/third_party/mbedtls/programs/test/ |
H A D | benchmark.c | 722 int keysize; in main() local 726 for (keysize = 128; keysize <= 256; keysize += 64) { in main() 727 mbedtls_snprintf(title, sizeof(title), "AES-CBC-%d", keysize); in main() 731 CHECK_AND_CONTINUE(mbedtls_aes_setkey_enc(&aes, tmp, keysize)); in main() 741 int keysize; in main() local 746 for (keysize = 128; keysize <= 256; keysize in main() 760 int keysize; main() local 779 int keysize; main() local 804 int keysize; main() local 825 int keysize; main() local 846 int keysize; main() local 889 int keysize; main() local 917 int keysize; main() local 938 int keysize; main() local 1045 int keysize; main() local [all...] |
/third_party/mesa3d/src/mesa/program/ |
H A D | prog_cache.c | 41 unsigned keysize; member 177 const void *key, GLuint keysize) in _mesa_search_program_cache() 180 cache->last->keysize == keysize && in _mesa_search_program_cache() 181 memcmp(cache->last->key, key, keysize) == 0) { in _mesa_search_program_cache() 185 const GLuint hash = hash_key(key, keysize); in _mesa_search_program_cache() 190 c->keysize == keysize && in _mesa_search_program_cache() 191 memcmp(c->key, key, keysize) == 0) { in _mesa_search_program_cache() 206 const void *key, GLuint keysize, in _mesa_program_cache_insert() 176 _mesa_search_program_cache(struct gl_program_cache *cache, const void *key, GLuint keysize) _mesa_search_program_cache() argument 204 _mesa_program_cache_insert(struct gl_context *ctx, struct gl_program_cache *cache, const void *key, GLuint keysize, struct gl_program *program) _mesa_program_cache_insert() argument 233 _mesa_shader_cache_insert(struct gl_context *ctx, struct gl_program_cache *cache, const void *key, GLuint keysize, struct gl_shader_program *program) _mesa_shader_cache_insert() argument [all...] |
H A D | prog_cache.h | 59 const void *key, GLuint keysize); 64 const void *key, GLuint keysize, 70 const void *key, GLuint keysize,
|
/kernel/linux/linux-5.10/include/crypto/internal/ |
H A D | chacha.h | 16 unsigned int keysize, int nrounds) in chacha_setkey() 21 if (keysize != CHACHA_KEY_SIZE) in chacha_setkey() 32 unsigned int keysize) in chacha20_setkey() 34 return chacha_setkey(tfm, key, keysize, 20); in chacha20_setkey() 38 unsigned int keysize) in chacha12_setkey() 40 return chacha_setkey(tfm, key, keysize, 12); in chacha12_setkey() 15 chacha_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int keysize, int nrounds) chacha_setkey() argument 31 chacha20_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int keysize) chacha20_setkey() argument 37 chacha12_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int keysize) chacha12_setkey() argument
|
/kernel/linux/linux-6.6/include/crypto/internal/ |
H A D | chacha.h | 16 unsigned int keysize, int nrounds) in chacha_setkey() 21 if (keysize != CHACHA_KEY_SIZE) in chacha_setkey() 32 unsigned int keysize) in chacha20_setkey() 34 return chacha_setkey(tfm, key, keysize, 20); in chacha20_setkey() 38 unsigned int keysize) in chacha12_setkey() 40 return chacha_setkey(tfm, key, keysize, 12); in chacha12_setkey() 15 chacha_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int keysize, int nrounds) chacha_setkey() argument 31 chacha20_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int keysize) chacha20_setkey() argument 37 chacha12_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int keysize) chacha12_setkey() argument
|
/kernel/linux/linux-5.10/tools/testing/selftests/bpf/ |
H A D | test_lpm_map.c | 209 static void test_lpm_map(int keysize) in test_lpm_map() argument 227 data = alloca(keysize); in test_lpm_map() 228 memset(data, 0, keysize); in test_lpm_map() 230 value = alloca(keysize + 1); in test_lpm_map() 231 memset(value, 0, keysize + 1); in test_lpm_map() 233 key = alloca(sizeof(*key) + keysize); in test_lpm_map() 234 memset(key, 0, sizeof(*key) + keysize); in test_lpm_map() 237 sizeof(*key) + keysize, in test_lpm_map() 238 keysize + 1, in test_lpm_map() 244 for (j = 0; j < keysize; in test_lpm_map() [all...] |
/kernel/linux/linux-6.6/tools/testing/selftests/bpf/ |
H A D | test_lpm_map.c | 208 static void test_lpm_map(int keysize) in test_lpm_map() argument 228 data = alloca(keysize); in test_lpm_map() 229 memset(data, 0, keysize); in test_lpm_map() 231 value = alloca(keysize + 1); in test_lpm_map() 232 memset(value, 0, keysize + 1); in test_lpm_map() 234 key = alloca(sizeof(*key) + keysize); in test_lpm_map() 235 memset(key, 0, sizeof(*key) + keysize); in test_lpm_map() 238 sizeof(*key) + keysize, in test_lpm_map() 239 keysize + 1, in test_lpm_map() 245 for (j = 0; j < keysize; in test_lpm_map() [all...] |
/kernel/linux/linux-6.6/fs/crypto/ |
H A D | keysetup.c | 20 .keysize = 64, 28 .keysize = 32, 35 .keysize = 16, 43 .keysize = 16, 50 .keysize = 32, 58 .keysize = 16, 65 .keysize = 32, 73 .keysize = 32, 133 err = crypto_skcipher_setkey(tfm, raw_key, mode->keysize); in fscrypt_allocate_skcipher() 227 mode_key, mode->keysize); in setup_per_mode_enc_key() [all...] |
H A D | keysetup_v1.c | 205 if (crypto_memneq(raw_key, dk->dk_raw, ci->ci_mode->keysize)) in find_or_insert_direct_key() 243 memcpy(dk->dk_raw, raw_key, ci->ci_mode->keysize); in fscrypt_get_direct_key() 277 derived_key = kmalloc(ci->ci_mode->keysize, GFP_KERNEL); in setup_v1_file_key_derived() 282 derived_key, ci->ci_mode->keysize); in setup_v1_file_key_derived() 308 ci->ci_mode->keysize, &payload); in fscrypt_setup_v1_file_key_via_subscribed_keyrings() 312 ci->ci_mode->keysize, &payload); in fscrypt_setup_v1_file_key_via_subscribed_keyrings()
|
/kernel/linux/linux-6.6/block/ |
H A D | blk-crypto.c | 25 .keysize = 64, 31 .keysize = 16, 37 .keysize = 32, 43 .keysize = 32, 81 BUG_ON(blk_crypto_modes[i].keysize > BLK_CRYPTO_MAX_KEY_SIZE); in bio_crypt_ctx_init() 341 if (mode->keysize == 0) in blk_crypto_init_key() 354 blk_key->size = mode->keysize; in blk_crypto_init_key() 355 memcpy(blk_key->raw, raw_key, mode->keysize); in blk_crypto_init_key()
|
/kernel/linux/linux-5.10/fs/crypto/ |
H A D | keysetup.c | 20 .keysize = 64, 28 .keysize = 32, 35 .keysize = 16, 43 .keysize = 16, 50 .keysize = 32, 111 err = crypto_skcipher_setkey(tfm, raw_key, mode->keysize); in fscrypt_allocate_skcipher() 203 mode_key, mode->keysize); in setup_per_mode_enc_key() 207 memzero_explicit(mode_key, mode->keysize); in setup_per_mode_enc_key() 345 derived_key, ci->ci_mode->keysize); in fscrypt_setup_v2_file_key() 350 memzero_explicit(derived_key, ci->ci_mode->keysize); in fscrypt_setup_v2_file_key() [all...] |
H A D | keysetup_v1.c | 204 if (crypto_memneq(raw_key, dk->dk_raw, ci->ci_mode->keysize)) in find_or_insert_direct_key() 241 memcpy(dk->dk_raw, raw_key, ci->ci_mode->keysize); in fscrypt_get_direct_key() 275 derived_key = kmalloc(ci->ci_mode->keysize, GFP_KERNEL); in setup_v1_file_key_derived() 280 derived_key, ci->ci_mode->keysize); in setup_v1_file_key_derived() 306 ci->ci_mode->keysize, &payload); in fscrypt_setup_v1_file_key_via_subscribed_keyrings() 310 ci->ci_mode->keysize, &payload); in fscrypt_setup_v1_file_key_via_subscribed_keyrings()
|
/third_party/node/deps/openssl/openssl/apps/ |
H A D | rsautl.c | 84 int keyformat = FORMAT_UNDEF, keysize, ret = 1, rv; in rsautl_main() local 217 keysize = EVP_PKEY_get_size(pkey); in rsautl_main() 219 rsa_in = app_malloc(keysize * 2, "hold rsa key"); in rsautl_main() 220 rsa_out = app_malloc(keysize, "output rsa key"); in rsautl_main() 221 rsa_outlen = keysize; in rsautl_main() 224 rv = BIO_read(in, rsa_in, keysize * 2); in rsautl_main()
|
/third_party/openssl/apps/ |
H A D | rsautl.c | 84 int keyformat = FORMAT_UNDEF, keysize, ret = 1, rv; in rsautl_main() local 217 keysize = EVP_PKEY_get_size(pkey); in rsautl_main() 219 rsa_in = app_malloc(keysize * 2, "hold rsa key"); in rsautl_main() 220 rsa_out = app_malloc(keysize, "output rsa key"); in rsautl_main() 221 rsa_outlen = keysize; in rsautl_main() 224 rv = BIO_read(in, rsa_in, keysize * 2); in rsautl_main()
|
/kernel/linux/linux-6.6/drivers/s390/crypto/ |
H A D | pkey_api.c | 87 /* helper function which translates the PKEY_KEYTYPE_AES_* to their keysize */ 113 int keysize; in pkey_clr2protkey() local 119 keysize = 16; in pkey_clr2protkey() 125 keysize = 24; in pkey_clr2protkey() 131 keysize = 32; in pkey_clr2protkey() 137 keysize = 32; in pkey_clr2protkey() 143 keysize = 48; in pkey_clr2protkey() 149 keysize = 80; in pkey_clr2protkey() 155 keysize = 32; in pkey_clr2protkey() 161 keysize in pkey_clr2protkey() 377 int keysize; pkey_genprotkey() local 462 u32 keysize; nonccatokaes2pkey() local 2037 size_t keysize = CCACIPHERTOKENSIZE; pkey_ccacipher_aes_attr_read() local 2160 size_t keysize = MAXEP11AESKEYBLOBSIZE; pkey_ep11_aes_attr_read() local [all...] |
H A D | zcrypt_ccamisc.c | 180 const u8 *token, size_t keysize, in cca_check_sececckeytoken() 193 if (t->len > keysize) { in cca_check_sececckeytoken() 195 DBF("%s token check failed, len %d > keysize %zu\n", in cca_check_sececckeytoken() 196 __func__, (int)t->len, keysize); in cca_check_sececckeytoken() 300 int i, rc, keysize; in cca_genseckey() local 356 keysize = 16; in cca_genseckey() 361 keysize = 24; in cca_genseckey() 366 keysize = 32; in cca_genseckey() 422 prepparm->lv3.keyblock.tok, 8 * keysize); in cca_genseckey() 443 int rc, keysize, seckeysiz in cca_clr2seckey() local 179 cca_check_sececckeytoken(debug_info_t *dbg, int dbflvl, const u8 *token, size_t keysize, int checkcpacfexport) cca_check_sececckeytoken() argument [all...] |
/kernel/linux/linux-5.10/block/ |
H A D | blk-crypto.c | 24 .keysize = 64, 29 .keysize = 16, 34 .keysize = 32, 72 BUG_ON(blk_crypto_modes[i].keysize > BLK_CRYPTO_MAX_KEY_SIZE); in bio_crypt_ctx_init() 333 if (mode->keysize == 0) in blk_crypto_init_key() 346 blk_key->size = mode->keysize; in blk_crypto_init_key() 347 memcpy(blk_key->raw, raw_key, mode->keysize); in blk_crypto_init_key()
|
/third_party/mesa3d/src/gallium/auxiliary/translate/ |
H A D | translate.h | 161 int keysize = translate_keysize(a); in translate_key_sanitize() local 163 memset(ptr + keysize, 0, sizeof(*a) - keysize); in translate_key_sanitize()
|
/kernel/linux/linux-5.10/crypto/ |
H A D | tcrypt.c | 254 unsigned int aad_size, u8 *keysize, u32 num_mb) in test_mb_aead_speed() 348 *keysize * 8, *b_size); in test_mb_aead_speed() 355 if (template[j].klen == *keysize) { in test_mb_aead_speed() 363 ret = crypto_aead_setkey(tfm, key, *keysize); in test_mb_aead_speed() 431 keysize++; in test_mb_aead_speed() 432 } while (*keysize); in test_mb_aead_speed() 522 unsigned int aad_size, u8 *keysize) in test_aead_speed() 596 if ((*keysize + *b_size) > TVMEMSIZE * PAGE_SIZE) { in test_aead_speed() 598 *keysize + *b_size, in test_aead_speed() 605 if (template[j].klen == *keysize) { in test_aead_speed() 251 test_mb_aead_speed(const char *algo, int enc, int secs, struct aead_speed_template *template, unsigned int tcount, u8 authsize, unsigned int aad_size, u8 *keysize, u32 num_mb) test_mb_aead_speed() argument 519 test_aead_speed(const char *algo, int enc, unsigned int secs, struct aead_speed_template *template, unsigned int tcount, u8 authsize, unsigned int aad_size, u8 *keysize) test_aead_speed() argument 1249 test_mb_skcipher_speed(const char *algo, int enc, int secs, struct cipher_speed_template *template, unsigned int tcount, u8 *keysize, u32 num_mb) test_mb_skcipher_speed() argument 1481 test_skcipher_speed(const char *algo, int enc, unsigned int secs, struct cipher_speed_template *template, unsigned int tcount, u8 *keysize, bool async) test_skcipher_speed() argument 1611 test_acipher_speed(const char *algo, int enc, unsigned int secs, struct cipher_speed_template *template, unsigned int tcount, u8 *keysize) test_acipher_speed() argument 1619 test_cipher_speed(const char *algo, int enc, unsigned int secs, struct cipher_speed_template *template, unsigned int tcount, u8 *keysize) test_cipher_speed() argument [all...] |
H A D | salsa20_generic.c | 112 unsigned int keysize) in salsa20_setkey() 119 if (keysize != SALSA20_MIN_KEY_SIZE && in salsa20_setkey() 120 keysize != SALSA20_MAX_KEY_SIZE) in salsa20_setkey() 127 if (keysize == 32) { /* recommended */ in salsa20_setkey() 130 } else { /* keysize == 16 */ in salsa20_setkey() 111 salsa20_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int keysize) salsa20_setkey() argument
|
/kernel/linux/linux-6.6/crypto/ |
H A D | tcrypt.c | 246 unsigned int aad_size, u8 *keysize, u32 num_mb) in test_mb_aead_speed() 347 *keysize * 8, bs); in test_mb_aead_speed() 354 if (template[j].klen == *keysize) { in test_mb_aead_speed() 362 ret = crypto_aead_setkey(tfm, key, *keysize); in test_mb_aead_speed() 430 keysize++; in test_mb_aead_speed() 431 } while (*keysize); in test_mb_aead_speed() 521 unsigned int aad_size, u8 *keysize) in test_aead_speed() 603 if ((*keysize + bs) > TVMEMSIZE * PAGE_SIZE) { in test_aead_speed() 605 *keysize + bs, in test_aead_speed() 612 if (template[j].klen == *keysize) { in test_aead_speed() 243 test_mb_aead_speed(const char *algo, int enc, int secs, struct aead_speed_template *template, unsigned int tcount, u8 authsize, unsigned int aad_size, u8 *keysize, u32 num_mb) test_mb_aead_speed() argument 518 test_aead_speed(const char *algo, int enc, unsigned int secs, struct aead_speed_template *template, unsigned int tcount, u8 authsize, unsigned int aad_size, u8 *keysize) test_aead_speed() argument 1060 test_mb_skcipher_speed(const char *algo, int enc, int secs, struct cipher_speed_template *template, unsigned int tcount, u8 *keysize, u32 num_mb) test_mb_skcipher_speed() argument 1293 test_skcipher_speed(const char *algo, int enc, unsigned int secs, struct cipher_speed_template *template, unsigned int tcount, u8 *keysize, bool async) test_skcipher_speed() argument 1423 test_acipher_speed(const char *algo, int enc, unsigned int secs, struct cipher_speed_template *template, unsigned int tcount, u8 *keysize) test_acipher_speed() argument 1431 test_cipher_speed(const char *algo, int enc, unsigned int secs, struct cipher_speed_template *template, unsigned int tcount, u8 *keysize) test_cipher_speed() argument [all...] |
/kernel/linux/linux-5.10/drivers/s390/crypto/ |
H A D | pkey_api.c | 95 int keysize; in pkey_clr2protkey() local 100 keysize = 16; in pkey_clr2protkey() 104 keysize = 24; in pkey_clr2protkey() 108 keysize = 32; in pkey_clr2protkey() 131 memcpy(paramblock, clrkey->clrkey, keysize); in pkey_clr2protkey() 138 protkey->len = keysize + 32; in pkey_clr2protkey() 139 memcpy(protkey->protkey, paramblock, keysize + 32); in pkey_clr2protkey() 306 int keysize; in pkey_genprotkey() local 311 keysize = 16; in pkey_genprotkey() 314 keysize in pkey_genprotkey() 1807 size_t keysize = CCACIPHERTOKENSIZE; pkey_ccacipher_aes_attr_read() local 1930 size_t keysize = MAXEP11AESKEYBLOBSIZE; pkey_ep11_aes_attr_read() local [all...] |
H A D | zcrypt_ccamisc.c | 180 const u8 *token, size_t keysize, in cca_check_sececckeytoken() 193 if (t->len > keysize) { in cca_check_sececckeytoken() 195 DBF("%s token check failed, len %d > keysize %zu\n", in cca_check_sececckeytoken() 196 __func__, (int) t->len, keysize); in cca_check_sececckeytoken() 300 int i, rc, keysize; in cca_genseckey() local 356 keysize = 16; in cca_genseckey() 361 keysize = 24; in cca_genseckey() 366 keysize = 32; in cca_genseckey() 422 prepparm->lv3.keyblock.tok, 8*keysize); in cca_genseckey() 443 int rc, keysize, seckeysiz in cca_clr2seckey() local 179 cca_check_sececckeytoken(debug_info_t *dbg, int dbflvl, const u8 *token, size_t keysize, int checkcpacfexport) cca_check_sececckeytoken() argument [all...] |
/third_party/mesa3d/src/gallium/auxiliary/draw/ |
H A D | draw_vs.h | 202 int keysize = draw_vs_variant_keysize(a); in draw_vs_variant_key_compare() local 203 return memcmp(a, b, keysize); in draw_vs_variant_key_compare()
|
/third_party/skia/third_party/externals/angle2/include/EGL/ |
H A D | eglext_angle.h | 202 typedef void (EGLAPIENTRYP PFNEGLPROGRAMCACHEQUERYANGLEPROC) (EGLDisplay dpy, EGLint index, void *key, EGLint *keysize, void *binary, EGLint *binarysize); 203 typedef void (EGLAPIENTRYP PFNEGLPROGRAMCACHEPOPULATEANGLEPROC) (EGLDisplay dpy, const void *key, EGLint keysize, const void *binary, EGLint binarysize); 207 EGLAPI void EGLAPIENTRY eglProgramCacheQueryANGLE(EGLDisplay dpy, EGLint index, void *key, EGLint *keysize, void *binary, EGLint *binarysize); 208 EGLAPI void EGLAPIENTRY eglProgramCachePopulateANGLE(EGLDisplay dpy, const void *key, EGLint keysize, const void *binary, EGLint binarysize);
|