/linux-master/fs/smb/client/ |
H A D | sess.c | 624 * to sign packets before we generate the channel signing key 625 * (we sign with the session key) 948 cifs_dbg(VFS, "%s: requested signing/encryption but server did not return either 56-bit or 128-bit session key size\n", 963 pr_warn_once("%s: authentication has been weakened as server does not support key exchange\n", 1480 /* calculate nlmv2 response and session key */ 1573 struct key *spnego_key = NULL;
|
/linux-master/drivers/usb/host/ |
H A D | xhci-mem.c | 174 * key to the stream ID is 0x43244. I can use the DMA address of the TRB to 175 * pass the radix tree a key to get the right stream ID: 186 * The radix tree uses an unsigned long as a key pair. On 32-bit systems, an 189 * key on 32-bit or 64-bit systems (it would also be fine if we asked for 64-bit 199 unsigned long key; local 202 key = (unsigned long)(seg->dma >> TRB_SEGMENT_SHIFT); 204 if (radix_tree_lookup(trb_address_map, key)) 211 key, ring); 219 unsigned long key; local 221 key [all...] |
/linux-master/drivers/tty/vt/ |
H A D | vt.c | 2612 case '[': /* Function key */ 2724 static int ucs_cmp(const void *key, const void *elt) argument 2726 uint32_t ucs = *(uint32_t *)key;
|
/linux-master/drivers/thunderbolt/ |
H A D | xdomain.c | 909 return sysfs_emit(buf, "%*pE\n", (int)strlen(svc->key), svc->key); 911 static DEVICE_ATTR_RO(key); 915 return snprintf(buf, size, "tbsvc:k%sp%08Xv%08Xr%08X", svc->key, 1001 kfree(svc->key); 1022 if (!tb_property_find(xd->remote_properties, svc->key, 1038 return !strcmp(svc->key, p->key); 1061 svc->key = kstrdup(property->key, GFP_KERNE 2471 remove_directory(const char *key, const struct tb_property_dir *dir) argument 2496 tb_register_property_dir(const char *key, struct tb_property_dir *dir) argument 2537 tb_unregister_property_dir(const char *key, struct tb_property_dir *dir) argument [all...] |
H A D | icm.c | 514 memcpy(request.key, sw->key, TB_SWITCH_KEY_SIZE); 523 tb_warn(tb, "Adding key to switch failed\n"); 1080 memcpy(request.key, sw->key, TB_SWITCH_KEY_SIZE); 1089 tb_warn(tb, "Adding key to switch failed\n");
|
H A D | domain.c | 25 if (strcmp(id->protocol_key, svc->key)) 663 * tb_domain_approve_switch_key() - Approve switch and add key 668 * key to the switch NVM using connection manager specific means. If 669 * adding the key is successful, the switch is approved and connected. 732 ret = crypto_shash_setkey(tfm, sw->key, TB_SWITCH_KEY_SIZE);
|
/linux-master/drivers/staging/rtl8723bs/os_dep/ |
H A D | ioctl_cfg80211.c | 545 /* wep default key has not been set, so use this key index as default key. */ 560 memcpy(&(psecuritypriv->dot11DefKey[wep_key_idx].skey[0]), param->u.crypt.key, wep_key_len); 564 rtw_ap_set_wep_key(padapter, param->u.crypt.key, wep_key_len, wep_key_idx, 1); 569 /* group key */ 571 /* group key */ 574 memcpy(grpkey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len)); 583 memcpy(grpkey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len)); 585 /* DEBUG_ERR("set key lengt [all...] |
/linux-master/drivers/staging/rtl8723bs/core/ |
H A D | rtw_mlme.c | 1350 return; /* between drv has received this event before and fw have not yet to set key to CAM_ENTRY) */ 1942 memcpy(&(psetkeyparm->key[0]), &(psecuritypriv->dot11DefKey[keyid].skey[0]), keylen); 1946 memcpy(&(psetkeyparm->key[0]), &(psecuritypriv->dot11DefKey[keyid].skey[0]), keylen); 1950 memcpy(&psetkeyparm->key, &psecuritypriv->dot118021XGrpKey[keyid], keylen); 1955 memcpy(&psetkeyparm->key, &psecuritypriv->dot118021XGrpKey[keyid], keylen); 2024 /* -1 :if there is no pre-auth key in the table */ 2025 /* >= 0 :if there is pre-auth key, and return the entry id */
|
/linux-master/drivers/staging/rtl8192e/ |
H A D | rtllib_wx.c | 275 int i, key, key_provided, len; local 278 key = erq->flags & IW_ENCODE_INDEX; 279 if (key) { 280 if (key > NUM_WEP_KEYS) 282 key--; 286 key = ieee->crypt_info.tx_keyidx; 289 netdev_dbg(ieee->dev, "Key: %d [%s]\n", key, key_provided ? 291 crypt = &ieee->crypt_info.crypt[key]; 295 "Disabling encryption on key %d.\n", key); 428 int len, key; local [all...] |
H A D | rtllib.h | 1244 * WEP key changes 1624 union iwreq_data *wrqu, char *key); 1627 union iwreq_data *wrqu, char *key); 1630 union iwreq_data *wrqu, char *key);
|
/linux-master/drivers/staging/rtl8192e/rtl8192e/ |
H A D | rtl_wx.c | 489 union iwreq_data *wrqu, char *key) 493 return rtllib_wx_get_encode(priv->rtllib, info, wrqu, key); 498 union iwreq_data *wrqu, char *key) 525 ret = rtllib_wx_set_encode(priv->rtllib, info, wrqu, key); 537 hwkey[i] |= key[4 * i + 0] & mask; 542 hwkey[i] |= (key[4 * i + 1] & mask) << 8; 543 hwkey[i] |= (key[4 * i + 2] & mask) << 16; 544 hwkey[i] |= (key[4 * i + 3] & mask) << 24; 672 u32 key[4] = {0}; local 699 memcpy((u8 *)key, ex 487 _rtl92e_wx_get_enc(struct net_device *dev, struct iw_request_info *info, union iwreq_data *wrqu, char *key) argument 496 _rtl92e_wx_set_enc(struct net_device *dev, struct iw_request_info *info, union iwreq_data *wrqu, char *key) argument [all...] |
/linux-master/drivers/staging/octeon/ |
H A D | octeon-stubs.h | 1033 uint64_t key:1; member in struct:cvmx_npi_rsl_int_blocks::cvmx_npi_rsl_int_blocks_s 1068 uint64_t key:1; member in struct:cvmx_npi_rsl_int_blocks::cvmx_npi_rsl_int_blocks_cn30xx 1103 uint64_t key:1; member in struct:cvmx_npi_rsl_int_blocks::cvmx_npi_rsl_int_blocks_cn38xx 1134 uint64_t key:1; member in struct:cvmx_npi_rsl_int_blocks::cvmx_npi_rsl_int_blocks_cn50xx
|
/linux-master/drivers/scsi/ |
H A D | scsi_debug.c | 1274 static void mk_sense_buffer(struct scsi_cmnd *scp, int key, int asc, int asq) argument 1283 scsi_build_sense(scp, sdebug_dsense, key, asc, asq); 1288 my_name, key, asc, asq);
|
/linux-master/drivers/nvmem/ |
H A D | core.c | 406 nvmem->eeprom.attr.key = &eeprom_lock_key;
|
/linux-master/drivers/nvme/target/ |
H A D | rdma.c | 634 static int nvmet_rdma_rw_ctx_init(struct nvmet_rdma_rsp *rsp, u64 addr, u32 key, argument 645 addr, key, nvmet_data_dir(req)); 648 req->sg, req->sg_cnt, 0, addr, key, 885 u32 key = get_unaligned_le32(sgl->key); local 902 ret = nvmet_rdma_rw_ctx_init(rsp, addr, key, &sig_attrs); 908 rsp->invalidate_rkey = key;
|
/linux-master/drivers/nvme/host/ |
H A D | sysfs.c | 582 struct nvme_dhchap_key *key, *host_key; local 585 ret = nvme_auth_generate_key(dhchap_secret, &key); 594 ctrl->host_key = key; 640 struct nvme_dhchap_key *key, *ctrl_key; local 643 ret = nvme_auth_generate_key(dhchap_secret, &key); 652 ctrl->ctrl_key = key;
|
H A D | pr.c | 108 u64 key, u64 sa_key, u8 op) 114 put_unaligned_le64(key, &data[0]); 141 static int nvme_pr_reserve(struct block_device *bdev, u64 key, argument 151 return nvme_pr_command(bdev, cdw10, key, 0, nvme_cmd_resv_acquire); 162 static int nvme_pr_clear(struct block_device *bdev, u64 key) argument 164 u32 cdw10 = 1 | (key ? 0 : 1 << 3); 166 return nvme_pr_command(bdev, cdw10, key, 0, nvme_cmd_resv_release); 169 static int nvme_pr_release(struct block_device *bdev, u64 key, enum pr_type type) argument 171 u32 cdw10 = nvme_pr_type_from_blk(type) << 8 | (key ? 0 : 1 << 3); 173 return nvme_pr_command(bdev, cdw10, key, 107 nvme_pr_command(struct block_device *bdev, u32 cdw10, u64 key, u64 sa_key, u8 op) argument [all...] |
H A D | fabrics.h | 101 * @keyring: Keyring to use for key lookups 102 * @tls_key: TLS key for encrypted connections (TCP) 130 struct key *keyring; 131 struct key *tls_key;
|
/linux-master/drivers/net/wireguard/ |
H A D | receive.c | 280 keypair->receiving.key))
|
/linux-master/drivers/net/ethernet/mediatek/ |
H A D | mtk_ppe.c | 744 struct mtk_foe_bridge key = {}; local 781 ether_addr_copy(key.dest_mac, eh->h_dest); 782 ether_addr_copy(key.src_mac, eh->h_source); 784 key.vlan = 0; 801 key.vlan = get_unaligned_be16(tag + 2) & VLAN_VID_MASK; 807 entry = rhashtable_lookup_fast(&ppe->l2_flows, &key, mtk_flow_l2_ht_params);
|
/linux-master/drivers/net/ethernet/marvell/octeontx2/nic/ |
H A D | otx2_common.h | 88 #define RSS_HASH_KEY_SIZE 44 /* 352 bit key */ 89 u8 key[RSS_HASH_KEY_SIZE]; member in struct:otx2_rss_info
|
H A D | otx2_common.c | 355 u64 *key = (u64 *)&rss->key[4]; local 358 /* 352bit or 44byte key needs to be configured as below 359 * NIX_LF_RX_SECRETX0 = key<351:288> 360 * NIX_LF_RX_SECRETX1 = key<287:224> 361 * NIX_LF_RX_SECRETX2 = key<223:160> 362 * NIX_LF_RX_SECRETX3 = key<159:96> 363 * NIX_LF_RX_SECRETX4 = key<95:32> 364 * NIX_LF_RX_SECRETX5<63:32> = key<31:0> 367 (u64)(*((u32 *)&rss->key)) << 3 [all...] |
/linux-master/drivers/net/ethernet/marvell/octeontx2/af/ |
H A D | rvu.h | 155 u8 key; member in struct:npc_layer_mdata 160 * generated key. A key field may present anywhere and can 161 * be of any size in the generated key. Once this structure 167 * of a field in the key 170 /* Number of words in the key a field spans. If a field is 171 * of 16 bytes and key offset is 4 then the field will use 194 u8 banks_per_entry;/* Number of keywords in key */ 204 /* fields present in the generated key */
|
/linux-master/drivers/firewire/ |
H A D | core-device.c | 43 int fw_csr_iterator_next(struct fw_csr_iterator *ci, int *key, int *value) argument 45 *key = *ci->p >> 24; 55 int key, value; local 60 while (fw_csr_iterator_next(&ci, &key, &value)) { 61 if (key == search_key) 71 int last_key = 0, key, value; local 74 while (fw_csr_iterator_next(&ci, &key, &value)) { 76 key == (CSR_DESCRIPTOR | CSR_LEAF)) 79 last_key = key; 117 * @key 127 fw_csr_string(const u32 *directory, int key, char *buf, size_t size) argument 140 int key, value; local 279 u32 key; member in struct:config_rom_attribute 311 int key, val; local 501 int key, value; local 525 int key, value, i = 0; local 589 u32 sp, key; local 770 int key, value, i; local [all...] |
/linux-master/arch/riscv/kernel/ |
H A D | sys_hwprobe.c | 29 switch (pair->key) { 189 switch (pair->key) { 221 * call, but get their element key set to -1 and value set to 0 225 pair->key = -1; 272 if (get_user(pair.key, &pairs->key)) 277 ret = put_user(pair.key, &pairs->key); 326 if (!riscv_hwprobe_key_is_valid(pair.key)) { 328 pair = (struct riscv_hwprobe){ .key 382 int key; local [all...] |