Lines Matching refs:key_size

212 	unsigned int key_size;  member
235 u8 key[] __counted_by(key_size);
512 int subkey_size = cc->key_size / cc->key_parts; in crypt_iv_lmk_init()
643 if (cc->key_size <= (cc->iv_size + TCW_WHITENING_SIZE)) { in crypt_iv_tcw_ctr()
662 int key_offset = cc->key_size - cc->iv_size - TCW_WHITENING_SIZE; in crypt_iv_tcw_init()
1077 int key_offset = cc->key_size - cc->key_extra_size; in crypt_iv_elephant_init()
2434 return (cc->key_size - cc->key_extra_size) >> ilog2(cc->tfms_count); in crypt_subkey_size()
2521 if (cc->key_size != ukp->datalen) in set_key_user()
2524 memcpy(cc->key, ukp->data, cc->key_size); in set_key_user()
2537 if (cc->key_size != ekp->decrypted_datalen) in set_key_encrypted()
2540 memcpy(cc->key, ekp->decrypted_data, cc->key_size); in set_key_encrypted()
2553 if (cc->key_size != tkp->key_len) in set_key_trusted()
2556 memcpy(cc->key, tkp->key, cc->key_size); in set_key_trusted()
2678 if (!cc->key_size && strcmp(key, "-")) in crypt_set_key()
2695 if (cc->key_size && hex2bin(cc->key, key, cc->key_size) < 0) in crypt_set_key()
2714 get_random_bytes(&cc->key, cc->key_size); in crypt_wipe_key()
2726 memset(&cc->key, 0, cc->key_size * sizeof(u8)); in crypt_wipe_key()
2867 cc->key_extra_size = cc->key_size / 2; in crypt_ctr_ivmode()
2879 if (cc->key_size % cc->key_parts) { in crypt_ctr_ivmode()
2881 cc->key_extra_size = cc->key_size / cc->key_parts; in crypt_ctr_ivmode()
3147 memset(cc->key, 0, cc->key_size * sizeof(u8)); in crypt_ctr_cipher()
3262 int key_size, wq_id; in crypt_ctr() local
3275 key_size = get_key_size(&argv[1]); in crypt_ctr()
3276 if (key_size < 0) { in crypt_ctr()
3281 cc = kzalloc(struct_size(cc, key, key_size), GFP_KERNEL); in crypt_ctr()
3286 cc->key_size = key_size; in crypt_ctr()
3584 if (cc->key_size > 0) { in crypt_status()
3586 DMEMIT(":%u:%s", cc->key_size, cc->key_string); in crypt_status()
3588 for (i = 0; i < cc->key_size; i++) { in crypt_status()
3656 DMEMIT(",key_size=%u", cc->key_size); in crypt_status()
3699 int key_size, ret = -EINVAL; in crypt_message() local
3711 key_size = get_key_size(&argv[2]); in crypt_message()
3712 if (key_size < 0 || cc->key_size != key_size) { in crypt_message()
3724 memset(cc->key, 0, cc->key_size * sizeof(u8)); in crypt_message()