| /linux/include/crypto/ |
| H A D | aead.h | 381 int crypto_aead_setkey(struct crypto_aead *tfm, 387 return crypto_aead_setkey(&tfm->base, key, keylen); in crypto_sync_aead_setkey()
|
| /linux/crypto/ |
| H A D | aead.c | 44 int crypto_aead_setkey(struct crypto_aead *tfm, in crypto_aead_setkey() function 63 EXPORT_SYMBOL_GPL(crypto_aead_setkey);
|
| H A D | simd.c | 277 return crypto_aead_setkey(child, key, key_len); in simd_aead_setkey()
|
| H A D | essiv.c | 105 err = crypto_aead_setkey(tctx->u.aead, key, keylen); in essiv_aead_setkey()
|
| H A D | tcrypt.c | 362 ret = crypto_aead_setkey(tfm, key, *keysize); in test_mb_aead_speed() 618 ret = crypto_aead_setkey(tfm, key, *keysize); in test_aead_speed()
|
| H A D | testmgr.c | 2059 err = do_setkey(crypto_aead_setkey, tfm, vec->key, vec->klen, in test_aead_vec_cfg() 2394 vec->setkey_error = crypto_aead_setkey(tfm, vec->key, vec->klen); in generate_random_aead_testvec()
|
| /linux/net/mac80211/ |
| H A D | aes_gmac.c | 81 err = crypto_aead_setkey(tfm, key, key_len); in ieee80211_aes_gmac_key_setup()
|
| H A D | aead_api.c | 96 err = crypto_aead_setkey(tfm, key, key_len); in aead_key_setup_encrypt()
|
| /linux/security/keys/trusted-keys/ |
| H A D | trusted_dcp.c | 171 if (crypto_aead_setkey(aead, key, AES_KEYSIZE_128)) { in do_aead_crypto()
|
| /linux/fs/smb/server/ |
| H A D | auth.c | 884 rc = crypto_aead_setkey(tfm, key, SMB3_GCM256_CRYPTKEY_SIZE); in ksmbd_crypt_message() 886 rc = crypto_aead_setkey(tfm, key, SMB3_GCM128_CRYPTKEY_SIZE); in ksmbd_crypt_message()
|
| /linux/net/tls/ |
| H A D | tls_device_fallback.c | 459 rc = crypto_aead_setkey(offload_ctx->aead_send, in tls_sw_fallback_init()
|
| H A D | tls_sw.c | 2853 rc = crypto_aead_setkey(*aead, key, cipher_desc->key); in tls_set_sw_offload()
|
| /linux/drivers/crypto/inside-secure/ |
| H A D | safexcel_cipher.c | 2848 ret = crypto_aead_setkey(ctx->fback, (u8 *)key, in safexcel_aead_chachapoly_crypt() 2852 ret = crypto_aead_setkey(ctx->fback, (u8 *)key, in safexcel_aead_chachapoly_crypt() 3233 return crypto_aead_setkey(ctx->fback, (u8 *)key, len) ?: in safexcel_aead_fallback_setkey()
|
| /linux/net/mac802154/ |
| H A D | llsec.c | 134 if (crypto_aead_setkey(key->tfm[i], template->key, in llsec_key_alloc()
|
| /linux/drivers/md/ |
| H A D | dm-crypt.c | 2442 r = crypto_aead_setkey(cc->cipher_tfm.tfms_aead[i], in crypt_setkey() 2445 r = crypto_aead_setkey(cc->cipher_tfm.tfms_aead[i], in crypt_setkey()
|
| /linux/net/tipc/ |
| H A D | crypto.c | 557 err |= crypto_aead_setkey(tfm, ukey->key, keylen); in tipc_aead_init()
|
| /linux/fs/smb/client/ |
| H A D | smb2ops.c | 4452 rc = crypto_aead_setkey(tfm, key, SMB3_GCM256_CRYPTKEY_SIZE); in crypt_message() 4454 rc = crypto_aead_setkey(tfm, key, SMB3_GCM128_CRYPTKEY_SIZE); in crypt_message()
|
| /linux/net/ceph/ |
| H A D | messenger_v2.c | 751 ret = crypto_aead_setkey(con->v2.gcm_tfm, con_secret, CEPH_GCM_KEY_LEN); in setup_crypto()
|
| /linux/drivers/net/ |
| H A D | macsec.c | 1378 ret = crypto_aead_setkey(tfm, key, key_len); in macsec_alloc_tfm()
|