/linux-master/net/ipv4/ |
H A D | inet_fragment.c | 350 *prev = rhashtable_lookup_get_insert_key(&fqdir->rhashtable, &q->key, 362 struct inet_frag_queue *inet_frag_find(struct fqdir *fqdir, void *key) argument 373 prev = rhashtable_lookup(&fqdir->rhashtable, key, fqdir->f->rhash_params); 375 fq = inet_frag_create(fqdir, key, &prev);
|
/linux-master/mm/ |
H A D | filemap.c | 1093 struct wait_page_key *key = arg; local 1097 if (!wake_page_match(wait_page, key)) 1106 if (test_bit(key->bit_nr, &key->folio->flags)) 1109 if (test_and_set_bit(key->bit_nr, &key->folio->flags)) 1144 struct wait_page_key key; local 1147 key.folio = folio; 1148 key.bit_nr = bit_nr; 1149 key [all...] |
/linux-master/kernel/ |
H A D | sys.c | 25 #include <linux/key.h>
|
/linux-master/kernel/bpf/ |
H A D | helpers.c | 38 BPF_CALL_2(bpf_map_lookup_elem, struct bpf_map *, map, void *, key) 42 return (unsigned long) map->ops->map_lookup_elem(map, key); 54 BPF_CALL_4(bpf_map_update_elem, struct bpf_map *, map, void *, key, 59 return map->ops->map_update_elem(map, key, value, flags); 73 BPF_CALL_2(bpf_map_delete_elem, struct bpf_map *, map, void *, key) 77 return map->ops->map_delete_elem(map, key); 130 BPF_CALL_3(bpf_map_lookup_percpu_elem, struct bpf_map *, map, void *, key, u32, cpu) 133 return (unsigned long) map->ops->map_lookup_percpu_elem(map, key, cpu); 1125 void *key; local 1143 /* compute the key */ [all...] |
H A D | bloom_filter.c | 78 static int bloom_map_get_next_key(struct bpf_map *map, void *key, void *next_key) argument 170 static void *bloom_map_lookup_elem(struct bpf_map *map, void *key) argument 176 static long bloom_map_update_elem(struct bpf_map *map, void *key, argument
|
H A D | arena.c | 83 static int arena_map_get_next_key(struct bpf_map *map, void *key, void *next_key) argument 190 static void *arena_map_lookup_elem(struct bpf_map *map, void *key) argument 195 static long arena_map_update_elem(struct bpf_map *map, void *key, argument
|
/linux-master/include/net/ |
H A D | cfg80211.h | 779 * struct key_params - key information 781 * Information about a key 783 * @key: key material 784 * @key_len: length of key material 790 * @vlan_id: vlan_id for VLAN group key (if nonzero) 791 * @mode: key install mode (RX_TX, NO_TX or SET_TX) 794 const u8 *key; member in struct:key_params 1225 * @cipher_group: group key cipher suite (or 0 if unset) 1227 * @ciphers_pairwise: unicast key ciphe 3037 const u8 *key; member in struct:cfg80211_auth_request 3343 const u8 *key; member in struct:cfg80211_connect_params [all...] |
/linux-master/include/linux/ |
H A D | skbuff.h | 1515 const struct flow_dissector_key *key,
|
/linux-master/fs/ |
H A D | exec.c | 45 #include <linux/key.h>
|
/linux-master/fs/btrfs/ |
H A D | zoned.c | 294 struct btrfs_key key; local 299 key.objectid = 1; 300 key.type = BTRFS_DEV_EXTENT_KEY; 301 key.offset = 0; 307 ret = btrfs_search_slot(NULL, root, &key, path, 0, 0); 1217 struct btrfs_key key; local 1241 key.objectid = cache->start + cache->length; 1242 key.type = 0; 1243 key.offset = 0; 1245 root = btrfs_extent_root(fs_info, key [all...] |
H A D | block-group.c | 571 * @key: return value parameter for the item we find 673 struct btrfs_key key; local 685 ret = sample_block_group_extent_item(caching_ctl, block_group, i, 5, &key); 690 min_size = min_t(u64, min_size, key.offset); 709 struct btrfs_key key; local 742 key.objectid = last; 743 key.offset = 0; 744 key.type = BTRFS_EXTENT_ITEM_KEY; 747 ret = btrfs_search_slot(NULL, extent_root, &key, path, 0, 0); 761 btrfs_item_key_to_cpu(leaf, &key, pat 1031 struct btrfs_key key; local 1970 read_bg_from_eb(struct btrfs_fs_info *fs_info, struct btrfs_key *key, struct btrfs_path *path) argument 2017 find_first_block_group(struct btrfs_fs_info *fs_info, struct btrfs_path *path, struct btrfs_key *key) argument 2285 read_one_block_group(struct btrfs_fs_info *info, struct btrfs_block_group_item *bgi, const struct btrfs_key *key, int need_clear) argument 2460 struct btrfs_key key; local 2577 struct btrfs_key key; local 2612 struct btrfs_key key; local 3046 struct btrfs_key key; local [all...] |
/linux-master/drivers/net/wireless/intel/iwlwifi/mvm/ |
H A D | rxmq.c | 281 struct ieee80211_key_conf *key; local 305 /* key mismatch - will also report !MIC_OK but we shouldn't count it */ 320 key = rcu_dereference(mvmvif->bcn_prot.keys[0]); 321 if (!key) { 322 key = rcu_dereference(mvmvif->bcn_prot.keys[1]); 323 if (!key) 327 if (len < key->icv_len + IEEE80211_GMAC_PN_LEN + 2) 330 /* get the real key ID */ 331 keyid = frame[len - key->icv_len - IEEE80211_GMAC_PN_LEN - 2]; 332 /* and if that's the other key, loo [all...] |
H A D | mvm.h | 1007 * A bitmap indicating the index of the key in use. The firmware 1699 memcpy(tx_cmd->key, keyconf->key, keyconf->keylen); 2699 struct ieee80211_key_conf *key);
|
H A D | mac80211.c | 90 struct ieee80211_key_conf *key); 525 /* The new Tx API does not allow to pass the key or keyid of a MPDU to 526 * the hw, preventing us to control which key(id) to use per MPDU. 2806 struct ieee80211_key_conf *key = mvmvif->ap_early_keys[i]; local 2808 if (!key) 2813 *ret = __iwl_mvm_mac_set_key(hw, SET_KEY, vif, NULL, key); 4151 struct ieee80211_key_conf *key) 4157 int keyidx = key->keyidx; 4166 switch (key->cipher) { 4169 key 4147 __iwl_mvm_mac_set_key(struct ieee80211_hw *hw, enum set_key_cmd cmd, struct ieee80211_vif *vif, struct ieee80211_sta *sta, struct ieee80211_key_conf *key) argument 4389 iwl_mvm_mac_set_key(struct ieee80211_hw *hw, enum set_key_cmd cmd, struct ieee80211_vif *vif, struct ieee80211_sta *sta, struct ieee80211_key_conf *key) argument [all...] |
H A D | d3.c | 82 static const u8 *iwl_mvm_find_max_pn(struct ieee80211_key_conf *key, argument 91 ieee80211_get_key_rx_seq(key, tid, seq); 112 struct ieee80211_key_conf *key, 120 switch (key->cipher) { 133 .wep_key.key_index = key->keyidx, 134 .wep_key.key_size = key->keylen, 138 * This will fail -- the key functions don't set support 142 if (key->flags & IEEE80211_KEY_FLAG_PAIRWISE) 145 memcpy(&wkc.wep_key.key[3], key 109 iwl_mvm_wowlan_program_keys(struct ieee80211_hw *hw, struct ieee80211_vif *vif, struct ieee80211_sta *sta, struct ieee80211_key_conf *key, void *_data) argument 219 iwl_mvm_wowlan_get_rsc_tsc_data(struct ieee80211_hw *hw, struct ieee80211_vif *vif, struct ieee80211_sta *sta, struct ieee80211_key_conf *key, void *_data) argument 338 iwl_mvm_wowlan_get_rsc_v5_data(struct ieee80211_hw *hw, struct ieee80211_vif *vif, struct ieee80211_sta *sta, struct ieee80211_key_conf *key, void *_data) argument 525 iwl_mvm_wowlan_get_tkip_data(struct ieee80211_hw *hw, struct ieee80211_vif *vif, struct ieee80211_sta *sta, struct ieee80211_key_conf *key, void *_data) argument 591 iwl_mvm_wowlan_gtk_type_iter(struct ieee80211_hw *hw, struct ieee80211_vif *vif, struct ieee80211_sta *sta, struct ieee80211_key_conf *key, void *_data) argument 1416 u8 key[WOWLAN_KEY_MAX_SIZE]; member in struct:iwl_multicast_key_data 1438 u8 key[WOWLAN_KEY_MAX_SIZE]; member in struct:iwl_wowlan_status_data::__anon38 1647 iwl_mvm_set_key_rx_seq_tids(struct ieee80211_key_conf *key, struct ieee80211_key_seq *seq) argument 1656 iwl_mvm_set_aes_ptk_rx_seq(struct iwl_mvm *mvm, struct iwl_wowlan_status_data *status, struct ieee80211_sta *sta, struct ieee80211_key_conf *key) argument 1769 iwl_mvm_set_key_rx_seq_idx(struct ieee80211_key_conf *key, struct iwl_wowlan_status_data *status, int idx) argument 1787 iwl_mvm_set_key_rx_seq(struct ieee80211_key_conf *key, struct iwl_wowlan_status_data *status, bool installed) argument 1826 iwl_mvm_d3_find_last_keys(struct ieee80211_hw *hw, struct ieee80211_vif *vif, struct ieee80211_sta *sta, struct ieee80211_key_conf *key, void *_data) argument 1875 iwl_mvm_d3_set_igtk_bigtk_ipn(const struct iwl_multicast_key_data *key, struct ieee80211_key_seq *seq, u32 cipher) argument 1895 iwl_mvm_d3_update_igtk_bigtk(struct iwl_wowlan_status_data *status, struct ieee80211_key_conf *key, struct iwl_multicast_key_data *key_data) argument 1912 iwl_mvm_d3_update_keys(struct ieee80211_hw *hw, struct ieee80211_vif *vif, struct ieee80211_sta *sta, struct ieee80211_key_conf *key, void *_data) argument 1981 struct ieee80211_key_conf *key; local 1984 u8 key[32]; member in struct:__anon43 2047 u8 key[WOWLAN_KEY_MAX_SIZE]; member in struct:__anon44 [all...] |
/linux-master/drivers/net/ethernet/intel/ixgbe/ |
H A D | ixgbe_ipsec.c | 18 * @key: key byte array 22 u32 key[], u32 salt) 29 (__force u32)cpu_to_be32(key[3 - i])); 68 * @key: key byte array 74 u32 key[], u32 salt, u32 mode, u32 ip_idx) 86 /* store the key, salt, and mode */ 89 (__force u32)cpu_to_be32(key[3 - i])); 327 r->key, 21 ixgbe_ipsec_set_tx_sa(struct ixgbe_hw *hw, u16 idx, u32 key[], u32 salt) argument 73 ixgbe_ipsec_set_rx_sa(struct ixgbe_hw *hw, u16 idx, __be32 spi, u32 key[], u32 salt, u32 mode, u32 ip_idx) argument [all...] |
/linux-master/drivers/net/ethernet/intel/ice/ |
H A D | ice_lib.c | 1518 u8 *lut, *key; local 1557 key = kzalloc(ICE_GET_SET_RSS_KEY_EXTEND_KEY_SIZE, GFP_KERNEL); 1558 if (!key) { 1564 memcpy(key, vsi->rss_hkey_user, ICE_GET_SET_RSS_KEY_EXTEND_KEY_SIZE); 1566 netdev_rss_key_fill((void *)key, ICE_GET_SET_RSS_KEY_EXTEND_KEY_SIZE); 1568 err = ice_set_rss_key(vsi, key); 1572 kfree(key);
|
/linux-master/drivers/net/ethernet/hisilicon/hns3/hns3pf/ |
H A D | hclge_main.c | 4753 u8 *key, u8 *hfunc) 4759 hclge_comm_get_rss_hash_info(rss_cfg, key, hfunc); 4768 const u8 *key, const u8 hfunc) 4776 ret = hclge_comm_set_rss_hash_key(rss_cfg, &hdev->hw.hw, key, hfunc); 4883 u8 *key = hdev->rss_cfg.rss_hash_key; local 4892 ret = hclge_comm_set_rss_algo_key(&hdev->hw.hw, hfunc, key); 5453 dev_err(&hdev->pdev->dev, "set fd key fail, ret=%d\n", ret); 5508 /* If use max 400bit key, we can support tuples for ether type */ 5533 int loc, u8 *key, bool is_add) 5557 if (key) { 4752 hclge_get_rss(struct hnae3_handle *handle, u32 *indir, u8 *key, u8 *hfunc) argument 4767 hclge_set_rss(struct hnae3_handle *handle, const u32 *indir, const u8 *key, const u8 hfunc) argument 5532 hclge_fd_tcam_config(struct hclge_dev *hdev, u8 stage, bool sel_x, int loc, u8 *key, bool is_add) argument [all...] |
/linux-master/drivers/net/ethernet/hisilicon/hns3/ |
H A D | hns3_ethtool.c | 967 return h->ae_algo->ops->get_rss(h, rxfh->indir, rxfh->key, 996 return h->ae_algo->ops->set_rss(h, rxfh->indir, rxfh->key,
|
/linux-master/kernel/printk/ |
H A D | printk.c | 420 * Optionally, a record can carry a dictionary of properties (key/value 456 * The optional key/value pairs are attached as continuation lines starting 673 const char *key, const char *val) 682 len += msg_add_ext_text(buf + len, size - len, key, strlen(key), '='); 672 msg_add_dict_text(char *buf, size_t size, const char *key, const char *val) argument
|
/linux-master/crypto/ |
H A D | testmgr.h | 29 * @key: Pointer to key (NULL if none) 33 * @ksize: Length of @key in bytes (0 if no key) 39 const char *key; member in struct:hash_testvec 51 * @key: Pointer to key 52 * @klen: Length of @key in bytes 59 * ( e.g. test needs to fail due to a weak key ) 67 const char *key; member in struct:cipher_testvec 108 const char *key; member in struct:aead_testvec 125 const char *key; member in struct:cprng_testvec 152 const unsigned char *key; member in struct:akcipher_testvec [all...] |
/linux-master/crypto/asymmetric_keys/ |
H A D | x509_cert_parser.c | 22 const void *key; /* Key data */ member in struct:x509_parse_context 23 size_t key_size; /* Size of key data */ 25 size_t params_size; /* Size of key parameters */ 26 enum OID key_algo; /* Algorithm used by the cert's key */ 103 cert->pub->key = kmemdup(ctx->key, ctx->key_size, GFP_KERNEL); 104 if (!cert->pub->key) 121 /* Generate cert issuer + serial number key ID */ 490 * Extract the parameters for the public key 503 if (!ctx->cert->raw_subject || ctx->key) [all...] |
H A D | signature.c | 2 /* Signature verification with an asymmetric key 21 * Destroy a public key signature. 38 * query_asymmetric_key - Get information about an asymmetric key. 46 struct key *key = params->key; local 51 if (key->type != &key_type_asymmetric) 53 subtype = asymmetric_key_subtype(key); 55 !key->payload.data[0]) 68 * encrypt_blob - Encrypt data using an asymmetric key 137 verify_signature(const struct key *key, const struct public_key_signature *sig) argument [all...] |
H A D | public_key.c | 2 /* In-software asymmetric public-key crypto subtype 23 MODULE_DESCRIPTION("In-software asymmetric public-key subtype"); 28 * Provide a part of a description of the key for /proc/keys. 30 static void public_key_describe(const struct key *asymmetric_key, 33 struct public_key *key = asymmetric_key->payload.data[asym_crypto]; local 35 if (key) 36 seq_printf(m, "%s.%s", key->id_type, key->pkey_algo); 40 * Destroy a public key algorithm key 42 public_key_free(struct public_key *key) argument 167 u8 *key, *ptr; local 283 char *key, *ptr; local 387 char *key, *ptr; local 456 public_key_verify_signature_2(const struct key *key, const struct public_key_signature *sig) argument [all...] |
/linux-master/tools/testing/selftests/net/forwarding/ |
H A D | vxlan_bridge_1d_ipv6.sh | 512 local key 523 for key in ${!t0s[@]}; do 524 local delta=$((t1s[$key] - t0s[$key])) 525 local expect=${expects[$key]} 528 check_err $? "${counters[$key]}: Expected to capture $expect packets, got $delta."
|