/Linux-v5.4/fs/crypto/ |
D | keysetup.c | 24 .keysize = 64, 30 .keysize = 32, 36 .keysize = 16, 43 .keysize = 16, 49 .keysize = 32, 103 err = crypto_skcipher_setkey(tfm, raw_key, mode->keysize); in fscrypt_allocate_skcipher() 114 static int derive_essiv_salt(const u8 *key, int keysize, u8 *salt) in derive_essiv_salt() argument 145 return crypto_shash_digest(desc, key, keysize, salt); in derive_essiv_salt() 150 int keysize) in init_essiv_generator() argument 165 err = derive_essiv_salt(raw_key, keysize, salt); in init_essiv_generator() [all …]
|
D | keysetup_v1.c | 202 if (crypto_memneq(raw_key, dk->dk_raw, ci->ci_mode->keysize)) in find_or_insert_direct_key() 243 memcpy(dk->dk_raw, raw_key, ci->ci_mode->keysize); in fscrypt_get_direct_key() 296 derived_key = kmalloc(ci->ci_mode->keysize, GFP_NOFS); in setup_v1_file_key_derived() 301 derived_key, ci->ci_mode->keysize); in setup_v1_file_key_derived() 327 ci->ci_mode->keysize, &payload); in fscrypt_setup_v1_file_key_via_subscribed_keyrings() 331 ci->ci_mode->keysize, &payload); in fscrypt_setup_v1_file_key_via_subscribed_keyrings()
|
D | fscrypt_private.h | 444 int keysize; member
|
/Linux-v5.4/tools/testing/selftests/bpf/ |
D | test_lpm_map.c | 209 static void test_lpm_map(int keysize) in test_lpm_map() argument 227 data = alloca(keysize); in test_lpm_map() 228 memset(data, 0, keysize); in test_lpm_map() 230 value = alloca(keysize + 1); in test_lpm_map() 231 memset(value, 0, keysize + 1); in test_lpm_map() 233 key = alloca(sizeof(*key) + keysize); in test_lpm_map() 234 memset(key, 0, sizeof(*key) + keysize); in test_lpm_map() 237 sizeof(*key) + keysize, in test_lpm_map() 238 keysize + 1, in test_lpm_map() 244 for (j = 0; j < keysize; ++j) in test_lpm_map() [all …]
|
/Linux-v5.4/crypto/ |
D | chacha_generic.c | 81 unsigned int keysize, int nrounds) in chacha_setkey() argument 86 if (keysize != CHACHA_KEY_SIZE) in chacha_setkey() 97 unsigned int keysize) in crypto_chacha20_setkey() argument 99 return chacha_setkey(tfm, key, keysize, 20); in crypto_chacha20_setkey() 104 unsigned int keysize) in crypto_chacha12_setkey() argument 106 return chacha_setkey(tfm, key, keysize, 12); in crypto_chacha12_setkey()
|
D | tcrypt.c | 253 unsigned int aad_size, u8 *keysize, u32 num_mb) in test_mb_aead_speed() argument 347 *keysize * 8, *b_size); in test_mb_aead_speed() 354 if (template[j].klen == *keysize) { in test_mb_aead_speed() 362 ret = crypto_aead_setkey(tfm, key, *keysize); in test_mb_aead_speed() 430 keysize++; in test_mb_aead_speed() 431 } while (*keysize); in test_mb_aead_speed() 521 unsigned int aad_size, u8 *keysize) in test_aead_speed() argument 595 if ((*keysize + *b_size) > TVMEMSIZE * PAGE_SIZE) { in test_aead_speed() 597 *keysize + *b_size, in test_aead_speed() 604 if (template[j].klen == *keysize) { in test_aead_speed() [all …]
|
D | salsa20_generic.c | 112 unsigned int keysize) in salsa20_setkey() argument 119 if (keysize != SALSA20_MIN_KEY_SIZE && in salsa20_setkey() 120 keysize != SALSA20_MAX_KEY_SIZE) in salsa20_setkey() 127 if (keysize == 32) { /* recommended */ in salsa20_setkey()
|
D | skcipher.c | 594 if (tfm->keysize) in skcipher_set_needkey() 690 skcipher->keysize = calg->cra_blkcipher.max_keysize; in crypto_init_skcipher_ops_blkcipher() 790 skcipher->keysize = calg->cra_ablkcipher.max_keysize; in crypto_init_skcipher_ops_ablkcipher() 901 skcipher->keysize = alg->max_keysize; in crypto_skcipher_init_tfm()
|
/Linux-v5.4/drivers/s390/crypto/ |
D | pkey_api.c | 82 int keysize; in pkey_clr2protkey() local 87 keysize = 16; in pkey_clr2protkey() 91 keysize = 24; in pkey_clr2protkey() 95 keysize = 32; in pkey_clr2protkey() 116 memcpy(paramblock, clrkey->clrkey, keysize); in pkey_clr2protkey() 123 protkey->len = keysize + 32; in pkey_clr2protkey() 124 memcpy(protkey->protkey, paramblock, keysize + 32); in pkey_clr2protkey() 224 int keysize; in pkey_genprotkey() local 229 keysize = 16; in pkey_genprotkey() 232 keysize = 24; in pkey_genprotkey() [all …]
|
D | zcrypt_ccamisc.c | 275 int i, rc, keysize; in cca_genseckey() local 331 keysize = 16; in cca_genseckey() 336 keysize = 24; in cca_genseckey() 341 keysize = 32; in cca_genseckey() 396 prepparm->lv3.keyblock.tok, 8*keysize); in cca_genseckey() 417 int rc, keysize, seckeysize; in cca_clr2seckey() local 471 keysize = 16; in cca_clr2seckey() 475 keysize = 24; in cca_clr2seckey() 479 keysize = 32; in cca_clr2seckey() 487 preqparm->lv1.len = sizeof(struct lv1) + keysize; in cca_clr2seckey() [all …]
|
D | zcrypt_ccamisc.h | 51 u16 keysize; /* key byte size */ member
|
/Linux-v5.4/include/crypto/ |
D | chacha.h | 47 unsigned int keysize); 49 unsigned int keysize);
|
D | skcipher.h | 45 unsigned int keysize; member 385 return tfm->keysize; in crypto_skcipher_default_keysize()
|
/Linux-v5.4/fs/befs/ |
D | btree.c | 412 loff_t key_no, size_t bufsize, char *keybuf, size_t * keysize, in befs_btree_read() argument 450 *keysize = 0; in befs_btree_read() 463 *keysize = 0; in befs_btree_read() 505 *keysize = keylen; in befs_btree_read() 521 *keysize = 0; in befs_btree_read()
|
D | btree.h | 12 size_t *keysize, befs_off_t *value);
|
D | linuxvfs.c | 222 size_t keysize; in befs_readdir() local 230 keybuf, &keysize, &value); in befs_readdir() 253 befs_utf2nls(sb, keybuf, keysize, &nlsname, in befs_readdir() 266 if (!dir_emit(ctx, keybuf, keysize, in befs_readdir()
|
/Linux-v5.4/drivers/crypto/ux500/cryp/ |
D | cryp.c | 119 *control_register |= (cryp_config->keysize << CRYP_CR_KEYSIZE_POS); in cryp_set_configuration() 313 switch (config->keysize) { in cryp_save_device_context() 363 switch (config->keysize) { in cryp_restore_device_context()
|
D | cryp.h | 90 int keysize; member
|
D | cryp_core.c | 961 ctx->config.keysize = CRYP_KEY_SIZE_128; in aes_ablkcipher_setkey() 965 ctx->config.keysize = CRYP_KEY_SIZE_192; in aes_ablkcipher_setkey() 969 ctx->config.keysize = CRYP_KEY_SIZE_256; in aes_ablkcipher_setkey()
|
/Linux-v5.4/drivers/crypto/ |
D | hifn_795x.c | 616 unsigned int keysize; member 1144 if (ctx->keysize) in hifn_setup_cmd_desc() 1168 if (ctx->keysize != 16) in hifn_setup_cmd_desc() 1174 if (ctx->keysize != 24) in hifn_setup_cmd_desc() 1180 if (ctx->keysize != 32) in hifn_setup_cmd_desc() 1186 if (ctx->keysize != 24) in hifn_setup_cmd_desc() 1191 if (ctx->keysize != 8) in hifn_setup_cmd_desc() 1200 nbytes, nbytes, ctx->key, ctx->keysize, in hifn_setup_cmd_desc() 1584 ctx->key, ctx->keysize, in hifn_setup_session() 1953 ctx->keysize = len; in hifn_setkey() [all …]
|
/Linux-v5.4/drivers/char/tpm/ |
D | tpm-sysfs.c | 24 __be32 keysize; member 77 be32_to_cpu(out->keysize)); in pubek_show()
|
/Linux-v5.4/arch/s390/include/uapi/asm/ |
D | pkey.h | 165 __u16 keysize; /* out: key size in bits */ member
|
/Linux-v5.4/drivers/input/keyboard/ |
D | lm8323.c | 323 int keysize = (lm->size_x << 4) | lm->size_y; in lm8323_configure() local 337 lm8323_write(lm, 2, LM8323_CMD_SET_KEY_SIZE, keysize); in lm8323_configure()
|
/Linux-v5.4/net/tls/ |
D | tls_sw.c | 2220 size_t keysize; in tls_set_sw_offload() local 2281 keysize = TLS_CIPHER_AES_GCM_128_KEY_SIZE; in tls_set_sw_offload() 2298 keysize = TLS_CIPHER_AES_GCM_256_KEY_SIZE; in tls_set_sw_offload() 2315 keysize = TLS_CIPHER_AES_CCM_128_KEY_SIZE; in tls_set_sw_offload() 2377 rc = crypto_aead_setkey(*aead, key, keysize); in tls_set_sw_offload()
|
/Linux-v5.4/arch/x86/platform/efi/ |
D | quirks.c | 73 u32 keysize; member
|