Home
last modified time | relevance | path

Searched refs:keysize (Results 1 - 25 of 61) sorted by relevance

123

/kernel/linux/linux-5.10/include/crypto/internal/
H A Dchacha.h16 unsigned int keysize, int nrounds) in chacha_setkey()
21 if (keysize != CHACHA_KEY_SIZE) in chacha_setkey()
32 unsigned int keysize) in chacha20_setkey()
34 return chacha_setkey(tfm, key, keysize, 20); in chacha20_setkey()
38 unsigned int keysize) in chacha12_setkey()
40 return chacha_setkey(tfm, key, keysize, 12); in chacha12_setkey()
15 chacha_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int keysize, int nrounds) chacha_setkey() argument
31 chacha20_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int keysize) chacha20_setkey() argument
37 chacha12_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int keysize) chacha12_setkey() argument
/kernel/linux/linux-6.6/include/crypto/internal/
H A Dchacha.h16 unsigned int keysize, int nrounds) in chacha_setkey()
21 if (keysize != CHACHA_KEY_SIZE) in chacha_setkey()
32 unsigned int keysize) in chacha20_setkey()
34 return chacha_setkey(tfm, key, keysize, 20); in chacha20_setkey()
38 unsigned int keysize) in chacha12_setkey()
40 return chacha_setkey(tfm, key, keysize, 12); in chacha12_setkey()
15 chacha_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int keysize, int nrounds) chacha_setkey() argument
31 chacha20_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int keysize) chacha20_setkey() argument
37 chacha12_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int keysize) chacha12_setkey() argument
/kernel/linux/linux-5.10/tools/testing/selftests/bpf/
H A Dtest_lpm_map.c209 static void test_lpm_map(int keysize) in test_lpm_map() argument
227 data = alloca(keysize); in test_lpm_map()
228 memset(data, 0, keysize); in test_lpm_map()
230 value = alloca(keysize + 1); in test_lpm_map()
231 memset(value, 0, keysize + 1); in test_lpm_map()
233 key = alloca(sizeof(*key) + keysize); in test_lpm_map()
234 memset(key, 0, sizeof(*key) + keysize); in test_lpm_map()
237 sizeof(*key) + keysize, in test_lpm_map()
238 keysize + 1, in test_lpm_map()
244 for (j = 0; j < keysize; in test_lpm_map()
[all...]
/kernel/linux/linux-6.6/tools/testing/selftests/bpf/
H A Dtest_lpm_map.c208 static void test_lpm_map(int keysize) in test_lpm_map() argument
228 data = alloca(keysize); in test_lpm_map()
229 memset(data, 0, keysize); in test_lpm_map()
231 value = alloca(keysize + 1); in test_lpm_map()
232 memset(value, 0, keysize + 1); in test_lpm_map()
234 key = alloca(sizeof(*key) + keysize); in test_lpm_map()
235 memset(key, 0, sizeof(*key) + keysize); in test_lpm_map()
238 sizeof(*key) + keysize, in test_lpm_map()
239 keysize + 1, in test_lpm_map()
245 for (j = 0; j < keysize; in test_lpm_map()
[all...]
/kernel/linux/linux-6.6/fs/crypto/
H A Dkeysetup.c20 .keysize = 64,
28 .keysize = 32,
35 .keysize = 16,
43 .keysize = 16,
50 .keysize = 32,
58 .keysize = 16,
65 .keysize = 32,
73 .keysize = 32,
133 err = crypto_skcipher_setkey(tfm, raw_key, mode->keysize); in fscrypt_allocate_skcipher()
227 mode_key, mode->keysize); in setup_per_mode_enc_key()
[all...]
H A Dkeysetup_v1.c205 if (crypto_memneq(raw_key, dk->dk_raw, ci->ci_mode->keysize)) in find_or_insert_direct_key()
243 memcpy(dk->dk_raw, raw_key, ci->ci_mode->keysize); in fscrypt_get_direct_key()
277 derived_key = kmalloc(ci->ci_mode->keysize, GFP_KERNEL); in setup_v1_file_key_derived()
282 derived_key, ci->ci_mode->keysize); in setup_v1_file_key_derived()
308 ci->ci_mode->keysize, &payload); in fscrypt_setup_v1_file_key_via_subscribed_keyrings()
312 ci->ci_mode->keysize, &payload); in fscrypt_setup_v1_file_key_via_subscribed_keyrings()
/kernel/linux/linux-6.6/block/
H A Dblk-crypto.c25 .keysize = 64,
31 .keysize = 16,
37 .keysize = 32,
43 .keysize = 32,
81 BUG_ON(blk_crypto_modes[i].keysize > BLK_CRYPTO_MAX_KEY_SIZE); in bio_crypt_ctx_init()
341 if (mode->keysize == 0) in blk_crypto_init_key()
354 blk_key->size = mode->keysize; in blk_crypto_init_key()
355 memcpy(blk_key->raw, raw_key, mode->keysize); in blk_crypto_init_key()
/kernel/linux/linux-5.10/fs/crypto/
H A Dkeysetup.c20 .keysize = 64,
28 .keysize = 32,
35 .keysize = 16,
43 .keysize = 16,
50 .keysize = 32,
111 err = crypto_skcipher_setkey(tfm, raw_key, mode->keysize); in fscrypt_allocate_skcipher()
203 mode_key, mode->keysize); in setup_per_mode_enc_key()
207 memzero_explicit(mode_key, mode->keysize); in setup_per_mode_enc_key()
345 derived_key, ci->ci_mode->keysize); in fscrypt_setup_v2_file_key()
350 memzero_explicit(derived_key, ci->ci_mode->keysize); in fscrypt_setup_v2_file_key()
[all...]
H A Dkeysetup_v1.c204 if (crypto_memneq(raw_key, dk->dk_raw, ci->ci_mode->keysize)) in find_or_insert_direct_key()
241 memcpy(dk->dk_raw, raw_key, ci->ci_mode->keysize); in fscrypt_get_direct_key()
275 derived_key = kmalloc(ci->ci_mode->keysize, GFP_KERNEL); in setup_v1_file_key_derived()
280 derived_key, ci->ci_mode->keysize); in setup_v1_file_key_derived()
306 ci->ci_mode->keysize, &payload); in fscrypt_setup_v1_file_key_via_subscribed_keyrings()
310 ci->ci_mode->keysize, &payload); in fscrypt_setup_v1_file_key_via_subscribed_keyrings()
/kernel/linux/linux-6.6/drivers/s390/crypto/
H A Dpkey_api.c87 /* helper function which translates the PKEY_KEYTYPE_AES_* to their keysize */
113 int keysize; in pkey_clr2protkey() local
119 keysize = 16; in pkey_clr2protkey()
125 keysize = 24; in pkey_clr2protkey()
131 keysize = 32; in pkey_clr2protkey()
137 keysize = 32; in pkey_clr2protkey()
143 keysize = 48; in pkey_clr2protkey()
149 keysize = 80; in pkey_clr2protkey()
155 keysize = 32; in pkey_clr2protkey()
161 keysize in pkey_clr2protkey()
377 int keysize; pkey_genprotkey() local
462 u32 keysize; nonccatokaes2pkey() local
2037 size_t keysize = CCACIPHERTOKENSIZE; pkey_ccacipher_aes_attr_read() local
2160 size_t keysize = MAXEP11AESKEYBLOBSIZE; pkey_ep11_aes_attr_read() local
[all...]
H A Dzcrypt_ccamisc.c180 const u8 *token, size_t keysize, in cca_check_sececckeytoken()
193 if (t->len > keysize) { in cca_check_sececckeytoken()
195 DBF("%s token check failed, len %d > keysize %zu\n", in cca_check_sececckeytoken()
196 __func__, (int)t->len, keysize); in cca_check_sececckeytoken()
300 int i, rc, keysize; in cca_genseckey() local
356 keysize = 16; in cca_genseckey()
361 keysize = 24; in cca_genseckey()
366 keysize = 32; in cca_genseckey()
422 prepparm->lv3.keyblock.tok, 8 * keysize); in cca_genseckey()
443 int rc, keysize, seckeysiz in cca_clr2seckey() local
179 cca_check_sececckeytoken(debug_info_t *dbg, int dbflvl, const u8 *token, size_t keysize, int checkcpacfexport) cca_check_sececckeytoken() argument
[all...]
H A Dzcrypt_ccamisc.h53 u16 keysize; /* key byte size */ member
156 const u8 *token, size_t keysize,
/kernel/linux/linux-5.10/block/
H A Dblk-crypto.c24 .keysize = 64,
29 .keysize = 16,
34 .keysize = 32,
72 BUG_ON(blk_crypto_modes[i].keysize > BLK_CRYPTO_MAX_KEY_SIZE); in bio_crypt_ctx_init()
333 if (mode->keysize == 0) in blk_crypto_init_key()
346 blk_key->size = mode->keysize; in blk_crypto_init_key()
347 memcpy(blk_key->raw, raw_key, mode->keysize); in blk_crypto_init_key()
/kernel/linux/linux-5.10/crypto/
H A Dtcrypt.c254 unsigned int aad_size, u8 *keysize, u32 num_mb) in test_mb_aead_speed()
348 *keysize * 8, *b_size); in test_mb_aead_speed()
355 if (template[j].klen == *keysize) { in test_mb_aead_speed()
363 ret = crypto_aead_setkey(tfm, key, *keysize); in test_mb_aead_speed()
431 keysize++; in test_mb_aead_speed()
432 } while (*keysize); in test_mb_aead_speed()
522 unsigned int aad_size, u8 *keysize) in test_aead_speed()
596 if ((*keysize + *b_size) > TVMEMSIZE * PAGE_SIZE) { in test_aead_speed()
598 *keysize + *b_size, in test_aead_speed()
605 if (template[j].klen == *keysize) { in test_aead_speed()
251 test_mb_aead_speed(const char *algo, int enc, int secs, struct aead_speed_template *template, unsigned int tcount, u8 authsize, unsigned int aad_size, u8 *keysize, u32 num_mb) test_mb_aead_speed() argument
519 test_aead_speed(const char *algo, int enc, unsigned int secs, struct aead_speed_template *template, unsigned int tcount, u8 authsize, unsigned int aad_size, u8 *keysize) test_aead_speed() argument
1249 test_mb_skcipher_speed(const char *algo, int enc, int secs, struct cipher_speed_template *template, unsigned int tcount, u8 *keysize, u32 num_mb) test_mb_skcipher_speed() argument
1481 test_skcipher_speed(const char *algo, int enc, unsigned int secs, struct cipher_speed_template *template, unsigned int tcount, u8 *keysize, bool async) test_skcipher_speed() argument
1611 test_acipher_speed(const char *algo, int enc, unsigned int secs, struct cipher_speed_template *template, unsigned int tcount, u8 *keysize) test_acipher_speed() argument
1619 test_cipher_speed(const char *algo, int enc, unsigned int secs, struct cipher_speed_template *template, unsigned int tcount, u8 *keysize) test_cipher_speed() argument
[all...]
H A Dsalsa20_generic.c112 unsigned int keysize) in salsa20_setkey()
119 if (keysize != SALSA20_MIN_KEY_SIZE && in salsa20_setkey()
120 keysize != SALSA20_MAX_KEY_SIZE) in salsa20_setkey()
127 if (keysize == 32) { /* recommended */ in salsa20_setkey()
130 } else { /* keysize == 16 */ in salsa20_setkey()
111 salsa20_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int keysize) salsa20_setkey() argument
/kernel/linux/linux-6.6/crypto/
H A Dtcrypt.c246 unsigned int aad_size, u8 *keysize, u32 num_mb) in test_mb_aead_speed()
347 *keysize * 8, bs); in test_mb_aead_speed()
354 if (template[j].klen == *keysize) { in test_mb_aead_speed()
362 ret = crypto_aead_setkey(tfm, key, *keysize); in test_mb_aead_speed()
430 keysize++; in test_mb_aead_speed()
431 } while (*keysize); in test_mb_aead_speed()
521 unsigned int aad_size, u8 *keysize) in test_aead_speed()
603 if ((*keysize + bs) > TVMEMSIZE * PAGE_SIZE) { in test_aead_speed()
605 *keysize + bs, in test_aead_speed()
612 if (template[j].klen == *keysize) { in test_aead_speed()
243 test_mb_aead_speed(const char *algo, int enc, int secs, struct aead_speed_template *template, unsigned int tcount, u8 authsize, unsigned int aad_size, u8 *keysize, u32 num_mb) test_mb_aead_speed() argument
518 test_aead_speed(const char *algo, int enc, unsigned int secs, struct aead_speed_template *template, unsigned int tcount, u8 authsize, unsigned int aad_size, u8 *keysize) test_aead_speed() argument
1060 test_mb_skcipher_speed(const char *algo, int enc, int secs, struct cipher_speed_template *template, unsigned int tcount, u8 *keysize, u32 num_mb) test_mb_skcipher_speed() argument
1293 test_skcipher_speed(const char *algo, int enc, unsigned int secs, struct cipher_speed_template *template, unsigned int tcount, u8 *keysize, bool async) test_skcipher_speed() argument
1423 test_acipher_speed(const char *algo, int enc, unsigned int secs, struct cipher_speed_template *template, unsigned int tcount, u8 *keysize) test_acipher_speed() argument
1431 test_cipher_speed(const char *algo, int enc, unsigned int secs, struct cipher_speed_template *template, unsigned int tcount, u8 *keysize) test_cipher_speed() argument
[all...]
/kernel/linux/linux-5.10/drivers/s390/crypto/
H A Dpkey_api.c95 int keysize; in pkey_clr2protkey() local
100 keysize = 16; in pkey_clr2protkey()
104 keysize = 24; in pkey_clr2protkey()
108 keysize = 32; in pkey_clr2protkey()
131 memcpy(paramblock, clrkey->clrkey, keysize); in pkey_clr2protkey()
138 protkey->len = keysize + 32; in pkey_clr2protkey()
139 memcpy(protkey->protkey, paramblock, keysize + 32); in pkey_clr2protkey()
306 int keysize; in pkey_genprotkey() local
311 keysize = 16; in pkey_genprotkey()
314 keysize in pkey_genprotkey()
1807 size_t keysize = CCACIPHERTOKENSIZE; pkey_ccacipher_aes_attr_read() local
1930 size_t keysize = MAXEP11AESKEYBLOBSIZE; pkey_ep11_aes_attr_read() local
[all...]
H A Dzcrypt_ccamisc.c180 const u8 *token, size_t keysize, in cca_check_sececckeytoken()
193 if (t->len > keysize) { in cca_check_sececckeytoken()
195 DBF("%s token check failed, len %d > keysize %zu\n", in cca_check_sececckeytoken()
196 __func__, (int) t->len, keysize); in cca_check_sececckeytoken()
300 int i, rc, keysize; in cca_genseckey() local
356 keysize = 16; in cca_genseckey()
361 keysize = 24; in cca_genseckey()
366 keysize = 32; in cca_genseckey()
422 prepparm->lv3.keyblock.tok, 8*keysize); in cca_genseckey()
443 int rc, keysize, seckeysiz in cca_clr2seckey() local
179 cca_check_sececckeytoken(debug_info_t *dbg, int dbflvl, const u8 *token, size_t keysize, int checkcpacfexport) cca_check_sececckeytoken() argument
[all...]
H A Dzcrypt_ep11misc.c803 const u8 *key, size_t keysize, in ep11_cryptsingle()
838 if (keysize > 0xFFFF || inbufsize > 0xFFFF) in ep11_cryptsingle()
843 + ASN1TAGLEN(keysize) + ASN1TAGLEN(inbufsize); in ep11_cryptsingle()
861 p += asn1tag_write(p, 0x04, key, keysize); in ep11_cryptsingle()
1069 const u8 *key, size_t keysize, in ep11_wrapkey()
1112 keysize = kb->head.len < keysize ? kb->head.len : keysize; in ep11_wrapkey()
1117 + ASN1TAGLEN(keysize) + 4; in ep11_wrapkey()
1138 p += asn1tag_write(p, 0x04, key, keysize); in ep11_wrapkey()
801 ep11_cryptsingle(u16 card, u16 domain, u16 mode, u32 mech, const u8 *iv, const u8 *key, size_t keysize, const u8 *inbuf, size_t inbufsize, u8 *outbuf, size_t *outbufsize) ep11_cryptsingle() argument
1068 ep11_wrapkey(u16 card, u16 domain, const u8 *key, size_t keysize, u32 mech, const u8 *iv, u8 *databuf, size_t *datasize) ep11_wrapkey() argument
[all...]
H A Dzcrypt_ccamisc.h53 u16 keysize; /* key byte size */ member
156 const u8 *token, size_t keysize,
/kernel/linux/linux-5.10/fs/befs/
H A Dbtree.c397 * @keysize: Length of the returned key
412 loff_t key_no, size_t bufsize, char *keybuf, size_t * keysize, in befs_btree_read()
450 *keysize = 0; in befs_btree_read()
463 *keysize = 0; in befs_btree_read()
492 befs_debug(sb, "Read [%llu,%d]: keysize %d", in befs_btree_read()
505 *keysize = keylen; in befs_btree_read()
521 *keysize = 0; in befs_btree_read()
411 befs_btree_read(struct super_block *sb, const befs_data_stream *ds, loff_t key_no, size_t bufsize, char *keybuf, size_t * keysize, befs_off_t * value) befs_btree_read() argument
/kernel/linux/linux-6.6/fs/befs/
H A Dbtree.c397 * @keysize: Length of the returned key
412 loff_t key_no, size_t bufsize, char *keybuf, size_t * keysize, in befs_btree_read()
450 *keysize = 0; in befs_btree_read()
463 *keysize = 0; in befs_btree_read()
492 befs_debug(sb, "Read [%llu,%d]: keysize %d", in befs_btree_read()
505 *keysize = keylen; in befs_btree_read()
521 *keysize = 0; in befs_btree_read()
411 befs_btree_read(struct super_block *sb, const befs_data_stream *ds, loff_t key_no, size_t bufsize, char *keybuf, size_t * keysize, befs_off_t * value) befs_btree_read() argument
/kernel/linux/linux-5.10/drivers/crypto/ux500/cryp/
H A Dcryp.c119 *control_register |= (cryp_config->keysize << CRYP_CR_KEYSIZE_POS); in cryp_set_configuration()
313 switch (config->keysize) { in cryp_save_device_context()
363 switch (config->keysize) { in cryp_restore_device_context()
/kernel/linux/linux-6.6/include/crypto/
H A Dgcm.h74 unsigned int keysize, unsigned int authsize);
/kernel/linux/linux-5.10/drivers/crypto/
H A Dhifn_795x.c617 unsigned int keysize; member
1145 if (ctx->keysize) in hifn_setup_cmd_desc()
1169 if (ctx->keysize != 16) in hifn_setup_cmd_desc()
1175 if (ctx->keysize != 24) in hifn_setup_cmd_desc()
1181 if (ctx->keysize != 32) in hifn_setup_cmd_desc()
1187 if (ctx->keysize != 24) in hifn_setup_cmd_desc()
1192 if (ctx->keysize != 8) in hifn_setup_cmd_desc()
1201 nbytes, nbytes, ctx->key, ctx->keysize, in hifn_setup_cmd_desc()
1587 ctx->key, ctx->keysize, in hifn_setup_session()
1956 ctx->keysize in hifn_setkey()
[all...]

Completed in 26 milliseconds

123