Lines Matching refs:ukey
259 static int tipc_aead_init(struct tipc_aead **aead, struct tipc_aead_key *ukey,
334 int tipc_aead_key_validate(struct tipc_aead_key *ukey, struct genl_info *info) in tipc_aead_key_validate() argument
339 if (unlikely(!crypto_has_alg(ukey->alg_name, 0, 0))) { in tipc_aead_key_validate()
345 if (strcmp(ukey->alg_name, "gcm(aes)")) { in tipc_aead_key_validate()
351 keylen = ukey->keylen - TIPC_AES_GCM_SALT_SIZE; in tipc_aead_key_validate()
514 static int tipc_aead_init(struct tipc_aead **aead, struct tipc_aead_key *ukey, in tipc_aead_init() argument
532 keylen = ukey->keylen - TIPC_AES_GCM_SALT_SIZE; in tipc_aead_init()
543 tfm = crypto_alloc_aead(ukey->alg_name, 0, 0); in tipc_aead_init()
557 err |= crypto_aead_setkey(tfm, ukey->key, keylen); in tipc_aead_init()
592 bin2hex(tmp->hint, ukey->key + keylen - TIPC_AEAD_HINT_LEN, in tipc_aead_init()
599 tmp->key = kmemdup(ukey, tipc_aead_key_size(ukey), GFP_KERNEL); in tipc_aead_init()
604 memcpy(&tmp->salt, ukey->key + keylen, TIPC_AES_GCM_SALT_SIZE); in tipc_aead_init()
1119 int tipc_crypto_key_init(struct tipc_crypto *c, struct tipc_aead_key *ukey, in tipc_crypto_key_init() argument
1126 rc = tipc_aead_init(&aead, ukey, mode); in tipc_crypto_key_init()