/linux/crypto/ |
A D | rsa-pkcs1pad.c | 93 unsigned int key_size; member 113 ctx->key_size = 0; in pkcs1pad_set_pub_key() 124 ctx->key_size = err; in pkcs1pad_set_pub_key() 134 ctx->key_size = 0; in pkcs1pad_set_priv_key() 145 ctx->key_size = err; in pkcs1pad_set_priv_key() 159 return ctx->key_size; in pkcs1pad_get_max_size() 237 if (!ctx->key_size) in pkcs1pad_encrypt() 353 if (!ctx->key_size || req->src_len != ctx->key_size) in pkcs1pad_decrypt() 370 ctx->key_size); in pkcs1pad_decrypt() 390 if (!ctx->key_size) in pkcs1pad_sign() [all …]
|
A D | dh_helper.c | 31 return p->key_size + p->p_size + p->q_size + p->g_size; in dh_data_size() 53 ptr = dh_pack_data(ptr, end, ¶ms->key_size, in crypto_dh_encode_key() 54 sizeof(params->key_size)); in crypto_dh_encode_key() 58 ptr = dh_pack_data(ptr, end, params->key, params->key_size); in crypto_dh_encode_key() 80 ptr = dh_unpack_data(¶ms->key_size, ptr, sizeof(params->key_size)); in crypto_dh_decode_key() 91 if (params->key_size > params->p_size || in crypto_dh_decode_key() 99 params->p = (void *)(ptr + params->key_size); in crypto_dh_decode_key() 100 params->q = (void *)(ptr + params->key_size + params->p_size); in crypto_dh_decode_key() 101 params->g = (void *)(ptr + params->key_size + params->p_size + in crypto_dh_decode_key()
|
A D | ecdh_helper.c | 29 return ECDH_KPP_SECRET_MIN_SIZE + params->key_size; in crypto_ecdh_key_len() 49 ptr = ecdh_pack_data(ptr, ¶ms->key_size, sizeof(params->key_size)); in crypto_ecdh_encode_key() 50 ecdh_pack_data(ptr, params->key, params->key_size); in crypto_ecdh_encode_key() 72 ptr = ecdh_unpack_data(¶ms->key_size, ptr, sizeof(params->key_size)); in crypto_ecdh_decode_key()
|
A D | ecdh.c | 33 params.key_size > sizeof(u64) * ctx->ndigits) in ecdh_set_secret() 36 if (!params.key || !params.key_size) in ecdh_set_secret() 40 memcpy(ctx->private_key, params.key, params.key_size); in ecdh_set_secret() 43 ctx->private_key, params.key_size) < 0) { in ecdh_set_secret() 44 memzero_explicit(ctx->private_key, params.key_size); in ecdh_set_secret()
|
/linux/kernel/bpf/ |
A D | hashtab.c | 294 u32 key_size = htab->map.key_size; in prealloc_lru_pop() local 632 key_size = map->key_size; in __htab_map_lookup_elem() 780 key_size = map->key_size; in htab_map_get_next_key() 1037 key_size = map->key_size; in htab_map_update_elem() 1139 key_size = map->key_size; in htab_lru_map_update_elem() 1207 key_size = map->key_size; in __htab_percpu_map_update_elem() 1262 key_size = map->key_size; in __htab_lru_percpu_map_update_elem() 1337 key_size = map->key_size; in htab_map_delete_elem() 1373 key_size = map->key_size; in htab_lru_map_delete_elem() 1502 key_size = map->key_size; in __htab_map_lookup_and_delete_elem() [all …]
|
A D | map_in_map.c | 49 inner_map_meta->key_size = inner_map->key_size; in bpf_map_meta_alloc() 83 meta0->key_size == meta1->key_size && in bpf_map_meta_equal()
|
A D | map_iter.c | 105 u32 key_acc_size, value_acc_size, key_size, value_size; in bpf_iter_attach_map() local 128 key_size = map->key_size; in bpf_iter_attach_map() 134 if (key_acc_size > key_size || value_acc_size > value_size) { in bpf_iter_attach_map()
|
/linux/tools/testing/selftests/bpf/prog_tests/ |
A D | btf.c | 71 __u32 key_size; member 139 .key_size = sizeof(int), 194 .key_size = sizeof(int), 219 .key_size = sizeof(int), 260 .key_size = sizeof(int), 305 .key_size = sizeof(int), 327 .key_size = sizeof(int), 349 .key_size = sizeof(int), 371 .key_size = sizeof(int), 4107 create_attr.key_size = test->key_size; in do_test_raw() [all …]
|
/linux/tools/testing/selftests/bpf/ |
A D | test_lpm_map.c | 427 size_t key_size; in test_lpm_delete() local 432 key = alloca(key_size); in test_lpm_delete() 435 key_size, sizeof(value), in test_lpm_delete() 539 size_t key_size; in test_lpm_get_next_key() local 544 key_p = alloca(key_size); in test_lpm_get_next_key() 560 memset(key_p, 0, key_size); in test_lpm_get_next_key() 579 memset(key_p, 0, key_size); in test_lpm_get_next_key() 598 memset(key_p, 0, key_size); in test_lpm_get_next_key() 622 memset(key_p, 0, key_size); in test_lpm_get_next_key() 651 memset(key_p, 0, key_size); in test_lpm_get_next_key() [all …]
|
/linux/tools/bpf/bpftool/ |
A D | map.c | 169 print_hex_data_json(key, info->key_size); in print_entry_json() 189 print_hex_data_json(key, info->key_size); in print_entry_json() 284 if (info->key_size) { in print_entry_plain() 303 if (info->key_size) { in print_entry_plain() 375 if (key_size) in parse_elem() 853 key = malloc(info->key_size); in map_dump() 986 if (info->key_size) { in alloc_key_value() 987 *key = malloc(info->key_size); in alloc_key_value() 1156 key = malloc(info.key_size); in do_getnext() 1157 nextkey = malloc(info.key_size); in do_getnext() [all …]
|
/linux/tools/lib/bpf/ |
A D | libbpf_probes.c | 204 int key_size, value_size, max_entries, map_flags; in bpf_probe_map_type() local 209 key_size = sizeof(__u32); in bpf_probe_map_type() 219 key_size = sizeof(__u64); in bpf_probe_map_type() 225 key_size = sizeof(struct bpf_cgroup_storage_key); in bpf_probe_map_type() 231 key_size = 0; in bpf_probe_map_type() 246 key_size = 0; in bpf_probe_map_type() 292 attr.key_size = key_size; in bpf_probe_map_type()
|
A D | bpf.c | 97 attr.key_size = create_attr->key_size; in libbpf__bpf_create_map_xattr() 125 p.key_size = create_attr->key_size; in bpf_create_map_xattr() 145 int key_size, int value_size, int max_entries, in bpf_create_map_node() argument 153 map_attr.key_size = key_size; in bpf_create_map_node() 164 int bpf_create_map(enum bpf_map_type map_type, int key_size, in bpf_create_map() argument 171 map_attr.key_size = key_size; in bpf_create_map() 179 int key_size, int value_size, int max_entries, in bpf_create_map_name() argument 187 map_attr.key_size = key_size; in bpf_create_map_name() 195 int key_size, int inner_map_fd, int max_entries, in bpf_create_map_in_map_node() argument 204 attr.key_size = key_size; in bpf_create_map_in_map_node() [all …]
|
A D | bpf.h | 41 __u32 key_size; member 58 int key_size, int value_size, 61 int key_size, int value_size, 63 LIBBPF_API int bpf_create_map(enum bpf_map_type map_type, int key_size, 66 const char *name, int key_size, 70 const char *name, int key_size,
|
/linux/drivers/net/ethernet/netronome/nfp/flower/ |
A D | offload.c | 250 int key_size; in nfp_flower_calculate_key_layers() local 270 key_size = sizeof(struct nfp_flower_meta_tci) + in nfp_flower_calculate_key_layers() 292 key_size += sizeof(struct nfp_flower_vlan); in nfp_flower_calculate_key_layers() 309 key_size += sizeof(struct nfp_flower_vlan); in nfp_flower_calculate_key_layers() 375 key_size += in nfp_flower_calculate_key_layers() 378 key_size += in nfp_flower_calculate_key_layers() 397 &key_size, priv, in nfp_flower_calculate_key_layers() 421 key_size += sizeof(struct nfp_flower_ipv4); in nfp_flower_calculate_key_layers() 426 key_size += sizeof(struct nfp_flower_ipv6); in nfp_flower_calculate_key_layers() 538 ret_key_ls->key_size = key_size; in nfp_flower_calculate_key_layers() [all …]
|
A D | conntrack.c | 414 int key_size; in nfp_fl_calc_key_layers_sz() local 421 map[FLOW_PAY_EXT_META] = key_size; in nfp_fl_calc_key_layers_sz() 425 map[FLOW_PAY_INPORT] = key_size; in nfp_fl_calc_key_layers_sz() 429 map[FLOW_PAY_MAC_MPLS] = key_size; in nfp_fl_calc_key_layers_sz() 433 map[FLOW_PAY_L4] = key_size; in nfp_fl_calc_key_layers_sz() 437 map[FLOW_PAY_IPV4] = key_size; in nfp_fl_calc_key_layers_sz() 441 map[FLOW_PAY_IPV6] = key_size; in nfp_fl_calc_key_layers_sz() 446 map[FLOW_PAY_GRE] = key_size; in nfp_fl_calc_key_layers_sz() 454 map[FLOW_PAY_QINQ] = key_size; in nfp_fl_calc_key_layers_sz() 460 map[FLOW_PAY_UDP_TUN] = key_size; in nfp_fl_calc_key_layers_sz() [all …]
|
/linux/net/core/ |
A D | sock_map.c | 38 attr->key_size != 4 || in sock_map_alloc() 843 u32 key_size) in sock_hash_lookup_elem_raw() argument 859 u32 key_size = map->key_size, hash; in __sock_hash_lookup_elem() local 907 u32 hash, key_size = map->key_size; in sock_hash_delete_elem() local 928 void *key, u32 key_size, in sock_hash_alloc_elem() argument 948 memcpy(new->key, key, key_size); in sock_hash_alloc_elem() 958 u32 key_size = map->key_size, hash; in sock_hash_update_common() local 1024 u32 hash, key_size = map->key_size; in sock_hash_get_next_key() local 1067 attr->key_size == 0 || in sock_hash_alloc() 1072 if (attr->key_size > MAX_BPF_STACK) in sock_hash_alloc() [all …]
|
/linux/drivers/mmc/host/ |
A D | cqhci-crypto.c | 17 enum cqhci_crypto_key_size key_size; member 21 .key_size = CQHCI_CRYPTO_KEY_SIZE_256, 80 ccap_array[i].key_size == alg->key_size && in cqhci_crypto_keyslot_program() 149 cqhci_crypto_algs[i].key_size == cap.key_size) in cqhci_find_blk_crypto_mode()
|
/linux/tools/bpf/bpftool/skeleton/ |
A D | profiler.bpf.c | 10 __uint(key_size, sizeof(u32)); 17 __uint(key_size, sizeof(u32)); 24 __uint(key_size, sizeof(u32)); 31 __uint(key_size, sizeof(u32));
|
/linux/kernel/trace/ |
A D | tracing_map.c | 414 elt->key = kzalloc(map->key_size, GFP_KERNEL); in tracing_map_elt_alloc() 509 if (memcmp(key, test_key, key_size)) in keys_match() 523 key_hash = jhash(key, map->key_size, 0); in __tracing_map_insert() 536 keys_match(key, val->key, map->key_size)) { in __tracing_map_insert() 576 memcpy(elt->key, key, map->key_size); in __tracing_map_insert() 764 unsigned int key_size, in tracing_map_create() argument 793 map->key_size = key_size; in tracing_map_create() 848 if (memcmp(a->key, b->key, a->elt->map->key_size)) in cmp_entries_dup() 962 int n_entries, unsigned int key_size) in detect_dups() argument 976 if (!memcmp(sort_entries[i]->key, key, key_size)) { in detect_dups() [all …]
|
/linux/tools/perf/util/bpf_skel/ |
A D | bperf_leader.bpf.c | 9 __uint(key_size, sizeof(__u32)); 16 __uint(key_size, sizeof(__u32)); 23 __uint(key_size, sizeof(__u32));
|
A D | bperf_follower.bpf.c | 10 __uint(key_size, sizeof(__u32)); 17 __uint(key_size, sizeof(__u32)); 24 __uint(key_size, sizeof(__u32));
|
A D | bperf_cgroup.bpf.c | 18 __uint(key_size, sizeof(__u32)); 26 __uint(key_size, sizeof(__u64)); 34 __uint(key_size, sizeof(__u32)); 42 __uint(key_size, sizeof(__u32));
|
A D | bpf_prog_profiler.bpf.c | 10 __uint(key_size, sizeof(__u32)); 17 __uint(key_size, sizeof(__u32)); 25 __uint(key_size, sizeof(__u32));
|
/linux/crypto/asymmetric_keys/ |
A D | pkcs8_parser.c | 25 u32 key_size; member 90 ctx->key_size = vlen; in pkcs8_note_key() 119 pub->key = kmemdup(ctx.key, ctx.key_size, GFP_KERNEL); in pkcs8_parse() 123 pub->keylen = ctx.key_size; in pkcs8_parse()
|
/linux/fs/ecryptfs/ |
A D | crypto.c | 301 crypt_stat->key_size); in crypt_scatterlist() 303 crypt_stat->key_size); in crypt_scatterlist() 322 crypt_stat->key_size); in crypt_scatterlist() 563 crypt_stat->key_size << 3); in ecryptfs_init_crypt_ctx() 645 crypt_stat->key_size); in ecryptfs_compute_root_iv() 668 crypt_stat->key_size); in ecryptfs_generate_new_key() 794 crypt_stat->key_size = in ecryptfs_new_file_context() 1570 if (*key_size == 0) in ecryptfs_process_key_cipher() 1618 size_t key_size) in ecryptfs_add_new_key_tfm() argument 1636 tmp_tfm->key_size = key_size; in ecryptfs_add_new_key_tfm() [all …]
|