Searched refs:keysize (Results 1 - 25 of 30) sorted by relevance

12

/linux-master/include/crypto/internal/
H A Dchacha.h16 unsigned int keysize, int nrounds)
21 if (keysize != CHACHA_KEY_SIZE)
32 unsigned int keysize)
34 return chacha_setkey(tfm, key, keysize, 20);
38 unsigned int keysize)
40 return chacha_setkey(tfm, key, keysize, 12);
15 chacha_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int keysize, int nrounds) argument
31 chacha20_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int keysize) argument
37 chacha12_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int keysize) argument
/linux-master/fs/befs/
H A Dbtree.h12 size_t *keysize, befs_off_t *value);
H A Dbtree.c397 * @keysize: Length of the returned key
412 loff_t key_no, size_t bufsize, char *keybuf, size_t * keysize,
450 *keysize = 0;
463 *keysize = 0;
492 befs_debug(sb, "Read [%llu,%d]: keysize %d",
505 *keysize = keylen;
521 *keysize = 0;
411 befs_btree_read(struct super_block *sb, const befs_data_stream *ds, loff_t key_no, size_t bufsize, char *keybuf, size_t * keysize, befs_off_t * value) argument
H A Dlinuxvfs.c223 size_t keysize; local
231 keybuf, &keysize, &value);
254 befs_utf2nls(sb, keybuf, keysize, &nlsname,
267 if (!dir_emit(ctx, keybuf, keysize,
/linux-master/block/
H A Dblk-crypto.c25 .keysize = 64,
31 .keysize = 16,
37 .keysize = 32,
43 .keysize = 32,
81 BUG_ON(blk_crypto_modes[i].keysize > BLK_CRYPTO_MAX_KEY_SIZE);
341 if (mode->keysize == 0)
354 blk_key->size = mode->keysize;
355 memcpy(blk_key->raw, raw_key, mode->keysize);
H A Dblk-crypto-internal.h16 unsigned int keysize; /* key size in bytes */ member in struct:blk_crypto_mode
H A Dblk-crypto-fallback.c102 blk_crypto_modes[crypto_mode].keysize);
/linux-master/tools/testing/selftests/bpf/
H A Dtest_lpm_map.c208 static void test_lpm_map(int keysize) argument
228 data = alloca(keysize);
229 memset(data, 0, keysize);
231 value = alloca(keysize + 1);
232 memset(value, 0, keysize + 1);
234 key = alloca(sizeof(*key) + keysize);
235 memset(key, 0, sizeof(*key) + keysize);
238 sizeof(*key) + keysize,
239 keysize + 1,
245 for (j = 0; j < keysize;
[all...]
/linux-master/include/crypto/
H A Dgcm.h74 unsigned int keysize, unsigned int authsize);
/linux-master/fs/crypto/
H A Dkeysetup_v1.c206 if (crypto_memneq(raw_key, dk->dk_raw, ci->ci_mode->keysize))
244 memcpy(dk->dk_raw, raw_key, ci->ci_mode->keysize);
278 derived_key = kmalloc(ci->ci_mode->keysize, GFP_KERNEL);
283 derived_key, ci->ci_mode->keysize);
312 ci->ci_mode->keysize, &payload);
316 ci->ci_mode->keysize, &payload);
H A Dkeysetup.c20 .keysize = 64,
28 .keysize = 32,
35 .keysize = 16,
43 .keysize = 16,
50 .keysize = 32,
58 .keysize = 16,
65 .keysize = 32,
73 .keysize = 32,
133 err = crypto_skcipher_setkey(tfm, raw_key, mode->keysize);
228 mode_key, mode->keysize);
[all...]
H A Dfscrypt_private.h643 int keysize; /* key size in bytes */ member in struct:fscrypt_mode
/linux-master/crypto/
H A Dtcrypt.c246 unsigned int aad_size, u8 *keysize, u32 num_mb)
347 *keysize * 8, bs);
354 if (template[j].klen == *keysize) {
362 ret = crypto_aead_setkey(tfm, key, *keysize);
430 keysize++;
431 } while (*keysize);
521 unsigned int aad_size, u8 *keysize)
603 if ((*keysize + bs) > TVMEMSIZE * PAGE_SIZE) {
605 *keysize + bs,
612 if (template[j].klen == *keysize) {
243 test_mb_aead_speed(const char *algo, int enc, int secs, struct aead_speed_template *template, unsigned int tcount, u8 authsize, unsigned int aad_size, u8 *keysize, u32 num_mb) argument
518 test_aead_speed(const char *algo, int enc, unsigned int secs, struct aead_speed_template *template, unsigned int tcount, u8 authsize, unsigned int aad_size, u8 *keysize) argument
1060 test_mb_skcipher_speed(const char *algo, int enc, int secs, struct cipher_speed_template *template, unsigned int tcount, u8 *keysize, u32 num_mb) argument
1293 test_skcipher_speed(const char *algo, int enc, unsigned int secs, struct cipher_speed_template *template, unsigned int tcount, u8 *keysize, bool async) argument
1423 test_acipher_speed(const char *algo, int enc, unsigned int secs, struct cipher_speed_template *template, unsigned int tcount, u8 *keysize) argument
1431 test_cipher_speed(const char *algo, int enc, unsigned int secs, struct cipher_speed_template *template, unsigned int tcount, u8 *keysize) argument
[all...]
/linux-master/drivers/s390/crypto/
H A Dpkey_api.c86 /* helper function which translates the PKEY_KEYTYPE_AES_* to their keysize */
112 int keysize; local
118 keysize = 16;
124 keysize = 24;
130 keysize = 32;
136 keysize = 32;
142 keysize = 48;
148 keysize = 80;
154 keysize = 32;
160 keysize
379 int keysize; local
464 u32 keysize; local
2045 size_t keysize = CCACIPHERTOKENSIZE; local
2168 size_t keysize = MAXEP11AESKEYBLOBSIZE; local
[all...]
H A Dzcrypt_ccamisc.c175 const u8 *token, size_t keysize,
188 if (t->len > keysize) {
190 DBF("%s token check failed, len %d > keysize %zu\n",
191 __func__, (int)t->len, keysize);
295 int i, rc, keysize; local
351 keysize = 16;
356 keysize = 24;
361 keysize = 32;
417 prepparm->lv3.keyblock.tok, 8 * keysize);
438 int rc, keysize, seckeysiz local
174 cca_check_sececckeytoken(debug_info_t *dbg, int dbflvl, const u8 *token, size_t keysize, int checkcpacfexport) argument
[all...]
H A Dzcrypt_ccamisc.h53 u16 keysize; /* key byte size */ member in struct:secaeskeytoken
156 const u8 *token, size_t keysize,
H A Dzcrypt_ep11misc.c946 const u8 *key, size_t keysize,
981 if (keysize > 0xFFFF || inbufsize > 0xFFFF)
986 + ASN1TAGLEN(keysize) + ASN1TAGLEN(inbufsize);
1004 p += asn1tag_write(p, 0x04, key, keysize);
1251 const u8 *key, size_t keysize,
1289 + ASN1TAGLEN(keysize) + 4;
1311 p += asn1tag_write(p, 0x04, key, keysize);
944 ep11_cryptsingle(u16 card, u16 domain, u16 mode, u32 mech, const u8 *iv, const u8 *key, size_t keysize, const u8 *inbuf, size_t inbufsize, u8 *outbuf, size_t *outbufsize) argument
1250 _ep11_wrapkey(u16 card, u16 domain, const u8 *key, size_t keysize, u32 mech, const u8 *iv, u8 *databuf, size_t *datasize) argument
/linux-master/lib/crypto/
H A Daesgcm.c40 * @keysize: The length in bytes of the input key
43 * Returns: 0 on success, or -EINVAL if @keysize or @authsize contain values
47 unsigned int keysize, unsigned int authsize)
53 aes_expandkey(&ctx->aes_ctx, key, keysize);
46 aesgcm_expandkey(struct aesgcm_ctx *ctx, const u8 *key, unsigned int keysize, unsigned int authsize) argument
/linux-master/drivers/crypto/
H A Dhifn_795x.c617 unsigned int keysize; member in struct:hifn_context
1145 if (ctx->keysize)
1169 if (ctx->keysize != 16)
1175 if (ctx->keysize != 24)
1181 if (ctx->keysize != 32)
1187 if (ctx->keysize != 24)
1192 if (ctx->keysize != 8)
1201 nbytes, nbytes, ctx->key, ctx->keysize,
1587 ctx->key, ctx->keysize,
1956 ctx->keysize
[all...]
/linux-master/drivers/char/tpm/
H A Dtpm-sysfs.c24 __be32 keysize; member in struct:tpm_readpubek_out
69 be32_to_cpu(out->keysize));
/linux-master/arch/s390/include/uapi/asm/
H A Dpkey.h183 * Return some info about the key: keysize in bits, keytype (currently
190 __u16 keysize; /* out: key size in bits */ member in struct:pkey_verifykey
/linux-master/drivers/net/ethernet/sfc/
H A Dtc_encap_actions.c524 size_t keysize; local
530 keysize = sizeof(keys.dst_ip);
534 keysize = sizeof(keys.dst_ip6);
544 if (n->tbl->key_len != keysize) {
/linux-master/drivers/input/keyboard/
H A Dlm8323.c323 int keysize = (lm->size_x << 4) | lm->size_y; local
337 lm8323_write(lm, 2, LM8323_CMD_SET_KEY_SIZE, keysize);
/linux-master/arch/x86/platform/efi/
H A Dquirks.c50 * @keysize: Total length of the key data including including any
74 u32 keysize; member in struct:quark_security_header
/linux-master/net/key/
H A Daf_key.c1169 int keysize = 0; local
1176 keysize = (key->sadb_key_bits + 7) / 8;
1177 x->aalg = kmalloc(sizeof(*x->aalg) + keysize, GFP_KERNEL);
1186 memcpy(x->aalg->alg_key, key+1, keysize);
1207 int keysize = 0; local
1215 keysize = (key->sadb_key_bits + 7) / 8;
1216 x->ealg = kmalloc(sizeof(*x->ealg) + keysize, GFP_KERNEL);
1225 memcpy(x->ealg->alg_key, key+1, keysize);

Completed in 783 milliseconds

12