/linux-5.19.10/drivers/input/keyboard/ |
D | ep93xx_keypad.c | 74 int key1; member 87 int keycode, key1, key2; in ep93xx_keypad_irq_handler() local 92 key1 = keypad->keycodes[keycode]; in ep93xx_keypad_irq_handler() 98 if (keypad->key1 && key1 != keypad->key1 && key2 != keypad->key1) in ep93xx_keypad_irq_handler() 99 input_report_key(input_dev, keypad->key1, 0); in ep93xx_keypad_irq_handler() 101 if (keypad->key2 && key1 != keypad->key2 && key2 != keypad->key2) in ep93xx_keypad_irq_handler() 104 input_report_key(input_dev, key1, 1); in ep93xx_keypad_irq_handler() 107 keypad->key1 = key1; in ep93xx_keypad_irq_handler() 111 if (keypad->key1 && key1 != keypad->key1) in ep93xx_keypad_irq_handler() 112 input_report_key(input_dev, keypad->key1, 0); in ep93xx_keypad_irq_handler() [all …]
|
/linux-5.19.10/fs/befs/ |
D | btree.c | 119 static int befs_compare_strings(const void *key1, int keylen1, 712 befs_compare_strings(const void *key1, int keylen1, in befs_compare_strings() argument 716 int result = strncmp(key1, key2, len); in befs_compare_strings() 725 btree_compare_int32(cont void *key1, int keylen1, const void *key2, int keylen2) 727 return *(int32_t *) key1 - *(int32_t *) key2; 731 btree_compare_uint32(cont void *key1, int keylen1, 734 if (*(u_int32_t *) key1 == *(u_int32_t *) key2) 736 else if (*(u_int32_t *) key1 > *(u_int32_t *) key2) 742 btree_compare_int64(cont void *key1, int keylen1, const void *key2, int keylen2) 744 if (*(int64_t *) key1 == *(int64_t *) key2) [all …]
|
/linux-5.19.10/arch/arm/crypto/ |
D | aes-ce-core.S | 26 .macro enc_dround, key1, key2 27 enc_round q0, \key1 31 .macro dec_dround, key1, key2 32 dec_round q0, \key1 36 .macro enc_fround, key1, key2, key3 37 enc_round q0, \key1 42 .macro dec_fround, key1, key2, key3 43 dec_round q0, \key1 48 .macro enc_dround_4x, key1, key2 49 enc_round q0, \key1 [all …]
|
D | aes-ce-glue.c | 146 struct crypto_aes_ctx key1; member 160 ret = ce_aes_expandkey(&ctx->key1, in_key, key_len / 2); in xts_set_key() 448 int err, first, rounds = num_rounds(&ctx->key1); in xts_encrypt() 487 ctx->key1.key_enc, rounds, nbytes, walk.iv, in xts_encrypt() 509 ctx->key1.key_enc, rounds, walk.nbytes, walk.iv, in xts_encrypt() 520 int err, first, rounds = num_rounds(&ctx->key1); in xts_decrypt() 559 ctx->key1.key_dec, rounds, nbytes, walk.iv, in xts_decrypt() 581 ctx->key1.key_dec, rounds, walk.nbytes, walk.iv, in xts_decrypt()
|
/linux-5.19.10/fs/ubifs/ |
D | key.h | 479 const union ubifs_key *key1, in keys_cmp() argument 482 if (key1->u32[0] < key2->u32[0]) in keys_cmp() 484 if (key1->u32[0] > key2->u32[0]) in keys_cmp() 486 if (key1->u32[1] < key2->u32[1]) in keys_cmp() 488 if (key1->u32[1] > key2->u32[1]) in keys_cmp() 504 const union ubifs_key *key1, in keys_eq() argument 507 if (key1->u32[0] != key2->u32[0]) in keys_eq() 509 if (key1->u32[1] != key2->u32[1]) in keys_eq()
|
D | tnc_misc.c | 369 const union ubifs_key *key1, *key2; in read_znode() local 371 key1 = &znode->zbranch[i].key; in read_znode() 374 cmp = keys_cmp(c, key1, key2); in read_znode() 379 } else if (cmp == 0 && !is_hash_key(c, key1)) { in read_znode() 463 union ubifs_key key1, *key = &zbr->key; in ubifs_tnc_read_node() local 485 key_read(c, node + UBIFS_KEY_OFFSET, &key1); in ubifs_tnc_read_node() 486 if (!keys_eq(c, key, &key1)) { in ubifs_tnc_read_node() 490 dbg_tnck(&key1, "but found node's key "); in ubifs_tnc_read_node()
|
D | tnc.c | 1692 union ubifs_key key1; in validate_data_node() local 1721 key_read(c, buf + UBIFS_KEY_OFFSET, &key1); in validate_data_node() 1722 if (!keys_eq(c, &zbr->key, &key1)) { in validate_data_node() 1726 dbg_tnck(&key1, "found node's key "); in validate_data_node() 1998 union ubifs_key *key, *key1; in correct_parent_keys() local 2004 key1 = &znode->parent->zbranch[0].key; in correct_parent_keys() 2006 while (keys_cmp(c, key, key1) < 0) { in correct_parent_keys() 2007 key_copy(c, key, key1); in correct_parent_keys() 2012 key1 = &znode->parent->zbranch[0].key; in correct_parent_keys() 2085 union ubifs_key *key = &zbr->key, *key1; in tnc_insert() local [all …]
|
/linux-5.19.10/net/mptcp/ |
D | crypto_test.c | 37 u64 key1, key2; in mptcp_crypto_test_basic() local 43 key1 = be64_to_cpu(*((__be64 *)&tests[i].key[0])); in mptcp_crypto_test_basic() 51 mptcp_crypto_hmac_sha(key1, key2, msg, 8, hmac); in mptcp_crypto_test_basic()
|
D | crypto.c | 44 void mptcp_crypto_hmac_sha(u64 key1, u64 key2, u8 *msg, int len, void *hmac) in mptcp_crypto_hmac_sha() argument 54 put_unaligned_be64(key1, key1be); in mptcp_crypto_hmac_sha()
|
/linux-5.19.10/kernel/futex/ |
D | requeue.c | 268 struct futex_hash_bucket *hb2, union futex_key *key1, in futex_proxy_trylock_atomic() argument 290 top_waiter = futex_top_waiter(hb1, key1); in futex_proxy_trylock_atomic() 367 union futex_key key1 = FUTEX_KEY_INIT, key2 = FUTEX_KEY_INIT; in futex_requeue() local 427 ret = get_futex_key(uaddr1, flags & FLAGS_SHARED, &key1, FUTEX_READ); in futex_requeue() 439 if (requeue_pi && futex_match(&key1, &key2)) in futex_requeue() 442 hb1 = futex_hash(&key1); in futex_requeue() 484 ret = futex_proxy_trylock_atomic(uaddr2, hb1, hb2, &key1, in futex_requeue() 574 if (!futex_match(&this->key, &key1)) in futex_requeue()
|
D | futex.h | 135 static inline int futex_match(union futex_key *key1, union futex_key *key2) in futex_match() argument 137 return (key1 && key2 in futex_match() 138 && key1->both.word == key2->both.word in futex_match() 139 && key1->both.ptr == key2->both.ptr in futex_match() 140 && key1->both.offset == key2->both.offset); in futex_match()
|
D | waitwake.c | 241 union futex_key key1 = FUTEX_KEY_INIT, key2 = FUTEX_KEY_INIT; in futex_wake_op() local 248 ret = get_futex_key(uaddr1, flags & FLAGS_SHARED, &key1, FUTEX_READ); in futex_wake_op() 255 hb1 = futex_hash(&key1); in futex_wake_op() 287 if (futex_match (&this->key, &key1)) { in futex_wake_op()
|
/linux-5.19.10/drivers/crypto/vmx/ |
D | aesp8-ppc.pl | 1966 my ($inp,$out,$len,$key1,$key2,$ivp,$rounds,$idx) = map("r$_",(3..10)); 2051 ?lvsl $keyperm,0,$key1 # prepare for unaligned key 2052 lwz $rounds,240($key1) 2072 lvx $rndkey0,0,$key1 2073 lvx $rndkey1,$idx,$key1 2079 lvx $rndkey0,$idx,$key1 2088 lvx $rndkey1,$idx,$key1 2092 lvx $rndkey0,$idx,$key1 2098 lvx $rndkey1,$idx,$key1 2116 lvx $rndkey0,0,$key1 [all …]
|
D | aesp8-ppc.h | 28 const struct aes_key *key1, const struct aes_key *key2, u8 *iv); 30 const struct aes_key *key1, const struct aes_key *key2, u8 *iv);
|
/linux-5.19.10/tools/testing/selftests/bpf/prog_tests/ |
D | timer_mim.c | 10 int err, prog_fd, key1 = 1; in timer_mim() local 38 err = bpf_map__delete_elem(timer_skel->maps.outer_arr, &key1, sizeof(key1), 0); in timer_mim()
|
/linux-5.19.10/security/selinux/ss/ |
D | symtab.c | 26 static int symcmp(const void *key1, const void *key2) in symcmp() argument 30 keyp1 = key1; in symcmp()
|
/linux-5.19.10/arch/arm64/crypto/ |
D | aes-glue.c | 111 struct crypto_aes_ctx key1; member 116 struct crypto_aes_ctx key1; member 149 ret = aes_expandkey(&ctx->key1, in_key, key_len / 2); in xts_set_key() 164 ret = aes_expandkey(&ctx->key1, in_key, key_len); in essiv_cbc_set_key() 405 int err, rounds = 6 + ctx->key1.key_length / 4; in essiv_cbc_encrypt() 415 ctx->key1.key_enc, rounds, blocks, in essiv_cbc_encrypt() 427 int err, rounds = 6 + ctx->key1.key_length / 4; in essiv_cbc_decrypt() 437 ctx->key1.key_dec, rounds, blocks, in essiv_cbc_decrypt() 485 int err, first, rounds = 6 + ctx->key1.key_length / 4; in xts_encrypt() 524 ctx->key1.key_enc, rounds, nbytes, in xts_encrypt() [all …]
|
/linux-5.19.10/crypto/ |
D | xcbc.c | 58 u8 key1[XCBC_BLOCKSIZE]; in crypto_xcbc_digest_setkey() local 59 int bs = sizeof(key1); in crypto_xcbc_digest_setkey() 66 crypto_cipher_encrypt_one(ctx->child, key1, (u8 *)ks); in crypto_xcbc_digest_setkey() 68 return crypto_cipher_setkey(ctx->child, key1, bs); in crypto_xcbc_digest_setkey()
|
/linux-5.19.10/drivers/infiniband/sw/rxe/ |
D | rxe_verbs.h | 17 static inline int pkey_match(u16 key1, u16 key2) in pkey_match() argument 19 return (((key1 & 0x7fff) != 0) && in pkey_match() 20 ((key1 & 0x7fff) == (key2 & 0x7fff)) && in pkey_match() 21 ((key1 & 0x8000) || (key2 & 0x8000))) ? 1 : 0; in pkey_match()
|
/linux-5.19.10/tools/lib/bpf/ |
D | strset.c | 30 static bool strset_equal_fn(const void *key1, const void *key2, void *ctx) in strset_equal_fn() argument 33 const char *str1 = s->strs_data + (long)key1; in strset_equal_fn()
|
/linux-5.19.10/tools/bootconfig/samples/ |
D | bad-manywords.bconf | 1 key1.is2.too3.long4.5.6.7.8.9.10.11.12.13.14.15.16.17
|
D | escaped.bconf | 1 key1 = "A\B\C"
|
/linux-5.19.10/kernel/bpf/ |
D | local_storage.c | 43 const struct bpf_cgroup_storage_key *key1 = _key1; in bpf_cgroup_storage_key_cmp() local 46 if (key1->cgroup_inode_id < key2->cgroup_inode_id) in bpf_cgroup_storage_key_cmp() 48 else if (key1->cgroup_inode_id > key2->cgroup_inode_id) in bpf_cgroup_storage_key_cmp() 50 else if (key1->attach_type < key2->attach_type) in bpf_cgroup_storage_key_cmp() 52 else if (key1->attach_type > key2->attach_type) in bpf_cgroup_storage_key_cmp()
|
/linux-5.19.10/fs/hfs/ |
D | catalog.c | 171 int hfs_cat_keycmp(const btree_key *key1, const btree_key *key2) in hfs_cat_keycmp() argument 175 k1p = key1->cat.ParID; in hfs_cat_keycmp() 181 return hfs_strcmp(key1->cat.CName.name, key1->cat.CName.len, in hfs_cat_keycmp()
|
/linux-5.19.10/drivers/net/wireless/ath/ |
D | key.c | 134 u32 key0, key1, key2, key3, key4; in ath_hw_set_keycache_entry() local 185 key1 = get_unaligned_le16(k->kv_val + 4); in ath_hw_set_keycache_entry() 209 REG_WRITE(ah, AR_KEYTABLE_KEY1(entry), ~key1); in ath_hw_set_keycache_entry() 312 REG_WRITE(ah, AR_KEYTABLE_KEY1(entry), key1); in ath_hw_set_keycache_entry() 320 REG_WRITE(ah, AR_KEYTABLE_KEY1(entry), key1); in ath_hw_set_keycache_entry()
|