Home
last modified time | relevance | path

Searched refs:key_sz (Results 1 – 7 of 7) sorted by relevance

/kernel/linux/linux-5.10/drivers/crypto/qat/qat_common/
Dqat_asym_algs.c75 unsigned int key_sz; member
519 dma_free_coherent(dev, req->ctx.rsa->key_sz, req->src_align, in qat_rsa_cb()
522 dma_unmap_single(dev, req->in.rsa.enc.m, req->ctx.rsa->key_sz, in qat_rsa_cb()
525 areq->dst_len = req->ctx.rsa->key_sz; in qat_rsa_cb()
530 dma_free_coherent(dev, req->ctx.rsa->key_sz, req->dst_align, in qat_rsa_cb()
533 dma_unmap_single(dev, req->out.rsa.enc.c, req->ctx.rsa->key_sz, in qat_rsa_cb()
655 if (req->dst_len < ctx->key_sz) { in qat_rsa_enc()
656 req->dst_len = ctx->key_sz; in qat_rsa_enc()
662 msg->pke_hdr.cd_pars.func_id = qat_rsa_enc_fn_id(ctx->key_sz); in qat_rsa_enc()
685 if (sg_is_last(req->src) && req->src_len == ctx->key_sz) { in qat_rsa_enc()
[all …]
/kernel/linux/linux-5.10/drivers/crypto/hisilicon/hpre/
Dhpre_crypto.c77 unsigned int key_sz; member
209 shift = ctx->key_sz - len; in hpre_prepare_dma_buf()
213 ptr = dma_alloc_coherent(dev, ctx->key_sz, tmp, GFP_KERNEL); in hpre_prepare_dma_buf()
237 if ((sg_is_last(data) && len == ctx->key_sz) && in hpre_hw_data_init()
269 dma_free_coherent(dev, ctx->key_sz, req->src, tmp); in hpre_hw_data_clr_all()
271 dma_unmap_single(dev, tmp, ctx->key_sz, DMA_TO_DEVICE); in hpre_hw_data_clr_all()
281 ctx->key_sz, 1); in hpre_hw_data_clr_all()
282 dma_free_coherent(dev, ctx->key_sz, req->dst, tmp); in hpre_hw_data_clr_all()
284 dma_unmap_single(dev, tmp, ctx->key_sz, DMA_FROM_DEVICE); in hpre_hw_data_clr_all()
330 ctx->key_sz = 0; in hpre_ctx_set()
[all …]
/kernel/linux/linux-5.10/fs/orangefs/
Dxattr.c160 new_op->upcall.req.getxattr.key_sz = strlen(name) + 1; in orangefs_inode_getxattr()
215 upcall.req.getxattr.key_sz, in orangefs_inode_getxattr()
269 new_op->upcall.req.removexattr.key_sz = strlen(name) + 1; in orangefs_inode_removexattr()
274 (int)new_op->upcall.req.removexattr.key_sz); in orangefs_inode_removexattr()
363 new_op->upcall.req.setxattr.keyval.key_sz = strlen(name) + 1; in orangefs_inode_setxattr()
371 (int)new_op->upcall.req.setxattr.keyval.key_sz, in orangefs_inode_setxattr()
Dupcall.h118 __s32 key_sz; member
139 __s32 key_sz; member
Dprotocol.h219 __s32 key_sz; /* __s32 for portable, fixed-size structures */ member
/kernel/linux/linux-5.10/drivers/crypto/
Dsa2ul.c126 u16 key_sz, __be32 *ipad, __be32 *opad);
364 static void prepare_kiopad(u8 *k_ipad, u8 *k_opad, const u8 *key, u16 key_sz) in prepare_kiopad() argument
368 for (i = 0; i < key_sz; i++) { in prepare_kiopad()
414 u16 key_sz, __be32 *ipad, __be32 *opad) in sa_prepare_iopads() argument
424 prepare_kiopad(k_ipad, k_opad, key, key_sz); in sa_prepare_iopads()
440 static inline int sa_aes_inv_key(u8 *inv_key, const u8 *key, u16 key_sz) in sa_aes_inv_key() argument
445 if (aes_expandkey(&ctx, key, key_sz)) { in sa_aes_inv_key()
446 dev_err(sa_k3_dev, "%s: bad key len(%d)\n", __func__, key_sz); in sa_aes_inv_key()
451 if (key_sz == AES_KEYSIZE_192) { in sa_aes_inv_key()
457 switch (key_sz) { in sa_aes_inv_key()
[all …]
/kernel/linux/linux-5.10/drivers/crypto/inside-secure/
Dsafexcel_hash.c25 u8 key_sz; member
123 memcpy(ctx->base.ctxr->data, &ctx->base.ipad, ctx->key_sz); in safexcel_context_control()
1998 memcpy(req->state, &ctx->base.ipad, ctx->key_sz); in safexcel_cbcmac_init()
2004 req->state_sz = ctx->key_sz; in safexcel_cbcmac_init()
2029 ctx->key_sz = AES_MAX_KEY_SIZE + 2 * AES_BLOCK_SIZE; in safexcel_cbcmac_setkey()
2032 ctx->key_sz = AES_MAX_KEY_SIZE + 2 * AES_BLOCK_SIZE; in safexcel_cbcmac_setkey()
2035 ctx->key_sz = AES_MIN_KEY_SIZE + 2 * AES_BLOCK_SIZE; in safexcel_cbcmac_setkey()
2119 ctx->key_sz = AES_MIN_KEY_SIZE + 2 * AES_BLOCK_SIZE; in safexcel_xcbcmac_setkey()
2225 ctx->key_sz = AES_MAX_KEY_SIZE + 2 * AES_BLOCK_SIZE; in safexcel_cmac_setkey()
2228 ctx->key_sz = AES_MAX_KEY_SIZE + 2 * AES_BLOCK_SIZE; in safexcel_cmac_setkey()
[all …]