/linux/tools/testing/selftests/arm64/pauth/ |
H A D | pac.c | 56 int n_same(struct signatures *old, struct signatures *new, int nkeys) in n_same() argument 64 if (nkeys == NKEYS) in n_same() 70 int n_same_single_set(struct signatures *sign, int nkeys) in n_same_single_set() argument 72 size_t vals[nkeys]; in n_same_single_set() 80 if (nkeys >= 4) in n_same_single_set() 83 for (int i = 0; i < nkeys - 1; i++) { in n_same_single_set() 84 for (int j = i + 1; j < nkeys; j++) { in n_same_single_set() 258 int nkeys = NKEYS; in TEST() local 267 nkeys = NKEYS - 1; in TEST() 280 if (nkeys in TEST() 303 int nkeys = NKEYS; TEST() local [all...] |
/linux/net/sched/ |
H A D | cls_flow.c | 47 u32 nkeys; member 318 for (n = 0; n < f->nkeys; n++) { in flow_classify() 325 classid = jhash2(keys, f->nkeys, f->hashrnd); in flow_classify() 400 unsigned int nkeys = 0; in flow_change() local 424 nkeys = hweight32(keymask); in flow_change() 425 if (nkeys == 0) in flow_change() 462 fnew->nkeys = fold->nkeys; in flow_change() 476 if (mode != FLOW_MODE_HASH && nkeys > 1) in flow_change() 496 if (mode != FLOW_MODE_HASH && nkeys > in flow_change() [all...] |
H A D | act_pedit.c | 214 if (!parm->nkeys) { in tcf_pedit_init() 219 ksize = parm->nkeys * sizeof(struct tc_pedit_key); in tcf_pedit_init() 233 tcf_pedit_keys_ex_parse(tb[TCA_PEDIT_KEYS_EX], parm->nkeys, extack); in tcf_pedit_init() 247 nparms->tcfp_nkeys = parm->nkeys; in tcf_pedit_init() 518 opt->nkeys = parms->tcfp_nkeys; in tcf_pedit_dump()
|
H A D | cls_u32.c | 160 for (i = n->sel.nkeys; i > 0; i--, key++) { in u32_classify() 829 new = kzalloc(struct_size(new, sel.keys, s->nkeys), GFP_KERNEL); in u32_init_knode() 856 memcpy(&new->sel, s, struct_size(s, keys, s->nkeys)); in u32_init_knode() 1102 sel_size = struct_size(s, keys, s->nkeys); in u32_change() 1108 n = kzalloc(struct_size(n, sel.keys, s->nkeys), GFP_KERNEL); in u32_change() 1115 n->pf = __alloc_percpu(struct_size(n->pf, kcnts, s->nkeys), in u32_change() 1371 if (nla_put(skb, TCA_U32_SEL, struct_size(&n->sel, keys, n->sel.nkeys), in u32_dump() 1421 gpf = kzalloc(struct_size(gpf, kcnts, n->sel.nkeys), GFP_KERNEL); in u32_dump() 1431 for (i = 0; i < n->sel.nkeys; i++) in u32_dump() 1435 if (nla_put_64bit(skb, TCA_U32_PCNT, struct_size(gpf, kcnts, n->sel.nkeys), in u32_dump() [all...] |
/linux/include/net/tc_act/ |
H A D | tc_pedit.h | 44 int nkeys; in tcf_pedit_nkeys() local 48 nkeys = parms->tcfp_nkeys; in tcf_pedit_nkeys() 51 return nkeys; in tcf_pedit_nkeys()
|
/linux/tools/testing/selftests/net/tcp_ao/ |
H A D | setsockopt-closed.c | 173 get->nkeys = 1; in prepare_defs() 824 keys[0].nkeys = FILTER_TEST_NKEYS; in fetch_all_keys() 897 filtered_keys[0].nkeys = FILTER_TEST_NKEYS; in filter_keys_checked() 900 if (filtered_keys[0].nkeys != nexpected) { in filter_keys_checked() 902 filtered_keys[0].nkeys); in filter_keys_checked() 906 filtered_keys[0].nkeys)) { in filter_keys_checked() 937 for (int i = 0; i < original_keys[0].nkeys; i++) { in filter_tests() 950 for (int i = 0; i < original_keys[0].nkeys; i++) { in filter_tests() 964 for (int i = 0; i < original_keys[0].nkeys; i++) { in filter_tests() 984 filter.nkeys in filter_tests() [all...] |
H A D | key-management.c | 691 keys->nkeys = collection.nr_keys; in verify_keys() 724 dump_key = lookup_key(keys, keys->nkeys, sndid, rcvid); in verify_keys()
|
/linux/tools/testing/selftests/net/tcp_ao/lib/ |
H A D | sock.c | 244 tmp.nkeys = 1; in test_get_ao_keys_nr() 250 return (int)tmp.nkeys; in test_get_ao_keys_nr() 265 tmp.nkeys = 1; in test_get_one_ao() 270 if (tmp.nkeys != 1) in test_get_one_ao() 456 key_dump[0].nkeys = nr_keys; in test_get_tcp_counters()
|
/linux/drivers/net/ethernet/chelsio/cxgb4/ |
H A D | cxgb4_tc_u32.c | 55 for (i = 0; i < cls->knode.sel->nkeys; i++) { in fill_match_fields() 255 for (j = 0; j < cls->knode.sel->nkeys; j++) { in cxgb4_config_knode()
|
/linux/drivers/input/misc/ |
H A D | apanel.c | 57 u16 nkeys; member
|
/linux/drivers/net/ethernet/netronome/nfp/abm/ |
H A D | cls.c | 62 if (knode->sel->nkeys != 1) { in nfp_abm_u32_check_knode()
|
/linux/security/keys/ |
H A D | gc.c | 158 atomic_dec(&key->user->nkeys); in key_gc_unused_keys()
|
H A D | internal.h | 59 atomic_t nkeys; /* number of keys */ member
|
H A D | proc.c | 315 atomic_read(&user->nkeys), in proc_key_users_show()
|
H A D | key.c | 93 atomic_set(&candidate->nkeys, 0); in key_user_lookup() 322 atomic_inc(&user->nkeys); in key_alloc()
|
H A D | keyctl.c | 1031 atomic_dec(&key->user->nkeys); in keyctl_chown_key() 1032 atomic_inc(&newowner->nkeys); in keyctl_chown_key()
|
H A D | process_keys.c | 30 .nkeys = ATOMIC_INIT(2),
|
/linux/tools/include/uapi/linux/ |
H A D | pkt_cls.h | 175 unsigned char nkeys; member
|
/linux/include/uapi/linux/ |
H A D | tcp.h | 444 __u32 nkeys; /* in: size of the userspace buffer member
|
/linux/drivers/md/bcache/ |
H A D | journal.c | 851 unsigned int nkeys) in journal_wait_for_write() argument 866 sectors = __set_blocks(w->data, w->data->keys + nkeys, in journal_wait_for_write()
|
H A D | btree.c | 1322 gc->nkeys++; in btree_gc_mark_node()
|
/linux/drivers/net/ethernet/stmicro/stmmac/ |
H A D | stmmac_tc.c | 101 if (sel->nkeys <= 0 || sel->nkeys > 1) in tc_fill_entry()
|
H A D | stmmac_selftests.c | 1134 sel->nkeys = nk; in stmmac_test_rxp()
|
/linux/net/ipv4/ |
H A D | tcp_ao.c | 2085 * optval[0].nkeys is the size of the array in user space. On return it contains 2144 max_keys = opt_in.nkeys; in tcp_ao_copy_mkts_to_user() 2278 opt_out.nkeys = 0; in tcp_ao_copy_mkts_to_user() 2298 out_offset = offsetof(struct tcp_ao_getsockopt, nkeys); in tcp_ao_copy_mkts_to_user()
|
/linux/drivers/net/ethernet/marvell/ |
H A D | sky2.c | 1286 int i, nkeys = 4; in rx_set_rss() local 1290 nkeys = 10; in rx_set_rss() 1299 for (i = 0; i < nkeys; i++) in rx_set_rss()
|