Searched refs:key_size (Results 1 - 25 of 237) sorted by last modified time

12345678910

/linux-master/fs/smb/client/
H A Dsmb2transport.c312 struct kvec context, __u8 *key, unsigned int key_size)
324 memset(key, 0x0, key_size);
386 memcpy(key, hashptr, key_size);
311 generate_key(struct cifs_ses *ses, struct kvec label, struct kvec context, __u8 *key, unsigned int key_size) argument
/linux-master/tools/perf/util/bpf_skel/
H A Dlock_contention.bpf.c25 __uint(key_size, sizeof(__u32));
41 __uint(key_size, sizeof(__u32));
49 __uint(key_size, sizeof(struct contention_key));
56 __uint(key_size, sizeof(__u32));
63 __uint(key_size, sizeof(__u64));
70 __uint(key_size, sizeof(__u32));
77 __uint(key_size, sizeof(__u32));
84 __uint(key_size, sizeof(__u32));
91 __uint(key_size, sizeof(__u64));
98 __uint(key_size, sizeo
[all...]
/linux-master/drivers/ufs/host/
H A Dufs-qcom.c164 cap.key_size != UFS_CRYPTO_KEY_SIZE_256)
/linux-master/tools/hv/
H A Dhv_kvp_daemon.c278 static int kvp_key_delete(int pool, const __u8 *key, int key_size) argument
294 if (memcmp(key, record[i].key, key_size))
321 static int kvp_key_add_or_modify(int pool, const __u8 *key, int key_size, argument
329 if ((key_size > HV_KVP_EXCHANGE_MAX_KEY_SIZE) ||
343 if (memcmp(key, record[i].key, key_size))
368 memcpy(record[i].key, key, key_size);
375 static int kvp_get_value(int pool, const __u8 *key, int key_size, __u8 *value, argument
382 if ((key_size > HV_KVP_EXCHANGE_MAX_KEY_SIZE) ||
395 if (memcmp(key, record[i].key, key_size))
407 static int kvp_pool_enumerate(int pool, int index, __u8 *key, int key_size, argument
[all...]
/linux-master/net/bluetooth/rfcomm/
H A Dsock.c828 sec.key_size = 0;
/linux-master/net/bluetooth/
H A Dl2cap_sock.c591 sec.key_size = chan->conn->hcon->enc_key_size;
H A Dhci_event.c745 conn->enc_key_size = rp->key_size;
/linux-master/include/net/bluetooth/
H A Dbluetooth.h70 __u8 key_size; member in struct:bt_security
H A Dhci.h1615 __u8 key_size; member in struct:hci_rp_read_enc_key_size
/linux-master/net/core/
H A Dsock_map.c36 attr->key_size != 4 ||
870 u32 key_size)
876 !memcmp(&elem->key, key, key_size))
886 u32 key_size = map->key_size, hash; local
892 hash = sock_hash_bucket_hash(key, key_size);
894 elem = sock_hash_lookup_elem_raw(&bucket->head, hash, key, key_size);
922 elem->key, map->key_size);
934 u32 hash, key_size = map->key_size; local
869 sock_hash_lookup_elem_raw(struct hlist_head *head, u32 hash, void *key, u32 key_size) argument
957 sock_hash_alloc_elem(struct bpf_shtab *htab, void *key, u32 key_size, u32 hash, struct sock *sk, struct bpf_shtab_elem *old) argument
988 u32 key_size = map->key_size, hash; local
1054 u32 hash, key_size = map->key_size; local
[all...]
/linux-master/kernel/bpf/
H A Dverifier.c125 * [key, key + map->key_size) bytes are valid and were initialized on
136 * Now verifier knows that this map has key of R1->map_ptr->key_size bytes
139 * Now verifier checks that [R2, R2 + map's key_size) are within stack limits
5083 verbose(env, "invalid access to map key, key_size=%d off=%d size=%d\n",
6763 reg->map_ptr->key_size, false);
7264 reg->map_ptr->key_size, false);
8700 * check that [key, key + map->key_size) are within
8713 meta->map_ptr->key_size, false,
H A Dsyscall.c342 map->key_size = attr->key_size;
851 "key_size:\t%u\n"
860 map->key_size,
1068 u32 key_size, value_size; local
1073 key_type = btf_type_id_size(btf, &btf_key_id, &key_size);
1074 if (!key_type || key_size != map->key_size)
1498 static void *__bpf_copy_key(void __user *ukey, u64 key_size) argument
1500 if (key_size)
1509 ___bpf_copy_key(bpfptr_t ukey, u64 key_size) argument
[all...]
H A Dhelpers.c1147 key = value - round_up(map->key_size, 8);
H A Dbloom_filter.c101 if (attr->key_size != 0 || attr->value_size == 0 ||
H A Darena.c101 if (attr->key_size || attr->value_size || attr->max_entries == 0 ||
H A Dcpumap.c90 if (attr->max_entries == 0 || attr->key_size != 4 ||
/linux-master/include/linux/
H A Dbpf.h264 u32 key_size; member in struct:bpf_map
/linux-master/drivers/net/ethernet/intel/ice/
H A Dice_common.c4051 u16 key_size = sizeof(*key); local
4064 return ice_aq_send_cmd(hw, &desc, key, key_size, NULL);
/linux-master/drivers/md/
H A Ddm-integrity.c161 unsigned int key_size; member in struct:alg_spec
3784 a->key_size = strlen(a->key_string) / 2;
3785 a->key = kmalloc(a->key_size, GFP_KERNEL);
3788 if (hex2bin(a->key, a->key_string, a->key_size))
3816 r = crypto_shash_setkey(*hash, a->key, a->key_size);
3876 ic->journal_crypt_alg.key_size);
/linux-master/tools/lib/bpf/
H A Dlibbpf.c513 unsigned int key_size; member in struct:bpf_map_def
1343 map->def.key_size = sizeof(int);
1862 def->key_size = sizeof(int);
2474 } else if (strcmp(name, "key_size") == 0) {
2479 if (map_def->key_size && map_def->key_size != sz) {
2481 map_name, map_def->key_size, sz);
2484 map_def->key_size = sz;
2506 if (map_def->key_size && map_def->key_size !
[all...]
/linux-master/drivers/net/wireless/intel/iwlwifi/mvm/
H A Dd3.c134 .wep_key.key_size = key->keylen,
/linux-master/crypto/asymmetric_keys/
H A Dx509_cert_parser.c23 size_t key_size; /* Size of key data */ member in struct:x509_parse_context
103 cert->pub->key = kmemdup(ctx->key, ctx->key_size, GFP_KERNEL);
107 cert->pub->keylen = ctx->key_size;
561 ctx->key_size = vlen - 1;
H A Dpublic_key.c234 info->key_size = len * 8;
248 * which is actually 2 'key_size'-bit integers encoded in
/linux-master/include/ufs/
H A Dufshci.h401 u8 key_size; member in struct:ufs_crypto_cap_entry::__anon973
/linux-master/include/linux/mlx5/
H A Dmlx5_ifc.h12228 u8 key_size[0x1]; member in struct:mlx5_ifc_wrapped_dek_bits
12260 u8 key_size[0x4]; member in struct:mlx5_ifc_encryption_key_obj_bits
12351 u8 key_size[0x4]; member in struct:mlx5_ifc_int_kek_obj_bits

Completed in 704 milliseconds

12345678910