/linux-master/arch/powerpc/include/asm/ |
H A D | secvar.h | 18 int (*get)(const char *key, u64 key_len, u8 *data, u64 *data_size); 19 int (*get_next)(const char *key, u64 *key_len, u64 keybufsize); 20 int (*set)(const char *key, u64 key_len, u8 *data, u64 data_size);
|
/linux-master/tools/testing/selftests/bpf/progs/ |
H A D | freplace_attach_probe.c | 19 __type(key, __u32); 27 int key = 0; local 29 val = bpf_map_lookup_elem(&hash_map, &key);
|
H A D | test_sockmap_pass_prog.c | 8 __type(key, int); 15 __type(key, int); 22 __type(key, int);
|
H A D | test_sockmap_drop_prog.c | 8 __type(key, int); 15 __type(key, int); 22 __type(key, int);
|
H A D | local_kptr_stash.c | 12 long key; member in struct:node_data 30 __type(key, int); 36 long key; member in struct:plain_local 41 long key; member in struct:local_with_root 70 __type(key, int); 83 return node_a->key < node_b->key; 98 res->key = val; 126 res->key = 41; 149 res->key 175 int key = 1; local 195 int key = 0; local 239 int key = 0; local [all...] |
H A D | timer.c | 19 __type(key, int); 27 __type(key, int); 38 __type(key, int); 45 __type(key, int); 52 __type(key, int); 72 static int timer_cb1(void *map, int *key, struct bpf_timer *timer) argument 79 /* *key == 0 - the callback was called for array timer. 80 * *key == 4 - the callback was called from lru timer. 82 if (*key == ARRAY) { 96 } else if (*key 167 timer_cb2(void *map, int *key, struct hmap_elem *val) argument 230 int key = HTAB, key_malloc = HTAB_MALLOC; local 253 int key = HTAB, key_malloc = HTAB_MALLOC; local 300 timer_cb3(void *map, int *key, struct bpf_timer *timer) argument 319 int key = 0; local 337 timer_cb_pinned(void *map, int *key, struct bpf_timer *timer) argument 350 int key = 0; local [all...] |
H A D | test_subskeleton_lib.c | 32 __type(key, __u32); 39 __type(key, __u32); 46 __u32 key = 1, value = 2; local 49 bpf_map_update_elem(&map2, &key, &value, BPF_ANY);
|
H A D | perf_event_stackmap.c | 14 __type(key, __u32); 21 __type(key, __u32); 34 __u32 key = 0; local 44 trace = bpf_map_lookup_elem(&stackdata_map, &key);
|
/linux-master/fs/btrfs/ |
H A D | lru_cache.c | 23 static struct btrfs_lru_cache_entry *match_entry(struct list_head *head, u64 key, argument 29 if (entry->key == key && entry->gen == gen) 40 * @key: The key of the entry we are looking for. 41 * @gen: Generation associated to the key. 43 * Returns the entry associated with the key or NULL if none found. 46 u64 key, u64 gen) 51 head = mtree_load(&cache->entries, key); 55 entry = match_entry(head, key, ge 45 btrfs_lru_cache_lookup(struct btrfs_lru_cache *cache, u64 key, u64 gen) argument 110 const u64 key = new_entry->key; local [all...] |
/linux-master/security/selinux/ss/ |
H A D | hashtab.h | 4 * key values and datum values. The type of the key values 6 * functions for hash computation and key comparison are 22 u32 (*hash)(const void *key); /* hash func */ 27 void *key; member in struct:hashtab_node 51 int __hashtab_insert(struct hashtab *h, struct hashtab_node **dst, void *key, 55 * Inserts the specified (key, datum) pair into the specified hash table. 58 * -EEXIST if there is already an entry with the same key, 62 static inline int hashtab_insert(struct hashtab *h, void *key, void *datum, argument 73 hvalue = key_params.hash(key) 97 hashtab_search(struct hashtab *h, const void *key, struct hashtab_key_params key_params) argument [all...] |
/linux-master/crypto/asymmetric_keys/ |
H A D | signature.c | 2 /* Signature verification with an asymmetric key 21 * Destroy a public key signature. 38 * query_asymmetric_key - Get information about an asymmetric key. 46 struct key *key = params->key; local 51 if (key->type != &key_type_asymmetric) 53 subtype = asymmetric_key_subtype(key); 55 !key->payload.data[0]) 68 * encrypt_blob - Encrypt data using an asymmetric key 137 verify_signature(const struct key *key, const struct public_key_signature *sig) argument [all...] |
H A D | public_key.c | 2 /* In-software asymmetric public-key crypto subtype 23 MODULE_DESCRIPTION("In-software asymmetric public-key subtype"); 28 * Provide a part of a description of the key for /proc/keys. 30 static void public_key_describe(const struct key *asymmetric_key, 33 struct public_key *key = asymmetric_key->payload.data[asym_crypto]; local 35 if (key) 36 seq_printf(m, "%s.%s", key->id_type, key->pkey_algo); 40 * Destroy a public key algorithm key 42 public_key_free(struct public_key *key) argument 167 u8 *key, *ptr; local 283 char *key, *ptr; local 387 char *key, *ptr; local 456 public_key_verify_signature_2(const struct key *key, const struct public_key_signature *sig) argument [all...] |
/linux-master/crypto/ |
H A D | rsa.c | 2 /* RSA asymmetric public-key algorithm [RFC3447] 51 static int _rsa_enc(const struct rsa_mpi_key *key, MPI c, MPI m) argument 58 if (rsa_check_payload(m, key->n)) 62 return mpi_powm(c, m, key->e, key->n); 72 static int _rsa_dec_crt(const struct rsa_mpi_key *key, MPI m_or_m1_or_h, MPI c) argument 82 if (rsa_check_payload(c, key->n)) 91 ret = mpi_powm(m_or_m1_or_h, c, key->dp, key->p); 96 ret = mpi_powm(m2, c, key 198 rsa_free_mpi_key(struct rsa_mpi_key *key) argument 264 rsa_set_pub_key(struct crypto_akcipher *tfm, const void *key, unsigned int keylen) argument 303 rsa_set_priv_key(struct crypto_akcipher *tfm, const void *key, unsigned int keylen) argument [all...] |
/linux-master/fs/nfs/ |
H A D | fscache.c | 29 static bool nfs_append_int(char *key, int *_len, unsigned long long x) argument 34 key[(*_len)++] = ','; 36 *_len += sprintf(key + *_len, ",%llx", x); 47 char *key, int *_len) 52 *_len += snprintf(key + *_len, NFS_MAX_KEY_LEN - *_len, 60 if (!nfs_append_int(key, _len, sin->sin_port) || 61 !nfs_append_int(key, _len, sin->sin_addr.s_addr)) 66 if (!nfs_append_int(key, _len, sin6->sin6_port) || 67 !nfs_append_int(key, _len, sin6->sin6_addr.s6_addr32[0]) || 68 !nfs_append_int(key, _le 46 nfs_fscache_get_client_key(struct nfs_client *clp, char *key, int *_len) argument 93 char *key; local [all...] |
/linux-master/tools/testing/selftests/bpf/prog_tests/ |
H A D | for_each.c | 17 __u32 key, num_cpus; local 31 key = i; 33 err = bpf_map__update_elem(skel->maps.hashmap, &key, sizeof(key), 45 key = 1; 48 err = bpf_map__update_elem(skel->maps.percpu_map, &key, sizeof(key), 62 key = 1; 63 err = bpf_map__lookup_elem(skel->maps.hashmap, &key, sizeof(key), 79 __u32 key, num_cpus, max_entries; local [all...] |
H A D | map_init.c | 24 map_key_t key; local 29 for (key = 1; key <= num; key++) { 30 err = bpf_map_update_elem(map_fd, &key, value, BPF_NOEXIST); 77 /* executes bpf program that updates map with key, value */ 78 static int prog_run_insert_elem(struct test_map_init *skel, map_key_t key, argument 85 bss->inKey = key; 122 /* Add key=1 elem with values set for all CPUs 123 * Delete elem key 134 map_key_t key; local 174 map_key_t key; local [all...] |
/linux-master/tools/testing/selftests/net/tcp_ao/ |
H A D | key-management.c | 70 struct tcp_ao_getsockopt key = {}; local 97 err = test_get_one_ao(sk, &key, &sockaddr, sizeof(sockaddr), 122 test_ok("%s: key deletion was prevented", tst_name); 126 test_xfail("%s: failed to delete the key %u:%u %d", 132 test_fail("%s: the key was deleted %u:%u %d", tst_name, 135 test_ok("%s: the key was deleted", tst_name); 139 test_fail("%s: can't delete the key %u:%u %d", tst_name, sndid, rcvid, err); 168 static int test_add_current_rnext_key(int sk, const char *key, uint8_t keyflags, argument 179 strlen(key), key); 191 __try_add_current_rnext_key(int sk, const char *key, uint8_t keyflags, union tcp_addr in_addr, uint8_t prefix, bool set_current, bool set_rnext, uint8_t sndid, uint8_t rcvid) argument 213 try_add_current_rnext_key(char *tst_name, int sk, const char *key, uint8_t keyflags, union tcp_addr in_addr, uint8_t prefix, bool set_current, bool set_rnext, uint8_t sndid, uint8_t rcvid, fault_t inj) argument 454 struct test_key *key = &collection.keys[index]; local 513 test_key_error(const char *msg, struct test_key *key) argument 593 struct test_key *key = &collection.keys[i]; local 639 struct test_key *key = &collection.keys[i]; local 700 struct test_key *key = &collection.keys[i]; local 970 struct test_key *key; local [all...] |
/linux-master/tools/testing/selftests/bpf/ |
H A D | test_lpm_map.c | 33 uint8_t key[]; member in struct:tlpm_node 37 const uint8_t *key, 41 const uint8_t *key, 50 node = tlpm_match(list, key, n_bits); 52 memcpy(node->key, key, n); 56 /* add new entry with @key/@n_bits to @list and return new head */ 63 memcpy(node->key, key, n); 81 const uint8_t *key, 40 tlpm_add(struct tlpm_node *list, const uint8_t *key, size_t n_bits) argument 80 tlpm_match(struct tlpm_node *list, const uint8_t *key, size_t n_bits) argument 109 tlpm_delete(struct tlpm_node *list, const uint8_t *key, size_t n_bits) argument 190 uint8_t key[] = { rand() % 0xff, rand() % 0xff }; local 214 struct bpf_lpm_trie_key_u8 *key; local 426 struct bpf_lpm_trie_key_u8 *key; local 689 } key[MAX_TEST_KEYS]; member in struct:lpm_mt_test_info [all...] |
H A D | test_maps.c | 39 long long key, next_key, first_key, value; local 42 fd = bpf_map_create(BPF_MAP_TYPE_HASH, NULL, sizeof(key), sizeof(value), 2, &map_opts); 48 key = 1; 50 /* Insert key=1 element. */ 51 assert(bpf_map_update_elem(fd, &key, &value, BPF_ANY) == 0); 55 assert(bpf_map_update_elem(fd, &key, &value, BPF_NOEXIST) < 0 && 56 /* key=1 already exists. */ 60 assert(bpf_map_update_elem(fd, &key, &value, -1) < 0 && 63 /* Check that key=1 can be found. */ 64 assert(bpf_map_lookup_elem(fd, &key, 156 long long key, next_key, first_key; local 271 long long key, value[VALUE_SIZE] = {}; local 293 long long key, value[VALUE_SIZE], next_key; local 331 long long key, next_first, next_second; local 363 int key, next_key, fd; local 419 int key, next_key, fd, i; local 482 int key, fd, i; local 514 __u32 key, value; local 528 __u32 key, value; local 670 __u32 key, value; local 1315 } key; local 1408 map_update_retriable(int map_fd, const void *key, const void *value, int flags, int attempts, retry_for_error_fn need_retry) argument 1427 map_delete_retriable(int map_fd, const void *key, int attempts) argument 1449 int i, key, value, err; local 1478 int i, fd, key = 0, value = 0, j = 0; local 1536 int fd, key = 0, value = 0; local 1565 int fd, key = 0, value = 0; local [all...] |
/linux-master/net/ipv4/ |
H A D | tcp_ao.c | 22 int tcp_ao_calc_traffic_key(struct tcp_ao_key *mkt, u8 *key, void *ctx, argument 29 mkt->key, mkt->keylen)) 37 ahash_request_set_crypt(hp->req, &sg, key, len); 46 memset(key, 0, tcp_ao_digest_size(mkt)); 55 if (!static_branch_unlikely(&tcp_ao_needed.key)) 114 struct tcp_ao_key *key; local 116 hlist_for_each_entry_rcu(key, &ao->head, node) { 117 if ((sndid >= 0 && key->sndid != sndid) || 118 (rcvid >= 0 && key->rcvid != rcvid)) 120 return key; 139 __tcp_ao_key_cmp(const struct tcp_ao_key *key, int l3index, const union tcp_ao_addr *addr, u8 prefixlen, int family, int sndid, int rcvid) argument 175 tcp_ao_key_cmp(const struct tcp_ao_key *key, int l3index, const union tcp_ao_addr *addr, u8 prefixlen, int family, int sndid, int rcvid) argument 196 struct tcp_ao_key *key; local 242 tcp_ao_copy_key(struct sock *sk, struct tcp_ao_key *key) argument 263 struct tcp_ao_key *key = container_of(head, struct tcp_ao_key, rcu); local 272 struct tcp_ao_key *key; local 302 struct tcp_ao_key *key; local 319 tcp_v4_ao_calc_key(struct tcp_ao_key *mkt, u8 *key, __be32 saddr, __be32 daddr, __be16 sport, __be16 dport, __be32 sisn, __be32 disn) argument 355 tcp_v4_ao_calc_key_sk(struct tcp_ao_key *mkt, u8 *key, const struct sock *sk, __be32 sisn, __be32 disn, bool send) argument 369 tcp_ao_calc_key_sk(struct tcp_ao_key *mkt, u8 *key, const struct sock *sk, __be32 sisn, __be32 disn, bool send) argument 383 tcp_v4_ao_calc_key_rsk(struct tcp_ao_key *mkt, u8 *key, struct request_sock *req) argument 395 tcp_v4_ao_calc_key_skb(struct tcp_ao_key *mkt, u8 *key, const struct sk_buff *skb, __be32 sisn, __be32 disn) argument 406 tcp_ao_calc_key_skb(struct tcp_ao_key *mkt, u8 *key, const struct sk_buff *skb, __be32 sisn, __be32 disn, int family) argument 541 tcp_ao_hash_hdr(unsigned short int family, char *ao_hash, struct tcp_ao_key *key, const u8 *tkey, const union tcp_ao_addr *daddr, const union tcp_ao_addr *saddr, const struct tcphdr *th, u32 sne) argument 602 tcp_ao_hash_skb(unsigned short int family, char *ao_hash, struct tcp_ao_key *key, const struct sock *sk, const struct sk_buff *skb, const u8 *tkey, int hash_offset, u32 sne) argument 653 tcp_v4_ao_hash_skb(char *ao_hash, struct tcp_ao_key *key, const struct sock *sk, const struct sk_buff *skb, const u8 *tkey, int hash_offset, u32 sne) argument 705 tcp_ao_prepare_reset(const struct sock *sk, struct sk_buff *skb, const struct tcp_ao_hdr *aoh, int l3index, u32 seq, struct tcp_ao_key **key, char **traffic_key, bool *allocated_traffic_key, u8 *keyid, u32 *sne) argument 790 tcp_ao_transmit_skb(struct sock *sk, struct sk_buff *skb, struct tcp_ao_key *key, struct tcphdr *th, __u8 *hash_location) argument 852 struct tcp_ao_key *key; local 882 tcp_ao_verify_hash(const struct sock *sk, const struct sk_buff *skb, unsigned short int family, struct tcp_ao_info *info, const struct tcp_ao_hdr *aoh, struct tcp_ao_key *key, u8 *traffic_key, u8 *phash, u32 sne, int l3index) argument 933 struct tcp_ao_key *key; local 1072 struct tcp_ao_key *key; local 1132 struct tcp_ao_key *key; local 1146 struct tcp_ao_key *key; local 1164 struct tcp_ao_key *key, *new_key, *first_key; local 1309 tcp_ao_parse_crypto(struct tcp_ao_add *cmd, struct tcp_ao_key *key) argument 1525 struct tcp_ao_key *key; local 1573 struct tcp_ao_key *key; local 1734 tcp_ao_delete_key(struct sock *sk, struct tcp_ao_info *ao_info, bool del_async, struct tcp_ao_key *key, struct tcp_ao_key *new_current, struct tcp_ao_key *new_rnext) argument 1787 struct tcp_ao_key *key, *new_current = NULL, *new_rnext = NULL; local 2079 struct tcp_ao_key *key, *current_key; local 2345 struct tcp_ao_key *key; local [all...] |
/linux-master/drivers/net/wireless/silabs/wfx/ |
H A D | key.h | 17 struct ieee80211_sta *sta, struct ieee80211_key_conf *key);
|
/linux-master/drivers/net/ethernet/mellanox/mlx5/core/esw/ |
H A D | vporttbl.c | 6 /* This struct is used as a key to the hash table and we need it to be packed 21 struct mlx5_vport_key key; member in struct:mlx5_vport_table 57 struct mlx5_vport_key *key) 59 key->vport = attr->vport; 60 key->chain = attr->chain; 61 key->prio = attr->prio; 62 key->vhca_id = MLX5_CAP_GEN(esw->dev, vhca_id); 63 key->vport_ns = attr->vport_ns; 64 return jhash(key, sizeof(*key), 55 flow_attr_to_vport_key(struct mlx5_eswitch *esw, struct mlx5_vport_tbl_attr *attr, struct mlx5_vport_key *key) argument 69 esw_vport_tbl_lookup(struct mlx5_eswitch *esw, struct mlx5_vport_key *skey, u32 key) argument 135 struct mlx5_vport_key key; local [all...] |
/linux-master/include/linux/ |
H A D | pr.h | 14 u64 key; member in struct:pr_held_reservation 22 int (*pr_reserve)(struct block_device *bdev, u64 key, 24 int (*pr_release)(struct block_device *bdev, u64 key, 28 int (*pr_clear)(struct block_device *bdev, u64 key);
|
/linux-master/certs/ |
H A D | system_keyring.c | 20 static struct key *builtin_trusted_keys; 22 static struct key *secondary_trusted_keys; 25 static struct key *machine_trusted_keys; 28 static struct key *platform_trusted_keys; 38 * @type: The type of key being added. 39 * @payload: The payload of the new key. 42 * Restrict the addition of keys into a keyring based on the key-to-be-added 43 * being vouched for by a key in the built in system keyring. 45 int restrict_link_by_builtin_trusted(struct key *dest_keyring, 48 struct key *restriction_ke 167 key_ref_t key; local [all...] |
/linux-master/samples/bpf/ |
H A D | offwaketime.bpf.c | 29 __type(key, struct key_t); 36 __type(key, u32); 48 __type(key, u32); 80 struct key_t key; local 82 __builtin_memset(&key.waker, 0, sizeof(key.waker)); 83 bpf_get_current_comm(&key.target, sizeof(key.target)); 84 key.tret = bpf_get_stackid(ctx, &stackmap, STACKID_FLAGS); 85 key [all...] |