/linux-6.3-rc2/drivers/crypto/hisilicon/hpre/ |
A D | hpre_crypto.c | 120 unsigned int key_sz; member 395 ctx->key_sz = 0; in hpre_ctx_set() 411 ctx->key_sz = 0; in hpre_ctx_clear() 640 switch (key_sz) { in hpre_is_dh_params_length_valid() 746 return ctx->key_sz; in hpre_dh_max_size() 903 ctx->key_sz = vlen; in hpre_rsa_set_n() 941 if (!ctx->key_sz || !vlen || vlen > ctx->key_sz) in hpre_rsa_set_e() 956 if (!ctx->key_sz || !vlen || vlen > ctx->key_sz) in hpre_rsa_set_d() 1329 if (!ctx->key_sz) in hpre_ecdh_set_param() 1336 sz = ctx->key_sz; in hpre_ecdh_set_param() [all …]
|
/linux-6.3-rc2/drivers/crypto/qat/qat_common/ |
A D | qat_asym_algs.c | 76 unsigned int key_sz; member 664 req->dst_len = ctx->key_sz; in qat_rsa_enc() 668 if (req->src_len > ctx->key_sz) in qat_rsa_enc() 798 req->dst_len = ctx->key_sz; in qat_rsa_dec() 944 ctx->key_sz = vlen; in qat_rsa_set_n() 958 ctx->key_sz = 0; in qat_rsa_set_n() 975 if (!ctx->key_sz || !vlen || vlen > ctx->key_sz) { in qat_rsa_set_e() 1002 if (!ctx->key_sz || !vlen || vlen > ctx->key_sz) in qat_rsa_set_d() 1157 ctx->key_sz = 0; in qat_rsa_clear_ctx() 1223 return ctx->key_sz; in qat_rsa_max_size() [all …]
|
/linux-6.3-rc2/fs/orangefs/ |
A D | xattr.c | 160 new_op->upcall.req.getxattr.key_sz = strlen(name) + 1; in orangefs_inode_getxattr() 215 upcall.req.getxattr.key_sz, in orangefs_inode_getxattr() 269 new_op->upcall.req.removexattr.key_sz = strlen(name) + 1; in orangefs_inode_removexattr() 274 (int)new_op->upcall.req.removexattr.key_sz); in orangefs_inode_removexattr() 363 new_op->upcall.req.setxattr.keyval.key_sz = strlen(name) + 1; in orangefs_inode_setxattr() 371 (int)new_op->upcall.req.setxattr.keyval.key_sz, in orangefs_inode_setxattr()
|
A D | upcall.h | 118 __s32 key_sz; member 139 __s32 key_sz; member
|
A D | protocol.h | 219 __s32 key_sz; /* __s32 for portable, fixed-size structures */ member
|
/linux-6.3-rc2/drivers/crypto/ |
A D | sa2ul.c | 145 u16 key_sz, __be32 *ipad, __be32 *opad); 387 for (i = 0; i < key_sz; i++) in prepare_kipad() 399 for (i = 0; i < key_sz; i++) in prepare_kopad() 448 prepare_kipad(sha.k_pad, key, key_sz); in sa_prepare_iopads() 454 prepare_kopad(sha.k_pad, key, key_sz); in sa_prepare_iopads() 470 if (aes_expandkey(&ctx, key, key_sz)) { in sa_aes_inv_key() 476 if (key_sz == AES_KEYSIZE_192) { in sa_aes_inv_key() 482 switch (key_sz) { in sa_aes_inv_key() 485 key_pos = key_sz + 24; in sa_aes_inv_key() 489 key_pos = key_sz + 24 - 4; in sa_aes_inv_key() [all …]
|
/linux-6.3-rc2/tools/lib/bpf/ |
A D | libbpf.h | 947 const void *key, size_t key_sz, 971 const void *key, size_t key_sz, 987 const void *key, size_t key_sz, __u64 flags); 1010 const void *key, size_t key_sz, 1028 const void *cur_key, void *next_key, size_t key_sz);
|
A D | libbpf.c | 9426 if (map->def.key_size != key_sz) { in validate_map_op() 9428 map->name, key_sz, map->def.key_size); in validate_map_op() 9462 const void *key, size_t key_sz, in bpf_map__lookup_elem() argument 9467 err = validate_map_op(map, key_sz, value_sz, true); in bpf_map__lookup_elem() 9475 const void *key, size_t key_sz, in bpf_map__update_elem() argument 9480 err = validate_map_op(map, key_sz, value_sz, true); in bpf_map__update_elem() 9488 const void *key, size_t key_sz, __u64 flags) in bpf_map__delete_elem() argument 9492 err = validate_map_op(map, key_sz, 0, false /* check_value_sz */); in bpf_map__delete_elem() 9500 const void *key, size_t key_sz, in bpf_map__lookup_and_delete_elem() argument 9505 err = validate_map_op(map, key_sz, value_sz, true); in bpf_map__lookup_and_delete_elem() [all …]
|
/linux-6.3-rc2/drivers/crypto/inside-secure/ |
A D | safexcel_hash.c | 27 u8 key_sz; member 125 memcpy(ctx->base.ctxr->data, &ctx->base.ipad, ctx->key_sz); in safexcel_context_control() 1974 memcpy(req->state, &ctx->base.ipad, ctx->key_sz); in safexcel_cbcmac_init() 1980 req->state_sz = ctx->key_sz; in safexcel_cbcmac_init() 2005 ctx->key_sz = AES_MAX_KEY_SIZE + 2 * AES_BLOCK_SIZE; in safexcel_cbcmac_setkey() 2008 ctx->key_sz = AES_MAX_KEY_SIZE + 2 * AES_BLOCK_SIZE; in safexcel_cbcmac_setkey() 2011 ctx->key_sz = AES_MIN_KEY_SIZE + 2 * AES_BLOCK_SIZE; in safexcel_cbcmac_setkey() 2084 ctx->key_sz = AES_MIN_KEY_SIZE + 2 * AES_BLOCK_SIZE; in safexcel_xcbcmac_setkey() 2181 ctx->key_sz = AES_MAX_KEY_SIZE + 2 * AES_BLOCK_SIZE; in safexcel_cmac_setkey() 2184 ctx->key_sz = AES_MAX_KEY_SIZE + 2 * AES_BLOCK_SIZE; in safexcel_cmac_setkey() [all …]
|
/linux-6.3-rc2/drivers/net/ethernet/mellanox/mlx5/core/lib/ |
A D | crypto.c | 115 u8 key_sz; in mlx5_crypto_dek_fill_key() local 118 err = mlx5_crypto_dek_get_key_sz(mdev, sz_bytes, &key_sz); in mlx5_crypto_dek_fill_key() 122 MLX5_SET(encryption_key_obj, key_obj, key_size, key_sz); in mlx5_crypto_dek_fill_key()
|
/linux-6.3-rc2/drivers/net/ethernet/netronome/nfp/flower/ |
A D | conntrack.c | 125 u32 offset, size_t key_sz, in get_mangled_key() argument 141 if (off % 4 || off >= key_sz) in get_mangled_key()
|