Home
last modified time | relevance | path

Searched refs:keysize (Results 1 – 18 of 18) sorted by relevance

/linux/fs/crypto/
H A Dkeysetup.c21 .keysize = 64,
29 .keysize = 32,
36 .keysize = 16,
44 .keysize = 16,
51 .keysize = 32,
59 .keysize = 16,
66 .keysize = 32,
74 .keysize = 32,
136 err = crypto_sync_skcipher_setkey(tfm, raw_key, mode->keysize); in fscrypt_allocate_skcipher()
160 ci->ci_mode->keysize, in fscrypt_prepare_key()
[all …]
H A Dkeysetup_v1.c197 if (crypto_memneq(raw_key, dk->dk_raw, ci->ci_mode->keysize)) in find_or_insert_direct_key()
235 memcpy(dk->dk_raw, raw_key, ci->ci_mode->keysize); in fscrypt_get_direct_key()
269 derived_key = kmalloc(ci->ci_mode->keysize, GFP_KERNEL); in setup_v1_file_key_derived()
274 derived_key, ci->ci_mode->keysize); in setup_v1_file_key_derived()
303 ci->ci_mode->keysize, &payload); in fscrypt_setup_v1_file_key_via_subscribed_keyrings()
307 ci->ci_mode->keysize, &payload); in fscrypt_setup_v1_file_key_via_subscribed_keyrings()
H A Dfscrypt_private.h709 int keysize; /* key size in bytes */ member
/linux/crypto/
H A Dchacha.c21 const u8 *key, unsigned int keysize, int nrounds) in chacha_setkey() argument
26 if (keysize != CHACHA_KEY_SIZE) in chacha_setkey()
37 const u8 *key, unsigned int keysize) in chacha20_setkey() argument
39 return chacha_setkey(tfm, key, keysize, 20); in chacha20_setkey()
43 const u8 *key, unsigned int keysize) in chacha12_setkey() argument
45 return chacha_setkey(tfm, key, keysize, 12); in chacha12_setkey()
H A Dtcrypt.c246 unsigned int aad_size, u8 *keysize, u32 num_mb) in test_mb_aead_speed() argument
347 *keysize * 8, bs); in test_mb_aead_speed()
354 if (template[j].klen == *keysize) { in test_mb_aead_speed()
362 ret = crypto_aead_setkey(tfm, key, *keysize); in test_mb_aead_speed()
430 keysize++; in test_mb_aead_speed()
431 } while (*keysize); in test_mb_aead_speed()
521 unsigned int aad_size, u8 *keysize) in test_aead_speed() argument
603 if ((*keysize + bs) > TVMEMSIZE * PAGE_SIZE) { in test_aead_speed()
605 *keysize + bs, in test_aead_speed()
612 if (template[j].klen == *keysize) { in test_aead_speed()
[all …]
/linux/tools/testing/selftests/bpf/map_tests/
H A Dlpm_trie_map_basic_ops.c226 static void test_lpm_map(int keysize) in test_lpm_map() argument
246 data = alloca(keysize); in test_lpm_map()
247 memset(data, 0, keysize); in test_lpm_map()
249 value = alloca(keysize + 1); in test_lpm_map()
250 memset(value, 0, keysize + 1); in test_lpm_map()
252 key = alloca(sizeof(*key) + keysize); in test_lpm_map()
253 memset(key, 0, sizeof(*key) + keysize); in test_lpm_map()
256 sizeof(*key) + keysize, in test_lpm_map()
257 keysize + 1, in test_lpm_map()
263 for (j = 0; j < keysize; ++j) in test_lpm_map()
[all …]
/linux/fs/befs/
H A Dbtree.c411 loff_t key_no, size_t bufsize, char *keybuf, size_t * keysize, in befs_btree_read() argument
449 *keysize = 0; in befs_btree_read()
462 *keysize = 0; in befs_btree_read()
504 *keysize = keylen; in befs_btree_read()
520 *keysize = 0; in befs_btree_read()
H A Dbtree.h12 size_t *keysize, befs_off_t *value);
H A Dlinuxvfs.c224 size_t keysize; in befs_readdir() local
232 keybuf, &keysize, &value); in befs_readdir()
255 befs_utf2nls(sb, keybuf, keysize, &nlsname, in befs_readdir()
268 if (!dir_emit(ctx, keybuf, keysize, in befs_readdir()
/linux/drivers/crypto/
H A Dhifn_795x.c600 unsigned int keysize; member
1127 if (ctx->keysize) in hifn_setup_cmd_desc()
1151 if (ctx->keysize != 16) in hifn_setup_cmd_desc()
1157 if (ctx->keysize != 24) in hifn_setup_cmd_desc()
1163 if (ctx->keysize != 32) in hifn_setup_cmd_desc()
1169 if (ctx->keysize != 24) in hifn_setup_cmd_desc()
1174 if (ctx->keysize != 8) in hifn_setup_cmd_desc()
1183 nbytes, nbytes, ctx->key, ctx->keysize, in hifn_setup_cmd_desc()
1569 ctx->key, ctx->keysize, in hifn_setup_session()
1938 ctx->keysize = len; in hifn_setkey()
[all …]
/linux/drivers/net/ethernet/sfc/
H A Dtc_encap_actions.c526 size_t keysize; in efx_neigh_event() local
532 keysize = sizeof(keys.dst_ip); in efx_neigh_event()
536 keysize = sizeof(keys.dst_ip6); in efx_neigh_event()
546 if (n->tbl->key_len != keysize) { in efx_neigh_event()
/linux/lib/crypto/
H A Daesgcm.c39 * @keysize: The length in bytes of the input key
42 * Returns: 0 on success, or -EINVAL if @keysize or @authsize contain values
46 unsigned int keysize, unsigned int authsize) in aesgcm_expandkey() argument
52 aes_prepareenckey(&ctx->aes_key, key, keysize); in aesgcm_expandkey()
/linux/drivers/char/tpm/
H A Dtpm-sysfs.c24 __be32 keysize; member
69 be32_to_cpu(out->keysize)); in pubek_show()
/linux/arch/s390/include/uapi/asm/
H A Dpkey.h202 __u16 keysize; /* out: key size in bits */ member
/linux/net/key/
H A Daf_key.c1169 int keysize = 0; in pfkey_msg2xfrm_state() local
1176 keysize = (key->sadb_key_bits + 7) / 8; in pfkey_msg2xfrm_state()
1177 x->aalg = kmalloc(sizeof(*x->aalg) + keysize, GFP_KERNEL); in pfkey_msg2xfrm_state()
1186 memcpy(x->aalg->alg_key, key+1, keysize); in pfkey_msg2xfrm_state()
1207 int keysize = 0; in pfkey_msg2xfrm_state() local
1215 keysize = (key->sadb_key_bits + 7) / 8; in pfkey_msg2xfrm_state()
1216 x->ealg = kmalloc(sizeof(*x->ealg) + keysize, GFP_KERNEL); in pfkey_msg2xfrm_state()
1225 memcpy(x->ealg->alg_key, key+1, keysize); in pfkey_msg2xfrm_state()
/linux/block/
H A Dblk-crypto-fallback.c102 blk_crypto_modes[crypto_mode].keysize); in blk_crypto_fallback_evict_keyslot()
/linux/drivers/s390/crypto/
H A Dpkey_api.c295 kvk.keysize = (u16)keybitsize; in pkey_ioctl_verifykey()
/linux/drivers/net/ethernet/marvell/octeontx2/af/
H A Drvu_npc.c179 if (mcam->keysize == NPC_MCAM_KEY_X2) in npc_get_bank()
1849 mcam->keysize = cfg; in npc_mcam_rsrcs_init()