/kernel/linux/linux-5.10/fs/btrfs/ |
H A D | delayed-inode.c | 703 struct btrfs_key *keys; in btrfs_batch_insert_items() local 751 keys = kmalloc_array(nitems, sizeof(struct btrfs_key), GFP_NOFS); in btrfs_batch_insert_items() 752 if (!keys) { in btrfs_batch_insert_items() 763 /* get keys of all the delayed items */ in btrfs_batch_insert_items() 766 keys[i] = next->key; in btrfs_batch_insert_items() 771 /* insert the keys of the items */ in btrfs_batch_insert_items() 772 setup_items_for_insert(root, path, keys, data_size, nitems); in btrfs_batch_insert_items() 791 kfree(keys); in btrfs_batch_insert_items()
|
/kernel/linux/linux-5.10/drivers/net/wireless/st/cw1200/ |
H A D | txrx.c | 1238 priv->keys[idx].index = idx; in cw1200_alloc_key() 1245 memset(&priv->keys[idx], 0, sizeof(priv->keys[idx])); in cw1200_free_key() 1251 memset(&priv->keys, 0, sizeof(priv->keys)); in cw1200_free_keys() 1260 ret = wsm_add_key(priv, &priv->keys[idx]); in cw1200_upload_keys()
|
/kernel/linux/linux-6.6/drivers/net/wireless/st/cw1200/ |
H A D | txrx.c | 1234 priv->keys[idx].index = idx; in cw1200_alloc_key() 1241 memset(&priv->keys[idx], 0, sizeof(priv->keys[idx])); in cw1200_free_key() 1247 memset(&priv->keys, 0, sizeof(priv->keys)); in cw1200_free_keys() 1256 ret = wsm_add_key(priv, &priv->keys[idx]); in cw1200_upload_keys()
|
/kernel/linux/linux-6.6/net/sched/ |
H A D | cls_u32.c | 129 struct tc_u32_key *key = n->sel.keys; in u32_classify() 437 * for the variant that should be used with keys return from 819 new = kzalloc(struct_size(new, sel.keys, s->nkeys), GFP_KERNEL); in u32_init_knode() 846 memcpy(&new->sel, s, struct_size(s, keys, s->nkeys)); in u32_init_knode() 1090 sel_size = struct_size(s, keys, s->nkeys); in u32_change() 1096 n = kzalloc(struct_size(n, sel.keys, s->nkeys), GFP_KERNEL); in u32_change() 1357 if (nla_put(skb, TCA_U32_SEL, struct_size(&n->sel, keys, n->sel.nkeys), in u32_dump()
|
/third_party/node/deps/v8/src/debug/ |
H A D | debug-interface.cc | 194 i::Handle<i::FixedArray> keys; in GetPrivateMembers() local 196 isolate, keys, in GetPrivateMembers() 204 for (int i = 0; i < keys->length(); ++i) { in GetPrivateMembers() 206 i::Handle<i::Symbol> key(i::Symbol::cast(keys->get(i)), isolate); in GetPrivateMembers() 259 for (int i = 0; i < keys->length(); ++i) { in GetPrivateMembers() 260 i::Handle<i::Object> obj_key(keys->get(i), isolate); in GetPrivateMembers()
|
/third_party/node/deps/openssl/openssl/crypto/aria/ |
H A D | aria.c | 1090 unsigned int rounds, const ARIA_u128 *keys) in do_encrypt() 1097 FO(&p, &p, &keys[i]); in do_encrypt() 1098 FE(&p, &p, &keys[i + 1]); in do_encrypt() 1100 FO(&p, &p, &keys[rounds - 2]); in do_encrypt() 1101 sl2(o, &p, &keys[rounds - 1]); in do_encrypt() 1102 xor128(o, o, &keys[rounds]); in do_encrypt() 1089 do_encrypt(unsigned char *o, const unsigned char *pin, unsigned int rounds, const ARIA_u128 *keys) do_encrypt() argument
|
/third_party/openssl/crypto/aria/ |
H A D | aria.c | 1090 unsigned int rounds, const ARIA_u128 *keys) in do_encrypt() 1097 FO(&p, &p, &keys[i]); in do_encrypt() 1098 FE(&p, &p, &keys[i + 1]); in do_encrypt() 1100 FO(&p, &p, &keys[rounds - 2]); in do_encrypt() 1101 sl2(o, &p, &keys[rounds - 1]); in do_encrypt() 1102 xor128(o, o, &keys[rounds]); in do_encrypt() 1089 do_encrypt(unsigned char *o, const unsigned char *pin, unsigned int rounds, const ARIA_u128 *keys) do_encrypt() argument
|
/third_party/python/Lib/logging/ |
H A D | __init__.py | 595 _STYLES.keys())) 1409 for c in ph.loggerMap.keys(): 2060 _STYLES.keys())) 2071 keys = ', '.join(kwargs.keys()) 2072 raise ValueError('Unrecognised argument(s): %s' % keys)
|
/kernel/linux/linux-5.10/drivers/crypto/bcm/ |
H A D | cipher.c | 1800 /* XTS includes two keys of equal length */ in aes_setkey() 1853 /* SPU needs XTS keys in the reverse order the crypto API presents */ in skcipher_setkey() 2764 struct crypto_authenc_keys keys; in aead_authenc_setkey() local 2771 ret = crypto_authenc_extractkeys(&keys, key, keylen); in aead_authenc_setkey() 2775 if (keys.enckeylen > MAX_KEY_SIZE || in aead_authenc_setkey() 2776 keys.authkeylen > MAX_KEY_SIZE) in aead_authenc_setkey() 2779 ctx->enckeylen = keys.enckeylen; in aead_authenc_setkey() 2780 ctx->authkeylen = keys.authkeylen; in aead_authenc_setkey() 2782 memcpy(ctx->enckey, keys.enckey, keys in aead_authenc_setkey() [all...] |
/kernel/linux/linux-6.6/drivers/crypto/bcm/ |
H A D | cipher.c | 1797 /* XTS includes two keys of equal length */ in aes_setkey() 1850 /* SPU needs XTS keys in the reverse order the crypto API presents */ in skcipher_setkey() 2725 struct crypto_authenc_keys keys; in aead_authenc_setkey() local 2732 ret = crypto_authenc_extractkeys(&keys, key, keylen); in aead_authenc_setkey() 2736 if (keys.enckeylen > MAX_KEY_SIZE || in aead_authenc_setkey() 2737 keys.authkeylen > MAX_KEY_SIZE) in aead_authenc_setkey() 2740 ctx->enckeylen = keys.enckeylen; in aead_authenc_setkey() 2741 ctx->authkeylen = keys.authkeylen; in aead_authenc_setkey() 2743 memcpy(ctx->enckey, keys.enckey, keys in aead_authenc_setkey() [all...] |
/device/soc/hisilicon/hi3861v100/sdk_liteos/build/win_scripts/tools/nvtool/ |
H A D | build_nv.py | 316 if 'ID' in nv.attrib.keys():
359 if not grp_name in group_dics.keys():
|
/device/soc/hisilicon/hi3861v100/sdk_liteos/tools/nvtool/ |
H A D | build_nv.py | 316 if 'ID' in nv.attrib.keys():
359 if not grp_name in group_dics.keys():
|
/foundation/multimodalinput/input/service/module_loader/include/ |
H A D | mmi_service.h | 79 int32_t SupportKeys(int32_t deviceId, std::vector<int32_t> &keys, std::vector<bool> &keystroke) override; 221 int32_t OnSupportKeys(int32_t deviceId, std::vector<int32_t> &keys, std::vector<bool> &keystroke);
|
/foundation/distributeddatamgr/kv_store/frameworks/libs/distributeddb/storage/src/gaussdb_rd/ |
H A D | rd_single_ver_storage_executor.cpp | 450 // Get all the meta keys. 451 int RdSingleVerStorageExecutor::GetAllMetaKeys(std::vector<Key> &keys) const in GetAllMetaKeys() 637 int RdSingleVerStorageExecutor::DeleteMetaData(const std::vector<Key> &keys) in DeleteMetaData() argument
|
/foundation/distributeddatamgr/kv_store/frameworks/libs/distributeddb/syncer/src/device/ |
H A D | query_sync_water_mark_helper.cpp | 62 int QuerySyncWaterMarkHelper::DeleteMetaDataFromDB(const std::vector<Key> &keys) const in DeleteMetaDataFromDB() 67 return storage_->DeleteMetaData(keys); in DeleteMetaDataFromDB()
|
/foundation/distributeddatamgr/relational_store/frameworks/native/rdb/src/ |
H A D | rdb_store.cpp | 549 std::vector<PRIKey> &keys) in GetModifyTime() 553 (void)keys; in GetModifyTime() 548 GetModifyTime(const std::string &table, const std::string &column, std::vector<PRIKey> &keys) GetModifyTime() argument
|
/kernel/linux/linux-5.10/drivers/hid/ |
H A D | hid-prodikeys.c | 4 * providing midi & extra multimedia keys functionality 391 /* break keys */ in pcmidi_handle_report4() 400 /* make keys */ in pcmidi_handle_report4() 499 case 0x01: /* midi keys (qwerty)*/ in pcmidi_handle_report() 505 case 0x04: /* multimedia/midi keys (qwerty)*/ in pcmidi_handle_report() 515 /* reassigned functionality for N/A keys in pcmidi_setup_extra_keys() 519 static const unsigned int keys[] = { in pcmidi_setup_extra_keys() local 535 const unsigned int *pkeys = &keys[0]; in pcmidi_setup_extra_keys() 786 case 0x01: /* midi keys (qwerty)*/ in pk_raw_event() 788 case 0x04: /* extra/midi keys (qwert in pk_raw_event() [all...] |
/kernel/linux/linux-5.10/drivers/net/ethernet/mscc/ |
H A D | ocelot_flower.c | 389 int key_length = vcap->keys[VCAP_ES0_IGR_PORT].length; in ocelot_flower_parse_indev() 665 int key_length = vcap->keys[VCAP_ES0_EGR_PORT].length; in ocelot_vcap_filter_create()
|
/kernel/linux/linux-5.10/fs/nfs/ |
H A D | nfs4idmap.c | 46 #include <keys/user-type.h> 47 #include <keys/request_key_auth-type.h>
|
/kernel/linux/linux-5.10/fs/ecryptfs/ |
H A D | ecryptfs_kernel.h | 18 #include <keys/user-type.h> 19 #include <keys/encrypted-type.h> 283 * ecryptfs_global_auth_tok structs refer to authentication token keys
|
/kernel/linux/linux-6.6/fs/ecryptfs/ |
H A D | ecryptfs_kernel.h | 18 #include <keys/user-type.h> 19 #include <keys/encrypted-type.h> 280 * ecryptfs_global_auth_tok structs refer to authentication token keys
|
/kernel/linux/linux-6.6/fs/nfs/ |
H A D | nfs4idmap.c | 46 #include <keys/user-type.h> 47 #include <keys/request_key_auth-type.h>
|
/kernel/linux/linux-6.6/drivers/nvdimm/ |
H A D | security.c | 13 #include <keys/user-type.h> 14 #include <keys/encrypted-type.h>
|
/kernel/linux/linux-6.6/drivers/hid/ |
H A D | hid-prodikeys.c | 4 * providing midi & extra multimedia keys functionality 391 /* break keys */ in pcmidi_handle_report4() 400 /* make keys */ in pcmidi_handle_report4() 499 case 0x01: /* midi keys (qwerty)*/ in pcmidi_handle_report() 505 case 0x04: /* multimedia/midi keys (qwerty)*/ in pcmidi_handle_report() 515 /* reassigned functionality for N/A keys in pcmidi_setup_extra_keys() 519 static const unsigned int keys[] = { in pcmidi_setup_extra_keys() local 535 const unsigned int *pkeys = &keys[0]; in pcmidi_setup_extra_keys() 786 case 0x01: /* midi keys (qwerty)*/ in pk_raw_event() 788 case 0x04: /* extra/midi keys (qwert in pk_raw_event() [all...] |
/kernel/linux/linux-6.6/net/rxrpc/ |
H A D | key.c | 7 * RxRPC keys should have a description of describing their purpose: 22 #include <keys/rxrpc-type.h> 23 #include <keys/user-type.h> 33 * rxrpc defined keys take an arbitrary string as the description and an 573 /* we don't know what form we should return non-AFS keys in */ in rxrpc_read() 580 /* AFS keys we return in XDR form, so we need to work out the size of in rxrpc_read()
|