/drivers/staging/media/lirc/ |
H A D | lirc_zilog.c | 424 dprintk("key (0x%02x/0x%02x)\n", rx->b[0], rx->b[1]); 427 /* key pressed ? */ 548 /* decompress key data into the given buffer */ 550 unsigned int codeset, unsigned int key) 590 /* Read the id of the first key */ 594 /* Unpack the first key's data */ 604 /* Early out key found/not found */ 605 if (key == id) 615 /* Binary search for the key */ 623 if (*key_data == key) { 549 get_key_data(unsigned char *buf, unsigned int codeset, unsigned int key) argument 983 send_code(struct IR_tx *tx, unsigned int code, unsigned int key) argument [all...] |
/drivers/staging/rtl8192e/rtl8192e/ |
H A D | rtl_crypto.h | 75 int (*cia_setkey)(void *ctx, const u8 *key, 86 int (*dia_setkey)(void *ctx, const u8 *key, 142 const u8 *key, unsigned int keylen); 170 const u8 *key, unsigned int keylen); 299 const u8 *key, unsigned int keylen) 304 return tfm->crt_digest.dit_setkey(tfm, key, keylen); 308 const u8 *key, unsigned int keylen) 311 return tfm->crt_cipher.cit_setkey(tfm, key, keylen); 298 crypto_digest_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) argument 307 crypto_cipher_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) argument
|
H A D | rtl_wx.c | 742 union iwreq_data *wrqu, char *key) 746 return rtllib_wx_get_encode(priv->rtllib, info, wrqu, key); 751 union iwreq_data *wrqu, char *key) 781 RT_TRACE(COMP_SEC, "Setting SW wep key"); 782 ret = rtllib_wx_set_encode(priv->rtllib, info, wrqu, key); 796 hwkey[i] |= key[4*i+0]&mask; 801 hwkey[i] |= (key[4 * i + 1] & mask) << 8; 802 hwkey[i] |= (key[4 * i + 2] & mask) << 16; 803 hwkey[i] |= (key[4 * i + 3] & mask) << 24; 1000 u32 key[ local 740 r8192_wx_get_enc(struct net_device *dev, struct iw_request_info *info, union iwreq_data *wrqu, char *key) argument 749 r8192_wx_set_enc(struct net_device *dev, struct iw_request_info *info, union iwreq_data *wrqu, char *key) argument [all...] |
/drivers/staging/rtl8723au/hal/ |
H A D | hal_com.c | 686 u8 entry, u16 ctrl, const u8 *mac, const u8 *key) 705 val = key[i] | (key[i+1] << 8) | 706 (key[i+2] << 16) | (key[i+3] << 24); 685 rtl8723a_cam_write(struct rtw_adapter *padapter, u8 entry, u16 ctrl, const u8 *mac, const u8 *key) argument
|
/drivers/staging/rtl8723au/include/ |
H A D | rtw_security.h | 87 u8 key[WLAN_KEY_LEN_WEP104 + 1]; /* 14 */ member in struct:rtw_wep_key 108 * wep, 0~3 for key id. (tx key index) 113 * used for Grp key 115 u32 dot118021XGrpKeyid; /* key id used for Grp Key 116 * (tx key index) 309 void rtw_secmicsetkey23a(struct mic_data *pmicdata, u8 *key); 314 void rtw_seccalctkipmic23a(u8 *key, u8 *header, u8 *data, u32 data_len,
|
/drivers/target/iscsi/ |
H A D | iscsi_target_parameters.c | 688 char *key, 693 if (!key || !param_list) { 699 if (!strcmp(key, param->name)) 703 pr_err("Unable to locate key \"%s\".\n", key); 707 int iscsi_extract_key_value(char *textbuf, char **key, char **value) argument 711 pr_err("Unable to locate \"=\" separator for key," 716 *key = textbuf; 739 char *key, 746 pr_err("Value for notunderstood key \" 687 iscsi_find_param_from_key( char *key, struct iscsi_param_list *param_list) argument 738 iscsi_add_notunderstood_response( char *key, char *value, struct iscsi_param_list *param_list) argument 768 iscsi_check_for_auth_key(char *key) argument 1384 __iscsi_check_key( char *key, int sender, struct iscsi_param_list *param_list) argument 1418 iscsi_check_key( char *key, int phase, int sender, struct iscsi_param_list *param_list) argument 1618 char *key, *value; local 1754 char *key = NULL, *value = NULL; local [all...] |
/drivers/tty/ |
H A D | sysrq.c | 8 * overhauled to use key registration 87 static void sysrq_handle_loglevel(int key) argument 91 i = key - '0'; 104 static void sysrq_handle_SAK(int key) argument 120 static void sysrq_handle_unraw(int key) argument 135 static void sysrq_handle_crash(int key) argument 150 static void sysrq_handle_reboot(int key) argument 163 static void sysrq_handle_sync(int key) argument 174 static void sysrq_handle_show_timers(int key) argument 185 static void sysrq_handle_mountro(int key) argument 197 sysrq_handle_showlocks(int key) argument 235 sysrq_handle_showallcpus(int key) argument 261 sysrq_handle_showregs(int key) argument 275 sysrq_handle_showstate(int key) argument 286 sysrq_handle_showstate_blocked(int key) argument 300 sysrq_ftrace_dump(int key) argument 314 sysrq_handle_showmem(int key) argument 344 sysrq_handle_term(int key) argument 364 sysrq_handle_moom(int key) argument 376 sysrq_handle_thaw(int key) argument 388 sysrq_handle_kill(int key) argument 400 sysrq_handle_unrt(int key) argument 473 sysrq_key_table_key2index(int key) argument 489 __sysrq_get_key_op(int key) argument 501 __sysrq_put_key_op(int key, struct sysrq_key_op *op_p) argument 509 __handle_sysrq(int key, bool check_mask) argument 562 handle_sysrq(int key) argument 609 unsigned short key; local 690 u32 key; local 950 unsigned short key; local 1044 __sysrq_swap_key_ops(int key, struct sysrq_key_op *insert_op_p, struct sysrq_key_op *remove_op_p) argument 1068 register_sysrq_key(int key, struct sysrq_key_op *op_p) argument 1074 unregister_sysrq_key(int key, struct sysrq_key_op *op_p) argument [all...] |
/drivers/vhost/ |
H A D | vhost.c | 50 void *key) 54 if (!((unsigned long)key & poll->mask)) 49 vhost_poll_wakeup(wait_queue_t *wait, unsigned mode, int sync, void *key) argument
|
/drivers/block/ |
H A D | loop.c | 117 char *in, *out, *key; local 128 key = lo->lo_encrypt_key; 131 *out++ = *in++ ^ key[(i & 511) % keysize];
|
H A D | skd_s1120.h | 265 uint8_t key:4; /* 02: Bits0-3 indicate the sense key. */ member in struct:fit_comp_error_info
|
/drivers/char/ |
H A D | sonypi.c | 314 /* The set of possible program key events */ 475 int key; member in struct:sonypi_keypress 783 input_report_key(kp.dev, kp.key, 0); 809 kp.key = BTN_MIDDLE; 821 kp.key = sonypi_inputkeys[i].inputev; 828 input_report_key(kp.dev, kp.key, 1); 1098 /* Enable ACPI mode to get Fn key events */
|
/drivers/crypto/ |
H A D | atmel-aes.c | 86 u32 key[AES_KEYSIZE_256 / sizeof(u32)]; member in struct:atmel_aes_ctx 538 atmel_aes_write_n(dd, AES_KEYWR(0), dd->ctx->key, 811 static int atmel_aes_setkey(struct crypto_ablkcipher *tfm, const u8 *key, argument 822 memcpy(ctx->key, key, keylen);
|
H A D | ixp4xx_crypto.c | 590 int init_len, u32 ctx_addr, const u8 *key, int key_len) 615 memcpy(pad, key, key_len); 646 const u8 *key, int key_len, unsigned digest_len) 685 init_len, npe_ctx_addr, key, key_len); 689 init_len, npe_ctx_addr, key, key_len); 721 const u8 *key, int key_len) 750 const u32 *K = (const u32 *)key; 759 if (des_ekey(tmp, key) == 0) { 767 /* write cipher key to cryptinfo */ 768 memcpy(cinfo, key, key_le 589 register_chain_var(struct crypto_tfm *tfm, u8 xpad, u32 target, int init_len, u32 ctx_addr, const u8 *key, int key_len) argument 645 setup_auth(struct crypto_tfm *tfm, int encrypt, unsigned authsize, const u8 *key, int key_len, unsigned digest_len) argument 720 setup_cipher(struct crypto_tfm *tfm, int encrypt, const u8 *key, int key_len) argument 814 ablk_setkey(struct crypto_ablkcipher *tfm, const u8 *key, unsigned int key_len) argument 850 ablk_rfc3686_setkey(struct crypto_ablkcipher *tfm, const u8 *key, unsigned int key_len) argument 1148 aead_setkey(struct crypto_aead *tfm, const u8 *key, unsigned int keylen) argument [all...] |
H A D | mv_cesa.c | 194 static int mv_setkey_aes(struct crypto_ablkcipher *cipher, const u8 *key, argument 212 memcpy(ctx->aes_enc_key, key, AES_KEY_LEN); 773 static int mv_hash_setkey(struct crypto_ahash *tfm, const u8 * key, argument 783 rc = crypto_shash_setkey(ctx->fallback, key, keylen); 808 crypto_shash_digest(shash, key, keylen, ipad); 814 memcpy(ipad, key, keylen);
|
H A D | omap-aes.c | 103 u32 key[AES_KEYSIZE_256 / sizeof(u32)]; member in struct:omap_aes_ctx 265 /* it seems a key should always be set even if it has not changed */ 268 __le32_to_cpu(dd->ctx->key[i])); 737 static int omap_aes_setkey(struct crypto_ablkcipher *tfm, const u8 *key, argument 748 memcpy(ctx->key, key, keylen);
|
H A D | omap-des.c | 84 u32 key[(3 * DES_KEY_SIZE) / sizeof(u32)]; member in struct:omap_des_ctx 260 /* it seems a key should always be set even if it has not changed */ 263 __le32_to_cpu(dd->ctx->key[i])); 730 static int omap_des_setkey(struct crypto_ablkcipher *tfm, const u8 *key, argument 740 memcpy(ctx->key, key, keylen);
|
H A D | picoxcell_crypto.c | 159 u8 key[AES_MAX_KEY_SIZE]; member in struct:spacc_ablk_ctx 198 * Returns the address of the context page where the key/context may 221 void __iomem *page_addr, const u8 *key, 227 memcpy_toio32(key_ptr, key, key_len / 4); 442 * Set key for a DES operation in an AEAD cipher. This also performs weak key 445 static int spacc_aead_des_setkey(struct crypto_aead *aead, const u8 *key, argument 452 if (unlikely(!des_ekey(tmp, key)) && 458 memcpy(ctx->cipher_key, key, len); 464 /* Set the key fo 220 spacc_cipher_write_ctx(struct spacc_generic_ctx *ctx, void __iomem *page_addr, const u8 *key, size_t key_len, const u8 *iv, size_t iv_len) argument 465 spacc_aead_aes_setkey(struct crypto_aead *aead, const u8 *key, unsigned int len) argument 493 spacc_aead_setkey(struct crypto_aead *tfm, const u8 *key, unsigned int keylen) argument 815 spacc_des_setkey(struct crypto_ablkcipher *cipher, const u8 *key, unsigned int len) argument 843 spacc_aes_setkey(struct crypto_ablkcipher *cipher, const u8 *key, unsigned int len) argument 890 spacc_kasumi_f8_setkey(struct crypto_ablkcipher *cipher, const u8 *key, unsigned int len) argument [all...] |
H A D | s5p-sss.c | 380 uint8_t *key, uint8_t *iv, unsigned int keylen) 394 memcpy(keystart, key, keylen); 531 const uint8_t *key, unsigned int keylen) 541 memcpy(ctx->aes_key, key, keylen); 379 s5p_set_aes(struct s5p_aes_dev *dev, uint8_t *key, uint8_t *iv, unsigned int keylen) argument 530 s5p_aes_setkey(struct crypto_ablkcipher *cipher, const uint8_t *key, unsigned int keylen) argument
|
H A D | sahara.c | 123 u8 key[AES_KEYSIZE_128]; member in struct:sahara_ctx 271 "Illegal key size", 277 "DES key parity error", 439 /* Copy new key if necessary */ 441 memcpy(dev->key_base, ctx->key, ctx->keylen); 588 static int sahara_aes_setkey(struct crypto_ablkcipher *tfm, const u8 *key, argument 598 memcpy(ctx->key, key, keylen); 608 * The requested key size is not supported by HW, do a fallback. 614 ret = crypto_ablkcipher_setkey(ctx->fallback, key, keyle [all...] |
H A D | talitos.c | 646 u8 key[TALITOS_MAX_KEY_SIZE]; member in struct:talitos_ctx 682 const u8 *key, unsigned int keylen) 687 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) 693 memcpy(ctx->key, keys.authkey, keys.authkeylen); 694 memcpy(&ctx->key[keys.authkeylen], keys.enckey, keys.enckeylen); 956 /* hmac key */ 957 map_single_talitos_ptr(dev, &desc->ptr[0], ctx->authkeylen, &ctx->key, 1000 /* cipher key */ 1002 (char *)&ctx->key + ctx->authkeylen, 0, 1322 const u8 *key, unsigne 681 aead_setkey(struct crypto_aead *authenc, const u8 *key, unsigned int keylen) argument 1321 ablkcipher_setkey(struct crypto_ablkcipher *cipher, const u8 *key, unsigned int keylen) argument 1835 keyhash(struct crypto_ahash *tfm, const u8 *key, unsigned int keylen, u8 *hash) argument 1878 ahash_setkey(struct crypto_ahash *tfm, const u8 *key, unsigned int keylen) argument [all...] |
/drivers/crypto/qat/qat_common/ |
H A D | icp_qat_hw.h | 299 uint8_t key[ICP_QAT_HW_AES_256_F8_KEY_SZ]; member in struct:icp_qat_hw_cipher_aes256_f8
|
/drivers/firewire/ |
H A D | sbp2.c | 1027 int key, value; local 1030 while (fw_csr_iterator_next(&ci, &key, &value)) 1031 if (key == SBP2_CSR_LOGICAL_UNIT_NUMBER && 1041 int key, value; local 1044 while (fw_csr_iterator_next(&ci, &key, &value)) { 1045 switch (key) {
|
/drivers/gpu/drm/i915/ |
H A D | intel_overlay.c | 92 /* DCLRKM (dst-key) register */ 611 u32 key = overlay->color_key; local 621 iowrite32(RGB15_TO_COLORKEY(key), ®s->DCLRKV); 625 iowrite32(RGB16_TO_COLORKEY(key), ®s->DCLRKV); 633 iowrite32(key, ®s->DCLRKV);
|
/drivers/hwmon/ |
H A D | applesmc.c | 122 char key[5]; /* four-letter key code */ member in struct:applesmc_entry 142 struct applesmc_entry *cache; /* cached key entries */ 143 const char **index; /* temperature key index */ 221 static int send_argument(const char *key) argument 226 if (send_byte(key[i], APPLESMC_DATA_PORT)) 231 static int read_smc(u8 cmd, const char *key, u8 *buffer, u8 len) argument 236 if (send_command(cmd) || send_argument(key)) { 237 pr_warn("%.4s: read arg fail\n", key); 243 pr_warn("%.4s: read len fail\n", key); 269 write_smc(u8 cmd, const char *key, const u8 *buffer, u8 len) argument 343 u8 key[4], info[6]; local 375 applesmc_get_lower_bound(unsigned int *lo, const char *key) argument 397 applesmc_get_upper_bound(unsigned int *hi, const char *key) argument 419 applesmc_get_entry_by_key(const char *key) argument 436 applesmc_read_key(const char *key, u8 *buffer, u8 len) argument 447 applesmc_write_key(const char *key, const u8 *buffer, u8 len) argument 458 applesmc_has_key(const char *key, bool *value) argument 473 applesmc_read_s16(const char *key, s16 *value) argument 784 const char *key = smcreg.index[to_index(devattr)]; local 793 const char *key = smcreg.index[to_index(devattr)]; local [all...] |
/drivers/infiniband/core/ |
H A D | uverbs_cmd.c | 46 struct lock_class_key key; member in struct:uverbs_lock_class 92 lockdep_set_class_and_name(&uobj->mutex, &c->key, c->name);
|