Lines Matching refs:size
139 * @authsize: authentication tag size (max = 16)
344 /* Check if key size is correct */
666 * @crypto_ctx_size: size of crypto context for callback
1032 * Return: the header size if the building is successful, otherwise < 0
2239 u16 size, cong_link_cnt;
2243 size = tipc_aead_key_size(skey);
2244 skb = tipc_buf_acquire(INT_H_SIZE + size, GFP_ATOMIC);
2251 msg_set_size(hdr, INT_H_SIZE + size);
2287 u32 size = msg_data_sz(hdr);
2291 /* Verify whether the size can exist in the packet */
2292 if (unlikely(size < sizeof(struct tipc_aead_key) + TIPC_AEAD_KEYLEN_MIN)) {
2293 pr_debug("%s: message data size is too small\n", rx->name);
2299 /* Verify the supplied size values */
2300 if (unlikely(size != keylen + sizeof(struct tipc_aead_key) ||
2302 pr_debug("%s: invalid MSG_CRYPTO key size\n", rx->name);
2314 skey = kmalloc(size, GFP_ATOMIC);