| /drivers/crypto/inside-secure/eip93/ |
| A D | eip93-aead.c | 104 if (keys.enckeylen < CTR_RFC3686_NONCE_SIZE) in eip93_aead_setkey() 107 keys.enckeylen -= CTR_RFC3686_NONCE_SIZE; in eip93_aead_setkey() 108 memcpy(&nonce, keys.enckey + keys.enckeylen, in eip93_aead_setkey() 114 ret = verify_aead_des_key(ctfm, keys.enckey, keys.enckeylen); in eip93_aead_setkey() 120 if (keys.enckeylen != DES3_EDE_KEY_SIZE) in eip93_aead_setkey() 123 ret = verify_aead_des3_key(ctfm, keys.enckey, keys.enckeylen); in eip93_aead_setkey() 129 ret = aes_expandkey(&aes, keys.enckey, keys.enckeylen); in eip93_aead_setkey() 138 eip93_set_sa_record(sa_record, keys.enckeylen, ctx->flags); in eip93_aead_setkey() 146 memcpy(sa_record->sa_key, keys.enckey, keys.enckeylen); in eip93_aead_setkey()
|
| /drivers/crypto/qce/ |
| A D | aead.c | 607 if (authenc_keys.enckeylen > QCE_MAX_KEY_SIZE || in qce_aead_setkey() 612 err = verify_aead_des_key(tfm, authenc_keys.enckey, authenc_keys.enckeylen); in qce_aead_setkey() 616 err = verify_aead_des3_key(tfm, authenc_keys.enckey, authenc_keys.enckeylen); in qce_aead_setkey() 632 if (authenc_keys.enckeylen != AES_KEYSIZE_128 && in qce_aead_setkey() 633 authenc_keys.enckeylen != AES_KEYSIZE_192 && in qce_aead_setkey() 634 authenc_keys.enckeylen != AES_KEYSIZE_256) in qce_aead_setkey() 636 if (authenc_keys.enckeylen == AES_KEYSIZE_192) in qce_aead_setkey() 640 ctx->enc_keylen = authenc_keys.enckeylen; in qce_aead_setkey() 643 memcpy(ctx->enc_key, authenc_keys.enckey, authenc_keys.enckeylen); in qce_aead_setkey()
|
| A D | common.c | 299 unsigned int enckeylen, unsigned int cryptlen) in qce_xtskey() argument 302 unsigned int xtsklen = enckeylen / (2 * sizeof(u32)); in qce_xtskey() 304 qce_cpu_to_be32p_array((__be32 *)xtskey, enckey + enckeylen / 2, in qce_xtskey() 305 enckeylen / 2); in qce_xtskey()
|
| /drivers/crypto/bcm/ |
| A D | cipher.c | 1849 ctx->enckeylen = keylen; in skcipher_setkey() 1882 ctx->enckeylen, in skcipher_setkey() 2744 ctx->enckeylen = keys.enckeylen; in aead_authenc_setkey() 2766 switch (ctx->enckeylen) { in aead_authenc_setkey() 2803 ctx->enckeylen, in aead_authenc_setkey() 2811 ctx->enckeylen = 0; in aead_authenc_setkey() 2833 ctx->enckeylen = keylen; in aead_gcm_ccm_setkey() 2836 switch (ctx->enckeylen) { in aead_gcm_ccm_setkey() 2871 ctx->enckeylen, in aead_gcm_ccm_setkey() 2882 ctx->enckeylen = 0; in aead_gcm_ccm_setkey() [all …]
|
| A D | cipher.h | 181 unsigned int enckeylen; member
|
| /drivers/crypto/caam/ |
| A D | caamalg_qi.c | 213 keys.authkeylen + keys.enckeylen, keys.enckeylen, in aead_setkey() 227 if (ctx->adata.keylen_pad + keys.enckeylen > CAAM_MAX_KEY_SIZE) in aead_setkey() 232 keys.enckeylen); in aead_setkey() 235 keys.enckeylen, ctx->dir); in aead_setkey() 241 keys.enckeylen); in aead_setkey() 246 memcpy(ctx->key + ctx->adata.keylen_pad, keys.enckey, keys.enckeylen); in aead_setkey() 248 ctx->adata.keylen_pad + keys.enckeylen, in aead_setkey() 253 ctx->adata.keylen_pad + keys.enckeylen, 1); in aead_setkey() 256 ctx->cdata.keylen = keys.enckeylen; in aead_setkey() 298 err = verify_aead_des3_key(aead, keys.enckey, keys.enckeylen) ?: in des3_aead_setkey()
|
| A D | caamalg_desc.c | 216 unsigned int enckeylen = cdata->keylen; in init_sh_desc_key_aead() local 231 enckeylen -= CTR_RFC3686_NONCE_SIZE; in init_sh_desc_key_aead() 247 append_key_as_imm(desc, cdata->key_virt, enckeylen, in init_sh_desc_key_aead() 248 enckeylen, CLASS_1 | KEY_DEST_CLASS_REG); in init_sh_desc_key_aead() 250 append_key(desc, cdata->key_dma, enckeylen, CLASS_1 | in init_sh_desc_key_aead()
|
| A D | caamalg.c | 598 keys.authkeylen + keys.enckeylen, keys.enckeylen, in aead_setkey() 612 if (ctx->adata.keylen_pad + keys.enckeylen > CAAM_MAX_KEY_SIZE) in aead_setkey() 617 keys.enckeylen); in aead_setkey() 620 keys.enckeylen, ctx->dir); in aead_setkey() 626 keys.enckeylen); in aead_setkey() 632 memcpy(ctx->key + ctx->adata.keylen_pad, keys.enckey, keys.enckeylen); in aead_setkey() 634 keys.enckeylen, ctx->dir); in aead_setkey() 638 ctx->adata.keylen_pad + keys.enckeylen, 1); in aead_setkey() 641 ctx->cdata.keylen = keys.enckeylen; in aead_setkey() 659 err = verify_aead_des3_key(aead, keys.enckey, keys.enckeylen) ?: in des3_aead_setkey()
|
| A D | caamalg_qi2.c | 301 keys.authkeylen + keys.enckeylen, keys.enckeylen, in aead_setkey() 310 if (ctx->adata.keylen_pad + keys.enckeylen > CAAM_MAX_KEY_SIZE) in aead_setkey() 314 memcpy(ctx->key + ctx->adata.keylen_pad, keys.enckey, keys.enckeylen); in aead_setkey() 316 keys.enckeylen, ctx->dir); in aead_setkey() 319 ctx->adata.keylen_pad + keys.enckeylen, 1); in aead_setkey() 321 ctx->cdata.keylen = keys.enckeylen; in aead_setkey() 341 if (keys.enckeylen != DES3_EDE_KEY_SIZE) in des3_aead_setkey()
|
| /drivers/crypto/chelsio/ |
| A D | chcr_algo.c | 3587 if (keys.enckeylen < CTR_RFC3686_NONCE_SIZE) in chcr_authenc_setkey() 3591 keys.enckeylen -= CTR_RFC3686_NONCE_SIZE; in chcr_authenc_setkey() 3593 if (keys.enckeylen == AES_KEYSIZE_128) { in chcr_authenc_setkey() 3595 } else if (keys.enckeylen == AES_KEYSIZE_192) { in chcr_authenc_setkey() 3597 } else if (keys.enckeylen == AES_KEYSIZE_256) { in chcr_authenc_setkey() 3609 aeadctx->enckey_len = keys.enckeylen; in chcr_authenc_setkey() 3663 roundup(keys.enckeylen, 16) + in chcr_authenc_setkey() 3706 if (keys.enckeylen < CTR_RFC3686_NONCE_SIZE) in chcr_aead_digest_null_setkey() 3710 keys.enckeylen -= CTR_RFC3686_NONCE_SIZE; in chcr_aead_digest_null_setkey() 3712 if (keys.enckeylen == AES_KEYSIZE_128) { in chcr_aead_digest_null_setkey() [all …]
|
| /drivers/crypto/intel/qat/qat_common/ |
| A D | qat_algs.c | 247 sizeof(struct icp_qat_hw_auth_setup) + keys->enckeylen); in qat_alg_aead_init_enc_session() 257 memcpy(cipher->aes.key, keys->enckey, keys->enckeylen); in qat_alg_aead_init_enc_session() 280 cipher_cd_ctrl->cipher_key_sz = keys->enckeylen >> 3; in qat_alg_aead_init_enc_session() 343 memcpy(cipher->aes.key, keys->enckey, keys->enckeylen); in qat_alg_aead_init_dec_session() 367 cipher_cd_ctrl->cipher_key_sz = keys->enckeylen >> 3; in qat_alg_aead_init_dec_session() 555 if (qat_alg_validate_key(keys.enckeylen, &alg, mode)) in qat_alg_aead_init_sessions()
|
| /drivers/crypto/ |
| A D | talitos.c | 858 unsigned int enckeylen; member 899 if (keys.authkeylen + keys.enckeylen > TALITOS_MAX_KEY_SIZE) in aead_setkey() 906 memcpy(&ctx->key[keys.authkeylen], keys.enckey, keys.enckeylen); in aead_setkey() 908 ctx->keylen = keys.authkeylen + keys.enckeylen; in aead_setkey() 909 ctx->enckeylen = keys.enckeylen; in aead_setkey() 935 if (keys.authkeylen + keys.enckeylen > TALITOS_MAX_KEY_SIZE) in aead_des3_setkey() 938 err = verify_aead_des3_key(authenc, keys.enckey, keys.enckeylen); in aead_des3_setkey() 946 memcpy(&ctx->key[keys.authkeylen], keys.enckey, keys.enckeylen); in aead_des3_setkey() 948 ctx->keylen = keys.authkeylen + keys.enckeylen; in aead_des3_setkey() 949 ctx->enckeylen = keys.enckeylen; in aead_des3_setkey() [all …]
|
| A D | atmel-aes.c | 1914 if (keys.enckeylen > sizeof(ctx->base.key)) in atmel_aes_authenc_setkey() 1927 ctx->base.keylen = keys.enckeylen; in atmel_aes_authenc_setkey() 1928 memcpy(ctx->base.key, keys.enckey, keys.enckeylen); in atmel_aes_authenc_setkey()
|
| A D | sa2ul.c | 1783 key_idx = (keys.enckeylen >> 3) - 2; in sa_aead_setkey() 1810 keys.enckeylen, keys.authkey, keys.authkeylen, in sa_aead_setkey() 1824 keys.enckeylen, keys.authkey, keys.authkeylen, in sa_aead_setkey()
|
| /drivers/crypto/intel/ixp4xx/ |
| A D | ixp4xx_crypto.c | 1259 if (keys.enckeylen > sizeof(ctx->enckey)) in aead_setkey() 1263 memcpy(ctx->enckey, keys.enckey, keys.enckeylen); in aead_setkey() 1265 ctx->enckey_len = keys.enckeylen; in aead_setkey() 1289 err = verify_aead_des3_key(tfm, keys.enckey, keys.enckeylen); in des3_aead_setkey() 1294 memcpy(ctx->enckey, keys.enckey, keys.enckeylen); in des3_aead_setkey() 1296 ctx->enckey_len = keys.enckeylen; in des3_aead_setkey()
|
| /drivers/crypto/inside-secure/ |
| A D | safexcel_cipher.c | 418 if (unlikely(keys.enckeylen < CTR_RFC3686_NONCE_SIZE)) in safexcel_aead_setkey() 421 ctx->nonce = *(u32 *)(keys.enckey + keys.enckeylen - in safexcel_aead_setkey() 424 keys.enckeylen -= CTR_RFC3686_NONCE_SIZE; in safexcel_aead_setkey() 430 err = verify_aead_des_key(ctfm, keys.enckey, keys.enckeylen); in safexcel_aead_setkey() 435 err = verify_aead_des3_key(ctfm, keys.enckey, keys.enckeylen); in safexcel_aead_setkey() 440 err = aes_expandkey(&aes, keys.enckey, keys.enckeylen); in safexcel_aead_setkey() 445 if (unlikely(keys.enckeylen != SM4_KEY_SIZE)) in safexcel_aead_setkey() 454 for (i = 0; i < keys.enckeylen / sizeof(u32); i++) { in safexcel_aead_setkey() 493 for (i = 0; i < keys.enckeylen / sizeof(u32); i++) in safexcel_aead_setkey() 495 ctx->key_len = keys.enckeylen; in safexcel_aead_setkey()
|
| /drivers/crypto/marvell/octeontx/ |
| A D | otx_cptvf_algs.c | 769 ctx->enc_key_len = keys->enckeylen; in aead_hmac_init() 773 return keys->enckeylen ? -EINVAL : 0; in aead_hmac_init() 775 switch (keys->enckeylen) { in aead_hmac_init() 790 memcpy(ctx->key + authkeylen, keys->enckey, keys->enckeylen); in aead_hmac_init()
|
| /drivers/crypto/marvell/octeontx2/ |
| A D | otx2_cptvf_algs.c | 859 ctx->enc_key_len = keys->enckeylen; in aead_hmac_init() 863 return keys->enckeylen ? -EINVAL : 0; in aead_hmac_init() 865 switch (keys->enckeylen) { in aead_hmac_init() 880 memcpy(ctx->key + authkeylen, keys->enckey, keys->enckeylen); in aead_hmac_init()
|
| /drivers/md/ |
| A D | dm-crypt.c | 2448 unsigned int enckeylen, unsigned int authkeylen) in crypt_copy_authenckey() argument 2455 param->enckeylen = cpu_to_be32(enckeylen); in crypt_copy_authenckey() 2459 memcpy(p, key + enckeylen, authkeylen); in crypt_copy_authenckey() 2461 memcpy(p, key, enckeylen); in crypt_copy_authenckey()
|
| /drivers/crypto/ccree/ |
| A D | cc_aead.c | 565 ctx->enc_keylen = keys.enckeylen; in cc_aead_setkey() 648 err = verify_aead_des3_key(aead, keys.enckey, keys.enckeylen) ?: in cc_des3_aead_setkey()
|
| /drivers/crypto/hisilicon/sec2/ |
| A D | sec_crypto.c | 1326 switch (keys->enckeylen) { in sec_aead_aes_set_key() 1340 memcpy(c_ctx->c_key, keys->enckey, keys->enckeylen); in sec_aead_aes_set_key()
|