/linux/include/linux/platform_data/ |
H A D | keyboard-spear.h | 20 KEY(0, 0, KEY_ESC), \ 21 KEY(0, 1, KEY_1), \ 22 KEY(0, 2, KEY_2), \ 23 KEY(0, 3, KEY_3), \ 24 KEY(0, 4, KEY_4), \ 25 KEY(0, 5, KEY_5), \ 26 KEY(0, 6, KEY_6), \ 27 KEY(0, 7, KEY_7), \ 28 KEY(0, 8, KEY_8), \ 29 KEY(1, 0, KEY_9), \ [all …]
|
/linux/security/keys/ |
H A D | key.c | 2 /* Basic authentication token and access key management 26 unsigned int key_quota_root_maxkeys = 1000000; /* root's key count quota */ 27 unsigned int key_quota_root_maxbytes = 25000000; /* root's key space quota */ 28 unsigned int key_quota_maxkeys = 200; /* general key count quota */ 29 unsigned int key_quota_maxbytes = 20000; /* general key space quota */ 34 /* We serialise key instantiation and link */ 38 void __key_check(const struct key *key) in __key_check() argument 40 printk("__key_check: key %p {%08x} should be {%08x}\n", in __key_check() 41 key, key->magic, KEY_DEBUG_MAGIC); in __key_check() 47 * Get the key quota record for a user, allocating a new record if one doesn't [all …]
|
H A D | request_key.c | 2 /* Request a key from userspace 7 * See Documentation/security/keys/request-key.rst 20 #define key_negative_timeout 60 /* default timeout on a negative key's existence */ 22 static struct key *check_cached_key(struct keyring_search_context *ctx) in check_cached_key() 25 struct key *key = current->cached_requested_key; in check_cached_key() local 27 if (key && in check_cached_key() 28 ctx->match_data.cmp(key, &ctx->match_data) && in check_cached_key() 29 !(key->flags & ((1 << KEY_FLAG_INVALIDATED) | in check_cached_key() 31 return key_get(key); in check_cached_key() 36 static void cache_requested_key(struct key *key) in cache_requested_key() argument [all …]
|
H A D | gc.c | 2 /* Key garbage collector 14 * Delay between key revocation/expiry in seconds 34 #define KEY_GC_KEY_EXPIRED 0 /* A key expired and needs unlinking */ 40 * Any key whose type gets unregistered will be re-typed to this if it can't be 70 * Set the expiration time on a key. 72 void key_set_expiry(struct key *key, time64_t expiry) in key_set_expiry() argument 74 key->expiry = expiry; in key_set_expiry() 76 if (!(key->type->flags & KEY_TYPE_INSTANT_REAP)) in key_set_expiry() 92 * Some key's cleanup time was met after it expired, so we need to get the 138 struct key *key = in key_gc_unused_keys() local [all …]
|
H A D | keyring.c | 25 * When plumbing the depths of the key tree, this sets a hard limit 40 static inline struct key *keyring_ptr_to_key(const struct assoc_array_ptr *x) in keyring_ptr_to_key() 43 return (struct key *)((unsigned long)object & ~KEYRING_PTR_SUBTYPE); in keyring_ptr_to_key() 45 static inline void *keyring_key_to_ptr(struct key *key) in keyring_key_to_ptr() argument 47 if (key->type == &key_type_keyring) in keyring_key_to_ptr() 48 return (void *)((unsigned long)key | KEYRING_PTR_SUBTYPE); in keyring_key_to_ptr() 49 return key; in keyring_key_to_ptr() 70 * The keyring key type definition. Keyrings are simply keys of this type and 76 static int keyring_instantiate(struct key *keyring, 78 static void keyring_revoke(struct key *keyring); [all …]
|
H A D | keyctl.c | 2 /* Userspace key control operations 13 #include <linux/key.h> 63 * Extract the description of a new key from userspace and either add it as a 64 * new key to the specified keyring or update a matching key in that keyring. 66 * If the description is NULL or an empty string, the key type is asked to 69 * The keyring must be writable so that we can attach the key to it. 71 * If successful, the new key's serial number is returned, otherwise an error 132 /* create or update the requested key and add it to the target in SYSCALL_DEFINE5() 156 * matching key. Keyrings must have appropriate Search permission to be 159 * If a key is found, it will be attached to the destination keyring if there's [all …]
|
/linux/tools/testing/selftests/bpf/ |
H A D | test_lru_map.c | 42 static int bpf_map_lookup_elem_with_ref_bit(int fd, unsigned long long key, in bpf_map_lookup_elem_with_ref_bit() argument 48 BPF_LD_IMM64(BPF_REG_3, key), in bpf_map_lookup_elem_with_ref_bit() 103 printf("key:%llu not found from map. %s(%d)\n", in map_subset() 108 printf("key:%llu value0:%llu != value1:%llu\n", in map_subset() 154 * Add key=1 (+1 key) 155 * Add key=2 (+1 key) 156 * Lookup Key=1 157 * Add Key=3 158 * => Key=2 will be removed by LRU 159 * Iterate map. Only found key=1 and key=3 [all …]
|
/linux/tools/testing/selftests/bpf/progs/ |
H A D | test_tunnel_kern.c | 53 __type(key, __u32); 61 struct bpf_tunnel_key key; in gre_set_tunnel() local 63 __builtin_memset(&key, 0x0, sizeof(key)); in gre_set_tunnel() 64 key.remote_ipv4 = 0xac100164; /* 172.16.1.100 */ in gre_set_tunnel() 65 key.tunnel_id = 2; in gre_set_tunnel() 66 key.tunnel_tos = 0; in gre_set_tunnel() 67 key.tunnel_ttl = 64; in gre_set_tunnel() 69 ret = bpf_skb_set_tunnel_key(skb, &key, sizeof(key), in gre_set_tunnel() 83 struct bpf_tunnel_key key; in gre_set_tunnel_no_key() local 85 __builtin_memset(&key, 0x0, sizeof(key)); in gre_set_tunnel_no_key() [all …]
|
/linux/drivers/net/wireless/silabs/wfx/ |
H A D | key.c | 3 * Key management related functions. 11 #include "key.h" 29 WARN(!(wdev->key_map & BIT(idx)), "inconsistent key allocation"); in wfx_free_key() 34 struct ieee80211_key_conf *key, u8 *peer_addr) in fill_wep_pair() argument 36 WARN(key->keylen > sizeof(msg->key_data), "inconsistent data"); in fill_wep_pair() 37 msg->key_length = key->keylen; in fill_wep_pair() 38 memcpy(msg->key_data, key->key, key->keylen); in fill_wep_pair() 44 struct ieee80211_key_conf *key) in fill_wep_group() argument 46 WARN(key->keylen > sizeof(msg->key_data), "inconsistent data"); in fill_wep_group() 47 msg->key_id = key->keyidx; in fill_wep_group() [all …]
|
/linux/fs/ubifs/ |
H A D | key.h | 12 * This header contains various key-related definitions and helper function. 13 * UBIFS allows several key schemes, so we access key fields only via these 14 * helpers. At the moment only one key scheme is supported. 16 * Simple key scheme 20 * in case of direntry key). Next 3 bits are node type. The last 29 bits are 26 * Lot's of the key helpers require a struct ubifs_info *c as the first parameter. 28 * different c->key_format. But right now, there is only one key type, UBIFS_SIMPLE_KEY_FMT. 85 * ino_key_init - initialize inode key. 87 * @key: key to initialize 91 union ubifs_key *key, ino_t inum) in ino_key_init() argument [all …]
|
/linux/Documentation/security/keys/ |
H A D | core.rst | 2 Kernel Key Retention Service 9 Keyrings are permitted; these are a special type of key that can hold links to 13 The key service can be configured on by enabling: 15 "Security options"/"Enable access key retention support" (CONFIG_KEYS) 22 Key Overview 26 tokens, keyrings, etc.. These are represented in the kernel by struct key. 28 Each key has a number of attributes: 32 - A description (for matching a key in a search). 39 * Each key is issued a serial number of type key_serial_t that is unique for 40 the lifetime of that key. All serial numbers are positive non-zero 32-bit [all …]
|
H A D | request-key.rst | 2 Key Request Service 5 The key request service is part of the key retention service (refer to 12 struct key *request_key(const struct key_type *type, 18 struct key *request_key_tag(const struct key_type *type, 25 struct key *request_key_with_auxdata(const struct key_type *type, 34 struct key *request_key_rcu(const struct key_type *type, 46 does not need to link the key to a keyring to prevent it from being immediately 47 destroyed. The kernel interface returns a pointer directly to the key, and 48 it's up to the caller to destroy the key. 56 NULL). This is only useful for those key types that define their own upcall [all …]
|
/linux/include/linux/ |
H A D | key.h | 2 /* Authentication token and access key management 27 /* key handle serial number */ 30 /* key handle permissions mask */ 33 struct key; 40 #define KEY_POS_VIEW 0x01000000 /* possessor can view a key's attributes */ 41 #define KEY_POS_READ 0x02000000 /* possessor can read key payload / view keyring */ 42 #define KEY_POS_WRITE 0x04000000 /* possessor can update key payload / add link to keyring */ 43 #define KEY_POS_SEARCH 0x08000000 /* possessor can find a key in search / search a keyring */ 44 #define KEY_POS_LINK 0x10000000 /* possessor can create a link to a key/keyring */ 45 #define KEY_POS_SETATTR 0x20000000 /* possessor can set key attributes */ [all …]
|
H A D | key-type.h | 2 /* Definitions for key type implementations 11 #include <linux/key.h> 20 * Pre-parsed payload, used by key add, update and instantiate. 24 * def_datalen from the key type. Then if the preparse() op is provided by the 25 * key type, that will be called. Then the struct will be passed to the 33 char *description; /* Proposed key description (or NULL) */ 38 time64_t expiry; /* Expiry time of key */ 41 typedef int (*request_key_actor_t)(struct key *auth_key, void *aux); 51 bool (*cmp)(const struct key *key, 62 * kernel managed key type definition [all …]
|
/linux/arch/s390/include/uapi/asm/ |
H A D | pkey.h | 23 #define SECKEYBLOBSIZE 64 /* secure key blob size is always 64 bytes */ 24 #define PROTKEYBLOBSIZE 80 /* protected key blob size is always 80 bytes */ 25 #define MAXPROTKEYSIZE 64 /* a protected key blob may be up to 64 bytes */ 26 #define MAXCLRKEYSIZE 32 /* a clear key value may be up to 32 bytes */ 28 #define MINEP11AESKEYBLOBSIZE 256 /* min EP11 AES key blob size */ 29 #define MAXEP11AESKEYBLOBSIZE 336 /* max EP11 AES key blob size */ 31 /* Minimum size of a key blob */ 61 /* the newer ioctls use a pkey_key_size enum for key size information */ 89 /* Struct to hold a CCA AES secure key blob */ 91 __u8 seckey[SECKEYBLOBSIZE]; /* the secure key blob */ [all …]
|
/linux/crypto/ |
H A D | rsa_helper.c | 3 * RSA key extract helper 19 struct rsa_key *key = context; in rsa_get_n() local 23 /* invalid key provided */ in rsa_get_n() 33 /* In FIPS mode only allow key size 2K and higher */ in rsa_get_n() 35 pr_err("RSA: key size not allowed in FIPS mode\n"); in rsa_get_n() 40 key->n = value; in rsa_get_n() 41 key->n_sz = vlen; in rsa_get_n() 49 struct rsa_key *key = context; in rsa_get_e() local 51 /* invalid key provided */ in rsa_get_e() 52 if (!value || !key->n_sz || !vlen || vlen > key->n_sz) in rsa_get_e() [all …]
|
/linux/kernel/ |
H A D | jump_label.c | 41 * Entrires are sorted by key. in jump_label_cmp() 72 jea->key = jeb->key - delta; in jump_label_swap() 76 jeb->key = tmp.key + delta; in jump_label_swap() 93 static void jump_label_update(struct static_key *key); 104 int static_key_count(struct static_key *key) in static_key_count() argument 110 int n = atomic_read(&key->enabled); in static_key_count() 117 * static_key_fast_inc_not_disabled - adds a user for a static key 118 * @key 127 static_key_fast_inc_not_disabled(struct static_key * key) static_key_fast_inc_not_disabled() argument 151 static_key_slow_inc_cpuslocked(struct static_key * key) static_key_slow_inc_cpuslocked() argument 186 static_key_slow_inc(struct static_key * key) static_key_slow_inc() argument 197 static_key_enable_cpuslocked(struct static_key * key) static_key_enable_cpuslocked() argument 220 static_key_enable(struct static_key * key) static_key_enable() argument 228 static_key_disable_cpuslocked(struct static_key * key) static_key_disable_cpuslocked() argument 245 static_key_disable(struct static_key * key) static_key_disable() argument 253 static_key_dec_not_one(struct static_key * key) static_key_dec_not_one() argument 292 __static_key_slow_dec_cpuslocked(struct static_key * key) __static_key_slow_dec_cpuslocked() argument 318 __static_key_slow_dec(struct static_key * key) __static_key_slow_dec() argument 327 struct static_key_deferred *key = jump_label_update_timeout() local 333 static_key_slow_dec(struct static_key * key) static_key_slow_dec() argument 340 static_key_slow_dec_cpuslocked(struct static_key * key) static_key_slow_dec_cpuslocked() argument 346 __static_key_slow_dec_deferred(struct static_key * key,struct delayed_work * work,unsigned long timeout) __static_key_slow_dec_deferred() argument 359 __static_key_deferred_flush(void * key,struct delayed_work * work) __static_key_deferred_flush() argument 366 jump_label_rate_limit(struct static_key_deferred * key,unsigned long rl) jump_label_rate_limit() argument 409 static_key_entries(struct static_key * key) static_key_entries() argument 415 static_key_type(struct static_key * key) static_key_type() argument 420 static_key_linked(struct static_key * key) static_key_linked() argument 425 static_key_clear_linked(struct static_key * key) static_key_clear_linked() argument 430 static_key_set_linked(struct static_key * key) static_key_set_linked() argument 444 static_key_set_entries(struct static_key * key,struct jump_entry * entries) static_key_set_entries() argument 457 struct static_key *key = jump_entry_key(entry); jump_label_type() local 492 __jump_label_update(struct static_key * key,struct jump_entry * entry,struct jump_entry * stop,bool init) __jump_label_update() argument 503 __jump_label_update(struct static_key * key,struct jump_entry * entry,struct jump_entry * stop,bool init) __jump_label_update() argument 529 struct static_key *key = NULL; jump_label_init() local 571 static_key_sealed(struct static_key * key) static_key_sealed() argument 576 static_key_seal(struct static_key * key) static_key_seal() argument 614 struct static_key *key = jump_entry_key(entry); jump_label_init_type() local 628 static_key_mod(struct static_key * key) static_key_mod() argument 640 static_key_set_mod(struct static_key * key,struct static_key_mod * mod) static_key_set_mod() argument 675 __jump_label_mod_update(struct static_key * key) __jump_label_mod_update() argument 705 struct static_key *key = NULL; jump_label_add_module() local 777 struct static_key *key = NULL; jump_label_del_module() local 896 jump_label_update(struct static_key * key) jump_label_update() argument [all...] |
/linux/net/openvswitch/ |
H A D | flow.c | 385 static int parse_ipv6hdr(struct sk_buff *skb, struct sw_flow_key *key) in parse_ipv6hdr() argument 400 get_ipv6_ext_hdrs(skb, nh, &key->ipv6.exthdrs); in parse_ipv6hdr() 402 key->ip.proto = NEXTHDR_NONE; in parse_ipv6hdr() 403 key->ip.tos = ipv6_get_dsfield(nh); in parse_ipv6hdr() 404 key->ip.ttl = nh->hop_limit; in parse_ipv6hdr() 405 key->ipv6.label = *(__be32 *)nh & htonl(IPV6_FLOWINFO_FLOWLABEL); in parse_ipv6hdr() 406 key->ipv6.addr.src = nh->saddr; in parse_ipv6hdr() 407 key->ipv6.addr.dst = nh->daddr; in parse_ipv6hdr() 412 key->ip.frag = OVS_FRAG_TYPE_LATER; in parse_ipv6hdr() 413 key in parse_ipv6hdr() 486 clear_vlan(struct sw_flow_key * key) clear_vlan() argument 494 parse_vlan(struct sk_buff * skb,struct sw_flow_key * key) parse_vlan() argument 554 parse_icmpv6(struct sk_buff * skb,struct sw_flow_key * key,int nh_len) parse_icmpv6() argument 629 parse_nsh(struct sk_buff * skb,struct sw_flow_key * key) parse_nsh() argument 683 key_extract_l3l4(struct sk_buff * skb,struct sw_flow_key * key) key_extract_l3l4() argument 915 key_extract(struct sk_buff * skb,struct sw_flow_key * key) key_extract() argument 971 ovs_flow_key_update_l3l4(struct sk_buff * skb,struct sw_flow_key * key) ovs_flow_key_update_l3l4() argument 976 ovs_flow_key_update(struct sk_buff * skb,struct sw_flow_key * key) ovs_flow_key_update() argument 1002 ovs_flow_key_extract(const struct ip_tunnel_info * tun_info,struct sk_buff * skb,struct sw_flow_key * key) ovs_flow_key_extract() argument 1078 ovs_flow_key_extract_userspace(struct net * net,const struct nlattr * attr,struct sk_buff * skb,struct sw_flow_key * key,bool log) ovs_flow_key_extract_userspace() argument [all...] |
/linux/Documentation/crypto/ |
H A D | asymmetric-keys.rst | 4 Asymmetric / Public-key Cryptography Key Type 10 - Key identification. 13 - Asymmetric key subtypes. 21 The "asymmetric" key type is designed to be a container for the keys used in 22 public-key cryptography, without imposing any particular restrictions on the 23 form or mechanism of the cryptography or form of the key. 25 The asymmetric key is given a subtype that defines what sort of data is 26 associated with the key and provides operations to describe and destroy it. 27 However, no requirement is made that the key data actually be stored in the 28 key. [all …]
|
/linux/drivers/s390/crypto/ |
H A D | zcrypt_cca_key.h | 21 * mapping for the cca private ME key token. 25 * mapping for the cca key token header 40 * In a private key, the modulus doesn't appear in the public 51 unsigned short modulus_byte_len; /* In a private key, this is 0 */ 55 * mapping for the cca private CRT key 'token' 92 * Set up private key fields of a type6 MEX message. 95 * @p: pointer to memory area for the key 97 * Returns the size of the key area or negative errno value. 112 } __packed *key = p; in zcrypt_type6_mex_key_en() local 124 memset(key, 0, sizeof(*key)); in zcrypt_type6_mex_key_en() [all …]
|
/linux/drivers/nvdimm/ |
H A D | security.c | 11 #include <linux/key.h> 12 #include <linux/key-type.h> 23 MODULE_PARM_DESC(key_revalidate, "Require key validation at init."); 27 static void *key_data(struct key *key) in key_data() argument 29 struct encrypted_key_payload *epayload = dereference_key_locked(key); in key_data() 31 lockdep_assert_held_read(&key->sem); in key_data() 36 static void nvdimm_put_key(struct key *key) in nvdimm_put_key() argument 38 if (!key) in nvdimm_put_key() 41 up_read(&key->sem); in nvdimm_put_key() 42 key_put(key); in nvdimm_put_key() [all …]
|
/linux/fs/nilfs2/ |
H A D | direct.c | 24 nilfs_direct_get_ptr(const struct nilfs_bmap *direct, __u64 key) in nilfs_direct_get_ptr() argument 26 return le64_to_cpu(*(nilfs_direct_dptrs(direct) + key)); in nilfs_direct_get_ptr() 30 __u64 key, __u64 ptr) in nilfs_direct_set_ptr() argument 32 *(nilfs_direct_dptrs(direct) + key) = cpu_to_le64(ptr); in nilfs_direct_set_ptr() 36 __u64 key, int level, __u64 *ptrp) in nilfs_direct_lookup() argument 40 if (key > NILFS_DIRECT_KEY_MAX || level != 1) in nilfs_direct_lookup() 42 ptr = nilfs_direct_get_ptr(direct, key); in nilfs_direct_lookup() 51 __u64 key, __u64 *ptrp, in nilfs_direct_lookup_contig() argument 59 if (key > NILFS_DIRECT_KEY_MAX) in nilfs_direct_lookup_contig() 61 ptr = nilfs_direct_get_ptr(direct, key); in nilfs_direct_lookup_contig() [all …]
|
/linux/drivers/input/keyboard/ |
H A D | pinephone-keyboard.c | 46 KEY(0, 0, KEY_ESC), 47 KEY(0, 1, KEY_1), 48 KEY(0, 2, KEY_2), 49 KEY(0, 3, KEY_3), 50 KEY(0, 4, KEY_4), 51 KEY(0, 5, KEY_5), 52 KEY(0, 6, KEY_6), 53 KEY(0, 7, KEY_7), 54 KEY(0, 8, KEY_8), 55 KEY(0, 9, KEY_9), [all …]
|
/linux/net/ceph/ |
H A D | crypto.c | 11 #include <linux/key-type.h> 20 * Set ->key and ->tfm. The rest of the key should be filled in before 23 static int set_secret(struct ceph_crypto_key *key, void *buf) in set_secret() argument 28 key->key = NULL; in set_secret() 29 key->tfm = NULL; in set_secret() 31 switch (key->type) { in set_secret() 40 if (!key->len) in set_secret() 43 key->key = kmemdup(buf, key->len, GFP_NOIO); in set_secret() 44 if (!key->key) { in set_secret() 51 key->tfm = crypto_alloc_sync_skcipher("cbc(aes)", 0, 0); in set_secret() [all …]
|
/linux/drivers/net/wireless/intel/iwlwifi/mld/ |
H A D | key.c | 5 #include "key.h" 13 struct ieee80211_key_conf *key) in iwl_mld_get_key_flags() argument 16 bool pairwise = key->flags & IEEE80211_KEY_FLAG_PAIRWISE; in iwl_mld_get_key_flags() 17 bool igtk = key->keyidx == 4 || key->keyidx == 5; in iwl_mld_get_key_flags() 23 switch (key->cipher) { in iwl_mld_get_key_flags() 45 * the firmware this key will en/decrypt MGMT frames. in iwl_mld_get_key_flags() 46 * Same goes if we are installing a pairwise key for an MFP station. in iwl_mld_get_key_flags() 47 * In case we're installing a groupwise key (which is not an iGTK), in iwl_mld_get_key_flags() 48 * then, we will not use this key for MGMT frames. in iwl_mld_get_key_flags() 53 if (key->flags & IEEE80211_KEY_FLAG_SPP_AMSDU) in iwl_mld_get_key_flags() [all …]
|