Home
last modified time | relevance | path

Searched refs:keys (Results 1 – 200 of 447) sorted by relevance

123

/linux-4.4.14/drivers/input/keyboard/
Dipaq-micro-keys.c46 struct ipaq_micro_keys *keys = data; in micro_key_receive() local
53 input_report_key(keys->input, keys->codes[key], down); in micro_key_receive()
54 input_sync(keys->input); in micro_key_receive()
58 static void micro_key_start(struct ipaq_micro_keys *keys) in micro_key_start() argument
60 spin_lock(&keys->micro->lock); in micro_key_start()
61 keys->micro->key = micro_key_receive; in micro_key_start()
62 keys->micro->key_data = keys; in micro_key_start()
63 spin_unlock(&keys->micro->lock); in micro_key_start()
66 static void micro_key_stop(struct ipaq_micro_keys *keys) in micro_key_stop() argument
68 spin_lock(&keys->micro->lock); in micro_key_stop()
[all …]
DMakefile7 obj-$(CONFIG_KEYBOARD_ADP5520) += adp5520-keys.o
8 obj-$(CONFIG_KEYBOARD_ADP5588) += adp5588-keys.o
9 obj-$(CONFIG_KEYBOARD_ADP5589) += adp5589-keys.o
14 obj-$(CONFIG_KEYBOARD_BFIN) += bf54x-keys.o
27 obj-$(CONFIG_KEYBOARD_IPAQ_MICRO) += ipaq-micro-keys.o
35 obj-$(CONFIG_KEYBOARD_LPC32XX) += lpc32xx-keys.o
59 obj-$(CONFIG_KEYBOARD_SUN4I_LRADC) += sun4i-lradc-keys.o
Dsh_keysc.c91 DECLARE_BITMAP(keys, SH_KEYSC_MAXKEYS); in sh_keysc_isr()
103 bitmap_zero(keys, SH_KEYSC_MAXKEYS); in sh_keysc_isr()
119 __set_bit(n + k, keys); in sh_keysc_isr()
128 bitmap_complement(keys, keys, SH_KEYSC_MAXKEYS); in sh_keysc_isr()
129 bitmap_and(keys1, keys1, keys, SH_KEYSC_MAXKEYS); in sh_keysc_isr()
130 bitmap_or(keys0, keys0, keys, SH_KEYSC_MAXKEYS); in sh_keysc_isr()
132 sh_keysc_map_dbg(&pdev->dev, keys, "keys"); in sh_keysc_isr()
Dlm8333.c82 u8 keys[LM8333_FIFO_TRANSFER_SIZE]; in lm8333_key_handler() local
87 LM8333_FIFO_TRANSFER_SIZE, keys); in lm8333_key_handler()
94 for (i = 0; i < LM8333_FIFO_TRANSFER_SIZE && keys[i]; i++) { in lm8333_key_handler()
95 pressed = keys[i] & 0x80; in lm8333_key_handler()
96 code = keys[i] & 0x7f; in lm8333_key_handler()
DKconfig23 be called adp5520-keys.
33 module will be called adp5588-keys.
43 module will be called adp5589-keys.
106 The PrecisionBook has five keys that conflict with those used by most
152 module will be called bf54x-keys.
224 for keys connected through TCA6416/TCA6408A IO expanders.
226 Say Y here if your device has keys connected to
243 for keys connected through TCA8418 keypad decoder.
245 Say Y here if your device has keys connected to
356 module will be called lpc32xx-keys.
[all …]
/linux-4.4.14/drivers/input/misc/
Ddm355evm_keys.c107 struct dm355evm_keys *keys = _keys; in dm355evm_keys_irq() local
120 dev_dbg(keys->dev, "input high err %d\n", in dm355evm_keys_irq()
128 dev_dbg(keys->dev, "input low err %d\n", in dm355evm_keys_irq()
157 ke = sparse_keymap_entry_from_scancode(keys->input, event); in dm355evm_keys_irq()
159 dev_dbg(keys->dev, in dm355evm_keys_irq()
164 input_report_key(keys->input, keycode, 1); in dm355evm_keys_irq()
165 input_sync(keys->input); in dm355evm_keys_irq()
166 input_report_key(keys->input, keycode, 0); in dm355evm_keys_irq()
167 input_sync(keys->input); in dm355evm_keys_irq()
177 struct dm355evm_keys *keys; in dm355evm_keys_probe() local
[all …]
/linux-4.4.14/net/core/
Dflow_dissector.c575 static inline void __flow_hash_consistentify(struct flow_keys *keys) in __flow_hash_consistentify() argument
579 switch (keys->control.addr_type) { in __flow_hash_consistentify()
581 addr_diff = (__force u32)keys->addrs.v4addrs.dst - in __flow_hash_consistentify()
582 (__force u32)keys->addrs.v4addrs.src; in __flow_hash_consistentify()
585 ((__force u16)keys->ports.dst < in __flow_hash_consistentify()
586 (__force u16)keys->ports.src))) { in __flow_hash_consistentify()
587 swap(keys->addrs.v4addrs.src, keys->addrs.v4addrs.dst); in __flow_hash_consistentify()
588 swap(keys->ports.src, keys->ports.dst); in __flow_hash_consistentify()
592 addr_diff = memcmp(&keys->addrs.v6addrs.dst, in __flow_hash_consistentify()
593 &keys->addrs.v6addrs.src, in __flow_hash_consistentify()
[all …]
/linux-4.4.14/drivers/md/bcache/
Dbtree.c165 if (b->level && b->keys.nsets) in bch_btree_init_next()
166 bch_btree_sort(&b->keys, &b->c->sort); in bch_btree_init_next()
168 bch_btree_sort_lazy(&b->keys, &b->c->sort); in bch_btree_init_next()
171 bch_bset_init_next(&b->keys, write_block(b), in bch_btree_init_next()
209 iter->b = &b->keys; in bch_btree_node_read_done()
216 b->written < btree_blocks(b) && i->seq == b->keys.set[0].data->seq; in bch_btree_node_read_done()
244 if (i != b->keys.set[0].data && !i->keys) in bch_btree_node_read_done()
254 bset_sector_offset(&b->keys, i) < KEY_SIZE(&b->key); in bch_btree_node_read_done()
256 if (i->seq == b->keys.set[0].data->seq) in bch_btree_node_read_done()
259 bch_btree_sort_and_fix_extents(&b->keys, iter, &b->c->sort); in bch_btree_node_read_done()
[all …]
Ddebug.c43 sorted = b->c->verify_data->keys.set->data; in bch_btree_verify()
44 inmemory = b->keys.set->data; in bch_btree_verify()
49 v->keys.ops = b->keys.ops; in bch_btree_verify()
63 sorted = v->keys.set->data; in bch_btree_verify()
65 if (inmemory->keys != sorted->keys || in bch_btree_verify()
75 bch_dump_bset(&b->keys, inmemory, 0); in bch_btree_verify()
78 bch_dump_bset(&v->keys, sorted, 0); in bch_btree_verify()
85 bch_dump_bset(&b->keys, i, block); in bch_btree_verify()
91 for (j = 0; j < inmemory->keys; j++) in bch_btree_verify()
153 struct keybuf keys; member
[all …]
Djournal.c314 int ret = 0, keys = 0, entries = 0; in bch_journal_replay() local
341 keys++; in bch_journal_replay()
353 keys, entries, end); in bch_journal_replay()
544 j->cur->data->keys = 0; in bch_journal_next()
694 sectors = __set_blocks(w->data, w->data->keys + nkeys, in journal_wait_for_write()
715 BUG_ON(!w->data->keys); in journal_wait_for_write()
753 struct keylist *keys, in bch_journal() argument
762 w = journal_wait_for_write(c, bch_keylist_nkeys(keys)); in bch_journal()
764 memcpy(bset_bkey_last(w->data), keys->keys, bch_keylist_bytes(keys)); in bch_journal()
765 w->data->keys += bch_keylist_nkeys(keys); in bch_journal()
[all …]
Dbset.h252 #define set_bytes(i) __set_bytes(i, i->keys)
257 __set_blocks(i, (i)->keys, block_bytes)
383 #define bset_bkey_last(i) bkey_idx((struct bkey *) (i)->d, (i)->keys)
463 struct bkey *keys; member
483 l->keys = k; in bch_keylist_init_single()
500 return l->top == l->keys; in bch_keylist_empty()
505 l->top = l->keys; in bch_keylist_reset()
Dextents.c125 static void bch_bkey_dump(struct btree_keys *keys, const struct bkey *k) in bch_bkey_dump() argument
127 struct btree *b = container_of(keys, struct btree, keys); in bch_bkey_dump()
167 struct btree *b = container_of(bk, struct btree, keys); in bch_btree_ptr_invalid()
205 struct btree *b = container_of(bk, struct btree, keys); in bch_btree_ptr_bad()
230 struct btree *b = container_of(bk, struct btree, keys); in bch_btree_ptr_insert_fixup()
326 struct cache_set *c = container_of(b, struct btree, keys)->c; in bch_extent_insert_fixup()
499 struct btree *b = container_of(bk, struct btree, keys); in bch_extent_invalid()
535 struct btree *b = container_of(bk, struct btree, keys); in bch_extent_bad()
580 struct btree *b = container_of(bk, struct btree, keys); in bch_extent_merge()
Dbtree.h136 struct btree_keys keys; member
178 return b->keys.set->data; in btree_bset_first()
183 return bset_tree_last(&b->keys)->data; in btree_bset_last()
188 return bset_sector_offset(&b->keys, i) >> b->c->block_bits; in bset_block_offset()
Dbset.c27 (unsigned) ((u64 *) k - i->d), i->keys); in bch_dump_bset()
158 struct bkey *k = l->keys; in bch_keylist_pop()
171 l->top_p -= bkey_u64s(l->keys); in bch_keylist_pop_front()
173 memmove(l->keys, in bch_keylist_pop_front()
174 bkey_next(l->keys), in bch_keylist_pop_front()
565 ? bset_bkey_idx(t->data, t->data->keys - bkey_u64s(&t->end)) in make_bfloat()
628 i->keys = 0; in bch_bset_init_next()
806 __set_bytes(t->data, t->data->keys + bkey_u64s(insert)) > in bch_bset_insert()
813 t->data->keys += bkey_u64s(insert); in bch_bset_insert()
1174 out->keys = last ? (uint64_t *) bkey_next(last) - out->d : 0; in btree_mergesort()
[all …]
Dwriteback.c142 struct keylist keys; in write_dirty_finish() local
144 bch_keylist_init(&keys); in write_dirty_finish()
146 bkey_copy(keys.top, &w->key); in write_dirty_finish()
147 SET_KEY_DIRTY(keys.top, false); in write_dirty_finish()
148 bch_keylist_push(&keys); in write_dirty_finish()
153 ret = bch_btree_insert(dc->disk.c, &keys, NULL, &w->key); in write_dirty_finish()
444 RB_EMPTY_ROOT(&dc->writeback_keys.keys)) { in bch_writeback_thread()
Dsuper.c89 sb->keys = le16_to_cpu(s->keys); in read_super()
95 sb->version, sb->flags, sb->seq, sb->keys); in read_super()
105 if (sb->keys > SB_JOURNAL_BUCKETS) in read_super()
173 for (i = 0; i < sb->keys; i++) in read_super()
178 if (sb->first_bucket + sb->keys > sb->nbuckets) in read_super()
231 out->keys = cpu_to_le16(sb->keys); in __write_super()
233 for (i = 0; i < sb->keys; i++) in __write_super()
1636 ca->sb.keys = clamp_t(int, ca->sb.nbuckets >> 7, in run_cache_set()
1639 for (j = 0; j < ca->sb.keys; j++) in run_cache_set()
/linux-4.4.14/drivers/net/ethernet/cisco/enic/
Denic_clsf.c20 int enic_addfltr_5t(struct enic *enic, struct flow_keys *keys, u16 rq) in enic_addfltr_5t() argument
25 switch (keys->basic.ip_proto) { in enic_addfltr_5t()
36 data.u.ipv4.src_addr = ntohl(keys->addrs.v4addrs.src); in enic_addfltr_5t()
37 data.u.ipv4.dst_addr = ntohl(keys->addrs.v4addrs.dst); in enic_addfltr_5t()
38 data.u.ipv4.src_port = ntohs(keys->ports.src); in enic_addfltr_5t()
39 data.u.ipv4.dst_port = ntohs(keys->ports.dst); in enic_addfltr_5t()
161 if (tpos->keys.addrs.v4addrs.src == k->addrs.v4addrs.src && in htbl_key_search()
162 tpos->keys.addrs.v4addrs.dst == k->addrs.v4addrs.dst && in htbl_key_search()
163 tpos->keys.ports.ports == k->ports.ports && in htbl_key_search()
164 tpos->keys.basic.ip_proto == k->basic.ip_proto && in htbl_key_search()
[all …]
Denic_ethtool.c368 switch (n->keys.basic.ip_proto) { in enic_grxclsrule()
380 fsp->h_u.tcp_ip4_spec.ip4src = flow_get_u32_src(&n->keys); in enic_grxclsrule()
383 fsp->h_u.tcp_ip4_spec.ip4dst = flow_get_u32_dst(&n->keys); in enic_grxclsrule()
386 fsp->h_u.tcp_ip4_spec.psrc = n->keys.ports.src; in enic_grxclsrule()
389 fsp->h_u.tcp_ip4_spec.pdst = n->keys.ports.dst; in enic_grxclsrule()
Denic_clsf.h9 int enic_addfltr_5t(struct enic *enic, struct flow_keys *keys, u16 rq);
/linux-4.4.14/tools/perf/scripts/python/Perf-Trace-Util/lib/Perf/Trace/
DCore.py35 keys = flag_fields[event_name][field_name]['values'].keys()
36 keys.sort()
37 for idx in keys:
54 keys = symbolic_fields[event_name][field_name]['values'].keys()
55 keys.sort()
56 for idx in keys:
77 keys = trace_flags.keys()
79 for idx in keys:
/linux-4.4.14/drivers/mfd/
Ducb1x00-assabet.c44 struct gpio_keys_platform_data keys; in ucb1x00_assabet_add() local
49 memset(&keys, 0, sizeof(keys)); in ucb1x00_assabet_add()
58 keys.buttons = buttons; in ucb1x00_assabet_add()
59 keys.nbuttons = ARRAY_SIZE(buttons); in ucb1x00_assabet_add()
60 keys.poll_interval = 50; in ucb1x00_assabet_add()
61 keys.name = "ucb1x00"; in ucb1x00_assabet_add()
64 &keys, sizeof(keys)); in ucb1x00_assabet_add()
Dadp5520.c256 if (pdata->keys) { in adp5520_probe()
258 chip->id, pdata->keys, sizeof(*pdata->keys)); in adp5520_probe()
/linux-4.4.14/drivers/md/persistent-data/
Ddm-btree.c47 uint64_t mid_key = le64_to_cpu(n->keys[mid]); in bsearch()
101 array_insert(node->keys, sizeof(*node->keys), nr_entries, index, &key_le); in insert_at()
363 *result_key = le64_to_cpu(ro_node(s)->keys[i]); in btree_lookup_raw()
370 uint64_t *keys, void *value_le) in dm_btree_lookup() argument
392 r = btree_lookup_raw(&spine, root, keys[level], in dm_btree_lookup()
397 if (rkey != keys[level]) { in dm_btree_lookup()
450 *rkey = le64_to_cpu(n->keys[i]); in dm_btree_lookup_next_single()
459 uint64_t *keys, uint64_t *rkey, void *value_le) in dm_btree_lookup_next() argument
468 r = btree_lookup_raw(&spine, root, keys[level], in dm_btree_lookup_next()
474 if (*rkey != keys[level]) { in dm_btree_lookup_next()
[all …]
Ddm-btree.h110 uint64_t *keys, void *value_le);
117 uint64_t *keys, uint64_t *rkey, void *value_le);
123 uint64_t *keys, void *value, dm_block_t *new_root)
132 uint64_t *keys, void *value, dm_block_t *new_root,
142 uint64_t *keys, dm_block_t *new_root);
151 uint64_t *keys, uint64_t end_key,
176 int (*fn)(void *context, uint64_t *keys, void *leaf),
Ddm-btree-remove.c227 *key_ptr(parent, r->index) = right->keys[0]; in __rebalance2()
282 *key_ptr(parent, r->index) = right->keys[0]; in delete_center_node()
337 *key_ptr(parent, c->index) = center->keys[0]; in redistribute3()
338 *key_ptr(parent, r->index) = right->keys[0]; in redistribute3()
451 (le64_to_cpu(n->keys[i]) != key)) in do_leaf()
513 uint64_t *keys, dm_block_t *new_root) in dm_btree_remove() argument
527 root, keys[level], (unsigned *)&index); in dm_btree_remove()
609 uint64_t *keys, uint64_t end_key, in remove_one() argument
623 root, keys[level], (unsigned *) &index); in remove_one()
632 root, keys[last_level], &index); in remove_one()
[all …]
Ddm-btree-internal.h41 __le64 keys[0]; member
110 return n->keys + index; in key_ptr()
115 return &n->keys[le32_to_cpu(n->header.max_entries)]; in value_base()
/linux-4.4.14/Documentation/security/
D00-INDEX15 keys-ecryptfs.txt
16 - description of the encryption keys for the ecryptfs filesystem.
17 keys-request-key.txt
19 keys-trusted-encrypted.txt
20 - info on the Trusted and Encrypted keys in the kernel key ring service.
21 keys.txt
Dkeys-trusted-encrypted.txt4 key ring service. Both of these new types are variable length symmetric keys,
5 and in both cases all keys are created in the kernel, and user space sees,
11 Trusted Keys use a TPM both to generate and to seal the keys. Keys are sealed
15 (future) PCR values, so keys are easily migrated to new pcr values, such as
19 By default, trusted keys are sealed under the SRK, which has the default
43 TPM_STORED_DATA format. The key length for new keys are always in bytes.
47 Encrypted keys do not depend on a TPM, and are faster, as they use AES for
48 encryption/decryption. New keys are created from kernel generated random
51 disadvantage of encrypted keys is that if they are not rooted in a trusted key,
56 The decrypted portion of encrypted keys can contain either a simple symmetric
[all …]
Dkeys.txt5 This service allows cryptographic keys, authentication tokens, cross-domain
10 other keys. Processes each have three standard keyring subscriptions that a
11 kernel service can search for relevant keys.
36 In this context, keys represent units of cryptographic data, authentication
58 kernel by a kernel service (such as a filesystem) before keys of that type
64 Should a type be removed from the system, all the keys of that type will
79 actual "key". In the case of a keyring, this is a list of keys to which
124 The key service provides a number of features besides keys:
130 Keyrings are special keys that contain a list of other keys. Keyring
148 separated from the rest of the description by a ':'. "logon" keys can
[all …]
Dkeys-ecryptfs.txt1 Encrypted keys for the eCryptfs filesystem
22 filesystem. Encrypted keys of the newly introduced format store an
31 The eCryptfs filesystem may really benefit from using encrypted keys in that the
Dkeys-request-key.txt6 Documentation/security/keys.txt). This document explains more fully how
56 The two async in-kernel calls may return keys that are still in the process of
158 (2) It considers all the non-keyring keys within that keyring and, if any key
164 (3) It then considers all the keyring-type keys in the keyring it's currently
/linux-4.4.14/lib/
Dtest_static_keys.c60 static void invert_keys(struct test_key *keys, int size) in invert_keys() argument
66 if (previous != keys[i].key) { in invert_keys()
67 invert_key(keys[i].key); in invert_keys()
68 previous = keys[i].key; in invert_keys()
73 static int verify_keys(struct test_key *keys, int size, bool invert) in verify_keys() argument
79 ret = static_key_enabled(keys[i].key); in verify_keys()
80 init = keys[i].init_state; in verify_keys()
83 ret = keys[i].test_key(); in verify_keys()
84 if (static_key_enabled(keys[i].key)) { in verify_keys()
/linux-4.4.14/drivers/crypto/nx/
Dnx-aes-xcbc.c76 u8 keys[2][AES_BLOCK_SIZE]; in nx_xcbc_empty() local
88 memset(keys[0], 0x01, sizeof(keys[0])); in nx_xcbc_empty()
89 memset(keys[1], 0x03, sizeof(keys[1])); in nx_xcbc_empty()
91 len = sizeof(keys); in nx_xcbc_empty()
93 in_sg = nx_build_sg_list(nx_ctx->in_sg, (u8 *) keys, &len, in nx_xcbc_empty()
96 if (len != sizeof(keys)) in nx_xcbc_empty()
99 out_sg = nx_build_sg_list(nx_ctx->out_sg, (u8 *) keys, &len, in nx_xcbc_empty()
102 if (len != sizeof(keys)) in nx_xcbc_empty()
115 keys[1][0] ^= 0x80; in nx_xcbc_empty()
117 len = sizeof(keys[1]); in nx_xcbc_empty()
[all …]
/linux-4.4.14/net/sched/
Dact_pedit.c40 struct tc_pedit_key *keys = NULL; in tcf_pedit_init() local
65 keys = kmalloc(ksize, GFP_KERNEL); in tcf_pedit_init()
66 if (keys == NULL) { in tcf_pedit_init()
79 keys = kmalloc(ksize, GFP_KERNEL); in tcf_pedit_init()
80 if (keys == NULL) in tcf_pedit_init()
88 if (keys) { in tcf_pedit_init()
90 p->tcfp_keys = keys; in tcf_pedit_init()
93 memcpy(p->tcfp_keys, parm->keys, ksize); in tcf_pedit_init()
103 struct tc_pedit_key *keys = p->tcfp_keys; in tcf_pedit_cleanup() local
104 kfree(keys); in tcf_pedit_cleanup()
[all …]
Dcls_flower.c339 #define FL_KEY_SET(keys, cnt, id, member) \ argument
341 keys[cnt].key_id = id; \
342 keys[cnt].offset = FL_KEY_MEMBER_OFFSET(member); \
346 #define FL_KEY_SET_IF_IN_RANGE(mask, keys, cnt, id, member) \ argument
349 FL_KEY_SET(keys, cnt, id, member); \
355 struct flow_dissector_key keys[FLOW_DISSECTOR_KEY_MAX]; in fl_init_dissector() local
358 FL_KEY_SET(keys, cnt, FLOW_DISSECTOR_KEY_CONTROL, control); in fl_init_dissector()
359 FL_KEY_SET(keys, cnt, FLOW_DISSECTOR_KEY_BASIC, basic); in fl_init_dissector()
360 FL_KEY_SET_IF_IN_RANGE(mask, keys, cnt, in fl_init_dissector()
362 FL_KEY_SET_IF_IN_RANGE(mask, keys, cnt, in fl_init_dissector()
[all …]
Dsch_choke.c139 struct flow_keys_digest keys; member
174 make_flow_keys_digest(&choke_skb_cb(skb1)->keys, &temp); in choke_match_flow()
180 make_flow_keys_digest(&choke_skb_cb(skb2)->keys, &temp); in choke_match_flow()
183 return !memcmp(&choke_skb_cb(skb1)->keys, in choke_match_flow()
184 &choke_skb_cb(skb2)->keys, in choke_match_flow()
185 sizeof(choke_skb_cb(skb1)->keys)); in choke_match_flow()
Dcls_flow.c303 u32 keys[FLOW_KEY_MAX + 1]; in flow_classify() local
316 keys[n] = flow_key_get(skb, key, &flow_keys); in flow_classify()
320 classid = jhash2(keys, f->nkeys, f->hashrnd); in flow_classify()
322 classid = keys[0]; in flow_classify()
/linux-4.4.14/security/keys/
DKconfig10 access keys in the kernel.
12 It also includes provision of methods by which such keys might be
17 a searchable sequence of keys. Each process is equipped with access
41 bool "Large payload keys"
45 This option provides support for holding large keys within the kernel
59 keys in the kernel. Trusted keys are random number symmetric keys,
60 generated and RSA-sealed by the TPM. The TPM only unseals the keys,
76 This option provides support for create/encrypting/decrypting keys
77 in the kernel. Encrypted keys are kernel generated random numbers,
Dkeyring.c151 assoc_array_init(&keyring->keys); in keyring_instantiate()
397 assoc_array_destroy(&keyring->keys, &keyring_assoc_array_ops); in keyring_destroy()
411 if (keyring->keys.nr_leaves_on_tree != 0) in keyring_describe()
412 seq_printf(m, ": %lu", keyring->keys.nr_leaves_on_tree); in keyring_describe()
463 nr_keys = keyring->keys.nr_leaves_on_tree; in keyring_read()
479 ret = assoc_array_iterate(&keyring->keys, keyring_read_iterator, &ctx); in keyring_read()
600 object = assoc_array_find(&keyring->keys, in search_keyring()
605 return assoc_array_iterate(&keyring->keys, ctx->iterator, ctx); in search_keyring()
678 ptr = ACCESS_ONCE(keyring->keys.root); in search_nested_keyrings()
944 object = assoc_array_find(&keyring->keys, &keyring_assoc_array_ops, in find_key_to_update()
[all …]
Dgc.c127 static noinline void key_gc_unused_keys(struct list_head *keys) in key_gc_unused_keys() argument
129 while (!list_empty(keys)) { in key_gc_unused_keys()
131 list_entry(keys->next, struct key, graveyard_link); in key_gc_unused_keys()
DMakefile28 obj-$(CONFIG_ENCRYPTED_KEYS) += encrypted-keys/
/linux-4.4.14/Documentation/devicetree/bindings/input/
Dinput-reset.txt3 A simple binding to represent a set of keys as described in
4 include/uapi/linux/input.h. This is to communicate a sequence of keys to the
5 sysrq driver. Upon holding the keys for a specified amount of time (if
8 Key sequences are global to the system but all the keys in a set must be coming
12 a set of keys.
18 timeout-ms: duration keys must be pressed together in milliseconds before
Dsun4i-lradc-keys.txt1 Allwinner sun4i low res adc attached tablet keys
5 - compatible: "allwinner,sun4i-a10-lradc-keys"
10 Each key is represented as a sub-node of "allwinner,sun4i-a10-lradc-keys":
23 compatible = "allwinner,sun4i-a10-lradc-keys";
Dgpio-keys.txt4 - compatible = "gpio-keys";
10 Each button (key) is represented as a sub-node of "gpio-keys":
35 compatible = "gpio-keys";
Dgpio-keys-polled.txt4 - compatible = "gpio-keys-polled";
11 Each button (key) is represented as a sub-node of "gpio-keys-polled":
36 compatible = "gpio-keys-polled";
Dimx-keypad.txt4 or 3-point contact keys. The KPP is designed to simplify the software task
6 and decoding one or multiple keys pressed simultaneously on a keypad.
Dmatrix-keymap.txt2 defining the keys in the scope of linux key codes since that is a stable and
Dst-keyscan.txt19 - linux,keymap: The keymap for keys as described in the binding document
/linux-4.4.14/certs/
DKconfig18 bool "Provide system-wide ring of trusted keys"
21 Provide a system keyring to which trusted keys can be added. Keys in
24 userspace may only add extra keys if those keys can be verified by
25 keys already in the keyring.
30 string "Additional X.509 keys for default system keyring"
38 NOTE: If you previously provided keys for the system keyring in the
/linux-4.4.14/security/keys/encrypted-keys/
DMakefile5 obj-$(CONFIG_ENCRYPTED_KEYS) += encrypted-keys.o
7 encrypted-keys-y := encrypted.o ecryptfs_format.o
10 encrypted-keys-y += $(masterkey-y) $(masterkey-m-m)
/linux-4.4.14/include/trace/events/
Dbcache.h247 __field(unsigned, keys )
253 __entry->keys = b->keys.set[b->keys.nsets].data->keys;
343 TP_PROTO(struct btree *b, unsigned keys),
344 TP_ARGS(b, keys),
348 __field(unsigned, keys )
353 __entry->keys = keys;
356 TP_printk("bucket %zu keys %u", __entry->bucket, __entry->keys)
360 TP_PROTO(struct btree *b, unsigned keys),
361 TP_ARGS(b, keys)
365 TP_PROTO(struct btree *b, unsigned keys),
[all …]
/linux-4.4.14/tools/perf/scripts/python/
Dcheck-perf-trace.py71 keys = unhandled.keys()
72 if not keys:
81 for event_name in keys:
Dfailed-syscalls-by-pid.py68 comm_keys = syscalls.keys()
70 pid_keys = syscalls[comm].keys()
73 id_keys = syscalls[comm][pid].keys()
76 ret_keys = syscalls[comm][pid][id].keys()
Dnetdev-times.py132 if 'comm' in event.keys():
137 elif 'handle' in event.keys():
303 if cpu not in irq_dic.keys():
310 if cpu not in irq_dic.keys():
317 if 'event_list' in irq_record.keys():
322 if cpu not in irq_dic.keys() \
326 if 'event_list' in irq_record.keys():
342 if cpu in irq_dic.keys():
345 if cpu in net_rx_dic.keys():
358 if cpu in net_rx_dic.keys():
[all …]
Dsyscall-counts-by-pid.py66 comm_keys = syscalls.keys()
68 pid_keys = syscalls[comm].keys()
71 id_keys = syscalls[comm][pid].keys()
Dnet_dropmonitor.py53 for i in drop_log.keys():
/linux-4.4.14/crypto/
Dauthenc.c51 int crypto_authenc_extractkeys(struct crypto_authenc_keys *keys, const u8 *key, in crypto_authenc_extractkeys() argument
65 keys->enckeylen = be32_to_cpu(param->enckeylen); in crypto_authenc_extractkeys()
70 if (keylen < keys->enckeylen) in crypto_authenc_extractkeys()
73 keys->authkeylen = keylen - keys->enckeylen; in crypto_authenc_extractkeys()
74 keys->authkey = key; in crypto_authenc_extractkeys()
75 keys->enckey = key + keys->authkeylen; in crypto_authenc_extractkeys()
87 struct crypto_authenc_keys keys; in crypto_authenc_setkey() local
90 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in crypto_authenc_setkey()
96 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in crypto_authenc_setkey()
106 err = crypto_ablkcipher_setkey(enc, keys.enckey, keys.enckeylen); in crypto_authenc_setkey()
Dauthencesn.c69 struct crypto_authenc_keys keys; in crypto_authenc_esn_setkey() local
72 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in crypto_authenc_esn_setkey()
78 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in crypto_authenc_esn_setkey()
88 err = crypto_ablkcipher_setkey(enc, keys.enckey, keys.enckeylen); in crypto_authenc_esn_setkey()
/linux-4.4.14/drivers/net/wireless/orinoco/
Dwext.c34 kzfree(priv->keys[index].key); in orinoco_set_key()
35 kzfree(priv->keys[index].seq); in orinoco_set_key()
38 priv->keys[index].key = kzalloc(key_len, GFP_ATOMIC); in orinoco_set_key()
39 if (!priv->keys[index].key) in orinoco_set_key()
42 priv->keys[index].key = NULL; in orinoco_set_key()
45 priv->keys[index].seq = kzalloc(seq_len, GFP_ATOMIC); in orinoco_set_key()
46 if (!priv->keys[index].seq) in orinoco_set_key()
49 priv->keys[index].seq = NULL; in orinoco_set_key()
51 priv->keys[index].key_len = key_len; in orinoco_set_key()
52 priv->keys[index].seq_len = seq_len; in orinoco_set_key()
[all …]
Dhw.c828 struct orinoco_key keys[ORINOCO_MAX_KEYS]; in __orinoco_hw_setup_wepkeys() local
830 memset(&keys, 0, sizeof(keys)); in __orinoco_hw_setup_wepkeys()
832 int len = min(priv->keys[i].key_len, in __orinoco_hw_setup_wepkeys()
834 memcpy(&keys[i].data, priv->keys[i].key, len); in __orinoco_hw_setup_wepkeys()
836 keys[i].len = cpu_to_le16(LARGE_KEY_SIZE); in __orinoco_hw_setup_wepkeys()
838 keys[i].len = cpu_to_le16(SMALL_KEY_SIZE); in __orinoco_hw_setup_wepkeys()
840 keys[i].len = cpu_to_le16(0); in __orinoco_hw_setup_wepkeys()
845 &keys); in __orinoco_hw_setup_wepkeys()
862 keylen = priv->keys[priv->tx_key].key_len; in __orinoco_hw_setup_wepkeys()
879 memcpy(key, priv->keys[i].key, in __orinoco_hw_setup_wepkeys()
[all …]
/linux-4.4.14/include/net/
Dflow_dissector.h180 static inline bool flow_keys_have_l4(struct flow_keys *keys) in flow_keys_have_l4() argument
182 return (keys->ports.ports || keys->tags.flow_label); in flow_keys_have_l4()
185 u32 flow_hash_from_keys(struct flow_keys *keys);
Dflow.h248 __u32 __get_hash_from_flowi6(const struct flowi6 *fl6, struct flow_keys *keys);
252 struct flow_keys keys; in get_hash_from_flowi6() local
254 return __get_hash_from_flowi6(fl6, &keys); in get_hash_from_flowi6()
257 __u32 __get_hash_from_flowi4(const struct flowi4 *fl4, struct flow_keys *keys);
261 struct flow_keys keys; in get_hash_from_flowi4() local
263 return __get_hash_from_flowi4(fl4, &keys); in get_hash_from_flowi4()
Dcfg802154.h276 struct list_head keys; member
300 struct list_head keys; member
/linux-4.4.14/scripts/kconfig/
Dmconf.c290 int *keys, int *vscroll, int *hscroll,
361 int *keys; member
378 data->keys[k] = key; in update_text()
388 data->keys[k] = 0; in update_text()
436 int keys[JUMP_NB + 1], i; in search_conf() local
440 .keys = keys, in search_conf()
447 str_get(&res), 0, 0, keys, &vscroll, in search_conf()
451 for (i = 0; i < JUMP_NB && keys[i]; i++) in search_conf()
452 if (dres == keys[i]) { in search_conf()
757 *keys, int *vscroll, int *hscroll, update_text_fn in show_textbox_ext() argument
[all …]
/linux-4.4.14/security/integrity/
DKconfig28 to "lock" certain keyring to prevent adding new keys.
29 This is useful for evm and module keyrings, when keys are
33 bool "Enable asymmetric keys support"
42 asymmetric keys.
/linux-4.4.14/Documentation/video4linux/
DREADME.ir30 layer, i.e. you'll see the keys of the remote as normal key strokes
40 is, check whenever pressing keys on the remote actually generates
56 XFree86 likely can be configured to recognise the remote keys. Once I
58 device, which had the effect that XFree86 recognised some of the keys
/linux-4.4.14/arch/arm/boot/dts/
Dbcm47081-buffalo-wzr-900dhp.dts27 gpio-keys {
28 compatible = "gpio-keys";
Dbcm4708-luxul-xwc-1000.dts46 gpio-keys {
47 compatible = "gpio-keys";
Dbcm4709-asus-rt-ac87u.dts49 gpio-keys {
50 compatible = "gpio-keys";
Dbcm4709-netgear-r8000.dts55 gpio-keys {
56 compatible = "gpio-keys";
Dbcm4708-asus-rt-ac68u.dts55 gpio-keys {
56 compatible = "gpio-keys";
Dbcm47081-asus-rt-n18u.dts61 gpio-keys {
62 compatible = "gpio-keys";
Dbcm4708-netgear-r6300-v2.dts61 gpio-keys {
62 compatible = "gpio-keys";
Dbcm4708-netgear-r6250.dts72 gpio-keys {
73 compatible = "gpio-keys";
Dbcm4708-asus-rt-ac56u.dts74 gpio-keys {
75 compatible = "gpio-keys";
Dbcm4709-netgear-r7000.dts79 gpio-keys {
80 compatible = "gpio-keys";
Ds3c6410-mini6410.dts71 gpio-keys {
72 compatible = "gpio-keys";
207 gpio_keys: gpio-keys {
Dbcm47081-buffalo-wzr-600dhp2.dts94 gpio-keys {
95 compatible = "gpio-keys";
Dbcm4709-buffalo-wxr-1900dhp.dts85 gpio-keys {
86 compatible = "gpio-keys";
Dbcm4708-smartrg-sr400ac.dts97 gpio-keys {
98 compatible = "gpio-keys";
Dbcm4708-buffalo-wzr-1750dhp.dts100 gpio-keys {
101 compatible = "gpio-keys";
Dimx6q-gk802.dts40 gpio-keys {
41 compatible = "gpio-keys";
Dkirkwood-mv88f6281gtw-ge.dts56 pmx_keys: pmx-keys {
106 compatible = "gpio-keys";
Darmada-370-seagate-personal-cloud.dtsi125 gpio-keys {
126 compatible = "gpio-keys";
Dste-nomadik-s8815.dts160 gpio-keys {
161 compatible = "gpio-keys";
Dtegra30-colibri-eval-v3.dts137 gpio-keys {
138 compatible = "gpio-keys";
Dsama5d35ek.dts46 compatible = "gpio-keys";
Dimx51-apf51dev.dts59 gpio-keys {
60 compatible = "gpio-keys";
Dimx53-ard.dts65 gpio-keys {
66 compatible = "gpio-keys";
Dmpa1600.dts69 compatible = "gpio-keys";
Dkirkwood-ts219-6281.dts36 compatible = "gpio-keys";
Dorion5x-lacie-ethernet-disk-mini-v2.dts42 gpio-keys {
43 compatible = "gpio-keys";
Dkirkwood-iomega_ix2_200.dts147 gpio-keys {
148 compatible = "gpio-keys";
Dorion5x-maxtor-shared-storage-2.dts36 gpio-keys {
37 compatible = "gpio-keys";
Dkirkwood-b3.dts152 gpio-keys {
153 compatible = "gpio-keys";
Dimx28-apf28dev.dts221 gpio-keys {
222 compatible = "gpio-keys";
Dkirkwood-ts219-6282.dts46 compatible = "gpio-keys";
Drk3066a-rayeager.dts62 keys: gpio-keys { label
63 compatible = "gpio-keys";
373 keys {
Dkirkwood-netxbig.dtsi56 gpio-keys {
57 compatible = "gpio-keys";
Darmada-370-seagate-nas-xbay.dtsi157 gpio-keys {
158 compatible = "gpio-keys";
Dtegra30-apalis-eval.dts191 gpio-keys {
192 compatible = "gpio-keys";
Dimx53-smd.dts24 gpio-keys {
25 compatible = "gpio-keys";
Dkirkwood-netgear_readynas_duo_v2.dts159 gpio-keys {
160 compatible = "gpio-keys";
Domap3-overo-palo43-common.dtsi35 compatible = "gpio-keys";
Domap3-overo-palo35-common.dtsi35 compatible = "gpio-keys";
Domap3-overo-gallop43-common.dtsi35 compatible = "gpio-keys";
Dkirkwood-ns2-common.dtsi56 compatible = "gpio-keys";
Dusb_a9g20-dab-mmx.dtsi68 compatible = "gpio-keys";
Dimx27-apf27dev.dts39 gpio-keys {
40 compatible = "gpio-keys";
Dkirkwood-netgear_readynas_nv+_v2.dts171 gpio-keys {
172 compatible = "gpio-keys";
Dkirkwood-cloudbox.dts59 compatible = "gpio-keys";
Drk3288-firefly.dtsi88 keys: gpio-keys { label
89 compatible = "gpio-keys";
443 keys {
Domap3-overo-chestnut43-common.dtsi35 compatible = "gpio-keys";
Dkirkwood-dir665.dts189 gpio-keys {
190 compatible = "gpio-keys";
Dorion5x-lacie-d2-network.dts36 gpio-keys {
37 compatible = "gpio-keys";
Dusb_a9260_common.dtsi110 compatible = "gpio-keys";
Domap3-overo-alto35-common.dtsi42 compatible = "gpio-keys";
Dkirkwood-ts419.dtsi42 compatible = "gpio-keys";
Darmada-xp-axpwifiap.dts154 compatible = "gpio-keys";
172 keys_pin: keys-pin {
Domap4-var-om44customboard.dtsi33 gpio-keys {
34 compatible = "gpio-keys";
Dmoxart-uc7112lx.dts63 compatible = "gpio-keys-polled";
Dat91-kizboxmini.dts93 compatible = "gpio-keys";
Datlas7-evb.dts114 compatible = "gpio-keys";
Dzynq-zc702.dts37 gpio-keys {
38 compatible = "gpio-keys";
Drk3066a-bqcurie2.dts66 gpio-keys {
67 compatible = "gpio-keys";
Dimx53-qsb-common.dtsi57 gpio-keys {
58 compatible = "gpio-keys";
Dusb_a9263.dts138 compatible = "gpio-keys";
Dimx6qdl-cubox-i.dtsi109 gpio-keys {
110 compatible = "gpio-keys";
Dimx28-eukrea-mbmx28lc.dtsi31 compatible = "gpio-keys";
44 compatible = "gpio-keys";
Dtegra114-tn7.dts288 gpio-keys {
289 compatible = "gpio-keys";
Darmada-370-rd.dts145 gpio-keys {
146 compatible = "gpio-keys";
/linux-4.4.14/Documentation/ABI/testing/
Dsysfs-driver-hid-corsair6 where G-keys triggers their regular key codes. "HW" for
7 hardware playback mode where the G-keys play their macro
Devm20 loading existing trusted/encrypted keys, refer to:
21 Documentation/keys-trusted-encrypted.txt. (A sample dracut
Dsysfs-driver-toshiba_acpi152 In the "Normal Operation" mode, the F{1-12} keys are as usual
154 In the "Special Functions" mode, the F{1-12} keys trigger the
155 hotkey and the F{1-12} keys are accessed via FN-F{1-12}.
/linux-4.4.14/security/integrity/ima/
DKconfig126 bool "Require all keys on the .ima keyring be signed"
131 This option requires that all keys added to the .ima
139 File signature verification is based on the public keys
140 loaded on the .ima trusted keyring. These public keys are
148 default "/etc/keys/x509_ima.der"
/linux-4.4.14/fs/nilfs2/
Dbmap.c113 __u64 keys[NILFS_BMAP_SMALL_HIGH + 1]; in nilfs_bmap_do_insert() local
121 bmap, keys, ptrs, NILFS_BMAP_SMALL_HIGH + 1); in nilfs_bmap_do_insert()
125 bmap, key, ptr, keys, ptrs, n); in nilfs_bmap_do_insert()
168 __u64 keys[NILFS_BMAP_LARGE_LOW + 1]; in nilfs_bmap_do_delete() local
176 bmap, keys, ptrs, NILFS_BMAP_LARGE_LOW + 1); in nilfs_bmap_do_delete()
180 bmap, key, keys, ptrs, n); in nilfs_bmap_do_delete()
Ddirect.c215 __u64 *keys, __u64 *ptrs, int nitems) in nilfs_direct_gather_data() argument
227 keys[n] = key; in nilfs_direct_gather_data()
236 __u64 key, __u64 *keys, __u64 *ptrs, int n) in nilfs_direct_delete_and_convert() argument
255 if ((j < n) && (i == keys[j])) { in nilfs_direct_delete_and_convert()
/linux-4.4.14/net/wireless/
Dwext-compat.c444 if (!wdev->wext.keys) { in __cfg80211_set_encryption()
445 wdev->wext.keys = kzalloc(sizeof(*wdev->wext.keys), in __cfg80211_set_encryption()
447 if (!wdev->wext.keys) in __cfg80211_set_encryption()
450 wdev->wext.keys->params[i].key = in __cfg80211_set_encryption()
451 wdev->wext.keys->data[i]; in __cfg80211_set_encryption()
499 memset(wdev->wext.keys->data[idx], 0, in __cfg80211_set_encryption()
500 sizeof(wdev->wext.keys->data[idx])); in __cfg80211_set_encryption()
501 wdev->wext.keys->params[idx].key_len = 0; in __cfg80211_set_encryption()
502 wdev->wext.keys->params[idx].cipher = 0; in __cfg80211_set_encryption()
529 wdev->wext.keys->params[idx] = *params; in __cfg80211_set_encryption()
[all …]
Dwext-sme.c36 if (wdev->wext.keys) { in cfg80211_mgd_wext_connect()
37 wdev->wext.keys->def = wdev->wext.default_key; in cfg80211_mgd_wext_connect()
38 wdev->wext.keys->defmgmt = wdev->wext.default_mgmt_key; in cfg80211_mgd_wext_connect()
46 if (wdev->wext.keys) { in cfg80211_mgd_wext_connect()
47 ck = kmemdup(wdev->wext.keys, sizeof(*ck), GFP_KERNEL); in cfg80211_mgd_wext_connect()
Dibss.c287 if (wdev->wext.keys) { in cfg80211_ibss_wext_join()
288 wdev->wext.keys->def = wdev->wext.default_key; in cfg80211_ibss_wext_join()
289 wdev->wext.keys->defmgmt = wdev->wext.default_mgmt_key; in cfg80211_ibss_wext_join()
294 if (wdev->wext.keys) { in cfg80211_ibss_wext_join()
295 ck = kmemdup(wdev->wext.keys, sizeof(*ck), GFP_KERNEL); in cfg80211_ibss_wext_join()
/linux-4.4.14/drivers/crypto/qat/qat_common/
Dqat_algs.c274 struct crypto_authenc_keys *keys, in qat_alg_aead_init_enc_session() argument
283 sizeof(struct icp_qat_hw_auth_setup) + keys->enckeylen); in qat_alg_aead_init_enc_session()
293 memcpy(cipher->aes.key, keys->enckey, keys->enckeylen); in qat_alg_aead_init_enc_session()
300 if (qat_alg_do_precomputes(hash, ctx, keys->authkey, keys->authkeylen)) in qat_alg_aead_init_enc_session()
316 cipher_cd_ctrl->cipher_key_sz = keys->enckeylen >> 3; in qat_alg_aead_init_enc_session()
355 struct crypto_authenc_keys *keys, in qat_alg_aead_init_dec_session() argument
379 memcpy(cipher->aes.key, keys->enckey, keys->enckeylen); in qat_alg_aead_init_dec_session()
387 if (qat_alg_do_precomputes(hash, ctx, keys->authkey, keys->authkeylen)) in qat_alg_aead_init_dec_session()
403 cipher_cd_ctrl->cipher_key_sz = keys->enckeylen >> 3; in qat_alg_aead_init_dec_session()
533 struct crypto_authenc_keys keys; in qat_alg_aead_init_sessions() local
[all …]
/linux-4.4.14/Documentation/crypto/
Dasymmetric-keys.txt9 - Accessing asymmetric keys.
19 The "asymmetric" key type is designed to be a container for the keys used in
71 only keys of the specified subtype (e.g. tpm) will be matched. For
76 Looking in /proc/keys, the last 8 hex digits of the key fingerprint are
86 For general access to asymmetric keys from within the kernel, the following
91 This gives access to functions for dealing with asymmetric / public keys.
165 Asymmetric keys have a subtype that defines the set of operations that can be
175 #include <keys/asymmetric-subtype.h>
189 Asymmetric keys point to this with their payload[asym_subtype] member.
198 Mandatory. This allows the subtype to display something in /proc/keys
[all …]
/linux-4.4.14/drivers/tty/serial/8250/
D8250_fintek.c144 static const u8 keys[] = {0x77, 0xa0, 0x87, 0x67}; in fintek_8250_base_port() local
148 for (j = 0; j < ARRAY_SIZE(keys); j++) { in fintek_8250_base_port()
150 if (fintek_8250_enter_key(addr[i], keys[j])) in fintek_8250_base_port()
171 *key = keys[j]; in fintek_8250_base_port()
/linux-4.4.14/Documentation/laptops/
Dsonypi.txt19 - Fn keys
21 - programmable keys, back, help, zoom, thumbphrase buttons, etc.
84 programmable keys events). The default event mask is
107 keyboard reporting the pressing of the special keys.
126 Fn-keys which put the laptop in sleeping state, or switch the
128 driver disables all APM management for those keys, by enabling the
130 you have one of those laptops with working Fn keys and want to
Dthinkpad-acpi.txt168 Hot keys
189 The driver will generate events over the input layer for hot keys and
194 The hot key bit mask allows some control over which hot keys generate
201 modified do anything. Not all hot keys can be individually controlled
209 Note that unmasking some keys prevents their default behavior. For
223 echo 0xffffffff > /proc/acpi/ibm/hotkey -- enable all hot keys
224 echo 0 > /proc/acpi/ibm/hotkey -- disable all possible hot keys
249 Returns the hot keys mask when thinkpad-acpi was loaded.
250 Upon module unload, the hot keys mask will be restored
264 (see above). Returns the current status of the hot keys
[all …]
/linux-4.4.14/Documentation/
Dmodule-signing.txt9 - Generating signing keys.
10 - Public keys in the kernel.
30 This facility uses X.509 ITU-T standard certificates to encode the public keys
95 "certs/signing_key.pem" will disable the autogeneration of signing keys
108 (5) "Additional X.509 keys for default system keyring" (CONFIG_SYSTEM_TRUSTED_KEYS)
176 The kernel contains a ring of public keys that can be viewed by root. They're
179 [root@deneb ~]# cat /proc/keys
189 Further, the architecture code may take public keys from a hardware store and
192 Finally, it is possible to add additional public keys by doing:
200 Note, however, that the kernel will only permit keys to be added to
Dbraille-console.txt21 review mode. In review mode, the arrow keys permit to browse in the VT content,
22 page up/down keys go at the top/bottom of the screen, and the home key goes back
Dassoc_array.txt40 (3) Objects require index keys to locate them within the array.
42 (4) Index keys must be unique. Inserting an object with the same key as one
45 (5) Index keys can be of any length and can be of different lengths.
47 (6) Index keys should encode the length early on, before any variation due to
50 (7) Index keys can include a hash to scatter objects throughout the array.
165 (4) Diff the index keys of two objects.
349 This will cause leaves with different length keys to scatter away from each
350 other - and those with the same length keys to cluster together.
435 So, for instance, keys with the following example index keys will be found in
465 In the above example list of index keys, node A will contain:
Dstatic-keys.txt23 Static keys allows the inclusion of seldom used features in
58 kernel code paths should be able to make use of the static keys facility.
86 the basis for the static keys facility.
171 5) Static keys / jump label analysis, results (x86_64):
/linux-4.4.14/drivers/net/wireless/ipw2x00/
Dlibipw_wx.c412 memcpy(sec.keys[key], keybuf, erq->length); in libipw_wx_set_encode()
414 memset(sec.keys[key] + erq->length, 0, in libipw_wx_set_encode()
417 key, len, sec.keys[key], in libipw_wx_set_encode()
421 (*crypt)->ops->set_key(sec.keys[key], len, NULL, in libipw_wx_set_encode()
431 len = (*crypt)->ops->get_key(sec.keys[key], WEP_KEY_LEN, in libipw_wx_set_encode()
437 memset(sec.keys[key], 0, 13); in libipw_wx_set_encode()
438 (*crypt)->ops->set_key(sec.keys[key], 13, NULL, in libipw_wx_set_encode()
505 memcpy(keybuf, sec->keys[key], len); in libipw_wx_get_encode()
652 memcpy(sec.keys[idx], ext->key, ext->key_len); in libipw_wx_set_encodeext()
723 memcpy(ext->key, sec->keys[idx], ext->key_len); in libipw_wx_get_encodeext()
/linux-4.4.14/arch/arm64/boot/dts/apm/
Dapm-merlin.dts27 gpio-keys {
28 compatible = "gpio-keys";
Dapm-mustang.dts27 gpio-keys {
28 compatible = "gpio-keys";
/linux-4.4.14/net/sctp/
Dobjcnt.c56 SCTP_DBG_OBJCNT(keys);
72 SCTP_DBG_OBJCNT_ENTRY(keys),
Dauth.c68 SCTP_DBG_OBJCNT_DEC(keys); in sctp_auth_key_put()
88 SCTP_DBG_OBJCNT_INC(keys); in sctp_auth_create_key()
121 void sctp_auth_destroy_keys(struct list_head *keys) in sctp_auth_destroy_keys() argument
126 if (list_empty(keys)) in sctp_auth_destroy_keys()
129 key_for_each_safe(ep_key, tmp, keys) { in sctp_auth_destroy_keys()
/linux-4.4.14/net/ethernet/
Deth.c127 struct flow_keys keys; in eth_get_headlen() local
134 if (!skb_flow_dissect_flow_keys_buf(&keys, data, eth->h_proto, in eth_get_headlen()
136 return max_t(u32, keys.control.thoff, sizeof(*eth)); in eth_get_headlen()
139 return min_t(u32, __skb_get_poff(NULL, data, &keys, len), len); in eth_get_headlen()
/linux-4.4.14/net/mac802154/
Dllsec.c41 INIT_LIST_HEAD(&sec->table.keys); in mac802154_llsec_init()
69 list_for_each_entry_safe(key, kn, &sec->table.keys, list) { in mac802154_llsec_destroy()
229 list_for_each_entry(pos, &sec->table.keys, list) { in mac802154_llsec_key_add()
265 list_add_rcu(&new->list, &sec->table.keys); in mac802154_llsec_key_add()
279 list_for_each_entry(pos, &sec->table.keys, list) { in mac802154_llsec_key_del()
345 list_for_each_entry_safe(pos, pn, &dev->dev.keys, list) { in llsec_dev_free()
376 INIT_LIST_HEAD(&entry->dev.keys); in mac802154_llsec_dev_add()
416 list_for_each_entry_rcu(devkey, &dev->dev.keys, list) { in llsec_devkey_find()
447 list_add_tail_rcu(&devkey->devkey.list, &dev->dev.keys); in mac802154_llsec_devkey_add()
568 list_for_each_entry_rcu(key_entry, &sec->table.keys, list) { in llsec_lookup_key()
[all …]
/linux-4.4.14/arch/mips/boot/dts/qca/
Dar9132_tl_wr1043nd_v1.dts68 gpio-keys {
69 compatible = "gpio-keys-polled";
/linux-4.4.14/Documentation/ABI/obsolete/
Dsysfs-driver-hid-roccat-ryos24 Description: When written, this file lets one set the default of all keys for
35 function keys for a specific profile. Profile index is included
45 keys for a specific profile. Profile index is included in
55 thumbster keys for a specific profile. Profile index is included
65 capslock and function keys for a specific profile. Profile index
75 easyzone keys for a specific profile. Profile index is included
84 Description: When written, this file lets one deactivate certain keys like
85 windows and application keys, to prevent accidental presses.
Dsysfs-driver-hid-roccat-isku23 Description: When written, this file lets one deactivate certain keys like
24 windows and application keys, to prevent accidental presses.
45 easyzone keys for a specific profile. Profile number is included
55 function keys for a specific profile. Profile number is included
65 keys for a specific profile. Profile number is included in
75 keys for a specific profile. Profile number is included in
85 thumbster keys for a specific profile. Profile number is included
Dsysfs-driver-hid-roccat-arvo15 several modifier keys internally.
34 Description: The keyboard lets the user deactivate 5 certain keys like the
35 windows and application keys, to protect the user from the outcome
/linux-4.4.14/net/mac80211/
Dkey.c262 key = key_mtx_dereference(sdata->local, sdata->keys[idx]); in __ieee80211_set_default_key()
293 key = key_mtx_dereference(sdata->local, sdata->keys[idx]); in __ieee80211_set_default_mgmt_key()
358 rcu_assign_pointer(sdata->keys[idx], new); in ieee80211_key_replace()
631 old_key = key_mtx_dereference(sdata->local, sdata->keys[idx]); in ieee80211_key_link()
748 struct list_head *keys) in ieee80211_free_keys_iface() argument
762 list_add_tail(&key->list, keys); in ieee80211_free_keys_iface()
775 LIST_HEAD(keys); in ieee80211_free_keys()
781 ieee80211_free_keys_iface(sdata, &keys); in ieee80211_free_keys()
785 ieee80211_free_keys_iface(vlan, &keys); in ieee80211_free_keys()
788 if (!list_empty(&keys) || force_synchronize) in ieee80211_free_keys()
[all …]
/linux-4.4.14/drivers/staging/panel/
DKconfig49 int "Keypad type (0=none, 1=old 6 keys, 2=new 6 keys, 3=Nexcom 4 keys)"
54 The keys will be read from character device 10,185. Valid values are :
57 1 : old 6 keys keypad
58 2 : new 6 keys keypad, as used on the server at www.ant-computing.com
59 3 : Nexcom NSA1045's 4 keys keypad
62 supports simultaneous keys pressed when the keypad supports them.
/linux-4.4.14/include/uapi/linux/
Dbcache.h202 __u16 keys; member
279 __u32 keys; member
353 __u32 keys; member
/linux-4.4.14/include/crypto/
Dauthenc.h34 int crypto_authenc_extractkeys(struct crypto_authenc_keys *keys, const u8 *key,
/linux-4.4.14/Documentation/devicetree/bindings/power/
Dwakeup-source.txt21 2. "gpio-key,wakeup" Documentation/devicetree/bindings/input/gpio-keys{,-polled}.txt
59 compatible = "gpio-keys";
/linux-4.4.14/tools/perf/Documentation/
Dperf-report.txt69 Sort histogram entries by given key(s) - multiple keys can be specified
70 in CSV format. Following sort keys are available:
101 By default, comm, dso and symbol keys are used.
104 If --branch-stack option is used, following sort keys are also
117 And default sort keys are changed to comm, dso_from, symbol_from, dso_to
122 Specify output field - multiple keys can be specified in CSV format.
127 By default, every sort keys not specified in -F will be appended
130 If --mem-mode option is used, following sort keys are also available
143 And default sort keys are changed to local_weight, mem, sym, dso,
Dperf-kmem.txt41 for page). Available sort keys are 'ptr, callsite, bytes, hit,
/linux-4.4.14/net/bluetooth/hidp/
Dcore.c175 unsigned char *keys = session->keys; in hidp_input_report() local
191 if (keys[i] > 3 && memscan(udata + 2, keys[i], 6) == udata + 8) { in hidp_input_report()
192 if (hidp_keycode[keys[i]]) in hidp_input_report()
193 input_report_key(dev, hidp_keycode[keys[i]], 0); in hidp_input_report()
195 BT_ERR("Unknown key (scancode %#x) released.", keys[i]); in hidp_input_report()
198 if (udata[i] > 3 && memscan(keys + 2, udata[i], 6) == keys + 8) { in hidp_input_report()
206 memcpy(keys, udata, 8); in hidp_input_report()
Dhidp.h171 unsigned char keys[8]; member
/linux-4.4.14/drivers/staging/media/lirc/
Dlirc_zilog.c546 unsigned char keys, ndiffs, id; in get_key_data() local
573 if (!read_uint8(&data, endp, &keys) || in get_key_data()
575 ndiffs > TX_BLOCK_SIZE || keys == 0) in get_key_data()
600 if (keys == 1) in get_key_data()
605 if (!skip(&data, endp, (keys - 1) * (ndiffs + 1))) in get_key_data()
609 for (base = 0, lim = keys - 1; lim; lim >>= 1) { in get_key_data()
847 unsigned char keys; in fw_load() local
855 !read_uint8(&data, tx_data->endp, &keys) || in fw_load()
857 ndiffs > TX_BLOCK_SIZE || keys == 0) in fw_load()
874 (ndiffs + 1) * (keys - 1))) in fw_load()
/linux-4.4.14/include/uapi/linux/tc_act/
Dtc_pedit.h30 struct tc_pedit_key keys[0]; member
/linux-4.4.14/scripts/kconfig/lxdialog/
Dtextbox.c57 int initial_width, int *keys, int *_vscroll, int *_hscroll, in dialog_textbox() argument
250 for (i = 0; keys[i]; i++) { in dialog_textbox()
251 if (key == keys[i]) { in dialog_textbox()
/linux-4.4.14/drivers/staging/rtl8192u/ieee80211/
Dieee80211_wx.c390 memcpy(sec.keys[key], keybuf, erq->length); in ieee80211_wx_set_encode()
392 memset(sec.keys[key] + erq->length, 0, in ieee80211_wx_set_encode()
395 key, escape_essid(sec.keys[key], len), in ieee80211_wx_set_encode()
398 (*crypt)->ops->set_key(sec.keys[key], len, NULL, in ieee80211_wx_set_encode()
408 len = (*crypt)->ops->get_key(sec.keys[key], WEP_KEY_LEN, in ieee80211_wx_set_encode()
417 memset(sec.keys[key], 0, 13); in ieee80211_wx_set_encode()
418 (*crypt)->ops->set_key(sec.keys[key], 13, NULL, in ieee80211_wx_set_encode()
/linux-4.4.14/drivers/staging/rtl8192e/
Drtllib_wx.c402 memcpy(sec.keys[key], keybuf, erq->length); in rtllib_wx_set_encode()
404 memset(sec.keys[key] + erq->length, 0, in rtllib_wx_set_encode()
407 key, escape_essid(sec.keys[key], len), erq->length, in rtllib_wx_set_encode()
410 (*crypt)->ops->set_key(sec.keys[key], len, NULL, in rtllib_wx_set_encode()
421 len = (*crypt)->ops->get_key(sec.keys[key], WEP_KEY_LEN, in rtllib_wx_set_encode()
428 memset(sec.keys[key], 0, 13); in rtllib_wx_set_encode()
429 (*crypt)->ops->set_key(sec.keys[key], 13, NULL, in rtllib_wx_set_encode()
/linux-4.4.14/security/
DMakefile5 obj-$(CONFIG_KEYS) += keys/
/linux-4.4.14/arch/arm64/boot/dts/rockchip/
Drk3368-r88.dts66 keys: gpio-keys { label
67 compatible = "gpio-keys";
301 keys {
/linux-4.4.14/Documentation/blackfin/
Dbfin-gpio-notes.txt57 Some drivers, like gpio-keys, need this behavior. Kernel only print out
59 bfin-gpio: GPIO 24 is already reserved by gpio-keys: BTN0, and you are
/linux-4.4.14/drivers/hid/
Dhid-wiimote-modules.c65 static void wiimod_keys_in_keys(struct wiimote_data *wdata, const __u8 *keys) in wiimod_keys_in_keys() argument
68 !!(keys[0] & 0x01)); in wiimod_keys_in_keys()
70 !!(keys[0] & 0x02)); in wiimod_keys_in_keys()
72 !!(keys[0] & 0x04)); in wiimod_keys_in_keys()
74 !!(keys[0] & 0x08)); in wiimod_keys_in_keys()
76 !!(keys[0] & 0x10)); in wiimod_keys_in_keys()
78 !!(keys[1] & 0x01)); in wiimod_keys_in_keys()
80 !!(keys[1] & 0x02)); in wiimod_keys_in_keys()
82 !!(keys[1] & 0x04)); in wiimod_keys_in_keys()
84 !!(keys[1] & 0x08)); in wiimod_keys_in_keys()
[all …]
/linux-4.4.14/drivers/crypto/
Dixp4xx_crypto.c1160 struct crypto_authenc_keys keys; in aead_setkey() local
1162 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in aead_setkey()
1165 if (keys.authkeylen > sizeof(ctx->authkey)) in aead_setkey()
1168 if (keys.enckeylen > sizeof(ctx->enckey)) in aead_setkey()
1171 memcpy(ctx->authkey, keys.authkey, keys.authkeylen); in aead_setkey()
1172 memcpy(ctx->enckey, keys.enckey, keys.enckeylen); in aead_setkey()
1173 ctx->authkey_len = keys.authkeylen; in aead_setkey()
1174 ctx->enckey_len = keys.enckeylen; in aead_setkey()
Dpicoxcell_crypto.c453 struct crypto_authenc_keys keys; in spacc_aead_setkey() local
466 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in spacc_aead_setkey()
469 if (keys.enckeylen > AES_MAX_KEY_SIZE) in spacc_aead_setkey()
472 if (keys.authkeylen > sizeof(ctx->hash_ctx)) in spacc_aead_setkey()
475 memcpy(ctx->cipher_key, keys.enckey, keys.enckeylen); in spacc_aead_setkey()
476 ctx->cipher_key_len = keys.enckeylen; in spacc_aead_setkey()
478 memcpy(ctx->hash_ctx, keys.authkey, keys.authkeylen); in spacc_aead_setkey()
479 ctx->hash_key_len = keys.authkeylen; in spacc_aead_setkey()
Dtalitos.c852 struct crypto_authenc_keys keys; in aead_setkey() local
854 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in aead_setkey()
857 if (keys.authkeylen + keys.enckeylen > TALITOS_MAX_KEY_SIZE) in aead_setkey()
860 memcpy(ctx->key, keys.authkey, keys.authkeylen); in aead_setkey()
861 memcpy(&ctx->key[keys.authkeylen], keys.enckey, keys.enckeylen); in aead_setkey()
863 ctx->keylen = keys.authkeylen + keys.enckeylen; in aead_setkey()
864 ctx->enckeylen = keys.enckeylen; in aead_setkey()
865 ctx->authkeylen = keys.authkeylen; in aead_setkey()
/linux-4.4.14/drivers/staging/rdma/hfi1/
DMakefile11 init.o intr.o keys.o mad.o mmap.o mr.o pcie.o pio.o pio_copy.o \
/linux-4.4.14/arch/s390/kvm/
Dkvm-s390.c813 uint8_t *keys; in kvm_s390_get_skeys() local
829 keys = kmalloc_array(args->count, sizeof(uint8_t), in kvm_s390_get_skeys()
831 if (!keys) in kvm_s390_get_skeys()
832 keys = vmalloc(sizeof(uint8_t) * args->count); in kvm_s390_get_skeys()
833 if (!keys) in kvm_s390_get_skeys()
848 keys[i] = curkey; in kvm_s390_get_skeys()
851 r = copy_to_user((uint8_t __user *)args->skeydata_addr, keys, in kvm_s390_get_skeys()
856 kvfree(keys); in kvm_s390_get_skeys()
862 uint8_t *keys; in kvm_s390_set_skeys() local
873 keys = kmalloc_array(args->count, sizeof(uint8_t), in kvm_s390_set_skeys()
[all …]
/linux-4.4.14/net/ceph/
Dauth_x_protocol.h45 __le32 keys; member
/linux-4.4.14/arch/powerpc/crypto/
DMakefile13 aes-ppc-spe-y := aes-spe-core.o aes-spe-keys.o aes-tab-4k.o aes-spe-modes.o aes-spe-glue.o
/linux-4.4.14/fs/ecryptfs/
DKconfig21 for userspace to wrap/unwrap file encryption keys by other
/linux-4.4.14/drivers/md/
Ddm-thin-metadata.c1404 dm_block_t keys[2] = { td->id, block }; in dm_thin_find_block() local
1418 r = dm_btree_lookup(info, pmd->root, keys, &value); in dm_thin_find_block()
1498 dm_block_t keys[2] = { td->id, block }; in __insert() local
1503 r = dm_btree_insert_notify(&pmd->info, pmd->root, keys, &value, in __insert()
1532 dm_block_t keys[2] = { td->id, block }; in __remove() local
1534 r = dm_btree_remove(&pmd->info, pmd->root, keys, &pmd->root); in __remove()
1549 dm_block_t keys[1] = { td->id }; in __remove_range() local
1556 r = dm_btree_lookup(&pmd->tl_info, pmd->root, keys, &value); in __remove_range()
1566 r = dm_btree_remove(&pmd->tl_info, pmd->root, keys, &pmd->root); in __remove_range()
1600 return dm_btree_insert(&pmd->tl_info, pmd->root, keys, &value, &pmd->root); in __remove_range()
/linux-4.4.14/Documentation/devicetree/bindings/gpio/
Dnxp,lpc1850-gpio.txt32 compatible = "gpio-keys-polled";
/linux-4.4.14/arch/cris/boot/dts/
Dp1343.dts66 compatible = "gpio-keys";
/linux-4.4.14/drivers/crypto/ux500/
DKconfig15 AES-ECB, CBC and CTR with keys sizes of 128, 192 and 256 bit sizes.
/linux-4.4.14/arch/x86/crypto/sha-mb/
Dsha1_mb_mgr_datastruct.S64 #FIELD _keys, 8, 8 # pointer to keys
/linux-4.4.14/Documentation/device-mapper/
Dpersistent-data.txt78 of nested btrees, and take multiple keys. For example, the
84 64bits, although nesting allows you to use multiple keys.
Ddm-crypt.txt28 keys (for example IV seed) so the key contains more parts concatenated
32 Multi-key compatibility mode. You can define <keycount> keys and
/linux-4.4.14/Documentation/filesystems/nfs/
D00-INDEX24 - information for configuring request-keys to be used by idmapper
/linux-4.4.14/Documentation/input/
Datarikbd.txt40 The two shift keys return different scan codes in this mode. The ENTER key
54 keyboard keys.
151 for the appropriate cursor motion keys. The trigger or fire buttons of the
170 keys. Any keys down at power-up are presumed to be stuck, and their BREAK
207 ikbd will then scan the key matrix for any stuck (closed) keys. Any keys found
220 ; mss=100, mouse buttons act like keys
225 When buttons act like keys, LEFT=0x74 & RIGHT=0x75.
236 were keyboard keys.
356 N.B. If the mouse buttons have been commanded to act like keyboard keys, this
/linux-4.4.14/scripts/
Ddiffconfig127 new = sorted(b.keys())
/linux-4.4.14/include/net/sctp/
Dauth.h84 void sctp_auth_destroy_keys(struct list_head *keys);
/linux-4.4.14/tools/perf/
Dbuiltin-lock.c248 struct lock_key keys[] = { variable
265 for (i = 0; keys[i].name; i++) { in select_key()
266 if (!strcmp(keys[i].name, sort_key)) { in select_key()
267 compare = keys[i].key; in select_key()
/linux-4.4.14/Documentation/networking/
Dopenvswitch.txt13 table" that userspace populates with "flows" that map from keys based
64 How flow keys evolve over time is important to making this work, so
147 Basic rule for evolving flow keys
239 The other rules for flow keys are much less subtle:
247 compare entire flow keys that it may not be able to fully
/linux-4.4.14/include/linux/
Dskbuff.h987 const struct flow_keys *keys, int hlen);
1047 struct flow_keys keys; in skb_get_hash_flowi6() local
1048 __u32 hash = __get_hash_from_flowi6(fl6, &keys); in skb_get_hash_flowi6()
1050 __skb_set_sw_hash(skb, hash, flow_keys_have_l4(&keys)); in skb_get_hash_flowi6()
1061 struct flow_keys keys; in skb_get_hash_flowi4() local
1062 __u32 hash = __get_hash_from_flowi4(fl4, &keys); in skb_get_hash_flowi4()
1064 __skb_set_sw_hash(skb, hash, flow_keys_have_l4(&keys)); in skb_get_hash_flowi4()
2082 struct flow_keys keys; in skb_probe_transport_header() local
2086 else if (skb_flow_dissect_flow_keys(skb, &keys, 0)) in skb_probe_transport_header()
2087 skb_set_transport_header(skb, keys.control.thoff); in skb_probe_transport_header()

123