/kernel/linux/linux-5.10/arch/um/drivers/ |
H A D | vector_user.h | 91 unsigned int vlen, 97 unsigned int vlen,
|
/kernel/linux/linux-6.6/arch/um/drivers/ |
H A D | vector_user.h | 89 unsigned int vlen, 95 unsigned int vlen,
|
/kernel/linux/linux-5.10/include/linux/ |
H A D | compat.h | 545 compat_ulong_t vlen, u32 pos_low, u32 pos_high); 548 compat_ulong_t vlen, u32 pos_low, u32 pos_high); 552 unsigned long vlen, loff_t pos); 558 unsigned long vlen, loff_t pos); 762 unsigned vlen, unsigned int flags, 765 unsigned vlen, unsigned int flags, 776 unsigned vlen, unsigned int flags); 782 compat_ulong_t vlen, u32 pos_low, u32 pos_high, rwf_t flags); 785 compat_ulong_t vlen, u32 pos_low, u32 pos_high, rwf_t flags); 789 unsigned long vlen, loff_ [all...] |
/kernel/linux/linux-6.6/tools/bpf/bpftool/ |
H A D | gen.c | 132 int i, err, off = 0, pad_cnt = 0, vlen = btf_vlen(sec); in codegen_datasec_def() local 143 for (i = 0; i < vlen; i++, sec_var++) { in codegen_datasec_def() 301 int i, err = 0, vlen; in codegen_subskel_datasecs() local 328 vlen = btf_vlen(sec); in codegen_subskel_datasecs() 329 for (i = 0; i < vlen; i++, sec_var++) { in codegen_subskel_datasecs() 472 int i, vlen; in codegen_asserts() local 500 vlen = btf_vlen(sec); in codegen_asserts() 502 for (i = 0; i < vlen; i++, sec_var++) { in codegen_asserts() 1889 __u16 vlen = btf_vlen(btf_type); in btfgen_mark_type_match() local 1894 for (i = 0; i < vlen; in btfgen_mark_type_match() 1926 __u16 vlen = btf_vlen(btf_type); btfgen_mark_type_match() local 2172 unsigned short vlen; btfgen_get_btf() local [all...] |
H A D | btf_dumper.c | 473 int i, vlen; in btf_dumper_struct() local 480 vlen = BTF_INFO_VLEN(t->info); in btf_dumper_struct() 484 for (i = 0; i < vlen; i++) { in btf_dumper_struct() 532 int ret = 0, i, vlen; in btf_dumper_datasec() local 538 vlen = BTF_INFO_VLEN(t->info); in btf_dumper_datasec() 544 for (i = 0; i < vlen; i++) { in btf_dumper_datasec() 714 int i, vlen; in btf_dump_func() local 721 vlen = BTF_INFO_VLEN(func_proto->info); in btf_dump_func() 722 for (i = 0; i < vlen; i++) { in btf_dump_func()
|
/third_party/ltp/testcases/kernel/crypto/ |
H A D | crypto_user01.c | 35 static void do_check_for_leaks(const char *name, const char *value, size_t vlen) in do_check_for_leaks() argument 39 for (i = strnlen(value, vlen); i < vlen; i++) { in do_check_for_leaks()
|
/kernel/linux/linux-5.10/net/ |
H A D | compat.c | 359 unsigned int vlen, unsigned int flags) in __compat_sys_sendmmsg() 361 return __sys_sendmmsg(fd, (struct mmsghdr __user *)mmsg, vlen, in __compat_sys_sendmmsg() 366 unsigned int, vlen, unsigned int, flags) in COMPAT_SYSCALL_DEFINE4() 368 return __compat_sys_sendmmsg(fd, mmsg, vlen, flags); in COMPAT_SYSCALL_DEFINE4() 407 unsigned int, vlen, unsigned int, flags, in COMPAT_SYSCALL_DEFINE5() 410 return __sys_recvmmsg(fd, (struct mmsghdr __user *)mmsg, vlen, in COMPAT_SYSCALL_DEFINE5() 416 unsigned int, vlen, unsigned int, flags, in COMPAT_SYSCALL_DEFINE5() 419 return __sys_recvmmsg(fd, (struct mmsghdr __user *)mmsg, vlen, in COMPAT_SYSCALL_DEFINE5() 357 __compat_sys_sendmmsg(int fd, struct compat_mmsghdr __user *mmsg, unsigned int vlen, unsigned int flags) __compat_sys_sendmmsg() argument
|
/kernel/linux/linux-6.6/net/ |
H A D | compat.c | 358 unsigned int vlen, unsigned int flags) in __compat_sys_sendmmsg() 360 return __sys_sendmmsg(fd, (struct mmsghdr __user *)mmsg, vlen, in __compat_sys_sendmmsg() 365 unsigned int, vlen, unsigned int, flags) in COMPAT_SYSCALL_DEFINE4() 367 return __compat_sys_sendmmsg(fd, mmsg, vlen, flags); in COMPAT_SYSCALL_DEFINE4() 406 unsigned int, vlen, unsigned int, flags, in COMPAT_SYSCALL_DEFINE5() 409 return __sys_recvmmsg(fd, (struct mmsghdr __user *)mmsg, vlen, in COMPAT_SYSCALL_DEFINE5() 415 unsigned int, vlen, unsigned int, flags, in COMPAT_SYSCALL_DEFINE5() 418 return __sys_recvmmsg(fd, (struct mmsghdr __user *)mmsg, vlen, in COMPAT_SYSCALL_DEFINE5() 356 __compat_sys_sendmmsg(int fd, struct compat_mmsghdr __user *mmsg, unsigned int vlen, unsigned int flags) __compat_sys_sendmmsg() argument
|
/kernel/linux/linux-5.10/crypto/asymmetric_keys/ |
H A D | tpm_parser.c | 23 const void *value, size_t vlen) in tpm_note_key() 28 ctx->blob_len = vlen; in tpm_note_key() 21 tpm_note_key(void *context, size_t hdrlen, unsigned char tag, const void *value, size_t vlen) tpm_note_key() argument
|
/third_party/ltp/include/ |
H A D | time64_variants.h | 57 int (*recvmmsg)(int sockfd, struct mmsghdr *msgvec, unsigned int vlen, 59 int (*sendmmsg)(int sockfd, struct mmsghdr *msgvec, unsigned int vlen,
|
/kernel/linux/linux-5.10/crypto/ |
H A D | sm2.c | 187 const void *value, size_t vlen) in sm2_get_signature_r() 191 if (!value || !vlen) in sm2_get_signature_r() 194 sig->sig_r = mpi_read_raw_data(value, vlen); in sm2_get_signature_r() 202 const void *value, size_t vlen) in sm2_get_signature_s() 206 if (!value || !vlen) in sm2_get_signature_s() 209 sig->sig_s = mpi_read_raw_data(value, vlen); in sm2_get_signature_s() 186 sm2_get_signature_r(void *context, size_t hdrlen, unsigned char tag, const void *value, size_t vlen) sm2_get_signature_r() argument 201 sm2_get_signature_s(void *context, size_t hdrlen, unsigned char tag, const void *value, size_t vlen) sm2_get_signature_s() argument
|
/kernel/linux/linux-6.6/crypto/ |
H A D | sm2.c | 193 const void *value, size_t vlen) in sm2_get_signature_r() 197 if (!value || !vlen) in sm2_get_signature_r() 200 sig->sig_r = mpi_read_raw_data(value, vlen); in sm2_get_signature_r() 208 const void *value, size_t vlen) in sm2_get_signature_s() 212 if (!value || !vlen) in sm2_get_signature_s() 215 sig->sig_s = mpi_read_raw_data(value, vlen); in sm2_get_signature_s() 192 sm2_get_signature_r(void *context, size_t hdrlen, unsigned char tag, const void *value, size_t vlen) sm2_get_signature_r() argument 207 sm2_get_signature_s(void *context, size_t hdrlen, unsigned char tag, const void *value, size_t vlen) sm2_get_signature_s() argument
|
/foundation/communication/dhcp/services/dhcp_server/src/ |
H A D | dhcp_argument.cpp | 242 size_t vlen = strlen(val); in PutArgument() local 251 if (vlen >= ARGUMENT_VALUE_SIZE) { in PutArgument() 259 if (memcpy_s(arg.value, ARGUMENT_VALUE_SIZE, val, vlen) != EOK) { in PutArgument()
|
/third_party/node/deps/npm/node_modules/fastest-levenshtein/ |
H A D | mod.js | 84 var vlen = Math.min(32, m - start) + start; 85 for (var k = start; k < vlen; k++) { 110 for (var k = start; k < vlen; k++) {
|
/kernel/linux/linux-5.10/drivers/crypto/qat/qat_common/ |
H A D | qat_asym_algs.c | 928 size_t vlen) in qat_rsa_set_n() 935 while (!*ptr && vlen) { in qat_rsa_set_n() 937 vlen--; in qat_rsa_set_n() 940 ctx->key_sz = vlen; in qat_rsa_set_n() 960 size_t vlen) in qat_rsa_set_e() 966 while (!*ptr && vlen) { in qat_rsa_set_e() 968 vlen--; in qat_rsa_set_e() 971 if (!ctx->key_sz || !vlen || vlen > ctx->key_sz) { in qat_rsa_set_e() 980 memcpy(ctx->e + (ctx->key_sz - vlen), pt in qat_rsa_set_e() 927 qat_rsa_set_n(struct qat_rsa_ctx *ctx, const char *value, size_t vlen) qat_rsa_set_n() argument 959 qat_rsa_set_e(struct qat_rsa_ctx *ctx, const char *value, size_t vlen) qat_rsa_set_e() argument 984 qat_rsa_set_d(struct qat_rsa_ctx *ctx, const char *value, size_t vlen) qat_rsa_set_d() argument [all...] |
/kernel/linux/linux-6.6/drivers/crypto/intel/qat/qat_common/ |
H A D | qat_asym_algs.c | 930 size_t vlen) in qat_rsa_set_n() 937 while (!*ptr && vlen) { in qat_rsa_set_n() 939 vlen--; in qat_rsa_set_n() 942 ctx->key_sz = vlen; in qat_rsa_set_n() 962 size_t vlen) in qat_rsa_set_e() 968 while (!*ptr && vlen) { in qat_rsa_set_e() 970 vlen--; in qat_rsa_set_e() 973 if (!ctx->key_sz || !vlen || vlen > ctx->key_sz) { in qat_rsa_set_e() 982 memcpy(ctx->e + (ctx->key_sz - vlen), pt in qat_rsa_set_e() 929 qat_rsa_set_n(struct qat_rsa_ctx *ctx, const char *value, size_t vlen) qat_rsa_set_n() argument 961 qat_rsa_set_e(struct qat_rsa_ctx *ctx, const char *value, size_t vlen) qat_rsa_set_e() argument 986 qat_rsa_set_d(struct qat_rsa_ctx *ctx, const char *value, size_t vlen) qat_rsa_set_d() argument [all...] |
/kernel/linux/linux-6.6/drivers/crypto/hisilicon/hpre/ |
H A D | hpre_crypto.c | 897 size_t vlen, bool private) in hpre_rsa_set_n() 901 hpre_rsa_drop_leading_zeros(&ptr, &vlen); in hpre_rsa_set_n() 903 ctx->key_sz = vlen; in hpre_rsa_set_n() 909 ctx->rsa.pubkey = dma_alloc_coherent(ctx->dev, vlen << 1, in hpre_rsa_set_n() 916 ctx->rsa.prikey = dma_alloc_coherent(ctx->dev, vlen << 1, in hpre_rsa_set_n() 920 dma_free_coherent(ctx->dev, vlen << 1, in hpre_rsa_set_n() 926 memcpy(ctx->rsa.prikey + vlen, ptr, vlen); in hpre_rsa_set_n() 928 memcpy(ctx->rsa.pubkey + vlen, ptr, vlen); in hpre_rsa_set_n() 896 hpre_rsa_set_n(struct hpre_ctx *ctx, const char *value, size_t vlen, bool private) hpre_rsa_set_n() argument 934 hpre_rsa_set_e(struct hpre_ctx *ctx, const char *value, size_t vlen) hpre_rsa_set_e() argument 949 hpre_rsa_set_d(struct hpre_ctx *ctx, const char *value, size_t vlen) hpre_rsa_set_d() argument [all...] |
/third_party/libbpf/src/ |
H A D | btf.c | 295 __u16 vlen = btf_vlen(t); in btf_type_size() local 311 return base_size + vlen * sizeof(struct btf_enum); in btf_type_size() 313 return base_size + vlen * sizeof(struct btf_enum64); in btf_type_size() 318 return base_size + vlen * sizeof(struct btf_member); in btf_type_size() 320 return base_size + vlen * sizeof(struct btf_param); in btf_type_size() 324 return base_size + vlen * sizeof(struct btf_var_secinfo); in btf_type_size() 348 __u16 vlen = btf_vlen(t); in btf_bswap_type_rest() local 366 for (i = 0, e = btf_enum(t); i < vlen; i++, e++) { in btf_bswap_type_rest() 372 for (i = 0, e64 = btf_enum64(t); i < vlen; i++, e64++) { in btf_bswap_type_rest() 386 for (i = 0, m = btf_members(t); i < vlen; in btf_bswap_type_rest() 846 __u16 vlen = btf_vlen(t); btf__align_of() local 3696 __u16 vlen; global() local 3714 __u16 vlen; global() local 3770 __u32 vlen = btf_vlen(t); global() local 3791 __u16 vlen; global() local 3867 __u16 vlen = btf_vlen(t); global() local 3889 __u16 vlen; global() local 3915 __u16 vlen; global() local 4394 __u16 vlen; global() local 4414 __u16 vlen; global() local 4730 __u16 vlen; global() local [all...] |
/third_party/libuv/src/unix/ |
H A D | os390-syscalls.c | 447 ssize_t vlen; in os390_readlink() local 497 vlen = strlen(realpathstr); in os390_readlink() 498 rlen = plen + vlen; in os390_readlink() 504 memcpy(buf, realpathstr, vlen); in os390_readlink() 505 memcpy(buf + vlen, delimiter, plen); in os390_readlink()
|
/third_party/node/deps/uv/src/unix/ |
H A D | os390-syscalls.c | 447 ssize_t vlen; in os390_readlink() local 497 vlen = strlen(realpathstr); in os390_readlink() 498 rlen = plen + vlen; in os390_readlink() 504 memcpy(buf, realpathstr, vlen); in os390_readlink() 505 memcpy(buf + vlen, delimiter, plen); in os390_readlink()
|
/kernel/linux/linux-5.10/tools/testing/selftests/bpf/ |
H A D | test_btf.h | 7 #define BTF_INFO_ENC(kind, kind_flag, vlen) \ 8 ((!!(kind_flag) << 31) | ((kind) << 24) | ((vlen) & BTF_MAX_VLEN))
|
/kernel/linux/linux-6.6/tools/testing/selftests/bpf/ |
H A D | test_btf.h | 9 #define BTF_INFO_ENC(kind, kind_flag, vlen) \ 10 ((!!(kind_flag) << 31) | ((kind) << 24) | ((vlen) & BTF_MAX_VLEN))
|
/kernel/linux/linux-6.6/tools/testing/selftests/bpf/progs/ |
H A D | syscall.c | 21 #define BTF_INFO_ENC(kind, kind_flag, vlen) \ 22 ((!!(kind_flag) << 31) | ((kind) << 24) | ((vlen) & BTF_MAX_VLEN))
|
/kernel/linux/linux-6.6/include/linux/ |
H A D | compat.h | 623 compat_ulong_t vlen, u32 pos_low, u32 pos_high); 626 compat_ulong_t vlen, u32 pos_low, u32 pos_high); 630 unsigned long vlen, loff_t pos); 636 unsigned long vlen, loff_t pos); 770 unsigned vlen, unsigned int flags, 773 unsigned vlen, unsigned int flags, 784 unsigned vlen, unsigned int flags); 790 compat_ulong_t vlen, u32 pos_low, u32 pos_high, rwf_t flags); 793 compat_ulong_t vlen, u32 pos_low, u32 pos_high, rwf_t flags); 797 unsigned long vlen, loff_ [all...] |
/kernel/linux/linux-6.6/tools/testing/selftests/ |
H A D | kselftest_harness.h | 1066 unsigned int flen = 0, vlen = 0, tlen = 0; in test_enabled() local 1090 vlen = strlen(v->name); in test_enabled() 1093 if (strlen(optarg) == flen + 1 + vlen + !!vlen + tlen && in test_enabled() 1095 !strncmp(v->name, &optarg[flen + 1], vlen) && in test_enabled() 1096 !strncmp(t->name, &optarg[flen + 1 + vlen + !!vlen], tlen)) in test_enabled()
|