Home
last modified time | relevance | path

Searched refs:keysize (Results 1 – 25 of 34) sorted by relevance

12

/Linux-v5.4/fs/crypto/
Dkeysetup.c24 .keysize = 64,
30 .keysize = 32,
36 .keysize = 16,
43 .keysize = 16,
49 .keysize = 32,
103 err = crypto_skcipher_setkey(tfm, raw_key, mode->keysize); in fscrypt_allocate_skcipher()
114 static int derive_essiv_salt(const u8 *key, int keysize, u8 *salt) in derive_essiv_salt() argument
145 return crypto_shash_digest(desc, key, keysize, salt); in derive_essiv_salt()
150 int keysize) in init_essiv_generator() argument
165 err = derive_essiv_salt(raw_key, keysize, salt); in init_essiv_generator()
[all …]
Dkeysetup_v1.c202 if (crypto_memneq(raw_key, dk->dk_raw, ci->ci_mode->keysize)) in find_or_insert_direct_key()
243 memcpy(dk->dk_raw, raw_key, ci->ci_mode->keysize); in fscrypt_get_direct_key()
296 derived_key = kmalloc(ci->ci_mode->keysize, GFP_NOFS); in setup_v1_file_key_derived()
301 derived_key, ci->ci_mode->keysize); in setup_v1_file_key_derived()
327 ci->ci_mode->keysize, &payload); in fscrypt_setup_v1_file_key_via_subscribed_keyrings()
331 ci->ci_mode->keysize, &payload); in fscrypt_setup_v1_file_key_via_subscribed_keyrings()
Dfscrypt_private.h444 int keysize; member
/Linux-v5.4/tools/testing/selftests/bpf/
Dtest_lpm_map.c209 static void test_lpm_map(int keysize) in test_lpm_map() argument
227 data = alloca(keysize); in test_lpm_map()
228 memset(data, 0, keysize); in test_lpm_map()
230 value = alloca(keysize + 1); in test_lpm_map()
231 memset(value, 0, keysize + 1); in test_lpm_map()
233 key = alloca(sizeof(*key) + keysize); in test_lpm_map()
234 memset(key, 0, sizeof(*key) + keysize); in test_lpm_map()
237 sizeof(*key) + keysize, in test_lpm_map()
238 keysize + 1, in test_lpm_map()
244 for (j = 0; j < keysize; ++j) in test_lpm_map()
[all …]
/Linux-v5.4/crypto/
Dchacha_generic.c81 unsigned int keysize, int nrounds) in chacha_setkey() argument
86 if (keysize != CHACHA_KEY_SIZE) in chacha_setkey()
97 unsigned int keysize) in crypto_chacha20_setkey() argument
99 return chacha_setkey(tfm, key, keysize, 20); in crypto_chacha20_setkey()
104 unsigned int keysize) in crypto_chacha12_setkey() argument
106 return chacha_setkey(tfm, key, keysize, 12); in crypto_chacha12_setkey()
Dtcrypt.c253 unsigned int aad_size, u8 *keysize, u32 num_mb) in test_mb_aead_speed() argument
347 *keysize * 8, *b_size); in test_mb_aead_speed()
354 if (template[j].klen == *keysize) { in test_mb_aead_speed()
362 ret = crypto_aead_setkey(tfm, key, *keysize); in test_mb_aead_speed()
430 keysize++; in test_mb_aead_speed()
431 } while (*keysize); in test_mb_aead_speed()
521 unsigned int aad_size, u8 *keysize) in test_aead_speed() argument
595 if ((*keysize + *b_size) > TVMEMSIZE * PAGE_SIZE) { in test_aead_speed()
597 *keysize + *b_size, in test_aead_speed()
604 if (template[j].klen == *keysize) { in test_aead_speed()
[all …]
Dsalsa20_generic.c112 unsigned int keysize) in salsa20_setkey() argument
119 if (keysize != SALSA20_MIN_KEY_SIZE && in salsa20_setkey()
120 keysize != SALSA20_MAX_KEY_SIZE) in salsa20_setkey()
127 if (keysize == 32) { /* recommended */ in salsa20_setkey()
Dskcipher.c594 if (tfm->keysize) in skcipher_set_needkey()
690 skcipher->keysize = calg->cra_blkcipher.max_keysize; in crypto_init_skcipher_ops_blkcipher()
790 skcipher->keysize = calg->cra_ablkcipher.max_keysize; in crypto_init_skcipher_ops_ablkcipher()
901 skcipher->keysize = alg->max_keysize; in crypto_skcipher_init_tfm()
/Linux-v5.4/drivers/s390/crypto/
Dpkey_api.c82 int keysize; in pkey_clr2protkey() local
87 keysize = 16; in pkey_clr2protkey()
91 keysize = 24; in pkey_clr2protkey()
95 keysize = 32; in pkey_clr2protkey()
116 memcpy(paramblock, clrkey->clrkey, keysize); in pkey_clr2protkey()
123 protkey->len = keysize + 32; in pkey_clr2protkey()
124 memcpy(protkey->protkey, paramblock, keysize + 32); in pkey_clr2protkey()
224 int keysize; in pkey_genprotkey() local
229 keysize = 16; in pkey_genprotkey()
232 keysize = 24; in pkey_genprotkey()
[all …]
Dzcrypt_ccamisc.c275 int i, rc, keysize; in cca_genseckey() local
331 keysize = 16; in cca_genseckey()
336 keysize = 24; in cca_genseckey()
341 keysize = 32; in cca_genseckey()
396 prepparm->lv3.keyblock.tok, 8*keysize); in cca_genseckey()
417 int rc, keysize, seckeysize; in cca_clr2seckey() local
471 keysize = 16; in cca_clr2seckey()
475 keysize = 24; in cca_clr2seckey()
479 keysize = 32; in cca_clr2seckey()
487 preqparm->lv1.len = sizeof(struct lv1) + keysize; in cca_clr2seckey()
[all …]
Dzcrypt_ccamisc.h51 u16 keysize; /* key byte size */ member
/Linux-v5.4/include/crypto/
Dchacha.h47 unsigned int keysize);
49 unsigned int keysize);
Dskcipher.h45 unsigned int keysize; member
385 return tfm->keysize; in crypto_skcipher_default_keysize()
/Linux-v5.4/fs/befs/
Dbtree.c412 loff_t key_no, size_t bufsize, char *keybuf, size_t * keysize, in befs_btree_read() argument
450 *keysize = 0; in befs_btree_read()
463 *keysize = 0; in befs_btree_read()
505 *keysize = keylen; in befs_btree_read()
521 *keysize = 0; in befs_btree_read()
Dbtree.h12 size_t *keysize, befs_off_t *value);
Dlinuxvfs.c222 size_t keysize; in befs_readdir() local
230 keybuf, &keysize, &value); in befs_readdir()
253 befs_utf2nls(sb, keybuf, keysize, &nlsname, in befs_readdir()
266 if (!dir_emit(ctx, keybuf, keysize, in befs_readdir()
/Linux-v5.4/drivers/crypto/ux500/cryp/
Dcryp.c119 *control_register |= (cryp_config->keysize << CRYP_CR_KEYSIZE_POS); in cryp_set_configuration()
313 switch (config->keysize) { in cryp_save_device_context()
363 switch (config->keysize) { in cryp_restore_device_context()
Dcryp.h90 int keysize; member
Dcryp_core.c961 ctx->config.keysize = CRYP_KEY_SIZE_128; in aes_ablkcipher_setkey()
965 ctx->config.keysize = CRYP_KEY_SIZE_192; in aes_ablkcipher_setkey()
969 ctx->config.keysize = CRYP_KEY_SIZE_256; in aes_ablkcipher_setkey()
/Linux-v5.4/drivers/crypto/
Dhifn_795x.c616 unsigned int keysize; member
1144 if (ctx->keysize) in hifn_setup_cmd_desc()
1168 if (ctx->keysize != 16) in hifn_setup_cmd_desc()
1174 if (ctx->keysize != 24) in hifn_setup_cmd_desc()
1180 if (ctx->keysize != 32) in hifn_setup_cmd_desc()
1186 if (ctx->keysize != 24) in hifn_setup_cmd_desc()
1191 if (ctx->keysize != 8) in hifn_setup_cmd_desc()
1200 nbytes, nbytes, ctx->key, ctx->keysize, in hifn_setup_cmd_desc()
1584 ctx->key, ctx->keysize, in hifn_setup_session()
1953 ctx->keysize = len; in hifn_setkey()
[all …]
/Linux-v5.4/drivers/char/tpm/
Dtpm-sysfs.c24 __be32 keysize; member
77 be32_to_cpu(out->keysize)); in pubek_show()
/Linux-v5.4/arch/s390/include/uapi/asm/
Dpkey.h165 __u16 keysize; /* out: key size in bits */ member
/Linux-v5.4/drivers/input/keyboard/
Dlm8323.c323 int keysize = (lm->size_x << 4) | lm->size_y; in lm8323_configure() local
337 lm8323_write(lm, 2, LM8323_CMD_SET_KEY_SIZE, keysize); in lm8323_configure()
/Linux-v5.4/net/tls/
Dtls_sw.c2220 size_t keysize; in tls_set_sw_offload() local
2281 keysize = TLS_CIPHER_AES_GCM_128_KEY_SIZE; in tls_set_sw_offload()
2298 keysize = TLS_CIPHER_AES_GCM_256_KEY_SIZE; in tls_set_sw_offload()
2315 keysize = TLS_CIPHER_AES_CCM_128_KEY_SIZE; in tls_set_sw_offload()
2377 rc = crypto_aead_setkey(*aead, key, keysize); in tls_set_sw_offload()
/Linux-v5.4/arch/x86/platform/efi/
Dquirks.c73 u32 keysize; member

12