Home
last modified time | relevance | path

Searched refs:key_size (Results 1 – 82 of 82) sorted by relevance

/linux-4.4.14/kernel/bpf/
Dhashtab.c45 htab->map.key_size = attr->key_size; in htab_map_alloc()
53 if (htab->map.max_entries == 0 || htab->map.key_size == 0 || in htab_map_alloc()
61 if (htab->map.key_size > MAX_BPF_STACK) in htab_map_alloc()
77 round_up(htab->map.key_size, 8) + in htab_map_alloc()
129 void *key, u32 key_size) in lookup_elem_raw() argument
134 if (l->hash == hash && !memcmp(&l->key, key, key_size)) in lookup_elem_raw()
146 u32 hash, key_size; in htab_map_lookup_elem() local
151 key_size = map->key_size; in htab_map_lookup_elem()
153 hash = htab_map_hash(key, key_size); in htab_map_lookup_elem()
157 l = lookup_elem_raw(head, hash, key, key_size); in htab_map_lookup_elem()
[all …]
Dsyscall.c241 key = kmalloc(map->key_size, GFP_USER); in map_lookup_elem()
246 if (copy_from_user(key, ukey, map->key_size) != 0) in map_lookup_elem()
300 key = kmalloc(map->key_size, GFP_USER); in map_update_elem()
305 if (copy_from_user(key, ukey, map->key_size) != 0) in map_update_elem()
353 key = kmalloc(map->key_size, GFP_USER); in map_delete_elem()
358 if (copy_from_user(key, ukey, map->key_size) != 0) in map_delete_elem()
394 key = kmalloc(map->key_size, GFP_USER); in map_get_next_key()
399 if (copy_from_user(key, ukey, map->key_size) != 0) in map_get_next_key()
403 next_key = kmalloc(map->key_size, GFP_USER); in map_get_next_key()
414 if (copy_to_user(unext_key, next_key, map->key_size) != 0) in map_get_next_key()
Darraymap.c27 if (attr->max_entries == 0 || attr->key_size != 4 || in array_map_alloc()
55 array->map.key_size = attr->key_size; in array_map_alloc()
Dverifier.c257 env->cur_state.regs[i].map_ptr->key_size, in print_verifier_state()
861 err = check_stack_boundary(env, regno, (*mapp)->key_size); in check_func_arg()
/linux-4.4.14/drivers/usb/host/whci/
Dwusb.c142 const void *key, size_t key_size, bool is_gtk) in whc_set_key() argument
149 memcpy(seckey, key, key_size); in whc_set_key()
172 const void *ptk, size_t key_size) in whc_set_ptk() argument
181 ret = whc_set_key(whc, port_idx, tkid, ptk, key_size, false); in whc_set_ptk()
203 const void *gtk, size_t key_size) in whc_set_gtk() argument
210 ret = whc_set_key(whc, whc->n_devices, tkid, gtk, key_size, true); in whc_set_gtk()
Dwhcd.h161 const void *ptk, size_t key_size);
163 const void *gtk, size_t key_size);
/linux-4.4.14/tools/lib/bpf/
Dbpf.c43 int bpf_create_map(enum bpf_map_type map_type, int key_size, in bpf_create_map() argument
51 attr.key_size = key_size; in bpf_create_map()
Dbpf.h13 int bpf_create_map(enum bpf_map_type map_type, int key_size, int value_size,
Dlibbpf.h99 unsigned int key_size; member
Dlibbpf.c699 def.key_size, in bpf_object__create_maps()
/linux-4.4.14/tools/perf/tests/
Dbpf-script-example.c21 unsigned int key_size; member
29 .key_size = sizeof(int),
/linux-4.4.14/fs/ecryptfs/
Dcrypto.c353 crypt_stat->key_size); in crypt_scatterlist()
355 crypt_stat->key_size); in crypt_scatterlist()
374 crypt_stat->key_size); in crypt_scatterlist()
615 crypt_stat->key_size << 3); in ecryptfs_init_crypt_ctx()
697 crypt_stat->key_size); in ecryptfs_compute_root_iv()
714 get_random_bytes(crypt_stat->key, crypt_stat->key_size); in ecryptfs_generate_new_key()
720 crypt_stat->key_size); in ecryptfs_generate_new_key()
794 crypt_stat->key_size = ECRYPTFS_DEFAULT_KEY_BYTES; in ecryptfs_set_default_crypt_stat_vals()
846 crypt_stat->key_size = in ecryptfs_new_file_context()
1595 char *cipher_name, size_t *key_size) in ecryptfs_process_key_cipher() argument
[all …]
Dkeystore.c318 data_len = (5 + ECRYPTFS_SIG_SIZE_HEX + crypt_stat->key_size); in write_tag_66_packet()
338 rc = ecryptfs_write_packet_length(&message[i], crypt_stat->key_size + 3, in write_tag_66_packet()
347 memcpy(&message[i], crypt_stat->key, crypt_stat->key_size); in write_tag_66_packet()
348 i += crypt_stat->key_size; in write_tag_66_packet()
349 for (j = 0; j < crypt_stat->key_size; j++) in write_tag_66_packet()
1190 crypt_stat->key_size = auth_tok->session_key.decrypted_key_size; in decrypt_pki_encrypted_session_key()
1201 crypt_stat->key_size); in decrypt_pki_encrypted_session_key()
1464 crypt_stat->key_size = 24; in parse_tag_3_packet()
1467 crypt_stat->key_size = in parse_tag_3_packet()
1716 crypt_stat->key_size); in decrypt_passphrase_encrypted_session_key()
[all …]
Decryptfs_kernel.h232 size_t key_size; member
313 size_t key_size; member
658 size_t key_size);
/linux-4.4.14/samples/bpf/
Dlibbpf.c21 int bpf_create_map(enum bpf_map_type map_type, int key_size, int value_size, in bpf_create_map() argument
26 .key_size = key_size, in bpf_create_map()
Dtracex3_kern.c15 .key_size = sizeof(long),
46 .key_size = sizeof(u32),
Dlathist_kern.c23 .key_size = sizeof(int),
66 .key_size = sizeof(int),
Dtracex2_kern.c15 .key_size = sizeof(long),
74 .key_size = sizeof(struct hist_key),
Dsockex3_kern.c23 .key_size = sizeof(u32),
96 .key_size = sizeof(__u32),
117 .key_size = sizeof(struct flow_keys),
Dtracex6_kern.c8 .key_size = sizeof(int),
Dsockex1_kern.c9 .key_size = sizeof(u32),
Dtrace_output_kern.c8 .key_size = sizeof(int),
Dtracex4_kern.c19 .key_size = sizeof(long),
Dtracex5_kern.c17 .key_size = sizeof(u32),
Dbpf_helpers.h59 unsigned int key_size; member
Dlibbpf.h7 int bpf_create_map(enum bpf_map_type map_type, int key_size, int value_size,
Dsockex2_kern.c193 .key_size = sizeof(__be32),
Dbpf_load.c158 maps[i].key_size, in load_maps()
/linux-4.4.14/fs/hfs/
Dbrec.c455 int key_size, rec; in hfs_btree_inc_height() local
500 key_size = hfs_bnode_read_u8(node, 14) + 1; in hfs_btree_inc_height()
502 key_size = tree->max_key_len + 1; in hfs_btree_inc_height()
503 hfs_bnode_copy(new_node, 14, node, 14, key_size); in hfs_btree_inc_height()
506 key_size = tree->max_key_len + 1; in hfs_btree_inc_height()
509 key_size = (key_size + 1) & -2; in hfs_btree_inc_height()
511 hfs_bnode_write(new_node, &cnid, 14 + key_size, 4); in hfs_btree_inc_height()
514 hfs_bnode_write_u16(new_node, rec, 14 + key_size + 4); in hfs_btree_inc_height()
Dbnode.c320 int entry_size, key_size; in hfs_bnode_find() local
382 key_size = hfs_bnode_read_u8(node, off) + 1; in hfs_bnode_find()
383 if (key_size >= entry_size /*|| key_size & 1*/) in hfs_bnode_find()
/linux-4.4.14/tools/hv/
Dhv_kvp_daemon.c309 static int kvp_key_delete(int pool, const __u8 *key, int key_size) in kvp_key_delete() argument
325 if (memcmp(key, record[i].key, key_size)) in kvp_key_delete()
352 static int kvp_key_add_or_modify(int pool, const __u8 *key, int key_size, in kvp_key_add_or_modify() argument
360 if ((key_size > HV_KVP_EXCHANGE_MAX_KEY_SIZE) || in kvp_key_add_or_modify()
374 if (memcmp(key, record[i].key, key_size)) in kvp_key_add_or_modify()
399 memcpy(record[i].key, key, key_size); in kvp_key_add_or_modify()
406 static int kvp_get_value(int pool, const __u8 *key, int key_size, __u8 *value, in kvp_get_value() argument
413 if ((key_size > HV_KVP_EXCHANGE_MAX_KEY_SIZE) || in kvp_get_value()
426 if (memcmp(key, record[i].key, key_size)) in kvp_get_value()
438 static int kvp_pool_enumerate(int pool, int index, __u8 *key, int key_size, in kvp_pool_enumerate() argument
[all …]
/linux-4.4.14/drivers/md/
Ddm-crypt.c177 unsigned int key_size; member
271 sg_init_one(&sg, cc->key, cc->key_size); in crypt_iv_essiv_init()
275 err = crypto_hash_digest(&desc, &sg, cc->key_size, essiv->salt); in crypt_iv_essiv_init()
510 int subkey_size = cc->key_size / cc->key_parts; in crypt_iv_lmk_init()
634 if (cc->key_size <= (cc->iv_size + TCW_WHITENING_SIZE)) { in crypt_iv_tcw_ctr()
659 int key_offset = cc->key_size - cc->iv_size - TCW_WHITENING_SIZE; in crypt_iv_tcw_init()
1476 subkey_size = (cc->key_size - cc->key_extra_size) >> ilog2(cc->tfms_count); in crypt_setkey_allcpus()
1495 if (cc->key_size != (key_string_len >> 1)) in crypt_set_key()
1499 if (!cc->key_size && strcmp(key, "-")) in crypt_set_key()
1502 if (cc->key_size && crypt_decode_key(cc->key, key, cc->key_size) < 0) in crypt_set_key()
[all …]
/linux-4.4.14/drivers/usb/wusbcore/
Dsecurity.c101 const size_t key_size = sizeof(wusbhc->gtk.data); in wusbhc_generate_gtk() local
110 get_random_bytes(wusbhc->gtk.descr.bKeyData, key_size); in wusbhc_generate_gtk()
123 const size_t key_size = sizeof(wusbhc->gtk.data); in wusbhc_sec_start() local
129 &wusbhc->gtk.descr.bKeyData, key_size); in wusbhc_sec_start()
545 size_t key_size = sizeof(wusbhc->gtk.data); in wusbhc_gtk_rekey_work() local
590 &wusbhc->gtk.descr.bKeyData, key_size); in wusbhc_gtk_rekey_work()
Dwusbhc.h287 u32 tkid, const void *key, size_t key_size);
289 u32 tkid, const void *key, size_t key_size);
/linux-4.4.14/fs/hfsplus/
Dbrec.c459 int key_size, rec; in hfs_btree_inc_height() local
505 key_size = hfs_bnode_read_u16(node, 14) + 2; in hfs_btree_inc_height()
507 key_size = tree->max_key_len + 2; in hfs_btree_inc_height()
508 hfs_bnode_copy(new_node, 14, node, 14, key_size); in hfs_btree_inc_height()
512 key_size = tree->max_key_len + 2; in hfs_btree_inc_height()
516 hfs_bnode_write(new_node, &cnid, 14 + key_size, 4); in hfs_btree_inc_height()
519 hfs_bnode_write_u16(new_node, rec, 14 + key_size + 4); in hfs_btree_inc_height()
Dbnode.c486 int entry_size, key_size; in hfs_bnode_find() local
550 key_size = hfs_bnode_read_u16(node, off) + 2; in hfs_bnode_find()
551 if (key_size >= entry_size || key_size & 1) in hfs_bnode_find()
/linux-4.4.14/drivers/hv/
Dhv_kvp.c420 message->body.kvp_set.data.key_size = in kvp_send_key()
423 in_msg->body.kvp_set.data.key_size, in kvp_send_key()
430 message->body.kvp_delete.key_size = in kvp_send_key()
433 in_msg->body.kvp_delete.key_size, in kvp_send_key()
551 kvp_data->key_size = 2*(keylen + 1); /* utf16 encoding */ in kvp_respond_to_host()
/linux-4.4.14/include/uapi/linux/
Dhyperv.h345 __u32 key_size; member
369 __u32 key_size; member
Dbpf.h104 __u32 key_size; /* size of key in bytes */ member
Dethtool.h939 __u32 key_size; member
/linux-4.4.14/drivers/usb/host/
Dhwa-hc.c466 const void *key, size_t key_size, in __hwahc_dev_set_key() argument
476 keyd_len = sizeof(*keyd) + key_size; in __hwahc_dev_set_key()
486 memcpy(keyd->bKeyData, key, key_size); in __hwahc_dev_set_key()
507 const void *key, size_t key_size) in __hwahc_op_set_ptk() argument
521 key, key_size, key_idx); in __hwahc_op_set_ptk()
549 const void *key, size_t key_size) in __hwahc_op_set_gtk() argument
554 return __hwahc_dev_set_key(wusbhc, 0, tkid, key, key_size, key_idx); in __hwahc_op_set_gtk()
/linux-4.4.14/include/linux/
Decryptfs.h84 u32 key_size; member
Dccp.h294 u32 key_size; /* In bits */ member
Dbpf.h36 u32 key_size; member
/linux-4.4.14/drivers/crypto/amcc/
Dcrypto4xx_sa.c46 offset = cts.bf.key_size in get_dynamic_sa_offset_state_ptr_field()
Dcrypto4xx_sa.h47 u32 key_size:4; member
/linux-4.4.14/drivers/crypto/qce/
Dcommon.c102 static u32 qce_auth_cfg(unsigned long flags, u32 key_size) in qce_auth_cfg() argument
112 if (key_size == AES_KEYSIZE_128) in qce_auth_cfg()
114 else if (key_size == AES_KEYSIZE_256) in qce_auth_cfg()
/linux-4.4.14/net/bluetooth/
Dsmp.c1714 u8 key_size, auth, sec_level; in smp_cmd_pairing_req() local
1765 key_size = min(req->max_key_size, rsp.max_key_size); in smp_cmd_pairing_req()
1766 if (check_enc_key_size(conn, key_size)) in smp_cmd_pairing_req()
1803 key_size = min(req->max_key_size, rsp.max_key_size); in smp_cmd_pairing_req()
1804 if (check_enc_key_size(conn, key_size)) in smp_cmd_pairing_req()
1899 u8 key_size, auth; in smp_cmd_pairing_rsp() local
1914 key_size = min(req->max_key_size, rsp->max_key_size); in smp_cmd_pairing_rsp()
1915 if (check_enc_key_size(conn, key_size)) in smp_cmd_pairing_rsp()
3302 u8 key_size; in le_min_key_size_write() local
3309 sscanf(buf, "%hhu", &key_size); in le_min_key_size_write()
[all …]
Dhci_conn.c354 __u8 ltk[16], __u8 key_size) in hci_le_start_enc() argument
366 memcpy(cp.ltk, ltk, key_size); in hci_le_start_enc()
Dl2cap_sock.c530 sec.key_size = chan->conn->hcon->enc_key_size; in l2cap_sock_getsockopt()
Dhci_event.c2550 conn->enc_key_size = rp->key_size; in read_enc_key_size_complete()
/linux-4.4.14/drivers/net/wireless/ti/wlcore/
Dcmd.h77 u8 key_size, const u8 *key, const u8 *addr,
81 u8 key_size, const u8 *key, u8 hlid, u32 tx_seq_32,
511 u8 key_size; member
Dcmd.c1363 u8 key_size, const u8 *key, const u8 *addr, in wl1271_cmd_set_sta_key() argument
1389 cmd->key_size = key_size; in wl1271_cmd_set_sta_key()
1409 memcpy(cmd->key, key, key_size); in wl1271_cmd_set_sta_key()
1432 u8 key_size, const u8 *key, u8 hlid, u32 tx_seq_32, in wl1271_cmd_set_ap_key() argument
1459 cmd->key_size = key_size; in wl1271_cmd_set_ap_key()
1476 memcpy(cmd->key, key, key_size); in wl1271_cmd_set_ap_key()
Dwlcore_i.h218 u8 key_size; member
Dmain.c3278 u8 id, u8 key_type, u8 key_size, in wl1271_record_ap_key() argument
3287 if (key_size > MAX_KEY_SIZE) in wl1271_record_ap_key()
3313 ap_key->key_size = key_size; in wl1271_record_ap_key()
3314 memcpy(ap_key->key, key, key_size); in wl1271_record_ap_key()
3351 key->key_size, key->key, in wl1271_ap_init_hwenc()
3375 u8 key_size, const u8 *key, u32 tx_seq_32, in wl1271_set_key() argument
3401 key_type, key_size, in wl1271_set_key()
3406 id, key_type, key_size, in wl1271_set_key()
3439 id, key_type, key_size, in wl1271_set_key()
/linux-4.4.14/crypto/asymmetric_keys/
Dx509_cert_parser.c29 size_t key_size; /* Size of key data */ member
108 ctx->key, ctx->key_size); in x509_cert_parse()
403 ctx->key_size = vlen - 1; in x509_extract_key_data()
/linux-4.4.14/net/core/
Dethtool.c739 user_key_size = rxfh.key_size; in ethtool_get_rxfh()
747 rxfh.key_size = dev_key_size; in ethtool_get_rxfh()
820 (rxfh.key_size && (rxfh.key_size != dev_key_size)) || in ethtool_set_rxfh()
822 rxfh.key_size == 0 && rxfh.hfunc == ETH_RSS_HASH_NO_CHANGE)) in ethtool_set_rxfh()
828 rss_config = kzalloc(indir_bytes + rxfh.key_size, GFP_USER); in ethtool_set_rxfh()
855 if (rxfh.key_size) { in ethtool_set_rxfh()
859 rxfh.key_size)) { in ethtool_set_rxfh()
/linux-4.4.14/drivers/net/wireless/iwlwifi/mvm/
Dfw-api-sta.h389 u8 key_size; member
Dd3.c177 .wep_key.key_size = key->keylen, in iwl_mvm_wowlan_program_keys()
/linux-4.4.14/drivers/staging/rdma/hfi1/
Dfirmware.c101 u32 key_size; /* in DWORDs */ member
389 css->key_size, KEY_SIZE/4) in verify_css_header()
457 css->key_size, 4 * css->key_size); in obtain_one_firmware()
/linux-4.4.14/drivers/net/wireless/iwlwifi/dvm/
Dsta.c976 if (ctx->wep_keys[i].key_size) { in iwl_send_static_wepkey_cmd()
983 wep_cmd->key[i].key_size = ctx->wep_keys[i].key_size; in iwl_send_static_wepkey_cmd()
985 ctx->wep_keys[i].key_size); in iwl_send_static_wepkey_cmd()
1051 ctx->wep_keys[keyconf->keyidx].key_size = keyconf->keylen; in iwl_set_default_wep_key()
Dcommands.h1026 u8 key_size; member
/linux-4.4.14/include/uapi/linux/wimax/
Di2400m.h142 __le32 key_size; /* in dwords */ member
/linux-4.4.14/drivers/net/wireless/ti/wl1251/
Dcmd.h403 u8 key_size; member
Dmain.c963 wl_cmd->key_size = key->keylen; in wl1251_op_set_key()
/linux-4.4.14/include/net/bluetooth/
Dbluetooth.h62 __u8 key_size; member
Dhci.h1226 __u8 key_size; member
Dhci_core.h1496 __u8 ltk[16], __u8 key_size);
/linux-4.4.14/drivers/gpu/drm/i915/
Dintel_csr.c89 uint32_t key_size; member
/linux-4.4.14/drivers/net/ethernet/intel/i40evf/
Di40e_common.c488 u16 key_size = sizeof(struct i40e_aqc_get_set_rss_key_data); in i40e_aq_get_set_rss_key() local
507 status = i40evf_asq_send_command(hw, &desc, key, key_size, NULL); in i40e_aq_get_set_rss_key()
/linux-4.4.14/drivers/net/wireless/ipw2x00/
Dipw2100.h295 u8 key_size; // 0 no imm key, 0x5 64bit encr, 0xd 128bit encr, 0x10 128bit encr and 128bit IV member
Dipw2200.h821 u8 key_size; member
Dipw2200.c5950 key.key_size = 0; in ipw_send_wep_keys()
5954 key.key_size = priv->ieee->sec.key_sizes[i]; in ipw_send_wep_keys()
5955 memcpy(key.key, priv->ieee->sec.keys[i], key.key_size); in ipw_send_wep_keys()
/linux-4.4.14/drivers/crypto/ccp/
Dccp-ops.c1578 if (rsa->key_size > CCP_RSA_MAX_WIDTH) in ccp_run_rsa_cmd()
1590 o_len = ((rsa->key_size + 255) / 256) * 32; in ccp_run_rsa_cmd()
1656 op.u.rsa.mod_size = rsa->key_size; in ccp_run_rsa_cmd()
/linux-4.4.14/arch/ia64/kernel/
Dpalinfo.c316 vm_info_1.pal_vm_info_1_s.key_size, in vm_info()
/linux-4.4.14/drivers/net/wireless/iwlegacy/
D4965-mac.c3160 u8 key_size = il->_4965.wep_keys[i].key_size; in il4965_static_wepkey_cmd() local
3163 if (key_size) { in il4965_static_wepkey_cmd()
3169 wep_cmd->key[i].key_size = key_size; in il4965_static_wepkey_cmd()
3170 memcpy(&wep_cmd->key[i].key[3], il->_4965.wep_keys[i].key, key_size); in il4965_static_wepkey_cmd()
3235 il->_4965.wep_keys[idx].key_size = len; in il4965_set_default_wep_key()
Dcommands.h1105 u8 key_size; member
/linux-4.4.14/net/bluetooth/rfcomm/
Dsock.c858 sec.key_size = 0; in rfcomm_sock_getsockopt()
/linux-4.4.14/drivers/net/wimax/i2400m/
Dfw.c823 + le32_to_cpu(bcf_hdr->key_size) * sizeof(u32) in i2400m_dnload_finalize()
/linux-4.4.14/arch/ia64/include/asm/
Dpal.h1626 key_size : 8, member
/linux-4.4.14/drivers/net/ethernet/intel/i40e/
Di40e_common.c488 u16 key_size = sizeof(struct i40e_aqc_get_set_rss_key_data); in i40e_aq_get_set_rss_key() local
507 status = i40e_asq_send_command(hw, &desc, key, key_size, NULL); in i40e_aq_get_set_rss_key()
/linux-4.4.14/Documentation/networking/
Dfilter.txt1106 using attr->map_type, attr->key_size, attr->value_size, attr->max_entries