Home
last modified time | relevance | path

Searched refs:vlen (Results 1 – 25 of 76) sorted by relevance

1234

/openbmc/linux/crypto/
H A Drsa_helper.c21 size_t n_sz = vlen; in rsa_get_n()
41 key->n_sz = vlen; in rsa_get_n()
52 if (!value || !key->n_sz || !vlen || vlen > key->n_sz) in rsa_get_e()
56 key->e_sz = vlen; in rsa_get_e()
67 if (!value || !key->n_sz || !vlen || vlen > key->n_sz) in rsa_get_d()
71 key->d_sz = vlen; in rsa_get_d()
82 if (!value || !vlen || vlen > key->n_sz) in rsa_get_p()
97 if (!value || !vlen || vlen > key->n_sz) in rsa_get_q()
112 if (!value || !vlen || vlen > key->n_sz) in rsa_get_dp()
127 if (!value || !vlen || vlen > key->n_sz) in rsa_get_dq()
[all …]
H A Decdsa.c36 const void *value, size_t vlen, unsigned int ndigits) in ecdsa_get_signature_rs() argument
39 ssize_t diff = vlen - keylen; in ecdsa_get_signature_rs()
43 if (!value || !vlen) in ecdsa_get_signature_rs()
54 vlen -= 1; in ecdsa_get_signature_rs()
69 memcpy(&rs[-diff], d, vlen); in ecdsa_get_signature_rs()
77 const void *value, size_t vlen) in ecdsa_get_signature_r() argument
81 return ecdsa_get_signature_rs(sig->r, hdrlen, tag, value, vlen, in ecdsa_get_signature_r()
86 const void *value, size_t vlen) in ecdsa_get_signature_s() argument
90 return ecdsa_get_signature_rs(sig->s, hdrlen, tag, value, vlen, in ecdsa_get_signature_s()
H A Decrdsa.c151 const void *value, size_t vlen) in ecrdsa_param_curve() argument
155 ctx->curve_oid = look_up_OID(value, vlen); in ecrdsa_param_curve()
164 const void *value, size_t vlen) in ecrdsa_param_digest() argument
167 int digest_oid = look_up_OID(value, vlen); in ecrdsa_param_digest()
175 const void *value, size_t vlen) in ecrdsa_parse_pub_key() argument
180 ctx->key_len = vlen; in ecrdsa_parse_pub_key()
H A Dsm2.c193 const void *value, size_t vlen) in sm2_get_signature_r() argument
197 if (!value || !vlen) in sm2_get_signature_r()
200 sig->sig_r = mpi_read_raw_data(value, vlen); in sm2_get_signature_r()
208 const void *value, size_t vlen) in sm2_get_signature_s() argument
212 if (!value || !vlen) in sm2_get_signature_s()
215 sig->sig_s = mpi_read_raw_data(value, vlen); in sm2_get_signature_s()
/openbmc/linux/crypto/asymmetric_keys/
H A Dx509_cert_parser.c313 vlen--; in x509_note_signature()
345 ctx->cn_size = vlen; in x509_extract_name_segment()
349 ctx->o_size = vlen; in x509_extract_name_segment()
353 ctx->email_size = vlen; in x509_extract_name_segment()
570 vlen -= 2; in x509_process_extension()
597 if (vlen < 4) in x509_process_extension()
630 if (vlen < 2) in x509_process_extension()
632 if (v[1] != vlen - 2) in x509_process_extension()
674 if (vlen != 13) in x509_decode_time()
683 if (vlen != 15) in x509_decode_time()
[all …]
H A Dpkcs7_parser.c332 if (vlen != 1) in pkcs7_note_signeddata_version()
366 if (vlen != 1) in pkcs7_note_signerinfo_version()
421 vlen += hdrlen; in pkcs7_extract_cert()
489 ctx->msg->data_len = vlen; in pkcs7_note_data()
505 pr_devel("AuthAttr: %02x %zu [%*ph]\n", tag, vlen, (unsigned)vlen, value); in pkcs7_sig_note_authenticated_attr()
527 hdrlen, tag, value, vlen); in pkcs7_sig_note_authenticated_attr()
535 sinfo->msgdigest_len = vlen; in pkcs7_sig_note_authenticated_attr()
614 ctx->raw_serial_size = vlen; in pkcs7_sig_note_serial()
627 ctx->raw_issuer_size = vlen; in pkcs7_sig_note_issuer()
640 pr_devel("SKID: %02x %zu [%*ph]\n", tag, vlen, (unsigned)vlen, value); in pkcs7_sig_note_skid()
[all …]
H A Dmscode_parser.c38 const void *value, size_t vlen) in mscode_note_content_type() argument
42 oid = look_up_OID(value, vlen); in mscode_note_content_type()
46 sprint_oid(value, vlen, buffer, sizeof(buffer)); in mscode_note_content_type()
70 const void *value, size_t vlen) in mscode_note_digest_algo() argument
76 oid = look_up_OID(value, vlen); in mscode_note_digest_algo()
101 sprint_oid(value, vlen, buffer, sizeof(buffer)); in mscode_note_digest_algo()
118 const void *value, size_t vlen) in mscode_note_digest() argument
122 ctx->digest = kmemdup(value, vlen, GFP_KERNEL); in mscode_note_digest()
126 ctx->digest_len = vlen; in mscode_note_digest()
H A Dpkcs8_parser.c35 const void *value, size_t vlen) in pkcs8_note_OID() argument
39 ctx->last_oid = look_up_OID(value, vlen); in pkcs8_note_OID()
43 sprint_oid(value, vlen, buffer, sizeof(buffer)); in pkcs8_note_OID()
55 const void *value, size_t vlen) in pkcs8_note_version() argument
57 if (vlen != 1 || ((const u8 *)value)[0] != 0) { in pkcs8_note_version()
69 const void *value, size_t vlen) in pkcs8_note_algo() argument
85 const void *value, size_t vlen) in pkcs8_note_key() argument
90 ctx->key_size = vlen; in pkcs8_note_key()
/openbmc/linux/fs/smb/server/
H A Dasn1.c163 const void *value, size_t vlen) in ksmbd_gssapi_this_mech() argument
167 oid = look_up_OID(value, vlen); in ksmbd_gssapi_this_mech()
171 sprint_oid(value, vlen, buf, sizeof(buf)); in ksmbd_gssapi_this_mech()
181 size_t vlen) in ksmbd_neg_token_init_mech_type() argument
187 oid = look_up_OID(value, vlen); in ksmbd_neg_token_init_mech_type()
199 sprint_oid(value, vlen, buf, sizeof(buf)); in ksmbd_neg_token_init_mech_type()
213 size_t vlen) in ksmbd_neg_token_alloc() argument
217 if (!vlen) in ksmbd_neg_token_alloc()
224 conn->mechTokenLen = (unsigned int)vlen; in ksmbd_neg_token_alloc()
231 size_t vlen) in ksmbd_neg_token_init_mech_token() argument
[all …]
/openbmc/linux/fs/smb/client/
H A Dasn1.c23 unsigned char tag, const void *value, size_t vlen) in cifs_gssapi_this_mech() argument
27 oid = look_up_OID(value, vlen); in cifs_gssapi_this_mech()
31 sprint_oid(value, vlen, buf, sizeof(buf)); in cifs_gssapi_this_mech()
41 const void *value, size_t vlen) in cifs_neg_token_init_mech_type() argument
46 oid = look_up_OID(value, vlen); in cifs_neg_token_init_mech_type()
58 sprint_oid(value, vlen, buf, sizeof(buf)); in cifs_neg_token_init_mech_type()
/openbmc/linux/tools/testing/selftests/bpf/
H A Dbtf_helpers.c92 __u32 vlen; in fprintf_btf_type_raw() local
98 vlen = btf_vlen(t); in fprintf_btf_type_raw()
128 fprintf(out, " size=%u vlen=%u", t->size, vlen); in fprintf_btf_type_raw()
129 for (i = 0; i < vlen; i++, m++) { in fprintf_btf_type_raw()
147 btf_kflag(t) ? "SIGNED" : "UNSIGNED", t->size, vlen); in fprintf_btf_type_raw()
148 for (i = 0; i < vlen; i++, v++) { in fprintf_btf_type_raw()
161 btf_kflag(t) ? "SIGNED" : "UNSIGNED", t->size, vlen); in fprintf_btf_type_raw()
162 for (i = 0; i < vlen; i++, v++) { in fprintf_btf_type_raw()
179 for (i = 0; i < vlen; i++, p++) { in fprintf_btf_type_raw()
192 fprintf(out, " size=%u vlen=%u", t->size, vlen); in fprintf_btf_type_raw()
[all …]
/openbmc/qemu/crypto/
H A Dder.c142 return cb(ctx, value, vlen, errp); in qcrypto_der_invoke_callback()
150 size_t vlen = 0; in qcrypto_der_extract_definite_data() local
161 vlen = byte_count; in qcrypto_der_extract_definite_data()
162 qcrypto_der_cut_nbytes(data, dlen, vlen); in qcrypto_der_extract_definite_data()
167 return vlen; in qcrypto_der_extract_definite_data()
188 vlen <<= 8; in qcrypto_der_extract_definite_data()
189 vlen += qcrypto_der_cut_byte(data, dlen); in qcrypto_der_extract_definite_data()
192 if (vlen > *dlen) { in qcrypto_der_extract_definite_data()
193 error_setg(errp, "Invalid content length: %zu", vlen); in qcrypto_der_extract_definite_data()
198 qcrypto_der_cut_nbytes(data, dlen, vlen); in qcrypto_der_extract_definite_data()
[all …]
H A Drsakey-builtin.c.inc26 size_t vlen, Error **errp)
29 if (vlen == 0) {
33 mpi->data = g_memdup2(value, vlen);
34 mpi->len = vlen;
39 size_t vlen, Error **errp)
42 if (vlen != 1 || *value > 1) {
51 size_t vlen, Error **errp)
54 if (vlen == 0) {
/openbmc/linux/fs/
H A Dread_write.c941 unsigned long vlen, rwf_t flags) in do_readv() argument
965 unsigned long vlen, rwf_t flags) in do_writev() argument
1041 unsigned long, vlen) in SYSCALL_DEFINE3() argument
1043 return do_readv(fd, vec, vlen, 0); in SYSCALL_DEFINE3()
1047 unsigned long, vlen) in SYSCALL_DEFINE3() argument
1049 return do_writev(fd, vec, vlen, 0); in SYSCALL_DEFINE3()
1067 return do_readv(fd, vec, vlen, flags); in SYSCALL_DEFINE6()
1101 unsigned long, vlen, loff_t, pos) in COMPAT_SYSCALL_DEFINE4() argument
1122 return do_readv(fd, vec, vlen, flags); in COMPAT_SYSCALL_DEFINE5()
1135 return do_readv(fd, vec, vlen, flags); in COMPAT_SYSCALL_DEFINE6()
[all …]
/openbmc/linux/drivers/crypto/starfive/
H A Djh7110-rsa.c376 while (!*ptr && vlen) { in starfive_rsa_set_n()
378 vlen--; in starfive_rsa_set_n()
380 rsa_key->key_sz = vlen; in starfive_rsa_set_n()
407 while (!*ptr && vlen) { in starfive_rsa_set_e()
409 vlen--; in starfive_rsa_set_e()
413 if (!rsa_key->key_sz || !vlen || vlen > rsa_key->key_sz) { in starfive_rsa_set_e()
429 memcpy(rsa_key->e + (rsa_key->key_sz - vlen), ptr, vlen); in starfive_rsa_set_e()
442 while (!*ptr && vlen) { in starfive_rsa_set_d()
444 vlen--; in starfive_rsa_set_d()
449 if (!rsa_key->key_sz || !vlen || vlen > rsa_key->key_sz) in starfive_rsa_set_d()
[all …]
/openbmc/linux/tools/bpf/bpftool/
H A Dbtf.c164 __u16 vlen = BTF_INFO_VLEN(t->info); in dump_btf_type() local
169 jsonw_uint_field(w, "vlen", vlen); in dump_btf_type()
175 for (i = 0; i < vlen; i++, m++) { in dump_btf_type()
218 jsonw_uint_field(w, "vlen", vlen); in dump_btf_type()
224 for (i = 0; i < vlen; i++, v++) { in dump_btf_type()
248 __u16 vlen = btf_vlen(t); in dump_btf_type() local
256 jsonw_uint_field(w, "vlen", vlen); in dump_btf_type()
262 for (i = 0; i < vlen; i++, v++) { in dump_btf_type()
315 jsonw_uint_field(w, "vlen", vlen); in dump_btf_type()
321 for (i = 0; i < vlen; i++, p++) { in dump_btf_type()
[all …]
/openbmc/linux/tools/bpf/bpftool/Documentation/
H A Dbpftool-btf.rst101 [2] STRUCT 'dummy_tracepoint_args' size=16 vlen=2
156 [2] UNION 'my_union' size=48 vlen=2
160 [4] STRUCT 'my_struct' size=48 vlen=6
176 [14] ENUM 'my_enum' size=4 vlen=2
182 [18] FUNC_PROTO '(anon)' ret_type_id=3 vlen=2
189 [23] DATASEC 'data_sec' size=0 vlen=3
247 [104848] STRUCT 'i2c_smbus_alert' size=40 vlen=2
250 [104849] STRUCT 'alert_data' size=12 vlen=3
258 [104854] FUNC_PROTO '(anon)' ret_type_id=18 vlen=1
262 [104857] FUNC_PROTO '(anon)' ret_type_id=18 vlen=2
/openbmc/linux/security/keys/trusted-keys/
H A Dtrusted_tpm2.c144 const void *value, size_t vlen) in tpm2_key_parent() argument
151 for (i = 0; i < vlen; i++) { in tpm2_key_parent()
161 const void *value, size_t vlen) in tpm2_key_type() argument
163 enum OID oid = look_up_OID(value, vlen); in tpm2_key_type()
168 sprint_oid(value, vlen, buffer, sizeof(buffer)); in tpm2_key_type()
179 const void *value, size_t vlen) in tpm2_key_pub() argument
184 ctx->pub_len = vlen; in tpm2_key_pub()
191 const void *value, size_t vlen) in tpm2_key_priv() argument
196 ctx->priv_len = vlen; in tpm2_key_priv()
/openbmc/linux/tools/lib/bpf/
H A Dbtf_dump.c315 __u16 vlen; in btf_dump_mark_referenced() local
319 vlen = btf_vlen(t); in btf_dump_mark_referenced()
484 __u16 vlen; in btf_dump_order_type() local
528 vlen = btf_vlen(t); in btf_dump_order_type()
594 vlen = btf_vlen(t); in btf_dump_order_type()
838 __u16 vlen; in btf_is_struct_packed() local
841 vlen = btf_vlen(t); in btf_is_struct_packed()
972 __u16 vlen = btf_vlen(t); in btf_dump_emit_struct_def() local
1019 if (vlen || t->size) { in btf_dump_emit_struct_def()
1121 __u16 vlen = btf_vlen(t); in btf_dump_emit_enum_def() local
[all …]
/openbmc/linux/fs/xfs/libxfs/
H A Dxfs_attr_sf.h33 static inline int xfs_attr_sf_entsize_byname(uint8_t nlen, uint8_t vlen) in xfs_attr_sf_entsize_byname() argument
35 return sizeof(struct xfs_attr_sf_entry) + nlen + vlen; in xfs_attr_sf_entsize_byname()
/openbmc/qemu/target/riscv/insn_trans/
H A Dtrans_rvbf16.c.inc86 ctx->cfg_ptr->vlen / 8,
87 ctx->cfg_ptr->vlen / 8, data,
115 ctx->cfg_ptr->vlen / 8,
116 ctx->cfg_ptr->vlen / 8, data,
146 ctx->cfg_ptr->vlen / 8,
147 ctx->cfg_ptr->vlen / 8, data,
/openbmc/qemu/hw/usb/
H A Ddesc-msos.c135 int i, vlen = wcslen(value) + 1; in usb_desc_msos_prop_str() local
141 data->dwPropertyDataLength = cpu_to_le32(vlen*2); in usb_desc_msos_prop_str()
144 for (i = 0; i < vlen; i++) { in usb_desc_msos_prop_str()
148 length += vlen*2; in usb_desc_msos_prop_str()
/openbmc/linux/net/
H A Dcompat.c358 unsigned int vlen, unsigned int flags) in __compat_sys_sendmmsg() argument
360 return __sys_sendmmsg(fd, (struct mmsghdr __user *)mmsg, vlen, in __compat_sys_sendmmsg()
365 unsigned int, vlen, unsigned int, flags) in COMPAT_SYSCALL_DEFINE4() argument
367 return __compat_sys_sendmmsg(fd, mmsg, vlen, flags); in COMPAT_SYSCALL_DEFINE4()
406 unsigned int, vlen, unsigned int, flags, in COMPAT_SYSCALL_DEFINE5() argument
409 return __sys_recvmmsg(fd, (struct mmsghdr __user *)mmsg, vlen, in COMPAT_SYSCALL_DEFINE5()
415 unsigned int, vlen, unsigned int, flags, in COMPAT_SYSCALL_DEFINE5() argument
418 return __sys_recvmmsg(fd, (struct mmsghdr __user *)mmsg, vlen, in COMPAT_SYSCALL_DEFINE5()
/openbmc/linux/arch/um/drivers/
H A Dvector_user.h89 unsigned int vlen,
95 unsigned int vlen,
/openbmc/linux/drivers/crypto/intel/qat/qat_common/
H A Dqat_asym_algs.c930 size_t vlen) in qat_rsa_set_n() argument
939 vlen--; in qat_rsa_set_n()
942 ctx->key_sz = vlen; in qat_rsa_set_n()
962 size_t vlen) in qat_rsa_set_e() argument
970 vlen--; in qat_rsa_set_e()
973 if (!ctx->key_sz || !vlen || vlen > ctx->key_sz) { in qat_rsa_set_e()
982 memcpy(ctx->e + (ctx->key_sz - vlen), ptr, vlen); in qat_rsa_set_e()
987 size_t vlen) in qat_rsa_set_d() argument
996 vlen--; in qat_rsa_set_d()
1000 if (!ctx->key_sz || !vlen || vlen > ctx->key_sz) in qat_rsa_set_d()
[all …]

1234