/linux-master/fs/bcachefs/ |
H A D | btree_node_scan.c | 439 .max_key = b->key.k.p,
|
/linux-master/drivers/scsi/ |
H A D | sd.c | 1912 /* Make sure we have at least the key and type */ 1921 rsv->key = get_unaligned_be64(&data[8]); 1926 static int sd_pr_out_command(struct block_device *bdev, u8 sa, u64 key, argument 1958 put_unaligned_be64(key, &data[0]); 1988 static int sd_pr_reserve(struct block_device *bdev, u64 key, enum pr_type type, argument 1993 return sd_pr_out_command(bdev, 0x01, key, 0, 1997 static int sd_pr_release(struct block_device *bdev, u64 key, enum pr_type type) argument 1999 return sd_pr_out_command(bdev, 0x02, key, 0, 2010 static int sd_pr_clear(struct block_device *bdev, u64 key) argument 2012 return sd_pr_out_command(bdev, 0x03, key, [all...] |
/linux-master/tools/testing/selftests/riscv/hwprobe/ |
H A D | cbo.c | 87 .key = RISCV_HWPROBE_KEY_ZICBOZ_BLOCK_SIZE, 96 ksft_test_result(rc == 0 && pair.key == RISCV_HWPROBE_KEY_ZICBOZ_BLOCK_SIZE && 135 .key = RISCV_HWPROBE_KEY_IMA_EXT_0, 149 assert(rc == 0 && pair.key == RISCV_HWPROBE_KEY_IMA_EXT_0); 199 pair.key = RISCV_HWPROBE_KEY_IMA_EXT_0; 203 assert(rc == 0 && pair.key == RISCV_HWPROBE_KEY_IMA_EXT_0);
|
/linux-master/kernel/sched/ |
H A D | fair.c | 625 * As measured, the max (key * weight) value was ~44 bits for a kernel build. 631 s64 key = entity_key(cfs_rq, se); local 633 cfs_rq->avg_vruntime += key * weight; 641 s64 key = entity_key(cfs_rq, se); local 643 cfs_rq->avg_vruntime -= key * weight; 4211 * propagate its contribution. The key to this propagation is the invariant 7593 * capacity_orig value through the cpuset), the key will be set
|
/linux-master/fs/smb/client/ |
H A D | cifspdu.h | 112 * Size of the crypto key returned on the negotiate SMB in bytes 122 * Size of the session key (crypto key encrypted with the password 619 __u32 Reserved; /* encrypt key len and offset */ 660 __u8 key[CIFS_SERVER_CHALLENGE_SIZE]; member in struct:ntlmv2_resp::__anon52::__anon53 1785 * Size of the resume key on FINDFIRST and FINDNEXT calls 2615 3) FindFirst return unique inode number - what about resume key, two
|
/linux-master/arch/riscv/include/uapi/asm/ |
H A D | hwprobe.h | 16 __s64 key; member in struct:riscv_hwprobe
|
/linux-master/tools/testing/selftests/mm/ |
H A D | run_vmtests.sh | 59 memory protection key tests
|
/linux-master/net/wireless/ |
H A D | nl80211.c | 831 /* policy for the key attributes */ 844 /* policy for the key default flags */ 1303 static int nl80211_parse_key_new(struct genl_info *info, struct nlattr *key, argument 1307 int err = nla_parse_nested_deprecated(tb, NL80211_KEY_MAX, key, 1328 k->p.key = nla_data(tb[NL80211_KEY_DATA]); 1367 k->p.key = nla_data(info->attrs[NL80211_ATTR_KEY_DATA]); 1431 "key with multiple default flags is invalid"); 1438 "defmgmt/defbeacon key must be mcast"); 1447 "defmgmt key idx not 4 or 5"); 1453 "defbeacon key id 1478 struct nlattr *key; local 4451 struct nlattr *key; local 4590 struct key_parse key; local 4699 struct key_parse key; local 4769 struct key_parse key; local 10612 struct key_parse key; local [all...] |
/linux-master/net/tls/ |
H A D | tls.h | 57 unsigned int key; member in struct:tls_cipher_desc
|
/linux-master/net/openvswitch/ |
H A D | conntrack.c | 109 static u16 key_to_nfproto(const struct sw_flow_key *key) argument 111 switch (ntohs(key->eth.type)) { 179 static void __ovs_ct_update_key_orig_tp(struct sw_flow_key *key, argument 183 key->ct_orig_proto = orig->dst.protonum; 185 key->ct.orig_tp.src = htons(orig->dst.u.icmp.type); 186 key->ct.orig_tp.dst = htons(orig->dst.u.icmp.code); 188 key->ct.orig_tp.src = orig->src.u.all; 189 key->ct.orig_tp.dst = orig->dst.u.all; 193 static void __ovs_ct_update_key(struct sw_flow_key *key, u8 state, argument 197 key 237 ovs_ct_update_key(const struct sk_buff *skb, const struct ovs_conntrack_info *info, struct sw_flow_key *key, bool post_ct, bool keep_nat_flags) argument 278 ovs_ct_fill_key(const struct sk_buff *skb, struct sw_flow_key *key, bool post_ct) argument 339 ovs_ct_set_mark(struct nf_conn *ct, struct sw_flow_key *key, u32 ct_mark, u32 mask) argument 376 ovs_ct_init_labels(struct nf_conn *ct, struct sw_flow_key *key, const struct ovs_key_ct_labels *labels, const struct ovs_key_ct_labels *mask) argument 417 ovs_ct_set_labels(struct nf_conn *ct, struct sw_flow_key *key, const struct ovs_key_ct_labels *labels, const struct ovs_key_ct_labels *mask) argument 439 ovs_ct_handle_fragments(struct net *net, struct sw_flow_key *key, u16 zone, int family, struct sk_buff *skb) argument 528 ovs_ct_executed(struct net *net, const struct sw_flow_key *key, const struct ovs_conntrack_info *info, struct sk_buff *skb, bool *ct_executed) argument 556 skb_nfct_cached(struct net *net, const struct sw_flow_key *key, const struct ovs_conntrack_info *info, struct sk_buff *skb) argument 610 ovs_nat_update_key(struct sw_flow_key *key, const struct sk_buff *skb, enum nf_nat_manip_type maniptype) argument 662 ovs_ct_nat(struct net *net, struct sw_flow_key *key, const struct ovs_conntrack_info *info, struct sk_buff *skb, struct nf_conn *ct, enum ip_conntrack_info ctinfo) argument 686 ovs_ct_nat(struct net *net, struct sw_flow_key *key, const struct ovs_conntrack_info *info, struct sk_buff *skb, struct nf_conn *ct, enum ip_conntrack_info ctinfo) argument 701 __ovs_ct_lookup(struct net *net, struct sw_flow_key *key, const struct ovs_conntrack_info *info, struct sk_buff *skb) argument 813 ovs_ct_lookup(struct net *net, struct sw_flow_key *key, const struct ovs_conntrack_info *info, struct sk_buff *skb) argument 926 ovs_ct_commit(struct net *net, struct sw_flow_key *key, const struct ovs_conntrack_info *info, struct sk_buff *skb) argument 1008 ovs_ct_execute(struct net *net, struct sk_buff *skb, struct sw_flow_key *key, const struct ovs_conntrack_info *info) argument 1043 ovs_ct_clear(struct sk_buff *skb, struct sw_flow_key *key) argument 1348 ovs_ct_copy_action(struct net *net, const struct nlattr *attr, const struct sw_flow_key *key, struct sw_flow_actions **sfa, bool log) argument [all...] |
/linux-master/net/mac80211/ |
H A D | tx.c | 605 struct ieee80211_key *key; local 610 tx->key = NULL; 615 (key = rcu_dereference(tx->sta->ptk[tx->sta->ptk_idx]))) 616 tx->key = key; 617 else if ((key = ieee80211_select_link_key(tx))) 618 tx->key = key; 620 (key = rcu_dereference(tx->sdata->default_unicast_key))) 621 tx->key 3550 ieee80211_xmit_fast_finish(struct ieee80211_sub_if_data *sdata, struct sta_info *sta, u8 pn_offs, struct ieee80211_key *key, struct ieee80211_tx_data *tx) argument 4599 ieee80211_8023_xmit(struct ieee80211_sub_if_data *sdata, struct net_device *dev, struct sta_info *sta, struct ieee80211_key *key, struct sk_buff *skb) argument 4692 struct ieee80211_key *key; local [all...] |
H A D | rx.c | 984 /* Get the BIP key index from MMIE; return -1 if this is not a BIP frame */ 1875 struct ieee80211_key *key = NULL; local 1878 /* Make sure key gets set if either BIGTK key index is set so that 1880 * Beacon frames and Beacon frames that claim to use another BIGTK key 1881 * index (i.e., a key that we do not have). 1895 key = rcu_dereference(rx->link_sta->gtk[idx]); 1896 if (!key) 1897 key = rcu_dereference(rx->link->gtk[idx]); 1898 if (!key 2024 struct ieee80211_key *key = NULL; local 2766 struct ieee80211_mesh_fast_tx_key key = { local 4570 struct ieee80211_key *key; local [all...] |
H A D | mlme.c | 3812 auth_data->key, auth_data->key_len, 7856 if (req->key && req->key_len) { 7859 memcpy(auth_data->key, req->key, req->key_len);
|
H A D | mesh_pathtbl.c | 40 .key_len = sizeof_field(struct ieee80211_mesh_fast_tx, key), 41 .key_offset = offsetof(struct ieee80211_mesh_fast_tx, key), 435 struct ieee80211_mesh_fast_tx_key *key) 441 entry = rhashtable_lookup(&cache->rht, key, fast_tx_rht_params); 448 entry = rhashtable_lookup(&cache->rht, key, fast_tx_rht_params); 472 struct ieee80211_key *key; local 493 build.key.type = MESH_FAST_TX_TYPE_LOCAL; 501 build.key.type = MESH_FAST_TX_TYPE_PROXIED; 509 build.key.type = MESH_FAST_TX_TYPE_FORWARDED; 519 * to protect against concurrent sta key update 434 mesh_fast_tx_get(struct ieee80211_sub_if_data *sdata, struct ieee80211_mesh_fast_tx_key *key) argument 656 struct ieee80211_mesh_fast_tx_key key = {}; local [all...] |
H A D | mesh.h | 156 * struct ieee80211_mesh_fast_tx_key - cached mesh fast tx entry key 169 * @key: the lookup key for this cache entry 180 struct ieee80211_mesh_fast_tx_key key; member in struct:ieee80211_mesh_fast_tx 367 struct ieee80211_mesh_fast_tx_key *key);
|
H A D | mesh.c | 750 struct ieee80211_mesh_fast_tx_key key = { local 788 ether_addr_copy(key.addr, skb->data); 790 key.type = MESH_FAST_TX_TYPE_PROXIED; 791 entry = mesh_fast_tx_get(sdata, &key);
|
/linux-master/net/ipv4/ |
H A D | tcp_ao.c | 22 int tcp_ao_calc_traffic_key(struct tcp_ao_key *mkt, u8 *key, void *ctx, argument 29 mkt->key, mkt->keylen)) 37 ahash_request_set_crypt(hp->req, &sg, key, len); 46 memset(key, 0, tcp_ao_digest_size(mkt)); 55 if (!static_branch_unlikely(&tcp_ao_needed.key)) 114 struct tcp_ao_key *key; local 116 hlist_for_each_entry_rcu(key, &ao->head, node) { 117 if ((sndid >= 0 && key->sndid != sndid) || 118 (rcvid >= 0 && key->rcvid != rcvid)) 120 return key; 139 __tcp_ao_key_cmp(const struct tcp_ao_key *key, int l3index, const union tcp_ao_addr *addr, u8 prefixlen, int family, int sndid, int rcvid) argument 175 tcp_ao_key_cmp(const struct tcp_ao_key *key, int l3index, const union tcp_ao_addr *addr, u8 prefixlen, int family, int sndid, int rcvid) argument 196 struct tcp_ao_key *key; local 242 tcp_ao_copy_key(struct sock *sk, struct tcp_ao_key *key) argument 263 struct tcp_ao_key *key = container_of(head, struct tcp_ao_key, rcu); local 272 struct tcp_ao_key *key; local 302 struct tcp_ao_key *key; local 319 tcp_v4_ao_calc_key(struct tcp_ao_key *mkt, u8 *key, __be32 saddr, __be32 daddr, __be16 sport, __be16 dport, __be32 sisn, __be32 disn) argument 355 tcp_v4_ao_calc_key_sk(struct tcp_ao_key *mkt, u8 *key, const struct sock *sk, __be32 sisn, __be32 disn, bool send) argument 369 tcp_ao_calc_key_sk(struct tcp_ao_key *mkt, u8 *key, const struct sock *sk, __be32 sisn, __be32 disn, bool send) argument 383 tcp_v4_ao_calc_key_rsk(struct tcp_ao_key *mkt, u8 *key, struct request_sock *req) argument 395 tcp_v4_ao_calc_key_skb(struct tcp_ao_key *mkt, u8 *key, const struct sk_buff *skb, __be32 sisn, __be32 disn) argument 406 tcp_ao_calc_key_skb(struct tcp_ao_key *mkt, u8 *key, const struct sk_buff *skb, __be32 sisn, __be32 disn, int family) argument 541 tcp_ao_hash_hdr(unsigned short int family, char *ao_hash, struct tcp_ao_key *key, const u8 *tkey, const union tcp_ao_addr *daddr, const union tcp_ao_addr *saddr, const struct tcphdr *th, u32 sne) argument 602 tcp_ao_hash_skb(unsigned short int family, char *ao_hash, struct tcp_ao_key *key, const struct sock *sk, const struct sk_buff *skb, const u8 *tkey, int hash_offset, u32 sne) argument 653 tcp_v4_ao_hash_skb(char *ao_hash, struct tcp_ao_key *key, const struct sock *sk, const struct sk_buff *skb, const u8 *tkey, int hash_offset, u32 sne) argument 705 tcp_ao_prepare_reset(const struct sock *sk, struct sk_buff *skb, const struct tcp_ao_hdr *aoh, int l3index, u32 seq, struct tcp_ao_key **key, char **traffic_key, bool *allocated_traffic_key, u8 *keyid, u32 *sne) argument 790 tcp_ao_transmit_skb(struct sock *sk, struct sk_buff *skb, struct tcp_ao_key *key, struct tcphdr *th, __u8 *hash_location) argument 852 struct tcp_ao_key *key; local 882 tcp_ao_verify_hash(const struct sock *sk, const struct sk_buff *skb, unsigned short int family, struct tcp_ao_info *info, const struct tcp_ao_hdr *aoh, struct tcp_ao_key *key, u8 *traffic_key, u8 *phash, u32 sne, int l3index) argument 933 struct tcp_ao_key *key; local 1073 struct tcp_ao_key *key; local 1133 struct tcp_ao_key *key; local 1147 struct tcp_ao_key *key; local 1165 struct tcp_ao_key *key, *new_key, *first_key; local 1310 tcp_ao_parse_crypto(struct tcp_ao_add *cmd, struct tcp_ao_key *key) argument 1526 struct tcp_ao_key *key; local 1574 struct tcp_ao_key *key; local 1735 tcp_ao_delete_key(struct sock *sk, struct tcp_ao_info *ao_info, bool del_async, struct tcp_ao_key *key, struct tcp_ao_key *new_current, struct tcp_ao_key *new_rnext) argument 1788 struct tcp_ao_key *key, *new_current = NULL, *new_rnext = NULL; local 2080 struct tcp_ao_key *key, *current_key; local 2346 struct tcp_ao_key *key; local [all...] |
H A D | route.c | 2250 fl4.flowi4_tun_key.tun_id = tun_info->key.tun_id;
|
/linux-master/net/bluetooth/ |
H A D | mgmt.c | 2847 struct mgmt_link_key_info *key = &cp->keys[i]; local 2850 if (key->type > 0x08) 2870 struct mgmt_link_key_info *key = &cp->keys[i]; local 2874 key->val)) { 2875 bt_dev_warn(hdev, "Skipping blocked link key for %pMR", 2876 &key->addr.bdaddr); 2883 if (key->type == HCI_LK_DEBUG_COMBINATION) 2886 hci_add_link_key(hdev, NULL, &key->addr.bdaddr, key->val, 2887 key 7070 struct mgmt_irk_info *key = &cp->irks[i]; local 7112 ltk_is_valid(struct mgmt_ltk_info *key) argument 7165 struct mgmt_ltk_info *key = &cp->keys[i]; local 7178 struct mgmt_ltk_info *key = &cp->keys[i]; local 9477 mgmt_new_link_key(struct hci_dev *hdev, struct link_key *key, bool persistent) argument 9513 mgmt_new_ltk(struct hci_dev *hdev, struct smp_ltk *key, bool persistent) argument [all...] |
H A D | hci_event.c | 737 * secure approach is to then assume the key size is 0 to force a 741 bt_dev_err(hdev, "failed to read key size for handle %u", 3211 /* "Link key request" completed ahead of "connect request" completes */ 3214 struct link_key *key; local 3217 key = hci_find_link_key(hdev, &ev->bdaddr); 3218 if (key) { 3227 bt_dev_err(hdev, "sending read key size failed"); 3621 /* P-256 authentication key implies FIPS */ 3661 /* Try reading the encryption key size for encrypted ACL links */ 3677 bt_dev_err(hdev, "sending read key siz 4705 struct link_key *key; local 4762 struct link_key *key; local [all...] |
/linux-master/mm/ |
H A D | hugetlb.c | 6411 unsigned long key[2]; local 6414 key[0] = (unsigned long) mapping; 6415 key[1] = idx; 6417 hash = jhash2((u32 *)&key, sizeof(key)/(sizeof(u32)), 0);
|
/linux-master/include/net/ |
H A D | sock.h | 1651 #define sock_lock_init_class_and_name(sk, sname, skey, name, key) \ 1660 lockdep_init_map(&(sk)->sk_lock.dep_map, (name), (key), 0); \
|
H A D | macsec.h | 63 * struct macsec_key - SA key 64 * @id: user-provided key identifier 65 * @tfm: crypto struct, key storage 123 * @key: key structure 128 struct macsec_key key; member in struct:macsec_rx_sa 174 * @key: key structure 179 struct macsec_key key; member in struct:macsec_tx_sa 259 * @key 280 u8 key[MACSEC_MAX_KEY_LEN]; member in struct:macsec_context::__anon121 [all...] |
H A D | mac80211.h | 872 * testing. It will be sent out with incorrect Michael MIC key to allow 1156 * @control.hw_key: key to encrypt with (may be NULL) 2085 * enum ieee80211_key_flags - key flags 2092 * particular key. Setting this flag does not necessarily mean that SKBs 2095 * the driver for a TKIP key if it requires Michael MIC 2098 * that the key is pairwise rather then a shared key. 2100 * CCMP/GCMP key if it requires CCMP/GCMP encryption of management frames 2105 * @IEEE80211_KEY_FLAG_GENERATE_IV on the same key. Setting this flag does 2108 * @IEEE80211_KEY_FLAG_RX_MGMT: This key wil 2180 u8 key[]; member in struct:ieee80211_key_conf [all...] |
/linux-master/include/net/bluetooth/ |
H A D | hci_core.h | 332 /* Min encryption key size to match with SMP */ 2262 void mgmt_new_link_key(struct hci_dev *hdev, struct link_key *key, 2312 void mgmt_new_ltk(struct hci_dev *hdev, struct smp_ltk *key, bool persistent);
|