Home
last modified time | relevance | path

Searched refs:in_len (Results 1 – 25 of 317) sorted by relevance

12345678910>>...13

/OK3568_Linux_fs/kernel/lib/
H A Ddecompress_unlzo.c41 STATIC inline long INIT parse_header(u8 *input, long *skip, long in_len) in parse_header() argument
45 u8 *end = input + in_len; in parse_header()
54 if (in_len < HEADER_SIZE_MIN) in parse_header()
98 STATIC int INIT unlzo(u8 *input, long in_len, in unlzo() argument
152 in_len = fill(in_buf, HEADER_SIZE_MAX); in unlzo()
155 if (!parse_header(in_buf, &skip, in_len)) { in unlzo()
160 in_len -= skip; in unlzo()
164 memcpy(in_buf_save, in_buf, in_len); in unlzo()
173 if (fill && in_len < 4) { in unlzo()
174 skip = fill(in_buf + in_len, 4 - in_len); in unlzo()
[all …]
H A Ddecompress_unzstd.c123 static int INIT decompress_single(const u8 *in_buf, long in_len, u8 *out_buf, in decompress_single() argument
142 ret = ZSTD_findFrameCompressedSize(in_buf, in_len); in decompress_single()
146 in_len = (long)ret; in decompress_single()
148 ret = ZSTD_decompressDCtx(dctx, out_buf, out_len, in_buf, in_len); in decompress_single()
154 *in_pos = in_len; in decompress_single()
163 static int INIT __unzstd(unsigned char *in_buf, long in_len, in __unzstd() argument
194 return decompress_single(in_buf, in_len, out_buf, out_len, in __unzstd()
210 in_len = 0; in __unzstd()
214 in_len = fill(in_buf, ZSTD_IOBUF_SIZE); in __unzstd()
215 if (in_len < 0) { in __unzstd()
[all …]
/OK3568_Linux_fs/external/security/librkcrypto/test/
H A Dcmode_adapter.c10 uint8_t *in, uint32_t in_len, uint8_t *out) in soft_cipher() argument
18 ret = rk_des_ecb_encrypt(in, out, in_len, key, key_len, is_enc); in soft_cipher()
21 ret = rk_des_cbc_encrypt(in, out, in_len, key, key_len, iv, is_enc); in soft_cipher()
24 ret = rk_des_cfb_encrypt(in, out, in_len, key, key_len, iv, is_enc); in soft_cipher()
27 ret = rk_des_ofb_encrypt(in, out, in_len, key, key_len, iv, is_enc); in soft_cipher()
35 ret = rk_aes_ecb_encrypt(in, out, in_len, key, key_len, is_enc); in soft_cipher()
38 ret = rk_aes_cbc_encrypt(in, out, in_len, key, key_len, iv, is_enc); in soft_cipher()
41 ret = rk_aes_cfb_encrypt(in, out, in_len, key, key_len, iv, is_enc); in soft_cipher()
44 ret = rk_aes_ofb_encrypt(in, out, in_len, key, key_len, iv, is_enc); in soft_cipher()
47 ret = rk_aes_cts_encrypt(in, out, in_len, key, key_len, iv, is_enc); in soft_cipher()
[all …]
H A Dtest_rsa.c258 static RK_RES openssl_encrypt(const uint8_t *in, uint32_t in_len, uint8_t *out, uint32_t *out_len, in openssl_encrypt() argument
299 if (EVP_PKEY_encrypt(pkey_ctx, NULL /* out */, &tmp_len, in, in_len) <= 0) { in openssl_encrypt()
303 if (EVP_PKEY_encrypt(pkey_ctx, out, &tmp_len, in, in_len) <= 0) { in openssl_encrypt()
321 static RK_RES openssl_decrypt(const uint8_t *in, uint32_t in_len, uint8_t *out, uint32_t *out_len, in openssl_decrypt() argument
364 if (EVP_PKEY_decrypt(pkey_ctx, NULL /* out */, &tmp_len, in, in_len) <= 0) { in openssl_decrypt()
368 if (EVP_PKEY_decrypt(pkey_ctx, out, &tmp_len, in, in_len) <= 0) { in openssl_decrypt()
386 static RK_RES openssl_sign(const uint8_t *in, uint32_t in_len, uint8_t *out, uint32_t *out_len, in openssl_sign() argument
428 if (EVP_DigestSignUpdate(digest_ctx, in, in_len) != 1) { in openssl_sign()
456 static RK_RES openssl_verify(const uint8_t *in, uint32_t in_len, uint8_t *sign, uint32_t sign_len, in openssl_verify() argument
497 if (EVP_DigestVerifyUpdate(digest_ctx, in, in_len) != 1) { in openssl_verify()
[all …]
H A Dcmode_adapter.h11 uint8_t *in, uint32_t in_len, uint8_t *out);
16 uint8_t *in, uint32_t in_len, uint8_t *out, uint8_t *tag);
18 RK_RES soft_hash(uint32_t algo, const uint8_t *in, uint32_t in_len,
22 const uint8_t *in, uint32_t in_len, uint8_t *out, uint32_t *out_len);
/OK3568_Linux_fs/kernel/fs/btrfs/
H A Dlzo.c129 size_t in_len; in lzo_compress_pages() local
162 in_len = min(len, PAGE_SIZE); in lzo_compress_pages()
164 ret = lzo1x_1_compress(data_in, in_len, workspace->cbuf, in lzo_compress_pages()
179 tot_in += in_len; in lzo_compress_pages()
252 in_len = min(bytes_left, PAGE_SIZE); in lzo_compress_pages()
294 size_t in_len; in lzo_decompress_bio() local
331 in_len = read_compress_length(data_in + in_offset); in lzo_decompress_bio()
342 if (in_len > max_segment_len || tot_in + in_len > tot_len) { in lzo_decompress_bio()
347 tot_in += in_len; in lzo_decompress_bio()
348 working_bytes = in_len; in lzo_decompress_bio()
[all …]
/OK3568_Linux_fs/kernel/fs/ubifs/
H A Dcompress.c102 int in_len, void *out_buf, int *out_len, int *compr_type) in ubifs_compress() argument
111 if (in_len < UBIFS_MIN_COMPR_LEN) in ubifs_compress()
116 err = crypto_comp_compress(compr->cc, in_buf, in_len, out_buf, in ubifs_compress()
122 in_len, compr->name, err); in ubifs_compress()
130 if (in_len - *out_len < UBIFS_MIN_COMPRESS_DIFF) in ubifs_compress()
136 memcpy(out_buf, in_buf, in_len); in ubifs_compress()
137 *out_len = in_len; in ubifs_compress()
154 int in_len, void *out_buf, int *out_len, int compr_type) in ubifs_decompress() argument
172 memcpy(out_buf, in_buf, in_len); in ubifs_decompress()
173 *out_len = in_len; in ubifs_decompress()
[all …]
H A Dcrypto.c28 unsigned int in_len, unsigned int *out_len, int block) in ubifs_encrypt() argument
32 unsigned int pad_len = round_up(in_len, UBIFS_CIPHER_BLOCK_SIZE); in ubifs_encrypt()
36 dn->compr_size = cpu_to_le16(in_len); in ubifs_encrypt()
39 if (pad_len != in_len) in ubifs_encrypt()
40 memset(p + in_len, 0, pad_len - in_len); in ubifs_encrypt()
/OK3568_Linux_fs/external/security/librkcrypto/test/c_mode/
H A Dhmac.c12 typedef int (*hash_f)(const unsigned char *in, unsigned int in_len,
17 unsigned int in_len, unsigned char *out, unsigned int *out_len, hash_f hash)
54 tmp = (unsigned char*)malloc(PARTITION_BYTE_SIZE+in_len);
61 memcpy(tmp+sizeof(istr), in, in_len);
63 res = (*hash)(tmp, PARTITION_BYTE_SIZE+in_len, istr, &hash_len);
307 unsigned int in_len, unsigned char *out, unsigned int *out_len) in rk_hmac_md5() argument
312 return rk_hmac_64(key, key_len, in, in_len, out, out_len, rk_hash_md5); in rk_hmac_md5()
316 unsigned int in_len, unsigned char *out, unsigned int *out_len) in rk_hmac_sha1() argument
321 return rk_hmac_64(key, key_len, in, in_len, out, out_len, rk_hash_sha1); in rk_hmac_sha1()
325 unsigned int in_len, unsigned char *out, unsigned int *out_len) in rk_hmac_sha256() argument
[all …]
H A Dhash_sha512.c355 int rk_hash_sha512(const unsigned char *in, unsigned int in_len, in rk_hash_sha512() argument
360 if (in == NULL && in_len != 0) in rk_hash_sha512()
368 mbedtls_sha512_update( &ctx, in, in_len ); in rk_hash_sha512()
375 int rk_hash_sha384(const unsigned char *in, unsigned int in_len, in rk_hash_sha384() argument
380 if (in == NULL && in_len != 0) in rk_hash_sha384()
388 mbedtls_sha512_update( &ctx, in, in_len ); in rk_hash_sha384()
395 int rk_hash_sha512_224(const unsigned char *in, unsigned int in_len, in rk_hash_sha512_224() argument
400 if (in == NULL && in_len != 0) in rk_hash_sha512_224()
408 mbedtls_sha512_update( &ctx, in, in_len ); in rk_hash_sha512_224()
415 int rk_hash_sha512_256(const unsigned char *in, unsigned int in_len, in rk_hash_sha512_256() argument
[all …]
/OK3568_Linux_fs/external/security/librkcrypto/test/include/c_mode/
H A Dhmac.h60 unsigned int in_len, unsigned char *out, unsigned int *out_len);
63 unsigned int in_len, unsigned char *out, unsigned int *out_len);
66 unsigned int in_len, unsigned char *out, unsigned int *out_len);
69 unsigned int in_len, unsigned char *out, unsigned int *out_len);
72 unsigned int in_len, unsigned char *out, unsigned int *out_len);
H A Dhash_sha512.h59 int rk_hash_sha512(const unsigned char *in, unsigned int in_len,
62 int rk_hash_sha384(const unsigned char *in, unsigned int in_len,
65 int rk_hash_sha512_224(const unsigned char *in, unsigned int in_len,
68 int rk_hash_sha512_256(const unsigned char *in, unsigned int in_len,
/OK3568_Linux_fs/kernel/drivers/net/ethernet/sfc/
H A Dtx_tso.c66 unsigned int in_len; member
174 unsigned int header_len, in_len; in tso_start() local
180 in_len = skb_headlen(skb) - header_len; in tso_start()
182 st->in_len = in_len; in tso_start()
215 st->in_len = skb_frag_size(frag); in tso_get_fragment()
239 if (st->in_len == 0) in tso_fill_packet_with_fragment()
244 EFX_WARN_ON_ONCE_PARANOID(st->in_len <= 0); in tso_fill_packet_with_fragment()
247 n = min(st->in_len, st->packet_space); in tso_fill_packet_with_fragment()
251 st->in_len -= n; in tso_fill_packet_with_fragment()
263 if (st->in_len == 0) { in tso_fill_packet_with_fragment()
[all …]
/OK3568_Linux_fs/external/security/rk_tee_user/v2/ta/rk_public_api/
H A Drk_crypto_api.h118 TEE_Result rk_hash_crypto(uint8_t *in, uint8_t *out, uint32_t in_len,
121 TEE_Result rk_hash_update(crypto_ctx_t *ctx, uint8_t *in, uint32_t in_len);
123 uint32_t in_len, uint32_t *out_len);
132 uint32_t in_len, uint32_t *out_len);
139 uint32_t in_len, uint32_t *out_len, rk_ae_update_type_t is_add);
141 uint8_t *tag, uint32_t in_len, uint32_t *out_len, uint32_t *tag_len);
154 uint32_t in_len,
166 uint32_t in_len, uint32_t *out_len);
168 TEE_Result rk_sm2_pke(uint8_t *in, uint32_t in_len, uint8_t *out,
177 TEE_Result rk_mac_crypto(uint8_t *in, uint8_t *out, uint32_t in_len,
[all …]
H A Drk_crypto_api.c646 uint32_t in_len, uint32_t *out_len) in rk_cipher_buffer_update() argument
659 *in, *out, in_len, *out_len); in rk_cipher_buffer_update()
664 if ((ctx->buffer_offs + in_len) <= AES_BLOCK_SIZE) { in rk_cipher_buffer_update()
665 TEE_MemMove(ctx->buffer + ctx->buffer_offs, in, in_len); in rk_cipher_buffer_update()
666 ctx->buffer_offs += in_len; in rk_cipher_buffer_update()
685 real_in_len = ((ctx->buffer_offs + in_len) / AES_BLOCK_SIZE) * AES_BLOCK_SIZE; in rk_cipher_buffer_update()
688 real_in_len = ROUNDUP(ctx->buffer_offs + in_len, in rk_cipher_buffer_update()
691 real_in_len = ROUNDDOWN(ctx->buffer_offs + in_len, AES_BLOCK_SIZE); in rk_cipher_buffer_update()
717 tmp_out_len = (ctx->buffer_offs + in_len) % AES_BLOCK_SIZE; in rk_cipher_buffer_update()
740 uint32_t in_len, uint32_t *out_len) in rk_cipher_update() argument
[all …]
/OK3568_Linux_fs/kernel/net/ceph/
H A Dcrypto.c219 void *buf, int buf_len, int in_len, int *pout_len) in ceph_aes_crypt() argument
225 int pad_byte = AES_BLOCK_SIZE - (in_len & (AES_BLOCK_SIZE - 1)); in ceph_aes_crypt()
226 int crypt_len = encrypt ? in_len + pad_byte : in_len; in ceph_aes_crypt()
231 memset(buf + in_len, pad_byte, pad_byte); in ceph_aes_crypt()
265 pad_byte = *(char *)(buf + in_len - 1); in ceph_aes_crypt()
267 in_len >= pad_byte) { in ceph_aes_crypt()
268 *pout_len = in_len - pad_byte; in ceph_aes_crypt()
271 __func__, pad_byte, in_len); in ceph_aes_crypt()
283 void *buf, int buf_len, int in_len, int *pout_len) in ceph_crypt() argument
287 *pout_len = in_len; in ceph_crypt()
[all …]
/OK3568_Linux_fs/external/security/rk_tee_user/v1/ta/rk_public_api/
H A Drk_crypto_api.h101 TEE_Result rk_hash_crypto(uint8_t *in, uint8_t *out, uint32_t in_len,
104 TEE_Result rk_hash_update(crypto_ctx_t *ctx, uint8_t *in, uint32_t in_len);
106 uint32_t in_len, uint32_t *out_len);
115 uint32_t in_len, uint32_t *out_len);
122 uint32_t in_len, uint32_t *out_len, rk_ae_update_type_t is_add);
124 uint8_t *tag, uint32_t in_len, uint32_t *out_len, uint32_t *tag_len);
137 uint32_t in_len,
149 uint32_t in_len, uint32_t *out_len);
151 TEE_Result rk_mac_crypto(uint8_t *in, uint8_t *out, uint32_t in_len,
156 TEE_Result rk_mac_update(crypto_ctx_t *ctx, uint8_t *in, uint32_t in_len);
[all …]
H A Drk_crypto_api.c620 uint32_t in_len, uint32_t *out_len) in rk_cipher_buffer_update() argument
633 *in, *out, in_len, *out_len); in rk_cipher_buffer_update()
638 if ((ctx->buffer_offs + in_len) <= AES_BLOCK_SIZE) { in rk_cipher_buffer_update()
639 TEE_MemMove(ctx->buffer + ctx->buffer_offs, in, in_len); in rk_cipher_buffer_update()
640 ctx->buffer_offs += in_len; in rk_cipher_buffer_update()
659 real_in_len = ((ctx->buffer_offs + in_len) / AES_BLOCK_SIZE) * AES_BLOCK_SIZE; in rk_cipher_buffer_update()
662 real_in_len = ROUNDUP(ctx->buffer_offs + in_len, in rk_cipher_buffer_update()
665 real_in_len = ROUNDDOWN(ctx->buffer_offs + in_len, AES_BLOCK_SIZE); in rk_cipher_buffer_update()
691 tmp_out_len = (ctx->buffer_offs + in_len) % AES_BLOCK_SIZE; in rk_cipher_buffer_update()
714 uint32_t in_len, uint32_t *out_len) in rk_cipher_update() argument
[all …]
/OK3568_Linux_fs/external/security/librkcrypto/include/
H A Drkcrypto_core.h32 const uint8_t *in, uint32_t in_len, uint8_t *out, uint32_t *out_len);
34 const uint8_t *in, uint32_t in_len, uint8_t *out, uint32_t *out_len);
36 const uint8_t *in, uint32_t in_len, uint8_t *out, uint32_t *out_len);
38 const uint8_t *in, uint32_t in_len, uint8_t *out, uint32_t *out_len);
40 const uint8_t *in, uint32_t in_len, const uint8_t *hash,
43 const uint8_t *in, uint32_t in_len, const uint8_t *hash,
/OK3568_Linux_fs/kernel/security/keys/
H A Dkeyctl_pkey.c138 if (uparams.in_len > info.max_dec_size || in keyctl_pkey_params_get_2()
143 if (uparams.in_len > info.max_enc_size || in keyctl_pkey_params_get_2()
148 if (uparams.in_len > info.max_data_size || in keyctl_pkey_params_get_2()
153 if (uparams.in_len > info.max_data_size || in keyctl_pkey_params_get_2()
161 params->in_len = uparams.in_len; in keyctl_pkey_params_get_2()
246 in = memdup_user(_in, params.in_len); in keyctl_pkey_e_d_s()
308 in = memdup_user(_in, params.in_len); in keyctl_pkey_verify()
/OK3568_Linux_fs/external/security/rk_tee_user/v1/export-user_ta/host_include/openssl/
H A Drsa.h173 size_t max_out, const uint8_t *in, size_t in_len,
192 size_t max_out, const uint8_t *in, size_t in_len,
234 unsigned int in_len, uint8_t *out,
252 size_t in_len, const EVP_MD *md,
266 size_t in_len, int padding);
311 size_t in_len, int padding);
437 OPENSSL_EXPORT RSA *RSA_public_key_from_bytes(const uint8_t *in, size_t in_len);
459 size_t in_len);
605 const uint8_t *in, size_t in_len, int padding);
607 const uint8_t *in, size_t in_len, int padding);
/OK3568_Linux_fs/kernel/lib/lzo/
H A Dlzo1x_compress.c22 lzo1x_1_do_compress(const unsigned char *in, size_t in_len, in lzo1x_1_do_compress() argument
29 const unsigned char * const in_end = in + in_len; in lzo1x_1_do_compress()
30 const unsigned char * const ip_end = in + in_len - 20; in lzo1x_1_do_compress()
304 int lzogeneric1x_1_compress(const unsigned char *in, size_t in_len, in lzogeneric1x_1_compress() argument
311 size_t l = in_len; in lzogeneric1x_1_compress()
344 const unsigned char *ii = in + in_len - t; in lzogeneric1x_1_compress()
381 int lzo1x_1_compress(const unsigned char *in, size_t in_len, in lzo1x_1_compress() argument
385 return lzogeneric1x_1_compress(in, in_len, out, out_len, wrkmem, 0); in lzo1x_1_compress()
388 int lzorle1x_1_compress(const unsigned char *in, size_t in_len, in lzorle1x_1_compress() argument
392 return lzogeneric1x_1_compress(in, in_len, out, out_len, in lzorle1x_1_compress()
/OK3568_Linux_fs/external/security/rk_tee_user/v1/export-user_ta/include/openssl/
H A Drsa.h173 size_t max_out, const uint8_t *in, size_t in_len,
192 size_t max_out, const uint8_t *in, size_t in_len,
234 unsigned int in_len, uint8_t *out,
252 size_t in_len, const EVP_MD *md,
266 size_t in_len, int padding);
311 size_t in_len, int padding);
437 OPENSSL_EXPORT RSA *RSA_public_key_from_bytes(const uint8_t *in, size_t in_len);
459 size_t in_len);
605 const uint8_t *in, size_t in_len, int padding);
607 const uint8_t *in, size_t in_len, int padding);
/OK3568_Linux_fs/kernel/net/tls/
H A Dtls_device_fallback.c52 struct scatter_walk *out, int *in_len) in tls_enc_record() argument
60 len = min_t(int, *in_len, ARRAY_SIZE(buf)); in tls_enc_record()
65 *in_len -= len; in tls_enc_record()
66 if (!*in_len) in tls_enc_record()
89 *in_len -= len; in tls_enc_record()
90 if (*in_len < 0) { in tls_enc_record()
91 *in_len += TLS_CIPHER_AES_GCM_128_TAG_SIZE; in tls_enc_record()
99 if (*in_len < 0) in tls_enc_record()
100 len += *in_len; in tls_enc_record()
102 *in_len = 0; in tls_enc_record()
[all …]
/OK3568_Linux_fs/external/security/librkcrypto/src/
H A Drkcrypto_core.c929 const uint8_t *in, uint32_t in_len, in rk_rsa_crypt_common() argument
963 if (key_bits / 8 != in_len) { in rk_rsa_crypt_common()
976 rop.in_len = in_len; in rk_rsa_crypt_common()
996 const uint8_t *in, uint32_t in_len, uint8_t *out, uint32_t *out_len) in rk_rsa_pub_encrypt() argument
1003 RK_CRYPTO_CHECK_PARAM(in_len == 0); in rk_rsa_pub_encrypt()
1007 in, in_len, data_pad, &data_pad_len); in rk_rsa_pub_encrypt()
1018 const uint8_t *in, uint32_t in_len, uint8_t *out, uint32_t *out_len) in rk_rsa_priv_decrypt() argument
1025 RK_CRYPTO_CHECK_PARAM(priv->key.n_len != in_len); in rk_rsa_priv_decrypt()
1028 in, in_len, data_pad, &data_pad_len); in rk_rsa_priv_decrypt()
1039 const uint8_t *in, uint32_t in_len, uint8_t *out, uint32_t *out_len) in rk_rsa_priv_encrypt() argument
[all …]

12345678910>>...13