/Linux-v4.19/fs/crypto/ |
D | keyinfo.c | 154 int keysize; member 160 .keysize = 64, 165 .keysize = 32, 170 .keysize = 16, 175 .keysize = 16, 180 .keysize = 64, 185 .keysize = 32, 221 static int derive_essiv_salt(const u8 *key, int keysize, u8 *salt) in derive_essiv_salt() argument 248 return crypto_shash_digest(desc, key, keysize, salt); in derive_essiv_salt() 253 int keysize) in init_essiv_generator() argument [all …]
|
/Linux-v4.19/tools/testing/selftests/bpf/ |
D | test_lpm_map.c | 209 static void test_lpm_map(int keysize) in test_lpm_map() argument 227 data = alloca(keysize); in test_lpm_map() 228 memset(data, 0, keysize); in test_lpm_map() 230 value = alloca(keysize + 1); in test_lpm_map() 231 memset(value, 0, keysize + 1); in test_lpm_map() 233 key = alloca(sizeof(*key) + keysize); in test_lpm_map() 234 memset(key, 0, sizeof(*key) + keysize); in test_lpm_map() 237 sizeof(*key) + keysize, in test_lpm_map() 238 keysize + 1, in test_lpm_map() 244 for (j = 0; j < keysize; ++j) in test_lpm_map() [all …]
|
/Linux-v4.19/drivers/s390/crypto/ |
D | pkey_api.c | 70 u16 keysize; /* key byte size */ member 205 int i, rc, keysize; in pkey_genseckey() local 260 keysize = 16; in pkey_genseckey() 264 keysize = 24; in pkey_genseckey() 268 keysize = 32; in pkey_genseckey() 326 rc = check_secaeskeytoken(prepparm->lv3.keyblock.tok, 8*keysize); in pkey_genseckey() 348 int rc, keysize, seckeysize; in pkey_clr2seckey() local 401 keysize = 16; in pkey_clr2seckey() 404 keysize = 24; in pkey_clr2seckey() 407 keysize = 32; in pkey_clr2seckey() [all …]
|
/Linux-v4.19/crypto/ |
D | tcrypt.c | 257 unsigned int aad_size, u8 *keysize, u32 num_mb) in test_mb_aead_speed() argument 351 *keysize * 8, *b_size); in test_mb_aead_speed() 358 if (template[j].klen == *keysize) { in test_mb_aead_speed() 366 ret = crypto_aead_setkey(tfm, key, *keysize); in test_mb_aead_speed() 434 keysize++; in test_mb_aead_speed() 435 } while (*keysize); in test_mb_aead_speed() 525 unsigned int aad_size, u8 *keysize) in test_aead_speed() argument 599 if ((*keysize + *b_size) > TVMEMSIZE * PAGE_SIZE) { in test_aead_speed() 601 *keysize + *b_size, in test_aead_speed() 608 if (template[j].klen == *keysize) { in test_aead_speed() [all …]
|
D | salsa20_generic.c | 113 unsigned int keysize) in salsa20_setkey() argument 120 if (keysize != SALSA20_MIN_KEY_SIZE && in salsa20_setkey() 121 keysize != SALSA20_MAX_KEY_SIZE) in salsa20_setkey() 128 if (keysize == 32) { /* recommended */ in salsa20_setkey()
|
D | chacha20_generic.c | 60 unsigned int keysize) in crypto_chacha20_setkey() argument 65 if (keysize != CHACHA20_KEY_SIZE) in crypto_chacha20_setkey()
|
D | skcipher.c | 677 skcipher->keysize = calg->cra_blkcipher.max_keysize; in crypto_init_skcipher_ops_blkcipher() 679 if (skcipher->keysize) in crypto_init_skcipher_ops_blkcipher() 776 skcipher->keysize = calg->cra_ablkcipher.max_keysize; in crypto_init_skcipher_ops_ablkcipher() 778 if (skcipher->keysize) in crypto_init_skcipher_ops_ablkcipher() 853 skcipher->keysize = alg->max_keysize; in crypto_skcipher_init_tfm() 855 if (skcipher->keysize) in crypto_skcipher_init_tfm()
|
/Linux-v4.19/include/crypto/ |
D | speck.h | 36 unsigned int keysize); 60 unsigned int keysize);
|
D | chacha20.h | 25 unsigned int keysize);
|
D | skcipher.h | 63 unsigned int keysize; member 407 return tfm->keysize; in crypto_skcipher_default_keysize()
|
/Linux-v4.19/fs/befs/ |
D | btree.c | 412 loff_t key_no, size_t bufsize, char *keybuf, size_t * keysize, in befs_btree_read() argument 450 *keysize = 0; in befs_btree_read() 463 *keysize = 0; in befs_btree_read() 505 *keysize = keylen; in befs_btree_read() 521 *keysize = 0; in befs_btree_read()
|
D | btree.h | 12 size_t *keysize, befs_off_t *value);
|
D | linuxvfs.c | 221 size_t keysize; in befs_readdir() local 229 keybuf, &keysize, &value); in befs_readdir() 252 befs_utf2nls(sb, keybuf, keysize, &nlsname, in befs_readdir() 265 if (!dir_emit(ctx, keybuf, keysize, in befs_readdir()
|
/Linux-v4.19/drivers/crypto/ux500/cryp/ |
D | cryp.c | 119 *control_register |= (cryp_config->keysize << CRYP_CR_KEYSIZE_POS); in cryp_set_configuration() 313 switch (config->keysize) { in cryp_save_device_context() 360 switch (config->keysize) { in cryp_restore_device_context()
|
D | cryp.h | 90 int keysize; member
|
D | cryp_core.c | 955 ctx->config.keysize = CRYP_KEY_SIZE_128; in aes_ablkcipher_setkey() 959 ctx->config.keysize = CRYP_KEY_SIZE_192; in aes_ablkcipher_setkey() 963 ctx->config.keysize = CRYP_KEY_SIZE_256; in aes_ablkcipher_setkey()
|
/Linux-v4.19/drivers/crypto/ |
D | hifn_795x.c | 625 unsigned int keysize; member 1153 if (ctx->keysize) in hifn_setup_cmd_desc() 1177 if (ctx->keysize != 16) in hifn_setup_cmd_desc() 1183 if (ctx->keysize != 24) in hifn_setup_cmd_desc() 1189 if (ctx->keysize != 32) in hifn_setup_cmd_desc() 1195 if (ctx->keysize != 24) in hifn_setup_cmd_desc() 1200 if (ctx->keysize != 8) in hifn_setup_cmd_desc() 1209 nbytes, nbytes, ctx->key, ctx->keysize, in hifn_setup_cmd_desc() 1593 ctx->key, ctx->keysize, in hifn_setup_session() 1973 ctx->keysize = len; in hifn_setkey() [all …]
|
D | talitos.c | 2229 unsigned int keysize = keylen; in ahash_setkey() local 2234 memcpy(ctx->key, key, keysize); in ahash_setkey() 2244 keysize = digestsize; in ahash_setkey() 2251 ctx->keylen = keysize; in ahash_setkey() 2252 ctx->dma_key = dma_map_single(dev, ctx->key, keysize, DMA_TO_DEVICE); in ahash_setkey()
|
/Linux-v4.19/arch/s390/include/uapi/asm/ |
D | pkey.h | 125 __u16 keysize; /* out: key size in bits */ member
|
/Linux-v4.19/drivers/char/tpm/ |
D | tpm-sysfs.c | 29 __be32 keysize; member 85 be32_to_cpu(out->keysize)); in pubek_show()
|
/Linux-v4.19/drivers/input/keyboard/ |
D | lm8323.c | 335 int keysize = (lm->size_x << 4) | lm->size_y; in lm8323_configure() local 349 lm8323_write(lm, 2, LM8323_CMD_SET_KEY_SIZE, keysize); in lm8323_configure()
|
/Linux-v4.19/arch/x86/platform/efi/ |
D | quirks.c | 72 u32 keysize; member
|
/Linux-v4.19/net/key/ |
D | af_key.c | 1189 int keysize = 0; in pfkey_msg2xfrm_state() local 1196 keysize = (key->sadb_key_bits + 7) / 8; in pfkey_msg2xfrm_state() 1197 x->aalg = kmalloc(sizeof(*x->aalg) + keysize, GFP_KERNEL); in pfkey_msg2xfrm_state() 1206 memcpy(x->aalg->alg_key, key+1, keysize); in pfkey_msg2xfrm_state() 1227 int keysize = 0; in pfkey_msg2xfrm_state() local 1235 keysize = (key->sadb_key_bits + 7) / 8; in pfkey_msg2xfrm_state() 1236 x->ealg = kmalloc(sizeof(*x->ealg) + keysize, GFP_KERNEL); in pfkey_msg2xfrm_state() 1245 memcpy(x->ealg->alg_key, key+1, keysize); in pfkey_msg2xfrm_state()
|
/Linux-v4.19/arch/x86/crypto/ |
D | aesni-intel_asm.S | 133 #define keysize 2*15*16(%arg1) macro 821 mov keysize,%eax 917 mov keysize,%eax 1104 mov keysize,%eax 1312 mov keysize,%eax 1504 mov keysize,%eax
|
/Linux-v4.19/drivers/block/ |
D | loop.c | 99 int i, keysize; in transfer_xor() local 110 keysize = lo->lo_encrypt_key_size; in transfer_xor() 112 *out++ = *in++ ^ key[(i & 511) % keysize]; in transfer_xor()
|