| /OK3568_Linux_fs/external/security/librkcrypto/test/c_mode/ |
| H A D | hmac.c | 85 static int rk_hmac_64(const unsigned char *key, unsigned int key_length, const unsigned char *data… in rk_hmac_64() argument 106 if (key_length != b) /* Step 1 */ in rk_hmac_64() 109 if (key_length > b) in rk_hmac_64() 111 res = (*hash)(key, key_length, digest, &tmp_len); in rk_hmac_64() 121 else if (key_length < b) /* Step 3 */ in rk_hmac_64() 123 for (i=0; i<key_length; i++) in rk_hmac_64() 195 static int rk_hmac_128(const unsigned char *key, unsigned int key_length, const unsigned char *dat… in rk_hmac_128() argument 216 if (key_length != b) /* Step 1 */ in rk_hmac_128() 219 if (key_length > b) in rk_hmac_128() 221 res = (*hash)(key, key_length, digest, &tmp_len); in rk_hmac_128() [all …]
|
| /OK3568_Linux_fs/kernel/fs/ntfs/ |
| H A D | index.c | 185 le16_to_cpu(ie->key_length) > in ntfs_index_lookup() 192 if ((key_len == le16_to_cpu(ie->key_length)) && !memcmp(key, in ntfs_index_lookup() 214 key_len, &ie->key, le16_to_cpu(ie->key_length)); in ntfs_index_lookup() 352 le16_to_cpu(ie->key_length) > in ntfs_index_lookup() 362 if ((key_len == le16_to_cpu(ie->key_length)) && !memcmp(key, in ntfs_index_lookup() 377 key_len, &ie->key, le16_to_cpu(ie->key_length)); in ntfs_index_lookup()
|
| H A D | dir.c | 127 (u8*)ie + le16_to_cpu(ie->key_length) > in ntfs_lookup_inode_by_name() 383 (u8*)ie + le16_to_cpu(ie->key_length) > in ntfs_lookup_inode_by_name() 678 (u8*)ie + le16_to_cpu(ie->key_length) > 861 (u8*)ie + le16_to_cpu(ie->key_length) > 1188 (u8*)ie + le16_to_cpu(ie->key_length) > in ntfs_readdir() 1370 (u8*)ie + le16_to_cpu(ie->key_length) > in ntfs_readdir()
|
| /OK3568_Linux_fs/kernel/arch/arm64/crypto/ |
| H A D | aes-glue.c | 177 int err, rounds = 6 + ctx->key_length / 4; in ecb_encrypt() 197 int err, rounds = 6 + ctx->key_length / 4; in ecb_decrypt() 218 int err = 0, rounds = 6 + ctx->key_length / 4; in cbc_encrypt_walk() 247 int err = 0, rounds = 6 + ctx->key_length / 4; in cbc_decrypt_walk() 275 int err, rounds = 6 + ctx->key_length / 4; in cts_cbc_encrypt() 332 int err, rounds = 6 + ctx->key_length / 4; in cts_cbc_decrypt() 405 int err, rounds = 6 + ctx->key1.key_length / 4; in essiv_cbc_encrypt() 427 int err, rounds = 6 + ctx->key1.key_length / 4; in essiv_cbc_decrypt() 449 int err, rounds = 6 + ctx->key_length / 4; in ctr_encrypt() 488 int err, first, rounds = 6 + ctx->key1.key_length / 4; in xts_encrypt() [all …]
|
| H A D | aes-cipher-glue.c | 18 int rounds = 6 + ctx->key_length / 4; in aes_arm64_encrypt() 26 int rounds = 6 + ctx->key_length / 4; in aes_arm64_decrypt()
|
| H A D | aes-ce-glue.c | 43 return 6 + ctx->key_length / 4; in num_rounds() 93 ctx->key_length = key_len; in ce_aes_expandkey()
|
| /OK3568_Linux_fs/kernel/arch/arm/crypto/ |
| H A D | aes-cipher-glue.c | 19 int rounds = 6 + ctx->key_length / 4; in aes_arm_encrypt() 27 int rounds = 6 + ctx->key_length / 4; in aes_arm_decrypt()
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-devtools/apt/apt/ |
| H A D | triehash | 456 my $key_length = 0; 460 $key_length = length($key); 464 … x $indent) . "switch(%s | 0x%s) {\n", $self->switch_key($index, $key_length), '20' x $key_length); 466 … printf { $fh } ((' ' x $indent) . "switch(%s) {\n", $self->switch_key($index, $key_length));
|
| /OK3568_Linux_fs/kernel/drivers/s390/crypto/ |
| H A D | zcrypt_msgtype6.h | 129 short int key_length; in rng_type6CPRB_msgX() member 156 msg->key_length = 0x02; in rng_type6CPRB_msgX()
|
| /OK3568_Linux_fs/kernel/arch/x86/crypto/ |
| H A D | camellia-x86_64-asm_64.S | 35 #define key_length CAMELLIA_TABLE_BYTE_LEN macro 200 cmpb $16, key_length(CTX); 231 cmpl $16, key_length(CTX); 435 cmpb $16, key_length(CTX); 467 cmpl $16, key_length(CTX);
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-support/pidgin/pidgin-sipe/ |
| H A D | 0001-Migrate-to-use-g_memdup2.patch | 123 ctx->key_length = state->key_length; 126 state->key_length); 129 state->key_length);
|
| /OK3568_Linux_fs/kernel/lib/crypto/ |
| H A D | aes.c | 204 ctx->key_length = key_len; in aes_expandkey() 269 int rounds = 6 + ctx->key_length / 4; in aes_encrypt() 327 int rounds = 6 + ctx->key_length / 4; in aes_decrypt()
|
| /OK3568_Linux_fs/kernel/drivers/crypto/marvell/cesa/ |
| H A D | cipher.c | 264 remaining = (ctx->aes.key_length - 16) / 4; in mv_cesa_aes_setkey() 265 offset = ctx->aes.key_length + 24 - remaining; in mv_cesa_aes_setkey() 701 for (i = 0; i < ctx->aes.key_length / sizeof(u32); i++) in mv_cesa_aes_op() 704 if (ctx->aes.key_length == 24) in mv_cesa_aes_op() 706 else if (ctx->aes.key_length == 32) in mv_cesa_aes_op()
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/host_include/mbedtls/ |
| H A D | pkcs5.h | 92 uint32_t key_length, unsigned char *output );
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/host_include/mbedtls/ |
| H A D | pkcs5.h | 92 uint32_t key_length, unsigned char *output );
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/include/mbedtls/ |
| H A D | pkcs5.h | 92 uint32_t key_length, unsigned char *output );
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/include/mbedtls/ |
| H A D | pkcs5.h | 92 uint32_t key_length, unsigned char *output );
|
| /OK3568_Linux_fs/u-boot/lib/ |
| H A D | tpm.c | 883 const void *key, size_t key_length, in tpm_load_key2_oiap() argument 911 sizeof(command) + key_length in tpm_load_key2_oiap() 914 req_key_offset, key, key_length in tpm_load_key2_oiap() 918 err = create_request_auth(request, sizeof(command) + key_length, 4, in tpm_load_key2_oiap() 920 request + sizeof(command) + key_length, in tpm_load_key2_oiap()
|
| /OK3568_Linux_fs/kernel/include/crypto/ |
| H A D | aes.h | 28 u32 key_length; member
|
| /OK3568_Linux_fs/kernel/drivers/staging/ks7010/ |
| H A D | eap_packet.h | 43 unsigned short key_length; member
|
| /OK3568_Linux_fs/kernel/drivers/net/ethernet/mscc/ |
| H A D | ocelot_flower.c | 389 int key_length = vcap->keys[VCAP_ES0_IGR_PORT].length; in ocelot_flower_parse_indev() local 429 filter->ingress_port.mask = GENMASK(key_length - 1, 0); in ocelot_flower_parse_indev() 665 int key_length = vcap->keys[VCAP_ES0_EGR_PORT].length; in ocelot_vcap_filter_create() local 668 filter->egress_port.mask = GENMASK(key_length - 1, 0); in ocelot_vcap_filter_create()
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/host/openssl/include/openssl/ |
| H A D | hmac.h | 80 unsigned int key_length; member
|
| /OK3568_Linux_fs/kernel/crypto/ |
| H A D | aes_generic.c | 1181 const int key_len = ctx->key_length; in crypto_aes_encrypt() 1250 const int key_len = ctx->key_length; in crypto_aes_decrypt()
|
| /OK3568_Linux_fs/kernel/drivers/crypto/axis/ |
| H A D | artpec6_crypto.c | 326 size_t key_length; member 1199 ctx->key_length); in artpec6_crypto_ctr_crypt() 1255 ctx->key_length = len; in artpec6_crypto_aead_set_key() 1611 ctx->key_length = keylen; in artpec6_crypto_cipher_set_key() 1637 ctx->key_length = keylen; in artpec6_crypto_xts_set_key() 1691 ctx->key_length, true, false); in artpec6_crypto_prepare_crypto() 1698 cipher_klen = ctx->key_length/2; in artpec6_crypto_prepare_crypto() 1700 cipher_klen = ctx->key_length; in artpec6_crypto_prepare_crypto() 1715 MODULE_NAME, ctx->key_length); in artpec6_crypto_prepare_crypto() 1855 ctx->key_length, true, false); in artpec6_crypto_prepare_aead() [all …]
|
| /OK3568_Linux_fs/kernel/drivers/net/wireless/marvell/mwifiex/ |
| H A D | sta_ioctl.c | 931 if (!wep_key->key_length) { in mwifiex_sec_ioctl_set_wep_key() 939 wep_key->key_material, wep_key->key_length); in mwifiex_sec_ioctl_set_wep_key() 940 encrypt_key->key_len = wep_key->key_length; in mwifiex_sec_ioctl_set_wep_key() 953 wep_key->key_length = encrypt_key->key_len; in mwifiex_sec_ioctl_set_wep_key() 956 if (wep_key->key_length) { in mwifiex_sec_ioctl_set_wep_key()
|