/linux-master/include/linux/ |
H A D | lzo.h | 24 int lzo1x_1_compress(const unsigned char *src, size_t src_len, 28 int lzorle1x_1_compress(const unsigned char *src, size_t src_len, 32 int lzo1x_decompress_safe(const unsigned char *src, size_t src_len,
|
H A D | ccp.h | 155 * @src_len: length in bytes of data used for this operation 161 * - type, mode, action, key, key_len, src, dst, src_len 183 u64 src_len; /* In bytes */ member in struct:ccp_aes_engine 222 * @src_len: length in bytes of data used for this operation 226 * - action, unit_size, key, key_len, iv, iv_len, src, dst, src_len, final 243 u64 src_len; /* In bytes */ member in struct:ccp_xts_aes_engine 271 * @src_len: length in bytes of data used for this operation 279 * - type, ctx, ctx_len, src, src_len, final 292 u64 src_len; /* In bytes */ member in struct:ccp_sha_engine 332 * @src_len 354 u64 src_len; /* In bytes */ member in struct:ccp_des3_engine 382 u32 src_len; /* In bytes */ member in struct:ccp_rsa_engine 441 u64 src_len; /* In bytes */ member in struct:ccp_passthru_engine 470 u64 src_len; /* In bytes */ member in struct:ccp_passthru_nomap_engine [all...] |
/linux-master/include/crypto/ |
H A D | chacha20poly1305.h | 18 void chacha20poly1305_encrypt(u8 *dst, const u8 *src, const size_t src_len, 24 chacha20poly1305_decrypt(u8 *dst, const u8 *src, const size_t src_len, 28 void xchacha20poly1305_encrypt(u8 *dst, const u8 *src, const size_t src_len, 34 u8 *dst, const u8 *src, const size_t src_len, const u8 *ad, 38 bool chacha20poly1305_encrypt_sg_inplace(struct scatterlist *src, size_t src_len, 43 bool chacha20poly1305_decrypt_sg_inplace(struct scatterlist *src, size_t src_len,
|
H A D | akcipher.h | 20 * total size of @src is @src_len + @dst_len. 22 * @src_len: Size of the input buffer 39 unsigned int src_len; member in struct:akcipher_request 272 * @src_len: size of the src input scatter list to be processed 279 unsigned int src_len, 284 req->src_len = src_len; 345 atomic64_add(req->src_len, &istat->encrypt_tlen); 370 atomic64_add(req->src_len, &istat->decrypt_tlen); 276 akcipher_request_set_crypt(struct akcipher_request *req, struct scatterlist *src, struct scatterlist *dst, unsigned int src_len, unsigned int dst_len) argument
|
/linux-master/lib/ |
H A D | decompress_unlzo.c | 105 u32 src_len, dst_len; local 207 src_len = get_unaligned_be32(in_buf); 211 if (src_len <= 0 || src_len > dst_len) { 217 if (fill && in_len < src_len) { 218 skip = fill(in_buf + in_len, src_len - in_len); 222 if (in_len < src_len) { 231 if (unlikely(dst_len == src_len)) 232 memcpy(out_buf, in_buf, src_len); 234 r = lzo1x_decompress_safe((u8 *) in_buf, src_len, [all...] |
/linux-master/lib/crypto/ |
H A D | chacha20poly1305.c | 57 __chacha20poly1305_encrypt(u8 *dst, const u8 *src, const size_t src_len, argument 74 chacha20_crypt(chacha_state, dst, src, src_len); 76 poly1305_update(&poly1305_state, dst, src_len); 77 if (src_len & 0xf) 78 poly1305_update(&poly1305_state, pad0, 0x10 - (src_len & 0xf)); 81 b.lens[1] = cpu_to_le64(src_len); 84 poly1305_final(&poly1305_state, dst + src_len); 90 void chacha20poly1305_encrypt(u8 *dst, const u8 *src, const size_t src_len, argument 105 __chacha20poly1305_encrypt(dst, src, src_len, ad, ad_len, chacha_state); 112 void xchacha20poly1305_encrypt(u8 *dst, const u8 *src, const size_t src_len, argument 125 __chacha20poly1305_decrypt(u8 *dst, const u8 *src, const size_t src_len, const u8 *ad, const size_t ad_len, u32 *chacha_state) argument 168 chacha20poly1305_decrypt(u8 *dst, const u8 *src, const size_t src_len, const u8 *ad, const size_t ad_len, const u64 nonce, const u8 key[CHACHA20POLY1305_KEY_SIZE]) argument 194 xchacha20poly1305_decrypt(u8 *dst, const u8 *src, const size_t src_len, const u8 *ad, const size_t ad_len, const u8 nonce[XCHACHA20POLY1305_NONCE_SIZE], const u8 key[CHACHA20POLY1305_KEY_SIZE]) argument 208 chacha20poly1305_crypt_sg_inplace(struct scatterlist *src, const size_t src_len, const u8 *ad, const size_t ad_len, const u64 nonce, const u8 key[CHACHA20POLY1305_KEY_SIZE], int encrypt) argument 333 chacha20poly1305_encrypt_sg_inplace(struct scatterlist *src, size_t src_len, const u8 *ad, const size_t ad_len, const u64 nonce, const u8 key[CHACHA20POLY1305_KEY_SIZE]) argument 343 chacha20poly1305_decrypt_sg_inplace(struct scatterlist *src, size_t src_len, const u8 *ad, const size_t ad_len, const u64 nonce, const u8 key[CHACHA20POLY1305_KEY_SIZE]) argument [all...] |
/linux-master/arch/s390/include/asm/ |
H A D | cpacf.h | 248 * @src_len: length of src operand in bytes 254 u8 *dest, const u8 *src, long src_len) 260 s.odd = (unsigned long)src_len; 271 return src_len - s.odd; 280 * @src_len: length of src operand in bytes 286 u8 *dest, const u8 *src, long src_len) 292 s.odd = (unsigned long)src_len; 303 return src_len - s.odd; 312 * @src_len: length of src operand in bytes 315 const u8 *src, long src_len) 253 cpacf_km(unsigned long func, void *param, u8 *dest, const u8 *src, long src_len) argument 285 cpacf_kmc(unsigned long func, void *param, u8 *dest, const u8 *src, long src_len) argument 314 cpacf_kimd(unsigned long func, void *param, const u8 *src, long src_len) argument 339 cpacf_klmd(unsigned long func, void *param, const u8 *src, long src_len) argument 367 cpacf_kmac(unsigned long func, void *param, const u8 *src, long src_len) argument 399 cpacf_kmctr(unsigned long func, void *param, u8 *dest, const u8 *src, long src_len, u8 *counter) argument 528 cpacf_kma(unsigned long func, void *param, u8 *dest, const u8 *src, unsigned long src_len, const u8 *aad, unsigned long aad_len) argument [all...] |
/linux-master/fs/bcachefs/ |
H A D | compress.c | 156 size_t src_len = src->bi_iter.bi_size; local 167 src_len, dst_len, dst_len); 174 .avail_in = src_len, 195 if (real_src_len > src_len - 4) 298 void *src, size_t src_len, 307 int len = src_len; 312 if (len < src_len) 319 src_len, dst_len, 328 .avail_in = src_len, 372 src, src_len, 295 attempt_compress(struct bch_fs *c, void *workspace, void *dst, size_t dst_len, void *src, size_t src_len, struct bch_compression_opt compression) argument 385 __bio_compress(struct bch_fs *c, struct bio *dst, size_t *dst_len, struct bio *src, size_t *src_len, struct bch_compression_opt compression) argument 482 bch2_bio_compress(struct bch_fs *c, struct bio *dst, size_t *dst_len, struct bio *src, size_t *src_len, unsigned compression_opt) argument [all...] |
/linux-master/net/smc/ |
H A D | smc_tx.c | 357 size_t src_off, size_t src_len, 366 int src_len_sum = src_len, dst_len_sum = dst_len; 388 sge[srcchunk].length = src_len; 394 src_off += src_len; 401 src_len = dst_len - src_len; /* remainder */ 402 src_len_sum += src_len; 413 src_len = min_t(int, dst_len, conn->sndbuf_desc->len - 415 src_len_sum = src_len; 422 size_t src_off, size_t src_len, 356 smcr_tx_rdma_writes(struct smc_connection *conn, size_t len, size_t src_off, size_t src_len, size_t dst_off, size_t dst_len, struct smc_rdma_wr *wr_rdma_buf) argument 421 smcd_tx_rdma_writes(struct smc_connection *conn, size_t len, size_t src_off, size_t src_len, size_t dst_off, size_t dst_len) argument 466 size_t len, src_len, dst_off, dst_len; /* current chunk values */ local [all...] |
/linux-master/drivers/block/zram/ |
H A D | zcomp.h | 40 const void *src, unsigned int src_len, void *dst);
|
H A D | zcomp.c | 143 const void *src, unsigned int src_len, void *dst) 148 src, src_len, 142 zcomp_decompress(struct zcomp_strm *zstrm, const void *src, unsigned int src_len, void *dst) argument
|
/linux-master/net/ipv4/ |
H A D | fib_rules.c | 38 u8 src_len; member in struct:fib4_rule 53 if (r->dst_len || r->src_len || r->dscp) 260 if (frh->src_len) 277 rule4->src_len = frh->src_len; 278 rule4->srcmask = inet_make_mask(rule4->src_len); 317 if (frh->src_len && (rule4->src_len != frh->src_len)) 331 if (frh->src_len [all...] |
/linux-master/tools/bpf/bpftool/ |
H A D | tracelog.c | 42 size_t src_len; local 47 src_len = strlen(mntpt); 48 if (src_len + 1 >= PATH_MAX) {
|
/linux-master/drivers/misc/mei/ |
H A D | vsc-tp.c | 161 int ret, offset = 0, cpy_len, src_len, dst_len = sizeof(struct vsc_tp_packet); local 178 src_len = next_xfer_len; 184 src_len = next_xfer_len - (src - rx_buf); 188 while (src_len > 0) { 189 cpy_len = min(src_len, dst_len); 193 src_len -= cpy_len; 201 if (!src_len) 215 if (src_len) { 218 cpy_len = min(src_len, remain); 222 src_len [all...] |
/linux-master/drivers/staging/rtl8723bs/os_dep/ |
H A D | osdep_service.c | 123 void rtw_buf_update(u8 **buf, u32 *buf_len, u8 *src, u32 src_len) argument 132 if (!src || !src_len) 136 dup = rtw_malloc(src_len); 138 dup_len = src_len;
|
/linux-master/crypto/ |
H A D | ecrdsa.c | 99 req->dst_len * 2 != req->src_len || 100 WARN_ON(req->src_len > sizeof(sig)) || 104 sg_copy_to_buffer(req->src, sg_nents_for_len(req->src, req->src_len), 105 sig, req->src_len); 108 req->src_len + req->dst_len), 109 digest, req->dst_len, req->src_len);
|
H A D | ecdsa.c | 154 buffer = kmalloc(req->src_len + req->dst_len, GFP_KERNEL); 159 sg_nents_for_len(req->src, req->src_len + req->dst_len), 160 buffer, req->src_len + req->dst_len, 0); 163 buffer, req->src_len); 172 memcpy(&rawhash[diff], buffer + req->src_len, req->dst_len); 175 memcpy(&rawhash, buffer + req->src_len, keylen);
|
H A D | rsa-pkcs1pad.c | 260 if (req->src_len > ctx->key_size - 11) 268 req_ctx->in_buf = kmalloc(ctx->key_size - 1 - req->src_len, 273 ps_end = ctx->key_size - req->src_len - 2; 280 ctx->key_size - 1 - req->src_len, req->src); 371 if (!ctx->key_size || req->src_len != ctx->key_size) 387 req_ctx->out_sg, req->src_len, 414 if (req->src_len + digest_info_size > ctx->key_size - 11) 422 req_ctx->in_buf = kmalloc(ctx->key_size - 1 - req->src_len, 427 ps_end = ctx->key_size - digest_info_size - req->src_len - 2; 437 ctx->key_size - 1 - req->src_len, re [all...] |
H A D | sm2.c | 390 buffer = kmalloc(req->src_len + req->dst_len, GFP_KERNEL); 395 sg_nents_for_len(req->src, req->src_len + req->dst_len), 396 buffer, req->src_len + req->dst_len, 0); 401 buffer, req->src_len); 406 hash = mpi_read_raw_data(buffer + req->src_len, req->dst_len);
|
/linux-master/include/uapi/linux/ |
H A D | fib_rules.h | 22 __u8 src_len; member in struct:fib_rule_hdr
|
/linux-master/drivers/crypto/virtio/ |
H A D | virtio_crypto_akcipher_algs.c | 234 unsigned int src_len = verify ? req->src_len + req->dst_len : req->src_len; local 241 src_buf = kcalloc_node(src_len, 1, GFP_KERNEL, node); 247 sg_copy_to_buffer(req->src, sg_nents(req->src), src_buf, src_len); 248 sg_init_one(&srcdata_sg, src_buf, src_len); 251 sg_copy_to_buffer(req->src, sg_nents(req->src), src_buf, src_len); 252 sg_init_one(&srcdata_sg, src_buf, src_len); 313 akcipher_req->para.src_data_len = cpu_to_le32(req->src_len);
|
/linux-master/drivers/crypto/ccp/ |
H A D | ccp-dmaengine.c | 366 unsigned int src_offset, src_len; local 384 src_len = sg_dma_len(src_sg); 391 if (!src_len) { 400 src_len = sg_dma_len(src_sg); 419 len = min(dst_len, src_len); 435 ccp_pt->src_len = len; 445 &ccp_pt->dst_dma, ccp_pt->src_len); 449 src_len -= len;
|
H A D | ccp-ops.c | 490 if (aes->src_len & (AES_BLOCK_SIZE - 1)) 565 ret = ccp_init_data(&src, cmd_q, aes->src, aes->src_len, 688 ilen = aes->src_len; 692 ilen = aes->src_len - authsize; 933 (aes->src_len & (AES_BLOCK_SIZE - 1))) 1022 ret = ccp_init_data(&src, cmd_q, aes->src, aes->src_len, 1031 ret = ccp_init_data(&dst, cmd_q, aes->dst, aes->src_len, 1133 if (!xts->final && (xts->src_len & (AES_BLOCK_SIZE - 1))) 1232 ret = ccp_init_data(&src, cmd_q, xts->src, xts->src_len, 1241 ret = ccp_init_data(&dst, cmd_q, xts->dst, xts->src_len, [all...] |
/linux-master/drivers/video/fbdev/omap2/omapfb/dss/ |
H A D | omapdss-boot-init.c | 61 const char *src, int src_len) 65 while (total < src_len) { 60 omapdss_prefix_strcpy(char *dst, int dst_len, const char *src, int src_len) argument
|
/linux-master/drivers/target/ |
H A D | target_core_rd.c | 428 u32 src_len; local 460 src_len = PAGE_SIZE - rd_offset; 475 len = min((u32)m.length, src_len); 495 src_len -= len; 496 if (src_len) { 504 src_len = PAGE_SIZE;
|