/kernel/linux/linux-6.6/drivers/net/ethernet/netronome/nfp/crypto/ |
H A D | ipsec.c | 274 int i, key_len, trunc_len, err = 0; in nfp_net_xfrm_add_state() local 368 key_len = DIV_ROUND_UP(x->aalg->alg_key_len, BITS_PER_BYTE); in nfp_net_xfrm_add_state() 369 if (key_len > sizeof(cfg->auth_key)) { in nfp_net_xfrm_add_state() 373 for (i = 0; i < key_len / sizeof(cfg->auth_key[0]) ; i++) in nfp_net_xfrm_add_state() 432 key_len = DIV_ROUND_UP(x->aead->alg_key_len, BITS_PER_BYTE); in nfp_net_xfrm_add_state() 433 key_len -= salt_len; in nfp_net_xfrm_add_state() 435 if (key_len > sizeof(cfg->ciph_key)) { in nfp_net_xfrm_add_state() 440 for (i = 0; i < key_len / sizeof(cfg->ciph_key[0]) ; i++) in nfp_net_xfrm_add_state() 445 cfg->aesgcm_fields.salt = get_unaligned_be32(x->aead->alg_key + key_len); in nfp_net_xfrm_add_state() 449 key_len in nfp_net_xfrm_add_state() [all...] |
/kernel/linux/linux-6.6/drivers/crypto/ccp/ |
H A D | ccp-crypto-aes-cmac.c | 69 if (!ctx->u.aes.key_len) in ccp_do_cmac_update() 163 rctx->cmd.u.aes.key_len = ctx->u.aes.key_len; in ccp_do_cmac_update() 257 unsigned int key_len) in ccp_aes_cmac_setkey() 268 switch (key_len) { in ccp_aes_cmac_setkey() 284 ctx->u.aes.key_len = 0; in ccp_aes_cmac_setkey() 287 ret = aes_expandkey(&aes, key, key_len); in ccp_aes_cmac_setkey() 328 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_cmac_setkey() 329 ctx->u.aes.key_len = key_len; in ccp_aes_cmac_setkey() 256 ccp_aes_cmac_setkey(struct crypto_ahash *tfm, const u8 *key, unsigned int key_len) ccp_aes_cmac_setkey() argument [all...] |
/kernel/linux/linux-5.10/arch/powerpc/include/asm/ |
H A D | secvar.h | 17 int (*get)(const char *key, uint64_t key_len, u8 *data, 19 int (*get_next)(const char *key, uint64_t *key_len, 21 int (*set)(const char *key, uint64_t key_len, u8 *data,
|
/kernel/linux/linux-5.10/drivers/net/ethernet/netronome/nfp/ |
H A D | nfp_net_debugdump.c | 199 u32 tl_len, key_len; in nfp_calc_hwinfo_field_sz() local 203 key_len = strnlen(spec->data, tl_len); in nfp_calc_hwinfo_field_sz() 204 if (key_len == tl_len) in nfp_calc_hwinfo_field_sz() 211 return sizeof(struct nfp_dump_tl) + ALIGN8(key_len + strlen(value) + 2); in nfp_calc_hwinfo_field_sz() 234 u32 tl_len, key_len; in nfp_calc_rtsym_dump_sz() local 238 key_len = strnlen(spec_rtsym->rtsym, tl_len); in nfp_calc_rtsym_dump_sz() 239 if (key_len == tl_len) in nfp_calc_rtsym_dump_sz() 246 return ALIGN8(offsetof(struct nfp_dump_rtsym, rtsym) + key_len + 1) + in nfp_calc_rtsym_dump_sz() 415 u32 tl_len, key_len, val_len; in nfp_dump_hwinfo_field() local 421 key_len in nfp_dump_hwinfo_field() 605 u32 tl_len, key_len; nfp_dump_single_rtsym() local [all...] |
/kernel/linux/linux-6.6/drivers/net/ethernet/netronome/nfp/ |
H A D | nfp_net_debugdump.c | 199 u32 tl_len, key_len; in nfp_calc_hwinfo_field_sz() local 203 key_len = strnlen(spec->data, tl_len); in nfp_calc_hwinfo_field_sz() 204 if (key_len == tl_len) in nfp_calc_hwinfo_field_sz() 211 return sizeof(struct nfp_dump_tl) + ALIGN8(key_len + strlen(value) + 2); in nfp_calc_hwinfo_field_sz() 234 u32 tl_len, key_len; in nfp_calc_rtsym_dump_sz() local 238 key_len = strnlen(spec_rtsym->rtsym, tl_len); in nfp_calc_rtsym_dump_sz() 239 if (key_len == tl_len) in nfp_calc_rtsym_dump_sz() 246 return ALIGN8(offsetof(struct nfp_dump_rtsym, rtsym) + key_len + 1) + in nfp_calc_rtsym_dump_sz() 415 u32 tl_len, key_len, val_len; in nfp_dump_hwinfo_field() local 421 key_len in nfp_dump_hwinfo_field() 605 u32 tl_len, key_len; nfp_dump_single_rtsym() local [all...] |
/third_party/curl/lib/ |
H A D | hash.h | 64 size_t key_len; member 80 void *Curl_hash_add(struct Curl_hash *h, void *key, size_t key_len, void *p); 81 int Curl_hash_delete(struct Curl_hash *h, void *key, size_t key_len); 82 void *Curl_hash_pick(struct Curl_hash *, void *key, size_t key_len);
|
/third_party/mbedtls/library/ |
H A D | ssl_tls13_keys.c | 224 unsigned char *key, size_t key_len, in ssl_tls13_make_traffic_key() 234 key, key_len); in ssl_tls13_make_traffic_key() 268 size_t key_len, size_t iv_len, in mbedtls_ssl_tls13_make_traffic_keys() 275 keys->client_write_key, key_len, in mbedtls_ssl_tls13_make_traffic_keys() 283 keys->server_write_key, key_len, in mbedtls_ssl_tls13_make_traffic_keys() 289 keys->key_len = key_len; in mbedtls_ssl_tls13_make_traffic_keys() 1095 size_t *key_len, size_t *iv_len) in ssl_tls13_get_cipher_key_info() 1115 *key_len = PSA_BITS_TO_BYTES(key_bits); in ssl_tls13_get_cipher_key_info() 1143 size_t key_len in ssl_tls13_generate_early_key() local 221 ssl_tls13_make_traffic_key( psa_algorithm_t hash_alg, const unsigned char *secret, size_t secret_len, unsigned char *key, size_t key_len, unsigned char *iv, size_t iv_len) ssl_tls13_make_traffic_key() argument 264 mbedtls_ssl_tls13_make_traffic_keys( psa_algorithm_t hash_alg, const unsigned char *client_secret, const unsigned char *server_secret, size_t secret_len, size_t key_len, size_t iv_len, mbedtls_ssl_key_set *keys) mbedtls_ssl_tls13_make_traffic_keys() argument 1093 ssl_tls13_get_cipher_key_info( const mbedtls_ssl_ciphersuite_t *ciphersuite_info, size_t *key_len, size_t *iv_len) ssl_tls13_get_cipher_key_info() argument 1344 size_t key_len = 0; ssl_tls13_generate_handshake_keys() local 1595 size_t key_len = 0, iv_len = 0; ssl_tls13_generate_application_keys() local [all...] |
/third_party/node/deps/openssl/openssl/include/crypto/ |
H A D | evp.h | 295 int key_len; member 435 key_len, iv_len, flags, init_key, cleanup, \ 438 nid##_##nmode, block_size, key_len, iv_len, \ 451 #define BLOCK_CIPHER_def_cbc(cname, kstruct, nid, block_size, key_len, \ 454 BLOCK_CIPHER_def1(cname, cbc, cbc, CBC, kstruct, nid, block_size, key_len, \ 457 #define BLOCK_CIPHER_def_cfb(cname, kstruct, nid, key_len, \ 461 key_len, iv_len, flags, init_key, cleanup, set_asn1, \ 464 #define BLOCK_CIPHER_def_ofb(cname, kstruct, nid, key_len, \ 468 key_len, iv_len, flags, init_key, cleanup, set_asn1, \ 471 #define BLOCK_CIPHER_def_ecb(cname, kstruct, nid, block_size, key_len, \ [all...] |
/third_party/openssl/include/crypto/ |
H A D | evp.h | 295 int key_len; member 435 key_len, iv_len, flags, init_key, cleanup, \ 438 nid##_##nmode, block_size, key_len, iv_len, \ 451 #define BLOCK_CIPHER_def_cbc(cname, kstruct, nid, block_size, key_len, \ 454 BLOCK_CIPHER_def1(cname, cbc, cbc, CBC, kstruct, nid, block_size, key_len, \ 457 #define BLOCK_CIPHER_def_cfb(cname, kstruct, nid, key_len, \ 461 key_len, iv_len, flags, init_key, cleanup, set_asn1, \ 464 #define BLOCK_CIPHER_def_ofb(cname, kstruct, nid, key_len, \ 468 key_len, iv_len, flags, init_key, cleanup, set_asn1, \ 471 #define BLOCK_CIPHER_def_ecb(cname, kstruct, nid, block_size, key_len, \ [all...] |
/kernel/linux/linux-6.6/arch/powerpc/include/asm/ |
H A D | secvar.h | 18 int (*get)(const char *key, u64 key_len, u8 *data, u64 *data_size); 19 int (*get_next)(const char *key, u64 *key_len, u64 keybufsize); 20 int (*set)(const char *key, u64 key_len, u8 *data, u64 data_size);
|
/kernel/linux/linux-5.10/fs/ntfs/ |
H A D | index.c | 67 * @key_len: [IN] length of @key in bytes 105 int ntfs_index_lookup(const void *key, const int key_len, in ntfs_index_lookup() argument 129 BUG_ON(key_len <= 0); in ntfs_index_lookup() 192 if ((key_len == le16_to_cpu(ie->key_length)) && !memcmp(key, in ntfs_index_lookup() 193 &ie->key, key_len)) { in ntfs_index_lookup() 214 key_len, &ie->key, le16_to_cpu(ie->key_length)); in ntfs_index_lookup() 362 if ((key_len == le16_to_cpu(ie->key_length)) && !memcmp(key, in ntfs_index_lookup() 363 &ie->key, key_len)) { in ntfs_index_lookup() 377 key_len, &ie->key, le16_to_cpu(ie->key_length)); in ntfs_index_lookup()
|
/kernel/linux/linux-6.6/fs/ntfs/ |
H A D | index.c | 67 * @key_len: [IN] length of @key in bytes 105 int ntfs_index_lookup(const void *key, const int key_len, in ntfs_index_lookup() argument 129 BUG_ON(key_len <= 0); in ntfs_index_lookup() 192 if ((key_len == le16_to_cpu(ie->key_length)) && !memcmp(key, in ntfs_index_lookup() 193 &ie->key, key_len)) { in ntfs_index_lookup() 214 key_len, &ie->key, le16_to_cpu(ie->key_length)); in ntfs_index_lookup() 362 if ((key_len == le16_to_cpu(ie->key_length)) && !memcmp(key, in ntfs_index_lookup() 363 &ie->key, key_len)) { in ntfs_index_lookup() 377 key_len, &ie->key, le16_to_cpu(ie->key_length)); in ntfs_index_lookup()
|
/third_party/node/deps/openssl/openssl/providers/implementations/kdfs/ |
H A D | sshkdf.c | 36 const unsigned char *key, size_t key_len, 45 size_t key_len; member 83 OPENSSL_clear_free(ctx->key, ctx->key_len); in kdf_sshkdf_reset() 129 return SSHKDF(md, ctx->key, ctx->key_len, in kdf_sshkdf_derive() 148 if (!sshkdf_set_membuf(&ctx->key, &ctx->key_len, p)) in kdf_sshkdf_set_ctx_params() 228 const unsigned char *key, size_t key_len, in SSHKDF() 246 if (!EVP_DigestUpdate(md, key, key_len)) in SSHKDF() 274 if (!EVP_DigestUpdate(md, key, key_len)) in SSHKDF() 227 SSHKDF(const EVP_MD *evp_md, const unsigned char *key, size_t key_len, const unsigned char *xcghash, size_t xcghash_len, const unsigned char *session_id, size_t session_id_len, char type, unsigned char *okey, size_t okey_len) SSHKDF() argument
|
/third_party/openssl/providers/implementations/kdfs/ |
H A D | sshkdf.c | 36 const unsigned char *key, size_t key_len, 45 size_t key_len; member 83 OPENSSL_clear_free(ctx->key, ctx->key_len); in kdf_sshkdf_reset() 129 return SSHKDF(md, ctx->key, ctx->key_len, in kdf_sshkdf_derive() 148 if (!sshkdf_set_membuf(&ctx->key, &ctx->key_len, p)) in kdf_sshkdf_set_ctx_params() 228 const unsigned char *key, size_t key_len, in SSHKDF() 246 if (!EVP_DigestUpdate(md, key, key_len)) in SSHKDF() 274 if (!EVP_DigestUpdate(md, key, key_len)) in SSHKDF() 227 SSHKDF(const EVP_MD *evp_md, const unsigned char *key, size_t key_len, const unsigned char *xcghash, size_t xcghash_len, const unsigned char *session_id, size_t session_id_len, char type, unsigned char *okey, size_t okey_len) SSHKDF() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | crypto_internal-cipher.c | 45 size_t key_len) in crypto_cipher_init() 57 if (key_len > sizeof(ctx->u.rc4.key)) { in crypto_cipher_init() 61 ctx->u.rc4.keylen = key_len; in crypto_cipher_init() 62 os_memcpy(ctx->u.rc4.key, key, key_len); in crypto_cipher_init() 65 ctx->u.aes.ctx_enc = aes_encrypt_init(key, key_len); in crypto_cipher_init() 70 ctx->u.aes.ctx_dec = aes_decrypt_init(key, key_len); in crypto_cipher_init() 79 if (key_len != 24) { in crypto_cipher_init() 87 if (key_len != 8) { in crypto_cipher_init() 43 crypto_cipher_init(enum crypto_cipher_alg alg, const u8 *iv, const u8 *key, size_t key_len) crypto_cipher_init() argument
|
H A D | aes-gcm.c | 175 static void * aes_gcm_init_hash_subkey(const u8 *key, size_t key_len, u8 *H) in aes_gcm_init_hash_subkey() argument 179 aes = aes_encrypt_init(key, key_len); in aes_gcm_init_hash_subkey() 254 int aes_gcm_ae(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, in aes_gcm_ae() argument 263 aes = aes_gcm_init_hash_subkey(key, key_len, H); in aes_gcm_ae() 288 int aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, in aes_gcm_ad() argument 297 aes = aes_gcm_init_hash_subkey(key, key_len, H); in aes_gcm_ad() 322 int aes_gmac(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, in aes_gmac() argument 325 return aes_gcm_ae(key, key_len, iv, iv_len, NULL, 0, aad, aad_len, NULL, in aes_gmac()
|
H A D | sha1-prf.c | 19 * @key_len: Length of the key in bytes 30 int sha1_prf(const u8 *key, size_t key_len, const char *label, in sha1_prf() argument 51 if (hmac_sha1_vector(key, key_len, 3, addr, len, in sha1_prf() 56 if (hmac_sha1_vector(key, key_len, 3, addr, len, in sha1_prf()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | aes-gcm.c | 175 static void * aes_gcm_init_hash_subkey(const u8 *key, size_t key_len, u8 *H) in aes_gcm_init_hash_subkey() argument 179 aes = aes_encrypt_init(key, key_len); in aes_gcm_init_hash_subkey() 254 int aes_gcm_ae(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, in aes_gcm_ae() argument 263 aes = aes_gcm_init_hash_subkey(key, key_len, H); in aes_gcm_ae() 288 int aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, in aes_gcm_ad() argument 297 aes = aes_gcm_init_hash_subkey(key, key_len, H); in aes_gcm_ad() 322 int aes_gmac(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, in aes_gmac() argument 325 return aes_gcm_ae(key, key_len, iv, iv_len, NULL, 0, aad, aad_len, NULL, in aes_gmac()
|
H A D | crypto_internal-cipher.c | 45 size_t key_len) in crypto_cipher_init() 57 if (key_len > sizeof(ctx->u.rc4.key)) { in crypto_cipher_init() 61 ctx->u.rc4.keylen = key_len; in crypto_cipher_init() 62 os_memcpy(ctx->u.rc4.key, key, key_len); in crypto_cipher_init() 65 ctx->u.aes.ctx_enc = aes_encrypt_init(key, key_len); in crypto_cipher_init() 70 ctx->u.aes.ctx_dec = aes_decrypt_init(key, key_len); in crypto_cipher_init() 79 if (key_len != 24) { in crypto_cipher_init() 87 if (key_len != 8) { in crypto_cipher_init() 43 crypto_cipher_init(enum crypto_cipher_alg alg, const u8 *iv, const u8 *key, size_t key_len) crypto_cipher_init() argument
|
H A D | sha1-prf.c | 19 * @key_len: Length of the key in bytes 30 int sha1_prf(const u8 *key, size_t key_len, const char *label, in sha1_prf() argument 51 if (hmac_sha1_vector(key, key_len, 3, addr, len, in sha1_prf() 56 if (hmac_sha1_vector(key, key_len, 3, addr, len, in sha1_prf()
|
/kernel/linux/linux-6.6/drivers/net/wireless/intersil/orinoco/ |
H A D | wext.c | 31 enum orinoco_alg alg, const u8 *key, int key_len, in orinoco_set_key() 37 if (key_len) { in orinoco_set_key() 38 priv->keys[index].key = kzalloc(key_len, GFP_ATOMIC); in orinoco_set_key() 51 priv->keys[index].key_len = key_len; in orinoco_set_key() 54 if (key_len) in orinoco_set_key() 55 memcpy((void *)priv->keys[index].key, key, key_len); in orinoco_set_key() 65 priv->keys[index].cipher = (key_len > SMALL_KEY_SIZE) ? in orinoco_set_key() 82 priv->keys[index].key_len = 0; in orinoco_set_key() 290 if (priv->keys[index].key_len in orinoco_ioctl_setiwencode() 30 orinoco_set_key(struct orinoco_private *priv, int index, enum orinoco_alg alg, const u8 *key, int key_len, const u8 *seq, int seq_len) orinoco_set_key() argument [all...] |
/kernel/linux/linux-6.6/drivers/s390/crypto/ |
H A D | zcrypt_cca_key.h | 174 int short_len, long_len, pad_len, key_len, size; in zcrypt_type6_crt_key() local 190 key_len = 3 * long_len + 2 * short_len + pad_len + crt->inputdatalength; in zcrypt_type6_crt_key() 191 size = sizeof(*key) + key_len + sizeof(*pub) + 3; in zcrypt_type6_crt_key() 203 key->pvt.section_length = sizeof(key->pvt) + key_len; in zcrypt_type6_crt_key() 224 pub = (struct cca_public_sec *)(key->key_parts + key_len); in zcrypt_type6_crt_key()
|
/third_party/libwebsockets/lib/tls/openssl/ |
H A D | lws-genhash.c | 105 const uint8_t *key, size_t key_len) in lws_genhmac_init() 129 ctx->key = EVP_PKEY_new_raw_private_key(EVP_PKEY_HMAC, NULL, key, key_len); in lws_genhmac_init() 176 const uint8_t *key, size_t key_len) in lws_genhmac_init() 205 if (HMAC_Init_ex(ctx->ctx, key, (int)key_len, ctx->evp_type, NULL) != 1) in lws_genhmac_init() 207 if (HMAC_Init_ex(&ctx->ctx, key, (int)key_len, ctx->evp_type, NULL) != 1) in lws_genhmac_init() 104 lws_genhmac_init(struct lws_genhmac_ctx *ctx, enum lws_genhmac_types type, const uint8_t *key, size_t key_len) lws_genhmac_init() argument 175 lws_genhmac_init(struct lws_genhmac_ctx *ctx, enum lws_genhmac_types type, const uint8_t *key, size_t key_len) lws_genhmac_init() argument
|
/kernel/linux/linux-6.6/arch/arm64/crypto/ |
H A D | aes-neonbs-glue.c | 75 unsigned int key_len) in aesbs_setkey() 81 err = aes_expandkey(&rk, in_key, key_len); in aesbs_setkey() 85 ctx->rounds = 6 + key_len / 4; in aesbs_setkey() 134 unsigned int key_len) in aesbs_cbc_ctr_setkey() 140 err = aes_expandkey(&rk, in_key, key_len); in aesbs_cbc_ctr_setkey() 144 ctx->key.rounds = 6 + key_len / 4; in aesbs_cbc_ctr_setkey() 252 unsigned int key_len) in aesbs_xts_setkey() 258 err = xts_verify_key(tfm, in_key, key_len); in aesbs_xts_setkey() 262 key_len /= 2; in aesbs_xts_setkey() 263 err = aes_expandkey(&ctx->cts, in_key, key_len); in aesbs_xts_setkey() 74 aesbs_setkey(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) aesbs_setkey() argument 133 aesbs_cbc_ctr_setkey(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) aesbs_cbc_ctr_setkey() argument 251 aesbs_xts_setkey(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) aesbs_xts_setkey() argument [all...] |
/kernel/linux/linux-5.10/drivers/net/wireless/intersil/orinoco/ |
H A D | wext.c | 31 enum orinoco_alg alg, const u8 *key, int key_len, in orinoco_set_key() 37 if (key_len) { in orinoco_set_key() 38 priv->keys[index].key = kzalloc(key_len, GFP_ATOMIC); in orinoco_set_key() 51 priv->keys[index].key_len = key_len; in orinoco_set_key() 54 if (key_len) in orinoco_set_key() 55 memcpy((void *)priv->keys[index].key, key, key_len); in orinoco_set_key() 65 priv->keys[index].cipher = (key_len > SMALL_KEY_SIZE) ? in orinoco_set_key() 82 priv->keys[index].key_len = 0; in orinoco_set_key() 287 if (priv->keys[index].key_len in orinoco_ioctl_setiwencode() 30 orinoco_set_key(struct orinoco_private *priv, int index, enum orinoco_alg alg, const u8 *key, int key_len, const u8 *seq, int seq_len) orinoco_set_key() argument [all...] |