Lines Matching refs:key_size
207 unsigned int key_size;
463 int subkey_size = cc->key_size / cc->key_parts;
595 if (cc->key_size <= (cc->iv_size + TCW_WHITENING_SIZE)) {
621 int key_offset = cc->key_size - cc->iv_size - TCW_WHITENING_SIZE;
1052 int key_offset = cc->key_size - cc->key_extra_size;
2416 return (cc->key_size - cc->key_extra_size) >> ilog2(cc->tfms_count);
2503 if (cc->key_size != ukp->datalen)
2506 memcpy(cc->key, ukp->data, cc->key_size);
2519 if (cc->key_size != ekp->decrypted_datalen)
2522 memcpy(cc->key, ekp->decrypted_data, cc->key_size);
2535 if (cc->key_size != tkp->key_len)
2538 memcpy(cc->key, tkp->key, cc->key_size);
2663 /* Hyphen (which gives a key_size of zero) means there is no key. */
2664 if (!cc->key_size && strcmp(key, "-"))
2681 if (cc->key_size && hex2bin(cc->key, key, cc->key_size) < 0)
2700 get_random_bytes(&cc->key, cc->key_size);
2712 memset(&cc->key, 0, cc->key_size * sizeof(u8));
2850 cc->key_extra_size = cc->key_size / 2;
2862 if (cc->key_size % cc->key_parts) {
2864 cc->key_extra_size = cc->key_size / cc->key_parts;
3130 memset(cc->key, 0, cc->key_size * sizeof(u8));
3230 * <cipher> [<key>|:<key_size>:<user|logon>:<key_description>] <iv_offset> <dev_path> <start>
3236 int key_size;
3248 key_size = get_key_size(&argv[1]);
3249 if (key_size < 0) {
3254 cc = kzalloc(struct_size(cc, key, key_size), GFP_KERNEL);
3259 cc->key_size = key_size;
3536 if (cc->key_size > 0) {
3538 DMEMIT(":%u:%s", cc->key_size, cc->key_string);
3540 for (i = 0; i < cc->key_size; i++) {
3602 DMEMIT(",key_size=%u", cc->key_size);
3645 int key_size, ret = -EINVAL;
3657 key_size = get_key_size(&argv[2]);
3658 if (key_size < 0 || cc->key_size != key_size) {
3670 memset(cc->key, 0, cc->key_size * sizeof(u8));