| /drivers/net/ethernet/netronome/nfp/flower/ |
| A D | offload.c | 250 int key_size; in nfp_flower_calculate_key_layers() local 270 key_size = sizeof(struct nfp_flower_meta_tci) + in nfp_flower_calculate_key_layers() 292 key_size += sizeof(struct nfp_flower_vlan); in nfp_flower_calculate_key_layers() 309 key_size += sizeof(struct nfp_flower_vlan); in nfp_flower_calculate_key_layers() 379 key_size += in nfp_flower_calculate_key_layers() 382 key_size += in nfp_flower_calculate_key_layers() 401 &key_size, priv, in nfp_flower_calculate_key_layers() 425 key_size += sizeof(struct nfp_flower_ipv4); in nfp_flower_calculate_key_layers() 430 key_size += sizeof(struct nfp_flower_ipv6); in nfp_flower_calculate_key_layers() 542 ret_key_ls->key_size = key_size; in nfp_flower_calculate_key_layers() [all …]
|
| A D | conntrack.c | 623 int key_size; in nfp_fl_calc_key_layers_sz() local 630 map[FLOW_PAY_EXT_META] = key_size; in nfp_fl_calc_key_layers_sz() 634 map[FLOW_PAY_INPORT] = key_size; in nfp_fl_calc_key_layers_sz() 638 map[FLOW_PAY_MAC_MPLS] = key_size; in nfp_fl_calc_key_layers_sz() 642 map[FLOW_PAY_L4] = key_size; in nfp_fl_calc_key_layers_sz() 646 map[FLOW_PAY_IPV4] = key_size; in nfp_fl_calc_key_layers_sz() 650 map[FLOW_PAY_IPV6] = key_size; in nfp_fl_calc_key_layers_sz() 655 map[FLOW_PAY_QINQ] = key_size; in nfp_fl_calc_key_layers_sz() 660 map[FLOW_PAY_GRE] = key_size; in nfp_fl_calc_key_layers_sz() 669 map[FLOW_PAY_UDP_TUN] = key_size; in nfp_fl_calc_key_layers_sz() [all …]
|
| /drivers/mmc/host/ |
| A D | cqhci-crypto.c | 17 enum cqhci_crypto_key_size key_size; member 21 .key_size = CQHCI_CRYPTO_KEY_SIZE_256, 72 ccap_array[i].key_size == alg->key_size && in cqhci_crypto_keyslot_program() 142 cqhci_crypto_algs[i].key_size == cap.key_size) in cqhci_find_blk_crypto_mode()
|
| /drivers/md/ |
| A D | dm-crypt.c | 212 unsigned int key_size; member 235 u8 key[] __counted_by(key_size); 2521 if (cc->key_size != ukp->datalen) in set_key_user() 2553 if (cc->key_size != tkp->key_len) in set_key_trusted() 2695 if (cc->key_size && hex2bin(cc->key, key, cc->key_size) < 0) in crypt_set_key() 3262 int key_size, wq_id; in crypt_ctr() local 3276 if (key_size < 0) { in crypt_ctr() 3286 cc->key_size = key_size; in crypt_ctr() 3584 if (cc->key_size > 0) { in crypt_status() 3699 int key_size, ret = -EINVAL; in crypt_message() local [all …]
|
| /drivers/hv/ |
| A D | hv_kvp.c | 460 message->body.kvp_set.data.key_size = in kvp_send_key() 463 in_msg->body.kvp_set.data.key_size, in kvp_send_key() 471 message->body.kvp_get.data.key_size = in kvp_send_key() 474 in_msg->body.kvp_get.data.key_size, in kvp_send_key() 481 message->body.kvp_delete.key_size = in kvp_send_key() 484 in_msg->body.kvp_delete.key_size, in kvp_send_key() 600 kvp_data->key_size = 2*(keylen + 1); /* utf16 encoding */ in kvp_respond_to_host()
|
| /drivers/net/ethernet/netronome/nfp/bpf/ |
| A D | cmsg.c | 97 req->key_size = cpu_to_be32(map->key_size); in nfp_bpf_ctrl_alloc_map() 233 if (memcmp(cached_key, key, map->key_size)) in nfp_bpf_ctrl_op_cache_get() 245 map->key_size); in nfp_bpf_ctrl_op_cache_get() 330 memcpy(nfp_bpf_ctrl_req_key(bpf, req, 0), key, map->key_size); in nfp_bpf_ctrl_entry_op() 370 map->key_size); in nfp_bpf_ctrl_entry_op()
|
| A D | offload.c | 363 if (round_up(offmap->map.key_size, 8) + in nfp_bpf_map_alloc() 366 round_up(offmap->map.key_size, 8) + in nfp_bpf_map_alloc() 371 if (offmap->map.key_size > bpf->maps.max_key_sz) { in nfp_bpf_map_alloc() 373 offmap->map.key_size, bpf->maps.max_key_sz); in nfp_bpf_map_alloc()
|
| A D | fw.h | 80 __be32 key_size; /* in bytes */ member
|
| /drivers/crypto/amcc/ |
| A D | crypto4xx_sa.h | 38 u32 key_size:4; member 279 offset = cts->sa_contents.bf.key_size in get_dynamic_sa_offset_state_ptr_field() 306 cts->sa_contents.bf.key_size * 4); in get_dynamic_sa_inner_digest()
|
| /drivers/crypto/intel/keembay/ |
| A D | ocs-aes.c | 478 int ocs_aes_set_key(struct ocs_aes_dev *aes_dev, u32 key_size, const u8 *key, in ocs_aes_set_key() argument 486 if (cipher == OCS_AES && !(key_size == 32 || key_size == 16)) { in ocs_aes_set_key() 489 key_size * 8); in ocs_aes_set_key() 493 if (cipher == OCS_SM4 && key_size != 16) { in ocs_aes_set_key() 496 key_size * 8); in ocs_aes_set_key() 506 for (i = 0; i < (key_size / sizeof(u32)); i++) { in ocs_aes_set_key() 518 val = (key_size == 16) ? AES_128_BIT_KEY : AES_256_BIT_KEY; in ocs_aes_set_key()
|
| /drivers/net/ethernet/freescale/dpaa2/ |
| A D | dpaa2-ethtool.c | 584 rule_cfg.key_size = dpaa2_eth_cls_key_size(DPAA2_ETH_DIST_ALL); in dpaa2_eth_do_cls_rule() 587 key_buf = kzalloc(rule_cfg.key_size * 2, GFP_KERNEL); in dpaa2_eth_do_cls_rule() 592 err = dpaa2_eth_prep_cls_rule(fs, key_buf, key_buf + rule_cfg.key_size, &fields); in dpaa2_eth_do_cls_rule() 619 rule_cfg.key_size = dpaa2_eth_cls_key_size(fields); in dpaa2_eth_do_cls_rule() 622 key_iova = dma_map_single(dev, key_buf, rule_cfg.key_size * 2, in dpaa2_eth_do_cls_rule() 631 rule_cfg.mask_iova = key_iova + rule_cfg.key_size; in dpaa2_eth_do_cls_rule() 652 dma_unmap_single(dev, key_iova, rule_cfg.key_size * 2, DMA_TO_DEVICE); in dpaa2_eth_do_cls_rule()
|
| A D | dpni-cmd.h | 568 u8 key_size; member 583 u8 key_size; member 606 u8 key_size; member 615 u8 key_size; member
|
| A D | dpni.c | 1894 cmd_params->key_size = cfg->key_size; in dpni_add_fs_entry() 1932 cmd_params->key_size = cfg->key_size; in dpni_remove_fs_entry() 2006 cmd_params->key_size = cfg->key_size; in dpni_add_qos_entry() 2037 cmd_params->key_size = cfg->key_size; in dpni_remove_qos_entry()
|
| /drivers/platform/cznic/ |
| A D | turris-signing-key.c | 83 info->key_size = subtype->key_size; in turris_signing_key_asym_query()
|
| /drivers/net/ethernet/hisilicon/hns3/hns3_common/ |
| A D | hclge_comm_rss.c | 390 int key_size; in hclge_comm_set_rss_algo_key() local 405 key_size = min(HCLGE_COMM_RSS_HASH_KEY_NUM, key_counts); in hclge_comm_set_rss_algo_key() 408 key_size); in hclge_comm_set_rss_algo_key() 410 key_counts -= key_size; in hclge_comm_set_rss_algo_key()
|
| /drivers/ufs/core/ |
| A D | ufshcd-crypto.c | 59 ccap_array[i].key_size == alg->ufs_key_size && in ufshcd_crypto_keyslot_program() 134 ufs_crypto_algs[i].ufs_key_size == cap.key_size) { in ufshcd_find_blk_crypto_mode()
|
| /drivers/net/netdevsim/ |
| A D | bpf.c | 331 return e->key && !memcmp(key, e->key, map->key_size); in nsim_map_key_match() 351 nmap->entry[idx].key = kmalloc(offmap->map.key_size, in nsim_map_alloc_elem() 385 offmap->map.key_size); in nsim_map_get_next_key() 447 memcpy(nmap->entry[idx].key, key, offmap->map.key_size); in nsim_map_update_elem()
|
| /drivers/net/wireless/ti/wlcore/ |
| A D | cmd.h | 63 u8 key_size, const u8 *key, const u8 *addr, 67 u8 key_size, const u8 *key, u8 hlid, u32 tx_seq_32, 494 u8 key_size; member
|
| A D | cmd.c | 1370 u8 key_size, const u8 *key, const u8 *addr, in wl1271_cmd_set_sta_key() argument 1396 cmd->key_size = key_size; in wl1271_cmd_set_sta_key() 1416 memcpy(cmd->key, key, key_size); in wl1271_cmd_set_sta_key() 1439 u8 key_size, const u8 *key, u8 hlid, u32 tx_seq_32, in wl1271_cmd_set_ap_key() argument 1468 cmd->key_size = key_size; in wl1271_cmd_set_ap_key() 1485 memcpy(cmd->key, key, key_size); in wl1271_cmd_set_ap_key()
|
| /drivers/net/ethernet/intel/iavf/ |
| A D | iavf_common.c | 336 u16 key_size = sizeof(struct iavf_aqc_get_set_rss_key_data); in iavf_aq_get_set_rss_key() local 358 status = iavf_asq_send_command(hw, &desc, key, key_size, NULL); in iavf_aq_get_set_rss_key()
|
| /drivers/crypto/virtio/ |
| A D | virtio_crypto_akcipher_algs.c | 24 unsigned int key_size; member 370 rsa_ctx->key_size = mpi_get_size(n); in virtio_crypto_rsa_set_key() 443 return rsa_ctx->key_size; in virtio_crypto_rsa_max_size()
|
| /drivers/crypto/hisilicon/hpre/ |
| A D | hpre_crypto.c | 741 memcpy(ctx->dh.xa_p + (ctx->key_sz - params.key_size), params.key, in hpre_dh_set_secret() 742 params.key_size); in hpre_dh_set_secret() 1306 if (params->key_size == cur_sz && memcmp(params->key, n, cur_sz) >= 0) { in hpre_ecdh_fill_curve() 1342 if (!curve_sz || params->key_size > curve_sz) in hpre_ecdh_set_param() 1392 params->key_size); in ecdh_gen_privkey() 1416 if (!params.key || !params.key_size) { in hpre_ecdh_set_secret() 1424 params.key_size = curve_sz - 1; in hpre_ecdh_set_secret() 1430 if (hpre_key_is_zero(params.key, params.key_size)) { in hpre_ecdh_set_secret() 1444 sz_shift = (sz << 1) + sz - params.key_size; in hpre_ecdh_set_secret() 1445 memcpy(ctx->ecdh.p + sz_shift, params.key, params.key_size); in hpre_ecdh_set_secret()
|
| /drivers/crypto/ccp/ |
| A D | ccp-crypto-rsa.c | 52 req->dst_len = rctx->cmd.u.rsa.key_size >> 3; in ccp_rsa_complete() 75 rctx->cmd.u.rsa.key_size = ctx->u.rsa.key_len; /* in bits */ in ccp_rsa_crypt()
|
| /drivers/net/ethernet/mellanox/mlxsw/ |
| A D | spectrum_acl_erp.c | 389 enum mlxsw_reg_perpt_key_size key_size; in mlxsw_sp_acl_erp_table_erp_add() local 394 key_size = (enum mlxsw_reg_perpt_key_size) erp_table->aregion->type; in mlxsw_sp_acl_erp_table_erp_add() 395 mlxsw_reg_perpt_pack(perpt_pl, erpt_bank, erpt_index, key_size, erp->id, in mlxsw_sp_acl_erp_table_erp_add() 409 enum mlxsw_reg_perpt_key_size key_size; in mlxsw_sp_acl_erp_table_erp_del() local 414 key_size = (enum mlxsw_reg_perpt_key_size) erp_table->aregion->type; in mlxsw_sp_acl_erp_table_erp_del() 415 mlxsw_reg_perpt_pack(perpt_pl, erpt_bank, erpt_index, key_size, erp->id, in mlxsw_sp_acl_erp_table_erp_del()
|
| /drivers/crypto/qce/ |
| A D | common.c | 102 static u32 qce_auth_cfg(unsigned long flags, u32 key_size, u32 auth_size) in qce_auth_cfg() argument 112 if (key_size == AES_KEYSIZE_128) in qce_auth_cfg() 114 else if (key_size == AES_KEYSIZE_256) in qce_auth_cfg()
|