Searched refs:key (Results 51 - 75 of 3067) sorted by last modified time

1234567891011>>

/linux-master/include/linux/firmware/qcom/
H A Dqcom_scm.h104 int qcom_scm_ice_set_key(u32 index, const u8 *key, u32 key_size,
/linux-master/fs/ntfs3/
H A Dntfs_fs.h698 const void *key, u32 key_len, const void *param);
/linux-master/drivers/net/wireless/intel/iwlwifi/mvm/
H A Dftm-initiator.c100 IWL_ERR(mvm, "Invalid key length: tk_len=%u hltk_len=%u\n",
694 struct ieee80211_key_conf *key,
704 if (WARN_ON(key->keylen > sizeof(target->tk)))
707 memcpy(target->tk, key->key, key->keylen);
708 target->cipher = iwl_mvm_cipher_to_location_cipher(key->cipher);
691 iter(struct ieee80211_hw *hw, struct ieee80211_vif *vif, struct ieee80211_sta *sta, struct ieee80211_key_conf *key, void *data) argument
/linux-master/drivers/net/wireless/ath/ath11k/
H A Dmac.c4119 struct ieee80211_key_conf *key,
4127 .key_idx = key->keyidx,
4128 .key_len = key->keylen,
4129 .key_data = key->key,
4147 switch (key->cipher) {
4151 key->flags |= IEEE80211_KEY_FLAG_GENERATE_IV_MGMT;
4166 ath11k_warn(ar->ab, "cipher %d is not supported\n", key->cipher);
4171 key->flags |= IEEE80211_KEY_FLAG_GENERATE_IV |
4210 /* key flag
4118 ath11k_install_key(struct ath11k_vif *arvif, struct ieee80211_key_conf *key, enum set_key_cmd cmd, const u8 *macaddr, u32 flags) argument
4228 ath11k_mac_op_set_key(struct ieee80211_hw *hw, enum set_key_cmd cmd, struct ieee80211_vif *vif, struct ieee80211_sta *sta, struct ieee80211_key_conf *key) argument
5969 struct ieee80211_key_conf *key = info->control.hw_key; local
[all...]
/linux-master/drivers/net/
H A Dmacsec.c193 crypto_free_aead(sa->key.tfm);
221 crypto_free_aead(sa->key.tfm);
668 req = macsec_alloc_req(tx_sa->key.tfm, &iv, &sg, ret);
676 macsec_fill_iv_xpn(iv, tx_sa->ssci, pn.full64, tx_sa->key.salt);
894 req = macsec_alloc_req(rx_sa->key.tfm, &iv, &sg, ret);
912 rx_sa->key.salt);
1357 static struct crypto_aead *macsec_alloc_tfm(char *key, int key_len, int icv_len) argument
1367 ret = crypto_aead_setkey(tfm, key, key_len);
1388 rx_sa->key.tfm = macsec_alloc_tfm(sak, key_len, icv_len);
1389 if (IS_ERR(rx_sa->key
[all...]
/linux-master/drivers/net/ethernet/mellanox/mlx5/core/en_accel/
H A Dmacsec.c487 static void update_macsec_epn(struct mlx5e_macsec_sa *sa, const struct macsec_key *key, argument
493 sa->salt = key->salt;
540 update_macsec_epn(tx_sa, &ctx_tx_sa->key, &ctx_tx_sa->next_pn_halves,
543 err = mlx5_create_encryption_key(mdev, ctx->sa.key, secy->key_len,
922 update_macsec_epn(rx_sa, &ctx_rx_sa->key, &ctx_rx_sa->next_pn_halves,
925 err = mlx5_create_encryption_key(mdev, ctx->sa.key, ctx->secy->key_len,
/linux-master/drivers/net/ethernet/intel/iavf/
H A Diavf_main.c1701 dev_err(&adapter->pdev->dev, "Cannot set RSS key, err %s aq_err %s\n",
3681 dev_err(&adapter->pdev->dev, "Unsupported key used: 0x%llx\n",
3698 n_proto_key = ntohs(match.key->n_proto);
3713 if (match.key->ip_proto != IPPROTO_TCP) {
3745 if (!is_zero_ether_addr(match.key->dst))
3746 if (is_valid_ether_addr(match.key->dst) ||
3747 is_multicast_ether_addr(match.key->dst)) {
3752 match.key->dst);
3755 if (!is_zero_ether_addr(match.key->src))
3756 if (is_valid_ether_addr(match.key
[all...]
/linux-master/drivers/net/ethernet/intel/i40e/
H A Di40e_main.c1277 u64 key; local
1282 key = i40e_addr_to_hkey(macaddr);
1283 hash_for_each_possible(vsi->mac_filter_hash, f, hlist, key) {
1302 u64 key; local
1307 key = i40e_addr_to_hkey(macaddr);
1308 hash_for_each_possible(vsi->mac_filter_hash, f, hlist, key) {
1616 u64 key; local
1638 key = i40e_addr_to_hkey(macaddr);
1639 hash_add(vsi->mac_filter_hash, &f->hlist, key);
1864 "Cannot set RSS key, er
2252 u64 key = i40e_addr_to_hkey(f->macaddr); local
[all...]
/linux-master/drivers/net/ethernet/broadcom/bnxt/
H A Dbnxt.c4243 u8 *key = (void *)vnic->rss_hash_key; local
4265 bp->toeplitz_prefix |= key[k];
4524 /* Allocate rss table and hash key */
5445 struct bnxt_l2_key *key,
5454 if (ether_addr_equal(l2_key->dst_mac_addr, key->dst_mac_addr) &&
5455 l2_key->vlan == key->vlan)
5462 struct bnxt_l2_key *key,
5468 fltr = __bnxt_lookup_l2_filter(bp, key, idx);
5511 const unsigned char *key)
5541 prefix |= (j < HW_HASH_KEY_SIZE) ? key[
5444 __bnxt_lookup_l2_filter(struct bnxt *bp, struct bnxt_l2_key *key, u32 idx) argument
5461 bnxt_lookup_l2_filter(struct bnxt *bp, struct bnxt_l2_key *key, u32 idx) argument
5510 bnxt_toeplitz(struct bnxt *bp, struct flow_keys *fkeys, const unsigned char *key) argument
5550 bnxt_lookup_l2_filter_from_key(struct bnxt *bp, struct bnxt_l2_key *key) argument
5562 bnxt_init_l2_filter(struct bnxt *bp, struct bnxt_l2_filter *fltr, struct bnxt_l2_key *key, u32 idx) argument
5588 bnxt_alloc_l2_filter(struct bnxt *bp, struct bnxt_l2_key *key, gfp_t gfp) argument
5615 bnxt_alloc_new_l2_filter(struct bnxt *bp, struct bnxt_l2_key *key, u16 flags) argument
5873 struct bnxt_l2_key key; local
14250 struct bnxt_l2_key key; local
[all...]
/linux-master/drivers/md/
H A Ddm.c3302 static int dm_pr_reserve(struct block_device *bdev, u64 key, enum pr_type type, argument
3306 .old_key = key,
3345 static int dm_pr_release(struct block_device *bdev, u64 key, enum pr_type type) argument
3348 .old_key = key,
3398 static int dm_pr_clear(struct block_device *bdev, u64 key) argument
3410 r = ops->pr_clear(bdev, key);
/linux-master/drivers/md/dm-vdo/
H A Dmurmurhash3.c33 void murmurhash3_128(const void *key, const int len, const u32 seed, void *out) argument
35 const u8 *data = key;
/linux-master/drivers/firmware/qcom/
H A Dqcom_scm.c1111 * qcom_scm_ice_available() - Is the ICE key programming interface available?
1126 * qcom_scm_ice_invalidate_key() - Invalidate an inline encryption key
1152 * qcom_scm_ice_set_key() - Set an inline encryption key
1153 * @index: the keyslot into which to set the key
1154 * @key: the key to program
1155 * @key_size: the size of the key in bytes
1156 * @cipher: the encryption algorithm the key is for
1161 * Program a key into a keyslot of Qualcomm ICE (Inline Crypto Engine), where it
1172 int qcom_scm_ice_set_key(u32 index, const u8 *key, u3 argument
[all...]
/linux-master/fs/btrfs/
H A Dscrub.c401 struct btrfs_key key; local
412 key.objectid = inum;
413 key.type = BTRFS_INODE_ITEM_KEY;
414 key.offset = 0;
416 ret = btrfs_search_slot(NULL, local_root, &key, swarn->path, 0, 0);
1338 struct btrfs_key key; local
1340 btrfs_item_key_to_cpu(path->nodes[0], &key, path->slots[0]);
1341 ASSERT(key.type == BTRFS_EXTENT_ITEM_KEY ||
1342 key.type == BTRFS_METADATA_ITEM_KEY);
1343 if (key
1376 struct btrfs_key key; local
1442 struct btrfs_key key; local
2468 struct btrfs_key key; local
[all...]
H A Dinode.c155 struct btrfs_key key; local
167 key.objectid = inum;
168 key.type = BTRFS_INODE_ITEM_KEY;
169 key.offset = 0;
171 ret = btrfs_search_slot(NULL, local_root, &key, &warn->path, 0, 0);
535 struct btrfs_key key; local
538 key.objectid = btrfs_ino(inode);
539 key.offset = 0;
540 key.type = BTRFS_EXTENT_DATA_KEY;
543 ret = btrfs_insert_empty_item(trans, root, path, &key,
1864 can_nocow_file_extent(struct btrfs_path *path, struct btrfs_key *key, struct btrfs_inode *inode, struct can_nocow_file_extent_args *args) argument
3500 struct btrfs_key key, found_key; local
4271 struct btrfs_key key; local
4378 struct btrfs_key key; local
5455 struct btrfs_key key; local
5655 new_simple_dir(struct inode *dir, struct btrfs_key *key, struct btrfs_root *root) argument
5802 struct btrfs_key key, found_key; local
5943 struct btrfs_key key; local
6253 struct btrfs_key key[2]; local
6489 struct btrfs_key key; local
7129 struct btrfs_key key; local
9504 struct btrfs_key key; local
[all...]
H A Dbackref.c36 const struct btrfs_key *key,
42 u64 offset = key->offset;
73 ret = ctx->indirect_ref_iterator(key->objectid, offset,
86 e->inum = key->objectid;
109 struct btrfs_key key; local
118 * the key. thus, we must look into all items and see that we
123 btrfs_item_key_to_cpu(eb, &key, slot);
124 if (key.type != BTRFS_EXTENT_DATA_KEY)
135 ret = check_extent_in_eb(ctx, &key, eb, fi, eie);
353 * - if you add a key, yo
35 check_extent_in_eb(struct btrfs_backref_walk_ctx *ctx, const struct btrfs_key *key, const struct extent_buffer *eb, const struct btrfs_file_extent_item *fi, struct extent_inode_elem **eie) argument
388 add_prelim_ref(const struct btrfs_fs_info *fs_info, struct preftree *preftree, u64 root_id, const struct btrfs_key *key, int level, u64 parent, u64 wanted_disk_byte, int count, struct share_check *sc, gfp_t gfp_mask) argument
429 add_indirect_ref(const struct btrfs_fs_info *fs_info, struct preftrees *preftrees, u64 root_id, const struct btrfs_key *key, int level, u64 wanted_disk_byte, int count, struct share_check *sc, gfp_t gfp_mask) argument
477 struct btrfs_key key; local
893 struct btrfs_key key; local
1021 struct btrfs_key key; local
1156 struct btrfs_key key; local
1389 struct btrfs_key key; local
2055 struct btrfs_key key; local
2213 struct btrfs_key key; local
2285 get_extent_inline_ref(unsigned long *ptr, const struct extent_buffer *eb, const struct btrfs_key *key, const struct btrfs_extent_item *ei, u32 item_size, struct btrfs_extent_inline_ref **out_eiref, int *out_type) argument
2341 tree_backref_for_extent(unsigned long *ptr, struct extent_buffer *eb, struct btrfs_key *key, struct btrfs_extent_item *ei, u32 item_size, u64 *out_root, u8 *out_level) argument
2866 struct btrfs_key key; local
3518 struct btrfs_key key; local
[all...]
/linux-master/virt/kvm/
H A Dkvm_main.c5781 struct kvm_io_range *range, key; local
5784 key = (struct kvm_io_range) {
5789 range = bsearch(&key, bus->range, bus->dev_count,
5796 while (off > 0 && kvm_io_bus_cmp(&key, &bus->range[off-1]) == 0)
/linux-master/kernel/sched/
H A Dsched.h2102 static __always_inline bool static_branch_##name(struct static_key *key) \
2104 return static_key_##enabled(key); \
/linux-master/fs/sysfs/
H A Dfile.c273 struct lock_class_key *key = NULL; local
304 key = attr->key ?: (struct lock_class_key *)&attr->skey;
308 PAGE_SIZE, ops, (void *)attr, ns, key);
322 struct lock_class_key *key = NULL; local
339 key = attr->key ?: (struct lock_class_key *)&attr->skey;
343 battr->size, ops, (void *)attr, ns, key);
/linux-master/fs/smb/client/
H A Dsmb2transport.c77 int smb2_get_sign_key(__u64 ses_id, struct TCP_Server_Info *server, u8 *key) argument
111 * session key
113 memcpy(key, ses->smb3signingkey, SMB3_SIGN_KEY_SIZE);
120 * Otherwise, use the channel key.
126 memcpy(key, chan->signkey, SMB3_SIGN_KEY_SIZE);
136 "%s: Could not find channel signing key for session 0x%llx\n",
312 struct kvec context, __u8 *key, unsigned int key_size)
324 memset(key, 0x0, key_size);
335 cifs_server_dbg(VFS, "%s: Could not set with session key\n", __func__);
386 memcpy(key, hashpt
311 generate_key(struct cifs_ses *ses, struct kvec label, struct kvec context, __u8 *key, unsigned int key_size) argument
571 u8 key[SMB3_SIGN_KEY_SIZE]; local
[all...]
H A Dsmb2pdu.c372 * Try alternate password for next reconnect (key rotation
1583 "SMB3 session key generation failed\n");
1606 struct key *spnego_key = NULL;
1639 /* keep session key if binding */
H A Dsmb2ops.c1482 cifs_tcon_dbg(VFS, "refcpy ioctl error %d getting resume key\n", rc);
1486 cifs_tcon_dbg(VFS, "Invalid refcopy resume key length\n");
1766 cifs_dbg(FYI, "%s: about to call request res key\n", __func__);
1767 /* Request a key from the server to identify the source of the copy */
1789 /* Request server copy to target from src identified by key */
4186 smb2_get_enc_key(struct TCP_Server_Info *server, __u64 ses_id, int enc, u8 *key) argument
4201 memcpy(key, ses_enc_key, SMB3_ENC_DEC_KEY_SIZE);
4230 u8 key[SMB3_ENC_DEC_KEY_SIZE]; local
4239 rc = smb2_get_enc_key(server, le64_to_cpu(tr_hdr->SessionId), enc, key);
4241 cifs_server_dbg(FYI, "%s: Could not get %scryption key
[all...]
H A Dfscache.c43 char *key; local
67 memset(&key, 0, sizeof(key));
81 key = kasprintf(GFP_KERNEL, "cifs,%pISpc,%s", sa, sharename);
82 if (!key)
86 vcookie = fscache_acquire_volume(key,
89 cifs_dbg(FYI, "%s: (%s/0x%p)\n", __func__, key, vcookie);
95 pr_err("Cache volume key already in use (%s)\n", key);
107 kfree(key);
130 struct cifs_fscache_inode_key key; local
[all...]
H A Dconnect.c2094 struct key *key; local
2104 /* try to find an address key first */
2122 key = request_key(&key_type_logon, desc, "");
2123 if (IS_ERR(key)) {
2126 rc = PTR_ERR(key);
2130 /* didn't work, try to find a domain key */
2133 key = request_key(&key_type_logon, desc, "");
2134 if (IS_ERR(key)) {
2135 rc = PTR_ERR(key);
[all...]
H A Dfs_context.c445 int smb3_parse_opt(const char *options, const char *key, char **val) argument
459 if (strncasecmp(p, key, strlen(key)))
637 * smb3_fs_context_parse_monolithic - Parse key[=val][,key[=val]]* mount data
641 * Parse a blob of data that's in key[=val][,key[=val]]* form. This can be
650 char *options = data, *key; local
661 while ((key = strsep(&options, ",")) != NULL) {
665 if (*key
[all...]
H A Dcifsproto.h91 extern int smb3_parse_opt(const char *options, const char *key, char **val);

Completed in 678 milliseconds

1234567891011>>