/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | sha1.h | 14 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, 16 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, 18 int sha1_prf(const u8 *key, size_t key_len, const char *label, 20 int sha1_t_prf(const u8 *key, size_t key_len, const char *label,
|
H A D | sha256.h | 14 int hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, 16 int hmac_sha256(const u8 *key, size_t key_len, const u8 *data, 18 int sha256_prf(const u8 *key, size_t key_len, const char *label, 20 int sha256_prf_bits(const u8 *key, size_t key_len, const char *label,
|
H A D | sha384.h | 14 int hmac_sha384_vector(const u8 *key, size_t key_len, size_t num_elem, 16 int hmac_sha384(const u8 *key, size_t key_len, const u8 *data, 18 int sha384_prf(const u8 *key, size_t key_len, const char *label, 20 int sha384_prf_bits(const u8 *key, size_t key_len, const char *label,
|
H A D | sha512.h | 14 int hmac_sha512_vector(const u8 *key, size_t key_len, size_t num_elem, 16 int hmac_sha512(const u8 *key, size_t key_len, const u8 *data, 18 int sha512_prf(const u8 *key, size_t key_len, const char *label, 20 int sha512_prf_bits(const u8 *key, size_t key_len, const char *label,
|
H A D | crypto_wolfssl.c | 160 size_t key_len, size_t num_elem, in wolfssl_hmac_vector() 172 if (wc_HmacSetKey(&hmac, type, key, (word32) key_len) != 0) in wolfssl_hmac_vector() 185 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, in hmac_md5_vector() argument 188 return wolfssl_hmac_vector(WC_MD5, key, key_len, num_elem, addr, len, in hmac_md5_vector() 193 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_md5() argument 196 return hmac_md5_vector(key, key_len, 1, &data, &data_len, mac); in hmac_md5() 202 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, in hmac_sha1_vector() argument 205 return wolfssl_hmac_vector(WC_SHA, key, key_len, num_elem, addr, len, in hmac_sha1_vector() 210 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_sha1() argument 213 return hmac_sha1_vector(key, key_len, in hmac_sha1() 159 wolfssl_hmac_vector(int type, const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac, unsigned int mdlen) wolfssl_hmac_vector() argument 219 hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) hmac_sha256_vector() argument 227 hmac_sha256(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha256() argument 238 hmac_sha384_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) hmac_sha384_vector() argument 246 hmac_sha384(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha384() argument 257 hmac_sha512_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) hmac_sha512_vector() argument 265 hmac_sha512(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha512() argument 482 crypto_cipher_init(enum crypto_cipher_alg alg, const u8 *iv, const u8 *key, size_t key_len) crypto_cipher_init() argument 886 crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, size_t key_len) crypto_hash_init() argument 968 omac1_aes_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) omac1_aes_vector() argument 1788 word32 key_len = ecdh->ec->key.dp->size; crypto_ecdh_set_peerkey() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | ikev2_common.h | 254 size_t key_len; member 260 size_t key_len; member 266 size_t key_len; member 271 int ikev2_integ_hash(int alg, const u8 *key, size_t key_len, const u8 *data, 274 int ikev2_prf_hash(int alg, const u8 *key, size_t key_len, 277 int ikev2_prf_plus(int alg, const u8 *key, size_t key_len, 281 int ikev2_encr_encrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, 283 int ikev2_encr_decrypt(int alg, const u8 *key, size_t key_len, const u8 *iv,
|
H A D | eap_eke_common.c | 183 static int eap_eke_prf(u8 prf, const u8 *key, size_t key_len, const u8 *data, in eap_eke_prf() argument 200 return hmac_sha1_vector(key, key_len, num_elem, addr, len, res); in eap_eke_prf() 202 return hmac_sha256_vector(key, key_len, num_elem, addr, len, in eap_eke_prf() 208 static int eap_eke_prf_hmac_sha1(const u8 *key, size_t key_len, const u8 *data, in eap_eke_prf_hmac_sha1() argument 228 ret = hmac_sha1_vector(key, key_len, 2, &addr[1], in eap_eke_prf_hmac_sha1() 231 ret = hmac_sha1_vector(key, key_len, 3, addr, vlen, in eap_eke_prf_hmac_sha1() 249 static int eap_eke_prf_hmac_sha256(const u8 *key, size_t key_len, const u8 *data, in eap_eke_prf_hmac_sha256() argument 269 ret = hmac_sha256_vector(key, key_len, 2, &addr[1], in eap_eke_prf_hmac_sha256() 272 ret = hmac_sha256_vector(key, key_len, 3, addr, vlen, in eap_eke_prf_hmac_sha256() 290 static int eap_eke_prfplus(u8 prf, const u8 *key, size_t key_len, in eap_eke_prfplus() argument 310 size_t key_len = 16; /* Only AES-128-CBC is used here */ eap_eke_derive_key() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | ikev2_common.h | 254 size_t key_len; member 260 size_t key_len; member 266 size_t key_len; member 271 int ikev2_integ_hash(int alg, const u8 *key, size_t key_len, const u8 *data, 274 int ikev2_prf_hash(int alg, const u8 *key, size_t key_len, 277 int ikev2_prf_plus(int alg, const u8 *key, size_t key_len, 281 int ikev2_encr_encrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, 283 int ikev2_encr_decrypt(int alg, const u8 *key, size_t key_len, const u8 *iv,
|
H A D | eap_eke_common.c | 183 static int eap_eke_prf(u8 prf, const u8 *key, size_t key_len, const u8 *data, in eap_eke_prf() argument 200 return hmac_sha1_vector(key, key_len, num_elem, addr, len, res); in eap_eke_prf() 202 return hmac_sha256_vector(key, key_len, num_elem, addr, len, in eap_eke_prf() 208 static int eap_eke_prf_hmac_sha1(const u8 *key, size_t key_len, const u8 *data, in eap_eke_prf_hmac_sha1() argument 228 ret = hmac_sha1_vector(key, key_len, 2, &addr[1], in eap_eke_prf_hmac_sha1() 231 ret = hmac_sha1_vector(key, key_len, 3, addr, vlen, in eap_eke_prf_hmac_sha1() 249 static int eap_eke_prf_hmac_sha256(const u8 *key, size_t key_len, const u8 *data, in eap_eke_prf_hmac_sha256() argument 269 ret = hmac_sha256_vector(key, key_len, 2, &addr[1], in eap_eke_prf_hmac_sha256() 272 ret = hmac_sha256_vector(key, key_len, 3, addr, vlen, in eap_eke_prf_hmac_sha256() 290 static int eap_eke_prfplus(u8 prf, const u8 *key, size_t key_len, in eap_eke_prfplus() argument 310 size_t key_len = 16; /* Only AES-128-CBC is used here */ eap_eke_derive_key() local [all...] |
/kernel/linux/linux-5.10/net/mac80211/ |
H A D | fils_aead.c | 66 static int aes_siv_encrypt(const u8 *key, size_t key_len, in aes_siv_encrypt() argument 79 key_len /= 2; /* S2V key || CTR key */ in aes_siv_encrypt() 91 res = crypto_shash_setkey(tfm, key, key_len); in aes_siv_encrypt() 122 res = crypto_skcipher_setkey(tfm2, key + key_len, key_len); in aes_siv_encrypt() 144 static int aes_siv_decrypt(const u8 *key, size_t key_len, in aes_siv_decrypt() argument 159 key_len /= 2; /* S2V key || CTR key */ in aes_siv_decrypt() 179 res = crypto_skcipher_setkey(tfm2, key + key_len, key_len); in aes_siv_decrypt() 206 res = crypto_shash_setkey(tfm, key, key_len); in aes_siv_decrypt() [all...] |
/kernel/linux/linux-6.6/net/mac80211/ |
H A D | fils_aead.c | 66 static int aes_siv_encrypt(const u8 *key, size_t key_len, in aes_siv_encrypt() argument 79 key_len /= 2; /* S2V key || CTR key */ in aes_siv_encrypt() 91 res = crypto_shash_setkey(tfm, key, key_len); in aes_siv_encrypt() 122 res = crypto_skcipher_setkey(tfm2, key + key_len, key_len); in aes_siv_encrypt() 144 static int aes_siv_decrypt(const u8 *key, size_t key_len, in aes_siv_decrypt() argument 159 key_len /= 2; /* S2V key || CTR key */ in aes_siv_decrypt() 179 res = crypto_skcipher_setkey(tfm2, key + key_len, key_len); in aes_siv_decrypt() 206 res = crypto_shash_setkey(tfm, key, key_len); in aes_siv_decrypt() [all...] |
/kernel/linux/linux-5.10/arch/arm/crypto/ |
H A D | aes-neonbs-glue.c | 66 unsigned int key_len) in aesbs_setkey() 72 err = aes_expandkey(&rk, in_key, key_len); in aesbs_setkey() 76 ctx->rounds = 6 + key_len / 4; in aesbs_setkey() 125 unsigned int key_len) in aesbs_cbc_setkey() 131 err = aes_expandkey(&rk, in_key, key_len); in aesbs_cbc_setkey() 135 ctx->key.rounds = 6 + key_len / 4; in aesbs_cbc_setkey() 142 return crypto_skcipher_setkey(ctx->enc_tfm, in_key, key_len); in aesbs_cbc_setkey() 214 unsigned int key_len) in aesbs_ctr_setkey_sync() 219 err = aes_expandkey(&ctx->fallback, in_key, key_len); in aesbs_ctr_setkey_sync() 223 ctx->key.rounds = 6 + key_len / in aesbs_ctr_setkey_sync() 65 aesbs_setkey(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) aesbs_setkey() argument 124 aesbs_cbc_setkey(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) aesbs_cbc_setkey() argument 213 aesbs_ctr_setkey_sync(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) aesbs_ctr_setkey_sync() argument 297 aesbs_xts_setkey(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) aesbs_xts_setkey() argument [all...] |
/kernel/linux/linux-6.6/arch/arm/crypto/ |
H A D | aes-neonbs-glue.c | 69 unsigned int key_len) in aesbs_setkey() 75 err = aes_expandkey(&rk, in_key, key_len); in aesbs_setkey() 79 ctx->rounds = 6 + key_len / 4; in aesbs_setkey() 128 unsigned int key_len) in aesbs_cbc_setkey() 134 err = aes_expandkey(&rk, in_key, key_len); in aesbs_cbc_setkey() 138 ctx->key.rounds = 6 + key_len / 4; in aesbs_cbc_setkey() 145 return crypto_skcipher_setkey(ctx->enc_tfm, in_key, key_len); in aesbs_cbc_setkey() 217 unsigned int key_len) in aesbs_ctr_setkey_sync() 222 err = aes_expandkey(&ctx->fallback, in_key, key_len); in aesbs_ctr_setkey_sync() 226 ctx->key.rounds = 6 + key_len / in aesbs_ctr_setkey_sync() 68 aesbs_setkey(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) aesbs_setkey() argument 127 aesbs_cbc_setkey(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) aesbs_cbc_setkey() argument 216 aesbs_ctr_setkey_sync(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) aesbs_ctr_setkey_sync() argument 293 aesbs_xts_setkey(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) aesbs_xts_setkey() argument [all...] |
/kernel/linux/linux-5.10/drivers/crypto/bcm/ |
H A D | spu.c | 649 flow_log(" key: %d\n", cipher_parms->key_len); in spum_create_request() 650 flow_dump(" key: ", cipher_parms->key_buf, cipher_parms->key_len); in spum_create_request() 656 flow_log(" authkey: %d\n", hash_parms->key_len); in spum_create_request() 657 flow_dump(" authkey: ", hash_parms->key_buf, hash_parms->key_len); in spum_create_request() 705 if (hash_parms->key_len) { in spum_create_request() 706 memcpy(ptr, hash_parms->key_buf, hash_parms->key_len); in spum_create_request() 707 ptr += hash_parms->key_len; in spum_create_request() 708 buf_len += hash_parms->key_len; in spum_create_request() 709 sctx_words += hash_parms->key_len / 4; in spum_create_request() 739 if (cipher_parms->key_len) { in spum_create_request() [all...] |
/kernel/linux/linux-6.6/drivers/crypto/bcm/ |
H A D | spu.c | 647 flow_log(" key: %d\n", cipher_parms->key_len); in spum_create_request() 648 flow_dump(" key: ", cipher_parms->key_buf, cipher_parms->key_len); in spum_create_request() 654 flow_log(" authkey: %d\n", hash_parms->key_len); in spum_create_request() 655 flow_dump(" authkey: ", hash_parms->key_buf, hash_parms->key_len); in spum_create_request() 703 if (hash_parms->key_len) { in spum_create_request() 704 memcpy(ptr, hash_parms->key_buf, hash_parms->key_len); in spum_create_request() 705 ptr += hash_parms->key_len; in spum_create_request() 706 buf_len += hash_parms->key_len; in spum_create_request() 707 sctx_words += hash_parms->key_len / 4; in spum_create_request() 737 if (cipher_parms->key_len) { in spum_create_request() [all...] |
/kernel/linux/linux-6.6/include/keys/ |
H A D | trusted-type.h | 28 unsigned int key_len; member 68 int (*get_random)(unsigned char *key, size_t key_len); 86 pr_info("key_len %d\n", p->key_len); in dump_payload() 88 16, 1, p->key, p->key_len, 0); in dump_payload()
|
/third_party/node/deps/openssl/openssl/crypto/evp/ |
H A D | e_rc5.c | 75 const int key_len = EVP_CIPHER_CTX_get_key_length(ctx); in r_32_12_16_init_key() local 77 if (key_len > 255 || key_len < 0) { in r_32_12_16_init_key() 81 return RC5_32_set_key(&data(ctx)->ks, key_len, key, data(ctx)->rounds); in r_32_12_16_init_key()
|
/third_party/openssl/crypto/evp/ |
H A D | e_rc5.c | 75 const int key_len = EVP_CIPHER_CTX_get_key_length(ctx); in r_32_12_16_init_key() local 77 if (key_len > 255 || key_len < 0) { in r_32_12_16_init_key() 81 return RC5_32_set_key(&data(ctx)->ks, key_len, key, data(ctx)->rounds); in r_32_12_16_init_key()
|
/kernel/linux/linux-6.6/crypto/ |
H A D | aria_generic.c | 28 unsigned int key_len) in aria_set_encrypt_key() 36 ck = &key_rc[(key_len - 16) / 2]; in aria_set_encrypt_key() 50 if (key_len > 16) { in aria_set_encrypt_key() 53 if (key_len > 24) { in aria_set_encrypt_key() 134 if (key_len > 16) { in aria_set_encrypt_key() 140 if (key_len > 24) { in aria_set_encrypt_key() 174 int aria_set_key(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) in aria_set_key() argument 178 if (key_len != 16 && key_len != 24 && key_len ! in aria_set_key() 27 aria_set_encrypt_key(struct aria_ctx *ctx, const u8 *in_key, unsigned int key_len) aria_set_encrypt_key() argument [all...] |
/kernel/linux/linux-5.10/arch/arm64/crypto/ |
H A D | aes-neonbs-glue.c | 78 unsigned int key_len) in aesbs_setkey() 84 err = aes_expandkey(&rk, in_key, key_len); in aesbs_setkey() 88 ctx->rounds = 6 + key_len / 4; in aesbs_setkey() 137 unsigned int key_len) in aesbs_cbc_setkey() 143 err = aes_expandkey(&rk, in_key, key_len); in aesbs_cbc_setkey() 147 ctx->key.rounds = 6 + key_len / 4; in aesbs_cbc_setkey() 211 unsigned int key_len) in aesbs_ctr_setkey_sync() 216 err = aes_expandkey(&ctx->fallback, in_key, key_len); in aesbs_ctr_setkey_sync() 220 ctx->key.rounds = 6 + key_len / 4; in aesbs_ctr_setkey_sync() 271 unsigned int key_len) in aesbs_xts_setkey() 77 aesbs_setkey(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) aesbs_setkey() argument 136 aesbs_cbc_setkey(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) aesbs_cbc_setkey() argument 210 aesbs_ctr_setkey_sync(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) aesbs_ctr_setkey_sync() argument 270 aesbs_xts_setkey(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) aesbs_xts_setkey() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
H A D | eap_vendor_test.c | 152 const int key_len = 64; in eap_vendor_test_getKey() local 157 key = os_malloc(key_len); in eap_vendor_test_getKey() 161 os_memset(key, 0x11, key_len / 2); in eap_vendor_test_getKey() 162 os_memset(key + key_len / 2, 0x22, key_len / 2); in eap_vendor_test_getKey() 163 *len = key_len; in eap_vendor_test_getKey()
|
/kernel/linux/linux-6.6/drivers/staging/rtl8723bs/os_dep/ |
H A D | ioctl_linux.c | 58 if (param_len < (u32)((u8 *)param->u.crypt.key - (u8 *)param) + param->u.crypt.key_len) { in wpa_set_encryption() 87 wep_key_len = param->u.crypt.key_len; in wpa_set_encryption() 155 memcpy(psta->dot118021x_UncstKey.skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len)); in wpa_set_encryption() 158 /* DEBUG_ERR(("\nset key length :param->u.crypt.key_len =%d\n", param->u.crypt.key_len)); */ in wpa_set_encryption() 169 memcpy(padapter->securitypriv.dot118021XGrpKey[param->u.crypt.idx].skey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len)); in wpa_set_encryption() 171 if (param->u.crypt.key_len > 16) { in wpa_set_encryption() 181 /* printk("BIP key_len in wpa_set_encryption() [all...] |
/kernel/linux/linux-5.10/drivers/crypto/ccp/ |
H A D | ccp-crypto-des3.c | 37 unsigned int key_len) in ccp_des3_setkey() 52 ctx->u.des3.key_len = key_len; in ccp_des3_setkey() 54 memcpy(ctx->u.des3.key, key, key_len); in ccp_des3_setkey() 55 sg_init_one(&ctx->u.des3.key_sg, ctx->u.des3.key, key_len); in ccp_des3_setkey() 69 if (!ctx->u.des3.key_len) in ccp_des3_crypt() 96 rctx->cmd.u.des3.key_len = ctx->u.des3.key_len; in ccp_des3_crypt() 123 ctx->u.des3.key_len = 0; in ccp_des3_init_tfm() 36 ccp_des3_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int key_len) ccp_des3_setkey() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | crypto_wolfssl.c | 160 size_t key_len, size_t num_elem, in wolfssl_hmac_vector() 172 if (wc_HmacSetKey(&hmac, type, key, (word32) key_len) != 0) in wolfssl_hmac_vector() 185 int hmac_md5_vector(const u8 *key, size_t key_len, size_t num_elem, in hmac_md5_vector() argument 188 return wolfssl_hmac_vector(WC_MD5, key, key_len, num_elem, addr, len, in hmac_md5_vector() 193 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_md5() argument 196 return hmac_md5_vector(key, key_len, 1, &data, &data_len, mac); in hmac_md5() 202 int hmac_sha1_vector(const u8 *key, size_t key_len, size_t num_elem, in hmac_sha1_vector() argument 205 return wolfssl_hmac_vector(WC_SHA, key, key_len, num_elem, addr, len, in hmac_sha1_vector() 210 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_sha1() argument 213 return hmac_sha1_vector(key, key_len, in hmac_sha1() 159 wolfssl_hmac_vector(int type, const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac, unsigned int mdlen) wolfssl_hmac_vector() argument 219 hmac_sha256_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) hmac_sha256_vector() argument 227 hmac_sha256(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha256() argument 238 hmac_sha384_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) hmac_sha384_vector() argument 246 hmac_sha384(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha384() argument 257 hmac_sha512_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) hmac_sha512_vector() argument 265 hmac_sha512(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) hmac_sha512() argument 482 crypto_cipher_init(enum crypto_cipher_alg alg, const u8 *iv, const u8 *key, size_t key_len) crypto_cipher_init() argument 882 crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, size_t key_len) crypto_hash_init() argument 964 omac1_aes_vector(const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) omac1_aes_vector() argument 1806 word32 key_len = ecdh->ec->key.dp->size; crypto_ecdh_set_peerkey() local [all...] |
/kernel/linux/linux-5.10/arch/powerpc/include/asm/ |
H A D | secvar.h | 17 int (*get)(const char *key, uint64_t key_len, u8 *data, 19 int (*get_next)(const char *key, uint64_t *key_len, 21 int (*set)(const char *key, uint64_t key_len, u8 *data,
|