/linux-master/arch/arm64/kernel/ |
H A D | ptrace.c | 1293 static __uint128_t pac_key_to_user(const struct ptrauth_key *key) argument 1295 return (__uint128_t)key->hi << 64 | key->lo; 1300 struct ptrauth_key key = { local 1305 return key;
|
/linux-master/security/ |
H A D | security.c | 4292 * security_watch_key() - Check if a task is allowed to watch for key events 4293 * @key: the key to watch 4296 * a key or keyring. 4300 int security_watch_key(struct key *key) argument 4302 return call_int_hook(watch_key, key); 5245 * security_key_alloc() - Allocate and initialize a kernel key LSM blob 5246 * @key: key 5255 security_key_alloc(struct key *key, const struct cred *cred, unsigned long flags) argument 5267 security_key_free(struct key *key) argument 5301 security_key_getsecurity(struct key *key, char **buffer) argument 5318 security_key_post_create_or_update(struct key *keyring, struct key *key, const void *payload, size_t payload_len, unsigned long flags, bool create) argument [all...] |
/linux-master/fs/bcachefs/ |
H A D | btree_iter.c | 106 return bpos_gt(path->pos, b->key.k.p); 131 BUG_ON(ck->key.btree_id != path->btree_id || 132 !bkey_eq(ck->key.pos, path->pos)); 213 panic("path should be %s key at level %u:\n" 215 "prev key %s\n" 216 "cur key %s\n", 356 bkey_le(pos, path->l[0].b->key.k.p)) 457 /* Iterator is after key that changed */ 463 /* Iterator hasn't gotten to the key that changed yet: */ 475 /* Iterator is after key tha [all...] |
/linux-master/arch/x86/kernel/ |
H A D | kvm.c | 113 u32 key = hash_32(token, KVM_TASK_SLEEP_HASHBITS); local 114 struct kvm_task_sleep_head *b = &async_pf_sleepers[key]; 193 u32 key = hash_32(token, KVM_TASK_SLEEP_HASHBITS); local 194 struct kvm_task_sleep_head *b = &async_pf_sleepers[key];
|
/linux-master/scripts/kconfig/lxdialog/ |
H A D | util.c | 525 * out one menu too much. Filter away all escaped key sequences since 531 int key; local 537 key = wgetch(win); 544 if (key == KEY_ESC && key2 == ERR) 546 else if (key != ERR && key != KEY_ESC && key2 == ERR) 547 ungetch(key);
|
H A D | textbox.c | 155 int i, x, y, cur_x, cur_y, key = 0; local 236 key = wgetch(dialog); 237 switch (key) { 307 if (key == '0') 336 if (extra_key_cb && extra_key_cb(key, start, end, data)) { 357 return key;
|
H A D | yesno.c | 31 int i, x, y, key = 0, button = 0; local 65 while (key != KEY_ESC) { 66 key = wgetch(dialog); 67 switch (key) { 80 button = ((key == KEY_LEFT ? --button : ++button) < 0) ? 1 : (button > 1 ? 0 : button); 90 key = on_key_esc(dialog); 100 return key; /* ESC pressed */
|
H A D | menubox.c | 168 int key = 0, button = 0, scroll = 0, choice = 0; local 261 while (key != KEY_ESC) { 262 key = wgetch(menu); 264 if (key < 256 && isalpha(key)) 265 key = tolower(key); 267 if (strchr("ynmh", key)) 273 if (key == tolower(item_str()[j])) 280 if (key [all...] |
H A D | checklist.c | 108 int key = 0, button = 0, choice = 0, scroll = 0, max_choice; local 194 while (key != KEY_ESC) { 195 key = wgetch(dialog); 199 if (toupper(key) == toupper(item_str()[0])) 203 if (i < max_choice || key == KEY_UP || key == KEY_DOWN || 204 key == '+' || key == '-') { 205 if (key == KEY_UP || key [all...] |
H A D | inputbox.c | 35 int input_x = 0, key = 0, button = -1; local 106 while (key != KEY_ESC) { 107 key = wgetch(dialog); 110 switch (key) { 185 if (key < 0x100 && isprint(key)) { 191 instr[pos] = key; 193 instr[len] = key; 221 switch (key) { 275 key [all...] |
/linux-master/drivers/scsi/qla2xxx/ |
H A D | qla_target.c | 184 uint32_t key; local 191 key = be_to_port_id(d_id).b24; 193 host = btree_lookup32(&vha->hw->host_map, key); 196 "Unable to find host %06x\n", key); 1622 u64 key = 0; local 1649 btree_for_each_safe64(&tgt->lun_qpair_map, key, node) 1650 btree_remove64(&tgt->lun_qpair_map, key); 2011 uint32_t key; local 2014 key = sid_to_key(s_id); 2023 if (op_key == key 4241 u64 key = 0; local 4700 uint32_t key; local 6489 u32 key = 0; local [all...] |
/linux-master/drivers/md/ |
H A D | dm-integrity.c | 160 __u8 *key; member in struct:alg_spec 394 ic->internal_hash_alg.key || ic->journal_mac_alg.key : 395 ic->internal_hash_alg.key && !ic->journal_mac_alg.key) 3763 kfree_sensitive(a->key); 3785 a->key = kmalloc(a->key_size, GFP_KERNEL); 3786 if (!a->key) 3788 if (hex2bin(a->key, a->key_string, a->key_size)) 3815 if (a->key) { [all...] |
/linux-master/drivers/gpu/drm/i915/display/ |
H A D | skl_universal_plane.c | 918 const struct drm_intel_sprite_colorkey *key = &plane_state->ckey; local 942 if (key->flags & I915_SET_COLORKEY_DESTINATION) 944 else if (key->flags & I915_SET_COLORKEY_SOURCE) 1073 const struct drm_intel_sprite_colorkey *key = &plane_state->ckey; local 1075 return key->min_value; 1080 const struct drm_intel_sprite_colorkey *key = &plane_state->ckey; local 1083 return (key->max_value & 0xffffff) | PLANE_KEYMAX_ALPHA(alpha); 1088 const struct drm_intel_sprite_colorkey *key = &plane_state->ckey; local 1092 keymsk = key->channel_mask & 0x7ffffff;
|
/linux-master/block/ |
H A D | blk-mq.c | 1778 int flags, void *key) 1777 blk_mq_dispatch_wake(wait_queue_entry_t *wait, unsigned mode, int flags, void *key) argument
|
/linux-master/tools/testing/selftests/bpf/prog_tests/ |
H A D | verifier.c | 209 int err, key = 0; local 217 err = bpf_map_update_elem(bpf_map__fd(map), &key, &value, 0);
|
H A D | bloom_filter_map.c | 15 /* Invalid key size */ 17 if (!ASSERT_LT(fd, 0, "bpf_map_create bloom filter invalid key size")) 107 int outer_map_fd, inner_map_fd, err, i, key = 0; local 124 err = bpf_map_update_elem(outer_map_fd, &key, &inner_map_fd, BPF_ANY); 141 err = bpf_map_delete_elem(outer_map_fd, &key);
|
/linux-master/tools/net/ynl/ |
H A D | ynl-gen-c.py | 730 def __getitem__(self, key): 731 return self.attrs[key] 1341 local_vars.sort(key=len, reverse=True)
|
/linux-master/tools/lib/bpf/ |
H A D | libbpf.c | 2332 * encodes `type => BPF_MAP_TYPE_ARRAY` key/value pair completely using BTF 2480 pr_warn("map '%s': conflicting key size %u != %u.\n", 2486 } else if (strcmp(name, "key") == 0) { 2491 pr_warn("map '%s': key type [%d] not found.\n", 2496 pr_warn("map '%s': key spec is not PTR: %s.\n", 2502 pr_warn("map '%s': can't determine key size for type [%u]: %zd.\n", 2507 pr_warn("map '%s': conflicting key size %u != %zd.\n", 2719 pr_debug("map '%s': found key [%u], sz = %u.\n", 5680 static size_t bpf_core_hash_fn(const long key, void *ctx) argument 5682 return key; 6181 cmp_relo_by_insn_idx(const void *key, const void *elem) argument 10339 bpf_map__lookup_elem(const struct bpf_map *map, const void *key, size_t key_sz, void *value, size_t value_sz, __u64 flags) argument 10352 bpf_map__update_elem(const struct bpf_map *map, const void *key, size_t key_sz, const void *value, size_t value_sz, __u64 flags) argument 10365 bpf_map__delete_elem(const struct bpf_map *map, const void *key, size_t key_sz, __u64 flags) argument 10377 bpf_map__lookup_and_delete_elem(const struct bpf_map *map, const void *key, size_t key_sz, void *value, size_t value_sz, __u64 flags) argument [all...] |
/linux-master/tools/bpf/bpftool/ |
H A D | gen.c | 1918 static size_t btfgen_hash_fn(long key, void *ctx) argument 1920 return key;
|
/linux-master/net/tls/ |
H A D | tls_sw.c | 2694 char *iv, *rec_seq, *key, *salt; local 2736 key = crypto_info_key(crypto_info, cipher_desc); 2755 rc = crypto_aead_setkey(*aead, key, cipher_desc->key);
|
/linux-master/net/mac80211/ |
H A D | ieee80211_i.h | 33 #include "key.h" 177 struct ieee80211_key *key; member in struct:ieee80211_tx_data 221 struct ieee80211_key *key; member in struct:ieee80211_rx_data 405 u8 key[WLAN_KEY_LEN_WEP104]; member in struct:ieee80211_mgd_auth_data 709 * @rht: hash table containing struct ieee80211_mesh_fast_tx, using skb DA as key 2439 const u8 *da, const u8 *key, u8 key_len, u8 key_idx,
|
H A D | cfg.c | 35 * the return value at all (if it's not a pairwise key), 439 struct ieee80211_key *key; local 455 key = wiphy_dereference(local->hw.wiphy, sta->ptk[key_idx]); 457 if (key && key->conf.flags & IEEE80211_KEY_FLAG_NO_AUTO_TX) 458 ret = ieee80211_set_tx_key(key); 472 struct ieee80211_key *key; local 500 key = ieee80211_key_alloc(params->cipher, key_idx, params->key_len, 501 params->key, params->seq_len, params->seq); 502 if (IS_ERR(key)) 579 struct ieee80211_key *key; local 638 struct ieee80211_key *key; local 660 struct ieee80211_key *key; local [all...] |
/linux-master/net/ipv6/netfilter/ |
H A D | nf_conntrack_reasm.c | 149 struct frag_v6_compare_key key = { local 158 q = inet_frag_find(nf_frag->fqdir, &key);
|
/linux-master/net/ipv4/ |
H A D | tcp.c | 3459 __u8 key[TCP_FASTOPEN_KEY_BUF_LENGTH]; local 3462 /* Allow a backup key as well to facilitate key rotation 3463 * First key is the active one. 3469 if (copy_from_sockptr(key, optval, optlen)) 3473 backup_key = key + TCP_FASTOPEN_KEY_LENGTH; 3475 return tcp_fastopen_reset_cipher(net, sk, key, backup_key); 4128 u64 key[TCP_FASTOPEN_KEY_BUF_LENGTH / sizeof(u64)]; local 4134 key_len = tcp_fastopen_get_cipher(net, icsk, key) * 4139 if (copy_to_sockptr(optval, key, le 4416 tcp_md5_hash_key(struct tcp_sigpool *hp, const struct tcp_md5sig_key *key) argument 4445 struct tcp_md5sig_key *key; local [all...] |
H A D | ip_fragment.c | 87 const struct frag_v4_compare_key *key = a; local 89 q->key.v4 = *key; 92 inet_getpeer_v4(net->ipv4.peers, key->saddr, key->vif, 1) : 186 if (frag_expire_skip_icmp(qp->q.key.v4.user) && 208 struct frag_v4_compare_key key = { local 218 q = inet_frag_find(net->ipv4.fqdir, &key); 408 return qp->q.key.v4.user == IP_DEFRAG_LOCAL_DELIVER; 477 net_info_ratelimited("Oversized IP packet from %pI4\n", &qp->q.key 733 const struct frag_v4_compare_key *key = arg->key; local [all...] |