Home
last modified time | relevance | path

Searched refs:keysize (Results 1 – 18 of 18) sorted by relevance

/linux/fs/crypto/
H A Dkeysetup.c21 .keysize = 64,
29 .keysize = 32,
36 .keysize = 16,
44 .keysize = 16,
51 .keysize = 32,
59 .keysize = 16,
66 .keysize = 32,
74 .keysize = 32,
136 err = crypto_sync_skcipher_setkey(tfm, raw_key, mode->keysize); in fscrypt_allocate_skcipher()
160 ci->ci_mode->keysize, in fscrypt_prepare_key()
[all …]
H A Dkeysetup_v1.c197 if (crypto_memneq(raw_key, dk->dk_raw, ci->ci_mode->keysize)) in find_or_insert_direct_key()
235 memcpy(dk->dk_raw, raw_key, ci->ci_mode->keysize); in fscrypt_get_direct_key()
269 derived_key = kmalloc(ci->ci_mode->keysize, GFP_KERNEL); in setup_v1_file_key_derived()
274 derived_key, ci->ci_mode->keysize); in setup_v1_file_key_derived()
303 ci->ci_mode->keysize, &payload); in fscrypt_setup_v1_file_key_via_subscribed_keyrings()
307 ci->ci_mode->keysize, &payload); in fscrypt_setup_v1_file_key_via_subscribed_keyrings()
H A Dfscrypt_private.h709 int keysize; /* key size in bytes */ member
/linux/crypto/
H A Dchacha.c21 const u8 *key, unsigned int keysize, int nrounds) in chacha_setkey() argument
26 if (keysize != CHACHA_KEY_SIZE) in chacha_setkey()
37 const u8 *key, unsigned int keysize) in chacha20_setkey() argument
39 return chacha_setkey(tfm, key, keysize, 20); in chacha20_setkey()
43 const u8 *key, unsigned int keysize) in chacha12_setkey() argument
45 return chacha_setkey(tfm, key, keysize, 12); in chacha12_setkey()
H A Dtcrypt.c246 unsigned int aad_size, u8 *keysize, u32 num_mb) in test_mb_aead_speed() argument
347 *keysize * 8, bs); in test_mb_aead_speed()
354 if (template[j].klen == *keysize) { in test_mb_aead_speed()
362 ret = crypto_aead_setkey(tfm, key, *keysize); in test_mb_aead_speed()
430 keysize++; in test_mb_aead_speed()
431 } while (*keysize); in test_mb_aead_speed()
521 unsigned int aad_size, u8 *keysize) in test_aead_speed() argument
603 if ((*keysize + bs) > TVMEMSIZE * PAGE_SIZE) { in test_aead_speed()
605 *keysize + bs, in test_aead_speed()
612 if (template[j].klen == *keysize) { in test_aead_speed()
[all …]
/linux/tools/testing/selftests/bpf/map_tests/
H A Dlpm_trie_map_basic_ops.c226 static void test_lpm_map(int keysize) in test_lpm_map() argument
246 data = alloca(keysize); in test_lpm_map()
247 memset(data, 0, keysize); in test_lpm_map()
249 value = alloca(keysize + 1); in test_lpm_map()
250 memset(value, 0, keysize + 1); in test_lpm_map()
252 key = alloca(sizeof(*key) + keysize); in test_lpm_map()
253 memset(key, 0, sizeof(*key) + keysize); in test_lpm_map()
256 sizeof(*key) + keysize, in test_lpm_map()
257 keysize + 1, in test_lpm_map()
263 for (j = 0; j < keysize; ++j) in test_lpm_map()
[all …]
/linux/block/
H A Dblk-crypto.c25 .keysize = 64,
32 .keysize = 16,
39 .keysize = 32,
46 .keysize = 32,
88 BUG_ON(blk_crypto_modes[i].keysize > in bio_crypt_ctx_init()
91 blk_crypto_modes[i].keysize); in bio_crypt_ctx_init()
356 if (key_size != mode->keysize) in blk_crypto_init_key()
H A Dblk-crypto-internal.h16 unsigned int keysize; /* key size in bytes */ member
/linux/fs/befs/
H A Dbtree.c412 loff_t key_no, size_t bufsize, char *keybuf, size_t * keysize, in befs_btree_read() argument
450 *keysize = 0; in befs_btree_read()
463 *keysize = 0; in befs_btree_read()
505 *keysize = keylen; in befs_btree_read()
521 *keysize = 0; in befs_btree_read()
H A Dbtree.h12 size_t *keysize, befs_off_t *value);
H A Dlinuxvfs.c222 size_t keysize; in befs_readdir() local
230 keybuf, &keysize, &value); in befs_readdir()
253 befs_utf2nls(sb, keybuf, keysize, &nlsname, in befs_readdir()
266 if (!dir_emit(ctx, keybuf, keysize, in befs_readdir()
/linux/drivers/crypto/
H A Dhifn_795x.c600 unsigned int keysize; member
1127 if (ctx->keysize) in hifn_setup_cmd_desc()
1151 if (ctx->keysize != 16) in hifn_setup_cmd_desc()
1157 if (ctx->keysize != 24) in hifn_setup_cmd_desc()
1163 if (ctx->keysize != 32) in hifn_setup_cmd_desc()
1169 if (ctx->keysize != 24) in hifn_setup_cmd_desc()
1174 if (ctx->keysize != 8) in hifn_setup_cmd_desc()
1183 nbytes, nbytes, ctx->key, ctx->keysize, in hifn_setup_cmd_desc()
1569 ctx->key, ctx->keysize, in hifn_setup_session()
1938 ctx->keysize = len; in hifn_setkey()
[all …]
/linux/include/crypto/
H A Dgcm.h74 unsigned int keysize, unsigned int authsize);
/linux/lib/crypto/
H A Daesgcm.c46 unsigned int keysize, unsigned int authsize) in aesgcm_expandkey() argument
52 aes_expandkey(&ctx->aes_ctx, key, keysize); in aesgcm_expandkey()
/linux/drivers/char/tpm/
H A Dtpm-sysfs.c24 __be32 keysize; member
69 be32_to_cpu(out->keysize)); in pubek_show()
/linux/arch/s390/include/uapi/asm/
H A Dpkey.h202 __u16 keysize; /* out: key size in bits */ member
/linux/net/key/
H A Daf_key.c1169 int keysize = 0; in pfkey_msg2xfrm_state() local
1176 keysize = (key->sadb_key_bits + 7) / 8; in pfkey_msg2xfrm_state()
1177 x->aalg = kmalloc(sizeof(*x->aalg) + keysize, GFP_KERNEL); in pfkey_msg2xfrm_state()
1186 memcpy(x->aalg->alg_key, key+1, keysize); in pfkey_msg2xfrm_state()
1207 int keysize = 0; in pfkey_msg2xfrm_state() local
1215 keysize = (key->sadb_key_bits + 7) / 8; in pfkey_msg2xfrm_state()
1216 x->ealg = kmalloc(sizeof(*x->ealg) + keysize, GFP_KERNEL); in pfkey_msg2xfrm_state()
1225 memcpy(x->ealg->alg_key, key+1, keysize); in pfkey_msg2xfrm_state()
/linux/drivers/net/ethernet/marvell/octeontx2/af/
H A Drvu_npc.c179 if (mcam->keysize == NPC_MCAM_KEY_X2) in npc_get_bank()
1846 mcam->keysize = cfg; in npc_mcam_rsrcs_init()