_enc_session() 308 if (qat_alg_do_precomputes(hash, ctx, keys->authkey, keys->authkeylen)) in qat_alg_aead_init_enc_session() 324 cipher_cd_ctrl->cipher_key_sz = keys->enckeylen >> 3; in qat_alg_aead_init_enc_session() 363 struct crypto_authenc_keys *keys) in qat_alg_aead_init_dec_session() argument 386 memcpy(cipher->aes.key, keys->enckey, keys->enckeylen); in qat_alg_aead_init_dec_session() 394 if (qat_alg_do_precomputes(hash, ctx, keys->authkey, keys->authkeylen)) in qat_alg_aead_init_dec_session() 410 cipher_cd_ctrl->cipher_key_sz = keys->enckeylen >> 3; in qat_alg_aead_init_dec_session() 521 struct crypto_authenc_keys keys; in qat_alg_aead_init_sessions() local [all …]
|
/linux-4.1.27/net/wireless/ |
D | wext-compat.c | 444 if (!wdev->wext.keys) { in __cfg80211_set_encryption() 445 wdev->wext.keys = kzalloc(sizeof(*wdev->wext.keys), in __cfg80211_set_encryption() 447 if (!wdev->wext.keys) in __cfg80211_set_encryption() 450 wdev->wext.keys->params[i].key = in __cfg80211_set_encryption() 451 wdev->wext.keys->data[i]; in __cfg80211_set_encryption() 499 memset(wdev->wext.keys->data[idx], 0, in __cfg80211_set_encryption() 500 sizeof(wdev->wext.keys->data[idx])); in __cfg80211_set_encryption() 501 wdev->wext.keys->params[idx].key_len = 0; in __cfg80211_set_encryption() 502 wdev->wext.keys->params[idx].cipher = 0; in __cfg80211_set_encryption() 529 wdev->wext.keys->params[idx] = *params; in __cfg80211_set_encryption() [all …]
|
D | wext-sme.c | 36 if (wdev->wext.keys) { in cfg80211_mgd_wext_connect() 37 wdev->wext.keys->def = wdev->wext.default_key; in cfg80211_mgd_wext_connect() 38 wdev->wext.keys->defmgmt = wdev->wext.default_mgmt_key; in cfg80211_mgd_wext_connect() 46 if (wdev->wext.keys) { in cfg80211_mgd_wext_connect() 47 ck = kmemdup(wdev->wext.keys, sizeof(*ck), GFP_KERNEL); in cfg80211_mgd_wext_connect()
|
D | ibss.c | 287 if (wdev->wext.keys) { in cfg80211_ibss_wext_join() 288 wdev->wext.keys->def = wdev->wext.default_key; in cfg80211_ibss_wext_join() 289 wdev->wext.keys->defmgmt = wdev->wext.default_mgmt_key; in cfg80211_ibss_wext_join() 294 if (wdev->wext.keys) { in cfg80211_ibss_wext_join() 295 ck = kmemdup(wdev->wext.keys, sizeof(*ck), GFP_KERNEL); in cfg80211_ibss_wext_join()
|
/linux-4.1.27/Documentation/crypto/ |
D | asymmetric-keys.txt | 9 - Accessing asymmetric keys. 19 The "asymmetric" key type is designed to be a container for the keys used in 71 only keys of the specified subtype (e.g. tpm) will be matched. For 76 Looking in /proc/keys, the last 8 hex digits of the key fingerprint are 86 For general access to asymmetric keys from within the kernel, the following 91 This gives access to functions for dealing with asymmetric / public keys. 165 Asymmetric keys have a subtype that defines the set of operations that can be 175 #include <keys/asymmetric-subtype.h> 189 Asymmetric keys point to this with their type_data[0] member. 198 Mandatory. This allows the subtype to display something in /proc/keys [all …]
|
/linux-4.1.27/Documentation/laptops/ |
D | sonypi.txt | 19 - Fn keys 21 - programmable keys, back, help, zoom, thumbphrase buttons, etc. 84 programmable keys events). The default event mask is 107 keyboard reporting the pressing of the special keys. 126 Fn-keys which put the laptop in sleeping state, or switch the 128 driver disables all APM management for those keys, by enabling the 130 you have one of those laptops with working Fn keys and want to
|
D | thinkpad-acpi.txt | 168 Hot keys 189 The driver will generate events over the input layer for hot keys and 194 The hot key bit mask allows some control over which hot keys generate 201 modified do anything. Not all hot keys can be individually controlled 209 Note that unmasking some keys prevents their default behavior. For 223 echo 0xffffffff > /proc/acpi/ibm/hotkey -- enable all hot keys 224 echo 0 > /proc/acpi/ibm/hotkey -- disable all possible hot keys 249 Returns the hot keys mask when thinkpad-acpi was loaded. 250 Upon module unload, the hot keys mask will be restored 264 (see above). Returns the current status of the hot keys [all …]
|
/linux-4.1.27/drivers/net/wireless/ipw2x00/ |
D | libipw_wx.c | 412 memcpy(sec.keys[key], keybuf, erq->length); in libipw_wx_set_encode() 414 memset(sec.keys[key] + erq->length, 0, in libipw_wx_set_encode() 417 key, len, sec.keys[key], in libipw_wx_set_encode() 421 (*crypt)->ops->set_key(sec.keys[key], len, NULL, in libipw_wx_set_encode() 431 len = (*crypt)->ops->get_key(sec.keys[key], WEP_KEY_LEN, in libipw_wx_set_encode() 437 memset(sec.keys[key], 0, 13); in libipw_wx_set_encode() 438 (*crypt)->ops->set_key(sec.keys[key], 13, NULL, in libipw_wx_set_encode() 505 memcpy(keybuf, sec->keys[key], len); in libipw_wx_get_encode() 652 memcpy(sec.keys[idx], ext->key, ext->key_len); in libipw_wx_set_encodeext() 723 memcpy(ext->key, sec->keys[idx], ext->key_len); in libipw_wx_get_encodeext()
|
/linux-4.1.27/net/sctp/ |
D | objcnt.c | 56 SCTP_DBG_OBJCNT(keys); 72 SCTP_DBG_OBJCNT_ENTRY(keys),
|
D | auth.c | 68 SCTP_DBG_OBJCNT_DEC(keys); in sctp_auth_key_put() 88 SCTP_DBG_OBJCNT_INC(keys); in sctp_auth_create_key() 121 void sctp_auth_destroy_keys(struct list_head *keys) in sctp_auth_destroy_keys() argument 126 if (list_empty(keys)) in sctp_auth_destroy_keys() 129 key_for_each_safe(ep_key, tmp, keys) { in sctp_auth_destroy_keys()
|
/linux-4.1.27/Documentation/ |
D | module-signing.txt | 9 - Generating signing keys. 10 - Public keys in the kernel. 30 This facility uses X.509 ITU-T standard certificates to encode the public keys 146 The kernel contains a ring of public keys that can be viewed by root. They're 149 [root@deneb ~]# cat /proc/keys 160 Further, the architecture code may take public keys from a hardware store and 163 Finally, it is possible to add additional public keys by doing: 171 Note, however, that the kernel will only permit keys to be added to
|
D | braille-console.txt | 21 review mode. In review mode, the arrow keys permit to browse in the VT content, 22 page up/down keys go at the top/bottom of the screen, and the home key goes back
|
D | assoc_array.txt | 40 (3) Objects require index keys to locate them within the array. 42 (4) Index keys must be unique. Inserting an object with the same key as one 45 (5) Index keys can be of any length and can be of different lengths. 47 (6) Index keys should encode the length early on, before any variation due to 50 (7) Index keys can include a hash to scatter objects throughout the array. 165 (4) Diff the index keys of two objects. 349 This will cause leaves with different length keys to scatter away from each 350 other - and those with the same length keys to cluster together. 435 So, for instance, keys with the following example index keys will be found in 465 In the above example list of index keys, node A will contain:
|
D | static-keys.txt | 8 Static keys allows the inclusion of seldom used features in 43 kernel code paths should be able to make use of the static keys facility. 71 the basis for the static keys facility. 166 5) Static keys / jump label analysis, results (x86_64):
|
/linux-4.1.27/net/ethernet/ |
D | eth.c | 126 struct flow_keys keys; in eth_get_headlen() local 133 if (!__skb_flow_dissect(NULL, &keys, data, in eth_get_headlen() 135 return max_t(u32, keys.thoff, sizeof(*eth)); in eth_get_headlen() 138 return min_t(u32, __skb_get_poff(NULL, data, &keys, len), len); in eth_get_headlen()
|
/linux-4.1.27/Documentation/ABI/testing/ |
D | evm | 20 loading existing trusted/encrypted keys, refer to: 21 Documentation/keys-trusted-encrypted.txt. (A sample dracut
|
D | sysfs-driver-hid-roccat-ryos | 24 Description: When written, this file lets one set the default of all keys for 35 function keys for a specific profile. Profile index is included 45 keys for a specific profile. Profile index is included in 55 thumbster keys for a specific profile. Profile index is included 65 capslock and function keys for a specific profile. Profile index 75 easyzone keys for a specific profile. Profile index is included 84 Description: When written, this file lets one deactivate certain keys like 85 windows and application keys, to prevent accidental presses.
|
D | sysfs-driver-hid-roccat-isku | 23 Description: When written, this file lets one deactivate certain keys like 24 windows and application keys, to prevent accidental presses. 45 easyzone keys for a specific profile. Profile number is included 55 function keys for a specific profile. Profile number is included 65 keys for a specific profile. Profile number is included in 75 keys for a specific profile. Profile number is included in 85 thumbster keys for a specific profile. Profile number is included
|
D | sysfs-driver-hid-roccat-arvo | 15 several modifier keys internally. 34 Description: The keyboard lets the user deactivate 5 certain keys like the 35 windows and application keys, to protect the user from the outcome
|
D | sysfs-driver-toshiba_acpi | 152 In the "Normal Operation" mode, the F{1-12} keys are as usual 154 In the "Special Functions" mode, the F{1-12} keys trigger the 155 hotkey and the F{1-12} keys are accessed via FN-F{1-12}.
|
D | sysfs-driver-sunxi-sid | 9 HDMI-HDCP key and some custom keys. Below a quick overview, for
|
/linux-4.1.27/net/mac802154/ |
D | llsec.c | 40 INIT_LIST_HEAD(&sec->table.keys); in mac802154_llsec_init() 68 list_for_each_entry_safe(key, kn, &sec->table.keys, list) { in mac802154_llsec_destroy() 228 list_for_each_entry(pos, &sec->table.keys, list) { in mac802154_llsec_key_add() 264 list_add_rcu(&new->list, &sec->table.keys); in mac802154_llsec_key_add() 278 list_for_each_entry(pos, &sec->table.keys, list) { in mac802154_llsec_key_del() 344 list_for_each_entry_safe(pos, pn, &dev->dev.keys, list) { in llsec_dev_free() 375 INIT_LIST_HEAD(&entry->dev.keys); in mac802154_llsec_dev_add() 414 list_for_each_entry_rcu(devkey, &dev->dev.keys, list) { in llsec_devkey_find() 445 list_add_tail_rcu(&devkey->devkey.list, &dev->dev.keys); in mac802154_llsec_devkey_add() 566 list_for_each_entry_rcu(key_entry, &sec->table.keys, list) { in llsec_lookup_key() [all …]
|
/linux-4.1.27/tools/perf/Documentation/ |
D | perf-report.txt | 68 Sort histogram entries by given key(s) - multiple keys can be specified 69 in CSV format. Following sort keys are available: 97 By default, comm, dso and symbol keys are used. 100 If --branch-stack option is used, following sort keys are also 112 And default sort keys are changed to comm, dso_from, symbol_from, dso_to 117 Specify output field - multiple keys can be specified in CSV format. 122 By default, every sort keys not specified in -F will be appended 125 If --mem-mode option is used, following sort keys are also available 138 And default sort keys are changed to local_weight, mem, sym, dso,
|
/linux-4.1.27/drivers/staging/panel/ |
D | Kconfig | 49 int "Keypad type (0=none, 1=old 6 keys, 2=new 6 keys, 3=Nexcom 4 keys)" 54 The keys will be read from character device 10,185. Valid values are : 57 1 : old 6 keys keypad 58 2 : new 6 keys keypad, as used on the server at www.ant-computing.com 59 3 : Nexcom NSA1045's 4 keys keypad 62 supports simultaneous keys pressed when the keypad supports them.
|
/linux-4.1.27/net/mac80211/ |
D | key.c | 262 key = key_mtx_dereference(sdata->local, sdata->keys[idx]); in __ieee80211_set_default_key() 292 key = key_mtx_dereference(sdata->local, sdata->keys[idx]); in __ieee80211_set_default_mgmt_key() 357 rcu_assign_pointer(sdata->keys[idx], new); in ieee80211_key_replace() 628 old_key = key_mtx_dereference(sdata->local, sdata->keys[idx]); in ieee80211_key_link() 745 struct list_head *keys) in ieee80211_free_keys_iface() argument 759 list_add_tail(&key->list, keys); in ieee80211_free_keys_iface() 772 LIST_HEAD(keys); in ieee80211_free_keys() 778 ieee80211_free_keys_iface(sdata, &keys); in ieee80211_free_keys() 782 ieee80211_free_keys_iface(vlan, &keys); in ieee80211_free_keys() 785 if (!list_empty(&keys) || force_synchronize) in ieee80211_free_keys() [all …]
|
/linux-4.1.27/include/net/ |
D | ip.h | 362 struct flow_keys keys; in inet_set_txhash() local 364 keys.src = inet->inet_saddr; in inet_set_txhash() 365 keys.dst = inet->inet_daddr; in inet_set_txhash() 366 keys.port16[0] = inet->inet_sport; in inet_set_txhash() 367 keys.port16[1] = inet->inet_dport; in inet_set_txhash() 369 sk->sk_txhash = flow_hash_from_keys(&keys); in inet_set_txhash()
|
D | flow_keys.h | 42 u32 flow_hash_from_keys(struct flow_keys *keys);
|
D | ipv6.h | 717 struct flow_keys keys; in ip6_set_txhash() local 719 keys.src = (__force __be32)ipv6_addr_hash(&np->saddr); in ip6_set_txhash() 720 keys.dst = (__force __be32)ipv6_addr_hash(&sk->sk_v6_daddr); in ip6_set_txhash() 721 keys.port16[0] = inet->inet_sport; in ip6_set_txhash() 722 keys.port16[1] = inet->inet_dport; in ip6_set_txhash() 724 sk->sk_txhash = flow_hash_from_keys(&keys); in ip6_set_txhash()
|
D | ieee802154_netdev.h | 296 struct list_head keys; member 324 struct list_head keys; member
|
/linux-4.1.27/include/uapi/linux/ |
D | bcache.h | 202 __u16 keys; member 279 __u32 keys; member 353 __u32 keys; member
|
/linux-4.1.27/include/crypto/ |
D | authenc.h | 34 int crypto_authenc_extractkeys(struct crypto_authenc_keys *keys, const u8 *key,
|
/linux-4.1.27/net/bluetooth/hidp/ |
D | core.c | 175 unsigned char *keys = session->keys; in hidp_input_report() local 191 if (keys[i] > 3 && memscan(udata + 2, keys[i], 6) == udata + 8) { in hidp_input_report() 192 if (hidp_keycode[keys[i]]) in hidp_input_report() 193 input_report_key(dev, hidp_keycode[keys[i]], 0); in hidp_input_report() 195 BT_ERR("Unknown key (scancode %#x) released.", keys[i]); in hidp_input_report() 198 if (udata[i] > 3 && memscan(keys + 2, udata[i], 6) == keys + 8) { in hidp_input_report() 206 memcpy(keys, udata, 8); in hidp_input_report()
|
D | hidp.h | 171 unsigned char keys[8]; member
|
/linux-4.1.27/drivers/staging/media/lirc/ |
D | lirc_zilog.c | 546 unsigned char keys, ndiffs, id; in get_key_data() local 573 if (!read_uint8(&data, endp, &keys) || in get_key_data() 575 ndiffs > TX_BLOCK_SIZE || keys == 0) in get_key_data() 600 if (keys == 1) in get_key_data() 605 if (!skip(&data, endp, (keys - 1) * (ndiffs + 1))) in get_key_data() 609 for (base = 0, lim = keys - 1; lim; lim >>= 1) { in get_key_data() 847 unsigned char keys; in fw_load() local 855 !read_uint8(&data, tx_data->endp, &keys) || in fw_load() 857 ndiffs > TX_BLOCK_SIZE || keys == 0) in fw_load() 874 (ndiffs + 1) * (keys - 1))) in fw_load()
|
/linux-4.1.27/include/uapi/linux/tc_act/ |
D | tc_pedit.h | 30 struct tc_pedit_key keys[0]; member
|
/linux-4.1.27/scripts/kconfig/lxdialog/ |
D | textbox.c | 57 int initial_width, int *keys, int *_vscroll, int *_hscroll, in dialog_textbox() argument 250 for (i = 0; keys[i]; i++) { in dialog_textbox() 251 if (key == keys[i]) { in dialog_textbox()
|
/linux-4.1.27/drivers/staging/rtl8192u/ieee80211/ |
D | ieee80211_wx.c | 390 memcpy(sec.keys[key], keybuf, erq->length); in ieee80211_wx_set_encode() 392 memset(sec.keys[key] + erq->length, 0, in ieee80211_wx_set_encode() 395 key, escape_essid(sec.keys[key], len), in ieee80211_wx_set_encode() 398 (*crypt)->ops->set_key(sec.keys[key], len, NULL, in ieee80211_wx_set_encode() 408 len = (*crypt)->ops->get_key(sec.keys[key], WEP_KEY_LEN, in ieee80211_wx_set_encode() 417 memset(sec.keys[key], 0, 13); in ieee80211_wx_set_encode() 418 (*crypt)->ops->set_key(sec.keys[key], 13, NULL, in ieee80211_wx_set_encode()
|
/linux-4.1.27/arch/s390/kvm/ |
D | kvm-s390.c | 747 uint8_t *keys; in kvm_s390_get_skeys() local 763 keys = kmalloc_array(args->count, sizeof(uint8_t), in kvm_s390_get_skeys() 765 if (!keys) in kvm_s390_get_skeys() 766 keys = vmalloc(sizeof(uint8_t) * args->count); in kvm_s390_get_skeys() 767 if (!keys) in kvm_s390_get_skeys() 782 keys[i] = curkey; in kvm_s390_get_skeys() 785 r = copy_to_user((uint8_t __user *)args->skeydata_addr, keys, in kvm_s390_get_skeys() 790 kvfree(keys); in kvm_s390_get_skeys() 796 uint8_t *keys; in kvm_s390_set_skeys() local 807 keys = kmalloc_array(args->count, sizeof(uint8_t), in kvm_s390_set_skeys() [all …]
|
/linux-4.1.27/security/ |
D | Makefile | 5 obj-$(CONFIG_KEYS) += keys/
|
/linux-4.1.27/drivers/staging/rtl8192e/ |
D | rtllib_wx.c | 404 memcpy(sec.keys[key], keybuf, erq->length); in rtllib_wx_set_encode() 406 memset(sec.keys[key] + erq->length, 0, in rtllib_wx_set_encode() 409 key, escape_essid(sec.keys[key], len), in rtllib_wx_set_encode() 412 (*crypt)->ops->set_key(sec.keys[key], len, NULL, in rtllib_wx_set_encode() 423 len = (*crypt)->ops->get_key(sec.keys[key], WEP_KEY_LEN, in rtllib_wx_set_encode() 430 memset(sec.keys[key], 0, 13); in rtllib_wx_set_encode() 431 (*crypt)->ops->set_key(sec.keys[key], 13, NULL, in rtllib_wx_set_encode()
|
/linux-4.1.27/Documentation/blackfin/ |
D | bfin-gpio-notes.txt | 57 Some drivers, like gpio-keys, need this behavior. Kernel only print out 59 bfin-gpio: GPIO 24 is already reserved by gpio-keys: BTN0, and you are
|
/linux-4.1.27/drivers/hid/ |
D | hid-wiimote-modules.c | 65 static void wiimod_keys_in_keys(struct wiimote_data *wdata, const __u8 *keys) in wiimod_keys_in_keys() argument 68 !!(keys[0] & 0x01)); in wiimod_keys_in_keys() 70 !!(keys[0] & 0x02)); in wiimod_keys_in_keys() 72 !!(keys[0] & 0x04)); in wiimod_keys_in_keys() 74 !!(keys[0] & 0x08)); in wiimod_keys_in_keys() 76 !!(keys[0] & 0x10)); in wiimod_keys_in_keys() 78 !!(keys[1] & 0x01)); in wiimod_keys_in_keys() 80 !!(keys[1] & 0x02)); in wiimod_keys_in_keys() 82 !!(keys[1] & 0x04)); in wiimod_keys_in_keys() 84 !!(keys[1] & 0x08)); in wiimod_keys_in_keys() [all …]
|
/linux-4.1.27/drivers/crypto/ |
D | ixp4xx_crypto.c | 1151 struct crypto_authenc_keys keys; in aead_setkey() local 1153 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in aead_setkey() 1156 if (keys.authkeylen > sizeof(ctx->authkey)) in aead_setkey() 1159 if (keys.enckeylen > sizeof(ctx->enckey)) in aead_setkey() 1162 memcpy(ctx->authkey, keys.authkey, keys.authkeylen); in aead_setkey() 1163 memcpy(ctx->enckey, keys.enckey, keys.enckeylen); in aead_setkey() 1164 ctx->authkey_len = keys.authkeylen; in aead_setkey() 1165 ctx->enckey_len = keys.enckeylen; in aead_setkey()
|
D | picoxcell_crypto.c | 498 struct crypto_authenc_keys keys; in spacc_aead_setkey() local 501 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in spacc_aead_setkey() 504 if (keys.enckeylen > AES_MAX_KEY_SIZE) in spacc_aead_setkey() 507 if (keys.authkeylen > sizeof(ctx->hash_ctx)) in spacc_aead_setkey() 512 err = spacc_aead_aes_setkey(tfm, keys.enckey, keys.enckeylen); in spacc_aead_setkey() 514 err = spacc_aead_des_setkey(tfm, keys.enckey, keys.enckeylen); in spacc_aead_setkey() 519 memcpy(ctx->hash_ctx, keys.authkey, keys.authkeylen); in spacc_aead_setkey() 520 ctx->hash_key_len = keys.authkeylen; in spacc_aead_setkey()
|
D | talitos.c | 683 struct crypto_authenc_keys keys; in aead_setkey() local 685 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in aead_setkey() 688 if (keys.authkeylen + keys.enckeylen > TALITOS_MAX_KEY_SIZE) in aead_setkey() 691 memcpy(ctx->key, keys.authkey, keys.authkeylen); in aead_setkey() 692 memcpy(&ctx->key[keys.authkeylen], keys.enckey, keys.enckeylen); in aead_setkey() 694 ctx->keylen = keys.authkeylen + keys.enckeylen; in aead_setkey() 695 ctx->enckeylen = keys.enckeylen; in aead_setkey() 696 ctx->authkeylen = keys.authkeylen; in aead_setkey()
|
/linux-4.1.27/arch/powerpc/crypto/ |
D | Makefile | 13 aes-ppc-spe-y := aes-spe-core.o aes-spe-keys.o aes-tab-4k.o aes-spe-modes.o aes-spe-glue.o
|
/linux-4.1.27/net/ceph/ |
D | auth_x_protocol.h | 45 __le32 keys; member
|
/linux-4.1.27/fs/ecryptfs/ |
D | Kconfig | 21 for userspace to wrap/unwrap file encryption keys by other
|
/linux-4.1.27/drivers/crypto/ux500/ |
D | Kconfig | 13 AES-ECB, CBC and CTR with keys sizes of 128, 192 and 256 bit sizes.
|
/linux-4.1.27/arch/x86/crypto/sha-mb/ |
D | sha1_mb_mgr_datastruct.S | 64 #FIELD _keys, 8, 8 # pointer to keys
|
/linux-4.1.27/Documentation/device-mapper/ |
D | persistent-data.txt | 78 of nested btrees, and take multiple keys. For example, the 84 64bits, although nesting allows you to use multiple keys.
|
D | dm-crypt.txt | 28 keys (for example IV seed) so the key contains more parts concatenated 32 Multi-key compatibility mode. You can define <keycount> keys and
|
/linux-4.1.27/Documentation/filesystems/nfs/ |
D | 00-INDEX | 24 - information for configuring request-keys to be used by idmapper
|
/linux-4.1.27/Documentation/input/ |
D | atarikbd.txt | 40 The two shift keys return different scan codes in this mode. The ENTER key 54 keyboard keys. 151 for the appropriate cursor motion keys. The trigger or fire buttons of the 170 keys. Any keys down at power-up are presumed to be stuck, and their BREAK 207 ikbd will then scan the key matrix for any stuck (closed) keys. Any keys found 220 ; mss=100, mouse buttons act like keys 225 When buttons act like keys, LEFT=0x74 & RIGHT=0x75. 236 were keyboard keys. 356 N.B. If the mouse buttons have been commanded to act like keyboard keys, this
|
/linux-4.1.27/scripts/ |
D | diffconfig | 127 new = sorted(b.keys())
|
/linux-4.1.27/include/net/sctp/ |
D | auth.h | 84 void sctp_auth_destroy_keys(struct list_head *keys);
|
/linux-4.1.27/tools/perf/ |
D | builtin-lock.c | 248 struct lock_key keys[] = { variable 265 for (i = 0; keys[i].name; i++) { in select_key() 266 if (!strcmp(keys[i].name, sort_key)) { in select_key() 267 compare = keys[i].key; in select_key()
|
/linux-4.1.27/Documentation/networking/ |
D | openvswitch.txt | 13 table" that userspace populates with "flows" that map from keys based 64 How flow keys evolve over time is important to making this work, so 147 Basic rule for evolving flow keys 239 The other rules for flow keys are much less subtle: 247 compare entire flow keys that it may not be able to fully
|
D | dns_resolver.txt | 105 The kernel maintains an internal keyring in which it caches looked up keys. 146 See <file:Documentation/security/keys-request-key.txt> for further
|
/linux-4.1.27/drivers/staging/speakup/ |
D | spkguide.txt | 123 Most of the Speakup review keys are located on the keypad at the far 162 the speech with keypad enter, or use any of the Speakup review keys. 164 Here are some basic Speakup review keys, and a short description of what 184 keys in combination with it. For example, repeatedly holding keypad 207 through the list of available commands using the cursor keys. The list 212 You can also just explore by typing keyboard keys. Pressing keys will 218 You'll notice that some commands do not have keys assigned to them. 223 You'll also notice that some commands have two keys assigned to them. 228 numeric keypad is defined as the keys in the j k l area of the keyboard. 236 laptop. So you may choose which set of Speakup keys to use. Some [all …]
|
/linux-4.1.27/include/linux/mfd/ |
D | adp5520.h | 278 struct adp5520_keys_platform_data *keys; member
|