keysize 165 arch/s390/include/uapi/asm/pkey.h __u16 keysize; /* out: key size in bits */ keysize 73 arch/x86/platform/efi/quirks.c u32 keysize; keysize 81 crypto/chacha_generic.c unsigned int keysize, int nrounds) keysize 86 crypto/chacha_generic.c if (keysize != CHACHA_KEY_SIZE) keysize 97 crypto/chacha_generic.c unsigned int keysize) keysize 99 crypto/chacha_generic.c return chacha_setkey(tfm, key, keysize, 20); keysize 104 crypto/chacha_generic.c unsigned int keysize) keysize 106 crypto/chacha_generic.c return chacha_setkey(tfm, key, keysize, 12); keysize 112 crypto/salsa20_generic.c unsigned int keysize) keysize 119 crypto/salsa20_generic.c if (keysize != SALSA20_MIN_KEY_SIZE && keysize 120 crypto/salsa20_generic.c keysize != SALSA20_MAX_KEY_SIZE) keysize 127 crypto/salsa20_generic.c if (keysize == 32) { /* recommended */ keysize 594 crypto/skcipher.c if (tfm->keysize) keysize 690 crypto/skcipher.c skcipher->keysize = calg->cra_blkcipher.max_keysize; keysize 790 crypto/skcipher.c skcipher->keysize = calg->cra_ablkcipher.max_keysize; keysize 901 crypto/skcipher.c skcipher->keysize = alg->max_keysize; keysize 253 crypto/tcrypt.c unsigned int aad_size, u8 *keysize, u32 num_mb) keysize 347 crypto/tcrypt.c *keysize * 8, *b_size); keysize 354 crypto/tcrypt.c if (template[j].klen == *keysize) { keysize 362 crypto/tcrypt.c ret = crypto_aead_setkey(tfm, key, *keysize); keysize 430 crypto/tcrypt.c keysize++; keysize 431 crypto/tcrypt.c } while (*keysize); keysize 521 crypto/tcrypt.c unsigned int aad_size, u8 *keysize) keysize 595 crypto/tcrypt.c if ((*keysize + *b_size) > TVMEMSIZE * PAGE_SIZE) { keysize 597 crypto/tcrypt.c *keysize + *b_size, keysize 604 crypto/tcrypt.c if (template[j].klen == *keysize) { keysize 609 crypto/tcrypt.c ret = crypto_aead_setkey(tfm, key, *keysize); keysize 618 crypto/tcrypt.c i, *keysize * 8, *b_size); keysize 676 crypto/tcrypt.c keysize++; keysize 677 crypto/tcrypt.c } while (*keysize); keysize 1250 crypto/tcrypt.c unsigned int tcount, u8 *keysize, u32 num_mb) keysize 1325 crypto/tcrypt.c *keysize * 8, *b_size); keysize 1332 crypto/tcrypt.c if (template[j].klen == *keysize) { keysize 1340 crypto/tcrypt.c ret = crypto_skcipher_setkey(tfm, key, *keysize); keysize 1395 crypto/tcrypt.c keysize++; keysize 1396 crypto/tcrypt.c } while (*keysize); keysize 1491 crypto/tcrypt.c unsigned int tcount, u8 *keysize, bool async) keysize 1537 crypto/tcrypt.c if ((*keysize + *b_size) > TVMEMSIZE * PAGE_SIZE) { keysize 1539 crypto/tcrypt.c "tvmem (%lu)\n", *keysize + *b_size, keysize 1545 crypto/tcrypt.c *keysize * 8, *b_size); keysize 1552 crypto/tcrypt.c if (template[j].klen == *keysize) { keysize 1560 crypto/tcrypt.c ret = crypto_skcipher_setkey(tfm, key, *keysize); keysize 1567 crypto/tcrypt.c k = *keysize + *b_size; keysize 1571 crypto/tcrypt.c sg_set_buf(sg, tvmem[0] + *keysize, keysize 1572 crypto/tcrypt.c PAGE_SIZE - *keysize); keysize 1584 crypto/tcrypt.c sg_set_buf(sg, tvmem[0] + *keysize, *b_size); keysize 1610 crypto/tcrypt.c keysize++; keysize 1611 crypto/tcrypt.c } while (*keysize); keysize 1621 crypto/tcrypt.c unsigned int tcount, u8 *keysize) keysize 1623 crypto/tcrypt.c return test_skcipher_speed(algo, enc, secs, template, tcount, keysize, keysize 1629 crypto/tcrypt.c unsigned int tcount, u8 *keysize) keysize 1631 crypto/tcrypt.c return test_skcipher_speed(algo, enc, secs, template, tcount, keysize, keysize 2653 crypto/testmgr.c const unsigned int maxkeysize = tfm->keysize; keysize 2766 crypto/testmgr.c if (tfm->keysize != generic_tfm->keysize) { keysize 2768 crypto/testmgr.c driver, tfm->keysize, generic_tfm->keysize); keysize 2793 crypto/testmgr.c vec.key = kmalloc(tfm->keysize, GFP_KERNEL); keysize 100 drivers/block/loop.c int i, keysize; keysize 111 drivers/block/loop.c keysize = lo->lo_encrypt_key_size; keysize 113 drivers/block/loop.c *out++ = *in++ ^ key[(i & 511) % keysize]; keysize 24 drivers/char/tpm/tpm-sysfs.c __be32 keysize; keysize 77 drivers/char/tpm/tpm-sysfs.c be32_to_cpu(out->keysize)); keysize 616 drivers/crypto/hifn_795x.c unsigned int keysize; keysize 1144 drivers/crypto/hifn_795x.c if (ctx->keysize) keysize 1168 drivers/crypto/hifn_795x.c if (ctx->keysize != 16) keysize 1174 drivers/crypto/hifn_795x.c if (ctx->keysize != 24) keysize 1180 drivers/crypto/hifn_795x.c if (ctx->keysize != 32) keysize 1186 drivers/crypto/hifn_795x.c if (ctx->keysize != 24) keysize 1191 drivers/crypto/hifn_795x.c if (ctx->keysize != 8) keysize 1200 drivers/crypto/hifn_795x.c nbytes, nbytes, ctx->key, ctx->keysize, keysize 1584 drivers/crypto/hifn_795x.c ctx->key, ctx->keysize, keysize 1953 drivers/crypto/hifn_795x.c ctx->keysize = len; keysize 1972 drivers/crypto/hifn_795x.c ctx->keysize = len; keysize 2015 drivers/crypto/hifn_795x.c if (ctx->keysize != 16 && type == ACRYPTO_TYPE_AES_128) { keysize 2016 drivers/crypto/hifn_795x.c if (ctx->keysize == 24) keysize 2018 drivers/crypto/hifn_795x.c else if (ctx->keysize == 32) keysize 2223 drivers/crypto/talitos.c unsigned int keysize = keylen; keysize 2228 drivers/crypto/talitos.c memcpy(ctx->key, key, keysize); keysize 2238 drivers/crypto/talitos.c keysize = digestsize; keysize 2245 drivers/crypto/talitos.c ctx->keylen = keysize; keysize 2246 drivers/crypto/talitos.c ctx->dma_key = dma_map_single(dev, ctx->key, keysize, DMA_TO_DEVICE); keysize 119 drivers/crypto/ux500/cryp/cryp.c *control_register |= (cryp_config->keysize << CRYP_CR_KEYSIZE_POS); keysize 313 drivers/crypto/ux500/cryp/cryp.c switch (config->keysize) { keysize 363 drivers/crypto/ux500/cryp/cryp.c switch (config->keysize) { keysize 90 drivers/crypto/ux500/cryp/cryp.h int keysize; keysize 961 drivers/crypto/ux500/cryp/cryp_core.c ctx->config.keysize = CRYP_KEY_SIZE_128; keysize 965 drivers/crypto/ux500/cryp/cryp_core.c ctx->config.keysize = CRYP_KEY_SIZE_192; keysize 969 drivers/crypto/ux500/cryp/cryp_core.c ctx->config.keysize = CRYP_KEY_SIZE_256; keysize 323 drivers/input/keyboard/lm8323.c int keysize = (lm->size_x << 4) | lm->size_y; keysize 337 drivers/input/keyboard/lm8323.c lm8323_write(lm, 2, LM8323_CMD_SET_KEY_SIZE, keysize); keysize 91 drivers/net/ethernet/marvell/octeontx2/af/rvu.h u8 keysize; /* MCAM keysize 112/224/448 bits */ keysize 92 drivers/net/ethernet/marvell/octeontx2/af/rvu_npc.c if (mcam->keysize == NPC_MCAM_KEY_X2) keysize 685 drivers/net/ethernet/marvell/octeontx2/af/rvu_npc.c if (mcam->keysize != NPC_MCAM_KEY_X2) keysize 1005 drivers/net/ethernet/marvell/octeontx2/af/rvu_npc.c mcam->keysize = cfg; keysize 82 drivers/s390/crypto/pkey_api.c int keysize; keysize 87 drivers/s390/crypto/pkey_api.c keysize = 16; keysize 91 drivers/s390/crypto/pkey_api.c keysize = 24; keysize 95 drivers/s390/crypto/pkey_api.c keysize = 32; keysize 116 drivers/s390/crypto/pkey_api.c memcpy(paramblock, clrkey->clrkey, keysize); keysize 123 drivers/s390/crypto/pkey_api.c protkey->len = keysize + 32; keysize 124 drivers/s390/crypto/pkey_api.c memcpy(protkey->protkey, paramblock, keysize + 32); keysize 224 drivers/s390/crypto/pkey_api.c int keysize; keysize 229 drivers/s390/crypto/pkey_api.c keysize = 16; keysize 232 drivers/s390/crypto/pkey_api.c keysize = 24; keysize 235 drivers/s390/crypto/pkey_api.c keysize = 32; keysize 244 drivers/s390/crypto/pkey_api.c get_random_bytes(clrkey.clrkey, keysize); keysize 252 drivers/s390/crypto/pkey_api.c get_random_bytes(protkey->protkey, keysize); keysize 857 drivers/s390/crypto/pkey_api.c &kvk.keysize, &kvk.attributes); keysize 1380 drivers/s390/crypto/pkey_api.c size_t keysize; keysize 1389 drivers/s390/crypto/pkey_api.c keysize = CCACIPHERTOKENSIZE; keysize 1390 drivers/s390/crypto/pkey_api.c rc = cca_gencipherkey(-1, -1, keybits, 0, buf, &keysize); keysize 1393 drivers/s390/crypto/pkey_api.c memset(buf + keysize, 0, CCACIPHERTOKENSIZE - keysize); keysize 1396 drivers/s390/crypto/pkey_api.c keysize = CCACIPHERTOKENSIZE; keysize 1398 drivers/s390/crypto/pkey_api.c buf + CCACIPHERTOKENSIZE, &keysize); keysize 1401 drivers/s390/crypto/pkey_api.c memset(buf + CCACIPHERTOKENSIZE + keysize, 0, keysize 1402 drivers/s390/crypto/pkey_api.c CCACIPHERTOKENSIZE - keysize); keysize 275 drivers/s390/crypto/zcrypt_ccamisc.c int i, rc, keysize; keysize 331 drivers/s390/crypto/zcrypt_ccamisc.c keysize = 16; keysize 336 drivers/s390/crypto/zcrypt_ccamisc.c keysize = 24; keysize 341 drivers/s390/crypto/zcrypt_ccamisc.c keysize = 32; keysize 396 drivers/s390/crypto/zcrypt_ccamisc.c prepparm->lv3.keyblock.tok, 8*keysize); keysize 417 drivers/s390/crypto/zcrypt_ccamisc.c int rc, keysize, seckeysize; keysize 471 drivers/s390/crypto/zcrypt_ccamisc.c keysize = 16; keysize 475 drivers/s390/crypto/zcrypt_ccamisc.c keysize = 24; keysize 479 drivers/s390/crypto/zcrypt_ccamisc.c keysize = 32; keysize 487 drivers/s390/crypto/zcrypt_ccamisc.c preqparm->lv1.len = sizeof(struct lv1) + keysize; keysize 488 drivers/s390/crypto/zcrypt_ccamisc.c memcpy(preqparm->lv1.clrkey, clrkey, keysize); keysize 489 drivers/s390/crypto/zcrypt_ccamisc.c plv2 = (struct lv2 *) (((u8 *) &preqparm->lv2) + keysize); keysize 493 drivers/s390/crypto/zcrypt_ccamisc.c preqcblk->req_parml = sizeof(struct cmreqparm) + keysize; keysize 533 drivers/s390/crypto/zcrypt_ccamisc.c prepparm->lv3.keyblock.tok, 8*keysize); keysize 51 drivers/s390/crypto/zcrypt_ccamisc.h u16 keysize; /* key byte size */ keysize 412 fs/befs/btree.c loff_t key_no, size_t bufsize, char *keybuf, size_t * keysize, keysize 450 fs/befs/btree.c *keysize = 0; keysize 463 fs/befs/btree.c *keysize = 0; keysize 505 fs/befs/btree.c *keysize = keylen; keysize 521 fs/befs/btree.c *keysize = 0; keysize 12 fs/befs/btree.h size_t *keysize, befs_off_t *value); keysize 222 fs/befs/linuxvfs.c size_t keysize; keysize 230 fs/befs/linuxvfs.c keybuf, &keysize, &value); keysize 253 fs/befs/linuxvfs.c befs_utf2nls(sb, keybuf, keysize, &nlsname, keysize 266 fs/befs/linuxvfs.c if (!dir_emit(ctx, keybuf, keysize, keysize 444 fs/crypto/fscrypt_private.h int keysize; keysize 24 fs/crypto/keysetup.c .keysize = 64, keysize 30 fs/crypto/keysetup.c .keysize = 32, keysize 36 fs/crypto/keysetup.c .keysize = 16, keysize 43 fs/crypto/keysetup.c .keysize = 16, keysize 49 fs/crypto/keysetup.c .keysize = 32, keysize 103 fs/crypto/keysetup.c err = crypto_skcipher_setkey(tfm, raw_key, mode->keysize); keysize 114 fs/crypto/keysetup.c static int derive_essiv_salt(const u8 *key, int keysize, u8 *salt) keysize 145 fs/crypto/keysetup.c return crypto_shash_digest(desc, key, keysize, salt); keysize 150 fs/crypto/keysetup.c int keysize) keysize 165 fs/crypto/keysetup.c err = derive_essiv_salt(raw_key, keysize, salt); keysize 197 fs/crypto/keysetup.c err = init_essiv_generator(ci, derived_key, mode->keysize); keysize 229 fs/crypto/keysetup.c mode_key, mode->keysize); keysize 233 fs/crypto/keysetup.c memzero_explicit(mode_key, mode->keysize); keysize 275 fs/crypto/keysetup.c derived_key, ci->ci_mode->keysize); keysize 280 fs/crypto/keysetup.c memzero_explicit(derived_key, ci->ci_mode->keysize); keysize 350 fs/crypto/keysetup.c if (mk->mk_secret.size < ci->ci_mode->keysize) { keysize 355 fs/crypto/keysetup.c mk->mk_secret.size, ci->ci_mode->keysize); keysize 202 fs/crypto/keysetup_v1.c if (crypto_memneq(raw_key, dk->dk_raw, ci->ci_mode->keysize)) keysize 243 fs/crypto/keysetup_v1.c memcpy(dk->dk_raw, raw_key, ci->ci_mode->keysize); keysize 296 fs/crypto/keysetup_v1.c derived_key = kmalloc(ci->ci_mode->keysize, GFP_NOFS); keysize 301 fs/crypto/keysetup_v1.c derived_key, ci->ci_mode->keysize); keysize 327 fs/crypto/keysetup_v1.c ci->ci_mode->keysize, &payload); keysize 331 fs/crypto/keysetup_v1.c ci->ci_mode->keysize, &payload); keysize 47 include/crypto/chacha.h unsigned int keysize); keysize 49 include/crypto/chacha.h unsigned int keysize); keysize 45 include/crypto/skcipher.h unsigned int keysize; keysize 415 include/crypto/skcipher.h return tfm->keysize; keysize 1173 net/key/af_key.c int keysize = 0; keysize 1180 net/key/af_key.c keysize = (key->sadb_key_bits + 7) / 8; keysize 1181 net/key/af_key.c x->aalg = kmalloc(sizeof(*x->aalg) + keysize, GFP_KERNEL); keysize 1190 net/key/af_key.c memcpy(x->aalg->alg_key, key+1, keysize); keysize 1211 net/key/af_key.c int keysize = 0; keysize 1219 net/key/af_key.c keysize = (key->sadb_key_bits + 7) / 8; keysize 1220 net/key/af_key.c x->ealg = kmalloc(sizeof(*x->ealg) + keysize, GFP_KERNEL); keysize 1229 net/key/af_key.c memcpy(x->ealg->alg_key, key+1, keysize); keysize 2274 net/tls/tls_sw.c size_t keysize; keysize 2337 net/tls/tls_sw.c keysize = TLS_CIPHER_AES_GCM_128_KEY_SIZE; keysize 2354 net/tls/tls_sw.c keysize = TLS_CIPHER_AES_GCM_256_KEY_SIZE; keysize 2371 net/tls/tls_sw.c keysize = TLS_CIPHER_AES_CCM_128_KEY_SIZE; keysize 2433 net/tls/tls_sw.c rc = crypto_aead_setkey(*aead, key, keysize); keysize 209 tools/testing/selftests/bpf/test_lpm_map.c static void test_lpm_map(int keysize) keysize 227 tools/testing/selftests/bpf/test_lpm_map.c data = alloca(keysize); keysize 228 tools/testing/selftests/bpf/test_lpm_map.c memset(data, 0, keysize); keysize 230 tools/testing/selftests/bpf/test_lpm_map.c value = alloca(keysize + 1); keysize 231 tools/testing/selftests/bpf/test_lpm_map.c memset(value, 0, keysize + 1); keysize 233 tools/testing/selftests/bpf/test_lpm_map.c key = alloca(sizeof(*key) + keysize); keysize 234 tools/testing/selftests/bpf/test_lpm_map.c memset(key, 0, sizeof(*key) + keysize); keysize 237 tools/testing/selftests/bpf/test_lpm_map.c sizeof(*key) + keysize, keysize 238 tools/testing/selftests/bpf/test_lpm_map.c keysize + 1, keysize 244 tools/testing/selftests/bpf/test_lpm_map.c for (j = 0; j < keysize; ++j) keysize 246 tools/testing/selftests/bpf/test_lpm_map.c value[keysize] = rand() % (8 * keysize + 1); keysize 248 tools/testing/selftests/bpf/test_lpm_map.c list = tlpm_add(list, value, value[keysize]); keysize 250 tools/testing/selftests/bpf/test_lpm_map.c key->prefixlen = value[keysize]; keysize 251 tools/testing/selftests/bpf/test_lpm_map.c memcpy(key->data, value, keysize); keysize 257 tools/testing/selftests/bpf/test_lpm_map.c for (j = 0; j < keysize; ++j) keysize 260 tools/testing/selftests/bpf/test_lpm_map.c t = tlpm_match(list, data, 8 * keysize); keysize 262 tools/testing/selftests/bpf/test_lpm_map.c key->prefixlen = 8 * keysize; keysize 263 tools/testing/selftests/bpf/test_lpm_map.c memcpy(key->data, data, keysize); keysize 270 tools/testing/selftests/bpf/test_lpm_map.c assert(t->n_bits == value[keysize]); keysize 287 tools/testing/selftests/bpf/test_lpm_map.c memcpy(key->data, list->key, keysize); keysize 294 tools/testing/selftests/bpf/test_lpm_map.c for (j = 0; j < keysize; ++j) keysize 297 tools/testing/selftests/bpf/test_lpm_map.c t = tlpm_match(list, data, 8 * keysize); keysize 299 tools/testing/selftests/bpf/test_lpm_map.c key->prefixlen = 8 * keysize; keysize 300 tools/testing/selftests/bpf/test_lpm_map.c memcpy(key->data, data, keysize); keysize 307 tools/testing/selftests/bpf/test_lpm_map.c assert(t->n_bits == value[keysize]);