| /crypto/ |
| A D | aria_generic.c | 29 unsigned int key_len) in aria_set_encrypt_key() argument 36 ck = &key_rc[(key_len - 16) / 2]; in aria_set_encrypt_key() 50 if (key_len > 16) { in aria_set_encrypt_key() 53 if (key_len > 24) { in aria_set_encrypt_key() 134 if (key_len > 16) { in aria_set_encrypt_key() 140 if (key_len > 24) { in aria_set_encrypt_key() 174 int aria_set_key(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) in aria_set_key() argument 178 if (key_len != 16 && key_len != 24 && key_len != 32) in aria_set_key() 185 ctx->key_length = key_len; in aria_set_key() 186 ctx->rounds = (key_len + 32) / 4; in aria_set_key() [all …]
|
| A D | aes_generic.c | 1137 unsigned int key_len) in crypto_aes_set_key() argument 1141 return aes_expandkey(ctx, in_key, key_len); in crypto_aes_set_key() 1181 const int key_len = ctx->key_length; in crypto_aes_encrypt() local 1188 if (key_len > 24) { in crypto_aes_encrypt() 1193 if (key_len > 16) { in crypto_aes_encrypt() 1250 const int key_len = ctx->key_length; in crypto_aes_decrypt() local 1258 if (key_len > 24) { in crypto_aes_decrypt() 1263 if (key_len > 16) { in crypto_aes_decrypt()
|
| A D | rsa_helper.c | 163 unsigned int key_len) in rsa_parse_pub_key() argument 165 return asn1_ber_decoder(&rsapubkey_decoder, rsa_key, key, key_len); in rsa_parse_pub_key() 182 unsigned int key_len) in rsa_parse_priv_key() argument 184 return asn1_ber_decoder(&rsaprivkey_decoder, rsa_key, key, key_len); in rsa_parse_priv_key()
|
| A D | anubis.c | 46 int key_len; // in bits member 463 unsigned int key_len) in anubis_setkey() argument 470 switch (key_len) { in anubis_setkey() 478 ctx->key_len = key_len * 8; in anubis_setkey() 479 N = ctx->key_len >> 5; in anubis_setkey()
|
| A D | twofish_common.c | 570 unsigned int key_len) in __twofish_setkey() argument 586 if (key_len % 8) in __twofish_setkey() 610 if (key_len == 24 || key_len == 32) { /* 192- or 256-bit key */ in __twofish_setkey() 622 if (key_len == 32) { /* 256-bit key */ in __twofish_setkey() 654 } else if (key_len == 24) { /* 192-bit key */ in __twofish_setkey() 686 int twofish_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int key_len) in twofish_setkey() argument 688 return __twofish_setkey(crypto_tfm_ctx(tfm), key, key_len); in twofish_setkey()
|
| A D | ecrdsa.c | 40 unsigned int key_len; /* @key length (bytes) */ member 172 ctx->key_len = vlen; in ecrdsa_parse_pub_key() 227 if ((ctx->key_len != (2 * 256 / 8) && in ecrdsa_set_pub_key() 228 ctx->key_len != (2 * 512 / 8)) || in ecrdsa_set_pub_key() 229 ctx->key_len != ctx->curve->g.ndigits * sizeof(u64) * 2) in ecrdsa_set_pub_key() 232 ndigits = ctx->key_len / sizeof(u64) / 2; in ecrdsa_set_pub_key()
|
| A D | sm4_generic.c | 32 unsigned int key_len) in sm4_setkey() argument 36 return sm4_expandkey(ctx, in_key, key_len); in sm4_setkey()
|
| A D | aes_ti.c | 13 unsigned int key_len) in aesti_set_key() argument 17 return aes_expandkey(ctx, in_key, key_len); in aesti_set_key()
|
| A D | testmgr.h | 233 .key_len = 316, 289 .key_len = 607, 432 .key_len = 269, 675 .key_len = 49, 707 .key_len = 49, 739 .key_len = 49, 771 .key_len = 49, 804 .key_len = 49, 843 .key_len = 65, 876 .key_len = 65, [all …]
|
| A D | arc4.c | 20 unsigned int key_len) in crypto_arc4_setkey() argument 24 return arc4_setkey(ctx, in_key, key_len); in crypto_arc4_setkey()
|
| A D | sm4.c | 120 unsigned int key_len) in sm4_expandkey() argument 126 if (key_len != SM4_KEY_SIZE) in sm4_expandkey()
|
| A D | simd.c | 51 unsigned int key_len) in simd_skcipher_setkey() argument 59 return crypto_skcipher_setkey(child, key, key_len); in simd_skcipher_setkey() 269 unsigned int key_len) in simd_aead_setkey() argument 277 return crypto_aead_setkey(child, key, key_len); in simd_aead_setkey()
|
| A D | cast6_generic.c | 106 int __cast6_setkey(struct cast6_ctx *c, const u8 *in_key, unsigned int key_len) in __cast6_setkey() argument 112 if (key_len % 4 != 0) in __cast6_setkey() 116 memcpy(p_key, in_key, key_len); in __cast6_setkey()
|
| A D | camellia_generic.c | 961 unsigned int key_len) in camellia_set_key() argument 966 if (key_len != 16 && key_len != 24 && key_len != 32) in camellia_set_key() 969 cctx->key_length = key_len; in camellia_set_key() 971 switch (key_len) { in camellia_set_key()
|
| A D | tea.c | 43 unsigned int key_len) in tea_setkey() argument 111 unsigned int key_len) in xtea_setkey() argument
|
| A D | cast5_generic.c | 475 int cast5_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int key_len) in cast5_setkey() argument 484 c->rr = key_len <= 10 ? 1 : 0; in cast5_setkey() 487 memcpy(p_key, key, key_len); in cast5_setkey()
|
| A D | khazad.c | 757 unsigned int key_len) in khazad_setkey() argument
|
| A D | seed.c | 328 unsigned int key_len) in seed_set_key() argument
|
| A D | testmgr.c | 3882 vecs->key_len); in test_akcipher_one() 3885 vecs->key_len); in test_akcipher_one() 4039 key = kmalloc(vecs->key_len + 2 * sizeof(u32) + vecs->param_len, in test_sig_one() 4045 memcpy(key, vecs->key, vecs->key_len); in test_sig_one() 4046 ptr = key + vecs->key_len; in test_sig_one() 4052 err = crypto_sig_set_pubkey(tfm, key, vecs->key_len); in test_sig_one() 4054 err = crypto_sig_set_privkey(tfm, key, vecs->key_len); in test_sig_one()
|
| A D | af_alg.c | 270 *datalen = tkp->key_len; in key_data_ptr_trusted()
|
| /crypto/krb5/ |
| A D | rfc3962_aes.c | 80 .key_len = 16, 103 .key_len = 32,
|
| A D | rfc6803_camellia.c | 202 .key_len = 16, 225 .key_len = 32,
|
| A D | rfc8009_aes2.c | 327 .key_len = 16, 350 .key_len = 32,
|
| A D | rfc3961_simplified.c | 277 keylength = krb5->key_len; in rfc3961_calc_DK()
|