| /linux/crypto/ |
| H A D | rsa-pkcs1pad.c | 21 unsigned int key_size; member 39 return rsa_set_key(ctx->child, &ctx->key_size, RSA_PUB, key, keylen); in pkcs1pad_set_pub_key() 47 return rsa_set_key(ctx->child, &ctx->key_size, RSA_PRIV, key, keylen); in pkcs1pad_set_priv_key() 60 return ctx->key_size; in pkcs1pad_get_max_size() 88 pad_len = ctx->key_size - len; in pkcs1pad_encrypt_complete() 94 out_buf = kzalloc(ctx->key_size, GFP_ATOMIC); in pkcs1pad_encrypt_complete() 102 sg_nents_for_len(req->dst, ctx->key_size), in pkcs1pad_encrypt_complete() 103 out_buf, ctx->key_size); in pkcs1pad_encrypt_complete() 107 req->dst_len = ctx->key_size; in pkcs1pad_encrypt_complete() 135 if (!ctx->key_size) in pkcs1pad_encrypt() [all …]
|
| H A D | rsassa-pkcs1.c | 150 unsigned int key_size; member 172 if (!ctx->key_size) in rsassa_pkcs1_sign() 175 if (dlen < ctx->key_size) in rsassa_pkcs1_sign() 181 if (slen + hash_prefix->size > ctx->key_size - 11) in rsassa_pkcs1_sign() 184 pad_len = ctx->key_size - slen - hash_prefix->size - 1; in rsassa_pkcs1_sign() 199 ctx->key_size - 1, in_buf, in rsassa_pkcs1_sign() 200 ctx->key_size); in rsassa_pkcs1_sign() 205 pad_len = ctx->key_size - len; in rsassa_pkcs1_sign() 213 return ctx->key_size; in rsassa_pkcs1_sign() 234 if (!ctx->key_size || in rsassa_pkcs1_verify() [all …]
|
| H A D | dh_helper.c | 31 return p->key_size + p->p_size + p->g_size; in dh_data_size() 53 ptr = dh_pack_data(ptr, end, ¶ms->key_size, in crypto_dh_encode_key() 54 sizeof(params->key_size)); in crypto_dh_encode_key() 57 ptr = dh_pack_data(ptr, end, params->key, params->key_size); in crypto_dh_encode_key() 78 ptr = dh_unpack_data(¶ms->key_size, ptr, sizeof(params->key_size)); in __crypto_dh_decode_key() 88 params->p = (void *)(ptr + params->key_size); in __crypto_dh_decode_key() 89 params->g = (void *)(ptr + params->key_size + params->p_size); in __crypto_dh_decode_key() 106 if (params->key_size > params->p_size || in crypto_dh_decode_key()
|
| H A D | ecdh_helper.c | 29 return ECDH_KPP_SECRET_MIN_SIZE + params->key_size; in crypto_ecdh_key_len() 49 ptr = ecdh_pack_data(ptr, ¶ms->key_size, sizeof(params->key_size)); in crypto_ecdh_encode_key() 50 ecdh_pack_data(ptr, params->key, params->key_size); in crypto_ecdh_encode_key() 72 ptr = ecdh_unpack_data(¶ms->key_size, ptr, sizeof(params->key_size)); in crypto_ecdh_decode_key()
|
| H A D | ecdh.c | 34 params.key_size > sizeof(u64) * ctx->ndigits) in ecdh_set_secret() 39 if (!params.key || !params.key_size) in ecdh_set_secret() 43 ecc_digits_from_bytes(params.key, params.key_size, in ecdh_set_secret() 47 ctx->private_key, params.key_size) < 0) { in ecdh_set_secret() 48 memzero_explicit(ctx->private_key, params.key_size); in ecdh_set_secret()
|
| /linux/kernel/bpf/ |
| H A D | hashtab.c | 183 static inline void *htab_elem_value(struct htab_elem *l, u32 key_size) in htab_elem_value() argument 185 return l->key + round_up(key_size, 8); in htab_elem_value() 188 static inline void htab_elem_set_ptr(struct htab_elem *l, u32 key_size, in htab_elem_set_ptr() argument 191 *(void __percpu **)htab_elem_value(l, key_size) = pptr; in htab_elem_set_ptr() 194 static inline void __percpu *htab_elem_get_ptr(struct htab_elem *l, u32 key_size) in htab_elem_get_ptr() argument 196 return *(void __percpu **)htab_elem_value(l, key_size); in htab_elem_get_ptr() 201 return *(void **)htab_elem_value(l, map->key_size); in fd_htab_map_get_ptr() 222 htab_elem_value(elem, htab->map.key_size)); in htab_free_internal_structs() 225 htab_elem_value(elem, htab->map.key_size)); in htab_free_internal_structs() 228 htab_elem_value(elem, htab->map.key_size)); in htab_free_internal_structs() [all …]
|
| H A D | map_in_map.c | 37 inner_map_meta->key_size = inner_map->key_size; in bpf_map_meta_alloc() 88 meta0->key_size == meta1->key_size && in bpf_map_meta_equal()
|
| /linux/tools/testing/selftests/bpf/prog_tests/ |
| H A D | btf.c | 68 __u32 key_size; member 136 .key_size = sizeof(int), 191 .key_size = sizeof(int), 216 .key_size = sizeof(int), 257 .key_size = sizeof(int), 302 .key_size = sizeof(int), 324 .key_size = sizeof(int), 346 .key_size = sizeof(int), 368 .key_size = sizeof(int), 393 .key_size = sizeof(int), [all …]
|
| /linux/tools/bpf/bpftool/ |
| H A D | map.c | 139 print_hex_data_json(key, info->key_size); in print_entry_json() 162 print_hex_data_json(key, info->key_size); in print_entry_json() 200 break_names = info->key_size > 16 || msg_size > 16; in print_entry_error_msg() 201 single_line = info->key_size + msg_size <= 24 && !break_names; in print_entry_error_msg() 204 fprint_hex(stdout, key, info->key_size, " "); in print_entry_error_msg() 227 print_hex_data_json(key, map_info->key_size); in print_entry_error() 253 break_names = info->key_size > 16 || info->value_size > 16; in print_entry_plain() 254 single_line = info->key_size + info->value_size <= 24 && in print_entry_plain() 257 if (info->key_size) { in print_entry_plain() 259 fprint_hex(stdout, key, info->key_size, " "); in print_entry_plain() [all …]
|
| /linux/tools/testing/selftests/bpf/map_tests/ |
| H A D | lpm_trie_map_basic_ops.c | 445 size_t key_size; in test_lpm_delete() local 449 key_size = sizeof(*key) + sizeof(__u32); in test_lpm_delete() 450 key = alloca(key_size); in test_lpm_delete() 453 key_size, sizeof(value), in test_lpm_delete() 554 size_t key_size; in test_lpm_get_next_key() local 558 key_size = sizeof(*key_p) + sizeof(__u32); in test_lpm_get_next_key() 559 key_p = alloca(key_size); in test_lpm_get_next_key() 560 next_key_p = alloca(key_size); in test_lpm_get_next_key() 562 map_fd = bpf_map_create(BPF_MAP_TYPE_LPM_TRIE, NULL, key_size, sizeof(value), 100, &opts); in test_lpm_get_next_key() 573 memset(key_p, 0, key_size); in test_lpm_get_next_key() [all …]
|
| /linux/tools/lib/bpf/ |
| H A D | libbpf_probes.c | 285 int key_size, value_size, max_entries; in probe_map_create() local 289 key_size = sizeof(__u32); in probe_map_create() 298 key_size = sizeof(__u64); in probe_map_create() 304 key_size = sizeof(struct bpf_cgroup_storage_key); in probe_map_create() 310 key_size = 0; in probe_map_create() 327 key_size = 0; in probe_map_create() 338 key_size = 0; in probe_map_create() 342 key_size = 0; in probe_map_create() 388 fd = bpf_map_create(map_type, NULL, key_size, value_size, max_entries, &opts); in probe_map_create()
|
| /linux/drivers/net/ethernet/netronome/nfp/flower/ |
| H A D | offload.c | 155 u32 *key_layer_two, int *key_size, bool ipv6, in nfp_flower_calc_opt_layer() argument 166 *key_size += sizeof(struct nfp_flower_geneve_options); in nfp_flower_calc_opt_layer() 175 u32 *key_layer_two, u8 *key_layer, int *key_size, in nfp_flower_calc_udp_tun_layer() argument 189 *key_size += sizeof(struct nfp_flower_ext_meta); in nfp_flower_calc_udp_tun_layer() 191 *key_size += sizeof(struct nfp_flower_ipv6_udp_tun); in nfp_flower_calc_udp_tun_layer() 193 *key_size += sizeof(struct nfp_flower_ipv4_udp_tun); in nfp_flower_calc_udp_tun_layer() 208 *key_size += sizeof(struct nfp_flower_ext_meta); in nfp_flower_calc_udp_tun_layer() 213 *key_size += sizeof(struct nfp_flower_ipv6_udp_tun); in nfp_flower_calc_udp_tun_layer() 215 *key_size += sizeof(struct nfp_flower_ipv4_udp_tun); in nfp_flower_calc_udp_tun_layer() 224 err = nfp_flower_calc_opt_layer(enc_op, key_layer_two, key_size, in nfp_flower_calc_udp_tun_layer() [all …]
|
| /linux/tools/perf/util/bpf_skel/ |
| H A D | lock_contention.bpf.c | 31 __uint(key_size, sizeof(__u32)); 39 __uint(key_size, sizeof(__u32)); 47 __uint(key_size, sizeof(__u64)); // owner stacktrace 55 __uint(key_size, sizeof(__u64)); // lock address 63 __uint(key_size, sizeof(struct contention_key)); 79 __uint(key_size, sizeof(__u32)); 87 __uint(key_size, sizeof(struct contention_key)); 94 __uint(key_size, sizeof(__u32)); 101 __uint(key_size, sizeof(__u64)); 108 __uint(key_size, sizeof(__u32)); [all …]
|
| H A D | off_cpu.bpf.c | 46 __uint(key_size, sizeof(__u32)); 57 __uint(key_size, sizeof(int)); 64 __uint(key_size, sizeof(__u32)); 78 __uint(key_size, sizeof(struct offcpu_key)); 85 __uint(key_size, sizeof(__u32)); 92 __uint(key_size, sizeof(__u32)); 99 __uint(key_size, sizeof(__u64));
|
| H A D | bperf_leader.bpf.c | 9 __uint(key_size, sizeof(__u32)); 16 __uint(key_size, sizeof(__u32)); 23 __uint(key_size, sizeof(__u32));
|
| H A D | func_latency.bpf.c | 12 __uint(key_size, sizeof(__u64)); 19 __uint(key_size, sizeof(__u32)); 26 __uint(key_size, sizeof(__u32)); 33 __uint(key_size, sizeof(__u32));
|
| H A D | bpf_prog_profiler.bpf.c | 10 __uint(key_size, sizeof(__u32)); 17 __uint(key_size, sizeof(__u32)); 25 __uint(key_size, sizeof(__u32));
|
| /linux/drivers/mmc/host/ |
| H A D | cqhci-crypto.c | 17 enum cqhci_crypto_key_size key_size; member 21 .key_size = CQHCI_CRYPTO_KEY_SIZE_256, 72 ccap_array[i].key_size == alg->key_size && in cqhci_crypto_keyslot_program() 142 cqhci_crypto_algs[i].key_size == cap.key_size) in cqhci_find_blk_crypto_mode()
|
| /linux/tools/testing/selftests/bpf/benchs/ |
| H A D | bench_bpf_hashmap_lookup.c | 21 __u32 key_size; member 27 .key_size = 4, 67 args.key_size = ret; in parse_arg() 167 bpf_map__set_key_size(ctx.skel->maps.hash_map_bench, args.key_size); in setup() 174 if (args.key_size > 4) { in setup() 175 for (i = 1; i < args.key_size/4; i++) in setup()
|
| /linux/include/crypto/internal/ |
| H A D | rsa.h | 61 unsigned int *key_size, bool is_pubkey, in rsa_set_key() argument 66 *key_size = 0; in rsa_set_key() 80 *key_size = err; in rsa_set_key()
|
| /linux/kernel/trace/ |
| H A D | tracing_map.c | 414 elt->key = kzalloc(map->key_size, GFP_KERNEL); in tracing_map_elt_alloc() 505 static inline bool keys_match(void *key, void *test_key, unsigned key_size) in keys_match() argument 509 if (memcmp(key, test_key, key_size)) in keys_match() 523 key_hash = jhash(key, map->key_size, 0); in __tracing_map_insert() 536 keys_match(key, val->key, map->key_size)) { in __tracing_map_insert() 576 memcpy(elt->key, key, map->key_size); in __tracing_map_insert() 769 unsigned int key_size, in tracing_map_create() argument 798 map->key_size = key_size; in tracing_map_create() 852 return memcmp(a->key, b->key, a->elt->map->key_size); in cmp_entries_dup() 963 int n_entries, unsigned int key_size) in detect_dups() argument [all …]
|
| /linux/tools/bpf/bpftool/skeleton/ |
| H A D | profiler.bpf.c | 16 __uint(key_size, sizeof(u32)); 23 __uint(key_size, sizeof(u32)); 30 __uint(key_size, sizeof(u32)); 37 __uint(key_size, sizeof(u32));
|
| /linux/crypto/asymmetric_keys/ |
| H A D | pkcs8_parser.c | 25 u32 key_size; member 90 ctx->key_size = vlen; in pkcs8_note_key() 119 pub->key = kmemdup(ctx.key, ctx.key_size, GFP_KERNEL); in pkcs8_parse() 123 pub->keylen = ctx.key_size; in pkcs8_parse()
|
| /linux/fs/ecryptfs/ |
| H A D | crypto.c | 285 crypt_stat->key_size); in crypt_scatterlist() 287 crypt_stat->key_size); in crypt_scatterlist() 304 crypt_stat->key_size); in crypt_scatterlist() 542 crypt_stat->key_size << 3); in ecryptfs_init_crypt_ctx() 624 crypt_stat->key_size); in ecryptfs_compute_root_iv() 641 get_random_bytes(crypt_stat->key, crypt_stat->key_size); in ecryptfs_generate_new_key() 647 crypt_stat->key_size); in ecryptfs_generate_new_key() 721 crypt_stat->key_size = ECRYPTFS_DEFAULT_KEY_BYTES; in ecryptfs_set_default_crypt_stat_vals() 773 crypt_stat->key_size = in ecryptfs_new_file_context() 1524 char *cipher_name, size_t *key_size) in ecryptfs_process_key_cipher() argument [all …]
|
| /linux/net/core/ |
| H A D | sock_map.c | 44 attr->key_size != 4 || in sock_map_alloc() 880 u32 key_size) in sock_hash_lookup_elem_raw() argument 886 !memcmp(&elem->key, key, key_size)) in sock_hash_lookup_elem_raw() 896 u32 key_size = map->key_size, hash; in __sock_hash_lookup_elem() local 902 hash = sock_hash_bucket_hash(key, key_size); in __sock_hash_lookup_elem() 904 elem = sock_hash_lookup_elem_raw(&bucket->head, hash, key, key_size); in __sock_hash_lookup_elem() 932 elem->key, map->key_size); in sock_hash_delete_from_link() 944 u32 hash, key_size = map->key_size; in sock_hash_delete_elem() local 949 hash = sock_hash_bucket_hash(key, key_size); in sock_hash_delete_elem() 953 elem = sock_hash_lookup_elem_raw(&bucket->head, hash, key, key_size); in sock_hash_delete_elem() [all …]
|