| /linux/net/sunrpc/auth_gss/ |
| H A D | gss_krb5_keys.c | 151 const struct xdr_netobj *inkey, u8 *rawkey, in krb5_DK() argument 163 if (inkey->len != keylength) in krb5_DK() 170 if (crypto_sync_skcipher_setkey(cipher, inkey->data, inkey->len)) in krb5_DK() 268 const struct xdr_netobj *inkey, in krb5_derive_key_v2() argument 281 ret = krb5_DK(gk5e, inkey, inblock.data, label, gfp_mask); in krb5_derive_key_v2() 369 const struct xdr_netobj *inkey, in krb5_kdf_feedback_cmac() argument 391 ret = crypto_shash_setkey(tfm, inkey->data, inkey->len); in krb5_kdf_feedback_cmac() 501 const struct xdr_netobj *inkey, in krb5_kdf_hmac_sha2() argument 523 ret = crypto_shash_setkey(tfm, inkey->data, inkey->len); in krb5_kdf_hmac_sha2()
|
| H A D | gss_krb5_internal.h | 107 const struct xdr_netobj *inkey, 113 const struct xdr_netobj *inkey, 119 const struct xdr_netobj *inkey, 139 const struct xdr_netobj *inkey, in krb5_derive_key() argument 153 return gk5e->derive_key(gk5e, inkey, outkey, &label, gfp_mask); in krb5_derive_key()
|
| /linux/arch/arm64/crypto/ |
| H A D | ghash-ce-glue.c | 155 const u8 *inkey, unsigned int keylen) in ghash_setkey() argument 163 memcpy(&key->k, inkey, GHASH_BLOCK_SIZE); in ghash_setkey() 189 static int gcm_aes_setkey(struct crypto_aead *tfm, const u8 *inkey, in gcm_aes_setkey() argument 197 ret = aes_prepareenckey(&ctx->aes_key, inkey, keylen); in gcm_aes_setkey() 426 static int rfc4106_setkey(struct crypto_aead *tfm, const u8 *inkey, in rfc4106_setkey() argument 433 err = gcm_aes_setkey(tfm, inkey, keylen); in rfc4106_setkey() 437 memcpy(ctx->nonce, inkey + keylen, RFC4106_NONCE_SIZE); in rfc4106_setkey()
|
| /linux/arch/arm/crypto/ |
| H A D | ghash-ce-glue.c | 140 const u8 *inkey, unsigned int keylen) in ghash_setkey() argument 148 memcpy(&key->k, inkey, GHASH_BLOCK_SIZE); in ghash_setkey() 203 static int gcm_aes_setkey(struct crypto_aead *tfm, const u8 *inkey, in gcm_aes_setkey() argument 211 ret = aes_prepareenckey(&aes_key, inkey, keylen); in gcm_aes_setkey() 484 static int rfc4106_setkey(struct crypto_aead *tfm, const u8 *inkey, in rfc4106_setkey() argument 491 err = gcm_aes_setkey(tfm, inkey, keylen); in rfc4106_setkey() 495 memcpy(ctx->nonce, inkey + keylen, RFC4106_NONCE_SIZE); in rfc4106_setkey()
|
| /linux/net/ceph/ |
| H A D | crypto.c | 139 int ceph_crypto_key_unarmor(struct ceph_crypto_key *key, const char *inkey) in ceph_crypto_key_unarmor() argument 141 int inlen = strlen(inkey); in ceph_crypto_key_unarmor() 146 dout("crypto_key_unarmor %s\n", inkey); in ceph_crypto_key_unarmor() 150 blen = ceph_unarmor(buf, inkey, inkey+inlen); in ceph_crypto_key_unarmor()
|
| /linux/crypto/ |
| H A D | hmac.c | 36 const u8 *inkey, unsigned int keylen) in hmac_setkey() argument 56 err = crypto_shash_digest(shash, inkey, keylen, ipad); in hmac_setkey() 62 memcpy(ipad, inkey, keylen); in hmac_setkey() 252 const u8 *inkey, unsigned int keylen) in hmac_setkey_ahash() argument 270 ahash_request_set_virt(req, inkey, ipad, keylen); in hmac_setkey_ahash() 277 memcpy(ipad, inkey, keylen); in hmac_setkey_ahash()
|
| H A D | xcbc.c | 39 const u8 *inkey, unsigned int keylen) in crypto_xcbc_digest_setkey() argument 47 if ((err = crypto_cipher_setkey(ctx->child, inkey, keylen))) in crypto_xcbc_digest_setkey()
|
| H A D | cmac.c | 38 const u8 *inkey, unsigned int keylen) in crypto_cmac_digest_setkey() argument 47 err = crypto_cipher_setkey(ctx->child, inkey, keylen); in crypto_cmac_digest_setkey()
|
| H A D | ccm.c | 773 const u8 *inkey, unsigned int keylen) in crypto_cbcmac_digest_setkey() argument 777 return crypto_cipher_setkey(ctx->child, inkey, keylen); in crypto_cbcmac_digest_setkey()
|
| /linux/arch/powerpc/crypto/ |
| H A D | aes-gcm-p10-glue.c | 315 static int rfc4106_setkey(struct crypto_aead *tfm, const u8 *inkey, in rfc4106_setkey() argument 322 err = p10_aes_gcm_setkey(tfm, inkey, keylen); in rfc4106_setkey() 326 memcpy(ctx->nonce, inkey + keylen, RFC4106_NONCE_SIZE); in rfc4106_setkey()
|
| /linux/crypto/krb5/ |
| H A D | rfc3961_simplified.c | 265 const struct krb5_buffer *inkey, in rfc3961_calc_DK() argument 279 if (inkey->len != keylength || result->len != keylength) in rfc3961_calc_DK() 289 ret = crypto_sync_skcipher_setkey(cipher, inkey->data, inkey->len); in rfc3961_calc_DK()
|
| /linux/drivers/net/ethernet/intel/ice/ |
| H A D | ice_flex_pipe.c | 2354 struct ice_prof_id_key inkey; in ice_prof_gen_key() local 2356 inkey.xlt1 = ptg; in ice_prof_gen_key() 2357 inkey.xlt2_cdid = cpu_to_le16(vsig); in ice_prof_gen_key() 2358 inkey.flags = cpu_to_le16(flags); in ice_prof_gen_key() 2366 inkey.xlt2_cdid &= ~cpu_to_le16(ICE_CD_2_M); in ice_prof_gen_key() 2367 inkey.xlt2_cdid |= cpu_to_le16(BIT(cdid) << ICE_CD_2_S); in ice_prof_gen_key() 2372 inkey.xlt2_cdid &= ~cpu_to_le16(ICE_CD_4_M); in ice_prof_gen_key() 2373 inkey.xlt2_cdid |= cpu_to_le16(BIT(cdid) << ICE_CD_4_S); in ice_prof_gen_key() 2378 inkey.xlt2_cdid &= ~cpu_to_le16(ICE_CD_8_M); in ice_prof_gen_key() 2379 inkey.xlt2_cdid |= cpu_to_le16(BIT(cdid) << ICE_CD_8_S); in ice_prof_gen_key() [all …]
|
| /linux/tools/testing/selftests/dm-verity/ |
| H A D | test-dm-verity-keyring.sh | 314 -inkey "$key" \
|
| /linux/Documentation/admin-guide/LSM/ |
| H A D | ipe.rst | 247 -inkey "$MY_PRIVATE_KEY" \
|