/linux-master/include/linux/firmware/qcom/ |
H A D | qcom_scm.h | 104 int qcom_scm_ice_set_key(u32 index, const u8 *key, u32 key_size,
|
/linux-master/fs/ntfs3/ |
H A D | ntfs_fs.h | 698 const void *key, u32 key_len, const void *param);
|
/linux-master/drivers/net/wireless/intel/iwlwifi/mvm/ |
H A D | ftm-initiator.c | 100 IWL_ERR(mvm, "Invalid key length: tk_len=%u hltk_len=%u\n", 694 struct ieee80211_key_conf *key, 704 if (WARN_ON(key->keylen > sizeof(target->tk))) 707 memcpy(target->tk, key->key, key->keylen); 708 target->cipher = iwl_mvm_cipher_to_location_cipher(key->cipher); 691 iter(struct ieee80211_hw *hw, struct ieee80211_vif *vif, struct ieee80211_sta *sta, struct ieee80211_key_conf *key, void *data) argument
|
/linux-master/drivers/net/wireless/ath/ath11k/ |
H A D | mac.c | 4119 struct ieee80211_key_conf *key, 4127 .key_idx = key->keyidx, 4128 .key_len = key->keylen, 4129 .key_data = key->key, 4147 switch (key->cipher) { 4151 key->flags |= IEEE80211_KEY_FLAG_GENERATE_IV_MGMT; 4166 ath11k_warn(ar->ab, "cipher %d is not supported\n", key->cipher); 4171 key->flags |= IEEE80211_KEY_FLAG_GENERATE_IV | 4210 /* key flag 4118 ath11k_install_key(struct ath11k_vif *arvif, struct ieee80211_key_conf *key, enum set_key_cmd cmd, const u8 *macaddr, u32 flags) argument 4228 ath11k_mac_op_set_key(struct ieee80211_hw *hw, enum set_key_cmd cmd, struct ieee80211_vif *vif, struct ieee80211_sta *sta, struct ieee80211_key_conf *key) argument 5969 struct ieee80211_key_conf *key = info->control.hw_key; local [all...] |
/linux-master/drivers/net/ |
H A D | macsec.c | 193 crypto_free_aead(sa->key.tfm); 221 crypto_free_aead(sa->key.tfm); 668 req = macsec_alloc_req(tx_sa->key.tfm, &iv, &sg, ret); 676 macsec_fill_iv_xpn(iv, tx_sa->ssci, pn.full64, tx_sa->key.salt); 894 req = macsec_alloc_req(rx_sa->key.tfm, &iv, &sg, ret); 912 rx_sa->key.salt); 1357 static struct crypto_aead *macsec_alloc_tfm(char *key, int key_len, int icv_len) argument 1367 ret = crypto_aead_setkey(tfm, key, key_len); 1388 rx_sa->key.tfm = macsec_alloc_tfm(sak, key_len, icv_len); 1389 if (IS_ERR(rx_sa->key [all...] |
/linux-master/drivers/net/ethernet/mellanox/mlx5/core/en_accel/ |
H A D | macsec.c | 487 static void update_macsec_epn(struct mlx5e_macsec_sa *sa, const struct macsec_key *key, argument 493 sa->salt = key->salt; 540 update_macsec_epn(tx_sa, &ctx_tx_sa->key, &ctx_tx_sa->next_pn_halves, 543 err = mlx5_create_encryption_key(mdev, ctx->sa.key, secy->key_len, 922 update_macsec_epn(rx_sa, &ctx_rx_sa->key, &ctx_rx_sa->next_pn_halves, 925 err = mlx5_create_encryption_key(mdev, ctx->sa.key, ctx->secy->key_len,
|
/linux-master/drivers/net/ethernet/intel/iavf/ |
H A D | iavf_main.c | 1701 dev_err(&adapter->pdev->dev, "Cannot set RSS key, err %s aq_err %s\n", 3681 dev_err(&adapter->pdev->dev, "Unsupported key used: 0x%llx\n", 3698 n_proto_key = ntohs(match.key->n_proto); 3713 if (match.key->ip_proto != IPPROTO_TCP) { 3745 if (!is_zero_ether_addr(match.key->dst)) 3746 if (is_valid_ether_addr(match.key->dst) || 3747 is_multicast_ether_addr(match.key->dst)) { 3752 match.key->dst); 3755 if (!is_zero_ether_addr(match.key->src)) 3756 if (is_valid_ether_addr(match.key [all...] |
/linux-master/drivers/net/ethernet/intel/i40e/ |
H A D | i40e_main.c | 1277 u64 key; local 1282 key = i40e_addr_to_hkey(macaddr); 1283 hash_for_each_possible(vsi->mac_filter_hash, f, hlist, key) { 1302 u64 key; local 1307 key = i40e_addr_to_hkey(macaddr); 1308 hash_for_each_possible(vsi->mac_filter_hash, f, hlist, key) { 1616 u64 key; local 1638 key = i40e_addr_to_hkey(macaddr); 1639 hash_add(vsi->mac_filter_hash, &f->hlist, key); 1864 "Cannot set RSS key, er 2252 u64 key = i40e_addr_to_hkey(f->macaddr); local [all...] |
/linux-master/drivers/net/ethernet/broadcom/bnxt/ |
H A D | bnxt.c | 4243 u8 *key = (void *)vnic->rss_hash_key; local 4265 bp->toeplitz_prefix |= key[k]; 4524 /* Allocate rss table and hash key */ 5445 struct bnxt_l2_key *key, 5454 if (ether_addr_equal(l2_key->dst_mac_addr, key->dst_mac_addr) && 5455 l2_key->vlan == key->vlan) 5462 struct bnxt_l2_key *key, 5468 fltr = __bnxt_lookup_l2_filter(bp, key, idx); 5511 const unsigned char *key) 5541 prefix |= (j < HW_HASH_KEY_SIZE) ? key[ 5444 __bnxt_lookup_l2_filter(struct bnxt *bp, struct bnxt_l2_key *key, u32 idx) argument 5461 bnxt_lookup_l2_filter(struct bnxt *bp, struct bnxt_l2_key *key, u32 idx) argument 5510 bnxt_toeplitz(struct bnxt *bp, struct flow_keys *fkeys, const unsigned char *key) argument 5550 bnxt_lookup_l2_filter_from_key(struct bnxt *bp, struct bnxt_l2_key *key) argument 5562 bnxt_init_l2_filter(struct bnxt *bp, struct bnxt_l2_filter *fltr, struct bnxt_l2_key *key, u32 idx) argument 5588 bnxt_alloc_l2_filter(struct bnxt *bp, struct bnxt_l2_key *key, gfp_t gfp) argument 5615 bnxt_alloc_new_l2_filter(struct bnxt *bp, struct bnxt_l2_key *key, u16 flags) argument 5873 struct bnxt_l2_key key; local 14250 struct bnxt_l2_key key; local [all...] |
/linux-master/drivers/md/ |
H A D | dm.c | 3302 static int dm_pr_reserve(struct block_device *bdev, u64 key, enum pr_type type, argument 3306 .old_key = key, 3345 static int dm_pr_release(struct block_device *bdev, u64 key, enum pr_type type) argument 3348 .old_key = key, 3398 static int dm_pr_clear(struct block_device *bdev, u64 key) argument 3410 r = ops->pr_clear(bdev, key);
|
/linux-master/drivers/md/dm-vdo/ |
H A D | murmurhash3.c | 33 void murmurhash3_128(const void *key, const int len, const u32 seed, void *out) argument 35 const u8 *data = key;
|
/linux-master/drivers/firmware/qcom/ |
H A D | qcom_scm.c | 1111 * qcom_scm_ice_available() - Is the ICE key programming interface available? 1126 * qcom_scm_ice_invalidate_key() - Invalidate an inline encryption key 1152 * qcom_scm_ice_set_key() - Set an inline encryption key 1153 * @index: the keyslot into which to set the key 1154 * @key: the key to program 1155 * @key_size: the size of the key in bytes 1156 * @cipher: the encryption algorithm the key is for 1161 * Program a key into a keyslot of Qualcomm ICE (Inline Crypto Engine), where it 1172 int qcom_scm_ice_set_key(u32 index, const u8 *key, u3 argument [all...] |
/linux-master/fs/btrfs/ |
H A D | scrub.c | 401 struct btrfs_key key; local 412 key.objectid = inum; 413 key.type = BTRFS_INODE_ITEM_KEY; 414 key.offset = 0; 416 ret = btrfs_search_slot(NULL, local_root, &key, swarn->path, 0, 0); 1338 struct btrfs_key key; local 1340 btrfs_item_key_to_cpu(path->nodes[0], &key, path->slots[0]); 1341 ASSERT(key.type == BTRFS_EXTENT_ITEM_KEY || 1342 key.type == BTRFS_METADATA_ITEM_KEY); 1343 if (key 1376 struct btrfs_key key; local 1442 struct btrfs_key key; local 2468 struct btrfs_key key; local [all...] |
H A D | inode.c | 155 struct btrfs_key key; local 167 key.objectid = inum; 168 key.type = BTRFS_INODE_ITEM_KEY; 169 key.offset = 0; 171 ret = btrfs_search_slot(NULL, local_root, &key, &warn->path, 0, 0); 535 struct btrfs_key key; local 538 key.objectid = btrfs_ino(inode); 539 key.offset = 0; 540 key.type = BTRFS_EXTENT_DATA_KEY; 543 ret = btrfs_insert_empty_item(trans, root, path, &key, 1864 can_nocow_file_extent(struct btrfs_path *path, struct btrfs_key *key, struct btrfs_inode *inode, struct can_nocow_file_extent_args *args) argument 3500 struct btrfs_key key, found_key; local 4271 struct btrfs_key key; local 4378 struct btrfs_key key; local 5455 struct btrfs_key key; local 5655 new_simple_dir(struct inode *dir, struct btrfs_key *key, struct btrfs_root *root) argument 5802 struct btrfs_key key, found_key; local 5943 struct btrfs_key key; local 6253 struct btrfs_key key[2]; local 6489 struct btrfs_key key; local 7129 struct btrfs_key key; local 9504 struct btrfs_key key; local [all...] |
H A D | backref.c | 36 const struct btrfs_key *key, 42 u64 offset = key->offset; 73 ret = ctx->indirect_ref_iterator(key->objectid, offset, 86 e->inum = key->objectid; 109 struct btrfs_key key; local 118 * the key. thus, we must look into all items and see that we 123 btrfs_item_key_to_cpu(eb, &key, slot); 124 if (key.type != BTRFS_EXTENT_DATA_KEY) 135 ret = check_extent_in_eb(ctx, &key, eb, fi, eie); 353 * - if you add a key, yo 35 check_extent_in_eb(struct btrfs_backref_walk_ctx *ctx, const struct btrfs_key *key, const struct extent_buffer *eb, const struct btrfs_file_extent_item *fi, struct extent_inode_elem **eie) argument 388 add_prelim_ref(const struct btrfs_fs_info *fs_info, struct preftree *preftree, u64 root_id, const struct btrfs_key *key, int level, u64 parent, u64 wanted_disk_byte, int count, struct share_check *sc, gfp_t gfp_mask) argument 429 add_indirect_ref(const struct btrfs_fs_info *fs_info, struct preftrees *preftrees, u64 root_id, const struct btrfs_key *key, int level, u64 wanted_disk_byte, int count, struct share_check *sc, gfp_t gfp_mask) argument 477 struct btrfs_key key; local 893 struct btrfs_key key; local 1021 struct btrfs_key key; local 1156 struct btrfs_key key; local 1389 struct btrfs_key key; local 2055 struct btrfs_key key; local 2213 struct btrfs_key key; local 2285 get_extent_inline_ref(unsigned long *ptr, const struct extent_buffer *eb, const struct btrfs_key *key, const struct btrfs_extent_item *ei, u32 item_size, struct btrfs_extent_inline_ref **out_eiref, int *out_type) argument 2341 tree_backref_for_extent(unsigned long *ptr, struct extent_buffer *eb, struct btrfs_key *key, struct btrfs_extent_item *ei, u32 item_size, u64 *out_root, u8 *out_level) argument 2866 struct btrfs_key key; local 3518 struct btrfs_key key; local [all...] |
/linux-master/virt/kvm/ |
H A D | kvm_main.c | 5781 struct kvm_io_range *range, key; local 5784 key = (struct kvm_io_range) { 5789 range = bsearch(&key, bus->range, bus->dev_count, 5796 while (off > 0 && kvm_io_bus_cmp(&key, &bus->range[off-1]) == 0)
|
/linux-master/kernel/sched/ |
H A D | sched.h | 2102 static __always_inline bool static_branch_##name(struct static_key *key) \ 2104 return static_key_##enabled(key); \
|
/linux-master/fs/sysfs/ |
H A D | file.c | 273 struct lock_class_key *key = NULL; local 304 key = attr->key ?: (struct lock_class_key *)&attr->skey; 308 PAGE_SIZE, ops, (void *)attr, ns, key); 322 struct lock_class_key *key = NULL; local 339 key = attr->key ?: (struct lock_class_key *)&attr->skey; 343 battr->size, ops, (void *)attr, ns, key);
|
/linux-master/fs/smb/client/ |
H A D | smb2transport.c | 77 int smb2_get_sign_key(__u64 ses_id, struct TCP_Server_Info *server, u8 *key) argument 111 * session key 113 memcpy(key, ses->smb3signingkey, SMB3_SIGN_KEY_SIZE); 120 * Otherwise, use the channel key. 126 memcpy(key, chan->signkey, SMB3_SIGN_KEY_SIZE); 136 "%s: Could not find channel signing key for session 0x%llx\n", 312 struct kvec context, __u8 *key, unsigned int key_size) 324 memset(key, 0x0, key_size); 335 cifs_server_dbg(VFS, "%s: Could not set with session key\n", __func__); 386 memcpy(key, hashpt 311 generate_key(struct cifs_ses *ses, struct kvec label, struct kvec context, __u8 *key, unsigned int key_size) argument 571 u8 key[SMB3_SIGN_KEY_SIZE]; local [all...] |
H A D | smb2pdu.c | 372 * Try alternate password for next reconnect (key rotation 1583 "SMB3 session key generation failed\n"); 1606 struct key *spnego_key = NULL; 1639 /* keep session key if binding */
|
H A D | smb2ops.c | 1482 cifs_tcon_dbg(VFS, "refcpy ioctl error %d getting resume key\n", rc); 1486 cifs_tcon_dbg(VFS, "Invalid refcopy resume key length\n"); 1766 cifs_dbg(FYI, "%s: about to call request res key\n", __func__); 1767 /* Request a key from the server to identify the source of the copy */ 1789 /* Request server copy to target from src identified by key */ 4186 smb2_get_enc_key(struct TCP_Server_Info *server, __u64 ses_id, int enc, u8 *key) argument 4201 memcpy(key, ses_enc_key, SMB3_ENC_DEC_KEY_SIZE); 4230 u8 key[SMB3_ENC_DEC_KEY_SIZE]; local 4239 rc = smb2_get_enc_key(server, le64_to_cpu(tr_hdr->SessionId), enc, key); 4241 cifs_server_dbg(FYI, "%s: Could not get %scryption key [all...] |
H A D | fscache.c | 43 char *key; local 67 memset(&key, 0, sizeof(key)); 81 key = kasprintf(GFP_KERNEL, "cifs,%pISpc,%s", sa, sharename); 82 if (!key) 86 vcookie = fscache_acquire_volume(key, 89 cifs_dbg(FYI, "%s: (%s/0x%p)\n", __func__, key, vcookie); 95 pr_err("Cache volume key already in use (%s)\n", key); 107 kfree(key); 130 struct cifs_fscache_inode_key key; local [all...] |
H A D | connect.c | 2094 struct key *key; local 2104 /* try to find an address key first */ 2122 key = request_key(&key_type_logon, desc, ""); 2123 if (IS_ERR(key)) { 2126 rc = PTR_ERR(key); 2130 /* didn't work, try to find a domain key */ 2133 key = request_key(&key_type_logon, desc, ""); 2134 if (IS_ERR(key)) { 2135 rc = PTR_ERR(key); [all...] |
H A D | fs_context.c | 445 int smb3_parse_opt(const char *options, const char *key, char **val) argument 459 if (strncasecmp(p, key, strlen(key))) 637 * smb3_fs_context_parse_monolithic - Parse key[=val][,key[=val]]* mount data 641 * Parse a blob of data that's in key[=val][,key[=val]]* form. This can be 650 char *options = data, *key; local 661 while ((key = strsep(&options, ",")) != NULL) { 665 if (*key [all...] |
H A D | cifsproto.h | 91 extern int smb3_parse_opt(const char *options, const char *key, char **val);
|