/linux-master/arch/arm64/crypto/ |
H A D | aes-ce-setkey.h | 4 unsigned int key_len); 6 unsigned int key_len);
|
H A D | aes-ce-glue.c | 75 unsigned int key_len) 84 u32 kwords = key_len / sizeof(u32); 88 if (key_len != AES_KEYSIZE_128 && 89 key_len != AES_KEYSIZE_192 && 90 key_len != AES_KEYSIZE_256) 93 ctx->key_length = key_len; 107 if (key_len == AES_KEYSIZE_192) { 112 } else if (key_len == AES_KEYSIZE_256) { 143 unsigned int key_len) 147 return ce_aes_expandkey(ctx, in_key, key_len); 74 ce_aes_expandkey(struct crypto_aes_ctx *ctx, const u8 *in_key, unsigned int key_len) argument 142 ce_aes_setkey(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) argument [all...] |
/linux-master/include/crypto/ |
H A D | twofish.h | 22 unsigned int key_len); 23 int twofish_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int key_len);
|
H A D | blowfish.h | 22 unsigned int key_len);
|
H A D | arc4.h | 20 int arc4_setkey(struct arc4_ctx *ctx, const u8 *in_key, unsigned int key_len);
|
H A D | aes.h | 52 unsigned int key_len); 58 * @key_len: The length of the supplied key. 69 unsigned int key_len);
|
H A D | sm4.h | 32 * @key_len: The length of the supplied key. 38 unsigned int key_len);
|
/linux-master/arch/powerpc/include/asm/ |
H A D | secvar.h | 18 int (*get)(const char *key, u64 key_len, u8 *data, u64 *data_size); 19 int (*get_next)(const char *key, u64 *key_len, u64 keybufsize); 20 int (*set)(const char *key, u64 key_len, u8 *data, u64 data_size);
|
/linux-master/arch/sparc/crypto/ |
H A D | camellia_glue.c | 31 int key_len; member in struct:camellia_sparc64_ctx 35 unsigned int key_len, u64 *decrypt_key); 38 unsigned int key_len) 43 if (key_len != 16 && key_len != 24 && key_len != 32) 46 ctx->key_len = key_len; 49 key_len, &ctx->decrypt_key[0]); 54 const u8 *in_key, unsigned int key_len) 37 camellia_set_key(struct crypto_tfm *tfm, const u8 *_in_key, unsigned int key_len) argument 53 camellia_set_key_skcipher(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) argument [all...] |
/linux-master/arch/x86/crypto/ |
H A D | aes_ctrby8_avx-x86_64.S | 109 * do_aes num_in_par load_keys key_len 112 .macro do_aes b, k, key_len, xctr 115 .set klen, \key_len 400 .macro do_aes_load val, key_len, xctr 401 do_aes \val, 1, \key_len, \xctr 404 .macro do_aes_noload val, key_len, xctr 405 do_aes \val, 0, \key_len, \xctr 410 .macro do_aes_ctrmain key_len, xctr 412 jb .Ldo_return2\xctr\key_len 425 jz .Lmult_of_8_blks\xctr\key_len [all...] |
/linux-master/include/crypto/internal/ |
H A D | rsa.h | 51 unsigned int key_len); 54 unsigned int key_len);
|
/linux-master/drivers/firmware/efi/ |
H A D | apple-properties.c | 57 u32 key_len, val_len, entry_len; local 61 if (sizeof(key_len) > remaining) 64 key_len = *(typeof(key_len) *)ptr; 65 if (key_len + sizeof(val_len) > remaining || 66 key_len < sizeof(key_len) + sizeof(efi_char16_t) || 67 *(efi_char16_t *)(ptr + sizeof(key_len)) == 0) { 73 val_len = *(typeof(val_len) *)(ptr + key_len); 74 if (key_len [all...] |
/linux-master/net/mac80211/ |
H A D | aes_gmac.h | 16 size_t key_len);
|
H A D | aes_gcm.h | 32 ieee80211_aes_gcm_key_setup_encrypt(const u8 key[], size_t key_len) argument 35 key_len, IEEE80211_GCMP_MIC_LEN);
|
H A D | aes_ccm.h | 15 ieee80211_aes_key_setup_encrypt(const u8 key[], size_t key_len, size_t mic_len) argument 17 return aead_key_setup_encrypt("ccm(aes)", key, key_len, mic_len);
|
H A D | aes_cmac.h | 13 size_t key_len);
|
/linux-master/include/keys/ |
H A D | trusted-type.h | 28 unsigned int key_len; member in struct:trusted_key_payload 68 int (*get_random)(unsigned char *key, size_t key_len); 86 pr_info("key_len %d\n", p->key_len); 88 16, 1, p->key, p->key_len, 0);
|
/linux-master/fs/smb/common/ |
H A D | arc4.h | 20 int cifs_arc4_setkey(struct arc4_ctx *ctx, const u8 *in_key, unsigned int key_len);
|
/linux-master/arch/s390/crypto/ |
H A D | aes_s390.c | 45 int key_len; member in struct:s390_aes_ctx 56 int key_len; member in struct:s390_xts_ctx 73 unsigned int key_len) 81 return crypto_cipher_setkey(sctx->fallback.cip, in_key, key_len); 85 unsigned int key_len) 91 fc = (key_len == 16) ? CPACF_KM_AES_128 : 92 (key_len == 24) ? CPACF_KM_AES_192 : 93 (key_len == 32) ? CPACF_KM_AES_256 : 0; 98 return setkey_fallback_cip(tfm, in_key, key_len); 100 sctx->key_len 72 setkey_fallback_cip(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) argument 84 aes_set_key(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) argument 201 ecb_aes_set_key(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) argument 297 cbc_aes_set_key(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) argument 390 xts_aes_set_key(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) argument 529 ctr_aes_set_key(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) argument [all...] |
/linux-master/drivers/crypto/nx/ |
H A D | nx-aes-ctr.c | 24 unsigned int key_len) 31 switch (key_len) { 49 memcpy(csbcpb->cpb.aes_ctr.key, in_key, key_len); 56 unsigned int key_len) 60 if (key_len < CTR_RFC3686_NONCE_SIZE) 64 in_key + key_len - CTR_RFC3686_NONCE_SIZE, 67 key_len -= CTR_RFC3686_NONCE_SIZE; 69 return ctr_aes_nx_set_key(tfm, in_key, key_len); 22 ctr_aes_nx_set_key(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) argument 54 ctr3686_aes_nx_set_key(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) argument
|
/linux-master/arch/powerpc/platforms/pseries/ |
H A D | plpks-secvar.c | 75 static int plpks_get_variable(const char *key, u64 key_len, u8 *data, argument 81 // We subtract 1 from key_len because we don't need to include the 83 var.name = kcalloc(key_len - 1, sizeof(wchar_t), GFP_KERNEL); 86 rc = utf8s_to_utf16s(key, key_len - 1, UTF16_LITTLE_ENDIAN, (wchar_t *)var.name, 87 key_len - 1); 115 static int plpks_set_variable(const char *key, u64 key_len, u8 *data, argument 127 // We subtract 1 from key_len because we don't need to include the 129 var.name = kcalloc(key_len - 1, sizeof(wchar_t), GFP_KERNEL); 132 rc = utf8s_to_utf16s(key, key_len - 1, UTF16_LITTLE_ENDIAN, (wchar_t *)var.name, 133 key_len [all...] |
/linux-master/drivers/firmware/google/ |
H A D | vpd_decode.h | 28 typedef int vpd_decode_callback(const u8 *key, u32 key_len,
|
/linux-master/drivers/crypto/ccp/ |
H A D | ccp-crypto-aes-xts.c | 76 unsigned int key_len) 82 ret = xts_verify_key(tfm, key, key_len); 89 switch (key_len) { 91 memcpy(ctx->u.aes.key, key, key_len); 95 memcpy(ctx->u.aes.key, key, key_len); 98 ctx->u.aes.key_len = key_len / 2; 99 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); 101 return crypto_skcipher_setkey(ctx->u.aes.tfm_skcipher, key, key_len); 116 if (!ctx->u.aes.key_len) 75 ccp_aes_xts_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int key_len) argument [all...] |
H A D | ccp-crypto-aes.c | 39 unsigned int key_len) 44 switch (key_len) { 58 ctx->u.aes.key_len = key_len; 60 memcpy(ctx->u.aes.key, key, key_len); 61 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); 74 if (!ctx->u.aes.key_len) 100 rctx->cmd.u.aes.key_len = ctx->u.aes.key_len; 125 ctx->u.aes.key_len 38 ccp_aes_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int key_len) argument 144 ccp_aes_rfc3686_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int key_len) argument [all...] |
/linux-master/drivers/nvme/common/ |
H A D | auth.c | 153 u32 nvme_auth_key_struct_size(u32 key_len) argument 157 return struct_size(&key, key, key_len); 167 int ret, key_len; local 178 key_len = base64_decode(secret, allocated_len, key->key); 179 if (key_len < 0) { 181 key_len); 182 ret = key_len; 186 if (key_len != 36 && key_len != 52 && 187 key_len ! 244 int ret, key_len; local [all...] |