| /u-boot/board/lg/sniper/ |
| A D | sniper.c | 99 unsigned char keys[3]; in misc_init_r() local 111 keys[0] = twl4030_keypad_key((unsigned char *)&keypad_matrix, 0, 0); in misc_init_r() 112 keys[1] = twl4030_keypad_key((unsigned char *)&keypad_matrix, 0, 1); in misc_init_r() 113 keys[2] = twl4030_keypad_key((unsigned char *)&keypad_matrix, 0, 2); in misc_init_r() 119 if (keys[0]) in misc_init_r() 121 else if (keys[1]) in misc_init_r()
|
| /u-boot/drivers/input/ |
| A D | cros_ec_keyb.c | 43 static int check_for_keys(struct udevice *dev, struct key_matrix_key *keys, in check_for_keys() argument 96 key = keys + num_keys++; in check_for_keys() 123 struct key_matrix_key keys[KBC_MAX_KEYS]; in cros_ec_kbc_check() local 141 num_keys = check_for_keys(dev, keys, KBC_MAX_KEYS, in cros_ec_kbc_check() 146 memcpy(last_keys, keys, sizeof(keys)); in cros_ec_kbc_check() 153 memcpy(keys, last_keys, sizeof(keys)); in cros_ec_kbc_check() 158 num_keycodes = key_matrix_decode(&priv->matrix, keys, in cros_ec_kbc_check()
|
| A D | key_matrix.c | 27 static int has_ghosting(struct key_matrix *config, struct key_matrix_key *keys, in has_ghosting() argument 42 if (keys[j].col == keys[i].col) in has_ghosting() 44 if (keys[j].row == keys[i].row) in has_ghosting() 55 int key_matrix_decode(struct key_matrix *config, struct key_matrix_key keys[], in key_matrix_decode() argument 65 struct key_matrix_key *key = &keys[upto]; in key_matrix_decode() 82 if (has_ghosting(config, keys, valid)) { in key_matrix_decode()
|
| A D | tegra-kbc.c | 74 struct key_matrix_key keys[KBC_MAX_KPENT], *key; in tegra_kbc_find_keys() local 78 for (key = keys, i = 0; i < KBC_MAX_KPENT; i++, key++) { in tegra_kbc_find_keys() 90 return key_matrix_decode(&priv->matrix, keys, KBC_MAX_KPENT, fifo, in tegra_kbc_find_keys()
|
| A D | Kconfig | 47 then decoded into keys by this driver. 55 then decoded into keys by this driver. 63 then decoded into keys by this driver.
|
| /u-boot/doc/device-tree-bindings/input/ |
| A D | adc-keys.txt | 5 - compatible: "adc-keys" 8 - keyup-threshold-microvolt: Voltage above or equal to which all the keys are 16 Each button (key) is represented as a sub-node of "adc-keys": 32 adc-keys { 33 compatible = "adc-keys";
|
| /u-boot/arch/arm/dts/ |
| A D | meson-gxm-wetek-core2.dts | 33 adc-keys { 34 compatible = "adc-keys"; 46 gpio-keys-polled { 47 compatible = "gpio-keys-polled";
|
| A D | meson-gxl-s905x-khadas-vim.dts | 16 adc-keys { 17 compatible = "adc-keys"; 34 gpio-keys-polled { 35 compatible = "gpio-keys-polled";
|
| A D | rk3308-evb.dts | 20 compatible = "adc-keys"; 34 compatible = "adc-keys"; 71 gpio-keys { 72 compatible = "gpio-keys";
|
| A D | zynq-zturn-common.dtsi | 49 gpio-keys { 50 compatible = "gpio-keys";
|
| A D | meson-g12b-gtking-pro.dts | 17 gpio-keys-polled { 18 compatible = "gpio-keys-polled";
|
| A D | rk3368-sheep.dts | 37 keys: gpio-keys { label 38 compatible = "gpio-keys"; 245 keys {
|
| A D | rk3399-nanopc-t4.dts | 35 adc-keys { 36 compatible = "adc-keys";
|
| A D | imx6ul-phytec-segin-peb-eval-01.dtsi | 10 gpio_keys: gpio-keys {
|
| A D | sama5d35ek.dts | 50 compatible = "gpio-keys";
|
| /u-boot/doc/usage/ |
| A D | conitrace.rst | 15 driver. It is especially valuable for checking the support for special keys like 26 Entering keys <B><SHIFT-B><CTRL-B><X> 38 Entering keys <F1><POS1><DEL><BACKSPACE><X>
|
| /u-boot/scripts/kconfig/ |
| A D | mconf.c | 289 int *keys, int *vscroll, int *hscroll, 360 int *keys; member 377 data->keys[k] = key; in update_text() 387 data->keys[k] = 0; in update_text() 435 int keys[JUMP_NB + 1], i; in search_conf() local 439 .keys = keys, in search_conf() 446 str_get(&res), 0, 0, keys, &vscroll, in search_conf() 450 for (i = 0; i < JUMP_NB && keys[i]; i++) in search_conf() 451 if (dres == keys[i]) { in search_conf() 755 *keys, int *vscroll, int *hscroll, update_text_fn in show_textbox_ext() argument [all …]
|
| /u-boot/board/samsung/common/ |
| A D | misc.c | 174 int keys = 0; in check_keys() local 177 keys += KEY_POWER; in check_keys() 179 keys += KEY_VOLUMEUP; in check_keys() 181 keys += KEY_VOLUMEDOWN; in check_keys() 183 return keys; in check_keys()
|
| /u-boot/arch/arm/mach-k3/ |
| A D | config.mk | 21 ifneq ($(wildcard $(TI_SECURE_DEV_PKG)/keys/custMpk.pem),) 22 KEY=$(TI_SECURE_DEV_PKG)/keys/custMpk.pem
|
| /u-boot/board/nokia/rx51/ |
| A D | rx51.c | 547 static u8 keys[8]; variable 655 TWL4030_KEYPAD_FULL_CODE_7_0, keys, 8); in rx51_kp_tstc() 658 mods = keys[4] >> 4; in rx51_kp_tstc() 659 keys[4] &= 0x0f; in rx51_kp_tstc() 664 dk = ((keys[c] ^ old_keys[c])&keys[c]); in rx51_kp_tstc() 665 old_keys[c] = keys[c]; in rx51_kp_tstc()
|
| /u-boot/doc/ |
| A D | README.esbc_validate | 33 keys and revoke any key in case of particular key gets compromised. 38 This feature allows large number of keys to be used for esbc validation 39 of images. A set of public keys is being signed and validated by ISBC
|
| A D | README.serial_multi | 13 *) The default console depends on the keys pressed: 14 - SMC if keys not pressed (modem not enabled) 15 - SCC if keys pressed (modem enabled)
|
| /u-boot/include/ |
| A D | key_matrix.h | 56 int key_matrix_decode(struct key_matrix *config, struct key_matrix_key *keys,
|
| /u-boot/doc/uImage.FIT/ |
| A D | signature.txt | 53 For this reason the RSA image verification uses pre-processed public keys 69 $ openssl genpkey -algorithm RSA -out keys/dev.key \ 74 $ openssl req -batch -new -x509 -key keys/dev.key -out keys/dev.crt 78 $ openssl rsa -in keys/dev.key -pubout 151 all available signing keys until one matches. 154 image / configuration to be considered valid. Only required keys are 173 tools/mkimage -f fit.its -K control.dtb -k keys -r image.fit 395 all of the 'required' keys. 437 Build keys 618 Use the URL of the token to list the private keys: [all …]
|
| /u-boot/doc/imx/habv4/ |
| A D | introduction_habv4.txt | 31 keys. The resulting signed image data is then verified on the i.MX processor 32 using the corresponding public keys. The public keys are included in the CSF 146 The first step is to generate the private keys and public keys certificates. 150 under keys/ directory. The hab4_pki_tree.sh script is able to generate a PKI 152 IMG and CSF keys. 187 After running the script users can check the private keys under keys/ directory
|