Home
last modified time | relevance | path

Searched full:vlen (Results 1 – 25 of 85) sorted by relevance

1234

/linux-6.14.4/crypto/
Drsa_helper.c17 const void *value, size_t vlen) in rsa_get_n() argument
21 size_t n_sz = vlen; in rsa_get_n()
24 if (!value || !vlen) in rsa_get_n()
41 key->n_sz = vlen; in rsa_get_n()
47 const void *value, size_t vlen) in rsa_get_e() argument
52 if (!value || !key->n_sz || !vlen || vlen > key->n_sz) in rsa_get_e()
56 key->e_sz = vlen; in rsa_get_e()
62 const void *value, size_t vlen) in rsa_get_d() argument
67 if (!value || !key->n_sz || !vlen || vlen > key->n_sz) in rsa_get_d()
71 key->d_sz = vlen; in rsa_get_d()
[all …]
Decdsa-x962.c30 const void *value, size_t vlen, in ecdsa_get_signature_rs() argument
36 if (!value || !vlen || vlen > bufsize + 1) in ecdsa_get_signature_rs()
40 * vlen may be 1 byte larger than bufsize due to a leading zero byte in ecdsa_get_signature_rs()
43 if (vlen > bufsize) { in ecdsa_get_signature_rs()
46 vlen -= 1; in ecdsa_get_signature_rs()
53 ecc_digits_from_bytes(d, vlen, dest, ndigits); in ecdsa_get_signature_rs()
59 const void *value, size_t vlen) in ecdsa_get_signature_r() argument
63 return ecdsa_get_signature_rs(sig_ctx->sig.r, hdrlen, tag, value, vlen, in ecdsa_get_signature_r()
68 const void *value, size_t vlen) in ecdsa_get_signature_s() argument
72 return ecdsa_get_signature_rs(sig_ctx->sig.s, hdrlen, tag, value, vlen, in ecdsa_get_signature_s()
Decrdsa.c143 const void *value, size_t vlen) in ecrdsa_param_curve() argument
147 ctx->curve_oid = look_up_OID(value, vlen); in ecrdsa_param_curve()
156 const void *value, size_t vlen) in ecrdsa_param_digest() argument
159 int digest_oid = look_up_OID(value, vlen); in ecrdsa_param_digest()
167 const void *value, size_t vlen) in ecrdsa_parse_pub_key() argument
172 ctx->key_len = vlen; in ecrdsa_parse_pub_key()
/linux-6.14.4/crypto/asymmetric_keys/
Dx509_cert_parser.c143 const void *value, size_t vlen) in x509_note_OID() argument
147 ctx->last_oid = look_up_OID(value, vlen); in x509_note_OID()
150 sprint_oid(value, vlen, buffer, sizeof(buffer)); in x509_note_OID()
163 const void *value, size_t vlen) in x509_note_tbs_certificate() argument
168 hdrlen, tag, (unsigned long)value - ctx->data, vlen); in x509_note_tbs_certificate()
171 ctx->cert->tbs_size = vlen + hdrlen; in x509_note_tbs_certificate()
179 const void *value, size_t vlen) in x509_note_sig_algo() argument
284 const void *value, size_t vlen) in x509_note_signature() argument
288 pr_debug("Signature: alg=%u, size=%zu\n", ctx->last_oid, vlen); in x509_note_signature()
305 if (vlen < 1 || *(const u8 *)value != 0) in x509_note_signature()
[all …]
Dpkcs7_parser.c206 const void *value, size_t vlen) in pkcs7_note_OID() argument
210 ctx->last_oid = look_up_OID(value, vlen); in pkcs7_note_OID()
213 sprint_oid(value, vlen, buffer, sizeof(buffer)); in pkcs7_note_OID()
225 const void *value, size_t vlen) in pkcs7_sig_note_digest_algo() argument
275 const void *value, size_t vlen) in pkcs7_sig_note_pkey_algo() argument
312 const void *value, size_t vlen) in pkcs7_check_content_type() argument
329 const void *value, size_t vlen) in pkcs7_note_signeddata_version() argument
334 if (vlen != 1) in pkcs7_note_signeddata_version()
363 const void *value, size_t vlen) in pkcs7_note_signerinfo_version() argument
368 if (vlen != 1) in pkcs7_note_signerinfo_version()
[all …]
Dmscode_parser.c38 const void *value, size_t vlen) in mscode_note_content_type() argument
42 oid = look_up_OID(value, vlen); in mscode_note_content_type()
46 sprint_oid(value, vlen, buffer, sizeof(buffer)); in mscode_note_content_type()
70 const void *value, size_t vlen) in mscode_note_digest_algo() argument
76 oid = look_up_OID(value, vlen); in mscode_note_digest_algo()
101 sprint_oid(value, vlen, buffer, sizeof(buffer)); in mscode_note_digest_algo()
118 const void *value, size_t vlen) in mscode_note_digest() argument
122 ctx->digest = kmemdup(value, vlen, GFP_KERNEL); in mscode_note_digest()
126 ctx->digest_len = vlen; in mscode_note_digest()
Dpkcs8_parser.c35 const void *value, size_t vlen) in pkcs8_note_OID() argument
39 ctx->last_oid = look_up_OID(value, vlen); in pkcs8_note_OID()
43 sprint_oid(value, vlen, buffer, sizeof(buffer)); in pkcs8_note_OID()
55 const void *value, size_t vlen) in pkcs8_note_version() argument
57 if (vlen != 1 || ((const u8 *)value)[0] != 0) { in pkcs8_note_version()
69 const void *value, size_t vlen) in pkcs8_note_algo() argument
85 const void *value, size_t vlen) in pkcs8_note_key() argument
90 ctx->key_size = vlen; in pkcs8_note_key()
/linux-6.14.4/tools/testing/selftests/bpf/prog_tests/
Dbtf_distill.c72 "[3] STRUCT 's1' size=8 vlen=1\n" in test_distilled_base()
74 "[4] STRUCT '(anon)' size=12 vlen=2\n" in test_distilled_base()
78 "[6] UNION 'u1' size=12 vlen=2\n" in test_distilled_base()
81 "[7] UNION '(anon)' size=4 vlen=1\n" in test_distilled_base()
83 "[8] ENUM 'e1' encoding=UNSIGNED size=4 vlen=1\n" in test_distilled_base()
85 "[9] ENUM '(anon)' encoding=UNSIGNED size=4 vlen=1\n" in test_distilled_base()
87 "[10] ENUM64 'e641' encoding=SIGNED size=8 vlen=1\n" in test_distilled_base()
89 "[11] ENUM64 '(anon)' encoding=SIGNED size=8 vlen=1\n" in test_distilled_base()
91 "[12] STRUCT 'unneeded' size=4 vlen=1\n" in test_distilled_base()
93 "[13] STRUCT 'embedded' size=4 vlen=1\n" in test_distilled_base()
[all …]
Dbtf_dedup_split.c28 "[3] STRUCT 's1' size=4 vlen=1\n" in test_split_simple()
70 "[3] STRUCT 's1' size=4 vlen=1\n" in test_split_simple()
72 "[4] STRUCT 's2' size=16 vlen=3\n" in test_split_simple()
77 "[6] STRUCT 's1' size=4 vlen=1\n" in test_split_simple()
103 "[3] STRUCT 's1' size=4 vlen=1\n" in test_split_simple()
105 "[4] STRUCT 's2' size=16 vlen=3\n" in test_split_simple()
156 "[4] STRUCT 's1' size=16 vlen=2\n" in test_split_fwd_resolve()
159 "[5] STRUCT 's2' size=4 vlen=1\n" in test_split_fwd_resolve()
161 "[6] STRUCT 's3' size=4 vlen=1\n" in test_split_fwd_resolve()
184 "[4] STRUCT 's1' size=16 vlen=2\n" in test_split_fwd_resolve()
[all …]
Dbtf_write.c125 "[7] STRUCT 's1' size=8 vlen=2\n" in gen_btf()
152 "[8] UNION 'u1' size=8 vlen=1\n" in gen_btf()
175 "[9] ENUM 'e1' encoding=UNSIGNED size=4 vlen=2\n" in gen_btf()
206 "[12] ENUM 'enum_fwd' encoding=UNSIGNED size=4 vlen=0", "raw_dump"); in gen_btf()
247 "[15] FUNC_PROTO '(anon)' ret_type_id=1 vlen=2\n" in gen_btf()
278 "[17] DATASEC 'datasec1' size=12 vlen=1\n" in gen_btf()
333 "[21] ENUM64 'e1' encoding=SIGNED size=8 vlen=2\n" in gen_btf()
351 "[22] ENUM64 'e1' encoding=UNSIGNED size=8 vlen=1\n" in gen_btf()
373 "[7] STRUCT 's1' size=8 vlen=2\n" in test_btf_add()
376 "[8] UNION 'u1' size=8 vlen=1\n" in test_btf_add()
[all …]
Dbtf_field_iter.c97 "[5] STRUCT 's1' size=12 vlen=2\n" in test_btf_field_iter()
100 "[6] UNION 'u1' size=12 vlen=2\n" in test_btf_field_iter()
103 "[7] ENUM 'e1' encoding=UNSIGNED size=4 vlen=2\n" in test_btf_field_iter()
111 "[13] FUNC_PROTO '(anon)' ret_type_id=1 vlen=2\n" in test_btf_field_iter()
120 "[20] ENUM64 'e64' encoding=SIGNED size=8 vlen=3\n" in test_btf_field_iter()
124 "[21] DATASEC 'datasec1' size=12 vlen=2\n" in test_btf_field_iter()
/linux-6.14.4/fs/smb/server/
Dasn1.c163 const void *value, size_t vlen) in ksmbd_gssapi_this_mech() argument
167 oid = look_up_OID(value, vlen); in ksmbd_gssapi_this_mech()
171 sprint_oid(value, vlen, buf, sizeof(buf)); in ksmbd_gssapi_this_mech()
181 size_t vlen) in ksmbd_neg_token_init_mech_type() argument
187 oid = look_up_OID(value, vlen); in ksmbd_neg_token_init_mech_type()
199 sprint_oid(value, vlen, buf, sizeof(buf)); in ksmbd_neg_token_init_mech_type()
213 size_t vlen) in ksmbd_neg_token_alloc() argument
217 if (!vlen) in ksmbd_neg_token_alloc()
220 conn->mechToken = kmemdup_nul(value, vlen, KSMBD_DEFAULT_GFP); in ksmbd_neg_token_alloc()
224 conn->mechTokenLen = (unsigned int)vlen; in ksmbd_neg_token_alloc()
[all …]
/linux-6.14.4/tools/testing/selftests/bpf/
Dbtf_helpers.c92 __u32 vlen; in fprintf_btf_type_raw() local
98 vlen = btf_vlen(t); in fprintf_btf_type_raw()
128 fprintf(out, " size=%u vlen=%u", t->size, vlen); in fprintf_btf_type_raw()
129 for (i = 0; i < vlen; i++, m++) { in fprintf_btf_type_raw()
146 fprintf(out, " encoding=%s size=%u vlen=%u", in fprintf_btf_type_raw()
147 btf_kflag(t) ? "SIGNED" : "UNSIGNED", t->size, vlen); in fprintf_btf_type_raw()
148 for (i = 0; i < vlen; i++, v++) { in fprintf_btf_type_raw()
160 fprintf(out, " encoding=%s size=%u vlen=%u", in fprintf_btf_type_raw()
161 btf_kflag(t) ? "SIGNED" : "UNSIGNED", t->size, vlen); in fprintf_btf_type_raw()
162 for (i = 0; i < vlen; i++, v++) { in fprintf_btf_type_raw()
[all …]
/linux-6.14.4/fs/smb/client/
Dasn1.c23 unsigned char tag, const void *value, size_t vlen) in cifs_gssapi_this_mech() argument
27 oid = look_up_OID(value, vlen); in cifs_gssapi_this_mech()
31 sprint_oid(value, vlen, buf, sizeof(buf)); in cifs_gssapi_this_mech()
41 const void *value, size_t vlen) in cifs_neg_token_init_mech_type() argument
46 oid = look_up_OID(value, vlen); in cifs_neg_token_init_mech_type()
60 sprint_oid(value, vlen, buf, sizeof(buf)); in cifs_neg_token_init_mech_type()
/linux-6.14.4/drivers/crypto/starfive/
Djh7110-rsa.c349 const char *value, size_t vlen) in starfive_rsa_set_n() argument
355 while (!*ptr && vlen) { in starfive_rsa_set_n()
357 vlen--; in starfive_rsa_set_n()
359 rsa_key->key_sz = vlen; in starfive_rsa_set_n()
380 const char *value, size_t vlen) in starfive_rsa_set_e() argument
386 while (!*ptr && vlen) { in starfive_rsa_set_e()
388 vlen--; in starfive_rsa_set_e()
392 if (!rsa_key->key_sz || !vlen || vlen > rsa_key->key_sz) { in starfive_rsa_set_e()
406 rsa_key->e_bitlen = (vlen - 1) * 8 + loop; in starfive_rsa_set_e()
408 memcpy(rsa_key->e + (rsa_key->key_sz - vlen), ptr, vlen); in starfive_rsa_set_e()
[all …]
/linux-6.14.4/fs/
Dread_write.c984 unsigned long vlen, loff_t *pos, rwf_t flags) in vfs_readv() argument
997 ret = import_iovec(ITER_DEST, vec, vlen, ARRAY_SIZE(iovstack), &iov, in vfs_readv()
1022 unsigned long vlen, loff_t *pos, rwf_t flags) in vfs_writev() argument
1035 ret = import_iovec(ITER_SOURCE, vec, vlen, ARRAY_SIZE(iovstack), &iov, in vfs_writev()
1062 unsigned long vlen, rwf_t flags) in do_readv() argument
1073 ret = vfs_readv(fd_file(f), vec, vlen, ppos, flags); in do_readv()
1085 unsigned long vlen, rwf_t flags) in do_writev() argument
1096 ret = vfs_writev(fd_file(f), vec, vlen, ppos, flags); in do_writev()
1114 unsigned long vlen, loff_t pos, rwf_t flags) in do_preadv() argument
1125 ret = vfs_readv(fd_file(f), vec, vlen, &pos, flags); in do_preadv()
[all …]
/linux-6.14.4/tools/bpf/bpftool/
Dbtf.c181 __u16 vlen = BTF_INFO_VLEN(t->info); in dump_btf_type() local
186 jsonw_uint_field(w, "vlen", vlen); in dump_btf_type()
190 printf(" size=%u vlen=%u", t->size, vlen); in dump_btf_type()
192 for (i = 0; i < vlen; i++, m++) { in dump_btf_type()
227 __u16 vlen = BTF_INFO_VLEN(t->info); in dump_btf_type() local
235 jsonw_uint_field(w, "vlen", vlen); in dump_btf_type()
239 printf(" encoding=%s size=%u vlen=%u", encoding, t->size, vlen); in dump_btf_type()
241 for (i = 0; i < vlen; i++, v++) { in dump_btf_type()
265 __u16 vlen = btf_vlen(t); in dump_btf_type() local
273 jsonw_uint_field(w, "vlen", vlen); in dump_btf_type()
[all …]
/linux-6.14.4/Documentation/bpf/
Dbtf.rst100 * bits 0-15: vlen (e.g. # of struct's members)
132 * ``info.vlen``: 0
184 * ``info.vlen``: 0
196 * ``info.vlen``: 0
241 * ``info.vlen``: the number of struct/union members
244 ``btf_type`` is followed by ``info.vlen`` number of ``struct btf_member``.::
285 * ``info.vlen``: number of enum values
288 ``btf_type`` is followed by ``info.vlen`` number of ``struct btf_enum``.::
310 * ``info.vlen``: 0
322 * ``info.vlen``: 0
[all …]
/linux-6.14.4/tools/bpf/bpftool/Documentation/
Dbpftool-btf.rst102 [2] STRUCT 'dummy_tracepoint_args' size=16 vlen=2
157 [2] UNION 'my_union' size=48 vlen=2
161 [4] STRUCT 'my_struct' size=48 vlen=6
177 [14] ENUM 'my_enum' size=4 vlen=2
183 [18] FUNC_PROTO '(anon)' ret_type_id=3 vlen=2
190 [23] DATASEC 'data_sec' size=0 vlen=3
248 [104848] STRUCT 'i2c_smbus_alert' size=40 vlen=2
251 [104849] STRUCT 'alert_data' size=12 vlen=3
259 [104854] FUNC_PROTO '(anon)' ret_type_id=18 vlen=1
263 [104857] FUNC_PROTO '(anon)' ret_type_id=18 vlen=2
/linux-6.14.4/include/uapi/linux/
Dbtf.h34 * bits 0-15: vlen (e.g. # of struct's members)
102 * The exact number of btf_enum is stored in the vlen (of the
119 * of btf_member is stored in the vlen (of the info in
142 * The exact number of btf_param is stored in the vlen (of the
184 * or argument (0 ... vlen-1).
191 * The exact number of btf_enum64 is stored in the vlen (of the
/linux-6.14.4/tools/include/uapi/linux/
Dbtf.h34 * bits 0-15: vlen (e.g. # of struct's members)
102 * The exact number of btf_enum is stored in the vlen (of the
119 * of btf_member is stored in the vlen (of the info in
142 * The exact number of btf_param is stored in the vlen (of the
184 * or argument (0 ... vlen-1).
191 * The exact number of btf_enum64 is stored in the vlen (of the
/linux-6.14.4/security/keys/trusted-keys/
Dtrusted_tpm2.c144 const void *value, size_t vlen) in tpm2_key_parent() argument
151 for (i = 0; i < vlen; i++) { in tpm2_key_parent()
161 const void *value, size_t vlen) in tpm2_key_type() argument
163 enum OID oid = look_up_OID(value, vlen); in tpm2_key_type()
168 sprint_oid(value, vlen, buffer, sizeof(buffer)); in tpm2_key_type()
179 const void *value, size_t vlen) in tpm2_key_pub() argument
184 ctx->pub_len = vlen; in tpm2_key_pub()
191 const void *value, size_t vlen) in tpm2_key_priv() argument
196 ctx->priv_len = vlen; in tpm2_key_priv()
/linux-6.14.4/drivers/crypto/intel/qat/qat_common/
Dqat_asym_algs.c983 size_t vlen) in qat_rsa_set_n() argument
990 while (!*ptr && vlen) { in qat_rsa_set_n()
992 vlen--; in qat_rsa_set_n()
995 ctx->key_sz = vlen; in qat_rsa_set_n()
1015 size_t vlen) in qat_rsa_set_e() argument
1021 while (!*ptr && vlen) { in qat_rsa_set_e()
1023 vlen--; in qat_rsa_set_e()
1026 if (!ctx->key_sz || !vlen || vlen > ctx->key_sz) { in qat_rsa_set_e()
1035 memcpy(ctx->e + (ctx->key_sz - vlen), ptr, vlen); in qat_rsa_set_e()
1040 size_t vlen) in qat_rsa_set_d() argument
[all …]
/linux-6.14.4/tools/lib/bpf/
Dbtf_dump.c316 __u16 vlen; in btf_dump_mark_referenced() local
320 vlen = btf_vlen(t); in btf_dump_mark_referenced()
353 for (j = 0; j < vlen; j++, m++) in btf_dump_mark_referenced()
360 for (j = 0; j < vlen; j++, p++) in btf_dump_mark_referenced()
367 for (j = 0; j < vlen; j++, v++) in btf_dump_mark_referenced()
485 __u16 vlen; in btf_dump_order_type() local
529 vlen = btf_vlen(t); in btf_dump_order_type()
530 for (i = 0; i < vlen; i++, m++) { in btf_dump_order_type()
595 vlen = btf_vlen(t); in btf_dump_order_type()
596 for (i = 0; i < vlen; i++, p++) { in btf_dump_order_type()
[all …]
/linux-6.14.4/net/
Dcompat.c358 unsigned int vlen, unsigned int flags) in __compat_sys_sendmmsg() argument
360 return __sys_sendmmsg(fd, (struct mmsghdr __user *)mmsg, vlen, in __compat_sys_sendmmsg()
365 unsigned int, vlen, unsigned int, flags) in COMPAT_SYSCALL_DEFINE4() argument
367 return __compat_sys_sendmmsg(fd, mmsg, vlen, flags); in COMPAT_SYSCALL_DEFINE4()
406 unsigned int, vlen, unsigned int, flags, in COMPAT_SYSCALL_DEFINE5() argument
409 return __sys_recvmmsg(fd, (struct mmsghdr __user *)mmsg, vlen, in COMPAT_SYSCALL_DEFINE5()
415 unsigned int, vlen, unsigned int, flags, in COMPAT_SYSCALL_DEFINE5() argument
418 return __sys_recvmmsg(fd, (struct mmsghdr __user *)mmsg, vlen, in COMPAT_SYSCALL_DEFINE5()

1234