/linux-6.12.1/drivers/input/keyboard/ |
D | ep93xx_keypad.c | 71 int key1; member 84 int keycode, key1, key2; in ep93xx_keypad_irq_handler() local 89 key1 = keypad->keycodes[keycode]; in ep93xx_keypad_irq_handler() 95 if (keypad->key1 && key1 != keypad->key1 && key2 != keypad->key1) in ep93xx_keypad_irq_handler() 96 input_report_key(input_dev, keypad->key1, 0); in ep93xx_keypad_irq_handler() 98 if (keypad->key2 && key1 != keypad->key2 && key2 != keypad->key2) in ep93xx_keypad_irq_handler() 101 input_report_key(input_dev, key1, 1); in ep93xx_keypad_irq_handler() 104 keypad->key1 = key1; in ep93xx_keypad_irq_handler() 108 if (keypad->key1 && key1 != keypad->key1) in ep93xx_keypad_irq_handler() 109 input_report_key(input_dev, keypad->key1, 0); in ep93xx_keypad_irq_handler() [all …]
|
/linux-6.12.1/tools/testing/selftests/alsa/ |
D | conf.c | 349 static int conf_get_by_keys(snd_config_t *root, const char *key1, in conf_get_by_keys() argument 354 if (key1) { in conf_get_by_keys() 355 ret = snd_config_search(root, key1, &root); in conf_get_by_keys() 366 snd_config_t *conf_get_subtree(snd_config_t *root, const char *key1, const char *key2) in conf_get_subtree() argument 372 ret = conf_get_by_keys(root, key1, key2, &root); in conf_get_subtree() 376 ksft_exit_fail_msg("key '%s'.'%s' search error: %s\n", key1, key2, snd_strerror(ret)); in conf_get_subtree() 380 int conf_get_count(snd_config_t *root, const char *key1, const char *key2) in conf_get_count() argument 388 ret = conf_get_by_keys(root, key1, key2, &cfg); in conf_get_count() 392 ksft_exit_fail_msg("key '%s'.'%s' search error: %s\n", key1, key2, snd_strerror(ret)); in conf_get_count() 394 ksft_exit_fail_msg("key '%s'.'%s' is not a compound\n", key1, key2); in conf_get_count() [all …]
|
D | alsa-local.h | 19 snd_config_t *conf_get_subtree(snd_config_t *root, const char *key1, const char *key2); 20 int conf_get_count(snd_config_t *root, const char *key1, const char *key2); 21 const char *conf_get_string(snd_config_t *root, const char *key1, const char *key2, const char *def… 22 long conf_get_long(snd_config_t *root, const char *key1, const char *key2, long def); 23 int conf_get_bool(snd_config_t *root, const char *key1, const char *key2, int def); 24 void conf_get_string_array(snd_config_t *root, const char *key1, const char *key2,
|
/linux-6.12.1/fs/xfs/libxfs/ |
D | xfs_btree.h | 185 const union xfs_btree_key *key1, 213 const union xfs_btree_key *key1, 515 const union xfs_btree_key *key1, 531 const union xfs_btree_key *key1, in xfs_btree_keycmp_lt() argument 534 return cur->bc_ops->diff_two_keys(cur, key1, key2, NULL) < 0; in xfs_btree_keycmp_lt() 540 const union xfs_btree_key *key1, in xfs_btree_keycmp_gt() argument 543 return cur->bc_ops->diff_two_keys(cur, key1, key2, NULL) > 0; in xfs_btree_keycmp_gt() 549 const union xfs_btree_key *key1, in xfs_btree_keycmp_eq() argument 552 return cur->bc_ops->diff_two_keys(cur, key1, key2, NULL) == 0; in xfs_btree_keycmp_eq() 558 const union xfs_btree_key *key1, in xfs_btree_keycmp_le() argument [all …]
|
/linux-6.12.1/fs/befs/ |
D | btree.c | 119 static int befs_compare_strings(const void *key1, int keylen1, 712 befs_compare_strings(const void *key1, int keylen1, in befs_compare_strings() argument 716 int result = strncmp(key1, key2, len); in befs_compare_strings() 725 btree_compare_int32(cont void *key1, int keylen1, const void *key2, int keylen2) 727 return *(int32_t *) key1 - *(int32_t *) key2; 731 btree_compare_uint32(cont void *key1, int keylen1, 734 if (*(u_int32_t *) key1 == *(u_int32_t *) key2) 736 else if (*(u_int32_t *) key1 > *(u_int32_t *) key2) 742 btree_compare_int64(cont void *key1, int keylen1, const void *key2, int keylen2) 744 if (*(int64_t *) key1 == *(int64_t *) key2) [all …]
|
/linux-6.12.1/arch/arm/crypto/ |
D | aes-ce-core.S | 26 .macro enc_dround, key1, key2 27 enc_round q0, \key1 31 .macro dec_dround, key1, key2 32 dec_round q0, \key1 36 .macro enc_fround, key1, key2, key3 37 enc_round q0, \key1 42 .macro dec_fround, key1, key2, key3 43 dec_round q0, \key1 48 .macro enc_dround_4x, key1, key2 49 enc_round q0, \key1 [all …]
|
D | aes-ce-glue.c | 146 struct crypto_aes_ctx key1; member 160 ret = ce_aes_expandkey(&ctx->key1, in_key, key_len / 2); in xts_set_key() 448 int err, first, rounds = num_rounds(&ctx->key1); in xts_encrypt() 487 ctx->key1.key_enc, rounds, nbytes, walk.iv, in xts_encrypt() 509 ctx->key1.key_enc, rounds, walk.nbytes, walk.iv, in xts_encrypt() 520 int err, first, rounds = num_rounds(&ctx->key1); in xts_decrypt() 559 ctx->key1.key_dec, rounds, nbytes, walk.iv, in xts_decrypt() 581 ctx->key1.key_dec, rounds, walk.nbytes, walk.iv, in xts_decrypt()
|
/linux-6.12.1/fs/ubifs/ |
D | key.h | 479 const union ubifs_key *key1, in keys_cmp() argument 482 if (key1->u32[0] < key2->u32[0]) in keys_cmp() 484 if (key1->u32[0] > key2->u32[0]) in keys_cmp() 486 if (key1->u32[1] < key2->u32[1]) in keys_cmp() 488 if (key1->u32[1] > key2->u32[1]) in keys_cmp() 504 const union ubifs_key *key1, in keys_eq() argument 507 if (key1->u32[0] != key2->u32[0]) in keys_eq() 509 if (key1->u32[1] != key2->u32[1]) in keys_eq()
|
D | tnc_misc.c | 391 const union ubifs_key *key1, *key2; in read_znode() local 393 key1 = &znode->zbranch[i].key; in read_znode() 396 cmp = keys_cmp(c, key1, key2); in read_znode() 401 } else if (cmp == 0 && !is_hash_key(c, key1)) { in read_znode() 485 union ubifs_key key1, *key = &zbr->key; in ubifs_tnc_read_node() local 507 key_read(c, node + UBIFS_KEY_OFFSET, &key1); in ubifs_tnc_read_node() 508 if (!keys_eq(c, key, &key1)) { in ubifs_tnc_read_node() 512 dbg_tnck(&key1, "but found node's key "); in ubifs_tnc_read_node()
|
D | tnc.c | 1730 union ubifs_key key1; in validate_data_node() local 1759 key_read(c, buf + UBIFS_KEY_OFFSET, &key1); in validate_data_node() 1760 if (!keys_eq(c, &zbr->key, &key1)) { in validate_data_node() 1764 dbg_tnck(&key1, "found node's key "); in validate_data_node() 2036 union ubifs_key *key, *key1; in correct_parent_keys() local 2042 key1 = &znode->parent->zbranch[0].key; in correct_parent_keys() 2044 while (keys_cmp(c, key, key1) < 0) { in correct_parent_keys() 2045 key_copy(c, key, key1); in correct_parent_keys() 2050 key1 = &znode->parent->zbranch[0].key; in correct_parent_keys() 2123 union ubifs_key *key = &zbr->key, *key1; in tnc_insert() local [all …]
|
/linux-6.12.1/net/mptcp/ |
D | crypto_test.c | 37 u64 key1, key2; in mptcp_crypto_test_basic() local 43 key1 = be64_to_cpu(*((__be64 *)&tests[i].key[0])); in mptcp_crypto_test_basic() 51 mptcp_crypto_hmac_sha(key1, key2, msg, 8, hmac); in mptcp_crypto_test_basic()
|
D | crypto.c | 44 void mptcp_crypto_hmac_sha(u64 key1, u64 key2, u8 *msg, int len, void *hmac) in mptcp_crypto_hmac_sha() argument 54 put_unaligned_be64(key1, key1be); in mptcp_crypto_hmac_sha()
|
/linux-6.12.1/kernel/futex/ |
D | requeue.c | 270 struct futex_hash_bucket *hb2, union futex_key *key1, in futex_proxy_trylock_atomic() argument 292 top_waiter = futex_top_waiter(hb1, key1); in futex_proxy_trylock_atomic() 371 union futex_key key1 = FUTEX_KEY_INIT, key2 = FUTEX_KEY_INIT; in futex_requeue() local 431 ret = get_futex_key(uaddr1, flags1, &key1, FUTEX_READ); in futex_requeue() 443 if (requeue_pi && futex_match(&key1, &key2)) in futex_requeue() 446 hb1 = futex_hash(&key1); in futex_requeue() 488 ret = futex_proxy_trylock_atomic(uaddr2, hb1, hb2, &key1, in futex_requeue() 578 if (!futex_match(&this->key, &key1)) in futex_requeue()
|
D | futex.h | 212 static inline int futex_match(union futex_key *key1, union futex_key *key2) in futex_match() argument 214 return (key1 && key2 in futex_match() 215 && key1->both.word == key2->both.word in futex_match() 216 && key1->both.ptr == key2->both.ptr in futex_match() 217 && key1->both.offset == key2->both.offset); in futex_match()
|
/linux-6.12.1/arch/powerpc/crypto/ |
D | aesp8-ppc.pl | 1967 my ($inp,$out,$len,$key1,$key2,$ivp,$rounds,$idx) = map("r$_",(3..10)); 2052 ?lvsl $keyperm,0,$key1 # prepare for unaligned key 2053 lwz $rounds,240($key1) 2073 lvx $rndkey0,0,$key1 2074 lvx $rndkey1,$idx,$key1 2080 lvx $rndkey0,$idx,$key1 2089 lvx $rndkey1,$idx,$key1 2093 lvx $rndkey0,$idx,$key1 2099 lvx $rndkey1,$idx,$key1 2117 lvx $rndkey0,0,$key1 [all …]
|
D | aesp8-ppc.h | 28 const struct aes_key *key1, const struct aes_key *key2, u8 *iv); 30 const struct aes_key *key1, const struct aes_key *key2, u8 *iv);
|
/linux-6.12.1/security/selinux/ss/ |
D | avtab.c | 98 static int avtab_node_cmp(const struct avtab_key *key1, in avtab_node_cmp() argument 101 u16 specified = key1->specified & ~(AVTAB_ENABLED | AVTAB_ENABLED_OLD); in avtab_node_cmp() 103 if (key1->source_type == key2->source_type && in avtab_node_cmp() 104 key1->target_type == key2->target_type && in avtab_node_cmp() 105 key1->target_class == key2->target_class && in avtab_node_cmp() 108 if (key1->source_type < key2->source_type) in avtab_node_cmp() 110 if (key1->source_type == key2->source_type && in avtab_node_cmp() 111 key1->target_type < key2->target_type) in avtab_node_cmp() 113 if (key1->source_type == key2->source_type && in avtab_node_cmp() 114 key1->target_type == key2->target_type && in avtab_node_cmp() [all …]
|
D | symtab.c | 28 static int symcmp(const void *key1, const void *key2) in symcmp() argument 32 keyp1 = key1; in symcmp()
|
/linux-6.12.1/tools/testing/selftests/bpf/prog_tests/ |
D | timer_mim.c | 10 int err, prog_fd, key1 = 1; in timer_mim() local 38 err = bpf_map__delete_elem(timer_skel->maps.outer_arr, &key1, sizeof(key1), 0); in timer_mim()
|
/linux-6.12.1/tools/testing/selftests/hid/tests/ |
D | test_gamepad.py | 71 key1 = libevdev.evbit(uhdev.buttons_map[b1]) 77 expected_event0 = libevdev.InputEvent(key1, 1) 84 assert evdev.value[key1] == 1 89 expected_event = libevdev.InputEvent(key1, 0) 93 assert evdev.value[key1] == 0 102 assert evdev.value[key1] == 0
|
/linux-6.12.1/crypto/ |
D | xcbc.c | 57 u8 key1[XCBC_BLOCKSIZE]; in crypto_xcbc_digest_setkey() local 58 int bs = sizeof(key1); in crypto_xcbc_digest_setkey() 65 crypto_cipher_encrypt_one(ctx->child, key1, (u8 *)ks); in crypto_xcbc_digest_setkey() 67 return crypto_cipher_setkey(ctx->child, key1, bs); in crypto_xcbc_digest_setkey()
|
/linux-6.12.1/arch/arm64/crypto/ |
D | aes-glue.c | 117 struct crypto_aes_ctx key1; member 122 struct crypto_aes_ctx key1; member 155 ret = aes_expandkey(&ctx->key1, in_key, key_len / 2); in xts_set_key() 170 ret = aes_expandkey(&ctx->key1, in_key, key_len); in essiv_cbc_set_key() 411 int err, rounds = 6 + ctx->key1.key_length / 4; in essiv_cbc_encrypt() 421 ctx->key1.key_enc, rounds, blocks, in essiv_cbc_encrypt() 433 int err, rounds = 6 + ctx->key1.key_length / 4; in essiv_cbc_decrypt() 443 ctx->key1.key_dec, rounds, blocks, in essiv_cbc_decrypt() 545 int err, first, rounds = 6 + ctx->key1.key_length / 4; in xts_encrypt() 584 ctx->key1.key_enc, rounds, nbytes, in xts_encrypt() [all …]
|
D | sm4-ce-glue.c | 57 struct sm4_ctx key1; member 100 sm4_ce_expand_key(key, ctx->key1.rkey_enc, in sm4_xts_setkey() 101 ctx->key1.rkey_dec, crypto_sm4_fk, crypto_sm4_ck); in sm4_xts_setkey() 367 sm4_ce_xts_enc(ctx->key1.rkey_enc, walk.dst.virt.addr, in sm4_xts_crypt() 371 sm4_ce_xts_dec(ctx->key1.rkey_dec, walk.dst.virt.addr, in sm4_xts_crypt() 403 sm4_ce_xts_enc(ctx->key1.rkey_enc, walk.dst.virt.addr, in sm4_xts_crypt() 407 sm4_ce_xts_dec(ctx->key1.rkey_dec, walk.dst.virt.addr, in sm4_xts_crypt()
|
/linux-6.12.1/drivers/infiniband/sw/rxe/ |
D | rxe_verbs.h | 16 static inline int pkey_match(u16 key1, u16 key2) in pkey_match() argument 18 return (((key1 & 0x7fff) != 0) && in pkey_match() 19 ((key1 & 0x7fff) == (key2 & 0x7fff)) && in pkey_match() 20 ((key1 & 0x8000) || (key2 & 0x8000))) ? 1 : 0; in pkey_match()
|
/linux-6.12.1/tools/testing/selftests/wireguard/ |
D | netns.sh | 82 key1="$(pp wg genkey)" 86 pub1="$(pp wg pubkey <<<"$key1")" 91 [[ -n $key1 && -n $key2 && -n $psk ]] 101 private-key <(echo "$key1") \ 245 n1 wg set wg0 private-key <(echo "$key1") peer "$pub2" preshared-key <(echo "$psk") allowed-ips 192… 258 n1 wg set wg0 private-key <(echo "$key1") peer "$pub2" preshared-key <(echo "$psk") allowed-ips fd0… 523 n1 wg set wg0 private-key <(echo "$key1") peer "$pub2" endpoint 10.0.0.1:1 persistent-keepalive 1 538 n1 wg set wg0 private-key <(echo "$key1") 616 n0 wg set wg0 private-key <(echo "$key1") peer "$pub2" preshared-key <(echo "$psk") 617 [[ $(n0 wg show wg0 private-key) == "$key1" ]] [all …]
|