Searched defs:key (Results 251 - 275 of 422) sorted by relevance

<<11121314151617

/drivers/staging/media/lirc/
H A Dlirc_zilog.c424 dprintk("key (0x%02x/0x%02x)\n", rx->b[0], rx->b[1]);
427 /* key pressed ? */
548 /* decompress key data into the given buffer */
550 unsigned int codeset, unsigned int key)
590 /* Read the id of the first key */
594 /* Unpack the first key's data */
604 /* Early out key found/not found */
605 if (key == id)
615 /* Binary search for the key */
623 if (*key_data == key) {
549 get_key_data(unsigned char *buf, unsigned int codeset, unsigned int key) argument
983 send_code(struct IR_tx *tx, unsigned int code, unsigned int key) argument
[all...]
/drivers/staging/rtl8192e/rtl8192e/
H A Drtl_crypto.h75 int (*cia_setkey)(void *ctx, const u8 *key,
86 int (*dia_setkey)(void *ctx, const u8 *key,
142 const u8 *key, unsigned int keylen);
170 const u8 *key, unsigned int keylen);
299 const u8 *key, unsigned int keylen)
304 return tfm->crt_digest.dit_setkey(tfm, key, keylen);
308 const u8 *key, unsigned int keylen)
311 return tfm->crt_cipher.cit_setkey(tfm, key, keylen);
298 crypto_digest_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) argument
307 crypto_cipher_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) argument
H A Drtl_wx.c742 union iwreq_data *wrqu, char *key)
746 return rtllib_wx_get_encode(priv->rtllib, info, wrqu, key);
751 union iwreq_data *wrqu, char *key)
781 RT_TRACE(COMP_SEC, "Setting SW wep key");
782 ret = rtllib_wx_set_encode(priv->rtllib, info, wrqu, key);
796 hwkey[i] |= key[4*i+0]&mask;
801 hwkey[i] |= (key[4 * i + 1] & mask) << 8;
802 hwkey[i] |= (key[4 * i + 2] & mask) << 16;
803 hwkey[i] |= (key[4 * i + 3] & mask) << 24;
1000 u32 key[ local
740 r8192_wx_get_enc(struct net_device *dev, struct iw_request_info *info, union iwreq_data *wrqu, char *key) argument
749 r8192_wx_set_enc(struct net_device *dev, struct iw_request_info *info, union iwreq_data *wrqu, char *key) argument
[all...]
/drivers/staging/rtl8723au/hal/
H A Dhal_com.c686 u8 entry, u16 ctrl, const u8 *mac, const u8 *key)
705 val = key[i] | (key[i+1] << 8) |
706 (key[i+2] << 16) | (key[i+3] << 24);
685 rtl8723a_cam_write(struct rtw_adapter *padapter, u8 entry, u16 ctrl, const u8 *mac, const u8 *key) argument
/drivers/staging/rtl8723au/include/
H A Drtw_security.h87 u8 key[WLAN_KEY_LEN_WEP104 + 1]; /* 14 */ member in struct:rtw_wep_key
108 * wep, 0~3 for key id. (tx key index)
113 * used for Grp key
115 u32 dot118021XGrpKeyid; /* key id used for Grp Key
116 * (tx key index)
309 void rtw_secmicsetkey23a(struct mic_data *pmicdata, u8 *key);
314 void rtw_seccalctkipmic23a(u8 *key, u8 *header, u8 *data, u32 data_len,
/drivers/target/iscsi/
H A Discsi_target_parameters.c688 char *key,
693 if (!key || !param_list) {
699 if (!strcmp(key, param->name))
703 pr_err("Unable to locate key \"%s\".\n", key);
707 int iscsi_extract_key_value(char *textbuf, char **key, char **value) argument
711 pr_err("Unable to locate \"=\" separator for key,"
716 *key = textbuf;
739 char *key,
746 pr_err("Value for notunderstood key \"
687 iscsi_find_param_from_key( char *key, struct iscsi_param_list *param_list) argument
738 iscsi_add_notunderstood_response( char *key, char *value, struct iscsi_param_list *param_list) argument
768 iscsi_check_for_auth_key(char *key) argument
1384 __iscsi_check_key( char *key, int sender, struct iscsi_param_list *param_list) argument
1418 iscsi_check_key( char *key, int phase, int sender, struct iscsi_param_list *param_list) argument
1618 char *key, *value; local
1754 char *key = NULL, *value = NULL; local
[all...]
/drivers/tty/
H A Dsysrq.c8 * overhauled to use key registration
87 static void sysrq_handle_loglevel(int key) argument
91 i = key - '0';
104 static void sysrq_handle_SAK(int key) argument
120 static void sysrq_handle_unraw(int key) argument
135 static void sysrq_handle_crash(int key) argument
150 static void sysrq_handle_reboot(int key) argument
163 static void sysrq_handle_sync(int key) argument
174 static void sysrq_handle_show_timers(int key) argument
185 static void sysrq_handle_mountro(int key) argument
197 sysrq_handle_showlocks(int key) argument
235 sysrq_handle_showallcpus(int key) argument
261 sysrq_handle_showregs(int key) argument
275 sysrq_handle_showstate(int key) argument
286 sysrq_handle_showstate_blocked(int key) argument
300 sysrq_ftrace_dump(int key) argument
314 sysrq_handle_showmem(int key) argument
344 sysrq_handle_term(int key) argument
364 sysrq_handle_moom(int key) argument
376 sysrq_handle_thaw(int key) argument
388 sysrq_handle_kill(int key) argument
400 sysrq_handle_unrt(int key) argument
473 sysrq_key_table_key2index(int key) argument
489 __sysrq_get_key_op(int key) argument
501 __sysrq_put_key_op(int key, struct sysrq_key_op *op_p) argument
509 __handle_sysrq(int key, bool check_mask) argument
562 handle_sysrq(int key) argument
609 unsigned short key; local
690 u32 key; local
950 unsigned short key; local
1044 __sysrq_swap_key_ops(int key, struct sysrq_key_op *insert_op_p, struct sysrq_key_op *remove_op_p) argument
1068 register_sysrq_key(int key, struct sysrq_key_op *op_p) argument
1074 unregister_sysrq_key(int key, struct sysrq_key_op *op_p) argument
[all...]
/drivers/vhost/
H A Dvhost.c50 void *key)
54 if (!((unsigned long)key & poll->mask))
49 vhost_poll_wakeup(wait_queue_t *wait, unsigned mode, int sync, void *key) argument
/drivers/block/
H A Dloop.c117 char *in, *out, *key; local
128 key = lo->lo_encrypt_key;
131 *out++ = *in++ ^ key[(i & 511) % keysize];
H A Dskd_s1120.h265 uint8_t key:4; /* 02: Bits0-3 indicate the sense key. */ member in struct:fit_comp_error_info
/drivers/char/
H A Dsonypi.c314 /* The set of possible program key events */
475 int key; member in struct:sonypi_keypress
783 input_report_key(kp.dev, kp.key, 0);
809 kp.key = BTN_MIDDLE;
821 kp.key = sonypi_inputkeys[i].inputev;
828 input_report_key(kp.dev, kp.key, 1);
1098 /* Enable ACPI mode to get Fn key events */
/drivers/crypto/
H A Datmel-aes.c86 u32 key[AES_KEYSIZE_256 / sizeof(u32)]; member in struct:atmel_aes_ctx
538 atmel_aes_write_n(dd, AES_KEYWR(0), dd->ctx->key,
811 static int atmel_aes_setkey(struct crypto_ablkcipher *tfm, const u8 *key, argument
822 memcpy(ctx->key, key, keylen);
H A Dixp4xx_crypto.c590 int init_len, u32 ctx_addr, const u8 *key, int key_len)
615 memcpy(pad, key, key_len);
646 const u8 *key, int key_len, unsigned digest_len)
685 init_len, npe_ctx_addr, key, key_len);
689 init_len, npe_ctx_addr, key, key_len);
721 const u8 *key, int key_len)
750 const u32 *K = (const u32 *)key;
759 if (des_ekey(tmp, key) == 0) {
767 /* write cipher key to cryptinfo */
768 memcpy(cinfo, key, key_le
589 register_chain_var(struct crypto_tfm *tfm, u8 xpad, u32 target, int init_len, u32 ctx_addr, const u8 *key, int key_len) argument
645 setup_auth(struct crypto_tfm *tfm, int encrypt, unsigned authsize, const u8 *key, int key_len, unsigned digest_len) argument
720 setup_cipher(struct crypto_tfm *tfm, int encrypt, const u8 *key, int key_len) argument
814 ablk_setkey(struct crypto_ablkcipher *tfm, const u8 *key, unsigned int key_len) argument
850 ablk_rfc3686_setkey(struct crypto_ablkcipher *tfm, const u8 *key, unsigned int key_len) argument
1148 aead_setkey(struct crypto_aead *tfm, const u8 *key, unsigned int keylen) argument
[all...]
H A Dmv_cesa.c194 static int mv_setkey_aes(struct crypto_ablkcipher *cipher, const u8 *key, argument
212 memcpy(ctx->aes_enc_key, key, AES_KEY_LEN);
773 static int mv_hash_setkey(struct crypto_ahash *tfm, const u8 * key, argument
783 rc = crypto_shash_setkey(ctx->fallback, key, keylen);
808 crypto_shash_digest(shash, key, keylen, ipad);
814 memcpy(ipad, key, keylen);
H A Domap-aes.c103 u32 key[AES_KEYSIZE_256 / sizeof(u32)]; member in struct:omap_aes_ctx
265 /* it seems a key should always be set even if it has not changed */
268 __le32_to_cpu(dd->ctx->key[i]));
737 static int omap_aes_setkey(struct crypto_ablkcipher *tfm, const u8 *key, argument
748 memcpy(ctx->key, key, keylen);
H A Domap-des.c84 u32 key[(3 * DES_KEY_SIZE) / sizeof(u32)]; member in struct:omap_des_ctx
260 /* it seems a key should always be set even if it has not changed */
263 __le32_to_cpu(dd->ctx->key[i]));
730 static int omap_des_setkey(struct crypto_ablkcipher *tfm, const u8 *key, argument
740 memcpy(ctx->key, key, keylen);
H A Dpicoxcell_crypto.c159 u8 key[AES_MAX_KEY_SIZE]; member in struct:spacc_ablk_ctx
198 * Returns the address of the context page where the key/context may
221 void __iomem *page_addr, const u8 *key,
227 memcpy_toio32(key_ptr, key, key_len / 4);
442 * Set key for a DES operation in an AEAD cipher. This also performs weak key
445 static int spacc_aead_des_setkey(struct crypto_aead *aead, const u8 *key, argument
452 if (unlikely(!des_ekey(tmp, key)) &&
458 memcpy(ctx->cipher_key, key, len);
464 /* Set the key fo
220 spacc_cipher_write_ctx(struct spacc_generic_ctx *ctx, void __iomem *page_addr, const u8 *key, size_t key_len, const u8 *iv, size_t iv_len) argument
465 spacc_aead_aes_setkey(struct crypto_aead *aead, const u8 *key, unsigned int len) argument
493 spacc_aead_setkey(struct crypto_aead *tfm, const u8 *key, unsigned int keylen) argument
815 spacc_des_setkey(struct crypto_ablkcipher *cipher, const u8 *key, unsigned int len) argument
843 spacc_aes_setkey(struct crypto_ablkcipher *cipher, const u8 *key, unsigned int len) argument
890 spacc_kasumi_f8_setkey(struct crypto_ablkcipher *cipher, const u8 *key, unsigned int len) argument
[all...]
H A Ds5p-sss.c380 uint8_t *key, uint8_t *iv, unsigned int keylen)
394 memcpy(keystart, key, keylen);
531 const uint8_t *key, unsigned int keylen)
541 memcpy(ctx->aes_key, key, keylen);
379 s5p_set_aes(struct s5p_aes_dev *dev, uint8_t *key, uint8_t *iv, unsigned int keylen) argument
530 s5p_aes_setkey(struct crypto_ablkcipher *cipher, const uint8_t *key, unsigned int keylen) argument
H A Dsahara.c123 u8 key[AES_KEYSIZE_128]; member in struct:sahara_ctx
271 "Illegal key size",
277 "DES key parity error",
439 /* Copy new key if necessary */
441 memcpy(dev->key_base, ctx->key, ctx->keylen);
588 static int sahara_aes_setkey(struct crypto_ablkcipher *tfm, const u8 *key, argument
598 memcpy(ctx->key, key, keylen);
608 * The requested key size is not supported by HW, do a fallback.
614 ret = crypto_ablkcipher_setkey(ctx->fallback, key, keyle
[all...]
H A Dtalitos.c646 u8 key[TALITOS_MAX_KEY_SIZE]; member in struct:talitos_ctx
682 const u8 *key, unsigned int keylen)
687 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0)
693 memcpy(ctx->key, keys.authkey, keys.authkeylen);
694 memcpy(&ctx->key[keys.authkeylen], keys.enckey, keys.enckeylen);
956 /* hmac key */
957 map_single_talitos_ptr(dev, &desc->ptr[0], ctx->authkeylen, &ctx->key,
1000 /* cipher key */
1002 (char *)&ctx->key + ctx->authkeylen, 0,
1322 const u8 *key, unsigne
681 aead_setkey(struct crypto_aead *authenc, const u8 *key, unsigned int keylen) argument
1321 ablkcipher_setkey(struct crypto_ablkcipher *cipher, const u8 *key, unsigned int keylen) argument
1835 keyhash(struct crypto_ahash *tfm, const u8 *key, unsigned int keylen, u8 *hash) argument
1878 ahash_setkey(struct crypto_ahash *tfm, const u8 *key, unsigned int keylen) argument
[all...]
/drivers/crypto/qat/qat_common/
H A Dicp_qat_hw.h299 uint8_t key[ICP_QAT_HW_AES_256_F8_KEY_SZ]; member in struct:icp_qat_hw_cipher_aes256_f8
/drivers/firewire/
H A Dsbp2.c1027 int key, value; local
1030 while (fw_csr_iterator_next(&ci, &key, &value))
1031 if (key == SBP2_CSR_LOGICAL_UNIT_NUMBER &&
1041 int key, value; local
1044 while (fw_csr_iterator_next(&ci, &key, &value)) {
1045 switch (key) {
/drivers/gpu/drm/i915/
H A Dintel_overlay.c92 /* DCLRKM (dst-key) register */
611 u32 key = overlay->color_key; local
621 iowrite32(RGB15_TO_COLORKEY(key), &regs->DCLRKV);
625 iowrite32(RGB16_TO_COLORKEY(key), &regs->DCLRKV);
633 iowrite32(key, &regs->DCLRKV);
/drivers/hwmon/
H A Dapplesmc.c122 char key[5]; /* four-letter key code */ member in struct:applesmc_entry
142 struct applesmc_entry *cache; /* cached key entries */
143 const char **index; /* temperature key index */
221 static int send_argument(const char *key) argument
226 if (send_byte(key[i], APPLESMC_DATA_PORT))
231 static int read_smc(u8 cmd, const char *key, u8 *buffer, u8 len) argument
236 if (send_command(cmd) || send_argument(key)) {
237 pr_warn("%.4s: read arg fail\n", key);
243 pr_warn("%.4s: read len fail\n", key);
269 write_smc(u8 cmd, const char *key, const u8 *buffer, u8 len) argument
343 u8 key[4], info[6]; local
375 applesmc_get_lower_bound(unsigned int *lo, const char *key) argument
397 applesmc_get_upper_bound(unsigned int *hi, const char *key) argument
419 applesmc_get_entry_by_key(const char *key) argument
436 applesmc_read_key(const char *key, u8 *buffer, u8 len) argument
447 applesmc_write_key(const char *key, const u8 *buffer, u8 len) argument
458 applesmc_has_key(const char *key, bool *value) argument
473 applesmc_read_s16(const char *key, s16 *value) argument
784 const char *key = smcreg.index[to_index(devattr)]; local
793 const char *key = smcreg.index[to_index(devattr)]; local
[all...]
/drivers/infiniband/core/
H A Duverbs_cmd.c46 struct lock_class_key key; member in struct:uverbs_lock_class
92 lockdep_set_class_and_name(&uobj->mutex, &c->key, c->name);

Completed in 3713 milliseconds

<<11121314151617