Home
last modified time | relevance | path

Searched refs:key_size (Results 1 – 25 of 254) sorted by relevance

1234567891011

/linux/crypto/
A Drsa-pkcs1pad.c116 unsigned int key_size; member
136 ctx->key_size = 0; in pkcs1pad_set_pub_key()
147 ctx->key_size = err; in pkcs1pad_set_pub_key()
157 ctx->key_size = 0; in pkcs1pad_set_priv_key()
168 ctx->key_size = err; in pkcs1pad_set_priv_key()
182 return ctx->key_size; in pkcs1pad_get_max_size()
257 if (!ctx->key_size) in pkcs1pad_encrypt()
371 if (!ctx->key_size || req->src_len != ctx->key_size) in pkcs1pad_decrypt()
388 ctx->key_size); in pkcs1pad_decrypt()
408 if (!ctx->key_size) in pkcs1pad_sign()
[all …]
A Ddh_helper.c31 return p->key_size + p->p_size + p->g_size; in dh_data_size()
53 ptr = dh_pack_data(ptr, end, &params->key_size, in crypto_dh_encode_key()
54 sizeof(params->key_size)); in crypto_dh_encode_key()
57 ptr = dh_pack_data(ptr, end, params->key, params->key_size); in crypto_dh_encode_key()
78 ptr = dh_unpack_data(&params->key_size, ptr, sizeof(params->key_size)); in __crypto_dh_decode_key()
88 params->p = (void *)(ptr + params->key_size); in __crypto_dh_decode_key()
89 params->g = (void *)(ptr + params->key_size + params->p_size); in __crypto_dh_decode_key()
106 if (params->key_size > params->p_size || in crypto_dh_decode_key()
A Decdh_helper.c29 return ECDH_KPP_SECRET_MIN_SIZE + params->key_size; in crypto_ecdh_key_len()
49 ptr = ecdh_pack_data(ptr, &params->key_size, sizeof(params->key_size)); in crypto_ecdh_encode_key()
50 ecdh_pack_data(ptr, params->key, params->key_size); in crypto_ecdh_encode_key()
72 ptr = ecdh_unpack_data(&params->key_size, ptr, sizeof(params->key_size)); in crypto_ecdh_decode_key()
A Decdh.c34 params.key_size > sizeof(u64) * ctx->ndigits) in ecdh_set_secret()
39 if (!params.key || !params.key_size) in ecdh_set_secret()
43 ecc_digits_from_bytes(params.key, params.key_size, in ecdh_set_secret()
47 ctx->private_key, params.key_size) < 0) { in ecdh_set_secret()
48 memzero_explicit(ctx->private_key, params.key_size); in ecdh_set_secret()
/linux/kernel/bpf/
A Dhashtab.c686 u32 hash, key_size; in __htab_map_lookup_elem() local
691 key_size = map->key_size; in __htab_map_lookup_elem()
848 key_size = map->key_size; in htab_map_get_next_key()
1119 key_size = map->key_size; in htab_map_update_elem()
1222 key_size = map->key_size; in htab_lru_map_update_elem()
1291 key_size = map->key_size; in __htab_percpu_map_update_elem()
1346 key_size = map->key_size; in __htab_lru_percpu_map_update_elem()
1424 key_size = map->key_size; in htab_map_delete_elem()
1460 key_size = map->key_size; in htab_lru_map_delete_elem()
1610 key_size = map->key_size; in __htab_map_lookup_and_delete_elem()
[all …]
A Dmap_in_map.c37 inner_map_meta->key_size = inner_map->key_size; in bpf_map_meta_alloc()
88 meta0->key_size == meta1->key_size && in bpf_map_meta_equal()
/linux/tools/testing/selftests/bpf/
A Dtest_lpm_map.c427 size_t key_size; in test_lpm_delete() local
432 key = alloca(key_size); in test_lpm_delete()
435 key_size, sizeof(value), in test_lpm_delete()
536 size_t key_size; in test_lpm_get_next_key() local
541 key_p = alloca(key_size); in test_lpm_get_next_key()
555 memset(key_p, 0, key_size); in test_lpm_get_next_key()
573 memset(key_p, 0, key_size); in test_lpm_get_next_key()
591 memset(key_p, 0, key_size); in test_lpm_get_next_key()
614 memset(key_p, 0, key_size); in test_lpm_get_next_key()
642 memset(key_p, 0, key_size); in test_lpm_get_next_key()
[all …]
/linux/tools/testing/selftests/bpf/prog_tests/
A Dbtf.c68 __u32 key_size; member
136 .key_size = sizeof(int),
191 .key_size = sizeof(int),
216 .key_size = sizeof(int),
257 .key_size = sizeof(int),
302 .key_size = sizeof(int),
324 .key_size = sizeof(int),
346 .key_size = sizeof(int),
368 .key_size = sizeof(int),
4066 .key_size = 8,
[all …]
/linux/tools/bpf/bpftool/
A Dmap.c139 print_hex_data_json(key, info->key_size); in print_entry_json()
162 print_hex_data_json(key, info->key_size); in print_entry_json()
257 if (info->key_size) { in print_entry_plain()
281 if (info->key_size) { in print_entry_plain()
353 if (key_size) in parse_elem()
831 key = malloc(info->key_size); in map_dump()
967 if (info->key_size) { in alloc_key_value()
968 *key = malloc(info->key_size); in alloc_key_value()
1134 key = malloc(info.key_size); in do_getnext()
1135 nextkey = malloc(info.key_size); in do_getnext()
[all …]
/linux/tools/lib/bpf/
A Dlibbpf_probes.c285 int key_size, value_size, max_entries; in probe_map_create() local
289 key_size = sizeof(__u32); in probe_map_create()
298 key_size = sizeof(__u64); in probe_map_create()
304 key_size = sizeof(struct bpf_cgroup_storage_key); in probe_map_create()
310 key_size = 0; in probe_map_create()
327 key_size = 0; in probe_map_create()
338 key_size = 0; in probe_map_create()
342 key_size = 0; in probe_map_create()
388 fd = bpf_map_create(map_type, NULL, key_size, value_size, max_entries, &opts); in probe_map_create()
/linux/drivers/net/ethernet/netronome/nfp/flower/
A Doffload.c250 int key_size; in nfp_flower_calculate_key_layers() local
270 key_size = sizeof(struct nfp_flower_meta_tci) + in nfp_flower_calculate_key_layers()
292 key_size += sizeof(struct nfp_flower_vlan); in nfp_flower_calculate_key_layers()
309 key_size += sizeof(struct nfp_flower_vlan); in nfp_flower_calculate_key_layers()
379 key_size += in nfp_flower_calculate_key_layers()
382 key_size += in nfp_flower_calculate_key_layers()
401 &key_size, priv, in nfp_flower_calculate_key_layers()
425 key_size += sizeof(struct nfp_flower_ipv4); in nfp_flower_calculate_key_layers()
430 key_size += sizeof(struct nfp_flower_ipv6); in nfp_flower_calculate_key_layers()
542 ret_key_ls->key_size = key_size; in nfp_flower_calculate_key_layers()
[all …]
/linux/tools/perf/util/bpf_skel/
A Dfunc_latency.bpf.c12 __uint(key_size, sizeof(__u64));
19 __uint(key_size, sizeof(__u32));
26 __uint(key_size, sizeof(__u32));
33 __uint(key_size, sizeof(__u32));
A Dlock_contention.bpf.c25 __uint(key_size, sizeof(__u32));
41 __uint(key_size, sizeof(__u32));
49 __uint(key_size, sizeof(struct contention_key));
56 __uint(key_size, sizeof(__u32));
63 __uint(key_size, sizeof(__u64));
70 __uint(key_size, sizeof(__u32));
77 __uint(key_size, sizeof(__u32));
84 __uint(key_size, sizeof(__u32));
91 __uint(key_size, sizeof(__u64));
98 __uint(key_size, sizeof(__u64));
A Dbperf_leader.bpf.c9 __uint(key_size, sizeof(__u32));
16 __uint(key_size, sizeof(__u32));
23 __uint(key_size, sizeof(__u32));
A Dbperf_follower.bpf.c10 __uint(key_size, sizeof(__u32));
17 __uint(key_size, sizeof(__u32));
24 __uint(key_size, sizeof(__u32));
A Dbpf_prog_profiler.bpf.c10 __uint(key_size, sizeof(__u32));
17 __uint(key_size, sizeof(__u32));
25 __uint(key_size, sizeof(__u32));
A Doff_cpu.bpf.c37 __uint(key_size, sizeof(__u32));
51 __uint(key_size, sizeof(struct offcpu_key));
58 __uint(key_size, sizeof(__u32));
65 __uint(key_size, sizeof(__u32));
72 __uint(key_size, sizeof(__u64));
A Dbperf_cgroup.bpf.c18 __uint(key_size, sizeof(__u32));
26 __uint(key_size, sizeof(__u64));
34 __uint(key_size, sizeof(__u32));
42 __uint(key_size, sizeof(__u32));
/linux/drivers/mmc/host/
A Dcqhci-crypto.c17 enum cqhci_crypto_key_size key_size; member
21 .key_size = CQHCI_CRYPTO_KEY_SIZE_256,
80 ccap_array[i].key_size == alg->key_size && in cqhci_crypto_keyslot_program()
149 cqhci_crypto_algs[i].key_size == cap.key_size) in cqhci_find_blk_crypto_mode()
/linux/tools/testing/selftests/bpf/benchs/
A Dbench_bpf_hashmap_lookup.c21 __u32 key_size; member
27 .key_size = 4,
67 args.key_size = ret; in parse_arg()
167 bpf_map__set_key_size(ctx.skel->maps.hash_map_bench, args.key_size); in setup()
174 if (args.key_size > 4) { in setup()
175 for (i = 1; i < args.key_size/4; i++) in setup()
/linux/tools/bpf/bpftool/skeleton/
A Dprofiler.bpf.c16 __uint(key_size, sizeof(u32));
23 __uint(key_size, sizeof(u32));
30 __uint(key_size, sizeof(u32));
37 __uint(key_size, sizeof(u32));
/linux/crypto/asymmetric_keys/
A Dpkcs8_parser.c25 u32 key_size; member
90 ctx->key_size = vlen; in pkcs8_note_key()
119 pub->key = kmemdup(ctx.key, ctx.key_size, GFP_KERNEL); in pkcs8_parse()
123 pub->keylen = ctx.key_size; in pkcs8_parse()
/linux/kernel/trace/
A Dtracing_map.c414 elt->key = kzalloc(map->key_size, GFP_KERNEL); in tracing_map_elt_alloc()
509 if (memcmp(key, test_key, key_size)) in keys_match()
523 key_hash = jhash(key, map->key_size, 0); in __tracing_map_insert()
536 keys_match(key, val->key, map->key_size)) { in __tracing_map_insert()
576 memcpy(elt->key, key, map->key_size); in __tracing_map_insert()
769 unsigned int key_size, in tracing_map_create() argument
798 map->key_size = key_size; in tracing_map_create()
853 if (memcmp(a->key, b->key, a->elt->map->key_size)) in cmp_entries_dup()
967 int n_entries, unsigned int key_size) in detect_dups() argument
981 if (!memcmp(sort_entries[i]->key, key, key_size)) { in detect_dups()
[all …]
/linux/fs/ecryptfs/
A Dcrypto.c285 crypt_stat->key_size); in crypt_scatterlist()
287 crypt_stat->key_size); in crypt_scatterlist()
304 crypt_stat->key_size); in crypt_scatterlist()
539 crypt_stat->key_size << 3); in ecryptfs_init_crypt_ctx()
621 crypt_stat->key_size); in ecryptfs_compute_root_iv()
644 crypt_stat->key_size); in ecryptfs_generate_new_key()
770 crypt_stat->key_size = in ecryptfs_new_file_context()
1546 if (*key_size == 0) in ecryptfs_process_key_cipher()
1594 size_t key_size) in ecryptfs_add_new_key_tfm() argument
1610 tmp_tfm->key_size = key_size; in ecryptfs_add_new_key_tfm()
[all …]
/linux/net/core/
A Dsock_map.c44 attr->key_size != 4 || in sock_map_alloc()
874 u32 key_size) in sock_hash_lookup_elem_raw() argument
890 u32 key_size = map->key_size, hash; in __sock_hash_lookup_elem() local
938 u32 hash, key_size = map->key_size; in sock_hash_delete_elem() local
959 void *key, u32 key_size, in sock_hash_alloc_elem() argument
979 memcpy(new->key, key, key_size); in sock_hash_alloc_elem()
989 u32 key_size = map->key_size, hash; in sock_hash_update_common() local
1055 u32 hash, key_size = map->key_size; in sock_hash_get_next_key() local
1096 attr->key_size == 0 || in sock_hash_alloc()
1101 if (attr->key_size > MAX_BPF_STACK) in sock_hash_alloc()
[all …]

Completed in 73 milliseconds

1234567891011