| /Linux-v4.19/net/sunrpc/auth_gss/ |
| D | gss_krb5_mech.c | 71 .keylength = 8, 92 .keylength = 16, 113 .keylength = 24, 136 .keylength = 16, 159 .keylength = 32, 359 if (crypto_skcipher_setkey(cp, key, ctx->gk5e->keylength)) { in context_v2_alloc_cipher() 389 keyin.len = ctx->gk5e->keylength; in context_derive_keys_des3() 390 keyout.len = ctx->gk5e->keylength; in context_derive_keys_des3() 449 err = crypto_shash_setkey(hmac, ctx->Ksess, ctx->gk5e->keylength); in context_derive_keys_rc4() 509 keyin.len = ctx->gk5e->keylength; in context_derive_keys_new() [all …]
|
| D | gss_krb5_keys.c | 147 size_t blocksize, keybytes, keylength, n; in krb5_derive_key() local 155 keylength = gk5e->keylength; in krb5_derive_key() 157 if ((inkey->len != keylength) || (outkey->len != keylength)) in krb5_derive_key()
|
| D | gss_krb5_crypto.c | 244 err = crypto_ahash_setkey(hmac_md5, cksumkey, kctx->gk5e->keylength); in make_checksum_hmac_md5() 316 kctx->gk5e->keylength); in make_checksum() 408 err = crypto_ahash_setkey(tfm, cksumkey, kctx->gk5e->keylength); in make_checksum_v2() 980 err = crypto_shash_setkey(hmac, kctx->Ksess, kctx->gk5e->keylength); in krb5_rc4_setup_seq_key() 989 err = crypto_shash_setkey(hmac, Kseq, kctx->gk5e->keylength); in krb5_rc4_setup_seq_key() 997 err = crypto_skcipher_setkey(cipher, Kseq, kctx->gk5e->keylength); in krb5_rc4_setup_seq_key() 1047 for (i = 0; i < kctx->gk5e->keylength; i++) in krb5_rc4_setup_enc_key() 1050 err = crypto_shash_setkey(hmac, Kcrypt, kctx->gk5e->keylength); in krb5_rc4_setup_enc_key() 1059 err = crypto_shash_setkey(hmac, Kcrypt, kctx->gk5e->keylength); in krb5_rc4_setup_enc_key() 1072 err = crypto_skcipher_setkey(cipher, Kcrypt, kctx->gk5e->keylength); in krb5_rc4_setup_enc_key()
|
| /Linux-v4.19/fs/hfs/ |
| D | brec.c | 195 fd->record, fd->keylength + fd->entrylength); in hfs_brec_remove() 213 size = fd->keylength + fd->entrylength; in hfs_brec_remove() 380 fd->keylength = newkeylen = tree->max_key_len + 1; in hfs_brec_update_parent() 382 rec, fd->keylength, newkeylen); in hfs_brec_update_parent() 386 diff = newkeylen - fd->keylength; in hfs_brec_update_parent()
|
| D | bfind.c | 86 fd->keylength = keylen; in __hfs_brec_find() 218 fd->keylength = keylen; in hfs_brec_goto()
|
| D | btree.h | 76 int keyoffset, keylength; member
|
| /Linux-v4.19/fs/hfsplus/ |
| D | brec.c | 197 fd->record, fd->keylength + fd->entrylength); in hfs_brec_remove() 217 size = fd->keylength + fd->entrylength; in hfs_brec_remove() 385 fd->keylength = newkeylen = tree->max_key_len + 2; in hfs_brec_update_parent() 387 rec, fd->keylength, newkeylen); in hfs_brec_update_parent() 391 diff = newkeylen - fd->keylength; in hfs_brec_update_parent()
|
| D | bfind.c | 154 fd->keylength = keylen; in __hfs_brec_find() 287 fd->keylength = keylen; in hfs_brec_goto()
|
| D | hfsplus_fs.h | 292 int keyoffset, keylength; member
|
| /Linux-v4.19/drivers/staging/rtl8712/ |
| D | rtl871x_security.c | 167 u32 curfragnum, length, keylength, pki; in r8712_wep_encrypt() local 181 keylength = psecuritypriv->DefKeylen[pki]; in r8712_wep_encrypt() 188 keylength); in r8712_wep_encrypt() 197 arcfour_init(&mycontext, wepkey, 3 + keylength); in r8712_wep_encrypt() 208 arcfour_init(&mycontext, wepkey, 3 + keylength); in r8712_wep_encrypt() 225 u32 length, keylength; in r8712_wep_decrypt() local 239 keylength = psecuritypriv->DefKeylen[keyindex]; in r8712_wep_decrypt() 243 keylength); in r8712_wep_decrypt() 248 arcfour_init(&mycontext, wepkey, 3 + keylength); in r8712_wep_decrypt()
|
| /Linux-v4.19/drivers/staging/rtl8723bs/core/ |
| D | rtw_security.c | 220 u32 keylength; in rtw_wep_encrypt() local 237 keylength = psecuritypriv->dot11DefKeylen[psecuritypriv->dot11PrivacyKeyIndex]; in rtw_wep_encrypt() 242 …y(&wepkey[3], &psecuritypriv->dot11DefKey[psecuritypriv->dot11PrivacyKeyIndex].skey[0], keylength); in rtw_wep_encrypt() 251 arcfour_init(&mycontext, wepkey, 3+keylength); in rtw_wep_encrypt() 258 arcfour_init(&mycontext, wepkey, 3+keylength); in rtw_wep_encrypt() 277 u32 keylength; in rtw_wep_decrypt() local 290 keylength = psecuritypriv->dot11DefKeylen[keyindex]; in rtw_wep_decrypt() 293 memcpy(&wepkey[3], &psecuritypriv->dot11DefKey[keyindex].skey[0], keylength); in rtw_wep_decrypt() 299 arcfour_init(&mycontext, wepkey, 3+keylength); in rtw_wep_decrypt()
|
| /Linux-v4.19/include/linux/sunrpc/ |
| D | gss_krb5.h | 73 const u32 keylength; /* final key len, in bytes */ member
|
| /Linux-v4.19/Documentation/security/keys/ |
| D | trusted-encrypted.rst | 55 within the 2048 bit SRK (RSA) keylength, with all necessary structure/padding.
|
| /Linux-v4.19/drivers/crypto/chelsio/ |
| D | chcr_algo.c | 217 unsigned int keylength) in get_aes_decrypt_key() argument 224 switch (keylength) { in get_aes_decrypt_key()
|