Searched refs:key (Results 26 - 50 of 3067) sorted by last modified time

1234567891011>>

/linux-master/fs/bcachefs/
H A Dbtree_node_scan.c439 .max_key = b->key.k.p,
/linux-master/drivers/scsi/
H A Dsd.c1912 /* Make sure we have at least the key and type */
1921 rsv->key = get_unaligned_be64(&data[8]);
1926 static int sd_pr_out_command(struct block_device *bdev, u8 sa, u64 key, argument
1958 put_unaligned_be64(key, &data[0]);
1988 static int sd_pr_reserve(struct block_device *bdev, u64 key, enum pr_type type, argument
1993 return sd_pr_out_command(bdev, 0x01, key, 0,
1997 static int sd_pr_release(struct block_device *bdev, u64 key, enum pr_type type) argument
1999 return sd_pr_out_command(bdev, 0x02, key, 0,
2010 static int sd_pr_clear(struct block_device *bdev, u64 key) argument
2012 return sd_pr_out_command(bdev, 0x03, key,
[all...]
/linux-master/tools/testing/selftests/riscv/hwprobe/
H A Dcbo.c87 .key = RISCV_HWPROBE_KEY_ZICBOZ_BLOCK_SIZE,
96 ksft_test_result(rc == 0 && pair.key == RISCV_HWPROBE_KEY_ZICBOZ_BLOCK_SIZE &&
135 .key = RISCV_HWPROBE_KEY_IMA_EXT_0,
149 assert(rc == 0 && pair.key == RISCV_HWPROBE_KEY_IMA_EXT_0);
199 pair.key = RISCV_HWPROBE_KEY_IMA_EXT_0;
203 assert(rc == 0 && pair.key == RISCV_HWPROBE_KEY_IMA_EXT_0);
/linux-master/kernel/sched/
H A Dfair.c625 * As measured, the max (key * weight) value was ~44 bits for a kernel build.
631 s64 key = entity_key(cfs_rq, se); local
633 cfs_rq->avg_vruntime += key * weight;
641 s64 key = entity_key(cfs_rq, se); local
643 cfs_rq->avg_vruntime -= key * weight;
4211 * propagate its contribution. The key to this propagation is the invariant
7593 * capacity_orig value through the cpuset), the key will be set
/linux-master/fs/smb/client/
H A Dcifspdu.h112 * Size of the crypto key returned on the negotiate SMB in bytes
122 * Size of the session key (crypto key encrypted with the password
619 __u32 Reserved; /* encrypt key len and offset */
660 __u8 key[CIFS_SERVER_CHALLENGE_SIZE]; member in struct:ntlmv2_resp::__anon52::__anon53
1785 * Size of the resume key on FINDFIRST and FINDNEXT calls
2615 3) FindFirst return unique inode number - what about resume key, two
/linux-master/arch/riscv/include/uapi/asm/
H A Dhwprobe.h16 __s64 key; member in struct:riscv_hwprobe
/linux-master/tools/testing/selftests/mm/
H A Drun_vmtests.sh59 memory protection key tests
/linux-master/net/wireless/
H A Dnl80211.c831 /* policy for the key attributes */
844 /* policy for the key default flags */
1303 static int nl80211_parse_key_new(struct genl_info *info, struct nlattr *key, argument
1307 int err = nla_parse_nested_deprecated(tb, NL80211_KEY_MAX, key,
1328 k->p.key = nla_data(tb[NL80211_KEY_DATA]);
1367 k->p.key = nla_data(info->attrs[NL80211_ATTR_KEY_DATA]);
1431 "key with multiple default flags is invalid");
1438 "defmgmt/defbeacon key must be mcast");
1447 "defmgmt key idx not 4 or 5");
1453 "defbeacon key id
1478 struct nlattr *key; local
4451 struct nlattr *key; local
4590 struct key_parse key; local
4699 struct key_parse key; local
4769 struct key_parse key; local
10612 struct key_parse key; local
[all...]
/linux-master/net/tls/
H A Dtls.h57 unsigned int key; member in struct:tls_cipher_desc
/linux-master/net/openvswitch/
H A Dconntrack.c109 static u16 key_to_nfproto(const struct sw_flow_key *key) argument
111 switch (ntohs(key->eth.type)) {
179 static void __ovs_ct_update_key_orig_tp(struct sw_flow_key *key, argument
183 key->ct_orig_proto = orig->dst.protonum;
185 key->ct.orig_tp.src = htons(orig->dst.u.icmp.type);
186 key->ct.orig_tp.dst = htons(orig->dst.u.icmp.code);
188 key->ct.orig_tp.src = orig->src.u.all;
189 key->ct.orig_tp.dst = orig->dst.u.all;
193 static void __ovs_ct_update_key(struct sw_flow_key *key, u8 state, argument
197 key
237 ovs_ct_update_key(const struct sk_buff *skb, const struct ovs_conntrack_info *info, struct sw_flow_key *key, bool post_ct, bool keep_nat_flags) argument
278 ovs_ct_fill_key(const struct sk_buff *skb, struct sw_flow_key *key, bool post_ct) argument
339 ovs_ct_set_mark(struct nf_conn *ct, struct sw_flow_key *key, u32 ct_mark, u32 mask) argument
376 ovs_ct_init_labels(struct nf_conn *ct, struct sw_flow_key *key, const struct ovs_key_ct_labels *labels, const struct ovs_key_ct_labels *mask) argument
417 ovs_ct_set_labels(struct nf_conn *ct, struct sw_flow_key *key, const struct ovs_key_ct_labels *labels, const struct ovs_key_ct_labels *mask) argument
439 ovs_ct_handle_fragments(struct net *net, struct sw_flow_key *key, u16 zone, int family, struct sk_buff *skb) argument
528 ovs_ct_executed(struct net *net, const struct sw_flow_key *key, const struct ovs_conntrack_info *info, struct sk_buff *skb, bool *ct_executed) argument
556 skb_nfct_cached(struct net *net, const struct sw_flow_key *key, const struct ovs_conntrack_info *info, struct sk_buff *skb) argument
610 ovs_nat_update_key(struct sw_flow_key *key, const struct sk_buff *skb, enum nf_nat_manip_type maniptype) argument
662 ovs_ct_nat(struct net *net, struct sw_flow_key *key, const struct ovs_conntrack_info *info, struct sk_buff *skb, struct nf_conn *ct, enum ip_conntrack_info ctinfo) argument
686 ovs_ct_nat(struct net *net, struct sw_flow_key *key, const struct ovs_conntrack_info *info, struct sk_buff *skb, struct nf_conn *ct, enum ip_conntrack_info ctinfo) argument
701 __ovs_ct_lookup(struct net *net, struct sw_flow_key *key, const struct ovs_conntrack_info *info, struct sk_buff *skb) argument
813 ovs_ct_lookup(struct net *net, struct sw_flow_key *key, const struct ovs_conntrack_info *info, struct sk_buff *skb) argument
926 ovs_ct_commit(struct net *net, struct sw_flow_key *key, const struct ovs_conntrack_info *info, struct sk_buff *skb) argument
1008 ovs_ct_execute(struct net *net, struct sk_buff *skb, struct sw_flow_key *key, const struct ovs_conntrack_info *info) argument
1043 ovs_ct_clear(struct sk_buff *skb, struct sw_flow_key *key) argument
1348 ovs_ct_copy_action(struct net *net, const struct nlattr *attr, const struct sw_flow_key *key, struct sw_flow_actions **sfa, bool log) argument
[all...]
/linux-master/net/mac80211/
H A Dtx.c605 struct ieee80211_key *key; local
610 tx->key = NULL;
615 (key = rcu_dereference(tx->sta->ptk[tx->sta->ptk_idx])))
616 tx->key = key;
617 else if ((key = ieee80211_select_link_key(tx)))
618 tx->key = key;
620 (key = rcu_dereference(tx->sdata->default_unicast_key)))
621 tx->key
3550 ieee80211_xmit_fast_finish(struct ieee80211_sub_if_data *sdata, struct sta_info *sta, u8 pn_offs, struct ieee80211_key *key, struct ieee80211_tx_data *tx) argument
4599 ieee80211_8023_xmit(struct ieee80211_sub_if_data *sdata, struct net_device *dev, struct sta_info *sta, struct ieee80211_key *key, struct sk_buff *skb) argument
4692 struct ieee80211_key *key; local
[all...]
H A Drx.c984 /* Get the BIP key index from MMIE; return -1 if this is not a BIP frame */
1875 struct ieee80211_key *key = NULL; local
1878 /* Make sure key gets set if either BIGTK key index is set so that
1880 * Beacon frames and Beacon frames that claim to use another BIGTK key
1881 * index (i.e., a key that we do not have).
1895 key = rcu_dereference(rx->link_sta->gtk[idx]);
1896 if (!key)
1897 key = rcu_dereference(rx->link->gtk[idx]);
1898 if (!key
2024 struct ieee80211_key *key = NULL; local
2766 struct ieee80211_mesh_fast_tx_key key = { local
4570 struct ieee80211_key *key; local
[all...]
H A Dmlme.c3812 auth_data->key, auth_data->key_len,
7856 if (req->key && req->key_len) {
7859 memcpy(auth_data->key, req->key, req->key_len);
H A Dmesh_pathtbl.c40 .key_len = sizeof_field(struct ieee80211_mesh_fast_tx, key),
41 .key_offset = offsetof(struct ieee80211_mesh_fast_tx, key),
435 struct ieee80211_mesh_fast_tx_key *key)
441 entry = rhashtable_lookup(&cache->rht, key, fast_tx_rht_params);
448 entry = rhashtable_lookup(&cache->rht, key, fast_tx_rht_params);
472 struct ieee80211_key *key; local
493 build.key.type = MESH_FAST_TX_TYPE_LOCAL;
501 build.key.type = MESH_FAST_TX_TYPE_PROXIED;
509 build.key.type = MESH_FAST_TX_TYPE_FORWARDED;
519 * to protect against concurrent sta key update
434 mesh_fast_tx_get(struct ieee80211_sub_if_data *sdata, struct ieee80211_mesh_fast_tx_key *key) argument
656 struct ieee80211_mesh_fast_tx_key key = {}; local
[all...]
H A Dmesh.h156 * struct ieee80211_mesh_fast_tx_key - cached mesh fast tx entry key
169 * @key: the lookup key for this cache entry
180 struct ieee80211_mesh_fast_tx_key key; member in struct:ieee80211_mesh_fast_tx
367 struct ieee80211_mesh_fast_tx_key *key);
H A Dmesh.c750 struct ieee80211_mesh_fast_tx_key key = { local
788 ether_addr_copy(key.addr, skb->data);
790 key.type = MESH_FAST_TX_TYPE_PROXIED;
791 entry = mesh_fast_tx_get(sdata, &key);
/linux-master/net/ipv4/
H A Dtcp_ao.c22 int tcp_ao_calc_traffic_key(struct tcp_ao_key *mkt, u8 *key, void *ctx, argument
29 mkt->key, mkt->keylen))
37 ahash_request_set_crypt(hp->req, &sg, key, len);
46 memset(key, 0, tcp_ao_digest_size(mkt));
55 if (!static_branch_unlikely(&tcp_ao_needed.key))
114 struct tcp_ao_key *key; local
116 hlist_for_each_entry_rcu(key, &ao->head, node) {
117 if ((sndid >= 0 && key->sndid != sndid) ||
118 (rcvid >= 0 && key->rcvid != rcvid))
120 return key;
139 __tcp_ao_key_cmp(const struct tcp_ao_key *key, int l3index, const union tcp_ao_addr *addr, u8 prefixlen, int family, int sndid, int rcvid) argument
175 tcp_ao_key_cmp(const struct tcp_ao_key *key, int l3index, const union tcp_ao_addr *addr, u8 prefixlen, int family, int sndid, int rcvid) argument
196 struct tcp_ao_key *key; local
242 tcp_ao_copy_key(struct sock *sk, struct tcp_ao_key *key) argument
263 struct tcp_ao_key *key = container_of(head, struct tcp_ao_key, rcu); local
272 struct tcp_ao_key *key; local
302 struct tcp_ao_key *key; local
319 tcp_v4_ao_calc_key(struct tcp_ao_key *mkt, u8 *key, __be32 saddr, __be32 daddr, __be16 sport, __be16 dport, __be32 sisn, __be32 disn) argument
355 tcp_v4_ao_calc_key_sk(struct tcp_ao_key *mkt, u8 *key, const struct sock *sk, __be32 sisn, __be32 disn, bool send) argument
369 tcp_ao_calc_key_sk(struct tcp_ao_key *mkt, u8 *key, const struct sock *sk, __be32 sisn, __be32 disn, bool send) argument
383 tcp_v4_ao_calc_key_rsk(struct tcp_ao_key *mkt, u8 *key, struct request_sock *req) argument
395 tcp_v4_ao_calc_key_skb(struct tcp_ao_key *mkt, u8 *key, const struct sk_buff *skb, __be32 sisn, __be32 disn) argument
406 tcp_ao_calc_key_skb(struct tcp_ao_key *mkt, u8 *key, const struct sk_buff *skb, __be32 sisn, __be32 disn, int family) argument
541 tcp_ao_hash_hdr(unsigned short int family, char *ao_hash, struct tcp_ao_key *key, const u8 *tkey, const union tcp_ao_addr *daddr, const union tcp_ao_addr *saddr, const struct tcphdr *th, u32 sne) argument
602 tcp_ao_hash_skb(unsigned short int family, char *ao_hash, struct tcp_ao_key *key, const struct sock *sk, const struct sk_buff *skb, const u8 *tkey, int hash_offset, u32 sne) argument
653 tcp_v4_ao_hash_skb(char *ao_hash, struct tcp_ao_key *key, const struct sock *sk, const struct sk_buff *skb, const u8 *tkey, int hash_offset, u32 sne) argument
705 tcp_ao_prepare_reset(const struct sock *sk, struct sk_buff *skb, const struct tcp_ao_hdr *aoh, int l3index, u32 seq, struct tcp_ao_key **key, char **traffic_key, bool *allocated_traffic_key, u8 *keyid, u32 *sne) argument
790 tcp_ao_transmit_skb(struct sock *sk, struct sk_buff *skb, struct tcp_ao_key *key, struct tcphdr *th, __u8 *hash_location) argument
852 struct tcp_ao_key *key; local
882 tcp_ao_verify_hash(const struct sock *sk, const struct sk_buff *skb, unsigned short int family, struct tcp_ao_info *info, const struct tcp_ao_hdr *aoh, struct tcp_ao_key *key, u8 *traffic_key, u8 *phash, u32 sne, int l3index) argument
933 struct tcp_ao_key *key; local
1073 struct tcp_ao_key *key; local
1133 struct tcp_ao_key *key; local
1147 struct tcp_ao_key *key; local
1165 struct tcp_ao_key *key, *new_key, *first_key; local
1310 tcp_ao_parse_crypto(struct tcp_ao_add *cmd, struct tcp_ao_key *key) argument
1526 struct tcp_ao_key *key; local
1574 struct tcp_ao_key *key; local
1735 tcp_ao_delete_key(struct sock *sk, struct tcp_ao_info *ao_info, bool del_async, struct tcp_ao_key *key, struct tcp_ao_key *new_current, struct tcp_ao_key *new_rnext) argument
1788 struct tcp_ao_key *key, *new_current = NULL, *new_rnext = NULL; local
2080 struct tcp_ao_key *key, *current_key; local
2346 struct tcp_ao_key *key; local
[all...]
H A Droute.c2250 fl4.flowi4_tun_key.tun_id = tun_info->key.tun_id;
/linux-master/net/bluetooth/
H A Dmgmt.c2847 struct mgmt_link_key_info *key = &cp->keys[i]; local
2850 if (key->type > 0x08)
2870 struct mgmt_link_key_info *key = &cp->keys[i]; local
2874 key->val)) {
2875 bt_dev_warn(hdev, "Skipping blocked link key for %pMR",
2876 &key->addr.bdaddr);
2883 if (key->type == HCI_LK_DEBUG_COMBINATION)
2886 hci_add_link_key(hdev, NULL, &key->addr.bdaddr, key->val,
2887 key
7070 struct mgmt_irk_info *key = &cp->irks[i]; local
7112 ltk_is_valid(struct mgmt_ltk_info *key) argument
7165 struct mgmt_ltk_info *key = &cp->keys[i]; local
7178 struct mgmt_ltk_info *key = &cp->keys[i]; local
9477 mgmt_new_link_key(struct hci_dev *hdev, struct link_key *key, bool persistent) argument
9513 mgmt_new_ltk(struct hci_dev *hdev, struct smp_ltk *key, bool persistent) argument
[all...]
H A Dhci_event.c737 * secure approach is to then assume the key size is 0 to force a
741 bt_dev_err(hdev, "failed to read key size for handle %u",
3211 /* "Link key request" completed ahead of "connect request" completes */
3214 struct link_key *key; local
3217 key = hci_find_link_key(hdev, &ev->bdaddr);
3218 if (key) {
3227 bt_dev_err(hdev, "sending read key size failed");
3621 /* P-256 authentication key implies FIPS */
3661 /* Try reading the encryption key size for encrypted ACL links */
3677 bt_dev_err(hdev, "sending read key siz
4705 struct link_key *key; local
4762 struct link_key *key; local
[all...]
/linux-master/mm/
H A Dhugetlb.c6411 unsigned long key[2]; local
6414 key[0] = (unsigned long) mapping;
6415 key[1] = idx;
6417 hash = jhash2((u32 *)&key, sizeof(key)/(sizeof(u32)), 0);
/linux-master/include/net/
H A Dsock.h1651 #define sock_lock_init_class_and_name(sk, sname, skey, name, key) \
1660 lockdep_init_map(&(sk)->sk_lock.dep_map, (name), (key), 0); \
H A Dmacsec.h63 * struct macsec_key - SA key
64 * @id: user-provided key identifier
65 * @tfm: crypto struct, key storage
123 * @key: key structure
128 struct macsec_key key; member in struct:macsec_rx_sa
174 * @key: key structure
179 struct macsec_key key; member in struct:macsec_tx_sa
259 * @key
280 u8 key[MACSEC_MAX_KEY_LEN]; member in struct:macsec_context::__anon121
[all...]
H A Dmac80211.h872 * testing. It will be sent out with incorrect Michael MIC key to allow
1156 * @control.hw_key: key to encrypt with (may be NULL)
2085 * enum ieee80211_key_flags - key flags
2092 * particular key. Setting this flag does not necessarily mean that SKBs
2095 * the driver for a TKIP key if it requires Michael MIC
2098 * that the key is pairwise rather then a shared key.
2100 * CCMP/GCMP key if it requires CCMP/GCMP encryption of management frames
2105 * @IEEE80211_KEY_FLAG_GENERATE_IV on the same key. Setting this flag does
2108 * @IEEE80211_KEY_FLAG_RX_MGMT: This key wil
2180 u8 key[]; member in struct:ieee80211_key_conf
[all...]
/linux-master/include/net/bluetooth/
H A Dhci_core.h332 /* Min encryption key size to match with SMP */
2262 void mgmt_new_link_key(struct hci_dev *hdev, struct link_key *key,
2312 void mgmt_new_ltk(struct hci_dev *hdev, struct smp_ltk *key, bool persistent);

Completed in 730 milliseconds

1234567891011>>