/kernel/linux/linux-6.6/crypto/ |
H A D | arc4.c | 19 unsigned int key_len) in crypto_arc4_setkey() 23 return arc4_setkey(ctx, in_key, key_len); in crypto_arc4_setkey() 18 crypto_arc4_setkey(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) crypto_arc4_setkey() argument
|
/kernel/linux/linux-6.6/security/keys/trusted-keys/ |
H A D | trusted_caam.c | 23 .input = p->key, .input_len = p->key_len, in trusted_caam_seal() 49 p->key_len = info.output_len; in trusted_caam_unseal()
|
/kernel/linux/linux-6.6/lib/crypto/ |
H A D | arc4.c | 13 int arc4_setkey(struct arc4_ctx *ctx, const u8 *in_key, unsigned int key_len) in arc4_setkey() argument 29 if (++k >= key_len) in arc4_setkey()
|
/kernel/linux/linux-6.6/net/mac80211/ |
H A D | aes_cmac.c | 72 size_t key_len) in ieee80211_aes_cmac_key_setup() 78 int err = crypto_shash_setkey(tfm, key, key_len); in ieee80211_aes_cmac_key_setup() 71 ieee80211_aes_cmac_key_setup(const u8 key[], size_t key_len) ieee80211_aes_cmac_key_setup() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | eap_pax_common.h | 80 int eap_pax_kdf(u8 mac_id, const u8 *key, size_t key_len, 84 int eap_pax_mac(u8 mac_id, const u8 *key, size_t key_len,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | eap_pax_common.h | 80 int eap_pax_kdf(u8 mac_id, const u8 *key, size_t key_len, 84 int eap_pax_mac(u8 mac_id, const u8 *key, size_t key_len,
|
/third_party/mbedtls/library/ |
H A D | nist_kw.c | 456 static const unsigned int key_len[] = { variable 597 mbedtls_printf(" KW-AES-%u ", (unsigned int) key_len[i] * 8); in mbedtls_nist_kw_self_test() 601 kw_key[i], key_len[i] * 8, 1); in mbedtls_nist_kw_self_test() 623 kw_key[i], key_len[i] * 8, 0)) in mbedtls_nist_kw_self_test() 660 mbedtls_printf(" KWP-AES-%u ", (unsigned int) key_len[i] * 8); in mbedtls_nist_kw_self_test() 664 key_len[i] * 8, 1); in mbedtls_nist_kw_self_test() 686 kwp_key[i], key_len[i] * 8, 0)) in mbedtls_nist_kw_self_test()
|
H A D | pk_ecc.c | 48 int mbedtls_pk_ecc_set_key(mbedtls_pk_context *pk, unsigned char *key, size_t key_len) in mbedtls_pk_ecc_set_key() argument 70 status = psa_import_key(&attributes, key, key_len, &pk->priv_id); in mbedtls_pk_ecc_set_key() 76 int ret = mbedtls_ecp_read_key(eck->grp.id, eck, key, key_len); in mbedtls_pk_ecc_set_key()
|
/kernel/linux/linux-5.10/crypto/asymmetric_keys/ |
H A D | asym_tpm.c | 421 info->key_size = tk->key_len; in tpm_key_query() 422 info->max_data_size = tk->key_len / 8; in tpm_key_query() 425 info->max_dec_size = tk->key_len / 8; in tpm_key_query() 664 if (in_len > tk->key_len / 8 - 11) { in tpm_key_sign() 819 uint32_t key_len; in extract_key_parameters() local 856 key_len = get_unaligned_be32(cur); in extract_key_parameters() 858 switch (key_len) { in extract_key_parameters() 890 tk->key_len = key_len; in extract_key_parameters()
|
/kernel/linux/linux-5.10/net/ipv6/ |
H A D | calipso.c | 76 size_t key_len; member 112 * @key_len: the length of the key in bytes 118 static u32 calipso_map_cache_hash(const unsigned char *key, u32 key_len) in calipso_map_cache_hash() argument 120 return jhash(key, key_len, 0); in calipso_map_cache_hash() 180 * @key_len: buffer length in bytes 200 u32 key_len, in calipso_cache_check() 211 hash = calipso_map_cache_hash(key, key_len); in calipso_cache_check() 216 entry->key_len == key_len && in calipso_cache_check() 217 memcmp(entry->key, key, key_len) in calipso_cache_check() 199 calipso_cache_check(const unsigned char *key, u32 key_len, struct netlbl_lsm_secattr *secattr) calipso_cache_check() argument [all...] |
/kernel/linux/linux-6.6/net/ipv6/ |
H A D | calipso.c | 76 size_t key_len; member 112 * @key_len: the length of the key in bytes 118 static u32 calipso_map_cache_hash(const unsigned char *key, u32 key_len) in calipso_map_cache_hash() argument 120 return jhash(key, key_len, 0); in calipso_map_cache_hash() 180 * @key_len: buffer length in bytes 200 u32 key_len, in calipso_cache_check() 211 hash = calipso_map_cache_hash(key, key_len); in calipso_cache_check() 216 entry->key_len == key_len && in calipso_cache_check() 217 memcmp(entry->key, key, key_len) in calipso_cache_check() 199 calipso_cache_check(const unsigned char *key, u32 key_len, struct netlbl_lsm_secattr *secattr) calipso_cache_check() argument [all...] |
/kernel/linux/linux-5.10/crypto/ |
H A D | sm4_generic.c | 111 * @key_len: The length of the supplied key. 117 unsigned int key_len) in crypto_sm4_expand_key() 123 if (key_len != SM4_KEY_SIZE) in crypto_sm4_expand_key() 149 * @key_len: The size of the key. 158 unsigned int key_len) in crypto_sm4_set_key() 162 return crypto_sm4_expand_key(ctx, in_key, key_len); in crypto_sm4_set_key() 116 crypto_sm4_expand_key(struct crypto_sm4_ctx *ctx, const u8 *in_key, unsigned int key_len) crypto_sm4_expand_key() argument 157 crypto_sm4_set_key(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) crypto_sm4_set_key() argument
|
/kernel/linux/linux-5.10/drivers/net/netdevsim/ |
H A D | ipsec.c | 91 int key_len; in nsim_ipsec_parse_proto_keys() local 105 key_len = xs->aead->alg_key_len; in nsim_ipsec_parse_proto_keys() 115 if (key_len > NSIM_IPSEC_AUTH_BITS) { in nsim_ipsec_parse_proto_keys() 117 } else if (key_len == NSIM_IPSEC_AUTH_BITS) { in nsim_ipsec_parse_proto_keys()
|
/kernel/linux/linux-5.10/security/keys/trusted-keys/ |
H A D | trusted_tpm2.c | 100 tpm_buf_append_u16(&buf, 4 + options->blobauth_len + payload->key_len + 1); in tpm2_seal_trusted() 106 tpm_buf_append_u16(&buf, payload->key_len + 1); in tpm2_seal_trusted() 107 tpm_buf_append(&buf, payload->key, payload->key_len); in tpm2_seal_trusted() 291 payload->key_len = data_len - 1; in tpm2_unseal_cmd()
|
/kernel/linux/linux-5.10/fs/hfsplus/ |
H A D | hfsplus_raw.h | 214 __be16 key_len; member 340 __be16 key_len; member 358 __be16 key_len; member 402 __be16 key_len; member
|
/kernel/linux/linux-5.10/fs/cifs/ |
H A D | fscache.c | 49 uint16_t key_len = sizeof(key.hdr); in cifs_fscache_get_client_cookie() local 62 key_len += sizeof(key.ipv4_addr); in cifs_fscache_get_client_cookie() 68 key_len += sizeof(key.ipv6_addr); in cifs_fscache_get_client_cookie() 80 &key, key_len, in cifs_fscache_get_client_cookie()
|
/kernel/linux/linux-6.6/fs/hfsplus/ |
H A D | hfsplus_raw.h | 214 __be16 key_len; member 344 __be16 key_len; member 362 __be16 key_len; member 406 __be16 key_len; member
|
/kernel/linux/linux-6.6/drivers/net/netdevsim/ |
H A D | ipsec.c | 91 int key_len; in nsim_ipsec_parse_proto_keys() local 105 key_len = xs->aead->alg_key_len; in nsim_ipsec_parse_proto_keys() 115 if (key_len > NSIM_IPSEC_AUTH_BITS) { in nsim_ipsec_parse_proto_keys() 117 } else if (key_len == NSIM_IPSEC_AUTH_BITS) { in nsim_ipsec_parse_proto_keys()
|
/third_party/node/deps/cares/src/lib/ |
H A D | ares__htable.c | 415 unsigned int ares__htable_hash_FNV1a(const unsigned char *key, size_t key_len, in ares__htable_hash_FNV1a() argument 422 for (i = 0; i < key_len; i++) { in ares__htable_hash_FNV1a() 433 size_t key_len, unsigned int seed) in ares__htable_hash_FNV1a_casecmp() 439 for (i = 0; i < key_len; i++) { in ares__htable_hash_FNV1a_casecmp() 432 ares__htable_hash_FNV1a_casecmp(const unsigned char *key, size_t key_len, unsigned int seed) ares__htable_hash_FNV1a_casecmp() argument
|
H A D | ares_rand.c | 68 size_t key_len) in ares_rc4_generate_key() 75 if (key_len != ARES_RC4_KEY_LEN) { in ares_rc4_generate_key() 99 for (i = len; i < key_len; i++) { in ares_rc4_generate_key() 67 ares_rc4_generate_key(ares_rand_rc4 *rc4_state, unsigned char *key, size_t key_len) ares_rc4_generate_key() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | crypto_openssl.c | 709 size_t key_len) in crypto_cipher_init() 728 switch (key_len) { in crypto_cipher_init() 767 !EVP_CIPHER_CTX_set_key_length(ctx->enc, key_len) || in crypto_cipher_init() 778 !EVP_CIPHER_CTX_set_key_length(ctx->dec, key_len) || in crypto_cipher_init() 1057 size_t key_len) in crypto_hash_init() 1093 if (HMAC_Init_ex(ctx->ctx, key, key_len, md, NULL) != 1) { in crypto_hash_init() 1143 size_t key_len, size_t num_elem, in openssl_hmac_vector() 1157 res = HMAC_Init_ex(ctx, key, key_len, type, NULL); in openssl_hmac_vector() 1174 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, in hmac_md5_vector() argument 1177 return openssl_hmac_vector(EVP_md5(), key ,key_len, num_ele in hmac_md5_vector() 707 crypto_cipher_init(enum crypto_cipher_alg alg, const u8 *iv, const u8 *key, size_t key_len) crypto_cipher_init() argument 1056 crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, size_t key_len) crypto_hash_init() argument 1142 openssl_hmac_vector(const EVP_MD *type, const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac, unsigned int mdlen) openssl_hmac_vector() argument 1182 hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_md5() argument 1201 hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) hmac_sha1_vector() argument 1209 hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha1() argument 1218 hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) hmac_sha256_vector() argument 1226 hmac_sha256(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha256() argument 1237 hmac_sha384_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) hmac_sha384_vector() argument 1245 hmac_sha384(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha384() argument 1256 hmac_sha512_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) hmac_sha512_vector() argument 1264 hmac_sha512(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha512() argument 1282 omac1_aes_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) omac1_aes_vector() argument [all...] |
/kernel/linux/linux-5.10/include/linux/ |
H A D | ccp.h | 149 * @key_len: length in bytes of key 160 * - type, mode, action, key, key_len, src, dst, src_len 176 u32 key_len; /* In bytes */ member 216 * @key_len: length in bytes of key 225 * - action, unit_size, key, key_len, iv, iv_len, src, dst, src_len, final 236 u32 key_len; /* In bytes */ member 327 * @key_len: length of key (in bytes) 335 * - type, mode, action, key, key_len, src, dst, src_len 347 u32 key_len; /* In bytes */ member
|
/kernel/linux/linux-5.10/fs/hfs/ |
H A D | hfs.h | 150 u8 key_len; /* number of bytes in the key */ member 158 u8 key_len; /* number of bytes in the key */ member 165 u8 key_len; /* number of bytes in the key */ member
|
/kernel/linux/linux-6.6/include/linux/ |
H A D | ccp.h | 150 * @key_len: length in bytes of key 161 * - type, mode, action, key, key_len, src, dst, src_len 177 u32 key_len; /* In bytes */ member 217 * @key_len: length in bytes of key 226 * - action, unit_size, key, key_len, iv, iv_len, src, dst, src_len, final 237 u32 key_len; /* In bytes */ member 328 * @key_len: length of key (in bytes) 336 * - type, mode, action, key, key_len, src, dst, src_len 348 u32 key_len; /* In bytes */ member
|
/kernel/linux/linux-6.6/fs/hfs/ |
H A D | hfs.h | 150 u8 key_len; /* number of bytes in the key */ member 158 u8 key_len; /* number of bytes in the key */ member 165 u8 key_len; /* number of bytes in the key */ member
|