/linux-4.4.14/kernel/bpf/ |
D | hashtab.c | 45 htab->map.key_size = attr->key_size; in htab_map_alloc() 53 if (htab->map.max_entries == 0 || htab->map.key_size == 0 || in htab_map_alloc() 61 if (htab->map.key_size > MAX_BPF_STACK) in htab_map_alloc() 77 round_up(htab->map.key_size, 8) + in htab_map_alloc() 129 void *key, u32 key_size) in lookup_elem_raw() argument 134 if (l->hash == hash && !memcmp(&l->key, key, key_size)) in lookup_elem_raw() 146 u32 hash, key_size; in htab_map_lookup_elem() local 151 key_size = map->key_size; in htab_map_lookup_elem() 153 hash = htab_map_hash(key, key_size); in htab_map_lookup_elem() 157 l = lookup_elem_raw(head, hash, key, key_size); in htab_map_lookup_elem() [all …]
|
D | syscall.c | 241 key = kmalloc(map->key_size, GFP_USER); in map_lookup_elem() 246 if (copy_from_user(key, ukey, map->key_size) != 0) in map_lookup_elem() 300 key = kmalloc(map->key_size, GFP_USER); in map_update_elem() 305 if (copy_from_user(key, ukey, map->key_size) != 0) in map_update_elem() 353 key = kmalloc(map->key_size, GFP_USER); in map_delete_elem() 358 if (copy_from_user(key, ukey, map->key_size) != 0) in map_delete_elem() 394 key = kmalloc(map->key_size, GFP_USER); in map_get_next_key() 399 if (copy_from_user(key, ukey, map->key_size) != 0) in map_get_next_key() 403 next_key = kmalloc(map->key_size, GFP_USER); in map_get_next_key() 414 if (copy_to_user(unext_key, next_key, map->key_size) != 0) in map_get_next_key()
|
D | arraymap.c | 27 if (attr->max_entries == 0 || attr->key_size != 4 || in array_map_alloc() 55 array->map.key_size = attr->key_size; in array_map_alloc()
|
D | verifier.c | 257 env->cur_state.regs[i].map_ptr->key_size, in print_verifier_state() 861 err = check_stack_boundary(env, regno, (*mapp)->key_size); in check_func_arg()
|
/linux-4.4.14/drivers/usb/host/whci/ |
D | wusb.c | 142 const void *key, size_t key_size, bool is_gtk) in whc_set_key() argument 149 memcpy(seckey, key, key_size); in whc_set_key() 172 const void *ptk, size_t key_size) in whc_set_ptk() argument 181 ret = whc_set_key(whc, port_idx, tkid, ptk, key_size, false); in whc_set_ptk() 203 const void *gtk, size_t key_size) in whc_set_gtk() argument 210 ret = whc_set_key(whc, whc->n_devices, tkid, gtk, key_size, true); in whc_set_gtk()
|
D | whcd.h | 161 const void *ptk, size_t key_size); 163 const void *gtk, size_t key_size);
|
/linux-4.4.14/tools/lib/bpf/ |
D | bpf.c | 43 int bpf_create_map(enum bpf_map_type map_type, int key_size, in bpf_create_map() argument 51 attr.key_size = key_size; in bpf_create_map()
|
D | bpf.h | 13 int bpf_create_map(enum bpf_map_type map_type, int key_size, int value_size,
|
D | libbpf.h | 99 unsigned int key_size; member
|
D | libbpf.c | 699 def.key_size, in bpf_object__create_maps()
|
/linux-4.4.14/tools/perf/tests/ |
D | bpf-script-example.c | 21 unsigned int key_size; member 29 .key_size = sizeof(int),
|
/linux-4.4.14/fs/ecryptfs/ |
D | crypto.c | 353 crypt_stat->key_size); in crypt_scatterlist() 355 crypt_stat->key_size); in crypt_scatterlist() 374 crypt_stat->key_size); in crypt_scatterlist() 615 crypt_stat->key_size << 3); in ecryptfs_init_crypt_ctx() 697 crypt_stat->key_size); in ecryptfs_compute_root_iv() 714 get_random_bytes(crypt_stat->key, crypt_stat->key_size); in ecryptfs_generate_new_key() 720 crypt_stat->key_size); in ecryptfs_generate_new_key() 794 crypt_stat->key_size = ECRYPTFS_DEFAULT_KEY_BYTES; in ecryptfs_set_default_crypt_stat_vals() 846 crypt_stat->key_size = in ecryptfs_new_file_context() 1595 char *cipher_name, size_t *key_size) in ecryptfs_process_key_cipher() argument [all …]
|
D | keystore.c | 318 data_len = (5 + ECRYPTFS_SIG_SIZE_HEX + crypt_stat->key_size); in write_tag_66_packet() 338 rc = ecryptfs_write_packet_length(&message[i], crypt_stat->key_size + 3, in write_tag_66_packet() 347 memcpy(&message[i], crypt_stat->key, crypt_stat->key_size); in write_tag_66_packet() 348 i += crypt_stat->key_size; in write_tag_66_packet() 349 for (j = 0; j < crypt_stat->key_size; j++) in write_tag_66_packet() 1190 crypt_stat->key_size = auth_tok->session_key.decrypted_key_size; in decrypt_pki_encrypted_session_key() 1201 crypt_stat->key_size); in decrypt_pki_encrypted_session_key() 1464 crypt_stat->key_size = 24; in parse_tag_3_packet() 1467 crypt_stat->key_size = in parse_tag_3_packet() 1716 crypt_stat->key_size); in decrypt_passphrase_encrypted_session_key() [all …]
|
D | ecryptfs_kernel.h | 232 size_t key_size; member 313 size_t key_size; member 658 size_t key_size);
|
/linux-4.4.14/samples/bpf/ |
D | libbpf.c | 21 int bpf_create_map(enum bpf_map_type map_type, int key_size, int value_size, in bpf_create_map() argument 26 .key_size = key_size, in bpf_create_map()
|
D | tracex3_kern.c | 15 .key_size = sizeof(long), 46 .key_size = sizeof(u32),
|
D | lathist_kern.c | 23 .key_size = sizeof(int), 66 .key_size = sizeof(int),
|
D | tracex2_kern.c | 15 .key_size = sizeof(long), 74 .key_size = sizeof(struct hist_key),
|
D | sockex3_kern.c | 23 .key_size = sizeof(u32), 96 .key_size = sizeof(__u32), 117 .key_size = sizeof(struct flow_keys),
|
D | tracex6_kern.c | 8 .key_size = sizeof(int),
|
D | sockex1_kern.c | 9 .key_size = sizeof(u32),
|
D | trace_output_kern.c | 8 .key_size = sizeof(int),
|
D | tracex4_kern.c | 19 .key_size = sizeof(long),
|
D | tracex5_kern.c | 17 .key_size = sizeof(u32),
|
D | bpf_helpers.h | 59 unsigned int key_size; member
|
D | libbpf.h | 7 int bpf_create_map(enum bpf_map_type map_type, int key_size, int value_size,
|
D | sockex2_kern.c | 193 .key_size = sizeof(__be32),
|
D | bpf_load.c | 158 maps[i].key_size, in load_maps()
|
/linux-4.4.14/fs/hfs/ |
D | brec.c | 455 int key_size, rec; in hfs_btree_inc_height() local 500 key_size = hfs_bnode_read_u8(node, 14) + 1; in hfs_btree_inc_height() 502 key_size = tree->max_key_len + 1; in hfs_btree_inc_height() 503 hfs_bnode_copy(new_node, 14, node, 14, key_size); in hfs_btree_inc_height() 506 key_size = tree->max_key_len + 1; in hfs_btree_inc_height() 509 key_size = (key_size + 1) & -2; in hfs_btree_inc_height() 511 hfs_bnode_write(new_node, &cnid, 14 + key_size, 4); in hfs_btree_inc_height() 514 hfs_bnode_write_u16(new_node, rec, 14 + key_size + 4); in hfs_btree_inc_height()
|
D | bnode.c | 320 int entry_size, key_size; in hfs_bnode_find() local 382 key_size = hfs_bnode_read_u8(node, off) + 1; in hfs_bnode_find() 383 if (key_size >= entry_size /*|| key_size & 1*/) in hfs_bnode_find()
|
/linux-4.4.14/tools/hv/ |
D | hv_kvp_daemon.c | 309 static int kvp_key_delete(int pool, const __u8 *key, int key_size) in kvp_key_delete() argument 325 if (memcmp(key, record[i].key, key_size)) in kvp_key_delete() 352 static int kvp_key_add_or_modify(int pool, const __u8 *key, int key_size, in kvp_key_add_or_modify() argument 360 if ((key_size > HV_KVP_EXCHANGE_MAX_KEY_SIZE) || in kvp_key_add_or_modify() 374 if (memcmp(key, record[i].key, key_size)) in kvp_key_add_or_modify() 399 memcpy(record[i].key, key, key_size); in kvp_key_add_or_modify() 406 static int kvp_get_value(int pool, const __u8 *key, int key_size, __u8 *value, in kvp_get_value() argument 413 if ((key_size > HV_KVP_EXCHANGE_MAX_KEY_SIZE) || in kvp_get_value() 426 if (memcmp(key, record[i].key, key_size)) in kvp_get_value() 438 static int kvp_pool_enumerate(int pool, int index, __u8 *key, int key_size, in kvp_pool_enumerate() argument [all …]
|
/linux-4.4.14/drivers/md/ |
D | dm-crypt.c | 177 unsigned int key_size; member 271 sg_init_one(&sg, cc->key, cc->key_size); in crypt_iv_essiv_init() 275 err = crypto_hash_digest(&desc, &sg, cc->key_size, essiv->salt); in crypt_iv_essiv_init() 510 int subkey_size = cc->key_size / cc->key_parts; in crypt_iv_lmk_init() 634 if (cc->key_size <= (cc->iv_size + TCW_WHITENING_SIZE)) { in crypt_iv_tcw_ctr() 659 int key_offset = cc->key_size - cc->iv_size - TCW_WHITENING_SIZE; in crypt_iv_tcw_init() 1476 subkey_size = (cc->key_size - cc->key_extra_size) >> ilog2(cc->tfms_count); in crypt_setkey_allcpus() 1495 if (cc->key_size != (key_string_len >> 1)) in crypt_set_key() 1499 if (!cc->key_size && strcmp(key, "-")) in crypt_set_key() 1502 if (cc->key_size && crypt_decode_key(cc->key, key, cc->key_size) < 0) in crypt_set_key() [all …]
|
/linux-4.4.14/drivers/usb/wusbcore/ |
D | security.c | 101 const size_t key_size = sizeof(wusbhc->gtk.data); in wusbhc_generate_gtk() local 110 get_random_bytes(wusbhc->gtk.descr.bKeyData, key_size); in wusbhc_generate_gtk() 123 const size_t key_size = sizeof(wusbhc->gtk.data); in wusbhc_sec_start() local 129 &wusbhc->gtk.descr.bKeyData, key_size); in wusbhc_sec_start() 545 size_t key_size = sizeof(wusbhc->gtk.data); in wusbhc_gtk_rekey_work() local 590 &wusbhc->gtk.descr.bKeyData, key_size); in wusbhc_gtk_rekey_work()
|
D | wusbhc.h | 287 u32 tkid, const void *key, size_t key_size); 289 u32 tkid, const void *key, size_t key_size);
|
/linux-4.4.14/fs/hfsplus/ |
D | brec.c | 459 int key_size, rec; in hfs_btree_inc_height() local 505 key_size = hfs_bnode_read_u16(node, 14) + 2; in hfs_btree_inc_height() 507 key_size = tree->max_key_len + 2; in hfs_btree_inc_height() 508 hfs_bnode_copy(new_node, 14, node, 14, key_size); in hfs_btree_inc_height() 512 key_size = tree->max_key_len + 2; in hfs_btree_inc_height() 516 hfs_bnode_write(new_node, &cnid, 14 + key_size, 4); in hfs_btree_inc_height() 519 hfs_bnode_write_u16(new_node, rec, 14 + key_size + 4); in hfs_btree_inc_height()
|
D | bnode.c | 486 int entry_size, key_size; in hfs_bnode_find() local 550 key_size = hfs_bnode_read_u16(node, off) + 2; in hfs_bnode_find() 551 if (key_size >= entry_size || key_size & 1) in hfs_bnode_find()
|
/linux-4.4.14/drivers/hv/ |
D | hv_kvp.c | 420 message->body.kvp_set.data.key_size = in kvp_send_key() 423 in_msg->body.kvp_set.data.key_size, in kvp_send_key() 430 message->body.kvp_delete.key_size = in kvp_send_key() 433 in_msg->body.kvp_delete.key_size, in kvp_send_key() 551 kvp_data->key_size = 2*(keylen + 1); /* utf16 encoding */ in kvp_respond_to_host()
|
/linux-4.4.14/include/uapi/linux/ |
D | hyperv.h | 345 __u32 key_size; member 369 __u32 key_size; member
|
D | bpf.h | 104 __u32 key_size; /* size of key in bytes */ member
|
D | ethtool.h | 939 __u32 key_size; member
|
/linux-4.4.14/drivers/usb/host/ |
D | hwa-hc.c | 466 const void *key, size_t key_size, in __hwahc_dev_set_key() argument 476 keyd_len = sizeof(*keyd) + key_size; in __hwahc_dev_set_key() 486 memcpy(keyd->bKeyData, key, key_size); in __hwahc_dev_set_key() 507 const void *key, size_t key_size) in __hwahc_op_set_ptk() argument 521 key, key_size, key_idx); in __hwahc_op_set_ptk() 549 const void *key, size_t key_size) in __hwahc_op_set_gtk() argument 554 return __hwahc_dev_set_key(wusbhc, 0, tkid, key, key_size, key_idx); in __hwahc_op_set_gtk()
|
/linux-4.4.14/include/linux/ |
D | ecryptfs.h | 84 u32 key_size; member
|
D | ccp.h | 294 u32 key_size; /* In bits */ member
|
D | bpf.h | 36 u32 key_size; member
|
/linux-4.4.14/drivers/crypto/amcc/ |
D | crypto4xx_sa.c | 46 offset = cts.bf.key_size in get_dynamic_sa_offset_state_ptr_field()
|
D | crypto4xx_sa.h | 47 u32 key_size:4; member
|
/linux-4.4.14/drivers/crypto/qce/ |
D | common.c | 102 static u32 qce_auth_cfg(unsigned long flags, u32 key_size) in qce_auth_cfg() argument 112 if (key_size == AES_KEYSIZE_128) in qce_auth_cfg() 114 else if (key_size == AES_KEYSIZE_256) in qce_auth_cfg()
|
/linux-4.4.14/net/bluetooth/ |
D | smp.c | 1714 u8 key_size, auth, sec_level; in smp_cmd_pairing_req() local 1765 key_size = min(req->max_key_size, rsp.max_key_size); in smp_cmd_pairing_req() 1766 if (check_enc_key_size(conn, key_size)) in smp_cmd_pairing_req() 1803 key_size = min(req->max_key_size, rsp.max_key_size); in smp_cmd_pairing_req() 1804 if (check_enc_key_size(conn, key_size)) in smp_cmd_pairing_req() 1899 u8 key_size, auth; in smp_cmd_pairing_rsp() local 1914 key_size = min(req->max_key_size, rsp->max_key_size); in smp_cmd_pairing_rsp() 1915 if (check_enc_key_size(conn, key_size)) in smp_cmd_pairing_rsp() 3302 u8 key_size; in le_min_key_size_write() local 3309 sscanf(buf, "%hhu", &key_size); in le_min_key_size_write() [all …]
|
D | hci_conn.c | 354 __u8 ltk[16], __u8 key_size) in hci_le_start_enc() argument 366 memcpy(cp.ltk, ltk, key_size); in hci_le_start_enc()
|
D | l2cap_sock.c | 530 sec.key_size = chan->conn->hcon->enc_key_size; in l2cap_sock_getsockopt()
|
D | hci_event.c | 2550 conn->enc_key_size = rp->key_size; in read_enc_key_size_complete()
|
/linux-4.4.14/drivers/net/wireless/ti/wlcore/ |
D | cmd.h | 77 u8 key_size, const u8 *key, const u8 *addr, 81 u8 key_size, const u8 *key, u8 hlid, u32 tx_seq_32, 511 u8 key_size; member
|
D | cmd.c | 1363 u8 key_size, const u8 *key, const u8 *addr, in wl1271_cmd_set_sta_key() argument 1389 cmd->key_size = key_size; in wl1271_cmd_set_sta_key() 1409 memcpy(cmd->key, key, key_size); in wl1271_cmd_set_sta_key() 1432 u8 key_size, const u8 *key, u8 hlid, u32 tx_seq_32, in wl1271_cmd_set_ap_key() argument 1459 cmd->key_size = key_size; in wl1271_cmd_set_ap_key() 1476 memcpy(cmd->key, key, key_size); in wl1271_cmd_set_ap_key()
|
D | wlcore_i.h | 218 u8 key_size; member
|
D | main.c | 3278 u8 id, u8 key_type, u8 key_size, in wl1271_record_ap_key() argument 3287 if (key_size > MAX_KEY_SIZE) in wl1271_record_ap_key() 3313 ap_key->key_size = key_size; in wl1271_record_ap_key() 3314 memcpy(ap_key->key, key, key_size); in wl1271_record_ap_key() 3351 key->key_size, key->key, in wl1271_ap_init_hwenc() 3375 u8 key_size, const u8 *key, u32 tx_seq_32, in wl1271_set_key() argument 3401 key_type, key_size, in wl1271_set_key() 3406 id, key_type, key_size, in wl1271_set_key() 3439 id, key_type, key_size, in wl1271_set_key()
|
/linux-4.4.14/crypto/asymmetric_keys/ |
D | x509_cert_parser.c | 29 size_t key_size; /* Size of key data */ member 108 ctx->key, ctx->key_size); in x509_cert_parse() 403 ctx->key_size = vlen - 1; in x509_extract_key_data()
|
/linux-4.4.14/net/core/ |
D | ethtool.c | 739 user_key_size = rxfh.key_size; in ethtool_get_rxfh() 747 rxfh.key_size = dev_key_size; in ethtool_get_rxfh() 820 (rxfh.key_size && (rxfh.key_size != dev_key_size)) || in ethtool_set_rxfh() 822 rxfh.key_size == 0 && rxfh.hfunc == ETH_RSS_HASH_NO_CHANGE)) in ethtool_set_rxfh() 828 rss_config = kzalloc(indir_bytes + rxfh.key_size, GFP_USER); in ethtool_set_rxfh() 855 if (rxfh.key_size) { in ethtool_set_rxfh() 859 rxfh.key_size)) { in ethtool_set_rxfh()
|
/linux-4.4.14/drivers/net/wireless/iwlwifi/mvm/ |
D | fw-api-sta.h | 389 u8 key_size; member
|
D | d3.c | 177 .wep_key.key_size = key->keylen, in iwl_mvm_wowlan_program_keys()
|
/linux-4.4.14/drivers/staging/rdma/hfi1/ |
D | firmware.c | 101 u32 key_size; /* in DWORDs */ member 389 css->key_size, KEY_SIZE/4) in verify_css_header() 457 css->key_size, 4 * css->key_size); in obtain_one_firmware()
|
/linux-4.4.14/drivers/net/wireless/iwlwifi/dvm/ |
D | sta.c | 976 if (ctx->wep_keys[i].key_size) { in iwl_send_static_wepkey_cmd() 983 wep_cmd->key[i].key_size = ctx->wep_keys[i].key_size; in iwl_send_static_wepkey_cmd() 985 ctx->wep_keys[i].key_size); in iwl_send_static_wepkey_cmd() 1051 ctx->wep_keys[keyconf->keyidx].key_size = keyconf->keylen; in iwl_set_default_wep_key()
|
D | commands.h | 1026 u8 key_size; member
|
/linux-4.4.14/include/uapi/linux/wimax/ |
D | i2400m.h | 142 __le32 key_size; /* in dwords */ member
|
/linux-4.4.14/drivers/net/wireless/ti/wl1251/ |
D | cmd.h | 403 u8 key_size; member
|
D | main.c | 963 wl_cmd->key_size = key->keylen; in wl1251_op_set_key()
|
/linux-4.4.14/include/net/bluetooth/ |
D | bluetooth.h | 62 __u8 key_size; member
|
D | hci.h | 1226 __u8 key_size; member
|
D | hci_core.h | 1496 __u8 ltk[16], __u8 key_size);
|
/linux-4.4.14/drivers/gpu/drm/i915/ |
D | intel_csr.c | 89 uint32_t key_size; member
|
/linux-4.4.14/drivers/net/ethernet/intel/i40evf/ |
D | i40e_common.c | 488 u16 key_size = sizeof(struct i40e_aqc_get_set_rss_key_data); in i40e_aq_get_set_rss_key() local 507 status = i40evf_asq_send_command(hw, &desc, key, key_size, NULL); in i40e_aq_get_set_rss_key()
|
/linux-4.4.14/drivers/net/wireless/ipw2x00/ |
D | ipw2100.h | 295 u8 key_size; // 0 no imm key, 0x5 64bit encr, 0xd 128bit encr, 0x10 128bit encr and 128bit IV member
|
D | ipw2200.h | 821 u8 key_size; member
|
D | ipw2200.c | 5950 key.key_size = 0; in ipw_send_wep_keys() 5954 key.key_size = priv->ieee->sec.key_sizes[i]; in ipw_send_wep_keys() 5955 memcpy(key.key, priv->ieee->sec.keys[i], key.key_size); in ipw_send_wep_keys()
|
/linux-4.4.14/drivers/crypto/ccp/ |
D | ccp-ops.c | 1578 if (rsa->key_size > CCP_RSA_MAX_WIDTH) in ccp_run_rsa_cmd() 1590 o_len = ((rsa->key_size + 255) / 256) * 32; in ccp_run_rsa_cmd() 1656 op.u.rsa.mod_size = rsa->key_size; in ccp_run_rsa_cmd()
|
/linux-4.4.14/arch/ia64/kernel/ |
D | palinfo.c | 316 vm_info_1.pal_vm_info_1_s.key_size, in vm_info()
|
/linux-4.4.14/drivers/net/wireless/iwlegacy/ |
D | 4965-mac.c | 3160 u8 key_size = il->_4965.wep_keys[i].key_size; in il4965_static_wepkey_cmd() local 3163 if (key_size) { in il4965_static_wepkey_cmd() 3169 wep_cmd->key[i].key_size = key_size; in il4965_static_wepkey_cmd() 3170 memcpy(&wep_cmd->key[i].key[3], il->_4965.wep_keys[i].key, key_size); in il4965_static_wepkey_cmd() 3235 il->_4965.wep_keys[idx].key_size = len; in il4965_set_default_wep_key()
|
D | commands.h | 1105 u8 key_size; member
|
/linux-4.4.14/net/bluetooth/rfcomm/ |
D | sock.c | 858 sec.key_size = 0; in rfcomm_sock_getsockopt()
|
/linux-4.4.14/drivers/net/wimax/i2400m/ |
D | fw.c | 823 + le32_to_cpu(bcf_hdr->key_size) * sizeof(u32) in i2400m_dnload_finalize()
|
/linux-4.4.14/arch/ia64/include/asm/ |
D | pal.h | 1626 key_size : 8, member
|
/linux-4.4.14/drivers/net/ethernet/intel/i40e/ |
D | i40e_common.c | 488 u16 key_size = sizeof(struct i40e_aqc_get_set_rss_key_data); in i40e_aq_get_set_rss_key() local 507 status = i40e_asq_send_command(hw, &desc, key, key_size, NULL); in i40e_aq_get_set_rss_key()
|
/linux-4.4.14/Documentation/networking/ |
D | filter.txt | 1106 using attr->map_type, attr->key_size, attr->value_size, attr->max_entries
|