/kernel/linux/linux-6.6/tools/lib/bpf/ |
H A D | bpf.c | 167 __u32 key_size, in bpf_map_create() 186 attr.key_size = key_size; in bpf_map_create() 165 bpf_map_create(enum bpf_map_type map_type, const char *map_name, __u32 key_size, __u32 value_size, __u32 max_entries, const struct bpf_map_create_opts *opts) bpf_map_create() argument
|
/third_party/libbpf/src/ |
H A D | bpf.c | 167 __u32 key_size, in bpf_map_create() 186 attr.key_size = key_size; in bpf_map_create() 165 bpf_map_create(enum bpf_map_type map_type, const char *map_name, __u32 key_size, __u32 value_size, __u32 max_entries, const struct bpf_map_create_opts *opts) bpf_map_create() argument
|
/kernel/linux/linux-6.6/fs/ntfs3/ |
H A D | frecord.c | 2909 u16 de_key_size = le16_to_cpu(de->key_size); in ni_remove_name() 2944 (*de2)->key_size = cpu_to_le16(de2_key_size); in ni_remove_name() 2976 de_key_size = le16_to_cpu(de2->key_size); in ni_remove_name_undo() 2993 de_key_size = le16_to_cpu(de->key_size); in ni_remove_name_undo() 3022 u16 de_key_size = le16_to_cpu(de->key_size); in ni_add_name()
|
/third_party/mesa3d/src/gallium/drivers/vc4/ |
H A D | vc4_program.c | 2564 uint32_t key_size; in vc4_get_compiled_shader() local 2569 key_size = sizeof(struct vc4_fs_key); in vc4_get_compiled_shader() 2573 key_size = sizeof(struct vc4_vs_key); in vc4_get_compiled_shader() 2634 dup_key = rzalloc_size(shader, key_size); /* TODO: don't use rzalloc */ in vc4_get_compiled_shader() 2635 memcpy(dup_key, key, key_size); in vc4_get_compiled_shader()
|
/third_party/protobuf/php/ext/google/protobuf/ |
H A D | php-upb.c | 595 char key_size = desctype_to_mapsize[key_field->descriptortype]; in decode_tomap() local 599 map = _upb_map_new(d->arena, key_size, val_size); in decode_tomap() 615 _upb_map_set(map, &ent.k, map->key_size, &ent.v, map->val_size, d->arena); in decode_tomap() 1127 _upb_map_fromkey(key, &ent.k, map->key_size); in upb_encode_map() 1370 upb_map *_upb_map_new(upb_arena *a, size_t key_size, size_t value_size) { in _upb_map_new() argument 1378 map->key_size = key_size; in _upb_map_new() 5925 return _upb_map_get(map, &key, map->key_size, val, map->val_size); in upb_map_get() 5930 return _upb_map_set(map, &key, map->key_size, &val, map->val_size, arena); in upb_map_set() 5934 return _upb_map_delete(map, &key, map->key_size); in upb_map_delete() [all...] |
/kernel/linux/linux-5.10/arch/ia64/kernel/ |
H A D | palinfo.c | 317 vm_info_1.pal_vm_info_1_s.key_size, in vm_info()
|
/kernel/linux/linux-6.6/arch/ia64/kernel/ |
H A D | palinfo.c | 317 vm_info_1.pal_vm_info_1_s.key_size, in vm_info()
|
/kernel/linux/linux-5.10/tools/lib/bpf/ |
H A D | libbpf.h | 400 unsigned int key_size; member
|
/kernel/linux/linux-5.10/kernel/bpf/ |
H A D | cpumap.c | 94 if (attr->max_entries == 0 || attr->key_size != 4 || in cpu_map_alloc()
|
H A D | inode.c | 204 iter->key = kzalloc(map->key_size, GFP_KERNEL | __GFP_NOWARN); in map_iter_alloc()
|
/kernel/linux/linux-6.6/kernel/bpf/ |
H A D | cpumap.c | 89 if (attr->max_entries == 0 || attr->key_size != 4 || in cpu_map_alloc()
|
H A D | bpf_local_storage.c | 702 attr->key_size != sizeof(int) || !attr->value_size || in bpf_local_storage_map_alloc_check()
|
H A D | inode.c | 203 iter->key = kzalloc(map->key_size, GFP_KERNEL | __GFP_NOWARN); in map_iter_alloc()
|
H A D | ringbuf.c | 193 if (attr->key_size || attr->value_size || in ringbuf_map_alloc()
|
H A D | stackmap.c | 81 if (attr->max_entries == 0 || attr->key_size != 4 || in stack_map_alloc()
|
/kernel/linux/linux-6.6/tools/perf/util/ |
H A D | bpf_counter.c | 311 return (map_info.key_size == sizeof(struct perf_event_attr)) && in bperf_attr_map_compatible()
|
/kernel/linux/linux-6.6/tools/testing/selftests/bpf/progs/ |
H A D | verifier_ref_tracking.c | 70 __uint(key_size, sizeof(int));
|
/kernel/linux/patches/linux-4.19/prebuilts/usr/include/linux/ |
H A D | ethtool.h | 353 __u32 key_size; member
|
/third_party/node/deps/ngtcp2/ngtcp2/crypto/picotls/ |
H A D | picotls.c | 158 return aead->key_size; in crypto_aead_keylen()
|
/third_party/node/deps/openssl/openssl/engines/ |
H A D | e_afalg.c | 727 cipher_handle->key_size)) == NULL in afalg_aes_cbc()
|
/third_party/openssl/engines/ |
H A D | e_afalg.c | 727 cipher_handle->key_size)) == NULL in afalg_aes_cbc()
|
/kernel/linux/linux-5.10/drivers/net/wireless/ti/wlcore/ |
H A D | main.c | 3272 u8 id, u8 key_type, u8 key_size, in wl1271_record_ap_key() 3281 if (key_size > MAX_KEY_SIZE) in wl1271_record_ap_key() 3307 ap_key->key_size = key_size; in wl1271_record_ap_key() 3308 memcpy(ap_key->key, key, key_size); in wl1271_record_ap_key() 3346 key->key_size, key->key, in wl1271_ap_init_hwenc() 3370 u8 key_size, const u8 *key, u32 tx_seq_32, in wl1271_set_key() 3397 key_type, key_size, in wl1271_set_key() 3402 id, key_type, key_size, in wl1271_set_key() 3435 id, key_type, key_size, in wl1271_set_key() 3271 wl1271_record_ap_key(struct wl1271 *wl, struct wl12xx_vif *wlvif, u8 id, u8 key_type, u8 key_size, const u8 *key, u8 hlid, u32 tx_seq_32, u16 tx_seq_16, bool is_pairwise) wl1271_record_ap_key() argument 3368 wl1271_set_key(struct wl1271 *wl, struct wl12xx_vif *wlvif, u16 action, u8 id, u8 key_type, u8 key_size, const u8 *key, u32 tx_seq_32, u16 tx_seq_16, struct ieee80211_sta *sta, bool is_pairwise) wl1271_set_key() argument [all...] |
/kernel/linux/linux-6.6/drivers/net/wireless/ti/wlcore/ |
H A D | main.c | 3247 u8 id, u8 key_type, u8 key_size, in wl1271_record_ap_key() 3256 if (key_size > MAX_KEY_SIZE) in wl1271_record_ap_key() 3282 ap_key->key_size = key_size; in wl1271_record_ap_key() 3283 memcpy(ap_key->key, key, key_size); in wl1271_record_ap_key() 3321 key->key_size, key->key, in wl1271_ap_init_hwenc() 3345 u8 key_size, const u8 *key, u32 tx_seq_32, in wl1271_set_key() 3372 key_type, key_size, in wl1271_set_key() 3377 id, key_type, key_size, in wl1271_set_key() 3410 id, key_type, key_size, in wl1271_set_key() 3246 wl1271_record_ap_key(struct wl1271 *wl, struct wl12xx_vif *wlvif, u8 id, u8 key_type, u8 key_size, const u8 *key, u8 hlid, u32 tx_seq_32, u16 tx_seq_16, bool is_pairwise) wl1271_record_ap_key() argument 3343 wl1271_set_key(struct wl1271 *wl, struct wl12xx_vif *wlvif, u16 action, u8 id, u8 key_type, u8 key_size, const u8 *key, u32 tx_seq_32, u16 tx_seq_16, struct ieee80211_sta *sta, bool is_pairwise) wl1271_set_key() argument [all...] |
/third_party/mesa3d/src/amd/vulkan/ |
H A D | radv_cmd_buffer.c | 3013 uint32_t key_size : 8; member 3038 return _mesa_hash_data(key, header.key_size); in radv_hash_vs_prolog() 3051 return memcmp(a, b, header.key_size) == 0; in radv_cmp_vs_prolog() 3109 unsigned key_size = 1; in lookup_vs_prolog() local 3131 key_words[key_size++] = instance_rate_inputs; in lookup_vs_prolog() 3135 key_words[key_size++] = *nontrivial_divisors; in lookup_vs_prolog() 3139 key_words[key_size++] = zero_divisors; in lookup_vs_prolog() 3143 key_words[key_size++] = misaligned_mask; in lookup_vs_prolog() 3145 uint8_t *formats = (uint8_t *)&key_words[key_size]; in lookup_vs_prolog() 3150 key_size in lookup_vs_prolog() [all...] |
/kernel/linux/linux-5.10/drivers/md/ |
H A D | dm-integrity.c | 151 unsigned key_size; member 3503 a->key_size = strlen(a->key_string) / 2; in get_alg_and_key() 3504 a->key = kmalloc(a->key_size, GFP_KERNEL); in get_alg_and_key() 3507 if (hex2bin(a->key, a->key_string, a->key_size)) in get_alg_and_key() 3535 r = crypto_shash_setkey(*hash, a->key, a->key_size); in get_mac() 3595 ic->journal_crypt_alg.key_size); in create_journal()
|