/linux-4.19.296/crypto/ |
D | rsa-pkcs1pad.c | 95 unsigned int key_size; member 115 ctx->key_size = 0; in pkcs1pad_set_pub_key() 126 ctx->key_size = err; in pkcs1pad_set_pub_key() 136 ctx->key_size = 0; in pkcs1pad_set_priv_key() 147 ctx->key_size = err; in pkcs1pad_set_priv_key() 161 return ctx->key_size; in pkcs1pad_get_max_size() 189 pad_len = ctx->key_size - len; in pkcs1pad_encrypt_sign_complete() 195 out_buf = kzalloc(ctx->key_size, GFP_KERNEL); in pkcs1pad_encrypt_sign_complete() 203 sg_nents_for_len(req->dst, ctx->key_size), in pkcs1pad_encrypt_sign_complete() 204 out_buf, ctx->key_size); in pkcs1pad_encrypt_sign_complete() [all …]
|
D | dh_helper.c | 35 return p->key_size + p->p_size + p->q_size + p->g_size; in dh_data_size() 57 ptr = dh_pack_data(ptr, end, ¶ms->key_size, in crypto_dh_encode_key() 58 sizeof(params->key_size)); in crypto_dh_encode_key() 62 ptr = dh_pack_data(ptr, end, params->key, params->key_size); in crypto_dh_encode_key() 84 ptr = dh_unpack_data(¶ms->key_size, ptr, sizeof(params->key_size)); in crypto_dh_decode_key() 95 if (params->key_size > params->p_size || in crypto_dh_decode_key() 103 params->p = (void *)(ptr + params->key_size); in crypto_dh_decode_key() 104 params->q = (void *)(ptr + params->key_size + params->p_size); in crypto_dh_decode_key() 105 params->g = (void *)(ptr + params->key_size + params->p_size + in crypto_dh_decode_key()
|
D | ecdh_helper.c | 33 return ECDH_KPP_SECRET_MIN_SIZE + params->key_size; in crypto_ecdh_key_len() 54 ptr = ecdh_pack_data(ptr, ¶ms->key_size, sizeof(params->key_size)); in crypto_ecdh_encode_key() 55 ecdh_pack_data(ptr, params->key, params->key_size); in crypto_ecdh_encode_key() 78 ptr = ecdh_unpack_data(¶ms->key_size, ptr, sizeof(params->key_size)); in crypto_ecdh_decode_key()
|
D | ecdh.c | 47 params.key_size > sizeof(ctx->private_key)) in ecdh_set_secret() 57 if (!params.key || !params.key_size) in ecdh_set_secret() 61 memcpy(ctx->private_key, params.key, params.key_size); in ecdh_set_secret() 64 ctx->private_key, params.key_size) < 0) { in ecdh_set_secret() 65 memzero_explicit(ctx->private_key, params.key_size); in ecdh_set_secret()
|
D | dh.c | 93 ctx->xa = mpi_read_raw_data(params.key, params.key_size); in dh_set_secret()
|
/linux-4.19.296/fs/orangefs/ |
D | xattr.c | 311 int key_size; in orangefs_listxattr() local 329 key_size = 0; in orangefs_listxattr() 382 key_size, in orangefs_listxattr() 387 key_size); in orangefs_listxattr() 389 new_op->downcall.resp.listxattr.key + key_size, in orangefs_listxattr() 396 key_size); in orangefs_listxattr() 398 key_size += new_op->downcall.resp.listxattr.lengths[i]; in orangefs_listxattr()
|
/linux-4.19.296/fs/ecryptfs/ |
D | crypto.c | 332 crypt_stat->key_size); in crypt_scatterlist() 334 crypt_stat->key_size); in crypt_scatterlist() 353 crypt_stat->key_size); in crypt_scatterlist() 594 crypt_stat->key_size << 3); in ecryptfs_init_crypt_ctx() 676 crypt_stat->key_size); in ecryptfs_compute_root_iv() 693 get_random_bytes(crypt_stat->key, crypt_stat->key_size); in ecryptfs_generate_new_key() 699 crypt_stat->key_size); in ecryptfs_generate_new_key() 773 crypt_stat->key_size = ECRYPTFS_DEFAULT_KEY_BYTES; in ecryptfs_set_default_crypt_stat_vals() 825 crypt_stat->key_size = in ecryptfs_new_file_context() 1573 char *cipher_name, size_t *key_size) in ecryptfs_process_key_cipher() argument [all …]
|
D | keystore.c | 319 data_len = (5 + ECRYPTFS_SIG_SIZE_HEX + crypt_stat->key_size); in write_tag_66_packet() 339 rc = ecryptfs_write_packet_length(&message[i], crypt_stat->key_size + 3, in write_tag_66_packet() 348 memcpy(&message[i], crypt_stat->key, crypt_stat->key_size); in write_tag_66_packet() 349 i += crypt_stat->key_size; in write_tag_66_packet() 350 for (j = 0; j < crypt_stat->key_size; j++) in write_tag_66_packet() 1185 crypt_stat->key_size = auth_tok->session_key.decrypted_key_size; in decrypt_pki_encrypted_session_key() 1196 crypt_stat->key_size); in decrypt_pki_encrypted_session_key() 1459 crypt_stat->key_size = 24; in parse_tag_3_packet() 1462 crypt_stat->key_size = in parse_tag_3_packet() 1722 crypt_stat->key_size); in decrypt_passphrase_encrypted_session_key() [all …]
|
D | ecryptfs_kernel.h | 249 size_t key_size; member 329 size_t key_size; member 672 size_t key_size);
|
/linux-4.19.296/fs/hfs/ |
D | brec.c | 462 int key_size, rec; in hfs_btree_inc_height() local 507 key_size = hfs_bnode_read_u8(node, 14) + 1; in hfs_btree_inc_height() 509 key_size = tree->max_key_len + 1; in hfs_btree_inc_height() 510 hfs_bnode_copy(new_node, 14, node, 14, key_size); in hfs_btree_inc_height() 513 key_size = tree->max_key_len + 1; in hfs_btree_inc_height() 516 key_size = (key_size + 1) & -2; in hfs_btree_inc_height() 518 hfs_bnode_write(new_node, &cnid, 14 + key_size, 4); in hfs_btree_inc_height() 521 hfs_bnode_write_u16(new_node, rec, 14 + key_size + 4); in hfs_btree_inc_height()
|
D | bnode.c | 333 int entry_size, key_size; in hfs_bnode_find() local 395 key_size = hfs_bnode_read_u8(node, off) + 1; in hfs_bnode_find() 396 if (key_size >= entry_size /*|| key_size & 1*/) in hfs_bnode_find()
|
/linux-4.19.296/fs/hfsplus/ |
D | brec.c | 466 int key_size, rec; in hfs_btree_inc_height() local 512 key_size = hfs_bnode_read_u16(node, 14) + 2; in hfs_btree_inc_height() 514 key_size = tree->max_key_len + 2; in hfs_btree_inc_height() 515 hfs_bnode_copy(new_node, 14, node, 14, key_size); in hfs_btree_inc_height() 519 key_size = tree->max_key_len + 2; in hfs_btree_inc_height() 523 hfs_bnode_write(new_node, &cnid, 14 + key_size, 4); in hfs_btree_inc_height() 526 hfs_bnode_write_u16(new_node, rec, 14 + key_size + 4); in hfs_btree_inc_height()
|
D | bnode.c | 483 int entry_size, key_size; in hfs_bnode_find() local 547 key_size = hfs_bnode_read_u16(node, off) + 2; in hfs_bnode_find() 548 if (key_size >= entry_size || key_size & 1) in hfs_bnode_find()
|
/linux-4.19.296/include/crypto/ |
D | ecdh.h | 44 unsigned short key_size; member
|
D | dh.h | 44 unsigned int key_size; member
|
/linux-4.19.296/include/uapi/linux/ |
D | hyperv.h | 347 __u32 key_size; member 371 __u32 key_size; member
|
D | bpf.h | 304 __u32 key_size; /* size of key in bytes */ member 2517 __u32 key_size; member
|
D | ethtool.h | 1040 __u32 key_size; member
|
/linux-4.19.296/include/linux/ |
D | ecryptfs.h | 85 u32 key_size; member
|
D | ccp.h | 375 u32 key_size; /* In bits */ member
|
/linux-4.19.296/crypto/asymmetric_keys/ |
D | x509_cert_parser.c | 28 size_t key_size; /* Size of key data */ member 106 cert->pub->key = kmemdup(ctx->key, ctx->key_size, GFP_KERNEL); in x509_cert_parse() 110 cert->pub->keylen = ctx->key_size; in x509_cert_parse() 424 ctx->key_size = vlen - 1; in x509_extract_key_data()
|
/linux-4.19.296/fs/cifs/ |
D | smb2transport.c | 234 struct kvec context, __u8 *key, unsigned int key_size) in generate_key() argument 244 memset(key, 0x0, key_size); in generate_key() 307 memcpy(key, hashptr, key_size); in generate_key()
|
/linux-4.19.296/include/uapi/linux/wimax/ |
D | i2400m.h | 142 __le32 key_size; /* in dwords */ member
|
/linux-4.19.296/include/net/bluetooth/ |
D | bluetooth.h | 65 __u8 key_size; member
|
/linux-4.19.296/lib/ |
D | vsprintf.c | 1717 int key_size = sizeof(ptr_key); in initialize_ptr_random() local 1721 if (get_random_bytes_arch(&ptr_key, key_size) == key_size) { in initialize_ptr_random()
|