/openbmc/linux/lib/ |
H A D | decompress_unlzo.c | 41 STATIC inline long INIT parse_header(u8 *input, long *skip, long in_len) in parse_header() argument 45 u8 *end = input + in_len; in parse_header() 53 if (in_len < HEADER_SIZE_MIN) in parse_header() 97 STATIC int INIT unlzo(u8 *input, long in_len, in unlzo() argument 151 in_len = fill(in_buf, HEADER_SIZE_MAX); in unlzo() 154 if (!parse_header(in_buf, &skip, in_len)) { in unlzo() 159 in_len -= skip; in unlzo() 163 memcpy(in_buf_save, in_buf, in_len); in unlzo() 172 if (fill && in_len < 4) { in unlzo() 173 skip = fill(in_buf + in_len, 4 - in_len); in unlzo() [all …]
|
H A D | decompress_unzstd.c | 125 static int INIT decompress_single(const u8 *in_buf, long in_len, u8 *out_buf, in decompress_single() argument 144 ret = zstd_find_frame_compressed_size(in_buf, in_len); in decompress_single() 148 in_len = (long)ret; in decompress_single() 150 ret = zstd_decompress_dctx(dctx, out_buf, out_len, in_buf, in_len); in decompress_single() 156 *in_pos = in_len; in decompress_single() 165 static int INIT __unzstd(unsigned char *in_buf, long in_len, in __unzstd() argument 196 return decompress_single(in_buf, in_len, out_buf, out_len, in __unzstd() 212 in_len = 0; in __unzstd() 216 in_len = fill(in_buf, ZSTD_IOBUF_SIZE); in __unzstd() 217 if (in_len < 0) { in __unzstd() [all …]
|
H A D | decompress_unlz4.c | 31 STATIC inline int INIT unlz4(u8 *input, long in_len, in unlz4() argument 43 long size = in_len; in unlz4() 45 size_t out_len = get_unaligned_le32(input + in_len); in unlz4() 207 STATIC int INIT __decompress(unsigned char *buf, long in_len, in __decompress() argument 215 return unlz4(buf, in_len - 4, fill, flush, output, posp, error); in __decompress()
|
/openbmc/qemu/hw/misc/macio/ |
H A D | pmu.c | 106 const uint8_t *in_data, uint8_t in_len, in pmu_cmd_int_ack() argument 109 if (in_len != 0) { in pmu_cmd_int_ack() 112 in_len); in pmu_cmd_int_ack() 138 const uint8_t *in_data, uint8_t in_len, in pmu_cmd_set_int_mask() argument 141 if (in_len != 1) { in pmu_cmd_set_int_mask() 144 in_len); in pmu_cmd_set_int_mask() 169 const uint8_t *in_data, uint8_t in_len, in pmu_cmd_adb() argument 175 if (in_len < 2) { in pmu_cmd_adb() 178 in_len); in pmu_cmd_adb() 193 if (in_len != 4) { in pmu_cmd_adb() [all …]
|
H A D | cuda.c | 223 const uint8_t *in_args, int in_len, 228 const uint8_t *in_data, int in_len, in cuda_cmd_autopoll() argument 234 if (in_len != 1) { in cuda_cmd_autopoll() 245 const uint8_t *in_data, int in_len, in cuda_cmd_set_autorate() argument 250 if (in_len != 1) { in cuda_cmd_set_autorate() 265 const uint8_t *in_data, int in_len, in cuda_cmd_set_device_list() argument 271 if (in_len != 2) { in cuda_cmd_set_device_list() 282 const uint8_t *in_data, int in_len, in cuda_cmd_powerdown() argument 285 if (in_len != 0) { in cuda_cmd_powerdown() 294 const uint8_t *in_data, int in_len, in cuda_cmd_reset_system() argument [all …]
|
/openbmc/qemu/hw/char/ |
H A D | terminal3270.c | 36 int in_len; member 50 return INPUT_BUFFER_SIZE - t->in_len; in DECLARE_INSTANCE_CHECKER() 104 assert(size <= (INPUT_BUFFER_SIZE - t->in_len)); in terminal_read() 108 memcpy(&t->inv[t->in_len], buf, size); in terminal_read() 109 t->in_len += size; in terminal_read() 110 if (t->in_len < 2) { in terminal_read() 121 if (t->in_len > 6 && t->inv[2] == 0x18 && t->inv[3] == 0x0 && in terminal_read() 122 t->inv[t->in_len - 2] == IAC && t->inv[t->in_len - 1] == IAC_SE) { in terminal_read() 124 t->in_len = 0; in terminal_read() 129 for (end = 0; end < t->in_len - 1; end++) { in terminal_read() [all …]
|
/openbmc/linux/fs/ubifs/ |
H A D | compress.c | 102 int in_len, void *out_buf, int *out_len, int *compr_type) in ubifs_compress() argument 111 if (in_len < UBIFS_MIN_COMPR_LEN) in ubifs_compress() 116 err = crypto_comp_compress(compr->cc, in_buf, in_len, out_buf, in ubifs_compress() 122 in_len, compr->name, err); in ubifs_compress() 130 if (in_len - *out_len < UBIFS_MIN_COMPRESS_DIFF) in ubifs_compress() 136 memcpy(out_buf, in_buf, in_len); in ubifs_compress() 137 *out_len = in_len; in ubifs_compress() 154 int in_len, void *out_buf, int *out_len, int compr_type) in ubifs_decompress() argument 172 memcpy(out_buf, in_buf, in_len); in ubifs_decompress() 173 *out_len = in_len; in ubifs_decompress() [all …]
|
H A D | crypto.c | 39 unsigned int in_len, unsigned int *out_len, int block) in ubifs_encrypt() argument 43 unsigned int pad_len = round_up(in_len, UBIFS_CIPHER_BLOCK_SIZE); in ubifs_encrypt() 47 dn->compr_size = cpu_to_le16(in_len); in ubifs_encrypt() 50 if (pad_len != in_len) in ubifs_encrypt() 51 memset(p + in_len, 0, pad_len - in_len); in ubifs_encrypt()
|
/openbmc/qemu/migration/ |
H A D | multifd-qatzip.c | 35 uint32_t in_len; member 93 q->in_len = MULTIFD_PACKET_SIZE; in qatzip_send_setup() 100 q->in_buf = qzMalloc(q->in_len, 0, PINNED_MEM); in qatzip_send_setup() 102 q->in_buf = qzMalloc(q->in_len, 0, COMMON_MEM); in qatzip_send_setup() 167 unsigned int in_len, out_len; in qatzip_send_prepare() local 188 in_len = pages->normal_num * page_size; in qatzip_send_prepare() 189 if (in_len > q->in_len) { in qatzip_send_prepare() 195 ret = qzCompress(&q->sess, q->in_buf, &in_len, q->out_buf, &out_len, 1); in qatzip_send_prepare() 201 if (in_len != pages->normal_num * page_size) { in qatzip_send_prepare() 261 q->in_len = MULTIFD_PACKET_SIZE * 2; in qatzip_recv_setup() [all …]
|
/openbmc/qemu/util/ |
H A D | base64.c | 29 size_t in_len, in qbase64_decode() argument 35 if (in_len != -1) { in qbase64_decode() 37 if (input[in_len] != '\0') { in qbase64_decode() 43 if (memchr(input, '\0', in_len) != NULL) { in qbase64_decode() 51 in_len = strlen(input); in qbase64_decode() 54 if (strspn(input, base64_valid_chars) != in_len) { in qbase64_decode()
|
/openbmc/qemu/crypto/ |
H A D | akcipher.c | 50 const void *in, size_t in_len, in qcrypto_akcipher_encrypt() argument 55 return drv->encrypt(akcipher, in, in_len, out, out_len, errp); in qcrypto_akcipher_encrypt() 59 const void *in, size_t in_len, in qcrypto_akcipher_decrypt() argument 64 return drv->decrypt(akcipher, in, in_len, out, out_len, errp); in qcrypto_akcipher_decrypt() 68 const void *in, size_t in_len, in qcrypto_akcipher_sign() argument 73 return drv->sign(akcipher, in, in_len, out, out_len, errp); in qcrypto_akcipher_sign() 77 const void *in, size_t in_len, in qcrypto_akcipher_verify() argument 82 return drv->verify(akcipher, in, in_len, in2, in2_len, errp); in qcrypto_akcipher_verify()
|
H A D | akcipherpriv.h | 41 const void *in, size_t in_len, 45 void *in, size_t in_len, Error **errp); 47 const void *in, size_t in_len, 50 const void *in, size_t in_len,
|
/openbmc/u-boot/fs/btrfs/ |
H A D | compression.c | 15 u32 tot_len, in_len, res; in decompress_lzo() local 35 in_len = le32_to_cpu(get_unaligned((u32 *)cbuf)); in decompress_lzo() 39 if (in_len > clen || tot_len < 4 + in_len) in decompress_lzo() 42 tot_len -= 4 + in_len; in decompress_lzo() 45 ret = lzo1x_decompress_safe(cbuf, in_len, dbuf, &out_len); in decompress_lzo() 49 cbuf += in_len; in decompress_lzo() 50 clen -= in_len; in decompress_lzo()
|
/openbmc/qemu/scsi/ |
H A D | utils.c | 95 SCSISense scsi_parse_sense_buf(const uint8_t *in_buf, int in_len) in scsi_parse_sense_buf() argument 100 assert(in_len > 0); in scsi_parse_sense_buf() 103 if (in_len < 14) { in scsi_parse_sense_buf() 110 if (in_len < 4) { in scsi_parse_sense_buf() 335 int scsi_convert_sense(uint8_t *in_buf, int in_len, in scsi_convert_sense() argument 341 if (in_len == 0) { in scsi_convert_sense() 347 memcpy(buf, in_buf, MIN(len, in_len)); in scsi_convert_sense() 348 return MIN(len, in_len); in scsi_convert_sense() 350 sense = scsi_parse_sense_buf(in_buf, in_len); in scsi_convert_sense() 435 int scsi_sense_buf_to_errno(const uint8_t *in_buf, size_t in_len) in scsi_sense_buf_to_errno() argument [all …]
|
/openbmc/linux/drivers/net/ethernet/sfc/ |
H A D | tx_tso.c | 66 unsigned int in_len; member 174 unsigned int header_len, in_len; in tso_start() local 180 in_len = skb_headlen(skb) - header_len; in tso_start() 182 st->in_len = in_len; in tso_start() 215 st->in_len = skb_frag_size(frag); in tso_get_fragment() 239 if (st->in_len == 0) in tso_fill_packet_with_fragment() 244 EFX_WARN_ON_ONCE_PARANOID(st->in_len <= 0); in tso_fill_packet_with_fragment() 247 n = min(st->in_len, st->packet_space); in tso_fill_packet_with_fragment() 251 st->in_len -= n; in tso_fill_packet_with_fragment() 263 if (st->in_len == 0) { in tso_fill_packet_with_fragment() [all …]
|
/openbmc/linux/net/ceph/ |
H A D | crypto.c | 220 void *buf, int buf_len, int in_len, int *pout_len) in ceph_aes_crypt() argument 226 int pad_byte = AES_BLOCK_SIZE - (in_len & (AES_BLOCK_SIZE - 1)); in ceph_aes_crypt() 227 int crypt_len = encrypt ? in_len + pad_byte : in_len; in ceph_aes_crypt() 232 memset(buf + in_len, pad_byte, pad_byte); in ceph_aes_crypt() 266 pad_byte = *(char *)(buf + in_len - 1); in ceph_aes_crypt() 268 in_len >= pad_byte) { in ceph_aes_crypt() 269 *pout_len = in_len - pad_byte; in ceph_aes_crypt() 272 __func__, pad_byte, in_len); in ceph_aes_crypt() 284 void *buf, int buf_len, int in_len, int *pout_len) in ceph_crypt() argument 288 *pout_len = in_len; in ceph_crypt() [all …]
|
/openbmc/linux/security/keys/ |
H A D | keyctl_pkey.c | 138 if (uparams.in_len > info.max_dec_size || in keyctl_pkey_params_get_2() 143 if (uparams.in_len > info.max_enc_size || in keyctl_pkey_params_get_2() 148 if (uparams.in_len > info.max_data_size || in keyctl_pkey_params_get_2() 153 if (uparams.in_len > info.max_data_size || in keyctl_pkey_params_get_2() 161 params->in_len = uparams.in_len; in keyctl_pkey_params_get_2() 244 in = memdup_user(_in, params.in_len); in keyctl_pkey_e_d_s() 306 in = memdup_user(_in, params.in_len); in keyctl_pkey_verify()
|
/openbmc/qemu/include/crypto/ |
H A D | akcipher.h | 76 const void *in, size_t in_len, 96 const void *in, size_t in_len, 116 const void *in, size_t in_len, 136 const void *in, size_t in_len,
|
/openbmc/linux/fs/btrfs/ |
H A D | lzo.c | 242 u32 in_len; in lzo_compress_pages() local 252 in_len = min_t(u32, start + len - cur_in, sectorsize - sector_off); in lzo_compress_pages() 253 ASSERT(in_len); in lzo_compress_pages() 256 offset_in_page(cur_in), in_len, in lzo_compress_pages() 272 cur_in += in_len; in lzo_compress_pages() 432 size_t in_len; in lzo_decompress() local 442 in_len = read_compress_length(data_in); in lzo_decompress() 443 if (in_len != srclen) in lzo_decompress() 447 in_len = read_compress_length(data_in); in lzo_decompress() 448 if (in_len != srclen - LZO_LEN * 2) { in lzo_decompress() [all …]
|
/openbmc/linux/lib/lzo/ |
H A D | lzo1x_compress.c | 22 lzo1x_1_do_compress(const unsigned char *in, size_t in_len, in lzo1x_1_do_compress() argument 29 const unsigned char * const in_end = in + in_len; in lzo1x_1_do_compress() 30 const unsigned char * const ip_end = in + in_len - 20; in lzo1x_1_do_compress() 302 static int lzogeneric1x_1_compress(const unsigned char *in, size_t in_len, in lzogeneric1x_1_compress() argument 309 size_t l = in_len; in lzogeneric1x_1_compress() 342 const unsigned char *ii = in + in_len - t; in lzogeneric1x_1_compress() 379 int lzo1x_1_compress(const unsigned char *in, size_t in_len, in lzo1x_1_compress() argument 383 return lzogeneric1x_1_compress(in, in_len, out, out_len, wrkmem, 0); in lzo1x_1_compress() 386 int lzorle1x_1_compress(const unsigned char *in, size_t in_len, in lzorle1x_1_compress() argument 390 return lzogeneric1x_1_compress(in, in_len, out, out_len, in lzorle1x_1_compress()
|
/openbmc/linux/net/tls/ |
H A D | tls_device_fallback.c | 54 struct scatter_walk *out, int *in_len, in tls_enc_record() argument 75 len = min_t(int, *in_len, buf_size); in tls_enc_record() 80 *in_len -= len; in tls_enc_record() 81 if (!*in_len) in tls_enc_record() 101 *in_len -= len; in tls_enc_record() 102 if (*in_len < 0) { in tls_enc_record() 103 *in_len += cipher_desc->tag; in tls_enc_record() 111 if (*in_len < 0) in tls_enc_record() 112 len += *in_len; in tls_enc_record() 114 *in_len = 0; in tls_enc_record() [all …]
|
/openbmc/openbmc/meta-security/meta-tpm/recipes-tpm1/openssl-tpm-engine/files/ |
H A D | 0003-tpm-openssl-tpm-engine-parse-an-encrypted-tpm-SRK-pa.patch | 36 + int in_len, 46 + ret = EVP_DecodeUpdate(&dctx, outdata, &len, indata, in_len); 65 +static int tpm_decrypt_srk_pw(unsigned char *indata, int in_len, 120 + if (!EVP_CipherUpdate(ctx, dec_data, &dec_data_len, indata, in_len)) { 157 + int in_len = strlen(srkPasswd); 161 + if (!in_len || in_len % 4) { 168 + out_len = in_len * 3 / 4;
|
/openbmc/linux/scripts/kconfig/ |
H A D | preprocess.c | 503 size_t in_len, out_len; in __expand_string() local 513 in_len = p - in; in __expand_string() 516 out_len += in_len + strlen(expansion); in __expand_string() 518 strncat(out, in, in_len); in __expand_string() 531 in_len = p - in; in __expand_string() 532 out_len += in_len; in __expand_string() 534 strncat(out, in, in_len); in __expand_string()
|
/openbmc/qemu/block/export/ |
H A D | vhost-user-blk-server.c | 43 static void vu_blk_req_complete(VuBlkReq *req, size_t in_len) in vu_blk_req_complete() argument 47 vu_queue_push(vu_dev, req->vq, &req->elem, in_len); in vu_blk_req_complete() 68 int in_len; in vu_blk_virtio_process_req() local 70 in_len = virtio_blk_process_req(handler, in_iov, out_iov, in vu_blk_virtio_process_req() 72 if (in_len < 0) { in vu_blk_virtio_process_req() 78 vu_blk_req_complete(req, in_len); in vu_blk_virtio_process_req()
|
/openbmc/qemu/tests/qtest/ |
H A D | stm32l4x5_usart-test.c | 91 int i, in_len = strlen(in); in usart_receive_string() local 93 g_assert_true(send(sock_fd, in, in_len, 0) == in_len); in usart_receive_string() 94 for (i = 0; i < in_len; i++) { in usart_receive_string() 104 int i, in_len = strlen(in); in usart_send_string() local 106 for (i = 0; i < in_len; i++) { in usart_send_string()
|