/linux-4.4.14/drivers/input/keyboard/ |
D | ipaq-micro-keys.c | 46 struct ipaq_micro_keys *keys = data; in micro_key_receive() local 53 input_report_key(keys->input, keys->codes[key], down); in micro_key_receive() 54 input_sync(keys->input); in micro_key_receive() 58 static void micro_key_start(struct ipaq_micro_keys *keys) in micro_key_start() argument 60 spin_lock(&keys->micro->lock); in micro_key_start() 61 keys->micro->key = micro_key_receive; in micro_key_start() 62 keys->micro->key_data = keys; in micro_key_start() 63 spin_unlock(&keys->micro->lock); in micro_key_start() 66 static void micro_key_stop(struct ipaq_micro_keys *keys) in micro_key_stop() argument 68 spin_lock(&keys->micro->lock); in micro_key_stop() [all …]
|
D | Makefile | 7 obj-$(CONFIG_KEYBOARD_ADP5520) += adp5520-keys.o 8 obj-$(CONFIG_KEYBOARD_ADP5588) += adp5588-keys.o 9 obj-$(CONFIG_KEYBOARD_ADP5589) += adp5589-keys.o 14 obj-$(CONFIG_KEYBOARD_BFIN) += bf54x-keys.o 27 obj-$(CONFIG_KEYBOARD_IPAQ_MICRO) += ipaq-micro-keys.o 35 obj-$(CONFIG_KEYBOARD_LPC32XX) += lpc32xx-keys.o 59 obj-$(CONFIG_KEYBOARD_SUN4I_LRADC) += sun4i-lradc-keys.o
|
D | sh_keysc.c | 91 DECLARE_BITMAP(keys, SH_KEYSC_MAXKEYS); in sh_keysc_isr() 103 bitmap_zero(keys, SH_KEYSC_MAXKEYS); in sh_keysc_isr() 119 __set_bit(n + k, keys); in sh_keysc_isr() 128 bitmap_complement(keys, keys, SH_KEYSC_MAXKEYS); in sh_keysc_isr() 129 bitmap_and(keys1, keys1, keys, SH_KEYSC_MAXKEYS); in sh_keysc_isr() 130 bitmap_or(keys0, keys0, keys, SH_KEYSC_MAXKEYS); in sh_keysc_isr() 132 sh_keysc_map_dbg(&pdev->dev, keys, "keys"); in sh_keysc_isr()
|
D | lm8333.c | 82 u8 keys[LM8333_FIFO_TRANSFER_SIZE]; in lm8333_key_handler() local 87 LM8333_FIFO_TRANSFER_SIZE, keys); in lm8333_key_handler() 94 for (i = 0; i < LM8333_FIFO_TRANSFER_SIZE && keys[i]; i++) { in lm8333_key_handler() 95 pressed = keys[i] & 0x80; in lm8333_key_handler() 96 code = keys[i] & 0x7f; in lm8333_key_handler()
|
D | Kconfig | 23 be called adp5520-keys. 33 module will be called adp5588-keys. 43 module will be called adp5589-keys. 106 The PrecisionBook has five keys that conflict with those used by most 152 module will be called bf54x-keys. 224 for keys connected through TCA6416/TCA6408A IO expanders. 226 Say Y here if your device has keys connected to 243 for keys connected through TCA8418 keypad decoder. 245 Say Y here if your device has keys connected to 356 module will be called lpc32xx-keys. [all …]
|
/linux-4.4.14/drivers/input/misc/ |
D | dm355evm_keys.c | 107 struct dm355evm_keys *keys = _keys; in dm355evm_keys_irq() local 120 dev_dbg(keys->dev, "input high err %d\n", in dm355evm_keys_irq() 128 dev_dbg(keys->dev, "input low err %d\n", in dm355evm_keys_irq() 157 ke = sparse_keymap_entry_from_scancode(keys->input, event); in dm355evm_keys_irq() 159 dev_dbg(keys->dev, in dm355evm_keys_irq() 164 input_report_key(keys->input, keycode, 1); in dm355evm_keys_irq() 165 input_sync(keys->input); in dm355evm_keys_irq() 166 input_report_key(keys->input, keycode, 0); in dm355evm_keys_irq() 167 input_sync(keys->input); in dm355evm_keys_irq() 177 struct dm355evm_keys *keys; in dm355evm_keys_probe() local [all …]
|
/linux-4.4.14/net/core/ |
D | flow_dissector.c | 575 static inline void __flow_hash_consistentify(struct flow_keys *keys) in __flow_hash_consistentify() argument 579 switch (keys->control.addr_type) { in __flow_hash_consistentify() 581 addr_diff = (__force u32)keys->addrs.v4addrs.dst - in __flow_hash_consistentify() 582 (__force u32)keys->addrs.v4addrs.src; in __flow_hash_consistentify() 585 ((__force u16)keys->ports.dst < in __flow_hash_consistentify() 586 (__force u16)keys->ports.src))) { in __flow_hash_consistentify() 587 swap(keys->addrs.v4addrs.src, keys->addrs.v4addrs.dst); in __flow_hash_consistentify() 588 swap(keys->ports.src, keys->ports.dst); in __flow_hash_consistentify() 592 addr_diff = memcmp(&keys->addrs.v6addrs.dst, in __flow_hash_consistentify() 593 &keys->addrs.v6addrs.src, in __flow_hash_consistentify() [all …]
|
/linux-4.4.14/drivers/md/bcache/ |
D | btree.c | 165 if (b->level && b->keys.nsets) in bch_btree_init_next() 166 bch_btree_sort(&b->keys, &b->c->sort); in bch_btree_init_next() 168 bch_btree_sort_lazy(&b->keys, &b->c->sort); in bch_btree_init_next() 171 bch_bset_init_next(&b->keys, write_block(b), in bch_btree_init_next() 209 iter->b = &b->keys; in bch_btree_node_read_done() 216 b->written < btree_blocks(b) && i->seq == b->keys.set[0].data->seq; in bch_btree_node_read_done() 244 if (i != b->keys.set[0].data && !i->keys) in bch_btree_node_read_done() 254 bset_sector_offset(&b->keys, i) < KEY_SIZE(&b->key); in bch_btree_node_read_done() 256 if (i->seq == b->keys.set[0].data->seq) in bch_btree_node_read_done() 259 bch_btree_sort_and_fix_extents(&b->keys, iter, &b->c->sort); in bch_btree_node_read_done() [all …]
|
D | debug.c | 43 sorted = b->c->verify_data->keys.set->data; in bch_btree_verify() 44 inmemory = b->keys.set->data; in bch_btree_verify() 49 v->keys.ops = b->keys.ops; in bch_btree_verify() 63 sorted = v->keys.set->data; in bch_btree_verify() 65 if (inmemory->keys != sorted->keys || in bch_btree_verify() 75 bch_dump_bset(&b->keys, inmemory, 0); in bch_btree_verify() 78 bch_dump_bset(&v->keys, sorted, 0); in bch_btree_verify() 85 bch_dump_bset(&b->keys, i, block); in bch_btree_verify() 91 for (j = 0; j < inmemory->keys; j++) in bch_btree_verify() 153 struct keybuf keys; member [all …]
|
D | journal.c | 314 int ret = 0, keys = 0, entries = 0; in bch_journal_replay() local 341 keys++; in bch_journal_replay() 353 keys, entries, end); in bch_journal_replay() 544 j->cur->data->keys = 0; in bch_journal_next() 694 sectors = __set_blocks(w->data, w->data->keys + nkeys, in journal_wait_for_write() 715 BUG_ON(!w->data->keys); in journal_wait_for_write() 753 struct keylist *keys, in bch_journal() argument 762 w = journal_wait_for_write(c, bch_keylist_nkeys(keys)); in bch_journal() 764 memcpy(bset_bkey_last(w->data), keys->keys, bch_keylist_bytes(keys)); in bch_journal() 765 w->data->keys += bch_keylist_nkeys(keys); in bch_journal() [all …]
|
D | bset.h | 252 #define set_bytes(i) __set_bytes(i, i->keys) 257 __set_blocks(i, (i)->keys, block_bytes) 383 #define bset_bkey_last(i) bkey_idx((struct bkey *) (i)->d, (i)->keys) 463 struct bkey *keys; member 483 l->keys = k; in bch_keylist_init_single() 500 return l->top == l->keys; in bch_keylist_empty() 505 l->top = l->keys; in bch_keylist_reset()
|
D | extents.c | 125 static void bch_bkey_dump(struct btree_keys *keys, const struct bkey *k) in bch_bkey_dump() argument 127 struct btree *b = container_of(keys, struct btree, keys); in bch_bkey_dump() 167 struct btree *b = container_of(bk, struct btree, keys); in bch_btree_ptr_invalid() 205 struct btree *b = container_of(bk, struct btree, keys); in bch_btree_ptr_bad() 230 struct btree *b = container_of(bk, struct btree, keys); in bch_btree_ptr_insert_fixup() 326 struct cache_set *c = container_of(b, struct btree, keys)->c; in bch_extent_insert_fixup() 499 struct btree *b = container_of(bk, struct btree, keys); in bch_extent_invalid() 535 struct btree *b = container_of(bk, struct btree, keys); in bch_extent_bad() 580 struct btree *b = container_of(bk, struct btree, keys); in bch_extent_merge()
|
D | btree.h | 136 struct btree_keys keys; member 178 return b->keys.set->data; in btree_bset_first() 183 return bset_tree_last(&b->keys)->data; in btree_bset_last() 188 return bset_sector_offset(&b->keys, i) >> b->c->block_bits; in bset_block_offset()
|
D | bset.c | 27 (unsigned) ((u64 *) k - i->d), i->keys); in bch_dump_bset() 158 struct bkey *k = l->keys; in bch_keylist_pop() 171 l->top_p -= bkey_u64s(l->keys); in bch_keylist_pop_front() 173 memmove(l->keys, in bch_keylist_pop_front() 174 bkey_next(l->keys), in bch_keylist_pop_front() 565 ? bset_bkey_idx(t->data, t->data->keys - bkey_u64s(&t->end)) in make_bfloat() 628 i->keys = 0; in bch_bset_init_next() 806 __set_bytes(t->data, t->data->keys + bkey_u64s(insert)) > in bch_bset_insert() 813 t->data->keys += bkey_u64s(insert); in bch_bset_insert() 1174 out->keys = last ? (uint64_t *) bkey_next(last) - out->d : 0; in btree_mergesort() [all …]
|
D | writeback.c | 142 struct keylist keys; in write_dirty_finish() local 144 bch_keylist_init(&keys); in write_dirty_finish() 146 bkey_copy(keys.top, &w->key); in write_dirty_finish() 147 SET_KEY_DIRTY(keys.top, false); in write_dirty_finish() 148 bch_keylist_push(&keys); in write_dirty_finish() 153 ret = bch_btree_insert(dc->disk.c, &keys, NULL, &w->key); in write_dirty_finish() 444 RB_EMPTY_ROOT(&dc->writeback_keys.keys)) { in bch_writeback_thread()
|
D | super.c | 89 sb->keys = le16_to_cpu(s->keys); in read_super() 95 sb->version, sb->flags, sb->seq, sb->keys); in read_super() 105 if (sb->keys > SB_JOURNAL_BUCKETS) in read_super() 173 for (i = 0; i < sb->keys; i++) in read_super() 178 if (sb->first_bucket + sb->keys > sb->nbuckets) in read_super() 231 out->keys = cpu_to_le16(sb->keys); in __write_super() 233 for (i = 0; i < sb->keys; i++) in __write_super() 1636 ca->sb.keys = clamp_t(int, ca->sb.nbuckets >> 7, in run_cache_set() 1639 for (j = 0; j < ca->sb.keys; j++) in run_cache_set()
|
/linux-4.4.14/drivers/net/ethernet/cisco/enic/ |
D | enic_clsf.c | 20 int enic_addfltr_5t(struct enic *enic, struct flow_keys *keys, u16 rq) in enic_addfltr_5t() argument 25 switch (keys->basic.ip_proto) { in enic_addfltr_5t() 36 data.u.ipv4.src_addr = ntohl(keys->addrs.v4addrs.src); in enic_addfltr_5t() 37 data.u.ipv4.dst_addr = ntohl(keys->addrs.v4addrs.dst); in enic_addfltr_5t() 38 data.u.ipv4.src_port = ntohs(keys->ports.src); in enic_addfltr_5t() 39 data.u.ipv4.dst_port = ntohs(keys->ports.dst); in enic_addfltr_5t() 161 if (tpos->keys.addrs.v4addrs.src == k->addrs.v4addrs.src && in htbl_key_search() 162 tpos->keys.addrs.v4addrs.dst == k->addrs.v4addrs.dst && in htbl_key_search() 163 tpos->keys.ports.ports == k->ports.ports && in htbl_key_search() 164 tpos->keys.basic.ip_proto == k->basic.ip_proto && in htbl_key_search() [all …]
|
D | enic_ethtool.c | 368 switch (n->keys.basic.ip_proto) { in enic_grxclsrule() 380 fsp->h_u.tcp_ip4_spec.ip4src = flow_get_u32_src(&n->keys); in enic_grxclsrule() 383 fsp->h_u.tcp_ip4_spec.ip4dst = flow_get_u32_dst(&n->keys); in enic_grxclsrule() 386 fsp->h_u.tcp_ip4_spec.psrc = n->keys.ports.src; in enic_grxclsrule() 389 fsp->h_u.tcp_ip4_spec.pdst = n->keys.ports.dst; in enic_grxclsrule()
|
D | enic_clsf.h | 9 int enic_addfltr_5t(struct enic *enic, struct flow_keys *keys, u16 rq);
|
/linux-4.4.14/tools/perf/scripts/python/Perf-Trace-Util/lib/Perf/Trace/ |
D | Core.py | 35 keys = flag_fields[event_name][field_name]['values'].keys() 36 keys.sort() 37 for idx in keys: 54 keys = symbolic_fields[event_name][field_name]['values'].keys() 55 keys.sort() 56 for idx in keys: 77 keys = trace_flags.keys() 79 for idx in keys:
|
/linux-4.4.14/drivers/mfd/ |
D | ucb1x00-assabet.c | 44 struct gpio_keys_platform_data keys; in ucb1x00_assabet_add() local 49 memset(&keys, 0, sizeof(keys)); in ucb1x00_assabet_add() 58 keys.buttons = buttons; in ucb1x00_assabet_add() 59 keys.nbuttons = ARRAY_SIZE(buttons); in ucb1x00_assabet_add() 60 keys.poll_interval = 50; in ucb1x00_assabet_add() 61 keys.name = "ucb1x00"; in ucb1x00_assabet_add() 64 &keys, sizeof(keys)); in ucb1x00_assabet_add()
|
D | adp5520.c | 256 if (pdata->keys) { in adp5520_probe() 258 chip->id, pdata->keys, sizeof(*pdata->keys)); in adp5520_probe()
|
/linux-4.4.14/drivers/md/persistent-data/ |
D | dm-btree.c | 47 uint64_t mid_key = le64_to_cpu(n->keys[mid]); in bsearch() 101 array_insert(node->keys, sizeof(*node->keys), nr_entries, index, &key_le); in insert_at() 363 *result_key = le64_to_cpu(ro_node(s)->keys[i]); in btree_lookup_raw() 370 uint64_t *keys, void *value_le) in dm_btree_lookup() argument 392 r = btree_lookup_raw(&spine, root, keys[level], in dm_btree_lookup() 397 if (rkey != keys[level]) { in dm_btree_lookup() 450 *rkey = le64_to_cpu(n->keys[i]); in dm_btree_lookup_next_single() 459 uint64_t *keys, uint64_t *rkey, void *value_le) in dm_btree_lookup_next() argument 468 r = btree_lookup_raw(&spine, root, keys[level], in dm_btree_lookup_next() 474 if (*rkey != keys[level]) { in dm_btree_lookup_next() [all …]
|
D | dm-btree.h | 110 uint64_t *keys, void *value_le); 117 uint64_t *keys, uint64_t *rkey, void *value_le); 123 uint64_t *keys, void *value, dm_block_t *new_root) 132 uint64_t *keys, void *value, dm_block_t *new_root, 142 uint64_t *keys, dm_block_t *new_root); 151 uint64_t *keys, uint64_t end_key, 176 int (*fn)(void *context, uint64_t *keys, void *leaf),
|
D | dm-btree-remove.c | 227 *key_ptr(parent, r->index) = right->keys[0]; in __rebalance2() 282 *key_ptr(parent, r->index) = right->keys[0]; in delete_center_node() 337 *key_ptr(parent, c->index) = center->keys[0]; in redistribute3() 338 *key_ptr(parent, r->index) = right->keys[0]; in redistribute3() 451 (le64_to_cpu(n->keys[i]) != key)) in do_leaf() 513 uint64_t *keys, dm_block_t *new_root) in dm_btree_remove() argument 527 root, keys[level], (unsigned *)&index); in dm_btree_remove() 609 uint64_t *keys, uint64_t end_key, in remove_one() argument 623 root, keys[level], (unsigned *) &index); in remove_one() 632 root, keys[last_level], &index); in remove_one() [all …]
|
D | dm-btree-internal.h | 41 __le64 keys[0]; member 110 return n->keys + index; in key_ptr() 115 return &n->keys[le32_to_cpu(n->header.max_entries)]; in value_base()
|
/linux-4.4.14/Documentation/security/ |
D | 00-INDEX | 15 keys-ecryptfs.txt 16 - description of the encryption keys for the ecryptfs filesystem. 17 keys-request-key.txt 19 keys-trusted-encrypted.txt 20 - info on the Trusted and Encrypted keys in the kernel key ring service. 21 keys.txt
|
D | keys-trusted-encrypted.txt | 4 key ring service. Both of these new types are variable length symmetric keys, 5 and in both cases all keys are created in the kernel, and user space sees, 11 Trusted Keys use a TPM both to generate and to seal the keys. Keys are sealed 15 (future) PCR values, so keys are easily migrated to new pcr values, such as 19 By default, trusted keys are sealed under the SRK, which has the default 43 TPM_STORED_DATA format. The key length for new keys are always in bytes. 47 Encrypted keys do not depend on a TPM, and are faster, as they use AES for 48 encryption/decryption. New keys are created from kernel generated random 51 disadvantage of encrypted keys is that if they are not rooted in a trusted key, 56 The decrypted portion of encrypted keys can contain either a simple symmetric [all …]
|
D | keys.txt | 5 This service allows cryptographic keys, authentication tokens, cross-domain 10 other keys. Processes each have three standard keyring subscriptions that a 11 kernel service can search for relevant keys. 36 In this context, keys represent units of cryptographic data, authentication 58 kernel by a kernel service (such as a filesystem) before keys of that type 64 Should a type be removed from the system, all the keys of that type will 79 actual "key". In the case of a keyring, this is a list of keys to which 124 The key service provides a number of features besides keys: 130 Keyrings are special keys that contain a list of other keys. Keyring 148 separated from the rest of the description by a ':'. "logon" keys can [all …]
|
D | keys-ecryptfs.txt | 1 Encrypted keys for the eCryptfs filesystem 22 filesystem. Encrypted keys of the newly introduced format store an 31 The eCryptfs filesystem may really benefit from using encrypted keys in that the
|
D | keys-request-key.txt | 6 Documentation/security/keys.txt). This document explains more fully how 56 The two async in-kernel calls may return keys that are still in the process of 158 (2) It considers all the non-keyring keys within that keyring and, if any key 164 (3) It then considers all the keyring-type keys in the keyring it's currently
|
/linux-4.4.14/lib/ |
D | test_static_keys.c | 60 static void invert_keys(struct test_key *keys, int size) in invert_keys() argument 66 if (previous != keys[i].key) { in invert_keys() 67 invert_key(keys[i].key); in invert_keys() 68 previous = keys[i].key; in invert_keys() 73 static int verify_keys(struct test_key *keys, int size, bool invert) in verify_keys() argument 79 ret = static_key_enabled(keys[i].key); in verify_keys() 80 init = keys[i].init_state; in verify_keys() 83 ret = keys[i].test_key(); in verify_keys() 84 if (static_key_enabled(keys[i].key)) { in verify_keys()
|
/linux-4.4.14/drivers/crypto/nx/ |
D | nx-aes-xcbc.c | 76 u8 keys[2][AES_BLOCK_SIZE]; in nx_xcbc_empty() local 88 memset(keys[0], 0x01, sizeof(keys[0])); in nx_xcbc_empty() 89 memset(keys[1], 0x03, sizeof(keys[1])); in nx_xcbc_empty() 91 len = sizeof(keys); in nx_xcbc_empty() 93 in_sg = nx_build_sg_list(nx_ctx->in_sg, (u8 *) keys, &len, in nx_xcbc_empty() 96 if (len != sizeof(keys)) in nx_xcbc_empty() 99 out_sg = nx_build_sg_list(nx_ctx->out_sg, (u8 *) keys, &len, in nx_xcbc_empty() 102 if (len != sizeof(keys)) in nx_xcbc_empty() 115 keys[1][0] ^= 0x80; in nx_xcbc_empty() 117 len = sizeof(keys[1]); in nx_xcbc_empty() [all …]
|
/linux-4.4.14/net/sched/ |
D | act_pedit.c | 40 struct tc_pedit_key *keys = NULL; in tcf_pedit_init() local 65 keys = kmalloc(ksize, GFP_KERNEL); in tcf_pedit_init() 66 if (keys == NULL) { in tcf_pedit_init() 79 keys = kmalloc(ksize, GFP_KERNEL); in tcf_pedit_init() 80 if (keys == NULL) in tcf_pedit_init() 88 if (keys) { in tcf_pedit_init() 90 p->tcfp_keys = keys; in tcf_pedit_init() 93 memcpy(p->tcfp_keys, parm->keys, ksize); in tcf_pedit_init() 103 struct tc_pedit_key *keys = p->tcfp_keys; in tcf_pedit_cleanup() local 104 kfree(keys); in tcf_pedit_cleanup() [all …]
|
D | cls_flower.c | 339 #define FL_KEY_SET(keys, cnt, id, member) \ argument 341 keys[cnt].key_id = id; \ 342 keys[cnt].offset = FL_KEY_MEMBER_OFFSET(member); \ 346 #define FL_KEY_SET_IF_IN_RANGE(mask, keys, cnt, id, member) \ argument 349 FL_KEY_SET(keys, cnt, id, member); \ 355 struct flow_dissector_key keys[FLOW_DISSECTOR_KEY_MAX]; in fl_init_dissector() local 358 FL_KEY_SET(keys, cnt, FLOW_DISSECTOR_KEY_CONTROL, control); in fl_init_dissector() 359 FL_KEY_SET(keys, cnt, FLOW_DISSECTOR_KEY_BASIC, basic); in fl_init_dissector() 360 FL_KEY_SET_IF_IN_RANGE(mask, keys, cnt, in fl_init_dissector() 362 FL_KEY_SET_IF_IN_RANGE(mask, keys, cnt, in fl_init_dissector() [all …]
|
D | sch_choke.c | 139 struct flow_keys_digest keys; member 174 make_flow_keys_digest(&choke_skb_cb(skb1)->keys, &temp); in choke_match_flow() 180 make_flow_keys_digest(&choke_skb_cb(skb2)->keys, &temp); in choke_match_flow() 183 return !memcmp(&choke_skb_cb(skb1)->keys, in choke_match_flow() 184 &choke_skb_cb(skb2)->keys, in choke_match_flow() 185 sizeof(choke_skb_cb(skb1)->keys)); in choke_match_flow()
|
D | cls_flow.c | 303 u32 keys[FLOW_KEY_MAX + 1]; in flow_classify() local 316 keys[n] = flow_key_get(skb, key, &flow_keys); in flow_classify() 320 classid = jhash2(keys, f->nkeys, f->hashrnd); in flow_classify() 322 classid = keys[0]; in flow_classify()
|
/linux-4.4.14/security/keys/ |
D | Kconfig | 10 access keys in the kernel. 12 It also includes provision of methods by which such keys might be 17 a searchable sequence of keys. Each process is equipped with access 41 bool "Large payload keys" 45 This option provides support for holding large keys within the kernel 59 keys in the kernel. Trusted keys are random number symmetric keys, 60 generated and RSA-sealed by the TPM. The TPM only unseals the keys, 76 This option provides support for create/encrypting/decrypting keys 77 in the kernel. Encrypted keys are kernel generated random numbers,
|
D | keyring.c | 151 assoc_array_init(&keyring->keys); in keyring_instantiate() 397 assoc_array_destroy(&keyring->keys, &keyring_assoc_array_ops); in keyring_destroy() 411 if (keyring->keys.nr_leaves_on_tree != 0) in keyring_describe() 412 seq_printf(m, ": %lu", keyring->keys.nr_leaves_on_tree); in keyring_describe() 463 nr_keys = keyring->keys.nr_leaves_on_tree; in keyring_read() 479 ret = assoc_array_iterate(&keyring->keys, keyring_read_iterator, &ctx); in keyring_read() 600 object = assoc_array_find(&keyring->keys, in search_keyring() 605 return assoc_array_iterate(&keyring->keys, ctx->iterator, ctx); in search_keyring() 678 ptr = ACCESS_ONCE(keyring->keys.root); in search_nested_keyrings() 944 object = assoc_array_find(&keyring->keys, &keyring_assoc_array_ops, in find_key_to_update() [all …]
|
D | gc.c | 127 static noinline void key_gc_unused_keys(struct list_head *keys) in key_gc_unused_keys() argument 129 while (!list_empty(keys)) { in key_gc_unused_keys() 131 list_entry(keys->next, struct key, graveyard_link); in key_gc_unused_keys()
|
D | Makefile | 28 obj-$(CONFIG_ENCRYPTED_KEYS) += encrypted-keys/
|
/linux-4.4.14/Documentation/devicetree/bindings/input/ |
D | input-reset.txt | 3 A simple binding to represent a set of keys as described in 4 include/uapi/linux/input.h. This is to communicate a sequence of keys to the 5 sysrq driver. Upon holding the keys for a specified amount of time (if 8 Key sequences are global to the system but all the keys in a set must be coming 12 a set of keys. 18 timeout-ms: duration keys must be pressed together in milliseconds before
|
D | sun4i-lradc-keys.txt | 1 Allwinner sun4i low res adc attached tablet keys 5 - compatible: "allwinner,sun4i-a10-lradc-keys" 10 Each key is represented as a sub-node of "allwinner,sun4i-a10-lradc-keys": 23 compatible = "allwinner,sun4i-a10-lradc-keys";
|
D | gpio-keys.txt | 4 - compatible = "gpio-keys"; 10 Each button (key) is represented as a sub-node of "gpio-keys": 35 compatible = "gpio-keys";
|
D | gpio-keys-polled.txt | 4 - compatible = "gpio-keys-polled"; 11 Each button (key) is represented as a sub-node of "gpio-keys-polled": 36 compatible = "gpio-keys-polled";
|
D | imx-keypad.txt | 4 or 3-point contact keys. The KPP is designed to simplify the software task 6 and decoding one or multiple keys pressed simultaneously on a keypad.
|
D | matrix-keymap.txt | 2 defining the keys in the scope of linux key codes since that is a stable and
|
D | st-keyscan.txt | 19 - linux,keymap: The keymap for keys as described in the binding document
|
/linux-4.4.14/certs/ |
D | Kconfig | 18 bool "Provide system-wide ring of trusted keys" 21 Provide a system keyring to which trusted keys can be added. Keys in 24 userspace may only add extra keys if those keys can be verified by 25 keys already in the keyring. 30 string "Additional X.509 keys for default system keyring" 38 NOTE: If you previously provided keys for the system keyring in the
|
/linux-4.4.14/security/keys/encrypted-keys/ |
D | Makefile | 5 obj-$(CONFIG_ENCRYPTED_KEYS) += encrypted-keys.o 7 encrypted-keys-y := encrypted.o ecryptfs_format.o 10 encrypted-keys-y += $(masterkey-y) $(masterkey-m-m)
|
/linux-4.4.14/include/trace/events/ |
D | bcache.h | 247 __field(unsigned, keys ) 253 __entry->keys = b->keys.set[b->keys.nsets].data->keys; 343 TP_PROTO(struct btree *b, unsigned keys), 344 TP_ARGS(b, keys), 348 __field(unsigned, keys ) 353 __entry->keys = keys; 356 TP_printk("bucket %zu keys %u", __entry->bucket, __entry->keys) 360 TP_PROTO(struct btree *b, unsigned keys), 361 TP_ARGS(b, keys) 365 TP_PROTO(struct btree *b, unsigned keys), [all …]
|
/linux-4.4.14/tools/perf/scripts/python/ |
D | check-perf-trace.py | 71 keys = unhandled.keys() 72 if not keys: 81 for event_name in keys:
|
D | failed-syscalls-by-pid.py | 68 comm_keys = syscalls.keys() 70 pid_keys = syscalls[comm].keys() 73 id_keys = syscalls[comm][pid].keys() 76 ret_keys = syscalls[comm][pid][id].keys()
|
D | netdev-times.py | 132 if 'comm' in event.keys(): 137 elif 'handle' in event.keys(): 303 if cpu not in irq_dic.keys(): 310 if cpu not in irq_dic.keys(): 317 if 'event_list' in irq_record.keys(): 322 if cpu not in irq_dic.keys() \ 326 if 'event_list' in irq_record.keys(): 342 if cpu in irq_dic.keys(): 345 if cpu in net_rx_dic.keys(): 358 if cpu in net_rx_dic.keys(): [all …]
|
D | syscall-counts-by-pid.py | 66 comm_keys = syscalls.keys() 68 pid_keys = syscalls[comm].keys() 71 id_keys = syscalls[comm][pid].keys()
|
D | net_dropmonitor.py | 53 for i in drop_log.keys():
|
/linux-4.4.14/crypto/ |
D | authenc.c | 51 int crypto_authenc_extractkeys(struct crypto_authenc_keys *keys, const u8 *key, in crypto_authenc_extractkeys() argument 65 keys->enckeylen = be32_to_cpu(param->enckeylen); in crypto_authenc_extractkeys() 70 if (keylen < keys->enckeylen) in crypto_authenc_extractkeys() 73 keys->authkeylen = keylen - keys->enckeylen; in crypto_authenc_extractkeys() 74 keys->authkey = key; in crypto_authenc_extractkeys() 75 keys->enckey = key + keys->authkeylen; in crypto_authenc_extractkeys() 87 struct crypto_authenc_keys keys; in crypto_authenc_setkey() local 90 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in crypto_authenc_setkey() 96 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in crypto_authenc_setkey() 106 err = crypto_ablkcipher_setkey(enc, keys.enckey, keys.enckeylen); in crypto_authenc_setkey()
|
D | authencesn.c | 69 struct crypto_authenc_keys keys; in crypto_authenc_esn_setkey() local 72 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in crypto_authenc_esn_setkey() 78 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in crypto_authenc_esn_setkey() 88 err = crypto_ablkcipher_setkey(enc, keys.enckey, keys.enckeylen); in crypto_authenc_esn_setkey()
|
/linux-4.4.14/drivers/net/wireless/orinoco/ |
D | wext.c | 34 kzfree(priv->keys[index].key); in orinoco_set_key() 35 kzfree(priv->keys[index].seq); in orinoco_set_key() 38 priv->keys[index].key = kzalloc(key_len, GFP_ATOMIC); in orinoco_set_key() 39 if (!priv->keys[index].key) in orinoco_set_key() 42 priv->keys[index].key = NULL; in orinoco_set_key() 45 priv->keys[index].seq = kzalloc(seq_len, GFP_ATOMIC); in orinoco_set_key() 46 if (!priv->keys[index].seq) in orinoco_set_key() 49 priv->keys[index].seq = NULL; in orinoco_set_key() 51 priv->keys[index].key_len = key_len; in orinoco_set_key() 52 priv->keys[index].seq_len = seq_len; in orinoco_set_key() [all …]
|
D | hw.c | 828 struct orinoco_key keys[ORINOCO_MAX_KEYS]; in __orinoco_hw_setup_wepkeys() local 830 memset(&keys, 0, sizeof(keys)); in __orinoco_hw_setup_wepkeys() 832 int len = min(priv->keys[i].key_len, in __orinoco_hw_setup_wepkeys() 834 memcpy(&keys[i].data, priv->keys[i].key, len); in __orinoco_hw_setup_wepkeys() 836 keys[i].len = cpu_to_le16(LARGE_KEY_SIZE); in __orinoco_hw_setup_wepkeys() 838 keys[i].len = cpu_to_le16(SMALL_KEY_SIZE); in __orinoco_hw_setup_wepkeys() 840 keys[i].len = cpu_to_le16(0); in __orinoco_hw_setup_wepkeys() 845 &keys); in __orinoco_hw_setup_wepkeys() 862 keylen = priv->keys[priv->tx_key].key_len; in __orinoco_hw_setup_wepkeys() 879 memcpy(key, priv->keys[i].key, in __orinoco_hw_setup_wepkeys() [all …]
|
/linux-4.4.14/include/net/ |
D | flow_dissector.h | 180 static inline bool flow_keys_have_l4(struct flow_keys *keys) in flow_keys_have_l4() argument 182 return (keys->ports.ports || keys->tags.flow_label); in flow_keys_have_l4() 185 u32 flow_hash_from_keys(struct flow_keys *keys);
|
D | flow.h | 248 __u32 __get_hash_from_flowi6(const struct flowi6 *fl6, struct flow_keys *keys); 252 struct flow_keys keys; in get_hash_from_flowi6() local 254 return __get_hash_from_flowi6(fl6, &keys); in get_hash_from_flowi6() 257 __u32 __get_hash_from_flowi4(const struct flowi4 *fl4, struct flow_keys *keys); 261 struct flow_keys keys; in get_hash_from_flowi4() local 263 return __get_hash_from_flowi4(fl4, &keys); in get_hash_from_flowi4()
|
D | cfg802154.h | 276 struct list_head keys; member 300 struct list_head keys; member
|
/linux-4.4.14/scripts/kconfig/ |
D | mconf.c | 290 int *keys, int *vscroll, int *hscroll, 361 int *keys; member 378 data->keys[k] = key; in update_text() 388 data->keys[k] = 0; in update_text() 436 int keys[JUMP_NB + 1], i; in search_conf() local 440 .keys = keys, in search_conf() 447 str_get(&res), 0, 0, keys, &vscroll, in search_conf() 451 for (i = 0; i < JUMP_NB && keys[i]; i++) in search_conf() 452 if (dres == keys[i]) { in search_conf() 757 *keys, int *vscroll, int *hscroll, update_text_fn in show_textbox_ext() argument [all …]
|
/linux-4.4.14/security/integrity/ |
D | Kconfig | 28 to "lock" certain keyring to prevent adding new keys. 29 This is useful for evm and module keyrings, when keys are 33 bool "Enable asymmetric keys support" 42 asymmetric keys.
|
/linux-4.4.14/Documentation/video4linux/ |
D | README.ir | 30 layer, i.e. you'll see the keys of the remote as normal key strokes 40 is, check whenever pressing keys on the remote actually generates 56 XFree86 likely can be configured to recognise the remote keys. Once I 58 device, which had the effect that XFree86 recognised some of the keys
|
/linux-4.4.14/arch/arm/boot/dts/ |
D | bcm47081-buffalo-wzr-900dhp.dts | 27 gpio-keys { 28 compatible = "gpio-keys";
|
D | bcm4708-luxul-xwc-1000.dts | 46 gpio-keys { 47 compatible = "gpio-keys";
|
D | bcm4709-asus-rt-ac87u.dts | 49 gpio-keys { 50 compatible = "gpio-keys";
|
D | bcm4709-netgear-r8000.dts | 55 gpio-keys { 56 compatible = "gpio-keys";
|
D | bcm4708-asus-rt-ac68u.dts | 55 gpio-keys { 56 compatible = "gpio-keys";
|
D | bcm47081-asus-rt-n18u.dts | 61 gpio-keys { 62 compatible = "gpio-keys";
|
D | bcm4708-netgear-r6300-v2.dts | 61 gpio-keys { 62 compatible = "gpio-keys";
|
D | bcm4708-netgear-r6250.dts | 72 gpio-keys { 73 compatible = "gpio-keys";
|
D | bcm4708-asus-rt-ac56u.dts | 74 gpio-keys { 75 compatible = "gpio-keys";
|
D | bcm4709-netgear-r7000.dts | 79 gpio-keys { 80 compatible = "gpio-keys";
|
D | s3c6410-mini6410.dts | 71 gpio-keys { 72 compatible = "gpio-keys"; 207 gpio_keys: gpio-keys {
|
D | bcm47081-buffalo-wzr-600dhp2.dts | 94 gpio-keys { 95 compatible = "gpio-keys";
|
D | bcm4709-buffalo-wxr-1900dhp.dts | 85 gpio-keys { 86 compatible = "gpio-keys";
|
D | bcm4708-smartrg-sr400ac.dts | 97 gpio-keys { 98 compatible = "gpio-keys";
|
D | bcm4708-buffalo-wzr-1750dhp.dts | 100 gpio-keys { 101 compatible = "gpio-keys";
|
D | imx6q-gk802.dts | 40 gpio-keys { 41 compatible = "gpio-keys";
|
D | kirkwood-mv88f6281gtw-ge.dts | 56 pmx_keys: pmx-keys { 106 compatible = "gpio-keys";
|
D | armada-370-seagate-personal-cloud.dtsi | 125 gpio-keys { 126 compatible = "gpio-keys";
|
D | ste-nomadik-s8815.dts | 160 gpio-keys { 161 compatible = "gpio-keys";
|
D | tegra30-colibri-eval-v3.dts | 137 gpio-keys { 138 compatible = "gpio-keys";
|
D | sama5d35ek.dts | 46 compatible = "gpio-keys";
|
D | imx51-apf51dev.dts | 59 gpio-keys { 60 compatible = "gpio-keys";
|
D | imx53-ard.dts | 65 gpio-keys { 66 compatible = "gpio-keys";
|
D | mpa1600.dts | 69 compatible = "gpio-keys";
|
D | kirkwood-ts219-6281.dts | 36 compatible = "gpio-keys";
|
D | orion5x-lacie-ethernet-disk-mini-v2.dts | 42 gpio-keys { 43 compatible = "gpio-keys";
|
D | kirkwood-iomega_ix2_200.dts | 147 gpio-keys { 148 compatible = "gpio-keys";
|
D | orion5x-maxtor-shared-storage-2.dts | 36 gpio-keys { 37 compatible = "gpio-keys";
|
D | kirkwood-b3.dts | 152 gpio-keys { 153 compatible = "gpio-keys";
|
D | imx28-apf28dev.dts | 221 gpio-keys { 222 compatible = "gpio-keys";
|
D | kirkwood-ts219-6282.dts | 46 compatible = "gpio-keys";
|
D | rk3066a-rayeager.dts | 62 keys: gpio-keys { label 63 compatible = "gpio-keys"; 373 keys {
|
D | kirkwood-netxbig.dtsi | 56 gpio-keys { 57 compatible = "gpio-keys";
|
D | armada-370-seagate-nas-xbay.dtsi | 157 gpio-keys { 158 compatible = "gpio-keys";
|
D | tegra30-apalis-eval.dts | 191 gpio-keys { 192 compatible = "gpio-keys";
|
D | imx53-smd.dts | 24 gpio-keys { 25 compatible = "gpio-keys";
|
D | kirkwood-netgear_readynas_duo_v2.dts | 159 gpio-keys { 160 compatible = "gpio-keys";
|
D | omap3-overo-palo43-common.dtsi | 35 compatible = "gpio-keys";
|
D | omap3-overo-palo35-common.dtsi | 35 compatible = "gpio-keys";
|
D | omap3-overo-gallop43-common.dtsi | 35 compatible = "gpio-keys";
|
D | kirkwood-ns2-common.dtsi | 56 compatible = "gpio-keys";
|
D | usb_a9g20-dab-mmx.dtsi | 68 compatible = "gpio-keys";
|
D | imx27-apf27dev.dts | 39 gpio-keys { 40 compatible = "gpio-keys";
|
D | kirkwood-netgear_readynas_nv+_v2.dts | 171 gpio-keys { 172 compatible = "gpio-keys";
|
D | kirkwood-cloudbox.dts | 59 compatible = "gpio-keys";
|
D | rk3288-firefly.dtsi | 88 keys: gpio-keys { label 89 compatible = "gpio-keys"; 443 keys {
|
D | omap3-overo-chestnut43-common.dtsi | 35 compatible = "gpio-keys";
|
D | kirkwood-dir665.dts | 189 gpio-keys { 190 compatible = "gpio-keys";
|
D | orion5x-lacie-d2-network.dts | 36 gpio-keys { 37 compatible = "gpio-keys";
|
D | usb_a9260_common.dtsi | 110 compatible = "gpio-keys";
|
D | omap3-overo-alto35-common.dtsi | 42 compatible = "gpio-keys";
|
D | kirkwood-ts419.dtsi | 42 compatible = "gpio-keys";
|
D | armada-xp-axpwifiap.dts | 154 compatible = "gpio-keys"; 172 keys_pin: keys-pin {
|
D | omap4-var-om44customboard.dtsi | 33 gpio-keys { 34 compatible = "gpio-keys";
|
D | moxart-uc7112lx.dts | 63 compatible = "gpio-keys-polled";
|
D | at91-kizboxmini.dts | 93 compatible = "gpio-keys";
|
D | atlas7-evb.dts | 114 compatible = "gpio-keys";
|
D | zynq-zc702.dts | 37 gpio-keys { 38 compatible = "gpio-keys";
|
D | rk3066a-bqcurie2.dts | 66 gpio-keys { 67 compatible = "gpio-keys";
|
D | imx53-qsb-common.dtsi | 57 gpio-keys { 58 compatible = "gpio-keys";
|
D | usb_a9263.dts | 138 compatible = "gpio-keys";
|
D | imx6qdl-cubox-i.dtsi | 109 gpio-keys { 110 compatible = "gpio-keys";
|
D | imx28-eukrea-mbmx28lc.dtsi | 31 compatible = "gpio-keys"; 44 compatible = "gpio-keys";
|
D | tegra114-tn7.dts | 288 gpio-keys { 289 compatible = "gpio-keys";
|
D | armada-370-rd.dts | 145 gpio-keys { 146 compatible = "gpio-keys";
|
/linux-4.4.14/Documentation/ABI/testing/ |
D | sysfs-driver-hid-corsair | 6 where G-keys triggers their regular key codes. "HW" for 7 hardware playback mode where the G-keys play their macro
|
D | evm | 20 loading existing trusted/encrypted keys, refer to: 21 Documentation/keys-trusted-encrypted.txt. (A sample dracut
|
D | sysfs-driver-toshiba_acpi | 152 In the "Normal Operation" mode, the F{1-12} keys are as usual 154 In the "Special Functions" mode, the F{1-12} keys trigger the 155 hotkey and the F{1-12} keys are accessed via FN-F{1-12}.
|
/linux-4.4.14/security/integrity/ima/ |
D | Kconfig | 126 bool "Require all keys on the .ima keyring be signed" 131 This option requires that all keys added to the .ima 139 File signature verification is based on the public keys 140 loaded on the .ima trusted keyring. These public keys are 148 default "/etc/keys/x509_ima.der"
|
/linux-4.4.14/fs/nilfs2/ |
D | bmap.c | 113 __u64 keys[NILFS_BMAP_SMALL_HIGH + 1]; in nilfs_bmap_do_insert() local 121 bmap, keys, ptrs, NILFS_BMAP_SMALL_HIGH + 1); in nilfs_bmap_do_insert() 125 bmap, key, ptr, keys, ptrs, n); in nilfs_bmap_do_insert() 168 __u64 keys[NILFS_BMAP_LARGE_LOW + 1]; in nilfs_bmap_do_delete() local 176 bmap, keys, ptrs, NILFS_BMAP_LARGE_LOW + 1); in nilfs_bmap_do_delete() 180 bmap, key, keys, ptrs, n); in nilfs_bmap_do_delete()
|
D | direct.c | 215 __u64 *keys, __u64 *ptrs, int nitems) in nilfs_direct_gather_data() argument 227 keys[n] = key; in nilfs_direct_gather_data() 236 __u64 key, __u64 *keys, __u64 *ptrs, int n) in nilfs_direct_delete_and_convert() argument 255 if ((j < n) && (i == keys[j])) { in nilfs_direct_delete_and_convert()
|
/linux-4.4.14/net/wireless/ |
D | wext-compat.c | 444 if (!wdev->wext.keys) { in __cfg80211_set_encryption() 445 wdev->wext.keys = kzalloc(sizeof(*wdev->wext.keys), in __cfg80211_set_encryption() 447 if (!wdev->wext.keys) in __cfg80211_set_encryption() 450 wdev->wext.keys->params[i].key = in __cfg80211_set_encryption() 451 wdev->wext.keys->data[i]; in __cfg80211_set_encryption() 499 memset(wdev->wext.keys->data[idx], 0, in __cfg80211_set_encryption() 500 sizeof(wdev->wext.keys->data[idx])); in __cfg80211_set_encryption() 501 wdev->wext.keys->params[idx].key_len = 0; in __cfg80211_set_encryption() 502 wdev->wext.keys->params[idx].cipher = 0; in __cfg80211_set_encryption() 529 wdev->wext.keys->params[idx] = *params; in __cfg80211_set_encryption() [all …]
|
D | wext-sme.c | 36 if (wdev->wext.keys) { in cfg80211_mgd_wext_connect() 37 wdev->wext.keys->def = wdev->wext.default_key; in cfg80211_mgd_wext_connect() 38 wdev->wext.keys->defmgmt = wdev->wext.default_mgmt_key; in cfg80211_mgd_wext_connect() 46 if (wdev->wext.keys) { in cfg80211_mgd_wext_connect() 47 ck = kmemdup(wdev->wext.keys, sizeof(*ck), GFP_KERNEL); in cfg80211_mgd_wext_connect()
|
D | ibss.c | 287 if (wdev->wext.keys) { in cfg80211_ibss_wext_join() 288 wdev->wext.keys->def = wdev->wext.default_key; in cfg80211_ibss_wext_join() 289 wdev->wext.keys->defmgmt = wdev->wext.default_mgmt_key; in cfg80211_ibss_wext_join() 294 if (wdev->wext.keys) { in cfg80211_ibss_wext_join() 295 ck = kmemdup(wdev->wext.keys, sizeof(*ck), GFP_KERNEL); in cfg80211_ibss_wext_join()
|
/linux-4.4.14/drivers/crypto/qat/qat_common/ |
D | qat_algs.c | 274 struct crypto_authenc_keys *keys, in qat_alg_aead_init_enc_session() argument 283 sizeof(struct icp_qat_hw_auth_setup) + keys->enckeylen); in qat_alg_aead_init_enc_session() 293 memcpy(cipher->aes.key, keys->enckey, keys->enckeylen); in qat_alg_aead_init_enc_session() 300 if (qat_alg_do_precomputes(hash, ctx, keys->authkey, keys->authkeylen)) in qat_alg_aead_init_enc_session() 316 cipher_cd_ctrl->cipher_key_sz = keys->enckeylen >> 3; in qat_alg_aead_init_enc_session() 355 struct crypto_authenc_keys *keys, in qat_alg_aead_init_dec_session() argument 379 memcpy(cipher->aes.key, keys->enckey, keys->enckeylen); in qat_alg_aead_init_dec_session() 387 if (qat_alg_do_precomputes(hash, ctx, keys->authkey, keys->authkeylen)) in qat_alg_aead_init_dec_session() 403 cipher_cd_ctrl->cipher_key_sz = keys->enckeylen >> 3; in qat_alg_aead_init_dec_session() 533 struct crypto_authenc_keys keys; in qat_alg_aead_init_sessions() local [all …]
|
/linux-4.4.14/Documentation/crypto/ |
D | asymmetric-keys.txt | 9 - Accessing asymmetric keys. 19 The "asymmetric" key type is designed to be a container for the keys used in 71 only keys of the specified subtype (e.g. tpm) will be matched. For 76 Looking in /proc/keys, the last 8 hex digits of the key fingerprint are 86 For general access to asymmetric keys from within the kernel, the following 91 This gives access to functions for dealing with asymmetric / public keys. 165 Asymmetric keys have a subtype that defines the set of operations that can be 175 #include <keys/asymmetric-subtype.h> 189 Asymmetric keys point to this with their payload[asym_subtype] member. 198 Mandatory. This allows the subtype to display something in /proc/keys [all …]
|
/linux-4.4.14/drivers/tty/serial/8250/ |
D | 8250_fintek.c | 144 static const u8 keys[] = {0x77, 0xa0, 0x87, 0x67}; in fintek_8250_base_port() local 148 for (j = 0; j < ARRAY_SIZE(keys); j++) { in fintek_8250_base_port() 150 if (fintek_8250_enter_key(addr[i], keys[j])) in fintek_8250_base_port() 171 *key = keys[j]; in fintek_8250_base_port()
|
/linux-4.4.14/Documentation/laptops/ |
D | sonypi.txt | 19 - Fn keys 21 - programmable keys, back, help, zoom, thumbphrase buttons, etc. 84 programmable keys events). The default event mask is 107 keyboard reporting the pressing of the special keys. 126 Fn-keys which put the laptop in sleeping state, or switch the 128 driver disables all APM management for those keys, by enabling the 130 you have one of those laptops with working Fn keys and want to
|
D | thinkpad-acpi.txt | 168 Hot keys 189 The driver will generate events over the input layer for hot keys and 194 The hot key bit mask allows some control over which hot keys generate 201 modified do anything. Not all hot keys can be individually controlled 209 Note that unmasking some keys prevents their default behavior. For 223 echo 0xffffffff > /proc/acpi/ibm/hotkey -- enable all hot keys 224 echo 0 > /proc/acpi/ibm/hotkey -- disable all possible hot keys 249 Returns the hot keys mask when thinkpad-acpi was loaded. 250 Upon module unload, the hot keys mask will be restored 264 (see above). Returns the current status of the hot keys [all …]
|
/linux-4.4.14/Documentation/ |
D | module-signing.txt | 9 - Generating signing keys. 10 - Public keys in the kernel. 30 This facility uses X.509 ITU-T standard certificates to encode the public keys 95 "certs/signing_key.pem" will disable the autogeneration of signing keys 108 (5) "Additional X.509 keys for default system keyring" (CONFIG_SYSTEM_TRUSTED_KEYS) 176 The kernel contains a ring of public keys that can be viewed by root. They're 179 [root@deneb ~]# cat /proc/keys 189 Further, the architecture code may take public keys from a hardware store and 192 Finally, it is possible to add additional public keys by doing: 200 Note, however, that the kernel will only permit keys to be added to
|
D | braille-console.txt | 21 review mode. In review mode, the arrow keys permit to browse in the VT content, 22 page up/down keys go at the top/bottom of the screen, and the home key goes back
|
D | assoc_array.txt | 40 (3) Objects require index keys to locate them within the array. 42 (4) Index keys must be unique. Inserting an object with the same key as one 45 (5) Index keys can be of any length and can be of different lengths. 47 (6) Index keys should encode the length early on, before any variation due to 50 (7) Index keys can include a hash to scatter objects throughout the array. 165 (4) Diff the index keys of two objects. 349 This will cause leaves with different length keys to scatter away from each 350 other - and those with the same length keys to cluster together. 435 So, for instance, keys with the following example index keys will be found in 465 In the above example list of index keys, node A will contain:
|
D | static-keys.txt | 23 Static keys allows the inclusion of seldom used features in 58 kernel code paths should be able to make use of the static keys facility. 86 the basis for the static keys facility. 171 5) Static keys / jump label analysis, results (x86_64):
|
/linux-4.4.14/drivers/net/wireless/ipw2x00/ |
D | libipw_wx.c | 412 memcpy(sec.keys[key], keybuf, erq->length); in libipw_wx_set_encode() 414 memset(sec.keys[key] + erq->length, 0, in libipw_wx_set_encode() 417 key, len, sec.keys[key], in libipw_wx_set_encode() 421 (*crypt)->ops->set_key(sec.keys[key], len, NULL, in libipw_wx_set_encode() 431 len = (*crypt)->ops->get_key(sec.keys[key], WEP_KEY_LEN, in libipw_wx_set_encode() 437 memset(sec.keys[key], 0, 13); in libipw_wx_set_encode() 438 (*crypt)->ops->set_key(sec.keys[key], 13, NULL, in libipw_wx_set_encode() 505 memcpy(keybuf, sec->keys[key], len); in libipw_wx_get_encode() 652 memcpy(sec.keys[idx], ext->key, ext->key_len); in libipw_wx_set_encodeext() 723 memcpy(ext->key, sec->keys[idx], ext->key_len); in libipw_wx_get_encodeext()
|
/linux-4.4.14/arch/arm64/boot/dts/apm/ |
D | apm-merlin.dts | 27 gpio-keys { 28 compatible = "gpio-keys";
|
D | apm-mustang.dts | 27 gpio-keys { 28 compatible = "gpio-keys";
|
/linux-4.4.14/net/sctp/ |
D | objcnt.c | 56 SCTP_DBG_OBJCNT(keys); 72 SCTP_DBG_OBJCNT_ENTRY(keys),
|
D | auth.c | 68 SCTP_DBG_OBJCNT_DEC(keys); in sctp_auth_key_put() 88 SCTP_DBG_OBJCNT_INC(keys); in sctp_auth_create_key() 121 void sctp_auth_destroy_keys(struct list_head *keys) in sctp_auth_destroy_keys() argument 126 if (list_empty(keys)) in sctp_auth_destroy_keys() 129 key_for_each_safe(ep_key, tmp, keys) { in sctp_auth_destroy_keys()
|
/linux-4.4.14/net/ethernet/ |
D | eth.c | 127 struct flow_keys keys; in eth_get_headlen() local 134 if (!skb_flow_dissect_flow_keys_buf(&keys, data, eth->h_proto, in eth_get_headlen() 136 return max_t(u32, keys.control.thoff, sizeof(*eth)); in eth_get_headlen() 139 return min_t(u32, __skb_get_poff(NULL, data, &keys, len), len); in eth_get_headlen()
|
/linux-4.4.14/net/mac802154/ |
D | llsec.c | 41 INIT_LIST_HEAD(&sec->table.keys); in mac802154_llsec_init() 69 list_for_each_entry_safe(key, kn, &sec->table.keys, list) { in mac802154_llsec_destroy() 229 list_for_each_entry(pos, &sec->table.keys, list) { in mac802154_llsec_key_add() 265 list_add_rcu(&new->list, &sec->table.keys); in mac802154_llsec_key_add() 279 list_for_each_entry(pos, &sec->table.keys, list) { in mac802154_llsec_key_del() 345 list_for_each_entry_safe(pos, pn, &dev->dev.keys, list) { in llsec_dev_free() 376 INIT_LIST_HEAD(&entry->dev.keys); in mac802154_llsec_dev_add() 416 list_for_each_entry_rcu(devkey, &dev->dev.keys, list) { in llsec_devkey_find() 447 list_add_tail_rcu(&devkey->devkey.list, &dev->dev.keys); in mac802154_llsec_devkey_add() 568 list_for_each_entry_rcu(key_entry, &sec->table.keys, list) { in llsec_lookup_key() [all …]
|
/linux-4.4.14/arch/mips/boot/dts/qca/ |
D | ar9132_tl_wr1043nd_v1.dts | 68 gpio-keys { 69 compatible = "gpio-keys-polled";
|
/linux-4.4.14/Documentation/ABI/obsolete/ |
D | sysfs-driver-hid-roccat-ryos | 24 Description: When written, this file lets one set the default of all keys for 35 function keys for a specific profile. Profile index is included 45 keys for a specific profile. Profile index is included in 55 thumbster keys for a specific profile. Profile index is included 65 capslock and function keys for a specific profile. Profile index 75 easyzone keys for a specific profile. Profile index is included 84 Description: When written, this file lets one deactivate certain keys like 85 windows and application keys, to prevent accidental presses.
|
D | sysfs-driver-hid-roccat-isku | 23 Description: When written, this file lets one deactivate certain keys like 24 windows and application keys, to prevent accidental presses. 45 easyzone keys for a specific profile. Profile number is included 55 function keys for a specific profile. Profile number is included 65 keys for a specific profile. Profile number is included in 75 keys for a specific profile. Profile number is included in 85 thumbster keys for a specific profile. Profile number is included
|
D | sysfs-driver-hid-roccat-arvo | 15 several modifier keys internally. 34 Description: The keyboard lets the user deactivate 5 certain keys like the 35 windows and application keys, to protect the user from the outcome
|
/linux-4.4.14/net/mac80211/ |
D | key.c | 262 key = key_mtx_dereference(sdata->local, sdata->keys[idx]); in __ieee80211_set_default_key() 293 key = key_mtx_dereference(sdata->local, sdata->keys[idx]); in __ieee80211_set_default_mgmt_key() 358 rcu_assign_pointer(sdata->keys[idx], new); in ieee80211_key_replace() 631 old_key = key_mtx_dereference(sdata->local, sdata->keys[idx]); in ieee80211_key_link() 748 struct list_head *keys) in ieee80211_free_keys_iface() argument 762 list_add_tail(&key->list, keys); in ieee80211_free_keys_iface() 775 LIST_HEAD(keys); in ieee80211_free_keys() 781 ieee80211_free_keys_iface(sdata, &keys); in ieee80211_free_keys() 785 ieee80211_free_keys_iface(vlan, &keys); in ieee80211_free_keys() 788 if (!list_empty(&keys) || force_synchronize) in ieee80211_free_keys() [all …]
|
/linux-4.4.14/drivers/staging/panel/ |
D | Kconfig | 49 int "Keypad type (0=none, 1=old 6 keys, 2=new 6 keys, 3=Nexcom 4 keys)" 54 The keys will be read from character device 10,185. Valid values are : 57 1 : old 6 keys keypad 58 2 : new 6 keys keypad, as used on the server at www.ant-computing.com 59 3 : Nexcom NSA1045's 4 keys keypad 62 supports simultaneous keys pressed when the keypad supports them.
|
/linux-4.4.14/include/uapi/linux/ |
D | bcache.h | 202 __u16 keys; member 279 __u32 keys; member 353 __u32 keys; member
|
/linux-4.4.14/include/crypto/ |
D | authenc.h | 34 int crypto_authenc_extractkeys(struct crypto_authenc_keys *keys, const u8 *key,
|
/linux-4.4.14/Documentation/devicetree/bindings/power/ |
D | wakeup-source.txt | 21 2. "gpio-key,wakeup" Documentation/devicetree/bindings/input/gpio-keys{,-polled}.txt 59 compatible = "gpio-keys";
|
/linux-4.4.14/tools/perf/Documentation/ |
D | perf-report.txt | 69 Sort histogram entries by given key(s) - multiple keys can be specified 70 in CSV format. Following sort keys are available: 101 By default, comm, dso and symbol keys are used. 104 If --branch-stack option is used, following sort keys are also 117 And default sort keys are changed to comm, dso_from, symbol_from, dso_to 122 Specify output field - multiple keys can be specified in CSV format. 127 By default, every sort keys not specified in -F will be appended 130 If --mem-mode option is used, following sort keys are also available 143 And default sort keys are changed to local_weight, mem, sym, dso,
|
D | perf-kmem.txt | 41 for page). Available sort keys are 'ptr, callsite, bytes, hit,
|
/linux-4.4.14/net/bluetooth/hidp/ |
D | core.c | 175 unsigned char *keys = session->keys; in hidp_input_report() local 191 if (keys[i] > 3 && memscan(udata + 2, keys[i], 6) == udata + 8) { in hidp_input_report() 192 if (hidp_keycode[keys[i]]) in hidp_input_report() 193 input_report_key(dev, hidp_keycode[keys[i]], 0); in hidp_input_report() 195 BT_ERR("Unknown key (scancode %#x) released.", keys[i]); in hidp_input_report() 198 if (udata[i] > 3 && memscan(keys + 2, udata[i], 6) == keys + 8) { in hidp_input_report() 206 memcpy(keys, udata, 8); in hidp_input_report()
|
D | hidp.h | 171 unsigned char keys[8]; member
|
/linux-4.4.14/drivers/staging/media/lirc/ |
D | lirc_zilog.c | 546 unsigned char keys, ndiffs, id; in get_key_data() local 573 if (!read_uint8(&data, endp, &keys) || in get_key_data() 575 ndiffs > TX_BLOCK_SIZE || keys == 0) in get_key_data() 600 if (keys == 1) in get_key_data() 605 if (!skip(&data, endp, (keys - 1) * (ndiffs + 1))) in get_key_data() 609 for (base = 0, lim = keys - 1; lim; lim >>= 1) { in get_key_data() 847 unsigned char keys; in fw_load() local 855 !read_uint8(&data, tx_data->endp, &keys) || in fw_load() 857 ndiffs > TX_BLOCK_SIZE || keys == 0) in fw_load() 874 (ndiffs + 1) * (keys - 1))) in fw_load()
|
/linux-4.4.14/include/uapi/linux/tc_act/ |
D | tc_pedit.h | 30 struct tc_pedit_key keys[0]; member
|
/linux-4.4.14/scripts/kconfig/lxdialog/ |
D | textbox.c | 57 int initial_width, int *keys, int *_vscroll, int *_hscroll, in dialog_textbox() argument 250 for (i = 0; keys[i]; i++) { in dialog_textbox() 251 if (key == keys[i]) { in dialog_textbox()
|
/linux-4.4.14/drivers/staging/rtl8192u/ieee80211/ |
D | ieee80211_wx.c | 390 memcpy(sec.keys[key], keybuf, erq->length); in ieee80211_wx_set_encode() 392 memset(sec.keys[key] + erq->length, 0, in ieee80211_wx_set_encode() 395 key, escape_essid(sec.keys[key], len), in ieee80211_wx_set_encode() 398 (*crypt)->ops->set_key(sec.keys[key], len, NULL, in ieee80211_wx_set_encode() 408 len = (*crypt)->ops->get_key(sec.keys[key], WEP_KEY_LEN, in ieee80211_wx_set_encode() 417 memset(sec.keys[key], 0, 13); in ieee80211_wx_set_encode() 418 (*crypt)->ops->set_key(sec.keys[key], 13, NULL, in ieee80211_wx_set_encode()
|
/linux-4.4.14/drivers/staging/rtl8192e/ |
D | rtllib_wx.c | 402 memcpy(sec.keys[key], keybuf, erq->length); in rtllib_wx_set_encode() 404 memset(sec.keys[key] + erq->length, 0, in rtllib_wx_set_encode() 407 key, escape_essid(sec.keys[key], len), erq->length, in rtllib_wx_set_encode() 410 (*crypt)->ops->set_key(sec.keys[key], len, NULL, in rtllib_wx_set_encode() 421 len = (*crypt)->ops->get_key(sec.keys[key], WEP_KEY_LEN, in rtllib_wx_set_encode() 428 memset(sec.keys[key], 0, 13); in rtllib_wx_set_encode() 429 (*crypt)->ops->set_key(sec.keys[key], 13, NULL, in rtllib_wx_set_encode()
|
/linux-4.4.14/security/ |
D | Makefile | 5 obj-$(CONFIG_KEYS) += keys/
|
/linux-4.4.14/arch/arm64/boot/dts/rockchip/ |
D | rk3368-r88.dts | 66 keys: gpio-keys { label 67 compatible = "gpio-keys"; 301 keys {
|
/linux-4.4.14/Documentation/blackfin/ |
D | bfin-gpio-notes.txt | 57 Some drivers, like gpio-keys, need this behavior. Kernel only print out 59 bfin-gpio: GPIO 24 is already reserved by gpio-keys: BTN0, and you are
|
/linux-4.4.14/drivers/hid/ |
D | hid-wiimote-modules.c | 65 static void wiimod_keys_in_keys(struct wiimote_data *wdata, const __u8 *keys) in wiimod_keys_in_keys() argument 68 !!(keys[0] & 0x01)); in wiimod_keys_in_keys() 70 !!(keys[0] & 0x02)); in wiimod_keys_in_keys() 72 !!(keys[0] & 0x04)); in wiimod_keys_in_keys() 74 !!(keys[0] & 0x08)); in wiimod_keys_in_keys() 76 !!(keys[0] & 0x10)); in wiimod_keys_in_keys() 78 !!(keys[1] & 0x01)); in wiimod_keys_in_keys() 80 !!(keys[1] & 0x02)); in wiimod_keys_in_keys() 82 !!(keys[1] & 0x04)); in wiimod_keys_in_keys() 84 !!(keys[1] & 0x08)); in wiimod_keys_in_keys() [all …]
|
/linux-4.4.14/drivers/crypto/ |
D | ixp4xx_crypto.c | 1160 struct crypto_authenc_keys keys; in aead_setkey() local 1162 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in aead_setkey() 1165 if (keys.authkeylen > sizeof(ctx->authkey)) in aead_setkey() 1168 if (keys.enckeylen > sizeof(ctx->enckey)) in aead_setkey() 1171 memcpy(ctx->authkey, keys.authkey, keys.authkeylen); in aead_setkey() 1172 memcpy(ctx->enckey, keys.enckey, keys.enckeylen); in aead_setkey() 1173 ctx->authkey_len = keys.authkeylen; in aead_setkey() 1174 ctx->enckey_len = keys.enckeylen; in aead_setkey()
|
D | picoxcell_crypto.c | 453 struct crypto_authenc_keys keys; in spacc_aead_setkey() local 466 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in spacc_aead_setkey() 469 if (keys.enckeylen > AES_MAX_KEY_SIZE) in spacc_aead_setkey() 472 if (keys.authkeylen > sizeof(ctx->hash_ctx)) in spacc_aead_setkey() 475 memcpy(ctx->cipher_key, keys.enckey, keys.enckeylen); in spacc_aead_setkey() 476 ctx->cipher_key_len = keys.enckeylen; in spacc_aead_setkey() 478 memcpy(ctx->hash_ctx, keys.authkey, keys.authkeylen); in spacc_aead_setkey() 479 ctx->hash_key_len = keys.authkeylen; in spacc_aead_setkey()
|
D | talitos.c | 852 struct crypto_authenc_keys keys; in aead_setkey() local 854 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in aead_setkey() 857 if (keys.authkeylen + keys.enckeylen > TALITOS_MAX_KEY_SIZE) in aead_setkey() 860 memcpy(ctx->key, keys.authkey, keys.authkeylen); in aead_setkey() 861 memcpy(&ctx->key[keys.authkeylen], keys.enckey, keys.enckeylen); in aead_setkey() 863 ctx->keylen = keys.authkeylen + keys.enckeylen; in aead_setkey() 864 ctx->enckeylen = keys.enckeylen; in aead_setkey() 865 ctx->authkeylen = keys.authkeylen; in aead_setkey()
|
/linux-4.4.14/drivers/staging/rdma/hfi1/ |
D | Makefile | 11 init.o intr.o keys.o mad.o mmap.o mr.o pcie.o pio.o pio_copy.o \
|
/linux-4.4.14/arch/s390/kvm/ |
D | kvm-s390.c | 813 uint8_t *keys; in kvm_s390_get_skeys() local 829 keys = kmalloc_array(args->count, sizeof(uint8_t), in kvm_s390_get_skeys() 831 if (!keys) in kvm_s390_get_skeys() 832 keys = vmalloc(sizeof(uint8_t) * args->count); in kvm_s390_get_skeys() 833 if (!keys) in kvm_s390_get_skeys() 848 keys[i] = curkey; in kvm_s390_get_skeys() 851 r = copy_to_user((uint8_t __user *)args->skeydata_addr, keys, in kvm_s390_get_skeys() 856 kvfree(keys); in kvm_s390_get_skeys() 862 uint8_t *keys; in kvm_s390_set_skeys() local 873 keys = kmalloc_array(args->count, sizeof(uint8_t), in kvm_s390_set_skeys() [all …]
|
/linux-4.4.14/net/ceph/ |
D | auth_x_protocol.h | 45 __le32 keys; member
|
/linux-4.4.14/arch/powerpc/crypto/ |
D | Makefile | 13 aes-ppc-spe-y := aes-spe-core.o aes-spe-keys.o aes-tab-4k.o aes-spe-modes.o aes-spe-glue.o
|
/linux-4.4.14/fs/ecryptfs/ |
D | Kconfig | 21 for userspace to wrap/unwrap file encryption keys by other
|
/linux-4.4.14/drivers/md/ |
D | dm-thin-metadata.c | 1404 dm_block_t keys[2] = { td->id, block }; in dm_thin_find_block() local 1418 r = dm_btree_lookup(info, pmd->root, keys, &value); in dm_thin_find_block() 1498 dm_block_t keys[2] = { td->id, block }; in __insert() local 1503 r = dm_btree_insert_notify(&pmd->info, pmd->root, keys, &value, in __insert() 1532 dm_block_t keys[2] = { td->id, block }; in __remove() local 1534 r = dm_btree_remove(&pmd->info, pmd->root, keys, &pmd->root); in __remove() 1549 dm_block_t keys[1] = { td->id }; in __remove_range() local 1556 r = dm_btree_lookup(&pmd->tl_info, pmd->root, keys, &value); in __remove_range() 1566 r = dm_btree_remove(&pmd->tl_info, pmd->root, keys, &pmd->root); in __remove_range() 1600 return dm_btree_insert(&pmd->tl_info, pmd->root, keys, &value, &pmd->root); in __remove_range()
|
/linux-4.4.14/Documentation/devicetree/bindings/gpio/ |
D | nxp,lpc1850-gpio.txt | 32 compatible = "gpio-keys-polled";
|
/linux-4.4.14/arch/cris/boot/dts/ |
D | p1343.dts | 66 compatible = "gpio-keys";
|
/linux-4.4.14/drivers/crypto/ux500/ |
D | Kconfig | 15 AES-ECB, CBC and CTR with keys sizes of 128, 192 and 256 bit sizes.
|
/linux-4.4.14/arch/x86/crypto/sha-mb/ |
D | sha1_mb_mgr_datastruct.S | 64 #FIELD _keys, 8, 8 # pointer to keys
|
/linux-4.4.14/Documentation/device-mapper/ |
D | persistent-data.txt | 78 of nested btrees, and take multiple keys. For example, the 84 64bits, although nesting allows you to use multiple keys.
|
D | dm-crypt.txt | 28 keys (for example IV seed) so the key contains more parts concatenated 32 Multi-key compatibility mode. You can define <keycount> keys and
|
/linux-4.4.14/Documentation/filesystems/nfs/ |
D | 00-INDEX | 24 - information for configuring request-keys to be used by idmapper
|
/linux-4.4.14/Documentation/input/ |
D | atarikbd.txt | 40 The two shift keys return different scan codes in this mode. The ENTER key 54 keyboard keys. 151 for the appropriate cursor motion keys. The trigger or fire buttons of the 170 keys. Any keys down at power-up are presumed to be stuck, and their BREAK 207 ikbd will then scan the key matrix for any stuck (closed) keys. Any keys found 220 ; mss=100, mouse buttons act like keys 225 When buttons act like keys, LEFT=0x74 & RIGHT=0x75. 236 were keyboard keys. 356 N.B. If the mouse buttons have been commanded to act like keyboard keys, this
|
/linux-4.4.14/scripts/ |
D | diffconfig | 127 new = sorted(b.keys())
|
/linux-4.4.14/include/net/sctp/ |
D | auth.h | 84 void sctp_auth_destroy_keys(struct list_head *keys);
|
/linux-4.4.14/tools/perf/ |
D | builtin-lock.c | 248 struct lock_key keys[] = { variable 265 for (i = 0; keys[i].name; i++) { in select_key() 266 if (!strcmp(keys[i].name, sort_key)) { in select_key() 267 compare = keys[i].key; in select_key()
|
/linux-4.4.14/Documentation/networking/ |
D | openvswitch.txt | 13 table" that userspace populates with "flows" that map from keys based 64 How flow keys evolve over time is important to making this work, so 147 Basic rule for evolving flow keys 239 The other rules for flow keys are much less subtle: 247 compare entire flow keys that it may not be able to fully
|
/linux-4.4.14/include/linux/ |
D | skbuff.h | 987 const struct flow_keys *keys, int hlen); 1047 struct flow_keys keys; in skb_get_hash_flowi6() local 1048 __u32 hash = __get_hash_from_flowi6(fl6, &keys); in skb_get_hash_flowi6() 1050 __skb_set_sw_hash(skb, hash, flow_keys_have_l4(&keys)); in skb_get_hash_flowi6() 1061 struct flow_keys keys; in skb_get_hash_flowi4() local 1062 __u32 hash = __get_hash_from_flowi4(fl4, &keys); in skb_get_hash_flowi4() 1064 __skb_set_sw_hash(skb, hash, flow_keys_have_l4(&keys)); in skb_get_hash_flowi4() 2082 struct flow_keys keys; in skb_probe_transport_header() local 2086 else if (skb_flow_dissect_flow_keys(skb, &keys, 0)) in skb_probe_transport_header() 2087 skb_set_transport_header(skb, keys.control.thoff); in skb_probe_transport_header()
|