/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | crypto_libtomcrypt.c | 155 size_t key_len) in crypto_hash_init() 175 if (hmac_init(&ctx->u.hmac, find_hash("md5"), key, key_len) != in crypto_hash_init() 180 if (hmac_init(&ctx->u.hmac, find_hash("sha1"), key, key_len) != in crypto_hash_init() 303 size_t key_len) in crypto_cipher_init() 335 if (key_len > sizeof(ctx->u.rc4.key)) { in crypto_cipher_init() 339 ctx->u.rc4.keylen = key_len; in crypto_cipher_init() 340 os_memcpy(ctx->u.rc4.key, key, key_len); in crypto_cipher_init() 342 res = cbc_start(idx, iv, key, key_len, 0, &ctx->u.cbc); in crypto_cipher_init() 154 crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, size_t key_len) crypto_hash_init() argument 301 crypto_cipher_init(enum crypto_cipher_alg alg, const u8 *iv, const u8 *key, size_t key_len) crypto_cipher_init() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | crypto_libtomcrypt.c | 155 size_t key_len) in crypto_hash_init() 175 if (hmac_init(&ctx->u.hmac, find_hash("md5"), key, key_len) != in crypto_hash_init() 180 if (hmac_init(&ctx->u.hmac, find_hash("sha1"), key, key_len) != in crypto_hash_init() 303 size_t key_len) in crypto_cipher_init() 335 if (key_len > sizeof(ctx->u.rc4.key)) { in crypto_cipher_init() 339 ctx->u.rc4.keylen = key_len; in crypto_cipher_init() 340 os_memcpy(ctx->u.rc4.key, key, key_len); in crypto_cipher_init() 342 res = cbc_start(idx, iv, key, key_len, 0, &ctx->u.cbc); in crypto_cipher_init() 154 crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, size_t key_len) crypto_hash_init() argument 301 crypto_cipher_init(enum crypto_cipher_alg alg, const u8 *iv, const u8 *key, size_t key_len) crypto_cipher_init() argument
|
/kernel/linux/linux-5.10/drivers/crypto/ccp/ |
H A D | ccp-ops.c | 485 if (!((aes->key_len == AES_KEYSIZE_128) || in ccp_run_aes_cmac_cmd() 486 (aes->key_len == AES_KEYSIZE_192) || in ccp_run_aes_cmac_cmd() 487 (aes->key_len == AES_KEYSIZE_256))) in ccp_run_aes_cmac_cmd() 532 dm_offset = CCP_SB_BYTES - aes->key_len; in ccp_run_aes_cmac_cmd() 533 ret = ccp_set_dm_area(&key, dm_offset, aes->key, 0, aes->key_len); in ccp_run_aes_cmac_cmd() 655 if (!((aes->key_len == AES_KEYSIZE_128) || in ccp_run_aes_gcm_cmd() 656 (aes->key_len == AES_KEYSIZE_192) || in ccp_run_aes_gcm_cmd() 657 (aes->key_len == AES_KEYSIZE_256))) in ccp_run_aes_gcm_cmd() 713 dm_offset = CCP_SB_BYTES - aes->key_len; in ccp_run_aes_gcm_cmd() 714 ret = ccp_set_dm_area(&key, dm_offset, aes->key, 0, aes->key_len); in ccp_run_aes_gcm_cmd() [all...] |
/kernel/linux/linux-6.6/drivers/crypto/ccp/ |
H A D | ccp-ops.c | 485 if (!((aes->key_len == AES_KEYSIZE_128) || in ccp_run_aes_cmac_cmd() 486 (aes->key_len == AES_KEYSIZE_192) || in ccp_run_aes_cmac_cmd() 487 (aes->key_len == AES_KEYSIZE_256))) in ccp_run_aes_cmac_cmd() 532 dm_offset = CCP_SB_BYTES - aes->key_len; in ccp_run_aes_cmac_cmd() 533 ret = ccp_set_dm_area(&key, dm_offset, aes->key, 0, aes->key_len); in ccp_run_aes_cmac_cmd() 655 if (!((aes->key_len == AES_KEYSIZE_128) || in ccp_run_aes_gcm_cmd() 656 (aes->key_len == AES_KEYSIZE_192) || in ccp_run_aes_gcm_cmd() 657 (aes->key_len == AES_KEYSIZE_256))) in ccp_run_aes_gcm_cmd() 713 dm_offset = CCP_SB_BYTES - aes->key_len; in ccp_run_aes_gcm_cmd() 714 ret = ccp_set_dm_area(&key, dm_offset, aes->key, 0, aes->key_len); in ccp_run_aes_gcm_cmd() [all...] |
/kernel/linux/linux-5.10/drivers/net/wireless/intel/ipw2x00/ |
H A D | libipw_wx.c | 620 if (ext->key_len > 0 && (*crypt)->ops->set_key && in libipw_wx_set_encodeext() 621 (*crypt)->ops->set_key(ext->key, ext->key_len, ext->rx_seq, in libipw_wx_set_encodeext() 636 int key_len = clamp_val(ext->key_len, 0, SCM_KEY_LEN); in libipw_wx_set_encodeext() local 638 memcpy(sec.keys[idx], ext->key, key_len); in libipw_wx_set_encodeext() 639 sec.key_sizes[idx] = key_len; in libipw_wx_set_encodeext() 696 ext->key_len = 0; in libipw_wx_get_encodeext() 708 ext->key_len = sec->key_sizes[idx]; in libipw_wx_get_encodeext() 709 memcpy(ext->key, sec->keys[idx], ext->key_len); in libipw_wx_get_encodeext() 711 if (ext->key_len in libipw_wx_get_encodeext() [all...] |
/kernel/linux/linux-6.6/fs/fscache/ |
H A D | cookie.c | 51 k = (cookie->key_len <= sizeof(cookie->inline_key)) ? in fscache_print_cookie() 53 pr_err("%c-key=[%u] '%*phN'\n", prefix, cookie->key_len, cookie->key_len, k); in fscache_print_cookie() 76 if (cookie->key_len > sizeof(cookie->inline_key)) in fscache_free_cookie() 307 a->key_len != b->key_len) in fscache_cookie_same() 310 if (a->key_len <= sizeof(a->inline_key)) { in fscache_cookie_same() 317 return memcmp(ka, kb, a->key_len) == 0; in fscache_cookie_same() 342 cookie->key_len = index_key_len; in fscache_alloc_cookie() 1133 keylen = cookie->key_len; in fscache_cookies_seq_show() [all...] |
/kernel/linux/linux-6.6/drivers/crypto/intel/keembay/ |
H A D | keembay-ocs-hcu-core.c | 41 * @key_len: The length of the key. 48 size_t key_len; member 390 if (ctx->key_len > rctx->blk_sz) { in prepare_ipad() 394 memzero_explicit(&ctx->key[ctx->key_len], in prepare_ipad() 395 rctx->blk_sz - ctx->key_len); in prepare_ipad() 396 ctx->key_len = rctx->blk_sz; in prepare_ipad() 438 rc = ocs_hcu_hmac(hcu_dev, rctx->algo, tctx->key, tctx->key_len, in kmb_ocs_hcu_do_one_request() 534 WARN_ON(tctx->key_len != rctx->blk_sz); in kmb_ocs_hcu_do_one_request() 675 ctx->key_len <= OCS_HCU_HW_KEY_LEN) { in kmb_ocs_hcu_fin_common() 769 ctx->key_len in kmb_ocs_hcu_setkey() [all...] |
/kernel/linux/linux-6.6/drivers/net/wireless/intel/ipw2x00/ |
H A D | libipw_wx.c | 620 if (ext->key_len > 0 && (*crypt)->ops->set_key && in libipw_wx_set_encodeext() 621 (*crypt)->ops->set_key(ext->key, ext->key_len, ext->rx_seq, in libipw_wx_set_encodeext() 636 int key_len = clamp_val(ext->key_len, 0, SCM_KEY_LEN); in libipw_wx_set_encodeext() local 638 memcpy(sec.keys[idx], ext->key, key_len); in libipw_wx_set_encodeext() 639 sec.key_sizes[idx] = key_len; in libipw_wx_set_encodeext() 696 ext->key_len = 0; in libipw_wx_get_encodeext() 708 ext->key_len = sec->key_sizes[idx]; in libipw_wx_get_encodeext() 709 memcpy(ext->key, sec->keys[idx], ext->key_len); in libipw_wx_get_encodeext() 711 if (ext->key_len in libipw_wx_get_encodeext() [all...] |
/kernel/linux/linux-5.10/drivers/staging/rtl8723bs/os_dep/ |
H A D | ioctl_cfg80211.c | 574 if (param_len != sizeof(struct ieee_param) + param->u.crypt.key_len) in rtw_cfg80211_ap_set_encryption() 616 wep_key_len = param->u.crypt.key_len; in rtw_cfg80211_ap_set_encryption() 668 memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len)); in rtw_cfg80211_ap_set_encryption() 671 if (param->u.crypt.key_len == 13) in rtw_cfg80211_ap_set_encryption() 683 memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len)); in rtw_cfg80211_ap_set_encryption() 685 /* DEBUG_ERR("set key length :param->u.crypt.key_len =%d\n", param->u.crypt.key_len); */ in rtw_cfg80211_ap_set_encryption() 699 memcpy(psecuritypriv->dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 1 in rtw_cfg80211_ap_set_encryption() [all...] |
/kernel/linux/linux-5.10/drivers/crypto/cavium/cpt/ |
H A D | cptvf_algs.c | 126 memcpy(fctx->enc.encr_key, ctx->enc_key, ctx->key_len * 2); in create_ctx_hdr() 128 memcpy(fctx->enc.encr_key, ctx->enc_key, ctx->key_len); in create_ctx_hdr() 244 ctx->key_len = keylen; in cvm_xts_setkey() 248 switch (ctx->key_len) { in cvm_xts_setkey() 265 ctx->key_len = keylen; in cvm_validate_keylen() 266 switch (ctx->key_len) { in cvm_validate_keylen()
|
H A D | cptvf_algs.h | 99 u32 key_len; member 106 u32 key_len; member
|
/kernel/linux/linux-5.10/drivers/net/ethernet/mellanox/mlx5/core/en_accel/ |
H A D | ipsec.c | 152 unsigned int crypto_data_len, key_len; in mlx5e_ipsec_build_accel_xfrm_attrs() local 159 key_len = crypto_data_len - 4; /* 4 bytes salt at end */ in mlx5e_ipsec_build_accel_xfrm_attrs() 161 memcpy(aes_gcm->aes_key, x->aead->alg_key, key_len); in mlx5e_ipsec_build_accel_xfrm_attrs() 162 aes_gcm->key_len = key_len * 8; in mlx5e_ipsec_build_accel_xfrm_attrs() 169 memcpy(&aes_gcm->salt, x->aead->alg_key + key_len, in mlx5e_ipsec_build_accel_xfrm_attrs()
|
/kernel/linux/linux-6.6/drivers/crypto/cavium/cpt/ |
H A D | cptvf_algs.c | 126 memcpy(fctx->enc.encr_key, ctx->enc_key, ctx->key_len * 2); in create_ctx_hdr() 128 memcpy(fctx->enc.encr_key, ctx->enc_key, ctx->key_len); in create_ctx_hdr() 243 ctx->key_len = keylen; in cvm_xts_setkey() 247 switch (ctx->key_len) { in cvm_xts_setkey() 264 ctx->key_len = keylen; in cvm_validate_keylen() 265 switch (ctx->key_len) { in cvm_validate_keylen()
|
H A D | cptvf_algs.h | 99 u32 key_len; member 106 u32 key_len; member
|
/third_party/mbedtls/library/ |
H A D | lmots.c | 394 const unsigned char *key, size_t key_len) in mbedtls_lmots_import_public_key() 396 if (key_len < MBEDTLS_LMOTS_SIG_TYPE_OFFSET + MBEDTLS_LMOTS_TYPE_LEN) { in mbedtls_lmots_import_public_key() 403 if (key_len != MBEDTLS_LMOTS_PUBLIC_KEY_LEN(ctx->params.type)) { in mbedtls_lmots_import_public_key() 426 size_t *key_len) in mbedtls_lmots_export_public_key() 449 if (key_len != NULL) { in mbedtls_lmots_export_public_key() 450 *key_len = MBEDTLS_LMOTS_PUBLIC_KEY_LEN(ctx->params.type); in mbedtls_lmots_export_public_key() 393 mbedtls_lmots_import_public_key(mbedtls_lmots_public_t *ctx, const unsigned char *key, size_t key_len) mbedtls_lmots_import_public_key() argument 424 mbedtls_lmots_export_public_key(const mbedtls_lmots_public_t *ctx, unsigned char *key, size_t key_size, size_t *key_len) mbedtls_lmots_export_public_key() argument
|
/third_party/node/deps/openssl/openssl/engines/ |
H A D | e_padlock.c | 621 int key_len = EVP_CIPHER_CTX_get_key_length(ctx) * 8; in padlock_aes_init_key() local 635 cdata->cword.b.rounds = 10 + (key_len - 128) / 32; in padlock_aes_init_key() 636 cdata->cword.b.ksize = (key_len - 128) / 64; in padlock_aes_init_key() 638 switch (key_len) { in padlock_aes_init_key() 659 AES_set_decrypt_key(key, key_len, &cdata->ks); in padlock_aes_init_key() 661 AES_set_encrypt_key(key, key_len, &cdata->ks); in padlock_aes_init_key()
|
/third_party/openssl/engines/ |
H A D | e_padlock.c | 621 int key_len = EVP_CIPHER_CTX_get_key_length(ctx) * 8; in padlock_aes_init_key() local 635 cdata->cword.b.rounds = 10 + (key_len - 128) / 32; in padlock_aes_init_key() 636 cdata->cword.b.ksize = (key_len - 128) / 64; in padlock_aes_init_key() 638 switch (key_len) { in padlock_aes_init_key() 659 AES_set_decrypt_key(key, key_len, &cdata->ks); in padlock_aes_init_key() 661 AES_set_encrypt_key(key, key_len, &cdata->ks); in padlock_aes_init_key()
|
/third_party/pulseaudio/src/pulsecore/ |
H A D | modargs.c | 121 size_t key_len = 0, value_len = 0; in parse() local 134 key_len = 1; in parse() 144 key_len++; in parse() 158 pa_xstrndup(key, key_len), in parse() 178 pa_xstrndup(key, key_len), in parse() 199 pa_xstrndup(key, key_len), in parse() 220 pa_xstrndup(key, key_len), in parse() 241 if (add_key_value(ma, pa_xstrndup(key, key_len), pa_xstrdup(""), valid_keys, ignore_dupes) < 0) in parse() 244 if (add_key_value(ma, pa_xstrndup(key, key_len), pa_xstrdup(value), valid_keys, ignore_dupes) < 0) in parse()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
H A D | wpa_common.c | 186 * @key_len: KCK length in octets 203 int wpa_eapol_key_mic(const u8 *key, size_t key_len, int akmp, int ver, in wpa_eapol_key_mic() argument 208 if (key_len == 0) { in wpa_eapol_key_mic() 218 return hmac_md5(key, key_len, buf, len, mic); in wpa_eapol_key_mic() 222 if (hmac_sha1(key, key_len, buf, len, hash)) in wpa_eapol_key_mic() 240 (unsigned int) key_len * 8 * 2); in wpa_eapol_key_mic() 241 if (key_len == 128 / 8) { in wpa_eapol_key_mic() 242 if (hmac_sha256(key, key_len, buf, len, hash)) in wpa_eapol_key_mic() 245 } else if (key_len == 192 / 8) { in wpa_eapol_key_mic() 246 if (hmac_sha384(key, key_len, bu in wpa_eapol_key_mic() [all...] |
/kernel/linux/linux-5.10/security/keys/trusted-keys/ |
H A D | trusted_tpm1.c | 679 p->key[p->key_len] = p->migratable; in key_seal() 682 p->key, p->key_len + 1, p->blob, &p->blob_len, in key_seal() 705 o->blobauth, p->key, &p->key_len); in key_unseal() 710 p->migratable = p->key[--p->key_len]; in key_unseal() 905 p->key_len = keylen; in datablob_parse() 993 size_t key_len; in trusted_instantiate() local 1046 key_len = payload->key_len; in trusted_instantiate() 1047 ret = tpm_get_random(chip, payload->key, key_len); in trusted_instantiate() 1051 if (ret != key_len) { in trusted_instantiate() [all...] |
/kernel/linux/linux-5.10/crypto/ |
H A D | arc4.c | 19 unsigned int key_len) in crypto_arc4_setkey() 23 return arc4_setkey(ctx, in_key, key_len); in crypto_arc4_setkey() 18 crypto_arc4_setkey(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) crypto_arc4_setkey() argument
|
/kernel/linux/linux-6.6/arch/arm64/crypto/ |
H A D | sm4-ce-cipher-glue.c | 21 unsigned int key_len) in sm4_ce_setkey() 25 return sm4_expandkey(ctx, key, key_len); in sm4_ce_setkey() 20 sm4_ce_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int key_len) sm4_ce_setkey() argument
|
/kernel/linux/linux-5.10/lib/crypto/ |
H A D | arc4.c | 13 int arc4_setkey(struct arc4_ctx *ctx, const u8 *in_key, unsigned int key_len) in arc4_setkey() argument 29 if (++k >= key_len) in arc4_setkey()
|
/kernel/linux/linux-5.10/net/mac80211/ |
H A D | aes_cmac.c | 71 size_t key_len) in ieee80211_aes_cmac_key_setup() 77 crypto_shash_setkey(tfm, key, key_len); in ieee80211_aes_cmac_key_setup() 70 ieee80211_aes_cmac_key_setup(const u8 key[], size_t key_len) ieee80211_aes_cmac_key_setup() argument
|
/kernel/linux/linux-6.6/fs/smb/common/ |
H A D | cifs_arc4.c | 15 int cifs_arc4_setkey(struct arc4_ctx *ctx, const u8 *in_key, unsigned int key_len) in cifs_arc4_setkey() argument 31 if (++k >= key_len) in cifs_arc4_setkey()
|