/linux-4.1.27/drivers/misc/eeprom/ |
D | sunxi_sid.c | 40 unsigned int keysize; member 53 if (offset >= sid_data->keysize) in sunxi_sid_read_byte() 73 if (pos < 0 || pos >= sid_data->keysize) in sid_read() 75 if (size > sid_data->keysize - pos) in sid_read() 76 size = sid_data->keysize - pos; in sid_read() 125 sid_data->keysize = (int)of_dev_id->data; in sunxi_sid_probe() 129 sid_bin_attr.size = sid_data->keysize; in sunxi_sid_probe() 133 entropy = kzalloc(sizeof(u8) * sid_data->keysize, GFP_KERNEL); in sunxi_sid_probe() 134 for (i = 0; i < sid_data->keysize; i++) in sunxi_sid_probe() 136 add_device_randomness(entropy, sid_data->keysize); in sunxi_sid_probe()
|
/linux-4.1.27/drivers/staging/lustre/lustre/include/lustre/ |
D | libiam.h | 76 int blocksize, int keysize, int recsize, int ptrsize); 102 int *keysize, char *save_key, 118 int *keysize, char *save_key, 127 int *keysize, char *save_key,
|
/linux-4.1.27/net/core/ |
D | flow.c | 161 size_t keysize) in flow_hash_code() argument 164 const u32 length = keysize * sizeof(flow_compare_t) / sizeof(u32); in flow_hash_code() 174 size_t keysize) in flow_key_compare() argument 179 k1_lim = k1 + keysize; in flow_key_compare() 199 size_t keysize; in flow_cache_lookup() local 208 keysize = flow_key_size(family); in flow_cache_lookup() 209 if (!keysize) in flow_cache_lookup() 220 hash = flow_hash_code(fc, fcp, key, keysize); in flow_cache_lookup() 225 flow_key_compare(key, &tfle->key, keysize) == 0) { in flow_cache_lookup() 240 memcpy(&fle->key, key, keysize * sizeof(flow_compare_t)); in flow_cache_lookup()
|
/linux-4.1.27/crypto/ |
D | tcrypt.c | 271 unsigned int aad_size, u8 *keysize) in test_aead_speed() argument 343 if ((*keysize + *b_size) > TVMEMSIZE * PAGE_SIZE) { in test_aead_speed() 345 *keysize + *b_size, in test_aead_speed() 352 if (template[j].klen == *keysize) { in test_aead_speed() 357 ret = crypto_aead_setkey(tfm, key, *keysize); in test_aead_speed() 366 i, *keysize * 8, *b_size); in test_aead_speed() 399 keysize++; in test_aead_speed() 400 } while (*keysize); in test_aead_speed() 421 unsigned int tcount, u8 *keysize) in test_cipher_speed() argument 456 if ((*keysize + *b_size) > TVMEMSIZE * PAGE_SIZE) { in test_cipher_speed() [all …]
|
D | salsa20_generic.c | 170 unsigned int keysize) in setkey() argument 173 salsa20_keysetup(ctx, key, keysize); in setkey()
|
/linux-4.1.27/arch/x86/crypto/ |
D | salsa20_glue.c | 35 u32 keysize, u32 ivsize); 41 unsigned int keysize) in setkey() argument 44 salsa20_keysetup(ctx, key, keysize*8, SALSA20_IV_SIZE*8); in setkey()
|
D | aesni-intel_asm.S | 103 #define keysize 2*15*16(%arg1) macro 274 mov keysize,%eax 390 mov keysize,%eax 496 mov keysize,%eax 611 mov keysize,%eax 781 mov keysize,%eax 989 mov keysize,%eax 1181 mov keysize,%eax
|
/linux-4.1.27/fs/befs/ |
D | btree.h | 12 size_t * keysize, befs_off_t * value);
|
D | btree.c | 420 loff_t key_no, size_t bufsize, char *keybuf, size_t * keysize, in befs_btree_read() argument 458 *keysize = 0; in befs_btree_read() 471 *keysize = 0; in befs_btree_read() 513 *keysize = keylen; in befs_btree_read() 529 *keysize = 0; in befs_btree_read()
|
D | linuxvfs.c | 221 size_t keysize; in befs_readdir() local 230 keybuf, &keysize, &value); in befs_readdir() 254 befs_utf2nls(sb, keybuf, keysize, &nlsname, &nlsnamelen); in befs_readdir() 266 if (!dir_emit(ctx, keybuf, keysize, in befs_readdir()
|
/linux-4.1.27/drivers/crypto/ux500/cryp/ |
D | cryp.c | 119 *control_register |= (cryp_config->keysize << CRYP_CR_KEYSIZE_POS); in cryp_set_configuration() 313 switch (config->keysize) { in cryp_save_device_context() 360 switch (config->keysize) { in cryp_restore_device_context()
|
D | cryp.h | 90 int keysize; member
|
D | cryp_core.c | 954 ctx->config.keysize = CRYP_KEY_SIZE_128; in aes_ablkcipher_setkey() 958 ctx->config.keysize = CRYP_KEY_SIZE_192; in aes_ablkcipher_setkey() 962 ctx->config.keysize = CRYP_KEY_SIZE_256; in aes_ablkcipher_setkey()
|
/linux-4.1.27/drivers/crypto/ |
D | hifn_795x.c | 652 unsigned int keysize; member 1198 if (ctx->keysize) in hifn_setup_cmd_desc() 1222 if (ctx->keysize != 16) in hifn_setup_cmd_desc() 1228 if (ctx->keysize != 24) in hifn_setup_cmd_desc() 1234 if (ctx->keysize != 32) in hifn_setup_cmd_desc() 1240 if (ctx->keysize != 24) in hifn_setup_cmd_desc() 1245 if (ctx->keysize != 8) in hifn_setup_cmd_desc() 1254 nbytes, nbytes, ctx->key, ctx->keysize, in hifn_setup_cmd_desc() 1638 ctx->key, ctx->keysize, in hifn_setup_session() 1662 ctx.keysize = 16; in hifn_test() [all …]
|
D | talitos.c | 1884 unsigned int keysize = keylen; in ahash_setkey() local 1889 memcpy(ctx->key, key, keysize); in ahash_setkey() 1899 keysize = digestsize; in ahash_setkey() 1903 ctx->keylen = keysize; in ahash_setkey()
|
/linux-4.1.27/drivers/input/keyboard/ |
D | lm8323.c | 335 int keysize = (lm->size_x << 4) | lm->size_y; in lm8323_configure() local 349 lm8323_write(lm, 2, LM8323_CMD_SET_KEY_SIZE, keysize); in lm8323_configure()
|
/linux-4.1.27/drivers/char/tpm/ |
D | tpm.h | 332 __be32 keysize; member
|
/linux-4.1.27/net/key/ |
D | af_key.c | 1140 int keysize = 0; in pfkey_msg2xfrm_state() local 1147 keysize = (key->sadb_key_bits + 7) / 8; in pfkey_msg2xfrm_state() 1148 x->aalg = kmalloc(sizeof(*x->aalg) + keysize, GFP_KERNEL); in pfkey_msg2xfrm_state() 1155 memcpy(x->aalg->alg_key, key+1, keysize); in pfkey_msg2xfrm_state() 1174 int keysize = 0; in pfkey_msg2xfrm_state() local 1182 keysize = (key->sadb_key_bits + 7) / 8; in pfkey_msg2xfrm_state() 1183 x->ealg = kmalloc(sizeof(*x->ealg) + keysize, GFP_KERNEL); in pfkey_msg2xfrm_state() 1190 memcpy(x->ealg->alg_key, key+1, keysize); in pfkey_msg2xfrm_state()
|
/linux-4.1.27/drivers/block/ |
D | loop.c | 97 int i, keysize; in transfer_xor() local 108 keysize = lo->lo_encrypt_key_size; in transfer_xor() 110 *out++ = *in++ ^ key[(i & 511) % keysize]; in transfer_xor()
|