/linux-4.1.27/drivers/misc/eeprom/ |
H A D | sunxi_sid.c | 40 unsigned int keysize; member in struct:sunxi_sid_data 53 if (offset >= sid_data->keysize) sunxi_sid_read_byte() 73 if (pos < 0 || pos >= sid_data->keysize) sid_read() 75 if (size > sid_data->keysize - pos) sid_read() 76 size = sid_data->keysize - pos; sid_read() 125 sid_data->keysize = (int)of_dev_id->data; sunxi_sid_probe() 129 sid_bin_attr.size = sid_data->keysize; sunxi_sid_probe() 133 entropy = kzalloc(sizeof(u8) * sid_data->keysize, GFP_KERNEL); sunxi_sid_probe() 134 for (i = 0; i < sid_data->keysize; i++) sunxi_sid_probe() 136 add_device_randomness(entropy, sid_data->keysize); sunxi_sid_probe()
|
/linux-4.1.27/net/core/ |
H A D | flow.c | 161 size_t keysize) flow_hash_code() 164 const u32 length = keysize * sizeof(flow_compare_t) / sizeof(u32); flow_hash_code() 174 size_t keysize) flow_key_compare() 179 k1_lim = k1 + keysize; flow_key_compare() 199 size_t keysize; flow_cache_lookup() local 208 keysize = flow_key_size(family); flow_cache_lookup() 209 if (!keysize) flow_cache_lookup() 220 hash = flow_hash_code(fc, fcp, key, keysize); flow_cache_lookup() 225 flow_key_compare(key, &tfle->key, keysize) == 0) { flow_cache_lookup() 240 memcpy(&fle->key, key, keysize * sizeof(flow_compare_t)); flow_cache_lookup() 158 flow_hash_code(struct flow_cache *fc, struct flow_cache_percpu *fcp, const struct flowi *key, size_t keysize) flow_hash_code() argument 173 flow_key_compare(const struct flowi *key1, const struct flowi *key2, size_t keysize) flow_key_compare() argument
|
/linux-4.1.27/arch/x86/crypto/ |
H A D | salsa20_glue.c | 35 u32 keysize, u32 ivsize); 41 unsigned int keysize) setkey() 44 salsa20_keysetup(ctx, key, keysize*8, SALSA20_IV_SIZE*8); setkey() 40 setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keysize) setkey() argument
|
H A D | aesni-intel_asm.S | 103 #define keysize 2*15*16(%arg1) define 274 mov keysize,%eax 390 mov keysize,%eax 496 mov keysize,%eax 611 mov keysize,%eax 781 mov keysize,%eax 989 mov keysize,%eax 1181 mov keysize,%eax
|
/linux-4.1.27/drivers/staging/lustre/lustre/include/lustre/ |
H A D | libiam.h | 76 int blocksize, int keysize, int recsize, int ptrsize); 102 int *keysize, char *save_key, 118 int *keysize, char *save_key, 127 int *keysize, char *save_key,
|
/linux-4.1.27/crypto/ |
H A D | tcrypt.c | 271 unsigned int aad_size, u8 *keysize) test_aead_speed() 343 if ((*keysize + *b_size) > TVMEMSIZE * PAGE_SIZE) { test_aead_speed() 345 *keysize + *b_size, test_aead_speed() 352 if (template[j].klen == *keysize) { test_aead_speed() 357 ret = crypto_aead_setkey(tfm, key, *keysize); test_aead_speed() 366 i, *keysize * 8, *b_size); test_aead_speed() 399 keysize++; test_aead_speed() 400 } while (*keysize); test_aead_speed() 421 unsigned int tcount, u8 *keysize) test_cipher_speed() 456 if ((*keysize + *b_size) > TVMEMSIZE * PAGE_SIZE) { test_cipher_speed() 458 "tvmem (%lu)\n", *keysize + *b_size, test_cipher_speed() 464 *keysize * 8, *b_size); test_cipher_speed() 471 if (template[j].klen == *keysize) { test_cipher_speed() 477 ret = crypto_blkcipher_setkey(tfm, key, *keysize); test_cipher_speed() 485 sg_set_buf(sg, tvmem[0] + *keysize, test_cipher_speed() 486 PAGE_SIZE - *keysize); test_cipher_speed() 512 keysize++; test_cipher_speed() 513 } while (*keysize); test_cipher_speed() 1082 unsigned int tcount, u8 *keysize) test_acipher_speed() 1128 if ((*keysize + *b_size) > TVMEMSIZE * PAGE_SIZE) { test_acipher_speed() 1130 "tvmem (%lu)\n", *keysize + *b_size, test_acipher_speed() 1136 *keysize * 8, *b_size); test_acipher_speed() 1143 if (template[j].klen == *keysize) { test_acipher_speed() 1151 ret = crypto_ablkcipher_setkey(tfm, key, *keysize); test_acipher_speed() 1158 k = *keysize + *b_size; test_acipher_speed() 1162 sg_set_buf(sg, tvmem[0] + *keysize, test_acipher_speed() 1163 PAGE_SIZE - *keysize); test_acipher_speed() 1175 sg_set_buf(sg, tvmem[0] + *keysize, *b_size); test_acipher_speed() 1199 keysize++; test_acipher_speed() 1200 } while (*keysize); test_acipher_speed() 268 test_aead_speed(const char *algo, int enc, unsigned int secs, struct aead_speed_template *template, unsigned int tcount, u8 authsize, unsigned int aad_size, u8 *keysize) test_aead_speed() argument 419 test_cipher_speed(const char *algo, int enc, unsigned int secs, struct cipher_speed_template *template, unsigned int tcount, u8 *keysize) test_cipher_speed() argument 1080 test_acipher_speed(const char *algo, int enc, unsigned int secs, struct cipher_speed_template *template, unsigned int tcount, u8 *keysize) test_acipher_speed() argument
|
H A D | proc.c | 111 seq_printf(m, "min keysize : %u\n", c_show() 113 seq_printf(m, "max keysize : %u\n", c_show()
|
H A D | salsa20_generic.c | 170 unsigned int keysize) setkey() 173 salsa20_keysetup(ctx, key, keysize); setkey() 169 setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keysize) setkey() argument
|
H A D | ablkcipher.c | 423 seq_printf(m, "min keysize : %u\n", ablkcipher->min_keysize); crypto_ablkcipher_show() 424 seq_printf(m, "max keysize : %u\n", ablkcipher->max_keysize); crypto_ablkcipher_show() 504 seq_printf(m, "min keysize : %u\n", ablkcipher->min_keysize); crypto_givcipher_show() 505 seq_printf(m, "max keysize : %u\n", ablkcipher->max_keysize); crypto_givcipher_show()
|
H A D | blkcipher.c | 545 seq_printf(m, "min keysize : %u\n", alg->cra_blkcipher.min_keysize); crypto_blkcipher_show() 546 seq_printf(m, "max keysize : %u\n", alg->cra_blkcipher.max_keysize); crypto_blkcipher_show()
|
/linux-4.1.27/drivers/crypto/ux500/cryp/ |
H A D | cryp.c | 119 *control_register |= (cryp_config->keysize << CRYP_CR_KEYSIZE_POS); cryp_set_configuration() 313 switch (config->keysize) { cryp_save_device_context() 360 switch (config->keysize) { cryp_restore_device_context()
|
H A D | cryp.h | 83 * @keysize: Key size for AES 90 int keysize; member in struct:cryp_config
|
H A D | cryp_core.c | 954 ctx->config.keysize = CRYP_KEY_SIZE_128; aes_ablkcipher_setkey() 958 ctx->config.keysize = CRYP_KEY_SIZE_192; aes_ablkcipher_setkey() 962 ctx->config.keysize = CRYP_KEY_SIZE_256; aes_ablkcipher_setkey()
|
/linux-4.1.27/fs/befs/ |
H A D | btree.c | 405 * @keysize: Length of the returned key 420 loff_t key_no, size_t bufsize, char *keybuf, size_t * keysize, befs_btree_read() 458 *keysize = 0; befs_btree_read() 471 *keysize = 0; befs_btree_read() 500 befs_debug(sb, "Read [%llu,%d]: keysize %d", befs_btree_read() 513 *keysize = keylen; befs_btree_read() 529 *keysize = 0; befs_btree_read() 419 befs_btree_read(struct super_block *sb, befs_data_stream * ds, loff_t key_no, size_t bufsize, char *keybuf, size_t * keysize, befs_off_t * value) befs_btree_read() argument
|
H A D | linuxvfs.c | 221 size_t keysize; befs_readdir() local 230 keybuf, &keysize, &value); befs_readdir() 254 befs_utf2nls(sb, keybuf, keysize, &nlsname, &nlsnamelen); befs_readdir() 266 if (!dir_emit(ctx, keybuf, keysize, befs_readdir()
|
/linux-4.1.27/drivers/crypto/ |
H A D | hifn_795x.c | 652 unsigned int keysize; member in struct:hifn_context 1198 if (ctx->keysize) hifn_setup_cmd_desc() 1222 if (ctx->keysize != 16) hifn_setup_cmd_desc() 1228 if (ctx->keysize != 24) hifn_setup_cmd_desc() 1234 if (ctx->keysize != 32) hifn_setup_cmd_desc() 1240 if (ctx->keysize != 24) hifn_setup_cmd_desc() 1245 if (ctx->keysize != 8) hifn_setup_cmd_desc() 1254 nbytes, nbytes, ctx->key, ctx->keysize, hifn_setup_cmd_desc() 1638 ctx->key, ctx->keysize, hifn_setup_session() 1662 ctx.keysize = 16; hifn_test() 2072 ctx->keysize = len; hifn_setkey() 2115 if (ctx->keysize != 16 && type == ACRYPTO_TYPE_AES_128) { hifn_setup_crypto_req() 2116 if (ctx->keysize == 24) hifn_setup_crypto_req() 2118 else if (ctx->keysize == 32) hifn_setup_crypto_req()
|
H A D | talitos.c | 1884 unsigned int keysize = keylen; ahash_setkey() local 1889 memcpy(ctx->key, key, keysize); ahash_setkey() 1899 keysize = digestsize; ahash_setkey() 1903 ctx->keylen = keysize; ahash_setkey()
|
/linux-4.1.27/drivers/char/tpm/ |
H A D | tpm.h | 332 __be32 keysize; member in struct:tpm_readpubek_params_out
|
/linux-4.1.27/drivers/input/keyboard/ |
H A D | lm8323.c | 335 int keysize = (lm->size_x << 4) | lm->size_y; lm8323_configure() local 349 lm8323_write(lm, 2, LM8323_CMD_SET_KEY_SIZE, keysize); lm8323_configure()
|
/linux-4.1.27/net/key/ |
H A D | af_key.c | 1140 int keysize = 0; pfkey_msg2xfrm_state() local 1147 keysize = (key->sadb_key_bits + 7) / 8; pfkey_msg2xfrm_state() 1148 x->aalg = kmalloc(sizeof(*x->aalg) + keysize, GFP_KERNEL); pfkey_msg2xfrm_state() 1155 memcpy(x->aalg->alg_key, key+1, keysize); pfkey_msg2xfrm_state() 1174 int keysize = 0; pfkey_msg2xfrm_state() local 1182 keysize = (key->sadb_key_bits + 7) / 8; pfkey_msg2xfrm_state() 1183 x->ealg = kmalloc(sizeof(*x->ealg) + keysize, GFP_KERNEL); pfkey_msg2xfrm_state() 1190 memcpy(x->ealg->alg_key, key+1, keysize); pfkey_msg2xfrm_state()
|
/linux-4.1.27/drivers/block/ |
H A D | loop.c | 97 int i, keysize; transfer_xor() local 108 keysize = lo->lo_encrypt_key_size; transfer_xor() 110 *out++ = *in++ ^ key[(i & 511) % keysize]; transfer_xor()
|