/kernel/linux/linux-5.10/include/crypto/ |
H A D | sm4.h | 24 unsigned int key_len); 26 unsigned int key_len);
|
H A D | aes.h | 52 unsigned int key_len); 58 * @key_len: The length of the supplied key. 69 unsigned int key_len);
|
/kernel/linux/linux-6.6/include/crypto/internal/ |
H A D | rsa.h | 51 unsigned int key_len); 54 unsigned int key_len);
|
/kernel/linux/linux-6.6/net/mac80211/ |
H A D | aes_gcm.h | 32 ieee80211_aes_gcm_key_setup_encrypt(const u8 key[], size_t key_len) in ieee80211_aes_gcm_key_setup_encrypt() argument 35 key_len, IEEE80211_GCMP_MIC_LEN); in ieee80211_aes_gcm_key_setup_encrypt()
|
H A D | aes_ccm.h | 15 ieee80211_aes_key_setup_encrypt(const u8 key[], size_t key_len, size_t mic_len) in ieee80211_aes_key_setup_encrypt() argument 17 return aead_key_setup_encrypt("ccm(aes)", key, key_len, mic_len); in ieee80211_aes_key_setup_encrypt()
|
/third_party/mbedtls/tests/scripts/ |
H A D | gen_gcm_encrypt.pl | 62 my $key_len = get_suite_val("Keylen"); 63 next if ($key_len !~ /\d+/); 79 print("GCM NIST Validation (AES-$key_len,$iv_len,$pt_len,$add_len,$tag_len) #$Count\n");
|
H A D | gen_gcm_decrypt.pl | 79 my $key_len = get_suite_val("Keylen"); 80 next if ($key_len !~ /\d+/); 96 print("GCM NIST Validation (AES-$key_len,$iv_len,$pt_len,$add_len,$tag_len) #$Count\n");
|
/third_party/node/deps/cares/src/lib/ |
H A D | ares__htable.h | 155 * \param[in] key_len Length of key 159 unsigned int ares__htable_hash_FNV1a(const unsigned char *key, size_t key_len, 167 * \param[in] key_len Length of key 172 size_t key_len, unsigned int seed);
|
/third_party/node/deps/openssl/openssl/crypto/evp/ |
H A D | p_enc.c | 22 int key_len, EVP_PKEY *pubk) in EVP_PKEY_encrypt_old() 37 RSA_public_encrypt(key_len, key, ek, rsa, RSA_PKCS1_PADDING); in EVP_PKEY_encrypt_old() 21 EVP_PKEY_encrypt_old(unsigned char *ek, const unsigned char *key, int key_len, EVP_PKEY *pubk) EVP_PKEY_encrypt_old() argument
|
/third_party/openssl/crypto/evp/ |
H A D | p_enc.c | 22 int key_len, EVP_PKEY *pubk) in EVP_PKEY_encrypt_old() 37 RSA_public_encrypt(key_len, key, ek, rsa, RSA_PKCS1_PADDING); in EVP_PKEY_encrypt_old() 21 EVP_PKEY_encrypt_old(unsigned char *ek, const unsigned char *key, int key_len, EVP_PKEY *pubk) EVP_PKEY_encrypt_old() argument
|
/kernel/linux/linux-5.10/fs/hfsplus/ |
H A D | brec.c | 67 int size, key_len, rec; in hfs_brec_insert() local 83 key_len = be16_to_cpu(fd->search_key->key_len) + 2; in hfs_brec_insert() 87 size = key_len + entry_len; in hfs_brec_insert() 132 hfs_bnode_write(node, fd->search_key, data_off, key_len); in hfs_brec_insert() 133 hfs_bnode_write(node, entry, data_off + key_len, entry_len); in hfs_brec_insert() 167 key_len = be16_to_cpu(fd->search_key->key_len) + 2; in hfs_brec_insert() 169 fd->search_key->key_len = in hfs_brec_insert() 171 key_len in hfs_brec_insert() [all...] |
/kernel/linux/linux-5.10/fs/hfs/ |
H A D | brec.c | 69 int size, key_len, rec; in hfs_brec_insert() local 85 key_len = (fd->search_key->key_len | 1) + 1; in hfs_brec_insert() 89 size = key_len + entry_len; in hfs_brec_insert() 132 hfs_bnode_write(node, fd->search_key, data_off, key_len); in hfs_brec_insert() 133 hfs_bnode_write(node, entry, data_off + key_len, entry_len); in hfs_brec_insert() 166 key_len = fd->search_key->key_len + 1; in hfs_brec_insert() 168 fd->search_key->key_len = tree->max_key_len; in hfs_brec_insert() 169 key_len in hfs_brec_insert() [all...] |
/kernel/linux/linux-6.6/fs/hfs/ |
H A D | brec.c | 69 int size, key_len, rec; in hfs_brec_insert() local 85 key_len = (fd->search_key->key_len | 1) + 1; in hfs_brec_insert() 89 size = key_len + entry_len; in hfs_brec_insert() 132 hfs_bnode_write(node, fd->search_key, data_off, key_len); in hfs_brec_insert() 133 hfs_bnode_write(node, entry, data_off + key_len, entry_len); in hfs_brec_insert() 166 key_len = fd->search_key->key_len + 1; in hfs_brec_insert() 168 fd->search_key->key_len = tree->max_key_len; in hfs_brec_insert() 169 key_len in hfs_brec_insert() [all...] |
/kernel/linux/linux-6.6/fs/hfsplus/ |
H A D | brec.c | 67 int size, key_len, rec; in hfs_brec_insert() local 83 key_len = be16_to_cpu(fd->search_key->key_len) + 2; in hfs_brec_insert() 87 size = key_len + entry_len; in hfs_brec_insert() 132 hfs_bnode_write(node, fd->search_key, data_off, key_len); in hfs_brec_insert() 133 hfs_bnode_write(node, entry, data_off + key_len, entry_len); in hfs_brec_insert() 167 key_len = be16_to_cpu(fd->search_key->key_len) + 2; in hfs_brec_insert() 169 fd->search_key->key_len = in hfs_brec_insert() 171 key_len in hfs_brec_insert() [all...] |
/third_party/node/deps/openssl/openssl/providers/implementations/kdfs/ |
H A D | hkdf.c | 51 const unsigned char *key, size_t key_len, 79 size_t key_len; member 124 OPENSSL_clear_free(ctx->key, ctx->key_len); in kdf_hkdf_reset() 177 ctx->key, ctx->key_len, ctx->info, ctx->info_len, key, keylen); in kdf_hkdf_derive() 181 ctx->key, ctx->key_len, key, keylen); in kdf_hkdf_derive() 184 return HKDF_Expand(md, ctx->key, ctx->key_len, ctx->info, in kdf_hkdf_derive() 228 OPENSSL_clear_free(ctx->key, ctx->key_len); in hkdf_common_set_ctx_params() 231 &ctx->key_len)) in hkdf_common_set_ctx_params() 703 ctx->key, ctx->key_len, in kdf_tls1_3_derive() 709 return prov_tls13_hkdf_expand(md, ctx->key, ctx->key_len, in kdf_tls1_3_derive() [all...] |
/third_party/openssl/providers/implementations/kdfs/ |
H A D | hkdf.c | 51 const unsigned char *key, size_t key_len, 79 size_t key_len; member 124 OPENSSL_clear_free(ctx->key, ctx->key_len); in kdf_hkdf_reset() 177 ctx->key, ctx->key_len, ctx->info, ctx->info_len, key, keylen); in kdf_hkdf_derive() 181 ctx->key, ctx->key_len, key, keylen); in kdf_hkdf_derive() 184 return HKDF_Expand(md, ctx->key, ctx->key_len, ctx->info, in kdf_hkdf_derive() 228 OPENSSL_clear_free(ctx->key, ctx->key_len); in hkdf_common_set_ctx_params() 231 &ctx->key_len)) in hkdf_common_set_ctx_params() 703 ctx->key, ctx->key_len, in kdf_tls1_3_derive() 709 return prov_tls13_hkdf_expand(md, ctx->key, ctx->key_len, in kdf_tls1_3_derive() [all...] |
/kernel/linux/linux-5.10/arch/s390/crypto/ |
H A D | des_s390.c | 36 unsigned int key_len) in des_setkey() 45 memcpy(ctx->key, key, key_len); in des_setkey() 50 unsigned int key_len) in des_setkey_skcipher() 52 return des_setkey(crypto_skcipher_tfm(tfm), key, key_len); in des_setkey_skcipher() 201 unsigned int key_len) in des3_setkey() 210 memcpy(ctx->key, key, key_len); in des3_setkey() 215 unsigned int key_len) in des3_setkey_skcipher() 217 return des3_setkey(crypto_skcipher_tfm(tfm), key, key_len); in des3_setkey_skcipher() 35 des_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int key_len) des_setkey() argument 49 des_setkey_skcipher(struct crypto_skcipher *tfm, const u8 *key, unsigned int key_len) des_setkey_skcipher() argument 200 des3_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int key_len) des3_setkey() argument 214 des3_setkey_skcipher(struct crypto_skcipher *tfm, const u8 *key, unsigned int key_len) des3_setkey_skcipher() argument
|
/kernel/linux/linux-6.6/arch/s390/crypto/ |
H A D | des_s390.c | 36 unsigned int key_len) in des_setkey() 45 memcpy(ctx->key, key, key_len); in des_setkey() 50 unsigned int key_len) in des_setkey_skcipher() 52 return des_setkey(crypto_skcipher_tfm(tfm), key, key_len); in des_setkey_skcipher() 201 unsigned int key_len) in des3_setkey() 210 memcpy(ctx->key, key, key_len); in des3_setkey() 215 unsigned int key_len) in des3_setkey_skcipher() 217 return des3_setkey(crypto_skcipher_tfm(tfm), key, key_len); in des3_setkey_skcipher() 35 des_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int key_len) des_setkey() argument 49 des_setkey_skcipher(struct crypto_skcipher *tfm, const u8 *key, unsigned int key_len) des_setkey_skcipher() argument 200 des3_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int key_len) des3_setkey() argument 214 des3_setkey_skcipher(struct crypto_skcipher *tfm, const u8 *key, unsigned int key_len) des3_setkey_skcipher() argument
|
/third_party/node/deps/openssl/openssl/providers/implementations/macs/ |
H A D | kmac_prov.c | 122 size_t key_len; member 151 OPENSSL_cleanse(kctx->key, kctx->key_len); in kmac_free() 233 dst->key_len = src->key_len; in kmac_dup() 236 memcpy(dst->key, src->key, src->key_len); in kmac_dup() 256 if (!kmac_bytepad_encode_key(kctx->key, sizeof(kctx->key), &kctx->key_len, in kmac_setkey() 282 } else if (kctx->key_len == 0) { in kmac_init() 320 && EVP_DigestUpdate(ctx, kctx->key, kctx->key_len); in kmac_init()
|
/third_party/openssl/providers/implementations/macs/ |
H A D | kmac_prov.c | 122 size_t key_len; member 151 OPENSSL_cleanse(kctx->key, kctx->key_len); in kmac_free() 233 dst->key_len = src->key_len; in kmac_dup() 236 memcpy(dst->key, src->key, src->key_len); in kmac_dup() 256 if (!kmac_bytepad_encode_key(kctx->key, sizeof(kctx->key), &kctx->key_len, in kmac_setkey() 282 } else if (kctx->key_len == 0) { in kmac_init() 320 && EVP_DigestUpdate(ctx, kctx->key, kctx->key_len); in kmac_init()
|
/kernel/linux/linux-5.10/arch/arm64/crypto/ |
H A D | aes-glue.c | 132 unsigned int key_len) in skcipher_aes_setkey() 136 return aes_expandkey(ctx, in_key, key_len); in skcipher_aes_setkey() 140 const u8 *in_key, unsigned int key_len) in xts_set_key() 145 ret = xts_verify_key(tfm, in_key, key_len); in xts_set_key() 149 ret = aes_expandkey(&ctx->key1, in_key, key_len / 2); in xts_set_key() 151 ret = aes_expandkey(&ctx->key2, &in_key[key_len / 2], in xts_set_key() 152 key_len / 2); in xts_set_key() 158 unsigned int key_len) in essiv_cbc_set_key() 164 ret = aes_expandkey(&ctx->key1, in_key, key_len); in essiv_cbc_set_key() 168 crypto_shash_tfm_digest(ctx->hash, in_key, key_len, diges in essiv_cbc_set_key() 131 skcipher_aes_setkey(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) skcipher_aes_setkey() argument 139 xts_set_key(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) xts_set_key() argument 156 essiv_cbc_set_key(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) essiv_cbc_set_key() argument 772 cbcmac_setkey(struct crypto_shash *tfm, const u8 *in_key, unsigned int key_len) cbcmac_setkey() argument 789 cmac_setkey(struct crypto_shash *tfm, const u8 *in_key, unsigned int key_len) cmac_setkey() argument 813 xcbc_setkey(struct crypto_shash *tfm, const u8 *in_key, unsigned int key_len) xcbc_setkey() argument [all...] |
/kernel/linux/linux-6.6/arch/arm64/crypto/ |
H A D | aes-glue.c | 138 unsigned int key_len) in skcipher_aes_setkey() 142 return aes_expandkey(ctx, in_key, key_len); in skcipher_aes_setkey() 146 const u8 *in_key, unsigned int key_len) in xts_set_key() 151 ret = xts_verify_key(tfm, in_key, key_len); in xts_set_key() 155 ret = aes_expandkey(&ctx->key1, in_key, key_len / 2); in xts_set_key() 157 ret = aes_expandkey(&ctx->key2, &in_key[key_len / 2], in xts_set_key() 158 key_len / 2); in xts_set_key() 164 unsigned int key_len) in essiv_cbc_set_key() 170 ret = aes_expandkey(&ctx->key1, in_key, key_len); in essiv_cbc_set_key() 174 crypto_shash_tfm_digest(ctx->hash, in_key, key_len, diges in essiv_cbc_set_key() 137 skcipher_aes_setkey(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) skcipher_aes_setkey() argument 145 xts_set_key(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) xts_set_key() argument 162 essiv_cbc_set_key(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) essiv_cbc_set_key() argument 800 cbcmac_setkey(struct crypto_shash *tfm, const u8 *in_key, unsigned int key_len) cbcmac_setkey() argument 817 cmac_setkey(struct crypto_shash *tfm, const u8 *in_key, unsigned int key_len) cmac_setkey() argument 841 xcbc_setkey(struct crypto_shash *tfm, const u8 *in_key, unsigned int key_len) xcbc_setkey() argument [all...] |
/kernel/linux/linux-6.6/drivers/crypto/intel/ixp4xx/ |
H A D | ixp4xx_crypto.c | 682 int key_len) in register_chain_var() 707 memcpy(pad, key, key_len); in register_chain_var() 708 memset(pad + key_len, 0, HMAC_PAD_BLOCKLEN - key_len); in register_chain_var() 737 const u8 *key, int key_len, unsigned int digest_len) in setup_auth() 776 init_len, npe_ctx_addr, key, key_len); in setup_auth() 780 init_len, npe_ctx_addr, key, key_len); in setup_auth() 812 int key_len) in setup_cipher() 831 switch (key_len) { in setup_cipher() 855 memcpy(cinfo, key, key_len); in setup_cipher() 680 register_chain_var(struct crypto_tfm *tfm, u8 xpad, u32 target, int init_len, u32 ctx_addr, const u8 *key, int key_len) register_chain_var() argument 736 setup_auth(struct crypto_tfm *tfm, int encrypt, unsigned int authsize, const u8 *key, int key_len, unsigned int digest_len) setup_auth() argument 811 setup_cipher(struct crypto_tfm *tfm, int encrypt, const u8 *key, int key_len) setup_cipher() argument 901 ablk_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int key_len) ablk_setkey() argument 931 ablk_des3_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int key_len) ablk_des3_setkey() argument 938 ablk_rfc3686_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int key_len) ablk_rfc3686_setkey() argument [all...] |
/kernel/linux/linux-5.10/net/mac80211/ |
H A D | aes_ccm.h | 15 ieee80211_aes_key_setup_encrypt(const u8 key[], size_t key_len, size_t mic_len) in ieee80211_aes_key_setup_encrypt() argument 17 return aead_key_setup_encrypt("ccm(aes)", key, key_len, mic_len); in ieee80211_aes_key_setup_encrypt()
|
/kernel/linux/linux-6.6/include/crypto/ |
H A D | aes.h | 52 unsigned int key_len); 58 * @key_len: The length of the supplied key. 69 unsigned int key_len);
|