/kernel/linux/linux-5.10/net/mac80211/ |
H A D | aes_ccm.h | 15 ieee80211_aes_key_setup_encrypt(const u8 key[], size_t key_len, size_t mic_len) in ieee80211_aes_key_setup_encrypt() argument 17 return aead_key_setup_encrypt("ccm(aes)", key, key_len, mic_len); in ieee80211_aes_key_setup_encrypt()
|
/kernel/linux/linux-5.10/include/crypto/ |
H A D | aes.h | 52 unsigned int key_len); 58 * @key_len: The length of the supplied key. 69 unsigned int key_len);
|
/kernel/linux/linux-6.6/include/crypto/ |
H A D | aes.h | 52 unsigned int key_len); 58 * @key_len: The length of the supplied key. 69 unsigned int key_len);
|
/kernel/linux/linux-6.6/net/mac80211/ |
H A D | aes_ccm.h | 15 ieee80211_aes_key_setup_encrypt(const u8 key[], size_t key_len, size_t mic_len) in ieee80211_aes_key_setup_encrypt() argument 17 return aead_key_setup_encrypt("ccm(aes)", key, key_len, mic_len); in ieee80211_aes_key_setup_encrypt()
|
/third_party/mbedtls/tests/scripts/ |
H A D | gen_gcm_decrypt.pl | 79 my $key_len = get_suite_val("Keylen"); 80 next if ($key_len !~ /\d+/); 96 print("GCM NIST Validation (AES-$key_len,$iv_len,$pt_len,$add_len,$tag_len) #$Count\n");
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | aes-ctr.c | 18 * @key: Key for encryption (key_len bytes) 19 * @key_len: Length of the key (16, 24, or 32 bytes) 25 int aes_ctr_encrypt(const u8 *key, size_t key_len, const u8 *nonce, in aes_ctr_encrypt() argument 34 ctx = aes_encrypt_init(key, key_len); in aes_ctr_encrypt() 61 * @key: Key for encryption (key_len bytes)
|
H A D | aes-ccm.c | 148 int aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, in aes_ccm_ae() argument 159 aes = aes_encrypt_init(key, key_len); in aes_ccm_ae() 178 int aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, in aes_ccm_ad() argument 190 aes = aes_encrypt_init(key, key_len); in aes_ccm_ad()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | aes-ctr.c | 18 * @key: Key for encryption (key_len bytes) 19 * @key_len: Length of the key (16, 24, or 32 bytes) 25 int aes_ctr_encrypt(const u8 *key, size_t key_len, const u8 *nonce, in aes_ctr_encrypt() argument 34 ctx = aes_encrypt_init(key, key_len); in aes_ctr_encrypt() 61 * @key: Key for encryption (key_len bytes)
|
H A D | aes-ccm.c | 148 int aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, in aes_ccm_ae() argument 159 aes = aes_encrypt_init(key, key_len); in aes_ccm_ae() 178 int aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, in aes_ccm_ad() argument 190 aes = aes_encrypt_init(key, key_len); in aes_ccm_ad()
|
/kernel/linux/linux-5.10/drivers/crypto/ |
H A D | ixp4xx_crypto.c | 621 int init_len, u32 ctx_addr, const u8 *key, int key_len) in register_chain_var() 646 memcpy(pad, key, key_len); in register_chain_var() 647 memset(pad + key_len, 0, HMAC_PAD_BLOCKLEN - key_len); in register_chain_var() 677 const u8 *key, int key_len, unsigned digest_len) in setup_auth() 716 init_len, npe_ctx_addr, key, key_len); in setup_auth() 720 init_len, npe_ctx_addr, key, key_len); in setup_auth() 752 const u8 *key, int key_len) in setup_cipher() 771 switch (key_len) { in setup_cipher() 789 memcpy(cinfo, key, key_len); in setup_cipher() 620 register_chain_var(struct crypto_tfm *tfm, u8 xpad, u32 target, int init_len, u32 ctx_addr, const u8 *key, int key_len) register_chain_var() argument 676 setup_auth(struct crypto_tfm *tfm, int encrypt, unsigned authsize, const u8 *key, int key_len, unsigned digest_len) setup_auth() argument 751 setup_cipher(struct crypto_tfm *tfm, int encrypt, const u8 *key, int key_len) setup_cipher() argument 835 ablk_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int key_len) ablk_setkey() argument 860 ablk_des3_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int key_len) ablk_des3_setkey() argument 867 ablk_rfc3686_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int key_len) ablk_rfc3686_setkey() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/ |
H A D | wpa_common.c | 175 * @key_len: KCK length in octets 192 int wpa_eapol_key_mic(const u8 *key, size_t key_len, int akmp, int ver, in wpa_eapol_key_mic() argument 197 if (key_len == 0) { in wpa_eapol_key_mic() 207 return hmac_md5(key, key_len, buf, len, mic); in wpa_eapol_key_mic() 211 if (hmac_sha1(key, key_len, buf, len, hash)) in wpa_eapol_key_mic() 239 if (hmac_sha256(key, key_len, buf, len, hash)) in wpa_eapol_key_mic() 248 if (hmac_sha384(key, key_len, buf, len, hash)) in wpa_eapol_key_mic() 257 (unsigned int) key_len * 8 * 2); in wpa_eapol_key_mic() 258 if (key_len == 128 / 8) { in wpa_eapol_key_mic() 259 if (hmac_sha256(key, key_len, bu in wpa_eapol_key_mic() [all...] |
/kernel/linux/linux-5.10/drivers/crypto/ccp/ |
H A D | ccp-crypto.h | 99 unsigned int key_len; member 170 unsigned int key_len; member 191 unsigned int key_len; member 241 unsigned int key_len; /* in bits */ member
|
/kernel/linux/linux-5.10/drivers/net/wireless/ti/wl18xx/ |
H A D | cmd.c | 127 u8 key_len, u8 *key) in wl18xx_cmd_smart_config_set_group_key() 135 if (key_len != sizeof(cmd->key)) { in wl18xx_cmd_smart_config_set_group_key() 136 wl1271_error("invalid group key size: %d", key_len); in wl18xx_cmd_smart_config_set_group_key() 147 memcpy(cmd->key, key, key_len); in wl18xx_cmd_smart_config_set_group_key() 126 wl18xx_cmd_smart_config_set_group_key(struct wl1271 *wl, u16 group_id, u8 key_len, u8 *key) wl18xx_cmd_smart_config_set_group_key() argument
|
/kernel/linux/linux-6.6/drivers/crypto/ccp/ |
H A D | ccp-crypto.h | 100 unsigned int key_len; member 171 unsigned int key_len; member 192 unsigned int key_len; member 242 unsigned int key_len; /* in bits */ member
|
/kernel/linux/linux-6.6/drivers/net/wireless/ti/wl18xx/ |
H A D | cmd.c | 127 u8 key_len, u8 *key) in wl18xx_cmd_smart_config_set_group_key() 135 if (key_len != sizeof(cmd->key)) { in wl18xx_cmd_smart_config_set_group_key() 136 wl1271_error("invalid group key size: %d", key_len); in wl18xx_cmd_smart_config_set_group_key() 147 memcpy(cmd->key, key, key_len); in wl18xx_cmd_smart_config_set_group_key() 126 wl18xx_cmd_smart_config_set_group_key(struct wl1271 *wl, u16 group_id, u8 key_len, u8 *key) wl18xx_cmd_smart_config_set_group_key() argument
|
/third_party/mbedtls/library/ |
H A D | psa_crypto_ffdh.c | 170 size_t key_len = PSA_BITS_TO_BYTES(attributes->bits); in mbedtls_psa_ffdh_export_public_key() local 172 status = mbedtls_psa_ffdh_set_prime_generator(key_len, &P, &G); in mbedtls_psa_ffdh_export_public_key() 182 MBEDTLS_MPI_CHK(mbedtls_mpi_write_binary(&GX, data, key_len)); in mbedtls_psa_ffdh_export_public_key() 184 *data_length = key_len; in mbedtls_psa_ffdh_export_public_key()
|
/third_party/lwip/src/apps/snmp/ |
H A D | snmpv3_mbedtls.c | 56 u8_t key_len; in snmpv3_auth() local 64 key_len = SNMP_V3_MD5_LEN; in snmpv3_auth() 67 key_len = SNMP_V3_SHA_LEN; in snmpv3_auth() 77 if (mbedtls_md_hmac_starts(&ctx, key, key_len) != 0) { in snmpv3_auth()
|
/third_party/skia/third_party/externals/libpng/ |
H A D | pngset.c | 836 size_t text_length, key_len; in png_set_text_2() local 851 key_len = strlen(text_ptr[i].key); in png_set_text_2() 903 key_len + text_length + lang_len + lang_key_len + 4)); in png_set_text_2() 915 (key_len + lang_len + lang_key_len + text_length + 4), in png_set_text_2() 918 memcpy(textp->key, text_ptr[i].key, key_len); in png_set_text_2() 919 *(textp->key + key_len) = '\0'; in png_set_text_2() 923 textp->lang = textp->key + key_len + 1; in png_set_text_2() 936 textp->text = textp->key + key_len + 1; in png_set_text_2() 1731 png_uint_32 key_len = 0; in png_check_keyword() local 1743 while (*key && key_len < 7 in png_check_keyword() [all...] |
/kernel/linux/linux-5.10/drivers/firmware/google/ |
H A D | vpd.c | 79 * @key_len: key name length 81 static int vpd_section_check_key_name(const u8 *key, s32 key_len) in vpd_section_check_key_name() argument 85 while (key_len-- > 0) { in vpd_section_check_key_name() 95 static int vpd_section_attrib_add(const u8 *key, u32 key_len, in vpd_section_attrib_add() argument 107 if (vpd_section_check_key_name(key, key_len) != VPD_OK) in vpd_section_attrib_add() 114 info->key = kstrndup(key, key_len, GFP_KERNEL); in vpd_section_attrib_add()
|
/kernel/linux/linux-6.6/drivers/firmware/google/ |
H A D | vpd.c | 79 * @key_len: key name length 81 static int vpd_section_check_key_name(const u8 *key, s32 key_len) in vpd_section_check_key_name() argument 85 while (key_len-- > 0) { in vpd_section_check_key_name() 95 static int vpd_section_attrib_add(const u8 *key, u32 key_len, in vpd_section_attrib_add() argument 107 if (vpd_section_check_key_name(key, key_len) != VPD_OK) in vpd_section_attrib_add() 114 info->key = kstrndup(key, key_len, GFP_KERNEL); in vpd_section_attrib_add()
|
/kernel/linux/linux-6.6/security/keys/trusted-keys/ |
H A D | trusted_tee.c | 86 param[0].u.memref.size = p->key_len; in trusted_tee_seal() 146 p->key_len = param[1].u.memref.size; in trusted_tee_unseal() 157 static int trusted_tee_get_random(unsigned char *key, size_t key_len) in trusted_tee_get_random() argument 167 reg_shm = tee_shm_register_kernel_buf(pvt_data.ctx, key, key_len); in trusted_tee_get_random() 179 param[0].u.memref.size = key_len; in trusted_tee_get_random()
|
/kernel/linux/linux-5.10/arch/sparc/crypto/ |
H A D | aes_glue.c | 166 unsigned int key_len); 169 unsigned int key_len) in aes_set_key() 173 switch (key_len) { in aes_set_key() 193 aes_sparc64_key_expand((const u32 *)in_key, &ctx->key[0], key_len); in aes_set_key() 194 ctx->key_length = key_len; in aes_set_key() 200 unsigned int key_len) in aes_set_key_skcipher() 202 return aes_set_key(crypto_skcipher_tfm(tfm), in_key, key_len); in aes_set_key_skcipher() 168 aes_set_key(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) aes_set_key() argument 199 aes_set_key_skcipher(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) aes_set_key_skcipher() argument
|
/kernel/linux/linux-6.6/arch/sparc/crypto/ |
H A D | aes_glue.c | 166 unsigned int key_len); 169 unsigned int key_len) in aes_set_key() 173 switch (key_len) { in aes_set_key() 193 aes_sparc64_key_expand((const u32 *)in_key, &ctx->key[0], key_len); in aes_set_key() 194 ctx->key_length = key_len; in aes_set_key() 200 unsigned int key_len) in aes_set_key_skcipher() 202 return aes_set_key(crypto_skcipher_tfm(tfm), in_key, key_len); in aes_set_key_skcipher() 168 aes_set_key(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) aes_set_key() argument 199 aes_set_key_skcipher(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) aes_set_key_skcipher() argument
|
/kernel/linux/linux-5.10/drivers/net/wireless/marvell/mwifiex/ |
H A D | sta_cmd.c | 553 key_param_set->key_len = in mwifiex_set_keyparamset_wep() 609 km->key_param_set.key_params.cmac_aes.key_len = in mwifiex_set_aes_key_v2() 610 cpu_to_le16(enc_key->key_len); in mwifiex_set_aes_key_v2() 612 enc_key->key_material, enc_key->key_len); in mwifiex_set_aes_key_v2() 626 km->key_param_set.key_params.aes.key_len = in mwifiex_set_aes_key_v2() 627 cpu_to_le16(enc_key->key_len); in mwifiex_set_aes_key_v2() 629 enc_key->key_material, enc_key->key_len); in mwifiex_set_aes_key_v2() 712 if (enc_key->key_len <= WLAN_KEY_LEN_WEP104) { in mwifiex_cmd_802_11_key_material_v2() 735 km->key_param_set.key_params.wep.key_len = in mwifiex_cmd_802_11_key_material_v2() 736 cpu_to_le16(enc_key->key_len); in mwifiex_cmd_802_11_key_material_v2() [all...] |
/kernel/linux/linux-6.6/drivers/net/wireless/marvell/mwifiex/ |
H A D | sta_cmd.c | 545 key_param_set->key_len = in mwifiex_set_keyparamset_wep() 601 km->key_param_set.key_params.cmac_aes.key_len = in mwifiex_set_aes_key_v2() 602 cpu_to_le16(enc_key->key_len); in mwifiex_set_aes_key_v2() 604 enc_key->key_material, enc_key->key_len); in mwifiex_set_aes_key_v2() 618 km->key_param_set.key_params.aes.key_len = in mwifiex_set_aes_key_v2() 619 cpu_to_le16(enc_key->key_len); in mwifiex_set_aes_key_v2() 621 enc_key->key_material, enc_key->key_len); in mwifiex_set_aes_key_v2() 704 if (enc_key->key_len <= WLAN_KEY_LEN_WEP104) { in mwifiex_cmd_802_11_key_material_v2() 727 km->key_param_set.key_params.wep.key_len = in mwifiex_cmd_802_11_key_material_v2() 728 cpu_to_le16(enc_key->key_len); in mwifiex_cmd_802_11_key_material_v2() [all...] |