/linux-master/include/crypto/internal/ |
H A D | chacha.h | 16 unsigned int keysize, int nrounds) 21 if (keysize != CHACHA_KEY_SIZE) 32 unsigned int keysize) 34 return chacha_setkey(tfm, key, keysize, 20); 38 unsigned int keysize) 40 return chacha_setkey(tfm, key, keysize, 12); 15 chacha_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int keysize, int nrounds) argument 31 chacha20_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int keysize) argument 37 chacha12_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int keysize) argument
|
/linux-master/fs/befs/ |
H A D | btree.h | 12 size_t *keysize, befs_off_t *value);
|
H A D | btree.c | 397 * @keysize: Length of the returned key 412 loff_t key_no, size_t bufsize, char *keybuf, size_t * keysize, 450 *keysize = 0; 463 *keysize = 0; 492 befs_debug(sb, "Read [%llu,%d]: keysize %d", 505 *keysize = keylen; 521 *keysize = 0; 411 befs_btree_read(struct super_block *sb, const befs_data_stream *ds, loff_t key_no, size_t bufsize, char *keybuf, size_t * keysize, befs_off_t * value) argument
|
H A D | linuxvfs.c | 223 size_t keysize; local 231 keybuf, &keysize, &value); 254 befs_utf2nls(sb, keybuf, keysize, &nlsname, 267 if (!dir_emit(ctx, keybuf, keysize,
|
/linux-master/block/ |
H A D | blk-crypto.c | 25 .keysize = 64, 31 .keysize = 16, 37 .keysize = 32, 43 .keysize = 32, 81 BUG_ON(blk_crypto_modes[i].keysize > BLK_CRYPTO_MAX_KEY_SIZE); 341 if (mode->keysize == 0) 354 blk_key->size = mode->keysize; 355 memcpy(blk_key->raw, raw_key, mode->keysize);
|
H A D | blk-crypto-internal.h | 16 unsigned int keysize; /* key size in bytes */ member in struct:blk_crypto_mode
|
H A D | blk-crypto-fallback.c | 102 blk_crypto_modes[crypto_mode].keysize);
|
/linux-master/tools/testing/selftests/bpf/ |
H A D | test_lpm_map.c | 208 static void test_lpm_map(int keysize) argument 228 data = alloca(keysize); 229 memset(data, 0, keysize); 231 value = alloca(keysize + 1); 232 memset(value, 0, keysize + 1); 234 key = alloca(sizeof(*key) + keysize); 235 memset(key, 0, sizeof(*key) + keysize); 238 sizeof(*key) + keysize, 239 keysize + 1, 245 for (j = 0; j < keysize; [all...] |
/linux-master/include/crypto/ |
H A D | gcm.h | 74 unsigned int keysize, unsigned int authsize);
|
/linux-master/fs/crypto/ |
H A D | keysetup_v1.c | 206 if (crypto_memneq(raw_key, dk->dk_raw, ci->ci_mode->keysize)) 244 memcpy(dk->dk_raw, raw_key, ci->ci_mode->keysize); 278 derived_key = kmalloc(ci->ci_mode->keysize, GFP_KERNEL); 283 derived_key, ci->ci_mode->keysize); 312 ci->ci_mode->keysize, &payload); 316 ci->ci_mode->keysize, &payload);
|
H A D | keysetup.c | 20 .keysize = 64, 28 .keysize = 32, 35 .keysize = 16, 43 .keysize = 16, 50 .keysize = 32, 58 .keysize = 16, 65 .keysize = 32, 73 .keysize = 32, 133 err = crypto_skcipher_setkey(tfm, raw_key, mode->keysize); 228 mode_key, mode->keysize); [all...] |
H A D | fscrypt_private.h | 643 int keysize; /* key size in bytes */ member in struct:fscrypt_mode
|
/linux-master/crypto/ |
H A D | tcrypt.c | 246 unsigned int aad_size, u8 *keysize, u32 num_mb) 347 *keysize * 8, bs); 354 if (template[j].klen == *keysize) { 362 ret = crypto_aead_setkey(tfm, key, *keysize); 430 keysize++; 431 } while (*keysize); 521 unsigned int aad_size, u8 *keysize) 603 if ((*keysize + bs) > TVMEMSIZE * PAGE_SIZE) { 605 *keysize + bs, 612 if (template[j].klen == *keysize) { 243 test_mb_aead_speed(const char *algo, int enc, int secs, struct aead_speed_template *template, unsigned int tcount, u8 authsize, unsigned int aad_size, u8 *keysize, u32 num_mb) argument 518 test_aead_speed(const char *algo, int enc, unsigned int secs, struct aead_speed_template *template, unsigned int tcount, u8 authsize, unsigned int aad_size, u8 *keysize) argument 1060 test_mb_skcipher_speed(const char *algo, int enc, int secs, struct cipher_speed_template *template, unsigned int tcount, u8 *keysize, u32 num_mb) argument 1293 test_skcipher_speed(const char *algo, int enc, unsigned int secs, struct cipher_speed_template *template, unsigned int tcount, u8 *keysize, bool async) argument 1423 test_acipher_speed(const char *algo, int enc, unsigned int secs, struct cipher_speed_template *template, unsigned int tcount, u8 *keysize) argument 1431 test_cipher_speed(const char *algo, int enc, unsigned int secs, struct cipher_speed_template *template, unsigned int tcount, u8 *keysize) argument [all...] |
/linux-master/drivers/s390/crypto/ |
H A D | pkey_api.c | 86 /* helper function which translates the PKEY_KEYTYPE_AES_* to their keysize */ 112 int keysize; local 118 keysize = 16; 124 keysize = 24; 130 keysize = 32; 136 keysize = 32; 142 keysize = 48; 148 keysize = 80; 154 keysize = 32; 160 keysize 379 int keysize; local 464 u32 keysize; local 2045 size_t keysize = CCACIPHERTOKENSIZE; local 2168 size_t keysize = MAXEP11AESKEYBLOBSIZE; local [all...] |
H A D | zcrypt_ccamisc.c | 175 const u8 *token, size_t keysize, 188 if (t->len > keysize) { 190 DBF("%s token check failed, len %d > keysize %zu\n", 191 __func__, (int)t->len, keysize); 295 int i, rc, keysize; local 351 keysize = 16; 356 keysize = 24; 361 keysize = 32; 417 prepparm->lv3.keyblock.tok, 8 * keysize); 438 int rc, keysize, seckeysiz local 174 cca_check_sececckeytoken(debug_info_t *dbg, int dbflvl, const u8 *token, size_t keysize, int checkcpacfexport) argument [all...] |
H A D | zcrypt_ccamisc.h | 53 u16 keysize; /* key byte size */ member in struct:secaeskeytoken 156 const u8 *token, size_t keysize,
|
H A D | zcrypt_ep11misc.c | 946 const u8 *key, size_t keysize, 981 if (keysize > 0xFFFF || inbufsize > 0xFFFF) 986 + ASN1TAGLEN(keysize) + ASN1TAGLEN(inbufsize); 1004 p += asn1tag_write(p, 0x04, key, keysize); 1251 const u8 *key, size_t keysize, 1289 + ASN1TAGLEN(keysize) + 4; 1311 p += asn1tag_write(p, 0x04, key, keysize); 944 ep11_cryptsingle(u16 card, u16 domain, u16 mode, u32 mech, const u8 *iv, const u8 *key, size_t keysize, const u8 *inbuf, size_t inbufsize, u8 *outbuf, size_t *outbufsize) argument 1250 _ep11_wrapkey(u16 card, u16 domain, const u8 *key, size_t keysize, u32 mech, const u8 *iv, u8 *databuf, size_t *datasize) argument
|
/linux-master/lib/crypto/ |
H A D | aesgcm.c | 40 * @keysize: The length in bytes of the input key 43 * Returns: 0 on success, or -EINVAL if @keysize or @authsize contain values 47 unsigned int keysize, unsigned int authsize) 53 aes_expandkey(&ctx->aes_ctx, key, keysize); 46 aesgcm_expandkey(struct aesgcm_ctx *ctx, const u8 *key, unsigned int keysize, unsigned int authsize) argument
|
/linux-master/drivers/crypto/ |
H A D | hifn_795x.c | 617 unsigned int keysize; member in struct:hifn_context 1145 if (ctx->keysize) 1169 if (ctx->keysize != 16) 1175 if (ctx->keysize != 24) 1181 if (ctx->keysize != 32) 1187 if (ctx->keysize != 24) 1192 if (ctx->keysize != 8) 1201 nbytes, nbytes, ctx->key, ctx->keysize, 1587 ctx->key, ctx->keysize, 1956 ctx->keysize [all...] |
/linux-master/drivers/char/tpm/ |
H A D | tpm-sysfs.c | 24 __be32 keysize; member in struct:tpm_readpubek_out 69 be32_to_cpu(out->keysize));
|
/linux-master/arch/s390/include/uapi/asm/ |
H A D | pkey.h | 183 * Return some info about the key: keysize in bits, keytype (currently 190 __u16 keysize; /* out: key size in bits */ member in struct:pkey_verifykey
|
/linux-master/drivers/net/ethernet/sfc/ |
H A D | tc_encap_actions.c | 524 size_t keysize; local 530 keysize = sizeof(keys.dst_ip); 534 keysize = sizeof(keys.dst_ip6); 544 if (n->tbl->key_len != keysize) {
|
/linux-master/drivers/input/keyboard/ |
H A D | lm8323.c | 323 int keysize = (lm->size_x << 4) | lm->size_y; local 337 lm8323_write(lm, 2, LM8323_CMD_SET_KEY_SIZE, keysize);
|
/linux-master/arch/x86/platform/efi/ |
H A D | quirks.c | 50 * @keysize: Total length of the key data including including any 74 u32 keysize; member in struct:quark_security_header
|
/linux-master/net/key/ |
H A D | af_key.c | 1169 int keysize = 0; local 1176 keysize = (key->sadb_key_bits + 7) / 8; 1177 x->aalg = kmalloc(sizeof(*x->aalg) + keysize, GFP_KERNEL); 1186 memcpy(x->aalg->alg_key, key+1, keysize); 1207 int keysize = 0; local 1215 keysize = (key->sadb_key_bits + 7) / 8; 1216 x->ealg = kmalloc(sizeof(*x->ealg) + keysize, GFP_KERNEL); 1225 memcpy(x->ealg->alg_key, key+1, keysize);
|