Searched refs:key_size (Results 51 - 75 of 237) sorted by relevance

12345678910

/linux-master/tools/perf/util/bpf_skel/
H A Dlock_contention.bpf.c25 __uint(key_size, sizeof(__u32));
41 __uint(key_size, sizeof(__u32));
49 __uint(key_size, sizeof(struct contention_key));
56 __uint(key_size, sizeof(__u32));
63 __uint(key_size, sizeof(__u64));
70 __uint(key_size, sizeof(__u32));
77 __uint(key_size, sizeof(__u32));
84 __uint(key_size, sizeof(__u32));
91 __uint(key_size, sizeof(__u64));
98 __uint(key_size, sizeo
[all...]
H A Doff_cpu.bpf.c37 __uint(key_size, sizeof(__u32));
51 __uint(key_size, sizeof(struct offcpu_key));
58 __uint(key_size, sizeof(__u32));
65 __uint(key_size, sizeof(__u32));
72 __uint(key_size, sizeof(__u64));
H A Dkwork_top.bpf.c59 __uint(key_size, sizeof(struct work_key));
66 __uint(key_size, sizeof(struct task_key));
73 __uint(key_size, sizeof(struct work_key));
80 __uint(key_size, sizeof(u32));
H A Dkwork_trace.bpf.c37 __uint(key_size, sizeof(struct work_key));
44 __uint(key_size, sizeof(struct work_key));
51 __uint(key_size, sizeof(struct work_key));
58 __uint(key_size, sizeof(__u32));
65 __uint(key_size, sizeof(__u32));
/linux-master/crypto/
H A Decdh.c33 params.key_size > sizeof(u64) * ctx->ndigits)
36 if (!params.key || !params.key_size)
40 memcpy(ctx->private_key, params.key, params.key_size);
43 ctx->private_key, params.key_size) < 0) {
44 memzero_explicit(ctx->private_key, params.key_size);
/linux-master/drivers/net/ethernet/netronome/nfp/flower/
H A Doffload.c155 u32 *key_layer_two, int *key_size, bool ipv6,
166 *key_size += sizeof(struct nfp_flower_geneve_options);
175 u32 *key_layer_two, u8 *key_layer, int *key_size,
189 *key_size += sizeof(struct nfp_flower_ext_meta);
191 *key_size += sizeof(struct nfp_flower_ipv6_udp_tun);
193 *key_size += sizeof(struct nfp_flower_ipv4_udp_tun);
208 *key_size += sizeof(struct nfp_flower_ext_meta);
213 *key_size += sizeof(struct nfp_flower_ipv6_udp_tun);
215 *key_size += sizeof(struct nfp_flower_ipv4_udp_tun);
224 err = nfp_flower_calc_opt_layer(enc_op, key_layer_two, key_size,
154 nfp_flower_calc_opt_layer(struct flow_dissector_key_enc_opts *enc_opts, u32 *key_layer_two, int *key_size, bool ipv6, struct netlink_ext_ack *extack) argument
173 nfp_flower_calc_udp_tun_layer(struct flow_dissector_key_ports *enc_ports, struct flow_dissector_key_enc_opts *enc_op, u32 *key_layer_two, u8 *key_layer, int *key_size, struct nfp_flower_priv *priv, enum nfp_flower_tun_type *tun_type, bool ipv6, struct netlink_ext_ack *extack) argument
250 int key_size; local
[all...]
/linux-master/samples/bpf/
H A Dtest_map_in_map.bpf.c56 __uint(key_size, sizeof(u32));
64 __uint(key_size, sizeof(u32));
72 __uint(key_size, sizeof(u32));
H A Dmap_perf_test.bpf.c51 __uint(key_size, sizeof(u32));
60 __uint(key_size, sizeof(u32));
75 __uint(key_size, sizeof(u32));
83 __uint(key_size, 8);
H A Dtracex6.bpf.c9 __uint(key_size, sizeof(int));
/linux-master/tools/testing/selftests/bpf/progs/
H A Dverifier_map_ptr_mixing.c50 __uint(key_size, sizeof(int));
63 __uint(key_size, sizeof(int));
H A Dtimer_mim_reject.c29 __uint(key_size, sizeof(int));
H A Dtest_unpriv_bpf_disabled.c57 __uint(key_size, sizeof(__u32));
H A Dtailcall_bpf2bpf3.c10 __uint(key_size, sizeof(__u32));
H A Dxsk_xdp_progs.c12 __uint(key_size, sizeof(int));
H A Daccess_map_in_map.c11 __uint(key_size, 4);
H A Dmap_in_map_btf.c29 __uint(key_size, 4);
/linux-master/kernel/trace/
H A Dtracing_map.h184 unsigned int key_size; member in struct:tracing_map
242 unsigned int key_size,
H A Dtracing_map.c414 elt->key = kzalloc(map->key_size, GFP_KERNEL);
505 static inline bool keys_match(void *key, void *test_key, unsigned key_size) argument
509 if (memcmp(key, test_key, key_size))
523 key_hash = jhash(key, map->key_size, 0);
536 keys_match(key, val->key, map->key_size)) {
576 memcpy(elt->key, key, map->key_size);
721 * @key_size: The size of the key for the map in bytes
769 unsigned int key_size,
798 map->key_size = key_size;
768 tracing_map_create(unsigned int map_bits, unsigned int key_size, const struct tracing_map_ops *ops, void *private_data) argument
966 detect_dups(struct tracing_map_sort_entry **sort_entries, int n_entries, unsigned int key_size) argument
[all...]
/linux-master/net/core/
H A Dsock_map.c36 attr->key_size != 4 ||
870 u32 key_size)
876 !memcmp(&elem->key, key, key_size))
886 u32 key_size = map->key_size, hash; local
892 hash = sock_hash_bucket_hash(key, key_size);
894 elem = sock_hash_lookup_elem_raw(&bucket->head, hash, key, key_size);
922 elem->key, map->key_size);
934 u32 hash, key_size = map->key_size; local
869 sock_hash_lookup_elem_raw(struct hlist_head *head, u32 hash, void *key, u32 key_size) argument
957 sock_hash_alloc_elem(struct bpf_shtab *htab, void *key, u32 key_size, u32 hash, struct sock *sk, struct bpf_shtab_elem *old) argument
988 u32 key_size = map->key_size, hash; local
1054 u32 hash, key_size = map->key_size; local
[all...]
/linux-master/kernel/bpf/
H A Dmap_iter.c104 u32 key_acc_size, value_acc_size, key_size, value_size; local
127 key_size = map->key_size;
133 if (key_acc_size > key_size || value_acc_size > value_size) {
/linux-master/fs/orangefs/
H A Dxattr.c415 int key_size; local
433 key_size = 0;
486 key_size,
491 key_size);
493 new_op->downcall.resp.listxattr.key + key_size,
500 key_size);
502 key_size += new_op->downcall.resp.listxattr.lengths[i];
/linux-master/fs/hfs/
H A Dbrec.c462 int key_size, rec; local
507 key_size = hfs_bnode_read_u8(node, 14) + 1;
509 key_size = tree->max_key_len + 1;
510 hfs_bnode_copy(new_node, 14, node, 14, key_size);
513 key_size = tree->max_key_len + 1;
516 key_size = (key_size + 1) & -2;
518 hfs_bnode_write(new_node, &cnid, 14 + key_size, 4);
521 hfs_bnode_write_u16(new_node, rec, 14 + key_size + 4);
/linux-master/drivers/net/ethernet/netronome/nfp/bpf/
H A Dcmsg.c95 req->key_size = cpu_to_be32(map->key_size);
231 if (memcmp(cached_key, key, map->key_size))
243 map->key_size);
328 memcpy(nfp_bpf_ctrl_req_key(bpf, req, 0), key, map->key_size);
368 map->key_size);
/linux-master/fs/ecryptfs/
H A Dkeystore.c259 ecryptfs_printk(KERN_ERR, "key_size [%d] larger than "
305 data_len = (5 + ECRYPTFS_SIG_SIZE_HEX + crypt_stat->key_size);
325 rc = ecryptfs_write_packet_length(&message[i], crypt_stat->key_size + 3,
334 memcpy(&message[i], crypt_stat->key, crypt_stat->key_size);
335 i += crypt_stat->key_size;
336 for (j = 0; j < crypt_stat->key_size; j++)
400 printk(KERN_ERR "%s: Encrypted key_size [%zd] larger than "
1172 crypt_stat->key_size = auth_tok->session_key.decrypted_key_size;
1183 crypt_stat->key_size);
1446 crypt_stat->key_size
[all...]
/linux-master/include/uapi/linux/
H A Dhyperv.h358 __u32 key_size; member in struct:hv_kvp_exchg_msg_value
382 __u32 key_size; member in struct:hv_kvp_msg_delete

Completed in 371 milliseconds

12345678910