/kernel/linux/linux-6.6/tools/testing/selftests/bpf/progs/ |
H A D | tailcall_bpf2bpf4.c | 8 __uint(key_size, sizeof(__u32)); 15 __uint(key_size, sizeof(__u32));
|
H A D | test_queue_stack_map.h | 15 __uint(key_size, 0); 23 __uint(key_size, 0);
|
H A D | map_ptr_kern.c | 32 __u32 key_size; member 38 static inline int check_bpf_map_fields(struct bpf_map *map, __u32 key_size, in check_bpf_map_fields() argument 42 VERIFY(map->key_size == key_size); in check_bpf_map_fields() 54 VERIFY(indirect->key_size == direct->key_size); in check_bpf_map_ptr() 63 __u32 key_size, __u32 value_size, __u32 max_entries) in check() 66 VERIFY(check_bpf_map_fields(indirect, key_size, value_size, in check() 62 check(struct bpf_map *indirect, struct bpf_map *direct, __u32 key_size, __u32 value_size, __u32 max_entries) check() argument
|
H A D | xdp_redirect_multi_kern.c | 17 __uint(key_size, sizeof(int)); 24 __uint(key_size, sizeof(int));
|
/kernel/linux/linux-6.6/samples/bpf/ |
H A D | spintest.bpf.c | 24 __uint(key_size, sizeof(long)); 31 __uint(key_size, sizeof(u32));
|
H A D | test_map_in_map.bpf.c | 56 __uint(key_size, sizeof(u32)); 64 __uint(key_size, sizeof(u32)); 72 __uint(key_size, sizeof(u32));
|
H A D | map_perf_test.bpf.c | 51 __uint(key_size, sizeof(u32)); 60 __uint(key_size, sizeof(u32)); 75 __uint(key_size, sizeof(u32)); 83 __uint(key_size, 8);
|
/third_party/mbedtls/library/ |
H A D | lmots.h | 94 const unsigned char *key, size_t key_size); 116 unsigned char *key, size_t key_size,
|
/kernel/linux/linux-5.10/tools/testing/selftests/bpf/progs/ |
H A D | map_ptr_kern.c | 35 __u32 key_size; member 42 static inline int check_bpf_map_fields(struct bpf_map *map, __u32 key_size, in check_bpf_map_fields() argument 46 VERIFY(map->key_size == key_size); in check_bpf_map_fields() 59 VERIFY(indirect->key_size == direct->key_size); in check_bpf_map_ptr() 69 __u32 key_size, __u32 value_size, __u32 max_entries) in check() 72 VERIFY(check_bpf_map_fields(indirect, key_size, value_size, in check() 68 check(struct bpf_map *indirect, struct bpf_map *direct, __u32 key_size, __u32 value_size, __u32 max_entries) check() argument
|
/third_party/mesa3d/src/gallium/drivers/lima/ |
H A D | lima_program.c | 349 uint32_t key_size; in lima_get_compiled_fs() local 352 key_size = sizeof(struct lima_fs_key); in lima_get_compiled_fs() 382 dup_key = rzalloc_size(fs, key_size); in lima_get_compiled_fs() 383 memcpy(dup_key, key, key_size); in lima_get_compiled_fs() 523 uint32_t key_size; in lima_get_compiled_vs() local 526 key_size = sizeof(struct lima_vs_key); in lima_get_compiled_vs() 554 dup_key = rzalloc_size(vs, key_size); in lima_get_compiled_vs() 555 memcpy(dup_key, key, key_size); in lima_get_compiled_vs()
|
/kernel/linux/linux-6.6/drivers/md/ |
H A D | dm-crypt.c | 207 unsigned int key_size; member 463 int subkey_size = cc->key_size / cc->key_parts; in crypt_iv_lmk_init() 595 if (cc->key_size <= (cc->iv_size + TCW_WHITENING_SIZE)) { in crypt_iv_tcw_ctr() 621 int key_offset = cc->key_size - cc->iv_size - TCW_WHITENING_SIZE; in crypt_iv_tcw_init() 1052 int key_offset = cc->key_size - cc->key_extra_size; in crypt_iv_elephant_init() 2416 return (cc->key_size - cc->key_extra_size) >> ilog2(cc->tfms_count); in crypt_subkey_size() 2503 if (cc->key_size != ukp->datalen) in set_key_user() 2506 memcpy(cc->key, ukp->data, cc->key_size); in set_key_user() 2519 if (cc->key_size != ekp->decrypted_datalen) in set_key_encrypted() 2522 memcpy(cc->key, ekp->decrypted_data, cc->key_size); in set_key_encrypted() 3236 int key_size; crypt_ctr() local 3645 int key_size, ret = -EINVAL; crypt_message() local [all...] |
/kernel/linux/linux-5.10/samples/bpf/ |
H A D | test_map_in_map_kern.c | 56 __uint(key_size, sizeof(u32)); 64 __uint(key_size, sizeof(u32)); 72 __uint(key_size, sizeof(u32));
|
H A D | spintest_kern.c | 23 __uint(key_size, sizeof(long)); 30 __uint(key_size, sizeof(u32));
|
H A D | map_perf_test_kern.c | 53 __uint(key_size, sizeof(u32)); 62 __uint(key_size, sizeof(u32)); 77 __uint(key_size, sizeof(u32)); 85 __uint(key_size, 8);
|
/kernel/linux/linux-5.10/fs/ecryptfs/ |
H A D | crypto.c | 303 crypt_stat->key_size); in crypt_scatterlist() 305 crypt_stat->key_size); in crypt_scatterlist() 324 crypt_stat->key_size); in crypt_scatterlist() 565 crypt_stat->key_size << 3); in ecryptfs_init_crypt_ctx() 648 crypt_stat->key_size); in ecryptfs_compute_root_iv() 665 get_random_bytes(crypt_stat->key, crypt_stat->key_size); in ecryptfs_generate_new_key() 671 crypt_stat->key_size); in ecryptfs_generate_new_key() 745 crypt_stat->key_size = ECRYPTFS_DEFAULT_KEY_BYTES; in ecryptfs_set_default_crypt_stat_vals() 797 crypt_stat->key_size = in ecryptfs_new_file_context() 1540 * @key_size 1547 ecryptfs_process_key_cipher(struct crypto_skcipher **key_tfm, char *cipher_name, size_t *key_size) ecryptfs_process_key_cipher() argument 1621 ecryptfs_add_new_key_tfm(struct ecryptfs_key_tfm **key_tfm, char *cipher_name, size_t key_size) ecryptfs_add_new_key_tfm() argument [all...] |
/kernel/linux/linux-6.6/fs/ecryptfs/ |
H A D | crypto.c | 285 crypt_stat->key_size); in crypt_scatterlist() 287 crypt_stat->key_size); in crypt_scatterlist() 304 crypt_stat->key_size); in crypt_scatterlist() 539 crypt_stat->key_size << 3); in ecryptfs_init_crypt_ctx() 621 crypt_stat->key_size); in ecryptfs_compute_root_iv() 638 get_random_bytes(crypt_stat->key, crypt_stat->key_size); in ecryptfs_generate_new_key() 644 crypt_stat->key_size); in ecryptfs_generate_new_key() 718 crypt_stat->key_size = ECRYPTFS_DEFAULT_KEY_BYTES; in ecryptfs_set_default_crypt_stat_vals() 770 crypt_stat->key_size = in ecryptfs_new_file_context() 1513 * @key_size 1520 ecryptfs_process_key_cipher(struct crypto_skcipher **key_tfm, char *cipher_name, size_t *key_size) ecryptfs_process_key_cipher() argument 1593 ecryptfs_add_new_key_tfm(struct ecryptfs_key_tfm **key_tfm, char *cipher_name, size_t key_size) ecryptfs_add_new_key_tfm() argument [all...] |
/kernel/linux/linux-5.10/drivers/infiniband/sw/rxe/ |
H A D | rxe_pool.c | 72 .key_size = sizeof(union ib_gid), 149 pool->key_size = rxe_type_info[type].key_size; in rxe_pool_init() 239 (u8 *)new + pool->key_offset, pool->key_size); in insert_key() 265 memcpy((u8 *)elem + pool->key_offset, key, pool->key_size); in rxe_add_key() 443 key, pool->key_size); in rxe_pool_get_key()
|
H A D | rxe_pool.h | 44 size_t key_size; member 85 size_t key_size; member
|
/kernel/linux/linux-5.10/drivers/net/ethernet/netronome/nfp/bpf/ |
H A D | cmsg.c | 95 req->key_size = cpu_to_be32(map->key_size); in nfp_bpf_ctrl_alloc_map() 231 if (memcmp(cached_key, key, map->key_size)) in nfp_bpf_ctrl_op_cache_get() 243 map->key_size); in nfp_bpf_ctrl_op_cache_get() 328 memcpy(nfp_bpf_ctrl_req_key(bpf, req, 0), key, map->key_size); in nfp_bpf_ctrl_entry_op() 368 map->key_size); in nfp_bpf_ctrl_entry_op()
|
/kernel/linux/linux-6.6/drivers/net/ethernet/netronome/nfp/bpf/ |
H A D | cmsg.c | 95 req->key_size = cpu_to_be32(map->key_size); in nfp_bpf_ctrl_alloc_map() 231 if (memcmp(cached_key, key, map->key_size)) in nfp_bpf_ctrl_op_cache_get() 243 map->key_size); in nfp_bpf_ctrl_op_cache_get() 328 memcpy(nfp_bpf_ctrl_req_key(bpf, req, 0), key, map->key_size); in nfp_bpf_ctrl_entry_op() 368 map->key_size); in nfp_bpf_ctrl_entry_op()
|
/kernel/linux/linux-6.6/crypto/ |
H A D | dh.c | 86 ctx->xa = mpi_read_raw_data(params.key, params.key_size); in dh_set_secret() 350 unsigned int *key_size) in dh_safe_prime_gen_privkey() 445 *key_size = n << 3; in dh_safe_prime_gen_privkey() 447 memmove(key, &key[1], *key_size); in dh_safe_prime_gen_privkey() 480 if (!params.key_size) { in dh_safe_prime_set_secret() 482 ¶ms.key_size); in dh_safe_prime_set_secret() 349 dh_safe_prime_gen_privkey(const struct dh_safe_prime *safe_prime, unsigned int *key_size) dh_safe_prime_gen_privkey() argument
|
/kernel/linux/linux-5.10/drivers/md/ |
H A D | dm-crypt.c | 200 unsigned int key_size; member 455 int subkey_size = cc->key_size / cc->key_parts; in crypt_iv_lmk_init() 587 if (cc->key_size <= (cc->iv_size + TCW_WHITENING_SIZE)) { in crypt_iv_tcw_ctr() 613 int key_offset = cc->key_size - cc->iv_size - TCW_WHITENING_SIZE; in crypt_iv_tcw_init() 1037 int key_offset = cc->key_size - cc->key_extra_size; in crypt_iv_elephant_init() 2348 return (cc->key_size - cc->key_extra_size) >> ilog2(cc->tfms_count); in crypt_subkey_size() 2435 if (cc->key_size != ukp->datalen) in set_key_user() 2438 memcpy(cc->key, ukp->data, cc->key_size); in set_key_user() 2452 if (cc->key_size != ekp->decrypted_datalen) in set_key_encrypted() 2455 memcpy(cc->key, ekp->decrypted_data, cc->key_size); in set_key_encrypted() 3150 int key_size; crypt_ctr() local 3513 int key_size, ret = -EINVAL; crypt_message() local [all...] |
/kernel/linux/linux-5.10/tools/perf/include/bpf/ |
H A D | bpf.h | 13 unsigned int key_size; member 24 .key_size = sizeof(type_key), \
|
/kernel/linux/linux-5.10/fs/hfsplus/ |
H A D | brec.c | 466 int key_size, rec; in hfs_btree_inc_height() local 512 key_size = hfs_bnode_read_u16(node, 14) + 2; in hfs_btree_inc_height() 514 key_size = tree->max_key_len + 2; in hfs_btree_inc_height() 515 hfs_bnode_copy(new_node, 14, node, 14, key_size); in hfs_btree_inc_height() 519 key_size = tree->max_key_len + 2; in hfs_btree_inc_height() 523 hfs_bnode_write(new_node, &cnid, 14 + key_size, 4); in hfs_btree_inc_height() 526 hfs_bnode_write_u16(new_node, rec, 14 + key_size + 4); in hfs_btree_inc_height()
|
/kernel/linux/linux-6.6/fs/hfsplus/ |
H A D | brec.c | 466 int key_size, rec; in hfs_btree_inc_height() local 512 key_size = hfs_bnode_read_u16(node, 14) + 2; in hfs_btree_inc_height() 514 key_size = tree->max_key_len + 2; in hfs_btree_inc_height() 515 hfs_bnode_copy(new_node, 14, node, 14, key_size); in hfs_btree_inc_height() 519 key_size = tree->max_key_len + 2; in hfs_btree_inc_height() 523 hfs_bnode_write(new_node, &cnid, 14 + key_size, 4); in hfs_btree_inc_height() 526 hfs_bnode_write_u16(new_node, rec, 14 + key_size + 4); in hfs_btree_inc_height()
|