Home
last modified time | relevance | path

Searched refs:key_len (Results 1 – 25 of 270) sorted by relevance

1234567891011

/linux/drivers/firmware/efi/
H A Dapple-properties.c57 u32 key_len, val_len, entry_len; in unmarshal_key_value_pairs() local
61 if (sizeof(key_len) > remaining) in unmarshal_key_value_pairs()
64 key_len = *(typeof(key_len) *)ptr; in unmarshal_key_value_pairs()
65 if (key_len + sizeof(val_len) > remaining || in unmarshal_key_value_pairs()
66 key_len < sizeof(key_len) + sizeof(efi_char16_t) || in unmarshal_key_value_pairs()
67 *(efi_char16_t *)(ptr + sizeof(key_len)) == 0) { in unmarshal_key_value_pairs()
73 val_len = *(typeof(val_len) *)(ptr + key_len); in unmarshal_key_value_pairs()
74 if (key_len + val_len > remaining || in unmarshal_key_value_pairs()
77 ptr - (void *)dev_header + key_len); in unmarshal_key_value_pairs()
82 key = kzalloc((key_len - sizeof(key_len)) * 4 + 1, GFP_KERNEL); in unmarshal_key_value_pairs()
[all …]
/linux/lib/crypto/tests/
H A Dblake2b_kunit.c52 for (int key_len = 0; key_len <= BLAKE2B_KEY_SIZE; key_len++) { in test_blake2b_all_key_and_hash_lens() local
53 rand_bytes_seeded_from_len(key, key_len); in test_blake2b_all_key_and_hash_lens()
55 blake2b(key, key_len, data, data_len, hash, out_len); in test_blake2b_all_key_and_hash_lens()
73 for (int key_len = 0; key_len <= BLAKE2B_KEY_SIZE; key_len++) { in test_blake2b_with_guarded_key_buf() local
75 u8 *guarded_key = &test_buf[TEST_BUF_LEN - key_len]; in test_blake2b_with_guarded_key_buf()
80 rand_bytes(key, key_len); in test_blake2b_with_guarded_key_buf()
81 memcpy(guarded_key, key, key_len); in test_blake2b_with_guarded_key_buf()
83 blake2b(key, key_len, test_buf, data_len, in test_blake2b_with_guarded_key_buf()
85 blake2b(guarded_key, key_len, test_buf, data_len, in test_blake2b_with_guarded_key_buf()
89 blake2b_init_key(&ctx, BLAKE2B_HASH_SIZE, guarded_key, key_len); in test_blake2b_with_guarded_key_buf()
H A Dblake2s_kunit.c52 for (int key_len = 0; key_len <= BLAKE2S_KEY_SIZE; key_len++) { in test_blake2s_all_key_and_hash_lens() local
53 rand_bytes_seeded_from_len(key, key_len); in test_blake2s_all_key_and_hash_lens()
55 blake2s(key, key_len, data, data_len, hash, out_len); in test_blake2s_all_key_and_hash_lens()
73 for (int key_len = 0; key_len <= BLAKE2S_KEY_SIZE; key_len++) { in test_blake2s_with_guarded_key_buf() local
75 u8 *guarded_key = &test_buf[TEST_BUF_LEN - key_len]; in test_blake2s_with_guarded_key_buf()
80 rand_bytes(key, key_len); in test_blake2s_with_guarded_key_buf()
81 memcpy(guarded_key, key, key_len); in test_blake2s_with_guarded_key_buf()
83 blake2s(key, key_len, test_buf, data_len, in test_blake2s_with_guarded_key_buf()
85 blake2s(guarded_key, key_len, test_buf, data_len, in test_blake2s_with_guarded_key_buf()
89 blake2s_init_key(&ctx, BLAKE2S_HASH_SIZE, guarded_key, key_len); in test_blake2s_with_guarded_key_buf()
/linux/drivers/crypto/ccp/
H A Dccp-crypto-aes-xts.c76 unsigned int key_len) in ccp_aes_xts_setkey() argument
82 ret = xts_verify_key(tfm, key, key_len); in ccp_aes_xts_setkey()
89 switch (key_len) { in ccp_aes_xts_setkey()
91 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_xts_setkey()
95 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_xts_setkey()
98 ctx->u.aes.key_len = key_len / 2; in ccp_aes_xts_setkey()
99 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); in ccp_aes_xts_setkey()
101 return crypto_skcipher_setkey(ctx->u.aes.tfm_skcipher, key, key_len); in ccp_aes_xts_setkey()
116 if (!ctx->u.aes.key_len) in ccp_aes_xts_crypt()
142 (ctx->u.aes.key_len != AES_KEYSIZE_128)) in ccp_aes_xts_crypt()
[all …]
H A Dccp-crypto-aes-galois.c30 unsigned int key_len) in ccp_aes_gcm_setkey() argument
34 switch (key_len) { in ccp_aes_gcm_setkey()
49 ctx->u.aes.key_len = key_len; in ccp_aes_gcm_setkey()
51 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_gcm_setkey()
52 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); in ccp_aes_gcm_setkey()
86 if (!ctx->u.aes.key_len) in ccp_aes_gcm_crypt()
124 rctx->cmd.u.aes.key_len = ctx->u.aes.key_len; in ccp_aes_gcm_crypt()
154 ctx->u.aes.key_len = 0; in ccp_aes_gcm_cra_init()
H A Dccp-crypto-aes-cmac.c69 if (!ctx->u.aes.key_len) in ccp_do_cmac_update()
163 rctx->cmd.u.aes.key_len = ctx->u.aes.key_len; in ccp_do_cmac_update()
257 unsigned int key_len) in ccp_aes_cmac_setkey() argument
268 switch (key_len) { in ccp_aes_cmac_setkey()
284 ctx->u.aes.key_len = 0; in ccp_aes_cmac_setkey()
287 ret = aes_expandkey(&aes, key, key_len); in ccp_aes_cmac_setkey()
328 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_cmac_setkey()
329 ctx->u.aes.key_len = key_len; in ccp_aes_cmac_setkey()
330 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); in ccp_aes_cmac_setkey()
341 ctx->u.aes.key_len = 0; in ccp_aes_cmac_cra_init()
H A Dccp-crypto-sha.c162 rctx->cmd.u.sha.opad = ctx->u.sha.key_len ? in ccp_do_sha_update()
164 rctx->cmd.u.sha.opad_len = ctx->u.sha.key_len ? in ccp_do_sha_update()
197 if (ctx->u.sha.key_len) { in ccp_sha_init()
273 unsigned int key_len) in ccp_sha_setkey() argument
282 ctx->u.sha.key_len = 0; in ccp_sha_setkey()
289 if (key_len > block_size) { in ccp_sha_setkey()
291 ret = crypto_shash_tfm_digest(shash, key, key_len, in ccp_sha_setkey()
296 key_len = digest_size; in ccp_sha_setkey()
298 memcpy(ctx->u.sha.key, key, key_len); in ccp_sha_setkey()
309 ctx->u.sha.key_len = key_len; in ccp_sha_setkey()
[all …]
/linux/arch/arm64/crypto/
H A Daes-ce-glue.c73 unsigned int key_len) in ce_aes_expandkey() argument
82 u32 kwords = key_len / sizeof(u32); in ce_aes_expandkey()
86 if (key_len != AES_KEYSIZE_128 && in ce_aes_expandkey()
87 key_len != AES_KEYSIZE_192 && in ce_aes_expandkey()
88 key_len != AES_KEYSIZE_256) in ce_aes_expandkey()
91 ctx->key_length = key_len; in ce_aes_expandkey()
106 if (key_len == AES_KEYSIZE_192) { in ce_aes_expandkey()
111 } else if (key_len == AES_KEYSIZE_256) { in ce_aes_expandkey()
142 unsigned int key_len) in ce_aes_setkey() argument
146 return ce_aes_expandkey(ctx, in_key, key_len); in ce_aes_setkey()
H A Daes-neonbs-glue.c76 unsigned int key_len) in aesbs_setkey() argument
82 err = aes_expandkey(&rk, in_key, key_len); in aesbs_setkey()
86 ctx->rounds = 6 + key_len / 4; in aesbs_setkey()
133 unsigned int key_len) in aesbs_cbc_ctr_setkey() argument
139 err = aes_expandkey(&rk, in_key, key_len); in aesbs_cbc_ctr_setkey()
143 ctx->key.rounds = 6 + key_len / 4; in aesbs_cbc_ctr_setkey()
251 unsigned int key_len) in aesbs_xts_setkey() argument
257 err = xts_verify_key(tfm, in_key, key_len); in aesbs_xts_setkey()
261 key_len /= 2; in aesbs_xts_setkey()
262 err = aes_expandkey(&ctx->cts, in_key, key_len); in aesbs_xts_setkey()
[all …]
/linux/security/keys/trusted-keys/
H A Dtrusted_core.c99 p->key_len = keylen; in datablob_parse()
158 size_t key_len; in trusted_instantiate() local
191 key_len = payload->key_len; in trusted_instantiate()
193 key_len); in trusted_instantiate()
197 if (ret != key_len) { in trusted_instantiate()
267 new_p->key_len = p->key_len; in trusted_update()
268 memcpy(new_p->key, p->key, p->key_len); in trusted_update()
327 static int kernel_get_random(unsigned char *key, size_t key_len) in kernel_get_random() argument
329 return get_random_bytes_wait(key, key_len) ?: key_len; in kernel_get_random()
334 int (*get_random)(unsigned char *key, size_t key_len); in init_trusted()
H A Dtrusted_caam.c96 .input = p->key, .input_len = p->key_len, in trusted_caam_seal()
106 info.pkey_info.plain_key_sz = p->key_len; in trusted_caam_seal()
120 p->key_len = p->blob_len + sizeof(struct caam_pkey_info); in trusted_caam_seal()
145 p->key_len = p->blob_len + sizeof(struct caam_pkey_info); in trusted_caam_unseal()
156 p->key_len = info.output_len; in trusted_caam_unseal()
/linux/drivers/nvme/common/
H A Dauth.c156 u32 nvme_auth_key_struct_size(u32 key_len) in nvme_auth_key_struct_size() argument
160 return struct_size(&key, key, key_len); in nvme_auth_key_struct_size()
170 int ret, key_len; in nvme_auth_extract_key() local
181 key_len = base64_decode(secret, allocated_len, key->key, true, BASE64_STD); in nvme_auth_extract_key()
182 if (key_len < 0) { in nvme_auth_extract_key()
184 key_len); in nvme_auth_extract_key()
185 ret = key_len; in nvme_auth_extract_key()
189 if (key_len != 36 && key_len != 52 && in nvme_auth_extract_key()
190 key_len != 68) { in nvme_auth_extract_key()
191 pr_err("Invalid key len %d\n", key_len); in nvme_auth_extract_key()
[all …]
/linux/arch/powerpc/platforms/pseries/
H A Dplpks-secvar.c82 static int plpks_get_variable(const char *key, u64 key_len, u8 *data, in plpks_get_variable() argument
90 var.name = kcalloc(key_len - 1, sizeof(wchar_t), GFP_KERNEL); in plpks_get_variable()
93 rc = utf8s_to_utf16s(key, key_len - 1, UTF16_LITTLE_ENDIAN, (wchar_t *)var.name, in plpks_get_variable()
94 key_len - 1); in plpks_get_variable()
122 static int plpks_set_variable(const char *key, u64 key_len, u8 *data, in plpks_set_variable() argument
136 var.name = kcalloc(key_len - 1, sizeof(wchar_t), GFP_KERNEL); in plpks_set_variable()
139 rc = utf8s_to_utf16s(key, key_len - 1, UTF16_LITTLE_ENDIAN, (wchar_t *)var.name, in plpks_set_variable()
140 key_len - 1); in plpks_set_variable()
/linux/lib/crypto/
H A Daes.c187 unsigned int key_len) in aes_expandkey() argument
189 u32 kwords = key_len / sizeof(u32); in aes_expandkey()
193 err = aes_check_keylen(key_len); in aes_expandkey()
197 ctx->key_length = key_len; in aes_expandkey()
211 if (key_len == AES_KEYSIZE_192) { in aes_expandkey()
216 } else if (key_len == AES_KEYSIZE_256) { in aes_expandkey()
232 ctx->key_dec[0] = ctx->key_enc[key_len + 24]; in aes_expandkey()
233 ctx->key_dec[1] = ctx->key_enc[key_len + 25]; in aes_expandkey()
234 ctx->key_dec[2] = ctx->key_enc[key_len + 26]; in aes_expandkey()
235 ctx->key_dec[3] = ctx->key_enc[key_len + 27]; in aes_expandkey()
[all …]
/linux/tools/testing/selftests/bpf/progs/
H A Dcrypto_bench.c15 u32 key_len, authsize; variable
27 .key_len = key_len, in crypto_setup()
34 if (!cipher[0] || !key_len || key_len > 256) { in crypto_setup()
/linux/net/mac80211/
H A Dfils_aead.c66 static int aes_siv_encrypt(const u8 *key, size_t key_len, in aes_siv_encrypt() argument
79 key_len /= 2; /* S2V key || CTR key */ in aes_siv_encrypt()
91 res = crypto_shash_setkey(tfm, key, key_len); in aes_siv_encrypt()
122 res = crypto_skcipher_setkey(tfm2, key + key_len, key_len); in aes_siv_encrypt()
144 static int aes_siv_decrypt(const u8 *key, size_t key_len, in aes_siv_decrypt() argument
159 key_len /= 2; /* S2V key || CTR key */ in aes_siv_decrypt()
179 res = crypto_skcipher_setkey(tfm2, key + key_len, key_len); in aes_siv_decrypt()
206 res = crypto_shash_setkey(tfm, key, key_len); in aes_siv_decrypt()
/linux/drivers/net/ethernet/netronome/nfp/
H A Dnfp_net_debugdump.c204 u32 tl_len, key_len; in nfp_calc_hwinfo_field_sz() local
208 key_len = strnlen(spec->data, tl_len); in nfp_calc_hwinfo_field_sz()
209 if (key_len == tl_len) in nfp_calc_hwinfo_field_sz()
216 return sizeof(struct nfp_dump_tl) + ALIGN8(key_len + strlen(value) + 2); in nfp_calc_hwinfo_field_sz()
239 u32 tl_len, key_len; in nfp_calc_rtsym_dump_sz() local
243 key_len = strnlen(spec_rtsym->rtsym, tl_len); in nfp_calc_rtsym_dump_sz()
244 if (key_len == tl_len) in nfp_calc_rtsym_dump_sz()
251 return ALIGN8(offsetof(struct nfp_dump_rtsym, rtsym) + key_len + 1) + in nfp_calc_rtsym_dump_sz()
420 u32 tl_len, key_len, val_len; in nfp_dump_hwinfo_field() local
426 key_len = strnlen(spec->data, tl_len); in nfp_dump_hwinfo_field()
[all …]
/linux/include/keys/
H A Dtrusted-type.h28 unsigned int key_len; member
68 int (*get_random)(unsigned char *key, size_t key_len);
86 pr_info("key_len %d\n", p->key_len); in dump_payload()
88 16, 1, p->key, p->key_len, 0); in dump_payload()
/linux/arch/powerpc/include/asm/
H A Dsecvar.h18 int (*get)(const char *key, u64 key_len, u8 *data, u64 *data_size);
19 int (*get_next)(const char *key, u64 *key_len, u64 keybufsize);
20 int (*set)(const char *key, u64 key_len, u8 *data, u64 data_size);
/linux/drivers/crypto/hisilicon/sec/
H A Dsec_algs.c25 unsigned key_len : 2; member
33 .key_len = SEC_KEY_LEN_DES,
38 .key_len = SEC_KEY_LEN_DES,
43 .key_len = SEC_KEY_LEN_3DES_3_KEY,
48 .key_len = SEC_KEY_LEN_3DES_2_KEY,
53 .key_len = SEC_KEY_LEN_3DES_3_KEY,
58 .key_len = SEC_KEY_LEN_3DES_2_KEY,
63 .key_len = SEC_KEY_LEN_AES_128,
68 .key_len = SEC_KEY_LEN_AES_192,
73 .key_len = SEC_KEY_LEN_AES_256,
[all …]
/linux/drivers/crypto/
H A Dpadlock-aes.c77 aes_hw_extkey_available(uint8_t key_len) in aes_hw_extkey_available() argument
82 if (key_len == 16) in aes_hw_extkey_available()
108 unsigned int key_len) in aes_set_key() argument
115 if (key_len % 8) in aes_set_key()
134 ctx->cword.encrypt.rounds = 10 + (key_len - 16) / 4; in aes_set_key()
136 ctx->cword.encrypt.ksize = (key_len - 16) / 8; in aes_set_key()
140 if (aes_hw_extkey_available(key_len)) in aes_set_key()
147 if (aes_expandkey(&gen_aes, in_key, key_len)) in aes_set_key()
163 unsigned int key_len) in aes_set_key_skcipher() argument
165 return aes_set_key(crypto_skcipher_tfm(tfm), in_key, key_len); in aes_set_key_skcipher()
/linux/arch/powerpc/crypto/
H A Daes-spe-glue.c76 unsigned int key_len);
93 unsigned int key_len) in ppc_aes_setkey() argument
97 switch (key_len) { in ppc_aes_setkey()
114 ppc_generate_decrypt_key(ctx->key_dec, ctx->key_enc, key_len); in ppc_aes_setkey()
120 const u8 *in_key, unsigned int key_len) in ppc_aes_setkey_skcipher() argument
122 return ppc_aes_setkey(crypto_skcipher_tfm(tfm), in_key, key_len); in ppc_aes_setkey_skcipher()
126 unsigned int key_len) in ppc_xts_setkey() argument
131 err = xts_verify_key(tfm, in_key, key_len); in ppc_xts_setkey()
135 key_len >>= 1; in ppc_xts_setkey()
137 switch (key_len) { in ppc_xts_setkey()
[all …]
/linux/drivers/s390/crypto/
H A Dzcrypt_cca_key.h174 int short_len, long_len, pad_len, key_len, size; in zcrypt_type6_crt_key() local
190 key_len = 3 * long_len + 2 * short_len + pad_len + crt->inputdatalength; in zcrypt_type6_crt_key()
191 size = sizeof(*key) + key_len + sizeof(*pub) + 3; in zcrypt_type6_crt_key()
203 key->pvt.section_length = sizeof(key->pvt) + key_len; in zcrypt_type6_crt_key()
224 pub = (struct cca_public_sec *)(key->key_parts + key_len); in zcrypt_type6_crt_key()
/linux/drivers/net/wireless/microchip/wilc1000/
H A Dfw.h52 u8 key_len; member
59 u8 key_len; member
67 u8 key_len; member
75 u8 key_len; member
/linux/crypto/
H A Dtwofish_common.c570 unsigned int key_len) in __twofish_setkey() argument
586 if (key_len % 8) in __twofish_setkey()
610 if (key_len == 24 || key_len == 32) { /* 192- or 256-bit key */ in __twofish_setkey()
622 if (key_len == 32) { /* 256-bit key */ in __twofish_setkey()
654 } else if (key_len == 24) { /* 192-bit key */ in __twofish_setkey()
686 int twofish_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int key_len) in twofish_setkey() argument
688 return __twofish_setkey(crypto_tfm_ctx(tfm), key, key_len); in twofish_setkey()

1234567891011