/linux-master/include/crypto/ |
H A D | xts.h | 12 const u8 *key, unsigned int keylen) 18 if (keylen % 2) 25 if (fips_enabled && keylen != 32 && keylen != 64) 34 !crypto_memneq(key, key + (keylen / 2), keylen / 2)) 11 xts_verify_key(struct crypto_skcipher *tfm, const u8 *key, unsigned int keylen) argument
|
H A D | sm2.h | 18 const void *key, unsigned int keylen, void *dgst); 21 const void *key, unsigned int keylen, 20 sm2_compute_z_digest(struct shash_desc *desc, const void *key, unsigned int keylen, void *dgst) argument
|
H A D | blake2s.h | 47 const void *key, size_t keylen) 49 state->h[0] = BLAKE2S_IV0 ^ (0x01010000 | keylen << 8 | outlen); 63 if (keylen) { 64 memcpy(state->buf, key, keylen); 65 memset(&state->buf[keylen], 0, BLAKE2S_BLOCK_SIZE - keylen); 78 const size_t keylen) 81 !key || !keylen || keylen > BLAKE2S_KEY_SIZE)); 83 __blake2s_init(state, outlen, key, keylen); 46 __blake2s_init(struct blake2s_state *state, size_t outlen, const void *key, size_t keylen) argument 76 blake2s_init_key(struct blake2s_state *state, const size_t outlen, const void *key, const size_t keylen) argument 89 blake2s(u8 *out, const u8 *in, const u8 *key, const size_t outlen, const size_t inlen, const size_t keylen) argument [all...] |
H A D | serpent.h | 22 unsigned int keylen); 23 int serpent_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen);
|
H A D | blake2b.h | 43 const void *key, size_t keylen) 45 state->h[0] = BLAKE2B_IV0 ^ (0x01010000 | keylen << 8 | outlen); 59 if (keylen) { 60 memcpy(state->buf, key, keylen); 61 memset(&state->buf[keylen], 0, BLAKE2B_BLOCK_SIZE - keylen); 42 __blake2b_init(struct blake2b_state *state, size_t outlen, const void *key, size_t keylen) argument
|
H A D | cast6.h | 18 int __cast6_setkey(struct cast6_ctx *ctx, const u8 *key, unsigned int keylen); 19 int cast6_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen);
|
H A D | sig.h | 118 * @keylen: length of the key (not including other data) 123 const void *key, unsigned int keylen); 134 * @keylen: length of the key (not including other data) 139 const void *key, unsigned int keylen);
|
H A D | authenc.h | 30 unsigned int keylen);
|
H A D | kdf_sp800108.h | 41 * @keylen This length of the key buffer. 58 const u8 *key, size_t keylen,
|
H A D | des.h | 42 int des_expand_key(struct des_ctx *ctx, const u8 *key, unsigned int keylen); 55 unsigned int keylen);
|
H A D | aes.h | 37 static inline int aes_check_keylen(unsigned int keylen) argument 39 switch (keylen) {
|
/linux-master/include/linux/ |
H A D | sed-opal-key.h | 15 int sed_read_key(char *keyname, char *key, u_int *keylen); 16 int sed_write_key(char *keyname, char *key, u_int keylen); 19 int sed_read_key(char *keyname, char *key, u_int *keylen) { argument 23 int sed_write_key(char *keyname, char *key, u_int keylen) { argument
|
/linux-master/drivers/staging/wlan-ng/ |
H A D | p80211wep.c | 44 /* keylen in bytes! */ 46 int wep_change_key(struct wlandevice *wlandev, int keynum, u8 *key, int keylen) argument 48 if (keylen < 0) 50 if (keylen >= MAX_KEYLEN) 59 wlandev->wep_keylens[keynum] = keylen; 60 memcpy(wlandev->wep_keys[keynum], key, keylen); 72 u32 i, j, k, crc, keylen; local 92 keylen = wlandev->wep_keylens[keyidx]; 94 if (keylen == 0) 98 memcpy(key + 3, wlandev->wep_keys[keyidx], keylen); 143 u32 i, j, k, crc, keylen; local [all...] |
/linux-master/fs/cachefiles/ |
H A D | key.c | 41 unsigned int acc, i, n, nle, nbe, keylen = object->cookie->key_len; local 45 _enter(",%u,%*phN", keylen, keylen, key); 47 BUG_ON(keylen > NAME_MAX - 3); 50 for (i = 0; i < keylen; i++) { 57 len = 1 + keylen; 63 memcpy(name + 1, key, keylen); 71 n = round_up(keylen, 4); 81 b64len = DIV_ROUND_UP(keylen, 3); 82 pad = b64len * 3 - keylen; [all...] |
/linux-master/include/crypto/internal/ |
H A D | blake2b.h | 69 unsigned int keylen; member in struct:blake2b_tfm_ctx 73 const u8 *key, unsigned int keylen) 77 if (keylen == 0 || keylen > BLAKE2B_KEY_SIZE) 80 memcpy(tctx->key, key, keylen); 81 tctx->keylen = keylen; 92 __blake2b_init(state, outlen, tctx->key, tctx->keylen); 72 crypto_blake2b_setkey(struct crypto_shash *tfm, const u8 *key, unsigned int keylen) argument
|
/linux-master/drivers/crypto/caam/ |
H A D | caamhash_desc.c | 36 if (state != OP_ALG_AS_UPDATE && adata->keylen) { 46 adata->keylen, CLASS_2 | 98 append_key_as_imm(desc, adata->key_virt, adata->keylen, 99 adata->keylen, CLASS_1 | KEY_DEST_CLASS_REG); 103 append_key(desc, adata->key_dma, adata->keylen, 106 append_key_as_imm(desc, adata->key_virt, adata->keylen, 107 adata->keylen, CLASS_1 | 138 append_fifo_store(desc, adata->key_dma, adata->keylen,
|
H A D | key_gen.c | 45 struct alginfo * const adata, const u8 *key_in, u32 keylen, 54 adata->keylen = split_key_len(adata->algtype & OP_ALG_ALGSEL_MASK); 57 local_max = max(keylen, adata->keylen_pad); 59 dev_dbg(jrdev, "split keylen %d split keylen padded %d\n", 60 adata->keylen, adata->keylen_pad); 62 DUMP_PREFIX_ADDRESS, 16, 4, key_in, keylen, 1); 73 memcpy(key_out, key_in, keylen); 82 append_key(desc, dma_addr, keylen, CLASS_2 | KEY_DEST_CLASS_REG); 100 append_fifo_store(desc, dma_addr, adata->keylen, 44 gen_split_key(struct device *jrdev, u8 *key_out, struct alginfo * const adata, const u8 *key_in, u32 keylen, int max_keylen) argument [all...] |
/linux-master/fs/hfs/ |
H A D | bfind.c | 58 u16 off, len, keylen; local 69 keylen = hfs_brec_keylen(bnode, rec); 70 if (keylen == 0) { 74 hfs_bnode_read(bnode, fd->key, off, keylen); 88 keylen = hfs_brec_keylen(bnode, e); 89 if (keylen == 0) { 93 hfs_bnode_read(bnode, fd->key, off, keylen); 98 fd->keylength = keylen; 99 fd->entryoffset = off + keylen; 100 fd->entrylength = len - keylen; 179 u16 off, len, keylen; local [all...] |
/linux-master/arch/s390/include/asm/ |
H A D | pkey.h | 21 * @param keylen size of the key blob in bytes 25 int pkey_keyblob2pkey(const u8 *key, u32 keylen,
|
/linux-master/arch/powerpc/platforms/powernv/ |
H A D | opal-secvar.c | 73 static int opal_get_next_variable(const char *key, u64 *keylen, u64 keybufsize) argument 77 if (!key || !keylen) 80 *keylen = cpu_to_be64(*keylen); 82 rc = opal_secvar_get_next(key, keylen, keybufsize); 84 *keylen = be64_to_cpu(*keylen);
|
/linux-master/crypto/ |
H A D | cipher.c | 21 unsigned int keylen) 29 absize = keylen + alignmask; 35 memcpy(alignbuffer, key, keylen); 36 ret = cia->cia_setkey(crypto_cipher_tfm(tfm), alignbuffer, keylen); 37 memset(alignbuffer, 0, keylen); 44 const u8 *key, unsigned int keylen) 49 if (keylen < cia->cia_min_keysize || keylen > cia->cia_max_keysize) 53 return setkey_unaligned(tfm, key, keylen); 55 return cia->cia_setkey(crypto_cipher_tfm(tfm), key, keylen); 20 setkey_unaligned(struct crypto_cipher *tfm, const u8 *key, unsigned int keylen) argument 43 crypto_cipher_setkey(struct crypto_cipher *tfm, const u8 *key, unsigned int keylen) argument [all...] |
/linux-master/arch/riscv/crypto/ |
H A D | aes-macros.S | 93 // v1-v11 (for AES-128), v1-v13 (for AES-192), or v1-v15 (for AES-256). \keylen 96 .macro aes_encrypt data, keylen 107 .if \keylen == 128 109 .elseif \keylen == 192 123 .macro aes_decrypt data, keylen 124 .if \keylen == 128 126 .elseif \keylen == 192 150 .macro aes_crypt data, enc, keylen 152 aes_encrypt \data, \keylen 154 aes_decrypt \data, \keylen [all...] |
H A D | aes-riscv64-zvkned.S | 59 .macro __aes_crypt_zvkned enc, keylen 61 aes_crypt v16, \enc, \keylen 86 .macro __aes_ecb_crypt enc, keylen 94 aes_crypt v16, \enc, \keylen 125 .macro aes_cbc_encrypt keylen 130 aes_encrypt v16, \keylen // Encrypt 141 .macro aes_cbc_decrypt keylen 150 aes_decrypt v20, \keylen // Decrypt the blocks 188 .macro aes_cbc_cts_encrypt keylen 202 aes_encrypt v16, \keylen // Encryp [all...] |
/linux-master/fs/hfsplus/ |
H A D | bfind.c | 117 u16 off, len, keylen; local 129 keylen = hfs_brec_keylen(bnode, rec); 130 if (keylen == 0) { 134 hfs_bnode_read(bnode, fd->key, off, keylen); 143 keylen = hfs_brec_keylen(bnode, e); 144 if (keylen == 0) { 148 hfs_bnode_read(bnode, fd->key, off, keylen); 154 fd->keylength = keylen; 155 fd->entryoffset = off + keylen; 156 fd->entrylength = len - keylen; 236 u16 off, len, keylen; local [all...] |
/linux-master/drivers/crypto/cavium/cpt/ |
H A D | cptvf_algs.c | 233 u32 keylen) 238 const u8 *key2 = key + (keylen / 2); 240 err = xts_verify_key(cipher, key, keylen); 243 ctx->key_len = keylen; 244 memcpy(ctx->enc_key, key1, keylen / 2); 245 memcpy(ctx->enc_key + KEY2_OFFSET, key2, keylen / 2); 261 static int cvm_validate_keylen(struct cvm_enc_ctx *ctx, u32 keylen) argument 263 if ((keylen == 16) || (keylen == 24) || (keylen 232 cvm_xts_setkey(struct crypto_skcipher *cipher, const u8 *key, u32 keylen) argument 288 cvm_setkey(struct crypto_skcipher *cipher, const u8 *key, u32 keylen, u8 cipher_type) argument 302 cvm_cbc_aes_setkey(struct crypto_skcipher *cipher, const u8 *key, u32 keylen) argument 308 cvm_ecb_aes_setkey(struct crypto_skcipher *cipher, const u8 *key, u32 keylen) argument 314 cvm_cbc_des3_setkey(struct crypto_skcipher *cipher, const u8 *key, u32 keylen) argument 321 cvm_ecb_des3_setkey(struct crypto_skcipher *cipher, const u8 *key, u32 keylen) argument [all...] |