Lines Matching defs:key_size

200 	unsigned int key_size;
455 int subkey_size = cc->key_size / cc->key_parts;
587 if (cc->key_size <= (cc->iv_size + TCW_WHITENING_SIZE)) {
613 int key_offset = cc->key_size - cc->iv_size - TCW_WHITENING_SIZE;
1037 int key_offset = cc->key_size - cc->key_extra_size;
2348 return (cc->key_size - cc->key_extra_size) >> ilog2(cc->tfms_count);
2435 if (cc->key_size != ukp->datalen)
2438 memcpy(cc->key, ukp->data, cc->key_size);
2452 if (cc->key_size != ekp->decrypted_datalen)
2455 memcpy(cc->key, ekp->decrypted_data, cc->key_size);
2578 /* Hyphen (which gives a key_size of zero) means there is no key. */
2579 if (!cc->key_size && strcmp(key, "-"))
2596 if (cc->key_size && hex2bin(cc->key, key, cc->key_size) < 0)
2615 get_random_bytes(&cc->key, cc->key_size);
2627 memset(&cc->key, 0, cc->key_size * sizeof(u8));
2763 cc->key_extra_size = cc->key_size / 2;
2775 if (cc->key_size % cc->key_parts) {
2777 cc->key_extra_size = cc->key_size / cc->key_parts;
3043 memset(cc->key, 0, cc->key_size * sizeof(u8));
3144 * <cipher> [<key>|:<key_size>:<user|logon>:<key_description>] <iv_offset> <dev_path> <start>
3150 int key_size;
3162 key_size = get_key_size(&argv[1]);
3163 if (key_size < 0) {
3168 cc = kzalloc(struct_size(cc, key, key_size), GFP_KERNEL);
3173 cc->key_size = key_size;
3431 if (cc->key_size > 0) {
3433 DMEMIT(":%u:%s", cc->key_size, cc->key_string);
3435 for (i = 0; i < cc->key_size; i++) {
3513 int key_size, ret = -EINVAL;
3525 key_size = get_key_size(&argv[2]);
3526 if (key_size < 0 || cc->key_size != key_size) {
3538 memset(cc->key, 0, cc->key_size * sizeof(u8));