/linux-4.4.14/security/keys/ |
D | key.c | 42 void __key_check(const struct key *key) in __key_check() argument 45 key, key->magic, KEY_DEBUG_MAGIC); in __key_check() 137 static inline void key_alloc_serial(struct key *key) in key_alloc_serial() argument 140 struct key *xkey; in key_alloc_serial() 145 get_random_bytes(&key->serial, sizeof(key->serial)); in key_alloc_serial() 147 key->serial >>= 1; /* negative numbers are not permitted */ in key_alloc_serial() 148 } while (key->serial < 3); in key_alloc_serial() 158 xkey = rb_entry(parent, struct key, serial_node); in key_alloc_serial() 160 if (key->serial < xkey->serial) in key_alloc_serial() 162 else if (key->serial > xkey->serial) in key_alloc_serial() [all …]
|
D | gc.c | 130 struct key *key = in key_gc_unused_keys() local 131 list_entry(keys->next, struct key, graveyard_link); in key_gc_unused_keys() 132 list_del(&key->graveyard_link); in key_gc_unused_keys() 134 kdebug("- %u", key->serial); in key_gc_unused_keys() 135 key_check(key); in key_gc_unused_keys() 138 if (test_bit(KEY_FLAG_INSTANTIATED, &key->flags) && in key_gc_unused_keys() 139 !test_bit(KEY_FLAG_NEGATIVE, &key->flags) && in key_gc_unused_keys() 140 key->type->destroy) in key_gc_unused_keys() 141 key->type->destroy(key); in key_gc_unused_keys() 143 security_key_free(key); in key_gc_unused_keys() [all …]
|
D | request_key.c | 35 kenter("{%d,%d},%d", cons->key->serial, cons->authkey->serial, error); in complete_request_key() 38 key_negate_and_link(cons->key, key_negative_timeout, NULL, in complete_request_key() 43 key_put(cons->key); in complete_request_key() 58 struct key *keyring = info->data; in umh_keys_init() 68 struct key *keyring = info->data; in umh_keys_cleanup() 76 struct key *session_keyring, int wait) in call_usermodehelper_keys() 100 struct key *key = cons->key, *authkey = cons->authkey, *keyring, in call_sbin_request_key() local 107 kenter("{%d},{%d},%s", key->serial, authkey->serial, op); in call_sbin_request_key() 114 sprintf(desc, "_req.%u", key->serial); in call_sbin_request_key() 136 sprintf(key_str, "%d", key->serial); in call_sbin_request_key() [all …]
|
D | proc.c | 91 struct key *key = rb_entry(n, struct key, serial_node); in key_serial_next() local 92 if (kuid_has_mapping(user_ns, key->user->uid)) in key_serial_next() 104 static struct key *find_ge_key(struct seq_file *p, key_serial_t id) in find_ge_key() 108 struct key *minkey = NULL; in find_ge_key() 111 struct key *key = rb_entry(n, struct key, serial_node); in find_ge_key() local 112 if (id < key->serial) { in find_ge_key() 113 if (!minkey || minkey->serial > key->serial) in find_ge_key() 114 minkey = key; in find_ge_key() 116 } else if (id > key->serial) { in find_ge_key() 119 minkey = key; in find_ge_key() [all …]
|
D | internal.h | 91 extern int __key_link_begin(struct key *keyring, 94 extern int __key_link_check_live_key(struct key *keyring, struct key *key); 95 extern void __key_link(struct key *key, struct assoc_array_edit **_edit); 96 extern void __key_link_end(struct key *keyring, 103 extern struct key *keyring_search_instkey(struct key *keyring, 106 extern int iterate_over_keyring(const struct key *keyring, 107 int (*func)(const struct key *key, void *data), 131 extern bool key_default_cmp(const struct key *key, 139 extern struct key *find_keyring_by_name(const char *name, bool skip_perm_check); 144 extern int install_session_keyring_to_cred(struct cred *, struct key *); [all …]
|
D | permission.c | 33 struct key *key; in key_task_permission() local 37 key = key_ref_to_ptr(key_ref); in key_task_permission() 40 if (uid_eq(key->uid, cred->fsuid)) { in key_task_permission() 41 kperm = key->perm >> 16; in key_task_permission() 47 if (gid_valid(key->gid) && key->perm & KEY_GRP_ALL) { in key_task_permission() 48 if (gid_eq(key->gid, cred->fsgid)) { in key_task_permission() 49 kperm = key->perm >> 8; in key_task_permission() 53 ret = groups_search(cred->group_info, key->gid); in key_task_permission() 55 kperm = key->perm >> 8; in key_task_permission() 61 kperm = key->perm; in key_task_permission() [all …]
|
D | keyring.c | 46 static inline struct key *keyring_ptr_to_key(const struct assoc_array_ptr *x) in keyring_ptr_to_key() 49 return (struct key *)((unsigned long)object & ~KEYRING_PTR_SUBTYPE); in keyring_ptr_to_key() 51 static inline void *keyring_key_to_ptr(struct key *key) in keyring_key_to_ptr() argument 53 if (key->type == &key_type_keyring) in keyring_key_to_ptr() 54 return (void *)((unsigned long)key | KEYRING_PTR_SUBTYPE); in keyring_key_to_ptr() 55 return key; in keyring_key_to_ptr() 78 static int keyring_instantiate(struct key *keyring, 80 static void keyring_revoke(struct key *keyring); 81 static void keyring_destroy(struct key *keyring); 82 static void keyring_describe(const struct key *keyring, struct seq_file *m); [all …]
|
D | request_key_auth.c | 25 static int request_key_auth_instantiate(struct key *, 27 static void request_key_auth_describe(const struct key *, struct seq_file *); 28 static void request_key_auth_revoke(struct key *); 29 static void request_key_auth_destroy(struct key *); 30 static long request_key_auth_read(const struct key *, char __user *, size_t); 59 static int request_key_auth_instantiate(struct key *key, in request_key_auth_instantiate() argument 62 key->payload.data[0] = (struct request_key_auth *)prep->data; in request_key_auth_instantiate() 69 static void request_key_auth_describe(const struct key *key, in request_key_auth_describe() argument 72 struct request_key_auth *rka = key->payload.data[0]; in request_key_auth_describe() 75 seq_puts(m, key->description); in request_key_auth_describe() [all …]
|
D | user_defined.c | 97 int user_update(struct key *key, struct key_preparsed_payload *prep) in user_update() argument 119 ret = key_payload_reserve(key, datalen); in user_update() 123 if (!test_bit(KEY_FLAG_NEGATIVE, &key->flags)) in user_update() 124 zap = key->payload.data[0]; in user_update() 127 rcu_assign_keypointer(key, upayload); in user_update() 128 key->expiry = 0; in user_update() 144 void user_revoke(struct key *key) in user_revoke() argument 146 struct user_key_payload *upayload = key->payload.data[0]; in user_revoke() 149 key_payload_reserve(key, 0); in user_revoke() 152 rcu_assign_keypointer(key, NULL); in user_revoke() [all …]
|
D | big_key.c | 135 void big_key_revoke(struct key *key) in big_key_revoke() argument 137 struct path *path = (struct path *)&key->payload.data[big_key_path]; in big_key_revoke() 140 key_payload_reserve(key, 0); in big_key_revoke() 141 if (key_is_instantiated(key) && in big_key_revoke() 142 (size_t)key->payload.data[big_key_len] > BIG_KEY_FILE_THRESHOLD) in big_key_revoke() 149 void big_key_destroy(struct key *key) in big_key_destroy() argument 151 size_t datalen = (size_t)key->payload.data[big_key_len]; in big_key_destroy() 154 struct path *path = (struct path *)&key->payload.data[big_key_path]; in big_key_destroy() 159 kfree(key->payload.data[big_key_data]); in big_key_destroy() 160 key->payload.data[big_key_data] = NULL; in big_key_destroy() [all …]
|
D | process_keys.c | 47 struct key *uid_keyring, *session_keyring; in install_user_keyrings() 133 struct key *keyring; in install_thread_keyring_to_cred() 176 struct key *keyring; in install_process_keyring_to_cred() 219 int install_session_keyring_to_cred(struct cred *cred, struct key *keyring) in install_session_keyring_to_cred() 222 struct key *old; in install_session_keyring_to_cred() 255 static int install_session_keyring(struct key *keyring) in install_session_keyring() 492 bool lookup_user_key_possessed(const struct key *key, in lookup_user_key_possessed() argument 495 return key == match_data->raw_data; in lookup_user_key_possessed() 525 struct key *key; in lookup_user_key() local 547 key = ctx.cred->thread_keyring; in lookup_user_key() [all …]
|
D | keyctl.c | 164 struct key *key; in SYSCALL_DEFINE4() local 213 key = request_key_and_link(ktype, description, callout_info, in SYSCALL_DEFINE4() 216 if (IS_ERR(key)) { in SYSCALL_DEFINE4() 217 ret = PTR_ERR(key); in SYSCALL_DEFINE4() 222 ret = wait_for_key_construction(key, 1); in SYSCALL_DEFINE4() 226 ret = key->serial; in SYSCALL_DEFINE4() 229 key_put(key); in SYSCALL_DEFINE4() 559 struct key *key, *instkey; in keyctl_describe_key() local 586 key = key_ref_to_ptr(key_ref); in keyctl_describe_key() 587 desclen = strlen(key->description); in keyctl_describe_key() [all …]
|
/linux-4.4.14/crypto/ |
D | testmgr.h | 40 char *key; member 68 char *key; member 84 char *key; member 103 char *key; member 130 unsigned char *key; member 152 .key = 182 .key = 226 .key = 291 .key = 2054 .key = "\xdf\xa6\xbf\x4d\xed\x81\xdb\x03" [all …]
|
D | rsa_helper.c | 24 struct rsa_key *key = context; in rsa_get_n() local 26 key->n = mpi_read_raw_data(value, vlen); in rsa_get_n() 28 if (!key->n) in rsa_get_n() 32 if (fips_enabled && (mpi_get_size(key->n) != 256 && in rsa_get_n() 33 mpi_get_size(key->n) != 384)) { in rsa_get_n() 35 mpi_free(key->n); in rsa_get_n() 36 key->n = NULL; in rsa_get_n() 45 struct rsa_key *key = context; in rsa_get_e() local 47 key->e = mpi_read_raw_data(value, vlen); in rsa_get_e() 49 if (!key->e) in rsa_get_e() [all …]
|
D | cast6_generic.c | 101 static inline void W(u32 *key, unsigned int i) in W() argument 104 key[6] ^= F1(key[7], Tr[i % 4][0], Tm[i][0]); in W() 105 key[5] ^= F2(key[6], Tr[i % 4][1], Tm[i][1]); in W() 106 key[4] ^= F3(key[5], Tr[i % 4][2], Tm[i][2]); in W() 107 key[3] ^= F1(key[4], Tr[i % 4][3], Tm[i][3]); in W() 108 key[2] ^= F2(key[3], Tr[i % 4][4], Tm[i][4]); in W() 109 key[1] ^= F3(key[2], Tr[i % 4][5], Tm[i][5]); in W() 110 key[0] ^= F1(key[1], Tr[i % 4][6], Tm[i][6]); in W() 111 key[7] ^= F2(key[0], Tr[i % 4][7], Tm[i][7]); in W() 118 u32 key[8]; in __cast6_setkey() local [all …]
|
D | rsa.c | 21 static int _rsa_enc(const struct rsa_key *key, MPI c, MPI m) in _rsa_enc() argument 24 if (mpi_cmp_ui(m, 0) < 0 || mpi_cmp(m, key->n) >= 0) in _rsa_enc() 28 return mpi_powm(c, m, key->e, key->n); in _rsa_enc() 35 static int _rsa_dec(const struct rsa_key *key, MPI m, MPI c) in _rsa_dec() argument 38 if (mpi_cmp_ui(c, 0) < 0 || mpi_cmp(c, key->n) >= 0) in _rsa_dec() 42 return mpi_powm(m, c, key->d, key->n); in _rsa_dec() 49 static int _rsa_sign(const struct rsa_key *key, MPI s, MPI m) in _rsa_sign() argument 52 if (mpi_cmp_ui(m, 0) < 0 || mpi_cmp(m, key->n) >= 0) in _rsa_sign() 56 return mpi_powm(s, m, key->d, key->n); in _rsa_sign() 63 static int _rsa_verify(const struct rsa_key *key, MPI m, MPI s) in _rsa_verify() argument [all …]
|
D | twofish_common.c | 483 if (key[i]) { \ 484 tmp = poly_to_exp[key[i] - 1]; \ 544 mds[0][q0[a ^ key[(j) + 8]] ^ key[j]] \ 545 ^ mds[1][q0[b ^ key[(j) + 9]] ^ key[(j) + 1]] \ 546 ^ mds[2][q1[c ^ key[(j) + 10]] ^ key[(j) + 2]] \ 547 ^ mds[3][q1[d ^ key[(j) + 11]] ^ key[(j) + 3]] 557 CALC_K_2 (q0[a ^ key[(j) + 16]], \ 558 q1[b ^ key[(j) + 17]], \ 559 q0[c ^ key[(j) + 18]], \ 560 q1[d ^ key[(j) + 19]], j) [all …]
|
D | crc32c_generic.c | 49 u32 key; member 66 ctx->crc = mctx->key; in chksum_init() 76 static int chksum_setkey(struct crypto_shash *tfm, const u8 *key, in chksum_setkey() argument 81 if (keylen != sizeof(mctx->key)) { in chksum_setkey() 85 mctx->key = le32_to_cpu(*(__le32 *)key); in chksum_setkey() 125 return __chksum_finup(&mctx->key, data, length, out); in chksum_digest() 132 mctx->key = ~0; in crc32c_cra_init()
|
/linux-4.4.14/net/mac80211/ |
D | key.c | 125 static int ieee80211_key_enable_hw_accel(struct ieee80211_key *key) in ieee80211_key_enable_hw_accel() argument 133 if (key->flags & KEY_FLAG_TAINTED) { in ieee80211_key_enable_hw_accel() 141 key->flags &= ~KEY_FLAG_UPLOADED_TO_HARDWARE; in ieee80211_key_enable_hw_accel() 145 if (!key->local->ops->set_key) in ieee80211_key_enable_hw_accel() 148 assert_key_lock(key->local); in ieee80211_key_enable_hw_accel() 150 sta = key->sta; in ieee80211_key_enable_hw_accel() 156 if (sta && !(key->conf.flags & IEEE80211_KEY_FLAG_PAIRWISE) && in ieee80211_key_enable_hw_accel() 157 !ieee80211_hw_check(&key->local->hw, SUPPORTS_PER_STA_GTK)) in ieee80211_key_enable_hw_accel() 163 sdata = key->sdata; in ieee80211_key_enable_hw_accel() 169 if (!(key->conf.flags & IEEE80211_KEY_FLAG_PAIRWISE)) in ieee80211_key_enable_hw_accel() [all …]
|
D | debugfs_key.c | 24 struct ieee80211_key *key = file->private_data; \ 26 format_string, key->prop); \ 77 struct ieee80211_key *key = file->private_data; in key_algorithm_read() local 78 u32 c = key->conf.cipher; in key_algorithm_read() 89 struct ieee80211_key *key = file->private_data; in key_tx_spec_write() local 93 switch (key->conf.cipher) { in key_tx_spec_write() 114 atomic64_set(&key->conf.tx_pn, pn); in key_tx_spec_write() 127 struct ieee80211_key *key = file->private_data; in key_tx_spec_read() local 129 switch (key->conf.cipher) { in key_tx_spec_read() 136 key->u.tkip.tx.iv32, in key_tx_spec_read() [all …]
|
D | tkip.c | 145 u8 *ieee80211_tkip_add_iv(u8 *pos, struct ieee80211_key *key) in ieee80211_tkip_add_iv() argument 147 lockdep_assert_held(&key->u.tkip.txlock); in ieee80211_tkip_add_iv() 149 pos = write_tkip_iv(pos, key->u.tkip.tx.iv16); in ieee80211_tkip_add_iv() 150 *pos++ = (key->conf.keyidx << 6) | (1 << 5) /* Ext IV */; in ieee80211_tkip_add_iv() 151 put_unaligned_le32(key->u.tkip.tx.iv32, pos); in ieee80211_tkip_add_iv() 155 static void ieee80211_compute_tkip_p1k(struct ieee80211_key *key, u32 iv32) in ieee80211_compute_tkip_p1k() argument 157 struct ieee80211_sub_if_data *sdata = key->sdata; in ieee80211_compute_tkip_p1k() 158 struct tkip_ctx *ctx = &key->u.tkip.tx; in ieee80211_compute_tkip_p1k() 159 const u8 *tk = &key->conf.key[NL80211_TKIP_DATA_OFFSET_ENCR_KEY]; in ieee80211_compute_tkip_p1k() 161 lockdep_assert_held(&key->u.tkip.txlock); in ieee80211_compute_tkip_p1k() [all …]
|
D | wpa.c | 32 u8 *data, *key, *mic; in ieee80211_tx_h_michael_mic_add() local 41 if (!tx->key || tx->key->conf.cipher != WLAN_CIPHER_SUITE_TKIP || in ieee80211_tx_h_michael_mic_add() 60 !(tx->key->conf.flags & IEEE80211_KEY_FLAG_GENERATE_MMIC)) { in ieee80211_tx_h_michael_mic_add() 76 key = &tx->key->conf.key[NL80211_TKIP_DATA_OFFSET_TX_MIC_KEY]; in ieee80211_tx_h_michael_mic_add() 78 michael_mic(key, hdr, data, data_len, mic); in ieee80211_tx_h_michael_mic_add() 89 u8 *data, *key = NULL; in ieee80211_rx_h_michael_mic_verify() local 114 if (!(status->flag & RX_FLAG_IV_STRIPPED) && rx->key && in ieee80211_rx_h_michael_mic_verify() 115 rx->key->conf.cipher == WLAN_CIPHER_SUITE_TKIP) in ieee80211_rx_h_michael_mic_verify() 126 if (!rx->key || rx->key->conf.cipher != WLAN_CIPHER_SUITE_TKIP || in ieee80211_rx_h_michael_mic_verify() 130 if (rx->sdata->vif.type == NL80211_IFTYPE_AP && rx->key->conf.keyidx) { in ieee80211_rx_h_michael_mic_verify() [all …]
|
D | debugfs_key.h | 5 void ieee80211_debugfs_key_add(struct ieee80211_key *key); 6 void ieee80211_debugfs_key_remove(struct ieee80211_key *key); 12 void ieee80211_debugfs_key_sta_del(struct ieee80211_key *key, 15 static inline void ieee80211_debugfs_key_add(struct ieee80211_key *key) in ieee80211_debugfs_key_add() argument 17 static inline void ieee80211_debugfs_key_remove(struct ieee80211_key *key) in ieee80211_debugfs_key_remove() argument 28 static inline void ieee80211_debugfs_key_sta_del(struct ieee80211_key *key, in ieee80211_debugfs_key_sta_del() argument
|
D | wep.c | 120 struct ieee80211_key *key) in ieee80211_wep_remove_iv() argument 163 const u8 *key, int keylen, int keyidx) in ieee80211_wep_encrypt() argument 182 memcpy(rc4key + 3, key, keylen); in ieee80211_wep_encrypt() 227 struct ieee80211_key *key) in ieee80211_wep_decrypt() argument 248 if (!key || keyidx != key->conf.keyidx) in ieee80211_wep_decrypt() 251 klen = 3 + key->conf.keylen; in ieee80211_wep_decrypt() 257 memcpy(rc4key + 3, key->conf.key, key->conf.keylen); in ieee80211_wep_decrypt() 288 if (ieee80211_wep_decrypt(rx->local, rx->skb, rx->key)) in ieee80211_crypto_wep_decrypt() 294 ieee80211_wep_remove_iv(rx->local, rx->skb, rx->key); in ieee80211_crypto_wep_decrypt() 309 if (ieee80211_wep_encrypt(tx->local, skb, tx->key->conf.key, in wep_encrypt_skb() [all …]
|
/linux-4.4.14/include/linux/ |
D | key.h | 36 struct key; 113 static inline key_ref_t make_key_ref(const struct key *key, in make_key_ref() argument 116 return (key_ref_t) ((unsigned long) key | possession); in make_key_ref() 119 static inline struct key *key_ref_to_ptr(const key_ref_t key_ref) in key_ref_to_ptr() 121 return (struct key *) ((unsigned long) key_ref & ~1UL); in key_ref_to_ptr() 137 struct key { struct 209 extern struct key *key_alloc(struct key_type *type, argument 222 extern void key_revoke(struct key *key); 223 extern void key_invalidate(struct key *key); 224 extern void key_put(struct key *key); [all …]
|
D | key-type.h | 25 struct key *key; /* key being constructed */ member 26 struct key *authkey;/* authorisation for key being constructed */ 51 typedef int (*request_key_actor_t)(struct key_construction *key, 62 bool (*cmp)(const struct key *key, 102 int (*instantiate)(struct key *key, struct key_preparsed_payload *prep); 109 int (*update)(struct key *key, struct key_preparsed_payload *prep); 124 void (*revoke)(struct key *key); 127 void (*destroy)(struct key *key); 130 void (*describe)(const struct key *key, struct seq_file *p); 139 long (*read)(const struct key *key, char __user *buffer, size_t buflen); [all …]
|
D | jump_label.h | 120 static inline int static_key_count(struct static_key *key) in static_key_count() argument 122 return atomic_read(&key->enabled); in static_key_count() 131 static __always_inline bool static_key_false(struct static_key *key) in static_key_false() argument 133 return arch_static_branch(key, false); in static_key_false() 136 static __always_inline bool static_key_true(struct static_key *key) in static_key_true() argument 138 return !arch_static_branch(key, true); in static_key_true() 152 extern void static_key_slow_inc(struct static_key *key); 153 extern void static_key_slow_dec(struct static_key *key); 170 static __always_inline bool static_key_false(struct static_key *key) in static_key_false() argument 172 if (unlikely(static_key_count(key) > 0)) in static_key_false() [all …]
|
D | btree-type.h | 37 static inline void *BTREE_FN(lookup)(BTREE_TYPE_HEAD *head, BTREE_KEYTYPE key) in BTREE_FN() 39 unsigned long _key = key; in BTREE_FN() 43 static inline int BTREE_FN(insert)(BTREE_TYPE_HEAD *head, BTREE_KEYTYPE key, in BTREE_FN() 46 unsigned long _key = key; in BTREE_FN() 50 static inline int BTREE_FN(update)(BTREE_TYPE_HEAD *head, BTREE_KEYTYPE key, in BTREE_FN() 53 unsigned long _key = key; in BTREE_FN() 57 static inline void *BTREE_FN(remove)(BTREE_TYPE_HEAD *head, BTREE_KEYTYPE key) in BTREE_FN() 59 unsigned long _key = key; in BTREE_FN() 63 static inline void *BTREE_FN(last)(BTREE_TYPE_HEAD *head, BTREE_KEYTYPE *key) in BTREE_FN() 68 *key = _key; in BTREE_FN() [all …]
|
D | btree.h | 100 unsigned long *key); 115 unsigned long *key, void *val, gfp_t gfp); 128 unsigned long *key, void *val); 140 unsigned long *key); 172 unsigned long *key); 186 unsigned long *key); 193 unsigned long *key, size_t index, 201 unsigned long *key, 215 #define btree_for_each_safel(head, key, val) \ argument 216 for (val = btree_lastl(head, &key); \ [all …]
|
D | btree-128.h | 23 u64 key[2] = {k1, k2}; in btree_lookup128() local 24 return btree_lookup(&head->h, &btree_geo128, (unsigned long *)&key); in btree_lookup128() 30 u64 key[2] = {*k1, *k2}; in btree_get_prev128() local 34 (unsigned long *)&key); in btree_get_prev128() 35 *k1 = key[0]; in btree_get_prev128() 36 *k2 = key[1]; in btree_get_prev128() 43 u64 key[2] = {k1, k2}; in btree_insert128() local 45 (unsigned long *)&key, val, gfp); in btree_insert128() 51 u64 key[2] = {k1, k2}; in btree_update128() local 53 (unsigned long *)&key, val); in btree_update128() [all …]
|
D | sysrq.h | 45 void handle_sysrq(int key); 46 void __handle_sysrq(int key, bool check_mask); 47 int register_sysrq_key(int key, struct sysrq_key_op *op); 48 int unregister_sysrq_key(int key, struct sysrq_key_op *op); 49 struct sysrq_key_op *__sysrq_get_key_op(int key); 55 static inline void handle_sysrq(int key) in handle_sysrq() argument 59 static inline void __handle_sysrq(int key, bool check_mask) in __handle_sysrq() argument 63 static inline int register_sysrq_key(int key, struct sysrq_key_op *op) in register_sysrq_key() argument 68 static inline int unregister_sysrq_key(int key, struct sysrq_key_op *op) in unregister_sysrq_key() argument
|
D | jump_label_ratelimit.h | 9 struct static_key key; member 16 extern void static_key_slow_dec_deferred(struct static_key_deferred *key); 18 jump_label_rate_limit(struct static_key_deferred *key, unsigned long rl); 22 struct static_key key; member 24 static inline void static_key_slow_dec_deferred(struct static_key_deferred *key) in static_key_slow_dec_deferred() argument 27 static_key_slow_dec(&key->key); in static_key_slow_dec_deferred() 30 jump_label_rate_limit(struct static_key_deferred *key, in jump_label_rate_limit() argument
|
D | lockdep.h | 76 struct lockdep_subclass_key *key; member 151 struct lock_class_key *key; member 281 struct lock_class_key *key, int subclass); 288 { .name = (_name), .key = (void *)(_key), } 296 #define lockdep_set_class(lock, key) \ argument 297 lockdep_init_map(&(lock)->dep_map, #key, key, 0) 298 #define lockdep_set_class_and_name(lock, key, name) \ argument 299 lockdep_init_map(&(lock)->dep_map, name, key, 0) 300 #define lockdep_set_class_and_subclass(lock, key, sub) \ argument 301 lockdep_init_map(&(lock)->dep_map, #key, key, sub) [all …]
|
D | hashtable.h | 55 #define hash_add(hashtable, node, key) \ argument 56 hlist_add_head(node, &hashtable[hash_min(key, HASH_BITS(hashtable))]) 64 #define hash_add_rcu(hashtable, node, key) \ argument 65 hlist_add_head_rcu(node, &hashtable[hash_min(key, HASH_BITS(hashtable))]) 160 #define hash_for_each_possible(name, obj, member, key) \ argument 161 hlist_for_each_entry(obj, &name[hash_min(key, HASH_BITS(name))], member) 172 #define hash_for_each_possible_rcu(name, obj, member, key) \ argument 173 hlist_for_each_entry_rcu(obj, &name[hash_min(key, HASH_BITS(name))],\ 187 #define hash_for_each_possible_rcu_notrace(name, obj, member, key) \ argument 189 &name[hash_min(key, HASH_BITS(name))], member) [all …]
|
D | rhashtable.h | 89 const void *key; member 213 const void *key, const struct rhashtable_params params) in rht_key_hashfn() argument 219 hash = ht->p.hashfn(key, ht->key_len, tbl->hash_rnd); in rht_key_hashfn() 224 hash = params.hashfn(key, key_len, tbl->hash_rnd); in rht_key_hashfn() 226 hash = jhash(key, key_len, tbl->hash_rnd); in rht_key_hashfn() 228 hash = jhash2(key, key_len / sizeof(u32), in rht_key_hashfn() 234 hash = params.hashfn(key, key_len, tbl->hash_rnd); in rht_key_hashfn() 236 hash = jhash(key, key_len, tbl->hash_rnd); in rht_key_hashfn() 344 const void *key, 514 return memcmp(ptr + ht->p.key_offset, arg->key, ht->p.key_len); in rhashtable_compare() [all …]
|
/linux-4.4.14/drivers/s390/crypto/ |
D | zcrypt_cca_key.h | 160 } __attribute__((packed)) *key = p; in zcrypt_type6_mex_key_de() local 163 memset(key, 0, sizeof(*key)); in zcrypt_type6_mex_key_de() 166 key->t6_hdr.blen = cpu_to_be16(0x189); in zcrypt_type6_mex_key_de() 167 key->t6_hdr.ulen = cpu_to_be16(0x189 - 2); in zcrypt_type6_mex_key_de() 169 key->t6_hdr.blen = cpu_to_le16(0x189); in zcrypt_type6_mex_key_de() 170 key->t6_hdr.ulen = cpu_to_le16(0x189 - 2); in zcrypt_type6_mex_key_de() 172 key->pvtMeHdr = static_pvt_me_hdr; in zcrypt_type6_mex_key_de() 173 key->pvtMeSec = static_pvt_me_sec; in zcrypt_type6_mex_key_de() 174 key->pubMeSec = static_pub_me_sec; in zcrypt_type6_mex_key_de() 180 memcpy(key->exponent, pk_exponent, 3); in zcrypt_type6_mex_key_de() [all …]
|
/linux-4.4.14/samples/bpf/ |
D | test_maps.c | 23 long long key, next_key, value; in test_hashmap_sanity() local 26 map_fd = bpf_create_map(BPF_MAP_TYPE_HASH, sizeof(key), sizeof(value), 2); in test_hashmap_sanity() 32 key = 1; in test_hashmap_sanity() 35 assert(bpf_update_elem(map_fd, &key, &value, BPF_ANY) == 0); in test_hashmap_sanity() 39 assert(bpf_update_elem(map_fd, &key, &value, BPF_NOEXIST) == -1 && in test_hashmap_sanity() 43 assert(bpf_update_elem(map_fd, &key, &value, -1) == -1 && errno == EINVAL); in test_hashmap_sanity() 46 assert(bpf_lookup_elem(map_fd, &key, &value) == 0 && value == 1234); in test_hashmap_sanity() 48 key = 2; in test_hashmap_sanity() 50 assert(bpf_lookup_elem(map_fd, &key, &value) == -1 && errno == ENOENT); in test_hashmap_sanity() 53 assert(bpf_update_elem(map_fd, &key, &value, BPF_EXIST) == -1 && in test_hashmap_sanity() [all …]
|
D | tracex3_user.c | 23 __u32 key; in clear_stats() local 26 for (key = 0; key < SLOTS; key++) in clear_stats() 27 bpf_update_elem(fd, &key, &value, BPF_ANY); in clear_stats() 78 __u32 key; in print_hist() local 84 for (key = 0; key < SLOTS; key++) { in print_hist() 86 bpf_lookup_elem(fd, &key, &value); in print_hist() 87 cnt[key] = value; in print_hist() 93 for (key = full_range ? 0 : 29; key < SLOTS; key++) { in print_hist() 94 int c = num_colors * cnt[key] / (max_cnt + 1); in print_hist()
|
D | tracex2_user.c | 39 struct hist_key key = {}, next_key; in print_hist_for_pid() local 47 while (bpf_get_next_key(fd, &key, &next_key) == 0) { in print_hist_for_pid() 49 key = next_key; in print_hist_for_pid() 59 key = next_key; in print_hist_for_pid() 74 struct hist_key key = {}, next_key; in print_hist() local 79 while (bpf_get_next_key(fd, &key, &next_key) == 0) { in print_hist() 87 key = next_key; in print_hist() 109 long key, next_key, value; in main() local 131 key = 0; in main() 132 while (bpf_get_next_key(map_fd[0], &key, &next_key) == 0) { in main() [all …]
|
D | libbpf.c | 34 int bpf_update_elem(int fd, void *key, void *value, unsigned long long flags) in bpf_update_elem() argument 38 .key = ptr_to_u64(key), in bpf_update_elem() 46 int bpf_lookup_elem(int fd, void *key, void *value) in bpf_lookup_elem() argument 50 .key = ptr_to_u64(key), in bpf_lookup_elem() 57 int bpf_delete_elem(int fd, void *key) in bpf_delete_elem() argument 61 .key = ptr_to_u64(key), in bpf_delete_elem() 67 int bpf_get_next_key(int fd, void *key, void *next_key) in bpf_get_next_key() argument 71 .key = ptr_to_u64(key), in bpf_get_next_key()
|
D | sockex1_user.c | 32 int key; in main() local 34 key = IPPROTO_TCP; in main() 35 assert(bpf_lookup_elem(map_fd[0], &key, &tcp_cnt) == 0); in main() 37 key = IPPROTO_UDP; in main() 38 assert(bpf_lookup_elem(map_fd[0], &key, &udp_cnt) == 0); in main() 40 key = IPPROTO_ICMP; in main() 41 assert(bpf_lookup_elem(map_fd[0], &key, &icmp_cnt) == 0); in main()
|
D | sock_example.c | 33 int sock = -1, map_fd, prog_fd, i, key; in test_sock() local 36 map_fd = bpf_create_map(BPF_MAP_TYPE_ARRAY, sizeof(key), sizeof(value), in test_sock() 74 key = IPPROTO_TCP; in test_sock() 75 assert(bpf_lookup_elem(map_fd, &key, &tcp_cnt) == 0); in test_sock() 77 key = IPPROTO_UDP; in test_sock() 78 assert(bpf_lookup_elem(map_fd, &key, &udp_cnt) == 0); in test_sock() 80 key = IPPROTO_ICMP; in test_sock() 81 assert(bpf_lookup_elem(map_fd, &key, &icmp_cnt) == 0); in test_sock()
|
D | tracex2_kern.c | 85 struct hist_key key = {}; in bpf_prog3() local 87 key.index = log2l(write_size); in bpf_prog3() 88 key.pid_tgid = bpf_get_current_pid_tgid(); in bpf_prog3() 89 key.uid_gid = bpf_get_current_uid_gid(); in bpf_prog3() 90 bpf_get_current_comm(&key.comm, sizeof(key.comm)); in bpf_prog3() 92 value = bpf_map_lookup_elem(&my_hist_map, &key); in bpf_prog3() 96 bpf_map_update_elem(&my_hist_map, &key, &init_val, BPF_ANY); in bpf_prog3()
|
/linux-4.4.14/net/openvswitch/ |
D | flow.c | 250 static int parse_ipv6hdr(struct sk_buff *skb, struct sw_flow_key *key) in parse_ipv6hdr() argument 268 key->ip.proto = NEXTHDR_NONE; in parse_ipv6hdr() 269 key->ip.tos = ipv6_get_dsfield(nh); in parse_ipv6hdr() 270 key->ip.ttl = nh->hop_limit; in parse_ipv6hdr() 271 key->ipv6.label = *(__be32 *)nh & htonl(IPV6_FLOWINFO_FLOWLABEL); in parse_ipv6hdr() 272 key->ipv6.addr.src = nh->saddr; in parse_ipv6hdr() 273 key->ipv6.addr.dst = nh->daddr; in parse_ipv6hdr() 279 key->ip.frag = OVS_FRAG_TYPE_LATER; in parse_ipv6hdr() 281 key->ip.frag = OVS_FRAG_TYPE_FIRST; in parse_ipv6hdr() 283 key->ip.frag = OVS_FRAG_TYPE_NONE; in parse_ipv6hdr() [all …]
|
D | conntrack.h | 34 void ovs_ct_fill_key(const struct sk_buff *skb, struct sw_flow_key *key); 35 int ovs_ct_put_key(const struct sw_flow_key *key, struct sk_buff *skb); 54 const struct sw_flow_key *key, in ovs_ct_copy_action() argument 67 struct sw_flow_key *key, in ovs_ct_execute() argument 75 struct sw_flow_key *key) in ovs_ct_fill_key() argument 77 key->ct.state = 0; in ovs_ct_fill_key() 78 key->ct.zone = 0; in ovs_ct_fill_key() 79 key->ct.mark = 0; in ovs_ct_fill_key() 80 memset(&key->ct.labels, 0, sizeof(key->ct.labels)); in ovs_ct_fill_key() 83 static inline int ovs_ct_put_key(const struct sw_flow_key *key, in ovs_ct_put_key() argument
|
D | conntrack.c | 58 static u16 key_to_nfproto(const struct sw_flow_key *key) in key_to_nfproto() argument 60 switch (ntohs(key->eth.type)) { in key_to_nfproto() 132 static void __ovs_ct_update_key(struct sw_flow_key *key, u8 state, in __ovs_ct_update_key() argument 136 key->ct.state = state; in __ovs_ct_update_key() 137 key->ct.zone = zone->id; in __ovs_ct_update_key() 138 key->ct.mark = ovs_ct_get_mark(ct); in __ovs_ct_update_key() 139 ovs_ct_get_labels(ct, &key->ct.labels); in __ovs_ct_update_key() 147 struct sw_flow_key *key, bool post_ct) in ovs_ct_update_key() argument 167 __ovs_ct_update_key(key, state, zone, ct); in ovs_ct_update_key() 170 void ovs_ct_fill_key(const struct sk_buff *skb, struct sw_flow_key *key) in ovs_ct_fill_key() argument [all …]
|
D | actions.c | 48 struct sw_flow_key *key, 113 const struct sw_flow_key *key, in add_deferred_actions() argument 124 da->pkt_key = *key; in add_deferred_actions() 130 static void invalidate_flow_key(struct sw_flow_key *key) in invalidate_flow_key() argument 132 key->eth.type = htons(0); in invalidate_flow_key() 135 static bool is_flow_key_valid(const struct sw_flow_key *key) in is_flow_key_valid() argument 137 return !!key->eth.type; in is_flow_key_valid() 140 static int push_mpls(struct sk_buff *skb, struct sw_flow_key *key, in push_mpls() argument 170 invalidate_flow_key(key); in push_mpls() 174 static int pop_mpls(struct sk_buff *skb, struct sw_flow_key *key, in pop_mpls() argument [all …]
|
D | flow_netlink.c | 90 sizeof((match)->key->field), is_mask); \ 92 (match)->mask->key.field = value; \ 94 (match)->key->field = value; \ 101 memcpy((u8 *)&(match)->mask->key + offset, value_p, \ 104 memcpy((u8 *)(match)->key + offset, value_p, len); \ 114 sizeof((match)->key->field), is_mask); \ 116 memset((u8 *)&(match)->mask->key.field, value, \ 117 sizeof((match)->mask->key.field)); \ 119 memset((u8 *)&(match)->key->field, value, \ 120 sizeof((match)->key->field)); \ [all …]
|
/linux-4.4.14/security/selinux/ss/ |
D | avtab.c | 71 struct avtab_key *key, struct avtab_datum *datum) in avtab_insert_node() argument 78 newnode->key = *key; in avtab_insert_node() 80 if (key->specified & AVTAB_XPERMS) { in avtab_insert_node() 108 static int avtab_insert(struct avtab *h, struct avtab_key *key, struct avtab_datum *datum) in avtab_insert() argument 112 u16 specified = key->specified & ~(AVTAB_ENABLED|AVTAB_ENABLED_OLD); in avtab_insert() 117 hvalue = avtab_hash(key, h->mask); in avtab_insert() 121 if (key->source_type == cur->key.source_type && in avtab_insert() 122 key->target_type == cur->key.target_type && in avtab_insert() 123 key->target_class == cur->key.target_class && in avtab_insert() 124 (specified & cur->key.specified)) { in avtab_insert() [all …]
|
D | hashtab.c | 12 struct hashtab *hashtab_create(u32 (*hash_value)(struct hashtab *h, const void *key), in hashtab_create() argument 39 int hashtab_insert(struct hashtab *h, void *key, void *datum) in hashtab_insert() argument 49 hvalue = h->hash_value(h, key); in hashtab_insert() 52 while (cur && h->keycmp(h, key, cur->key) > 0) { in hashtab_insert() 57 if (cur && (h->keycmp(h, key, cur->key) == 0)) in hashtab_insert() 63 newnode->key = key; in hashtab_insert() 77 void *hashtab_search(struct hashtab *h, const void *key) in hashtab_search() argument 85 hvalue = h->hash_value(h, key); in hashtab_search() 87 while (cur && h->keycmp(h, key, cur->key) > 0) in hashtab_search() 90 if (cur == NULL || (h->keycmp(h, key, cur->key) != 0)) in hashtab_search() [all …]
|
D | conditional.c | 103 cur->node->key.specified &= ~AVTAB_ENABLED; in evaluate_cond_node() 105 cur->node->key.specified |= AVTAB_ENABLED; in evaluate_cond_node() 111 cur->node->key.specified &= ~AVTAB_ENABLED; in evaluate_cond_node() 113 cur->node->key.specified |= AVTAB_ENABLED; in evaluate_cond_node() 186 int cond_destroy_bool(void *key, void *datum, void *p) in cond_destroy_bool() argument 188 kfree(key); in cond_destroy_bool() 193 int cond_index_bool(void *key, void *datum, void *datap) in cond_index_bool() argument 206 if (flex_array_put_ptr(fa, booldatum->value - 1, key, in cond_index_bool() 223 char *key = NULL; in cond_read_bool() local 247 key = kmalloc(len + 1, GFP_KERNEL); in cond_read_bool() [all …]
|
D | policydb.c | 177 char *key = NULL; in roles_init() local 192 key = kstrdup(OBJECT_R, GFP_KERNEL); in roles_init() 193 if (!key) in roles_init() 196 rc = hashtab_insert(p->p_roles.table, key, role); in roles_init() 202 kfree(key); in roles_init() 246 const struct range_trans *key = k; in rangetr_hash() local 247 return (key->source_type + (key->target_type << 3) + in rangetr_hash() 248 (key->target_class << 5)) & (h->size - 1); in rangetr_hash() 331 static int common_index(void *key, void *datum, void *datap) in common_index() argument 343 if (flex_array_put_ptr(fa, comdatum->value - 1, key, in common_index() [all …]
|
/linux-4.4.14/lib/ |
D | test_static_keys.c | 45 struct static_key *key; member 49 #define test_key_func(key, branch) \ argument 50 ({bool func(void) { return branch(key); } func; }) 52 static void invert_key(struct static_key *key) in invert_key() argument 54 if (static_key_enabled(key)) in invert_key() 55 static_key_disable(key); in invert_key() 57 static_key_enable(key); in invert_key() 66 if (previous != keys[i].key) { in invert_keys() 67 invert_key(keys[i].key); in invert_keys() 68 previous = keys[i].key; in invert_keys() [all …]
|
D | btree.c | 135 static void dec_key(struct btree_geo *geo, unsigned long *key) in dec_key() argument 141 val = key[i]; in dec_key() 142 key[i] = val - 1; in dec_key() 159 unsigned long *key) in setkey() argument 161 longcpy(bkey(geo, node, n), key, geo->keylen); in setkey() 208 unsigned long *key) in btree_last() argument 219 longcpy(key, bkey(geo, node, 0), geo->keylen); in btree_last() 225 unsigned long *key) in keycmp() argument 227 return longcmp(bkey(geo, node, pos), key, geo->keylen); in keycmp() 230 static int keyzero(struct btree_geo *geo, unsigned long *key) in keyzero() argument [all …]
|
D | digsig.c | 70 static int digsig_verify_rsa(struct key *key, in digsig_verify_rsa() argument 87 down_read(&key->sem); in digsig_verify_rsa() 88 ukp = user_key_payload(key); in digsig_verify_rsa() 170 up_read(&key->sem); in digsig_verify_rsa() 190 int digsig_verify(struct key *keyring, const char *sig, int siglen, in digsig_verify() 197 struct key *key; in digsig_verify() local 214 key = ERR_CAST(kref); in digsig_verify() 216 key = key_ref_to_ptr(kref); in digsig_verify() 218 key = request_key(&key_type_user, name, NULL); in digsig_verify() 220 if (IS_ERR(key)) { in digsig_verify() [all …]
|
D | test_static_key_base.c | 42 static void invert_key(struct static_key *key) in invert_key() argument 44 if (static_key_enabled(key)) in invert_key() 45 static_key_disable(key); in invert_key() 47 static_key_enable(key); in invert_key() 54 invert_key(&base_inv_true_key.key); in test_static_key_base_init() 55 invert_key(&base_inv_false_key.key); in test_static_key_base_init()
|
D | once.c | 8 struct static_key *key; member 16 BUG_ON(!static_key_enabled(work->key)); in once_deferred() 17 static_key_slow_dec(work->key); in once_deferred() 21 static void once_disable_jump(struct static_key *key) in once_disable_jump() argument 30 w->key = key; in once_disable_jump()
|
/linux-4.4.14/fs/ubifs/ |
D | key.h | 97 union ubifs_key *key, ino_t inum) in ino_key_init() argument 99 key->u32[0] = inum; in ino_key_init() 100 key->u32[1] = UBIFS_INO_KEY << UBIFS_S_KEY_BLOCK_BITS; in ino_key_init() 112 union ubifs_key *key = k; in ino_key_init_flash() local 114 key->j32[0] = cpu_to_le32(inum); in ino_key_init_flash() 115 key->j32[1] = cpu_to_le32(UBIFS_INO_KEY << UBIFS_S_KEY_BLOCK_BITS); in ino_key_init_flash() 126 union ubifs_key *key, ino_t inum) in lowest_ino_key() argument 128 key->u32[0] = inum; in lowest_ino_key() 129 key->u32[1] = 0; in lowest_ino_key() 139 union ubifs_key *key, ino_t inum) in highest_ino_key() argument [all …]
|
D | tnc.c | 321 ubifs_assert(is_hash_key(c, &zbr->key)); in lnc_add() 396 ubifs_assert(is_hash_key(c, &zbr->key)); in tnc_read_node_nm() 486 static int fallible_read_node(struct ubifs_info *c, const union ubifs_key *key, in fallible_read_node() argument 491 dbg_tnck(key, "LEB %d:%d, key ", zbr->lnum, zbr->offs); in fallible_read_node() 493 ret = try_read_node(c, node, key_type(c, key), zbr->len, zbr->lnum, in fallible_read_node() 500 key_read(c, &dent->key, &node_key); in fallible_read_node() 501 if (keys_cmp(c, key, &node_key) != 0) in fallible_read_node() 505 dbg_mntk(key, "dangling branch LEB %d:%d len %d, key ", in fallible_read_node() 690 static int resolve_collision(struct ubifs_info *c, const union ubifs_key *key, in resolve_collision() argument 713 if (keys_cmp(c, &(*zn)->zbranch[*n].key, key)) { in resolve_collision() [all …]
|
D | tnc_misc.c | 137 const union ubifs_key *key, int *n) in ubifs_search_zbranch() argument 147 cmp = keys_cmp(c, key, &zbr[mid].key); in ubifs_search_zbranch() 163 ubifs_assert(keys_cmp(c, key, &zbr[0].key) < 0); in ubifs_search_zbranch() 165 ubifs_assert(keys_cmp(c, key, &zbr[*n].key) > 0); in ubifs_search_zbranch() 167 ubifs_assert(keys_cmp(c, key, &zbr[*n + 1].key) < 0); in ubifs_search_zbranch() 308 key_read(c, &br->key, &zbr->key); in read_znode() 324 switch (key_type(c, &zbr->key)) { in read_znode() 332 i, key_type(c, &zbr->key)); in read_znode() 340 type = key_type(c, &zbr->key); in read_znode() 368 key1 = &znode->zbranch[i].key; in read_znode() [all …]
|
D | replay.c | 62 union ubifs_key key; member 204 ino = key_inum(c, &r->key); in trun_remove_range() 223 dbg_mntk(&r->key, "LEB %d:%d len %d deletion %d sqnum %llu key ", in apply_replay_entry() 229 if (is_hash_key(c, &r->key)) { in apply_replay_entry() 231 err = ubifs_tnc_remove_nm(c, &r->key, &r->nm); in apply_replay_entry() 233 err = ubifs_tnc_add_nm(c, &r->key, r->lnum, r->offs, in apply_replay_entry() 237 switch (key_type(c, &r->key)) { in apply_replay_entry() 240 ino_t inum = key_inum(c, &r->key); in apply_replay_entry() 249 err = ubifs_tnc_remove(c, &r->key); in apply_replay_entry() 253 err = ubifs_tnc_add(c, &r->key, r->lnum, r->offs, in apply_replay_entry() [all …]
|
/linux-4.4.14/kernel/ |
D | jump_label.c | 38 if (jea->key < jeb->key) in jump_label_cmp() 41 if (jea->key > jeb->key) in jump_label_cmp() 57 static void jump_label_update(struct static_key *key); 59 void static_key_slow_inc(struct static_key *key) in static_key_slow_inc() argument 62 if (atomic_inc_not_zero(&key->enabled)) in static_key_slow_inc() 66 if (atomic_inc_return(&key->enabled) == 1) in static_key_slow_inc() 67 jump_label_update(key); in static_key_slow_inc() 72 static void __static_key_slow_dec(struct static_key *key, in __static_key_slow_dec() argument 75 if (!atomic_dec_and_mutex_lock(&key->enabled, &jump_label_mutex)) { in __static_key_slow_dec() 76 WARN(atomic_read(&key->enabled) < 0, in __static_key_slow_dec() [all …]
|
D | futex.c | 204 union futex_key key; member 234 union futex_key key; member 243 .key = FUTEX_KEY_INIT, 331 static inline void futex_get_mm(union futex_key *key) in futex_get_mm() argument 333 atomic_inc(&key->private.mm->mm_count); in futex_get_mm() 379 static struct futex_hash_bucket *hash_futex(union futex_key *key) in hash_futex() argument 381 u32 hash = jhash2((u32*)&key->both.word, in hash_futex() 382 (sizeof(key->both.word)+sizeof(key->both.ptr))/4, in hash_futex() 383 key->both.offset); in hash_futex() 403 static void get_futex_key_refs(union futex_key *key) in get_futex_key_refs() argument [all …]
|
/linux-4.4.14/fs/nilfs2/ |
D | direct.c | 37 nilfs_direct_get_ptr(const struct nilfs_bmap *direct, __u64 key) in nilfs_direct_get_ptr() argument 39 return le64_to_cpu(*(nilfs_direct_dptrs(direct) + key)); in nilfs_direct_get_ptr() 43 __u64 key, __u64 ptr) in nilfs_direct_set_ptr() argument 45 *(nilfs_direct_dptrs(direct) + key) = cpu_to_le64(ptr); in nilfs_direct_set_ptr() 49 __u64 key, int level, __u64 *ptrp) in nilfs_direct_lookup() argument 53 if (key > NILFS_DIRECT_KEY_MAX || level != 1) in nilfs_direct_lookup() 55 ptr = nilfs_direct_get_ptr(direct, key); in nilfs_direct_lookup() 64 __u64 key, __u64 *ptrp, in nilfs_direct_lookup_contig() argument 72 if (key > NILFS_DIRECT_KEY_MAX) in nilfs_direct_lookup_contig() 74 ptr = nilfs_direct_get_ptr(direct, key); in nilfs_direct_lookup_contig() [all …]
|
D | bmap.c | 75 int nilfs_bmap_lookup_at_level(struct nilfs_bmap *bmap, __u64 key, int level, in nilfs_bmap_lookup_at_level() argument 82 ret = bmap->b_ops->bop_lookup(bmap, key, level, ptrp); in nilfs_bmap_lookup_at_level() 99 int nilfs_bmap_lookup_contig(struct nilfs_bmap *bmap, __u64 key, __u64 *ptrp, in nilfs_bmap_lookup_contig() argument 105 ret = bmap->b_ops->bop_lookup_contig(bmap, key, ptrp, maxblocks); in nilfs_bmap_lookup_contig() 111 static int nilfs_bmap_do_insert(struct nilfs_bmap *bmap, __u64 key, __u64 ptr) in nilfs_bmap_do_insert() argument 118 ret = bmap->b_ops->bop_check_insert(bmap, key); in nilfs_bmap_do_insert() 125 bmap, key, ptr, keys, ptrs, n); in nilfs_bmap_do_insert() 134 return bmap->b_ops->bop_insert(bmap, key, ptr); in nilfs_bmap_do_insert() 155 int nilfs_bmap_insert(struct nilfs_bmap *bmap, __u64 key, unsigned long rec) in nilfs_bmap_insert() argument 160 ret = nilfs_bmap_do_insert(bmap, key, rec); in nilfs_bmap_insert() [all …]
|
/linux-4.4.14/drivers/input/ |
D | sparse-keymap.c | 29 struct key_entry *key; in sparse_keymap_get_key_index() local 32 for (key = dev->keycode; key->type != KE_END; key++) { in sparse_keymap_get_key_index() 33 if (key->type == KE_KEY) { in sparse_keymap_get_key_index() 34 if (key == k) in sparse_keymap_get_key_index() 46 struct key_entry *key; in sparse_keymap_entry_by_index() local 49 for (key = dev->keycode; key->type != KE_END; key++) in sparse_keymap_entry_by_index() 50 if (key->type == KE_KEY) in sparse_keymap_entry_by_index() 52 return key; in sparse_keymap_entry_by_index() 68 struct key_entry *key; in sparse_keymap_entry_from_scancode() local 70 for (key = dev->keycode; key->type != KE_END; key++) in sparse_keymap_entry_from_scancode() [all …]
|
D | matrix-keymap.c | 32 unsigned int row_shift, unsigned int key) in matrix_keypad_map_key() argument 35 unsigned int row = KEY_ROW(key); in matrix_keypad_map_key() 36 unsigned int col = KEY_COL(key); in matrix_keypad_map_key() 37 unsigned short code = KEY_VAL(key); in matrix_keypad_map_key() 42 __func__, key, row, col, rows, cols); in matrix_keypad_map_key() 110 unsigned int key = be32_to_cpup(prop + i); in matrix_keypad_parse_of_keymap() local 113 row_shift, key)) in matrix_keypad_parse_of_keymap() 188 unsigned int key = keymap_data->keymap[i]; in matrix_keypad_build_keymap() local 191 row_shift, key)) in matrix_keypad_build_keymap()
|
/linux-4.4.14/security/integrity/ |
D | digsig_asymmetric.c | 26 static struct key *request_asymmetric_key(struct key *keyring, uint32_t keyid) in request_asymmetric_key() 28 struct key *key; in request_asymmetric_key() local 41 key = ERR_CAST(kref); in request_asymmetric_key() 43 key = key_ref_to_ptr(kref); in request_asymmetric_key() 45 key = request_key(&key_type_asymmetric, name, NULL); in request_asymmetric_key() 48 if (IS_ERR(key)) { in request_asymmetric_key() 50 name, PTR_ERR(key)); in request_asymmetric_key() 51 switch (PTR_ERR(key)) { in request_asymmetric_key() 58 return key; in request_asymmetric_key() 62 pr_debug("%s() = 0 [%x]\n", __func__, key_serial(key)); in request_asymmetric_key() [all …]
|
D | digsig.c | 24 static struct key *keyring[INTEGRITY_KEYRING_MAX]; 90 key_ref_t key; in integrity_load_x509() local 101 key = key_create_or_update(make_key_ref(keyring[id], 1), in integrity_load_x509() 109 if (IS_ERR(key)) { in integrity_load_x509() 110 rc = PTR_ERR(key); in integrity_load_x509() 115 key_ref_to_ptr(key)->description, path); in integrity_load_x509() 116 key_ref_put(key); in integrity_load_x509()
|
/linux-4.4.14/fs/afs/ |
D | security.c | 23 struct key *afs_request_key(struct afs_cell *cell) in afs_request_key() 25 struct key *key; in afs_request_key() local 30 key = request_key(&key_type_rxrpc, cell->anonymous_key->description, in afs_request_key() 32 if (IS_ERR(key)) { in afs_request_key() 33 if (PTR_ERR(key) != -ENOKEY) { in afs_request_key() 34 _leave(" = %ld", PTR_ERR(key)); in afs_request_key() 35 return key; in afs_request_key() 43 _leave(" = {%x} [auth]", key_serial(key)); in afs_request_key() 44 return key; in afs_request_key() 60 key_put(permits->permits[loop].key); in afs_zap_permits() [all …]
|
D | dir.c | 191 struct key *key) in afs_dir_get_page() argument 196 page = read_cache_page(dir->i_mapping, index, afs_page_filler, key); in afs_dir_get_page() 322 struct key *key) in afs_dir_iterate() argument 347 page = afs_dir_get_page(dir, blkoff / PAGE_SIZE, key); in afs_dir_iterate() 427 struct afs_fid *fid, struct key *key) in afs_do_lookup() argument 440 ret = afs_dir_iterate(dir, &cookie.ctx, key); in afs_do_lookup() 462 int ret, struct dentry *dentry, struct inode *dir, struct key *key, in afs_try_auto_mntpt() argument 470 ret, dentry, dentry, vnode->fid.vid, vnode->fid.vnode, key); in afs_try_auto_mntpt() 476 inode = afs_iget_autocell(dir, devname, strlen(devname), key); in afs_try_auto_mntpt() 500 struct key *key; in afs_lookup() local [all …]
|
D | file.c | 68 struct key *key; in afs_open() local 73 key = afs_request_key(vnode->volume->cell); in afs_open() 74 if (IS_ERR(key)) { in afs_open() 75 _leave(" = %ld [key]", PTR_ERR(key)); in afs_open() 76 return PTR_ERR(key); in afs_open() 79 ret = afs_validate(vnode, key); in afs_open() 85 file->private_data = key; in afs_open() 129 struct key *key = data; in afs_page_filler() local 134 _enter("{%x},{%lu},{%lu}", key_serial(key), inode->i_ino, page->index); in afs_page_filler() 172 ret = afs_vnode_fetch_data(vnode, key, offset, len, page); in afs_page_filler() [all …]
|
D | internal.h | 51 struct key *key; /* key to use for secure mounting */ member 83 struct key *key; /* security for this call */ member 148 struct key *key; /* owner of this write */ member 197 struct key *anonymous_key; /* anonymous user key for this cell */ 371 struct key *unlock_key; /* key to be used in unlocking */ 389 struct key *key; /* RxRPC ticket holding a security context */ member 515 extern int afs_fs_fetch_file_status(struct afs_server *, struct key *, 520 extern int afs_fs_fetch_data(struct afs_server *, struct key *, 523 extern int afs_fs_create(struct afs_server *, struct key *, 528 extern int afs_fs_remove(struct afs_server *, struct key *, [all …]
|
D | vnode.c | 265 struct afs_vnode *auth_vnode, struct key *key) in afs_vnode_fetch_status() argument 360 ret = afs_fs_fetch_file_status(server, key, vnode, NULL, in afs_vnode_fetch_status() 369 afs_cache_permit(vnode, key, acl_order); in afs_vnode_fetch_status() 395 int afs_vnode_fetch_data(struct afs_vnode *vnode, struct key *key, in afs_vnode_fetch_data() argument 406 key_serial(key)); in afs_vnode_fetch_data() 423 ret = afs_fs_fetch_data(server, key, vnode, offset, length, in afs_vnode_fetch_data() 450 int afs_vnode_create(struct afs_vnode *vnode, struct key *key, in afs_vnode_create() argument 463 key_serial(key), in afs_vnode_create() 479 ret = afs_fs_create(server, key, vnode, name, mode, newfid, in afs_vnode_create() 508 int afs_vnode_remove(struct afs_vnode *vnode, struct key *key, const char *name, in afs_vnode_remove() argument [all …]
|
D | fsclient.c | 278 struct key *key, in afs_fs_fetch_file_status() argument 287 key_serial(key), vnode->fid.vid, vnode->fid.vnode); in afs_fs_fetch_file_status() 293 call->key = key; in afs_fs_fetch_file_status() 450 struct key *key, in afs_fs_fetch_data64() argument 467 call->key = key; in afs_fs_fetch_data64() 493 struct key *key, in afs_fs_fetch_data() argument 503 return afs_fs_fetch_data64(server, key, vnode, offset, length, in afs_fs_fetch_data() 512 call->key = key; in afs_fs_fetch_data() 661 struct key *key, in afs_fs_create() argument 685 call->key = key; in afs_fs_create() [all …]
|
D | flock.c | 112 struct key *key; in afs_lock_work() local 146 key = key_get(fl->fl_file->private_data); in afs_lock_work() 149 ret = afs_vnode_extend_lock(vnode, key); in afs_lock_work() 151 key_put(key); in afs_lock_work() 180 key = key_get(fl->fl_file->private_data); in afs_lock_work() 185 ret = afs_vnode_set_lock(vnode, key, type); in afs_lock_work() 216 afs_vnode_release_lock(vnode, key); in afs_lock_work() 222 key_put(key); in afs_lock_work() 238 static void afs_defer_unlock(struct afs_vnode *vnode, struct key *key) in afs_defer_unlock() argument 246 vnode->unlock_key = key_get(key); in afs_defer_unlock() [all …]
|
D | inode.c | 34 static int afs_inode_map_status(struct afs_vnode *vnode, struct key *key) in afs_inode_map_status() argument 84 afs_mntpt_check_symlink(vnode, key); in afs_inode_map_status() 137 int namesz, struct key *key) in afs_iget_autocell() argument 198 struct inode *afs_iget(struct super_block *sb, struct key *key, in afs_iget() argument 234 ret = afs_vnode_fetch_status(vnode, NULL, key); in afs_iget() 265 ret = afs_inode_map_status(vnode, key); in afs_iget() 313 int afs_validate(struct afs_vnode *vnode, struct key *key) in afs_validate() argument 319 key_serial(key)); in afs_validate() 345 ret = afs_vnode_fetch_status(vnode, NULL, key); in afs_validate() 462 struct key *key; in afs_setattr() local [all …]
|
/linux-4.4.14/fs/nfs/ |
D | fscache.c | 69 struct nfs_fscache_key *key, *xkey; in nfs_fscache_get_super_cookie() local 79 key = kzalloc(sizeof(*key) + ulen, GFP_KERNEL); in nfs_fscache_get_super_cookie() 80 if (!key) in nfs_fscache_get_super_cookie() 83 key->nfs_client = nfss->nfs_client; in nfs_fscache_get_super_cookie() 84 key->key.super.s_flags = sb->s_flags & NFS_MS_MASK; in nfs_fscache_get_super_cookie() 85 key->key.nfs_server.flags = nfss->flags; in nfs_fscache_get_super_cookie() 86 key->key.nfs_server.rsize = nfss->rsize; in nfs_fscache_get_super_cookie() 87 key->key.nfs_server.wsize = nfss->wsize; in nfs_fscache_get_super_cookie() 88 key->key.nfs_server.acregmin = nfss->acregmin; in nfs_fscache_get_super_cookie() 89 key->key.nfs_server.acregmax = nfss->acregmax; in nfs_fscache_get_super_cookie() [all …]
|
D | fscache-index.c | 74 struct nfs_server_key *key = buffer; in nfs_server_get_key() local 77 memset(key, 0, len); in nfs_server_get_key() 78 key->nfsversion = clp->rpc_ops->version; in nfs_server_get_key() 79 key->family = clp->cl_addr.ss_family; in nfs_server_get_key() 83 key->port = sin->sin_port; in nfs_server_get_key() 84 key->addr[0].ipv4_addr = sin->sin_addr; in nfs_server_get_key() 85 len += sizeof(key->addr[0].ipv4_addr); in nfs_server_get_key() 89 key->port = sin6->sin6_port; in nfs_server_get_key() 90 key->addr[0].ipv6_addr = sin6->sin6_addr; in nfs_server_get_key() 91 len += sizeof(key->addr[0].ipv6_addr); in nfs_server_get_key() [all …]
|
D | dns_resolve.c | 74 struct nfs_dns_ent *key; in nfs_dns_ent_update() local 77 key = container_of(ckey, struct nfs_dns_ent, h); in nfs_dns_ent_update() 79 memcpy(&new->addr, &key->addr, key->addrlen); in nfs_dns_ent_update() 80 new->addrlen = key->addrlen; in nfs_dns_ent_update() 87 struct nfs_dns_ent *key; in nfs_dns_ent_init() local 90 key = container_of(ckey, struct nfs_dns_ent, h); in nfs_dns_ent_init() 93 new->hostname = kstrndup(key->hostname, key->namelen, GFP_KERNEL); in nfs_dns_ent_init() 95 new->namelen = key->namelen; in nfs_dns_ent_init() 125 static unsigned int nfs_dns_hash(const struct nfs_dns_ent *key) in nfs_dns_hash() argument 127 return hash_str(key->hostname, NFS_DNS_HASHBITS); in nfs_dns_hash() [all …]
|
/linux-4.4.14/drivers/gpu/drm/ |
D | drm_hashtab.c | 59 void drm_ht_verbose_list(struct drm_open_hash *ht, unsigned long key) in drm_ht_verbose_list() argument 66 hashed_key = hash_long(key, ht->order); in drm_ht_verbose_list() 67 DRM_DEBUG("Key is 0x%08lx, Hashed key is 0x%08x\n", key, hashed_key); in drm_ht_verbose_list() 70 DRM_DEBUG("count %d, key: 0x%08lx\n", count++, entry->key); in drm_ht_verbose_list() 74 unsigned long key) in drm_ht_find_key() argument 80 hashed_key = hash_long(key, ht->order); in drm_ht_find_key() 83 if (entry->key == key) in drm_ht_find_key() 85 if (entry->key > key) in drm_ht_find_key() 92 unsigned long key) in drm_ht_find_key_rcu() argument 98 hashed_key = hash_long(key, ht->order); in drm_ht_find_key_rcu() [all …]
|
/linux-4.4.14/drivers/staging/vt6656/ |
D | key.c | 51 struct ieee80211_key_conf *key, u32 key_type, u32 mode, in vnt_set_keymode() argument 59 u8 key_inx = key->keyidx; in vnt_set_keymode() 72 key->hw_key_idx = i; in vnt_set_keymode() 73 entry = key->hw_key_idx; in vnt_set_keymode() 84 key->hw_key_idx = entry; in vnt_set_keymode() 110 if (key->keylen == WLAN_KEY_LEN_WEP40) in vnt_set_keymode() 111 key->key[15] &= 0x7f; in vnt_set_keymode() 112 if (key->keylen == WLAN_KEY_LEN_WEP104) in vnt_set_keymode() 113 key->key[15] |= 0x80; in vnt_set_keymode() 116 vnt_mac_set_keyentry(priv, key_mode, entry, key_inx, bssid, key->key); in vnt_set_keymode() [all …]
|
/linux-4.4.14/drivers/staging/vt6655/ |
D | key.c | 45 struct ieee80211_key_conf *key, u32 key_type, u32 mode, in vnt_set_keymode() argument 53 u8 key_inx = key->keyidx; in vnt_set_keymode() 66 key->hw_key_idx = i; in vnt_set_keymode() 67 entry = key->hw_key_idx; in vnt_set_keymode() 78 key->hw_key_idx = entry; in vnt_set_keymode() 101 if (key->keylen == WLAN_KEY_LEN_WEP40) in vnt_set_keymode() 102 key->key[15] &= 0x7f; in vnt_set_keymode() 103 if (key->keylen == WLAN_KEY_LEN_WEP104) in vnt_set_keymode() 104 key->key[15] |= 0x80; in vnt_set_keymode() 108 bssid, (u32 *)key->key, priv->byLocalID); in vnt_set_keymode() [all …]
|
/linux-4.4.14/tools/perf/arch/x86/util/ |
D | kvm-stat.c | 20 struct event_key *key) in mmio_event_get_key() argument 22 key->key = perf_evsel__intval(evsel, sample, "gpa"); in mmio_event_get_key() 23 key->info = perf_evsel__intval(evsel, sample, "type"); in mmio_event_get_key() 31 struct perf_sample *sample, struct event_key *key) in mmio_event_begin() argument 40 mmio_event_get_key(evsel, sample, key); in mmio_event_begin() 48 struct event_key *key) in mmio_event_end() argument 57 mmio_event_get_key(evsel, sample, key); in mmio_event_end() 65 struct event_key *key, in mmio_event_decode_key() argument 69 (unsigned long)key->key, in mmio_event_decode_key() 70 key->info == KVM_TRACE_MMIO_WRITE ? "W" : "R"); in mmio_event_decode_key() [all …]
|
/linux-4.4.14/fs/btrfs/tests/ |
D | extent-buffer-tests.c | 37 struct btrfs_key key; in test_btrfs_split_item() local 64 key.objectid = 0; in test_btrfs_split_item() 65 key.type = BTRFS_EXTENT_CSUM_KEY; in test_btrfs_split_item() 66 key.offset = 0; in test_btrfs_split_item() 68 setup_items_for_insert(root, path, &key, &value_len, value_len, in test_btrfs_split_item() 74 key.offset = 3; in test_btrfs_split_item() 81 ret = btrfs_split_item(NULL, root, path, &key, 17); in test_btrfs_split_item() 91 btrfs_item_key_to_cpu(eb, &key, 0); in test_btrfs_split_item() 92 if (key.objectid != 0 || key.type != BTRFS_EXTENT_CSUM_KEY || in test_btrfs_split_item() 93 key.offset != 0) { in test_btrfs_split_item() [all …]
|
D | qgroup-tests.c | 93 struct btrfs_key key; in add_tree_ref() local 99 key.objectid = bytenr; in add_tree_ref() 100 key.type = BTRFS_EXTENT_ITEM_KEY; in add_tree_ref() 101 key.offset = num_bytes; in add_tree_ref() 110 ret = btrfs_search_slot(&trans, root, &key, path, 0, 1); in add_tree_ref() 123 key.objectid = bytenr; in add_tree_ref() 125 key.type = BTRFS_SHARED_BLOCK_REF_KEY; in add_tree_ref() 126 key.offset = parent; in add_tree_ref() 128 key.type = BTRFS_TREE_BLOCK_REF_KEY; in add_tree_ref() 129 key.offset = root_objectid; in add_tree_ref() [all …]
|
/linux-4.4.14/net/mac802154/ |
D | llsec.c | 27 static void llsec_key_put(struct mac802154_llsec_key *key); 51 struct ieee802154_llsec_key_entry *key, *kn; in mac802154_llsec_destroy() local 69 list_for_each_entry_safe(key, kn, &sec->table.keys, list) { in mac802154_llsec_destroy() 72 mkey = container_of(key->key, struct mac802154_llsec_key, key); in mac802154_llsec_destroy() 73 list_del(&key->list); in mac802154_llsec_destroy() 75 kzfree(key); in mac802154_llsec_destroy() 123 struct mac802154_llsec_key *key; in llsec_key_alloc() local 126 key = kzalloc(sizeof(*key), GFP_KERNEL); in llsec_key_alloc() 127 if (!key) in llsec_key_alloc() 130 kref_init(&key->ref); in llsec_key_alloc() [all …]
|
/linux-4.4.14/fs/cachefiles/ |
D | key.c | 41 char *key; in cachefiles_cook_key() local 81 key = kmalloc(max, cachefiles_gfp); in cachefiles_cook_key() 82 if (!key) in cachefiles_cook_key() 88 sprintf(key, "@%02x%c+", (unsigned) csum, 0); in cachefiles_cook_key() 96 key[len + 1] = cachefiles_charmap[acc & 63]; in cachefiles_cook_key() 98 key[len] = cachefiles_charmap[acc & 63]; in cachefiles_cook_key() 104 key[len++] = '\0'; in cachefiles_cook_key() 106 key[len++] = '+'; in cachefiles_cook_key() 110 key[len++] = *raw++; in cachefiles_cook_key() 123 key[len++] = '\0'; in cachefiles_cook_key() [all …]
|
/linux-4.4.14/Documentation/security/ |
D | keys-request-key.txt | 5 The key request service is part of the key retention service (refer to 12 struct key *request_key(const struct key_type *type, 18 struct key *request_key_with_auxdata(const struct key_type *type, 26 struct key *request_key_async(const struct key_type *type, 33 struct key *request_key_async_with_auxdata(const struct key_type *type, 47 does not need to link the key to a keyring to prevent it from being immediately 48 destroyed. The kernel interface returns a pointer directly to the key, and 49 it's up to the caller to destroy the key. 53 default is NULL). This is only useful for those key types that define their 54 own upcall mechanism rather than using /sbin/request-key. [all …]
|
D | keys.txt | 9 Keyrings are permitted; these are a special type of key that can hold links to 13 The key service can be configured on by enabling: 15 "Security options"/"Enable access key retention support" (CONFIG_KEYS) 27 - Defining a key type 28 - Request-key callback service 37 tokens, keyrings, etc.. These are represented in the kernel by struct key. 39 Each key has a number of attributes: 43 - A description (for matching a key in a search). 50 (*) Each key is issued a serial number of type key_serial_t that is unique for 51 the lifetime of that key. All serial numbers are positive non-zero 32-bit [all …]
|
D | keys-trusted-encrypted.txt | 3 Trusted and Encrypted Keys are two new key types added to the existing kernel 4 key ring service. Both of these new types are variable length symmetric keys, 12 under a 2048 bit RSA key in the TPM, and optionally sealed to specified PCR 16 when the kernel and initramfs are updated. The same key can have many saved 26 keyctl update key "update [options]" 30 keyhandle= ascii hex value of sealing key default 0x40000000 (SRK) 31 keyauth= ascii hex auth for sealing key default 0x00...i 42 "keyctl print" returns an ascii hex copy of the sealed key, which is in standard 43 TPM_STORED_DATA format. The key length for new keys are always in bytes. 49 numbers, and are encrypted/decrypted using a specified 'master' key. The [all …]
|
D | keys-ecryptfs.txt | 9 using a key, the FEFEK, derived from a user prompted passphrase; in the latter 11 to support other mechanisms like public key cryptography, PKCS#11 and TPM based 16 kernel key of the 'user' type, inserted in the user's session specific keyring 20 The 'encrypted' key type has been extended with the introduction of the new 24 kernel and protected by the parent master key. 32 required key can be securely generated by an Administrator and provided at boot 33 time after the unsealing of a 'trusted' key in order to perform the mount in a 34 controlled environment. Another advantage is that the key is not exposed to 39 keyctl add encrypted name "new ecryptfs key-type:master-key-name keylen" ring 41 keyctl update keyid "update key-type:master-key-name" [all …]
|
/linux-4.4.14/net/sched/ |
D | cls_flower.c | 45 struct fl_flow_key key; member 66 struct fl_flow_key key; member 79 const u8 *bytes = (const u8 *) &mask->key; in fl_mask_update_range() 80 size_t size = sizeof(mask->key); in fl_mask_update_range() 83 for (i = 0; i < sizeof(mask->key); i++) { in fl_mask_update_range() 94 static void *fl_key_get_start(struct fl_flow_key *key, in fl_key_get_start() argument 97 return (u8 *) key + mask->range.start; in fl_key_get_start() 100 static void fl_set_masked_key(struct fl_flow_key *mkey, struct fl_flow_key *key, in fl_set_masked_key() argument 103 const long *lkey = fl_key_get_start(key, mask); in fl_set_masked_key() 104 const long *lmask = fl_key_get_start(&mask->key, mask); in fl_set_masked_key() [all …]
|
/linux-4.4.14/crypto/asymmetric_keys/ |
D | pkcs7_trust.c | 28 struct key *trust_keyring) in pkcs7_validate_trust_one() 32 struct key *key; in pkcs7_validate_trust_one() local 57 key = x509_request_asymmetric_key(trust_keyring, in pkcs7_validate_trust_one() 60 if (!IS_ERR(key)) { in pkcs7_validate_trust_one() 67 sinfo->index, x509->index, key_serial(key)); in pkcs7_validate_trust_one() 70 if (key == ERR_PTR(-ENOMEM)) in pkcs7_validate_trust_one() 90 key = x509_request_asymmetric_key(trust_keyring, in pkcs7_validate_trust_one() 94 if (!IS_ERR(key)) { in pkcs7_validate_trust_one() 97 sinfo->index, x509->index, key_serial(key)); in pkcs7_validate_trust_one() 100 if (PTR_ERR(key) != -ENOKEY) in pkcs7_validate_trust_one() [all …]
|
D | public_key.c | 49 static void public_key_describe(const struct key *asymmetric_key, in public_key_describe() 52 struct public_key *key = asymmetric_key->payload.data[asym_crypto]; in public_key_describe() local 54 if (key) in public_key_describe() 56 pkey_id_type_name[key->id_type], key->algo->name); in public_key_describe() 64 struct public_key *key = payload; in public_key_destroy() local 67 if (key) { in public_key_destroy() 68 for (i = 0; i < ARRAY_SIZE(key->mpi); i++) in public_key_destroy() 69 mpi_free(key->mpi[i]); in public_key_destroy() 70 kfree(key); in public_key_destroy() 112 static int public_key_verify_signature_2(const struct key *key, in public_key_verify_signature_2() argument [all …]
|
D | Kconfig | 2 tristate "Asymmetric (public-key cryptographic) key type" 5 This option provides support for a key type that holds the data for 6 the asymmetric keys used for public key cryptographic operations such 13 tristate "Asymmetric public-key crypto algorithm subtype" 19 This option provides support for asymmetric public key type handling. 25 tristate "RSA public-key algorithm" 36 This option provides support for parsing X.509 format blobs for key 37 data and provides the ability to instantiate a crypto key from a 38 public key packet found inside the certificate. 50 tristate "PKCS#7 testing key type" [all …]
|
D | asymmetric_type.c | 158 static bool asymmetric_key_cmp(const struct key *key, in asymmetric_key_cmp() argument 161 const struct asymmetric_key_ids *kids = asymmetric_key_ids(key); in asymmetric_key_cmp() 171 static bool asymmetric_key_cmp_partial(const struct key *key, in asymmetric_key_cmp_partial() argument 174 const struct asymmetric_key_ids *kids = asymmetric_key_ids(key); in asymmetric_key_cmp_partial() 199 bool (*cmp)(const struct key *, const struct key_match_data *) = in asymmetric_key_match_preparse() 241 static void asymmetric_key_describe(const struct key *key, struct seq_file *m) in asymmetric_key_describe() argument 243 const struct asymmetric_key_subtype *subtype = asymmetric_key_subtype(key); in asymmetric_key_describe() 244 const struct asymmetric_key_ids *kids = asymmetric_key_ids(key); in asymmetric_key_describe() 249 seq_puts(m, key->description); in asymmetric_key_describe() 253 subtype->describe(key, m); in asymmetric_key_describe() [all …]
|
D | signature.c | 28 int verify_signature(const struct key *key, in verify_signature() argument 36 if (key->type != &key_type_asymmetric) in verify_signature() 38 subtype = asymmetric_key_subtype(key); in verify_signature() 40 !key->payload.data[0]) in verify_signature() 45 ret = subtype->verify_signature(key, sig); in verify_signature()
|
D | x509_public_key.c | 77 struct key *x509_request_asymmetric_key(struct key *keyring, in x509_request_asymmetric_key() 82 struct key *key; in x509_request_asymmetric_key() local 132 key = key_ref_to_ptr(ref); in x509_request_asymmetric_key() 134 const struct asymmetric_key_ids *kids = asymmetric_key_ids(key); in x509_request_asymmetric_key() 145 pr_devel("<==%s() = 0 [%x]\n", __func__, key_serial(key)); in x509_request_asymmetric_key() 146 return key; in x509_request_asymmetric_key() 149 key_put(key); in x509_request_asymmetric_key() 253 struct key *trust_keyring) in x509_validate_trust() 255 struct key *key; in x509_validate_trust() local 264 key = x509_request_asymmetric_key(trust_keyring, in x509_validate_trust() [all …]
|
/linux-4.4.14/tools/perf/arch/s390/util/ |
D | kvm-stat.c | 23 struct event_key *key) in event_icpt_insn_get_key() argument 28 key->key = icpt_insn_decoder(insn); in event_icpt_insn_get_key() 29 key->exit_reasons = sie_icpt_insn_codes; in event_icpt_insn_get_key() 34 struct event_key *key) in event_sigp_get_key() argument 36 key->key = perf_evsel__intval(evsel, sample, "order_code"); in event_sigp_get_key() 37 key->exit_reasons = sie_sigp_order_codes; in event_sigp_get_key() 42 struct event_key *key) in event_diag_get_key() argument 44 key->key = perf_evsel__intval(evsel, sample, "code"); in event_diag_get_key() 45 key->exit_reasons = sie_diagnose_codes; in event_diag_get_key() 50 struct event_key *key) in event_icpt_prog_get_key() argument [all …]
|
/linux-4.4.14/include/keys/ |
D | user-type.h | 44 extern int user_update(struct key *key, struct key_preparsed_payload *prep); 45 extern void user_revoke(struct key *key); 46 extern void user_destroy(struct key *key); 47 extern void user_describe(const struct key *user, struct seq_file *m); 48 extern long user_read(const struct key *key, 51 static inline const struct user_key_payload *user_key_payload(const struct key *key) in user_key_payload() argument 53 return (struct user_key_payload *)rcu_dereference_key(key); in user_key_payload()
|
D | asymmetric-subtype.h | 32 void (*describe)(const struct key *key, struct seq_file *m); 38 int (*verify_signature)(const struct key *key, 50 struct asymmetric_key_subtype *asymmetric_key_subtype(const struct key *key) in asymmetric_key_subtype() argument 52 return key->payload.data[asym_subtype]; in asymmetric_key_subtype()
|
D | big_key-type.h | 21 extern void big_key_revoke(struct key *key); 22 extern void big_key_destroy(struct key *key); 23 extern void big_key_describe(const struct key *big_key, struct seq_file *m); 24 extern long big_key_read(const struct key *key, char __user *buffer, size_t buflen);
|
/linux-4.4.14/net/wireless/ |
D | lib80211_crypt_ccmp.c | 43 u8 key[CCMP_TK_LEN]; member 184 struct lib80211_ccmp_data *key = priv; in lib80211_ccmp_hdr() local 192 memcpy(aeskey, key->key, CCMP_TK_LEN); in lib80211_ccmp_hdr() 200 key->tx_pn[i]++; in lib80211_ccmp_hdr() 201 if (key->tx_pn[i] != 0) in lib80211_ccmp_hdr() 206 *pos++ = key->tx_pn[5]; in lib80211_ccmp_hdr() 207 *pos++ = key->tx_pn[4]; in lib80211_ccmp_hdr() 209 *pos++ = (key->key_idx << 6) | (1 << 5) /* Ext IV included */ ; in lib80211_ccmp_hdr() 210 *pos++ = key->tx_pn[3]; in lib80211_ccmp_hdr() 211 *pos++ = key->tx_pn[2]; in lib80211_ccmp_hdr() [all …]
|
D | lib80211_crypt_wep.c | 35 u8 key[WEP_KEY_LEN + 1]; member 92 u8 *key, int keylen, void *priv) in lib80211_wep_build_iv() argument 140 u8 key[WEP_KEY_LEN + 3]; in lib80211_wep_encrypt() local 151 skb_copy_from_linear_data_offset(skb, hdr_len, key, 3); in lib80211_wep_encrypt() 154 memcpy(key + 3, wep->key, wep->key_len); in lib80211_wep_encrypt() 168 crypto_blkcipher_setkey(wep->tx_tfm, key, klen); in lib80211_wep_encrypt() 185 u8 key[WEP_KEY_LEN + 3]; in lib80211_wep_decrypt() local 193 key[0] = *pos++; in lib80211_wep_decrypt() 194 key[1] = *pos++; in lib80211_wep_decrypt() 195 key[2] = *pos++; in lib80211_wep_decrypt() [all …]
|
/linux-4.4.14/scripts/ |
D | kernel-doc-xml-ref | 102 my $key = $_[0]; 106 $key = trim($key); 108 $key =~ s/[^A-Za-z0-9]/-/g; 109 $key = "API-" . $key; 112 if (!has_key_defined($key) || $line =~ m/\s+<funcdef/i) { 122 return "<link linkend=\"$key\">$head</link>$tail"; 129 my $key = $_[0]; 130 $key =~ s/(struct )?(\w)/$2/g; 131 $key =~ s/[^A-Za-z0-9]/-/g; 132 $key = "API-struct-" . $key; [all …]
|
D | bootgraph.pl | 187 foreach my $key (@initcalls) { 188 my $duration = $end{$key} - $start{$key}; 192 my $pid = $pids{$key}; 198 $s = ($start{$key} - $firsttime) * $mult; 201 $e = ($end{$key} - $firsttime) * $mult; 213 if ($type{$key} == 1) { 219 print "<text transform=\"translate($s2,$y2) rotate(90)\">$key</text>\n"; 221 print "<text transform=\"translate($s3,$y2) rotate(90)\" font-size=\"3pt\">$key</text>\n";
|
/linux-4.4.14/drivers/staging/lustre/lustre/llite/ |
D | llite_rmtacl.c | 77 static struct rmtacl_ctl_entry *rce_alloc(pid_t key, int ops) in rce_alloc() argument 86 rce->rce_key = key; in rce_alloc() 101 pid_t key) in __rct_search() argument 104 struct list_head *head = &rct->rct_entries[rce_hashfunc(key)]; in __rct_search() 107 if (rce->rce_key == key) in __rct_search() 113 struct rmtacl_ctl_entry *rct_search(struct rmtacl_ctl_table *rct, pid_t key) in rct_search() argument 118 rce = __rct_search(rct, key); in rct_search() 123 int rct_add(struct rmtacl_ctl_table *rct, pid_t key, int ops) in rct_add() argument 127 rce = rce_alloc(key, ops); in rct_add() 132 e = __rct_search(rct, key); in rct_add() [all …]
|
/linux-4.4.14/drivers/staging/rtl8192e/ |
D | rtllib_crypt_ccmp.c | 35 u8 key[CCMP_TK_LEN]; member 188 struct rtllib_ccmp_data *key = priv; in rtllib_ccmp_encrypt() local 206 key->tx_pn[i]++; in rtllib_ccmp_encrypt() 207 if (key->tx_pn[i] != 0) in rtllib_ccmp_encrypt() 212 *pos++ = key->tx_pn[5]; in rtllib_ccmp_encrypt() 213 *pos++ = key->tx_pn[4]; in rtllib_ccmp_encrypt() 215 *pos++ = (key->key_idx << 6) | (1 << 5) /* Ext IV included */; in rtllib_ccmp_encrypt() 216 *pos++ = key->tx_pn[3]; in rtllib_ccmp_encrypt() 217 *pos++ = key->tx_pn[2]; in rtllib_ccmp_encrypt() 218 *pos++ = key->tx_pn[1]; in rtllib_ccmp_encrypt() [all …]
|
D | rtllib_crypt_wep.c | 28 u8 key[WEP_KEY_LEN + 1]; member 98 u8 key[WEP_KEY_LEN + 3]; in prism2_wep_encrypt() local 134 *pos++ = key[0] = (wep->iv >> 16) & 0xff; in prism2_wep_encrypt() 135 *pos++ = key[1] = (wep->iv >> 8) & 0xff; in prism2_wep_encrypt() 136 *pos++ = key[2] = wep->iv & 0xff; in prism2_wep_encrypt() 140 memcpy(key + 3, wep->key, wep->key_len); in prism2_wep_encrypt() 153 crypto_blkcipher_setkey(wep->tx_tfm, key, klen); in prism2_wep_encrypt() 172 u8 key[WEP_KEY_LEN + 3]; in prism2_wep_decrypt() local 185 key[0] = *pos++; in prism2_wep_decrypt() 186 key[1] = *pos++; in prism2_wep_decrypt() [all …]
|
D | rtllib_wx.c | 309 int i, key, key_provided, len; in rtllib_wx_set_encode() local 314 key = erq->flags & IW_ENCODE_INDEX; in rtllib_wx_set_encode() 315 if (key) { in rtllib_wx_set_encode() 316 if (key > NUM_WEP_KEYS) in rtllib_wx_set_encode() 318 key--; in rtllib_wx_set_encode() 322 key = ieee->crypt_info.tx_keyidx; in rtllib_wx_set_encode() 325 netdev_dbg(ieee->dev, "Key: %d [%s]\n", key, key_provided ? in rtllib_wx_set_encode() 327 crypt = &ieee->crypt_info.crypt[key]; in rtllib_wx_set_encode() 331 "Disabling encryption on key %d.\n", key); in rtllib_wx_set_encode() 385 new_crypt->priv = new_crypt->ops->init(key); in rtllib_wx_set_encode() [all …]
|
/linux-4.4.14/fs/btrfs/ |
D | export.c | 65 struct btrfs_key key; in btrfs_get_dentry() local 72 key.objectid = root_objectid; in btrfs_get_dentry() 73 key.type = BTRFS_ROOT_ITEM_KEY; in btrfs_get_dentry() 74 key.offset = (u64)-1; in btrfs_get_dentry() 78 root = btrfs_read_fs_root_no_name(fs_info, &key); in btrfs_get_dentry() 84 key.objectid = objectid; in btrfs_get_dentry() 85 key.type = BTRFS_INODE_ITEM_KEY; in btrfs_get_dentry() 86 key.offset = 0; in btrfs_get_dentry() 88 inode = btrfs_iget(sb, &key, root, NULL); in btrfs_get_dentry() 160 struct btrfs_key key; in btrfs_get_parent() local [all …]
|
D | root-tree.c | 137 *root, struct btrfs_key *key, struct btrfs_root_item in btrfs_update_root() argument 151 ret = btrfs_search_slot(trans, root, key, path, 0, 1); in btrfs_update_root() 160 key->objectid, key->type, key->offset); in btrfs_update_root() 176 ret = btrfs_search_slot(trans, root, key, path, in btrfs_update_root() 190 key, sizeof(*item)); in btrfs_update_root() 214 struct btrfs_key *key, struct btrfs_root_item *item) in btrfs_insert_root() argument 220 return btrfs_insert_item(trans, root, key, item, sizeof(*item)); in btrfs_insert_root() 227 struct btrfs_key key; in btrfs_find_orphan_roots() local 241 key.objectid = BTRFS_ORPHAN_OBJECTID; in btrfs_find_orphan_roots() 242 key.type = BTRFS_ORPHAN_ITEM_KEY; in btrfs_find_orphan_roots() [all …]
|
D | dir-item.c | 77 struct btrfs_key key, location; in btrfs_insert_xattr_item() local 84 key.objectid = objectid; in btrfs_insert_xattr_item() 85 key.type = BTRFS_XATTR_ITEM_KEY; in btrfs_insert_xattr_item() 86 key.offset = btrfs_name_hash(name, name_len); in btrfs_insert_xattr_item() 89 dir_item = insert_with_overflow(trans, root, path, &key, data_size, in btrfs_insert_xattr_item() 131 struct btrfs_key key; in btrfs_insert_dir_item() local 135 key.objectid = btrfs_ino(dir); in btrfs_insert_dir_item() 136 key.type = BTRFS_DIR_ITEM_KEY; in btrfs_insert_dir_item() 137 key.offset = btrfs_name_hash(name, name_len); in btrfs_insert_dir_item() 147 dir_item = insert_with_overflow(trans, root, path, &key, data_size, in btrfs_insert_dir_item() [all …]
|
D | uuid-tree.c | 26 static void btrfs_uuid_to_key(u8 *uuid, u8 type, struct btrfs_key *key) in btrfs_uuid_to_key() argument 28 key->type = type; in btrfs_uuid_to_key() 29 key->objectid = get_unaligned_le64(uuid); in btrfs_uuid_to_key() 30 key->offset = get_unaligned_le64(uuid + sizeof(u64)); in btrfs_uuid_to_key() 43 struct btrfs_key key; in btrfs_uuid_tree_lookup() local 56 btrfs_uuid_to_key(uuid, type, &key); in btrfs_uuid_tree_lookup() 57 ret = btrfs_search_slot(NULL, uuid_root, &key, path, 0, 0); in btrfs_uuid_tree_lookup() 99 struct btrfs_key key; in btrfs_uuid_tree_add() local 114 btrfs_uuid_to_key(uuid, type, &key); in btrfs_uuid_tree_add() 122 ret = btrfs_insert_empty_item(trans, uuid_root, path, &key, in btrfs_uuid_tree_add() [all …]
|
D | orphan.c | 26 struct btrfs_key key; in btrfs_insert_orphan_item() local 29 key.objectid = BTRFS_ORPHAN_OBJECTID; in btrfs_insert_orphan_item() 30 key.type = BTRFS_ORPHAN_ITEM_KEY; in btrfs_insert_orphan_item() 31 key.offset = offset; in btrfs_insert_orphan_item() 37 ret = btrfs_insert_empty_item(trans, root, path, &key, 0); in btrfs_insert_orphan_item() 47 struct btrfs_key key; in btrfs_del_orphan_item() local 50 key.objectid = BTRFS_ORPHAN_OBJECTID; in btrfs_del_orphan_item() 51 key.type = BTRFS_ORPHAN_ITEM_KEY; in btrfs_del_orphan_item() 52 key.offset = offset; in btrfs_del_orphan_item() 58 ret = btrfs_search_slot(trans, root, &key, path, -1, 1); in btrfs_del_orphan_item()
|
D | inode-item.c | 104 struct btrfs_key key; in btrfs_lookup_inode_extref() local 107 key.objectid = inode_objectid; in btrfs_lookup_inode_extref() 108 key.type = BTRFS_INODE_EXTREF_KEY; in btrfs_lookup_inode_extref() 109 key.offset = btrfs_extref_hash(ref_objectid, name, name_len); in btrfs_lookup_inode_extref() 111 ret = btrfs_search_slot(trans, root, &key, path, ins_len, cow); in btrfs_lookup_inode_extref() 128 struct btrfs_key key; in btrfs_del_inode_extref() local 137 key.objectid = inode_objectid; in btrfs_del_inode_extref() 138 key.type = BTRFS_INODE_EXTREF_KEY; in btrfs_del_inode_extref() 139 key.offset = btrfs_extref_hash(ref_objectid, name, name_len); in btrfs_del_inode_extref() 147 ret = btrfs_search_slot(trans, root, &key, path, -1, 1); in btrfs_del_inode_extref() [all …]
|
D | tree-defrag.c | 36 struct btrfs_key key; in btrfs_defrag_leaves() local 77 memset(&key, 0, sizeof(key)); in btrfs_defrag_leaves() 79 memcpy(&key, &root->defrag_progress, sizeof(key)); in btrfs_defrag_leaves() 84 ret = btrfs_search_forward(root, &key, path, min_trans); in btrfs_defrag_leaves() 92 wret = btrfs_search_slot(trans, root, &key, path, 0, 1); in btrfs_defrag_leaves() 103 next_key_ret = btrfs_find_next_key(root, path, &key, 1, in btrfs_defrag_leaves() 114 memcpy(&root->defrag_progress, &key, sizeof(key)); in btrfs_defrag_leaves()
|
D | relocation.c | 143 struct btrfs_key key; member 586 struct btrfs_key key; in read_fs_root() local 588 key.objectid = root_objectid; in read_fs_root() 589 key.type = BTRFS_ROOT_ITEM_KEY; in read_fs_root() 591 key.offset = 0; in read_fs_root() 593 key.offset = (u64)-1; in read_fs_root() 595 return btrfs_get_fs_root(fs_info, &key, false); in read_fs_root() 625 struct btrfs_key key; in find_inline_backref() local 630 btrfs_item_key_to_cpu(leaf, &key, slot); in find_inline_backref() 643 if (key.type == BTRFS_EXTENT_ITEM_KEY && in find_inline_backref() [all …]
|
D | file-item.c | 310 struct btrfs_key key; in btrfs_lookup_csums_range() local 335 key.objectid = BTRFS_EXTENT_CSUM_OBJECTID; in btrfs_lookup_csums_range() 336 key.offset = start; in btrfs_lookup_csums_range() 337 key.type = BTRFS_EXTENT_CSUM_KEY; in btrfs_lookup_csums_range() 339 ret = btrfs_search_slot(NULL, root, &key, path, 0, 0); in btrfs_lookup_csums_range() 344 btrfs_item_key_to_cpu(leaf, &key, path->slots[0] - 1); in btrfs_lookup_csums_range() 345 if (key.objectid == BTRFS_EXTENT_CSUM_OBJECTID && in btrfs_lookup_csums_range() 346 key.type == BTRFS_EXTENT_CSUM_KEY) { in btrfs_lookup_csums_range() 347 offset = (start - key.offset) >> in btrfs_lookup_csums_range() 366 btrfs_item_key_to_cpu(leaf, &key, path->slots[0]); in btrfs_lookup_csums_range() [all …]
|
D | backref.c | 37 static int check_extent_in_eb(struct btrfs_key *key, struct extent_buffer *eb, in check_extent_in_eb() argument 65 e->inum = key->objectid; in check_extent_in_eb() 66 e->offset = key->offset + offset; in check_extent_in_eb() 87 struct btrfs_key key; in find_extent_in_eb() local 101 btrfs_item_key_to_cpu(eb, &key, slot); in find_extent_in_eb() 102 if (key.type != BTRFS_EXTENT_DATA_KEY) in find_extent_in_eb() 113 ret = check_extent_in_eb(&key, eb, fi, extent_item_pos, eie); in find_extent_in_eb() 195 struct btrfs_key *key, int level, in __add_prelim_ref() argument 209 if (key) { in __add_prelim_ref() 210 ref->key_for_search = *key; in __add_prelim_ref() [all …]
|
D | tree-log.c | 338 struct btrfs_key *key) in overwrite_item() argument 347 bool inode_item = key->type == BTRFS_INODE_ITEM_KEY; in overwrite_item() 356 ret = btrfs_search_slot(NULL, root, key, path, 0, 0); in overwrite_item() 451 key, item_size); in overwrite_item() 479 if (key->type == BTRFS_INODE_ITEM_KEY && ret == -EEXIST) { in overwrite_item() 528 if (key->type == BTRFS_INODE_ITEM_KEY) { in overwrite_item() 549 struct btrfs_key key; in read_one_inode() local 552 key.objectid = objectid; in read_one_inode() 553 key.type = BTRFS_INODE_ITEM_KEY; in read_one_inode() 554 key.offset = 0; in read_one_inode() [all …]
|
D | send.c | 792 struct btrfs_key key; in __get_inode_info() local 794 key.objectid = ino; in __get_inode_info() 795 key.type = BTRFS_INODE_ITEM_KEY; in __get_inode_info() 796 key.offset = 0; in __get_inode_info() 797 ret = btrfs_search_slot(NULL, root, &key, path, 0, 0); in __get_inode_info() 1106 struct btrfs_key key, found_key; in get_inode_path() local 1115 key.objectid = ino; in get_inode_path() 1116 key.type = BTRFS_INODE_REF_KEY; in get_inode_path() 1117 key.offset = 0; in get_inode_path() 1119 ret = btrfs_search_slot_for_read(root, &key, p, 1, 0); in get_inode_path() [all …]
|
/linux-4.4.14/drivers/tty/ |
D | sysrq.c | 84 static void sysrq_handle_loglevel(int key) in sysrq_handle_loglevel() argument 88 i = key - '0'; in sysrq_handle_loglevel() 101 static void sysrq_handle_SAK(int key) in sysrq_handle_SAK() argument 117 static void sysrq_handle_unraw(int key) in sysrq_handle_unraw() argument 132 static void sysrq_handle_crash(int key) in sysrq_handle_crash() argument 147 static void sysrq_handle_reboot(int key) in sysrq_handle_reboot() argument 160 static void sysrq_handle_sync(int key) in sysrq_handle_sync() argument 171 static void sysrq_handle_show_timers(int key) in sysrq_handle_show_timers() argument 182 static void sysrq_handle_mountro(int key) in sysrq_handle_mountro() argument 194 static void sysrq_handle_showlocks(int key) in sysrq_handle_showlocks() argument [all …]
|
/linux-4.4.14/kernel/sched/ |
D | wait.c | 14 void __init_waitqueue_head(wait_queue_head_t *q, const char *name, struct lock_class_key *key) in __init_waitqueue_head() argument 17 lockdep_set_class_and_name(&q->lock, key, name); in __init_waitqueue_head() 66 int nr_exclusive, int wake_flags, void *key) in __wake_up_common() argument 73 if (curr->func(curr, mode, wake_flags, key) && in __wake_up_common() 90 int nr_exclusive, void *key) in __wake_up() argument 95 __wake_up_common(q, mode, nr_exclusive, 0, key); in __wake_up() 109 void __wake_up_locked_key(wait_queue_head_t *q, unsigned int mode, void *key) in __wake_up_locked_key() argument 111 __wake_up_common(q, mode, 1, 0, key); in __wake_up_locked_key() 133 int nr_exclusive, void *key) in __wake_up_sync_key() argument 145 __wake_up_common(q, mode, nr_exclusive, wake_flags, key); in __wake_up_sync_key() [all …]
|
/linux-4.4.14/drivers/crypto/qat/qat_common/ |
D | qat_crypto.c | 169 char key[ADF_CFG_MAX_KEY_LEN_IN_BYTES]; in qat_crypto_create_instances() local 173 strlcpy(key, ADF_NUM_CY, sizeof(key)); in qat_crypto_create_instances() 174 if (adf_cfg_get_param_value(accel_dev, SEC, key, val)) in qat_crypto_create_instances() 190 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_BANK_NUM, i); in qat_crypto_create_instances() 191 if (adf_cfg_get_param_value(accel_dev, SEC, key, val)) in qat_crypto_create_instances() 196 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_SYM_SIZE, i); in qat_crypto_create_instances() 197 if (adf_cfg_get_param_value(accel_dev, SEC, key, val)) in qat_crypto_create_instances() 205 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_ASYM_SIZE, i); in qat_crypto_create_instances() 206 if (adf_cfg_get_param_value(accel_dev, SEC, key, val)) in qat_crypto_create_instances() 214 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_SYM_TX, i); in qat_crypto_create_instances() [all …]
|
/linux-4.4.14/drivers/staging/rtl8192u/ieee80211/ |
D | ieee80211_crypt_ccmp.c | 39 u8 key[CCMP_TK_LEN]; member 196 struct ieee80211_ccmp_data *key = priv; in ieee80211_ccmp_encrypt() local 215 key->tx_pn[i]++; in ieee80211_ccmp_encrypt() 216 if (key->tx_pn[i] != 0) in ieee80211_ccmp_encrypt() 221 *pos++ = key->tx_pn[5]; in ieee80211_ccmp_encrypt() 222 *pos++ = key->tx_pn[4]; in ieee80211_ccmp_encrypt() 224 *pos++ = (key->key_idx << 6) | (1 << 5) /* Ext IV included */; in ieee80211_ccmp_encrypt() 225 *pos++ = key->tx_pn[3]; in ieee80211_ccmp_encrypt() 226 *pos++ = key->tx_pn[2]; in ieee80211_ccmp_encrypt() 227 *pos++ = key->tx_pn[1]; in ieee80211_ccmp_encrypt() [all …]
|
D | ieee80211_crypt_wep.c | 32 u8 key[WEP_KEY_LEN + 1]; member 91 u8 key[WEP_KEY_LEN + 3]; in prism2_wep_encrypt() local 123 *pos++ = key[0] = (wep->iv >> 16) & 0xff; in prism2_wep_encrypt() 124 *pos++ = key[1] = (wep->iv >> 8) & 0xff; in prism2_wep_encrypt() 125 *pos++ = key[2] = wep->iv & 0xff; in prism2_wep_encrypt() 129 memcpy(key + 3, wep->key, wep->key_len); in prism2_wep_encrypt() 140 crypto_blkcipher_setkey(wep->tx_tfm, key, klen); in prism2_wep_encrypt() 161 u8 key[WEP_KEY_LEN + 3]; in prism2_wep_decrypt() local 173 key[0] = *pos++; in prism2_wep_decrypt() 174 key[1] = *pos++; in prism2_wep_decrypt() [all …]
|
D | ieee80211_wx.c | 299 int i, key, key_provided, len; in ieee80211_wx_set_encode() local 304 key = erq->flags & IW_ENCODE_INDEX; in ieee80211_wx_set_encode() 305 if (key) { in ieee80211_wx_set_encode() 306 if (key > WEP_KEYS) in ieee80211_wx_set_encode() 308 key--; in ieee80211_wx_set_encode() 312 key = ieee->tx_keyidx; in ieee80211_wx_set_encode() 315 IEEE80211_DEBUG_WX("Key: %d [%s]\n", key, key_provided ? in ieee80211_wx_set_encode() 317 crypt = &ieee->crypt[key]; in ieee80211_wx_set_encode() 322 key); in ieee80211_wx_set_encode() 373 new_crypt->priv = new_crypt->ops->init(key); in ieee80211_wx_set_encode() [all …]
|
/linux-4.4.14/arch/sparc/crypto/ |
D | aes_glue.c | 34 void (*encrypt)(const u64 *key, const u32 *input, u32 *output); 35 void (*decrypt)(const u64 *key, const u32 *input, u32 *output); 36 void (*load_encrypt_keys)(const u64 *key); 37 void (*load_decrypt_keys)(const u64 *key); 38 void (*ecb_encrypt)(const u64 *key, const u64 *input, u64 *output, 40 void (*ecb_decrypt)(const u64 *key, const u64 *input, u64 *output, 42 void (*cbc_encrypt)(const u64 *key, const u64 *input, u64 *output, 44 void (*cbc_decrypt)(const u64 *key, const u64 *input, u64 *output, 46 void (*ctr_crypt)(const u64 *key, const u64 *input, u64 *output, 52 u64 key[AES_MAX_KEYLENGTH / sizeof(u64)]; member [all …]
|
D | camellia_glue.c | 54 extern void camellia_sparc64_crypt(const u64 *key, const u32 *input, 75 extern void camellia_sparc64_load_keys(const u64 *key, unsigned int key_len); 78 const u64 *key); 92 const u64 *key; in __ecb_crypt() local 104 key = &ctx->encrypt_key[0]; in __ecb_crypt() 106 key = &ctx->decrypt_key[0]; in __ecb_crypt() 107 camellia_sparc64_load_keys(key, ctx->key_len); in __ecb_crypt() 117 op(src64, dst64, block_len, key); in __ecb_crypt() 141 const u64 *key, u64 *iv); 155 const u64 *key; in cbc_encrypt() local [all …]
|
/linux-4.4.14/net/ceph/ |
D | crypto.c | 19 dst->key = kmemdup(src->key, src->len, GFP_NOFS); in ceph_crypto_key_clone() 20 if (!dst->key) in ceph_crypto_key_clone() 25 int ceph_crypto_key_encode(struct ceph_crypto_key *key, void **p, void *end) in ceph_crypto_key_encode() argument 27 if (*p + sizeof(u16) + sizeof(key->created) + in ceph_crypto_key_encode() 28 sizeof(u16) + key->len > end) in ceph_crypto_key_encode() 30 ceph_encode_16(p, key->type); in ceph_crypto_key_encode() 31 ceph_encode_copy(p, &key->created, sizeof(key->created)); in ceph_crypto_key_encode() 32 ceph_encode_16(p, key->len); in ceph_crypto_key_encode() 33 ceph_encode_copy(p, key->key, key->len); in ceph_crypto_key_encode() 37 int ceph_crypto_key_decode(struct ceph_crypto_key *key, void **p, void *end) in ceph_crypto_key_decode() argument [all …]
|
D | ceph_common.c | 148 if (opt1->key && !opt2->key) in ceph_compare_options() 150 if (!opt1->key && opt2->key) in ceph_compare_options() 152 if (opt1->key && opt2->key) { in ceph_compare_options() 153 if (opt1->key->type != opt2->key->type) in ceph_compare_options() 155 if (opt1->key->created.tv_sec != opt2->key->created.tv_sec) in ceph_compare_options() 157 if (opt1->key->created.tv_nsec != opt2->key->created.tv_nsec) in ceph_compare_options() 159 if (opt1->key->len != opt2->key->len) in ceph_compare_options() 161 if (opt1->key->key && !opt2->key->key) in ceph_compare_options() 163 if (!opt1->key->key && opt2->key->key) in ceph_compare_options() 165 if (opt1->key->key && opt2->key->key) { in ceph_compare_options() [all …]
|
D | crypto.h | 14 void *key; member 17 static inline void ceph_crypto_key_destroy(struct ceph_crypto_key *key) in ceph_crypto_key_destroy() argument 19 if (key) { in ceph_crypto_key_destroy() 20 kfree(key->key); in ceph_crypto_key_destroy() 21 key->key = NULL; in ceph_crypto_key_destroy() 27 int ceph_crypto_key_encode(struct ceph_crypto_key *key, void **p, void *end); 28 int ceph_crypto_key_decode(struct ceph_crypto_key *key, void **p, void *end); 29 int ceph_crypto_key_unarmor(struct ceph_crypto_key *key, const char *in);
|
/linux-4.4.14/Documentation/crypto/ |
D | asymmetric-keys.txt | 11 - Asymmetric key subtypes. 19 The "asymmetric" key type is designed to be a container for the keys used in 20 public-key cryptography, without imposing any particular restrictions on the 21 form or mechanism of the cryptography or form of the key. 23 The asymmetric key is given a subtype that defines what sort of data is 24 associated with the key and provides operations to describe and destroy it. 25 However, no requirement is made that the key data actually be stored in the 26 key. 28 A completely in-kernel key retention and operation subtype can be defined, but 30 a TPM) that might be used to both retain the relevant key and perform [all …]
|
/linux-4.4.14/net/sunrpc/auth_gss/ |
D | gss_krb5_keys.c | 250 static void mit_des_fixup_key_parity(u8 key[8]) in mit_des_fixup_key_parity() 254 key[i] &= 0xfe; in mit_des_fixup_key_parity() 255 key[i] |= 1^parity_char(key[i]); in mit_des_fixup_key_parity() 264 struct xdr_netobj *key) in gss_krb5_des3_make_key() argument 269 if (key->len != 24) { in gss_krb5_des3_make_key() 270 dprintk("%s: key->len is %d\n", __func__, key->len); in gss_krb5_des3_make_key() 283 memcpy(key->data + i*8, randombits->data + i*7, 7); in gss_krb5_des3_make_key() 284 key->data[i*8+7] = (((key->data[i*8]&1)<<1) | in gss_krb5_des3_make_key() 285 ((key->data[i*8+1]&1)<<2) | in gss_krb5_des3_make_key() 286 ((key->data[i*8+2]&1)<<3) | in gss_krb5_des3_make_key() [all …]
|
/linux-4.4.14/mm/ |
D | cleancache.c | 146 struct cleancache_filekey *key) in cleancache_get_key() argument 152 key->u.ino = inode->i_ino; in cleancache_get_key() 156 len = (*fhfn)(inode, &key->u.fh[0], &maxlen, NULL); in cleancache_get_key() 181 struct cleancache_filekey key = { .u.key = { 0 } }; in __cleancache_get_page() local 193 if (cleancache_get_key(page->mapping->host, &key) < 0) in __cleancache_get_page() 196 ret = cleancache_ops->get_page(pool_id, key, page->index, page); in __cleancache_get_page() 219 struct cleancache_filekey key = { .u.key = { 0 } }; in __cleancache_put_page() local 229 cleancache_get_key(page->mapping->host, &key) >= 0) { in __cleancache_put_page() 230 cleancache_ops->put_page(pool_id, key, page->index, page); in __cleancache_put_page() 249 struct cleancache_filekey key = { .u.key = { 0 } }; in __cleancache_invalidate_page() local [all …]
|
/linux-4.4.14/tools/perf/ui/tui/ |
D | util.c | 29 int key; in popup_menu__run() local 35 key = ui_browser__run(menu, 0); in popup_menu__run() 37 switch (key) { in popup_menu__run() 40 key = menu->index; in popup_menu__run() 46 key = -1; in popup_menu__run() 56 return key; in popup_menu__run() 75 int x, y, len, key; in ui_browser__input_window() local 129 key = ui__getch(delay_secs); in ui_browser__input_window() 130 while (key != K_TIMER && key != K_ENTER && key != K_ESC) { in ui_browser__input_window() 133 if (key == K_BKSPC) { in ui_browser__input_window() [all …]
|
/linux-4.4.14/drivers/crypto/qat/qat_dh895xccvf/ |
D | adf_drv.c | 126 char key[ADF_CFG_MAX_KEY_LEN_IN_BYTES]; in adf_dev_configure() local 134 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_BANK_NUM, 0); in adf_dev_configure() 135 if (adf_cfg_add_key_value_param(accel_dev, ADF_KERNEL_SEC, key, in adf_dev_configure() 140 snprintf(key, sizeof(key), ADF_CY "%d" ADF_ETRMGR_CORE_AFFINITY, 0); in adf_dev_configure() 141 if (adf_cfg_add_key_value_param(accel_dev, ADF_KERNEL_SEC, key, in adf_dev_configure() 145 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_ASYM_SIZE, 0); in adf_dev_configure() 148 if (adf_cfg_add_key_value_param(accel_dev, ADF_KERNEL_SEC, key, in adf_dev_configure() 153 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_SYM_SIZE, 0); in adf_dev_configure() 155 key, (void *)&val, ADF_DEC)) in adf_dev_configure() 159 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_ASYM_TX, 0); in adf_dev_configure() [all …]
|
/linux-4.4.14/drivers/crypto/qat/qat_dh895xcc/ |
D | adf_drv.c | 128 char key[ADF_CFG_MAX_KEY_LEN_IN_BYTES]; in adf_dev_configure() local 138 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_BANK_NUM, i); in adf_dev_configure() 140 key, (void *)&val, ADF_DEC)) in adf_dev_configure() 143 snprintf(key, sizeof(key), ADF_CY "%d" ADF_ETRMGR_CORE_AFFINITY, in adf_dev_configure() 146 key, (void *)&val, ADF_DEC)) in adf_dev_configure() 149 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_ASYM_SIZE, i); in adf_dev_configure() 152 key, (void *)&val, ADF_DEC)) in adf_dev_configure() 156 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_SYM_SIZE, i); in adf_dev_configure() 158 key, (void *)&val, ADF_DEC)) in adf_dev_configure() 162 snprintf(key, sizeof(key), ADF_CY "%d" ADF_RING_ASYM_TX, i); in adf_dev_configure() [all …]
|
/linux-4.4.14/Documentation/devicetree/bindings/input/ |
D | pxa27x-keypad.txt | 7 - marvell,debounce-interval : How long time the key will be 9 is debounce interval for direct key and bit[15:0] is debounce 10 interval for matrix key. The value is in binary number of 2ms 16 - marvell,direct-key-count : How many direct keyes are used. 17 - marvell,direct-key-mask : The mask indicates which keyes 18 are used. If bit[X] of the mask is set, the direct key X 20 - marvell,direct-key-low-active : Direct key status register 23 is low, the key is pressed(active). 24 - marvell,direct-key-map : It is a u16 array. Each item indicates 25 the linux key-code for the direct key. [all …]
|
/linux-4.4.14/drivers/sfi/ |
D | sfi_acpi.c | 99 struct sfi_table_key key = SFI_ANY_KEY; in sfi_acpi_parse_xsdt() local 106 ret = sfi_check_table(xsdt_va->table_offset_entry[i], &key); in sfi_acpi_parse_xsdt() 127 static struct acpi_table_header *sfi_acpi_get_table(struct sfi_table_key *key) in sfi_acpi_get_table() argument 134 ret = sfi_check_table(xsdt_va->table_offset_entry[i], key); in sfi_acpi_get_table() 156 struct sfi_table_key key; in sfi_acpi_table_parse() local 162 key.sig = signature; in sfi_acpi_table_parse() 163 key.oem_id = oem_id; in sfi_acpi_table_parse() 164 key.oem_table_id = oem_table_id; in sfi_acpi_table_parse() 166 table = sfi_acpi_get_table(&key); in sfi_acpi_table_parse() 182 struct sfi_table_key key; in sfi_acpi_table_show() local [all …]
|
D | sfi_core.c | 200 struct sfi_table_key *key) in sfi_table_check_key() argument 203 if (strncmp(th->sig, key->sig, SFI_SIGNATURE_SIZE) in sfi_table_check_key() 204 || (key->oem_id && strncmp(th->oem_id, in sfi_table_check_key() 205 key->oem_id, SFI_OEM_ID_SIZE)) in sfi_table_check_key() 206 || (key->oem_table_id && strncmp(th->oem_table_id, in sfi_table_check_key() 207 key->oem_table_id, SFI_OEM_TABLE_ID_SIZE))) in sfi_table_check_key() 231 __ref sfi_check_table(u64 pa, struct sfi_table_key *key) in sfi_check_table() argument 240 if (!key->sig) { in sfi_check_table() 245 if (!sfi_table_check_key(th, key)) in sfi_check_table() 259 struct sfi_table_header *sfi_get_table(struct sfi_table_key *key) in sfi_get_table() argument [all …]
|
/linux-4.4.14/arch/x86/boot/ |
D | video.c | 104 int key; in get_entry() local 108 key = getchar(); in get_entry() 110 if (key == '\b') { in get_entry() 115 } else if ((key >= '0' && key <= '9') || in get_entry() 116 (key >= 'A' && key <= 'Z') || in get_entry() 117 (key >= 'a' && key <= 'z')) { in get_entry() 119 entry_buf[len++] = key; in get_entry() 120 putchar(key); in get_entry() 123 } while (key != '\r'); in get_entry() 132 key = entry_buf[i] | 0x20; in get_entry() [all …]
|
/linux-4.4.14/drivers/staging/lustre/include/linux/libcfs/ |
D | libcfs_hash.h | 302 unsigned (*hs_hash)(struct cfs_hash *hs, const void *key, 307 void (*hs_keycpy)(struct hlist_node *hnode, void *key); 312 int (*hs_keycmp)(const void *key, struct hlist_node *hnode); 461 cfs_hash_id(struct cfs_hash *hs, const void *key, unsigned mask) in cfs_hash_id() argument 463 return hs->hs_ops->hs_hash(hs, key, mask); in cfs_hash_id() 473 cfs_hash_keycpy(struct cfs_hash *hs, struct hlist_node *hnode, void *key) in cfs_hash_keycpy() argument 476 hs->hs_ops->hs_keycpy(hnode, key); in cfs_hash_keycpy() 483 cfs_hash_keycmp(struct cfs_hash *hs, const void *key, struct hlist_node *hnode) in cfs_hash_keycmp() argument 485 return hs->hs_ops->hs_keycmp(key, hnode); in cfs_hash_keycmp() 552 void cfs_hash_bd_get(struct cfs_hash *hs, const void *key, [all …]
|
/linux-4.4.14/kernel/bpf/ |
D | hashtab.c | 31 char key[0] __aligned(8); member 118 static inline u32 htab_map_hash(const void *key, u32 key_len) in htab_map_hash() argument 120 return jhash(key, key_len, 0); in htab_map_hash() 129 void *key, u32 key_size) in lookup_elem_raw() argument 134 if (l->hash == hash && !memcmp(&l->key, key, key_size)) in lookup_elem_raw() 141 static void *htab_map_lookup_elem(struct bpf_map *map, void *key) in htab_map_lookup_elem() argument 153 hash = htab_map_hash(key, key_size); in htab_map_lookup_elem() 157 l = lookup_elem_raw(head, hash, key, key_size); in htab_map_lookup_elem() 160 return l->key + round_up(map->key_size, 8); in htab_map_lookup_elem() 166 static int htab_map_get_next_key(struct bpf_map *map, void *key, void *next_key) in htab_map_get_next_key() argument [all …]
|
D | syscall.c | 224 void __user *ukey = u64_to_ptr(attr->key); in map_lookup_elem() 228 void *key, *value, *ptr; in map_lookup_elem() local 241 key = kmalloc(map->key_size, GFP_USER); in map_lookup_elem() 242 if (!key) in map_lookup_elem() 246 if (copy_from_user(key, ukey, map->key_size) != 0) in map_lookup_elem() 255 ptr = map->ops->map_lookup_elem(map, key); in map_lookup_elem() 273 kfree(key); in map_lookup_elem() 283 void __user *ukey = u64_to_ptr(attr->key); in map_update_elem() 287 void *key, *value; in map_update_elem() local 300 key = kmalloc(map->key_size, GFP_USER); in map_update_elem() [all …]
|
/linux-4.4.14/scripts/kconfig/lxdialog/ |
D | menubox.c | 189 int key = 0, button = 0, scroll = 0, choice = 0; in dialog_menu() local 282 while (key != KEY_ESC) { in dialog_menu() 283 key = wgetch(menu); in dialog_menu() 285 if (key < 256 && isalpha(key)) in dialog_menu() 286 key = tolower(key); in dialog_menu() 288 if (strchr("ynmh", key)) in dialog_menu() 294 if (key == tolower(item_str()[j])) in dialog_menu() 301 if (key == tolower(item_str()[j])) in dialog_menu() 308 key == KEY_UP || key == KEY_DOWN || in dialog_menu() 309 key == '-' || key == '+' || in dialog_menu() [all …]
|
D | checklist.c | 121 int key = 0, button = 0, choice = 0, scroll = 0, max_choice; in dialog_checklist() local 208 while (key != KEY_ESC) { in dialog_checklist() 209 key = wgetch(dialog); in dialog_checklist() 213 if (toupper(key) == toupper(item_str()[0])) in dialog_checklist() 217 if (i < max_choice || key == KEY_UP || key == KEY_DOWN || in dialog_checklist() 218 key == '+' || key == '-') { in dialog_checklist() 219 if (key == KEY_UP || key == '-') { in dialog_checklist() 244 } else if (key == KEY_DOWN || key == '+') { in dialog_checklist() 286 switch (key) { in dialog_checklist() 306 button = ((key == KEY_LEFT ? --button : ++button) < 0) in dialog_checklist() [all …]
|
/linux-4.4.14/net/ipv4/ |
D | ip_tunnel_core.c | 138 dst->key.tun_id = src->key.tun_id; in iptunnel_metadata_reply() 140 memcpy(&dst->key.u.ipv6.dst, &src->key.u.ipv6.src, in iptunnel_metadata_reply() 143 dst->key.u.ipv4.dst = src->key.u.ipv4.src; in iptunnel_metadata_reply() 254 tun_info->key.tun_id = nla_get_u64(tb[LWTUNNEL_IP_ID]); in ip_tun_build_state() 257 tun_info->key.u.ipv4.dst = nla_get_be32(tb[LWTUNNEL_IP_DST]); in ip_tun_build_state() 260 tun_info->key.u.ipv4.src = nla_get_be32(tb[LWTUNNEL_IP_SRC]); in ip_tun_build_state() 263 tun_info->key.ttl = nla_get_u8(tb[LWTUNNEL_IP_TTL]); in ip_tun_build_state() 266 tun_info->key.tos = nla_get_u8(tb[LWTUNNEL_IP_TOS]); in ip_tun_build_state() 269 tun_info->key.tun_flags = nla_get_u16(tb[LWTUNNEL_IP_FLAGS]); in ip_tun_build_state() 284 if (nla_put_u64(skb, LWTUNNEL_IP_ID, tun_info->key.tun_id) || in ip_tun_fill_encap_info() [all …]
|
D | fib_trie.c | 99 t_key key; member 194 #define get_cindex(key, kv) (((key) ^ (kv)->key) >> (kv)->pos) argument 196 static inline unsigned long get_index(t_key key, struct key_vector *kv) in get_index() argument 198 unsigned long index = key ^ kv->key; in get_index() 327 static struct key_vector *leaf_new(t_key key, struct fib_alias *fa) in leaf_new() argument 338 l->key = key; in leaf_new() 350 static struct key_vector *tnode_new(t_key key, int pos, int bits) in tnode_new() argument 372 tn->key = (shift < KEYLENGTH) ? (key >> shift) << shift : 0; in tnode_new() 442 static inline void put_child_root(struct key_vector *tp, t_key key, in put_child_root() argument 448 put_child(tp, get_index(key, tp), n); in put_child_root() [all …]
|
/linux-4.4.14/net/sctp/ |
D | auth.c | 61 void sctp_auth_key_put(struct sctp_auth_bytes *key) in sctp_auth_key_put() argument 63 if (!key) in sctp_auth_key_put() 66 if (atomic_dec_and_test(&key->refcnt)) { in sctp_auth_key_put() 67 kzfree(key); in sctp_auth_key_put() 75 struct sctp_auth_bytes *key; in sctp_auth_create_key() local 82 key = kmalloc(sizeof(struct sctp_auth_bytes) + key_len, gfp); in sctp_auth_create_key() 83 if (!key) in sctp_auth_create_key() 86 key->len = key_len; in sctp_auth_create_key() 87 atomic_set(&key->refcnt, 1); in sctp_auth_create_key() 90 return key; in sctp_auth_create_key() [all …]
|
/linux-4.4.14/tools/perf/util/ |
D | kvm-stat.h | 13 u64 key; member 27 struct event_key key; member 40 key_cmp_fun key; member 48 struct event_key *key); 55 struct event_key *key); 57 struct perf_sample *sample, struct event_key *key); 59 void (*decode_key)(struct perf_kvm_stat *kvm, struct event_key *key, 112 struct event_key *key); 115 struct event_key *key); 118 struct event_key *key); [all …]
|
/linux-4.4.14/drivers/staging/wlan-ng/ |
D | p80211wep.c | 122 int wep_change_key(wlandevice_t *wlandev, int keynum, u8 *key, int keylen) in wep_change_key() argument 128 if (key == NULL) in wep_change_key() 137 memcpy(wlandev->wep_keys[keynum], key, keylen); in wep_change_key() 150 u8 s[256], key[64], c_crc[4]; in wep_decrypt() local 158 key[0] = iv[0]; in wep_decrypt() 159 key[1] = iv[1]; in wep_decrypt() 160 key[2] = iv[2]; in wep_decrypt() 175 memcpy(key + 3, wlandev->wep_keys[keyidx], keylen); in wep_decrypt() 185 j = (j + s[i] + key[i % keylen]) & 0xff; in wep_decrypt() 223 u8 s[256], key[64]; in wep_encrypt() local [all …]
|
/linux-4.4.14/Documentation/filesystems/nfs/ |
D | idmapper.txt | 8 ways NFS could obtain this information: placing a call to /sbin/request-key 11 NFS will attempt to call /sbin/request-key first. If this succeeds, the 12 result will be cached using the generic request-key cache. This call should 13 only fail if /etc/request-key.conf is not configured for the id_resolver key 14 type, see the "Configuring" section below if you wish to use the request-key 17 If the call to /sbin/request-key fails (if /etc/request-key.conf is not 18 configured with the id_resolver key type), then the idmapper will ask the 26 The file /etc/request-key.conf will need to be modified so /sbin/request-key can 34 The last parameter, 600, defines how many seconds into the future the key will 38 id mapper uses for key descriptions: [all …]
|
/linux-4.4.14/drivers/net/wireless/ath/ |
D | key.c | 339 static int ath_setkey_tkip(struct ath_common *common, u16 keyix, const u8 *key, in ath_setkey_tkip() argument 346 key_txmic = key + NL80211_TKIP_DATA_OFFSET_TX_MIC_KEY; in ath_setkey_tkip() 347 key_rxmic = key + NL80211_TKIP_DATA_OFFSET_RX_MIC_KEY; in ath_setkey_tkip() 476 struct ieee80211_key_conf *key) in ath_key_config() argument 486 switch (key->cipher) { in ath_key_config() 504 hk.kv_len = key->keylen; in ath_key_config() 505 if (key->keylen) in ath_key_config() 506 memcpy(hk.kv_val, key->key, key->keylen); in ath_key_config() 508 if (!(key->flags & IEEE80211_KEY_FLAG_PAIRWISE)) { in ath_key_config() 514 idx = ath_reserve_key_cache_slot(common, key->cipher); in ath_key_config() [all …]
|
/linux-4.4.14/drivers/crypto/vmx/ |
D | aesp8-ppc.pl | 62 my ($zero,$in0,$in1,$key,$rcon,$mask,$tmp)=map("v$_",(0..6)); 115 lvsr $key,0,r9 # borrow $key 121 le?vxor $key,$key,$mask # adjust for byte swap 124 vperm $in0,$in0,$in1,$key # align [and byte swap in LE] 142 vperm $key,$in0,$in0,$mask # rotate-n-splat 147 vcipherlast $key,$key,$rcon 157 vxor $in0,$in0,$key 162 vperm $key,$in0,$in0,$mask # rotate-n-splat 167 vcipherlast $key,$key,$rcon 177 vxor $in0,$in0,$key [all …]
|
D | aesp8-ppc.h | 7 u8 key[AES_MAX_KEYLENGTH]; member 12 struct aes_key *key); 14 struct aes_key *key); 15 void aes_p8_encrypt(const u8 *in, u8 *out, const struct aes_key *key); 16 void aes_p8_decrypt(const u8 *in, u8 *out, const struct aes_key *key); 18 const struct aes_key *key, u8 *iv, const int enc); 20 size_t len, const struct aes_key *key,
|
/linux-4.4.14/fs/reiserfs/ |
D | prints.c | 17 static char *reiserfs_cpu_offset(struct cpu_key *key) in reiserfs_cpu_offset() argument 19 if (cpu_key_k_type(key) == TYPE_DIRENTRY) in reiserfs_cpu_offset() 22 GET_HASH_VALUE(cpu_key_k_offset(key)), in reiserfs_cpu_offset() 24 GET_GENERATION_NUMBER(cpu_key_k_offset(key))); in reiserfs_cpu_offset() 27 (unsigned long long)cpu_key_k_offset(key)); in reiserfs_cpu_offset() 31 static char *le_offset(struct reiserfs_key *key) in le_offset() argument 35 version = le_key_version(key); in le_offset() 36 if (le_key_k_type(version, key) == TYPE_DIRENTRY) in le_offset() 39 GET_HASH_VALUE(le_key_k_offset(version, key)), in le_offset() 41 GET_GENERATION_NUMBER(le_key_k_offset(version, key))); in le_offset() [all …]
|
D | item_ops.c | 24 static void sd_decrement_key(struct cpu_key *key) in sd_decrement_key() argument 26 key->on_disk_key.k_objectid--; in sd_decrement_key() 27 set_cpu_key_k_type(key, TYPE_ANY); in sd_decrement_key() 28 set_cpu_key_k_offset(key, (loff_t)(~0ULL >> 1)); in sd_decrement_key() 31 static int sd_is_left_mergeable(struct reiserfs_key *key, unsigned long bsize) in sd_is_left_mergeable() argument 128 static void direct_decrement_key(struct cpu_key *key) in direct_decrement_key() argument 130 cpu_key_k_offset_dec(key); in direct_decrement_key() 131 if (cpu_key_k_offset(key) == 0) in direct_decrement_key() 132 set_cpu_key_k_type(key, TYPE_STAT_DATA); in direct_decrement_key() 135 static int direct_is_left_mergeable(struct reiserfs_key *key, in direct_is_left_mergeable() argument [all …]
|
/linux-4.4.14/drivers/staging/speakup/ |
D | keyhelp.c | 65 u_short *p_key = key_data, key; in build_key_data() local 102 key = (state_tbl[i] << 8) + ch; in build_key_data() 108 *p_key = key; in build_key_data() 113 static void say_key(int key) in say_key() argument 115 int i, state = key >> 8; in say_key() 117 key &= 0xff; in say_key() 122 if ((key > 0) && (key <= num_key_names)) in say_key() 124 spk_msg_get(MSG_KEYNAMES_START + (key - 1))); in say_key() 145 int spk_handle_help(struct vc_data *vc, u_char type, u_char ch, u_short key) in spk_handle_help() argument 187 if ((type != KT_SPKUP) && (key > 0) && (key <= num_key_names)) { in spk_handle_help() [all …]
|
/linux-4.4.14/drivers/hid/ |
D | hid-zydacron.c | 117 unsigned key; in zc_raw_event() local 124 key = zc->last_key[index]; in zc_raw_event() 125 if (key) { in zc_raw_event() 126 input_event(zc->input_ep81, EV_KEY, key, 0); in zc_raw_event() 131 key = 0; in zc_raw_event() 137 key = KEY_MODE; in zc_raw_event() 141 key = KEY_SCREEN; in zc_raw_event() 145 key = KEY_INFO; in zc_raw_event() 149 key = KEY_RADIO; in zc_raw_event() 154 if (key) { in zc_raw_event() [all …]
|
/linux-4.4.14/drivers/power/ |
D | test_power.c | 251 char const *key; member 294 static int map_get_value(struct battery_property_map *map, const char *key, in map_get_value() argument 300 strncpy(buf, key, MAX_KEYLENGTH); in map_get_value() 307 while (map->key) { in map_get_value() 308 if (strncasecmp(map->key, buf, MAX_KEYLENGTH) == 0) in map_get_value() 320 while (map->key) { in map_get_key() 322 return map->key; in map_get_key() 335 static int param_set_ac_online(const char *key, const struct kernel_param *kp) in param_set_ac_online() argument 337 ac_online = map_get_value(map_ac_online, key, ac_online); in param_set_ac_online() 348 static int param_set_usb_online(const char *key, const struct kernel_param *kp) in param_set_usb_online() argument [all …]
|
/linux-4.4.14/drivers/staging/lustre/lustre/obdclass/ |
D | lu_object.c | 446 struct lu_cdebug_data *key; in lu_cdebug_printer() local 453 key = lu_context_key_get(&env->le_ctx, &lu_global_key); in lu_cdebug_printer() 454 LASSERT(key != NULL); in lu_cdebug_printer() 456 used = strlen(key->lck_area); in lu_cdebug_printer() 461 vsnprintf(key->lck_area + used, in lu_cdebug_printer() 462 ARRAY_SIZE(key->lck_area) - used, format, args); in lu_cdebug_printer() 465 libcfs_debug_msg(msgdata, "%s", key->lck_area); in lu_cdebug_printer() 466 key->lck_area[0] = 0; in lu_cdebug_printer() 867 const void *key, unsigned mask) in lu_obj_hop_hash() argument 869 struct lu_fid *fid = (struct lu_fid *)key; in lu_obj_hop_hash() [all …]
|
/linux-4.4.14/net/rxrpc/ |
D | ar-key.c | 33 static void rxrpc_destroy(struct key *); 34 static void rxrpc_destroy_s(struct key *); 35 static void rxrpc_describe(const struct key *, struct seq_file *); 36 static long rxrpc_read(const struct key *, char __user *, size_t); 862 static void rxrpc_destroy(struct key *key) in rxrpc_destroy() argument 864 rxrpc_free_token_list(key->payload.data[0]); in rxrpc_destroy() 870 static void rxrpc_destroy_s(struct key *key) in rxrpc_destroy_s() argument 872 if (key->payload.data[0]) { in rxrpc_destroy_s() 873 crypto_free_blkcipher(key->payload.data[0]); in rxrpc_destroy_s() 874 key->payload.data[0] = NULL; in rxrpc_destroy_s() [all …]
|
D | ar-security.c | 128 struct key *key = conn->key; in rxrpc_init_client_conn_security() local 131 _enter("{%d},{%x}", conn->debug_id, key_serial(key)); in rxrpc_init_client_conn_security() 133 if (!key) in rxrpc_init_client_conn_security() 136 ret = key_validate(key); in rxrpc_init_client_conn_security() 140 token = key->payload.data[0]; in rxrpc_init_client_conn_security() 168 struct key *key; in rxrpc_init_server_conn_security() local 213 key = key_ref_to_ptr(kref); in rxrpc_init_server_conn_security() 216 conn->server_key = key; in rxrpc_init_server_conn_security() 262 key_put(conn->key); in rxrpc_clear_conn_security()
|
/linux-4.4.14/drivers/infiniband/hw/mthca/ |
D | mthca_mr.c | 53 __be32 key; member 390 static inline u32 tavor_key_to_hw_index(u32 key) in tavor_key_to_hw_index() argument 392 return key; in tavor_key_to_hw_index() 400 static inline u32 arbel_key_to_hw_index(u32 key) in arbel_key_to_hw_index() argument 402 return (key << 24) | (key >> 8); in arbel_key_to_hw_index() 413 static inline u32 key_to_hw_index(struct mthca_dev *dev, u32 key) in key_to_hw_index() argument 416 return arbel_key_to_hw_index(key); in key_to_hw_index() 418 return tavor_key_to_hw_index(key); in key_to_hw_index() 421 static inline u32 adjust_key(struct mthca_dev *dev, u32 key) in adjust_key() argument 424 return ((key << 20) & 0x800000) | (key & 0x7fffff); in adjust_key() [all …]
|
/linux-4.4.14/Documentation/ |
D | digsig.txt | 20 Public key and signature consist of header and MPIs. 23 uint8_t version; /* key format version */ 24 time_t timestamp; /* key made, always 0 for now */ 40 keyid equals to SHA1[12-19] over the total key content. 42 Such approach insures that key or signature header could not be changed. 50 digsig_verify() - digital signature verification with public key 54 * digsig_verify() - digital signature verification with public key 55 * @keyring: keyring to search key in 67 int digsig_verify(struct key *keyring, const char *sig, int siglen, 72 The signing and key management utilities evm-utils provide functionality [all …]
|
D | module-signing.txt | 15 - Administering/protecting the private key. 25 or modules signed with an invalid key. Module signing increases security by 32 type. The facility currently only supports the RSA public key encryption 52 signature for which the key is not known or a module that is unsigned. 54 If this is off (ie. "permissive"), then modules for which the key is not 60 signature that can be verified by a public key in the kernel's possession 92 (4) "File name or PKCS#11 URI of module signing key" (CONFIG_MODULE_SIG_KEY) 96 and allow the kernel modules to be signed with a key of your choosing. 97 The string provided should identify a file containing both a private key 101 certificate and a private key. [all …]
|
/linux-4.4.14/net/ipv4/netfilter/ |
D | nf_nat_proto_gre.c | 48 static u_int16_t key; in gre_unique_tuple() local 58 keyptr = &tuple->src.u.gre.key; in gre_unique_tuple() 60 keyptr = &tuple->dst.u.gre.key; in gre_unique_tuple() 67 min = ntohs(range->min_proto.gre.key); in gre_unique_tuple() 68 range_size = ntohs(range->max_proto.gre.key) - min + 1; in gre_unique_tuple() 73 for (i = 0; ; ++key) { in gre_unique_tuple() 74 *keyptr = htons(min + key % range_size); in gre_unique_tuple() 112 pr_debug("call_id -> 0x%04x\n", ntohs(tuple->dst.u.gre.key)); in gre_manip_pkt() 113 pgreh->call_id = tuple->dst.u.gre.key; in gre_manip_pkt()
|
/linux-4.4.14/fs/cifs/ |
D | smbencrypt.c | 52 str_to_key(unsigned char *str, unsigned char *key) in str_to_key() argument 56 key[0] = str[0] >> 1; in str_to_key() 57 key[1] = ((str[0] & 0x01) << 6) | (str[1] >> 2); in str_to_key() 58 key[2] = ((str[1] & 0x03) << 5) | (str[2] >> 3); in str_to_key() 59 key[3] = ((str[2] & 0x07) << 4) | (str[3] >> 4); in str_to_key() 60 key[4] = ((str[3] & 0x0F) << 3) | (str[4] >> 5); in str_to_key() 61 key[5] = ((str[4] & 0x1F) << 2) | (str[5] >> 6); in str_to_key() 62 key[6] = ((str[5] & 0x3F) << 1) | (str[6] >> 7); in str_to_key() 63 key[7] = str[6] & 0x7F; in str_to_key() 65 key[i] = (key[i] << 1); in str_to_key() [all …]
|
/linux-4.4.14/drivers/net/wireless/ipw2x00/ |
D | libipw_wx.c | 319 int i, key, key_provided, len; in libipw_wx_set_encode() local 325 key = erq->flags & IW_ENCODE_INDEX; in libipw_wx_set_encode() 326 if (key) { in libipw_wx_set_encode() 327 if (key > WEP_KEYS) in libipw_wx_set_encode() 329 key--; in libipw_wx_set_encode() 333 key = ieee->crypt_info.tx_keyidx; in libipw_wx_set_encode() 336 LIBIPW_DEBUG_WX("Key: %d [%s]\n", key, key_provided ? in libipw_wx_set_encode() 339 crypt = &ieee->crypt_info.crypt[key]; in libipw_wx_set_encode() 344 key); in libipw_wx_set_encode() 396 new_crypt->priv = new_crypt->ops->init(key); in libipw_wx_set_encode() [all …]
|
/linux-4.4.14/net/dns_resolver/ |
D | dns_key.c | 179 static bool dns_resolver_cmp(const struct key *key, in dns_resolver_cmp() argument 183 const char *src = key->description, *dsp = match_data->raw_data; in dns_resolver_cmp() 224 static void dns_resolver_describe(const struct key *key, struct seq_file *m) in dns_resolver_describe() argument 226 seq_puts(m, key->description); in dns_resolver_describe() 227 if (key_is_instantiated(key)) { in dns_resolver_describe() 228 int err = PTR_ERR(key->payload.data[dns_key_error]); in dns_resolver_describe() 233 seq_printf(m, ": %u", key->datalen); in dns_resolver_describe() 241 static long dns_resolver_read(const struct key *key, in dns_resolver_read() argument 244 int err = PTR_ERR(key->payload.data[dns_key_error]); in dns_resolver_read() 249 return user_read(key, buffer, buflen); in dns_resolver_read() [all …]
|
/linux-4.4.14/drivers/crypto/ |
D | padlock-aes.c | 108 const __le32 *key = (const __le32 *)in_key; in aes_set_key() local 125 ctx->E[0] = le32_to_cpu(key[0]); in aes_set_key() 126 ctx->E[1] = le32_to_cpu(key[1]); in aes_set_key() 127 ctx->E[2] = le32_to_cpu(key[2]); in aes_set_key() 128 ctx->E[3] = le32_to_cpu(key[3]); in aes_set_key() 190 static inline void rep_xcrypt_ecb(const u8 *input, u8 *output, void *key, in rep_xcrypt_ecb() argument 195 : "d"(control_word), "b"(key), "c"(count)); in rep_xcrypt_ecb() 198 static inline u8 *rep_xcrypt_cbc(const u8 *input, u8 *output, void *key, in rep_xcrypt_cbc() argument 203 : "d" (control_word), "b" (key), "c" (count)); in rep_xcrypt_cbc() 207 static void ecb_crypt_copy(const u8 *in, u8 *out, u32 *key, in ecb_crypt_copy() argument [all …]
|
/linux-4.4.14/scripts/kconfig/ |
D | nconf.c | 287 typedef void (*function_key_handler_t)(int *key, struct menu *menu); 288 static void handle_f1(int *key, struct menu *current_item); 289 static void handle_f2(int *key, struct menu *current_item); 290 static void handle_f3(int *key, struct menu *current_item); 291 static void handle_f4(int *key, struct menu *current_item); 292 static void handle_f5(int *key, struct menu *current_item); 293 static void handle_f6(int *key, struct menu *current_item); 294 static void handle_f7(int *key, struct menu *current_item); 295 static void handle_f8(int *key, struct menu *current_item); 296 static void handle_f9(int *key, struct menu *current_item); [all …]
|
/linux-4.4.14/Documentation/RCU/ |
D | rculist_nulls.txt | 17 obj = lockless_lookup(key); 24 * must check key after getting the reference on object 26 if (obj->key != key) { // not the object we expected 33 Beware that lockless_lookup(key) cannot use traditional hlist_for_each_entry_rcu() 36 lockless_lookup(key) 43 if (obj->key == key) 54 if (obj->key == key) 68 checking the key." 74 and previous value of 'obj->key'. Or else, an item could be deleted 85 obj->key = key; [all …]
|
/linux-4.4.14/certs/ |
D | system_keyring.c | 21 struct key *system_trusted_keyring; 57 key_ref_t key; in load_system_certificate_list() local 79 key = key_create_or_update(make_key_ref(system_trusted_keyring, 1), in load_system_certificate_list() 88 if (IS_ERR(key)) { in load_system_certificate_list() 90 PTR_ERR(key)); in load_system_certificate_list() 92 set_bit(KEY_FLAG_BUILTIN, &key_ref_to_ptr(key)->flags); in load_system_certificate_list() 94 key_ref_to_ptr(key)->description); in load_system_certificate_list() 95 key_ref_put(key); in load_system_certificate_list()
|
/linux-4.4.14/kernel/debug/kdb/ |
D | kdb_io.c | 59 int key; in kdb_read_get_key() local 73 key = *ped++; in kdb_read_get_key() 78 key = (*f)(); in kdb_read_get_key() 79 if (key == -1) { in kdb_read_get_key() 87 if (key == '\r') in kdb_read_get_key() 88 key = '\n'; in kdb_read_get_key() 89 *buffer++ = key; in kdb_read_get_key() 93 if (escape_delay == 0 && key == '\e') { in kdb_read_get_key() 99 *ped++ = key; in kdb_read_get_key() 109 if (key != '[') in kdb_read_get_key() [all …]
|
/linux-4.4.14/arch/powerpc/boot/ |
D | planetcore.c | 41 const char *planetcore_get_key(const char *table, const char *key) in planetcore_get_key() argument 43 int keylen = strlen(key); in planetcore_get_key() 46 if (!strncmp(table, key, keylen) && table[keylen] == '=') in planetcore_get_key() 55 int planetcore_get_decimal(const char *table, const char *key, u64 *val) in planetcore_get_decimal() argument 57 const char *str = planetcore_get_key(table, key); in planetcore_get_decimal() 65 int planetcore_get_hex(const char *table, const char *key, u64 *val) in planetcore_get_hex() argument 67 const char *str = planetcore_get_key(table, key); in planetcore_get_hex()
|
/linux-4.4.14/include/net/ |
D | ip_tunnels.h | 59 struct ip_tunnel_key key; member 150 __be32 key; member 182 static inline void ip_tunnel_key_init(struct ip_tunnel_key *key, in ip_tunnel_key_init() argument 188 key->tun_id = tun_id; in ip_tunnel_key_init() 189 key->u.ipv4.src = saddr; in ip_tunnel_key_init() 190 key->u.ipv4.dst = daddr; in ip_tunnel_key_init() 191 memset((unsigned char *)key + IP_TUNNEL_KEY_IPV4_PAD, in ip_tunnel_key_init() 193 key->tos = tos; in ip_tunnel_key_init() 194 key->ttl = ttl; in ip_tunnel_key_init() 195 key->tun_flags = tun_flags; in ip_tunnel_key_init() [all …]
|
D | arp.h | 14 u32 key = *(const u32 *)pkey; in arp_hashfn() local 15 u32 val = key ^ hash32_ptr(dev); in arp_hashfn() 20 static inline struct neighbour *__ipv4_neigh_lookup_noref(struct net_device *dev, u32 key) in __ipv4_neigh_lookup_noref() argument 22 return ___neigh_lookup_noref(&arp_tbl, neigh_key_eq32, arp_hashfn, &key, dev); in __ipv4_neigh_lookup_noref() 25 static inline struct neighbour *__ipv4_neigh_lookup(struct net_device *dev, u32 key) in __ipv4_neigh_lookup() argument 30 n = __ipv4_neigh_lookup_noref(dev, key); in __ipv4_neigh_lookup()
|
/linux-4.4.14/arch/arm64/include/asm/ |
D | jump_label.h | 29 static __always_inline bool arch_static_branch(struct static_key *key, bool branch) in arch_static_branch() argument 36 : : "i"(&((char *)key)[branch]) : : l_yes); in arch_static_branch() 43 static __always_inline bool arch_static_branch_jump(struct static_key *key, bool branch) in arch_static_branch_jump() argument 50 : : "i"(&((char *)key)[branch]) : : l_yes); in arch_static_branch_jump() 62 jump_label_t key; member
|
/linux-4.4.14/arch/s390/crypto/ |
D | des_s390.c | 33 u8 key[DES3_KEY_SIZE]; member 36 static int des_setkey(struct crypto_tfm *tfm, const u8 *key, in des_setkey() argument 44 if (!des_ekey(tmp, key) && (*flags & CRYPTO_TFM_REQ_WEAK_KEY)) { in des_setkey() 49 memcpy(ctx->key, key, key_len); in des_setkey() 57 crypt_s390_km(KM_DEA_ENCRYPT, ctx->key, out, in, DES_BLOCK_SIZE); in des_encrypt() 64 crypt_s390_km(KM_DEA_DECRYPT, ctx->key, out, in, DES_BLOCK_SIZE); in des_decrypt() 87 u8 *key, struct blkcipher_walk *walk) in ecb_desall_crypt() argument 98 ret = crypt_s390_km(func, key, out, in, n); in ecb_desall_crypt() 117 u8 key[DES3_KEY_SIZE]; in cbc_desall_crypt() member 124 memcpy(param.key, ctx->key, DES3_KEY_SIZE); in cbc_desall_crypt() [all …]
|
/linux-4.4.14/arch/sparc/include/asm/ |
D | jump_label.h | 10 static __always_inline bool arch_static_branch(struct static_key *key, bool branch) in arch_static_branch() argument 19 : : "i" (&((char *)key)[branch]) : : l_yes); in arch_static_branch() 26 static __always_inline bool arch_static_branch_jump(struct static_key *key, bool branch) in arch_static_branch_jump() argument 35 : : "i" (&((char *)key)[branch]) : : l_yes); in arch_static_branch_jump() 47 jump_label_t key; member
|
/linux-4.4.14/arch/s390/include/asm/ |
D | jump_label.h | 15 static __always_inline bool arch_static_branch(struct static_key *key, bool branch) in arch_static_branch() argument 22 : : "X" (&((char *)key)[branch]) : : label); in arch_static_branch() 29 static __always_inline bool arch_static_branch_jump(struct static_key *key, bool branch) in arch_static_branch_jump() argument 36 : : "X" (&((char *)key)[branch]) : : label); in arch_static_branch_jump() 48 jump_label_t key; member
|
/linux-4.4.14/drivers/hwmon/ |
D | applesmc.c | 122 char key[5]; /* four-letter key code */ member 221 static int send_argument(const char *key) in send_argument() argument 226 if (send_byte(key[i], APPLESMC_DATA_PORT)) in send_argument() 231 static int read_smc(u8 cmd, const char *key, u8 *buffer, u8 len) in read_smc() argument 236 if (send_command(cmd) || send_argument(key)) { in read_smc() 237 pr_warn("%.4s: read arg fail\n", key); in read_smc() 243 pr_warn("%.4s: read len fail\n", key); in read_smc() 249 pr_warn("%.4s: read data[%d] fail\n", key, i); in read_smc() 269 static int write_smc(u8 cmd, const char *key, const u8 *buffer, u8 len) in write_smc() argument 273 if (send_command(cmd) || send_argument(key)) { in write_smc() [all …]
|
/linux-4.4.14/arch/arm/include/asm/ |
D | jump_label.h | 11 static __always_inline bool arch_static_branch(struct static_key *key, bool branch) in arch_static_branch() argument 18 : : "i" (&((char *)key)[branch]) : : l_yes); in arch_static_branch() 25 static __always_inline bool arch_static_branch_jump(struct static_key *key, bool branch) in arch_static_branch_jump() argument 32 : : "i" (&((char *)key)[branch]) : : l_yes); in arch_static_branch_jump() 44 jump_label_t key; member
|
/linux-4.4.14/tools/perf/ |
D | builtin-kvm.c | 38 struct event_key *key) in exit_event_get_key() argument 40 key->info = 0; in exit_event_get_key() 41 key->key = perf_evsel__intval(evsel, sample, KVM_EXIT_REASON); in exit_event_get_key() 50 struct perf_sample *sample, struct event_key *key) in exit_event_begin() argument 53 exit_event_get_key(evsel, sample, key); in exit_event_begin() 67 struct event_key *key __maybe_unused) in exit_event_end() 88 struct event_key *key, in exit_event_decode_key() argument 91 const char *exit_reason = get_exit_reason(kvm, key->exit_reasons, in exit_event_decode_key() 92 key->key); in exit_event_decode_key() 150 static int kvm_events_hash_fn(u64 key) in kvm_events_hash_fn() argument [all …]
|
/linux-4.4.14/fs/xfs/ |
D | xfs_mru_cache.h | 25 unsigned long key; member 37 int xfs_mru_cache_insert(struct xfs_mru_cache *mru, unsigned long key, 40 xfs_mru_cache_remove(struct xfs_mru_cache *mru, unsigned long key); 41 void xfs_mru_cache_delete(struct xfs_mru_cache *mru, unsigned long key); 43 xfs_mru_cache_lookup(struct xfs_mru_cache *mru, unsigned long key);
|
/linux-4.4.14/arch/mips/include/asm/ |
D | jump_label.h | 29 static __always_inline bool arch_static_branch(struct static_key *key, bool branch) in arch_static_branch() argument 36 : : "i" (&((char *)key)[branch]) : : l_yes); in arch_static_branch() 43 static __always_inline bool arch_static_branch_jump(struct static_key *key, bool branch) in arch_static_branch_jump() argument 50 : : "i" (&((char *)key)[branch]) : : l_yes); in arch_static_branch_jump() 66 jump_label_t key; member
|
/linux-4.4.14/arch/x86/include/asm/ |
D | jump_label.h | 19 static __always_inline bool arch_static_branch(struct static_key *key, bool branch) in arch_static_branch() argument 27 : : "i" (key), "i" (branch) : : l_yes); in arch_static_branch() 34 static __always_inline bool arch_static_branch_jump(struct static_key *key, bool branch) in arch_static_branch_jump() argument 43 : : "i" (key), "i" (branch) : : l_yes); in arch_static_branch_jump() 59 jump_label_t key; member
|
/linux-4.4.14/drivers/net/ethernet/mellanox/mlx5/core/ |
D | mr.c | 60 u8 key; in mlx5_core_create_mkey() local 64 key = dev->priv.mkey_key++; in mlx5_core_create_mkey() 66 in->seg.qpn_mkey7_0 |= cpu_to_be32(key); in mlx5_core_create_mkey() 88 mr->key = mlx5_idx_to_mkey(be32_to_cpu(lout.mkey) & 0xffffff) | key; in mlx5_core_create_mkey() 92 be32_to_cpu(lout.mkey), key, mr->key); in mlx5_core_create_mkey() 96 err = radix_tree_insert(&table->tree, mlx5_base_mkey(mr->key), mr); in mlx5_core_create_mkey() 100 mlx5_base_mkey(mr->key), err); in mlx5_core_create_mkey() 121 deleted_mr = radix_tree_delete(&table->tree, mlx5_base_mkey(mr->key)); in mlx5_core_destroy_mkey() 125 mlx5_base_mkey(mr->key)); in mlx5_core_destroy_mkey() 130 in.mkey = cpu_to_be32(mlx5_mkey_to_idx(mr->key)); in mlx5_core_destroy_mkey() [all …]
|
/linux-4.4.14/include/linux/usb/ |
D | wusb.h | 313 const u8 key[16], const struct aes_ccm_nonce *_n, 317 static inline int wusb_prf_64(void *out, size_t out_size, const u8 key[16], in wusb_prf_64() 322 return wusb_prf(out, out_size, key, n, a, b, blen, 64); in wusb_prf_64() 325 static inline int wusb_prf_128(void *out, size_t out_size, const u8 key[16], in wusb_prf_128() 330 return wusb_prf(out, out_size, key, n, a, b, blen, 128); in wusb_prf_128() 333 static inline int wusb_prf_256(void *out, size_t out_size, const u8 key[16], in wusb_prf_256() 338 return wusb_prf(out, out_size, key, n, a, b, blen, 256); in wusb_prf_256() 343 const u8 key[16], in wusb_key_derive() 348 return wusb_prf_256(keydvt_out, sizeof(*keydvt_out), key, n, &a, in wusb_key_derive() 368 static inline int wusb_oob_mic(u8 mic_out[8], const u8 key[16], in wusb_oob_mic() [all …]
|
/linux-4.4.14/drivers/media/usb/dvb-usb/ |
D | cinergyT2-core.c | 144 u8 key[5] = {0, 0, 0, 0, 0}, cmd = CINERGYT2_EP1_GET_RC_EVENTS; in cinergyt2_rc_query() local 149 dvb_usb_generic_rw(d, &cmd, 1, key, sizeof(key), 0); in cinergyt2_rc_query() 150 if (key[4] == 0xff) { in cinergyt2_rc_query() 169 key[2] = ~key[1]; in cinergyt2_rc_query() 170 dvb_usb_nec_rc_key_to_event(d, key, event, state); in cinergyt2_rc_query() 171 if (key[0] != 0) { in cinergyt2_rc_query() 175 deb_rc("key: %*ph\n", 5, key); in cinergyt2_rc_query()
|
/linux-4.4.14/tools/perf/ui/ |
D | browser.c | 201 int key = 0, err; in ui_browser__warning() local 212 while ((key = ui__question_window("Warning!", text, in ui_browser__warning() 219 return key; in ui_browser__warning() 224 int key; in ui_browser__help_window() local 226 while ((key = ui__help_window(text)) == K_RESIZE) in ui_browser__help_window() 229 return key; in ui_browser__help_window() 234 int key; in ui_browser__dialog_yesno() local 236 while ((key = ui__dialog_yesno(text)) == K_RESIZE) in ui_browser__dialog_yesno() 239 return key == K_ENTER || toupper(key) == 'Y'; in ui_browser__dialog_yesno() 372 int err, key; in ui_browser__run() local [all …]
|
/linux-4.4.14/arch/powerpc/include/asm/ |
D | jump_label.h | 21 static __always_inline bool arch_static_branch(struct static_key *key, bool branch) in arch_static_branch() argument 28 : : "i" (&((char *)key)[branch]) : : l_yes); in arch_static_branch() 35 static __always_inline bool arch_static_branch_jump(struct static_key *key, bool branch) in arch_static_branch_jump() argument 42 : : "i" (&((char *)key)[branch]) : : l_yes); in arch_static_branch_jump() 58 jump_label_t key; member
|
/linux-4.4.14/Documentation/block/ |
D | pr.txt | 37 Only initiators with a registered key can write to the device, 42 Only initiators with a registered key can access the device. 46 Only initiators with a registered key can write to the device, 48 All initiators with a registered key are considered reservation 55 Only initiators with a registered key can access the device. 56 All initiators with a registered key are considered reservation 70 the old reservation key. 79 devices based on the type argument. The key argument must be the existing 80 reservation key for the device as acquired by the IOC_PR_REGISTER, 86 This ioctl command releases the reservation specified by key and flags [all …]
|
/linux-4.4.14/drivers/md/bcache/ |
D | movinggc.c | 54 trace_bcache_gc_copy_collision(&io->w->key); in write_moving_finish() 71 else if (!KEY_DIRTY(&b->key) && in read_moving_endio() 72 ptr_stale(io->op.c, &b->key, 0)) { in read_moving_endio() 87 bio->bi_iter.bi_size = KEY_SIZE(&io->w->key) << 9; in moving_init() 88 bio->bi_max_vecs = DIV_ROUND_UP(KEY_SIZE(&io->w->key), in moving_init() 103 io->bio.bio.bi_iter.bi_sector = KEY_START(&io->w->key); in write_moving() 107 op->writeback = KEY_DIRTY(&io->w->key); in write_moving() 108 op->csum = KEY_CSUM(&io->w->key); in write_moving() 110 bkey_copy(&op->replace_key, &io->w->key); in write_moving() 124 bch_submit_bbio(bio, io->op.c, &io->w->key, 0); in read_moving_submit() [all …]
|
/linux-4.4.14/arch/arm/crypto/ |
D | bsaes-armv7.pl | 53 my ($inp,$out,$len,$key)=("r0","r1","r2","r3"); 57 my ($key,$rounds,$const)=("r4","r5","r6"); 344 vldmia $key!, {@t[0]-@t[3]} 349 vldmia $key!, {@t[0]} 353 vldmia $key!, {@t[1]} 357 vldmia $key!, {@t[2]} 360 vldmia $key!, {@t[3]} 728 vldmia $key!, {@XMM[9]} @ round 0 key 784 vldmia $key, {@XMM[8]} @ last round key 823 vldmia $key!, {@XMM[9]} @ round 0 key [all …]
|
/linux-4.4.14/fs/ntfs/ |
D | dir.c | 157 (ntfschar*)&ie->key.file_name.file_name, in ntfs_lookup_inode_by_name() 158 ie->key.file_name.file_name_length, in ntfs_lookup_inode_by_name() 171 if (ie->key.file_name.file_name_type == FILE_NAME_DOS) { in ntfs_lookup_inode_by_name() 205 ie->key.file_name.file_name_type && in ntfs_lookup_inode_by_name() 207 (ntfschar*)&ie->key.file_name.file_name, in ntfs_lookup_inode_by_name() 208 ie->key.file_name.file_name_length, in ntfs_lookup_inode_by_name() 211 u8 type = ie->key.file_name.file_name_type; in ntfs_lookup_inode_by_name() 212 u8 len = ie->key.file_name.file_name_length; in ntfs_lookup_inode_by_name() 237 memcpy(name->name, ie->key.file_name.file_name, in ntfs_lookup_inode_by_name() 248 (ntfschar*)&ie->key.file_name.file_name, in ntfs_lookup_inode_by_name() [all …]
|