Home
last modified time | relevance | path

Searched refs:keysize (Results 1 – 25 of 33) sorted by relevance

12

/linux-6.12.1/drivers/s390/crypto/
Dpkey_pckmo.c87 int keysize, rc = -EINVAL; in pckmo_clr2protkey() local
95 keysize = 16; in pckmo_clr2protkey()
101 keysize = 24; in pckmo_clr2protkey()
107 keysize = 32; in pckmo_clr2protkey()
113 keysize = 32; in pckmo_clr2protkey()
119 keysize = 48; in pckmo_clr2protkey()
125 keysize = 80; in pckmo_clr2protkey()
131 keysize = 32; in pckmo_clr2protkey()
137 keysize = 64; in pckmo_clr2protkey()
143 keysize = 32; in pckmo_clr2protkey()
[all …]
Dpkey_sysfs.c425 u32 keysize = CCACIPHERTOKENSIZE; in pkey_ccacipher_aes_attr_read() local
434 memset(buf, 0, is_xts ? 2 * keysize : keysize); in pkey_ccacipher_aes_attr_read()
438 buf, &keysize, NULL); in pkey_ccacipher_aes_attr_read()
443 keysize = CCACIPHERTOKENSIZE; in pkey_ccacipher_aes_attr_read()
448 buf, &keysize, NULL); in pkey_ccacipher_aes_attr_read()
540 u32 keysize = MAXEP11AESKEYBLOBSIZE; in pkey_ep11_aes_attr_read() local
549 memset(buf, 0, is_xts ? 2 * keysize : keysize); in pkey_ep11_aes_attr_read()
553 buf, &keysize, NULL); in pkey_ep11_aes_attr_read()
558 keysize = MAXEP11AESKEYBLOBSIZE; in pkey_ep11_aes_attr_read()
563 buf, &keysize, NULL); in pkey_ep11_aes_attr_read()
Dzcrypt_ccamisc.c175 const u8 *token, u32 keysize, in cca_check_sececckeytoken() argument
188 if (t->len > keysize) { in cca_check_sececckeytoken()
191 __func__, (int)t->len, keysize); in cca_check_sececckeytoken()
295 int i, rc, keysize; in cca_genseckey() local
351 keysize = 16; in cca_genseckey()
356 keysize = 24; in cca_genseckey()
361 keysize = 32; in cca_genseckey()
417 prepparm->lv3.keyblock.tok, 8 * keysize); in cca_genseckey()
438 int rc, keysize, seckeysize; in cca_clr2seckey() local
492 keysize = 16; in cca_clr2seckey()
[all …]
Dpkey_ep11.c508 u32 tmplen, keysize = 0; in ep11_slowpath_key2protkey() local
517 keysize = pkey_keytype_aes_to_size(t->keytype); in ep11_slowpath_key2protkey()
518 if (!keysize || t->len != keysize) in ep11_slowpath_key2protkey()
530 8 * keysize, 0, t->clearkey, t->len, in ep11_slowpath_key2protkey()
Dpkey_cca.c559 u32 tmplen, keysize = 0; in cca_slowpath_key2protkey() local
568 keysize = pkey_keytype_aes_to_size(t->keytype); in cca_slowpath_key2protkey()
569 if (!keysize || t->len != keysize) in cca_slowpath_key2protkey()
581 8 * keysize, 0, t->clearkey, t->len, in cca_slowpath_key2protkey()
Dzcrypt_ccamisc.h53 u16 keysize; /* key byte size */ member
156 const u8 *token, u32 keysize,
Dzcrypt_ep11misc.c974 const u8 *key, size_t keysize, in ep11_cryptsingle() argument
1009 if (keysize > 0xFFFF || inbufsize > 0xFFFF) in ep11_cryptsingle()
1014 + ASN1TAGLEN(keysize) + ASN1TAGLEN(inbufsize); in ep11_cryptsingle()
1032 p += asn1tag_write(p, 0x04, key, keysize); in ep11_cryptsingle()
1291 const u8 *key, size_t keysize, in _ep11_wrapkey() argument
1329 + ASN1TAGLEN(keysize) + 4; in _ep11_wrapkey()
1351 p += asn1tag_write(p, 0x04, key, keysize); in _ep11_wrapkey()
/linux-6.12.1/include/crypto/internal/
Dchacha.h16 unsigned int keysize, int nrounds) in chacha_setkey() argument
21 if (keysize != CHACHA_KEY_SIZE) in chacha_setkey()
32 unsigned int keysize) in chacha20_setkey() argument
34 return chacha_setkey(tfm, key, keysize, 20); in chacha20_setkey()
38 unsigned int keysize) in chacha12_setkey() argument
40 return chacha_setkey(tfm, key, keysize, 12); in chacha12_setkey()
/linux-6.12.1/tools/testing/selftests/bpf/
Dtest_lpm_map.c208 static void test_lpm_map(int keysize) in test_lpm_map() argument
228 data = alloca(keysize); in test_lpm_map()
229 memset(data, 0, keysize); in test_lpm_map()
231 value = alloca(keysize + 1); in test_lpm_map()
232 memset(value, 0, keysize + 1); in test_lpm_map()
234 key = alloca(sizeof(*key) + keysize); in test_lpm_map()
235 memset(key, 0, sizeof(*key) + keysize); in test_lpm_map()
238 sizeof(*key) + keysize, in test_lpm_map()
239 keysize + 1, in test_lpm_map()
245 for (j = 0; j < keysize; ++j) in test_lpm_map()
[all …]
/linux-6.12.1/block/
Dblk-crypto.c25 .keysize = 64,
31 .keysize = 16,
37 .keysize = 32,
43 .keysize = 32,
81 BUG_ON(blk_crypto_modes[i].keysize > BLK_CRYPTO_MAX_KEY_SIZE); in bio_crypt_ctx_init()
341 if (mode->keysize == 0) in blk_crypto_init_key()
354 blk_key->size = mode->keysize; in blk_crypto_init_key()
355 memcpy(blk_key->raw, raw_key, mode->keysize); in blk_crypto_init_key()
Dblk-crypto-internal.h16 unsigned int keysize; /* key size in bytes */ member
/linux-6.12.1/fs/crypto/
Dkeysetup.c20 .keysize = 64,
28 .keysize = 32,
35 .keysize = 16,
43 .keysize = 16,
50 .keysize = 32,
58 .keysize = 16,
65 .keysize = 32,
73 .keysize = 32,
133 err = crypto_skcipher_setkey(tfm, raw_key, mode->keysize); in fscrypt_allocate_skcipher()
228 mode_key, mode->keysize); in setup_per_mode_enc_key()
[all …]
Dkeysetup_v1.c206 if (crypto_memneq(raw_key, dk->dk_raw, ci->ci_mode->keysize)) in find_or_insert_direct_key()
244 memcpy(dk->dk_raw, raw_key, ci->ci_mode->keysize); in fscrypt_get_direct_key()
278 derived_key = kmalloc(ci->ci_mode->keysize, GFP_KERNEL); in setup_v1_file_key_derived()
283 derived_key, ci->ci_mode->keysize); in setup_v1_file_key_derived()
312 ci->ci_mode->keysize, &payload); in fscrypt_setup_v1_file_key_via_subscribed_keyrings()
316 ci->ci_mode->keysize, &payload); in fscrypt_setup_v1_file_key_via_subscribed_keyrings()
Dfscrypt_private.h643 int keysize; /* key size in bytes */ member
/linux-6.12.1/crypto/
Dtcrypt.c246 unsigned int aad_size, u8 *keysize, u32 num_mb) in test_mb_aead_speed() argument
347 *keysize * 8, bs); in test_mb_aead_speed()
354 if (template[j].klen == *keysize) { in test_mb_aead_speed()
362 ret = crypto_aead_setkey(tfm, key, *keysize); in test_mb_aead_speed()
430 keysize++; in test_mb_aead_speed()
431 } while (*keysize); in test_mb_aead_speed()
521 unsigned int aad_size, u8 *keysize) in test_aead_speed() argument
603 if ((*keysize + bs) > TVMEMSIZE * PAGE_SIZE) { in test_aead_speed()
605 *keysize + bs, in test_aead_speed()
612 if (template[j].klen == *keysize) { in test_aead_speed()
[all …]
/linux-6.12.1/fs/befs/
Dbtree.c412 loff_t key_no, size_t bufsize, char *keybuf, size_t * keysize, in befs_btree_read() argument
450 *keysize = 0; in befs_btree_read()
463 *keysize = 0; in befs_btree_read()
505 *keysize = keylen; in befs_btree_read()
521 *keysize = 0; in befs_btree_read()
Dbtree.h12 size_t *keysize, befs_off_t *value);
Dlinuxvfs.c223 size_t keysize; in befs_readdir() local
231 keybuf, &keysize, &value); in befs_readdir()
254 befs_utf2nls(sb, keybuf, keysize, &nlsname, in befs_readdir()
267 if (!dir_emit(ctx, keybuf, keysize, in befs_readdir()
/linux-6.12.1/drivers/crypto/
Dhifn_795x.c600 unsigned int keysize; member
1128 if (ctx->keysize) in hifn_setup_cmd_desc()
1152 if (ctx->keysize != 16) in hifn_setup_cmd_desc()
1158 if (ctx->keysize != 24) in hifn_setup_cmd_desc()
1164 if (ctx->keysize != 32) in hifn_setup_cmd_desc()
1170 if (ctx->keysize != 24) in hifn_setup_cmd_desc()
1175 if (ctx->keysize != 8) in hifn_setup_cmd_desc()
1184 nbytes, nbytes, ctx->key, ctx->keysize, in hifn_setup_cmd_desc()
1570 ctx->key, ctx->keysize, in hifn_setup_session()
1939 ctx->keysize = len; in hifn_setkey()
[all …]
/linux-6.12.1/include/crypto/
Dgcm.h74 unsigned int keysize, unsigned int authsize);
/linux-6.12.1/lib/crypto/
Daesgcm.c47 unsigned int keysize, unsigned int authsize) in aesgcm_expandkey() argument
53 aes_expandkey(&ctx->aes_ctx, key, keysize); in aesgcm_expandkey()
/linux-6.12.1/drivers/net/ethernet/sfc/
Dtc_encap_actions.c524 size_t keysize; in efx_neigh_event() local
530 keysize = sizeof(keys.dst_ip); in efx_neigh_event()
534 keysize = sizeof(keys.dst_ip6); in efx_neigh_event()
544 if (n->tbl->key_len != keysize) { in efx_neigh_event()
/linux-6.12.1/drivers/char/tpm/
Dtpm-sysfs.c24 __be32 keysize; member
69 be32_to_cpu(out->keysize)); in pubek_show()
/linux-6.12.1/arch/s390/include/uapi/asm/
Dpkey.h195 __u16 keysize; /* out: key size in bits */ member
/linux-6.12.1/drivers/input/keyboard/
Dlm8323.c323 int keysize = (lm->size_x << 4) | lm->size_y; in lm8323_configure() local
337 lm8323_write(lm, 2, LM8323_CMD_SET_KEY_SIZE, keysize); in lm8323_configure()

12