/linux-2.6.39/arch/x86/crypto/ |
D | salsa20_glue.c | 40 u32 keysize, u32 ivsize); 46 unsigned int keysize) in setkey() argument 49 salsa20_keysetup(ctx, key, keysize*8, SALSA20_IV_SIZE*8); in setkey()
|
/linux-2.6.39/crypto/ |
D | tcrypt.c | 146 unsigned int tcount, u8 *keysize) in test_cipher_speed() argument 180 if ((*keysize + *b_size) > TVMEMSIZE * PAGE_SIZE) { in test_cipher_speed() 182 "tvmem (%lu)\n", *keysize + *b_size, in test_cipher_speed() 188 *keysize * 8, *b_size); in test_cipher_speed() 195 if (template[j].klen == *keysize) { in test_cipher_speed() 201 ret = crypto_blkcipher_setkey(tfm, key, *keysize); in test_cipher_speed() 209 sg_set_buf(sg, tvmem[0] + *keysize, in test_cipher_speed() 210 PAGE_SIZE - *keysize); in test_cipher_speed() 236 keysize++; in test_cipher_speed() 237 } while (*keysize); in test_cipher_speed()
|
D | salsa20_generic.c | 170 unsigned int keysize) in setkey() argument 173 salsa20_keysetup(ctx, key, keysize); in setkey()
|
/linux-2.6.39/fs/befs/ |
D | btree.c | 417 loff_t key_no, size_t bufsize, char *keybuf, size_t * keysize, in befs_btree_read() argument 455 *keysize = 0; in befs_btree_read() 468 *keysize = 0; in befs_btree_read() 507 *keysize = keylen; in befs_btree_read() 524 *keysize = 0; in befs_btree_read()
|
D | btree.h | 12 size_t * keysize, befs_off_t * value);
|
D | linuxvfs.c | 220 size_t keysize; in befs_readdir() local 232 keybuf, &keysize, &value); in befs_readdir() 254 befs_utf2nls(sb, keybuf, keysize, &nlsname, &nlsnamelen); in befs_readdir() 264 result = filldir(dirent, keybuf, keysize, filp->f_pos, in befs_readdir()
|
/linux-2.6.39/drivers/staging/pohmelfs/ |
D | config.c | 453 g->hash_keysize = c->keysize; in pohmelfs_crypto_hash_init() 455 g->hash_key = kmemdup(key, c->keysize, GFP_KERNEL); in pohmelfs_crypto_hash_init() 476 g->cipher_keysize = c->keysize; in pohmelfs_crypto_cipher_init() 478 g->cipher_key = kmemdup(key, c->keysize, GFP_KERNEL); in pohmelfs_crypto_cipher_init() 495 crypto->keysize, (char *)crypto->data); in pohmelfs_cn_crypto()
|
D | netfs.h | 117 unsigned int keysize; /* Key size */ member
|
/linux-2.6.39/drivers/crypto/ |
D | hifn_795x.c | 652 unsigned int keysize; member 1198 if (ctx->keysize) in hifn_setup_cmd_desc() 1222 if (ctx->keysize != 16) in hifn_setup_cmd_desc() 1228 if (ctx->keysize != 24) in hifn_setup_cmd_desc() 1234 if (ctx->keysize != 32) in hifn_setup_cmd_desc() 1240 if (ctx->keysize != 24) in hifn_setup_cmd_desc() 1245 if (ctx->keysize != 8) in hifn_setup_cmd_desc() 1254 nbytes, nbytes, ctx->key, ctx->keysize, in hifn_setup_cmd_desc() 1638 ctx->key, ctx->keysize, in hifn_setup_session() 1662 ctx.keysize = 16; in hifn_test() [all …]
|
/linux-2.6.39/drivers/char/tpm/ |
D | tpm.h | 234 __be32 keysize; member
|
/linux-2.6.39/drivers/input/keyboard/ |
D | lm8323.c | 337 int keysize = (lm->size_x << 4) | lm->size_y; in lm8323_configure() local 351 lm8323_write(lm, 2, LM8323_CMD_SET_KEY_SIZE, keysize); in lm8323_configure()
|
/linux-2.6.39/net/key/ |
D | af_key.c | 1139 int keysize = 0; in pfkey_msg2xfrm_state() local 1146 keysize = (key->sadb_key_bits + 7) / 8; in pfkey_msg2xfrm_state() 1147 x->aalg = kmalloc(sizeof(*x->aalg) + keysize, GFP_KERNEL); in pfkey_msg2xfrm_state() 1154 memcpy(x->aalg->alg_key, key+1, keysize); in pfkey_msg2xfrm_state() 1173 int keysize = 0; in pfkey_msg2xfrm_state() local 1181 keysize = (key->sadb_key_bits + 7) / 8; in pfkey_msg2xfrm_state() 1182 x->ealg = kmalloc(sizeof(*x->ealg) + keysize, GFP_KERNEL); in pfkey_msg2xfrm_state() 1189 memcpy(x->ealg->alg_key, key+1, keysize); in pfkey_msg2xfrm_state()
|
/linux-2.6.39/drivers/block/ |
D | loop.c | 117 int i, keysize; in transfer_xor() local 128 keysize = lo->lo_encrypt_key_size; in transfer_xor() 130 *out++ = *in++ ^ key[(i & 511) % keysize]; in transfer_xor()
|