/linux-6.6.21/drivers/crypto/starfive/ |
D | jh7110-rsa.c | 74 static unsigned int starfive_rsa_get_nbit(u8 *pa, u32 snum, int key_sz) in starfive_rsa_get_nbit() argument 81 value = pa[key_sz - i - 1]; in starfive_rsa_get_nbit() 191 u8 *de, u32 *n, int key_sz) in starfive_rsa_cpu_start() argument 201 opsize = (key_sz - 1) >> 2; in starfive_rsa_cpu_start() 203 mta = kmalloc(key_sz, GFP_KERNEL); in starfive_rsa_cpu_start() 208 0, n, key_sz << 3); in starfive_rsa_cpu_start() 219 mlen = starfive_rsa_get_nbit(de, loop - 1, key_sz); in starfive_rsa_cpu_start() 258 ret = starfive_rsa_montgomery_form(ctx, result, result, 1, n, key_sz << 3); in starfive_rsa_cpu_start() 267 u8 *de, u8 *n, int key_sz) in starfive_rsa_start() argument 269 return starfive_rsa_cpu_start(ctx, (u32 *)result, de, (u32 *)n, key_sz); in starfive_rsa_start() [all …]
|
D | jh7110-cryp.h | 135 size_t key_sz; member
|
/linux-6.6.21/drivers/crypto/hisilicon/hpre/ |
D | hpre_crypto.c | 120 unsigned int key_sz; member 267 shift = ctx->key_sz - len; in hpre_prepare_dma_buf() 271 ptr = dma_alloc_coherent(dev, ctx->key_sz, tmp, GFP_ATOMIC); in hpre_prepare_dma_buf() 295 if ((sg_is_last(data) && len == ctx->key_sz) && in hpre_hw_data_init() 327 dma_free_coherent(dev, ctx->key_sz, req->src, tmp); in hpre_hw_data_clr_all() 329 dma_unmap_single(dev, tmp, ctx->key_sz, DMA_TO_DEVICE); in hpre_hw_data_clr_all() 339 ctx->key_sz, 1); in hpre_hw_data_clr_all() 340 dma_free_coherent(dev, ctx->key_sz, req->dst, tmp); in hpre_hw_data_clr_all() 342 dma_unmap_single(dev, tmp, ctx->key_sz, DMA_FROM_DEVICE); in hpre_hw_data_clr_all() 395 ctx->key_sz = 0; in hpre_ctx_set() [all …]
|
/linux-6.6.21/drivers/crypto/intel/qat/qat_common/ |
D | qat_asym_algs.c | 76 unsigned int key_sz; member 523 dma_unmap_single(dev, req->in.rsa.enc.m, req->ctx.rsa->key_sz, in qat_rsa_cb() 528 areq->dst_len = req->ctx.rsa->key_sz; in qat_rsa_cb() 529 dma_unmap_single(dev, req->out.rsa.enc.c, req->ctx.rsa->key_sz, in qat_rsa_cb() 661 if (req->dst_len < ctx->key_sz) { in qat_rsa_enc() 662 req->dst_len = ctx->key_sz; in qat_rsa_enc() 666 if (req->src_len > ctx->key_sz) in qat_rsa_enc() 672 msg->pke_hdr.cd_pars.func_id = qat_rsa_enc_fn_id(ctx->key_sz); in qat_rsa_enc() 695 if (sg_is_last(req->src) && req->src_len == ctx->key_sz) { in qat_rsa_enc() 699 int shift = ctx->key_sz - req->src_len; in qat_rsa_enc() [all …]
|
/linux-6.6.21/fs/orangefs/ |
D | xattr.c | 160 new_op->upcall.req.getxattr.key_sz = strlen(name) + 1; in orangefs_inode_getxattr() 215 upcall.req.getxattr.key_sz, in orangefs_inode_getxattr() 269 new_op->upcall.req.removexattr.key_sz = strlen(name) + 1; in orangefs_inode_removexattr() 274 (int)new_op->upcall.req.removexattr.key_sz); in orangefs_inode_removexattr() 363 new_op->upcall.req.setxattr.keyval.key_sz = strlen(name) + 1; in orangefs_inode_setxattr() 371 (int)new_op->upcall.req.setxattr.keyval.key_sz, in orangefs_inode_setxattr()
|
D | upcall.h | 118 __s32 key_sz; member 139 __s32 key_sz; member
|
D | protocol.h | 219 __s32 key_sz; /* __s32 for portable, fixed-size structures */ member
|
/linux-6.6.21/drivers/crypto/ |
D | sa2ul.c | 146 u16 key_sz, __be32 *ipad, __be32 *opad); 384 static void prepare_kipad(u8 *k_ipad, const u8 *key, u16 key_sz) in prepare_kipad() argument 388 for (i = 0; i < key_sz; i++) in prepare_kipad() 396 static void prepare_kopad(u8 *k_opad, const u8 *key, u16 key_sz) in prepare_kopad() argument 400 for (i = 0; i < key_sz; i++) in prepare_kopad() 436 u16 key_sz, __be32 *ipad, __be32 *opad) in sa_prepare_iopads() argument 449 prepare_kipad(sha.k_pad, key, key_sz); in sa_prepare_iopads() 455 prepare_kopad(sha.k_pad, key, key_sz); in sa_prepare_iopads() 466 static inline int sa_aes_inv_key(u8 *inv_key, const u8 *key, u16 key_sz) in sa_aes_inv_key() argument 471 if (aes_expandkey(&ctx, key, key_sz)) { in sa_aes_inv_key() [all …]
|
/linux-6.6.21/tools/lib/bpf/ |
D | libbpf.h | 1070 const void *key, size_t key_sz, 1094 const void *key, size_t key_sz, 1110 const void *key, size_t key_sz, __u64 flags); 1133 const void *key, size_t key_sz, 1151 const void *cur_key, void *next_key, size_t key_sz);
|
D | libbpf.c | 9803 static int validate_map_op(const struct bpf_map *map, size_t key_sz, in validate_map_op() argument 9809 if (map->def.key_size != key_sz) { in validate_map_op() 9811 map->name, key_sz, map->def.key_size); in validate_map_op() 9845 const void *key, size_t key_sz, in bpf_map__lookup_elem() argument 9850 err = validate_map_op(map, key_sz, value_sz, true); in bpf_map__lookup_elem() 9858 const void *key, size_t key_sz, in bpf_map__update_elem() argument 9863 err = validate_map_op(map, key_sz, value_sz, true); in bpf_map__update_elem() 9871 const void *key, size_t key_sz, __u64 flags) in bpf_map__delete_elem() argument 9875 err = validate_map_op(map, key_sz, 0, false /* check_value_sz */); in bpf_map__delete_elem() 9883 const void *key, size_t key_sz, in bpf_map__lookup_and_delete_elem() argument [all …]
|
/linux-6.6.21/drivers/crypto/inside-secure/ |
D | safexcel_hash.c | 27 u8 key_sz; member 125 memcpy(ctx->base.ctxr->data, &ctx->base.ipad, ctx->key_sz); in safexcel_context_control() 1974 memcpy(req->state, &ctx->base.ipad, ctx->key_sz); in safexcel_cbcmac_init() 1980 req->state_sz = ctx->key_sz; in safexcel_cbcmac_init() 2005 ctx->key_sz = AES_MAX_KEY_SIZE + 2 * AES_BLOCK_SIZE; in safexcel_cbcmac_setkey() 2008 ctx->key_sz = AES_MAX_KEY_SIZE + 2 * AES_BLOCK_SIZE; in safexcel_cbcmac_setkey() 2011 ctx->key_sz = AES_MIN_KEY_SIZE + 2 * AES_BLOCK_SIZE; in safexcel_cbcmac_setkey() 2084 ctx->key_sz = AES_MIN_KEY_SIZE + 2 * AES_BLOCK_SIZE; in safexcel_xcbcmac_setkey() 2181 ctx->key_sz = AES_MAX_KEY_SIZE + 2 * AES_BLOCK_SIZE; in safexcel_cmac_setkey() 2184 ctx->key_sz = AES_MAX_KEY_SIZE + 2 * AES_BLOCK_SIZE; in safexcel_cmac_setkey() [all …]
|
/linux-6.6.21/drivers/net/ethernet/mellanox/mlx5/core/lib/ |
D | crypto.c | 115 u8 key_sz; in mlx5_crypto_dek_fill_key() local 118 err = mlx5_crypto_dek_get_key_sz(mdev, sz_bytes, &key_sz); in mlx5_crypto_dek_fill_key() 122 MLX5_SET(encryption_key_obj, key_obj, key_size, key_sz); in mlx5_crypto_dek_fill_key()
|
/linux-6.6.21/drivers/net/ethernet/netronome/nfp/flower/ |
D | conntrack.c | 136 u32 offset, size_t key_sz, in get_mangled_key() argument 152 if (off % 4 || off >= key_sz) in get_mangled_key()
|