/Linux-v6.1/include/crypto/internal/ |
D | chacha.h | 16 unsigned int keysize, int nrounds) in chacha_setkey() argument 21 if (keysize != CHACHA_KEY_SIZE) in chacha_setkey() 32 unsigned int keysize) in chacha20_setkey() argument 34 return chacha_setkey(tfm, key, keysize, 20); in chacha20_setkey() 38 unsigned int keysize) in chacha12_setkey() argument 40 return chacha_setkey(tfm, key, keysize, 12); in chacha12_setkey()
|
/Linux-v6.1/tools/testing/selftests/bpf/ |
D | test_lpm_map.c | 208 static void test_lpm_map(int keysize) in test_lpm_map() argument 228 data = alloca(keysize); in test_lpm_map() 229 memset(data, 0, keysize); in test_lpm_map() 231 value = alloca(keysize + 1); in test_lpm_map() 232 memset(value, 0, keysize + 1); in test_lpm_map() 234 key = alloca(sizeof(*key) + keysize); in test_lpm_map() 235 memset(key, 0, sizeof(*key) + keysize); in test_lpm_map() 238 sizeof(*key) + keysize, in test_lpm_map() 239 keysize + 1, in test_lpm_map() 245 for (j = 0; j < keysize; ++j) in test_lpm_map() [all …]
|
/Linux-v6.1/block/ |
D | blk-crypto.c | 24 .keysize = 64, 30 .keysize = 16, 36 .keysize = 32, 74 BUG_ON(blk_crypto_modes[i].keysize > BLK_CRYPTO_MAX_KEY_SIZE); in bio_crypt_ctx_init() 336 if (mode->keysize == 0) in blk_crypto_init_key() 349 blk_key->size = mode->keysize; in blk_crypto_init_key() 350 memcpy(blk_key->raw, raw_key, mode->keysize); in blk_crypto_init_key()
|
D | blk-crypto-internal.h | 16 unsigned int keysize; /* key size in bytes */ member
|
/Linux-v6.1/fs/crypto/ |
D | keysetup.c | 20 .keysize = 64, 28 .keysize = 32, 35 .keysize = 16, 43 .keysize = 16, 50 .keysize = 32, 58 .keysize = 32, 118 err = crypto_skcipher_setkey(tfm, raw_key, mode->keysize); in fscrypt_allocate_skcipher() 212 mode_key, mode->keysize); in setup_per_mode_enc_key() 216 memzero_explicit(mode_key, mode->keysize); in setup_per_mode_enc_key() 354 derived_key, ci->ci_mode->keysize); in fscrypt_setup_v2_file_key() [all …]
|
D | keysetup_v1.c | 205 if (crypto_memneq(raw_key, dk->dk_raw, ci->ci_mode->keysize)) in find_or_insert_direct_key() 243 memcpy(dk->dk_raw, raw_key, ci->ci_mode->keysize); in fscrypt_get_direct_key() 277 derived_key = kmalloc(ci->ci_mode->keysize, GFP_KERNEL); in setup_v1_file_key_derived() 282 derived_key, ci->ci_mode->keysize); in setup_v1_file_key_derived() 308 ci->ci_mode->keysize, &payload); in fscrypt_setup_v1_file_key_via_subscribed_keyrings() 312 ci->ci_mode->keysize, &payload); in fscrypt_setup_v1_file_key_via_subscribed_keyrings()
|
D | fscrypt_private.h | 591 int keysize; /* key size in bytes */ member
|
/Linux-v6.1/crypto/ |
D | tcrypt.c | 243 unsigned int aad_size, u8 *keysize, u32 num_mb) in test_mb_aead_speed() argument 344 *keysize * 8, bs); in test_mb_aead_speed() 351 if (template[j].klen == *keysize) { in test_mb_aead_speed() 359 ret = crypto_aead_setkey(tfm, key, *keysize); in test_mb_aead_speed() 427 keysize++; in test_mb_aead_speed() 428 } while (*keysize); in test_mb_aead_speed() 518 unsigned int aad_size, u8 *keysize) in test_aead_speed() argument 600 if ((*keysize + bs) > TVMEMSIZE * PAGE_SIZE) { in test_aead_speed() 602 *keysize + bs, in test_aead_speed() 609 if (template[j].klen == *keysize) { in test_aead_speed() [all …]
|
/Linux-v6.1/drivers/s390/crypto/ |
D | pkey_api.c | 95 int keysize; in pkey_clr2protkey() local 100 keysize = 16; in pkey_clr2protkey() 104 keysize = 24; in pkey_clr2protkey() 108 keysize = 32; in pkey_clr2protkey() 131 memcpy(paramblock, clrkey->clrkey, keysize); in pkey_clr2protkey() 138 protkey->len = keysize + 32; in pkey_clr2protkey() 139 memcpy(protkey->protkey, paramblock, keysize + 32); in pkey_clr2protkey() 312 int keysize; in pkey_genprotkey() local 317 keysize = 16; in pkey_genprotkey() 320 keysize = 24; in pkey_genprotkey() [all …]
|
D | zcrypt_ccamisc.c | 180 const u8 *token, size_t keysize, in cca_check_sececckeytoken() argument 193 if (t->len > keysize) { in cca_check_sececckeytoken() 196 __func__, (int)t->len, keysize); in cca_check_sececckeytoken() 300 int i, rc, keysize; in cca_genseckey() local 356 keysize = 16; in cca_genseckey() 361 keysize = 24; in cca_genseckey() 366 keysize = 32; in cca_genseckey() 422 prepparm->lv3.keyblock.tok, 8 * keysize); in cca_genseckey() 443 int rc, keysize, seckeysize; in cca_clr2seckey() local 497 keysize = 16; in cca_clr2seckey() [all …]
|
D | zcrypt_ep11misc.c | 802 const u8 *key, size_t keysize, in ep11_cryptsingle() argument 837 if (keysize > 0xFFFF || inbufsize > 0xFFFF) in ep11_cryptsingle() 842 + ASN1TAGLEN(keysize) + ASN1TAGLEN(inbufsize); in ep11_cryptsingle() 860 p += asn1tag_write(p, 0x04, key, keysize); in ep11_cryptsingle() 1068 const u8 *key, size_t keysize, in ep11_wrapkey() argument 1111 keysize = min_t(size_t, kb->head.len, keysize); in ep11_wrapkey() 1116 + ASN1TAGLEN(keysize) + 4; in ep11_wrapkey() 1137 p += asn1tag_write(p, 0x04, key, keysize); in ep11_wrapkey() 1140 kb = (struct ep11keyblob *)(p - keysize); in ep11_wrapkey()
|
D | zcrypt_ccamisc.h | 53 u16 keysize; /* key byte size */ member 156 const u8 *token, size_t keysize,
|
/Linux-v6.1/fs/befs/ |
D | btree.c | 412 loff_t key_no, size_t bufsize, char *keybuf, size_t * keysize, in befs_btree_read() argument 450 *keysize = 0; in befs_btree_read() 463 *keysize = 0; in befs_btree_read() 505 *keysize = keylen; in befs_btree_read() 521 *keysize = 0; in befs_btree_read()
|
D | btree.h | 12 size_t *keysize, befs_off_t *value);
|
D | linuxvfs.c | 222 size_t keysize; in befs_readdir() local 230 keybuf, &keysize, &value); in befs_readdir() 253 befs_utf2nls(sb, keybuf, keysize, &nlsname, in befs_readdir() 266 if (!dir_emit(ctx, keybuf, keysize, in befs_readdir()
|
/Linux-v6.1/drivers/crypto/ux500/cryp/ |
D | cryp.c | 119 *control_register |= (cryp_config->keysize << CRYP_CR_KEYSIZE_POS); in cryp_set_configuration() 314 switch (config->keysize) { in cryp_save_device_context() 364 switch (config->keysize) { in cryp_restore_device_context()
|
D | cryp.h | 90 int keysize; member
|
D | cryp_core.c | 952 ctx->config.keysize = CRYP_KEY_SIZE_128; in aes_skcipher_setkey() 956 ctx->config.keysize = CRYP_KEY_SIZE_192; in aes_skcipher_setkey() 960 ctx->config.keysize = CRYP_KEY_SIZE_256; in aes_skcipher_setkey()
|
/Linux-v6.1/drivers/crypto/ |
D | hifn_795x.c | 617 unsigned int keysize; member 1145 if (ctx->keysize) in hifn_setup_cmd_desc() 1169 if (ctx->keysize != 16) in hifn_setup_cmd_desc() 1175 if (ctx->keysize != 24) in hifn_setup_cmd_desc() 1181 if (ctx->keysize != 32) in hifn_setup_cmd_desc() 1187 if (ctx->keysize != 24) in hifn_setup_cmd_desc() 1192 if (ctx->keysize != 8) in hifn_setup_cmd_desc() 1201 nbytes, nbytes, ctx->key, ctx->keysize, in hifn_setup_cmd_desc() 1587 ctx->key, ctx->keysize, in hifn_setup_session() 1956 ctx->keysize = len; in hifn_setkey() [all …]
|
/Linux-v6.1/net/tls/ |
D | tls_sw.c | 2475 size_t keysize; in tls_set_sw_offload() local 2540 keysize = TLS_CIPHER_AES_GCM_128_KEY_SIZE; in tls_set_sw_offload() 2557 keysize = TLS_CIPHER_AES_GCM_256_KEY_SIZE; in tls_set_sw_offload() 2574 keysize = TLS_CIPHER_AES_CCM_128_KEY_SIZE; in tls_set_sw_offload() 2591 keysize = TLS_CIPHER_CHACHA20_POLY1305_KEY_SIZE; in tls_set_sw_offload() 2608 keysize = TLS_CIPHER_SM4_GCM_KEY_SIZE; in tls_set_sw_offload() 2625 keysize = TLS_CIPHER_SM4_CCM_KEY_SIZE; in tls_set_sw_offload() 2642 keysize = TLS_CIPHER_ARIA_GCM_128_KEY_SIZE; in tls_set_sw_offload() 2659 keysize = TLS_CIPHER_ARIA_GCM_256_KEY_SIZE; in tls_set_sw_offload() 2722 rc = crypto_aead_setkey(*aead, key, keysize); in tls_set_sw_offload()
|
/Linux-v6.1/drivers/char/tpm/ |
D | tpm-sysfs.c | 24 __be32 keysize; member 69 be32_to_cpu(out->keysize)); in pubek_show()
|
/Linux-v6.1/arch/s390/include/uapi/asm/ |
D | pkey.h | 185 __u16 keysize; /* out: key size in bits */ member
|
/Linux-v6.1/drivers/input/keyboard/ |
D | lm8323.c | 323 int keysize = (lm->size_x << 4) | lm->size_y; in lm8323_configure() local 337 lm8323_write(lm, 2, LM8323_CMD_SET_KEY_SIZE, keysize); in lm8323_configure()
|
/Linux-v6.1/arch/x86/platform/efi/ |
D | quirks.c | 74 u32 keysize; member
|
/Linux-v6.1/net/key/ |
D | af_key.c | 1169 int keysize = 0; in pfkey_msg2xfrm_state() local 1176 keysize = (key->sadb_key_bits + 7) / 8; in pfkey_msg2xfrm_state() 1177 x->aalg = kmalloc(sizeof(*x->aalg) + keysize, GFP_KERNEL); in pfkey_msg2xfrm_state() 1186 memcpy(x->aalg->alg_key, key+1, keysize); in pfkey_msg2xfrm_state() 1207 int keysize = 0; in pfkey_msg2xfrm_state() local 1215 keysize = (key->sadb_key_bits + 7) / 8; in pfkey_msg2xfrm_state() 1216 x->ealg = kmalloc(sizeof(*x->ealg) + keysize, GFP_KERNEL); in pfkey_msg2xfrm_state() 1225 memcpy(x->ealg->alg_key, key+1, keysize); in pfkey_msg2xfrm_state()
|