/kernel/linux/linux-6.6/drivers/crypto/nx/ |
H A D | nx-aes-ccm.c | 25 unsigned int key_len) in ccm_aes_nx_set_key() 33 switch (key_len) { in ccm_aes_nx_set_key() 44 memcpy(csbcpb->cpb.aes_ccm.key, in_key, key_len); in ccm_aes_nx_set_key() 47 memcpy(csbcpb_aead->cpb.aes_cca.key, in_key, key_len); in ccm_aes_nx_set_key() 55 unsigned int key_len) in ccm4309_aes_nx_set_key() 59 if (key_len < 3) in ccm4309_aes_nx_set_key() 62 key_len -= 3; in ccm4309_aes_nx_set_key() 64 memcpy(nx_ctx->priv.ccm.nonce, in_key + key_len, 3); in ccm4309_aes_nx_set_key() 66 return ccm_aes_nx_set_key(tfm, in_key, key_len); in ccm4309_aes_nx_set_key() 23 ccm_aes_nx_set_key(struct crypto_aead *tfm, const u8 *in_key, unsigned int key_len) ccm_aes_nx_set_key() argument 53 ccm4309_aes_nx_set_key(struct crypto_aead *tfm, const u8 *in_key, unsigned int key_len) ccm4309_aes_nx_set_key() argument
|
/kernel/linux/linux-5.10/arch/x86/crypto/ |
H A D | aesni-intel_glue.c | 85 unsigned int key_len); 313 const u8 *in_key, unsigned int key_len) in aes_set_key_common() 318 if (key_len != AES_KEYSIZE_128 && key_len != AES_KEYSIZE_192 && in aes_set_key_common() 319 key_len != AES_KEYSIZE_256) in aes_set_key_common() 323 err = aes_expandkey(ctx, in_key, key_len); in aes_set_key_common() 326 err = aesni_set_key(ctx, in_key, key_len); in aes_set_key_common() 334 unsigned int key_len) in aes_set_key() 336 return aes_set_key_common(tfm, crypto_tfm_ctx(tfm), in_key, key_len); in aes_set_key() 612 rfc4106_set_hash_subkey(u8 *hash_subkey, const u8 *key, unsigned int key_len) in rfc4106_set_hash_subkey() argument 312 aes_set_key_common(struct crypto_tfm *tfm, void *raw_ctx, const u8 *in_key, unsigned int key_len) aes_set_key_common() argument 333 aes_set_key(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) aes_set_key() argument 631 common_rfc4106_set_key(struct crypto_aead *aead, const u8 *key, unsigned int key_len) common_rfc4106_set_key() argument 978 generic_gcmaes_set_key(struct crypto_aead *aead, const u8 *key, unsigned int key_len) generic_gcmaes_set_key() argument [all...] |
/kernel/linux/linux-6.6/arch/x86/crypto/ |
H A D | aesni-intel_glue.c | 84 unsigned int key_len); 233 const u8 *in_key, unsigned int key_len) in aes_set_key_common() 237 if (key_len != AES_KEYSIZE_128 && key_len != AES_KEYSIZE_192 && in aes_set_key_common() 238 key_len != AES_KEYSIZE_256) in aes_set_key_common() 242 err = aes_expandkey(ctx, in_key, key_len); in aes_set_key_common() 245 err = aesni_set_key(ctx, in_key, key_len); in aes_set_key_common() 253 unsigned int key_len) in aes_set_key() 256 key_len); in aes_set_key() 597 rfc4106_set_hash_subkey(u8 *hash_subkey, const u8 *key, unsigned int key_len) in rfc4106_set_hash_subkey() argument 232 aes_set_key_common(struct crypto_aes_ctx *ctx, const u8 *in_key, unsigned int key_len) aes_set_key_common() argument 252 aes_set_key(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) aes_set_key() argument 616 common_rfc4106_set_key(struct crypto_aead *aead, const u8 *key, unsigned int key_len) common_rfc4106_set_key() argument 1145 generic_gcmaes_set_key(struct crypto_aead *aead, const u8 *key, unsigned int key_len) generic_gcmaes_set_key() argument [all...] |
/kernel/linux/linux-5.10/drivers/s390/crypto/ |
H A D | zcrypt_cca_key.h | 186 int short_len, long_len, pad_len, key_len, size; in zcrypt_type6_crt_key() local 202 key_len = 3*long_len + 2*short_len + pad_len + crt->inputdatalength; in zcrypt_type6_crt_key() 203 size = sizeof(*key) + key_len + sizeof(*pub) + 3; in zcrypt_type6_crt_key() 215 key->pvt.section_length = sizeof(key->pvt) + key_len; in zcrypt_type6_crt_key() 236 pub = (struct cca_public_sec *)(key->key_parts + key_len); in zcrypt_type6_crt_key()
|
/kernel/linux/linux-5.10/drivers/firmware/google/ |
H A D | vpd_decode.c | 64 u32 key_len; in vpd_decode_string() local 81 &key_len) != VPD_OK) in vpd_decode_string() 89 return callback(key, key_len, value, value_len, in vpd_decode_string()
|
/kernel/linux/linux-6.6/drivers/firmware/google/ |
H A D | vpd_decode.c | 64 u32 key_len; in vpd_decode_string() local 81 &key_len) != VPD_OK) in vpd_decode_string() 89 return callback(key, key_len, value, value_len, in vpd_decode_string()
|
/third_party/curl/tests/unit/ |
H A D | unit1305.c | 117 size_t key_len; variable 123 key_len = strlen(data_key); 126 nodep = Curl_hash_add(&hp, data_key, key_len + 1, data_node);
|
/kernel/linux/linux-5.10/arch/powerpc/crypto/ |
H A D | aes-spe-glue.c | 76 unsigned int key_len); 93 unsigned int key_len) in ppc_aes_setkey() 97 switch (key_len) { in ppc_aes_setkey() 114 ppc_generate_decrypt_key(ctx->key_dec, ctx->key_enc, key_len); in ppc_aes_setkey() 120 const u8 *in_key, unsigned int key_len) in ppc_aes_setkey_skcipher() 122 return ppc_aes_setkey(crypto_skcipher_tfm(tfm), in_key, key_len); in ppc_aes_setkey_skcipher() 126 unsigned int key_len) in ppc_xts_setkey() 131 err = xts_verify_key(tfm, in_key, key_len); in ppc_xts_setkey() 135 key_len >>= 1; in ppc_xts_setkey() 137 switch (key_len) { in ppc_xts_setkey() 92 ppc_aes_setkey(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) ppc_aes_setkey() argument 119 ppc_aes_setkey_skcipher(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) ppc_aes_setkey_skcipher() argument 125 ppc_xts_setkey(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) ppc_xts_setkey() argument [all...] |
/kernel/linux/linux-6.6/arch/powerpc/crypto/ |
H A D | aes-spe-glue.c | 76 unsigned int key_len); 93 unsigned int key_len) in ppc_aes_setkey() 97 switch (key_len) { in ppc_aes_setkey() 114 ppc_generate_decrypt_key(ctx->key_dec, ctx->key_enc, key_len); in ppc_aes_setkey() 120 const u8 *in_key, unsigned int key_len) in ppc_aes_setkey_skcipher() 122 return ppc_aes_setkey(crypto_skcipher_tfm(tfm), in_key, key_len); in ppc_aes_setkey_skcipher() 126 unsigned int key_len) in ppc_xts_setkey() 131 err = xts_verify_key(tfm, in_key, key_len); in ppc_xts_setkey() 135 key_len >>= 1; in ppc_xts_setkey() 137 switch (key_len) { in ppc_xts_setkey() 92 ppc_aes_setkey(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) ppc_aes_setkey() argument 119 ppc_aes_setkey_skcipher(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) ppc_aes_setkey_skcipher() argument 125 ppc_xts_setkey(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) ppc_xts_setkey() argument [all...] |
/kernel/linux/linux-5.10/lib/crypto/ |
H A D | aes.c | 175 * @key_len: The length of the supplied key. 186 unsigned int key_len) in aes_expandkey() 188 u32 kwords = key_len / sizeof(u32); in aes_expandkey() 192 err = aes_check_keylen(key_len); in aes_expandkey() 196 ctx->key_length = key_len; in aes_expandkey() 210 if (key_len == AES_KEYSIZE_192) { in aes_expandkey() 215 } else if (key_len == AES_KEYSIZE_256) { in aes_expandkey() 231 ctx->key_dec[0] = ctx->key_enc[key_len + 24]; in aes_expandkey() 232 ctx->key_dec[1] = ctx->key_enc[key_len + 25]; in aes_expandkey() 233 ctx->key_dec[2] = ctx->key_enc[key_len in aes_expandkey() 185 aes_expandkey(struct crypto_aes_ctx *ctx, const u8 *in_key, unsigned int key_len) aes_expandkey() argument [all...] |
/kernel/linux/linux-6.6/lib/crypto/ |
H A D | aes.c | 175 * @key_len: The length of the supplied key. 186 unsigned int key_len) in aes_expandkey() 188 u32 kwords = key_len / sizeof(u32); in aes_expandkey() 192 err = aes_check_keylen(key_len); in aes_expandkey() 196 ctx->key_length = key_len; in aes_expandkey() 210 if (key_len == AES_KEYSIZE_192) { in aes_expandkey() 215 } else if (key_len == AES_KEYSIZE_256) { in aes_expandkey() 231 ctx->key_dec[0] = ctx->key_enc[key_len + 24]; in aes_expandkey() 232 ctx->key_dec[1] = ctx->key_enc[key_len + 25]; in aes_expandkey() 233 ctx->key_dec[2] = ctx->key_enc[key_len in aes_expandkey() 185 aes_expandkey(struct crypto_aes_ctx *ctx, const u8 *in_key, unsigned int key_len) aes_expandkey() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
H A D | dpp_backup.c | 271 size_t key_len; in dpp_build_pw_recipient_info() local 279 key_len = auth->curve->hash_len; in dpp_build_pw_recipient_info() 281 res = dpp_hkdf_expand(key_len, auth->bk, key_len, in dpp_build_pw_recipient_info() 282 "Enveloped Data Password", key, key_len); in dpp_build_pw_recipient_info() 285 wpa_hexdump_key(MSG_DEBUG, "DPP: PBKDF2 key", key, key_len); in dpp_build_pw_recipient_info() 287 if (dpp_pbkdf2(hash_len, key, key_len, wpabuf_head(salt), 64, 1000, in dpp_build_pw_recipient_info() 1136 size_t key_len; in dpp_conf_resp_env_data() local 1151 key_len = auth->curve->hash_len; in dpp_conf_resp_env_data() 1153 res = dpp_hkdf_expand(key_len, aut in dpp_conf_resp_env_data() [all...] |
/kernel/linux/linux-5.10/include/crypto/ |
H A D | twofish.h | 22 unsigned int key_len); 23 int twofish_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int key_len);
|
/kernel/linux/linux-6.6/include/crypto/ |
H A D | twofish.h | 22 unsigned int key_len); 23 int twofish_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int key_len);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | md5.h | 14 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, 16 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
|
H A D | aes_siv.h | 12 int aes_siv_encrypt(const u8 *key, size_t key_len, 16 int aes_siv_decrypt(const u8 *key, size_t key_len,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | md5.h | 14 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, 16 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
|
H A D | aes_siv.h | 12 int aes_siv_encrypt(const u8 *key, size_t key_len, 16 int aes_siv_decrypt(const u8 *key, size_t key_len,
|
/kernel/linux/linux-5.10/drivers/crypto/hisilicon/sec/ |
H A D | sec_algs.c | 25 unsigned key_len : 2; member 33 .key_len = SEC_KEY_LEN_DES, 38 .key_len = SEC_KEY_LEN_DES, 43 .key_len = SEC_KEY_LEN_3DES_3_KEY, 48 .key_len = SEC_KEY_LEN_3DES_2_KEY, 53 .key_len = SEC_KEY_LEN_3DES_3_KEY, 58 .key_len = SEC_KEY_LEN_3DES_2_KEY, 63 .key_len = SEC_KEY_LEN_AES_128, 68 .key_len = SEC_KEY_LEN_AES_192, 73 .key_len [all...] |
/kernel/linux/linux-6.6/drivers/crypto/hisilicon/sec/ |
H A D | sec_algs.c | 25 unsigned key_len : 2; member 33 .key_len = SEC_KEY_LEN_DES, 38 .key_len = SEC_KEY_LEN_DES, 43 .key_len = SEC_KEY_LEN_3DES_3_KEY, 48 .key_len = SEC_KEY_LEN_3DES_2_KEY, 53 .key_len = SEC_KEY_LEN_3DES_3_KEY, 58 .key_len = SEC_KEY_LEN_3DES_2_KEY, 63 .key_len = SEC_KEY_LEN_AES_128, 68 .key_len = SEC_KEY_LEN_AES_192, 73 .key_len [all...] |
/kernel/linux/linux-5.10/crypto/ |
H A D | ecrdsa.c | 41 unsigned int key_len; /* @key length (bytes) */ member 180 ctx->key_len = vlen; in ecrdsa_parse_pub_key() 235 if ((ctx->key_len != (2 * 256 / 8) && in ecrdsa_set_pub_key() 236 ctx->key_len != (2 * 512 / 8)) || in ecrdsa_set_pub_key() 237 ctx->key_len != ctx->curve->g.ndigits * sizeof(u64) * 2) in ecrdsa_set_pub_key() 240 ndigits = ctx->key_len / sizeof(u64) / 2; in ecrdsa_set_pub_key()
|
/kernel/linux/linux-6.6/crypto/ |
H A D | ecrdsa.c | 41 unsigned int key_len; /* @key length (bytes) */ member 180 ctx->key_len = vlen; in ecrdsa_parse_pub_key() 235 if ((ctx->key_len != (2 * 256 / 8) && in ecrdsa_set_pub_key() 236 ctx->key_len != (2 * 512 / 8)) || in ecrdsa_set_pub_key() 237 ctx->key_len != ctx->curve->g.ndigits * sizeof(u64) * 2) in ecrdsa_set_pub_key() 240 ndigits = ctx->key_len / sizeof(u64) / 2; in ecrdsa_set_pub_key()
|
/kernel/linux/linux-6.6/drivers/crypto/intel/keembay/ |
H A D | keembay-ocs-aes-core.c | 42 * @key_len: The length (in bytes) of @key. 50 unsigned int key_len; member 146 static int check_key(const u8 *in_key, size_t key_len, enum ocs_cipher cipher) in check_key() argument 152 if (cipher == OCS_AES && (key_len == OCS_AES_KEYSIZE_128 || in check_key() 153 key_len == OCS_AES_KEYSIZE_256)) in check_key() 157 if (cipher == OCS_SM4 && key_len == OCS_AES_KEYSIZE_128) in check_key() 165 static int save_key(struct ocs_aes_tctx *tctx, const u8 *in_key, size_t key_len, in save_key() argument 170 ret = check_key(in_key, key_len, cipher); in save_key() 174 memcpy(tctx->key, in_key, key_len); in save_key() 175 tctx->key_len in save_key() 182 kmb_ocs_sk_set_key(struct crypto_skcipher *tfm, const u8 *in_key, size_t key_len, enum ocs_cipher cipher) kmb_ocs_sk_set_key() argument 204 kmb_ocs_aead_set_key(struct crypto_aead *tfm, const u8 *in_key, size_t key_len, enum ocs_cipher cipher) kmb_ocs_aead_set_key() argument 996 kmb_ocs_aes_set_key(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) kmb_ocs_aes_set_key() argument 1002 kmb_ocs_aes_aead_set_key(struct crypto_aead *tfm, const u8 *in_key, unsigned int key_len) kmb_ocs_aes_aead_set_key() argument 1072 kmb_ocs_sm4_set_key(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) kmb_ocs_sm4_set_key() argument 1078 kmb_ocs_sm4_aead_set_key(struct crypto_aead *tfm, const u8 *in_key, unsigned int key_len) kmb_ocs_sm4_aead_set_key() argument [all...] |
/kernel/linux/linux-5.10/arch/arm64/crypto/ |
H A D | aes-glue.c | 132 unsigned int key_len) in skcipher_aes_setkey() 136 return aes_expandkey(ctx, in_key, key_len); in skcipher_aes_setkey() 140 const u8 *in_key, unsigned int key_len) in xts_set_key() 145 ret = xts_verify_key(tfm, in_key, key_len); in xts_set_key() 149 ret = aes_expandkey(&ctx->key1, in_key, key_len / 2); in xts_set_key() 151 ret = aes_expandkey(&ctx->key2, &in_key[key_len / 2], in xts_set_key() 152 key_len / 2); in xts_set_key() 158 unsigned int key_len) in essiv_cbc_set_key() 164 ret = aes_expandkey(&ctx->key1, in_key, key_len); in essiv_cbc_set_key() 168 crypto_shash_tfm_digest(ctx->hash, in_key, key_len, diges in essiv_cbc_set_key() 131 skcipher_aes_setkey(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) skcipher_aes_setkey() argument 139 xts_set_key(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) xts_set_key() argument 156 essiv_cbc_set_key(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) essiv_cbc_set_key() argument 772 cbcmac_setkey(struct crypto_shash *tfm, const u8 *in_key, unsigned int key_len) cbcmac_setkey() argument 789 cmac_setkey(struct crypto_shash *tfm, const u8 *in_key, unsigned int key_len) cmac_setkey() argument 813 xcbc_setkey(struct crypto_shash *tfm, const u8 *in_key, unsigned int key_len) xcbc_setkey() argument [all...] |
/kernel/linux/linux-6.6/arch/arm64/crypto/ |
H A D | aes-glue.c | 138 unsigned int key_len) in skcipher_aes_setkey() 142 return aes_expandkey(ctx, in_key, key_len); in skcipher_aes_setkey() 146 const u8 *in_key, unsigned int key_len) in xts_set_key() 151 ret = xts_verify_key(tfm, in_key, key_len); in xts_set_key() 155 ret = aes_expandkey(&ctx->key1, in_key, key_len / 2); in xts_set_key() 157 ret = aes_expandkey(&ctx->key2, &in_key[key_len / 2], in xts_set_key() 158 key_len / 2); in xts_set_key() 164 unsigned int key_len) in essiv_cbc_set_key() 170 ret = aes_expandkey(&ctx->key1, in_key, key_len); in essiv_cbc_set_key() 174 crypto_shash_tfm_digest(ctx->hash, in_key, key_len, diges in essiv_cbc_set_key() 137 skcipher_aes_setkey(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) skcipher_aes_setkey() argument 145 xts_set_key(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) xts_set_key() argument 162 essiv_cbc_set_key(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) essiv_cbc_set_key() argument 800 cbcmac_setkey(struct crypto_shash *tfm, const u8 *in_key, unsigned int key_len) cbcmac_setkey() argument 817 cmac_setkey(struct crypto_shash *tfm, const u8 *in_key, unsigned int key_len) cmac_setkey() argument 841 xcbc_setkey(struct crypto_shash *tfm, const u8 *in_key, unsigned int key_len) xcbc_setkey() argument [all...] |