Home
last modified time | relevance | path

Searched refs:key_len (Results 76 - 100 of 1104) sorted by relevance

12345678910>>...45

/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
H A Dsha1.h14 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem,
16 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
18 int sha1_prf(const u8 *key, size_t key_len, const char *label,
20 int sha1_t_prf(const u8 *key, size_t key_len, const char *label,
H A Dsha256.h14 int hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem,
16 int hmac_sha256(const u8 *key, size_t key_len, const u8 *data,
18 int sha256_prf(const u8 *key, size_t key_len, const char *label,
20 int sha256_prf_bits(const u8 *key, size_t key_len, const char *label,
H A Dsha384.h14 int hmac_sha384_vector(const u8 *key, size_t key_len, size_t num_elem,
16 int hmac_sha384(const u8 *key, size_t key_len, const u8 *data,
18 int sha384_prf(const u8 *key, size_t key_len, const char *label,
20 int sha384_prf_bits(const u8 *key, size_t key_len, const char *label,
H A Dsha512.h14 int hmac_sha512_vector(const u8 *key, size_t key_len, size_t num_elem,
16 int hmac_sha512(const u8 *key, size_t key_len, const u8 *data,
18 int sha512_prf(const u8 *key, size_t key_len, const char *label,
20 int sha512_prf_bits(const u8 *key, size_t key_len, const char *label,
H A Dcrypto_wolfssl.c160 size_t key_len, size_t num_elem, in wolfssl_hmac_vector()
172 if (wc_HmacSetKey(&hmac, type, key, (word32) key_len) != 0) in wolfssl_hmac_vector()
185 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, in hmac_md5_vector() argument
188 return wolfssl_hmac_vector(WC_MD5, key, key_len, num_elem, addr, len, in hmac_md5_vector()
193 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_md5() argument
196 return hmac_md5_vector(key, key_len, 1, &data, &data_len, mac); in hmac_md5()
202 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, in hmac_sha1_vector() argument
205 return wolfssl_hmac_vector(WC_SHA, key, key_len, num_elem, addr, len, in hmac_sha1_vector()
210 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_sha1() argument
213 return hmac_sha1_vector(key, key_len, in hmac_sha1()
159 wolfssl_hmac_vector(int type, const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac, unsigned int mdlen) wolfssl_hmac_vector() argument
219 hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) hmac_sha256_vector() argument
227 hmac_sha256(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha256() argument
238 hmac_sha384_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) hmac_sha384_vector() argument
246 hmac_sha384(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha384() argument
257 hmac_sha512_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) hmac_sha512_vector() argument
265 hmac_sha512(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha512() argument
482 crypto_cipher_init(enum crypto_cipher_alg alg, const u8 *iv, const u8 *key, size_t key_len) crypto_cipher_init() argument
886 crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, size_t key_len) crypto_hash_init() argument
968 omac1_aes_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) omac1_aes_vector() argument
1788 word32 key_len = ecdh->ec->key.dp->size; crypto_ecdh_set_peerkey() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
H A Dikev2_common.h254 size_t key_len; member
260 size_t key_len; member
266 size_t key_len; member
271 int ikev2_integ_hash(int alg, const u8 *key, size_t key_len, const u8 *data,
274 int ikev2_prf_hash(int alg, const u8 *key, size_t key_len,
277 int ikev2_prf_plus(int alg, const u8 *key, size_t key_len,
281 int ikev2_encr_encrypt(int alg, const u8 *key, size_t key_len, const u8 *iv,
283 int ikev2_encr_decrypt(int alg, const u8 *key, size_t key_len, const u8 *iv,
H A Deap_eke_common.c183 static int eap_eke_prf(u8 prf, const u8 *key, size_t key_len, const u8 *data, in eap_eke_prf() argument
200 return hmac_sha1_vector(key, key_len, num_elem, addr, len, res); in eap_eke_prf()
202 return hmac_sha256_vector(key, key_len, num_elem, addr, len, in eap_eke_prf()
208 static int eap_eke_prf_hmac_sha1(const u8 *key, size_t key_len, const u8 *data, in eap_eke_prf_hmac_sha1() argument
228 ret = hmac_sha1_vector(key, key_len, 2, &addr[1], in eap_eke_prf_hmac_sha1()
231 ret = hmac_sha1_vector(key, key_len, 3, addr, vlen, in eap_eke_prf_hmac_sha1()
249 static int eap_eke_prf_hmac_sha256(const u8 *key, size_t key_len, const u8 *data, in eap_eke_prf_hmac_sha256() argument
269 ret = hmac_sha256_vector(key, key_len, 2, &addr[1], in eap_eke_prf_hmac_sha256()
272 ret = hmac_sha256_vector(key, key_len, 3, addr, vlen, in eap_eke_prf_hmac_sha256()
290 static int eap_eke_prfplus(u8 prf, const u8 *key, size_t key_len, in eap_eke_prfplus() argument
310 size_t key_len = 16; /* Only AES-128-CBC is used here */ eap_eke_derive_key() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
H A Dikev2_common.h254 size_t key_len; member
260 size_t key_len; member
266 size_t key_len; member
271 int ikev2_integ_hash(int alg, const u8 *key, size_t key_len, const u8 *data,
274 int ikev2_prf_hash(int alg, const u8 *key, size_t key_len,
277 int ikev2_prf_plus(int alg, const u8 *key, size_t key_len,
281 int ikev2_encr_encrypt(int alg, const u8 *key, size_t key_len, const u8 *iv,
283 int ikev2_encr_decrypt(int alg, const u8 *key, size_t key_len, const u8 *iv,
H A Deap_eke_common.c183 static int eap_eke_prf(u8 prf, const u8 *key, size_t key_len, const u8 *data, in eap_eke_prf() argument
200 return hmac_sha1_vector(key, key_len, num_elem, addr, len, res); in eap_eke_prf()
202 return hmac_sha256_vector(key, key_len, num_elem, addr, len, in eap_eke_prf()
208 static int eap_eke_prf_hmac_sha1(const u8 *key, size_t key_len, const u8 *data, in eap_eke_prf_hmac_sha1() argument
228 ret = hmac_sha1_vector(key, key_len, 2, &addr[1], in eap_eke_prf_hmac_sha1()
231 ret = hmac_sha1_vector(key, key_len, 3, addr, vlen, in eap_eke_prf_hmac_sha1()
249 static int eap_eke_prf_hmac_sha256(const u8 *key, size_t key_len, const u8 *data, in eap_eke_prf_hmac_sha256() argument
269 ret = hmac_sha256_vector(key, key_len, 2, &addr[1], in eap_eke_prf_hmac_sha256()
272 ret = hmac_sha256_vector(key, key_len, 3, addr, vlen, in eap_eke_prf_hmac_sha256()
290 static int eap_eke_prfplus(u8 prf, const u8 *key, size_t key_len, in eap_eke_prfplus() argument
310 size_t key_len = 16; /* Only AES-128-CBC is used here */ eap_eke_derive_key() local
[all...]
/kernel/linux/linux-5.10/net/mac80211/
H A Dfils_aead.c66 static int aes_siv_encrypt(const u8 *key, size_t key_len, in aes_siv_encrypt() argument
79 key_len /= 2; /* S2V key || CTR key */ in aes_siv_encrypt()
91 res = crypto_shash_setkey(tfm, key, key_len); in aes_siv_encrypt()
122 res = crypto_skcipher_setkey(tfm2, key + key_len, key_len); in aes_siv_encrypt()
144 static int aes_siv_decrypt(const u8 *key, size_t key_len, in aes_siv_decrypt() argument
159 key_len /= 2; /* S2V key || CTR key */ in aes_siv_decrypt()
179 res = crypto_skcipher_setkey(tfm2, key + key_len, key_len); in aes_siv_decrypt()
206 res = crypto_shash_setkey(tfm, key, key_len); in aes_siv_decrypt()
[all...]
/kernel/linux/linux-6.6/net/mac80211/
H A Dfils_aead.c66 static int aes_siv_encrypt(const u8 *key, size_t key_len, in aes_siv_encrypt() argument
79 key_len /= 2; /* S2V key || CTR key */ in aes_siv_encrypt()
91 res = crypto_shash_setkey(tfm, key, key_len); in aes_siv_encrypt()
122 res = crypto_skcipher_setkey(tfm2, key + key_len, key_len); in aes_siv_encrypt()
144 static int aes_siv_decrypt(const u8 *key, size_t key_len, in aes_siv_decrypt() argument
159 key_len /= 2; /* S2V key || CTR key */ in aes_siv_decrypt()
179 res = crypto_skcipher_setkey(tfm2, key + key_len, key_len); in aes_siv_decrypt()
206 res = crypto_shash_setkey(tfm, key, key_len); in aes_siv_decrypt()
[all...]
/kernel/linux/linux-5.10/arch/arm/crypto/
H A Daes-neonbs-glue.c66 unsigned int key_len) in aesbs_setkey()
72 err = aes_expandkey(&rk, in_key, key_len); in aesbs_setkey()
76 ctx->rounds = 6 + key_len / 4; in aesbs_setkey()
125 unsigned int key_len) in aesbs_cbc_setkey()
131 err = aes_expandkey(&rk, in_key, key_len); in aesbs_cbc_setkey()
135 ctx->key.rounds = 6 + key_len / 4; in aesbs_cbc_setkey()
142 return crypto_skcipher_setkey(ctx->enc_tfm, in_key, key_len); in aesbs_cbc_setkey()
214 unsigned int key_len) in aesbs_ctr_setkey_sync()
219 err = aes_expandkey(&ctx->fallback, in_key, key_len); in aesbs_ctr_setkey_sync()
223 ctx->key.rounds = 6 + key_len / in aesbs_ctr_setkey_sync()
65 aesbs_setkey(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) aesbs_setkey() argument
124 aesbs_cbc_setkey(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) aesbs_cbc_setkey() argument
213 aesbs_ctr_setkey_sync(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) aesbs_ctr_setkey_sync() argument
297 aesbs_xts_setkey(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) aesbs_xts_setkey() argument
[all...]
/kernel/linux/linux-6.6/arch/arm/crypto/
H A Daes-neonbs-glue.c69 unsigned int key_len) in aesbs_setkey()
75 err = aes_expandkey(&rk, in_key, key_len); in aesbs_setkey()
79 ctx->rounds = 6 + key_len / 4; in aesbs_setkey()
128 unsigned int key_len) in aesbs_cbc_setkey()
134 err = aes_expandkey(&rk, in_key, key_len); in aesbs_cbc_setkey()
138 ctx->key.rounds = 6 + key_len / 4; in aesbs_cbc_setkey()
145 return crypto_skcipher_setkey(ctx->enc_tfm, in_key, key_len); in aesbs_cbc_setkey()
217 unsigned int key_len) in aesbs_ctr_setkey_sync()
222 err = aes_expandkey(&ctx->fallback, in_key, key_len); in aesbs_ctr_setkey_sync()
226 ctx->key.rounds = 6 + key_len / in aesbs_ctr_setkey_sync()
68 aesbs_setkey(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) aesbs_setkey() argument
127 aesbs_cbc_setkey(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) aesbs_cbc_setkey() argument
216 aesbs_ctr_setkey_sync(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) aesbs_ctr_setkey_sync() argument
293 aesbs_xts_setkey(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) aesbs_xts_setkey() argument
[all...]
/kernel/linux/linux-5.10/drivers/crypto/bcm/
H A Dspu.c649 flow_log(" key: %d\n", cipher_parms->key_len); in spum_create_request()
650 flow_dump(" key: ", cipher_parms->key_buf, cipher_parms->key_len); in spum_create_request()
656 flow_log(" authkey: %d\n", hash_parms->key_len); in spum_create_request()
657 flow_dump(" authkey: ", hash_parms->key_buf, hash_parms->key_len); in spum_create_request()
705 if (hash_parms->key_len) { in spum_create_request()
706 memcpy(ptr, hash_parms->key_buf, hash_parms->key_len); in spum_create_request()
707 ptr += hash_parms->key_len; in spum_create_request()
708 buf_len += hash_parms->key_len; in spum_create_request()
709 sctx_words += hash_parms->key_len / 4; in spum_create_request()
739 if (cipher_parms->key_len) { in spum_create_request()
[all...]
/kernel/linux/linux-6.6/drivers/crypto/bcm/
H A Dspu.c647 flow_log(" key: %d\n", cipher_parms->key_len); in spum_create_request()
648 flow_dump(" key: ", cipher_parms->key_buf, cipher_parms->key_len); in spum_create_request()
654 flow_log(" authkey: %d\n", hash_parms->key_len); in spum_create_request()
655 flow_dump(" authkey: ", hash_parms->key_buf, hash_parms->key_len); in spum_create_request()
703 if (hash_parms->key_len) { in spum_create_request()
704 memcpy(ptr, hash_parms->key_buf, hash_parms->key_len); in spum_create_request()
705 ptr += hash_parms->key_len; in spum_create_request()
706 buf_len += hash_parms->key_len; in spum_create_request()
707 sctx_words += hash_parms->key_len / 4; in spum_create_request()
737 if (cipher_parms->key_len) { in spum_create_request()
[all...]
/kernel/linux/linux-6.6/include/keys/
H A Dtrusted-type.h28 unsigned int key_len; member
68 int (*get_random)(unsigned char *key, size_t key_len);
86 pr_info("key_len %d\n", p->key_len); in dump_payload()
88 16, 1, p->key, p->key_len, 0); in dump_payload()
/third_party/node/deps/openssl/openssl/crypto/evp/
H A De_rc5.c75 const int key_len = EVP_CIPHER_CTX_get_key_length(ctx); in r_32_12_16_init_key() local
77 if (key_len > 255 || key_len < 0) { in r_32_12_16_init_key()
81 return RC5_32_set_key(&data(ctx)->ks, key_len, key, data(ctx)->rounds); in r_32_12_16_init_key()
/third_party/openssl/crypto/evp/
H A De_rc5.c75 const int key_len = EVP_CIPHER_CTX_get_key_length(ctx); in r_32_12_16_init_key() local
77 if (key_len > 255 || key_len < 0) { in r_32_12_16_init_key()
81 return RC5_32_set_key(&data(ctx)->ks, key_len, key, data(ctx)->rounds); in r_32_12_16_init_key()
/kernel/linux/linux-6.6/crypto/
H A Daria_generic.c28 unsigned int key_len) in aria_set_encrypt_key()
36 ck = &key_rc[(key_len - 16) / 2]; in aria_set_encrypt_key()
50 if (key_len > 16) { in aria_set_encrypt_key()
53 if (key_len > 24) { in aria_set_encrypt_key()
134 if (key_len > 16) { in aria_set_encrypt_key()
140 if (key_len > 24) { in aria_set_encrypt_key()
174 int aria_set_key(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) in aria_set_key() argument
178 if (key_len != 16 && key_len != 24 && key_len ! in aria_set_key()
27 aria_set_encrypt_key(struct aria_ctx *ctx, const u8 *in_key, unsigned int key_len) aria_set_encrypt_key() argument
[all...]
/kernel/linux/linux-5.10/arch/arm64/crypto/
H A Daes-neonbs-glue.c78 unsigned int key_len) in aesbs_setkey()
84 err = aes_expandkey(&rk, in_key, key_len); in aesbs_setkey()
88 ctx->rounds = 6 + key_len / 4; in aesbs_setkey()
137 unsigned int key_len) in aesbs_cbc_setkey()
143 err = aes_expandkey(&rk, in_key, key_len); in aesbs_cbc_setkey()
147 ctx->key.rounds = 6 + key_len / 4; in aesbs_cbc_setkey()
211 unsigned int key_len) in aesbs_ctr_setkey_sync()
216 err = aes_expandkey(&ctx->fallback, in_key, key_len); in aesbs_ctr_setkey_sync()
220 ctx->key.rounds = 6 + key_len / 4; in aesbs_ctr_setkey_sync()
271 unsigned int key_len) in aesbs_xts_setkey()
77 aesbs_setkey(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) aesbs_setkey() argument
136 aesbs_cbc_setkey(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) aesbs_cbc_setkey() argument
210 aesbs_ctr_setkey_sync(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) aesbs_ctr_setkey_sync() argument
270 aesbs_xts_setkey(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) aesbs_xts_setkey() argument
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
H A Deap_vendor_test.c152 const int key_len = 64; in eap_vendor_test_getKey() local
157 key = os_malloc(key_len); in eap_vendor_test_getKey()
161 os_memset(key, 0x11, key_len / 2); in eap_vendor_test_getKey()
162 os_memset(key + key_len / 2, 0x22, key_len / 2); in eap_vendor_test_getKey()
163 *len = key_len; in eap_vendor_test_getKey()
/kernel/linux/linux-6.6/drivers/staging/rtl8723bs/os_dep/
H A Dioctl_linux.c58 if (param_len < (u32)((u8 *)param->u.crypt.key - (u8 *)param) + param->u.crypt.key_len) { in wpa_set_encryption()
87 wep_key_len = param->u.crypt.key_len; in wpa_set_encryption()
155 memcpy(psta->dot118021x_UncstKey.skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len)); in wpa_set_encryption()
158 /* DEBUG_ERR(("\nset key length :param->u.crypt.key_len =%d\n", param->u.crypt.key_len)); */ in wpa_set_encryption()
169 memcpy(padapter->securitypriv.dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len)); in wpa_set_encryption()
171 if (param->u.crypt.key_len > 16) { in wpa_set_encryption()
181 /* printk("BIP key_len in wpa_set_encryption()
[all...]
/kernel/linux/linux-5.10/drivers/crypto/ccp/
H A Dccp-crypto-des3.c37 unsigned int key_len) in ccp_des3_setkey()
52 ctx->u.des3.key_len = key_len; in ccp_des3_setkey()
54 memcpy(ctx->u.des3.key, key, key_len); in ccp_des3_setkey()
55 sg_init_one(&ctx->u.des3.key_sg, ctx->u.des3.key, key_len); in ccp_des3_setkey()
69 if (!ctx->u.des3.key_len) in ccp_des3_crypt()
96 rctx->cmd.u.des3.key_len = ctx->u.des3.key_len; in ccp_des3_crypt()
123 ctx->u.des3.key_len = 0; in ccp_des3_init_tfm()
36 ccp_des3_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int key_len) ccp_des3_setkey() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A Dcrypto_wolfssl.c160 size_t key_len, size_t num_elem, in wolfssl_hmac_vector()
172 if (wc_HmacSetKey(&hmac, type, key, (word32) key_len) != 0) in wolfssl_hmac_vector()
185 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, in hmac_md5_vector() argument
188 return wolfssl_hmac_vector(WC_MD5, key, key_len, num_elem, addr, len, in hmac_md5_vector()
193 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_md5() argument
196 return hmac_md5_vector(key, key_len, 1, &data, &data_len, mac); in hmac_md5()
202 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, in hmac_sha1_vector() argument
205 return wolfssl_hmac_vector(WC_SHA, key, key_len, num_elem, addr, len, in hmac_sha1_vector()
210 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_sha1() argument
213 return hmac_sha1_vector(key, key_len, in hmac_sha1()
159 wolfssl_hmac_vector(int type, const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac, unsigned int mdlen) wolfssl_hmac_vector() argument
219 hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) hmac_sha256_vector() argument
227 hmac_sha256(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha256() argument
238 hmac_sha384_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) hmac_sha384_vector() argument
246 hmac_sha384(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha384() argument
257 hmac_sha512_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) hmac_sha512_vector() argument
265 hmac_sha512(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha512() argument
482 crypto_cipher_init(enum crypto_cipher_alg alg, const u8 *iv, const u8 *key, size_t key_len) crypto_cipher_init() argument
882 crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, size_t key_len) crypto_hash_init() argument
964 omac1_aes_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) omac1_aes_vector() argument
1806 word32 key_len = ecdh->ec->key.dp->size; crypto_ecdh_set_peerkey() local
[all...]
/kernel/linux/linux-5.10/arch/powerpc/include/asm/
H A Dsecvar.h17 int (*get)(const char *key, uint64_t key_len, u8 *data,
19 int (*get_next)(const char *key, uint64_t *key_len,
21 int (*set)(const char *key, uint64_t key_len, u8 *data,

Completed in 17 milliseconds

12345678910>>...45