/kernel/linux/linux-5.10/drivers/crypto/ |
H A D | padlock-aes.c | 75 the extended key for a given key_len. */ 77 aes_hw_extkey_available(uint8_t key_len) in aes_hw_extkey_available() argument 82 if (key_len == 16) in aes_hw_extkey_available() 108 unsigned int key_len) in aes_set_key() 115 if (key_len % 8) in aes_set_key() 134 ctx->cword.encrypt.rounds = 10 + (key_len - 16) / 4; in aes_set_key() 136 ctx->cword.encrypt.ksize = (key_len - 16) / 8; in aes_set_key() 140 if (aes_hw_extkey_available(key_len)) in aes_set_key() 147 if (aes_expandkey(&gen_aes, in_key, key_len)) in aes_set_key() 163 unsigned int key_len) in aes_set_key_skcipher() 107 aes_set_key(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) aes_set_key() argument 162 aes_set_key_skcipher(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) aes_set_key_skcipher() argument [all...] |
/kernel/linux/linux-6.6/drivers/crypto/ |
H A D | padlock-aes.c | 75 the extended key for a given key_len. */ 77 aes_hw_extkey_available(uint8_t key_len) in aes_hw_extkey_available() argument 82 if (key_len == 16) in aes_hw_extkey_available() 108 unsigned int key_len) in aes_set_key() 115 if (key_len % 8) in aes_set_key() 134 ctx->cword.encrypt.rounds = 10 + (key_len - 16) / 4; in aes_set_key() 136 ctx->cword.encrypt.ksize = (key_len - 16) / 8; in aes_set_key() 140 if (aes_hw_extkey_available(key_len)) in aes_set_key() 147 if (aes_expandkey(&gen_aes, in_key, key_len)) in aes_set_key() 163 unsigned int key_len) in aes_set_key_skcipher() 107 aes_set_key(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) aes_set_key() argument 162 aes_set_key_skcipher(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) aes_set_key_skcipher() argument [all...] |
/kernel/linux/linux-5.10/include/linux/ |
H A D | rhashtable.h | 132 if (!__builtin_constant_p(params.key_len)) in rht_key_get_hash() 133 hash = ht->p.hashfn(key, ht->key_len, hash_rnd); in rht_key_get_hash() 134 else if (params.key_len) { in rht_key_get_hash() 135 unsigned int key_len = params.key_len; in rht_key_get_hash() local 138 hash = params.hashfn(key, key_len, hash_rnd); in rht_key_get_hash() 139 else if (key_len & (sizeof(u32) - 1)) in rht_key_get_hash() 140 hash = jhash(key, key_len, hash_rnd); in rht_key_get_hash() 142 hash = jhash2(key, key_len / sizeof(u32), hash_rnd); in rht_key_get_hash() 144 unsigned int key_len in rht_key_get_hash() local [all...] |
/kernel/linux/linux-6.6/include/linux/ |
H A D | rhashtable.h | 132 if (!__builtin_constant_p(params.key_len)) in rht_key_get_hash() 133 hash = ht->p.hashfn(key, ht->key_len, hash_rnd); in rht_key_get_hash() 134 else if (params.key_len) { in rht_key_get_hash() 135 unsigned int key_len = params.key_len; in rht_key_get_hash() local 138 hash = params.hashfn(key, key_len, hash_rnd); in rht_key_get_hash() 139 else if (key_len & (sizeof(u32) - 1)) in rht_key_get_hash() 140 hash = jhash(key, key_len, hash_rnd); in rht_key_get_hash() 142 hash = jhash2(key, key_len / sizeof(u32), hash_rnd); in rht_key_get_hash() 144 unsigned int key_len in rht_key_get_hash() local [all...] |
/third_party/openssl/test/ |
H A D | cmactest.c | 36 int key_len; member 91 || !TEST_true(CMAC_Init(ctx, test[0].key, test[0].key_len, NULL, NULL)) in test_cmac_bad() 116 if (!TEST_true(CMAC_Init(ctx, test[0].key, test[0].key_len, in test_cmac_run() 126 if (!TEST_true(CMAC_Init(ctx, test[1].key, test[1].key_len, in test_cmac_run() 136 if (!TEST_true(CMAC_Init(ctx, test[2].key, test[2].key_len, NULL, NULL)) in test_cmac_run() 154 || !TEST_true(CMAC_Init(ctx, test[2].key, test[2].key_len, NULL, NULL)) in test_cmac_run() 181 if (!TEST_true(CMAC_Init(ctx, test[0].key, test[0].key_len, in test_cmac_copy()
|
H A D | hmactest.c | 37 int key_len; member 94 ebcdic2ascii(test[2].key, test[2].key, test[2].key_len); in test_hmac_md5() 99 test[idx].key, test[idx].key_len, in test_hmac_md5() 146 if (!TEST_true(HMAC_Init_ex(ctx, test[4].key, test[4].key_len, EVP_sha1(), NULL)) in test_hmac_run() 158 if (!TEST_true(HMAC_Init_ex(ctx, test[5].key, test[5].key_len, EVP_sha256(), NULL)) in test_hmac_run() 168 if (!TEST_true(HMAC_Init_ex(ctx, test[6].key, test[6].key_len, NULL, NULL)) in test_hmac_run() 231 if (!TEST_true(HMAC_Init_ex(ctx, test[7].key, test[7].key_len, EVP_sha1(), NULL)) in test_hmac_copy()
|
/kernel/linux/linux-5.10/drivers/crypto/ccp/ |
H A D | ccp-crypto-sha.c | 161 rctx->cmd.u.sha.opad = ctx->u.sha.key_len ? in ccp_do_sha_update() 163 rctx->cmd.u.sha.opad_len = ctx->u.sha.key_len ? in ccp_do_sha_update() 196 if (ctx->u.sha.key_len) { in ccp_sha_init() 272 unsigned int key_len) in ccp_sha_setkey() 281 ctx->u.sha.key_len = 0; in ccp_sha_setkey() 288 if (key_len > block_size) { in ccp_sha_setkey() 290 ret = crypto_shash_tfm_digest(shash, key, key_len, in ccp_sha_setkey() 295 key_len = digest_size; in ccp_sha_setkey() 297 memcpy(ctx->u.sha.key, key, key_len); in ccp_sha_setkey() 308 ctx->u.sha.key_len in ccp_sha_setkey() 271 ccp_sha_setkey(struct crypto_ahash *tfm, const u8 *key, unsigned int key_len) ccp_sha_setkey() argument [all...] |
/kernel/linux/linux-6.6/drivers/crypto/ccp/ |
H A D | ccp-crypto-sha.c | 162 rctx->cmd.u.sha.opad = ctx->u.sha.key_len ? in ccp_do_sha_update() 164 rctx->cmd.u.sha.opad_len = ctx->u.sha.key_len ? in ccp_do_sha_update() 197 if (ctx->u.sha.key_len) { in ccp_sha_init() 273 unsigned int key_len) in ccp_sha_setkey() 282 ctx->u.sha.key_len = 0; in ccp_sha_setkey() 289 if (key_len > block_size) { in ccp_sha_setkey() 291 ret = crypto_shash_tfm_digest(shash, key, key_len, in ccp_sha_setkey() 296 key_len = digest_size; in ccp_sha_setkey() 298 memcpy(ctx->u.sha.key, key, key_len); in ccp_sha_setkey() 309 ctx->u.sha.key_len in ccp_sha_setkey() 272 ccp_sha_setkey(struct crypto_ahash *tfm, const u8 *key, unsigned int key_len) ccp_sha_setkey() argument [all...] |
/kernel/linux/linux-5.10/crypto/ |
H A D | rsa_helper.c | 158 * @key_len: length of key 163 unsigned int key_len) in rsa_parse_pub_key() 165 return asn1_ber_decoder(&rsapubkey_decoder, rsa_key, key, key_len); in rsa_parse_pub_key() 177 * @key_len: length of key 182 unsigned int key_len) in rsa_parse_priv_key() 184 return asn1_ber_decoder(&rsaprivkey_decoder, rsa_key, key, key_len); in rsa_parse_priv_key() 162 rsa_parse_pub_key(struct rsa_key *rsa_key, const void *key, unsigned int key_len) rsa_parse_pub_key() argument 181 rsa_parse_priv_key(struct rsa_key *rsa_key, const void *key, unsigned int key_len) rsa_parse_priv_key() argument
|
/kernel/linux/linux-5.10/drivers/net/wireless/microchip/wilc1000/ |
H A D | fw.h | 46 u8 key_len; member 52 u8 key_len; member 59 u8 key_len; member 67 u8 key_len; member
|
/kernel/linux/linux-6.6/drivers/net/wireless/microchip/wilc1000/ |
H A D | fw.h | 46 u8 key_len; member 53 u8 key_len; member 61 u8 key_len; member 69 u8 key_len; member
|
/kernel/linux/linux-6.6/crypto/ |
H A D | rsa_helper.c | 158 * @key_len: length of key 163 unsigned int key_len) in rsa_parse_pub_key() 165 return asn1_ber_decoder(&rsapubkey_decoder, rsa_key, key, key_len); in rsa_parse_pub_key() 177 * @key_len: length of key 182 unsigned int key_len) in rsa_parse_priv_key() 184 return asn1_ber_decoder(&rsaprivkey_decoder, rsa_key, key, key_len); in rsa_parse_priv_key() 162 rsa_parse_pub_key(struct rsa_key *rsa_key, const void *key, unsigned int key_len) rsa_parse_pub_key() argument 181 rsa_parse_priv_key(struct rsa_key *rsa_key, const void *key, unsigned int key_len) rsa_parse_priv_key() argument
|
/third_party/node/deps/openssl/openssl/crypto/evp/ |
H A D | cmeth_lib.c | 23 EVP_CIPHER *EVP_CIPHER_meth_new(int cipher_type, int block_size, int key_len) in EVP_CIPHER_meth_new() argument 30 cipher->key_len = key_len; in EVP_CIPHER_meth_new() 48 cipher->key_len)) != NULL) { in EVP_CIPHER_meth_dup()
|
/third_party/openssl/crypto/evp/ |
H A D | cmeth_lib.c | 23 EVP_CIPHER *EVP_CIPHER_meth_new(int cipher_type, int block_size, int key_len) in EVP_CIPHER_meth_new() argument 30 cipher->key_len = key_len; in EVP_CIPHER_meth_new() 48 cipher->key_len)) != NULL) { in EVP_CIPHER_meth_dup()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | eap_pax_common.c | 20 * @key_len: Length of the secret key in bytes 30 int eap_pax_kdf(u8 mac_id, const u8 *key, size_t key_len, in eap_pax_kdf() argument 60 if (hmac_sha1_vector(key, key_len, 3, addr, len, mac) < 0) in eap_pax_kdf() 75 * @key_len: Length of the secret key in bytes 87 int eap_pax_mac(u8 mac_id, const u8 *key, size_t key_len, in eap_pax_mac() argument 110 if (hmac_sha1_vector(key, key_len, count, addr, len, hash) < 0) in eap_pax_mac()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/drivers/ |
H A D | driver_openbsd.c | 78 size_t key_len = params->key_len; local 80 if (key_len > IEEE80211_PMK_LEN || 88 memcpy(keyavail.i_key, key, key_len);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | eap_pax_common.c | 20 * @key_len: Length of the secret key in bytes 30 int eap_pax_kdf(u8 mac_id, const u8 *key, size_t key_len, in eap_pax_kdf() argument 60 if (hmac_sha1_vector(key, key_len, 3, addr, len, mac) < 0) in eap_pax_kdf() 75 * @key_len: Length of the secret key in bytes 87 int eap_pax_mac(u8 mac_id, const u8 *key, size_t key_len, in eap_pax_mac() argument 110 if (hmac_sha1_vector(key, key_len, count, addr, len, hash) < 0) in eap_pax_mac()
|
/kernel/linux/linux-5.10/tools/testing/selftests/net/ |
H A D | ipsec.c | 503 /* unsigned key_len; */ 766 size_t buf_len, unsigned int *key_len) in xfrm_fill_key() 770 *key_len = 0; in xfrm_fill_key() 772 *key_len = 0; in xfrm_fill_key() 774 *key_len = 64; in xfrm_fill_key() 776 *key_len = 128; in xfrm_fill_key() 778 *key_len = 128; in xfrm_fill_key() 780 *key_len = 128; in xfrm_fill_key() 782 *key_len = 128; in xfrm_fill_key() 784 *key_len in xfrm_fill_key() 765 xfrm_fill_key(char *name, char *buf, size_t buf_len, unsigned int *key_len) xfrm_fill_key() argument [all...] |
/kernel/linux/linux-5.10/arch/arm/crypto/ |
H A D | aes-ce-glue.c | 70 unsigned int key_len) in ce_aes_expandkey() 79 u32 kwords = key_len / sizeof(u32); in ce_aes_expandkey() 83 if (key_len != AES_KEYSIZE_128 && in ce_aes_expandkey() 84 key_len != AES_KEYSIZE_192 && in ce_aes_expandkey() 85 key_len != AES_KEYSIZE_256) in ce_aes_expandkey() 88 ctx->key_length = key_len; in ce_aes_expandkey() 103 if (key_len == AES_KEYSIZE_192) { in ce_aes_expandkey() 108 } else if (key_len == AES_KEYSIZE_256) { in ce_aes_expandkey() 138 unsigned int key_len) in ce_aes_setkey() 142 return ce_aes_expandkey(ctx, in_key, key_len); in ce_aes_setkey() 69 ce_aes_expandkey(struct crypto_aes_ctx *ctx, const u8 *in_key, unsigned int key_len) ce_aes_expandkey() argument 137 ce_aes_setkey(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) ce_aes_setkey() argument 150 xts_set_key(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) xts_set_key() argument [all...] |
/kernel/linux/linux-6.6/arch/arm/crypto/ |
H A D | aes-ce-glue.c | 70 unsigned int key_len) in ce_aes_expandkey() 79 u32 kwords = key_len / sizeof(u32); in ce_aes_expandkey() 83 if (key_len != AES_KEYSIZE_128 && in ce_aes_expandkey() 84 key_len != AES_KEYSIZE_192 && in ce_aes_expandkey() 85 key_len != AES_KEYSIZE_256) in ce_aes_expandkey() 88 ctx->key_length = key_len; in ce_aes_expandkey() 103 if (key_len == AES_KEYSIZE_192) { in ce_aes_expandkey() 108 } else if (key_len == AES_KEYSIZE_256) { in ce_aes_expandkey() 138 unsigned int key_len) in ce_aes_setkey() 142 return ce_aes_expandkey(ctx, in_key, key_len); in ce_aes_setkey() 69 ce_aes_expandkey(struct crypto_aes_ctx *ctx, const u8 *in_key, unsigned int key_len) ce_aes_expandkey() argument 137 ce_aes_setkey(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) ce_aes_setkey() argument 150 xts_set_key(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) xts_set_key() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | crypto_openssl.c | 636 size_t key_len) in crypto_cipher_init() 655 switch (key_len) { in crypto_cipher_init() 694 !EVP_CIPHER_CTX_set_key_length(ctx->enc, key_len) || in crypto_cipher_init() 705 !EVP_CIPHER_CTX_set_key_length(ctx->dec, key_len) || in crypto_cipher_init() 984 size_t key_len) in crypto_hash_init() 1020 if (HMAC_Init_ex(ctx->ctx, key, key_len, md, NULL) != 1) { in crypto_hash_init() 1070 size_t key_len, size_t num_elem, in openssl_hmac_vector() 1084 res = HMAC_Init_ex(ctx, key, key_len, type, NULL); in openssl_hmac_vector() 1101 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, in hmac_md5_vector() argument 1104 return openssl_hmac_vector(EVP_md5(), key ,key_len, num_ele in hmac_md5_vector() 634 crypto_cipher_init(enum crypto_cipher_alg alg, const u8 *iv, const u8 *key, size_t key_len) crypto_cipher_init() argument 983 crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, size_t key_len) crypto_hash_init() argument 1069 openssl_hmac_vector(const EVP_MD *type, const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac, unsigned int mdlen) openssl_hmac_vector() argument 1109 hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_md5() argument 1128 hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) hmac_sha1_vector() argument 1136 hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha1() argument 1145 hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) hmac_sha256_vector() argument 1153 hmac_sha256(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha256() argument 1164 hmac_sha384_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) hmac_sha384_vector() argument 1172 hmac_sha384(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha384() argument 1183 hmac_sha512_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) hmac_sha512_vector() argument 1191 hmac_sha512(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha512() argument 1209 omac1_aes_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) omac1_aes_vector() argument [all...] |
/kernel/linux/linux-5.10/arch/x86/crypto/ |
H A D | aesni-intel_glue.c | 85 unsigned int key_len); 313 const u8 *in_key, unsigned int key_len) in aes_set_key_common() 318 if (key_len != AES_KEYSIZE_128 && key_len != AES_KEYSIZE_192 && in aes_set_key_common() 319 key_len != AES_KEYSIZE_256) in aes_set_key_common() 323 err = aes_expandkey(ctx, in_key, key_len); in aes_set_key_common() 326 err = aesni_set_key(ctx, in_key, key_len); in aes_set_key_common() 334 unsigned int key_len) in aes_set_key() 336 return aes_set_key_common(tfm, crypto_tfm_ctx(tfm), in_key, key_len); in aes_set_key() 612 rfc4106_set_hash_subkey(u8 *hash_subkey, const u8 *key, unsigned int key_len) in rfc4106_set_hash_subkey() argument 312 aes_set_key_common(struct crypto_tfm *tfm, void *raw_ctx, const u8 *in_key, unsigned int key_len) aes_set_key_common() argument 333 aes_set_key(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) aes_set_key() argument 631 common_rfc4106_set_key(struct crypto_aead *aead, const u8 *key, unsigned int key_len) common_rfc4106_set_key() argument 978 generic_gcmaes_set_key(struct crypto_aead *aead, const u8 *key, unsigned int key_len) generic_gcmaes_set_key() argument [all...] |
/kernel/linux/linux-6.6/arch/x86/crypto/ |
H A D | aesni-intel_glue.c | 84 unsigned int key_len); 233 const u8 *in_key, unsigned int key_len) in aes_set_key_common() 237 if (key_len != AES_KEYSIZE_128 && key_len != AES_KEYSIZE_192 && in aes_set_key_common() 238 key_len != AES_KEYSIZE_256) in aes_set_key_common() 242 err = aes_expandkey(ctx, in_key, key_len); in aes_set_key_common() 245 err = aesni_set_key(ctx, in_key, key_len); in aes_set_key_common() 253 unsigned int key_len) in aes_set_key() 256 key_len); in aes_set_key() 597 rfc4106_set_hash_subkey(u8 *hash_subkey, const u8 *key, unsigned int key_len) in rfc4106_set_hash_subkey() argument 232 aes_set_key_common(struct crypto_aes_ctx *ctx, const u8 *in_key, unsigned int key_len) aes_set_key_common() argument 252 aes_set_key(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) aes_set_key() argument 616 common_rfc4106_set_key(struct crypto_aead *aead, const u8 *key, unsigned int key_len) common_rfc4106_set_key() argument 1145 generic_gcmaes_set_key(struct crypto_aead *aead, const u8 *key, unsigned int key_len) generic_gcmaes_set_key() argument [all...] |
/kernel/linux/linux-5.10/drivers/crypto/nx/ |
H A D | nx-aes-gcm.c | 25 unsigned int key_len) in gcm_aes_nx_set_key() 33 switch (key_len) { in gcm_aes_nx_set_key() 54 memcpy(csbcpb->cpb.aes_gcm.key, in_key, key_len); in gcm_aes_nx_set_key() 57 memcpy(csbcpb_aead->cpb.aes_gca.key, in_key, key_len); in gcm_aes_nx_set_key() 64 unsigned int key_len) in gcm4106_aes_nx_set_key() 70 if (key_len < 4) in gcm4106_aes_nx_set_key() 73 key_len -= 4; in gcm4106_aes_nx_set_key() 75 rc = gcm_aes_nx_set_key(tfm, in_key, key_len); in gcm4106_aes_nx_set_key() 79 memcpy(nonce, in_key + key_len, 4); in gcm4106_aes_nx_set_key() 23 gcm_aes_nx_set_key(struct crypto_aead *tfm, const u8 *in_key, unsigned int key_len) gcm_aes_nx_set_key() argument 62 gcm4106_aes_nx_set_key(struct crypto_aead *tfm, const u8 *in_key, unsigned int key_len) gcm4106_aes_nx_set_key() argument
|
H A D | nx-aes-ccm.c | 25 unsigned int key_len) in ccm_aes_nx_set_key() 33 switch (key_len) { in ccm_aes_nx_set_key() 44 memcpy(csbcpb->cpb.aes_ccm.key, in_key, key_len); in ccm_aes_nx_set_key() 47 memcpy(csbcpb_aead->cpb.aes_cca.key, in_key, key_len); in ccm_aes_nx_set_key() 55 unsigned int key_len) in ccm4309_aes_nx_set_key() 59 if (key_len < 3) in ccm4309_aes_nx_set_key() 62 key_len -= 3; in ccm4309_aes_nx_set_key() 64 memcpy(nx_ctx->priv.ccm.nonce, in_key + key_len, 3); in ccm4309_aes_nx_set_key() 66 return ccm_aes_nx_set_key(tfm, in_key, key_len); in ccm4309_aes_nx_set_key() 23 ccm_aes_nx_set_key(struct crypto_aead *tfm, const u8 *in_key, unsigned int key_len) ccm_aes_nx_set_key() argument 53 ccm4309_aes_nx_set_key(struct crypto_aead *tfm, const u8 *in_key, unsigned int key_len) ccm4309_aes_nx_set_key() argument
|