/linux-6.3-rc2/crypto/ |
A D | rsa_helper.c | 21 size_t n_sz = vlen; in rsa_get_n() 41 key->n_sz = vlen; in rsa_get_n() 52 if (!value || !key->n_sz || !vlen || vlen > key->n_sz) in rsa_get_e() 56 key->e_sz = vlen; in rsa_get_e() 67 if (!value || !key->n_sz || !vlen || vlen > key->n_sz) in rsa_get_d() 71 key->d_sz = vlen; in rsa_get_d() 82 if (!value || !vlen || vlen > key->n_sz) in rsa_get_p() 97 if (!value || !vlen || vlen > key->n_sz) in rsa_get_q() 112 if (!value || !vlen || vlen > key->n_sz) in rsa_get_dp() 127 if (!value || !vlen || vlen > key->n_sz) in rsa_get_dq() [all …]
|
A D | ecdsa.c | 36 const void *value, size_t vlen, unsigned int ndigits) in ecdsa_get_signature_rs() argument 39 ssize_t diff = vlen - keylen; in ecdsa_get_signature_rs() 43 if (!value || !vlen) in ecdsa_get_signature_rs() 54 vlen -= 1; in ecdsa_get_signature_rs() 69 memcpy(&rs[-diff], d, vlen); in ecdsa_get_signature_rs() 77 const void *value, size_t vlen) in ecdsa_get_signature_r() argument 81 return ecdsa_get_signature_rs(sig->r, hdrlen, tag, value, vlen, in ecdsa_get_signature_r() 86 const void *value, size_t vlen) in ecdsa_get_signature_s() argument 90 return ecdsa_get_signature_rs(sig->s, hdrlen, tag, value, vlen, in ecdsa_get_signature_s()
|
A D | ecrdsa.c | 151 const void *value, size_t vlen) in ecrdsa_param_curve() argument 155 ctx->curve_oid = look_up_OID(value, vlen); in ecrdsa_param_curve() 164 const void *value, size_t vlen) in ecrdsa_param_digest() argument 167 int digest_oid = look_up_OID(value, vlen); in ecrdsa_param_digest() 175 const void *value, size_t vlen) in ecrdsa_parse_pub_key() argument 180 ctx->key_len = vlen; in ecrdsa_parse_pub_key()
|
A D | sm2.c | 187 const void *value, size_t vlen) in sm2_get_signature_r() argument 191 if (!value || !vlen) in sm2_get_signature_r() 194 sig->sig_r = mpi_read_raw_data(value, vlen); in sm2_get_signature_r() 202 const void *value, size_t vlen) in sm2_get_signature_s() argument 206 if (!value || !vlen) in sm2_get_signature_s() 209 sig->sig_s = mpi_read_raw_data(value, vlen); in sm2_get_signature_s()
|
/linux-6.3-rc2/crypto/asymmetric_keys/ |
A D | x509_cert_parser.c | 313 vlen--; in x509_note_signature() 345 ctx->cn_size = vlen; in x509_extract_name_segment() 349 ctx->o_size = vlen; in x509_extract_name_segment() 353 ctx->email_size = vlen; in x509_extract_name_segment() 543 ctx->key_size = vlen - 1; in x509_extract_key_data() 570 vlen -= 2; in x509_process_extension() 624 if (vlen != 13) in x509_decode_time() 633 if (vlen != 15) in x509_decode_time() 678 tag, (int)vlen, value); in x509_decode_time() 682 tag, (int)vlen, value); in x509_decode_time() [all …]
|
A D | pkcs7_parser.c | 332 if (vlen != 1) in pkcs7_note_signeddata_version() 366 if (vlen != 1) in pkcs7_note_signerinfo_version() 421 vlen += hdrlen; in pkcs7_extract_cert() 489 ctx->msg->data_len = vlen; in pkcs7_note_data() 505 pr_devel("AuthAttr: %02x %zu [%*ph]\n", tag, vlen, (unsigned)vlen, value); in pkcs7_sig_note_authenticated_attr() 527 hdrlen, tag, value, vlen); in pkcs7_sig_note_authenticated_attr() 535 sinfo->msgdigest_len = vlen; in pkcs7_sig_note_authenticated_attr() 614 ctx->raw_serial_size = vlen; in pkcs7_sig_note_serial() 627 ctx->raw_issuer_size = vlen; in pkcs7_sig_note_issuer() 640 pr_devel("SKID: %02x %zu [%*ph]\n", tag, vlen, (unsigned)vlen, value); in pkcs7_sig_note_skid() [all …]
|
A D | mscode_parser.c | 38 const void *value, size_t vlen) in mscode_note_content_type() argument 42 oid = look_up_OID(value, vlen); in mscode_note_content_type() 46 sprint_oid(value, vlen, buffer, sizeof(buffer)); in mscode_note_content_type() 70 const void *value, size_t vlen) in mscode_note_digest_algo() argument 76 oid = look_up_OID(value, vlen); in mscode_note_digest_algo() 101 sprint_oid(value, vlen, buffer, sizeof(buffer)); in mscode_note_digest_algo() 118 const void *value, size_t vlen) in mscode_note_digest() argument 122 ctx->digest = kmemdup(value, vlen, GFP_KERNEL); in mscode_note_digest() 126 ctx->digest_len = vlen; in mscode_note_digest()
|
A D | pkcs8_parser.c | 35 const void *value, size_t vlen) in pkcs8_note_OID() argument 39 ctx->last_oid = look_up_OID(value, vlen); in pkcs8_note_OID() 43 sprint_oid(value, vlen, buffer, sizeof(buffer)); in pkcs8_note_OID() 55 const void *value, size_t vlen) in pkcs8_note_version() argument 57 if (vlen != 1 || ((const u8 *)value)[0] != 0) { in pkcs8_note_version() 69 const void *value, size_t vlen) in pkcs8_note_algo() argument 85 const void *value, size_t vlen) in pkcs8_note_key() argument 90 ctx->key_size = vlen; in pkcs8_note_key()
|
/linux-6.3-rc2/fs/ksmbd/ |
A D | asn1.c | 163 const void *value, size_t vlen) in ksmbd_gssapi_this_mech() argument 167 oid = look_up_OID(value, vlen); in ksmbd_gssapi_this_mech() 171 sprint_oid(value, vlen, buf, sizeof(buf)); in ksmbd_gssapi_this_mech() 181 size_t vlen) in ksmbd_neg_token_init_mech_type() argument 187 oid = look_up_OID(value, vlen); in ksmbd_neg_token_init_mech_type() 199 sprint_oid(value, vlen, buf, sizeof(buf)); in ksmbd_neg_token_init_mech_type() 213 size_t vlen) in ksmbd_neg_token_alloc() argument 221 memcpy(conn->mechToken, value, vlen); in ksmbd_neg_token_alloc() 222 conn->mechToken[vlen] = '\0'; in ksmbd_neg_token_alloc() 228 size_t vlen) in ksmbd_neg_token_init_mech_token() argument [all …]
|
/linux-6.3-rc2/fs/cifs/ |
A D | asn1.c | 23 unsigned char tag, const void *value, size_t vlen) in cifs_gssapi_this_mech() argument 27 oid = look_up_OID(value, vlen); in cifs_gssapi_this_mech() 31 sprint_oid(value, vlen, buf, sizeof(buf)); in cifs_gssapi_this_mech() 41 const void *value, size_t vlen) in cifs_neg_token_init_mech_type() argument 46 oid = look_up_OID(value, vlen); in cifs_neg_token_init_mech_type() 58 sprint_oid(value, vlen, buf, sizeof(buf)); in cifs_neg_token_init_mech_type()
|
/linux-6.3-rc2/tools/testing/selftests/bpf/ |
A D | btf_helpers.c | 92 __u32 vlen; in fprintf_btf_type_raw() local 98 vlen = btf_vlen(t); in fprintf_btf_type_raw() 128 fprintf(out, " size=%u vlen=%u", t->size, vlen); in fprintf_btf_type_raw() 129 for (i = 0; i < vlen; i++, m++) { in fprintf_btf_type_raw() 147 btf_kflag(t) ? "SIGNED" : "UNSIGNED", t->size, vlen); in fprintf_btf_type_raw() 148 for (i = 0; i < vlen; i++, v++) { in fprintf_btf_type_raw() 161 btf_kflag(t) ? "SIGNED" : "UNSIGNED", t->size, vlen); in fprintf_btf_type_raw() 162 for (i = 0; i < vlen; i++, v++) { in fprintf_btf_type_raw() 179 for (i = 0; i < vlen; i++, p++) { in fprintf_btf_type_raw() 192 fprintf(out, " size=%u vlen=%u", t->size, vlen); in fprintf_btf_type_raw() [all …]
|
/linux-6.3-rc2/fs/ |
A D | read_write.c | 942 unsigned long vlen, rwf_t flags) in do_readv() argument 966 unsigned long vlen, rwf_t flags) in do_writev() argument 1042 unsigned long, vlen) in SYSCALL_DEFINE3() argument 1044 return do_readv(fd, vec, vlen, 0); in SYSCALL_DEFINE3() 1048 unsigned long, vlen) in SYSCALL_DEFINE3() argument 1050 return do_writev(fd, vec, vlen, 0); in SYSCALL_DEFINE3() 1068 return do_readv(fd, vec, vlen, flags); in SYSCALL_DEFINE6() 1102 unsigned long, vlen, loff_t, pos) in COMPAT_SYSCALL_DEFINE4() argument 1123 return do_readv(fd, vec, vlen, flags); in COMPAT_SYSCALL_DEFINE5() 1136 return do_readv(fd, vec, vlen, flags); in COMPAT_SYSCALL_DEFINE6() [all …]
|
/linux-6.3-rc2/tools/bpf/bpftool/ |
A D | btf.c | 164 __u16 vlen = BTF_INFO_VLEN(t->info); in dump_btf_type() local 169 jsonw_uint_field(w, "vlen", vlen); in dump_btf_type() 175 for (i = 0; i < vlen; i++, m++) { in dump_btf_type() 218 jsonw_uint_field(w, "vlen", vlen); in dump_btf_type() 224 for (i = 0; i < vlen; i++, v++) { in dump_btf_type() 248 __u16 vlen = btf_vlen(t); in dump_btf_type() local 256 jsonw_uint_field(w, "vlen", vlen); in dump_btf_type() 262 for (i = 0; i < vlen; i++, v++) { in dump_btf_type() 315 jsonw_uint_field(w, "vlen", vlen); in dump_btf_type() 321 for (i = 0; i < vlen; i++, p++) { in dump_btf_type() [all …]
|
A D | btf_dumper.c | 473 int i, vlen; in btf_dumper_struct() local 480 vlen = BTF_INFO_VLEN(t->info); in btf_dumper_struct() 484 for (i = 0; i < vlen; i++) { in btf_dumper_struct() 532 int ret = 0, i, vlen; in btf_dumper_datasec() local 538 vlen = BTF_INFO_VLEN(t->info); in btf_dumper_datasec() 544 for (i = 0; i < vlen; i++) { in btf_dumper_datasec() 714 int i, vlen; in btf_dump_func() local 721 vlen = BTF_INFO_VLEN(func_proto->info); in btf_dump_func() 722 for (i = 0; i < vlen; i++) { in btf_dump_func()
|
A D | gen.c | 143 for (i = 0; i < vlen; i++, sec_var++) { in codegen_datasec_def() 301 int i, err = 0, vlen; in codegen_subskel_datasecs() local 328 vlen = btf_vlen(sec); in codegen_subskel_datasecs() 472 int i, vlen; in codegen_asserts() local 500 vlen = btf_vlen(sec); in codegen_asserts() 1886 __u16 vlen = btf_vlen(btf_type); in btfgen_mark_type_match() local 1891 for (i = 0; i < vlen; i++, m++) { in btfgen_mark_type_match() 1923 __u16 vlen = btf_vlen(btf_type); in btfgen_mark_type_match() local 1933 for (i = 0; i < vlen; i++) { in btfgen_mark_type_match() 2169 unsigned short vlen; in btfgen_get_btf() local [all …]
|
/linux-6.3-rc2/security/keys/trusted-keys/ |
A D | trusted_tpm2.c | 131 const void *value, size_t vlen) in tpm2_key_parent() argument 138 for (i = 0; i < vlen; i++) { in tpm2_key_parent() 148 const void *value, size_t vlen) in tpm2_key_type() argument 150 enum OID oid = look_up_OID(value, vlen); in tpm2_key_type() 155 sprint_oid(value, vlen, buffer, sizeof(buffer)); in tpm2_key_type() 166 const void *value, size_t vlen) in tpm2_key_pub() argument 171 ctx->pub_len = vlen; in tpm2_key_pub() 178 const void *value, size_t vlen) in tpm2_key_priv() argument 183 ctx->priv_len = vlen; in tpm2_key_priv()
|
/linux-6.3-rc2/tools/bpf/bpftool/Documentation/ |
A D | bpftool-btf.rst | 101 [2] STRUCT 'dummy_tracepoint_args' size=16 vlen=2 156 [2] UNION 'my_union' size=48 vlen=2 160 [4] STRUCT 'my_struct' size=48 vlen=6 176 [14] ENUM 'my_enum' size=4 vlen=2 182 [18] FUNC_PROTO '(anon)' ret_type_id=3 vlen=2 189 [23] DATASEC 'data_sec' size=0 vlen=3 247 [104848] STRUCT 'i2c_smbus_alert' size=40 vlen=2 250 [104849] STRUCT 'alert_data' size=12 vlen=3 258 [104854] FUNC_PROTO '(anon)' ret_type_id=18 vlen=1 262 [104857] FUNC_PROTO '(anon)' ret_type_id=18 vlen=2
|
/linux-6.3-rc2/tools/lib/bpf/ |
A D | btf_dump.c | 315 __u16 vlen; in btf_dump_mark_referenced() local 319 vlen = btf_vlen(t); in btf_dump_mark_referenced() 484 __u16 vlen; in btf_dump_order_type() local 528 vlen = btf_vlen(t); in btf_dump_order_type() 594 vlen = btf_vlen(t); in btf_dump_order_type() 838 __u16 vlen; in btf_is_struct_packed() local 841 vlen = btf_vlen(t); in btf_is_struct_packed() 972 __u16 vlen = btf_vlen(t); in btf_dump_emit_struct_def() local 1019 if (vlen || t->size) { in btf_dump_emit_struct_def() 1121 __u16 vlen = btf_vlen(t); in btf_dump_emit_enum_def() local [all …]
|
A D | btf.c | 3436 __u16 vlen; in btf_equal_enum_members() local 3439 vlen = btf_vlen(t1); in btf_equal_enum_members() 3454 __u16 vlen; in btf_equal_enum64_members() local 3457 vlen = btf_vlen(t1); in btf_equal_enum64_members() 3531 __u16 vlen; in btf_shallow_equal_struct() local 3537 vlen = btf_vlen(t1); in btf_shallow_equal_struct() 3629 __u16 vlen; in btf_equal_fnproto() local 3655 __u16 vlen; in btf_compat_fnproto() local 4134 __u16 vlen; in btf_dedup_is_equiv() local 4154 __u16 vlen; in btf_dedup_is_equiv() local [all …]
|
/linux-6.3-rc2/fs/xfs/libxfs/ |
A D | xfs_attr_sf.h | 33 static inline int xfs_attr_sf_entsize_byname(uint8_t nlen, uint8_t vlen) in xfs_attr_sf_entsize_byname() argument 35 return sizeof(struct xfs_attr_sf_entry) + nlen + vlen; in xfs_attr_sf_entsize_byname()
|
/linux-6.3-rc2/net/ |
A D | compat.c | 357 unsigned int vlen, unsigned int flags) in __compat_sys_sendmmsg() argument 359 return __sys_sendmmsg(fd, (struct mmsghdr __user *)mmsg, vlen, in __compat_sys_sendmmsg() 364 unsigned int, vlen, unsigned int, flags) in COMPAT_SYSCALL_DEFINE4() argument 366 return __compat_sys_sendmmsg(fd, mmsg, vlen, flags); in COMPAT_SYSCALL_DEFINE4() 405 unsigned int, vlen, unsigned int, flags, in COMPAT_SYSCALL_DEFINE5() argument 408 return __sys_recvmmsg(fd, (struct mmsghdr __user *)mmsg, vlen, in COMPAT_SYSCALL_DEFINE5() 414 unsigned int, vlen, unsigned int, flags, in COMPAT_SYSCALL_DEFINE5() argument 417 return __sys_recvmmsg(fd, (struct mmsghdr __user *)mmsg, vlen, in COMPAT_SYSCALL_DEFINE5()
|
/linux-6.3-rc2/drivers/crypto/qat/qat_common/ |
A D | qat_asym_algs.c | 932 size_t vlen) in qat_rsa_set_n() argument 941 vlen--; in qat_rsa_set_n() 944 ctx->key_sz = vlen; in qat_rsa_set_n() 964 size_t vlen) in qat_rsa_set_e() argument 972 vlen--; in qat_rsa_set_e() 975 if (!ctx->key_sz || !vlen || vlen > ctx->key_sz) { in qat_rsa_set_e() 984 memcpy(ctx->e + (ctx->key_sz - vlen), ptr, vlen); in qat_rsa_set_e() 989 size_t vlen) in qat_rsa_set_d() argument 998 vlen--; in qat_rsa_set_d() 1002 if (!ctx->key_sz || !vlen || vlen > ctx->key_sz) in qat_rsa_set_d() [all …]
|
/linux-6.3-rc2/Documentation/bpf/ |
A D | btf.rst | 132 * ``info.vlen``: 0 184 * ``info.vlen``: 0 196 * ``info.vlen``: 0 312 * ``info.vlen``: 0 324 * ``info.vlen``: 0 336 * ``info.vlen``: 0 348 * ``info.vlen``: 0 360 * ``info.vlen``: 0 474 * ``info.vlen``: 0 486 * ``info.vlen``: 0 [all …]
|
/linux-6.3-rc2/arch/um/drivers/ |
A D | vector_user.h | 89 unsigned int vlen, 95 unsigned int vlen,
|
/linux-6.3-rc2/include/linux/ |
A D | compat.h | 637 compat_ulong_t vlen, u32 pos_low, u32 pos_high); 640 compat_ulong_t vlen, u32 pos_low, u32 pos_high); 644 unsigned long vlen, loff_t pos); 650 unsigned long vlen, loff_t pos); 834 unsigned vlen, unsigned int flags, 837 unsigned vlen, unsigned int flags, 848 unsigned vlen, unsigned int flags); 854 compat_ulong_t vlen, u32 pos_low, u32 pos_high, rwf_t flags); 857 compat_ulong_t vlen, u32 pos_low, u32 pos_high, rwf_t flags); 861 unsigned long vlen, loff_t pos, rwf_t flags); [all …]
|