/linux-master/include/crypto/ |
H A D | chacha.h | 6 * security. Here they share the same key size, tfm context, and setkey 65 void chacha_init_arch(u32 *state, const u32 *key, const u8 *iv); 66 static inline void chacha_init_generic(u32 *state, const u32 *key, const u8 *iv) argument 69 state[4] = key[0]; 70 state[5] = key[1]; 71 state[6] = key[2]; 72 state[7] = key[3]; 73 state[8] = key[4]; 74 state[9] = key[5]; 75 state[10] = key[ 83 chacha_init(u32 *state, const u32 *key, const u8 *iv) argument [all...] |
/linux-master/lib/crypto/ |
H A D | poly1305-donna32.c | 13 void poly1305_core_setkey(struct poly1305_core_key *key, argument 17 key->key.r[0] = (get_unaligned_le32(&raw_key[0])) & 0x3ffffff; 18 key->key.r[1] = (get_unaligned_le32(&raw_key[3]) >> 2) & 0x3ffff03; 19 key->key.r[2] = (get_unaligned_le32(&raw_key[6]) >> 4) & 0x3ffc0ff; 20 key->key.r[3] = (get_unaligned_le32(&raw_key[9]) >> 6) & 0x3f03fff; 21 key 31 poly1305_core_blocks(struct poly1305_state *state, const struct poly1305_core_key *key, const void *src, unsigned int nblocks, u32 hibit) argument [all...] |
/linux-master/fs/btrfs/tests/ |
H A D | extent-buffer-tests.c | 25 struct btrfs_key key; local 60 key.objectid = 0; 61 key.type = BTRFS_EXTENT_CSUM_KEY; 62 key.offset = 0; 68 btrfs_setup_item_for_insert(NULL, root, path, &key, value_len); 72 key.offset = 3; 79 ret = btrfs_split_item(NULL, root, path, &key, 17); 86 * Read the first slot, it should have the original key and contain only 89 btrfs_item_key_to_cpu(eb, &key, 0); 90 if (key [all...] |
/linux-master/net/mac802154/ |
H A D | llsec.c | 21 static void llsec_key_put(struct mac802154_llsec_key *key); 45 struct ieee802154_llsec_key_entry *key, *kn; local 63 list_for_each_entry_safe(key, kn, &sec->table.keys, list) { 66 mkey = container_of(key->key, struct mac802154_llsec_key, key); 67 list_del(&key->list); 69 kfree_sensitive(key); 117 struct mac802154_llsec_key *key; local 120 key 164 struct mac802154_llsec_key *key; local 177 llsec_key_get(struct mac802154_llsec_key *key) argument 183 llsec_key_put(struct mac802154_llsec_key *key) argument 212 mac802154_llsec_key_add(struct mac802154_llsec *sec, const struct ieee802154_llsec_key_id *id, const struct ieee802154_llsec_key *key) argument 280 mac802154_llsec_key_del(struct mac802154_llsec *sec, const struct ieee802154_llsec_key_id *key) argument 317 u32 key = llsec_dev_hash_short(short_addr, pan_id); local 332 u64 key = llsec_dev_hash_long(hwaddr); local 413 llsec_devkey_find(struct mac802154_llsec_device *dev, const struct ieee802154_llsec_key_id *key) argument 429 mac802154_llsec_devkey_add(struct mac802154_llsec *sec, __le64 dev_addr, const struct ieee802154_llsec_device_key *key) argument 453 mac802154_llsec_devkey_del(struct mac802154_llsec *sec, __le64 dev_addr, const struct ieee802154_llsec_device_key *key) argument 558 struct mac802154_llsec_key *key; local 619 llsec_do_encrypt_unauth(struct sk_buff *skb, const struct mac802154_llsec *sec, const struct ieee802154_hdr *hdr, struct mac802154_llsec_key *key) argument 644 llsec_tfm_by_len(struct mac802154_llsec_key *key, int authlen) argument 656 llsec_do_encrypt_auth(struct sk_buff *skb, const struct mac802154_llsec *sec, const struct ieee802154_hdr *hdr, struct mac802154_llsec_key *key) argument 698 llsec_do_encrypt(struct sk_buff *skb, const struct mac802154_llsec *sec, const struct ieee802154_hdr *hdr, struct mac802154_llsec_key *key) argument 713 struct mac802154_llsec_key *key; local 796 u32 key = llsec_dev_hash_short(devaddr.short_addr, local 806 u64 key = llsec_dev_hash_long(devaddr.extended_addr); local 838 llsec_do_decrypt_unauth(struct sk_buff *skb, const struct mac802154_llsec *sec, const struct ieee802154_hdr *hdr, struct mac802154_llsec_key *key, __le64 dev_addr) argument 865 llsec_do_decrypt_auth(struct sk_buff *skb, const struct mac802154_llsec *sec, const struct ieee802154_hdr *hdr, struct mac802154_llsec_key *key, __le64 dev_addr) argument 907 llsec_do_decrypt(struct sk_buff *skb, const struct mac802154_llsec *sec, const struct ieee802154_hdr *hdr, struct mac802154_llsec_key *key, __le64 dev_addr) argument 989 struct mac802154_llsec_key *key; local [all...] |
/linux-master/net/mctp/ |
H A D | route.c | 76 /* A note on the key allocations. 85 * a key with (local = local-eid, peer = ANY). This allows a match on the 100 * So, the key set allows both a local EID of ANY, as well as a peer EID of 110 static bool mctp_key_match(struct mctp_sk_key *key, unsigned int net, argument 113 if (key->net != net) 116 if (!mctp_address_matches(key->local_addr, local)) 119 if (!mctp_address_matches(key->peer_addr, peer)) 122 if (key->tag != tag) 128 /* returns a key (with key 136 struct mctp_sk_key *key, *ret; variable in typeref:struct:mctp_sk_key 175 struct mctp_sk_key *key; local 194 mctp_key_unref(struct mctp_sk_key *key) argument 212 mctp_key_add(struct mctp_sk_key *key, struct mctp_sock *msk) argument 281 mctp_key_unref(key); variable 287 mctp_key_unref(key); variable 293 mctp_skb_set_flow(struct sk_buff *skb, struct mctp_sk_key *key) argument 307 struct mctp_sk_key *key; local 322 mctp_skb_set_flow(struct sk_buff *skb, struct mctp_sk_key *key) argument 326 mctp_frag_queue(struct mctp_sk_key *key, struct sk_buff *skb) argument 365 struct mctp_sk_key *key, *any_key = NULL; local 626 mctp_reserve_tag(struct net *net, struct mctp_sk_key *key, struct mctp_sock *msk) argument 654 struct mctp_sk_key *key, *tmp; local 738 struct mctp_sk_key *key, *tmp; local 930 struct mctp_sk_key *key; local [all...] |
/linux-master/drivers/net/ethernet/mellanox/mlxsw/ |
H A D | spectrum2_mr_tcam.c | 143 struct mlxsw_sp_mr_route_key *key) 146 key->vrid, GENMASK(11, 0)); 148 (char *) &key->source.addr4, 149 (char *) &key->source_mask.addr4, 4); 151 (char *) &key->group.addr4, 152 (char *) &key->group_mask.addr4, 4); 157 struct mlxsw_sp_mr_route_key *key) 160 key->vrid, GENMASK(3, 0)); 162 key->vrid >> 4, GENMASK(3, 0)); 165 key 142 mlxsw_sp2_mr_tcam_rule_parse4(struct mlxsw_sp_acl_rule_info *rulei, struct mlxsw_sp_mr_route_key *key) argument 156 mlxsw_sp2_mr_tcam_rule_parse6(struct mlxsw_sp_acl_rule_info *rulei, struct mlxsw_sp_mr_route_key *key) argument 193 mlxsw_sp2_mr_tcam_rule_parse(struct mlxsw_sp_acl_rule *rule, struct mlxsw_sp_mr_route_key *key, unsigned int priority) argument 210 mlxsw_sp2_mr_tcam_route_create(struct mlxsw_sp *mlxsw_sp, void *priv, void *route_priv, struct mlxsw_sp_mr_route_key *key, struct mlxsw_afa_block *afa_block, enum mlxsw_sp_mr_route_prio prio) argument 246 mlxsw_sp2_mr_tcam_route_destroy(struct mlxsw_sp *mlxsw_sp, void *priv, void *route_priv, struct mlxsw_sp_mr_route_key *key) argument 268 mlxsw_sp2_mr_tcam_route_update(struct mlxsw_sp *mlxsw_sp, void *route_priv, struct mlxsw_sp_mr_route_key *key, struct mlxsw_afa_block *afa_block) argument [all...] |
/linux-master/tools/testing/selftests/bpf/prog_tests/ |
H A D | btf_map_in_map.c | 28 int err, key = 0, val, i, fd; local 48 bpf_map_update_elem(outer_arr_fd, &key, &map1_fd, 0); 49 bpf_map_update_elem(outer_hash_fd, &key, &map2_fd, 0); 50 bpf_map_update_elem(outer_arr_dyn_fd, &key, &map3_fd, 0); 53 bpf_map_lookup_elem(map1_fd, &key, &val); 55 bpf_map_lookup_elem(map2_fd, &key, &val); 57 bpf_map_lookup_elem(map3_fd, &key, &val); 61 bpf_map_update_elem(outer_arr_fd, &key, &map2_fd, 0); 62 bpf_map_update_elem(outer_hash_fd, &key, &map1_fd, 0); 63 bpf_map_update_elem(outer_arr_dyn_fd, &key, [all...] |
/linux-master/tools/testing/selftests/bpf/progs/ |
H A D | lsm.c | 17 __type(key, __u32); 24 __type(key, __u32); 31 __type(key, __u32); 38 __type(key, __u32); 45 __type(key, __u32); 52 __type(key, __u32); 59 __type(key, int); 115 __u32 key = 0; local 124 value = bpf_map_lookup_elem(&array, &key); 127 value = bpf_map_lookup_elem(&hash, &key); [all...] |
H A D | bpf_iter_sockmap.c | 14 __type(key, __u32); 21 __type(key, __u32); 28 __type(key, __u32); 39 __u32 tmp, *key = ctx->key; local 42 if (!key) 50 tmp = *key;
|
H A D | test_helper_restricted.c | 17 __type(key, __u32); 24 __type(key, __u32); 28 static int timer_cb(void *map, int *key, struct timer *timer) argument 36 const int key = 0; local 38 timer = bpf_map_lookup_elem(&timers, &key); 49 const int key = 0; local 52 lock = bpf_map_lookup_elem(&locks, &key);
|
H A D | test_siphash.h | 34 v3 ^= key->key[1]; \ 35 v2 ^= key->key[0]; \ 36 v1 ^= key->key[1]; \ 37 v0 ^= key->key[0]; 51 static inline u64 siphash_2u64(const u64 first, const u64 second, const siphash_key_t *key) argument
|
H A D | test_btf_newkv.c | 15 __type(key, int); 23 int key = 0; local 25 counts = bpf_map_lookup_elem(&btf_map, &key);
|
H A D | jeq_infer_not_null_fail.c | 12 __type(key, u64); 22 u64 key = 0, ret = 0, *val; local 24 val = bpf_map_lookup_elem(map, &key);
|
/linux-master/drivers/nvme/common/ |
H A D | keyring.c | 8 #include <linux/key.h> 9 #include <linux/key-type.h> 15 static struct key *nvme_keyring; 23 static void nvme_tls_psk_describe(const struct key *key, struct seq_file *m) argument 25 seq_puts(m, key->description); 26 seq_printf(m, ": %u", key->datalen); 29 static bool nvme_tls_psk_match(const struct key *key, argument 35 if (!key [all...] |
/linux-master/samples/bpf/ |
H A D | sockex1_user.c | 46 int key; local 48 key = IPPROTO_TCP; 49 assert(bpf_map_lookup_elem(map_fd, &key, &tcp_cnt) == 0); 51 key = IPPROTO_UDP; 52 assert(bpf_map_lookup_elem(map_fd, &key, &udp_cnt) == 0); 54 key = IPPROTO_ICMP; 55 assert(bpf_map_lookup_elem(map_fd, &key, &icmp_cnt) == 0);
|
H A D | spintest_user.c | 14 long key, next_key, value; local 56 key = 0; 58 while (bpf_map_get_next_key(map_fd, &key, &next_key) == 0) { 62 key = next_key; 70 if (key) 72 key = 0; 73 while (bpf_map_get_next_key(map_fd, &key, &next_key) == 0)
|
H A D | tracex2.bpf.c | 15 __type(key, long); 84 struct hist_key key; local 86 key.index = log2l(count); 87 key.pid_tgid = bpf_get_current_pid_tgid(); 88 key.uid_gid = bpf_get_current_uid_gid(); 89 bpf_get_current_comm(&key.comm, sizeof(key.comm)); 91 value = bpf_map_lookup_elem(&my_hist_map, &key); 95 bpf_map_update_elem(&my_hist_map, &key, &init_val, BPF_ANY);
|
/linux-master/kernel/sched/ |
H A D | wait_bit.c | 23 struct wait_bit_key *key = arg; local 26 if (wait_bit->key.flags != key->flags || 27 wait_bit->key.bit_nr != key->bit_nr || 28 test_bit(key->bit_nr, key->flags)) 31 return autoremove_wake_function(wq_entry, mode, sync, key); 48 if (test_bit(wbq_entry->key.bit_nr, wbq_entry->key 123 struct wait_bit_key key = __WAIT_BIT_KEY_INITIALIZER(word, bit); local 163 struct wait_bit_key *key = arg; local [all...] |
/linux-master/certs/ |
H A D | blacklist.c | 11 #include <linux/key.h> 12 #include <linux/key-type.h> 35 static struct key *blacklist_keyring; 86 static int blacklist_key_instantiate(struct key *key, argument 94 key->perm = BLACKLIST_KEY_PERM; 100 if (key->flags & (1 << KEY_FLAG_BUILTIN)) 108 err = verify_pkcs7_signature(key->description, 109 strlen(key->description), prep->data, prep->datalen, 124 return generic_key_instantiate(key, pre 127 blacklist_key_update(struct key *key, struct key_preparsed_payload *prep) argument 133 blacklist_describe(const struct key *key, struct seq_file *m) argument 184 key_ref_t key; local 264 key_ref_t key; local [all...] |
/linux-master/arch/powerpc/crypto/ |
H A D | aesp8-ppc.h | 6 u8 key[AES_MAX_KEYLENGTH]; member in struct:aes_key 17 struct aes_key *key); 19 struct aes_key *key); 20 void aes_p8_encrypt(const u8 *in, u8 *out, const struct aes_key *key); 21 void aes_p8_decrypt(const u8 *in, u8 *out, const struct aes_key *key); 23 const struct aes_key *key, u8 *iv, const int enc); 25 size_t len, const struct aes_key *key,
|
/linux-master/net/mac80211/ |
H A D | debugfs_key.c | 13 #include "key.h" 22 struct ieee80211_key *key = file->private_data; \ 24 format_string, key->prop); \ 74 struct ieee80211_key *key = file->private_data; local 75 u32 c = key->conf.cipher; 86 struct ieee80211_key *key = file->private_data; local 90 switch (key->conf.cipher) { 111 atomic64_set(&key->conf.tx_pn, pn); 124 struct ieee80211_key *key = file->private_data; local 126 switch (key 160 struct ieee80211_key *key = file->private_data; local 228 struct ieee80211_key *key = file->private_data; local 261 struct ieee80211_key *key = file->private_data; local 286 struct ieee80211_key *key = file->private_data; local 302 struct ieee80211_key *key = file->private_data; local 318 KEY_OPS(key); variable 327 ieee80211_debugfs_key_add(struct ieee80211_key *key) argument 364 ieee80211_debugfs_key_remove(struct ieee80211_key *key) argument 376 struct ieee80211_key *key; local 411 struct ieee80211_key *key; local 440 struct ieee80211_key *key; local 467 ieee80211_debugfs_key_sta_del(struct ieee80211_key *key, struct sta_info *sta) argument [all...] |
/linux-master/kernel/ |
H A D | static_call_inline.c | 31 /* mutex to protect key modules/sites */ 51 return (long)site->key + (long)&site->key; 59 /* These assume the key is word-aligned. */ 72 site->key = (__static_call_key(site) | STATIC_CALL_SITE_INIT) - 73 (long)&site->key; 100 a->key = b->key - delta; 103 b->key = tmp.key 113 static_call_key_has_mods(struct static_call_key *key) argument 118 static_call_key_next(struct static_call_key *key) argument 126 static_call_key_sites(struct static_call_key *key) argument 134 __static_call_update(struct static_call_key *key, void *tramp, void *func) argument 225 struct static_call_key *key, *prev_key = NULL; local 373 unsigned long key; local 408 struct static_call_key *key, *prev_key = NULL; local [all...] |
/linux-master/include/linux/ |
H A D | digsig.h | 14 #include <linux/key.h> 28 uint8_t version; /* key format version */ 29 uint32_t timestamp; /* key made, always 0 for now */ 47 int digsig_verify(struct key *keyring, const char *sig, int siglen, 52 static inline int digsig_verify(struct key *keyring, const char *sig,
|
H A D | bsearch.h | 8 void *__inline_bsearch(const void *key, const void *base, size_t num, size_t size, cmp_func_t cmp) argument 15 result = cmp(key, pivot); 30 extern void *bsearch(const void *key, const void *base, size_t num, size_t size, cmp_func_t cmp);
|
/linux-master/security/keys/encrypted-keys/ |
H A D | masterkey_trusted.c | 21 * request_trusted_key - request the trusted key 24 * manages both trusted/encrypted key-types, like the encrypted key type 25 * data, trusted key type data is not visible decrypted from userspace. 27 struct key *request_trusted_key(const char *trusted_desc, 31 struct key *tkey; 39 *master_key = tpayload->key;
|