/linux-master/fs/smb/client/ |
H A D | smb2transport.c | 312 struct kvec context, __u8 *key, unsigned int key_size) 324 memset(key, 0x0, key_size); 386 memcpy(key, hashptr, key_size); 311 generate_key(struct cifs_ses *ses, struct kvec label, struct kvec context, __u8 *key, unsigned int key_size) argument
|
/linux-master/tools/perf/util/bpf_skel/ |
H A D | lock_contention.bpf.c | 25 __uint(key_size, sizeof(__u32)); 41 __uint(key_size, sizeof(__u32)); 49 __uint(key_size, sizeof(struct contention_key)); 56 __uint(key_size, sizeof(__u32)); 63 __uint(key_size, sizeof(__u64)); 70 __uint(key_size, sizeof(__u32)); 77 __uint(key_size, sizeof(__u32)); 84 __uint(key_size, sizeof(__u32)); 91 __uint(key_size, sizeof(__u64)); 98 __uint(key_size, sizeo [all...] |
/linux-master/drivers/ufs/host/ |
H A D | ufs-qcom.c | 164 cap.key_size != UFS_CRYPTO_KEY_SIZE_256)
|
/linux-master/tools/hv/ |
H A D | hv_kvp_daemon.c | 278 static int kvp_key_delete(int pool, const __u8 *key, int key_size) argument 294 if (memcmp(key, record[i].key, key_size)) 321 static int kvp_key_add_or_modify(int pool, const __u8 *key, int key_size, argument 329 if ((key_size > HV_KVP_EXCHANGE_MAX_KEY_SIZE) || 343 if (memcmp(key, record[i].key, key_size)) 368 memcpy(record[i].key, key, key_size); 375 static int kvp_get_value(int pool, const __u8 *key, int key_size, __u8 *value, argument 382 if ((key_size > HV_KVP_EXCHANGE_MAX_KEY_SIZE) || 395 if (memcmp(key, record[i].key, key_size)) 407 static int kvp_pool_enumerate(int pool, int index, __u8 *key, int key_size, argument [all...] |
/linux-master/net/bluetooth/rfcomm/ |
H A D | sock.c | 828 sec.key_size = 0;
|
/linux-master/net/bluetooth/ |
H A D | l2cap_sock.c | 591 sec.key_size = chan->conn->hcon->enc_key_size;
|
H A D | hci_event.c | 745 conn->enc_key_size = rp->key_size;
|
/linux-master/include/net/bluetooth/ |
H A D | bluetooth.h | 70 __u8 key_size; member in struct:bt_security
|
H A D | hci.h | 1615 __u8 key_size; member in struct:hci_rp_read_enc_key_size
|
/linux-master/net/core/ |
H A D | sock_map.c | 36 attr->key_size != 4 || 870 u32 key_size) 876 !memcmp(&elem->key, key, key_size)) 886 u32 key_size = map->key_size, hash; local 892 hash = sock_hash_bucket_hash(key, key_size); 894 elem = sock_hash_lookup_elem_raw(&bucket->head, hash, key, key_size); 922 elem->key, map->key_size); 934 u32 hash, key_size = map->key_size; local 869 sock_hash_lookup_elem_raw(struct hlist_head *head, u32 hash, void *key, u32 key_size) argument 957 sock_hash_alloc_elem(struct bpf_shtab *htab, void *key, u32 key_size, u32 hash, struct sock *sk, struct bpf_shtab_elem *old) argument 988 u32 key_size = map->key_size, hash; local 1054 u32 hash, key_size = map->key_size; local [all...] |
/linux-master/kernel/bpf/ |
H A D | verifier.c | 125 * [key, key + map->key_size) bytes are valid and were initialized on 136 * Now verifier knows that this map has key of R1->map_ptr->key_size bytes 139 * Now verifier checks that [R2, R2 + map's key_size) are within stack limits 5083 verbose(env, "invalid access to map key, key_size=%d off=%d size=%d\n", 6763 reg->map_ptr->key_size, false); 7264 reg->map_ptr->key_size, false); 8700 * check that [key, key + map->key_size) are within 8713 meta->map_ptr->key_size, false,
|
H A D | syscall.c | 342 map->key_size = attr->key_size; 851 "key_size:\t%u\n" 860 map->key_size, 1068 u32 key_size, value_size; local 1073 key_type = btf_type_id_size(btf, &btf_key_id, &key_size); 1074 if (!key_type || key_size != map->key_size) 1498 static void *__bpf_copy_key(void __user *ukey, u64 key_size) argument 1500 if (key_size) 1509 ___bpf_copy_key(bpfptr_t ukey, u64 key_size) argument [all...] |
H A D | helpers.c | 1147 key = value - round_up(map->key_size, 8);
|
H A D | bloom_filter.c | 101 if (attr->key_size != 0 || attr->value_size == 0 ||
|
H A D | arena.c | 101 if (attr->key_size || attr->value_size || attr->max_entries == 0 ||
|
H A D | cpumap.c | 90 if (attr->max_entries == 0 || attr->key_size != 4 ||
|
/linux-master/include/linux/ |
H A D | bpf.h | 264 u32 key_size; member in struct:bpf_map
|
/linux-master/drivers/net/ethernet/intel/ice/ |
H A D | ice_common.c | 4051 u16 key_size = sizeof(*key); local 4064 return ice_aq_send_cmd(hw, &desc, key, key_size, NULL);
|
/linux-master/drivers/md/ |
H A D | dm-integrity.c | 161 unsigned int key_size; member in struct:alg_spec 3784 a->key_size = strlen(a->key_string) / 2; 3785 a->key = kmalloc(a->key_size, GFP_KERNEL); 3788 if (hex2bin(a->key, a->key_string, a->key_size)) 3816 r = crypto_shash_setkey(*hash, a->key, a->key_size); 3876 ic->journal_crypt_alg.key_size);
|
/linux-master/tools/lib/bpf/ |
H A D | libbpf.c | 513 unsigned int key_size; member in struct:bpf_map_def 1343 map->def.key_size = sizeof(int); 1862 def->key_size = sizeof(int); 2474 } else if (strcmp(name, "key_size") == 0) { 2479 if (map_def->key_size && map_def->key_size != sz) { 2481 map_name, map_def->key_size, sz); 2484 map_def->key_size = sz; 2506 if (map_def->key_size && map_def->key_size ! [all...] |
/linux-master/drivers/net/wireless/intel/iwlwifi/mvm/ |
H A D | d3.c | 134 .wep_key.key_size = key->keylen,
|
/linux-master/crypto/asymmetric_keys/ |
H A D | x509_cert_parser.c | 23 size_t key_size; /* Size of key data */ member in struct:x509_parse_context 103 cert->pub->key = kmemdup(ctx->key, ctx->key_size, GFP_KERNEL); 107 cert->pub->keylen = ctx->key_size; 561 ctx->key_size = vlen - 1;
|
H A D | public_key.c | 234 info->key_size = len * 8; 248 * which is actually 2 'key_size'-bit integers encoded in
|
/linux-master/include/ufs/ |
H A D | ufshci.h | 401 u8 key_size; member in struct:ufs_crypto_cap_entry::__anon973
|
/linux-master/include/linux/mlx5/ |
H A D | mlx5_ifc.h | 12228 u8 key_size[0x1]; member in struct:mlx5_ifc_wrapped_dek_bits 12260 u8 key_size[0x4]; member in struct:mlx5_ifc_encryption_key_obj_bits 12351 u8 key_size[0x4]; member in struct:mlx5_ifc_int_kek_obj_bits
|