Lines Matching refs:keylen
47 int keylen; member
296 unsigned int keylen) in cc_cipher_sethkey() argument
304 ctx_p, crypto_tfm_alg_name(tfm), keylen); in cc_cipher_sethkey()
305 dump_byte_array("key", key, keylen); in cc_cipher_sethkey()
310 if (keylen != sizeof(hki)) { in cc_cipher_sethkey()
311 dev_err(dev, "Unsupported protected key size %d.\n", keylen); in cc_cipher_sethkey()
315 memcpy(&hki, key, keylen); in cc_cipher_sethkey()
320 keylen = hki.keylen; in cc_cipher_sethkey()
322 if (validate_keys_sizes(ctx_p, keylen)) { in cc_cipher_sethkey()
323 dev_dbg(dev, "Unsupported key size %d.\n", keylen); in cc_cipher_sethkey()
327 ctx_p->keylen = keylen; in cc_cipher_sethkey()
396 unsigned int keylen) in cc_cipher_setkey() argument
407 ctx_p, crypto_tfm_alg_name(tfm), keylen); in cc_cipher_setkey()
408 dump_byte_array("key", key, keylen); in cc_cipher_setkey()
412 if (validate_keys_sizes(ctx_p, keylen)) { in cc_cipher_setkey()
413 dev_dbg(dev, "Invalid key size %d.\n", keylen); in cc_cipher_setkey()
420 if (keylen != AES_KEYSIZE_256) { in cc_cipher_setkey()
428 return crypto_skcipher_setkey(ctx_p->fallback_tfm, key, keylen); in cc_cipher_setkey()
431 dev_dbg(dev, "Unsupported key size %d and no fallback.\n", keylen); in cc_cipher_setkey()
448 if ((keylen == DES3_EDE_KEY_SIZE && in cc_cipher_setkey()
457 xts_verify_key(sktfm, key, keylen)) { in cc_cipher_setkey()
466 memcpy(ctx_p->user.key, key, keylen); in cc_cipher_setkey()
473 ctx_p->user.key, keylen, in cc_cipher_setkey()
474 ctx_p->user.key + keylen); in cc_cipher_setkey()
480 keylen <<= 1; in cc_cipher_setkey()
484 ctx_p->keylen = keylen; in cc_cipher_setkey()
616 unsigned int key_len = (ctx_p->keylen / 2); in cc_setup_xex_state_desc()
693 unsigned int key_len = ctx_p->keylen; in cc_setup_key_desc()