Home
last modified time | relevance | path

Searched refs:keys (Results 1 – 5 of 5) sorted by relevance

/crypto/
Dauthenc.c46 int crypto_authenc_extractkeys(struct crypto_authenc_keys *keys, const u8 *key, in crypto_authenc_extractkeys() argument
68 keys->enckeylen = be32_to_cpu(param->enckeylen); in crypto_authenc_extractkeys()
73 if (keylen < keys->enckeylen) in crypto_authenc_extractkeys()
76 keys->authkeylen = keylen - keys->enckeylen; in crypto_authenc_extractkeys()
77 keys->authkey = key; in crypto_authenc_extractkeys()
78 keys->enckey = key + keys->authkeylen; in crypto_authenc_extractkeys()
90 struct crypto_authenc_keys keys; in crypto_authenc_setkey() local
93 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in crypto_authenc_setkey()
99 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in crypto_authenc_setkey()
106 err = crypto_skcipher_setkey(enc, keys.enckey, keys.enckeylen); in crypto_authenc_setkey()
[all …]
Dauthencesn.c64 struct crypto_authenc_keys keys; in crypto_authenc_esn_setkey() local
67 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in crypto_authenc_esn_setkey()
73 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in crypto_authenc_esn_setkey()
80 err = crypto_skcipher_setkey(enc, keys.enckey, keys.enckeylen); in crypto_authenc_esn_setkey()
82 memzero_explicit(&keys, sizeof(keys)); in crypto_authenc_esn_setkey()
Dessiv.c98 struct crypto_authenc_keys keys; in essiv_aead_setkey() local
109 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in essiv_aead_setkey()
114 crypto_shash_update(desc, keys.enckey, keys.enckeylen) ?: in essiv_aead_setkey()
115 crypto_shash_finup(desc, keys.authkey, keys.authkeylen, salt); in essiv_aead_setkey()
DKconfig447 Anubis is a variable key length cipher which can use keys from
476 This is a variable key length cipher which can use keys from 32
684 ARC4 is a stream cipher using keys ranging from 8 bits to 2048
946 that the keys are presented in the same format used by the authenc
/crypto/asymmetric_keys/
DKconfig7 the asymmetric keys used for public key cryptographic operations such