Home
last modified time | relevance | path

Searched refs:vlen (Results 1 – 25 of 53) sorted by relevance

123

/linux-6.1.9/crypto/
Drsa_helper.c17 const void *value, size_t vlen) in rsa_get_n() argument
21 size_t n_sz = vlen; in rsa_get_n()
24 if (!value || !vlen) in rsa_get_n()
41 key->n_sz = vlen; in rsa_get_n()
47 const void *value, size_t vlen) in rsa_get_e() argument
52 if (!value || !key->n_sz || !vlen || vlen > key->n_sz) in rsa_get_e()
56 key->e_sz = vlen; in rsa_get_e()
62 const void *value, size_t vlen) in rsa_get_d() argument
67 if (!value || !key->n_sz || !vlen || vlen > key->n_sz) in rsa_get_d()
71 key->d_sz = vlen; in rsa_get_d()
[all …]
Decdsa.c36 const void *value, size_t vlen, unsigned int ndigits) in ecdsa_get_signature_rs() argument
39 ssize_t diff = vlen - keylen; in ecdsa_get_signature_rs()
43 if (!value || !vlen) in ecdsa_get_signature_rs()
54 vlen -= 1; in ecdsa_get_signature_rs()
69 memcpy(&rs[-diff], d, vlen); in ecdsa_get_signature_rs()
77 const void *value, size_t vlen) in ecdsa_get_signature_r() argument
81 return ecdsa_get_signature_rs(sig->r, hdrlen, tag, value, vlen, in ecdsa_get_signature_r()
86 const void *value, size_t vlen) in ecdsa_get_signature_s() argument
90 return ecdsa_get_signature_rs(sig->s, hdrlen, tag, value, vlen, in ecdsa_get_signature_s()
Decrdsa.c151 const void *value, size_t vlen) in ecrdsa_param_curve() argument
155 ctx->curve_oid = look_up_OID(value, vlen); in ecrdsa_param_curve()
164 const void *value, size_t vlen) in ecrdsa_param_digest() argument
167 int digest_oid = look_up_OID(value, vlen); in ecrdsa_param_digest()
175 const void *value, size_t vlen) in ecrdsa_parse_pub_key() argument
180 ctx->key_len = vlen; in ecrdsa_parse_pub_key()
Dsm2.c187 const void *value, size_t vlen) in sm2_get_signature_r() argument
191 if (!value || !vlen) in sm2_get_signature_r()
194 sig->sig_r = mpi_read_raw_data(value, vlen); in sm2_get_signature_r()
202 const void *value, size_t vlen) in sm2_get_signature_s() argument
206 if (!value || !vlen) in sm2_get_signature_s()
209 sig->sig_s = mpi_read_raw_data(value, vlen); in sm2_get_signature_s()
/linux-6.1.9/crypto/asymmetric_keys/
Dx509_cert_parser.c155 const void *value, size_t vlen) in x509_note_OID() argument
159 ctx->last_oid = look_up_OID(value, vlen); in x509_note_OID()
162 sprint_oid(value, vlen, buffer, sizeof(buffer)); in x509_note_OID()
175 const void *value, size_t vlen) in x509_note_tbs_certificate() argument
180 hdrlen, tag, (unsigned long)value - ctx->data, vlen); in x509_note_tbs_certificate()
183 ctx->cert->tbs_size = vlen + hdrlen; in x509_note_tbs_certificate()
191 const void *value, size_t vlen) in x509_note_sig_algo() argument
287 const void *value, size_t vlen) in x509_note_signature() argument
291 pr_debug("Signature: alg=%u, size=%zu\n", ctx->last_oid, vlen); in x509_note_signature()
309 if (vlen < 1 || *(const u8 *)value != 0) in x509_note_signature()
[all …]
Dpkcs7_parser.c206 const void *value, size_t vlen) in pkcs7_note_OID() argument
210 ctx->last_oid = look_up_OID(value, vlen); in pkcs7_note_OID()
213 sprint_oid(value, vlen, buffer, sizeof(buffer)); in pkcs7_note_OID()
225 const void *value, size_t vlen) in pkcs7_sig_note_digest_algo() argument
272 const void *value, size_t vlen) in pkcs7_sig_note_pkey_algo() argument
310 const void *value, size_t vlen) in pkcs7_check_content_type() argument
327 const void *value, size_t vlen) in pkcs7_note_signeddata_version() argument
332 if (vlen != 1) in pkcs7_note_signeddata_version()
361 const void *value, size_t vlen) in pkcs7_note_signerinfo_version() argument
366 if (vlen != 1) in pkcs7_note_signerinfo_version()
[all …]
Dmscode_parser.c38 const void *value, size_t vlen) in mscode_note_content_type() argument
42 oid = look_up_OID(value, vlen); in mscode_note_content_type()
46 sprint_oid(value, vlen, buffer, sizeof(buffer)); in mscode_note_content_type()
70 const void *value, size_t vlen) in mscode_note_digest_algo() argument
76 oid = look_up_OID(value, vlen); in mscode_note_digest_algo()
101 sprint_oid(value, vlen, buffer, sizeof(buffer)); in mscode_note_digest_algo()
118 const void *value, size_t vlen) in mscode_note_digest() argument
122 ctx->digest = kmemdup(value, vlen, GFP_KERNEL); in mscode_note_digest()
126 ctx->digest_len = vlen; in mscode_note_digest()
Dpkcs8_parser.c35 const void *value, size_t vlen) in pkcs8_note_OID() argument
39 ctx->last_oid = look_up_OID(value, vlen); in pkcs8_note_OID()
43 sprint_oid(value, vlen, buffer, sizeof(buffer)); in pkcs8_note_OID()
55 const void *value, size_t vlen) in pkcs8_note_version() argument
57 if (vlen != 1 || ((const u8 *)value)[0] != 0) { in pkcs8_note_version()
69 const void *value, size_t vlen) in pkcs8_note_algo() argument
85 const void *value, size_t vlen) in pkcs8_note_key() argument
90 ctx->key_size = vlen; in pkcs8_note_key()
/linux-6.1.9/fs/ksmbd/
Dasn1.c163 const void *value, size_t vlen) in ksmbd_gssapi_this_mech() argument
167 oid = look_up_OID(value, vlen); in ksmbd_gssapi_this_mech()
171 sprint_oid(value, vlen, buf, sizeof(buf)); in ksmbd_gssapi_this_mech()
181 size_t vlen) in ksmbd_neg_token_init_mech_type() argument
187 oid = look_up_OID(value, vlen); in ksmbd_neg_token_init_mech_type()
199 sprint_oid(value, vlen, buf, sizeof(buf)); in ksmbd_neg_token_init_mech_type()
213 size_t vlen) in ksmbd_neg_token_init_mech_token() argument
217 conn->mechToken = kmalloc(vlen + 1, GFP_KERNEL); in ksmbd_neg_token_init_mech_token()
221 memcpy(conn->mechToken, value, vlen); in ksmbd_neg_token_init_mech_token()
222 conn->mechToken[vlen] = '\0'; in ksmbd_neg_token_init_mech_token()
[all …]
/linux-6.1.9/fs/cifs/
Dasn1.c23 unsigned char tag, const void *value, size_t vlen) in cifs_gssapi_this_mech() argument
27 oid = look_up_OID(value, vlen); in cifs_gssapi_this_mech()
31 sprint_oid(value, vlen, buf, sizeof(buf)); in cifs_gssapi_this_mech()
41 const void *value, size_t vlen) in cifs_neg_token_init_mech_type() argument
46 oid = look_up_OID(value, vlen); in cifs_neg_token_init_mech_type()
58 sprint_oid(value, vlen, buf, sizeof(buf)); in cifs_neg_token_init_mech_type()
/linux-6.1.9/tools/testing/selftests/bpf/
Dbtf_helpers.c92 __u32 vlen; in fprintf_btf_type_raw() local
98 vlen = btf_vlen(t); in fprintf_btf_type_raw()
128 fprintf(out, " size=%u vlen=%u", t->size, vlen); in fprintf_btf_type_raw()
129 for (i = 0; i < vlen; i++, m++) { in fprintf_btf_type_raw()
147 btf_kflag(t) ? "SIGNED" : "UNSIGNED", t->size, vlen); in fprintf_btf_type_raw()
148 for (i = 0; i < vlen; i++, v++) { in fprintf_btf_type_raw()
161 btf_kflag(t) ? "SIGNED" : "UNSIGNED", t->size, vlen); in fprintf_btf_type_raw()
162 for (i = 0; i < vlen; i++, v++) { in fprintf_btf_type_raw()
178 fprintf(out, " ret_type_id=%u vlen=%u", t->type, vlen); in fprintf_btf_type_raw()
179 for (i = 0; i < vlen; i++, p++) { in fprintf_btf_type_raw()
[all …]
/linux-6.1.9/fs/
Dread_write.c907 unsigned long vlen, loff_t *pos, rwf_t flags) in vfs_readv() argument
914 ret = import_iovec(READ, vec, vlen, ARRAY_SIZE(iovstack), &iov, &iter); in vfs_readv()
924 unsigned long vlen, loff_t *pos, rwf_t flags) in vfs_writev() argument
931 ret = import_iovec(WRITE, vec, vlen, ARRAY_SIZE(iovstack), &iov, &iter); in vfs_writev()
942 unsigned long vlen, rwf_t flags) in do_readv() argument
953 ret = vfs_readv(f.file, vec, vlen, ppos, flags); in do_readv()
966 unsigned long vlen, rwf_t flags) in do_writev() argument
977 ret = vfs_writev(f.file, vec, vlen, ppos, flags); in do_writev()
996 unsigned long vlen, loff_t pos, rwf_t flags) in do_preadv() argument
1008 ret = vfs_readv(f.file, vec, vlen, &pos, flags); in do_preadv()
[all …]
/linux-6.1.9/tools/bpf/bpftool/
Dbtf.c164 __u16 vlen = BTF_INFO_VLEN(t->info); in dump_btf_type() local
169 jsonw_uint_field(w, "vlen", vlen); in dump_btf_type()
173 printf(" size=%u vlen=%u", t->size, vlen); in dump_btf_type()
175 for (i = 0; i < vlen; i++, m++) { in dump_btf_type()
210 __u16 vlen = BTF_INFO_VLEN(t->info); in dump_btf_type() local
218 jsonw_uint_field(w, "vlen", vlen); in dump_btf_type()
222 printf(" encoding=%s size=%u vlen=%u", encoding, t->size, vlen); in dump_btf_type()
224 for (i = 0; i < vlen; i++, v++) { in dump_btf_type()
248 __u16 vlen = btf_vlen(t); in dump_btf_type() local
256 jsonw_uint_field(w, "vlen", vlen); in dump_btf_type()
[all …]
Dbtf_dumper.c473 int i, vlen; in btf_dumper_struct() local
480 vlen = BTF_INFO_VLEN(t->info); in btf_dumper_struct()
484 for (i = 0; i < vlen; i++) { in btf_dumper_struct()
532 int ret = 0, i, vlen; in btf_dumper_datasec() local
538 vlen = BTF_INFO_VLEN(t->info); in btf_dumper_datasec()
544 for (i = 0; i < vlen; i++) { in btf_dumper_datasec()
714 int i, vlen; in btf_dump_func() local
721 vlen = BTF_INFO_VLEN(func_proto->info); in btf_dump_func()
722 for (i = 0; i < vlen; i++) { in btf_dump_func()
Dgen.c132 int i, err, off = 0, pad_cnt = 0, vlen = btf_vlen(sec); in codegen_datasec_def() local
143 for (i = 0; i < vlen; i++, sec_var++) { in codegen_datasec_def()
302 int i, err = 0, vlen; in codegen_subskel_datasecs() local
329 vlen = btf_vlen(sec); in codegen_subskel_datasecs()
330 for (i = 0; i < vlen; i++, sec_var++) { in codegen_subskel_datasecs()
473 int i, vlen; in codegen_asserts() local
501 vlen = btf_vlen(sec); in codegen_asserts()
503 for (i = 0; i < vlen; i++, sec_var++) { in codegen_asserts()
1893 __u16 vlen = btf_vlen(btf_type); in btfgen_mark_type_match() local
1898 for (i = 0; i < vlen; i++, m++) { in btfgen_mark_type_match()
[all …]
/linux-6.1.9/security/keys/trusted-keys/
Dtrusted_tpm2.c131 const void *value, size_t vlen) in tpm2_key_parent() argument
138 for (i = 0; i < vlen; i++) { in tpm2_key_parent()
148 const void *value, size_t vlen) in tpm2_key_type() argument
150 enum OID oid = look_up_OID(value, vlen); in tpm2_key_type()
155 sprint_oid(value, vlen, buffer, sizeof(buffer)); in tpm2_key_type()
166 const void *value, size_t vlen) in tpm2_key_pub() argument
171 ctx->pub_len = vlen; in tpm2_key_pub()
178 const void *value, size_t vlen) in tpm2_key_priv() argument
183 ctx->priv_len = vlen; in tpm2_key_priv()
/linux-6.1.9/tools/bpf/bpftool/Documentation/
Dbpftool-btf.rst101 [2] STRUCT 'dummy_tracepoint_args' size=16 vlen=2
156 [2] UNION 'my_union' size=48 vlen=2
160 [4] STRUCT 'my_struct' size=48 vlen=6
176 [14] ENUM 'my_enum' size=4 vlen=2
182 [18] FUNC_PROTO '(anon)' ret_type_id=3 vlen=2
189 [23] DATASEC 'data_sec' size=0 vlen=3
247 [104848] STRUCT 'i2c_smbus_alert' size=40 vlen=2
250 [104849] STRUCT 'alert_data' size=12 vlen=3
258 [104854] FUNC_PROTO '(anon)' ret_type_id=18 vlen=1
262 [104857] FUNC_PROTO '(anon)' ret_type_id=18 vlen=2
/linux-6.1.9/tools/lib/bpf/
Dbtf_dump.c314 __u16 vlen; in btf_dump_mark_referenced() local
318 vlen = btf_vlen(t); in btf_dump_mark_referenced()
351 for (j = 0; j < vlen; j++, m++) in btf_dump_mark_referenced()
358 for (j = 0; j < vlen; j++, p++) in btf_dump_mark_referenced()
365 for (j = 0; j < vlen; j++, v++) in btf_dump_mark_referenced()
483 __u16 vlen; in btf_dump_order_type() local
527 vlen = btf_vlen(t); in btf_dump_order_type()
528 for (i = 0; i < vlen; i++, m++) { in btf_dump_order_type()
593 vlen = btf_vlen(t); in btf_dump_order_type()
594 for (i = 0; i < vlen; i++, p++) { in btf_dump_order_type()
[all …]
Dbtf.c291 __u16 vlen = btf_vlen(t); in btf_type_size() local
307 return base_size + vlen * sizeof(struct btf_enum); in btf_type_size()
309 return base_size + vlen * sizeof(struct btf_enum64); in btf_type_size()
314 return base_size + vlen * sizeof(struct btf_member); in btf_type_size()
316 return base_size + vlen * sizeof(struct btf_param); in btf_type_size()
320 return base_size + vlen * sizeof(struct btf_var_secinfo); in btf_type_size()
344 __u16 vlen = btf_vlen(t); in btf_bswap_type_rest() local
362 for (i = 0, e = btf_enum(t); i < vlen; i++, e++) { in btf_bswap_type_rest()
368 for (i = 0, e64 = btf_enum64(t); i < vlen; i++, e64++) { in btf_bswap_type_rest()
382 for (i = 0, m = btf_members(t); i < vlen; i++, m++) { in btf_bswap_type_rest()
[all …]
/linux-6.1.9/fs/xfs/libxfs/
Dxfs_attr_sf.h33 static inline int xfs_attr_sf_entsize_byname(uint8_t nlen, uint8_t vlen) in xfs_attr_sf_entsize_byname() argument
35 return sizeof(struct xfs_attr_sf_entry) + nlen + vlen; in xfs_attr_sf_entsize_byname()
/linux-6.1.9/net/
Dcompat.c356 unsigned int vlen, unsigned int flags) in __compat_sys_sendmmsg() argument
358 return __sys_sendmmsg(fd, (struct mmsghdr __user *)mmsg, vlen, in __compat_sys_sendmmsg()
363 unsigned int, vlen, unsigned int, flags) in COMPAT_SYSCALL_DEFINE4() argument
365 return __compat_sys_sendmmsg(fd, mmsg, vlen, flags); in COMPAT_SYSCALL_DEFINE4()
404 unsigned int, vlen, unsigned int, flags, in COMPAT_SYSCALL_DEFINE5() argument
407 return __sys_recvmmsg(fd, (struct mmsghdr __user *)mmsg, vlen, in COMPAT_SYSCALL_DEFINE5()
413 unsigned int, vlen, unsigned int, flags, in COMPAT_SYSCALL_DEFINE5() argument
416 return __sys_recvmmsg(fd, (struct mmsghdr __user *)mmsg, vlen, in COMPAT_SYSCALL_DEFINE5()
/linux-6.1.9/drivers/crypto/qat/qat_common/
Dqat_asym_algs.c930 size_t vlen) in qat_rsa_set_n() argument
937 while (!*ptr && vlen) { in qat_rsa_set_n()
939 vlen--; in qat_rsa_set_n()
942 ctx->key_sz = vlen; in qat_rsa_set_n()
962 size_t vlen) in qat_rsa_set_e() argument
968 while (!*ptr && vlen) { in qat_rsa_set_e()
970 vlen--; in qat_rsa_set_e()
973 if (!ctx->key_sz || !vlen || vlen > ctx->key_sz) { in qat_rsa_set_e()
982 memcpy(ctx->e + (ctx->key_sz - vlen), ptr, vlen); in qat_rsa_set_e()
987 size_t vlen) in qat_rsa_set_d() argument
[all …]
/linux-6.1.9/Documentation/bpf/
Dbtf.rst100 * bits 0-15: vlen (e.g. # of struct's members)
132 * ``info.vlen``: 0
184 * ``info.vlen``: 0
196 * ``info.vlen``: 0
241 * ``info.vlen``: the number of struct/union members
244 ``btf_type`` is followed by ``info.vlen`` number of ``struct btf_member``.::
287 * ``info.vlen``: number of enum values
290 ``btf_type`` is followed by ``info.vlen`` number of ``struct btf_enum``.::
312 * ``info.vlen``: 0
324 * ``info.vlen``: 0
[all …]
/linux-6.1.9/arch/um/drivers/
Dvector_user.h91 unsigned int vlen,
97 unsigned int vlen,
/linux-6.1.9/include/linux/
Dcompat.h639 compat_ulong_t vlen, u32 pos_low, u32 pos_high);
642 compat_ulong_t vlen, u32 pos_low, u32 pos_high);
646 unsigned long vlen, loff_t pos);
652 unsigned long vlen, loff_t pos);
836 unsigned vlen, unsigned int flags,
839 unsigned vlen, unsigned int flags,
850 unsigned vlen, unsigned int flags);
856 compat_ulong_t vlen, u32 pos_low, u32 pos_high, rwf_t flags);
859 compat_ulong_t vlen, u32 pos_low, u32 pos_high, rwf_t flags);
863 unsigned long vlen, loff_t pos, rwf_t flags);
[all …]

123