| /include/crypto/ |
| A D | xts.h | 12 const u8 *key, unsigned int keylen) in xts_verify_key() argument 18 if (keylen % 2) in xts_verify_key() 25 if (fips_enabled && keylen != 32 && keylen != 64) in xts_verify_key() 34 !crypto_memneq(key, key + (keylen / 2), keylen / 2)) in xts_verify_key()
|
| A D | blake2s.h | 47 const void *key, size_t keylen) in __blake2s_init() argument 63 if (keylen) { in __blake2s_init() 64 memcpy(state->buf, key, keylen); in __blake2s_init() 65 memset(&state->buf[keylen], 0, BLAKE2S_BLOCK_SIZE - keylen); in __blake2s_init() 78 const size_t keylen) in blake2s_init_key() argument 81 !key || !keylen || keylen > BLAKE2S_KEY_SIZE)); in blake2s_init_key() 83 __blake2s_init(state, outlen, key, keylen); in blake2s_init_key() 91 const size_t keylen) in blake2s() argument 96 outlen > BLAKE2S_HASH_SIZE || keylen > BLAKE2S_KEY_SIZE || in blake2s() 97 (!key && keylen))); in blake2s() [all …]
|
| A D | sig.h | 61 const void *key, unsigned int keylen); 63 const void *key, unsigned int keylen); 238 const void *key, unsigned int keylen) in crypto_sig_set_pubkey() argument 242 return alg->set_pub_key(tfm, key, keylen); in crypto_sig_set_pubkey() 259 const void *key, unsigned int keylen) in crypto_sig_set_privkey() argument 263 return alg->set_priv_key(tfm, key, keylen); in crypto_sig_set_privkey()
|
| A D | authenc.h | 30 unsigned int keylen); 32 unsigned int keylen);
|
| A D | cast6.h | 18 int __cast6_setkey(struct cast6_ctx *ctx, const u8 *key, unsigned int keylen); 19 int cast6_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen);
|
| A D | serpent.h | 22 unsigned int keylen); 23 int serpent_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen);
|
| A D | akcipher.h | 88 unsigned int keylen); 90 unsigned int keylen); 350 unsigned int keylen) in crypto_akcipher_set_pub_key() argument 354 return alg->set_pub_key(tfm, key, keylen); in crypto_akcipher_set_pub_key() 372 unsigned int keylen) in crypto_akcipher_set_priv_key() argument 376 return alg->set_priv_key(tfm, key, keylen); in crypto_akcipher_set_priv_key()
|
| A D | des.h | 42 int des_expand_key(struct des_ctx *ctx, const u8 *key, unsigned int keylen); 55 unsigned int keylen);
|
| A D | blake2b.h | 43 size_t keylen) in __blake2b_init() argument 45 state->h[0] = BLAKE2B_IV0 ^ (0x01010000 | keylen << 8 | outlen); in __blake2b_init()
|
| A D | aes.h | 37 static inline int aes_check_keylen(unsigned int keylen) in aes_check_keylen() argument 39 switch (keylen) { in aes_check_keylen()
|
| A D | kdf_sp800108.h | 58 const u8 *key, size_t keylen,
|
| A D | cast5.h | 19 int cast5_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen);
|
| A D | skcipher.h | 153 unsigned int keylen); 204 unsigned int keylen); 615 const u8 *key, unsigned int keylen); 618 const u8 *key, unsigned int keylen) in crypto_sync_skcipher_setkey() argument 620 return crypto_skcipher_setkey(&tfm->base, key, keylen); in crypto_sync_skcipher_setkey() 640 const u8 *key, unsigned int keylen);
|
| A D | nhpoly1305.h | 62 const u8 *key, unsigned int keylen);
|
| /include/crypto/internal/ |
| A D | blake2b.h | 40 unsigned int keylen; member 44 const u8 *key, unsigned int keylen) in crypto_blake2b_setkey() argument 48 if (keylen > BLAKE2B_KEY_SIZE) in crypto_blake2b_setkey() 53 memcpy(tctx->key, key, keylen); in crypto_blake2b_setkey() 54 memset(tctx->key + keylen, 0, BLAKE2B_BLOCK_SIZE - keylen); in crypto_blake2b_setkey() 55 tctx->keylen = keylen; in crypto_blake2b_setkey() 66 __blake2b_init(state, outlen, tctx->keylen); in crypto_blake2b_init() 67 return tctx->keylen ? in crypto_blake2b_init()
|
| A D | des.h | 112 int keylen) in verify_aead_des_key() argument 114 if (keylen != DES_KEY_SIZE) in verify_aead_des_key() 120 int keylen) in verify_aead_des3_key() argument 122 if (keylen != DES3_EDE_KEY_SIZE) in verify_aead_des3_key()
|
| A D | rsa.h | 62 const void *key, unsigned int keylen) in rsa_set_key() argument 69 err = crypto_akcipher_set_pub_key(child, key, keylen); in rsa_set_key() 71 err = crypto_akcipher_set_priv_key(child, key, keylen); in rsa_set_key()
|
| A D | kdf_selftest.h | 15 size_t keylen; member 26 const u8 *key, size_t keylen, in kdf_test() argument 48 ret = crypto_kdf_setkey(kmd, test->key, test->keylen, in kdf_test()
|
| /include/linux/ |
| A D | sed-opal-key.h | 15 int sed_read_key(char *keyname, char *key, u_int *keylen); 16 int sed_write_key(char *keyname, char *key, u_int keylen); 19 int sed_read_key(char *keyname, char *key, u_int *keylen) { in sed_read_key() argument 23 int sed_write_key(char *keyname, char *key, u_int keylen) { in sed_write_key() argument
|
| A D | evm.h | 16 extern int evm_set_key(void *key, size_t keylen); 41 static inline int evm_set_key(void *key, size_t keylen) in evm_set_key() argument
|
| A D | bpf_crypto.h | 10 int (*setkey)(void *tfm, const u8 *key, unsigned int keylen);
|
| /include/xen/interface/io/ |
| A D | netif.h | 284 unsigned int keylen, in xen_netif_toeplitz_hash() argument 294 prefix |= (keyi < keylen) ? key[keyi] : 0; in xen_netif_toeplitz_hash() 312 prefix |= (keyi < keylen) ? key[keyi] : 0; in xen_netif_toeplitz_hash()
|
| /include/keys/ |
| A D | trusted_tpm.h | 32 unsigned int keylen, unsigned char *h1, 38 unsigned int keylen, ...);
|
| /include/net/netfilter/ |
| A D | nf_conntrack_count.h | 18 struct nf_conncount_data *nf_conncount_init(struct net *net, unsigned int keylen);
|
| /include/uapi/linux/ |
| A D | tipc.h | 243 unsigned int keylen; /* in bytes */ member 254 return sizeof(*key) + key->keylen; in tipc_aead_key_size()
|