Home
last modified time | relevance | path

Searched refs:keysize (Results 1 – 20 of 20) sorted by relevance

/f-stack/dpdk/lib/librte_ipsec/
H A Dipsec_sad.c40 uint32_t keysize[RTE_IPSEC_SAD_KEY_TYPE_MASK]; member
78 rte_hash_crc(key, sad->keysize[key_type], sad->init_val)); in EAL_REGISTER_TAILQ()
98 rte_hash_crc(key, sad->keysize[RTE_IPSEC_SAD_SPI_ONLY], in EAL_REGISTER_TAILQ()
105 rte_hash_crc(key, sad->keysize[RTE_IPSEC_SAD_SPI_ONLY], in EAL_REGISTER_TAILQ()
139 key, rte_hash_crc(key, sad->keysize[key_type], in rte_ipsec_sad_add()
147 key, rte_hash_crc(key, sad->keysize[key_type], in rte_ipsec_sad_add()
229 key, rte_hash_crc(key, sad->keysize[key_type], in rte_ipsec_sad_del()
235 key, rte_hash_crc(key, sad->keysize[key_type], in rte_ipsec_sad_del()
243 rte_hash_crc(key, sad->keysize[key_type], in rte_ipsec_sad_del()
497 sad->keysize[RTE_IPSEC_SAD_SPI_DIP_SIP], in __ipsec_sad_lookup()
[all …]
/f-stack/freebsd/opencrypto/
H A Dxform_sha2.c79 .keysize = SHA2_256_BLOCK_LEN,
91 .keysize = SHA2_384_BLOCK_LEN,
103 .keysize = SHA2_512_BLOCK_LEN,
116 .keysize = SHA2_224_BLOCK_LEN,
128 .keysize = SHA2_256_BLOCK_LEN,
140 .keysize = SHA2_384_BLOCK_LEN,
152 .keysize = SHA2_512_BLOCK_LEN,
H A Dxform_cbc_mac.c11 .keysize = AES_128_CBC_MAC_KEY_LEN,
24 .keysize = AES_192_CBC_MAC_KEY_LEN,
37 .keysize = AES_256_CBC_MAC_KEY_LEN,
H A Dxform_gmac.c70 .keysize = AES_128_GMAC_KEY_LEN,
84 .keysize = AES_192_GMAC_KEY_LEN,
98 .keysize = AES_256_GMAC_KEY_LEN,
H A Dxform_rmd160.c64 .keysize = RIPEMD160_BLOCK_LEN,
H A Dxform_sha1.c76 .keysize = SHA1_BLOCK_LEN,
H A Dxform_auth.h55 uint16_t keysize; member
H A Dxform_null.c82 .keysize = 0,
H A Dxform_poly1305.c83 .keysize = POLY1305_KEY_LEN,
H A Dcryptodev.c629 if (sop->mackeylen > thash->keysize || sop->mackeylen < 0) { in cse_create()
/f-stack/freebsd/contrib/openzfs/module/icp/algs/aes/
H A Daes_impl.c46 uint_t keysize, i, j; in aes_init_keysched() local
69 keysize = CRYPTO_BITS2BYTES(keyBits); in aes_init_keysched()
79 for (i = 0, j = 0; j < keysize; i++, j += 8) { in aes_init_keysched()
84 bcopy(cipherKey, keyarr.ka32, keysize); in aes_init_keysched()
88 for (i = 0, j = 0; j < keysize; i++, j += 4) { in aes_init_keysched()
/f-stack/freebsd/kern/
H A Dkern_shutdown.c1494 uint32_t keysize; in dump_write_headers() local
1504 keysize = kerneldumpcrypto_dumpkeysize(kdc); in dump_write_headers()
1507 keysize = 0; in dump_write_headers()
1515 return (di->dumper_hdr(di, kdh, key, keysize)); in dump_write_headers()
1530 keysize, keysize); in dump_write_headers()
1538 keysize, di->blocksize); in dump_write_headers()
1575 uint32_t keysize; in dump_start() local
1582 keysize = kerneldumpcrypto_dumpkeysize(di->kdcrypto); in dump_start()
1585 keysize = 0; in dump_start()
1593 keysize; in dump_start()
/f-stack/freebsd/mips/nlm/dev/net/ucore/
H A Ducore.h293 int keysize, int valid, int startcrc, int endcrc) in nlm_ucore_crc_setup() argument
306 val |= ((keysize & 0x3f) << 25); in nlm_ucore_crc_setup()
/f-stack/freebsd/crypto/blake2/
H A Dblake2-sw.c88 .keysize = BLAKE2B_KEYBYTES,
156 .keysize = BLAKE2S_KEYBYTES,
/f-stack/freebsd/netinet/netdump/
H A Dnetdump_client.c341 void *key, uint32_t keysize) in netdump_write_headers() argument
351 if (error == 0 && keysize > 0) { in netdump_write_headers()
352 if (keysize > sizeof(nd_buf)) in netdump_write_headers()
354 memcpy(nd_buf, key, keysize); in netdump_write_headers()
356 keysize, NULL); in netdump_write_headers()
/f-stack/freebsd/crypto/via/
H A Dpadlock_hash.c84 .keysize = SHA1_BLOCK_LEN,
96 .keysize = SHA2_256_BLOCK_LEN,
/f-stack/freebsd/contrib/openzfs/module/os/freebsd/zfs/
H A Dcrypto_os.c450 xauth->name, xauth->keysize); in freebsd_crypt_newsession()
556 xauth->name, xauth->keysize); in freebsd_crypt_uio()
/f-stack/freebsd/netipsec/
H A Dxform_ah.c207 if (keylen > thash->keysize && thash->keysize != 0) { in ah_init0()
210 keylen, thash->name, thash->keysize)); in ah_init0()
H A Dkey.c6358 if (ah->keysize == 0) { in key_getsizes_ah()
/f-stack/app/redis-5.0.5/src/
H A Dredis-benchmark.c62 int keysize; member