Home
last modified time | relevance | path

Searched refs:key_len (Results 1 – 12 of 12) sorted by relevance

/crypto/
Daes_generic.c1217 unsigned int key_len) in crypto_aes_expand_key() argument
1222 if (key_len != AES_KEYSIZE_128 && key_len != AES_KEYSIZE_192 && in crypto_aes_expand_key()
1223 key_len != AES_KEYSIZE_256) in crypto_aes_expand_key()
1226 ctx->key_length = key_len; in crypto_aes_expand_key()
1228 ctx->key_dec[key_len + 24] = ctx->key_enc[0] = le32_to_cpu(key[0]); in crypto_aes_expand_key()
1229 ctx->key_dec[key_len + 25] = ctx->key_enc[1] = le32_to_cpu(key[1]); in crypto_aes_expand_key()
1230 ctx->key_dec[key_len + 26] = ctx->key_enc[2] = le32_to_cpu(key[2]); in crypto_aes_expand_key()
1231 ctx->key_dec[key_len + 27] = ctx->key_enc[3] = le32_to_cpu(key[3]); in crypto_aes_expand_key()
1233 switch (key_len) { in crypto_aes_expand_key()
1258 ctx->key_dec[0] = ctx->key_enc[key_len + 24]; in crypto_aes_expand_key()
[all …]
Dtwofish_common.c584 unsigned int key_len, u32 *flags) in __twofish_setkey() argument
600 if (key_len % 8) in __twofish_setkey()
627 if (key_len == 24 || key_len == 32) { /* 192- or 256-bit key */ in __twofish_setkey()
639 if (key_len == 32) { /* 256-bit key */ in __twofish_setkey()
671 } else if (key_len == 24) { /* 192-bit key */ in __twofish_setkey()
703 int twofish_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int key_len) in twofish_setkey() argument
705 return __twofish_setkey(crypto_tfm_ctx(tfm), key, key_len, in twofish_setkey()
Danubis.c46 int key_len; // in bits member
463 unsigned int key_len) in anubis_setkey() argument
472 switch (key_len) { in anubis_setkey()
481 ctx->key_len = key_len * 8; in anubis_setkey()
482 N = ctx->key_len >> 5; in anubis_setkey()
Dablk_helper.c38 unsigned int key_len) in ablk_set_key() argument
47 err = crypto_ablkcipher_setkey(child, key, key_len); in ablk_set_key()
Darc4.c30 unsigned int key_len) in arc4_set_key() argument
46 if (++k >= key_len) in arc4_set_key()
Dcast6_generic.c115 unsigned key_len, u32 *flags) in __cast6_setkey() argument
121 if (key_len % 4 != 0) { in __cast6_setkey()
127 memcpy(p_key, in_key, key_len); in __cast6_setkey()
Dcamellia_generic.c982 unsigned int key_len) in camellia_set_key() argument
988 if (key_len != 16 && key_len != 24 && key_len != 32) { in camellia_set_key()
993 cctx->key_length = key_len; in camellia_set_key()
995 switch (key_len) { in camellia_set_key()
Dtea.c48 unsigned int key_len) in tea_setkey() argument
121 unsigned int key_len) in xtea_setkey() argument
Dcast5_generic.c487 int cast5_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int key_len) in cast5_setkey() argument
496 c->rr = key_len <= 10 ? 1 : 0; in cast5_setkey()
499 memcpy(p_key, key, key_len); in cast5_setkey()
Dkhazad.c757 unsigned int key_len) in khazad_setkey() argument
Dseed.c332 unsigned int key_len) in seed_set_key() argument
/crypto/asymmetric_keys/
Dx509_cert_parser.c413 size_t key_len; in x509_process_extension() local
434 key_len = v[3]; in x509_process_extension()
456 key_len = v[sub + 1]; in x509_process_extension()
460 f = kmalloc(key_len * 2 + 1, GFP_KERNEL); in x509_process_extension()
463 for (i = 0; i < key_len; i++) in x509_process_extension()