/openbmc/linux/crypto/ |
H A D | rsa_helper.c | 17 const void *value, size_t vlen) in rsa_get_n() argument 21 size_t n_sz = vlen; in rsa_get_n() 24 if (!value || !vlen) in rsa_get_n() 41 key->n_sz = vlen; in rsa_get_n() 47 const void *value, size_t vlen) in rsa_get_e() argument 52 if (!value || !key->n_sz || !vlen || vlen > key->n_sz) in rsa_get_e() 56 key->e_sz = vlen; in rsa_get_e() 62 const void *value, size_t vlen) in rsa_get_d() argument 67 if (!value || !key->n_sz || !vlen || vlen > key->n_sz) in rsa_get_d() 71 key->d_sz = vlen; in rsa_get_d() [all …]
|
H A D | ecdsa.c | 36 const void *value, size_t vlen, unsigned int ndigits) in ecdsa_get_signature_rs() argument 41 if (!value || !vlen || vlen > bufsize + 1) in ecdsa_get_signature_rs() 48 if (vlen > bufsize) { in ecdsa_get_signature_rs() 51 vlen -= 1; in ecdsa_get_signature_rs() 58 ecc_digits_from_bytes(d, vlen, dest, ndigits); in ecdsa_get_signature_rs() 64 const void *value, size_t vlen) in ecdsa_get_signature_r() argument 68 return ecdsa_get_signature_rs(sig->r, hdrlen, tag, value, vlen, in ecdsa_get_signature_r() 73 const void *value, size_t vlen) in ecdsa_get_signature_s() argument 77 return ecdsa_get_signature_rs(sig->s, hdrlen, tag, value, vlen, in ecdsa_get_signature_s()
|
H A D | ecrdsa.c | 151 const void *value, size_t vlen) in ecrdsa_param_curve() argument 155 ctx->curve_oid = look_up_OID(value, vlen); in ecrdsa_param_curve() 164 const void *value, size_t vlen) in ecrdsa_param_digest() argument 167 int digest_oid = look_up_OID(value, vlen); in ecrdsa_param_digest() 175 const void *value, size_t vlen) in ecrdsa_parse_pub_key() argument 180 ctx->key_len = vlen; in ecrdsa_parse_pub_key()
|
H A D | sm2.c | 193 const void *value, size_t vlen) in sm2_get_signature_r() argument 197 if (!value || !vlen) in sm2_get_signature_r() 200 sig->sig_r = mpi_read_raw_data(value, vlen); in sm2_get_signature_r() 208 const void *value, size_t vlen) in sm2_get_signature_s() argument 212 if (!value || !vlen) in sm2_get_signature_s() 215 sig->sig_s = mpi_read_raw_data(value, vlen); in sm2_get_signature_s()
|
/openbmc/linux/crypto/asymmetric_keys/ |
H A D | x509_cert_parser.c | 155 const void *value, size_t vlen) in x509_note_OID() argument 159 ctx->last_oid = look_up_OID(value, vlen); in x509_note_OID() 162 sprint_oid(value, vlen, buffer, sizeof(buffer)); in x509_note_OID() 175 const void *value, size_t vlen) in x509_note_tbs_certificate() argument 180 hdrlen, tag, (unsigned long)value - ctx->data, vlen); in x509_note_tbs_certificate() 183 ctx->cert->tbs_size = vlen + hdrlen; in x509_note_tbs_certificate() 191 const void *value, size_t vlen) in x509_note_sig_algo() argument 287 const void *value, size_t vlen) in x509_note_signature() argument 291 pr_debug("Signature: alg=%u, size=%zu\n", ctx->last_oid, vlen); in x509_note_signature() 309 if (vlen < 1 || *(const u8 *)value != 0) in x509_note_signature() [all …]
|
H A D | pkcs7_parser.c | 206 const void *value, size_t vlen) in pkcs7_note_OID() argument 210 ctx->last_oid = look_up_OID(value, vlen); in pkcs7_note_OID() 213 sprint_oid(value, vlen, buffer, sizeof(buffer)); in pkcs7_note_OID() 225 const void *value, size_t vlen) in pkcs7_sig_note_digest_algo() argument 272 const void *value, size_t vlen) in pkcs7_sig_note_pkey_algo() argument 310 const void *value, size_t vlen) in pkcs7_check_content_type() argument 327 const void *value, size_t vlen) in pkcs7_note_signeddata_version() argument 332 if (vlen != 1) in pkcs7_note_signeddata_version() 361 const void *value, size_t vlen) in pkcs7_note_signerinfo_version() argument 366 if (vlen != 1) in pkcs7_note_signerinfo_version() [all …]
|
H A D | mscode_parser.c | 38 const void *value, size_t vlen) in mscode_note_content_type() argument 42 oid = look_up_OID(value, vlen); in mscode_note_content_type() 46 sprint_oid(value, vlen, buffer, sizeof(buffer)); in mscode_note_content_type() 70 const void *value, size_t vlen) in mscode_note_digest_algo() argument 76 oid = look_up_OID(value, vlen); in mscode_note_digest_algo() 101 sprint_oid(value, vlen, buffer, sizeof(buffer)); in mscode_note_digest_algo() 118 const void *value, size_t vlen) in mscode_note_digest() argument 122 ctx->digest = kmemdup(value, vlen, GFP_KERNEL); in mscode_note_digest() 126 ctx->digest_len = vlen; in mscode_note_digest()
|
H A D | pkcs8_parser.c | 35 const void *value, size_t vlen) in pkcs8_note_OID() argument 39 ctx->last_oid = look_up_OID(value, vlen); in pkcs8_note_OID() 43 sprint_oid(value, vlen, buffer, sizeof(buffer)); in pkcs8_note_OID() 55 const void *value, size_t vlen) in pkcs8_note_version() argument 57 if (vlen != 1 || ((const u8 *)value)[0] != 0) { in pkcs8_note_version() 69 const void *value, size_t vlen) in pkcs8_note_algo() argument 85 const void *value, size_t vlen) in pkcs8_note_key() argument 90 ctx->key_size = vlen; in pkcs8_note_key()
|
/openbmc/linux/fs/smb/server/ |
H A D | asn1.c | 163 const void *value, size_t vlen) in ksmbd_gssapi_this_mech() argument 167 oid = look_up_OID(value, vlen); in ksmbd_gssapi_this_mech() 171 sprint_oid(value, vlen, buf, sizeof(buf)); in ksmbd_gssapi_this_mech() 181 size_t vlen) in ksmbd_neg_token_init_mech_type() argument 187 oid = look_up_OID(value, vlen); in ksmbd_neg_token_init_mech_type() 199 sprint_oid(value, vlen, buf, sizeof(buf)); in ksmbd_neg_token_init_mech_type() 213 size_t vlen) in ksmbd_neg_token_alloc() argument 217 if (!vlen) in ksmbd_neg_token_alloc() 220 conn->mechToken = kmemdup_nul(value, vlen, GFP_KERNEL); in ksmbd_neg_token_alloc() 224 conn->mechTokenLen = (unsigned int)vlen; in ksmbd_neg_token_alloc() [all …]
|
/openbmc/linux/fs/smb/client/ |
H A D | asn1.c | 23 unsigned char tag, const void *value, size_t vlen) in cifs_gssapi_this_mech() argument 27 oid = look_up_OID(value, vlen); in cifs_gssapi_this_mech() 31 sprint_oid(value, vlen, buf, sizeof(buf)); in cifs_gssapi_this_mech() 41 const void *value, size_t vlen) in cifs_neg_token_init_mech_type() argument 46 oid = look_up_OID(value, vlen); in cifs_neg_token_init_mech_type() 58 sprint_oid(value, vlen, buf, sizeof(buf)); in cifs_neg_token_init_mech_type()
|
/openbmc/linux/tools/testing/selftests/bpf/ |
H A D | btf_helpers.c | 92 __u32 vlen; in fprintf_btf_type_raw() local 98 vlen = btf_vlen(t); in fprintf_btf_type_raw() 128 fprintf(out, " size=%u vlen=%u", t->size, vlen); in fprintf_btf_type_raw() 129 for (i = 0; i < vlen; i++, m++) { in fprintf_btf_type_raw() 147 btf_kflag(t) ? "SIGNED" : "UNSIGNED", t->size, vlen); in fprintf_btf_type_raw() 148 for (i = 0; i < vlen; i++, v++) { in fprintf_btf_type_raw() 161 btf_kflag(t) ? "SIGNED" : "UNSIGNED", t->size, vlen); in fprintf_btf_type_raw() 162 for (i = 0; i < vlen; i++, v++) { in fprintf_btf_type_raw() 178 fprintf(out, " ret_type_id=%u vlen=%u", t->type, vlen); in fprintf_btf_type_raw() 179 for (i = 0; i < vlen; i++, p++) { in fprintf_btf_type_raw() [all …]
|
/openbmc/qemu/crypto/ |
H A D | der.c | 135 const uint8_t *value, size_t vlen, in qcrypto_der_invoke_callback() argument 142 return cb(ctx, value, vlen, errp); in qcrypto_der_invoke_callback() 150 size_t vlen = 0; in qcrypto_der_extract_definite_data() local 161 vlen = byte_count; in qcrypto_der_extract_definite_data() 162 qcrypto_der_cut_nbytes(data, dlen, vlen); in qcrypto_der_extract_definite_data() 164 if (qcrypto_der_invoke_callback(cb, ctx, value, vlen, errp) != 0) { in qcrypto_der_extract_definite_data() 167 return vlen; in qcrypto_der_extract_definite_data() 188 vlen <<= 8; in qcrypto_der_extract_definite_data() 189 vlen += qcrypto_der_cut_byte(data, dlen); in qcrypto_der_extract_definite_data() 192 if (vlen > *dlen) { in qcrypto_der_extract_definite_data() [all …]
|
H A D | rsakey-builtin.c.inc | 26 size_t vlen, Error **errp) 29 if (vlen == 0) { 33 mpi->data = g_memdup2(value, vlen); 34 mpi->len = vlen; 39 size_t vlen, Error **errp) 42 if (vlen != 1 || *value > 1) { 51 size_t vlen, Error **errp) 54 if (vlen == 0) {
|
/openbmc/linux/fs/ |
H A D | read_write.c | 906 unsigned long vlen, loff_t *pos, rwf_t flags) in vfs_readv() argument 913 ret = import_iovec(ITER_DEST, vec, vlen, ARRAY_SIZE(iovstack), &iov, &iter); in vfs_readv() 923 unsigned long vlen, loff_t *pos, rwf_t flags) in vfs_writev() argument 930 ret = import_iovec(ITER_SOURCE, vec, vlen, ARRAY_SIZE(iovstack), &iov, &iter); in vfs_writev() 941 unsigned long vlen, rwf_t flags) in do_readv() argument 952 ret = vfs_readv(f.file, vec, vlen, ppos, flags); in do_readv() 965 unsigned long vlen, rwf_t flags) in do_writev() argument 976 ret = vfs_writev(f.file, vec, vlen, ppos, flags); in do_writev() 995 unsigned long vlen, loff_t pos, rwf_t flags) in do_preadv() argument 1007 ret = vfs_readv(f.file, vec, vlen, &pos, flags); in do_preadv() [all …]
|
/openbmc/linux/drivers/crypto/starfive/ |
H A D | jh7110-rsa.c | 373 const char *value, size_t vlen) in starfive_rsa_set_n() argument 379 while (!*ptr && vlen) { in starfive_rsa_set_n() 381 vlen--; in starfive_rsa_set_n() 383 rsa_key->key_sz = vlen; in starfive_rsa_set_n() 404 const char *value, size_t vlen) in starfive_rsa_set_e() argument 410 while (!*ptr && vlen) { in starfive_rsa_set_e() 412 vlen--; in starfive_rsa_set_e() 416 if (!rsa_key->key_sz || !vlen || vlen > rsa_key->key_sz) { in starfive_rsa_set_e() 430 rsa_key->e_bitlen = (vlen - 1) * 8 + loop; in starfive_rsa_set_e() 432 memcpy(rsa_key->e + (rsa_key->key_sz - vlen), ptr, vlen); in starfive_rsa_set_e() [all …]
|
/openbmc/linux/tools/bpf/bpftool/ |
H A D | btf.c | 164 __u16 vlen = BTF_INFO_VLEN(t->info); in dump_btf_type() local 169 jsonw_uint_field(w, "vlen", vlen); in dump_btf_type() 173 printf(" size=%u vlen=%u", t->size, vlen); in dump_btf_type() 175 for (i = 0; i < vlen; i++, m++) { in dump_btf_type() 210 __u16 vlen = BTF_INFO_VLEN(t->info); in dump_btf_type() local 218 jsonw_uint_field(w, "vlen", vlen); in dump_btf_type() 222 printf(" encoding=%s size=%u vlen=%u", encoding, t->size, vlen); in dump_btf_type() 224 for (i = 0; i < vlen; i++, v++) { in dump_btf_type() 248 __u16 vlen = btf_vlen(t); in dump_btf_type() local 256 jsonw_uint_field(w, "vlen", vlen); in dump_btf_type() [all …]
|
H A D | gen.c | 132 int i, err, off = 0, pad_cnt = 0, vlen = btf_vlen(sec); in codegen_datasec_def() local 143 for (i = 0; i < vlen; i++, sec_var++) { in codegen_datasec_def() 301 int i, err = 0, vlen; in codegen_subskel_datasecs() local 328 vlen = btf_vlen(sec); in codegen_subskel_datasecs() 329 for (i = 0; i < vlen; i++, sec_var++) { in codegen_subskel_datasecs() 472 int i, vlen; in codegen_asserts() local 500 vlen = btf_vlen(sec); in codegen_asserts() 502 for (i = 0; i < vlen; i++, sec_var++) { in codegen_asserts() 1889 __u16 vlen = btf_vlen(btf_type); in btfgen_mark_type_match() local 1894 for (i = 0; i < vlen; i++, m++) { in btfgen_mark_type_match() [all …]
|
/openbmc/linux/tools/bpf/bpftool/Documentation/ |
H A D | bpftool-btf.rst | 101 [2] STRUCT 'dummy_tracepoint_args' size=16 vlen=2 156 [2] UNION 'my_union' size=48 vlen=2 160 [4] STRUCT 'my_struct' size=48 vlen=6 176 [14] ENUM 'my_enum' size=4 vlen=2 182 [18] FUNC_PROTO '(anon)' ret_type_id=3 vlen=2 189 [23] DATASEC 'data_sec' size=0 vlen=3 247 [104848] STRUCT 'i2c_smbus_alert' size=40 vlen=2 250 [104849] STRUCT 'alert_data' size=12 vlen=3 258 [104854] FUNC_PROTO '(anon)' ret_type_id=18 vlen=1 262 [104857] FUNC_PROTO '(anon)' ret_type_id=18 vlen=2
|
/openbmc/linux/tools/lib/bpf/ |
H A D | btf_dump.c | 315 __u16 vlen; in btf_dump_mark_referenced() local 319 vlen = btf_vlen(t); in btf_dump_mark_referenced() 352 for (j = 0; j < vlen; j++, m++) in btf_dump_mark_referenced() 359 for (j = 0; j < vlen; j++, p++) in btf_dump_mark_referenced() 366 for (j = 0; j < vlen; j++, v++) in btf_dump_mark_referenced() 484 __u16 vlen; in btf_dump_order_type() local 528 vlen = btf_vlen(t); in btf_dump_order_type() 529 for (i = 0; i < vlen; i++, m++) { in btf_dump_order_type() 594 vlen = btf_vlen(t); in btf_dump_order_type() 595 for (i = 0; i < vlen; i++, p++) { in btf_dump_order_type() [all …]
|
H A D | btf.c | 291 __u16 vlen = btf_vlen(t); in btf_type_size() local 307 return base_size + vlen * sizeof(struct btf_enum); in btf_type_size() 309 return base_size + vlen * sizeof(struct btf_enum64); in btf_type_size() 314 return base_size + vlen * sizeof(struct btf_member); in btf_type_size() 316 return base_size + vlen * sizeof(struct btf_param); in btf_type_size() 320 return base_size + vlen * sizeof(struct btf_var_secinfo); in btf_type_size() 344 __u16 vlen = btf_vlen(t); in btf_bswap_type_rest() local 362 for (i = 0, e = btf_enum(t); i < vlen; i++, e++) { in btf_bswap_type_rest() 368 for (i = 0, e64 = btf_enum64(t); i < vlen; i++, e64++) { in btf_bswap_type_rest() 382 for (i = 0, m = btf_members(t); i < vlen; i++, m++) { in btf_bswap_type_rest() [all …]
|
/openbmc/linux/security/keys/trusted-keys/ |
H A D | trusted_tpm2.c | 144 const void *value, size_t vlen) in tpm2_key_parent() argument 151 for (i = 0; i < vlen; i++) { in tpm2_key_parent() 161 const void *value, size_t vlen) in tpm2_key_type() argument 163 enum OID oid = look_up_OID(value, vlen); in tpm2_key_type() 168 sprint_oid(value, vlen, buffer, sizeof(buffer)); in tpm2_key_type() 179 const void *value, size_t vlen) in tpm2_key_pub() argument 184 ctx->pub_len = vlen; in tpm2_key_pub() 191 const void *value, size_t vlen) in tpm2_key_priv() argument 196 ctx->priv_len = vlen; in tpm2_key_priv()
|
/openbmc/linux/fs/xfs/libxfs/ |
H A D | xfs_attr_sf.h | 33 static inline int xfs_attr_sf_entsize_byname(uint8_t nlen, uint8_t vlen) in xfs_attr_sf_entsize_byname() argument 35 return sizeof(struct xfs_attr_sf_entry) + nlen + vlen; in xfs_attr_sf_entsize_byname()
|
/openbmc/qemu/hw/usb/ |
H A D | desc-msos.c | 135 int i, vlen = wcslen(value) + 1; in usb_desc_msos_prop_str() local 141 data->dwPropertyDataLength = cpu_to_le32(vlen*2); in usb_desc_msos_prop_str() 144 for (i = 0; i < vlen; i++) { in usb_desc_msos_prop_str() 148 length += vlen*2; in usb_desc_msos_prop_str()
|
/openbmc/linux/net/ |
H A D | compat.c | 358 unsigned int vlen, unsigned int flags) in __compat_sys_sendmmsg() argument 360 return __sys_sendmmsg(fd, (struct mmsghdr __user *)mmsg, vlen, in __compat_sys_sendmmsg() 365 unsigned int, vlen, unsigned int, flags) in COMPAT_SYSCALL_DEFINE4() argument 367 return __compat_sys_sendmmsg(fd, mmsg, vlen, flags); in COMPAT_SYSCALL_DEFINE4() 406 unsigned int, vlen, unsigned int, flags, in COMPAT_SYSCALL_DEFINE5() argument 409 return __sys_recvmmsg(fd, (struct mmsghdr __user *)mmsg, vlen, in COMPAT_SYSCALL_DEFINE5() 415 unsigned int, vlen, unsigned int, flags, in COMPAT_SYSCALL_DEFINE5() argument 418 return __sys_recvmmsg(fd, (struct mmsghdr __user *)mmsg, vlen, in COMPAT_SYSCALL_DEFINE5()
|
/openbmc/linux/drivers/crypto/intel/qat/qat_common/ |
H A D | qat_asym_algs.c | 930 size_t vlen) in qat_rsa_set_n() argument 937 while (!*ptr && vlen) { in qat_rsa_set_n() 939 vlen--; in qat_rsa_set_n() 942 ctx->key_sz = vlen; in qat_rsa_set_n() 962 size_t vlen) in qat_rsa_set_e() argument 968 while (!*ptr && vlen) { in qat_rsa_set_e() 970 vlen--; in qat_rsa_set_e() 973 if (!ctx->key_sz || !vlen || vlen > ctx->key_sz) { in qat_rsa_set_e() 982 memcpy(ctx->e + (ctx->key_sz - vlen), ptr, vlen); in qat_rsa_set_e() 987 size_t vlen) in qat_rsa_set_d() argument [all …]
|