/linux-master/samples/bpf/ |
H A D | xdp_router_ipv4.bpf.c | 44 __uint(key_size, 8); 68 __uint(key_size, sizeof(int));
|
H A D | trace_event_kern.c | 29 __uint(key_size, sizeof(u32));
|
H A D | tracex2.bpf.c | 74 __uint(key_size, sizeof(struct hist_key));
|
H A D | tracex5.bpf.c | 20 __uint(key_size, sizeof(u32));
|
H A D | tracex3.bpf.c | 52 __uint(key_size, sizeof(u32));
|
/linux-master/tools/testing/selftests/bpf/progs/ |
H A D | verifier_runtime_jit.c | 16 __uint(key_size, sizeof(int)); 29 __uint(key_size, sizeof(int));
|
H A D | lsm.c | 66 __uint(key_size, sizeof(int)); 76 __uint(key_size, sizeof(int));
|
H A D | map_ptr_kern.c | 32 __u32 key_size; member in struct:bpf_map 38 static inline int check_bpf_map_fields(struct bpf_map *map, __u32 key_size, argument 42 VERIFY(map->key_size == key_size); 54 VERIFY(indirect->key_size == direct->key_size); 63 __u32 key_size, __u32 value_size, __u32 max_entries) 66 VERIFY(check_bpf_map_fields(indirect, key_size, value_size, 62 check(struct bpf_map *indirect, struct bpf_map *direct, __u32 key_size, __u32 value_size, __u32 max_entries) argument
|
H A D | test_get_stack_rawtp.c | 21 __uint(key_size, sizeof(int));
|
H A D | timer_mim.c | 28 __uint(key_size, sizeof(int));
|
H A D | test_sockmap_kern.h | 35 __uint(key_size, sizeof(int)); 42 __uint(key_size, sizeof(int)); 49 __uint(key_size, sizeof(int)); 91 __uint(key_size, sizeof(int));
|
H A D | htab_mem_bench.c | 19 __uint(key_size, 4);
|
H A D | syscall.c | 45 __uint(key_size, 4); 112 .key_size = 8, 179 attr->key_size = 4;
|
/linux-master/include/linux/ |
H A D | ecryptfs.h | 85 u32 key_size; member in struct:ecryptfs_private_key
|
/linux-master/drivers/net/ethernet/netronome/nfp/bpf/ |
H A D | fw.h | 80 __be32 key_size; /* in bytes */ member in struct:cmsg_req_map_alloc_tbl
|
/linux-master/include/uapi/linux/ |
H A D | keyctl.h | 100 __u32 key_size; /* Size of the key in bits */ member in struct:keyctl_pkey_query
|
/linux-master/tools/bpf/runqslower/ |
H A D | runqslower.bpf.c | 22 __uint(key_size, sizeof(u32));
|
/linux-master/tools/testing/selftests/bpf/prog_tests/ |
H A D | obj_name.c | 55 attr.key_size = 4;
|
/linux-master/drivers/crypto/intel/keembay/ |
H A D | ocs-aes.h | 67 int ocs_aes_set_key(struct ocs_aes_dev *aes_dev, const u32 key_size,
|
/linux-master/tools/lib/bpf/ |
H A D | bpf_gen_internal.h | 60 __u32 key_size, __u32 value_size, __u32 max_entries,
|
/linux-master/drivers/crypto/amcc/ |
H A D | crypto4xx_sa.h | 38 u32 key_size:4; member in struct:dynamic_sa_contents::__anon173 279 offset = cts->sa_contents.bf.key_size 306 cts->sa_contents.bf.key_size * 4);
|
/linux-master/drivers/soc/qcom/ |
H A D | ice.c | 165 u8 algorithm_id, u8 key_size, 179 key_size != QCOM_ICE_CRYPTO_KEY_SIZE_256) { 181 "Unhandled crypto capability; algorithm_id=%d, key_size=%d\n", 182 algorithm_id, key_size); 164 qcom_ice_program_key(struct qcom_ice *ice, u8 algorithm_id, u8 key_size, const u8 crypto_key[], u8 data_unit_size, int slot) argument
|
/linux-master/fs/ecryptfs/ |
H A D | crypto.c | 285 crypt_stat->key_size); 287 crypt_stat->key_size); 304 crypt_stat->key_size); 539 crypt_stat->key_size << 3); 621 crypt_stat->key_size); 638 get_random_bytes(crypt_stat->key, crypt_stat->key_size); 644 crypt_stat->key_size); 718 crypt_stat->key_size = ECRYPTFS_DEFAULT_KEY_BYTES; 770 crypt_stat->key_size = 1513 * @key_size 1520 ecryptfs_process_key_cipher(struct crypto_skcipher **key_tfm, char *cipher_name, size_t *key_size) argument 1593 ecryptfs_add_new_key_tfm(struct ecryptfs_key_tfm **key_tfm, char *cipher_name, size_t key_size) argument [all...] |
/linux-master/fs/hfsplus/ |
H A D | brec.c | 466 int key_size, rec; local 512 key_size = hfs_bnode_read_u16(node, 14) + 2; 514 key_size = tree->max_key_len + 2; 515 hfs_bnode_copy(new_node, 14, node, 14, key_size); 519 key_size = tree->max_key_len + 2; 523 hfs_bnode_write(new_node, &cnid, 14 + key_size, 4); 526 hfs_bnode_write_u16(new_node, rec, 14 + key_size + 4);
|
/linux-master/drivers/hv/ |
H A D | hv_kvp.c | 460 message->body.kvp_set.data.key_size = 463 in_msg->body.kvp_set.data.key_size, 471 message->body.kvp_get.data.key_size = 474 in_msg->body.kvp_get.data.key_size, 481 message->body.kvp_delete.key_size = 484 in_msg->body.kvp_delete.key_size, 600 kvp_data->key_size = 2*(keylen + 1); /* utf16 encoding */
|