Searched refs:keys (Results 1 – 5 of 5) sorted by relevance
/crypto/ |
D | authenc.c | 46 int crypto_authenc_extractkeys(struct crypto_authenc_keys *keys, const u8 *key, in crypto_authenc_extractkeys() argument 68 keys->enckeylen = be32_to_cpu(param->enckeylen); in crypto_authenc_extractkeys() 73 if (keylen < keys->enckeylen) in crypto_authenc_extractkeys() 76 keys->authkeylen = keylen - keys->enckeylen; in crypto_authenc_extractkeys() 77 keys->authkey = key; in crypto_authenc_extractkeys() 78 keys->enckey = key + keys->authkeylen; in crypto_authenc_extractkeys() 90 struct crypto_authenc_keys keys; in crypto_authenc_setkey() local 93 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in crypto_authenc_setkey() 99 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in crypto_authenc_setkey() 106 err = crypto_skcipher_setkey(enc, keys.enckey, keys.enckeylen); in crypto_authenc_setkey() [all …]
|
D | authencesn.c | 64 struct crypto_authenc_keys keys; in crypto_authenc_esn_setkey() local 67 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in crypto_authenc_esn_setkey() 73 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in crypto_authenc_esn_setkey() 80 err = crypto_skcipher_setkey(enc, keys.enckey, keys.enckeylen); in crypto_authenc_esn_setkey() 82 memzero_explicit(&keys, sizeof(keys)); in crypto_authenc_esn_setkey()
|
D | essiv.c | 98 struct crypto_authenc_keys keys; in essiv_aead_setkey() local 109 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in essiv_aead_setkey() 114 crypto_shash_update(desc, keys.enckey, keys.enckeylen) ?: in essiv_aead_setkey() 115 crypto_shash_finup(desc, keys.authkey, keys.authkeylen, salt); in essiv_aead_setkey()
|
D | Kconfig | 447 Anubis is a variable key length cipher which can use keys from 476 This is a variable key length cipher which can use keys from 32 684 ARC4 is a stream cipher using keys ranging from 8 bits to 2048 946 that the keys are presented in the same format used by the authenc
|
/crypto/asymmetric_keys/ |
D | Kconfig | 7 the asymmetric keys used for public key cryptographic operations such
|