keysize           165 arch/s390/include/uapi/asm/pkey.h 	__u16  keysize;			       /* out: key size in bits   */
keysize            73 arch/x86/platform/efi/quirks.c 	u32 keysize;
keysize            81 crypto/chacha_generic.c 			 unsigned int keysize, int nrounds)
keysize            86 crypto/chacha_generic.c 	if (keysize != CHACHA_KEY_SIZE)
keysize            97 crypto/chacha_generic.c 			   unsigned int keysize)
keysize            99 crypto/chacha_generic.c 	return chacha_setkey(tfm, key, keysize, 20);
keysize           104 crypto/chacha_generic.c 			   unsigned int keysize)
keysize           106 crypto/chacha_generic.c 	return chacha_setkey(tfm, key, keysize, 12);
keysize           112 crypto/salsa20_generic.c 			  unsigned int keysize)
keysize           119 crypto/salsa20_generic.c 	if (keysize != SALSA20_MIN_KEY_SIZE &&
keysize           120 crypto/salsa20_generic.c 	    keysize != SALSA20_MAX_KEY_SIZE)
keysize           127 crypto/salsa20_generic.c 	if (keysize == 32) { /* recommended */
keysize           594 crypto/skcipher.c 	if (tfm->keysize)
keysize           690 crypto/skcipher.c 	skcipher->keysize = calg->cra_blkcipher.max_keysize;
keysize           790 crypto/skcipher.c 	skcipher->keysize = calg->cra_ablkcipher.max_keysize;
keysize           901 crypto/skcipher.c 	skcipher->keysize = alg->max_keysize;
keysize           253 crypto/tcrypt.c 			       unsigned int aad_size, u8 *keysize, u32 num_mb)
keysize           347 crypto/tcrypt.c 				*keysize * 8, *b_size);
keysize           354 crypto/tcrypt.c 				if (template[j].klen == *keysize) {
keysize           362 crypto/tcrypt.c 			ret = crypto_aead_setkey(tfm, key, *keysize);
keysize           430 crypto/tcrypt.c 		keysize++;
keysize           431 crypto/tcrypt.c 	} while (*keysize);
keysize           521 crypto/tcrypt.c 			    unsigned int aad_size, u8 *keysize)
keysize           595 crypto/tcrypt.c 			if ((*keysize + *b_size) > TVMEMSIZE * PAGE_SIZE) {
keysize           597 crypto/tcrypt.c 				       *keysize + *b_size,
keysize           604 crypto/tcrypt.c 				if (template[j].klen == *keysize) {
keysize           609 crypto/tcrypt.c 			ret = crypto_aead_setkey(tfm, key, *keysize);
keysize           618 crypto/tcrypt.c 					i, *keysize * 8, *b_size);
keysize           676 crypto/tcrypt.c 		keysize++;
keysize           677 crypto/tcrypt.c 	} while (*keysize);
keysize          1250 crypto/tcrypt.c 				   unsigned int tcount, u8 *keysize, u32 num_mb)
keysize          1325 crypto/tcrypt.c 				*keysize * 8, *b_size);
keysize          1332 crypto/tcrypt.c 				if (template[j].klen == *keysize) {
keysize          1340 crypto/tcrypt.c 			ret = crypto_skcipher_setkey(tfm, key, *keysize);
keysize          1395 crypto/tcrypt.c 		keysize++;
keysize          1396 crypto/tcrypt.c 	} while (*keysize);
keysize          1491 crypto/tcrypt.c 				unsigned int tcount, u8 *keysize, bool async)
keysize          1537 crypto/tcrypt.c 			if ((*keysize + *b_size) > TVMEMSIZE * PAGE_SIZE) {
keysize          1539 crypto/tcrypt.c 				       "tvmem (%lu)\n", *keysize + *b_size,
keysize          1545 crypto/tcrypt.c 				*keysize * 8, *b_size);
keysize          1552 crypto/tcrypt.c 				if (template[j].klen == *keysize) {
keysize          1560 crypto/tcrypt.c 			ret = crypto_skcipher_setkey(tfm, key, *keysize);
keysize          1567 crypto/tcrypt.c 			k = *keysize + *b_size;
keysize          1571 crypto/tcrypt.c 				sg_set_buf(sg, tvmem[0] + *keysize,
keysize          1572 crypto/tcrypt.c 				   PAGE_SIZE - *keysize);
keysize          1584 crypto/tcrypt.c 				sg_set_buf(sg, tvmem[0] + *keysize, *b_size);
keysize          1610 crypto/tcrypt.c 		keysize++;
keysize          1611 crypto/tcrypt.c 	} while (*keysize);
keysize          1621 crypto/tcrypt.c 			       unsigned int tcount, u8 *keysize)
keysize          1623 crypto/tcrypt.c 	return test_skcipher_speed(algo, enc, secs, template, tcount, keysize,
keysize          1629 crypto/tcrypt.c 			      unsigned int tcount, u8 *keysize)
keysize          1631 crypto/tcrypt.c 	return test_skcipher_speed(algo, enc, secs, template, tcount, keysize,
keysize          2653 crypto/testmgr.c 	const unsigned int maxkeysize = tfm->keysize;
keysize          2766 crypto/testmgr.c 	if (tfm->keysize != generic_tfm->keysize) {
keysize          2768 crypto/testmgr.c 		       driver, tfm->keysize, generic_tfm->keysize);
keysize          2793 crypto/testmgr.c 	vec.key = kmalloc(tfm->keysize, GFP_KERNEL);
keysize           100 drivers/block/loop.c 	int i, keysize;
keysize           111 drivers/block/loop.c 	keysize = lo->lo_encrypt_key_size;
keysize           113 drivers/block/loop.c 		*out++ = *in++ ^ key[(i & 511) % keysize];
keysize            24 drivers/char/tpm/tpm-sysfs.c 	__be32 keysize;
keysize            77 drivers/char/tpm/tpm-sysfs.c 		    be32_to_cpu(out->keysize));
keysize           616 drivers/crypto/hifn_795x.c 	unsigned int		keysize;
keysize          1144 drivers/crypto/hifn_795x.c 		if (ctx->keysize)
keysize          1168 drivers/crypto/hifn_795x.c 			if (ctx->keysize != 16)
keysize          1174 drivers/crypto/hifn_795x.c 			if (ctx->keysize != 24)
keysize          1180 drivers/crypto/hifn_795x.c 			if (ctx->keysize != 32)
keysize          1186 drivers/crypto/hifn_795x.c 			if (ctx->keysize != 24)
keysize          1191 drivers/crypto/hifn_795x.c 			if (ctx->keysize != 8)
keysize          1200 drivers/crypto/hifn_795x.c 				nbytes, nbytes, ctx->key, ctx->keysize,
keysize          1584 drivers/crypto/hifn_795x.c 			 ctx->key, ctx->keysize,
keysize          1953 drivers/crypto/hifn_795x.c 	ctx->keysize = len;
keysize          1972 drivers/crypto/hifn_795x.c 	ctx->keysize = len;
keysize          2015 drivers/crypto/hifn_795x.c 	if (ctx->keysize != 16 && type == ACRYPTO_TYPE_AES_128) {
keysize          2016 drivers/crypto/hifn_795x.c 		if (ctx->keysize == 24)
keysize          2018 drivers/crypto/hifn_795x.c 		else if (ctx->keysize == 32)
keysize          2223 drivers/crypto/talitos.c 	unsigned int keysize = keylen;
keysize          2228 drivers/crypto/talitos.c 		memcpy(ctx->key, key, keysize);
keysize          2238 drivers/crypto/talitos.c 		keysize = digestsize;
keysize          2245 drivers/crypto/talitos.c 	ctx->keylen = keysize;
keysize          2246 drivers/crypto/talitos.c 	ctx->dma_key = dma_map_single(dev, ctx->key, keysize, DMA_TO_DEVICE);
keysize           119 drivers/crypto/ux500/cryp/cryp.c 	*control_register |= (cryp_config->keysize << CRYP_CR_KEYSIZE_POS);
keysize           313 drivers/crypto/ux500/cryp/cryp.c 	switch (config->keysize) {
keysize           363 drivers/crypto/ux500/cryp/cryp.c 	switch (config->keysize) {
keysize            90 drivers/crypto/ux500/cryp/cryp.h 	int keysize;
keysize           961 drivers/crypto/ux500/cryp/cryp_core.c 		ctx->config.keysize = CRYP_KEY_SIZE_128;
keysize           965 drivers/crypto/ux500/cryp/cryp_core.c 		ctx->config.keysize = CRYP_KEY_SIZE_192;
keysize           969 drivers/crypto/ux500/cryp/cryp_core.c 		ctx->config.keysize = CRYP_KEY_SIZE_256;
keysize           323 drivers/input/keyboard/lm8323.c 	int keysize = (lm->size_x << 4) | lm->size_y;
keysize           337 drivers/input/keyboard/lm8323.c 	lm8323_write(lm, 2, LM8323_CMD_SET_KEY_SIZE, keysize);
keysize            91 drivers/net/ethernet/marvell/octeontx2/af/rvu.h 	u8	keysize;	/* MCAM keysize 112/224/448 bits */
keysize            92 drivers/net/ethernet/marvell/octeontx2/af/rvu_npc.c 	if (mcam->keysize == NPC_MCAM_KEY_X2)
keysize           685 drivers/net/ethernet/marvell/octeontx2/af/rvu_npc.c 	if (mcam->keysize != NPC_MCAM_KEY_X2)
keysize          1005 drivers/net/ethernet/marvell/octeontx2/af/rvu_npc.c 	mcam->keysize = cfg;
keysize            82 drivers/s390/crypto/pkey_api.c 	int keysize;
keysize            87 drivers/s390/crypto/pkey_api.c 		keysize = 16;
keysize            91 drivers/s390/crypto/pkey_api.c 		keysize = 24;
keysize            95 drivers/s390/crypto/pkey_api.c 		keysize = 32;
keysize           116 drivers/s390/crypto/pkey_api.c 	memcpy(paramblock, clrkey->clrkey, keysize);
keysize           123 drivers/s390/crypto/pkey_api.c 	protkey->len = keysize + 32;
keysize           124 drivers/s390/crypto/pkey_api.c 	memcpy(protkey->protkey, paramblock, keysize + 32);
keysize           224 drivers/s390/crypto/pkey_api.c 	int keysize;
keysize           229 drivers/s390/crypto/pkey_api.c 		keysize = 16;
keysize           232 drivers/s390/crypto/pkey_api.c 		keysize = 24;
keysize           235 drivers/s390/crypto/pkey_api.c 		keysize = 32;
keysize           244 drivers/s390/crypto/pkey_api.c 	get_random_bytes(clrkey.clrkey, keysize);
keysize           252 drivers/s390/crypto/pkey_api.c 	get_random_bytes(protkey->protkey, keysize);
keysize           857 drivers/s390/crypto/pkey_api.c 				    &kvk.keysize, &kvk.attributes);
keysize          1380 drivers/s390/crypto/pkey_api.c 	size_t keysize;
keysize          1389 drivers/s390/crypto/pkey_api.c 	keysize = CCACIPHERTOKENSIZE;
keysize          1390 drivers/s390/crypto/pkey_api.c 	rc = cca_gencipherkey(-1, -1, keybits, 0, buf, &keysize);
keysize          1393 drivers/s390/crypto/pkey_api.c 	memset(buf + keysize, 0, CCACIPHERTOKENSIZE - keysize);
keysize          1396 drivers/s390/crypto/pkey_api.c 		keysize = CCACIPHERTOKENSIZE;
keysize          1398 drivers/s390/crypto/pkey_api.c 				      buf + CCACIPHERTOKENSIZE, &keysize);
keysize          1401 drivers/s390/crypto/pkey_api.c 		memset(buf + CCACIPHERTOKENSIZE + keysize, 0,
keysize          1402 drivers/s390/crypto/pkey_api.c 		       CCACIPHERTOKENSIZE - keysize);
keysize           275 drivers/s390/crypto/zcrypt_ccamisc.c 	int i, rc, keysize;
keysize           331 drivers/s390/crypto/zcrypt_ccamisc.c 		keysize = 16;
keysize           336 drivers/s390/crypto/zcrypt_ccamisc.c 		keysize = 24;
keysize           341 drivers/s390/crypto/zcrypt_ccamisc.c 		keysize = 32;
keysize           396 drivers/s390/crypto/zcrypt_ccamisc.c 				      prepparm->lv3.keyblock.tok, 8*keysize);
keysize           417 drivers/s390/crypto/zcrypt_ccamisc.c 	int rc, keysize, seckeysize;
keysize           471 drivers/s390/crypto/zcrypt_ccamisc.c 		keysize = 16;
keysize           475 drivers/s390/crypto/zcrypt_ccamisc.c 		keysize = 24;
keysize           479 drivers/s390/crypto/zcrypt_ccamisc.c 		keysize = 32;
keysize           487 drivers/s390/crypto/zcrypt_ccamisc.c 	preqparm->lv1.len = sizeof(struct lv1) + keysize;
keysize           488 drivers/s390/crypto/zcrypt_ccamisc.c 	memcpy(preqparm->lv1.clrkey, clrkey, keysize);
keysize           489 drivers/s390/crypto/zcrypt_ccamisc.c 	plv2 = (struct lv2 *) (((u8 *) &preqparm->lv2) + keysize);
keysize           493 drivers/s390/crypto/zcrypt_ccamisc.c 	preqcblk->req_parml = sizeof(struct cmreqparm) + keysize;
keysize           533 drivers/s390/crypto/zcrypt_ccamisc.c 				      prepparm->lv3.keyblock.tok, 8*keysize);
keysize            51 drivers/s390/crypto/zcrypt_ccamisc.h 	u16 keysize;  /* key byte size */
keysize           412 fs/befs/btree.c 		loff_t key_no, size_t bufsize, char *keybuf, size_t * keysize,
keysize           450 fs/befs/btree.c 		*keysize = 0;
keysize           463 fs/befs/btree.c 			*keysize = 0;
keysize           505 fs/befs/btree.c 	*keysize = keylen;
keysize           521 fs/befs/btree.c 	*keysize = 0;
keysize            12 fs/befs/btree.h 		    size_t *keysize, befs_off_t *value);
keysize           222 fs/befs/linuxvfs.c 	size_t keysize;
keysize           230 fs/befs/linuxvfs.c 					 keybuf, &keysize, &value);
keysize           253 fs/befs/linuxvfs.c 			    befs_utf2nls(sb, keybuf, keysize, &nlsname,
keysize           266 fs/befs/linuxvfs.c 			if (!dir_emit(ctx, keybuf, keysize,
keysize           444 fs/crypto/fscrypt_private.h 	int keysize;
keysize            24 fs/crypto/keysetup.c 		.keysize = 64,
keysize            30 fs/crypto/keysetup.c 		.keysize = 32,
keysize            36 fs/crypto/keysetup.c 		.keysize = 16,
keysize            43 fs/crypto/keysetup.c 		.keysize = 16,
keysize            49 fs/crypto/keysetup.c 		.keysize = 32,
keysize           103 fs/crypto/keysetup.c 	err = crypto_skcipher_setkey(tfm, raw_key, mode->keysize);
keysize           114 fs/crypto/keysetup.c static int derive_essiv_salt(const u8 *key, int keysize, u8 *salt)
keysize           145 fs/crypto/keysetup.c 		return crypto_shash_digest(desc, key, keysize, salt);
keysize           150 fs/crypto/keysetup.c 				int keysize)
keysize           165 fs/crypto/keysetup.c 	err = derive_essiv_salt(raw_key, keysize, salt);
keysize           197 fs/crypto/keysetup.c 		err = init_essiv_generator(ci, derived_key, mode->keysize);
keysize           229 fs/crypto/keysetup.c 				  mode_key, mode->keysize);
keysize           233 fs/crypto/keysetup.c 	memzero_explicit(mode_key, mode->keysize);
keysize           275 fs/crypto/keysetup.c 				  derived_key, ci->ci_mode->keysize);
keysize           280 fs/crypto/keysetup.c 	memzero_explicit(derived_key, ci->ci_mode->keysize);
keysize           350 fs/crypto/keysetup.c 	if (mk->mk_secret.size < ci->ci_mode->keysize) {
keysize           355 fs/crypto/keysetup.c 			     mk->mk_secret.size, ci->ci_mode->keysize);
keysize           202 fs/crypto/keysetup_v1.c 		if (crypto_memneq(raw_key, dk->dk_raw, ci->ci_mode->keysize))
keysize           243 fs/crypto/keysetup_v1.c 	memcpy(dk->dk_raw, raw_key, ci->ci_mode->keysize);
keysize           296 fs/crypto/keysetup_v1.c 	derived_key = kmalloc(ci->ci_mode->keysize, GFP_NOFS);
keysize           301 fs/crypto/keysetup_v1.c 			     derived_key, ci->ci_mode->keysize);
keysize           327 fs/crypto/keysetup_v1.c 					ci->ci_mode->keysize, &payload);
keysize           331 fs/crypto/keysetup_v1.c 						ci->ci_mode->keysize, &payload);
keysize            47 include/crypto/chacha.h 			   unsigned int keysize);
keysize            49 include/crypto/chacha.h 			   unsigned int keysize);
keysize            45 include/crypto/skcipher.h 	unsigned int keysize;
keysize           415 include/crypto/skcipher.h 	return tfm->keysize;
keysize          1173 net/key/af_key.c 		int keysize = 0;
keysize          1180 net/key/af_key.c 			keysize = (key->sadb_key_bits + 7) / 8;
keysize          1181 net/key/af_key.c 		x->aalg = kmalloc(sizeof(*x->aalg) + keysize, GFP_KERNEL);
keysize          1190 net/key/af_key.c 			memcpy(x->aalg->alg_key, key+1, keysize);
keysize          1211 net/key/af_key.c 			int keysize = 0;
keysize          1219 net/key/af_key.c 				keysize = (key->sadb_key_bits + 7) / 8;
keysize          1220 net/key/af_key.c 			x->ealg = kmalloc(sizeof(*x->ealg) + keysize, GFP_KERNEL);
keysize          1229 net/key/af_key.c 				memcpy(x->ealg->alg_key, key+1, keysize);
keysize          2274 net/tls/tls_sw.c 	size_t keysize;
keysize          2337 net/tls/tls_sw.c 		keysize = TLS_CIPHER_AES_GCM_128_KEY_SIZE;
keysize          2354 net/tls/tls_sw.c 		keysize = TLS_CIPHER_AES_GCM_256_KEY_SIZE;
keysize          2371 net/tls/tls_sw.c 		keysize = TLS_CIPHER_AES_CCM_128_KEY_SIZE;
keysize          2433 net/tls/tls_sw.c 	rc = crypto_aead_setkey(*aead, key, keysize);
keysize           209 tools/testing/selftests/bpf/test_lpm_map.c static void test_lpm_map(int keysize)
keysize           227 tools/testing/selftests/bpf/test_lpm_map.c 	data = alloca(keysize);
keysize           228 tools/testing/selftests/bpf/test_lpm_map.c 	memset(data, 0, keysize);
keysize           230 tools/testing/selftests/bpf/test_lpm_map.c 	value = alloca(keysize + 1);
keysize           231 tools/testing/selftests/bpf/test_lpm_map.c 	memset(value, 0, keysize + 1);
keysize           233 tools/testing/selftests/bpf/test_lpm_map.c 	key = alloca(sizeof(*key) + keysize);
keysize           234 tools/testing/selftests/bpf/test_lpm_map.c 	memset(key, 0, sizeof(*key) + keysize);
keysize           237 tools/testing/selftests/bpf/test_lpm_map.c 			     sizeof(*key) + keysize,
keysize           238 tools/testing/selftests/bpf/test_lpm_map.c 			     keysize + 1,
keysize           244 tools/testing/selftests/bpf/test_lpm_map.c 		for (j = 0; j < keysize; ++j)
keysize           246 tools/testing/selftests/bpf/test_lpm_map.c 		value[keysize] = rand() % (8 * keysize + 1);
keysize           248 tools/testing/selftests/bpf/test_lpm_map.c 		list = tlpm_add(list, value, value[keysize]);
keysize           250 tools/testing/selftests/bpf/test_lpm_map.c 		key->prefixlen = value[keysize];
keysize           251 tools/testing/selftests/bpf/test_lpm_map.c 		memcpy(key->data, value, keysize);
keysize           257 tools/testing/selftests/bpf/test_lpm_map.c 		for (j = 0; j < keysize; ++j)
keysize           260 tools/testing/selftests/bpf/test_lpm_map.c 		t = tlpm_match(list, data, 8 * keysize);
keysize           262 tools/testing/selftests/bpf/test_lpm_map.c 		key->prefixlen = 8 * keysize;
keysize           263 tools/testing/selftests/bpf/test_lpm_map.c 		memcpy(key->data, data, keysize);
keysize           270 tools/testing/selftests/bpf/test_lpm_map.c 			assert(t->n_bits == value[keysize]);
keysize           287 tools/testing/selftests/bpf/test_lpm_map.c 		memcpy(key->data, list->key, keysize);
keysize           294 tools/testing/selftests/bpf/test_lpm_map.c 		for (j = 0; j < keysize; ++j)
keysize           297 tools/testing/selftests/bpf/test_lpm_map.c 		t = tlpm_match(list, data, 8 * keysize);
keysize           299 tools/testing/selftests/bpf/test_lpm_map.c 		key->prefixlen = 8 * keysize;
keysize           300 tools/testing/selftests/bpf/test_lpm_map.c 		memcpy(key->data, data, keysize);
keysize           307 tools/testing/selftests/bpf/test_lpm_map.c 			assert(t->n_bits == value[keysize]);