| /Linux-v5.4/kernel/bpf/ |
| D | hashtab.c | 79 static inline void htab_elem_set_ptr(struct htab_elem *l, u32 key_size, in htab_elem_set_ptr() argument 82 *(void __percpu **)(l->key + key_size) = pptr; in htab_elem_set_ptr() 85 static inline void __percpu *htab_elem_get_ptr(struct htab_elem *l, u32 key_size) in htab_elem_get_ptr() argument 87 return *(void __percpu **)(l->key + key_size); in htab_elem_get_ptr() 92 return *(void **)(l->key + roundup(map->key_size, 8)); in fd_htab_map_get_ptr() 111 htab->map.key_size); in htab_free_elems() 127 memcpy(l->key, key, htab->map.key_size); in prealloc_lru_pop() 157 htab_elem_set_ptr(get_htab_elem(htab, i), htab->map.key_size, in prealloc_init() 273 if (attr->max_entries == 0 || attr->key_size == 0 || in htab_map_alloc_check() 277 if (attr->key_size > MAX_BPF_STACK) in htab_map_alloc_check() [all …]
|
| D | map_in_map.c | 54 inner_map_meta->key_size = inner_map->key_size; in bpf_map_meta_alloc() 82 meta0->key_size == meta1->key_size && in bpf_map_meta_equal()
|
| /Linux-v5.4/crypto/ |
| D | rsa-pkcs1pad.c | 92 unsigned int key_size; member 112 ctx->key_size = 0; in pkcs1pad_set_pub_key() 123 ctx->key_size = err; in pkcs1pad_set_pub_key() 133 ctx->key_size = 0; in pkcs1pad_set_priv_key() 144 ctx->key_size = err; in pkcs1pad_set_priv_key() 158 return ctx->key_size; in pkcs1pad_get_max_size() 186 pad_len = ctx->key_size - len; in pkcs1pad_encrypt_sign_complete() 192 out_buf = kzalloc(ctx->key_size, GFP_KERNEL); in pkcs1pad_encrypt_sign_complete() 200 sg_nents_for_len(req->dst, ctx->key_size), in pkcs1pad_encrypt_sign_complete() 201 out_buf, ctx->key_size); in pkcs1pad_encrypt_sign_complete() [all …]
|
| D | dh_helper.c | 31 return p->key_size + p->p_size + p->q_size + p->g_size; in dh_data_size() 53 ptr = dh_pack_data(ptr, end, ¶ms->key_size, in crypto_dh_encode_key() 54 sizeof(params->key_size)); in crypto_dh_encode_key() 58 ptr = dh_pack_data(ptr, end, params->key, params->key_size); in crypto_dh_encode_key() 80 ptr = dh_unpack_data(¶ms->key_size, ptr, sizeof(params->key_size)); in crypto_dh_decode_key() 91 if (params->key_size > params->p_size || in crypto_dh_decode_key() 99 params->p = (void *)(ptr + params->key_size); in crypto_dh_decode_key() 100 params->q = (void *)(ptr + params->key_size + params->p_size); in crypto_dh_decode_key() 101 params->g = (void *)(ptr + params->key_size + params->p_size + in crypto_dh_decode_key()
|
| D | ecdh_helper.c | 29 return ECDH_KPP_SECRET_MIN_SIZE + params->key_size; in crypto_ecdh_key_len() 50 ptr = ecdh_pack_data(ptr, ¶ms->key_size, sizeof(params->key_size)); in crypto_ecdh_encode_key() 51 ecdh_pack_data(ptr, params->key, params->key_size); in crypto_ecdh_encode_key() 71 ptr = ecdh_unpack_data(¶ms->key_size, ptr, sizeof(params->key_size)); in crypto_ecdh_decode_key()
|
| /Linux-v5.4/tools/testing/selftests/bpf/ |
| D | test_lpm_map.c | 427 size_t key_size; in test_lpm_delete() local 431 key_size = sizeof(*key) + sizeof(__u32); in test_lpm_delete() 432 key = alloca(key_size); in test_lpm_delete() 435 key_size, sizeof(value), in test_lpm_delete() 539 size_t key_size; in test_lpm_get_next_key() local 543 key_size = sizeof(*key_p) + sizeof(__u32); in test_lpm_get_next_key() 544 key_p = alloca(key_size); in test_lpm_get_next_key() 545 next_key_p = alloca(key_size); in test_lpm_get_next_key() 547 map_fd = bpf_create_map(BPF_MAP_TYPE_LPM_TRIE, key_size, sizeof(value), in test_lpm_get_next_key() 560 memset(key_p, 0, key_size); in test_lpm_get_next_key() [all …]
|
| D | test_btf.c | 109 __u32 key_size; member 177 .key_size = sizeof(int), 232 .key_size = sizeof(int), 257 .key_size = sizeof(int), 298 .key_size = sizeof(int), 343 .key_size = sizeof(int), 365 .key_size = sizeof(int), 387 .key_size = sizeof(int), 409 .key_size = sizeof(int), 434 .key_size = sizeof(int), [all …]
|
| /Linux-v5.4/samples/bpf/ |
| D | map_perf_test_kern.c | 18 .key_size = sizeof(u32), 25 .key_size = sizeof(u32), 32 .key_size = sizeof(u32), 40 .key_size = sizeof(u32), 49 .key_size = sizeof(u32), 55 .key_size = sizeof(u32), 62 .key_size = sizeof(u32), 70 .key_size = sizeof(u32), 78 .key_size = 8, 86 .key_size = sizeof(u32), [all …]
|
| D | test_map_in_map_kern.c | 20 .key_size = sizeof(u32), 28 .key_size = sizeof(u32), 36 .key_size = sizeof(u32), 44 .key_size = sizeof(u32), 52 .key_size = sizeof(u32), 60 .key_size = sizeof(u32), 68 .key_size = sizeof(u32),
|
| D | xdp_monitor_kern.c | 11 .key_size = sizeof(u32), 20 .key_size = sizeof(u32), 134 .key_size = sizeof(u32), 141 .key_size = sizeof(u32), 215 .key_size = sizeof(u32),
|
| D | xdp_router_ipv4_kern.c | 47 .key_size = 8, 56 .key_size = sizeof(u32), 64 .key_size = sizeof(__be32), 72 .key_size = sizeof(__be32), 79 .key_size = sizeof(int),
|
| D | tracex6_kern.c | 8 .key_size = sizeof(int), 14 .key_size = sizeof(int), 20 .key_size = sizeof(int),
|
| D | spintest_kern.c | 16 .key_size = sizeof(long), 22 .key_size = sizeof(long), 29 .key_size = sizeof(u32),
|
| D | offwaketime_kern.c | 27 .key_size = sizeof(struct key_t), 34 .key_size = sizeof(u32), 46 .key_size = sizeof(u32), 53 .key_size = sizeof(u32),
|
| D | xdp_rxq_info_kern.c | 28 .key_size = sizeof(int), 41 .key_size = sizeof(u32), 51 .key_size = sizeof(u32),
|
| /Linux-v5.4/tools/bpf/bpftool/ |
| D | map.c | 214 print_hex_data_json(key, info->key_size); in print_entry_json() 234 print_hex_data_json(key, info->key_size); in print_entry_json() 271 break_names = info->key_size > 16 || msg_size > 16; in print_entry_error() 272 single_line = info->key_size + msg_size <= 24 && !break_names; in print_entry_error() 275 fprint_hex(stdout, key, info->key_size, " "); in print_entry_error() 290 break_names = info->key_size > 16 || info->value_size > 16; in print_entry_plain() 291 single_line = info->key_size + info->value_size <= 24 && in print_entry_plain() 294 if (info->key_size) { in print_entry_plain() 296 fprint_hex(stdout, key, info->key_size, " "); in print_entry_plain() 313 if (info->key_size) { in print_entry_plain() [all …]
|
| /Linux-v5.4/net/core/ |
| D | sock_map.c | 33 attr->key_size != 4 || in sock_map_alloc() 545 u32 key_size) in sock_hash_lookup_elem_raw() argument 551 !memcmp(&elem->key, key, key_size)) in sock_hash_lookup_elem_raw() 561 u32 key_size = map->key_size, hash; in __sock_hash_lookup_elem() local 567 hash = sock_hash_bucket_hash(key, key_size); in __sock_hash_lookup_elem() 569 elem = sock_hash_lookup_elem_raw(&bucket->head, hash, key, key_size); in __sock_hash_lookup_elem() 597 elem->key, map->key_size); in sock_hash_delete_from_link() 609 u32 hash, key_size = map->key_size; in sock_hash_delete_elem() local 614 hash = sock_hash_bucket_hash(key, key_size); in sock_hash_delete_elem() 618 elem = sock_hash_lookup_elem_raw(&bucket->head, hash, key, key_size); in sock_hash_delete_elem() [all …]
|
| /Linux-v5.4/tools/lib/bpf/ |
| D | bpf.h | 43 __u32 key_size; member 57 int key_size, int value_size, 60 int key_size, int value_size, 62 LIBBPF_API int bpf_create_map(enum bpf_map_type map_type, int key_size, 65 const char *name, int key_size, 69 const char *name, int key_size,
|
| D | libbpf_probes.c | 195 int key_size, value_size, max_entries, map_flags; in bpf_probe_map_type() local 200 key_size = sizeof(__u32); in bpf_probe_map_type() 210 key_size = sizeof(__u64); in bpf_probe_map_type() 216 key_size = sizeof(struct bpf_cgroup_storage_key); in bpf_probe_map_type() 222 key_size = 0; in bpf_probe_map_type() 275 attr.key_size = key_size; in bpf_probe_map_type()
|
| D | bpf.c | 86 attr.key_size = create_attr->key_size; in bpf_create_map_xattr() 104 int key_size, int value_size, int max_entries, in bpf_create_map_node() argument 112 map_attr.key_size = key_size; in bpf_create_map_node() 123 int bpf_create_map(enum bpf_map_type map_type, int key_size, in bpf_create_map() argument 130 map_attr.key_size = key_size; in bpf_create_map() 138 int key_size, int value_size, int max_entries, in bpf_create_map_name() argument 146 map_attr.key_size = key_size; in bpf_create_map_name() 154 int key_size, int inner_map_fd, int max_entries, in bpf_create_map_in_map_node() argument 162 attr.key_size = key_size; in bpf_create_map_in_map_node() 180 int key_size, int inner_map_fd, int max_entries, in bpf_create_map_in_map() argument [all …]
|
| /Linux-v5.4/drivers/staging/wusbcore/host/whci/ |
| D | wusb.c | 131 const void *key, size_t key_size, bool is_gtk) in whc_set_key() argument 138 memcpy(seckey, key, key_size); in whc_set_key() 161 const void *ptk, size_t key_size) in whc_set_ptk() argument 170 ret = whc_set_key(whc, port_idx, tkid, ptk, key_size, false); in whc_set_ptk() 192 const void *gtk, size_t key_size) in whc_set_gtk() argument 199 ret = whc_set_key(whc, whc->n_devices, tkid, gtk, key_size, true); in whc_set_gtk()
|
| /Linux-v5.4/drivers/net/ethernet/netronome/nfp/flower/ |
| D | offload.c | 149 u32 *key_layer_two, int *key_size, in nfp_flower_calc_opt_layer() argument 159 *key_size += sizeof(struct nfp_flower_geneve_options); in nfp_flower_calc_opt_layer() 168 u32 *key_layer_two, u8 *key_layer, int *key_size, in nfp_flower_calc_udp_tun_layer() argument 179 *key_size += sizeof(struct nfp_flower_ipv4_udp_tun); in nfp_flower_calc_udp_tun_layer() 193 *key_size += sizeof(struct nfp_flower_ext_meta); in nfp_flower_calc_udp_tun_layer() 195 *key_size += sizeof(struct nfp_flower_ipv4_udp_tun); in nfp_flower_calc_udp_tun_layer() 204 key_size, extack); in nfp_flower_calc_udp_tun_layer() 230 int key_size; in nfp_flower_calculate_key_layers() local 248 key_size = sizeof(struct nfp_flower_meta_tci) + in nfp_flower_calculate_key_layers() 254 key_size += sizeof(struct nfp_flower_mac_mpls); in nfp_flower_calculate_key_layers() [all …]
|
| /Linux-v5.4/tools/testing/selftests/bpf/progs/ |
| D | sockmap_verdict_prog.c | 10 __uint(key_size, sizeof(int)); 17 __uint(key_size, sizeof(int)); 24 __uint(key_size, sizeof(int));
|
| /Linux-v5.4/kernel/trace/ |
| D | tracing_map.c | 411 elt->key = kzalloc(map->key_size, GFP_KERNEL); in tracing_map_elt_alloc() 502 static inline bool keys_match(void *key, void *test_key, unsigned key_size) in keys_match() argument 506 if (memcmp(key, test_key, key_size)) in keys_match() 520 key_hash = jhash(key, map->key_size, 0); in __tracing_map_insert() 533 keys_match(key, val->key, map->key_size)) { in __tracing_map_insert() 573 memcpy(elt->key, key, map->key_size); in __tracing_map_insert() 761 unsigned int key_size, in tracing_map_create() argument 790 map->key_size = key_size; in tracing_map_create() 842 if (memcmp((*a)->key, (*b)->key, (*a)->elt->map->key_size)) in cmp_entries_dup() 950 int n_entries, unsigned int key_size) in detect_dups() argument [all …]
|
| /Linux-v5.4/crypto/asymmetric_keys/ |
| D | pkcs8_parser.c | 25 u32 key_size; member 90 ctx->key_size = vlen; in pkcs8_note_key() 119 pub->key = kmemdup(ctx.key, ctx.key_size, GFP_KERNEL); in pkcs8_parse() 123 pub->keylen = ctx.key_size; in pkcs8_parse()
|