| /crypto/krb5/ |
| A D | krb5_api.c | 162 const struct krb5_buffer *keys, in krb5_prepare_encryption() argument 176 ret = crypto_aead_setkey(ci, keys->data, keys->len); in krb5_prepare_encryption() 211 struct krb5_buffer keys = {}; in crypto_krb5_prepare_encryption() local 214 ret = krb5->profile->derive_encrypt_keys(krb5, TK, usage, &keys, gfp); in crypto_krb5_prepare_encryption() 218 ci = krb5_prepare_encryption(krb5, &keys, gfp); in crypto_krb5_prepare_encryption() 224 kfree(keys.data); in crypto_krb5_prepare_encryption() 227 kfree(keys.data); in crypto_krb5_prepare_encryption() 279 struct krb5_buffer keys = {}; in crypto_krb5_prepare_checksum() local 288 ci = krb5_prepare_checksum(krb5, &keys, gfp); in crypto_krb5_prepare_checksum() 294 kfree(keys.data); in crypto_krb5_prepare_checksum() [all …]
|
| A D | selftest.c | 244 struct krb5_buffer K0 = {}, Ke = {}, Ki = {}, keys = {}; in krb5_test_one_enc() local 266 ret = krb5->profile->load_encrypt_keys(krb5, &Ke, &Ki, &keys, GFP_KERNEL); in krb5_test_one_enc() 295 ci = krb5_prepare_encryption(krb5, &keys, GFP_KERNEL); in krb5_test_one_enc() 367 clear_buf(&keys); in krb5_test_one_enc() 384 struct krb5_buffer K0 = {}, Kc = {}, keys = {}, plain = {}, mic = {}; in krb5_test_one_mic() local 400 ret = krb5->profile->load_checksum_key(krb5, &Kc, &keys, GFP_KERNEL); in krb5_test_one_mic() 482 clear_buf(&keys); in krb5_test_one_mic()
|
| A D | internal.h | 152 const struct krb5_buffer *keys,
|
| /crypto/ |
| A D | authenc.c | 44 int crypto_authenc_extractkeys(struct crypto_authenc_keys *keys, const u8 *key, in crypto_authenc_extractkeys() argument 66 keys->enckeylen = be32_to_cpu(param->enckeylen); in crypto_authenc_extractkeys() 71 if (keylen < keys->enckeylen) in crypto_authenc_extractkeys() 74 keys->authkeylen = keylen - keys->enckeylen; in crypto_authenc_extractkeys() 75 keys->authkey = key; in crypto_authenc_extractkeys() 76 keys->enckey = key + keys->authkeylen; in crypto_authenc_extractkeys() 88 struct crypto_authenc_keys keys; in crypto_authenc_setkey() local 91 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in crypto_authenc_setkey() 97 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in crypto_authenc_setkey() 104 err = crypto_skcipher_setkey(enc, keys.enckey, keys.enckeylen); in crypto_authenc_setkey() [all …]
|
| A D | krb5enc.c | 62 int crypto_krb5enc_extractkeys(struct crypto_authenc_keys *keys, const u8 *key, in crypto_krb5enc_extractkeys() argument 84 keys->enckeylen = be32_to_cpu(param->enckeylen); in crypto_krb5enc_extractkeys() 89 if (keylen < keys->enckeylen) in crypto_krb5enc_extractkeys() 92 keys->authkeylen = keylen - keys->enckeylen; in crypto_krb5enc_extractkeys() 93 keys->authkey = key; in crypto_krb5enc_extractkeys() 94 keys->enckey = key + keys->authkeylen; in crypto_krb5enc_extractkeys() 102 struct crypto_authenc_keys keys; in krb5enc_setkey() local 109 if (crypto_krb5enc_extractkeys(&keys, key, keylen) != 0) in krb5enc_setkey() 114 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in krb5enc_setkey() 120 err = crypto_skcipher_setkey(enc, keys.enckey, keys.enckeylen); in krb5enc_setkey() [all …]
|
| A D | authencesn.c | 62 struct crypto_authenc_keys keys; in crypto_authenc_esn_setkey() local 65 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in crypto_authenc_esn_setkey() 71 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in crypto_authenc_esn_setkey() 78 err = crypto_skcipher_setkey(enc, keys.enckey, keys.enckeylen); in crypto_authenc_esn_setkey() 80 memzero_explicit(&keys, sizeof(keys)); in crypto_authenc_esn_setkey()
|
| A D | essiv.c | 98 struct crypto_authenc_keys keys; in essiv_aead_setkey() local 109 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in essiv_aead_setkey() 114 crypto_shash_update(desc, keys.enckey, keys.enckeylen) ?: in essiv_aead_setkey() 115 crypto_shash_finup(desc, keys.authkey, keys.authkeylen, salt); in essiv_aead_setkey()
|
| A D | Kconfig | 405 Anubis is a variable key length cipher which can use keys from 434 This is a variable key length cipher which can use keys from 32 642 ARC4 is a stream cipher using keys ranging from 8 bits to 2048 872 that the keys are presented in the same format used by the authenc
|
| /crypto/asymmetric_keys/ |
| A D | selftest.c | 17 const u8 *keys, size_t keys_len, in fips_signature_selftest() argument 36 ret = x509_load_certificate_list(keys, keys_len, keyring); in fips_signature_selftest()
|
| A D | selftest.h | 8 const u8 *keys, size_t keys_len,
|
| A D | Kconfig | 7 the asymmetric keys used for public key cryptographic operations such
|