Searched refs:key_sz (Results 1 - 14 of 14) sorted by relevance

/linux-master/drivers/crypto/starfive/
H A Djh7110-rsa.c54 static unsigned int starfive_rsa_get_nbit(u8 *pa, u32 snum, int key_sz) argument
61 value = pa[key_sz - i - 1];
167 u8 *de, u32 *n, int key_sz)
177 opsize = (key_sz - 1) >> 2;
179 mta = kmalloc(key_sz, GFP_KERNEL);
184 0, n, key_sz << 3);
195 mlen = starfive_rsa_get_nbit(de, loop - 1, key_sz);
232 ret = starfive_rsa_montgomery_form(ctx, result, result, 1, n, key_sz << 3);
241 u8 *de, u8 *n, int key_sz)
243 return starfive_rsa_cpu_start(ctx, (u32 *)result, de, (u32 *)n, key_sz);
166 starfive_rsa_cpu_start(struct starfive_cryp_ctx *ctx, u32 *result, u8 *de, u32 *n, int key_sz) argument
240 starfive_rsa_start(struct starfive_cryp_ctx *ctx, u8 *result, u8 *de, u8 *n, int key_sz) argument
[all...]
H A Djh7110-cryp.h142 size_t key_sz; member in struct:starfive_rsa_key
/linux-master/drivers/crypto/hisilicon/hpre/
H A Dhpre_crypto.c123 unsigned int key_sz; member in struct:hpre_ctx
270 shift = ctx->key_sz - len;
274 ptr = dma_alloc_coherent(dev, ctx->key_sz, tmp, GFP_ATOMIC);
298 if ((sg_is_last(data) && len == ctx->key_sz) &&
330 dma_free_coherent(dev, ctx->key_sz, req->src, tmp);
332 dma_unmap_single(dev, tmp, ctx->key_sz, DMA_TO_DEVICE);
342 ctx->key_sz, 1);
343 dma_free_coherent(dev, ctx->key_sz, req->dst, tmp);
345 dma_unmap_single(dev, tmp, ctx->key_sz, DMA_FROM_DEVICE);
398 ctx->key_sz
635 hpre_is_dh_params_length_valid(unsigned int key_sz) argument
1363 hpre_key_is_zero(char *key, unsigned short key_sz) argument
[all...]
/linux-master/drivers/crypto/intel/qat/qat_common/
H A Dqat_asym_algs.c76 unsigned int key_sz; member in struct:qat_rsa_ctx
523 dma_unmap_single(dev, req->in.rsa.enc.m, req->ctx.rsa->key_sz,
528 areq->dst_len = req->ctx.rsa->key_sz;
529 dma_unmap_single(dev, req->out.rsa.enc.c, req->ctx.rsa->key_sz,
661 if (req->dst_len < ctx->key_sz) {
662 req->dst_len = ctx->key_sz;
666 if (req->src_len > ctx->key_sz)
672 msg->pke_hdr.cd_pars.func_id = qat_rsa_enc_fn_id(ctx->key_sz);
695 if (sg_is_last(req->src) && req->src_len == ctx->key_sz) {
699 int shift = ctx->key_sz
[all...]
/linux-master/fs/orangefs/
H A Dxattr.c160 new_op->upcall.req.getxattr.key_sz = strlen(name) + 1;
210 "key %s key_sz %d, val_len %d\n",
215 upcall.req.getxattr.key_sz,
269 new_op->upcall.req.removexattr.key_sz = strlen(name) + 1;
272 "orangefs_inode_removexattr: key %s, key_sz %d\n",
274 (int)new_op->upcall.req.removexattr.key_sz);
363 new_op->upcall.req.setxattr.keyval.key_sz = strlen(name) + 1;
368 "orangefs_inode_setxattr: key %s, key_sz %d "
371 (int)new_op->upcall.req.setxattr.keyval.key_sz,
H A Dupcall.h118 __s32 key_sz; member in struct:orangefs_getxattr_request_s
139 __s32 key_sz; member in struct:orangefs_removexattr_request_s
H A Dprotocol.h219 __s32 key_sz; /* __s32 for portable, fixed-size structures */ member in struct:ORANGEFS_keyval_pair
/linux-master/drivers/crypto/
H A Dsa2ul.c146 u16 key_sz, __be32 *ipad, __be32 *opad);
384 static void prepare_kipad(u8 *k_ipad, const u8 *key, u16 key_sz) argument
388 for (i = 0; i < key_sz; i++)
396 static void prepare_kopad(u8 *k_opad, const u8 *key, u16 key_sz) argument
400 for (i = 0; i < key_sz; i++)
436 u16 key_sz, __be32 *ipad, __be32 *opad)
449 prepare_kipad(sha.k_pad, key, key_sz);
455 prepare_kopad(sha.k_pad, key, key_sz);
466 static inline int sa_aes_inv_key(u8 *inv_key, const u8 *key, u16 key_sz) argument
471 if (aes_expandkey(&ctx, key, key_sz)) {
435 sa_prepare_iopads(struct algo_data *data, const u8 *key, u16 key_sz, __be32 *ipad, __be32 *opad) argument
503 sa_set_sc_enc(struct algo_data *ad, const u8 *key, u16 key_sz, u8 enc, u8 *sc_buf) argument
532 sa_set_sc_auth(struct algo_data *ad, const u8 *key, u16 key_sz, u8 *sc_buf) argument
[all...]
/linux-master/tools/lib/bpf/
H A Dlibbpf.h1088 * @param key_sz size in bytes of key data, needs to match BPF map definition's **key_size**
1104 const void *key, size_t key_sz,
1112 * @param key_sz size in bytes of key data, needs to match BPF map definition's **key_size**
1128 const void *key, size_t key_sz,
1136 * @param key_sz size in bytes of key data, needs to match BPF map definition's **key_size**
1144 const void *key, size_t key_sz, __u64 flags);
1151 * @param key_sz size in bytes of key data, needs to match BPF map definition's **key_size**
1167 const void *key, size_t key_sz,
1177 * @param key_sz size in bytes of key data, needs to match BPF map definition's **key_size**
1185 const void *cur_key, void *next_key, size_t key_sz);
[all...]
H A Dlibbpf.c10298 static int validate_map_op(const struct bpf_map *map, size_t key_sz, argument
10304 if (map->def.key_size != key_sz) {
10306 map->name, key_sz, map->def.key_size);
10340 const void *key, size_t key_sz,
10345 err = validate_map_op(map, key_sz, value_sz, true);
10353 const void *key, size_t key_sz,
10358 err = validate_map_op(map, key_sz, value_sz, true);
10366 const void *key, size_t key_sz, __u64 flags)
10370 err = validate_map_op(map, key_sz, 0, false /* check_value_sz */);
10378 const void *key, size_t key_sz,
10339 bpf_map__lookup_elem(const struct bpf_map *map, const void *key, size_t key_sz, void *value, size_t value_sz, __u64 flags) argument
10352 bpf_map__update_elem(const struct bpf_map *map, const void *key, size_t key_sz, const void *value, size_t value_sz, __u64 flags) argument
10365 bpf_map__delete_elem(const struct bpf_map *map, const void *key, size_t key_sz, __u64 flags) argument
10377 bpf_map__lookup_and_delete_elem(const struct bpf_map *map, const void *key, size_t key_sz, void *value, size_t value_sz, __u64 flags) argument
10390 bpf_map__get_next_key(const struct bpf_map *map, const void *cur_key, void *next_key, size_t key_sz) argument
[all...]
/linux-master/drivers/net/ethernet/mellanox/mlx5/core/lib/
H A Dcrypto.c115 u8 key_sz; local
118 err = mlx5_crypto_dek_get_key_sz(mdev, sz_bytes, &key_sz);
122 MLX5_SET(encryption_key_obj, key_obj, key_size, key_sz);
/linux-master/tools/testing/selftests/net/tcp_ao/
H A Dkey-management.c485 size_t key_sz = sizeof(collection.keys[0]); local
501 collection.keys = reallocarray(collection.keys, nr_keys, key_sz);
505 memset(collection.keys, 0, nr_keys * key_sz);
/linux-master/drivers/crypto/inside-secure/
H A Dsafexcel_hash.c27 u8 key_sz; member in struct:safexcel_ahash_ctx
125 memcpy(ctx->base.ctxr->data, &ctx->base.ipad, ctx->key_sz);
1974 memcpy(req->state, &ctx->base.ipad, ctx->key_sz);
1980 req->state_sz = ctx->key_sz;
2005 ctx->key_sz = AES_MAX_KEY_SIZE + 2 * AES_BLOCK_SIZE;
2008 ctx->key_sz = AES_MAX_KEY_SIZE + 2 * AES_BLOCK_SIZE;
2011 ctx->key_sz = AES_MIN_KEY_SIZE + 2 * AES_BLOCK_SIZE;
2084 ctx->key_sz = AES_MIN_KEY_SIZE + 2 * AES_BLOCK_SIZE;
2181 ctx->key_sz = AES_MAX_KEY_SIZE + 2 * AES_BLOCK_SIZE;
2184 ctx->key_sz
[all...]
/linux-master/drivers/net/ethernet/netronome/nfp/flower/
H A Dconntrack.c130 * @key_sz: key size
136 u32 offset, size_t key_sz,
152 if (off % 4 || off >= key_sz)
135 get_mangled_key(struct flow_rule *rule, void *buf, u32 offset, size_t key_sz, enum flow_action_mangle_base htype) argument

Completed in 428 milliseconds