| /linux/arch/x86/crypto/ |
| A D | aes_ctrby8_avx-x86_64.S | 115 .set klen, \key_len 429 jg .Lgt4\xctr\key_len 432 .Llt4\xctr\key_len: 437 .Leq1\xctr\key_len: 444 .Leq2\xctr\key_len: 452 .Leq3\xctr\key_len: 459 .Leq4\xctr\key_len: 466 .Lgt4\xctr\key_len: 471 .Leq5\xctr\key_len: 478 .Leq6\xctr\key_len: [all …]
|
| /linux/drivers/firmware/efi/ |
| A D | apple-properties.c | 57 u32 key_len, val_len, entry_len; in unmarshal_key_value_pairs() local 61 if (sizeof(key_len) > remaining) in unmarshal_key_value_pairs() 64 key_len = *(typeof(key_len) *)ptr; in unmarshal_key_value_pairs() 65 if (key_len + sizeof(val_len) > remaining || in unmarshal_key_value_pairs() 66 key_len < sizeof(key_len) + sizeof(efi_char16_t) || in unmarshal_key_value_pairs() 74 if (key_len + val_len > remaining || in unmarshal_key_value_pairs() 77 ptr - (void *)dev_header + key_len); in unmarshal_key_value_pairs() 82 key = kzalloc((key_len - sizeof(key_len)) * 4 + 1, GFP_KERNEL); in unmarshal_key_value_pairs() 87 ucs2_as_utf8(key, ptr + sizeof(key_len), in unmarshal_key_value_pairs() 88 key_len - sizeof(key_len)); in unmarshal_key_value_pairs() [all …]
|
| /linux/arch/sparc/crypto/ |
| A D | camellia_glue.c | 31 int key_len; member 38 unsigned int key_len) in camellia_set_key() argument 43 if (key_len != 16 && key_len != 24 && key_len != 32) in camellia_set_key() 46 ctx->key_len = key_len; in camellia_set_key() 49 key_len, &ctx->decrypt_key[0]); in camellia_set_key() 60 u32 *output, unsigned int key_len); 68 (u32 *) dst, ctx->key_len); in camellia_encrypt() 77 (u32 *) dst, ctx->key_len); in camellia_decrypt() 99 if (ctx->key_len != 16) in __ecb_crypt() 149 if (ctx->key_len != 16) in cbc_encrypt() [all …]
|
| /linux/arch/s390/crypto/ |
| A D | aes_s390.c | 45 int key_len; member 61 int key_len; member 78 unsigned int key_len) in setkey_fallback_cip() argument 105 sctx->key_len = key_len; in aes_set_key() 222 sctx->key_len = key_len; in ecb_aes_set_key() 318 sctx->key_len = key_len; in cbc_aes_set_key() 416 key_len = key_len / 2; in xts_aes_set_key() 417 xts_ctx->key_len = key_len; in xts_aes_set_key() 419 memcpy(xts_ctx->pcc_key, in_key + key_len, key_len); in xts_aes_set_key() 556 xts_ctx->key_len = key_len; in fullxts_aes_set_key() [all …]
|
| /linux/drivers/nvme/common/ |
| A D | auth.c | 157 return struct_size(&key, key, key_len); in nvme_auth_key_struct_size() 167 int ret, key_len; in nvme_auth_extract_key() local 179 if (key_len < 0) { in nvme_auth_extract_key() 181 key_len); in nvme_auth_extract_key() 182 ret = key_len; in nvme_auth_extract_key() 186 if (key_len != 36 && key_len != 52 && in nvme_auth_extract_key() 187 key_len != 68) { in nvme_auth_extract_key() 194 key_len -= 4; in nvme_auth_extract_key() 199 crc = ~crc32(~0, key->key, key_len); in nvme_auth_extract_key() 207 key->len = key_len; in nvme_auth_extract_key() [all …]
|
| /linux/drivers/crypto/ccp/ |
| A D | ccp-crypto-aes-xts.c | 76 unsigned int key_len) in ccp_aes_xts_setkey() argument 82 ret = xts_verify_key(tfm, key, key_len); in ccp_aes_xts_setkey() 89 switch (key_len) { in ccp_aes_xts_setkey() 91 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_xts_setkey() 95 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_xts_setkey() 98 ctx->u.aes.key_len = key_len / 2; in ccp_aes_xts_setkey() 116 if (!ctx->u.aes.key_len) in ccp_aes_xts_crypt() 142 (ctx->u.aes.key_len != AES_KEYSIZE_128)) in ccp_aes_xts_crypt() 145 (ctx->u.aes.key_len != AES_KEYSIZE_256)) in ccp_aes_xts_crypt() 175 rctx->cmd.u.xts.key_len = ctx->u.aes.key_len; in ccp_aes_xts_crypt() [all …]
|
| A D | ccp-crypto-aes.c | 39 unsigned int key_len) in ccp_aes_setkey() argument 44 switch (key_len) { in ccp_aes_setkey() 58 ctx->u.aes.key_len = key_len; in ccp_aes_setkey() 60 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_setkey() 74 if (!ctx->u.aes.key_len) in ccp_aes_crypt() 100 rctx->cmd.u.aes.key_len = ctx->u.aes.key_len; in ccp_aes_crypt() 125 ctx->u.aes.key_len = 0; in ccp_aes_init_tfm() 145 unsigned int key_len) in ccp_aes_rfc3686_setkey() argument 149 if (key_len < CTR_RFC3686_NONCE_SIZE) in ccp_aes_rfc3686_setkey() 152 key_len -= CTR_RFC3686_NONCE_SIZE; in ccp_aes_rfc3686_setkey() [all …]
|
| A D | ccp-crypto-aes-galois.c | 30 unsigned int key_len) in ccp_aes_gcm_setkey() argument 34 switch (key_len) { in ccp_aes_gcm_setkey() 49 ctx->u.aes.key_len = key_len; in ccp_aes_gcm_setkey() 51 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_gcm_setkey() 52 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); in ccp_aes_gcm_setkey() 86 if (!ctx->u.aes.key_len) in ccp_aes_gcm_crypt() 124 rctx->cmd.u.aes.key_len = ctx->u.aes.key_len; in ccp_aes_gcm_crypt() 154 ctx->u.aes.key_len = 0; in ccp_aes_gcm_cra_init()
|
| A D | ccp-crypto-des3.c | 38 unsigned int key_len) in ccp_des3_setkey() argument 53 ctx->u.des3.key_len = key_len; in ccp_des3_setkey() 55 memcpy(ctx->u.des3.key, key, key_len); in ccp_des3_setkey() 56 sg_init_one(&ctx->u.des3.key_sg, ctx->u.des3.key, key_len); in ccp_des3_setkey() 69 if (!ctx->u.des3.key_len) in ccp_des3_crypt() 96 rctx->cmd.u.des3.key_len = ctx->u.des3.key_len; in ccp_des3_crypt() 121 ctx->u.des3.key_len = 0; in ccp_des3_init_tfm()
|
| /linux/arch/arm64/crypto/ |
| A D | aes-ce-glue.c | 75 unsigned int key_len) in ce_aes_expandkey() argument 84 u32 kwords = key_len / sizeof(u32); in ce_aes_expandkey() 88 if (key_len != AES_KEYSIZE_128 && in ce_aes_expandkey() 89 key_len != AES_KEYSIZE_192 && in ce_aes_expandkey() 90 key_len != AES_KEYSIZE_256) in ce_aes_expandkey() 93 ctx->key_length = key_len; in ce_aes_expandkey() 107 if (key_len == AES_KEYSIZE_192) { in ce_aes_expandkey() 112 } else if (key_len == AES_KEYSIZE_256) { in ce_aes_expandkey() 143 unsigned int key_len) in ce_aes_setkey() argument 147 return ce_aes_expandkey(ctx, in_key, key_len); in ce_aes_setkey()
|
| /linux/net/wireless/ |
| A D | lib80211_crypt_wep.c | 33 u8 key_len; member 77 klen = 3 + wep->key_len; in lib80211_wep_build_iv() 124 memcpy(key + 3, wep->key, wep->key_len); in lib80211_wep_encrypt() 128 klen = 3 + wep->key_len; in lib80211_wep_encrypt() 169 klen = 3 + wep->key_len; in lib80211_wep_decrypt() 172 memcpy(key + 3, wep->key, wep->key_len); in lib80211_wep_decrypt() 206 wep->key_len = len; in lib80211_wep_set_key() 215 if (len < wep->key_len) in lib80211_wep_get_key() 218 memcpy(key, wep->key, wep->key_len); in lib80211_wep_get_key() 220 return wep->key_len; in lib80211_wep_get_key() [all …]
|
| /linux/drivers/staging/rtl8192e/ |
| A D | rtllib_crypt_wep.c | 24 u8 key_len; member 81 klen = 3 + wep->key_len; in prism2_wep_encrypt() 103 memcpy(key + 3, wep->key, wep->key_len); in prism2_wep_encrypt() 150 klen = 3 + wep->key_len; in prism2_wep_decrypt() 153 memcpy(key + 3, wep->key, wep->key_len); in prism2_wep_decrypt() 188 wep->key_len = len; in prism2_wep_set_key() 197 if (len < wep->key_len) in prism2_wep_get_key() 200 memcpy(key, wep->key, wep->key_len); in prism2_wep_get_key() 202 return wep->key_len; in prism2_wep_get_key() 209 seq_printf(m, "key[%d] alg=WEP len=%d\n", wep->key_idx, wep->key_len); in prism2_wep_print_stats()
|
| /linux/security/keys/trusted-keys/ |
| A D | trusted_core.c | 99 p->key_len = keylen; in datablob_parse() 158 size_t key_len; in trusted_instantiate() local 191 key_len = payload->key_len; in trusted_instantiate() 193 key_len); in trusted_instantiate() 197 if (ret != key_len) { in trusted_instantiate() 267 new_p->key_len = p->key_len; in trusted_update() 268 memcpy(new_p->key, p->key, p->key_len); in trusted_update() 327 static int kernel_get_random(unsigned char *key, size_t key_len) in kernel_get_random() argument 329 return get_random_bytes_wait(key, key_len) ?: key_len; in kernel_get_random() 334 int (*get_random)(unsigned char *key, size_t key_len); in init_trusted()
|
| /linux/drivers/crypto/nx/ |
| A D | nx-aes-ctr.c | 24 unsigned int key_len) in ctr_aes_nx_set_key() argument 31 switch (key_len) { in ctr_aes_nx_set_key() 49 memcpy(csbcpb->cpb.aes_ctr.key, in_key, key_len); in ctr_aes_nx_set_key() 56 unsigned int key_len) in ctr3686_aes_nx_set_key() argument 60 if (key_len < CTR_RFC3686_NONCE_SIZE) in ctr3686_aes_nx_set_key() 64 in_key + key_len - CTR_RFC3686_NONCE_SIZE, in ctr3686_aes_nx_set_key() 67 key_len -= CTR_RFC3686_NONCE_SIZE; in ctr3686_aes_nx_set_key() 69 return ctr_aes_nx_set_key(tfm, in_key, key_len); in ctr3686_aes_nx_set_key()
|
| /linux/arch/powerpc/platforms/pseries/ |
| A D | plpks-secvar.c | 75 static int plpks_get_variable(const char *key, u64 key_len, u8 *data, in plpks_get_variable() argument 83 var.name = kcalloc(key_len - 1, sizeof(wchar_t), GFP_KERNEL); in plpks_get_variable() 86 rc = utf8s_to_utf16s(key, key_len - 1, UTF16_LITTLE_ENDIAN, (wchar_t *)var.name, in plpks_get_variable() 87 key_len - 1); in plpks_get_variable() 115 static int plpks_set_variable(const char *key, u64 key_len, u8 *data, in plpks_set_variable() argument 129 var.name = kcalloc(key_len - 1, sizeof(wchar_t), GFP_KERNEL); in plpks_set_variable() 132 rc = utf8s_to_utf16s(key, key_len - 1, UTF16_LITTLE_ENDIAN, (wchar_t *)var.name, in plpks_set_variable() 133 key_len - 1); in plpks_set_variable()
|
| /linux/drivers/crypto/bcm/ |
| A D | spu2.c | 1003 flow_log(" key: %d\n", cipher_parms->key_len); in spu2_create_request() 1037 hash_parms->key_len = cipher_parms->key_len; in spu2_create_request() 1039 cipher_parms->key_len); in spu2_create_request() 1040 cipher_parms->key_len = 0; in spu2_create_request() 1075 hash_parms->key_len, cipher_parms->key_len, in spu2_create_request() 1091 if (hash_parms->key_len) { in spu2_create_request() 1093 ptr += hash_parms->key_len; in spu2_create_request() 1094 buf_len += hash_parms->key_len; in spu2_create_request() 1096 if (cipher_parms->key_len) { in spu2_create_request() 1098 ptr += cipher_parms->key_len; in spu2_create_request() [all …]
|
| A D | spu.c | 703 if (hash_parms->key_len) { in spum_create_request() 705 ptr += hash_parms->key_len; in spum_create_request() 706 buf_len += hash_parms->key_len; in spum_create_request() 707 sctx_words += hash_parms->key_len / 4; in spum_create_request() 737 if (cipher_parms->key_len) { in spum_create_request() 739 cipher_parms->key_len); in spum_create_request() 740 ptr += cipher_parms->key_len; in spum_create_request() 741 buf_len += cipher_parms->key_len; in spum_create_request() 742 sctx_words += cipher_parms->key_len / 4; in spum_create_request() 864 if (cipher_parms->key_len) { in spum_cipher_req_init() [all …]
|
| /linux/crypto/ |
| A D | aria_generic.c | 28 unsigned int key_len) in aria_set_encrypt_key() argument 36 ck = &key_rc[(key_len - 16) / 2]; in aria_set_encrypt_key() 50 if (key_len > 16) { in aria_set_encrypt_key() 53 if (key_len > 24) { in aria_set_encrypt_key() 134 if (key_len > 16) { in aria_set_encrypt_key() 140 if (key_len > 24) { in aria_set_encrypt_key() 174 int aria_set_key(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) in aria_set_key() argument 178 if (key_len != 16 && key_len != 24 && key_len != 32) in aria_set_key() 185 ctx->key_length = key_len; in aria_set_key() 186 ctx->rounds = (key_len + 32) / 4; in aria_set_key() [all …]
|
| /linux/lib/crypto/ |
| A D | aes.c | 186 unsigned int key_len) in aes_expandkey() argument 188 u32 kwords = key_len / sizeof(u32); in aes_expandkey() 192 err = aes_check_keylen(key_len); in aes_expandkey() 196 ctx->key_length = key_len; in aes_expandkey() 210 if (key_len == AES_KEYSIZE_192) { in aes_expandkey() 215 } else if (key_len == AES_KEYSIZE_256) { in aes_expandkey() 231 ctx->key_dec[0] = ctx->key_enc[key_len + 24]; in aes_expandkey() 232 ctx->key_dec[1] = ctx->key_enc[key_len + 25]; in aes_expandkey() 233 ctx->key_dec[2] = ctx->key_enc[key_len + 26]; in aes_expandkey() 234 ctx->key_dec[3] = ctx->key_enc[key_len + 27]; in aes_expandkey() [all …]
|
| /linux/tools/testing/selftests/bpf/progs/ |
| A D | crypto_bench.c | 15 u32 key_len, authsize; variable 27 .key_len = key_len, in crypto_setup() 34 if (!cipher[0] || !key_len || key_len > 256) { in crypto_setup()
|
| /linux/arch/arm/crypto/ |
| A D | aes-neonbs-glue.c | 68 unsigned int key_len) in aesbs_setkey() argument 74 err = aes_expandkey(&rk, in_key, key_len); in aesbs_setkey() 78 ctx->rounds = 6 + key_len / 4; in aesbs_setkey() 127 unsigned int key_len) in aesbs_cbc_setkey() argument 136 ctx->key.rounds = 6 + key_len / 4; in aesbs_cbc_setkey() 204 unsigned int key_len) in aesbs_ctr_setkey_sync() argument 213 ctx->key.rounds = 6 + key_len / 4; in aesbs_ctr_setkey_sync() 273 unsigned int key_len) in aesbs_xts_setkey() argument 282 key_len /= 2; in aesbs_xts_setkey() 286 err = aes_expandkey(&ctx->tweak_key, in_key + key_len, key_len); in aesbs_xts_setkey() [all …]
|
| /linux/net/mac80211/ |
| A D | fils_aead.c | 66 static int aes_siv_encrypt(const u8 *key, size_t key_len, in aes_siv_encrypt() argument 79 key_len /= 2; /* S2V key || CTR key */ in aes_siv_encrypt() 91 res = crypto_shash_setkey(tfm, key, key_len); in aes_siv_encrypt() 122 res = crypto_skcipher_setkey(tfm2, key + key_len, key_len); in aes_siv_encrypt() 144 static int aes_siv_decrypt(const u8 *key, size_t key_len, in aes_siv_decrypt() argument 159 key_len /= 2; /* S2V key || CTR key */ in aes_siv_decrypt() 179 res = crypto_skcipher_setkey(tfm2, key + key_len, key_len); in aes_siv_decrypt() 206 res = crypto_shash_setkey(tfm, key, key_len); in aes_siv_decrypt()
|
| /linux/drivers/net/ethernet/netronome/nfp/ |
| A D | nfp_net_debugdump.c | 204 u32 tl_len, key_len; in nfp_calc_hwinfo_field_sz() local 208 key_len = strnlen(spec->data, tl_len); in nfp_calc_hwinfo_field_sz() 209 if (key_len == tl_len) in nfp_calc_hwinfo_field_sz() 239 u32 tl_len, key_len; in nfp_calc_rtsym_dump_sz() local 244 if (key_len == tl_len) in nfp_calc_rtsym_dump_sz() 420 u32 tl_len, key_len, val_len; in nfp_dump_hwinfo_field() local 426 key_len = strnlen(spec->data, tl_len); in nfp_dump_hwinfo_field() 427 if (key_len == tl_len) in nfp_dump_hwinfo_field() 616 u32 tl_len, key_len; in nfp_dump_single_rtsym() local 622 key_len = strnlen(spec->rtsym, tl_len); in nfp_dump_single_rtsym() [all …]
|
| /linux/include/keys/ |
| A D | trusted-type.h | 28 unsigned int key_len; member 68 int (*get_random)(unsigned char *key, size_t key_len); 86 pr_info("key_len %d\n", p->key_len); in dump_payload() 88 16, 1, p->key, p->key_len, 0); in dump_payload()
|
| /linux/drivers/net/ethernet/netronome/nfp/crypto/ |
| A D | ipsec.c | 274 int i, key_len, trunc_len, err = 0; in nfp_net_xfrm_add_state() local 368 key_len = DIV_ROUND_UP(x->aalg->alg_key_len, BITS_PER_BYTE); in nfp_net_xfrm_add_state() 369 if (key_len > sizeof(cfg->auth_key)) { in nfp_net_xfrm_add_state() 373 for (i = 0; i < key_len / sizeof(cfg->auth_key[0]) ; i++) in nfp_net_xfrm_add_state() 461 key_len = DIV_ROUND_UP(x->aead->alg_key_len, BITS_PER_BYTE); in nfp_net_xfrm_add_state() 462 key_len -= salt_len; in nfp_net_xfrm_add_state() 464 if (key_len > sizeof(cfg->ciph_key)) { in nfp_net_xfrm_add_state() 474 key_offset = key_len / sizeof(cfg->ciph_key[0]) >> 1; in nfp_net_xfrm_add_state() 476 for (i = 0; i < key_len / sizeof(cfg->ciph_key[0]); i++) { in nfp_net_xfrm_add_state() 490 if (key_len > sizeof(cfg->ciph_key)) { in nfp_net_xfrm_add_state() [all …]
|