/third_party/mbedtls/library/ |
H A D | psa_crypto_ffdh.c | 30 static psa_status_t mbedtls_psa_ffdh_set_prime_generator(size_t key_size, in mbedtls_psa_ffdh_set_prime_generator() argument 75 switch (key_size) { in mbedtls_psa_ffdh_set_prime_generator()
|
H A D | lms.c | 236 const unsigned char *key, size_t key_size) in mbedtls_lms_import_public_key() 247 if (key_size != MBEDTLS_LMS_PUBLIC_KEY_LEN(ctx->params.type)) { in mbedtls_lms_import_public_key() 271 size_t key_size, size_t *key_len) in mbedtls_lms_export_public_key() 273 if (key_size < MBEDTLS_LMS_PUBLIC_KEY_LEN(ctx->params.type)) { in mbedtls_lms_export_public_key() 235 mbedtls_lms_import_public_key(mbedtls_lms_public_t *ctx, const unsigned char *key, size_t key_size) mbedtls_lms_import_public_key() argument 269 mbedtls_lms_export_public_key(const mbedtls_lms_public_t *ctx, unsigned char *key, size_t key_size, size_t *key_len) mbedtls_lms_export_public_key() argument
|
/third_party/mesa3d/src/intel/blorp/ |
H A D | blorp.h | 53 const void *key, uint32_t key_size, 57 const void *key, uint32_t key_size,
|
/kernel/linux/linux-5.10/tools/testing/selftests/bpf/progs/ |
H A D | test_stacktrace_map.c | 30 __uint(key_size, sizeof(__u32));
|
H A D | test_xdp_bpf2bpf.c | 39 __uint(key_size, sizeof(int));
|
/kernel/linux/linux-5.10/tools/lib/bpf/ |
H A D | bpf_helpers.h | 115 unsigned int key_size; member
|
/kernel/linux/linux-6.6/tools/testing/selftests/bpf/progs/ |
H A D | tailcall_bpf2bpf3.c | 10 __uint(key_size, sizeof(__u32));
|
H A D | timer_mim_reject.c | 29 __uint(key_size, sizeof(int));
|
/third_party/node/deps/openssl/openssl/engines/ |
H A D | e_afalg.h | 63 int key_size; member
|
/third_party/openssl/engines/ |
H A D | e_afalg.h | 63 int key_size; member
|
/kernel/linux/linux-5.10/crypto/asymmetric_keys/ |
H A D | x509_cert_parser.c | 24 size_t key_size; /* Size of key data */ member 105 cert->pub->key = kmemdup(ctx->key, ctx->key_size, GFP_KERNEL); in x509_cert_parse() 109 cert->pub->keylen = ctx->key_size; in x509_cert_parse() 528 ctx->key_size = vlen - 1; in x509_extract_key_data()
|
/kernel/linux/linux-5.10/drivers/net/ethernet/netronome/nfp/bpf/ |
H A D | offload.c | 363 if (round_up(offmap->map.key_size, 8) + in nfp_bpf_map_alloc() 366 round_up(offmap->map.key_size, 8) + in nfp_bpf_map_alloc() 371 if (offmap->map.key_size > bpf->maps.max_key_sz) { in nfp_bpf_map_alloc() 373 offmap->map.key_size, bpf->maps.max_key_sz); in nfp_bpf_map_alloc()
|
/kernel/linux/linux-5.10/drivers/net/netdevsim/ |
H A D | bpf.c | 334 return e->key && !memcmp(key, e->key, map->key_size); in nsim_map_key_match() 354 nmap->entry[idx].key = kmalloc(offmap->map.key_size, in nsim_map_alloc_elem() 388 offmap->map.key_size); in nsim_map_get_next_key() 450 memcpy(nmap->entry[idx].key, key, offmap->map.key_size); in nsim_map_update_elem()
|
/kernel/linux/linux-6.6/drivers/net/ethernet/netronome/nfp/bpf/ |
H A D | offload.c | 363 if (round_up(offmap->map.key_size, 8) + in nfp_bpf_map_alloc() 366 round_up(offmap->map.key_size, 8) + in nfp_bpf_map_alloc() 371 if (offmap->map.key_size > bpf->maps.max_key_sz) { in nfp_bpf_map_alloc() 373 offmap->map.key_size, bpf->maps.max_key_sz); in nfp_bpf_map_alloc()
|
/kernel/linux/linux-6.6/drivers/net/netdevsim/ |
H A D | bpf.c | 330 return e->key && !memcmp(key, e->key, map->key_size); in nsim_map_key_match() 350 nmap->entry[idx].key = kmalloc(offmap->map.key_size, in nsim_map_alloc_elem() 384 offmap->map.key_size); in nsim_map_get_next_key() 446 memcpy(nmap->entry[idx].key, key, offmap->map.key_size); in nsim_map_update_elem()
|
/kernel/linux/linux-6.6/crypto/asymmetric_keys/ |
H A D | x509_cert_parser.c | 23 size_t key_size; /* Size of key data */ member 103 cert->pub->key = kmemdup(ctx->key, ctx->key_size, GFP_KERNEL); in x509_cert_parse() 107 cert->pub->keylen = ctx->key_size; in x509_cert_parse() 543 ctx->key_size = vlen - 1; in x509_extract_key_data()
|
/third_party/mesa3d/src/gallium/drivers/crocus/ |
H A D | crocus_context.h | 905 uint32_t key_size, 909 uint32_t key_size, 925 uint32_t key_size, 930 const void *key, uint32_t key_size,
|
/third_party/libcoap/src/ |
H A D | coap_tinydtls.c | 573 #define DTLS_CE_LENGTH (sizeof(cert_asn1_header) + key_size + key_size) 580 size_t key_size) { in verify_ecdsa_key() 598 memcpy(p, other_pub_x, key_size); in verify_ecdsa_key() 599 p += key_size; in verify_ecdsa_key() 601 memcpy(p, other_pub_y, key_size); in verify_ecdsa_key() 602 p += key_size; in verify_ecdsa_key() 576 verify_ecdsa_key(struct dtls_context_t *dtls_context COAP_UNUSED, const session_t *dtls_session COAP_UNUSED, const uint8_t *other_pub_x, const uint8_t *other_pub_y, size_t key_size) verify_ecdsa_key() argument
|
/kernel/linux/linux-5.10/drivers/crypto/qce/ |
H A D | common.c | 96 static u32 qce_auth_cfg(unsigned long flags, u32 key_size) in qce_auth_cfg() argument 106 if (key_size == AES_KEYSIZE_128) in qce_auth_cfg() 108 else if (key_size == AES_KEYSIZE_256) in qce_auth_cfg()
|
/kernel/linux/linux-5.10/kernel/bpf/ |
H A D | lpm_trie.c | 557 attr->key_size < LPM_KEY_SIZE_MIN || in trie_alloc() 558 attr->key_size > LPM_KEY_SIZE_MAX || in trie_alloc() 569 trie->data_size = attr->key_size - in trie_alloc()
|
H A D | local_storage.c | 34 return map->key_size == sizeof(struct bpf_cgroup_storage_key); in attach_type_isolated() 291 if (attr->key_size != sizeof(struct bpf_cgroup_storage_key) && in cgroup_storage_map_alloc() 292 attr->key_size != sizeof(__u64)) in cgroup_storage_map_alloc()
|
/kernel/linux/linux-5.10/drivers/net/wireless/ti/wlcore/ |
H A D | cmd.h | 63 u8 key_size, const u8 *key, const u8 *addr, 67 u8 key_size, const u8 *key, u8 hlid, u32 tx_seq_32, 497 u8 key_size; member
|
/kernel/linux/linux-6.6/fs/hfs/ |
H A D | bnode.c | 322 int entry_size, key_size; in hfs_bnode_find() local 385 key_size = hfs_bnode_read_u8(node, off) + 1; in hfs_bnode_find() 386 if (key_size >= entry_size /*|| key_size & 1*/) in hfs_bnode_find()
|
/kernel/linux/linux-6.6/kernel/bpf/ |
H A D | lpm_trie.c | 555 attr->key_size < LPM_KEY_SIZE_MIN || in trie_alloc() 556 attr->key_size > LPM_KEY_SIZE_MAX || in trie_alloc() 567 trie->data_size = attr->key_size - in trie_alloc()
|
H A D | local_storage.c | 36 return map->key_size == sizeof(struct bpf_cgroup_storage_key); in attach_type_isolated() 298 if (attr->key_size != sizeof(struct bpf_cgroup_storage_key) && in cgroup_storage_map_alloc() 299 attr->key_size != sizeof(__u64)) in cgroup_storage_map_alloc()
|