| /drivers/crypto/amcc/ |
| A D | crypto4xx_alg.c | 120 unsigned int keylen, in crypto4xx_setkey_aes() argument 128 if (keylen != AES_KEYSIZE_256 && keylen != AES_KEYSIZE_192 && in crypto4xx_setkey_aes() 129 keylen != AES_KEYSIZE_128) in crypto4xx_setkey_aes() 158 key, keylen); in crypto4xx_setkey_aes() 273 unsigned int keylen) in crypto4xx_sk_setup_fallback() argument 352 unsigned int keylen) in crypto4xx_aead_setup_fallback() argument 365 unsigned int keylen) in crypto4xx_setkey_aes_ccm() argument 481 switch (keylen) { in crypto4xx_aes_gcm_validate_keylen() 492 unsigned int keylen) in crypto4xx_compute_gcm_hash_key_sw() argument 550 key, keylen); in crypto4xx_setkey_aes_gcm() [all …]
|
| /drivers/crypto/cavium/cpt/ |
| A D | cptvf_algs.c | 233 u32 keylen) in cvm_xts_setkey() argument 238 const u8 *key2 = key + (keylen / 2); in cvm_xts_setkey() 243 ctx->key_len = keylen; in cvm_xts_setkey() 263 if ((keylen == 16) || (keylen == 24) || (keylen == 32)) { in cvm_validate_keylen() 264 ctx->key_len = keylen; in cvm_validate_keylen() 289 u32 keylen, u8 cipher_type) in cvm_setkey() argument 295 memcpy(ctx->enc_key, key, keylen); in cvm_setkey() 303 u32 keylen) in cvm_cbc_aes_setkey() argument 309 u32 keylen) in cvm_ecb_aes_setkey() argument 315 u32 keylen) in cvm_cbc_des3_setkey() argument [all …]
|
| /drivers/s390/crypto/ |
| A D | pkey_pckmo.c | 28 static bool is_pckmo_key(const u8 *key, u32 keylen) in is_pckmo_key() argument 33 if (keylen < sizeof(*hdr)) in is_pckmo_key() 224 if (keylen < sizeof(*hdr)) in pckmo_key2protkey() 234 if (keylen < sizeof(*t)) in pckmo_key2protkey() 270 if (keylen < sizeof(*t) || in pckmo_key2protkey() 271 keylen < sizeof(*t) + t->len) in pckmo_key2protkey() 361 if (keylen < sizeof(*hdr)) in pckmo_verify_key() 371 if (keylen < sizeof(*t)) in pckmo_verify_key() 408 const u8 *key, u32 keylen, in pkey_pckmo_key2protkey() argument 412 return pckmo_key2protkey(key, keylen, in pkey_pckmo_key2protkey() [all …]
|
| A D | pkey_api.c | 35 key, keylen, in key2protkey() 42 key, keylen, in key2protkey() 79 if (!ukey || keylen < MINKEYBLOBBUFSIZE || keylen > KEYBLOBBUFSIZE) in _copy_key_from_user() 82 return memdup_user(ukey, keylen); in _copy_key_from_user() 173 u32 keylen; in pkey_ioctl_clr2protk() local 182 if (!keylen) { in pkey_ioctl_clr2protk() 197 t->len = keylen; in pkey_ioctl_clr2protk() 428 if (kgs.keylen < klen) { in pkey_ioctl_genseck2() 437 kgs.keylen = klen; in pkey_ioctl_genseck2() 486 if (kcs.keylen < klen) { in pkey_ioctl_clr2seck2() [all …]
|
| A D | pkey_base.c | 102 if (h->is_supported_key(key, keylen)) { in pkey_handler_get_keybased() 153 const u8 *key, u32 keylen, in pkey_handler_key_to_protkey() argument 160 h = pkey_handler_get_keybased(key, keylen); in pkey_handler_key_to_protkey() 162 rc = h->key_to_protkey(apqns, nr_apqns, key, keylen, in pkey_handler_key_to_protkey() 180 const u8 *key, u32 keylen, in pkey_handler_slowpath_key_to_protkey() argument 202 key, keylen, in pkey_handler_slowpath_key_to_protkey() 254 int pkey_handler_verify_key(const u8 *key, u32 keylen, in pkey_handler_verify_key() argument 262 h = pkey_handler_get_keybased(key, keylen); in pkey_handler_verify_key() 264 rc = h->verify_key(key, keylen, card, dom, in pkey_handler_verify_key() 280 h = pkey_handler_get_keybased(key, keylen); in pkey_handler_apqns_for_key() [all …]
|
| A D | pkey_ep11.c | 42 if (keylen < sizeof(*hdr)) in is_ep11_key() 191 const u8 *key, u32 keylen, in ep11_key2protkey() argument 202 if (keylen < sizeof(*hdr)) in ep11_key2protkey() 210 3, key, keylen, 1)) in ep11_key2protkey() 217 3, key, keylen, 1)) in ep11_key2protkey() 431 if (keylen < sizeof(*hdr)) in ep11_verifykey() 450 ep11_kb_wkvp(key, keylen), xflags); in ep11_verifykey() 465 3, key, keylen, 1); in ep11_verifykey() 474 ep11_kb_wkvp(key, keylen), xflags); in ep11_verifykey() 502 const u8 *key, u32 keylen, in ep11_slowpath_key2protkey() argument [all …]
|
| A D | pkey_base.h | 158 bool (*is_supported_key)(const u8 *key, u32 keylen); 161 const u8 *key, u32 keylen, 166 const u8 *key, u32 keylen, 178 int (*verify_key)(const u8 *key, u32 keylen, 182 int (*apqns_for_key)(const u8 *key, u32 keylen, u32 flags, 200 const struct pkey_handler *pkey_handler_get_keybased(const u8 *key, u32 keylen); 205 const u8 *key, u32 keylen, 210 const u8 *key, u32 keylen, 223 int pkey_handler_verify_key(const u8 *key, u32 keylen, 227 int pkey_handler_apqns_for_key(const u8 *key, u32 keylen, u32 flags,
|
| /drivers/net/wireless/silabs/wfx/ |
| A D | key.c | 36 WARN(key->keylen > sizeof(msg->key_data), "inconsistent data"); in fill_wep_pair() 37 msg->key_length = key->keylen; in fill_wep_pair() 38 memcpy(msg->key_data, key->key, key->keylen); in fill_wep_pair() 46 WARN(key->keylen > sizeof(msg->key_data), "inconsistent data"); in fill_wep_group() 48 msg->key_length = key->keylen; in fill_wep_group() 49 memcpy(msg->key_data, key->key, key->keylen); in fill_wep_group() 93 WARN(key->keylen != sizeof(msg->aes_key_data), "inconsistent data"); in fill_ccmp_pair() 95 memcpy(msg->aes_key_data, key->key, key->keylen); in fill_ccmp_pair() 102 WARN(key->keylen != sizeof(msg->aes_key_data), "inconsistent data"); in fill_ccmp_group() 103 memcpy(msg->aes_key_data, key->key, key->keylen); in fill_ccmp_group() [all …]
|
| /drivers/crypto/cavium/nitrox/ |
| A D | nitrox_skcipher.c | 167 unsigned int keylen) in nitrox_skcipher_setkey() argument 192 memcpy(fctx->crypto.u.key, key, keylen); in nitrox_skcipher_setkey() 198 unsigned int keylen) in nitrox_aes_setkey() argument 202 aes_keylen = flexi_aes_keylen(keylen); in nitrox_aes_setkey() 338 const u8 *key, unsigned int keylen) in nitrox_aes_xts_setkey() argument 348 keylen /= 2; in nitrox_aes_xts_setkey() 350 aes_keylen = flexi_aes_keylen(keylen); in nitrox_aes_xts_setkey() 356 memcpy(fctx->auth.u.key2, (key + keylen), keylen); in nitrox_aes_xts_setkey() 368 if (keylen < CTR_RFC3686_NONCE_SIZE) in nitrox_aes_ctr_rfc3686_setkey() 376 keylen -= CTR_RFC3686_NONCE_SIZE; in nitrox_aes_ctr_rfc3686_setkey() [all …]
|
| /drivers/crypto/caam/ |
| A D | key_gen.c | 45 struct alginfo * const adata, const u8 *key_in, u32 keylen, in gen_split_key() argument 54 adata->keylen = split_key_len(adata->algtype & OP_ALG_ALGSEL_MASK); in gen_split_key() 57 local_max = max(keylen, adata->keylen_pad); in gen_split_key() 60 adata->keylen, adata->keylen_pad); in gen_split_key() 62 DUMP_PREFIX_ADDRESS, 16, 4, key_in, keylen, 1); in gen_split_key() 73 memcpy(key_out, key_in, keylen); in gen_split_key() 82 append_key(desc, dma_addr, keylen, CLASS_2 | KEY_DEST_CLASS_REG); in gen_split_key() 100 append_fifo_store(desc, dma_addr, adata->keylen, in gen_split_key()
|
| A D | caamhash_desc.c | 36 if (state != OP_ALG_AS_UPDATE && adata->keylen) { in cnstr_shdsc_ahash() 46 adata->keylen, CLASS_2 | in cnstr_shdsc_ahash() 98 append_key_as_imm(desc, adata->key_virt, adata->keylen, in cnstr_shdsc_sk_hash() 99 adata->keylen, CLASS_1 | KEY_DEST_CLASS_REG); in cnstr_shdsc_sk_hash() 103 append_key(desc, adata->key_dma, adata->keylen, in cnstr_shdsc_sk_hash() 106 append_key_as_imm(desc, adata->key_virt, adata->keylen, in cnstr_shdsc_sk_hash() 107 adata->keylen, CLASS_1 | in cnstr_shdsc_sk_hash() 138 append_fifo_store(desc, adata->key_dma, adata->keylen, in cnstr_shdsc_sk_hash()
|
| A D | caamalg_desc.c | 69 adata->keylen_pad, adata->keylen, in cnstr_shdsc_aead_null_encap() 73 append_key(desc, adata->key_dma, adata->keylen, in cnstr_shdsc_aead_null_encap() 148 adata->keylen_pad, adata->keylen, in cnstr_shdsc_aead_null_decap() 216 unsigned int enckeylen = cdata->keylen; in init_sh_desc_key_aead() 236 adata->keylen_pad, adata->keylen, in init_sh_desc_key_aead() 899 cdata->keylen), 4, FIFOLD_CLASS_CLASS1 | in cnstr_shdsc_rfc4106_encap() 981 cdata->keylen, CLASS_1 | in cnstr_shdsc_rfc4106_decap() 1008 cdata->keylen), 4, FIFOLD_CLASS_CLASS1 | in cnstr_shdsc_rfc4106_decap() 1092 cdata->keylen), 4, FIFOLD_CLASS_CLASS1 | in cnstr_shdsc_rfc4543_encap() 1175 cdata->keylen), 4, FIFOLD_CLASS_CLASS1 | in cnstr_shdsc_rfc4543_decap() [all …]
|
| A D | caamalg_qi.c | 201 unsigned int keylen) in aead_setkey() argument 289 unsigned int keylen) in des3_aead_setkey() argument 310 ctx->cdata.keylen; in gcm_set_sh_desc() 380 ctx->cdata.keylen = keylen; in gcm_setkey() 413 ctx->cdata.keylen; in rfc4106_set_sh_desc() 486 ctx->cdata.keylen = keylen - 4; in rfc4106_setkey() 521 ctx->cdata.keylen; in rfc4543_set_sh_desc() 592 ctx->cdata.keylen = keylen - 4; in rfc4543_setkey() 637 ctx->cdata.keylen = keylen; in skcipher_setkey() 751 if (keylen != 2 * AES_KEYSIZE_128 && keylen != 2 * AES_KEYSIZE_256) in xts_skcipher_setkey() [all …]
|
| A D | caamalg.c | 211 if (!ctx->cdata.keylen) in aead_set_sh_desc() 339 ctx->cdata.keylen; in gcm_set_sh_desc() 404 ctx->cdata.keylen; in rfc4106_set_sh_desc() 472 ctx->cdata.keylen; in rfc4543_set_sh_desc() 580 ctx->cdata.keylen = keylen - saltlen; in chachapoly_setkey() 682 ctx->cdata.keylen = keylen; in gcm_setkey() 707 ctx->cdata.keylen = keylen - 4; in rfc4106_setkey() 733 ctx->cdata.keylen = keylen - 4; in rfc4543_setkey() 754 ctx->cdata.keylen = keylen; in skcipher_setkey() 857 if (keylen != 2 * AES_KEYSIZE_128 && keylen != 2 * AES_KEYSIZE_256) in xts_skcipher_setkey() [all …]
|
| /drivers/crypto/intel/qat/qat_common/ |
| A D | qat_algs.c | 432 memcpy(cd->ucs_aes.key, key, keylen); in qat_alg_skcipher_init_com() 433 keylen = keylen / 2; in qat_alg_skcipher_init_com() 438 keylen = round_up(keylen, 16); in qat_alg_skcipher_init_com() 440 memcpy(cd->aes.key, key, keylen); in qat_alg_skcipher_init_com() 444 cd_ctrl->cipher_key_sz = keylen >> 3; in qat_alg_skcipher_init_com() 472 if (keylen == AES_KEYSIZE_128) { in qat_alg_xts_reverse_key() 576 unsigned int keylen, in qat_alg_skcipher_init_sessions() argument 590 unsigned int keylen) in qat_alg_aead_rekey() argument 604 unsigned int keylen) in qat_alg_aead_newkey() argument 656 unsigned int keylen) in qat_alg_aead_setkey() argument [all …]
|
| /drivers/crypto/tegra/ |
| A D | tegra-se-key.c | 52 const u32 *key, u32 keylen, u16 slot, u32 alg) in tegra_key_prep_ins_cmd() argument 62 cpuvaddr[i++] = se->manifest(se->owner, alg, keylen); in tegra_key_prep_ins_cmd() 68 for (j = 0; j < keylen / 4; j++) { in tegra_key_prep_ins_cmd() 94 slot, se->manifest(se->owner, alg, keylen)); in tegra_key_prep_ins_cmd() 115 u32 keylen, u16 slot, u32 alg) in tegra_key_insert() argument 123 size = tegra_key_prep_ins_cmd(se, addr, keyval, keylen, slot, alg); in tegra_key_insert() 156 u32 keylen, u32 alg, u32 *keyid) in tegra_key_submit_reserved() argument 158 return tegra_key_insert(se, key, keylen, *keyid, alg); in tegra_key_submit_reserved() 161 int tegra_key_submit(struct tegra_se *se, const u8 *key, u32 keylen, u32 alg, u32 *keyid) in tegra_key_submit() argument 174 ret = tegra_key_insert(se, key, keylen, *keyid, alg); in tegra_key_submit()
|
| /drivers/crypto/rockchip/ |
| A D | rk3288_crypto_skcipher.c | 109 const u8 *key, unsigned int keylen) in rk_aes_setkey() argument 114 if (keylen != AES_KEYSIZE_128 && keylen != AES_KEYSIZE_192 && in rk_aes_setkey() 115 keylen != AES_KEYSIZE_256) in rk_aes_setkey() 117 ctx->keylen = keylen; in rk_aes_setkey() 118 memcpy(ctx->key, key, keylen); in rk_aes_setkey() 124 const u8 *key, unsigned int keylen) in rk_des_setkey() argument 133 ctx->keylen = keylen; in rk_des_setkey() 134 memcpy(ctx->key, key, keylen); in rk_des_setkey() 149 ctx->keylen = keylen; in rk_tdes_setkey() 150 memcpy(ctx->key, key, keylen); in rk_tdes_setkey() [all …]
|
| /drivers/crypto/allwinner/sun8i-ss/ |
| A D | sun8i-ss-cipher.c | 207 op->keylen); in sun8i_ss_cipher() 215 rctx->keylen = op->keylen; in sun8i_ss_cipher() 437 unsigned int keylen) in sun8i_ss_aes_setkey() argument 442 switch (keylen) { in sun8i_ss_aes_setkey() 454 op->keylen = keylen; in sun8i_ss_aes_setkey() 455 op->key = kmemdup(key, keylen, GFP_KERNEL); in sun8i_ss_aes_setkey() 466 unsigned int keylen) in sun8i_ss_des3_setkey() argument 471 if (unlikely(keylen != 3 * DES_KEY_SIZE)) { in sun8i_ss_des3_setkey() 472 dev_dbg(ss->dev, "Invalid keylen %u\n", keylen); in sun8i_ss_des3_setkey() 477 op->keylen = keylen; in sun8i_ss_des3_setkey() [all …]
|
| /drivers/crypto/qce/ |
| A D | skcipher.c | 171 unsigned int keylen) in qce_skcipher_setkey() argument 179 if (!key || !keylen) in qce_skcipher_setkey() 187 __keylen = keylen >> 1; in qce_skcipher_setkey() 191 __keylen = keylen; in qce_skcipher_setkey() 207 ctx->enc_keylen = keylen; in qce_skcipher_setkey() 212 unsigned int keylen) in qce_des_setkey() argument 221 ctx->enc_keylen = keylen; in qce_des_setkey() 227 unsigned int keylen) in qce_des3_setkey() argument 251 ctx->enc_keylen = keylen; in qce_des3_setkey() 263 int keylen; in qce_skcipher_crypt() local [all …]
|
| /drivers/crypto/virtio/ |
| A D | virtio_crypto_akcipher_algs.c | 100 const uint8_t *key, unsigned int keylen) in virtio_crypto_alg_akcipher_init_session() argument 111 pkey = kmemdup(key, keylen, GFP_KERNEL); in virtio_crypto_alg_akcipher_init_session() 130 sg_init_one(&key_sg, pkey, keylen); in virtio_crypto_alg_akcipher_init_session() 339 unsigned int keylen, in virtio_crypto_rsa_set_key() argument 357 ret = rsa_parse_priv_key(&rsa_key, key, keylen); in virtio_crypto_rsa_set_key() 360 ret = rsa_parse_pub_key(&rsa_key, key, keylen); in virtio_crypto_rsa_set_key() 394 para.keylen = cpu_to_le32(keylen); in virtio_crypto_rsa_set_key() 403 unsigned int keylen) in virtio_crypto_rsa_raw_set_priv_key() argument 413 unsigned int keylen) in virtio_crypto_p1pad_rsa_sha1_set_priv_key() argument 422 unsigned int keylen) in virtio_crypto_rsa_raw_set_pub_key() argument [all …]
|
| /drivers/crypto/allwinner/sun8i-ce/ |
| A D | sun8i-ce-cipher.c | 161 op->keylen); in sun8i_ce_cipher_prepare() 184 len = op->keylen; in sun8i_ce_cipher_prepare() 479 unsigned int keylen) in sun8i_ce_aes_setkey() argument 484 switch (keylen) { in sun8i_ce_aes_setkey() 492 dev_dbg(ce->dev, "ERROR: Invalid keylen %u\n", keylen); in sun8i_ce_aes_setkey() 496 op->keylen = keylen; in sun8i_ce_aes_setkey() 497 op->key = kmemdup(key, keylen, GFP_KERNEL | GFP_DMA); in sun8i_ce_aes_setkey() 504 return crypto_skcipher_setkey(op->fallback_tfm, key, keylen); in sun8i_ce_aes_setkey() 508 unsigned int keylen) in sun8i_ce_des3_setkey() argument 518 op->keylen = keylen; in sun8i_ce_des3_setkey() [all …]
|
| /drivers/crypto/ |
| A D | omap-aes-gcm.c | 312 unsigned int keylen) in omap_aes_gcm_setkey() argument 317 ret = aes_expandkey(&ctx->actx, key, keylen); in omap_aes_gcm_setkey() 321 memcpy(ctx->octx.key, key, keylen); in omap_aes_gcm_setkey() 322 ctx->octx.keylen = keylen; in omap_aes_gcm_setkey() 328 unsigned int keylen) in omap_aes_4106gcm_setkey() argument 333 if (keylen < 4) in omap_aes_4106gcm_setkey() 335 keylen -= 4; in omap_aes_4106gcm_setkey() 337 ret = aes_expandkey(&ctx->actx, key, keylen); in omap_aes_4106gcm_setkey() 341 memcpy(ctx->octx.key, key, keylen); in omap_aes_4106gcm_setkey() 342 memcpy(ctx->octx.nonce, key + keylen, 4); in omap_aes_4106gcm_setkey() [all …]
|
| /drivers/crypto/allwinner/sun4i-ss/ |
| A D | sun4i-ss-cipher.c | 62 for (i = 0; i < op->keylen / 4; i++) in sun4i_ss_opti_poll() 578 unsigned int keylen) in sun4i_ss_aes_setkey() argument 583 switch (keylen) { in sun4i_ss_aes_setkey() 597 op->keylen = keylen; in sun4i_ss_aes_setkey() 598 memcpy(op->key, key, keylen); in sun4i_ss_aes_setkey() 608 unsigned int keylen) in sun4i_ss_des_setkey() argument 617 op->keylen = keylen; in sun4i_ss_des_setkey() 618 memcpy(op->key, key, keylen); in sun4i_ss_des_setkey() 628 unsigned int keylen) in sun4i_ss_des3_setkey() argument 637 op->keylen = keylen; in sun4i_ss_des3_setkey() [all …]
|
| /drivers/crypto/hisilicon/sec/ |
| A D | sec_algs.c | 144 unsigned int keylen, in sec_alg_skcipher_init_context() argument 151 memcpy(ctx->key, key, keylen); in sec_alg_skcipher_init_context() 228 const u8 *key, unsigned int keylen, in sec_alg_skcipher_setkey() argument 254 const u8 *key, unsigned int keylen) in sec_alg_skcipher_setkey_aes_ecb() argument 258 switch (keylen) { in sec_alg_skcipher_setkey_aes_ecb() 276 const u8 *key, unsigned int keylen) in sec_alg_skcipher_setkey_aes_cbc() argument 280 switch (keylen) { in sec_alg_skcipher_setkey_aes_cbc() 298 const u8 *key, unsigned int keylen) in sec_alg_skcipher_setkey_aes_ctr() argument 302 switch (keylen) { in sec_alg_skcipher_setkey_aes_ctr() 325 ret = xts_verify_key(tfm, key, keylen); in sec_alg_skcipher_setkey_aes_xts() [all …]
|
| /drivers/crypto/ccree/ |
| A D | cc_cipher.c | 47 int keylen; member 296 unsigned int keylen) in cc_cipher_sethkey() argument 310 if (keylen != sizeof(hki)) { in cc_cipher_sethkey() 315 memcpy(&hki, key, keylen); in cc_cipher_sethkey() 320 keylen = hki.keylen; in cc_cipher_sethkey() 327 ctx_p->keylen = keylen; in cc_cipher_sethkey() 396 unsigned int keylen) in cc_cipher_setkey() argument 420 if (keylen != AES_KEYSIZE_256) { in cc_cipher_setkey() 473 ctx_p->user.key, keylen, in cc_cipher_setkey() 480 keylen <<= 1; in cc_cipher_setkey() [all …]
|