| /OK3568_Linux_fs/kernel/lib/ |
| H A D | decompress_unlzo.c | 41 STATIC inline long INIT parse_header(u8 *input, long *skip, long in_len) in parse_header() argument 45 u8 *end = input + in_len; in parse_header() 54 if (in_len < HEADER_SIZE_MIN) in parse_header() 98 STATIC int INIT unlzo(u8 *input, long in_len, in unlzo() argument 152 in_len = fill(in_buf, HEADER_SIZE_MAX); in unlzo() 155 if (!parse_header(in_buf, &skip, in_len)) { in unlzo() 160 in_len -= skip; in unlzo() 164 memcpy(in_buf_save, in_buf, in_len); in unlzo() 173 if (fill && in_len < 4) { in unlzo() 174 skip = fill(in_buf + in_len, 4 - in_len); in unlzo() [all …]
|
| H A D | decompress_unzstd.c | 123 static int INIT decompress_single(const u8 *in_buf, long in_len, u8 *out_buf, in decompress_single() argument 142 ret = ZSTD_findFrameCompressedSize(in_buf, in_len); in decompress_single() 146 in_len = (long)ret; in decompress_single() 148 ret = ZSTD_decompressDCtx(dctx, out_buf, out_len, in_buf, in_len); in decompress_single() 154 *in_pos = in_len; in decompress_single() 163 static int INIT __unzstd(unsigned char *in_buf, long in_len, in __unzstd() argument 194 return decompress_single(in_buf, in_len, out_buf, out_len, in __unzstd() 210 in_len = 0; in __unzstd() 214 in_len = fill(in_buf, ZSTD_IOBUF_SIZE); in __unzstd() 215 if (in_len < 0) { in __unzstd() [all …]
|
| /OK3568_Linux_fs/external/security/librkcrypto/test/ |
| H A D | cmode_adapter.c | 10 uint8_t *in, uint32_t in_len, uint8_t *out) in soft_cipher() argument 18 ret = rk_des_ecb_encrypt(in, out, in_len, key, key_len, is_enc); in soft_cipher() 21 ret = rk_des_cbc_encrypt(in, out, in_len, key, key_len, iv, is_enc); in soft_cipher() 24 ret = rk_des_cfb_encrypt(in, out, in_len, key, key_len, iv, is_enc); in soft_cipher() 27 ret = rk_des_ofb_encrypt(in, out, in_len, key, key_len, iv, is_enc); in soft_cipher() 35 ret = rk_aes_ecb_encrypt(in, out, in_len, key, key_len, is_enc); in soft_cipher() 38 ret = rk_aes_cbc_encrypt(in, out, in_len, key, key_len, iv, is_enc); in soft_cipher() 41 ret = rk_aes_cfb_encrypt(in, out, in_len, key, key_len, iv, is_enc); in soft_cipher() 44 ret = rk_aes_ofb_encrypt(in, out, in_len, key, key_len, iv, is_enc); in soft_cipher() 47 ret = rk_aes_cts_encrypt(in, out, in_len, key, key_len, iv, is_enc); in soft_cipher() [all …]
|
| H A D | test_rsa.c | 258 static RK_RES openssl_encrypt(const uint8_t *in, uint32_t in_len, uint8_t *out, uint32_t *out_len, in openssl_encrypt() argument 299 if (EVP_PKEY_encrypt(pkey_ctx, NULL /* out */, &tmp_len, in, in_len) <= 0) { in openssl_encrypt() 303 if (EVP_PKEY_encrypt(pkey_ctx, out, &tmp_len, in, in_len) <= 0) { in openssl_encrypt() 321 static RK_RES openssl_decrypt(const uint8_t *in, uint32_t in_len, uint8_t *out, uint32_t *out_len, in openssl_decrypt() argument 364 if (EVP_PKEY_decrypt(pkey_ctx, NULL /* out */, &tmp_len, in, in_len) <= 0) { in openssl_decrypt() 368 if (EVP_PKEY_decrypt(pkey_ctx, out, &tmp_len, in, in_len) <= 0) { in openssl_decrypt() 386 static RK_RES openssl_sign(const uint8_t *in, uint32_t in_len, uint8_t *out, uint32_t *out_len, in openssl_sign() argument 428 if (EVP_DigestSignUpdate(digest_ctx, in, in_len) != 1) { in openssl_sign() 456 static RK_RES openssl_verify(const uint8_t *in, uint32_t in_len, uint8_t *sign, uint32_t sign_len, in openssl_verify() argument 497 if (EVP_DigestVerifyUpdate(digest_ctx, in, in_len) != 1) { in openssl_verify() [all …]
|
| H A D | cmode_adapter.h | 11 uint8_t *in, uint32_t in_len, uint8_t *out); 16 uint8_t *in, uint32_t in_len, uint8_t *out, uint8_t *tag); 18 RK_RES soft_hash(uint32_t algo, const uint8_t *in, uint32_t in_len, 22 const uint8_t *in, uint32_t in_len, uint8_t *out, uint32_t *out_len);
|
| /OK3568_Linux_fs/kernel/fs/btrfs/ |
| H A D | lzo.c | 129 size_t in_len; in lzo_compress_pages() local 162 in_len = min(len, PAGE_SIZE); in lzo_compress_pages() 164 ret = lzo1x_1_compress(data_in, in_len, workspace->cbuf, in lzo_compress_pages() 179 tot_in += in_len; in lzo_compress_pages() 252 in_len = min(bytes_left, PAGE_SIZE); in lzo_compress_pages() 294 size_t in_len; in lzo_decompress_bio() local 331 in_len = read_compress_length(data_in + in_offset); in lzo_decompress_bio() 342 if (in_len > max_segment_len || tot_in + in_len > tot_len) { in lzo_decompress_bio() 347 tot_in += in_len; in lzo_decompress_bio() 348 working_bytes = in_len; in lzo_decompress_bio() [all …]
|
| /OK3568_Linux_fs/kernel/fs/ubifs/ |
| H A D | compress.c | 102 int in_len, void *out_buf, int *out_len, int *compr_type) in ubifs_compress() argument 111 if (in_len < UBIFS_MIN_COMPR_LEN) in ubifs_compress() 116 err = crypto_comp_compress(compr->cc, in_buf, in_len, out_buf, in ubifs_compress() 122 in_len, compr->name, err); in ubifs_compress() 130 if (in_len - *out_len < UBIFS_MIN_COMPRESS_DIFF) in ubifs_compress() 136 memcpy(out_buf, in_buf, in_len); in ubifs_compress() 137 *out_len = in_len; in ubifs_compress() 154 int in_len, void *out_buf, int *out_len, int compr_type) in ubifs_decompress() argument 172 memcpy(out_buf, in_buf, in_len); in ubifs_decompress() 173 *out_len = in_len; in ubifs_decompress() [all …]
|
| H A D | crypto.c | 28 unsigned int in_len, unsigned int *out_len, int block) in ubifs_encrypt() argument 32 unsigned int pad_len = round_up(in_len, UBIFS_CIPHER_BLOCK_SIZE); in ubifs_encrypt() 36 dn->compr_size = cpu_to_le16(in_len); in ubifs_encrypt() 39 if (pad_len != in_len) in ubifs_encrypt() 40 memset(p + in_len, 0, pad_len - in_len); in ubifs_encrypt()
|
| /OK3568_Linux_fs/external/security/librkcrypto/test/c_mode/ |
| H A D | hmac.c | 12 typedef int (*hash_f)(const unsigned char *in, unsigned int in_len, 17 unsigned int in_len, unsigned char *out, unsigned int *out_len, hash_f hash) 54 tmp = (unsigned char*)malloc(PARTITION_BYTE_SIZE+in_len); 61 memcpy(tmp+sizeof(istr), in, in_len); 63 res = (*hash)(tmp, PARTITION_BYTE_SIZE+in_len, istr, &hash_len); 307 unsigned int in_len, unsigned char *out, unsigned int *out_len) in rk_hmac_md5() argument 312 return rk_hmac_64(key, key_len, in, in_len, out, out_len, rk_hash_md5); in rk_hmac_md5() 316 unsigned int in_len, unsigned char *out, unsigned int *out_len) in rk_hmac_sha1() argument 321 return rk_hmac_64(key, key_len, in, in_len, out, out_len, rk_hash_sha1); in rk_hmac_sha1() 325 unsigned int in_len, unsigned char *out, unsigned int *out_len) in rk_hmac_sha256() argument [all …]
|
| H A D | hash_sha512.c | 355 int rk_hash_sha512(const unsigned char *in, unsigned int in_len, in rk_hash_sha512() argument 360 if (in == NULL && in_len != 0) in rk_hash_sha512() 368 mbedtls_sha512_update( &ctx, in, in_len ); in rk_hash_sha512() 375 int rk_hash_sha384(const unsigned char *in, unsigned int in_len, in rk_hash_sha384() argument 380 if (in == NULL && in_len != 0) in rk_hash_sha384() 388 mbedtls_sha512_update( &ctx, in, in_len ); in rk_hash_sha384() 395 int rk_hash_sha512_224(const unsigned char *in, unsigned int in_len, in rk_hash_sha512_224() argument 400 if (in == NULL && in_len != 0) in rk_hash_sha512_224() 408 mbedtls_sha512_update( &ctx, in, in_len ); in rk_hash_sha512_224() 415 int rk_hash_sha512_256(const unsigned char *in, unsigned int in_len, in rk_hash_sha512_256() argument [all …]
|
| /OK3568_Linux_fs/external/security/librkcrypto/test/include/c_mode/ |
| H A D | hmac.h | 60 unsigned int in_len, unsigned char *out, unsigned int *out_len); 63 unsigned int in_len, unsigned char *out, unsigned int *out_len); 66 unsigned int in_len, unsigned char *out, unsigned int *out_len); 69 unsigned int in_len, unsigned char *out, unsigned int *out_len); 72 unsigned int in_len, unsigned char *out, unsigned int *out_len);
|
| H A D | hash_sha512.h | 59 int rk_hash_sha512(const unsigned char *in, unsigned int in_len, 62 int rk_hash_sha384(const unsigned char *in, unsigned int in_len, 65 int rk_hash_sha512_224(const unsigned char *in, unsigned int in_len, 68 int rk_hash_sha512_256(const unsigned char *in, unsigned int in_len,
|
| /OK3568_Linux_fs/kernel/drivers/net/ethernet/sfc/ |
| H A D | tx_tso.c | 66 unsigned int in_len; member 174 unsigned int header_len, in_len; in tso_start() local 180 in_len = skb_headlen(skb) - header_len; in tso_start() 182 st->in_len = in_len; in tso_start() 215 st->in_len = skb_frag_size(frag); in tso_get_fragment() 239 if (st->in_len == 0) in tso_fill_packet_with_fragment() 244 EFX_WARN_ON_ONCE_PARANOID(st->in_len <= 0); in tso_fill_packet_with_fragment() 247 n = min(st->in_len, st->packet_space); in tso_fill_packet_with_fragment() 251 st->in_len -= n; in tso_fill_packet_with_fragment() 263 if (st->in_len == 0) { in tso_fill_packet_with_fragment() [all …]
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/ta/rk_public_api/ |
| H A D | rk_crypto_api.h | 118 TEE_Result rk_hash_crypto(uint8_t *in, uint8_t *out, uint32_t in_len, 121 TEE_Result rk_hash_update(crypto_ctx_t *ctx, uint8_t *in, uint32_t in_len); 123 uint32_t in_len, uint32_t *out_len); 132 uint32_t in_len, uint32_t *out_len); 139 uint32_t in_len, uint32_t *out_len, rk_ae_update_type_t is_add); 141 uint8_t *tag, uint32_t in_len, uint32_t *out_len, uint32_t *tag_len); 154 uint32_t in_len, 166 uint32_t in_len, uint32_t *out_len); 168 TEE_Result rk_sm2_pke(uint8_t *in, uint32_t in_len, uint8_t *out, 177 TEE_Result rk_mac_crypto(uint8_t *in, uint8_t *out, uint32_t in_len, [all …]
|
| H A D | rk_crypto_api.c | 646 uint32_t in_len, uint32_t *out_len) in rk_cipher_buffer_update() argument 659 *in, *out, in_len, *out_len); in rk_cipher_buffer_update() 664 if ((ctx->buffer_offs + in_len) <= AES_BLOCK_SIZE) { in rk_cipher_buffer_update() 665 TEE_MemMove(ctx->buffer + ctx->buffer_offs, in, in_len); in rk_cipher_buffer_update() 666 ctx->buffer_offs += in_len; in rk_cipher_buffer_update() 685 real_in_len = ((ctx->buffer_offs + in_len) / AES_BLOCK_SIZE) * AES_BLOCK_SIZE; in rk_cipher_buffer_update() 688 real_in_len = ROUNDUP(ctx->buffer_offs + in_len, in rk_cipher_buffer_update() 691 real_in_len = ROUNDDOWN(ctx->buffer_offs + in_len, AES_BLOCK_SIZE); in rk_cipher_buffer_update() 717 tmp_out_len = (ctx->buffer_offs + in_len) % AES_BLOCK_SIZE; in rk_cipher_buffer_update() 740 uint32_t in_len, uint32_t *out_len) in rk_cipher_update() argument [all …]
|
| /OK3568_Linux_fs/kernel/net/ceph/ |
| H A D | crypto.c | 219 void *buf, int buf_len, int in_len, int *pout_len) in ceph_aes_crypt() argument 225 int pad_byte = AES_BLOCK_SIZE - (in_len & (AES_BLOCK_SIZE - 1)); in ceph_aes_crypt() 226 int crypt_len = encrypt ? in_len + pad_byte : in_len; in ceph_aes_crypt() 231 memset(buf + in_len, pad_byte, pad_byte); in ceph_aes_crypt() 265 pad_byte = *(char *)(buf + in_len - 1); in ceph_aes_crypt() 267 in_len >= pad_byte) { in ceph_aes_crypt() 268 *pout_len = in_len - pad_byte; in ceph_aes_crypt() 271 __func__, pad_byte, in_len); in ceph_aes_crypt() 283 void *buf, int buf_len, int in_len, int *pout_len) in ceph_crypt() argument 287 *pout_len = in_len; in ceph_crypt() [all …]
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v1/ta/rk_public_api/ |
| H A D | rk_crypto_api.h | 101 TEE_Result rk_hash_crypto(uint8_t *in, uint8_t *out, uint32_t in_len, 104 TEE_Result rk_hash_update(crypto_ctx_t *ctx, uint8_t *in, uint32_t in_len); 106 uint32_t in_len, uint32_t *out_len); 115 uint32_t in_len, uint32_t *out_len); 122 uint32_t in_len, uint32_t *out_len, rk_ae_update_type_t is_add); 124 uint8_t *tag, uint32_t in_len, uint32_t *out_len, uint32_t *tag_len); 137 uint32_t in_len, 149 uint32_t in_len, uint32_t *out_len); 151 TEE_Result rk_mac_crypto(uint8_t *in, uint8_t *out, uint32_t in_len, 156 TEE_Result rk_mac_update(crypto_ctx_t *ctx, uint8_t *in, uint32_t in_len); [all …]
|
| H A D | rk_crypto_api.c | 620 uint32_t in_len, uint32_t *out_len) in rk_cipher_buffer_update() argument 633 *in, *out, in_len, *out_len); in rk_cipher_buffer_update() 638 if ((ctx->buffer_offs + in_len) <= AES_BLOCK_SIZE) { in rk_cipher_buffer_update() 639 TEE_MemMove(ctx->buffer + ctx->buffer_offs, in, in_len); in rk_cipher_buffer_update() 640 ctx->buffer_offs += in_len; in rk_cipher_buffer_update() 659 real_in_len = ((ctx->buffer_offs + in_len) / AES_BLOCK_SIZE) * AES_BLOCK_SIZE; in rk_cipher_buffer_update() 662 real_in_len = ROUNDUP(ctx->buffer_offs + in_len, in rk_cipher_buffer_update() 665 real_in_len = ROUNDDOWN(ctx->buffer_offs + in_len, AES_BLOCK_SIZE); in rk_cipher_buffer_update() 691 tmp_out_len = (ctx->buffer_offs + in_len) % AES_BLOCK_SIZE; in rk_cipher_buffer_update() 714 uint32_t in_len, uint32_t *out_len) in rk_cipher_update() argument [all …]
|
| /OK3568_Linux_fs/external/security/librkcrypto/include/ |
| H A D | rkcrypto_core.h | 32 const uint8_t *in, uint32_t in_len, uint8_t *out, uint32_t *out_len); 34 const uint8_t *in, uint32_t in_len, uint8_t *out, uint32_t *out_len); 36 const uint8_t *in, uint32_t in_len, uint8_t *out, uint32_t *out_len); 38 const uint8_t *in, uint32_t in_len, uint8_t *out, uint32_t *out_len); 40 const uint8_t *in, uint32_t in_len, const uint8_t *hash, 43 const uint8_t *in, uint32_t in_len, const uint8_t *hash,
|
| /OK3568_Linux_fs/kernel/security/keys/ |
| H A D | keyctl_pkey.c | 138 if (uparams.in_len > info.max_dec_size || in keyctl_pkey_params_get_2() 143 if (uparams.in_len > info.max_enc_size || in keyctl_pkey_params_get_2() 148 if (uparams.in_len > info.max_data_size || in keyctl_pkey_params_get_2() 153 if (uparams.in_len > info.max_data_size || in keyctl_pkey_params_get_2() 161 params->in_len = uparams.in_len; in keyctl_pkey_params_get_2() 246 in = memdup_user(_in, params.in_len); in keyctl_pkey_e_d_s() 308 in = memdup_user(_in, params.in_len); in keyctl_pkey_verify()
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v1/export-user_ta/host_include/openssl/ |
| H A D | rsa.h | 173 size_t max_out, const uint8_t *in, size_t in_len, 192 size_t max_out, const uint8_t *in, size_t in_len, 234 unsigned int in_len, uint8_t *out, 252 size_t in_len, const EVP_MD *md, 266 size_t in_len, int padding); 311 size_t in_len, int padding); 437 OPENSSL_EXPORT RSA *RSA_public_key_from_bytes(const uint8_t *in, size_t in_len); 459 size_t in_len); 605 const uint8_t *in, size_t in_len, int padding); 607 const uint8_t *in, size_t in_len, int padding);
|
| /OK3568_Linux_fs/kernel/lib/lzo/ |
| H A D | lzo1x_compress.c | 22 lzo1x_1_do_compress(const unsigned char *in, size_t in_len, in lzo1x_1_do_compress() argument 29 const unsigned char * const in_end = in + in_len; in lzo1x_1_do_compress() 30 const unsigned char * const ip_end = in + in_len - 20; in lzo1x_1_do_compress() 304 int lzogeneric1x_1_compress(const unsigned char *in, size_t in_len, in lzogeneric1x_1_compress() argument 311 size_t l = in_len; in lzogeneric1x_1_compress() 344 const unsigned char *ii = in + in_len - t; in lzogeneric1x_1_compress() 381 int lzo1x_1_compress(const unsigned char *in, size_t in_len, in lzo1x_1_compress() argument 385 return lzogeneric1x_1_compress(in, in_len, out, out_len, wrkmem, 0); in lzo1x_1_compress() 388 int lzorle1x_1_compress(const unsigned char *in, size_t in_len, in lzorle1x_1_compress() argument 392 return lzogeneric1x_1_compress(in, in_len, out, out_len, in lzorle1x_1_compress()
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v1/export-user_ta/include/openssl/ |
| H A D | rsa.h | 173 size_t max_out, const uint8_t *in, size_t in_len, 192 size_t max_out, const uint8_t *in, size_t in_len, 234 unsigned int in_len, uint8_t *out, 252 size_t in_len, const EVP_MD *md, 266 size_t in_len, int padding); 311 size_t in_len, int padding); 437 OPENSSL_EXPORT RSA *RSA_public_key_from_bytes(const uint8_t *in, size_t in_len); 459 size_t in_len); 605 const uint8_t *in, size_t in_len, int padding); 607 const uint8_t *in, size_t in_len, int padding);
|
| /OK3568_Linux_fs/kernel/net/tls/ |
| H A D | tls_device_fallback.c | 52 struct scatter_walk *out, int *in_len) in tls_enc_record() argument 60 len = min_t(int, *in_len, ARRAY_SIZE(buf)); in tls_enc_record() 65 *in_len -= len; in tls_enc_record() 66 if (!*in_len) in tls_enc_record() 89 *in_len -= len; in tls_enc_record() 90 if (*in_len < 0) { in tls_enc_record() 91 *in_len += TLS_CIPHER_AES_GCM_128_TAG_SIZE; in tls_enc_record() 99 if (*in_len < 0) in tls_enc_record() 100 len += *in_len; in tls_enc_record() 102 *in_len = 0; in tls_enc_record() [all …]
|
| /OK3568_Linux_fs/external/security/librkcrypto/src/ |
| H A D | rkcrypto_core.c | 929 const uint8_t *in, uint32_t in_len, in rk_rsa_crypt_common() argument 963 if (key_bits / 8 != in_len) { in rk_rsa_crypt_common() 976 rop.in_len = in_len; in rk_rsa_crypt_common() 996 const uint8_t *in, uint32_t in_len, uint8_t *out, uint32_t *out_len) in rk_rsa_pub_encrypt() argument 1003 RK_CRYPTO_CHECK_PARAM(in_len == 0); in rk_rsa_pub_encrypt() 1007 in, in_len, data_pad, &data_pad_len); in rk_rsa_pub_encrypt() 1018 const uint8_t *in, uint32_t in_len, uint8_t *out, uint32_t *out_len) in rk_rsa_priv_decrypt() argument 1025 RK_CRYPTO_CHECK_PARAM(priv->key.n_len != in_len); in rk_rsa_priv_decrypt() 1028 in, in_len, data_pad, &data_pad_len); in rk_rsa_priv_decrypt() 1039 const uint8_t *in, uint32_t in_len, uint8_t *out, uint32_t *out_len) in rk_rsa_priv_encrypt() argument [all …]
|