Home
last modified time | relevance | path

Searched refs:keysize (Results 1 – 25 of 26) sorted by relevance

12

/Linux-v4.19/fs/crypto/
Dkeyinfo.c154 int keysize; member
160 .keysize = 64,
165 .keysize = 32,
170 .keysize = 16,
175 .keysize = 16,
180 .keysize = 64,
185 .keysize = 32,
221 static int derive_essiv_salt(const u8 *key, int keysize, u8 *salt) in derive_essiv_salt() argument
248 return crypto_shash_digest(desc, key, keysize, salt); in derive_essiv_salt()
253 int keysize) in init_essiv_generator() argument
[all …]
/Linux-v4.19/tools/testing/selftests/bpf/
Dtest_lpm_map.c209 static void test_lpm_map(int keysize) in test_lpm_map() argument
227 data = alloca(keysize); in test_lpm_map()
228 memset(data, 0, keysize); in test_lpm_map()
230 value = alloca(keysize + 1); in test_lpm_map()
231 memset(value, 0, keysize + 1); in test_lpm_map()
233 key = alloca(sizeof(*key) + keysize); in test_lpm_map()
234 memset(key, 0, sizeof(*key) + keysize); in test_lpm_map()
237 sizeof(*key) + keysize, in test_lpm_map()
238 keysize + 1, in test_lpm_map()
244 for (j = 0; j < keysize; ++j) in test_lpm_map()
[all …]
/Linux-v4.19/drivers/s390/crypto/
Dpkey_api.c70 u16 keysize; /* key byte size */ member
205 int i, rc, keysize; in pkey_genseckey() local
260 keysize = 16; in pkey_genseckey()
264 keysize = 24; in pkey_genseckey()
268 keysize = 32; in pkey_genseckey()
326 rc = check_secaeskeytoken(prepparm->lv3.keyblock.tok, 8*keysize); in pkey_genseckey()
348 int rc, keysize, seckeysize; in pkey_clr2seckey() local
401 keysize = 16; in pkey_clr2seckey()
404 keysize = 24; in pkey_clr2seckey()
407 keysize = 32; in pkey_clr2seckey()
[all …]
/Linux-v4.19/crypto/
Dtcrypt.c257 unsigned int aad_size, u8 *keysize, u32 num_mb) in test_mb_aead_speed() argument
351 *keysize * 8, *b_size); in test_mb_aead_speed()
358 if (template[j].klen == *keysize) { in test_mb_aead_speed()
366 ret = crypto_aead_setkey(tfm, key, *keysize); in test_mb_aead_speed()
434 keysize++; in test_mb_aead_speed()
435 } while (*keysize); in test_mb_aead_speed()
525 unsigned int aad_size, u8 *keysize) in test_aead_speed() argument
599 if ((*keysize + *b_size) > TVMEMSIZE * PAGE_SIZE) { in test_aead_speed()
601 *keysize + *b_size, in test_aead_speed()
608 if (template[j].klen == *keysize) { in test_aead_speed()
[all …]
Dsalsa20_generic.c113 unsigned int keysize) in salsa20_setkey() argument
120 if (keysize != SALSA20_MIN_KEY_SIZE && in salsa20_setkey()
121 keysize != SALSA20_MAX_KEY_SIZE) in salsa20_setkey()
128 if (keysize == 32) { /* recommended */ in salsa20_setkey()
Dchacha20_generic.c60 unsigned int keysize) in crypto_chacha20_setkey() argument
65 if (keysize != CHACHA20_KEY_SIZE) in crypto_chacha20_setkey()
Dskcipher.c677 skcipher->keysize = calg->cra_blkcipher.max_keysize; in crypto_init_skcipher_ops_blkcipher()
679 if (skcipher->keysize) in crypto_init_skcipher_ops_blkcipher()
776 skcipher->keysize = calg->cra_ablkcipher.max_keysize; in crypto_init_skcipher_ops_ablkcipher()
778 if (skcipher->keysize) in crypto_init_skcipher_ops_ablkcipher()
853 skcipher->keysize = alg->max_keysize; in crypto_skcipher_init_tfm()
855 if (skcipher->keysize) in crypto_skcipher_init_tfm()
/Linux-v4.19/include/crypto/
Dspeck.h36 unsigned int keysize);
60 unsigned int keysize);
Dchacha20.h25 unsigned int keysize);
Dskcipher.h63 unsigned int keysize; member
407 return tfm->keysize; in crypto_skcipher_default_keysize()
/Linux-v4.19/fs/befs/
Dbtree.c412 loff_t key_no, size_t bufsize, char *keybuf, size_t * keysize, in befs_btree_read() argument
450 *keysize = 0; in befs_btree_read()
463 *keysize = 0; in befs_btree_read()
505 *keysize = keylen; in befs_btree_read()
521 *keysize = 0; in befs_btree_read()
Dbtree.h12 size_t *keysize, befs_off_t *value);
Dlinuxvfs.c221 size_t keysize; in befs_readdir() local
229 keybuf, &keysize, &value); in befs_readdir()
252 befs_utf2nls(sb, keybuf, keysize, &nlsname, in befs_readdir()
265 if (!dir_emit(ctx, keybuf, keysize, in befs_readdir()
/Linux-v4.19/drivers/crypto/ux500/cryp/
Dcryp.c119 *control_register |= (cryp_config->keysize << CRYP_CR_KEYSIZE_POS); in cryp_set_configuration()
313 switch (config->keysize) { in cryp_save_device_context()
360 switch (config->keysize) { in cryp_restore_device_context()
Dcryp.h90 int keysize; member
Dcryp_core.c955 ctx->config.keysize = CRYP_KEY_SIZE_128; in aes_ablkcipher_setkey()
959 ctx->config.keysize = CRYP_KEY_SIZE_192; in aes_ablkcipher_setkey()
963 ctx->config.keysize = CRYP_KEY_SIZE_256; in aes_ablkcipher_setkey()
/Linux-v4.19/drivers/crypto/
Dhifn_795x.c625 unsigned int keysize; member
1153 if (ctx->keysize) in hifn_setup_cmd_desc()
1177 if (ctx->keysize != 16) in hifn_setup_cmd_desc()
1183 if (ctx->keysize != 24) in hifn_setup_cmd_desc()
1189 if (ctx->keysize != 32) in hifn_setup_cmd_desc()
1195 if (ctx->keysize != 24) in hifn_setup_cmd_desc()
1200 if (ctx->keysize != 8) in hifn_setup_cmd_desc()
1209 nbytes, nbytes, ctx->key, ctx->keysize, in hifn_setup_cmd_desc()
1593 ctx->key, ctx->keysize, in hifn_setup_session()
1973 ctx->keysize = len; in hifn_setkey()
[all …]
Dtalitos.c2229 unsigned int keysize = keylen; in ahash_setkey() local
2234 memcpy(ctx->key, key, keysize); in ahash_setkey()
2244 keysize = digestsize; in ahash_setkey()
2251 ctx->keylen = keysize; in ahash_setkey()
2252 ctx->dma_key = dma_map_single(dev, ctx->key, keysize, DMA_TO_DEVICE); in ahash_setkey()
/Linux-v4.19/arch/s390/include/uapi/asm/
Dpkey.h125 __u16 keysize; /* out: key size in bits */ member
/Linux-v4.19/drivers/char/tpm/
Dtpm-sysfs.c29 __be32 keysize; member
85 be32_to_cpu(out->keysize)); in pubek_show()
/Linux-v4.19/drivers/input/keyboard/
Dlm8323.c335 int keysize = (lm->size_x << 4) | lm->size_y; in lm8323_configure() local
349 lm8323_write(lm, 2, LM8323_CMD_SET_KEY_SIZE, keysize); in lm8323_configure()
/Linux-v4.19/arch/x86/platform/efi/
Dquirks.c72 u32 keysize; member
/Linux-v4.19/net/key/
Daf_key.c1189 int keysize = 0; in pfkey_msg2xfrm_state() local
1196 keysize = (key->sadb_key_bits + 7) / 8; in pfkey_msg2xfrm_state()
1197 x->aalg = kmalloc(sizeof(*x->aalg) + keysize, GFP_KERNEL); in pfkey_msg2xfrm_state()
1206 memcpy(x->aalg->alg_key, key+1, keysize); in pfkey_msg2xfrm_state()
1227 int keysize = 0; in pfkey_msg2xfrm_state() local
1235 keysize = (key->sadb_key_bits + 7) / 8; in pfkey_msg2xfrm_state()
1236 x->ealg = kmalloc(sizeof(*x->ealg) + keysize, GFP_KERNEL); in pfkey_msg2xfrm_state()
1245 memcpy(x->ealg->alg_key, key+1, keysize); in pfkey_msg2xfrm_state()
/Linux-v4.19/arch/x86/crypto/
Daesni-intel_asm.S133 #define keysize 2*15*16(%arg1) macro
821 mov keysize,%eax
917 mov keysize,%eax
1104 mov keysize,%eax
1312 mov keysize,%eax
1504 mov keysize,%eax
/Linux-v4.19/drivers/block/
Dloop.c99 int i, keysize; in transfer_xor() local
110 keysize = lo->lo_encrypt_key_size; in transfer_xor()
112 *out++ = *in++ ^ key[(i & 511) % keysize]; in transfer_xor()

12