Home
last modified time | relevance | path

Searched refs:key_len (Results 1 – 19 of 19) sorted by relevance

/crypto/
Daes_generic.c1137 unsigned int key_len) in crypto_aes_set_key() argument
1141 return aes_expandkey(ctx, in_key, key_len); in crypto_aes_set_key()
1181 const int key_len = ctx->key_length; in crypto_aes_encrypt() local
1188 if (key_len > 24) { in crypto_aes_encrypt()
1193 if (key_len > 16) { in crypto_aes_encrypt()
1250 const int key_len = ctx->key_length; in crypto_aes_decrypt() local
1258 if (key_len > 24) { in crypto_aes_decrypt()
1263 if (key_len > 16) { in crypto_aes_decrypt()
Drsa_helper.c163 unsigned int key_len) in rsa_parse_pub_key() argument
165 return asn1_ber_decoder(&rsapubkey_decoder, rsa_key, key, key_len); in rsa_parse_pub_key()
182 unsigned int key_len) in rsa_parse_priv_key() argument
184 return asn1_ber_decoder(&rsaprivkey_decoder, rsa_key, key, key_len); in rsa_parse_priv_key()
Dtwofish_common.c570 unsigned int key_len) in __twofish_setkey() argument
586 if (key_len % 8) in __twofish_setkey()
610 if (key_len == 24 || key_len == 32) { /* 192- or 256-bit key */ in __twofish_setkey()
622 if (key_len == 32) { /* 256-bit key */ in __twofish_setkey()
654 } else if (key_len == 24) { /* 192-bit key */ in __twofish_setkey()
686 int twofish_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int key_len) in twofish_setkey() argument
688 return __twofish_setkey(crypto_tfm_ctx(tfm), key, key_len); in twofish_setkey()
Danubis.c46 int key_len; // in bits member
463 unsigned int key_len) in anubis_setkey() argument
471 switch (key_len) { in anubis_setkey()
479 ctx->key_len = key_len * 8; in anubis_setkey()
480 N = ctx->key_len >> 5; in anubis_setkey()
Decrdsa.c41 unsigned int key_len; /* @key length (bytes) */ member
180 ctx->key_len = vlen; in ecrdsa_parse_pub_key()
235 if ((ctx->key_len != (2 * 256 / 8) && in ecrdsa_set_pub_key()
236 ctx->key_len != (2 * 512 / 8)) || in ecrdsa_set_pub_key()
237 ctx->key_len != ctx->curve->g.ndigits * sizeof(u64) * 2) in ecrdsa_set_pub_key()
240 ndigits = ctx->key_len / sizeof(u64) / 2; in ecrdsa_set_pub_key()
Dsm4_generic.c32 unsigned int key_len) in sm4_setkey() argument
36 return sm4_expandkey(ctx, in_key, key_len); in sm4_setkey()
Daes_ti.c13 unsigned int key_len) in aesti_set_key() argument
17 return aes_expandkey(ctx, in_key, key_len); in aesti_set_key()
Darc4.c19 unsigned int key_len) in crypto_arc4_setkey() argument
23 return arc4_setkey(ctx, in_key, key_len); in crypto_arc4_setkey()
Dtestmgr.h154 unsigned int key_len; member
211 .key_len = 157,
244 .key_len = 289,
302 .key_len = 547,
344 .key_len = 269,
562 .key_len = 2349,
579 .key_len = 49,
603 .key_len = 49,
627 .key_len = 49,
651 .key_len = 49,
[all …]
Dsimd.c51 unsigned int key_len) in simd_skcipher_setkey() argument
59 return crypto_skcipher_setkey(child, key, key_len); in simd_skcipher_setkey()
291 unsigned int key_len) in simd_aead_setkey() argument
299 return crypto_aead_setkey(child, key, key_len); in simd_aead_setkey()
Dcast6_generic.c106 int __cast6_setkey(struct cast6_ctx *c, const u8 *in_key, unsigned int key_len) in __cast6_setkey() argument
112 if (key_len % 4 != 0) in __cast6_setkey()
116 memcpy(p_key, in_key, key_len); in __cast6_setkey()
Dcamellia_generic.c961 unsigned int key_len) in camellia_set_key() argument
966 if (key_len != 16 && key_len != 24 && key_len != 32) in camellia_set_key()
969 cctx->key_length = key_len; in camellia_set_key()
971 switch (key_len) { in camellia_set_key()
Dtea.c43 unsigned int key_len) in tea_setkey() argument
116 unsigned int key_len) in xtea_setkey() argument
Dfips140-module.c448 const u8 *in_key, unsigned int key_len, in fips140_aes_expandkey() argument
451 *err = aes_expandkey(ctx, in_key, key_len); in fips140_aes_expandkey()
Dcast5_generic.c475 int cast5_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int key_len) in cast5_setkey() argument
484 c->rr = key_len <= 10 ? 1 : 0; in cast5_setkey()
487 memcpy(p_key, key, key_len); in cast5_setkey()
Dkhazad.c757 unsigned int key_len) in khazad_setkey() argument
Dseed.c328 unsigned int key_len) in seed_set_key() argument
Dtestmgr.c3940 key = kmalloc(vecs->key_len + sizeof(u32) * 2 + vecs->param_len, in test_akcipher_one()
3944 memcpy(key, vecs->key, vecs->key_len); in test_akcipher_one()
3945 ptr = key + vecs->key_len; in test_akcipher_one()
3951 err = crypto_akcipher_set_pub_key(tfm, key, vecs->key_len); in test_akcipher_one()
3953 err = crypto_akcipher_set_priv_key(tfm, key, vecs->key_len); in test_akcipher_one()
/crypto/asymmetric_keys/
Dasym_tpm.c421 info->key_size = tk->key_len; in tpm_key_query()
422 info->max_data_size = tk->key_len / 8; in tpm_key_query()
425 info->max_dec_size = tk->key_len / 8; in tpm_key_query()
664 if (in_len > tk->key_len / 8 - 11) { in tpm_key_sign()
819 uint32_t key_len; in extract_key_parameters() local
856 key_len = get_unaligned_be32(cur); in extract_key_parameters()
858 switch (key_len) { in extract_key_parameters()
890 tk->key_len = key_len; in extract_key_parameters()