Home
last modified time | relevance | path

Searched refs:key_size (Results 1 – 25 of 234) sorted by relevance

12345678910

/kernel/linux/linux-5.10/crypto/
Drsa-pkcs1pad.c93 unsigned int key_size; member
113 ctx->key_size = 0; in pkcs1pad_set_pub_key()
124 ctx->key_size = err; in pkcs1pad_set_pub_key()
134 ctx->key_size = 0; in pkcs1pad_set_priv_key()
145 ctx->key_size = err; in pkcs1pad_set_priv_key()
159 return ctx->key_size; in pkcs1pad_get_max_size()
187 pad_len = ctx->key_size - len; in pkcs1pad_encrypt_sign_complete()
193 out_buf = kzalloc(ctx->key_size, GFP_KERNEL); in pkcs1pad_encrypt_sign_complete()
201 sg_nents_for_len(req->dst, ctx->key_size), in pkcs1pad_encrypt_sign_complete()
202 out_buf, ctx->key_size); in pkcs1pad_encrypt_sign_complete()
[all …]
Ddh_helper.c31 return p->key_size + p->p_size + p->q_size + p->g_size; in dh_data_size()
53 ptr = dh_pack_data(ptr, end, &params->key_size, in crypto_dh_encode_key()
54 sizeof(params->key_size)); in crypto_dh_encode_key()
58 ptr = dh_pack_data(ptr, end, params->key, params->key_size); in crypto_dh_encode_key()
80 ptr = dh_unpack_data(&params->key_size, ptr, sizeof(params->key_size)); in crypto_dh_decode_key()
91 if (params->key_size > params->p_size || in crypto_dh_decode_key()
99 params->p = (void *)(ptr + params->key_size); in crypto_dh_decode_key()
100 params->q = (void *)(ptr + params->key_size + params->p_size); in crypto_dh_decode_key()
101 params->g = (void *)(ptr + params->key_size + params->p_size + in crypto_dh_decode_key()
Decdh_helper.c29 return ECDH_KPP_SECRET_MIN_SIZE + params->key_size; in crypto_ecdh_key_len()
50 ptr = ecdh_pack_data(ptr, &params->key_size, sizeof(params->key_size)); in crypto_ecdh_encode_key()
51 ecdh_pack_data(ptr, params->key, params->key_size); in crypto_ecdh_encode_key()
74 ptr = ecdh_unpack_data(&params->key_size, ptr, sizeof(params->key_size)); in crypto_ecdh_decode_key()
Decdh.c43 params.key_size > sizeof(ctx->private_key)) in ecdh_set_secret()
53 if (!params.key || !params.key_size) in ecdh_set_secret()
57 memcpy(ctx->private_key, params.key, params.key_size); in ecdh_set_secret()
60 ctx->private_key, params.key_size) < 0) { in ecdh_set_secret()
61 memzero_explicit(ctx->private_key, params.key_size); in ecdh_set_secret()
/kernel/linux/linux-5.10/kernel/bpf/
Dhashtab.c184 static inline void htab_elem_set_ptr(struct htab_elem *l, u32 key_size, in htab_elem_set_ptr() argument
187 *(void __percpu **)(l->key + key_size) = pptr; in htab_elem_set_ptr()
190 static inline void __percpu *htab_elem_get_ptr(struct htab_elem *l, u32 key_size) in htab_elem_get_ptr() argument
192 return *(void __percpu **)(l->key + key_size); in htab_elem_get_ptr()
197 return *(void **)(l->key + roundup(map->key_size, 8)); in fd_htab_map_get_ptr()
216 htab->map.key_size); in htab_free_elems()
243 memcpy(l->key, key, htab->map.key_size); in prealloc_lru_pop()
273 htab_elem_set_ptr(get_htab_elem(htab, i), htab->map.key_size, in prealloc_init()
389 if (attr->max_entries == 0 || attr->key_size == 0 || in htab_map_alloc_check()
393 if (attr->key_size > MAX_BPF_STACK) in htab_map_alloc_check()
[all …]
Dmap_in_map.c48 inner_map_meta->key_size = inner_map->key_size; in bpf_map_meta_alloc()
76 meta0->key_size == meta1->key_size && in bpf_map_meta_equal()
Dmap_iter.c105 u32 key_acc_size, value_acc_size, key_size, value_size; in bpf_iter_attach_map() local
128 key_size = map->key_size; in bpf_iter_attach_map()
134 if (key_acc_size > key_size || value_acc_size > value_size) { in bpf_iter_attach_map()
/kernel/linux/linux-5.10/tools/testing/selftests/bpf/
Dtest_lpm_map.c427 size_t key_size; in test_lpm_delete() local
431 key_size = sizeof(*key) + sizeof(__u32); in test_lpm_delete()
432 key = alloca(key_size); in test_lpm_delete()
435 key_size, sizeof(value), in test_lpm_delete()
539 size_t key_size; in test_lpm_get_next_key() local
543 key_size = sizeof(*key_p) + sizeof(__u32); in test_lpm_get_next_key()
544 key_p = alloca(key_size); in test_lpm_get_next_key()
545 next_key_p = alloca(key_size); in test_lpm_get_next_key()
547 map_fd = bpf_create_map(BPF_MAP_TYPE_LPM_TRIE, key_size, sizeof(value), in test_lpm_get_next_key()
560 memset(key_p, 0, key_size); in test_lpm_get_next_key()
[all …]
/kernel/linux/linux-5.10/tools/testing/selftests/bpf/prog_tests/
Dbtf.c71 __u32 key_size; member
139 .key_size = sizeof(int),
194 .key_size = sizeof(int),
219 .key_size = sizeof(int),
260 .key_size = sizeof(int),
305 .key_size = sizeof(int),
327 .key_size = sizeof(int),
349 .key_size = sizeof(int),
371 .key_size = sizeof(int),
396 .key_size = sizeof(int),
[all …]
/kernel/linux/linux-5.10/tools/bpf/bpftool/
Dmap.c165 print_hex_data_json(key, info->key_size); in print_entry_json()
185 print_hex_data_json(key, info->key_size); in print_entry_json()
223 break_names = info->key_size > 16 || msg_size > 16; in print_entry_error_msg()
224 single_line = info->key_size + msg_size <= 24 && !break_names; in print_entry_error_msg()
227 fprint_hex(stdout, key, info->key_size, " "); in print_entry_error_msg()
250 print_hex_data_json(key, map_info->key_size); in print_entry_error()
276 break_names = info->key_size > 16 || info->value_size > 16; in print_entry_plain()
277 single_line = info->key_size + info->value_size <= 24 && in print_entry_plain()
280 if (info->key_size) { in print_entry_plain()
282 fprint_hex(stdout, key, info->key_size, " "); in print_entry_plain()
[all …]
/kernel/linux/linux-5.10/tools/lib/bpf/
Dlibbpf_probes.c204 int key_size, value_size, max_entries, map_flags; in bpf_probe_map_type() local
209 key_size = sizeof(__u32); in bpf_probe_map_type()
219 key_size = sizeof(__u64); in bpf_probe_map_type()
225 key_size = sizeof(struct bpf_cgroup_storage_key); in bpf_probe_map_type()
231 key_size = 0; in bpf_probe_map_type()
245 key_size = 0; in bpf_probe_map_type()
291 attr.key_size = key_size; in bpf_probe_map_type()
Dbpf.h41 __u32 key_size; member
58 int key_size, int value_size,
61 int key_size, int value_size,
63 LIBBPF_API int bpf_create_map(enum bpf_map_type map_type, int key_size,
66 const char *name, int key_size,
70 const char *name, int key_size,
Dbpf.c86 attr.key_size = create_attr->key_size; in bpf_create_map_xattr()
108 int key_size, int value_size, int max_entries, in bpf_create_map_node() argument
116 map_attr.key_size = key_size; in bpf_create_map_node()
127 int bpf_create_map(enum bpf_map_type map_type, int key_size, in bpf_create_map() argument
134 map_attr.key_size = key_size; in bpf_create_map()
142 int key_size, int value_size, int max_entries, in bpf_create_map_name() argument
150 map_attr.key_size = key_size; in bpf_create_map_name()
158 int key_size, int inner_map_fd, int max_entries, in bpf_create_map_in_map_node() argument
166 attr.key_size = key_size; in bpf_create_map_in_map_node()
184 int key_size, int inner_map_fd, int max_entries, in bpf_create_map_in_map() argument
[all …]
/kernel/linux/linux-5.10/drivers/net/ethernet/netronome/nfp/flower/
Doffload.c156 u32 *key_layer_two, int *key_size, bool ipv6, in nfp_flower_calc_opt_layer() argument
167 *key_size += sizeof(struct nfp_flower_geneve_options); in nfp_flower_calc_opt_layer()
176 u32 *key_layer_two, u8 *key_layer, int *key_size, in nfp_flower_calc_udp_tun_layer() argument
190 *key_size += sizeof(struct nfp_flower_ext_meta); in nfp_flower_calc_udp_tun_layer()
192 *key_size += sizeof(struct nfp_flower_ipv6_udp_tun); in nfp_flower_calc_udp_tun_layer()
194 *key_size += sizeof(struct nfp_flower_ipv4_udp_tun); in nfp_flower_calc_udp_tun_layer()
209 *key_size += sizeof(struct nfp_flower_ext_meta); in nfp_flower_calc_udp_tun_layer()
214 *key_size += sizeof(struct nfp_flower_ipv6_udp_tun); in nfp_flower_calc_udp_tun_layer()
216 *key_size += sizeof(struct nfp_flower_ipv4_udp_tun); in nfp_flower_calc_udp_tun_layer()
225 err = nfp_flower_calc_opt_layer(enc_op, key_layer_two, key_size, in nfp_flower_calc_udp_tun_layer()
[all …]
/kernel/linux/linux-5.10/net/core/
Dsock_map.c36 attr->key_size != 4 || in sock_map_alloc()
880 u32 key_size) in sock_hash_lookup_elem_raw() argument
886 !memcmp(&elem->key, key, key_size)) in sock_hash_lookup_elem_raw()
896 u32 key_size = map->key_size, hash; in __sock_hash_lookup_elem() local
902 hash = sock_hash_bucket_hash(key, key_size); in __sock_hash_lookup_elem()
904 elem = sock_hash_lookup_elem_raw(&bucket->head, hash, key, key_size); in __sock_hash_lookup_elem()
932 elem->key, map->key_size); in sock_hash_delete_from_link()
944 u32 hash, key_size = map->key_size; in sock_hash_delete_elem() local
949 hash = sock_hash_bucket_hash(key, key_size); in sock_hash_delete_elem()
953 elem = sock_hash_lookup_elem_raw(&bucket->head, hash, key, key_size); in sock_hash_delete_elem()
[all …]
/kernel/linux/linux-5.10/tools/bpf/bpftool/skeleton/
Dprofiler.bpf.c10 __uint(key_size, sizeof(u32));
17 __uint(key_size, sizeof(u32));
24 __uint(key_size, sizeof(u32));
31 __uint(key_size, sizeof(u32));
/kernel/linux/linux-5.10/tools/testing/selftests/bpf/progs/
Dsockmap_verdict_prog.c10 __uint(key_size, sizeof(int));
17 __uint(key_size, sizeof(int));
24 __uint(key_size, sizeof(int));
Dtest_btf_map_in_map.c24 __uint(key_size, sizeof(int));
64 __uint(key_size, sizeof(int));
84 __uint(key_size, sizeof(int));
114 __uint(key_size, sizeof(int));
Dsample_map_ret0.c7 .key_size = sizeof(__u32),
14 .key_size = sizeof(__u32),
Dtest_pe_preserve_elems.c10 __uint(key_size, sizeof(int));
17 __uint(key_size, sizeof(int));
/kernel/linux/linux-5.10/crypto/asymmetric_keys/
Dpkcs8_parser.c25 u32 key_size; member
90 ctx->key_size = vlen; in pkcs8_note_key()
119 pub->key = kmemdup(ctx.key, ctx.key_size, GFP_KERNEL); in pkcs8_parse()
123 pub->keylen = ctx.key_size; in pkcs8_parse()
/kernel/linux/linux-5.10/kernel/trace/
Dtracing_map.c414 elt->key = kzalloc(map->key_size, GFP_KERNEL); in tracing_map_elt_alloc()
505 static inline bool keys_match(void *key, void *test_key, unsigned key_size) in keys_match() argument
509 if (memcmp(key, test_key, key_size)) in keys_match()
523 key_hash = jhash(key, map->key_size, 0); in __tracing_map_insert()
536 keys_match(key, val->key, map->key_size)) { in __tracing_map_insert()
576 memcpy(elt->key, key, map->key_size); in __tracing_map_insert()
764 unsigned int key_size, in tracing_map_create() argument
793 map->key_size = key_size; in tracing_map_create()
848 if (memcmp(a->key, b->key, a->elt->map->key_size)) in cmp_entries_dup()
962 int n_entries, unsigned int key_size) in detect_dups() argument
[all …]
/kernel/linux/linux-5.10/fs/ecryptfs/
Dcrypto.c303 crypt_stat->key_size); in crypt_scatterlist()
305 crypt_stat->key_size); in crypt_scatterlist()
324 crypt_stat->key_size); in crypt_scatterlist()
565 crypt_stat->key_size << 3); in ecryptfs_init_crypt_ctx()
648 crypt_stat->key_size); in ecryptfs_compute_root_iv()
665 get_random_bytes(crypt_stat->key, crypt_stat->key_size); in ecryptfs_generate_new_key()
671 crypt_stat->key_size); in ecryptfs_generate_new_key()
745 crypt_stat->key_size = ECRYPTFS_DEFAULT_KEY_BYTES; in ecryptfs_set_default_crypt_stat_vals()
797 crypt_stat->key_size = in ecryptfs_new_file_context()
1548 char *cipher_name, size_t *key_size) in ecryptfs_process_key_cipher() argument
[all …]
/kernel/linux/linux-5.10/tools/perf/tests/
Dbpf-script-test-relocation.c22 unsigned int key_size; member
30 .key_size = sizeof(int),
Dbpf-script-example.c22 unsigned int key_size; member
30 .key_size = sizeof(int),

12345678910