/linux-master/drivers/net/ethernet/freescale/dpaa2/ |
H A D | dpaa2-eth.c | 3683 u8 key_size = 2; /* VLAN TCI field */ local 3731 key = kzalloc(key_size * 2, GFP_KERNEL); 3736 mask = key + key_size; 3739 key_params.key_iova = dma_map_single(dev, key, key_size * 2, 3747 key_params.mask_iova = key_params.key_iova + key_size; 3748 key_params.key_size = key_size; 3758 key_size * 2, DMA_TO_DEVICE); 3775 dma_unmap_single(dev, key_params.key_iova, key_size * 2, DMA_TO_DEVICE);
|
H A D | dpni.h | 970 * @key_size: key and mask size (in bytes) 975 u8 key_size; member in struct:dpni_rule_cfg
|
/linux-master/tools/lib/bpf/ |
H A D | bpf.c | 170 __u32 key_size, 189 attr.key_size = key_size; 168 bpf_map_create(enum bpf_map_type map_type, const char *map_name, __u32 key_size, __u32 value_size, __u32 max_entries, const struct bpf_map_create_opts *opts) argument
|
H A D | libbpf_internal.h | 268 __u32 key_size; member in struct:btf_map_def
|
/linux-master/drivers/crypto/ccree/ |
H A D | cc_hash.c | 1228 u32 key_size, key_len; local 1234 key_size = CC_AES_128_BIT_KEY_SIZE; 1237 key_size = (ctx->key_params.keylen == 24) ? AES_MAX_KEY_SIZE : 1274 key_size, NS_BIT);
|
/linux-master/tools/testing/selftests/bpf/progs/ |
H A D | verifier_ref_tracking.c | 70 __uint(key_size, sizeof(int));
|
/linux-master/drivers/net/ethernet/netronome/nfp/flower/ |
H A D | main.h | 401 int key_size; member in struct:nfp_fl_key_ls
|
/linux-master/kernel/bpf/ |
H A D | ringbuf.c | 193 if (attr->key_size || attr->value_size ||
|
H A D | bpf_local_storage.c | 676 attr->key_size != sizeof(int) || !attr->value_size ||
|
H A D | stackmap.c | 81 if (attr->max_entries == 0 || attr->key_size != 4 ||
|
H A D | cpumap.c | 90 if (attr->max_entries == 0 || attr->key_size != 4 ||
|
H A D | arena.c | 101 if (attr->key_size || attr->value_size || attr->max_entries == 0 ||
|
/linux-master/tools/perf/util/ |
H A D | bpf_counter.c | 314 return (map_info.key_size == sizeof(struct perf_event_attr)) &&
|
/linux-master/fs/ntfs3/ |
H A D | namei.c | 57 e->key_size = cpu_to_le16(data_size);
|
H A D | frecord.c | 2909 u16 de_key_size = le16_to_cpu(de->key_size); 2944 (*de2)->key_size = cpu_to_le16(de2_key_size); 2976 de_key_size = le16_to_cpu(de2->key_size); 2993 de_key_size = le16_to_cpu(de->key_size); 3022 u16 de_key_size = le16_to_cpu(de->key_size);
|
H A D | fsntfs.c | 2232 sii_e.de.key_size = cpu_to_le16(sizeof(d_security->key.sec_id)); 2248 sdh_e.de.key_size = cpu_to_le16(sizeof(sdh_e.key)); 2390 re.de.key_size = cpu_to_le16(sizeof(re.key));
|
/linux-master/include/linux/ |
H A D | ethtool.h | 620 * @key_size: On SET, the array size of the user buffer for the hash key, 623 * @key: The hash key of size @key_size bytes. 637 u32 key_size; member in struct:ethtool_rxfh_param
|
/linux-master/include/uapi/linux/ |
H A D | bpf.h | 651 * of *key_size* * *count*. The *values* buffer must be of 702 * of *key_size* * *count*. The *values* buffer must be of 752 * size of the map *map_fd*, that is, *key_size* * *count*. 1457 __u32 key_size; /* size of key in bytes */ member in struct:bpf_attr::__anon2589 6581 __u32 key_size; member in struct:bpf_map_info
|
/linux-master/tools/include/uapi/linux/ |
H A D | bpf.h | 651 * of *key_size* * *count*. The *values* buffer must be of 702 * of *key_size* * *count*. The *values* buffer must be of 752 * size of the map *map_fd*, that is, *key_size* * *count*. 1457 __u32 key_size; /* size of key in bytes */ member in struct:bpf_attr::__anon3130 6581 __u32 key_size; member in struct:bpf_map_info
|
/linux-master/drivers/net/ethernet/intel/idpf/ |
H A D | idpf_virtchnl.c | 2404 u16 key_size; local 2441 key_size = min_t(u16, NETDEV_RSS_KEY_LEN, 2443 if (reply_sz < key_size) 2447 if (rss_data->rss_key_size == key_size) 2450 rss_data->rss_key_size = key_size; 2452 rss_data->rss_key = kzalloc(key_size, GFP_KERNEL);
|
/linux-master/drivers/net/wireless/ti/wlcore/ |
H A D | main.c | 3247 u8 id, u8 key_type, u8 key_size, 3256 if (key_size > MAX_KEY_SIZE) 3282 ap_key->key_size = key_size; 3283 memcpy(ap_key->key, key, key_size); 3321 key->key_size, key->key, 3345 u8 key_size, const u8 *key, u32 tx_seq_32, 3372 key_type, key_size, 3377 id, key_type, key_size, 3410 id, key_type, key_size, 3246 wl1271_record_ap_key(struct wl1271 *wl, struct wl12xx_vif *wlvif, u8 id, u8 key_type, u8 key_size, const u8 *key, u8 hlid, u32 tx_seq_32, u16 tx_seq_16, bool is_pairwise) argument 3343 wl1271_set_key(struct wl1271 *wl, struct wl12xx_vif *wlvif, u16 action, u8 id, u8 key_type, u8 key_size, const u8 *key, u32 tx_seq_32, u16 tx_seq_16, struct ieee80211_sta *sta, bool is_pairwise) argument [all...] |
/linux-master/drivers/crypto/ccp/ |
H A D | ccp-ops.c | 1844 if (rsa->key_size > cmd_q->ccp->vdata->rsamax) 1862 o_len = 32 * ((rsa->key_size + 255) / 256); 1939 op.u.rsa.mod_size = rsa->key_size;
|
/linux-master/drivers/md/ |
H A D | dm-integrity.c | 161 unsigned int key_size; member in struct:alg_spec 3784 a->key_size = strlen(a->key_string) / 2; 3785 a->key = kmalloc(a->key_size, GFP_KERNEL); 3788 if (hex2bin(a->key, a->key_string, a->key_size)) 3816 r = crypto_shash_setkey(*hash, a->key, a->key_size); 3876 ic->journal_crypt_alg.key_size);
|
/linux-master/drivers/crypto/intel/qat/qat_common/ |
H A D | qat_asym_algs.c | 470 memcpy(ctx->xa + (ctx->p_size - params.key_size), params.key, 471 params.key_size);
|
/linux-master/drivers/net/phy/ |
H A D | nxp-c45-tja11xx-macsec.c | 493 u32 key_size = ctx->secy->key_len / 4; local 500 for (i = 0; i < key_size; i++) {
|