Searched refs:enckey (Results 1 – 10 of 10) sorted by relevance
| /linux/security/keys/ |
| H A D | big_key.c | 61 u8 *buf, *enckey; in big_key_preparse() local 92 enckey = kmalloc(CHACHA20POLY1305_KEY_SIZE, GFP_KERNEL); in big_key_preparse() 93 if (!enckey) { in big_key_preparse() 97 ret = get_random_bytes_wait(enckey, CHACHA20POLY1305_KEY_SIZE); in big_key_preparse() 103 0, enckey); in big_key_preparse() 123 payload->data = enckey; in big_key_preparse() 143 kfree_sensitive(enckey); in big_key_preparse() 238 u8 *buf, *enckey = payload->data; in big_key_read() local 261 enckey) ? 0 : -EBADMSG; in big_key_read()
|
| /linux/drivers/crypto/qce/ |
| H A D | common.c | 298 static void qce_xtskey(struct qce_device *qce, const u8 *enckey, in qce_xtskey() argument 304 qce_cpu_to_be32p_array((__be32 *)xtskey, enckey + enckeylen / 2, in qce_xtskey() 321 __be32 enckey[QCE_MAX_CIPHER_KEY_SIZE / sizeof(__be32)] = {0}; in qce_setup_regs_skcipher() local 336 qce_cpu_to_be32p_array(enckey, ctx->enc_key, keylen); in qce_setup_regs_skcipher() 358 qce_write_array(qce, REG_ENCR_KEY0, (u32 *)enckey, enckey_words); in qce_setup_regs_skcipher() 427 u32 enckey[QCE_MAX_CIPHER_KEY_SIZE / sizeof(u32)] = {0}; in qce_setup_regs_aead() local 445 enckey_words = qce_be32_to_cpu_array(enckey, ctx->enc_key, enc_keylen); in qce_setup_regs_aead() 446 qce_write_array(qce, REG_ENCR_KEY0, enckey, enckey_words); in qce_setup_regs_aead()
|
| /linux/crypto/ |
| H A D | authenc.c | 76 keys->enckey = key + keys->authkeylen; in crypto_authenc_extractkeys() 104 err = crypto_skcipher_setkey(enc, keys.enckey, keys.enckeylen); in crypto_authenc_setkey()
|
| H A D | authencesn.c | 78 err = crypto_skcipher_setkey(enc, keys.enckey, keys.enckeylen); in crypto_authenc_esn_setkey()
|
| H A D | essiv.c | 114 crypto_shash_update(desc, keys.enckey, keys.enckeylen) ?: in essiv_aead_setkey()
|
| /linux/drivers/crypto/bcm/ |
| H A D | cipher.h | 180 u8 enckey[MAX_KEY_SIZE + ARC4_STATE_SIZE]; member
|
| /linux/drivers/crypto/inside-secure/ |
| H A D | safexcel_cipher.c | 421 ctx->nonce = *(u32 *)(keys.enckey + keys.enckeylen - in safexcel_aead_setkey() 430 err = verify_aead_des_key(ctfm, keys.enckey, keys.enckeylen); in safexcel_aead_setkey() 435 err = verify_aead_des3_key(ctfm, keys.enckey, keys.enckeylen); in safexcel_aead_setkey() 440 err = aes_expandkey(&aes, keys.enckey, keys.enckeylen); in safexcel_aead_setkey() 456 ((u32 *)keys.enckey)[i]) { in safexcel_aead_setkey() 494 ctx->key[i] = cpu_to_le32(((u32 *)keys.enckey)[i]); in safexcel_aead_setkey()
|
| /linux/drivers/crypto/caam/ |
| H A D | caamalg_qi.c | 231 memcpy(ctx->key + ctx->adata.keylen_pad, keys.enckey, in aead_setkey() 246 memcpy(ctx->key + ctx->adata.keylen_pad, keys.enckey, keys.enckeylen); in aead_setkey() 298 err = verify_aead_des3_key(aead, keys.enckey, keys.enckeylen) ?: in des3_aead_setkey()
|
| H A D | caamalg.c | 622 memcpy(ctx->key + ctx->adata.keylen_pad, keys.enckey, in aead_setkey() 638 memcpy(ctx->key + ctx->adata.keylen_pad, keys.enckey, keys.enckeylen); in aead_setkey() 665 err = verify_aead_des3_key(aead, keys.enckey, keys.enckeylen) ?: in des3_aead_setkey()
|
| /linux/drivers/crypto/marvell/octeontx/ |
| H A D | otx_cptvf_algs.c | 790 memcpy(ctx->key + authkeylen, keys->enckey, keys->enckeylen); in aead_hmac_init()
|