Home
last modified time | relevance | path

Searched refs:keys (Results 1 – 11 of 11) sorted by relevance

/crypto/krb5/
A Dkrb5_api.c162 const struct krb5_buffer *keys, in krb5_prepare_encryption() argument
176 ret = crypto_aead_setkey(ci, keys->data, keys->len); in krb5_prepare_encryption()
211 struct krb5_buffer keys = {}; in crypto_krb5_prepare_encryption() local
214 ret = krb5->profile->derive_encrypt_keys(krb5, TK, usage, &keys, gfp); in crypto_krb5_prepare_encryption()
218 ci = krb5_prepare_encryption(krb5, &keys, gfp); in crypto_krb5_prepare_encryption()
224 kfree(keys.data); in crypto_krb5_prepare_encryption()
227 kfree(keys.data); in crypto_krb5_prepare_encryption()
279 struct krb5_buffer keys = {}; in crypto_krb5_prepare_checksum() local
288 ci = krb5_prepare_checksum(krb5, &keys, gfp); in crypto_krb5_prepare_checksum()
294 kfree(keys.data); in crypto_krb5_prepare_checksum()
[all …]
A Dselftest.c244 struct krb5_buffer K0 = {}, Ke = {}, Ki = {}, keys = {}; in krb5_test_one_enc() local
266 ret = krb5->profile->load_encrypt_keys(krb5, &Ke, &Ki, &keys, GFP_KERNEL); in krb5_test_one_enc()
295 ci = krb5_prepare_encryption(krb5, &keys, GFP_KERNEL); in krb5_test_one_enc()
367 clear_buf(&keys); in krb5_test_one_enc()
384 struct krb5_buffer K0 = {}, Kc = {}, keys = {}, plain = {}, mic = {}; in krb5_test_one_mic() local
400 ret = krb5->profile->load_checksum_key(krb5, &Kc, &keys, GFP_KERNEL); in krb5_test_one_mic()
482 clear_buf(&keys); in krb5_test_one_mic()
A Dinternal.h152 const struct krb5_buffer *keys,
/crypto/
A Dauthenc.c44 int crypto_authenc_extractkeys(struct crypto_authenc_keys *keys, const u8 *key, in crypto_authenc_extractkeys() argument
66 keys->enckeylen = be32_to_cpu(param->enckeylen); in crypto_authenc_extractkeys()
71 if (keylen < keys->enckeylen) in crypto_authenc_extractkeys()
74 keys->authkeylen = keylen - keys->enckeylen; in crypto_authenc_extractkeys()
75 keys->authkey = key; in crypto_authenc_extractkeys()
76 keys->enckey = key + keys->authkeylen; in crypto_authenc_extractkeys()
88 struct crypto_authenc_keys keys; in crypto_authenc_setkey() local
91 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in crypto_authenc_setkey()
97 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in crypto_authenc_setkey()
104 err = crypto_skcipher_setkey(enc, keys.enckey, keys.enckeylen); in crypto_authenc_setkey()
[all …]
A Dkrb5enc.c62 int crypto_krb5enc_extractkeys(struct crypto_authenc_keys *keys, const u8 *key, in crypto_krb5enc_extractkeys() argument
84 keys->enckeylen = be32_to_cpu(param->enckeylen); in crypto_krb5enc_extractkeys()
89 if (keylen < keys->enckeylen) in crypto_krb5enc_extractkeys()
92 keys->authkeylen = keylen - keys->enckeylen; in crypto_krb5enc_extractkeys()
93 keys->authkey = key; in crypto_krb5enc_extractkeys()
94 keys->enckey = key + keys->authkeylen; in crypto_krb5enc_extractkeys()
102 struct crypto_authenc_keys keys; in krb5enc_setkey() local
109 if (crypto_krb5enc_extractkeys(&keys, key, keylen) != 0) in krb5enc_setkey()
114 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in krb5enc_setkey()
120 err = crypto_skcipher_setkey(enc, keys.enckey, keys.enckeylen); in krb5enc_setkey()
[all …]
A Dauthencesn.c62 struct crypto_authenc_keys keys; in crypto_authenc_esn_setkey() local
65 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in crypto_authenc_esn_setkey()
71 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in crypto_authenc_esn_setkey()
78 err = crypto_skcipher_setkey(enc, keys.enckey, keys.enckeylen); in crypto_authenc_esn_setkey()
80 memzero_explicit(&keys, sizeof(keys)); in crypto_authenc_esn_setkey()
A Dessiv.c98 struct crypto_authenc_keys keys; in essiv_aead_setkey() local
109 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in essiv_aead_setkey()
114 crypto_shash_update(desc, keys.enckey, keys.enckeylen) ?: in essiv_aead_setkey()
115 crypto_shash_finup(desc, keys.authkey, keys.authkeylen, salt); in essiv_aead_setkey()
A DKconfig405 Anubis is a variable key length cipher which can use keys from
434 This is a variable key length cipher which can use keys from 32
642 ARC4 is a stream cipher using keys ranging from 8 bits to 2048
872 that the keys are presented in the same format used by the authenc
/crypto/asymmetric_keys/
A Dselftest.c17 const u8 *keys, size_t keys_len, in fips_signature_selftest() argument
36 ret = x509_load_certificate_list(keys, keys_len, keyring); in fips_signature_selftest()
A Dselftest.h8 const u8 *keys, size_t keys_len,
A DKconfig7 the asymmetric keys used for public key cryptographic operations such

Completed in 17 milliseconds