/linux-master/drivers/crypto/starfive/ |
H A D | jh7110-rsa.c | 54 static unsigned int starfive_rsa_get_nbit(u8 *pa, u32 snum, int key_sz) argument 61 value = pa[key_sz - i - 1]; 167 u8 *de, u32 *n, int key_sz) 177 opsize = (key_sz - 1) >> 2; 179 mta = kmalloc(key_sz, GFP_KERNEL); 184 0, n, key_sz << 3); 195 mlen = starfive_rsa_get_nbit(de, loop - 1, key_sz); 232 ret = starfive_rsa_montgomery_form(ctx, result, result, 1, n, key_sz << 3); 241 u8 *de, u8 *n, int key_sz) 243 return starfive_rsa_cpu_start(ctx, (u32 *)result, de, (u32 *)n, key_sz); 166 starfive_rsa_cpu_start(struct starfive_cryp_ctx *ctx, u32 *result, u8 *de, u32 *n, int key_sz) argument 240 starfive_rsa_start(struct starfive_cryp_ctx *ctx, u8 *result, u8 *de, u8 *n, int key_sz) argument [all...] |
H A D | jh7110-cryp.h | 142 size_t key_sz; member in struct:starfive_rsa_key
|
/linux-master/drivers/crypto/hisilicon/hpre/ |
H A D | hpre_crypto.c | 123 unsigned int key_sz; member in struct:hpre_ctx 270 shift = ctx->key_sz - len; 274 ptr = dma_alloc_coherent(dev, ctx->key_sz, tmp, GFP_ATOMIC); 298 if ((sg_is_last(data) && len == ctx->key_sz) && 330 dma_free_coherent(dev, ctx->key_sz, req->src, tmp); 332 dma_unmap_single(dev, tmp, ctx->key_sz, DMA_TO_DEVICE); 342 ctx->key_sz, 1); 343 dma_free_coherent(dev, ctx->key_sz, req->dst, tmp); 345 dma_unmap_single(dev, tmp, ctx->key_sz, DMA_FROM_DEVICE); 398 ctx->key_sz 635 hpre_is_dh_params_length_valid(unsigned int key_sz) argument 1363 hpre_key_is_zero(char *key, unsigned short key_sz) argument [all...] |
/linux-master/drivers/crypto/intel/qat/qat_common/ |
H A D | qat_asym_algs.c | 76 unsigned int key_sz; member in struct:qat_rsa_ctx 523 dma_unmap_single(dev, req->in.rsa.enc.m, req->ctx.rsa->key_sz, 528 areq->dst_len = req->ctx.rsa->key_sz; 529 dma_unmap_single(dev, req->out.rsa.enc.c, req->ctx.rsa->key_sz, 661 if (req->dst_len < ctx->key_sz) { 662 req->dst_len = ctx->key_sz; 666 if (req->src_len > ctx->key_sz) 672 msg->pke_hdr.cd_pars.func_id = qat_rsa_enc_fn_id(ctx->key_sz); 695 if (sg_is_last(req->src) && req->src_len == ctx->key_sz) { 699 int shift = ctx->key_sz [all...] |
/linux-master/fs/orangefs/ |
H A D | xattr.c | 160 new_op->upcall.req.getxattr.key_sz = strlen(name) + 1; 210 "key %s key_sz %d, val_len %d\n", 215 upcall.req.getxattr.key_sz, 269 new_op->upcall.req.removexattr.key_sz = strlen(name) + 1; 272 "orangefs_inode_removexattr: key %s, key_sz %d\n", 274 (int)new_op->upcall.req.removexattr.key_sz); 363 new_op->upcall.req.setxattr.keyval.key_sz = strlen(name) + 1; 368 "orangefs_inode_setxattr: key %s, key_sz %d " 371 (int)new_op->upcall.req.setxattr.keyval.key_sz,
|
H A D | upcall.h | 118 __s32 key_sz; member in struct:orangefs_getxattr_request_s 139 __s32 key_sz; member in struct:orangefs_removexattr_request_s
|
H A D | protocol.h | 219 __s32 key_sz; /* __s32 for portable, fixed-size structures */ member in struct:ORANGEFS_keyval_pair
|
/linux-master/drivers/crypto/ |
H A D | sa2ul.c | 146 u16 key_sz, __be32 *ipad, __be32 *opad); 384 static void prepare_kipad(u8 *k_ipad, const u8 *key, u16 key_sz) argument 388 for (i = 0; i < key_sz; i++) 396 static void prepare_kopad(u8 *k_opad, const u8 *key, u16 key_sz) argument 400 for (i = 0; i < key_sz; i++) 436 u16 key_sz, __be32 *ipad, __be32 *opad) 449 prepare_kipad(sha.k_pad, key, key_sz); 455 prepare_kopad(sha.k_pad, key, key_sz); 466 static inline int sa_aes_inv_key(u8 *inv_key, const u8 *key, u16 key_sz) argument 471 if (aes_expandkey(&ctx, key, key_sz)) { 435 sa_prepare_iopads(struct algo_data *data, const u8 *key, u16 key_sz, __be32 *ipad, __be32 *opad) argument 503 sa_set_sc_enc(struct algo_data *ad, const u8 *key, u16 key_sz, u8 enc, u8 *sc_buf) argument 532 sa_set_sc_auth(struct algo_data *ad, const u8 *key, u16 key_sz, u8 *sc_buf) argument [all...] |
/linux-master/tools/lib/bpf/ |
H A D | libbpf.h | 1088 * @param key_sz size in bytes of key data, needs to match BPF map definition's **key_size** 1104 const void *key, size_t key_sz, 1112 * @param key_sz size in bytes of key data, needs to match BPF map definition's **key_size** 1128 const void *key, size_t key_sz, 1136 * @param key_sz size in bytes of key data, needs to match BPF map definition's **key_size** 1144 const void *key, size_t key_sz, __u64 flags); 1151 * @param key_sz size in bytes of key data, needs to match BPF map definition's **key_size** 1167 const void *key, size_t key_sz, 1177 * @param key_sz size in bytes of key data, needs to match BPF map definition's **key_size** 1185 const void *cur_key, void *next_key, size_t key_sz); [all...] |
H A D | libbpf.c | 10298 static int validate_map_op(const struct bpf_map *map, size_t key_sz, argument 10304 if (map->def.key_size != key_sz) { 10306 map->name, key_sz, map->def.key_size); 10340 const void *key, size_t key_sz, 10345 err = validate_map_op(map, key_sz, value_sz, true); 10353 const void *key, size_t key_sz, 10358 err = validate_map_op(map, key_sz, value_sz, true); 10366 const void *key, size_t key_sz, __u64 flags) 10370 err = validate_map_op(map, key_sz, 0, false /* check_value_sz */); 10378 const void *key, size_t key_sz, 10339 bpf_map__lookup_elem(const struct bpf_map *map, const void *key, size_t key_sz, void *value, size_t value_sz, __u64 flags) argument 10352 bpf_map__update_elem(const struct bpf_map *map, const void *key, size_t key_sz, const void *value, size_t value_sz, __u64 flags) argument 10365 bpf_map__delete_elem(const struct bpf_map *map, const void *key, size_t key_sz, __u64 flags) argument 10377 bpf_map__lookup_and_delete_elem(const struct bpf_map *map, const void *key, size_t key_sz, void *value, size_t value_sz, __u64 flags) argument 10390 bpf_map__get_next_key(const struct bpf_map *map, const void *cur_key, void *next_key, size_t key_sz) argument [all...] |
/linux-master/drivers/net/ethernet/mellanox/mlx5/core/lib/ |
H A D | crypto.c | 115 u8 key_sz; local 118 err = mlx5_crypto_dek_get_key_sz(mdev, sz_bytes, &key_sz); 122 MLX5_SET(encryption_key_obj, key_obj, key_size, key_sz);
|
/linux-master/tools/testing/selftests/net/tcp_ao/ |
H A D | key-management.c | 485 size_t key_sz = sizeof(collection.keys[0]); local 501 collection.keys = reallocarray(collection.keys, nr_keys, key_sz); 505 memset(collection.keys, 0, nr_keys * key_sz);
|
/linux-master/drivers/crypto/inside-secure/ |
H A D | safexcel_hash.c | 27 u8 key_sz; member in struct:safexcel_ahash_ctx 125 memcpy(ctx->base.ctxr->data, &ctx->base.ipad, ctx->key_sz); 1974 memcpy(req->state, &ctx->base.ipad, ctx->key_sz); 1980 req->state_sz = ctx->key_sz; 2005 ctx->key_sz = AES_MAX_KEY_SIZE + 2 * AES_BLOCK_SIZE; 2008 ctx->key_sz = AES_MAX_KEY_SIZE + 2 * AES_BLOCK_SIZE; 2011 ctx->key_sz = AES_MIN_KEY_SIZE + 2 * AES_BLOCK_SIZE; 2084 ctx->key_sz = AES_MIN_KEY_SIZE + 2 * AES_BLOCK_SIZE; 2181 ctx->key_sz = AES_MAX_KEY_SIZE + 2 * AES_BLOCK_SIZE; 2184 ctx->key_sz [all...] |
/linux-master/drivers/net/ethernet/netronome/nfp/flower/ |
H A D | conntrack.c | 130 * @key_sz: key size 136 u32 offset, size_t key_sz, 152 if (off % 4 || off >= key_sz) 135 get_mangled_key(struct flow_rule *rule, void *buf, u32 offset, size_t key_sz, enum flow_action_mangle_base htype) argument
|