/crypto/ |
D | aes_generic.c | 1137 unsigned int key_len) in crypto_aes_set_key() argument 1141 return aes_expandkey(ctx, in_key, key_len); in crypto_aes_set_key() 1181 const int key_len = ctx->key_length; in crypto_aes_encrypt() local 1188 if (key_len > 24) { in crypto_aes_encrypt() 1193 if (key_len > 16) { in crypto_aes_encrypt() 1250 const int key_len = ctx->key_length; in crypto_aes_decrypt() local 1258 if (key_len > 24) { in crypto_aes_decrypt() 1263 if (key_len > 16) { in crypto_aes_decrypt()
|
D | rsa_helper.c | 163 unsigned int key_len) in rsa_parse_pub_key() argument 165 return asn1_ber_decoder(&rsapubkey_decoder, rsa_key, key, key_len); in rsa_parse_pub_key() 182 unsigned int key_len) in rsa_parse_priv_key() argument 184 return asn1_ber_decoder(&rsaprivkey_decoder, rsa_key, key, key_len); in rsa_parse_priv_key()
|
D | twofish_common.c | 570 unsigned int key_len) in __twofish_setkey() argument 586 if (key_len % 8) in __twofish_setkey() 610 if (key_len == 24 || key_len == 32) { /* 192- or 256-bit key */ in __twofish_setkey() 622 if (key_len == 32) { /* 256-bit key */ in __twofish_setkey() 654 } else if (key_len == 24) { /* 192-bit key */ in __twofish_setkey() 686 int twofish_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int key_len) in twofish_setkey() argument 688 return __twofish_setkey(crypto_tfm_ctx(tfm), key, key_len); in twofish_setkey()
|
D | anubis.c | 46 int key_len; // in bits member 463 unsigned int key_len) in anubis_setkey() argument 471 switch (key_len) { in anubis_setkey() 479 ctx->key_len = key_len * 8; in anubis_setkey() 480 N = ctx->key_len >> 5; in anubis_setkey()
|
D | ecrdsa.c | 41 unsigned int key_len; /* @key length (bytes) */ member 180 ctx->key_len = vlen; in ecrdsa_parse_pub_key() 235 if ((ctx->key_len != (2 * 256 / 8) && in ecrdsa_set_pub_key() 236 ctx->key_len != (2 * 512 / 8)) || in ecrdsa_set_pub_key() 237 ctx->key_len != ctx->curve->g.ndigits * sizeof(u64) * 2) in ecrdsa_set_pub_key() 240 ndigits = ctx->key_len / sizeof(u64) / 2; in ecrdsa_set_pub_key()
|
D | sm4_generic.c | 32 unsigned int key_len) in sm4_setkey() argument 36 return sm4_expandkey(ctx, in_key, key_len); in sm4_setkey()
|
D | aes_ti.c | 13 unsigned int key_len) in aesti_set_key() argument 17 return aes_expandkey(ctx, in_key, key_len); in aesti_set_key()
|
D | arc4.c | 19 unsigned int key_len) in crypto_arc4_setkey() argument 23 return arc4_setkey(ctx, in_key, key_len); in crypto_arc4_setkey()
|
D | testmgr.h | 154 unsigned int key_len; member 211 .key_len = 157, 244 .key_len = 289, 302 .key_len = 547, 344 .key_len = 269, 562 .key_len = 2349, 579 .key_len = 49, 603 .key_len = 49, 627 .key_len = 49, 651 .key_len = 49, [all …]
|
D | simd.c | 51 unsigned int key_len) in simd_skcipher_setkey() argument 59 return crypto_skcipher_setkey(child, key, key_len); in simd_skcipher_setkey() 291 unsigned int key_len) in simd_aead_setkey() argument 299 return crypto_aead_setkey(child, key, key_len); in simd_aead_setkey()
|
D | cast6_generic.c | 106 int __cast6_setkey(struct cast6_ctx *c, const u8 *in_key, unsigned int key_len) in __cast6_setkey() argument 112 if (key_len % 4 != 0) in __cast6_setkey() 116 memcpy(p_key, in_key, key_len); in __cast6_setkey()
|
D | camellia_generic.c | 961 unsigned int key_len) in camellia_set_key() argument 966 if (key_len != 16 && key_len != 24 && key_len != 32) in camellia_set_key() 969 cctx->key_length = key_len; in camellia_set_key() 971 switch (key_len) { in camellia_set_key()
|
D | tea.c | 43 unsigned int key_len) in tea_setkey() argument 116 unsigned int key_len) in xtea_setkey() argument
|
D | fips140-module.c | 448 const u8 *in_key, unsigned int key_len, in fips140_aes_expandkey() argument 451 *err = aes_expandkey(ctx, in_key, key_len); in fips140_aes_expandkey()
|
D | cast5_generic.c | 475 int cast5_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int key_len) in cast5_setkey() argument 484 c->rr = key_len <= 10 ? 1 : 0; in cast5_setkey() 487 memcpy(p_key, key, key_len); in cast5_setkey()
|
D | khazad.c | 757 unsigned int key_len) in khazad_setkey() argument
|
D | seed.c | 328 unsigned int key_len) in seed_set_key() argument
|
D | testmgr.c | 3940 key = kmalloc(vecs->key_len + sizeof(u32) * 2 + vecs->param_len, in test_akcipher_one() 3944 memcpy(key, vecs->key, vecs->key_len); in test_akcipher_one() 3945 ptr = key + vecs->key_len; in test_akcipher_one() 3951 err = crypto_akcipher_set_pub_key(tfm, key, vecs->key_len); in test_akcipher_one() 3953 err = crypto_akcipher_set_priv_key(tfm, key, vecs->key_len); in test_akcipher_one()
|
/crypto/asymmetric_keys/ |
D | asym_tpm.c | 421 info->key_size = tk->key_len; in tpm_key_query() 422 info->max_data_size = tk->key_len / 8; in tpm_key_query() 425 info->max_dec_size = tk->key_len / 8; in tpm_key_query() 664 if (in_len > tk->key_len / 8 - 11) { in tpm_key_sign() 819 uint32_t key_len; in extract_key_parameters() local 856 key_len = get_unaligned_be32(cur); in extract_key_parameters() 858 switch (key_len) { in extract_key_parameters() 890 tk->key_len = key_len; in extract_key_parameters()
|