| /OK3568_Linux_fs/kernel/crypto/ |
| H A D | rsa-pkcs1pad.c | 93 unsigned int key_size; member 113 ctx->key_size = 0; in pkcs1pad_set_pub_key() 124 ctx->key_size = err; in pkcs1pad_set_pub_key() 134 ctx->key_size = 0; in pkcs1pad_set_priv_key() 145 ctx->key_size = err; in pkcs1pad_set_priv_key() 159 return ctx->key_size; in pkcs1pad_get_max_size() 187 pad_len = ctx->key_size - len; in pkcs1pad_encrypt_sign_complete() 193 out_buf = kzalloc(ctx->key_size, GFP_KERNEL); in pkcs1pad_encrypt_sign_complete() 201 sg_nents_for_len(req->dst, ctx->key_size), in pkcs1pad_encrypt_sign_complete() 202 out_buf, ctx->key_size); in pkcs1pad_encrypt_sign_complete() [all …]
|
| H A D | dh_helper.c | 31 return p->key_size + p->p_size + p->q_size + p->g_size; in dh_data_size() 53 ptr = dh_pack_data(ptr, end, ¶ms->key_size, in crypto_dh_encode_key() 54 sizeof(params->key_size)); in crypto_dh_encode_key() 58 ptr = dh_pack_data(ptr, end, params->key, params->key_size); in crypto_dh_encode_key() 80 ptr = dh_unpack_data(¶ms->key_size, ptr, sizeof(params->key_size)); in crypto_dh_decode_key() 91 if (params->key_size > params->p_size || in crypto_dh_decode_key() 99 params->p = (void *)(ptr + params->key_size); in crypto_dh_decode_key() 100 params->q = (void *)(ptr + params->key_size + params->p_size); in crypto_dh_decode_key() 101 params->g = (void *)(ptr + params->key_size + params->p_size + in crypto_dh_decode_key()
|
| H A D | ecdh_helper.c | 29 return ECDH_KPP_SECRET_MIN_SIZE + params->key_size; in crypto_ecdh_key_len() 50 ptr = ecdh_pack_data(ptr, ¶ms->key_size, sizeof(params->key_size)); in crypto_ecdh_encode_key() 51 ecdh_pack_data(ptr, params->key, params->key_size); in crypto_ecdh_encode_key() 74 ptr = ecdh_unpack_data(¶ms->key_size, ptr, sizeof(params->key_size)); in crypto_ecdh_decode_key()
|
| H A D | fips140-selftests.c | 66 size_t key_size; member 80 size_t key_size; member 91 size_t key_size; member 208 err = aes_expandkey(&ctx, vec->key, vec->key_size); in fips_test_aes_library() 264 err = crypto_skcipher_setkey(tfm, vec->key, vec->key_size); in fips_test_skcipher() 347 err = crypto_aead_setkey(tfm, vec->key, vec->key_size); in fips_test_aead() 428 err = crypto_shash_setkey(tfm, vec->key, vec->key_size); in fips_test_hash() 579 .key_size = sizeof(fips_aes_key), 616 .key_size = sizeof(fips_aes_key), 652 .key_size = sizeof(fips_aes_key), [all …]
|
| H A D | ecdh.c | 43 params.key_size > sizeof(ctx->private_key)) in ecdh_set_secret() 53 if (!params.key || !params.key_size) in ecdh_set_secret() 57 memcpy(ctx->private_key, params.key, params.key_size); in ecdh_set_secret() 60 ctx->private_key, params.key_size) < 0) { in ecdh_set_secret() 61 memzero_explicit(ctx->private_key, params.key_size); in ecdh_set_secret()
|
| /OK3568_Linux_fs/kernel/kernel/bpf/ |
| H A D | hashtab.c | 184 static inline void htab_elem_set_ptr(struct htab_elem *l, u32 key_size, in htab_elem_set_ptr() argument 187 *(void __percpu **)(l->key + key_size) = pptr; in htab_elem_set_ptr() 190 static inline void __percpu *htab_elem_get_ptr(struct htab_elem *l, u32 key_size) in htab_elem_get_ptr() argument 192 return *(void __percpu **)(l->key + key_size); in htab_elem_get_ptr() 197 return *(void **)(l->key + roundup(map->key_size, 8)); in fd_htab_map_get_ptr() 216 htab->map.key_size); in htab_free_elems() 243 memcpy(l->key, key, htab->map.key_size); in prealloc_lru_pop() 273 htab_elem_set_ptr(get_htab_elem(htab, i), htab->map.key_size, in prealloc_init() 389 if (attr->max_entries == 0 || attr->key_size == 0 || in htab_map_alloc_check() 393 if (attr->key_size > MAX_BPF_STACK) in htab_map_alloc_check() [all …]
|
| H A D | map_in_map.c | 48 inner_map_meta->key_size = inner_map->key_size; in bpf_map_meta_alloc() 76 meta0->key_size == meta1->key_size && in bpf_map_meta_equal()
|
| /OK3568_Linux_fs/u-boot/lib/avb/libavb/ |
| H A D | avb_property_descriptor.c | 63 size_t key_size; member 90 if (data->key_size == prop_desc.key_num_bytes) { in property_lookup_desc_foreach() 93 data->key_size) == 0) { in property_lookup_desc_foreach() 110 size_t key_size, in avb_property_lookup() argument 114 if (key_size == 0) { in avb_property_lookup() 115 key_size = avb_strlen(key); in avb_property_lookup() 119 data.key_size = key_size; in avb_property_lookup() 138 size_t key_size, in avb_property_lookup_uint64() argument 146 value = avb_property_lookup(image_data, image_size, key, key_size, NULL); in avb_property_lookup_uint64()
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/bpf/ |
| H A D | test_lpm_map.c | 427 size_t key_size; in test_lpm_delete() local 431 key_size = sizeof(*key) + sizeof(__u32); in test_lpm_delete() 432 key = alloca(key_size); in test_lpm_delete() 435 key_size, sizeof(value), in test_lpm_delete() 539 size_t key_size; in test_lpm_get_next_key() local 543 key_size = sizeof(*key_p) + sizeof(__u32); in test_lpm_get_next_key() 544 key_p = alloca(key_size); in test_lpm_get_next_key() 545 next_key_p = alloca(key_size); in test_lpm_get_next_key() 547 map_fd = bpf_create_map(BPF_MAP_TYPE_LPM_TRIE, key_size, sizeof(value), in test_lpm_get_next_key() 560 memset(key_p, 0, key_size); in test_lpm_get_next_key() [all …]
|
| /OK3568_Linux_fs/kernel/samples/crypto/ |
| H A D | fips140_lab_util.c | 325 size_t key_size; member 337 .key_size = 16, 341 .key_size = 17, 346 .key_size = 24, 350 .key_size = 32, 354 .key_size = 33, 359 .key_size = 16, 366 .key_size = 16, 372 .key_size = 16, 379 .key_size = 29, [all …]
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/bpf/prog_tests/ |
| H A D | btf.c | 71 __u32 key_size; member 139 .key_size = sizeof(int), 194 .key_size = sizeof(int), 219 .key_size = sizeof(int), 260 .key_size = sizeof(int), 305 .key_size = sizeof(int), 327 .key_size = sizeof(int), 349 .key_size = sizeof(int), 371 .key_size = sizeof(int), 396 .key_size = sizeof(int), [all …]
|
| /OK3568_Linux_fs/kernel/tools/bpf/bpftool/ |
| H A D | map.c | 165 print_hex_data_json(key, info->key_size); in print_entry_json() 185 print_hex_data_json(key, info->key_size); in print_entry_json() 223 break_names = info->key_size > 16 || msg_size > 16; in print_entry_error_msg() 224 single_line = info->key_size + msg_size <= 24 && !break_names; in print_entry_error_msg() 227 fprint_hex(stdout, key, info->key_size, " "); in print_entry_error_msg() 250 print_hex_data_json(key, map_info->key_size); in print_entry_error() 276 break_names = info->key_size > 16 || info->value_size > 16; in print_entry_plain() 277 single_line = info->key_size + info->value_size <= 24 && in print_entry_plain() 280 if (info->key_size) { in print_entry_plain() 282 fprint_hex(stdout, key, info->key_size, " "); in print_entry_plain() [all …]
|
| /OK3568_Linux_fs/u-boot/common/ |
| H A D | write_keybox.c | 123 uint8_t *key, uint32_t key_size, in rk_send_keybox_to_ta() argument 177 SharedMem1.size = key_size; in rk_send_keybox_to_ta() 228 uint32_t key_size; in write_keybox_to_secure_storage() local 265 key_size = *(widevine_data + SIZE_OF_TAG); in write_keybox_to_secure_storage() 266 data_size = *(widevine_data + SIZE_OF_TAG + sizeof(key_size)); in write_keybox_to_secure_storage() 272 sizeof(key_size) + sizeof(data_size), in write_keybox_to_secure_storage() 273 key_size, in write_keybox_to_secure_storage() 274 widevine_data + 12 + key_size, in write_keybox_to_secure_storage() 342 uint32_t key_size; in read_raw_data_from_secure_storage() local 350 memcpy(&key_size, read_data, sizeof(uint32_t)); in read_raw_data_from_secure_storage() [all …]
|
| /OK3568_Linux_fs/kernel/drivers/net/ethernet/netronome/nfp/flower/ |
| H A D | offload.c | 156 u32 *key_layer_two, int *key_size, bool ipv6, in nfp_flower_calc_opt_layer() argument 167 *key_size += sizeof(struct nfp_flower_geneve_options); in nfp_flower_calc_opt_layer() 176 u32 *key_layer_two, u8 *key_layer, int *key_size, in nfp_flower_calc_udp_tun_layer() argument 190 *key_size += sizeof(struct nfp_flower_ext_meta); in nfp_flower_calc_udp_tun_layer() 192 *key_size += sizeof(struct nfp_flower_ipv6_udp_tun); in nfp_flower_calc_udp_tun_layer() 194 *key_size += sizeof(struct nfp_flower_ipv4_udp_tun); in nfp_flower_calc_udp_tun_layer() 209 *key_size += sizeof(struct nfp_flower_ext_meta); in nfp_flower_calc_udp_tun_layer() 214 *key_size += sizeof(struct nfp_flower_ipv6_udp_tun); in nfp_flower_calc_udp_tun_layer() 216 *key_size += sizeof(struct nfp_flower_ipv4_udp_tun); in nfp_flower_calc_udp_tun_layer() 225 err = nfp_flower_calc_opt_layer(enc_op, key_layer_two, key_size, in nfp_flower_calc_udp_tun_layer() [all …]
|
| /OK3568_Linux_fs/kernel/tools/lib/bpf/ |
| H A D | libbpf_probes.c | 204 int key_size, value_size, max_entries, map_flags; in bpf_probe_map_type() local 209 key_size = sizeof(__u32); in bpf_probe_map_type() 219 key_size = sizeof(__u64); in bpf_probe_map_type() 225 key_size = sizeof(struct bpf_cgroup_storage_key); in bpf_probe_map_type() 231 key_size = 0; in bpf_probe_map_type() 245 key_size = 0; in bpf_probe_map_type() 291 attr.key_size = key_size; in bpf_probe_map_type()
|
| H A D | bpf.h | 41 __u32 key_size; member 58 int key_size, int value_size, 61 int key_size, int value_size, 63 LIBBPF_API int bpf_create_map(enum bpf_map_type map_type, int key_size, 66 const char *name, int key_size, 70 const char *name, int key_size,
|
| H A D | bpf.c | 86 attr.key_size = create_attr->key_size; in bpf_create_map_xattr() 108 int key_size, int value_size, int max_entries, in bpf_create_map_node() argument 116 map_attr.key_size = key_size; in bpf_create_map_node() 127 int bpf_create_map(enum bpf_map_type map_type, int key_size, in bpf_create_map() argument 134 map_attr.key_size = key_size; in bpf_create_map() 142 int key_size, int value_size, int max_entries, in bpf_create_map_name() argument 150 map_attr.key_size = key_size; in bpf_create_map_name() 158 int key_size, int inner_map_fd, int max_entries, in bpf_create_map_in_map_node() argument 166 attr.key_size = key_size; in bpf_create_map_in_map_node() 184 int key_size, int inner_map_fd, int max_entries, in bpf_create_map_in_map() argument [all …]
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/ta/rk_public_api/ |
| H A D | rk_derive_key_api.c | 10 uint8_t *key, uint16_t key_size) in rk_derive_ta_unique_key() argument 19 if (!extra || extra_size == 0 || !key || (key_size != 16 && key_size != 32)) in rk_derive_ta_unique_key() 39 taParams[1].memref.size = key_size; in rk_derive_ta_unique_key()
|
| /OK3568_Linux_fs/kernel/drivers/mmc/host/ |
| H A D | cqhci-crypto.c | 17 enum cqhci_crypto_key_size key_size; member 21 .key_size = CQHCI_CRYPTO_KEY_SIZE_256, 79 ccap_array[i].key_size == alg->key_size && in cqhci_crypto_keyslot_program() 148 cqhci_crypto_algs[i].key_size == cap.key_size) in cqhci_find_blk_crypto_mode()
|
| /OK3568_Linux_fs/kernel/net/core/ |
| H A D | sock_map.c | 36 attr->key_size != 4 || in sock_map_alloc() 889 u32 key_size) in sock_hash_lookup_elem_raw() argument 895 !memcmp(&elem->key, key, key_size)) in sock_hash_lookup_elem_raw() 905 u32 key_size = map->key_size, hash; in __sock_hash_lookup_elem() local 911 hash = sock_hash_bucket_hash(key, key_size); in __sock_hash_lookup_elem() 913 elem = sock_hash_lookup_elem_raw(&bucket->head, hash, key, key_size); in __sock_hash_lookup_elem() 941 elem->key, map->key_size); in sock_hash_delete_from_link() 953 u32 hash, key_size = map->key_size; in sock_hash_delete_elem() local 958 hash = sock_hash_bucket_hash(key, key_size); in sock_hash_delete_elem() 962 elem = sock_hash_lookup_elem_raw(&bucket->head, hash, key, key_size); in sock_hash_delete_elem() [all …]
|
| /OK3568_Linux_fs/kernel/tools/bpf/bpftool/skeleton/ |
| H A D | profiler.bpf.c | 10 __uint(key_size, sizeof(u32)); 17 __uint(key_size, sizeof(u32)); 24 __uint(key_size, sizeof(u32)); 31 __uint(key_size, sizeof(u32));
|
| /OK3568_Linux_fs/kernel/kernel/trace/ |
| H A D | tracing_map.c | 414 elt->key = kzalloc(map->key_size, GFP_KERNEL); in tracing_map_elt_alloc() 505 static inline bool keys_match(void *key, void *test_key, unsigned key_size) in keys_match() argument 509 if (memcmp(key, test_key, key_size)) in keys_match() 523 key_hash = jhash(key, map->key_size, 0); in __tracing_map_insert() 536 keys_match(key, val->key, map->key_size)) { in __tracing_map_insert() 576 memcpy(elt->key, key, map->key_size); in __tracing_map_insert() 764 unsigned int key_size, in tracing_map_create() argument 793 map->key_size = key_size; in tracing_map_create() 848 if (memcmp(a->key, b->key, a->elt->map->key_size)) in cmp_entries_dup() 962 int n_entries, unsigned int key_size) in detect_dups() argument [all …]
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/bpf/progs/ |
| H A D | test_btf_map_in_map.c | 24 __uint(key_size, sizeof(int)); 64 __uint(key_size, sizeof(int)); 84 __uint(key_size, sizeof(int)); 114 __uint(key_size, sizeof(int));
|
| H A D | sockmap_verdict_prog.c | 10 __uint(key_size, sizeof(int)); 17 __uint(key_size, sizeof(int)); 24 __uint(key_size, sizeof(int));
|
| /OK3568_Linux_fs/kernel/crypto/asymmetric_keys/ |
| H A D | pkcs8_parser.c | 25 u32 key_size; member 90 ctx->key_size = vlen; in pkcs8_note_key() 119 pub->key = kmemdup(ctx.key, ctx.key_size, GFP_KERNEL); in pkcs8_parse() 123 pub->keylen = ctx.key_size; in pkcs8_parse()
|