| /arch/riscv/crypto/ |
| A D | aes-riscv64-zvkned.S | 61 aes_crypt v16, \enc, \keylen 86 .macro __aes_ecb_crypt enc, keylen 94 aes_crypt v16, \enc, \keylen 125 .macro aes_cbc_encrypt keylen 141 .macro aes_cbc_decrypt keylen 188 .macro aes_cbc_cts_encrypt keylen 227 aes_encrypt v16, \keylen 236 .macro aes_cbc_cts_decrypt keylen 318 .macro aes_cbc_cts_crypt keylen 321 aes_cbc_cts_encrypt \keylen [all …]
|
| A D | aes-macros.S | 96 .macro aes_encrypt data, keylen 107 .if \keylen == 128 109 .elseif \keylen == 192 123 .macro aes_decrypt data, keylen 124 .if \keylen == 128 126 .elseif \keylen == 192 150 .macro aes_crypt data, enc, keylen 152 aes_encrypt \data, \keylen 154 aes_decrypt \data, \keylen
|
| A D | sm4-riscv64-glue.c | 28 unsigned int keylen) in riscv64_sm4_setkey() argument 33 if (keylen != SM4_KEY_SIZE) in riscv64_sm4_setkey() 40 return sm4_expandkey(ctx, key, keylen); in riscv64_sm4_setkey()
|
| A D | aes-riscv64-glue.c | 64 const u8 *key, unsigned int keylen) in riscv64_aes_setkey() argument 86 return aes_expandkey(ctx, key, keylen); in riscv64_aes_setkey() 90 const u8 *key, unsigned int keylen) in riscv64_aes_setkey_cipher() argument 94 return riscv64_aes_setkey(ctx, key, keylen); in riscv64_aes_setkey_cipher() 98 const u8 *key, unsigned int keylen) in riscv64_aes_setkey_skcipher() argument 102 return riscv64_aes_setkey(ctx, key, keylen); in riscv64_aes_setkey_skcipher() 345 unsigned int keylen) in riscv64_aes_xts_setkey() argument 349 return xts_verify_key(tfm, key, keylen) ?: in riscv64_aes_xts_setkey() 350 riscv64_aes_setkey(&ctx->ctx1, key, keylen / 2) ?: in riscv64_aes_xts_setkey() 351 riscv64_aes_setkey(&ctx->ctx2, key + keylen / 2, keylen / 2); in riscv64_aes_xts_setkey()
|
| A D | aes-riscv64-zvkned-zvbb-zvkg.S | 169 .macro __aes_xts_crypt enc, keylen 180 aes_crypt TMP0, \enc, \keylen 247 aes_crypt TMP0, \enc, \keylen 263 aes_crypt TMP0, \enc, \keylen
|
| /arch/powerpc/platforms/powernv/ |
| A D | opal-secvar.c | 73 static int opal_get_next_variable(const char *key, u64 *keylen, u64 keybufsize) in opal_get_next_variable() argument 77 if (!key || !keylen) in opal_get_next_variable() 80 *keylen = cpu_to_be64(*keylen); in opal_get_next_variable() 82 rc = opal_secvar_get_next(key, keylen, keybufsize); in opal_get_next_variable() 84 *keylen = be64_to_cpu(*keylen); in opal_get_next_variable()
|
| /arch/powerpc/crypto/ |
| A D | aes_xts.c | 58 unsigned int keylen) in p8_aes_xts_setkey() argument 63 ret = xts_verify_key(tfm, key, keylen); in p8_aes_xts_setkey() 70 ret = aes_p8_set_encrypt_key(key + keylen/2, (keylen/2) * 8, &ctx->tweak_key); in p8_aes_xts_setkey() 71 ret |= aes_p8_set_encrypt_key(key, (keylen/2) * 8, &ctx->enc_key); in p8_aes_xts_setkey() 72 ret |= aes_p8_set_decrypt_key(key, (keylen/2) * 8, &ctx->dec_key); in p8_aes_xts_setkey() 77 ret |= crypto_skcipher_setkey(ctx->fallback, key, keylen); in p8_aes_xts_setkey()
|
| A D | aes.c | 62 unsigned int keylen) in p8_aes_setkey() argument 70 ret = aes_p8_set_encrypt_key(key, keylen * 8, &ctx->enc_key); in p8_aes_setkey() 71 ret |= aes_p8_set_decrypt_key(key, keylen * 8, &ctx->dec_key); in p8_aes_setkey() 76 ret |= crypto_cipher_setkey(ctx->fallback, key, keylen); in p8_aes_setkey()
|
| A D | aes_cbc.c | 56 unsigned int keylen) in p8_aes_cbc_setkey() argument 64 ret = aes_p8_set_encrypt_key(key, keylen * 8, &ctx->enc_key); in p8_aes_cbc_setkey() 65 ret |= aes_p8_set_decrypt_key(key, keylen * 8, &ctx->dec_key); in p8_aes_cbc_setkey() 70 ret |= crypto_skcipher_setkey(ctx->fallback, key, keylen); in p8_aes_cbc_setkey()
|
| A D | aes_ctr.c | 55 unsigned int keylen) in p8_aes_ctr_setkey() argument 63 ret = aes_p8_set_encrypt_key(key, keylen * 8, &ctx->enc_key); in p8_aes_ctr_setkey() 68 ret |= crypto_skcipher_setkey(ctx->fallback, key, keylen); in p8_aes_ctr_setkey()
|
| A D | aes-gcm-p10-glue.c | 195 unsigned int keylen) in p10_aes_gcm_setkey() argument 202 ret = aes_p10_set_encrypt_key(key, keylen * 8, &ctx->enc_key); in p10_aes_gcm_setkey() 316 unsigned int keylen) in rfc4106_setkey() argument 321 keylen -= RFC4106_NONCE_SIZE; in rfc4106_setkey() 322 err = p10_aes_gcm_setkey(tfm, inkey, keylen); in rfc4106_setkey() 326 memcpy(ctx->nonce, inkey + keylen, RFC4106_NONCE_SIZE); in rfc4106_setkey()
|
| /arch/powerpc/platforms/pseries/ |
| A D | plpks_sed_ops.c | 70 int sed_read_key(char *keyname, char *key, u_int *keylen) in sed_read_key() argument 92 *keylen = len; in sed_read_key() 100 int sed_write_key(char *keyname, char *key, u_int keylen) in sed_write_key() argument 119 data.key_len = cpu_to_be32(keylen); in sed_write_key() 120 memcpy(data.key, (char *)key, keylen); in sed_write_key()
|
| /arch/s390/crypto/ |
| A D | paes_s390.c | 69 unsigned int keylen; member 89 unsigned int keylen; member 139 if (keylen > sizeof(ctx->keybuf)) in paes_ctx_setkey() 142 switch (keylen) { in paes_ctx_setkey() 148 ctx->keylen = make_clrkey_token(key, keylen, ctx->keybuf); in paes_ctx_setkey() 153 ctx->keylen = keylen; in paes_ctx_setkey() 167 size_t cklen = keylen / 2; in pxts_ctx_setkey() 172 switch (keylen) { in pxts_ctx_setkey() 184 ctx->keylen = keylen; in pxts_ctx_setkey() 285 if (ctx->keylen % 2) { in pxts_convert_key() [all …]
|
| A D | phmac_s390.c | 136 unsigned int keylen; member 292 const u8 *key, unsigned int keylen) in phmac_tfm_ctx_setkey() argument 294 if (keylen > sizeof(tfm_ctx->keybuf)) in phmac_tfm_ctx_setkey() 297 memcpy(tfm_ctx->keybuf, key, keylen); in phmac_tfm_ctx_setkey() 298 tfm_ctx->keylen = keylen; in phmac_tfm_ctx_setkey() 323 rc = pkey_key2protkey(key, keylen, in convert_key() 356 rc = convert_key(tfm_ctx->keybuf, tfm_ctx->keylen, &pk); in phmac_convert_key() 730 const u8 *key, unsigned int keylen) in phmac_setkey() argument 751 rc = make_clrkey_token(key, keylen, ds, tmpkey); in phmac_setkey() 754 keylen = tmpkeylen; in phmac_setkey() [all …]
|
| /arch/powerpc/boot/ |
| A D | planetcore.c | 40 int keylen = strlen(key); in planetcore_get_key() local 43 if (!strncmp(table, key, keylen) && table[keylen] == '=') in planetcore_get_key() 44 return table + keylen + 1; in planetcore_get_key()
|
| /arch/s390/include/uapi/asm/ |
| A D | pkey.h | 234 __u32 keylen; /* in: the key blob length */ member 267 __u32 keylen; /* in: available key blob buffer size */ member 302 __u32 keylen; /* in: available key blob buffer size */ member 336 __u32 keylen; /* in: key blob size */ member 361 __u32 keylen; /* in: key blob size */ member 397 __u32 keylen; /* in: key blob size */ member 463 __u32 keylen; /* in: key blob size */ member
|
| /arch/arm/crypto/ |
| A D | ghash-ce-glue.c | 140 const u8 *inkey, unsigned int keylen) in ghash_setkey() argument 144 if (keylen != GHASH_BLOCK_SIZE) in ghash_setkey() 204 unsigned int keylen) in gcm_aes_setkey() argument 211 ret = aes_expandkey(&aes_ctx, inkey, keylen); in gcm_aes_setkey() 218 ctx->rounds = 6 + keylen / 4; in gcm_aes_setkey() 481 unsigned int keylen) in rfc4106_setkey() argument 486 keylen -= RFC4106_NONCE_SIZE; in rfc4106_setkey() 487 err = gcm_aes_setkey(tfm, inkey, keylen); in rfc4106_setkey() 491 memcpy(ctx->nonce, inkey + keylen, RFC4106_NONCE_SIZE); in rfc4106_setkey()
|
| /arch/arm64/crypto/ |
| A D | ghash-ce-glue.c | 155 const u8 *inkey, unsigned int keylen) in ghash_setkey() argument 159 if (keylen != GHASH_BLOCK_SIZE) in ghash_setkey() 202 unsigned int keylen) in gcm_aes_setkey() argument 209 ret = aes_expandkey(&ctx->aes_key, inkey, keylen); in gcm_aes_setkey() 441 unsigned int keylen) in rfc4106_setkey() argument 446 keylen -= RFC4106_NONCE_SIZE; in rfc4106_setkey() 447 err = gcm_aes_setkey(tfm, inkey, keylen); in rfc4106_setkey() 451 memcpy(ctx->nonce, inkey + keylen, RFC4106_NONCE_SIZE); in rfc4106_setkey()
|
| /arch/x86/crypto/ |
| A D | cast5_avx_glue.c | 28 unsigned int keylen) in cast5_setkey_skcipher() argument 30 return cast5_setkey(&tfm->base, key, keylen); in cast5_setkey_skcipher()
|
| A D | cast6_avx_glue.c | 28 const u8 *key, unsigned int keylen) in cast6_setkey_skcipher() argument 30 return cast6_setkey(&tfm->base, key, keylen); in cast6_setkey_skcipher()
|
| A D | serpent_avx_glue.c | 36 const u8 *key, unsigned int keylen) in serpent_setkey_skcipher() argument 38 return __serpent_setkey(crypto_skcipher_ctx(tfm), key, keylen); in serpent_setkey_skcipher()
|
| A D | serpent_sse2_glue.c | 27 const u8 *key, unsigned int keylen) in serpent_setkey_skcipher() argument 29 return __serpent_setkey(crypto_skcipher_ctx(tfm), key, keylen); in serpent_setkey_skcipher()
|
| A D | camellia_aesni_avx_glue.c | 31 unsigned int keylen) in camellia_setkey() argument 33 return __camellia_setkey(crypto_skcipher_ctx(tfm), key, keylen); in camellia_setkey()
|
| A D | serpent_avx2_glue.c | 26 const u8 *key, unsigned int keylen) in serpent_setkey_skcipher() argument 28 return __serpent_setkey(crypto_skcipher_ctx(tfm), key, keylen); in serpent_setkey_skcipher()
|
| /arch/sparc/crypto/ |
| A D | des_glue.c | 45 unsigned int keylen) in des_set_key() argument 65 unsigned int keylen) in des_set_key_skcipher() argument 67 return des_set_key(crypto_skcipher_tfm(tfm), key, keylen); in des_set_key_skcipher() 181 unsigned int keylen) in des3_ede_set_key() argument 214 unsigned int keylen) in des3_ede_set_key_skcipher() argument 216 return des3_ede_set_key(crypto_skcipher_tfm(tfm), key, keylen); in des3_ede_set_key_skcipher()
|