| /Linux-v5.15/crypto/ |
| D | rsa_helper.c | 17 const void *value, size_t vlen) in rsa_get_n() argument 21 size_t n_sz = vlen; in rsa_get_n() 24 if (!value || !vlen) in rsa_get_n() 41 key->n_sz = vlen; in rsa_get_n() 47 const void *value, size_t vlen) in rsa_get_e() argument 52 if (!value || !key->n_sz || !vlen || vlen > key->n_sz) in rsa_get_e() 56 key->e_sz = vlen; in rsa_get_e() 62 const void *value, size_t vlen) in rsa_get_d() argument 67 if (!value || !key->n_sz || !vlen || vlen > key->n_sz) in rsa_get_d() 71 key->d_sz = vlen; in rsa_get_d() [all …]
|
| D | ecdsa.c | 36 const void *value, size_t vlen, unsigned int ndigits) in ecdsa_get_signature_rs() argument 39 ssize_t diff = vlen - keylen; in ecdsa_get_signature_rs() 43 if (!value || !vlen) in ecdsa_get_signature_rs() 54 vlen -= 1; in ecdsa_get_signature_rs() 69 memcpy(&rs[-diff], d, vlen); in ecdsa_get_signature_rs() 77 const void *value, size_t vlen) in ecdsa_get_signature_r() argument 81 return ecdsa_get_signature_rs(sig->r, hdrlen, tag, value, vlen, in ecdsa_get_signature_r() 86 const void *value, size_t vlen) in ecdsa_get_signature_s() argument 90 return ecdsa_get_signature_rs(sig->s, hdrlen, tag, value, vlen, in ecdsa_get_signature_s()
|
| D | ecrdsa.c | 151 const void *value, size_t vlen) in ecrdsa_param_curve() argument 155 ctx->curve_oid = look_up_OID(value, vlen); in ecrdsa_param_curve() 164 const void *value, size_t vlen) in ecrdsa_param_digest() argument 167 int digest_oid = look_up_OID(value, vlen); in ecrdsa_param_digest() 175 const void *value, size_t vlen) in ecrdsa_parse_pub_key() argument 180 ctx->key_len = vlen; in ecrdsa_parse_pub_key()
|
| D | sm2.c | 187 const void *value, size_t vlen) in sm2_get_signature_r() argument 191 if (!value || !vlen) in sm2_get_signature_r() 194 sig->sig_r = mpi_read_raw_data(value, vlen); in sm2_get_signature_r() 202 const void *value, size_t vlen) in sm2_get_signature_s() argument 206 if (!value || !vlen) in sm2_get_signature_s() 209 sig->sig_s = mpi_read_raw_data(value, vlen); in sm2_get_signature_s()
|
| /Linux-v5.15/crypto/asymmetric_keys/ |
| D | x509_cert_parser.c | 157 const void *value, size_t vlen) in x509_note_OID() argument 161 ctx->last_oid = look_up_OID(value, vlen); in x509_note_OID() 164 sprint_oid(value, vlen, buffer, sizeof(buffer)); in x509_note_OID() 177 const void *value, size_t vlen) in x509_note_tbs_certificate() argument 182 hdrlen, tag, (unsigned long)value - ctx->data, vlen); in x509_note_tbs_certificate() 185 ctx->cert->tbs_size = vlen + hdrlen; in x509_note_tbs_certificate() 194 const void *value, size_t vlen) in x509_note_pkey_algo() argument 290 const void *value, size_t vlen) in x509_note_signature() argument 294 pr_debug("Signature type: %u size %zu\n", ctx->last_oid, vlen); in x509_note_signature() 307 if (vlen < 1 || *(const u8 *)value != 0) in x509_note_signature() [all …]
|
| D | pkcs7_parser.c | 206 const void *value, size_t vlen) in pkcs7_note_OID() argument 210 ctx->last_oid = look_up_OID(value, vlen); in pkcs7_note_OID() 213 sprint_oid(value, vlen, buffer, sizeof(buffer)); in pkcs7_note_OID() 225 const void *value, size_t vlen) in pkcs7_sig_note_digest_algo() argument 263 const void *value, size_t vlen) in pkcs7_sig_note_pkey_algo() argument 292 const void *value, size_t vlen) in pkcs7_check_content_type() argument 309 const void *value, size_t vlen) in pkcs7_note_signeddata_version() argument 314 if (vlen != 1) in pkcs7_note_signeddata_version() 343 const void *value, size_t vlen) in pkcs7_note_signerinfo_version() argument 348 if (vlen != 1) in pkcs7_note_signerinfo_version() [all …]
|
| D | mscode_parser.c | 38 const void *value, size_t vlen) in mscode_note_content_type() argument 42 oid = look_up_OID(value, vlen); in mscode_note_content_type() 46 sprint_oid(value, vlen, buffer, sizeof(buffer)); in mscode_note_content_type() 70 const void *value, size_t vlen) in mscode_note_digest_algo() argument 76 oid = look_up_OID(value, vlen); in mscode_note_digest_algo() 101 sprint_oid(value, vlen, buffer, sizeof(buffer)); in mscode_note_digest_algo() 118 const void *value, size_t vlen) in mscode_note_digest() argument 122 ctx->digest = kmemdup(value, vlen, GFP_KERNEL); in mscode_note_digest() 126 ctx->digest_len = vlen; in mscode_note_digest()
|
| D | pkcs8_parser.c | 35 const void *value, size_t vlen) in pkcs8_note_OID() argument 39 ctx->last_oid = look_up_OID(value, vlen); in pkcs8_note_OID() 43 sprint_oid(value, vlen, buffer, sizeof(buffer)); in pkcs8_note_OID() 55 const void *value, size_t vlen) in pkcs8_note_version() argument 57 if (vlen != 1 || ((const u8 *)value)[0] != 0) { in pkcs8_note_version() 69 const void *value, size_t vlen) in pkcs8_note_algo() argument 85 const void *value, size_t vlen) in pkcs8_note_key() argument 90 ctx->key_size = vlen; in pkcs8_note_key()
|
| D | tpm_parser.c | 23 const void *value, size_t vlen) in tpm_note_key() argument 28 ctx->blob_len = vlen; in tpm_note_key()
|
| /Linux-v5.15/fs/ksmbd/ |
| D | asn1.c | 60 static bool asn1_oid_decode(const unsigned char *value, size_t vlen, in asn1_oid_decode() argument 63 const unsigned char *iptr = value, *end = value + vlen; in asn1_oid_decode() 67 vlen += 1; in asn1_oid_decode() 68 if (vlen < 2 || vlen > UINT_MAX / sizeof(unsigned long)) in asn1_oid_decode() 71 *oid = kmalloc(vlen * sizeof(unsigned long), GFP_KERNEL); in asn1_oid_decode() 95 if (++(*oidlen) > vlen) in asn1_oid_decode() 253 const void *value, size_t vlen) in ksmbd_gssapi_this_mech() argument 259 if (!asn1_oid_decode(value, vlen, &oid, &oidlen)) { in ksmbd_gssapi_this_mech() 271 sprint_oid(value, vlen, buf, sizeof(buf)); in ksmbd_gssapi_this_mech() 279 size_t vlen) in ksmbd_neg_token_init_mech_type() argument [all …]
|
| /Linux-v5.15/fs/cifs/ |
| D | asn1.c | 23 unsigned char tag, const void *value, size_t vlen) in cifs_gssapi_this_mech() argument 27 oid = look_up_OID(value, vlen); in cifs_gssapi_this_mech() 31 sprint_oid(value, vlen, buf, sizeof(buf)); in cifs_gssapi_this_mech() 41 const void *value, size_t vlen) in cifs_neg_token_init_mech_type() argument 46 oid = look_up_OID(value, vlen); in cifs_neg_token_init_mech_type() 58 sprint_oid(value, vlen, buf, sizeof(buf)); in cifs_neg_token_init_mech_type()
|
| /Linux-v5.15/tools/testing/selftests/bpf/ |
| D | btf_helpers.c | 89 __u32 vlen; in fprintf_btf_type_raw() local 95 vlen = btf_vlen(t); in fprintf_btf_type_raw() 124 fprintf(out, " size=%u vlen=%u", t->size, vlen); in fprintf_btf_type_raw() 125 for (i = 0; i < vlen; i++, m++) { in fprintf_btf_type_raw() 140 fprintf(out, " size=%u vlen=%u", t->size, vlen); in fprintf_btf_type_raw() 141 for (i = 0; i < vlen; i++, v++) { in fprintf_btf_type_raw() 156 fprintf(out, " ret_type_id=%u vlen=%u", t->type, vlen); in fprintf_btf_type_raw() 157 for (i = 0; i < vlen; i++, p++) { in fprintf_btf_type_raw() 170 fprintf(out, " size=%u vlen=%u", t->size, vlen); in fprintf_btf_type_raw() 171 for (i = 0; i < vlen; i++, v++) { in fprintf_btf_type_raw()
|
| /Linux-v5.15/fs/ |
| D | read_write.c | 901 unsigned long vlen, loff_t *pos, rwf_t flags) in vfs_readv() argument 908 ret = import_iovec(READ, vec, vlen, ARRAY_SIZE(iovstack), &iov, &iter); in vfs_readv() 918 unsigned long vlen, loff_t *pos, rwf_t flags) in vfs_writev() argument 925 ret = import_iovec(WRITE, vec, vlen, ARRAY_SIZE(iovstack), &iov, &iter); in vfs_writev() 936 unsigned long vlen, rwf_t flags) in do_readv() argument 947 ret = vfs_readv(f.file, vec, vlen, ppos, flags); in do_readv() 960 unsigned long vlen, rwf_t flags) in do_writev() argument 971 ret = vfs_writev(f.file, vec, vlen, ppos, flags); in do_writev() 990 unsigned long vlen, loff_t pos, rwf_t flags) in do_preadv() argument 1002 ret = vfs_readv(f.file, vec, vlen, &pos, flags); in do_preadv() [all …]
|
| /Linux-v5.15/tools/bpf/bpftool/ |
| D | btf.c | 169 __u16 vlen = BTF_INFO_VLEN(t->info); in dump_btf_type() local 174 jsonw_uint_field(w, "vlen", vlen); in dump_btf_type() 178 printf(" size=%u vlen=%u", t->size, vlen); in dump_btf_type() 180 for (i = 0; i < vlen; i++, m++) { in dump_btf_type() 215 __u16 vlen = BTF_INFO_VLEN(t->info); in dump_btf_type() local 220 jsonw_uint_field(w, "vlen", vlen); in dump_btf_type() 224 printf(" size=%u vlen=%u", t->size, vlen); in dump_btf_type() 226 for (i = 0; i < vlen; i++, v++) { in dump_btf_type() 265 __u16 vlen = BTF_INFO_VLEN(t->info); in dump_btf_type() local 270 jsonw_uint_field(w, "vlen", vlen); in dump_btf_type() [all …]
|
| D | btf_dumper.c | 439 int i, vlen; in btf_dumper_struct() local 446 vlen = BTF_INFO_VLEN(t->info); in btf_dumper_struct() 450 for (i = 0; i < vlen; i++) { in btf_dumper_struct() 498 int ret = 0, i, vlen; in btf_dumper_datasec() local 504 vlen = BTF_INFO_VLEN(t->info); in btf_dumper_datasec() 510 for (i = 0; i < vlen; i++) { in btf_dumper_datasec() 677 int i, vlen; in btf_dump_func() local 684 vlen = BTF_INFO_VLEN(func_proto->info); in btf_dump_func() 685 for (i = 0; i < vlen; i++) { in btf_dump_func()
|
| /Linux-v5.15/security/keys/trusted-keys/ |
| D | trusted_tpm2.c | 131 const void *value, size_t vlen) in tpm2_key_parent() argument 138 for (i = 0; i < vlen; i++) { in tpm2_key_parent() 148 const void *value, size_t vlen) in tpm2_key_type() argument 150 enum OID oid = look_up_OID(value, vlen); in tpm2_key_type() 155 sprint_oid(value, vlen, buffer, sizeof(buffer)); in tpm2_key_type() 166 const void *value, size_t vlen) in tpm2_key_pub() argument 171 ctx->pub_len = vlen; in tpm2_key_pub() 178 const void *value, size_t vlen) in tpm2_key_priv() argument 183 ctx->priv_len = vlen; in tpm2_key_priv()
|
| /Linux-v5.15/tools/bpf/bpftool/Documentation/ |
| D | bpftool-btf.rst | 98 [2] STRUCT 'dummy_tracepoint_args' size=16 vlen=2 153 [2] UNION 'my_union' size=48 vlen=2 157 [4] STRUCT 'my_struct' size=48 vlen=6 173 [14] ENUM 'my_enum' size=4 vlen=2 179 [18] FUNC_PROTO '(anon)' ret_type_id=3 vlen=2 186 [23] DATASEC 'data_sec' size=0 vlen=3 244 [104848] STRUCT 'i2c_smbus_alert' size=40 vlen=2 247 [104849] STRUCT 'alert_data' size=12 vlen=3 255 [104854] FUNC_PROTO '(anon)' ret_type_id=18 vlen=1 259 [104857] FUNC_PROTO '(anon)' ret_type_id=18 vlen=2
|
| /Linux-v5.15/fs/xfs/libxfs/ |
| D | xfs_attr_sf.h | 33 static inline int xfs_attr_sf_entsize_byname(uint8_t nlen, uint8_t vlen) in xfs_attr_sf_entsize_byname() argument 35 return sizeof(struct xfs_attr_sf_entry) + nlen + vlen; in xfs_attr_sf_entsize_byname()
|
| /Linux-v5.15/tools/lib/bpf/ |
| D | btf_dump.c | 299 __u16 vlen; in btf_dump_mark_referenced() local 303 vlen = btf_vlen(t); in btf_dump_mark_referenced() 333 for (j = 0; j < vlen; j++, m++) in btf_dump_mark_referenced() 340 for (j = 0; j < vlen; j++, p++) in btf_dump_mark_referenced() 347 for (j = 0; j < vlen; j++, v++) in btf_dump_mark_referenced() 465 __u16 vlen; in btf_dump_order_type() local 509 vlen = btf_vlen(t); in btf_dump_order_type() 510 for (i = 0; i < vlen; i++, m++) { in btf_dump_order_type() 573 vlen = btf_vlen(t); in btf_dump_order_type() 574 for (i = 0; i < vlen; i++, p++) { in btf_dump_order_type() [all …]
|
| D | btf.c | 280 __u16 vlen = btf_vlen(t); in btf_type_size() local 295 return base_size + vlen * sizeof(struct btf_enum); in btf_type_size() 300 return base_size + vlen * sizeof(struct btf_member); in btf_type_size() 302 return base_size + vlen * sizeof(struct btf_param); in btf_type_size() 306 return base_size + vlen * sizeof(struct btf_var_secinfo); in btf_type_size() 327 __u16 vlen = btf_vlen(t); in btf_bswap_type_rest() local 344 for (i = 0, e = btf_enum(t); i < vlen; i++, e++) { in btf_bswap_type_rest() 357 for (i = 0, m = btf_members(t); i < vlen; i++, m++) { in btf_bswap_type_rest() 364 for (i = 0, p = btf_params(t); i < vlen; i++, p++) { in btf_bswap_type_rest() 373 for (i = 0, v = btf_var_secinfos(t); i < vlen; i++, v++) { in btf_bswap_type_rest() [all …]
|
| /Linux-v5.15/net/ |
| D | compat.c | 359 unsigned int vlen, unsigned int flags) in __compat_sys_sendmmsg() argument 361 return __sys_sendmmsg(fd, (struct mmsghdr __user *)mmsg, vlen, in __compat_sys_sendmmsg() 366 unsigned int, vlen, unsigned int, flags) in COMPAT_SYSCALL_DEFINE4() argument 368 return __compat_sys_sendmmsg(fd, mmsg, vlen, flags); in COMPAT_SYSCALL_DEFINE4() 407 unsigned int, vlen, unsigned int, flags, in COMPAT_SYSCALL_DEFINE5() argument 410 return __sys_recvmmsg(fd, (struct mmsghdr __user *)mmsg, vlen, in COMPAT_SYSCALL_DEFINE5() 416 unsigned int, vlen, unsigned int, flags, in COMPAT_SYSCALL_DEFINE5() argument 419 return __sys_recvmmsg(fd, (struct mmsghdr __user *)mmsg, vlen, in COMPAT_SYSCALL_DEFINE5()
|
| /Linux-v5.15/drivers/crypto/qat/qat_common/ |
| D | qat_asym_algs.c | 923 size_t vlen) in qat_rsa_set_n() argument 930 while (!*ptr && vlen) { in qat_rsa_set_n() 932 vlen--; in qat_rsa_set_n() 935 ctx->key_sz = vlen; in qat_rsa_set_n() 955 size_t vlen) in qat_rsa_set_e() argument 961 while (!*ptr && vlen) { in qat_rsa_set_e() 963 vlen--; in qat_rsa_set_e() 966 if (!ctx->key_sz || !vlen || vlen > ctx->key_sz) { in qat_rsa_set_e() 975 memcpy(ctx->e + (ctx->key_sz - vlen), ptr, vlen); in qat_rsa_set_e() 980 size_t vlen) in qat_rsa_set_d() argument [all …]
|
| /Linux-v5.15/arch/um/drivers/ |
| D | vector_user.h | 91 unsigned int vlen, 97 unsigned int vlen,
|
| /Linux-v5.15/include/linux/ |
| D | compat.h | 607 compat_ulong_t vlen, u32 pos_low, u32 pos_high); 610 compat_ulong_t vlen, u32 pos_low, u32 pos_high); 614 unsigned long vlen, loff_t pos); 620 unsigned long vlen, loff_t pos); 804 unsigned vlen, unsigned int flags, 807 unsigned vlen, unsigned int flags, 818 unsigned vlen, unsigned int flags); 824 compat_ulong_t vlen, u32 pos_low, u32 pos_high, rwf_t flags); 827 compat_ulong_t vlen, u32 pos_low, u32 pos_high, rwf_t flags); 831 unsigned long vlen, loff_t pos, rwf_t flags); [all …]
|
| /Linux-v5.15/Documentation/bpf/ |
| D | btf.rst | 97 * bits 0-15: vlen (e.g. # of struct's members) 129 * ``info.vlen``: 0 181 * ``info.vlen``: 0 193 * ``info.vlen``: 0 238 * ``info.vlen``: the number of struct/union members 241 ``btf_type`` is followed by ``info.vlen`` number of ``struct btf_member``.:: 284 * ``info.vlen``: number of enum values 287 ``btf_type`` is followed by ``info.vlen`` number of ``struct btf_enum``.:: 305 * ``info.vlen``: 0 317 * ``info.vlen``: 0 [all …]
|