Searched refs:key_len (Results 1 – 12 of 12) sorted by relevance
/crypto/ |
D | aes_generic.c | 1217 unsigned int key_len) in crypto_aes_expand_key() argument 1222 if (key_len != AES_KEYSIZE_128 && key_len != AES_KEYSIZE_192 && in crypto_aes_expand_key() 1223 key_len != AES_KEYSIZE_256) in crypto_aes_expand_key() 1226 ctx->key_length = key_len; in crypto_aes_expand_key() 1228 ctx->key_dec[key_len + 24] = ctx->key_enc[0] = le32_to_cpu(key[0]); in crypto_aes_expand_key() 1229 ctx->key_dec[key_len + 25] = ctx->key_enc[1] = le32_to_cpu(key[1]); in crypto_aes_expand_key() 1230 ctx->key_dec[key_len + 26] = ctx->key_enc[2] = le32_to_cpu(key[2]); in crypto_aes_expand_key() 1231 ctx->key_dec[key_len + 27] = ctx->key_enc[3] = le32_to_cpu(key[3]); in crypto_aes_expand_key() 1233 switch (key_len) { in crypto_aes_expand_key() 1258 ctx->key_dec[0] = ctx->key_enc[key_len + 24]; in crypto_aes_expand_key() [all …]
|
D | twofish_common.c | 584 unsigned int key_len, u32 *flags) in __twofish_setkey() argument 600 if (key_len % 8) in __twofish_setkey() 627 if (key_len == 24 || key_len == 32) { /* 192- or 256-bit key */ in __twofish_setkey() 639 if (key_len == 32) { /* 256-bit key */ in __twofish_setkey() 671 } else if (key_len == 24) { /* 192-bit key */ in __twofish_setkey() 703 int twofish_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int key_len) in twofish_setkey() argument 705 return __twofish_setkey(crypto_tfm_ctx(tfm), key, key_len, in twofish_setkey()
|
D | anubis.c | 46 int key_len; // in bits member 463 unsigned int key_len) in anubis_setkey() argument 472 switch (key_len) { in anubis_setkey() 481 ctx->key_len = key_len * 8; in anubis_setkey() 482 N = ctx->key_len >> 5; in anubis_setkey()
|
D | ablk_helper.c | 38 unsigned int key_len) in ablk_set_key() argument 47 err = crypto_ablkcipher_setkey(child, key, key_len); in ablk_set_key()
|
D | arc4.c | 30 unsigned int key_len) in arc4_set_key() argument 46 if (++k >= key_len) in arc4_set_key()
|
D | cast6_generic.c | 115 unsigned key_len, u32 *flags) in __cast6_setkey() argument 121 if (key_len % 4 != 0) { in __cast6_setkey() 127 memcpy(p_key, in_key, key_len); in __cast6_setkey()
|
D | camellia_generic.c | 982 unsigned int key_len) in camellia_set_key() argument 988 if (key_len != 16 && key_len != 24 && key_len != 32) { in camellia_set_key() 993 cctx->key_length = key_len; in camellia_set_key() 995 switch (key_len) { in camellia_set_key()
|
D | tea.c | 48 unsigned int key_len) in tea_setkey() argument 121 unsigned int key_len) in xtea_setkey() argument
|
D | cast5_generic.c | 487 int cast5_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int key_len) in cast5_setkey() argument 496 c->rr = key_len <= 10 ? 1 : 0; in cast5_setkey() 499 memcpy(p_key, key, key_len); in cast5_setkey()
|
D | khazad.c | 757 unsigned int key_len) in khazad_setkey() argument
|
D | seed.c | 332 unsigned int key_len) in seed_set_key() argument
|
/crypto/asymmetric_keys/ |
D | x509_cert_parser.c | 413 size_t key_len; in x509_process_extension() local 434 key_len = v[3]; in x509_process_extension() 456 key_len = v[sub + 1]; in x509_process_extension() 460 f = kmalloc(key_len * 2 + 1, GFP_KERNEL); in x509_process_extension() 463 for (i = 0; i < key_len; i++) in x509_process_extension()
|