/linux-4.4.14/net/sunrpc/auth_gss/ |
D | gss_krb5_mech.c | 70 .keylength = 8, 91 .keylength = 16, 112 .keylength = 24, 135 .keylength = 16, 158 .keylength = 32, 358 if (crypto_blkcipher_setkey(cp, key, ctx->gk5e->keylength)) { in context_v2_alloc_cipher() 388 keyin.len = ctx->gk5e->keylength; in context_derive_keys_des3() 389 keyout.len = ctx->gk5e->keylength; in context_derive_keys_des3() 449 err = crypto_hash_setkey(hmac, ctx->Ksess, ctx->gk5e->keylength); in context_derive_keys_rc4() 506 keyin.len = ctx->gk5e->keylength; in context_derive_keys_new() [all …]
|
D | gss_krb5_keys.c | 147 size_t blocksize, keybytes, keylength, n; in krb5_derive_key() local 155 keylength = gk5e->keylength; in krb5_derive_key() 157 if ((inkey->len != keylength) || (outkey->len != keylength)) in krb5_derive_key()
|
D | gss_krb5_crypto.c | 217 err = crypto_hash_setkey(hmac_md5, cksumkey, kctx->gk5e->keylength); in make_checksum_hmac_md5() 271 kctx->gk5e->keylength); in make_checksum() 350 err = crypto_hash_setkey(desc.tfm, cksumkey, kctx->gk5e->keylength); in make_checksum_v2() 880 err = crypto_hash_setkey(hmac, kctx->Ksess, kctx->gk5e->keylength); in krb5_rc4_setup_seq_key() 890 err = crypto_hash_setkey(hmac, Kseq, kctx->gk5e->keylength); in krb5_rc4_setup_seq_key() 900 err = crypto_blkcipher_setkey(cipher, Kseq, kctx->gk5e->keylength); in krb5_rc4_setup_seq_key() 945 for (i = 0; i < kctx->gk5e->keylength; i++) in krb5_rc4_setup_enc_key() 948 err = crypto_hash_setkey(hmac, Kcrypt, kctx->gk5e->keylength); in krb5_rc4_setup_enc_key() 958 err = crypto_hash_setkey(hmac, Kcrypt, kctx->gk5e->keylength); in krb5_rc4_setup_enc_key() 973 err = crypto_blkcipher_setkey(cipher, Kcrypt, kctx->gk5e->keylength); in krb5_rc4_setup_enc_key()
|
/linux-4.4.14/fs/hfsplus/ |
D | brec.c | 195 fd->record, fd->keylength + fd->entrylength); in hfs_brec_remove() 215 size = fd->keylength + fd->entrylength; in hfs_brec_remove() 383 fd->keylength = newkeylen = tree->max_key_len + 2; in hfs_brec_update_parent() 385 rec, fd->keylength, newkeylen); in hfs_brec_update_parent() 389 diff = newkeylen - fd->keylength; in hfs_brec_update_parent()
|
D | bfind.c | 153 fd->keylength = keylen; in __hfs_brec_find() 286 fd->keylength = keylen; in hfs_brec_goto()
|
D | hfsplus_fs.h | 291 int keyoffset, keylength; member
|
/linux-4.4.14/fs/hfs/ |
D | brec.c | 193 fd->record, fd->keylength + fd->entrylength); in hfs_brec_remove() 211 size = fd->keylength + fd->entrylength; in hfs_brec_remove() 378 fd->keylength = newkeylen = tree->max_key_len + 1; in hfs_brec_update_parent() 380 rec, fd->keylength, newkeylen); in hfs_brec_update_parent() 384 diff = newkeylen - fd->keylength; in hfs_brec_update_parent()
|
D | bfind.c | 85 fd->keylength = keylen; in __hfs_brec_find() 217 fd->keylength = keylen; in hfs_brec_goto()
|
D | btree.h | 75 int keyoffset, keylength; member
|
/linux-4.4.14/drivers/staging/rtl8712/ |
D | rtl871x_security.c | 168 u32 curfragnum, length, keylength; in r8712_wep_encrypt() local 181 keylength = psecuritypriv->DefKeylen[psecuritypriv-> in r8712_wep_encrypt() 189 keylength); in r8712_wep_encrypt() 197 arcfour_init(&mycontext, wepkey, 3 + keylength); in r8712_wep_encrypt() 208 arcfour_init(&mycontext, wepkey, 3 + keylength); in r8712_wep_encrypt() 225 u32 length, keylength; in r8712_wep_decrypt() local 239 keylength = psecuritypriv->DefKeylen[keyindex]; in r8712_wep_decrypt() 243 keylength); in r8712_wep_decrypt() 248 arcfour_init(&mycontext, wepkey, 3 + keylength); in r8712_wep_decrypt()
|
/linux-4.4.14/drivers/staging/rtl8723au/core/ |
D | rtw_security.c | 154 u32 keylength; in rtw_wep_encrypt23a() local 175 keylength = psecuritypriv->wep_key[index].keylen; in rtw_wep_encrypt23a() 181 keylength); in rtw_wep_encrypt23a() 191 arcfour_init(&mycontext, wepkey, 3 + keylength); in rtw_wep_encrypt23a() 199 arcfour_init(&mycontext, wepkey, 3 + keylength); in rtw_wep_encrypt23a() 218 u32 keylength; in rtw_wep_decrypt23a() local 235 keylength = psecuritypriv->wep_key[keyindex].keylen; in rtw_wep_decrypt23a() 238 memcpy(&wepkey[3], &psecuritypriv->wep_key[keyindex].key, keylength); in rtw_wep_decrypt23a() 244 arcfour_init(&mycontext, wepkey, 3 + keylength); in rtw_wep_decrypt23a()
|
/linux-4.4.14/drivers/staging/rtl8188eu/core/ |
D | rtw_security.c | 148 u32 keylength; in rtw_wep_encrypt() local 168 keylength = psecuritypriv->dot11DefKeylen[psecuritypriv->dot11PrivacyKeyIndex]; in rtw_wep_encrypt() 173 …y(&wepkey[3], &psecuritypriv->dot11DefKey[psecuritypriv->dot11PrivacyKeyIndex].skey[0], keylength); in rtw_wep_encrypt() 181 arcfour_init(&mycontext, wepkey, 3+keylength); in rtw_wep_encrypt() 187 arcfour_init(&mycontext, wepkey, 3+keylength); in rtw_wep_encrypt() 205 u32 keylength; in rtw_wep_decrypt() local 218 keylength = psecuritypriv->dot11DefKeylen[keyindex]; in rtw_wep_decrypt() 220 memcpy(&wepkey[3], &psecuritypriv->dot11DefKey[keyindex].skey[0], keylength); in rtw_wep_decrypt() 226 arcfour_init(&mycontext, wepkey, 3+keylength); in rtw_wep_decrypt()
|
/linux-4.4.14/include/linux/sunrpc/ |
D | gss_krb5.h | 73 const u32 keylength; /* final key len, in bytes */ member
|
/linux-4.4.14/Documentation/security/ |
D | keys-trusted-encrypted.txt | 45 within the 2048 bit SRK (RSA) keylength, with all necessary structure/padding.
|
/linux-4.4.14/arch/cris/arch-v32/drivers/ |
D | cryptocop.c | 242 …oid get_aes_decrypt_key(unsigned char *dec_key, const unsigned char *key, unsigned int keylength); 1753 …void get_aes_decrypt_key(unsigned char *dec_key, const unsigned char *key, unsigned int keylength) in get_aes_decrypt_key() argument 1761 switch (keylength){ in get_aes_decrypt_key()
|