Home
last modified time | relevance | path

Searched full:keys (Results 1 – 25 of 2696) sorted by relevance

12345678910>>...108

/OK3568_Linux_fs/kernel/tools/testing/selftests/bpf/progs/
H A Dbpf_flow.c74 static __always_inline int export_flow_keys(struct bpf_flow_keys *keys, in export_flow_keys() argument
77 __u32 key = (__u32)(keys->sport) << 16 | keys->dport; in export_flow_keys()
80 memcpy(&val, keys, sizeof(val)); in export_flow_keys()
117 struct bpf_flow_keys *keys = skb->flow_keys; in parse_eth_proto() local
136 return export_flow_keys(keys, BPF_DROP); in parse_eth_proto()
139 return export_flow_keys(keys, BPF_DROP); in parse_eth_proto()
145 struct bpf_flow_keys *keys = skb->flow_keys; in _dissect() local
147 return parse_eth_proto(skb, keys->n_proto); in _dissect()
153 struct bpf_flow_keys *keys = skb->flow_keys; in parse_ip_proto() local
165 return export_flow_keys(keys, BPF_DROP); in parse_ip_proto()
[all …]
/OK3568_Linux_fs/kernel/drivers/input/keyboard/
H A Dmtk-pmic-keys.c78 struct mtk_pmic_keys *keys; member
89 struct mtk_pmic_keys_info keys[MTK_PMIC_MAX_KEY_COUNT]; member
98 static void mtk_pmic_keys_lp_reset_setup(struct mtk_pmic_keys *keys, in mtk_pmic_keys_lp_reset_setup() argument
104 ret = of_property_read_u32(keys->dev->of_node, in mtk_pmic_keys_lp_reset_setup()
109 regmap_update_bits(keys->regmap, pmic_rst_reg, in mtk_pmic_keys_lp_reset_setup()
113 ret = of_property_read_u32(keys->dev->of_node, in mtk_pmic_keys_lp_reset_setup()
120 regmap_update_bits(keys->regmap, pmic_rst_reg, in mtk_pmic_keys_lp_reset_setup()
123 regmap_update_bits(keys->regmap, pmic_rst_reg, in mtk_pmic_keys_lp_reset_setup()
128 regmap_update_bits(keys->regmap, pmic_rst_reg, in mtk_pmic_keys_lp_reset_setup()
131 regmap_update_bits(keys->regmap, pmic_rst_reg, in mtk_pmic_keys_lp_reset_setup()
[all …]
H A Dipaq-micro-keys.c43 struct ipaq_micro_keys *keys = data; in micro_key_receive() local
50 input_report_key(keys->input, keys->codes[key], down); in micro_key_receive()
51 input_sync(keys->input); in micro_key_receive()
55 static void micro_key_start(struct ipaq_micro_keys *keys) in micro_key_start() argument
57 spin_lock(&keys->micro->lock); in micro_key_start()
58 keys->micro->key = micro_key_receive; in micro_key_start()
59 keys->micro->key_data = keys; in micro_key_start()
60 spin_unlock(&keys->micro->lock); in micro_key_start()
63 static void micro_key_stop(struct ipaq_micro_keys *keys) in micro_key_stop() argument
65 spin_lock(&keys->micro->lock); in micro_key_stop()
[all …]
/OK3568_Linux_fs/kernel/arch/arm64/include/asm/
H A Dpointer_auth.h26 * We give each process its own keys, which are shared by all threads. The keys
48 static inline void ptrauth_keys_install_user(struct ptrauth_keys_user *keys) in ptrauth_keys_install_user() argument
51 __ptrauth_key_install_nosync(APIB, keys->apib); in ptrauth_keys_install_user()
52 __ptrauth_key_install_nosync(APDA, keys->apda); in ptrauth_keys_install_user()
53 __ptrauth_key_install_nosync(APDB, keys->apdb); in ptrauth_keys_install_user()
57 __ptrauth_key_install_nosync(APGA, keys->apga); in ptrauth_keys_install_user()
60 static inline void ptrauth_keys_init_user(struct ptrauth_keys_user *keys) in ptrauth_keys_init_user() argument
63 get_random_bytes(&keys->apia, sizeof(keys->apia)); in ptrauth_keys_init_user()
64 get_random_bytes(&keys->apib, sizeof(keys->apib)); in ptrauth_keys_init_user()
65 get_random_bytes(&keys->apda, sizeof(keys->apda)); in ptrauth_keys_init_user()
[all …]
/OK3568_Linux_fs/kernel/security/keys/
H A DKconfig6 config KEYS config
11 access keys in the kernel.
13 It also includes provision of methods by which such keys might be
18 a searchable sequence of keys. Each process is equipped with access
26 depends on KEYS
44 depends on KEYS
60 bool "Large payload keys"
61 depends on KEYS
65 This option provides support for holding large keys within the kernel
72 tristate "TRUSTED KEYS"
[all …]
H A Dgc.c10 #include <keys/keyring-type.h>
19 * Reaper for unused keys.
25 * Reaper for links from keyrings to dead keys.
80 * reaper to go through a cycle finding expired keys.
90 * Reap keys of dead type.
93 * collector: the first to mark keys of that type as being dead, the second to
94 * collect dead links and the third to clean up the dead keys. We have to be
120 * Garbage collect a list of unreferenced, detached keys
122 static noinline void key_gc_unused_keys(struct list_head *keys) in key_gc_unused_keys() argument
124 while (!list_empty(keys)) { in key_gc_unused_keys()
[all …]
/OK3568_Linux_fs/kernel/tools/testing/selftests/net/
H A Dtcp_fastopen_backup_key.c5 * New keys are 'rotated' in two steps:
7 * 2) Make new key the primary by swapping the backup and primary keys
51 static void get_keys(int fd, uint32_t *keys) in get_keys() argument
57 if (getsockopt(fd, SOL_TCP, TCP_FASTOPEN_KEY, keys, &len)) in get_keys()
64 if (sscanf(buf, "%x-%x-%x-%x,%x-%x-%x-%x", keys, keys + 1, keys + 2, in get_keys()
65 keys + 3, keys + 4, keys + 5, keys + 6, keys + 7) != 8) in get_keys()
69 static void set_keys(int fd, uint32_t *keys) in set_keys() argument
74 if (setsockopt(fd, SOL_TCP, TCP_FASTOPEN_KEY, keys, in set_keys()
81 keys[0], keys[1], keys[2], keys[3], keys[4], keys[5], in set_keys()
82 keys[6], keys[7]); in set_keys()
[all …]
/OK3568_Linux_fs/kernel/certs/
H A DKconfig19 bool "Provide system-wide ring of trusted keys"
20 depends on KEYS
23 Provide a system keyring to which trusted keys can be added. Keys in
24 the keyring are considered to be trusted. Keys may be added at will
26 userspace may only add extra keys if those keys can be verified by
27 keys already in the keyring.
29 Keys in this keyring are used by module signature checking.
32 string "Additional X.509 keys for default system keyring"
40 NOTE: If you previously provided keys for the system keyring in the
61 bool "Provide a keyring to which extra trustable keys may be added"
[all …]
/OK3568_Linux_fs/kernel/tools/testing/selftests/bpf/map_tests/
H A Dhtab_map_batch_ops.c13 static void map_batch_update(int map_fd, __u32 max_entries, int *keys, in map_batch_update() argument
28 keys[i] = i + 1; in map_batch_update()
36 err = bpf_map_update_batch(map_fd, keys, values, &max_entries, &opts); in map_batch_update()
41 int *keys, void *values, bool is_pcpu) in map_batch_verify() argument
55 CHECK(keys[i] + 1 + j != bpf_percpu(v[i], j), in map_batch_verify()
58 i, j, keys[i], bpf_percpu(v[i], j)); in map_batch_verify()
61 CHECK(keys[i] + 1 != ((int *)values)[i], in map_batch_verify()
63 "error: i %d key %d value %d\n", i, keys[i], in map_batch_verify()
72 "error: keys array at index %d missing\n", i); in map_batch_verify()
80 int map_fd, *keys, *visited, key; in __test_map_lookup_and_delete_batch() local
[all …]
H A Darray_map_batch_ops.c12 static void map_batch_update(int map_fd, __u32 max_entries, int *keys, in map_batch_update() argument
22 keys[i] = i; in map_batch_update()
26 err = bpf_map_update_batch(map_fd, keys, values, &max_entries, &opts); in map_batch_update()
31 int *keys, int *values) in map_batch_verify() argument
37 CHECK(keys[i] + 1 != values[i], "key/value checking", in map_batch_verify()
38 "error: i %d key %d value %d\n", i, keys[i], values[i]); in map_batch_verify()
43 "error: keys array at index %d missing\n", i); in map_batch_verify()
55 int map_fd, *keys, *values, *visited; in test_array_map_batch_ops() local
71 keys = malloc(max_entries * sizeof(int)); in test_array_map_batch_ops()
74 CHECK(!keys || !values || !visited, "malloc()", "error:%s\n", in test_array_map_batch_ops()
[all …]
/OK3568_Linux_fs/tools/linux/Linux_SecurityAVB/
H A Davb_user_tool.sh5 KEYS=avb_keys
14 echo " Generate new AVB keys"
17 echo " Must generated keys [-n] firstly"
31 touch $KEYS/temp.bin
32 echo -n $PRODUCT_ID > $KEYS/product_id.bin
33 # generate test keys
34 …openssl genpkey -algorithm RSA -pkeyopt rsa_keygen_bits:4096 -outform PEM -out $KEYS/testkey_prk.p…
35 …openssl genpkey -algorithm RSA -pkeyopt rsa_keygen_bits:4096 -outform PEM -out $KEYS/testkey_psk.p…
36 …openssl genpkey -algorithm RSA -pkeyopt rsa_keygen_bits:4096 -outform PEM -out $KEYS/testkey_pik.p…
37 …openssl genpkey -algorithm RSA -pkeyopt rsa_keygen_bits:4096 -outform PEM -out $KEYS/testkey_puk.p…
[all …]
/OK3568_Linux_fs/kernel/arch/arm64/kernel/
H A Dpointer_auth.c13 struct ptrauth_keys_user *keys = &tsk->thread.keys_user; in ptrauth_prctl_reset_keys() local
25 ptrauth_keys_init_user(keys); in ptrauth_prctl_reset_keys()
37 get_random_bytes(&keys->apia, sizeof(keys->apia)); in ptrauth_prctl_reset_keys()
39 get_random_bytes(&keys->apib, sizeof(keys->apib)); in ptrauth_prctl_reset_keys()
41 get_random_bytes(&keys->apda, sizeof(keys->apda)); in ptrauth_prctl_reset_keys()
43 get_random_bytes(&keys->apdb, sizeof(keys->apdb)); in ptrauth_prctl_reset_keys()
45 get_random_bytes(&keys->apga, sizeof(keys->apga)); in ptrauth_prctl_reset_keys()
46 ptrauth_keys_install_user(keys); in ptrauth_prctl_reset_keys()
67 int ptrauth_set_enabled_keys(struct task_struct *tsk, unsigned long keys, in ptrauth_set_enabled_keys() argument
78 if ((keys & ~PR_PAC_ENABLED_KEYS_MASK) || (enabled & ~keys)) in ptrauth_set_enabled_keys()
[all …]
/OK3568_Linux_fs/kernel/drivers/md/bcache/
H A Dbtree.c18 * as keys are inserted we only sort the pages that have not yet been written.
52 * Check for bad keys in replay
115 if (b->level && b->keys.nsets) in bch_btree_init_next()
116 bch_btree_sort(&b->keys, &b->c->sort); in bch_btree_init_next()
118 bch_btree_sort_lazy(&b->keys, &b->c->sort); in bch_btree_init_next()
121 bch_bset_init_next(&b->keys, write_block(b), in bch_btree_init_next()
164 iter->b = &b->keys; in bch_btree_node_read_done()
171 b->written < btree_blocks(b) && i->seq == b->keys.set[0].data->seq; in bch_btree_node_read_done()
199 if (i != b->keys.set[0].data && !i->keys) in bch_btree_node_read_done()
209 bset_sector_offset(&b->keys, i) < KEY_SIZE(&b->key); in bch_btree_node_read_done()
[all …]
/OK3568_Linux_fs/kernel/lib/
H A Dtest_static_keys.c3 * Kernel module for testing static keys.
14 /* old keys */
55 static void invert_keys(struct test_key *keys, int size) in invert_keys() argument
61 if (previous != keys[i].key) { in invert_keys()
62 invert_key(keys[i].key); in invert_keys()
63 previous = keys[i].key; in invert_keys()
68 static int verify_keys(struct test_key *keys, int size, bool invert) in verify_keys() argument
74 ret = static_key_enabled(keys[i].key); in verify_keys()
75 init = keys[i].init_state; in verify_keys()
78 ret = keys[i].test_key(); in verify_keys()
[all …]
/OK3568_Linux_fs/kernel/Documentation/security/keys/
H A Dtrusted-encrypted.rst2 Trusted and Encrypted Keys
5 Trusted and Encrypted Keys are two new key types added to the existing kernel
6 key ring service. Both of these new types are variable length symmetric keys,
7 and in both cases all keys are created in the kernel, and user space sees,
8 stores, and loads only encrypted blobs. Trusted Keys require the availability
10 Keys can be used on any system. All user level blobs, are displayed and loaded
13 Trusted Keys use a TPM both to generate and to seal the keys. Keys are sealed
17 (future) PCR values, so keys are easily migrated to new pcr values, such as
24 By default, trusted keys are sealed under the SRK, which has the default
77 TPM_STORED_DATA format. The key length for new keys are always in bytes.
[all …]
H A Dcore.rst5 This service allows cryptographic keys, authentication tokens, cross-domain
10 other keys. Processes each have three standard keyring subscriptions that a
11 kernel service can search for relevant keys.
25 In this context, keys represent units of cryptographic data, authentication
47 kernel by a kernel service (such as a filesystem) before keys of that type
53 Should a type be removed from the system, all the keys of that type will
65 instantiation function. Keys can also be immortal.
68 actual "key". In the case of a keyring, this is a list of keys to which
86 Keys being requested from userspace will be in this state.
96 * Expired. Keys can have lifetimes set. If their lifetime is exceeded,
[all …]
/OK3568_Linux_fs/kernel/drivers/net/ethernet/cisco/enic/
H A Denic_clsf.c15 * @keys: flow_keys of ipv4 5tuple
21 int enic_addfltr_5t(struct enic *enic, struct flow_keys *keys, u16 rq) in enic_addfltr_5t() argument
26 switch (keys->basic.ip_proto) { in enic_addfltr_5t()
38 data.u.ipv4.src_addr = ntohl(keys->addrs.v4addrs.src); in enic_addfltr_5t()
39 data.u.ipv4.dst_addr = ntohl(keys->addrs.v4addrs.dst); in enic_addfltr_5t()
40 data.u.ipv4.src_port = ntohs(keys->ports.src); in enic_addfltr_5t()
41 data.u.ipv4.dst_port = ntohs(keys->ports.dst); in enic_addfltr_5t()
162 if (tpos->keys.addrs.v4addrs.src == k->addrs.v4addrs.src && in htbl_key_search()
163 tpos->keys.addrs.v4addrs.dst == k->addrs.v4addrs.dst && in htbl_key_search()
164 tpos->keys.ports.ports == k->ports.ports && in htbl_key_search()
[all …]
/OK3568_Linux_fs/kernel/fs/xfs/
H A Dxfs_fsmap.c173 struct xfs_fsmap *keys,
406 struct xfs_fsmap *keys, in xfs_getfsmap_logdev() argument
413 /* Set up search keys */ in xfs_getfsmap_logdev()
414 info->low.rm_startblock = XFS_BB_TO_FSBT(mp, keys[0].fmr_physical); in xfs_getfsmap_logdev()
415 info->low.rm_offset = XFS_BB_TO_FSBT(mp, keys[0].fmr_offset); in xfs_getfsmap_logdev()
416 error = xfs_fsmap_owner_to_rmap(&info->low, keys); in xfs_getfsmap_logdev()
420 xfs_getfsmap_set_irec_flags(&info->low, &keys[0]); in xfs_getfsmap_logdev()
422 error = xfs_fsmap_owner_to_rmap(&info->high, keys + 1); in xfs_getfsmap_logdev()
435 if (keys[0].fmr_physical > 0) in xfs_getfsmap_logdev()
475 struct xfs_fsmap *keys, in __xfs_getfsmap_rtdev() argument
[all …]
/OK3568_Linux_fs/device/rockchip/common/build-hooks/
H A D60-security.sh62 if [ ! -d u-boot/keys ]; then
63 echo "ERROR: No root keys(u-boot/keys) found in u-boot"
69 if [ ! -f u-boot/keys/root_passwd ]; then
70 echo "ERROR: No root passwd(u-boot/keys/root_passwd) found in u-boot"
71 echo " echo your root key for sudo to u-boot/keys/root_passwd"
76 if [ ! -f u-boot/keys/system_enc_key ]; then
77 echo "ERROR: No enc key(u-boot/keys/system_enc_key) found in u-boot"
118 if [ -d u-boot/keys ]; then
119 echo "ERROR: u-boot/keys already exists"
123 mkdir -p u-boot/keys
[all …]
/OK3568_Linux_fs/device/rockchip/common/scripts/
H A Dmk-security.sh62 if [ ! -d u-boot/keys ]; then
63 echo "ERROR: No root keys(u-boot/keys) found in u-boot"
69 if [ ! -f u-boot/keys/root_passwd ]; then
70 echo "ERROR: No root passwd(u-boot/keys/root_passwd) found in u-boot"
71 echo " echo your root key for sudo to u-boot/keys/root_passwd"
76 if [ ! -f u-boot/keys/system_enc_key ]; then
77 echo "ERROR: No enc key(u-boot/keys/system_enc_key) found in u-boot"
118 if [ -d u-boot/keys ]; then
119 echo "ERROR: u-boot/keys already exists"
123 mkdir -p u-boot/keys
[all …]
/OK3568_Linux_fs/kernel/security/integrity/
H A DKconfig22 select KEYS
29 to "lock" certain keyring to prevent adding new keys.
30 This is useful for evm and module keyrings, when keys are
34 bool "Enable asymmetric keys support"
43 asymmetric keys.
46 bool "Require all keys on the integrity keyrings be signed"
51 This option requires that all keys added to the .ima and
56 bool "Provide keyring for platform/firmware trusted keys"
60 Provide a separate, distinct keyring for platform trusted keys, which
76 bool "Enable loading of platform and blacklisted keys for POWER"
[all …]
/OK3568_Linux_fs/yocto/poky/meta/lib/oeqa/selftest/cases/
H A Dpkgdata.py131 self.assertIn('zlib-dev', list(files.keys()), "listed pkgs. files: %s" %result.output)
132 self.assertIn('zlib-doc', list(files.keys()), "listed pkgs. files: %s" %result.output)
138 self.assertIn('libz1', list(files.keys()), "listed pkgs. files: %s" %result.output)
139 self.assertIn('libz-dev', list(files.keys()), "listed pkgs. files: %s" %result.output)
152 self.assertIn('zlib-dbg', list(files.keys()), "listed pkgs. files: %s" %result.output)
153 self.assertIn('zlib-doc', list(files.keys()), "listed pkgs. files: %s" %result.output)
154 self.assertIn('zlib-dev', list(files.keys()), "listed pkgs. files: %s" %result.output)
155 self.assertIn('zlib-staticdev', list(files.keys()), "listed pkgs. files: %s" %result.output)
156 self.assertIn('zlib', list(files.keys()), "listed pkgs. files: %s" %result.output)
157 self.assertNotIn('zlib-locale', list(files.keys()), "listed pkgs. files: %s" %result.output)
[all …]
/OK3568_Linux_fs/u-boot/drivers/input/
H A Dcros_ec_keyb.c21 KBC_MAX_KEYS = 8, /* Maximum keys held down at once */
40 * @param keys List of keys that we have detected
41 * @param max_count Maximum number of keys to return
43 * @return number of pressed keys, 0 for none, -EIO on error
45 static int check_for_keys(struct udevice *dev, struct key_matrix_key *keys, in check_for_keys() argument
78 key = keys + num_keys++; in check_for_keys()
91 * Check the keyboard, and send any keys that are pressed.
105 struct key_matrix_key keys[KBC_MAX_KEYS]; in cros_ec_kbc_check() local
114 * will always return non-zero if keys have been pressed. in cros_ec_kbc_check()
118 * may return 0 before all keys have been read from the EC. in cros_ec_kbc_check()
[all …]
H A DKconfig67 then decoded into keys by this driver.
75 then decoded into keys by this driver.
83 then decoded into keys by this driver.
103 bool "Enable adc keys support"
106 This adds a driver for the adc keys support.
109 bool "Enable SPL adc keys support without DM"
112 This adds a driver for the SPL adc keys support
115 bool "Enable gpio keys support"
118 This adds a driver for the gpio keys support.
121 bool "Enable rk keys support"
[all …]
/OK3568_Linux_fs/kernel/drivers/md/persistent-data/
H A Ddm-btree.c40 /* makes the assumption that no two keys are the same. */
47 uint64_t mid_key = le64_to_cpu(n->keys[mid]); in bsearch()
103 array_insert(node->keys, sizeof(*node->keys), nr_entries, index, &key_le); in insert_at()
370 *result_key = le64_to_cpu(ro_node(s)->keys[i]); in btree_lookup_raw()
378 uint64_t *keys, void *value_le) in dm_btree_lookup() argument
400 r = btree_lookup_raw(&spine, root, keys[level], in dm_btree_lookup()
405 if (rkey != keys[level]) { in dm_btree_lookup()
465 *rkey = le64_to_cpu(n->keys[i]); in dm_btree_lookup_next_single()
474 uint64_t *keys, uint64_t *rkey, void *value_le) in dm_btree_lookup_next() argument
483 r = btree_lookup_raw(&spine, root, keys[level], in dm_btree_lookup_next()
[all …]

12345678910>>...108