| /linux/drivers/s390/crypto/ |
| H A D | pkey_pckmo.c | 71 int keysize, rc = -EINVAL; in pckmo_clr2protkey() local 124 keysize = pkey_keytype_to_size(keytype); in pckmo_clr2protkey() 127 if (clrkeylen && clrkeylen < keysize) { in pckmo_clr2protkey() 129 __func__, clrkeylen, keysize); in pckmo_clr2protkey() 132 if (*protkeylen < keysize + AES_WK_VP_SIZE) { in pckmo_clr2protkey() 134 __func__, *protkeylen, keysize + AES_WK_VP_SIZE); in pckmo_clr2protkey() 157 memcpy(paramblock, clrkey, keysize); in pckmo_clr2protkey() 163 *protkeylen = keysize + AES_WK_VP_SIZE; in pckmo_clr2protkey() 182 int keysize, rc = -EINVAL; in pckmo_verify_protkey() local 186 keysize = pkey_keytype_to_size(protkeytype); in pckmo_verify_protkey() [all …]
|
| H A D | pkey_sysfs.c | 423 u32 keysize = CCACIPHERTOKENSIZE; in pkey_ccacipher_aes_attr_read() local 432 memset(buf, 0, is_xts ? 2 * keysize : keysize); in pkey_ccacipher_aes_attr_read() 436 buf, &keysize, NULL); in pkey_ccacipher_aes_attr_read() 441 keysize = CCACIPHERTOKENSIZE; in pkey_ccacipher_aes_attr_read() 446 buf, &keysize, NULL); in pkey_ccacipher_aes_attr_read() 538 u32 keysize = MAXEP11AESKEYBLOBSIZE; in pkey_ep11_aes_attr_read() local 547 memset(buf, 0, is_xts ? 2 * keysize : keysize); in pkey_ep11_aes_attr_read() 551 buf, &keysize, NULL); in pkey_ep11_aes_attr_read() 556 keysize = MAXEP11AESKEYBLOBSIZE; in pkey_ep11_aes_attr_read() 561 buf, &keysize, NULL); in pkey_ep11_aes_attr_read()
|
| H A D | zcrypt_ccamisc.c | 191 const u8 *token, u32 keysize, in cca_check_sececckeytoken() argument 204 if (t->len > keysize) { in cca_check_sececckeytoken() 207 __func__, (int)t->len, keysize); in cca_check_sececckeytoken() 323 int i, rc, keysize; in cca_genseckey() local 380 keysize = 16; in cca_genseckey() 385 keysize = 24; in cca_genseckey() 390 keysize = 32; in cca_genseckey() 446 prepparm->lv3.keyblock.tok, 8 * keysize); in cca_genseckey() 467 int rc, keysize, seckeysize; in cca_clr2seckey() local 522 keysize = 16; in cca_clr2seckey() [all …]
|
| H A D | pkey_ep11.c | 513 u32 tmplen, keysize = 0; in ep11_slowpath_key2protkey() local 521 keysize = pkey_keytype_aes_to_size(t->keytype); in ep11_slowpath_key2protkey() 522 if (!keysize || t->len != keysize) in ep11_slowpath_key2protkey() 529 8 * keysize, 0, t->clearkey, t->len, in ep11_slowpath_key2protkey()
|
| H A D | pkey_cca.c | 567 u32 tmplen, keysize = 0; in cca_slowpath_key2protkey() local 575 keysize = pkey_keytype_aes_to_size(t->keytype); in cca_slowpath_key2protkey() 576 if (!keysize || t->len != keysize) in cca_slowpath_key2protkey() 583 8 * keysize, 0, t->clearkey, t->len, in cca_slowpath_key2protkey()
|
| H A D | zcrypt_ccamisc.h | 54 u16 keysize; /* key byte size */ member 157 const u8 *token, u32 keysize,
|
| H A D | zcrypt_ep11misc.c | 925 const u8 *key, size_t keysize, in ep11_cryptsingle() argument 961 if (keysize > 0xFFFF || inbufsize > 0xFFFF) in ep11_cryptsingle() 966 + ASN1TAGLEN(keysize) + ASN1TAGLEN(inbufsize); in ep11_cryptsingle() 984 p += asn1tag_write(p, 0x04, key, keysize); in ep11_cryptsingle() 1235 const u8 *key, size_t keysize, in _ep11_wrapkey() argument 1273 + ASN1TAGLEN(keysize) + 4; in _ep11_wrapkey() 1295 p += asn1tag_write(p, 0x04, key, keysize); in _ep11_wrapkey()
|
| /linux/fs/crypto/ |
| H A D | keysetup.c | 21 .keysize = 64, 29 .keysize = 32, 36 .keysize = 16, 44 .keysize = 16, 51 .keysize = 32, 59 .keysize = 16, 66 .keysize = 32, 74 .keysize = 32, 136 err = crypto_sync_skcipher_setkey(tfm, raw_key, mode->keysize); in fscrypt_allocate_skcipher() 160 ci->ci_mode->keysize, in fscrypt_prepare_key() [all …]
|
| H A D | keysetup_v1.c | 197 if (crypto_memneq(raw_key, dk->dk_raw, ci->ci_mode->keysize)) in find_or_insert_direct_key() 235 memcpy(dk->dk_raw, raw_key, ci->ci_mode->keysize); in fscrypt_get_direct_key() 269 derived_key = kmalloc(ci->ci_mode->keysize, GFP_KERNEL); in setup_v1_file_key_derived() 274 derived_key, ci->ci_mode->keysize); in setup_v1_file_key_derived() 303 ci->ci_mode->keysize, &payload); in fscrypt_setup_v1_file_key_via_subscribed_keyrings() 307 ci->ci_mode->keysize, &payload); in fscrypt_setup_v1_file_key_via_subscribed_keyrings()
|
| /linux/crypto/ |
| H A D | chacha.c | 21 const u8 *key, unsigned int keysize, int nrounds) in chacha_setkey() argument 26 if (keysize != CHACHA_KEY_SIZE) in chacha_setkey() 37 const u8 *key, unsigned int keysize) in chacha20_setkey() argument 39 return chacha_setkey(tfm, key, keysize, 20); in chacha20_setkey() 43 const u8 *key, unsigned int keysize) in chacha12_setkey() argument 45 return chacha_setkey(tfm, key, keysize, 12); in chacha12_setkey()
|
| H A D | tcrypt.c | 246 unsigned int aad_size, u8 *keysize, u32 num_mb) in test_mb_aead_speed() argument 347 *keysize * 8, bs); in test_mb_aead_speed() 354 if (template[j].klen == *keysize) { in test_mb_aead_speed() 362 ret = crypto_aead_setkey(tfm, key, *keysize); in test_mb_aead_speed() 430 keysize++; in test_mb_aead_speed() 431 } while (*keysize); in test_mb_aead_speed() 521 unsigned int aad_size, u8 *keysize) in test_aead_speed() argument 603 if ((*keysize + bs) > TVMEMSIZE * PAGE_SIZE) { in test_aead_speed() 605 *keysize + bs, in test_aead_speed() 612 if (template[j].klen == *keysize) { in test_aead_speed() [all …]
|
| /linux/tools/testing/selftests/bpf/map_tests/ |
| H A D | lpm_trie_map_basic_ops.c | 226 static void test_lpm_map(int keysize) in test_lpm_map() argument 246 data = alloca(keysize); in test_lpm_map() 247 memset(data, 0, keysize); in test_lpm_map() 249 value = alloca(keysize + 1); in test_lpm_map() 250 memset(value, 0, keysize + 1); in test_lpm_map() 252 key = alloca(sizeof(*key) + keysize); in test_lpm_map() 253 memset(key, 0, sizeof(*key) + keysize); in test_lpm_map() 256 sizeof(*key) + keysize, in test_lpm_map() 257 keysize + 1, in test_lpm_map() 263 for (j = 0; j < keysize; ++j) in test_lpm_map() [all …]
|
| /linux/block/ |
| H A D | blk-crypto.c | 25 .keysize = 64, 32 .keysize = 16, 39 .keysize = 32, 46 .keysize = 32, 88 BUG_ON(blk_crypto_modes[i].keysize > in bio_crypt_ctx_init() 91 blk_crypto_modes[i].keysize); in bio_crypt_ctx_init() 324 if (key_size != mode->keysize) in blk_crypto_init_key()
|
| H A D | blk-crypto-internal.h | 16 unsigned int keysize; /* key size in bytes */ member
|
| /linux/fs/befs/ |
| H A D | btree.c | 411 loff_t key_no, size_t bufsize, char *keybuf, size_t * keysize, in befs_btree_read() argument 449 *keysize = 0; in befs_btree_read() 462 *keysize = 0; in befs_btree_read() 504 *keysize = keylen; in befs_btree_read() 520 *keysize = 0; in befs_btree_read()
|
| H A D | btree.h | 12 size_t *keysize, befs_off_t *value);
|
| H A D | linuxvfs.c | 224 size_t keysize; in befs_readdir() local 232 keybuf, &keysize, &value); in befs_readdir() 255 befs_utf2nls(sb, keybuf, keysize, &nlsname, in befs_readdir() 268 if (!dir_emit(ctx, keybuf, keysize, in befs_readdir()
|
| /linux/fs/afs/ |
| H A D | cm_security.c | 188 size_t keysize, uuidsize, authsize, toksize, encsize, contsize, adatasize, offset; in afs_create_yfs_cm_token() local 216 keysize = 4 + xdr_len_object(conn_krb5->key_len); in afs_create_yfs_cm_token() 237 toksize = keysize + 8 + 4 + 4 + 8 + xdr_len_object(authsize); in afs_create_yfs_cm_token()
|
| /linux/drivers/crypto/ |
| H A D | hifn_795x.c | 600 unsigned int keysize; member 1127 if (ctx->keysize) in hifn_setup_cmd_desc() 1151 if (ctx->keysize != 16) in hifn_setup_cmd_desc() 1157 if (ctx->keysize != 24) in hifn_setup_cmd_desc() 1163 if (ctx->keysize != 32) in hifn_setup_cmd_desc() 1169 if (ctx->keysize != 24) in hifn_setup_cmd_desc() 1174 if (ctx->keysize != 8) in hifn_setup_cmd_desc() 1183 nbytes, nbytes, ctx->key, ctx->keysize, in hifn_setup_cmd_desc() 1569 ctx->key, ctx->keysize, in hifn_setup_session() 1938 ctx->keysize = len; in hifn_setkey() [all …]
|
| /linux/include/crypto/ |
| H A D | gcm.h | 74 unsigned int keysize, unsigned int authsize);
|
| /linux/drivers/net/ethernet/sfc/ |
| H A D | tc_encap_actions.c | 526 size_t keysize; in efx_neigh_event() local 532 keysize = sizeof(keys.dst_ip); in efx_neigh_event() 536 keysize = sizeof(keys.dst_ip6); in efx_neigh_event() 546 if (n->tbl->key_len != keysize) { in efx_neigh_event()
|
| /linux/lib/crypto/ |
| H A D | aesgcm.c | 46 unsigned int keysize, unsigned int authsize) in aesgcm_expandkey() argument 52 aes_prepareenckey(&ctx->aes_key, key, keysize); in aesgcm_expandkey()
|
| /linux/drivers/char/tpm/ |
| H A D | tpm-sysfs.c | 24 __be32 keysize; member 69 be32_to_cpu(out->keysize)); in pubek_show()
|
| /linux/arch/s390/include/uapi/asm/ |
| H A D | pkey.h | 202 __u16 keysize; /* out: key size in bits */ member
|
| /linux/drivers/input/keyboard/ |
| H A D | lm8323.c | 324 int keysize = (lm->size_x << 4) | lm->size_y; in lm8323_configure() local 338 lm8323_write(lm, 2, LM8323_CMD_SET_KEY_SIZE, keysize); in lm8323_configure()
|