Home
last modified time | relevance | path

Searched refs:keysize (Results 1 – 25 of 39) sorted by relevance

12

/openbmc/linux/include/crypto/internal/
H A Dchacha.h16 unsigned int keysize, int nrounds) in chacha_setkey() argument
21 if (keysize != CHACHA_KEY_SIZE) in chacha_setkey()
32 unsigned int keysize) in chacha20_setkey() argument
34 return chacha_setkey(tfm, key, keysize, 20); in chacha20_setkey()
38 unsigned int keysize) in chacha12_setkey() argument
40 return chacha_setkey(tfm, key, keysize, 12); in chacha12_setkey()
/openbmc/linux/tools/testing/selftests/bpf/
H A Dtest_lpm_map.c228 data = alloca(keysize); in test_lpm_map()
229 memset(data, 0, keysize); in test_lpm_map()
231 value = alloca(keysize + 1); in test_lpm_map()
232 memset(value, 0, keysize + 1); in test_lpm_map()
238 sizeof(*key) + keysize, in test_lpm_map()
239 keysize + 1, in test_lpm_map()
245 for (j = 0; j < keysize; ++j) in test_lpm_map()
247 value[keysize] = rand() % (8 * keysize + 1); in test_lpm_map()
258 for (j = 0; j < keysize; ++j) in test_lpm_map()
263 key->prefixlen = 8 * keysize; in test_lpm_map()
[all …]
/openbmc/linux/block/
H A Dblk-crypto.c25 .keysize = 64,
31 .keysize = 16,
37 .keysize = 32,
43 .keysize = 32,
81 BUG_ON(blk_crypto_modes[i].keysize > BLK_CRYPTO_MAX_KEY_SIZE); in bio_crypt_ctx_init()
341 if (mode->keysize == 0) in blk_crypto_init_key()
354 blk_key->size = mode->keysize; in blk_crypto_init_key()
355 memcpy(blk_key->raw, raw_key, mode->keysize); in blk_crypto_init_key()
H A Dblk-crypto-internal.h16 unsigned int keysize; /* key size in bytes */ member
/openbmc/linux/fs/crypto/
H A Dkeysetup.c20 .keysize = 64,
28 .keysize = 32,
35 .keysize = 16,
43 .keysize = 16,
50 .keysize = 32,
58 .keysize = 16,
65 .keysize = 32,
73 .keysize = 32,
227 mode_key, mode->keysize); in setup_per_mode_enc_key()
369 derived_key, ci->ci_mode->keysize); in fscrypt_setup_v2_file_key()
[all …]
H A Dkeysetup_v1.c205 if (crypto_memneq(raw_key, dk->dk_raw, ci->ci_mode->keysize)) in find_or_insert_direct_key()
243 memcpy(dk->dk_raw, raw_key, ci->ci_mode->keysize); in fscrypt_get_direct_key()
277 derived_key = kmalloc(ci->ci_mode->keysize, GFP_KERNEL); in setup_v1_file_key_derived()
282 derived_key, ci->ci_mode->keysize); in setup_v1_file_key_derived()
308 ci->ci_mode->keysize, &payload); in fscrypt_setup_v1_file_key_via_subscribed_keyrings()
312 ci->ci_mode->keysize, &payload); in fscrypt_setup_v1_file_key_via_subscribed_keyrings()
/openbmc/qemu/tests/bench/
H A Dbenchmark-crypto-akcipher.c115 #define ADD_TEST(asym_alg, keysize) \ in main() argument
117 (!size || g_str_equal(size, #keysize))) \ in main()
119 "/crypto/akcipher/" #asym_alg "-" #keysize, \ in main()
120 (void *)keysize, \ in main()
121 test_ ## asym_alg ## _ ## keysize ## _speed) in main()
H A Dbenchmark-crypto-cipher.c175 #define ADD_TEST(mode, cipher, keysize, chunk) \ in main() argument
179 "/crypto/cipher/" #mode "-" #cipher "-" #keysize "/chunk-" #chunk, \ in main()
181 test_cipher_speed_ ## mode ## _ ## cipher ## _ ## keysize) in main()
/openbmc/linux/drivers/s390/crypto/
H A Dpkey_api.c113 int keysize; in pkey_clr2protkey() local
119 keysize = 16; in pkey_clr2protkey()
125 keysize = 24; in pkey_clr2protkey()
131 keysize = 32; in pkey_clr2protkey()
137 keysize = 32; in pkey_clr2protkey()
143 keysize = 48; in pkey_clr2protkey()
149 keysize = 80; in pkey_clr2protkey()
377 int keysize; in pkey_genprotkey() local
462 u32 keysize; in nonccatokaes2pkey() local
2053 memset(buf, 0, is_xts ? 2 * keysize : keysize); in pkey_ccacipher_aes_attr_read()
[all …]
H A Dzcrypt_ccamisc.c180 const u8 *token, size_t keysize, in cca_check_sececckeytoken() argument
193 if (t->len > keysize) { in cca_check_sececckeytoken()
196 __func__, (int)t->len, keysize); in cca_check_sececckeytoken()
300 int i, rc, keysize; in cca_genseckey() local
356 keysize = 16; in cca_genseckey()
361 keysize = 24; in cca_genseckey()
366 keysize = 32; in cca_genseckey()
443 int rc, keysize, seckeysize; in cca_clr2seckey() local
497 keysize = 16; in cca_clr2seckey()
501 keysize = 24; in cca_clr2seckey()
[all …]
H A Dzcrypt_ccamisc.h53 u16 keysize; /* key byte size */ member
156 const u8 *token, size_t keysize,
H A Dzcrypt_ep11misc.c953 const u8 *key, size_t keysize, in ep11_cryptsingle() argument
988 if (keysize > 0xFFFF || inbufsize > 0xFFFF) in ep11_cryptsingle()
993 + ASN1TAGLEN(keysize) + ASN1TAGLEN(inbufsize); in ep11_cryptsingle()
1011 p += asn1tag_write(p, 0x04, key, keysize); in ep11_cryptsingle()
1260 const u8 *key, size_t keysize, in _ep11_wrapkey() argument
1298 + ASN1TAGLEN(keysize) + 4; in _ep11_wrapkey()
1320 p += asn1tag_write(p, 0x04, key, keysize); in _ep11_wrapkey()
/openbmc/linux/crypto/
H A Dtcrypt.c347 *keysize * 8, bs); in test_mb_aead_speed()
430 keysize++; in test_mb_aead_speed()
431 } while (*keysize); in test_mb_aead_speed()
682 keysize++; in test_aead_speed()
683 } while (*keysize); in test_aead_speed()
1130 *keysize * 8, bs); in test_mb_skcipher_speed()
1199 keysize++; in test_mb_skcipher_speed()
1200 } while (*keysize); in test_mb_skcipher_speed()
1371 k = *keysize + bs; in test_skcipher_speed()
1414 keysize++; in test_skcipher_speed()
[all …]
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-crypto/cryptsetup/
H A Dcryptsetup_2.7.1.bb39 luks-adjust-xts-keysize \
65 PACKAGECONFIG[luks-adjust-xts-keysize] = "--enable-luks-adjust-xts-keysize,--disable-luks-adjust-xt…
/openbmc/qemu/tests/unit/
H A Dtest-crypto-cipher.c645 size_t ivsize, keysize, blocksize; in test_cipher() local
676 keysize = qcrypto_cipher_get_key_len(data->alg); in test_cipher()
681 g_assert_cmpint(keysize * 2, ==, nkey); in test_cipher()
683 g_assert_cmpint(keysize, ==, nkey); in test_cipher()
/openbmc/linux/fs/befs/
H A Dbtree.c412 loff_t key_no, size_t bufsize, char *keybuf, size_t * keysize, in befs_btree_read() argument
450 *keysize = 0; in befs_btree_read()
463 *keysize = 0; in befs_btree_read()
505 *keysize = keylen; in befs_btree_read()
521 *keysize = 0; in befs_btree_read()
H A Dbtree.h12 size_t *keysize, befs_off_t *value);
H A Dlinuxvfs.c222 size_t keysize; in befs_readdir() local
230 keybuf, &keysize, &value); in befs_readdir()
253 befs_utf2nls(sb, keybuf, keysize, &nlsname, in befs_readdir()
266 if (!dir_emit(ctx, keybuf, keysize, in befs_readdir()
/openbmc/linux/include/crypto/
H A Dgcm.h74 unsigned int keysize, unsigned int authsize);
/openbmc/linux/drivers/crypto/
H A Dhifn_795x.c617 unsigned int keysize; member
1145 if (ctx->keysize) in hifn_setup_cmd_desc()
1169 if (ctx->keysize != 16) in hifn_setup_cmd_desc()
1175 if (ctx->keysize != 24) in hifn_setup_cmd_desc()
1181 if (ctx->keysize != 32) in hifn_setup_cmd_desc()
1187 if (ctx->keysize != 24) in hifn_setup_cmd_desc()
1192 if (ctx->keysize != 8) in hifn_setup_cmd_desc()
1587 ctx->key, ctx->keysize, in hifn_setup_session()
1956 ctx->keysize = len; in hifn_setkey()
1975 ctx->keysize = len; in hifn_des3_setkey()
[all …]
/openbmc/qemu/ui/
H A Dvnc-auth-sasl.c601 int keysize; in start_auth_sasl() local
604 keysize = qcrypto_tls_session_get_key_size(vs->tls, in start_auth_sasl()
606 if (keysize < 0) { in start_auth_sasl()
613 ssf = keysize * CHAR_BIT; /* tls key size is bytes, sasl wants bits */ in start_auth_sasl()
/openbmc/linux/lib/crypto/
H A Daesgcm.c47 unsigned int keysize, unsigned int authsize) in aesgcm_expandkey() argument
53 aes_expandkey(&ctx->aes_ctx, key, keysize); in aesgcm_expandkey()
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-connectivity/wvdial/wvstreams/
H A D0001-Forward-port-to-OpenSSL-1.1.x.patch203 key = new unsigned char[keysize];
204 memcpy(key, _key, keysize);
222 - HMAC_Init(hmacctx, key, keysize, (env_md_st *)digest->getevpmd());
223 + HMAC_Init(hmacctx, key, keysize, digest->getevpmd());
531 size_t keysize;
/openbmc/linux/drivers/net/ethernet/sfc/
H A Dtc_encap_actions.c524 size_t keysize; in efx_neigh_event() local
530 keysize = sizeof(keys.dst_ip); in efx_neigh_event()
534 keysize = sizeof(keys.dst_ip6); in efx_neigh_event()
544 if (n->tbl->key_len != keysize) { in efx_neigh_event()
/openbmc/linux/drivers/char/tpm/
H A Dtpm-sysfs.c24 __be32 keysize; member
69 be32_to_cpu(out->keysize)); in pubek_show()

12