/Linux-v4.19/fs/ntfs/ |
D | index.c | 199 le16_to_cpu(ie->key_length) > in ntfs_index_lookup() 206 if ((key_len == le16_to_cpu(ie->key_length)) && !memcmp(key, in ntfs_index_lookup() 228 key_len, &ie->key, le16_to_cpu(ie->key_length)); in ntfs_index_lookup() 366 le16_to_cpu(ie->key_length) > in ntfs_index_lookup() 376 if ((key_len == le16_to_cpu(ie->key_length)) && !memcmp(key, in ntfs_index_lookup() 391 key_len, &ie->key, le16_to_cpu(ie->key_length)); in ntfs_index_lookup()
|
D | dir.c | 140 (u8*)ie + le16_to_cpu(ie->key_length) > in ntfs_lookup_inode_by_name() 396 (u8*)ie + le16_to_cpu(ie->key_length) > in ntfs_lookup_inode_by_name() 691 (u8*)ie + le16_to_cpu(ie->key_length) > 874 (u8*)ie + le16_to_cpu(ie->key_length) > 1201 (u8*)ie + le16_to_cpu(ie->key_length) > in ntfs_readdir() 1383 (u8*)ie + le16_to_cpu(ie->key_length) > in ntfs_readdir()
|
/Linux-v4.19/arch/arm64/crypto/ |
D | aes-cipher-glue.c | 24 int rounds = 6 + ctx->key_length / 4; in aes_encrypt() 32 int rounds = 6 + ctx->key_length / 4; in aes_decrypt()
|
D | aes-glue.c | 136 int err, rounds = 6 + ctx->key_length / 4; in ecb_encrypt() 156 int err, rounds = 6 + ctx->key_length / 4; in ecb_decrypt() 176 int err, rounds = 6 + ctx->key_length / 4; in cbc_encrypt() 196 int err, rounds = 6 + ctx->key_length / 4; in cbc_decrypt() 216 int err, rounds = 6 + ctx->key_length / 4; in ctr_encrypt() 266 int err, first, rounds = 6 + ctx->key1.key_length / 4; in xts_encrypt() 288 int err, first, rounds = 6 + ctx->key1.key_length / 4; in xts_decrypt() 474 int rounds = 6 + ctx->key_length / 4; in mac_do_update()
|
D | aes-ce-glue.c | 48 return 6 + ctx->key_length / 4; in num_rounds() 98 ctx->key_length = key_len; in ce_aes_expandkey()
|
D | aes-ctr-fallback.h | 41 6 + ctx->key_length / 4); in aes_ctr_encrypt_fallback()
|
/Linux-v4.19/arch/arm/crypto/ |
D | aes-cipher-glue.c | 25 int rounds = 6 + ctx->key_length / 4; in aes_encrypt() 33 int rounds = 6 + ctx->key_length / 4; in aes_decrypt()
|
D | aes-ce-glue.c | 62 return 6 + ctx->key_length / 4; in num_rounds() 85 ctx->key_length = key_len; in ce_aes_expandkey()
|
/Linux-v4.19/drivers/s390/crypto/ |
D | zcrypt_msgtype6.h | 136 short int key_length; in rng_type6CPRB_msgX() member 163 msg->key_length = 0x02; in rng_type6CPRB_msgX()
|
D | pkey_api.c | 216 char key_length[8]; in pkey_genseckey() member 261 memcpy(preqparm->lv1.key_length, "KEYLN16 ", 8); in pkey_genseckey() 265 memcpy(preqparm->lv1.key_length, "KEYLN24 ", 8); in pkey_genseckey() 269 memcpy(preqparm->lv1.key_length, "KEYLN32 ", 8); in pkey_genseckey()
|
D | zcrypt_pcixcc.c | 106 short int key_length; in zcrypt_pcixcc_rng_supported() member
|
/Linux-v4.19/arch/x86/crypto/ |
D | camellia-x86_64-asm_64.S | 50 #define key_length CAMELLIA_TABLE_BYTE_LEN macro 215 cmpb $16, key_length(CTX); 246 cmpl $16, key_length(CTX); 450 cmpb $16, key_length(CTX); 482 cmpl $16, key_length(CTX);
|
D | aesni-intel_glue.c | 212 if ((plaintext_len < AVX_GEN2_OPTSIZE) || (aes_ctx-> key_length != AES_KEYSIZE_128)){ in aesni_gcm_enc_avx() 230 if ((ciphertext_len < AVX_GEN2_OPTSIZE) || (aes_ctx-> key_length != AES_KEYSIZE_128)) { in aesni_gcm_dec_avx() 267 if ((plaintext_len < AVX_GEN2_OPTSIZE) || (aes_ctx-> key_length != AES_KEYSIZE_128)) { in aesni_gcm_enc_avx2() 289 if ((ciphertext_len < AVX_GEN2_OPTSIZE) || (aes_ctx-> key_length != AES_KEYSIZE_128)) { in aesni_gcm_dec_avx2() 541 if (ctx->key_length == AES_KEYSIZE_128) in aesni_ctr_enc_avx_tfm() 543 else if (ctx->key_length == AES_KEYSIZE_192) in aesni_ctr_enc_avx_tfm() 926 if (((struct crypto_aes_ctx *)aes_ctx)->key_length != AES_KEYSIZE_128 || in gcmaes_encrypt() 998 if (((struct crypto_aes_ctx *)aes_ctx)->key_length != AES_KEYSIZE_128 || in gcmaes_decrypt()
|
/Linux-v4.19/include/crypto/ |
D | aes.h | 28 u32 key_length; member
|
/Linux-v4.19/crypto/ |
D | aes_ti.c | 181 ctx->key_length = key_len; in aesti_expand_key() 270 int rounds = 6 + ctx->key_length / 4; in aesti_encrypt() 309 int rounds = 6 + ctx->key_length / 4; in aesti_decrypt()
|
D | aes_generic.c | 1226 ctx->key_length = key_len; in crypto_aes_expand_key() 1339 const int key_len = ctx->key_length; in aes_encrypt() 1408 const int key_len = ctx->key_length; in aes_decrypt()
|
D | camellia_generic.c | 975 int key_length; member 992 cctx->key_length = key_len; in camellia_set_key() 1023 if (cctx->key_length == 16) in camellia_encrypt() 1051 if (cctx->key_length == 16) in camellia_decrypt()
|
/Linux-v4.19/drivers/staging/ks7010/ |
D | eap_packet.h | 43 unsigned short key_length; member
|
/Linux-v4.19/drivers/crypto/marvell/ |
D | cipher.c | 266 remaining = (ctx->aes.key_length - 16) / 4; in mv_cesa_aes_setkey() 267 offset = ctx->aes.key_length + 24 - remaining; in mv_cesa_aes_setkey() 711 for (i = 0; i < ctx->aes.key_length / sizeof(u32); i++) in mv_cesa_aes_op() 714 if (ctx->aes.key_length == 24) in mv_cesa_aes_op() 716 else if (ctx->aes.key_length == 32) in mv_cesa_aes_op()
|
/Linux-v4.19/drivers/crypto/axis/ |
D | artpec6_crypto.c | 330 size_t key_length; member 1203 ctx->key_length); in artpec6_crypto_ctr_crypt() 1261 ctx->key_length = len; in artpec6_crypto_aead_set_key() 1631 ctx->key_length = keylen; in artpec6_crypto_cipher_set_key() 1659 ctx->key_length = keylen; in artpec6_crypto_xts_set_key() 1713 ctx->key_length, true, false); in artpec6_crypto_prepare_crypto() 1720 cipher_klen = ctx->key_length/2; in artpec6_crypto_prepare_crypto() 1722 cipher_klen = ctx->key_length; in artpec6_crypto_prepare_crypto() 1737 MODULE_NAME, ctx->key_length); in artpec6_crypto_prepare_crypto() 1877 ctx->key_length, true, false); in artpec6_crypto_prepare_aead() [all …]
|
/Linux-v4.19/arch/x86/include/asm/crypto/ |
D | camellia.h | 19 u32 key_length; member
|
/Linux-v4.19/drivers/net/wireless/marvell/mwifiex/ |
D | sta_ioctl.c | 918 if (!wep_key->key_length) { in mwifiex_sec_ioctl_set_wep_key() 926 wep_key->key_material, wep_key->key_length); in mwifiex_sec_ioctl_set_wep_key() 927 encrypt_key->key_len = wep_key->key_length; in mwifiex_sec_ioctl_set_wep_key() 940 wep_key->key_length = encrypt_key->key_len; in mwifiex_sec_ioctl_set_wep_key() 943 if (wep_key->key_length) { in mwifiex_sec_ioctl_set_wep_key()
|
D | sta_cmd.c | 538 if ((priv->wep_key[i].key_length == WLAN_KEY_LEN_WEP40) || in mwifiex_set_keyparamset_wep() 539 (priv->wep_key[i].key_length == WLAN_KEY_LEN_WEP104)) { in mwifiex_set_keyparamset_wep() 546 key_length + in mwifiex_set_keyparamset_wep() 554 cpu_to_le16(priv->wep_key[i].key_length); in mwifiex_set_keyparamset_wep() 566 priv->wep_key[i].key_length); in mwifiex_set_keyparamset_wep() 568 cur_key_param_len = priv->wep_key[i].key_length + in mwifiex_set_keyparamset_wep() 576 } else if (!priv->wep_key[i].key_length) { in mwifiex_set_keyparamset_wep() 581 (i + 1), priv->wep_key[i].key_length); in mwifiex_set_keyparamset_wep()
|
/Linux-v4.19/arch/s390/include/uapi/asm/ |
D | dasd.h | 212 unsigned int key_length; /* Key length of first record in error */ member
|
/Linux-v4.19/fs/reiserfs/ |
D | tail_conversion.c | 281 key.key_length = 4; in indirect2direct()
|