/linux-4.4.14/net/core/ |
D | flow.c | 161 size_t keysize) in flow_hash_code() argument 164 const u32 length = keysize * sizeof(flow_compare_t) / sizeof(u32); in flow_hash_code() 174 size_t keysize) in flow_key_compare() argument 179 k1_lim = k1 + keysize; in flow_key_compare() 199 size_t keysize; in flow_cache_lookup() local 208 keysize = flow_key_size(family); in flow_cache_lookup() 209 if (!keysize) in flow_cache_lookup() 220 hash = flow_hash_code(fc, fcp, key, keysize); in flow_cache_lookup() 225 flow_key_compare(key, &tfle->key, keysize) == 0) { in flow_cache_lookup() 240 memcpy(&fle->key, key, keysize * sizeof(flow_compare_t)); in flow_cache_lookup()
|
/linux-4.4.14/crypto/ |
D | tcrypt.c | 304 unsigned int aad_size, u8 *keysize) in test_aead_speed() argument 378 if ((*keysize + *b_size) > TVMEMSIZE * PAGE_SIZE) { in test_aead_speed() 380 *keysize + *b_size, in test_aead_speed() 387 if (template[j].klen == *keysize) { in test_aead_speed() 392 ret = crypto_aead_setkey(tfm, key, *keysize); in test_aead_speed() 401 i, *keysize * 8, *b_size); in test_aead_speed() 437 keysize++; in test_aead_speed() 438 } while (*keysize); in test_aead_speed() 459 unsigned int tcount, u8 *keysize) in test_cipher_speed() argument 494 if ((*keysize + *b_size) > TVMEMSIZE * PAGE_SIZE) { in test_cipher_speed() [all …]
|
D | salsa20_generic.c | 170 unsigned int keysize) in setkey() argument 173 salsa20_keysetup(ctx, key, keysize); in setkey()
|
D | chacha20_generic.c | 128 unsigned int keysize) in crypto_chacha20_setkey() argument 133 if (keysize != CHACHA20_KEY_SIZE) in crypto_chacha20_setkey()
|
/linux-4.4.14/arch/x86/crypto/ |
D | salsa20_glue.c | 35 u32 keysize, u32 ivsize); 41 unsigned int keysize) in setkey() argument 44 salsa20_keysetup(ctx, key, keysize*8, SALSA20_IV_SIZE*8); in setkey()
|
D | aesni-intel_asm.S | 103 #define keysize 2*15*16(%arg1) macro 274 mov keysize,%eax 390 mov keysize,%eax 496 mov keysize,%eax 611 mov keysize,%eax 781 mov keysize,%eax 989 mov keysize,%eax 1181 mov keysize,%eax
|
/linux-4.4.14/fs/befs/ |
D | btree.h | 12 size_t * keysize, befs_off_t * value);
|
D | btree.c | 420 loff_t key_no, size_t bufsize, char *keybuf, size_t * keysize, in befs_btree_read() argument 458 *keysize = 0; in befs_btree_read() 471 *keysize = 0; in befs_btree_read() 513 *keysize = keylen; in befs_btree_read() 529 *keysize = 0; in befs_btree_read()
|
D | linuxvfs.c | 215 size_t keysize; in befs_readdir() local 224 keybuf, &keysize, &value); in befs_readdir() 248 befs_utf2nls(sb, keybuf, keysize, &nlsname, &nlsnamelen); in befs_readdir() 260 if (!dir_emit(ctx, keybuf, keysize, in befs_readdir()
|
/linux-4.4.14/drivers/crypto/ux500/cryp/ |
D | cryp.c | 119 *control_register |= (cryp_config->keysize << CRYP_CR_KEYSIZE_POS); in cryp_set_configuration() 313 switch (config->keysize) { in cryp_save_device_context() 360 switch (config->keysize) { in cryp_restore_device_context()
|
D | cryp.h | 90 int keysize; member
|
D | cryp_core.c | 954 ctx->config.keysize = CRYP_KEY_SIZE_128; in aes_ablkcipher_setkey() 958 ctx->config.keysize = CRYP_KEY_SIZE_192; in aes_ablkcipher_setkey() 962 ctx->config.keysize = CRYP_KEY_SIZE_256; in aes_ablkcipher_setkey()
|
/linux-4.4.14/include/crypto/ |
D | chacha20.h | 21 unsigned int keysize);
|
/linux-4.4.14/drivers/crypto/ |
D | hifn_795x.c | 650 unsigned int keysize; member 1196 if (ctx->keysize) in hifn_setup_cmd_desc() 1220 if (ctx->keysize != 16) in hifn_setup_cmd_desc() 1226 if (ctx->keysize != 24) in hifn_setup_cmd_desc() 1232 if (ctx->keysize != 32) in hifn_setup_cmd_desc() 1238 if (ctx->keysize != 24) in hifn_setup_cmd_desc() 1243 if (ctx->keysize != 8) in hifn_setup_cmd_desc() 1252 nbytes, nbytes, ctx->key, ctx->keysize, in hifn_setup_cmd_desc() 1636 ctx->key, ctx->keysize, in hifn_setup_session() 1660 ctx.keysize = 16; in hifn_test() [all …]
|
D | talitos.c | 2073 unsigned int keysize = keylen; in ahash_setkey() local 2078 memcpy(ctx->key, key, keysize); in ahash_setkey() 2088 keysize = digestsize; in ahash_setkey() 2092 ctx->keylen = keysize; in ahash_setkey()
|
/linux-4.4.14/drivers/input/keyboard/ |
D | lm8323.c | 335 int keysize = (lm->size_x << 4) | lm->size_y; in lm8323_configure() local 349 lm8323_write(lm, 2, LM8323_CMD_SET_KEY_SIZE, keysize); in lm8323_configure()
|
/linux-4.4.14/drivers/char/tpm/ |
D | tpm.h | 342 __be32 keysize; member
|
/linux-4.4.14/net/key/ |
D | af_key.c | 1140 int keysize = 0; in pfkey_msg2xfrm_state() local 1147 keysize = (key->sadb_key_bits + 7) / 8; in pfkey_msg2xfrm_state() 1148 x->aalg = kmalloc(sizeof(*x->aalg) + keysize, GFP_KERNEL); in pfkey_msg2xfrm_state() 1155 memcpy(x->aalg->alg_key, key+1, keysize); in pfkey_msg2xfrm_state() 1174 int keysize = 0; in pfkey_msg2xfrm_state() local 1182 keysize = (key->sadb_key_bits + 7) / 8; in pfkey_msg2xfrm_state() 1183 x->ealg = kmalloc(sizeof(*x->ealg) + keysize, GFP_KERNEL); in pfkey_msg2xfrm_state() 1190 memcpy(x->ealg->alg_key, key+1, keysize); in pfkey_msg2xfrm_state()
|
/linux-4.4.14/drivers/block/ |
D | loop.c | 97 int i, keysize; in transfer_xor() local 108 keysize = lo->lo_encrypt_key_size; in transfer_xor() 110 *out++ = *in++ ^ key[(i & 511) % keysize]; in transfer_xor()
|