Home
last modified time | relevance | path

Searched refs:key_size (Results 1 – 25 of 28) sorted by relevance

12

/linux-4.19.296/crypto/
Drsa-pkcs1pad.c95 unsigned int key_size; member
115 ctx->key_size = 0; in pkcs1pad_set_pub_key()
126 ctx->key_size = err; in pkcs1pad_set_pub_key()
136 ctx->key_size = 0; in pkcs1pad_set_priv_key()
147 ctx->key_size = err; in pkcs1pad_set_priv_key()
161 return ctx->key_size; in pkcs1pad_get_max_size()
189 pad_len = ctx->key_size - len; in pkcs1pad_encrypt_sign_complete()
195 out_buf = kzalloc(ctx->key_size, GFP_KERNEL); in pkcs1pad_encrypt_sign_complete()
203 sg_nents_for_len(req->dst, ctx->key_size), in pkcs1pad_encrypt_sign_complete()
204 out_buf, ctx->key_size); in pkcs1pad_encrypt_sign_complete()
[all …]
Ddh_helper.c35 return p->key_size + p->p_size + p->q_size + p->g_size; in dh_data_size()
57 ptr = dh_pack_data(ptr, end, &params->key_size, in crypto_dh_encode_key()
58 sizeof(params->key_size)); in crypto_dh_encode_key()
62 ptr = dh_pack_data(ptr, end, params->key, params->key_size); in crypto_dh_encode_key()
84 ptr = dh_unpack_data(&params->key_size, ptr, sizeof(params->key_size)); in crypto_dh_decode_key()
95 if (params->key_size > params->p_size || in crypto_dh_decode_key()
103 params->p = (void *)(ptr + params->key_size); in crypto_dh_decode_key()
104 params->q = (void *)(ptr + params->key_size + params->p_size); in crypto_dh_decode_key()
105 params->g = (void *)(ptr + params->key_size + params->p_size + in crypto_dh_decode_key()
Decdh_helper.c33 return ECDH_KPP_SECRET_MIN_SIZE + params->key_size; in crypto_ecdh_key_len()
54 ptr = ecdh_pack_data(ptr, &params->key_size, sizeof(params->key_size)); in crypto_ecdh_encode_key()
55 ecdh_pack_data(ptr, params->key, params->key_size); in crypto_ecdh_encode_key()
78 ptr = ecdh_unpack_data(&params->key_size, ptr, sizeof(params->key_size)); in crypto_ecdh_decode_key()
Decdh.c47 params.key_size > sizeof(ctx->private_key)) in ecdh_set_secret()
57 if (!params.key || !params.key_size) in ecdh_set_secret()
61 memcpy(ctx->private_key, params.key, params.key_size); in ecdh_set_secret()
64 ctx->private_key, params.key_size) < 0) { in ecdh_set_secret()
65 memzero_explicit(ctx->private_key, params.key_size); in ecdh_set_secret()
Ddh.c93 ctx->xa = mpi_read_raw_data(params.key, params.key_size); in dh_set_secret()
/linux-4.19.296/fs/orangefs/
Dxattr.c311 int key_size; in orangefs_listxattr() local
329 key_size = 0; in orangefs_listxattr()
382 key_size, in orangefs_listxattr()
387 key_size); in orangefs_listxattr()
389 new_op->downcall.resp.listxattr.key + key_size, in orangefs_listxattr()
396 key_size); in orangefs_listxattr()
398 key_size += new_op->downcall.resp.listxattr.lengths[i]; in orangefs_listxattr()
/linux-4.19.296/fs/ecryptfs/
Dcrypto.c332 crypt_stat->key_size); in crypt_scatterlist()
334 crypt_stat->key_size); in crypt_scatterlist()
353 crypt_stat->key_size); in crypt_scatterlist()
594 crypt_stat->key_size << 3); in ecryptfs_init_crypt_ctx()
676 crypt_stat->key_size); in ecryptfs_compute_root_iv()
693 get_random_bytes(crypt_stat->key, crypt_stat->key_size); in ecryptfs_generate_new_key()
699 crypt_stat->key_size); in ecryptfs_generate_new_key()
773 crypt_stat->key_size = ECRYPTFS_DEFAULT_KEY_BYTES; in ecryptfs_set_default_crypt_stat_vals()
825 crypt_stat->key_size = in ecryptfs_new_file_context()
1573 char *cipher_name, size_t *key_size) in ecryptfs_process_key_cipher() argument
[all …]
Dkeystore.c319 data_len = (5 + ECRYPTFS_SIG_SIZE_HEX + crypt_stat->key_size); in write_tag_66_packet()
339 rc = ecryptfs_write_packet_length(&message[i], crypt_stat->key_size + 3, in write_tag_66_packet()
348 memcpy(&message[i], crypt_stat->key, crypt_stat->key_size); in write_tag_66_packet()
349 i += crypt_stat->key_size; in write_tag_66_packet()
350 for (j = 0; j < crypt_stat->key_size; j++) in write_tag_66_packet()
1185 crypt_stat->key_size = auth_tok->session_key.decrypted_key_size; in decrypt_pki_encrypted_session_key()
1196 crypt_stat->key_size); in decrypt_pki_encrypted_session_key()
1459 crypt_stat->key_size = 24; in parse_tag_3_packet()
1462 crypt_stat->key_size = in parse_tag_3_packet()
1722 crypt_stat->key_size); in decrypt_passphrase_encrypted_session_key()
[all …]
Decryptfs_kernel.h249 size_t key_size; member
329 size_t key_size; member
672 size_t key_size);
/linux-4.19.296/fs/hfs/
Dbrec.c462 int key_size, rec; in hfs_btree_inc_height() local
507 key_size = hfs_bnode_read_u8(node, 14) + 1; in hfs_btree_inc_height()
509 key_size = tree->max_key_len + 1; in hfs_btree_inc_height()
510 hfs_bnode_copy(new_node, 14, node, 14, key_size); in hfs_btree_inc_height()
513 key_size = tree->max_key_len + 1; in hfs_btree_inc_height()
516 key_size = (key_size + 1) & -2; in hfs_btree_inc_height()
518 hfs_bnode_write(new_node, &cnid, 14 + key_size, 4); in hfs_btree_inc_height()
521 hfs_bnode_write_u16(new_node, rec, 14 + key_size + 4); in hfs_btree_inc_height()
Dbnode.c333 int entry_size, key_size; in hfs_bnode_find() local
395 key_size = hfs_bnode_read_u8(node, off) + 1; in hfs_bnode_find()
396 if (key_size >= entry_size /*|| key_size & 1*/) in hfs_bnode_find()
/linux-4.19.296/fs/hfsplus/
Dbrec.c466 int key_size, rec; in hfs_btree_inc_height() local
512 key_size = hfs_bnode_read_u16(node, 14) + 2; in hfs_btree_inc_height()
514 key_size = tree->max_key_len + 2; in hfs_btree_inc_height()
515 hfs_bnode_copy(new_node, 14, node, 14, key_size); in hfs_btree_inc_height()
519 key_size = tree->max_key_len + 2; in hfs_btree_inc_height()
523 hfs_bnode_write(new_node, &cnid, 14 + key_size, 4); in hfs_btree_inc_height()
526 hfs_bnode_write_u16(new_node, rec, 14 + key_size + 4); in hfs_btree_inc_height()
Dbnode.c483 int entry_size, key_size; in hfs_bnode_find() local
547 key_size = hfs_bnode_read_u16(node, off) + 2; in hfs_bnode_find()
548 if (key_size >= entry_size || key_size & 1) in hfs_bnode_find()
/linux-4.19.296/include/crypto/
Decdh.h44 unsigned short key_size; member
Ddh.h44 unsigned int key_size; member
/linux-4.19.296/include/uapi/linux/
Dhyperv.h347 __u32 key_size; member
371 __u32 key_size; member
Dbpf.h304 __u32 key_size; /* size of key in bytes */ member
2517 __u32 key_size; member
Dethtool.h1040 __u32 key_size; member
/linux-4.19.296/include/linux/
Decryptfs.h85 u32 key_size; member
Dccp.h375 u32 key_size; /* In bits */ member
/linux-4.19.296/crypto/asymmetric_keys/
Dx509_cert_parser.c28 size_t key_size; /* Size of key data */ member
106 cert->pub->key = kmemdup(ctx->key, ctx->key_size, GFP_KERNEL); in x509_cert_parse()
110 cert->pub->keylen = ctx->key_size; in x509_cert_parse()
424 ctx->key_size = vlen - 1; in x509_extract_key_data()
/linux-4.19.296/fs/cifs/
Dsmb2transport.c234 struct kvec context, __u8 *key, unsigned int key_size) in generate_key() argument
244 memset(key, 0x0, key_size); in generate_key()
307 memcpy(key, hashptr, key_size); in generate_key()
/linux-4.19.296/include/uapi/linux/wimax/
Di2400m.h142 __le32 key_size; /* in dwords */ member
/linux-4.19.296/include/net/bluetooth/
Dbluetooth.h65 __u8 key_size; member
/linux-4.19.296/lib/
Dvsprintf.c1717 int key_size = sizeof(ptr_key); in initialize_ptr_random() local
1721 if (get_random_bytes_arch(&ptr_key, key_size) == key_size) { in initialize_ptr_random()

12