| /Linux-v5.4/net/sunrpc/auth_gss/ |
| D | gss_krb5_mech.c | 47 .keylength = 8, 69 .keylength = 16, 90 .keylength = 24, 113 .keylength = 16, 136 .keylength = 32, 337 if (crypto_sync_skcipher_setkey(cp, key, ctx->gk5e->keylength)) { in context_v2_alloc_cipher() 367 keyin.len = ctx->gk5e->keylength; in context_derive_keys_des3() 368 keyout.len = ctx->gk5e->keylength; in context_derive_keys_des3() 427 err = crypto_shash_setkey(hmac, ctx->Ksess, ctx->gk5e->keylength); in context_derive_keys_rc4() 484 keyin.len = ctx->gk5e->keylength; in context_derive_keys_new() [all …]
|
| D | gss_krb5_keys.c | 147 size_t blocksize, keybytes, keylength, n; in krb5_derive_key() local 155 keylength = gk5e->keylength; in krb5_derive_key() 157 if ((inkey->len != keylength) || (outkey->len != keylength)) in krb5_derive_key()
|
| D | gss_krb5_crypto.c | 244 err = crypto_ahash_setkey(hmac_md5, cksumkey, kctx->gk5e->keylength); in make_checksum_hmac_md5() 316 kctx->gk5e->keylength); in make_checksum() 408 err = crypto_ahash_setkey(tfm, cksumkey, kctx->gk5e->keylength); in make_checksum_v2() 982 err = crypto_shash_setkey(hmac, kctx->Ksess, kctx->gk5e->keylength); in krb5_rc4_setup_seq_key() 991 err = crypto_shash_setkey(hmac, Kseq, kctx->gk5e->keylength); in krb5_rc4_setup_seq_key() 999 err = crypto_sync_skcipher_setkey(cipher, Kseq, kctx->gk5e->keylength); in krb5_rc4_setup_seq_key() 1049 for (i = 0; i < kctx->gk5e->keylength; i++) in krb5_rc4_setup_enc_key() 1052 err = crypto_shash_setkey(hmac, Kcrypt, kctx->gk5e->keylength); in krb5_rc4_setup_enc_key() 1061 err = crypto_shash_setkey(hmac, Kcrypt, kctx->gk5e->keylength); in krb5_rc4_setup_enc_key() 1075 kctx->gk5e->keylength); in krb5_rc4_setup_enc_key()
|
| /Linux-v5.4/fs/hfsplus/ |
| D | brec.c | 197 fd->record, fd->keylength + fd->entrylength); in hfs_brec_remove() 217 size = fd->keylength + fd->entrylength; in hfs_brec_remove() 385 fd->keylength = newkeylen = tree->max_key_len + 2; in hfs_brec_update_parent() 387 rec, fd->keylength, newkeylen); in hfs_brec_update_parent() 391 diff = newkeylen - fd->keylength; in hfs_brec_update_parent()
|
| D | bfind.c | 154 fd->keylength = keylen; in __hfs_brec_find() 287 fd->keylength = keylen; in hfs_brec_goto()
|
| D | hfsplus_fs.h | 292 int keyoffset, keylength; member
|
| /Linux-v5.4/fs/hfs/ |
| D | brec.c | 195 fd->record, fd->keylength + fd->entrylength); in hfs_brec_remove() 213 size = fd->keylength + fd->entrylength; in hfs_brec_remove() 380 fd->keylength = newkeylen = tree->max_key_len + 1; in hfs_brec_update_parent() 382 rec, fd->keylength, newkeylen); in hfs_brec_update_parent() 386 diff = newkeylen - fd->keylength; in hfs_brec_update_parent()
|
| D | bfind.c | 86 fd->keylength = keylen; in __hfs_brec_find() 218 fd->keylength = keylen; in hfs_brec_goto()
|
| D | btree.h | 76 int keyoffset, keylength; member
|
| /Linux-v5.4/drivers/staging/rtl8712/ |
| D | rtl871x_security.c | 155 u32 curfragnum, length, keylength, pki; in r8712_wep_encrypt() local 169 keylength = psecuritypriv->DefKeylen[pki]; in r8712_wep_encrypt() 176 keylength); in r8712_wep_encrypt() 185 arcfour_init(&mycontext, wepkey, 3 + keylength); in r8712_wep_encrypt() 196 arcfour_init(&mycontext, wepkey, 3 + keylength); in r8712_wep_encrypt() 213 u32 length, keylength; in r8712_wep_decrypt() local 227 keylength = psecuritypriv->DefKeylen[keyindex]; in r8712_wep_decrypt() 231 keylength); in r8712_wep_decrypt() 236 arcfour_init(&mycontext, wepkey, 3 + keylength); in r8712_wep_decrypt()
|
| /Linux-v5.4/drivers/staging/rtl8723bs/core/ |
| D | rtw_security.c | 220 u32 keylength; in rtw_wep_encrypt() local 237 keylength = psecuritypriv->dot11DefKeylen[psecuritypriv->dot11PrivacyKeyIndex]; in rtw_wep_encrypt() 242 …y(&wepkey[3], &psecuritypriv->dot11DefKey[psecuritypriv->dot11PrivacyKeyIndex].skey[0], keylength); in rtw_wep_encrypt() 251 arcfour_init(&mycontext, wepkey, 3+keylength); in rtw_wep_encrypt() 258 arcfour_init(&mycontext, wepkey, 3+keylength); in rtw_wep_encrypt() 277 u32 keylength; in rtw_wep_decrypt() local 290 keylength = psecuritypriv->dot11DefKeylen[keyindex]; in rtw_wep_decrypt() 293 memcpy(&wepkey[3], &psecuritypriv->dot11DefKey[keyindex].skey[0], keylength); in rtw_wep_decrypt() 299 arcfour_init(&mycontext, wepkey, 3+keylength); in rtw_wep_decrypt()
|
| /Linux-v5.4/include/linux/sunrpc/ |
| D | gss_krb5.h | 73 const u32 keylength; /* final key len, in bytes */ member
|
| /Linux-v5.4/Documentation/security/keys/ |
| D | trusted-encrypted.rst | 80 within the 2048 bit SRK (RSA) keylength, with all necessary structure/padding.
|
| /Linux-v5.4/drivers/crypto/chelsio/ |
| D | chcr_algo.c | 235 unsigned int keylength) in get_aes_decrypt_key() argument 242 switch (keylength) { in get_aes_decrypt_key()
|