| /crypto/krb5/ |
| A D | selftest.c | 48 limit -= len; 55 len -= part; 133 if (VALID(result.len != prf.len)) { in krb5_test_one_prf() 355 pr_warn("BUF %*phN\n", plain.len, buf + conf.len); in krb5_test_one_enc() 417 len = plain.len; in krb5_test_one_mic() 421 if (CHECK(message_len != mic.len + plain.len)) { in krb5_test_one_mic() 423 message_len, mic.len + plain.len); in krb5_test_one_mic() 439 len = ret; in krb5_test_one_mic() 441 if (CHECK(len != plain.len + mic.len)) { in krb5_test_one_mic() 442 pr_warn("MIC length mismatch %zu != %u\n", len, plain.len + mic.len); in krb5_test_one_mic() [all …]
|
| A D | rfc3961_simplified.c | 112 if (WARN_ON(in->len != out->len)) in rfc3961_do_encrypt() 196 inbits = source->len; in rfc3961_nfold() 197 outbits = result->len; in rfc3961_nfold() 279 if (inkey->len != keylength || result->len != keylength) in rfc3961_calc_DK() 306 if (in_constant->len == inblock.len) in rfc3961_calc_DK() 323 n += outblock.len; in rfc3961_calc_DK() 403 buffer = kzalloc(round16(tmp1.len) + round16(derived_key.len), gfp); in rfc3961_calc_PRF() 414 tmp2.len = tmp1.len & ~(m - 1); in rfc3961_calc_PRF() 445 setkey->len = RTA_LENGTH(sizeof(*param)) + Ke.len + Ki.len; in authenc_derive_encrypt_keys() 483 setkey->len = RTA_LENGTH(sizeof(*param)) + Ke->len + Ki->len; in authenc_load_encrypt_keys() [all …]
|
| A D | krb5_kdf.c | 43 Tn.len = krb5->prf_len; in crypto_krb5_calc_PRFplus() 44 T_series.len = 0; in crypto_krb5_calc_PRFplus() 45 n_S.len = 4 + S->len; in crypto_krb5_calc_PRFplus() 47 buffer = kzalloc(round16(L + Tn.len) + round16(n_S.len), gfp); in crypto_krb5_calc_PRFplus() 52 n_S.data = buffer + round16(L + Tn.len); in crypto_krb5_calc_PRFplus() 53 memcpy(n_S.data + 4, S->data, S->len); in crypto_krb5_calc_PRFplus() 55 while (T_series.len < L) { in crypto_krb5_calc_PRFplus() 61 T_series.len += Tn.len; in crypto_krb5_calc_PRFplus() 95 key->len = krb5->Kc_len; in krb5_derive_Kc() 119 key->len = krb5->Ke_len; in krb5_derive_Ke() [all …]
|
| A D | rfc6803_camellia.c | 49 data.len = K.len + 4 + constant->len + 1 + 4; in rfc6803_calc_KDF_FEEDBACK_CMAC() 52 crypto_roundup(K.len) + in rfc6803_calc_KDF_FEEDBACK_CMAC() 53 crypto_roundup(data.len); in rfc6803_calc_KDF_FEEDBACK_CMAC() 67 crypto_roundup(K.len); in rfc6803_calc_KDF_FEEDBACK_CMAC() 69 p = data.data + K.len + 4; in rfc6803_calc_KDF_FEEDBACK_CMAC() 71 p += constant->len; in rfc6803_calc_KDF_FEEDBACK_CMAC() 85 memcpy(p, K.data, K.len); in rfc6803_calc_KDF_FEEDBACK_CMAC() 86 p += K.len; in rfc6803_calc_KDF_FEEDBACK_CMAC() 96 seg = min_t(size_t, result->len - offset, K.len); in rfc6803_calc_KDF_FEEDBACK_CMAC() 129 Kp.len = krb5->prf_len; in rfc6803_calc_PRF() [all …]
|
| A D | rfc8009_aes2.c | 45 if (WARN_ON(result->len != k / 8)) in rfc8009_calc_KDF_HMAC_SHA2() 51 ret = crypto_shash_setkey(shash, key->data, key->len); in rfc8009_calc_KDF_HMAC_SHA2() 60 data.len = 4 + label->len + 1 + context->len + 4; in rfc8009_calc_KDF_HMAC_SHA2() 63 crypto_roundup(data.len); in rfc8009_calc_KDF_HMAC_SHA2() 79 memcpy(p, label->data, label->len); in rfc8009_calc_KDF_HMAC_SHA2() 80 p += label->len; in rfc8009_calc_KDF_HMAC_SHA2() 82 memcpy(p, context->data, context->len); in rfc8009_calc_KDF_HMAC_SHA2() 83 p += context->len; in rfc8009_calc_KDF_HMAC_SHA2() 89 if (WARN_ON(p - (u8 *)data.data != data.len)) in rfc8009_calc_KDF_HMAC_SHA2() 92 K1.len = crypto_shash_digestsize(shash); in rfc8009_calc_KDF_HMAC_SHA2() [all …]
|
| /crypto/async_tx/ |
| A D | async_xor.c | 125 memset(dest_buf, 0, len); in do_sync_xor_offs() 188 src_cnt, len); in async_xor_offs() 205 unmap->len = len; in async_xor_offs() 212 len, DMA_TO_DEVICE); in async_xor_offs() 244 src_cnt, len, submit); in async_xor_offs() 277 src_cnt, len, submit); in async_xor() 294 src_cnt, len); in xor_val_chan() 345 len, DMA_TO_DEVICE); in async_xor_val_offs() 348 unmap->len = len; in async_xor_val_offs() 351 len, result, in async_xor_val_offs() [all …]
|
| A D | async_pq.c | 204 __func__, disks, len); in async_gen_syndrome() 209 unmap->len = len; in async_gen_syndrome() 228 len, DMA_BIDIRECTIONAL); in async_gen_syndrome() 238 len, DMA_BIDIRECTIONAL); in async_gen_syndrome() 278 disks, len); in pq_val_chan() 321 __func__, disks, len); in async_syndrome_val() 323 unmap->len = len; in async_syndrome_val() 327 offsets[i], len, in async_syndrome_val() 363 len, pqres, in async_syndrome_val() 385 __func__, disks, len); in async_syndrome_val() [all …]
|
| A D | async_memcpy.c | 33 unsigned int src_offset, size_t len, in async_memcpy() argument 37 &dest, 1, &src, 1, len); in async_memcpy() 45 if (unmap && is_dma_copy_aligned(device, src_offset, dest_offset, len)) { in async_memcpy() 54 unmap->addr[0] = dma_map_page(device->dev, src, src_offset, len, in async_memcpy() 57 unmap->addr[1] = dma_map_page(device->dev, dest, dest_offset, len, in async_memcpy() 59 unmap->len = len; in async_memcpy() 62 unmap->addr[0], len, in async_memcpy() 67 pr_debug("%s: (async) len: %zu\n", __func__, len); in async_memcpy() 73 pr_debug("%s: (sync) len: %zu\n", __func__, len); in async_memcpy() 81 memcpy(dest_buf, src_buf, len); in async_memcpy()
|
| /crypto/ |
| A D | algif_rng.c | 55 unsigned int len; member 80 if (len == 0) in _rng_recvmsg() 82 if (len > MAXSIZE) in _rng_recvmsg() 83 len = MAXSIZE; in _rng_recvmsg() 89 memset(result, 0, len); in _rng_recvmsg() 104 return err ? err : len; in _rng_recvmsg() 140 if (len > MAXSIZE) { in rng_test_sendmsg() 157 ctx->addtl_len = len; in rng_test_sendmsg() 251 ctx->len = len; in rng_accept_parent() 297 if (len > MAXSIZE) in rng_setentropy() [all …]
|
| A D | testmgr.h | 10220 .len = 8, 10226 .len = 8, 10232 .len = 8, 10250 .len = 8, 10368 .len = 8, 10376 .len = 8, 10384 .len = 8, 10604 .len = 8, 10612 .len = 8, 10620 .len = 8, [all …]
|
| A D | drbg.c | 324 size_t len = curr->len; in drbg_ctr_bcc() local 337 len--; in drbg_ctr_bcc() 606 len = ret; in drbg_ctr_generate() 608 return len; in drbg_ctr_generate() 735 return len; in drbg_hmac_generate() 958 return len; in drbg_hash_hashgen() 991 len = ret; in drbg_hash_generate() 1005 return len; in drbg_hash_generate() 1421 if (len) in drbg_generate() 1429 if (len) in drbg_generate() [all …]
|
| A D | ecdh_helper.c | 33 int crypto_ecdh_encode_key(char *buf, unsigned int len, in crypto_ecdh_encode_key() argument 39 .len = len in crypto_ecdh_encode_key() 45 if (len != crypto_ecdh_key_len(params)) in crypto_ecdh_encode_key() 56 int crypto_ecdh_decode_key(const char *buf, unsigned int len, in crypto_ecdh_decode_key() argument 62 if (unlikely(!buf || len < ECDH_KPP_SECRET_MIN_SIZE)) in crypto_ecdh_decode_key() 69 if (unlikely(len < secret.len)) in crypto_ecdh_decode_key() 73 if (secret.len != crypto_ecdh_key_len(params)) in crypto_ecdh_decode_key()
|
| A D | dh_helper.c | 40 int crypto_dh_encode_key(char *buf, unsigned int len, const struct dh *params) in crypto_dh_encode_key() argument 43 u8 * const end = ptr + len; in crypto_dh_encode_key() 46 .len = len in crypto_dh_encode_key() 49 if (unlikely(!len)) in crypto_dh_encode_key() 66 int __crypto_dh_decode_key(const char *buf, unsigned int len, struct dh *params) in __crypto_dh_decode_key() argument 71 if (unlikely(!buf || len < DH_KPP_SECRET_MIN_SIZE)) in __crypto_dh_decode_key() 81 if (secret.len != crypto_dh_key_len(params)) in __crypto_dh_decode_key() 94 int crypto_dh_decode_key(const char *buf, unsigned int len, struct dh *params) in crypto_dh_decode_key() argument 98 err = __crypto_dh_decode_key(buf, len, params); in crypto_dh_decode_key()
|
| A D | crc32.c | 58 unsigned int len) in crc32_update() argument 62 *crcp = crc32_le(*crcp, data, len); in crc32_update() 67 static int __crc32_finup(u32 *crcp, const u8 *data, unsigned int len, u8 *out) in __crc32_finup() argument 69 put_unaligned_le32(crc32_le(*crcp, data, len), out); in __crc32_finup() 74 unsigned int len, u8 *out) in crc32_finup() argument 76 return __crc32_finup(shash_desc_ctx(desc), data, len, out); in crc32_finup() 88 unsigned int len, u8 *out) in crc32_digest() argument 90 return __crc32_finup(crypto_shash_ctx(desc->tfm), data, len, out); in crc32_digest()
|
| A D | sha512.c | 74 const u8 *data, unsigned int len) in crypto_sha384_update() argument 76 sha384_update(SHA384_CTX(desc), data, len); in crypto_sha384_update() 87 const u8 *data, unsigned int len, u8 *out) in crypto_sha384_digest() argument 89 sha384(data, len, out); in crypto_sha384_digest() 126 const u8 *data, unsigned int len) in crypto_sha512_update() argument 128 sha512_update(SHA512_CTX(desc), data, len); in crypto_sha512_update() 141 sha512(data, len, out); in crypto_sha512_digest() 174 const u8 *data, unsigned int len) in crypto_hmac_sha384_update() argument 187 const u8 *data, unsigned int len, in crypto_hmac_sha384_digest() argument 226 const u8 *data, unsigned int len) in crypto_hmac_sha512_update() argument [all …]
|
| A D | sha256.c | 72 const u8 *data, unsigned int len) in crypto_sha224_update() argument 74 sha224_update(SHA224_CTX(desc), data, len); in crypto_sha224_update() 85 const u8 *data, unsigned int len, u8 *out) in crypto_sha224_digest() argument 87 sha224(data, len, out); in crypto_sha224_digest() 120 const u8 *data, unsigned int len) in crypto_sha256_update() argument 122 sha256_update(SHA256_CTX(desc), data, len); in crypto_sha256_update() 135 sha256(data, len, out); in crypto_sha256_digest() 168 const u8 *data, unsigned int len) in crypto_hmac_sha224_update() argument 181 const u8 *data, unsigned int len, in crypto_hmac_sha224_digest() argument 220 const u8 *data, unsigned int len) in crypto_hmac_sha256_update() argument [all …]
|
| A D | michael_mic.c | 60 unsigned int len) in michael_update() argument 66 if (flen > len) in michael_update() 67 flen = len; in michael_update() 71 len -= flen; in michael_update() 81 while (len >= 4) { in michael_update() 85 len -= 4; in michael_update() 88 if (len > 0) { in michael_update() 89 mctx->pending_len = len; in michael_update() 90 memcpy(&mctx->pending, data, len); in michael_update()
|
| A D | algif_skcipher.c | 109 size_t len = 0; in _skcipher_recvmsg() local 132 if (ctx->more || len < ctx->used) { in _skcipher_recvmsg() 133 len -= len % bs; in _skcipher_recvmsg() 152 af_alg_pull_tsgl(sk, len, areq->tsgl, 0); in _skcipher_recvmsg() 175 areq->outlen = len; in _skcipher_recvmsg() 210 return err ? err : len; in _skcipher_recvmsg() 370 sock_kfree_s(sk, ctx, ctx->len); in skcipher_sock_destruct() 379 unsigned int len = sizeof(*ctx); in skcipher_accept_parent_nokey() local 384 memset(ctx, 0, len); in skcipher_accept_parent_nokey() 389 sock_kfree_s(sk, ctx, len); in skcipher_accept_parent_nokey() [all …]
|
| A D | algif_hash.c | 26 unsigned int len; member 70 size_t len, max_pages, npages; in hash_sendmsg() local 123 len = err; in hash_sendmsg() 133 ctx->result, len); in hash_sendmsg() 159 copied += len; in hash_sendmsg() 189 if (len > ds) in hash_recvmsg() 190 len = ds; in hash_recvmsg() 191 else if (len < ds) in hash_recvmsg() 223 return err ?: len; in hash_recvmsg() 404 sock_kfree_s(sk, ctx, ctx->len); in hash_sock_destruct() [all …]
|
| A D | shash.c | 100 unsigned int len, u8 *out), in crypto_shash_op_and_zero() argument 105 err = op(desc, data, len, out); in crypto_shash_op_and_zero() 157 len -= nbytes - err - *blenp; in crypto_shash_finup() 162 memcpy(buf + *blenp, data, len); in crypto_shash_finup() 163 *blenp += len; in crypto_shash_finup() 167 len = *blenp; in crypto_shash_finup() 172 data, len, out); in crypto_shash_finup() 177 unsigned int len, u8 *out) in shash_default_digest() argument 184 unsigned int len, u8 *out) in crypto_shash_digest() argument 192 data, len, out); in crypto_shash_digest() [all …]
|
| A D | lskcipher.c | 96 while (len >= bs) { in crypto_lskcipher_crypt_unaligned() 111 len -= chunk; in crypto_lskcipher_crypt_unaligned() 114 err = len ? -EINVAL : 0; in crypto_lskcipher_crypt_unaligned() 124 u8 *dst, unsigned len, u8 *iv, in crypto_lskcipher_crypt() argument 127 unsigned len, u8 *iv, in crypto_lskcipher_crypt() 141 u8 *dst, unsigned len, u8 *iv) in crypto_lskcipher_encrypt() argument 161 unsigned len, u8 *ivs, in crypto_lskcipher_crypt_sg() argument 534 int len; in lskcipher_alloc_instance_simple() local 539 if (len < 2) in lskcipher_alloc_instance_simple() 542 if (ecb_name[len - 1] != ')') in lskcipher_alloc_instance_simple() [all …]
|
| A D | sha1.c | 68 const u8 *data, unsigned int len) in crypto_sha1_update() argument 70 sha1_update(SHA1_CTX(desc), data, len); in crypto_sha1_update() 81 const u8 *data, unsigned int len, u8 *out) in crypto_sha1_digest() argument 83 sha1(data, len, out); in crypto_sha1_digest() 114 const u8 *data, unsigned int len) in crypto_hmac_sha1_update() argument 116 hmac_sha1_update(HMAC_SHA1_CTX(desc), data, len); in crypto_hmac_sha1_update() 127 const u8 *data, unsigned int len, u8 *out) in crypto_hmac_sha1_digest() argument 129 hmac_sha1(HMAC_SHA1_KEY(desc->tfm), data, len, out); in crypto_hmac_sha1_digest()
|
| A D | jitterentropy.h | 3 extern void *jent_kvzalloc(unsigned int len); 4 extern void jent_kvzfree(void *ptr, unsigned int len); 5 extern void *jent_zalloc(unsigned int len); 17 unsigned int len);
|
| A D | xcbc.c | 68 unsigned int len) in crypto_xcbc_digest_update() argument 80 len -= bs; in crypto_xcbc_digest_update() 81 } while (len >= bs); in crypto_xcbc_digest_update() 82 return len; in crypto_xcbc_digest_update() 86 unsigned int len, u8 *out) in crypto_xcbc_digest_finup() argument 95 crypto_xor(prev, src, len); in crypto_xcbc_digest_finup() 96 if (len != bs) { in crypto_xcbc_digest_finup() 97 prev[len] ^= 0x80; in crypto_xcbc_digest_finup()
|
| /crypto/asymmetric_keys/ |
| A D | asymmetric_type.c | 51 int len; in find_asymmetric_key() local 55 len = id_0->len; in find_asymmetric_key() 58 len = id_1->len; in find_asymmetric_key() 61 len = id_2->len; in find_asymmetric_key() 83 p = bin2hex(p, lookup, len); in find_asymmetric_key() 149 kid->len = len_1 + len_2; in asymmetric_key_generate_id() 166 if (kid1->len != kid2->len) in asymmetric_key_id_same() 183 if (kid1->len < kid2->len) in asymmetric_key_id_partial() 185 return memcmp(kid1->data + (kid1->len - kid2->len), in asymmetric_key_id_partial() 217 match_id->len = hexlen; in __asymmetric_key_hex_to_key_id() [all …]
|