| /drivers/firmware/efi/ |
| A D | apple-properties.c | 57 u32 key_len, val_len, entry_len; in unmarshal_key_value_pairs() local 61 if (sizeof(key_len) > remaining) in unmarshal_key_value_pairs() 64 key_len = *(typeof(key_len) *)ptr; in unmarshal_key_value_pairs() 65 if (key_len + sizeof(val_len) > remaining || in unmarshal_key_value_pairs() 66 key_len < sizeof(key_len) + sizeof(efi_char16_t) || in unmarshal_key_value_pairs() 74 if (key_len + val_len > remaining || in unmarshal_key_value_pairs() 77 ptr - (void *)dev_header + key_len); in unmarshal_key_value_pairs() 82 key = kzalloc((key_len - sizeof(key_len)) * 4 + 1, GFP_KERNEL); in unmarshal_key_value_pairs() 87 ucs2_as_utf8(key, ptr + sizeof(key_len), in unmarshal_key_value_pairs() 88 key_len - sizeof(key_len)); in unmarshal_key_value_pairs() [all …]
|
| /drivers/crypto/ccp/ |
| A D | ccp-crypto-aes-xts.c | 76 unsigned int key_len) in ccp_aes_xts_setkey() argument 82 ret = xts_verify_key(tfm, key, key_len); in ccp_aes_xts_setkey() 89 switch (key_len) { in ccp_aes_xts_setkey() 91 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_xts_setkey() 95 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_xts_setkey() 98 ctx->u.aes.key_len = key_len / 2; in ccp_aes_xts_setkey() 116 if (!ctx->u.aes.key_len) in ccp_aes_xts_crypt() 142 (ctx->u.aes.key_len != AES_KEYSIZE_128)) in ccp_aes_xts_crypt() 145 (ctx->u.aes.key_len != AES_KEYSIZE_256)) in ccp_aes_xts_crypt() 175 rctx->cmd.u.xts.key_len = ctx->u.aes.key_len; in ccp_aes_xts_crypt() [all …]
|
| A D | ccp-crypto-aes.c | 40 unsigned int key_len) in ccp_aes_setkey() argument 45 switch (key_len) { in ccp_aes_setkey() 59 ctx->u.aes.key_len = key_len; in ccp_aes_setkey() 61 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_setkey() 75 if (!ctx->u.aes.key_len) in ccp_aes_crypt() 101 rctx->cmd.u.aes.key_len = ctx->u.aes.key_len; in ccp_aes_crypt() 126 ctx->u.aes.key_len = 0; in ccp_aes_init_tfm() 146 unsigned int key_len) in ccp_aes_rfc3686_setkey() argument 150 if (key_len < CTR_RFC3686_NONCE_SIZE) in ccp_aes_rfc3686_setkey() 153 key_len -= CTR_RFC3686_NONCE_SIZE; in ccp_aes_rfc3686_setkey() [all …]
|
| A D | ccp-crypto-aes-galois.c | 30 unsigned int key_len) in ccp_aes_gcm_setkey() argument 34 switch (key_len) { in ccp_aes_gcm_setkey() 49 ctx->u.aes.key_len = key_len; in ccp_aes_gcm_setkey() 51 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_gcm_setkey() 52 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); in ccp_aes_gcm_setkey() 86 if (!ctx->u.aes.key_len) in ccp_aes_gcm_crypt() 124 rctx->cmd.u.aes.key_len = ctx->u.aes.key_len; in ccp_aes_gcm_crypt() 154 ctx->u.aes.key_len = 0; in ccp_aes_gcm_cra_init()
|
| A D | ccp-crypto-des3.c | 39 unsigned int key_len) in ccp_des3_setkey() argument 54 ctx->u.des3.key_len = key_len; in ccp_des3_setkey() 56 memcpy(ctx->u.des3.key, key, key_len); in ccp_des3_setkey() 57 sg_init_one(&ctx->u.des3.key_sg, ctx->u.des3.key, key_len); in ccp_des3_setkey() 70 if (!ctx->u.des3.key_len) in ccp_des3_crypt() 97 rctx->cmd.u.des3.key_len = ctx->u.des3.key_len; in ccp_des3_crypt() 122 ctx->u.des3.key_len = 0; in ccp_des3_init_tfm()
|
| A D | ccp-crypto-aes-cmac.c | 69 if (!ctx->u.aes.key_len) in ccp_do_cmac_update() 163 rctx->cmd.u.aes.key_len = ctx->u.aes.key_len; in ccp_do_cmac_update() 257 unsigned int key_len) in ccp_aes_cmac_setkey() argument 268 switch (key_len) { in ccp_aes_cmac_setkey() 284 ctx->u.aes.key_len = 0; in ccp_aes_cmac_setkey() 287 ret = aes_expandkey(&aes, key, key_len); in ccp_aes_cmac_setkey() 328 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_cmac_setkey() 329 ctx->u.aes.key_len = key_len; in ccp_aes_cmac_setkey() 330 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); in ccp_aes_cmac_setkey() 341 ctx->u.aes.key_len = 0; in ccp_aes_cmac_cra_init()
|
| A D | ccp-crypto-sha.c | 162 rctx->cmd.u.sha.opad = ctx->u.sha.key_len ? in ccp_do_sha_update() 164 rctx->cmd.u.sha.opad_len = ctx->u.sha.key_len ? in ccp_do_sha_update() 197 if (ctx->u.sha.key_len) { in ccp_sha_init() 273 unsigned int key_len) in ccp_sha_setkey() argument 282 ctx->u.sha.key_len = 0; in ccp_sha_setkey() 289 if (key_len > block_size) { in ccp_sha_setkey() 291 ret = crypto_shash_tfm_digest(shash, key, key_len, in ccp_sha_setkey() 296 key_len = digest_size; in ccp_sha_setkey() 298 memcpy(ctx->u.sha.key, key, key_len); in ccp_sha_setkey() 309 ctx->u.sha.key_len = key_len; in ccp_sha_setkey() [all …]
|
| /drivers/net/wireless/intel/ipw2x00/ |
| A D | libipw_crypto_wep.c | 27 u8 key_len; member 71 klen = 3 + wep->key_len; in libipw_wep_build_iv() 118 memcpy(key + 3, wep->key, wep->key_len); in libipw_wep_encrypt() 122 klen = 3 + wep->key_len; in libipw_wep_encrypt() 163 klen = 3 + wep->key_len; in libipw_wep_decrypt() 166 memcpy(key + 3, wep->key, wep->key_len); in libipw_wep_decrypt() 200 wep->key_len = len; in libipw_wep_set_key() 209 if (len < wep->key_len) in libipw_wep_get_key() 212 memcpy(key, wep->key, wep->key_len); in libipw_wep_get_key() 214 return wep->key_len; in libipw_wep_get_key() [all …]
|
| /drivers/nvme/common/ |
| A D | auth.c | 160 return struct_size(&key, key, key_len); in nvme_auth_key_struct_size() 170 int ret, key_len; in nvme_auth_extract_key() local 182 if (key_len < 0) { in nvme_auth_extract_key() 184 key_len); in nvme_auth_extract_key() 185 ret = key_len; in nvme_auth_extract_key() 189 if (key_len != 36 && key_len != 52 && in nvme_auth_extract_key() 190 key_len != 68) { in nvme_auth_extract_key() 197 key_len -= 4; in nvme_auth_extract_key() 202 crc = ~crc32(~0, key->key, key_len); in nvme_auth_extract_key() 210 key->len = key_len; in nvme_auth_extract_key() [all …]
|
| /drivers/crypto/bcm/ |
| A D | spu2.c | 1004 flow_log(" key: %d\n", cipher_parms->key_len); in spu2_create_request() 1038 hash_parms->key_len = cipher_parms->key_len; in spu2_create_request() 1040 cipher_parms->key_len); in spu2_create_request() 1041 cipher_parms->key_len = 0; in spu2_create_request() 1076 hash_parms->key_len, cipher_parms->key_len, in spu2_create_request() 1092 if (hash_parms->key_len) { in spu2_create_request() 1094 ptr += hash_parms->key_len; in spu2_create_request() 1095 buf_len += hash_parms->key_len; in spu2_create_request() 1097 if (cipher_parms->key_len) { in spu2_create_request() 1099 ptr += cipher_parms->key_len; in spu2_create_request() [all …]
|
| A D | spu.c | 703 if (hash_parms->key_len) { in spum_create_request() 705 ptr += hash_parms->key_len; in spum_create_request() 706 buf_len += hash_parms->key_len; in spum_create_request() 707 sctx_words += hash_parms->key_len / 4; in spum_create_request() 737 if (cipher_parms->key_len) { in spum_create_request() 739 cipher_parms->key_len); in spum_create_request() 740 ptr += cipher_parms->key_len; in spum_create_request() 741 buf_len += cipher_parms->key_len; in spum_create_request() 742 sctx_words += cipher_parms->key_len / 4; in spum_create_request() 862 if (cipher_parms->key_len) in spum_cipher_req_init() [all …]
|
| /drivers/crypto/nx/ |
| A D | nx-aes-ctr.c | 26 unsigned int key_len) in ctr_aes_nx_set_key() argument 33 switch (key_len) { in ctr_aes_nx_set_key() 51 memcpy(csbcpb->cpb.aes_ctr.key, in_key, key_len); in ctr_aes_nx_set_key() 58 unsigned int key_len) in ctr3686_aes_nx_set_key() argument 62 if (key_len < CTR_RFC3686_NONCE_SIZE) in ctr3686_aes_nx_set_key() 66 in_key + key_len - CTR_RFC3686_NONCE_SIZE, in ctr3686_aes_nx_set_key() 69 key_len -= CTR_RFC3686_NONCE_SIZE; in ctr3686_aes_nx_set_key() 71 return ctr_aes_nx_set_key(tfm, in_key, key_len); in ctr3686_aes_nx_set_key()
|
| A D | nx-aes-ccm.c | 25 unsigned int key_len) in ccm_aes_nx_set_key() argument 33 switch (key_len) { in ccm_aes_nx_set_key() 44 memcpy(csbcpb->cpb.aes_ccm.key, in_key, key_len); in ccm_aes_nx_set_key() 47 memcpy(csbcpb_aead->cpb.aes_cca.key, in_key, key_len); in ccm_aes_nx_set_key() 55 unsigned int key_len) in ccm4309_aes_nx_set_key() argument 59 if (key_len < 3) in ccm4309_aes_nx_set_key() 62 key_len -= 3; in ccm4309_aes_nx_set_key() 64 memcpy(nx_ctx->priv.ccm.nonce, in_key + key_len, 3); in ccm4309_aes_nx_set_key() 66 return ccm_aes_nx_set_key(tfm, in_key, key_len); in ccm4309_aes_nx_set_key()
|
| A D | nx-aes-gcm.c | 25 unsigned int key_len) in gcm_aes_nx_set_key() argument 33 switch (key_len) { in gcm_aes_nx_set_key() 54 memcpy(csbcpb->cpb.aes_gcm.key, in_key, key_len); in gcm_aes_nx_set_key() 57 memcpy(csbcpb_aead->cpb.aes_gca.key, in_key, key_len); in gcm_aes_nx_set_key() 64 unsigned int key_len) in gcm4106_aes_nx_set_key() argument 70 if (key_len < 4) in gcm4106_aes_nx_set_key() 73 key_len -= 4; in gcm4106_aes_nx_set_key() 75 rc = gcm_aes_nx_set_key(tfm, in_key, key_len); in gcm4106_aes_nx_set_key() 79 memcpy(nonce, in_key + key_len, 4); in gcm4106_aes_nx_set_key()
|
| /drivers/net/ethernet/netronome/nfp/crypto/ |
| A D | ipsec.c | 274 int i, key_len, trunc_len, err = 0; in nfp_net_xfrm_add_state() local 368 key_len = DIV_ROUND_UP(x->aalg->alg_key_len, BITS_PER_BYTE); in nfp_net_xfrm_add_state() 369 if (key_len > sizeof(cfg->auth_key)) { in nfp_net_xfrm_add_state() 373 for (i = 0; i < key_len / sizeof(cfg->auth_key[0]) ; i++) in nfp_net_xfrm_add_state() 461 key_len = DIV_ROUND_UP(x->aead->alg_key_len, BITS_PER_BYTE); in nfp_net_xfrm_add_state() 462 key_len -= salt_len; in nfp_net_xfrm_add_state() 464 if (key_len > sizeof(cfg->ciph_key)) { in nfp_net_xfrm_add_state() 474 key_offset = key_len / sizeof(cfg->ciph_key[0]) >> 1; in nfp_net_xfrm_add_state() 476 for (i = 0; i < key_len / sizeof(cfg->ciph_key[0]); i++) { in nfp_net_xfrm_add_state() 490 if (key_len > sizeof(cfg->ciph_key)) { in nfp_net_xfrm_add_state() [all …]
|
| /drivers/net/ethernet/netronome/nfp/ |
| A D | nfp_net_debugdump.c | 204 u32 tl_len, key_len; in nfp_calc_hwinfo_field_sz() local 208 key_len = strnlen(spec->data, tl_len); in nfp_calc_hwinfo_field_sz() 209 if (key_len == tl_len) in nfp_calc_hwinfo_field_sz() 239 u32 tl_len, key_len; in nfp_calc_rtsym_dump_sz() local 244 if (key_len == tl_len) in nfp_calc_rtsym_dump_sz() 420 u32 tl_len, key_len, val_len; in nfp_dump_hwinfo_field() local 426 key_len = strnlen(spec->data, tl_len); in nfp_dump_hwinfo_field() 427 if (key_len == tl_len) in nfp_dump_hwinfo_field() 616 u32 tl_len, key_len; in nfp_dump_single_rtsym() local 622 key_len = strnlen(spec->rtsym, tl_len); in nfp_dump_single_rtsym() [all …]
|
| /drivers/crypto/intel/keembay/ |
| A D | keembay-ocs-aes-core.c | 50 unsigned int key_len; member 153 key_len == OCS_AES_KEYSIZE_256)) in check_key() 170 ret = check_key(in_key, key_len, cipher); in save_key() 174 memcpy(tctx->key, in_key, key_len); in save_key() 175 tctx->key_len = key_len; in save_key() 189 key_len == OCS_AES_KEYSIZE_192); in kmb_ocs_sk_set_key() 211 key_len == OCS_AES_KEYSIZE_192); in kmb_ocs_aead_set_key() 997 unsigned int key_len) in kmb_ocs_aes_set_key() argument 1003 unsigned int key_len) in kmb_ocs_aes_aead_set_key() argument 1073 unsigned int key_len) in kmb_ocs_sm4_set_key() argument [all …]
|
| /drivers/crypto/hisilicon/sec/ |
| A D | sec_algs.c | 25 unsigned key_len : 2; member 33 .key_len = SEC_KEY_LEN_DES, 38 .key_len = SEC_KEY_LEN_DES, 63 .key_len = SEC_KEY_LEN_AES_128, 68 .key_len = SEC_KEY_LEN_AES_192, 73 .key_len = SEC_KEY_LEN_AES_256, 78 .key_len = SEC_KEY_LEN_AES_128, 83 .key_len = SEC_KEY_LEN_AES_192, 88 .key_len = SEC_KEY_LEN_AES_256, 93 .key_len = SEC_KEY_LEN_AES_128, [all …]
|
| /drivers/crypto/ |
| A D | padlock-aes.c | 77 aes_hw_extkey_available(uint8_t key_len) in aes_hw_extkey_available() argument 82 if (key_len == 16) in aes_hw_extkey_available() 108 unsigned int key_len) in aes_set_key() argument 115 if (key_len % 8) in aes_set_key() 134 ctx->cword.encrypt.rounds = 10 + (key_len - 16) / 4; in aes_set_key() 136 ctx->cword.encrypt.ksize = (key_len - 16) / 8; in aes_set_key() 140 if (aes_hw_extkey_available(key_len)) in aes_set_key() 147 if (aes_expandkey(&gen_aes, in_key, key_len)) in aes_set_key() 163 unsigned int key_len) in aes_set_key_skcipher() argument 165 return aes_set_key(crypto_skcipher_tfm(tfm), in_key, key_len); in aes_set_key_skcipher()
|
| /drivers/crypto/intel/ixp4xx/ |
| A D | ixp4xx_crypto.c | 685 int key_len) in register_chain_var() argument 710 memcpy(pad, key, key_len); in register_chain_var() 711 memset(pad + key_len, 0, HMAC_PAD_BLOCKLEN - key_len); in register_chain_var() 815 int key_len) in setup_cipher() argument 834 switch (key_len) { in setup_cipher() 858 memcpy(cinfo, key, key_len); in setup_cipher() 861 memset(cinfo + key_len, 0, DES3_EDE_KEY_SIZE - key_len); in setup_cipher() 862 key_len = DES3_EDE_KEY_SIZE; in setup_cipher() 905 unsigned int key_len) in ablk_setkey() argument 935 unsigned int key_len) in ablk_des3_setkey() argument [all …]
|
| /drivers/s390/crypto/ |
| A D | zcrypt_cca_key.h | 174 int short_len, long_len, pad_len, key_len, size; in zcrypt_type6_crt_key() local 190 key_len = 3 * long_len + 2 * short_len + pad_len + crt->inputdatalength; in zcrypt_type6_crt_key() 191 size = sizeof(*key) + key_len + sizeof(*pub) + 3; in zcrypt_type6_crt_key() 203 key->pvt.section_length = sizeof(key->pvt) + key_len; in zcrypt_type6_crt_key() 224 pub = (struct cca_public_sec *)(key->key_parts + key_len); in zcrypt_type6_crt_key()
|
| /drivers/net/wireless/microchip/wilc1000/ |
| A D | fw.h | 52 u8 key_len; member 59 u8 key_len; member 67 u8 key_len; member 75 u8 key_len; member
|
| /drivers/firmware/google/ |
| A D | vpd_decode.c | 64 u32 key_len; in vpd_decode_string() local 81 &key_len) != VPD_OK) in vpd_decode_string() 89 return callback(key, key_len, value, value_len, in vpd_decode_string()
|
| /drivers/net/wireless/marvell/mwifiex/ |
| A D | sta_cmd.c | 530 key_param_set->key_len = in mwifiex_set_keyparamset_wep() 587 cpu_to_le16(enc_key->key_len); in mwifiex_set_aes_key_v2() 604 cpu_to_le16(enc_key->key_len); in mwifiex_set_aes_key_v2() 713 cpu_to_le16(enc_key->key_len); in mwifiex_cmd_802_11_key_material_v2() 733 cpu_to_le16(enc_key->key_len); in mwifiex_cmd_802_11_key_material_v2() 775 cpu_to_le16(enc_key->key_len); in mwifiex_cmd_802_11_key_material_v2() 923 key_material->key_param_set.key_len = in mwifiex_cmd_802_11_key_material_v1() 924 cpu_to_le16((u16) enc_key->key_len); in mwifiex_cmd_802_11_key_material_v1() 926 enc_key->key_len); in mwifiex_cmd_802_11_key_material_v1() 928 cpu_to_le16((u16) enc_key->key_len + in mwifiex_cmd_802_11_key_material_v1() [all …]
|
| /drivers/staging/rtl8723bs/os_dep/ |
| A D | ioctl_cfg80211.c | 573 memcpy(grpkey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len)); in rtw_cfg80211_ap_set_encryption() 576 if (param->u.crypt.key_len == 13) in rtw_cfg80211_ap_set_encryption() 582 memcpy(grpkey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len)); in rtw_cfg80211_ap_set_encryption() 593 memcpy(grpkey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len)); in rtw_cfg80211_ap_set_encryption() 623 if (param->u.crypt.key_len == 13) in rtw_cfg80211_ap_set_encryption() 648 … memcpy(grpkey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len)); in rtw_cfg80211_ap_set_encryption() 651 if (param->u.crypt.key_len == 13) in rtw_cfg80211_ap_set_encryption() 656 … memcpy(grpkey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len)); in rtw_cfg80211_ap_set_encryption() 667 … memcpy(grpkey, param->u.crypt.key, (param->u.crypt.key_len > 16 ? 16 : param->u.crypt.key_len)); in rtw_cfg80211_ap_set_encryption() 889 param->u.crypt.key_len = params->key_len; in cfg80211_rtw_add_key() [all …]
|