/linux-4.1.27/kernel/bpf/ |
D | hashtab.c | 45 htab->map.key_size = attr->key_size; in htab_map_alloc() 53 if (htab->map.max_entries == 0 || htab->map.key_size == 0 || in htab_map_alloc() 61 if (htab->map.key_size > MAX_BPF_STACK) in htab_map_alloc() 89 round_up(htab->map.key_size, 8) + in htab_map_alloc() 109 void *key, u32 key_size) in lookup_elem_raw() argument 114 if (l->hash == hash && !memcmp(&l->key, key, key_size)) in lookup_elem_raw() 126 u32 hash, key_size; in htab_map_lookup_elem() local 131 key_size = map->key_size; in htab_map_lookup_elem() 133 hash = htab_map_hash(key, key_size); in htab_map_lookup_elem() 137 l = lookup_elem_raw(head, hash, key, key_size); in htab_map_lookup_elem() [all …]
|
D | syscall.c | 165 key = kmalloc(map->key_size, GFP_USER); in map_lookup_elem() 170 if (copy_from_user(key, ukey, map->key_size) != 0) in map_lookup_elem() 223 key = kmalloc(map->key_size, GFP_USER); in map_update_elem() 228 if (copy_from_user(key, ukey, map->key_size) != 0) in map_update_elem() 275 key = kmalloc(map->key_size, GFP_USER); in map_delete_elem() 280 if (copy_from_user(key, ukey, map->key_size) != 0) in map_delete_elem() 315 key = kmalloc(map->key_size, GFP_USER); in map_get_next_key() 320 if (copy_from_user(key, ukey, map->key_size) != 0) in map_get_next_key() 324 next_key = kmalloc(map->key_size, GFP_USER); in map_get_next_key() 335 if (copy_to_user(unext_key, next_key, map->key_size) != 0) in map_get_next_key()
|
D | arraymap.c | 31 if (attr->max_entries == 0 || attr->key_size != 4 || in array_map_alloc() 53 array->map.key_size = attr->key_size; in array_map_alloc()
|
D | verifier.c | 256 env->cur_state.regs[i].map_ptr->key_size, in print_verifier_state() 807 err = check_stack_boundary(env, regno, (*mapp)->key_size); in check_func_arg()
|
/linux-4.1.27/drivers/usb/host/whci/ |
D | wusb.c | 142 const void *key, size_t key_size, bool is_gtk) in whc_set_key() argument 149 memcpy(seckey, key, key_size); in whc_set_key() 172 const void *ptk, size_t key_size) in whc_set_ptk() argument 181 ret = whc_set_key(whc, port_idx, tkid, ptk, key_size, false); in whc_set_ptk() 203 const void *gtk, size_t key_size) in whc_set_gtk() argument 210 ret = whc_set_key(whc, whc->n_devices, tkid, gtk, key_size, true); in whc_set_gtk()
|
D | whcd.h | 161 const void *ptk, size_t key_size); 163 const void *gtk, size_t key_size);
|
/linux-4.1.27/fs/ecryptfs/ |
D | crypto.c | 354 crypt_stat->key_size); in crypt_scatterlist() 356 crypt_stat->key_size); in crypt_scatterlist() 375 crypt_stat->key_size); in crypt_scatterlist() 616 crypt_stat->key_size << 3); in ecryptfs_init_crypt_ctx() 698 crypt_stat->key_size); in ecryptfs_compute_root_iv() 715 get_random_bytes(crypt_stat->key, crypt_stat->key_size); in ecryptfs_generate_new_key() 721 crypt_stat->key_size); in ecryptfs_generate_new_key() 795 crypt_stat->key_size = ECRYPTFS_DEFAULT_KEY_BYTES; in ecryptfs_set_default_crypt_stat_vals() 847 crypt_stat->key_size = in ecryptfs_new_file_context() 1596 char *cipher_name, size_t *key_size) in ecryptfs_process_key_cipher() argument [all …]
|
D | keystore.c | 318 data_len = (5 + ECRYPTFS_SIG_SIZE_HEX + crypt_stat->key_size); in write_tag_66_packet() 338 rc = ecryptfs_write_packet_length(&message[i], crypt_stat->key_size + 3, in write_tag_66_packet() 347 memcpy(&message[i], crypt_stat->key, crypt_stat->key_size); in write_tag_66_packet() 348 i += crypt_stat->key_size; in write_tag_66_packet() 349 for (j = 0; j < crypt_stat->key_size; j++) in write_tag_66_packet() 1190 crypt_stat->key_size = auth_tok->session_key.decrypted_key_size; in decrypt_pki_encrypted_session_key() 1201 crypt_stat->key_size); in decrypt_pki_encrypted_session_key() 1464 crypt_stat->key_size = 24; in parse_tag_3_packet() 1467 crypt_stat->key_size = in parse_tag_3_packet() 1716 crypt_stat->key_size); in decrypt_passphrase_encrypted_session_key() [all …]
|
D | ecryptfs_kernel.h | 233 size_t key_size; member 314 size_t key_size; member 659 size_t key_size);
|
/linux-4.1.27/samples/bpf/ |
D | libbpf.c | 21 int bpf_create_map(enum bpf_map_type map_type, int key_size, int value_size, in bpf_create_map() argument 26 .key_size = key_size, in bpf_create_map()
|
D | tracex2_kern.c | 15 .key_size = sizeof(long), 67 .key_size = sizeof(u32),
|
D | tracex3_kern.c | 15 .key_size = sizeof(long), 46 .key_size = sizeof(u32),
|
D | sockex1_kern.c | 9 .key_size = sizeof(u32),
|
D | tracex4_kern.c | 19 .key_size = sizeof(long),
|
D | bpf_helpers.h | 41 unsigned int key_size; member
|
D | libbpf.h | 7 int bpf_create_map(enum bpf_map_type map_type, int key_size, int value_size,
|
D | sockex2_kern.c | 193 .key_size = sizeof(__be32),
|
D | bpf_load.c | 128 maps[i].key_size, in load_maps()
|
/linux-4.1.27/fs/hfs/ |
D | brec.c | 455 int key_size, rec; in hfs_btree_inc_height() local 500 key_size = hfs_bnode_read_u8(node, 14) + 1; in hfs_btree_inc_height() 502 key_size = tree->max_key_len + 1; in hfs_btree_inc_height() 503 hfs_bnode_copy(new_node, 14, node, 14, key_size); in hfs_btree_inc_height() 506 key_size = tree->max_key_len + 1; in hfs_btree_inc_height() 509 key_size = (key_size + 1) & -2; in hfs_btree_inc_height() 511 hfs_bnode_write(new_node, &cnid, 14 + key_size, 4); in hfs_btree_inc_height() 514 hfs_bnode_write_u16(new_node, rec, 14 + key_size + 4); in hfs_btree_inc_height()
|
D | bnode.c | 320 int entry_size, key_size; in hfs_bnode_find() local 382 key_size = hfs_bnode_read_u8(node, off) + 1; in hfs_bnode_find() 383 if (key_size >= entry_size /*|| key_size & 1*/) in hfs_bnode_find()
|
/linux-4.1.27/drivers/md/ |
D | dm-crypt.c | 176 unsigned int key_size; member 270 sg_init_one(&sg, cc->key, cc->key_size); in crypt_iv_essiv_init() 274 err = crypto_hash_digest(&desc, &sg, cc->key_size, essiv->salt); in crypt_iv_essiv_init() 509 int subkey_size = cc->key_size / cc->key_parts; in crypt_iv_lmk_init() 633 if (cc->key_size <= (cc->iv_size + TCW_WHITENING_SIZE)) { in crypt_iv_tcw_ctr() 658 int key_offset = cc->key_size - cc->iv_size - TCW_WHITENING_SIZE; in crypt_iv_tcw_init() 1459 subkey_size = (cc->key_size - cc->key_extra_size) >> ilog2(cc->tfms_count); in crypt_setkey_allcpus() 1478 if (cc->key_size != (key_string_len >> 1)) in crypt_set_key() 1482 if (!cc->key_size && strcmp(key, "-")) in crypt_set_key() 1485 if (cc->key_size && crypt_decode_key(cc->key, key, cc->key_size) < 0) in crypt_set_key() [all …]
|
/linux-4.1.27/tools/hv/ |
D | hv_kvp_daemon.c | 311 static int kvp_key_delete(int pool, const __u8 *key, int key_size) in kvp_key_delete() argument 327 if (memcmp(key, record[i].key, key_size)) in kvp_key_delete() 354 static int kvp_key_add_or_modify(int pool, const __u8 *key, int key_size, in kvp_key_add_or_modify() argument 362 if ((key_size > HV_KVP_EXCHANGE_MAX_KEY_SIZE) || in kvp_key_add_or_modify() 376 if (memcmp(key, record[i].key, key_size)) in kvp_key_add_or_modify() 401 memcpy(record[i].key, key, key_size); in kvp_key_add_or_modify() 408 static int kvp_get_value(int pool, const __u8 *key, int key_size, __u8 *value, in kvp_get_value() argument 415 if ((key_size > HV_KVP_EXCHANGE_MAX_KEY_SIZE) || in kvp_get_value() 428 if (memcmp(key, record[i].key, key_size)) in kvp_get_value() 440 static int kvp_pool_enumerate(int pool, int index, __u8 *key, int key_size, in kvp_pool_enumerate() argument [all …]
|
/linux-4.1.27/drivers/usb/wusbcore/ |
D | security.c | 101 const size_t key_size = sizeof(wusbhc->gtk.data); in wusbhc_generate_gtk() local 110 get_random_bytes(wusbhc->gtk.descr.bKeyData, key_size); in wusbhc_generate_gtk() 123 const size_t key_size = sizeof(wusbhc->gtk.data); in wusbhc_sec_start() local 129 &wusbhc->gtk.descr.bKeyData, key_size); in wusbhc_sec_start() 545 size_t key_size = sizeof(wusbhc->gtk.data); in wusbhc_gtk_rekey_work() local 590 &wusbhc->gtk.descr.bKeyData, key_size); in wusbhc_gtk_rekey_work()
|
D | wusbhc.h | 287 u32 tkid, const void *key, size_t key_size); 289 u32 tkid, const void *key, size_t key_size);
|
/linux-4.1.27/fs/hfsplus/ |
D | brec.c | 459 int key_size, rec; in hfs_btree_inc_height() local 505 key_size = hfs_bnode_read_u16(node, 14) + 2; in hfs_btree_inc_height() 507 key_size = tree->max_key_len + 2; in hfs_btree_inc_height() 508 hfs_bnode_copy(new_node, 14, node, 14, key_size); in hfs_btree_inc_height() 512 key_size = tree->max_key_len + 2; in hfs_btree_inc_height() 516 hfs_bnode_write(new_node, &cnid, 14 + key_size, 4); in hfs_btree_inc_height() 519 hfs_bnode_write_u16(new_node, rec, 14 + key_size + 4); in hfs_btree_inc_height()
|
D | bnode.c | 486 int entry_size, key_size; in hfs_bnode_find() local 550 key_size = hfs_bnode_read_u16(node, off) + 2; in hfs_bnode_find() 551 if (key_size >= entry_size || key_size & 1) in hfs_bnode_find()
|
/linux-4.1.27/drivers/hv/ |
D | hv_kvp.c | 424 message->body.kvp_set.data.key_size = in kvp_send_key() 427 in_msg->body.kvp_set.data.key_size, in kvp_send_key() 434 message->body.kvp_delete.key_size = in kvp_send_key() 437 in_msg->body.kvp_delete.key_size, in kvp_send_key() 566 kvp_data->key_size = 2*(keylen + 1); /* utf16 encoding */ in kvp_respond_to_host()
|
/linux-4.1.27/include/uapi/linux/ |
D | hyperv.h | 339 __u32 key_size; member 363 __u32 key_size; member
|
D | bpf.h | 136 __u32 key_size; /* size of key in bytes */ member
|
D | ethtool.h | 908 __u32 key_size; member
|
/linux-4.1.27/drivers/usb/host/ |
D | hwa-hc.c | 466 const void *key, size_t key_size, in __hwahc_dev_set_key() argument 476 keyd_len = sizeof(*keyd) + key_size; in __hwahc_dev_set_key() 486 memcpy(keyd->bKeyData, key, key_size); in __hwahc_dev_set_key() 507 const void *key, size_t key_size) in __hwahc_op_set_ptk() argument 521 key, key_size, key_idx); in __hwahc_op_set_ptk() 549 const void *key, size_t key_size) in __hwahc_op_set_gtk() argument 554 return __hwahc_dev_set_key(wusbhc, 0, tkid, key, key_size, key_idx); in __hwahc_op_set_gtk()
|
/linux-4.1.27/include/linux/ |
D | ecryptfs.h | 84 u32 key_size; member
|
D | bpf.h | 32 u32 key_size; member
|
D | ccp.h | 294 u32 key_size; /* In bits */ member
|
/linux-4.1.27/drivers/crypto/amcc/ |
D | crypto4xx_sa.c | 46 offset = cts.bf.key_size in get_dynamic_sa_offset_state_ptr_field()
|
D | crypto4xx_sa.h | 47 u32 key_size:4; member
|
/linux-4.1.27/drivers/crypto/qce/ |
D | common.c | 102 static u32 qce_auth_cfg(unsigned long flags, u32 key_size) in qce_auth_cfg() argument 112 if (key_size == AES_KEYSIZE_128) in qce_auth_cfg() 114 else if (key_size == AES_KEYSIZE_256) in qce_auth_cfg()
|
/linux-4.1.27/drivers/net/wireless/ti/wlcore/ |
D | cmd.h | 77 u8 key_size, const u8 *key, const u8 *addr, 81 u8 key_size, const u8 *key, u8 hlid, u32 tx_seq_32, 509 u8 key_size; member
|
D | cmd.c | 1363 u8 key_size, const u8 *key, const u8 *addr, in wl1271_cmd_set_sta_key() argument 1389 cmd->key_size = key_size; in wl1271_cmd_set_sta_key() 1409 memcpy(cmd->key, key, key_size); in wl1271_cmd_set_sta_key() 1432 u8 key_size, const u8 *key, u8 hlid, u32 tx_seq_32, in wl1271_cmd_set_ap_key() argument 1459 cmd->key_size = key_size; in wl1271_cmd_set_ap_key() 1476 memcpy(cmd->key, key, key_size); in wl1271_cmd_set_ap_key()
|
D | wlcore_i.h | 218 u8 key_size; member
|
D | main.c | 3241 u8 id, u8 key_type, u8 key_size, in wl1271_record_ap_key() argument 3250 if (key_size > MAX_KEY_SIZE) in wl1271_record_ap_key() 3276 ap_key->key_size = key_size; in wl1271_record_ap_key() 3277 memcpy(ap_key->key, key, key_size); in wl1271_record_ap_key() 3314 key->key_size, key->key, in wl1271_ap_init_hwenc() 3338 u8 key_size, const u8 *key, u32 tx_seq_32, in wl1271_set_key() argument 3364 key_type, key_size, in wl1271_set_key() 3369 id, key_type, key_size, in wl1271_set_key() 3402 id, key_type, key_size, in wl1271_set_key()
|
/linux-4.1.27/crypto/asymmetric_keys/ |
D | x509_cert_parser.c | 29 size_t key_size; /* Size of key data */ member 108 ctx->key, ctx->key_size); in x509_cert_parse() 403 ctx->key_size = vlen - 1; in x509_extract_key_data()
|
/linux-4.1.27/net/core/ |
D | ethtool.c | 728 user_key_size = rxfh.key_size; in ethtool_get_rxfh() 736 rxfh.key_size = dev_key_size; in ethtool_get_rxfh() 809 (rxfh.key_size && (rxfh.key_size != dev_key_size)) || in ethtool_set_rxfh() 811 rxfh.key_size == 0 && rxfh.hfunc == ETH_RSS_HASH_NO_CHANGE)) in ethtool_set_rxfh() 817 rss_config = kzalloc(indir_bytes + rxfh.key_size, GFP_USER); in ethtool_set_rxfh() 844 if (rxfh.key_size) { in ethtool_set_rxfh() 848 rxfh.key_size)) { in ethtool_set_rxfh()
|
/linux-4.1.27/drivers/net/wireless/iwlwifi/mvm/ |
D | fw-api-sta.h | 389 u8 key_size; member
|
D | d3.c | 177 .wep_key.key_size = key->keylen, in iwl_mvm_wowlan_program_keys()
|
/linux-4.1.27/drivers/net/wireless/iwlwifi/dvm/ |
D | sta.c | 1009 if (ctx->wep_keys[i].key_size) { in iwl_send_static_wepkey_cmd() 1016 wep_cmd->key[i].key_size = ctx->wep_keys[i].key_size; in iwl_send_static_wepkey_cmd() 1018 ctx->wep_keys[i].key_size); in iwl_send_static_wepkey_cmd() 1084 ctx->wep_keys[keyconf->keyidx].key_size = keyconf->keylen; in iwl_set_default_wep_key()
|
D | commands.h | 1026 u8 key_size; member
|
/linux-4.1.27/include/uapi/linux/wimax/ |
D | i2400m.h | 142 __le32 key_size; /* in dwords */ member
|
/linux-4.1.27/include/net/bluetooth/ |
D | bluetooth.h | 62 __u8 key_size; member
|
/linux-4.1.27/drivers/net/wireless/ti/wl1251/ |
D | cmd.h | 403 u8 key_size; member
|
D | main.c | 968 wl_cmd->key_size = key->keylen; in wl1251_op_set_key()
|
/linux-4.1.27/net/bluetooth/ |
D | smp.c | 1713 u8 key_size, auth, sec_level; in smp_cmd_pairing_req() local 1764 key_size = min(req->max_key_size, rsp.max_key_size); in smp_cmd_pairing_req() 1765 if (check_enc_key_size(conn, key_size)) in smp_cmd_pairing_req() 1802 key_size = min(req->max_key_size, rsp.max_key_size); in smp_cmd_pairing_req() 1803 if (check_enc_key_size(conn, key_size)) in smp_cmd_pairing_req() 1898 u8 key_size, auth; in smp_cmd_pairing_rsp() local 1913 key_size = min(req->max_key_size, rsp->max_key_size); in smp_cmd_pairing_rsp() 1914 if (check_enc_key_size(conn, key_size)) in smp_cmd_pairing_rsp()
|
D | l2cap_sock.c | 530 sec.key_size = chan->conn->hcon->enc_key_size; in l2cap_sock_getsockopt()
|
/linux-4.1.27/drivers/net/wireless/ipw2x00/ |
D | ipw2100.h | 295 u8 key_size; // 0 no imm key, 0x5 64bit encr, 0xd 128bit encr, 0x10 128bit encr and 128bit IV member
|
D | ipw2200.h | 821 u8 key_size; member
|
D | ipw2200.c | 5950 key.key_size = 0; in ipw_send_wep_keys() 5954 key.key_size = priv->ieee->sec.key_sizes[i]; in ipw_send_wep_keys() 5955 memcpy(key.key, priv->ieee->sec.keys[i], key.key_size); in ipw_send_wep_keys()
|
/linux-4.1.27/drivers/crypto/ccp/ |
D | ccp-ops.c | 1574 if (rsa->key_size > CCP_RSA_MAX_WIDTH) in ccp_run_rsa_cmd() 1586 o_len = ((rsa->key_size + 255) / 256) * 32; in ccp_run_rsa_cmd() 1646 op.u.rsa.mod_size = rsa->key_size; in ccp_run_rsa_cmd()
|
/linux-4.1.27/arch/ia64/kernel/ |
D | palinfo.c | 316 vm_info_1.pal_vm_info_1_s.key_size, in vm_info()
|
/linux-4.1.27/drivers/net/wireless/iwlegacy/ |
D | 4965-mac.c | 3160 u8 key_size = il->_4965.wep_keys[i].key_size; in il4965_static_wepkey_cmd() local 3163 if (key_size) { in il4965_static_wepkey_cmd() 3169 wep_cmd->key[i].key_size = key_size; in il4965_static_wepkey_cmd() 3170 memcpy(&wep_cmd->key[i].key[3], il->_4965.wep_keys[i].key, key_size); in il4965_static_wepkey_cmd() 3235 il->_4965.wep_keys[idx].key_size = len; in il4965_set_default_wep_key()
|
D | commands.h | 1105 u8 key_size; member
|
/linux-4.1.27/drivers/staging/lustre/lustre/obdclass/ |
D | dt_object.c | 708 LASSERT(iops->key_size(env, it) == ii->ii_keysize); in dt_index_page_build()
|
/linux-4.1.27/net/bluetooth/rfcomm/ |
D | sock.c | 854 sec.key_size = 0; in rfcomm_sock_getsockopt()
|
/linux-4.1.27/drivers/net/wimax/i2400m/ |
D | fw.c | 823 + le32_to_cpu(bcf_hdr->key_size) * sizeof(u32) in i2400m_dnload_finalize()
|
/linux-4.1.27/arch/ia64/include/asm/ |
D | pal.h | 1626 key_size : 8, member
|
/linux-4.1.27/drivers/staging/lustre/lustre/include/ |
D | dt_object.h | 609 int (*key_size)(const struct lu_env *env, member
|
/linux-4.1.27/Documentation/networking/ |
D | filter.txt | 1106 using attr->map_type, attr->key_size, attr->value_size, attr->max_entries
|