| /linux/crypto/ |
| H A D | rsa_helper.c | 17 const void *value, size_t vlen) in rsa_get_n() argument 21 size_t n_sz = vlen; in rsa_get_n() 24 if (!value || !vlen) in rsa_get_n() 41 key->n_sz = vlen; in rsa_get_n() 47 const void *value, size_t vlen) in rsa_get_e() argument 52 if (!value || !key->n_sz || !vlen || vlen > key->n_sz) in rsa_get_e() 56 key->e_sz = vlen; in rsa_get_e() 62 const void *value, size_t vlen) in rsa_get_d() argument 67 if (!value || !key->n_sz || !vlen || vlen > key->n_sz) in rsa_get_d() 71 key->d_sz = vlen; in rsa_get_d() [all …]
|
| /linux/crypto/asymmetric_keys/ |
| H A D | x509_cert_parser.c | 143 const void *value, size_t vlen) in x509_note_OID() argument 147 ctx->last_oid = look_up_OID(value, vlen); in x509_note_OID() 150 sprint_oid(value, vlen, buffer, sizeof(buffer)); in x509_note_OID() 163 const void *value, size_t vlen) in x509_note_tbs_certificate() argument 168 hdrlen, tag, (unsigned long)value - ctx->data, vlen); in x509_note_tbs_certificate() 171 ctx->cert->tbs_size = vlen + hdrlen; in x509_note_tbs_certificate() 179 const void *value, size_t vlen) in x509_note_sig_algo() argument 299 const void *value, size_t vlen) in x509_note_signature() argument 303 pr_debug("Signature: alg=%u, size=%zu\n", ctx->last_oid, vlen); in x509_note_signature() 321 if (vlen < 1 || *(const u8 *)value != 0) in x509_note_signature() [all …]
|
| H A D | pkcs7_parser.c | 220 const void *value, size_t vlen) in pkcs7_note_OID() argument 224 ctx->last_oid = look_up_OID(value, vlen); in pkcs7_note_OID() 227 sprint_oid(value, vlen, buffer, sizeof(buffer)); in pkcs7_note_OID() 239 const void *value, size_t vlen) in pkcs7_sig_note_digest_algo() argument 289 const void *value, size_t vlen) in pkcs7_sig_note_pkey_algo() argument 341 const void *value, size_t vlen) in pkcs7_check_content_type() argument 358 const void *value, size_t vlen) in pkcs7_note_signeddata_version() argument 363 if (vlen != 1) in pkcs7_note_signeddata_version() 392 const void *value, size_t vlen) in pkcs7_note_signerinfo_version() argument 397 if (vlen != 1) in pkcs7_note_signerinfo_version() [all …]
|
| H A D | mscode_parser.c | 38 const void *value, size_t vlen) in mscode_note_content_type() argument 42 oid = look_up_OID(value, vlen); in mscode_note_content_type() 46 sprint_oid(value, vlen, buffer, sizeof(buffer)); in mscode_note_content_type() 70 const void *value, size_t vlen) in mscode_note_digest_algo() argument 76 oid = look_up_OID(value, vlen); in mscode_note_digest_algo() 101 sprint_oid(value, vlen, buffer, sizeof(buffer)); in mscode_note_digest_algo() 118 const void *value, size_t vlen) in mscode_note_digest() argument 122 ctx->digest = kmemdup(value, vlen, GFP_KERNEL); in mscode_note_digest() 126 ctx->digest_len = vlen; in mscode_note_digest()
|
| H A D | pkcs8_parser.c | 35 const void *value, size_t vlen) in pkcs8_note_OID() argument 39 ctx->last_oid = look_up_OID(value, vlen); in pkcs8_note_OID() 43 sprint_oid(value, vlen, buffer, sizeof(buffer)); in pkcs8_note_OID() 55 const void *value, size_t vlen) in pkcs8_note_version() argument 57 if (vlen != 1 || ((const u8 *)value)[0] != 0) { in pkcs8_note_version() 69 const void *value, size_t vlen) in pkcs8_note_algo() argument 85 const void *value, size_t vlen) in pkcs8_note_key() argument 90 ctx->key_size = vlen; in pkcs8_note_key()
|
| /linux/tools/testing/selftests/bpf/prog_tests/ |
| H A D | btf_distill.c | 72 "[3] STRUCT 's1' size=8 vlen=1\n" in test_distilled_base() 74 "[4] STRUCT '(anon)' size=12 vlen=2\n" in test_distilled_base() 78 "[6] UNION 'u1' size=12 vlen=2\n" in test_distilled_base() 81 "[7] UNION '(anon)' size=4 vlen=1\n" in test_distilled_base() 83 "[8] ENUM 'e1' encoding=UNSIGNED size=4 vlen=1\n" in test_distilled_base() 85 "[9] ENUM '(anon)' encoding=UNSIGNED size=4 vlen=1\n" in test_distilled_base() 87 "[10] ENUM64 'e641' encoding=SIGNED size=8 vlen=1\n" in test_distilled_base() 89 "[11] ENUM64 '(anon)' encoding=SIGNED size=8 vlen=1\n" in test_distilled_base() 91 "[12] STRUCT 'unneeded' size=4 vlen=1\n" in test_distilled_base() 93 "[13] STRUCT 'embedded' size=4 vlen=1\n" in test_distilled_base() [all …]
|
| H A D | btf_dedup_split.c | 28 "[3] STRUCT 's1' size=4 vlen=1\n" in test_split_simple() 70 "[3] STRUCT 's1' size=4 vlen=1\n" in test_split_simple() 72 "[4] STRUCT 's2' size=16 vlen=3\n" in test_split_simple() 77 "[6] STRUCT 's1' size=4 vlen=1\n" in test_split_simple() 103 "[3] STRUCT 's1' size=4 vlen=1\n" in test_split_simple() 105 "[4] STRUCT 's2' size=16 vlen=3\n" in test_split_simple() 156 "[4] STRUCT 's1' size=16 vlen=2\n" in test_split_fwd_resolve() 159 "[5] STRUCT 's2' size=4 vlen=1\n" in test_split_fwd_resolve() 161 "[6] STRUCT 's3' size=4 vlen=1\n" in test_split_fwd_resolve() 184 "[4] STRUCT 's1' size=16 vlen in test_split_fwd_resolve() [all...] |
| H A D | btf_write.c | 125 "[7] STRUCT 's1' size=8 vlen=2\n" in gen_btf() 152 "[8] UNION 'u1' size=8 vlen=1\n" in gen_btf() 175 "[9] ENUM 'e1' encoding=UNSIGNED size=4 vlen=2\n" in gen_btf() 206 "[12] ENUM 'enum_fwd' encoding=UNSIGNED size=4 vlen=0", "raw_dump"); in gen_btf() 247 "[15] FUNC_PROTO '(anon)' ret_type_id=1 vlen=2\n" in gen_btf() 278 "[17] DATASEC 'datasec1' size=12 vlen=1\n" in gen_btf() 333 "[21] ENUM64 'e1' encoding=SIGNED size=8 vlen=2\n" in gen_btf() 351 "[22] ENUM64 'e1' encoding=UNSIGNED size=8 vlen=1\n" in gen_btf() 373 "[7] STRUCT 's1' size=8 vlen=2\n" in test_btf_add() 376 "[8] UNION 'u1' size=8 vlen in test_btf_add() [all...] |
| H A D | btf_field_iter.c | 97 "[5] STRUCT 's1' size=12 vlen=2\n" in test_btf_field_iter() 100 "[6] UNION 'u1' size=12 vlen=2\n" in test_btf_field_iter() 103 "[7] ENUM 'e1' encoding=UNSIGNED size=4 vlen=2\n" in test_btf_field_iter() 111 "[13] FUNC_PROTO '(anon)' ret_type_id=1 vlen=2\n" in test_btf_field_iter() 120 "[20] ENUM64 'e64' encoding=SIGNED size=8 vlen=3\n" in test_btf_field_iter() 124 "[21] DATASEC 'datasec1' size=12 vlen=2\n" in test_btf_field_iter()
|
| /linux/fs/smb/server/ |
| H A D | asn1.c | 163 const void *value, size_t vlen) in ksmbd_gssapi_this_mech() argument 167 oid = look_up_OID(value, vlen); in ksmbd_gssapi_this_mech() 171 sprint_oid(value, vlen, buf, sizeof(buf)); in ksmbd_gssapi_this_mech() 181 size_t vlen) in ksmbd_neg_token_init_mech_type() argument 187 oid = look_up_OID(value, vlen); in ksmbd_neg_token_init_mech_type() 199 sprint_oid(value, vlen, buf, sizeof(buf)); in ksmbd_neg_token_init_mech_type() 213 size_t vlen) in ksmbd_neg_token_alloc() argument 217 if (!vlen) in ksmbd_neg_token_alloc() 220 conn->mechToken = kmemdup_nul(value, vlen, KSMBD_DEFAULT_GFP); in ksmbd_neg_token_alloc() 224 conn->mechTokenLen = (unsigned int)vlen; in ksmbd_neg_token_alloc() [all …]
|
| /linux/tools/testing/selftests/bpf/ |
| H A D | btf_helpers.c | 92 __u32 vlen; in fprintf_btf_type_raw() local 98 vlen = btf_vlen(t); in fprintf_btf_type_raw() 128 fprintf(out, " size=%u vlen=%u", t->size, vlen); in fprintf_btf_type_raw() 129 for (i = 0; i < vlen; i++, m++) { in fprintf_btf_type_raw() 146 fprintf(out, " encoding=%s size=%u vlen=%u", in fprintf_btf_type_raw() 147 btf_kflag(t) ? "SIGNED" : "UNSIGNED", t->size, vlen); in fprintf_btf_type_raw() 148 for (i = 0; i < vlen; i++, v++) { in fprintf_btf_type_raw() 160 fprintf(out, " encoding=%s size=%u vlen=%u", in fprintf_btf_type_raw() 161 btf_kflag(t) ? "SIGNED" : "UNSIGNED", t->size, vlen); in fprintf_btf_type_raw() 162 for (i = 0; i < vlen; i++, v++) { in fprintf_btf_type_raw() [all …]
|
| H A D | test_btf.h | 9 #define BTF_INFO_ENC(kind, kind_flag, vlen) \ argument 10 ((!!(kind_flag) << 31) | ((kind) << 24) | ((vlen) & BTF_MAX_VLEN))
|
| /linux/fs/smb/client/ |
| H A D | asn1.c | 23 unsigned char tag, const void *value, size_t vlen) in cifs_gssapi_this_mech() argument 27 oid = look_up_OID(value, vlen); in cifs_gssapi_this_mech() 31 sprint_oid(value, vlen, buf, sizeof(buf)); in cifs_gssapi_this_mech() 41 const void *value, size_t vlen) in cifs_neg_token_init_mech_type() argument 46 oid = look_up_OID(value, vlen); in cifs_neg_token_init_mech_type() 60 sprint_oid(value, vlen, buf, sizeof(buf)); in cifs_neg_token_init_mech_type()
|
| /linux/tools/bpf/bpftool/ |
| H A D | btf.c | 182 __u16 vlen = BTF_INFO_VLEN(t->info); in dump_btf_type() 187 jsonw_uint_field(w, "vlen", vlen); in dump_btf_type() 191 printf(" size=%u vlen=%u", t->size, vlen); in dump_btf_type() 193 for (i = 0; i < vlen; i++, m++) { in dump_btf_type() 228 __u16 vlen = BTF_INFO_VLEN(t->info); in dump_btf_type() 236 jsonw_uint_field(w, "vlen", vlen); in dump_btf_type() 240 printf(" encoding=%s size=%u vlen in dump_btf_type() 181 __u16 vlen = BTF_INFO_VLEN(t->info); dump_btf_type() local 227 __u16 vlen = BTF_INFO_VLEN(t->info); dump_btf_type() local 265 __u16 vlen = btf_vlen(t); dump_btf_type() local 327 __u16 vlen = BTF_INFO_VLEN(t->info); dump_btf_type() local 371 __u16 vlen = BTF_INFO_VLEN(t->info); dump_btf_type() local [all...] |
| /linux/tools/bpf/bpftool/Documentation/ |
| H A D | bpftool-btf.rst | 105 [2] STRUCT 'dummy_tracepoint_args' size=16 vlen=2 160 [2] UNION 'my_union' size=48 vlen=2 164 [4] STRUCT 'my_struct' size=48 vlen=6 180 [14] ENUM 'my_enum' size=4 vlen=2 186 [18] FUNC_PROTO '(anon)' ret_type_id=3 vlen=2 193 [23] DATASEC 'data_sec' size=0 vlen=3 251 [104848] STRUCT 'i2c_smbus_alert' size=40 vlen=2 254 [104849] STRUCT 'alert_data' size=12 vlen=3 262 [104854] FUNC_PROTO '(anon)' ret_type_id=18 vlen=1 266 [104857] FUNC_PROTO '(anon)' ret_type_id=18 vlen [all...] |
| /linux/tools/include/uapi/linux/ |
| H A D | btf.h | 46 * bits 0-15: vlen (e.g. # of struct's members) 115 * The exact number of btf_enum is stored in the vlen (of the 132 * of btf_member is stored in the vlen (of the info in 155 * The exact number of btf_param is stored in the vlen (of the 197 * or argument (0 ... vlen-1). 204 * The exact number of btf_enum64 is stored in the vlen (of the
|
| /linux/security/keys/trusted-keys/ |
| H A D | trusted_tpm2.c | 136 const void *value, size_t vlen) in tpm2_key_parent() argument 143 for (i = 0; i < vlen; i++) { in tpm2_key_parent() 153 const void *value, size_t vlen) in tpm2_key_type() argument 155 enum OID oid = look_up_OID(value, vlen); in tpm2_key_type() 160 sprint_oid(value, vlen, buffer, sizeof(buffer)); in tpm2_key_type() 171 const void *value, size_t vlen) in tpm2_key_pub() argument 176 ctx->pub_len = vlen; in tpm2_key_pub() 183 const void *value, size_t vlen) in tpm2_key_priv() argument 188 ctx->priv_len = vlen; in tpm2_key_priv()
|
| /linux/tools/testing/selftests/riscv/vector/ |
| H A D | validate_v_ptrace.c | 460 /* invalid fractional LMUL for VLEN <= 256: LMUL= 1/8, SEW = 64 */ 473 /* invalid integral LMUL for VLEN <= 16: LMUL= 2, SEW = 64 */ 486 /* XTheadVector: invalid integral LMUL for VLEN <= 16: LMUL= 2, SEW = 64 */ 499 /* invalid VL for VLEN <= 128: LMUL= 2, SEW = 64, VL = 8 */ 512 /* XTheadVector: invalid VL for VLEN <= 128: LMUL= 2, SEW = 64, VL = 8 */ 543 SKIP(return, "This test does not support VLEN < %lu\n", in TEST_F() 549 SKIP(return, "This test does not support VLEN > %lu\n", in TEST_F() 681 /* valid for VLEN >= 128: LMUL= 1/4, SEW = 32 */ 694 /* valid for VLEN >= 16: LMUL= 2, SEW = 32 */ 707 /* valid for XTheadVector VLEN >= 16: LMUL= 2, SEW = 32 */ [all …]
|
| /linux/net/ |
| H A D | compat.c | 358 unsigned int vlen, unsigned int flags) in __compat_sys_sendmmsg() argument 360 return __sys_sendmmsg(fd, (struct mmsghdr __user *)mmsg, vlen, in __compat_sys_sendmmsg() 365 unsigned int, vlen, unsigned int, flags) in COMPAT_SYSCALL_DEFINE4() argument 367 return __compat_sys_sendmmsg(fd, mmsg, vlen, flags); in COMPAT_SYSCALL_DEFINE4() 406 unsigned int, vlen, unsigned int, flags, in COMPAT_SYSCALL_DEFINE5() argument 409 return __sys_recvmmsg(fd, (struct mmsghdr __user *)mmsg, vlen, in COMPAT_SYSCALL_DEFINE5() 415 unsigned int, vlen, unsigned int, flags, in COMPAT_SYSCALL_DEFINE5() argument 418 return __sys_recvmmsg(fd, (struct mmsghdr __user *)mmsg, vlen, in COMPAT_SYSCALL_DEFINE5()
|
| /linux/arch/riscv/kernel/ |
| H A D | ptrace.c | 135 unsigned long elen, vlen; in invalid_ptrace_v_csr() local 139 vlen = vstate->vlenb * 8; in invalid_ptrace_v_csr() 176 /* integer 1/LMUL: VL =< VLMAX = VLEN / SEW / LMUL */ in invalid_ptrace_v_csr() 178 if (vlen < vl * sew * lmul) in invalid_ptrace_v_csr() 181 /* integer LMUL: VL =< VLMAX = LMUL * VLEN / SEW */ in invalid_ptrace_v_csr() 183 if (vl * sew > lmul * vlen) in invalid_ptrace_v_csr() 210 if (vl * sew > lmul * vlen) in invalid_ptrace_v_csr()
|
| /linux/tools/lib/bpf/ |
| H A D | btf_iter.c | 22 it->vlen = 0; in btf_field_iter_init() 139 it->vlen = btf_vlen(t); in btf_field_iter_init() 172 if (it->m_idx < it->vlen) in btf_field_iter_next()
|
| H A D | libbpf_internal.h | 79 #define BTF_INFO_ENC(kind, kind_flag, vlen) \ argument 80 ((!!(kind_flag) << 31) | ((kind) << 24) | ((vlen) & BTF_MAX_VLEN)) 259 static inline __u32 btf_type_info(int kind, int vlen, int kflag) in btf_type_info() argument 261 return (kflag << 31) | (kind << 24) | vlen; in btf_type_info() 586 int vlen; 577 int vlen; global() member
|
| /linux/arch/um/drivers/ |
| H A D | vector_user.h | 89 unsigned int vlen, 95 unsigned int vlen,
|
| /linux/tools/testing/selftests/mm/ |
| H A D | process_madv.c | 49 size_t vlen, int advice, unsigned int flags) in sys_process_madvise() argument 51 return syscall(__NR_process_madvise, pidfd, iovec, vlen, advice, flags); in sys_process_madvise() 285 * Test that process_madvise() rejects vlen > UIO_MAXIOV.
|
| /linux/tools/perf/util/ |
| H A D | bpf-event.c | 192 unsigned int vlen, vars; in bpf_metadata_read_map_data() local 224 vlen = btf_vlen(datasec); in bpf_metadata_read_map_data() 227 for (unsigned int i = 0; i < vlen; i++, vsi++) { in bpf_metadata_read_map_data() 306 unsigned int i, vlen; in bpf_metadata_fill_event() local 309 vlen = btf_vlen(map->datasec); in bpf_metadata_fill_event() 312 for (i = 0; i < vlen; i++, vsi++) { in bpf_metadata_fill_event()
|