/linux-master/net/xdp/ |
H A D | xskmap.c | 70 if (attr->max_entries == 0 || attr->key_size != 4 ||
|
/linux-master/drivers/crypto/ |
H A D | atmel-ecc.c | 96 if (params.key_size) {
|
/linux-master/drivers/crypto/intel/qat/qat_common/ |
H A D | icp_qat_uclo.h | 469 unsigned int key_size; member in struct:icp_qat_css_hdr
|
/linux-master/fs/smb/server/ |
H A D | auth.c | 678 unsigned int key_size) 690 memset(key, 0x0, key_size); 738 if (key_size == SMB3_ENC_DEC_KEY_SIZE && 756 memcpy(key, hashptr, key_size); 676 generate_key(struct ksmbd_conn *conn, struct ksmbd_session *sess, struct kvec label, struct kvec context, __u8 *key, unsigned int key_size) argument
|
/linux-master/tools/testing/selftests/bpf/prog_tests/ |
H A D | bpf_obj_id.c | 87 !ASSERT_EQ(map_infos[i].key_size, sizeof(__u32), "key_size") ||
|
/linux-master/drivers/crypto/intel/keembay/ |
H A D | keembay-ocs-ecc.c | 547 if (params.key_size > digits_to_bytes(tctx->curve->g.ndigits)) { 553 if (!params.key || !params.key_size) { 559 params.key_size);
|
/linux-master/tools/bpf/bpftool/ |
H A D | feature.c | 596 int key_size, value_size, max_entries; local 601 key_size = sizeof(__u32); 605 fd = bpf_map_create(map_type, NULL, key_size, value_size, max_entries,
|
/linux-master/net/ethtool/ |
H A D | ioctl.c | 1214 rxfh_dev.key_size = ops->get_rxfh_key_size(dev); 1219 user_key_size = rxfh.key_size; 1229 rxfh.key_size = rxfh_dev.key_size; 1234 (user_key_size && user_key_size != rxfh_dev.key_size)) 1320 (rxfh.key_size && (rxfh.key_size != dev_key_size)) || 1322 rxfh.key_size == 0 && rxfh.hfunc == ETH_RSS_HASH_NO_CHANGE && 1329 rss_config = kzalloc(indir_bytes + rxfh.key_size, GFP_USER); 1366 if (rxfh.key_size) { [all...] |
/linux-master/fs/smb/client/ |
H A D | smb2transport.c | 310 struct kvec context, __u8 *key, unsigned int key_size) 322 memset(key, 0x0, key_size); 384 memcpy(key, hashptr, key_size); 309 generate_key(struct cifs_ses *ses, struct kvec label, struct kvec context, __u8 *key, unsigned int key_size) argument
|
/linux-master/fs/ntfs3/ |
H A D | index.c | 760 e_key_len = le16_to_cpu(e->key_size); 827 before = hdr_find_e(indx, hdr, de + 1, le16_to_cpu(de->key_size), ctx, 1159 !(*indx->cmp)(key, key_len, e + 1, le16_to_cpu(e->key_size), ctx)) { 1877 (*indx->cmp)(new_de + 1, le16_to_cpu(new_de->key_size), 1878 up_e + 1, le16_to_cpu(up_e->key_size), 1959 le16_to_cpu(new_de->key_size), ctx, &diff, &e, 2614 e->key_size = 0;
|
H A D | dir.c | 370 if (le16_to_cpu(e->key_size) < SIZEOF_ATTRIBUTE_FILENAME)
|
H A D | ntfs.h | 621 __le16 key_size; // 0x0A: The size of File name length in bytes + 0x42. member in struct:NTFS_DE 672 return le16_to_cpu(e->key_size) >= SIZEOF_ATTRIBUTE_FILENAME ?
|
/linux-master/tools/lib/bpf/ |
H A D | gen_loader.c | 451 __u32 key_size, __u32 value_size, __u32 max_entries, 461 attr.key_size = key_size; 448 bpf_gen__map_create(struct bpf_gen *gen, enum bpf_map_type map_type, const char *map_name, __u32 key_size, __u32 value_size, __u32 max_entries, struct bpf_map_create_opts *map_attr, int map_idx) argument
|
H A D | bpf.h | 63 __u32 key_size, 204 * buffer must be of *key_size* * *count*. The *values* buffer must be of
|
H A D | libbpf.c | 513 unsigned int key_size; member in struct:bpf_map_def 1343 map->def.key_size = sizeof(int); 1862 def->key_size = sizeof(int); 2474 } else if (strcmp(name, "key_size") == 0) { 2479 if (map_def->key_size && map_def->key_size != sz) { 2481 map_name, map_def->key_size, sz); 2484 map_def->key_size = sz; 2506 if (map_def->key_size && map_def->key_size ! [all...] |
/linux-master/tools/testing/selftests/bpf/progs/ |
H A D | bpf_flow.c | 64 __uint(key_size, sizeof(__u32));
|
H A D | map_kptr.c | 102 __uint(key_size, sizeof(int)); \
|
/linux-master/drivers/infiniband/hw/hfi1/ |
H A D | firmware.c | 61 u32 key_size; /* in DWORDs */ member in struct:css_header 375 invalid_header(dd, "key_size", css->key_size, KEY_SIZE / 4) || 442 hfi1_cdbg(FIRMWARE, " key_size 0x%03x (0x%03x bytes)", 443 css->key_size, 4 * css->key_size);
|
/linux-master/include/ufs/ |
H A D | ufshci.h | 401 u8 key_size; member in struct:ufs_crypto_cap_entry::__anon973
|
/linux-master/crypto/asymmetric_keys/ |
H A D | public_key.c | 234 info->key_size = len * 8; 248 * which is actually 2 'key_size'-bit integers encoded in
|
/linux-master/include/net/bluetooth/ |
H A D | bluetooth.h | 70 __u8 key_size; member in struct:bt_security
|
/linux-master/drivers/net/ethernet/netronome/nfp/flower/ |
H A D | match.c | 554 memset(nfp_flow->unmasked_data, 0, key_ls->key_size); 555 memset(nfp_flow->mask_data, 0, key_ls->key_size);
|
/linux-master/net/bluetooth/ |
H A D | smp.c | 1750 u8 key_size, auth, sec_level; local 1804 key_size = min(req->max_key_size, rsp.max_key_size); 1805 if (check_enc_key_size(conn, key_size)) 1846 key_size = min(req->max_key_size, rsp.max_key_size); 1847 if (check_enc_key_size(conn, key_size)) 1941 u8 key_size, auth; local 1956 key_size = min(req->max_key_size, rsp->max_key_size); 1957 if (check_enc_key_size(conn, key_size))
|
/linux-master/drivers/net/ethernet/intel/iavf/ |
H A D | iavf_common.c | 399 u16 key_size = sizeof(struct iavf_aqc_get_set_rss_key_data); local 416 status = iavf_asq_send_command(hw, &desc, key, key_size, NULL);
|
/linux-master/kernel/trace/ |
H A D | trace_events_hist.c | 556 unsigned int key_size; member in struct:hist_trigger_data 4103 track_data = track_data_alloc(hist_data->key_size, data, hist_data); 4482 unsigned int key_size; local 4492 key_size = sizeof(unsigned long) * HIST_STACKTRACE_DEPTH; 4509 key_size = hist_field->size; 4514 key_size = ALIGN(key_size, sizeof(u64)); 4515 hist_data->fields[key_idx]->size = key_size; 4518 hist_data->key_size += key_size; [all...] |