| /linux/drivers/firmware/efi/ |
| H A D | apple-properties.c | 57 u32 key_len, val_len, entry_len; in unmarshal_key_value_pairs() local 61 if (sizeof(key_len) > remaining) in unmarshal_key_value_pairs() 64 key_len = *(typeof(key_len) *)ptr; in unmarshal_key_value_pairs() 65 if (key_len + sizeof(val_len) > remaining || in unmarshal_key_value_pairs() 66 key_len < sizeof(key_len) + sizeof(efi_char16_t) || in unmarshal_key_value_pairs() 67 *(efi_char16_t *)(ptr + sizeof(key_len)) == 0) { in unmarshal_key_value_pairs() 73 val_len = *(typeof(val_len) *)(ptr + key_len); in unmarshal_key_value_pairs() 74 if (key_len + val_len > remaining || in unmarshal_key_value_pairs() 77 ptr - (void *)dev_header + key_len); in unmarshal_key_value_pairs() 82 key = kzalloc((key_len - sizeof(key_len)) * 4 + 1, GFP_KERNEL); in unmarshal_key_value_pairs() [all …]
|
| /linux/lib/crypto/tests/ |
| H A D | blake2b_kunit.c | 52 for (int key_len = 0; key_len <= BLAKE2B_KEY_SIZE; key_len++) { in test_blake2b_all_key_and_hash_lens() local 53 rand_bytes_seeded_from_len(key, key_len); in test_blake2b_all_key_and_hash_lens() 55 blake2b(key, key_len, data, data_len, hash, out_len); in test_blake2b_all_key_and_hash_lens() 73 for (int key_len = 0; key_len <= BLAKE2B_KEY_SIZE; key_len++) { in test_blake2b_with_guarded_key_buf() local 75 u8 *guarded_key = &test_buf[TEST_BUF_LEN - key_len]; in test_blake2b_with_guarded_key_buf() 80 rand_bytes(key, key_len); in test_blake2b_with_guarded_key_buf() 81 memcpy(guarded_key, key, key_len); in test_blake2b_with_guarded_key_buf() 83 blake2b(key, key_len, test_buf, data_len, in test_blake2b_with_guarded_key_buf() 85 blake2b(guarded_key, key_len, test_buf, data_len, in test_blake2b_with_guarded_key_buf() 89 blake2b_init_key(&ctx, BLAKE2B_HASH_SIZE, guarded_key, key_len); in test_blake2b_with_guarded_key_buf()
|
| H A D | blake2s_kunit.c | 52 for (int key_len = 0; key_len <= BLAKE2S_KEY_SIZE; key_len++) { in test_blake2s_all_key_and_hash_lens() local 53 rand_bytes_seeded_from_len(key, key_len); in test_blake2s_all_key_and_hash_lens() 55 blake2s(key, key_len, data, data_len, hash, out_len); in test_blake2s_all_key_and_hash_lens() 73 for (int key_len = 0; key_len <= BLAKE2S_KEY_SIZE; key_len++) { in test_blake2s_with_guarded_key_buf() local 75 u8 *guarded_key = &test_buf[TEST_BUF_LEN - key_len]; in test_blake2s_with_guarded_key_buf() 80 rand_bytes(key, key_len); in test_blake2s_with_guarded_key_buf() 81 memcpy(guarded_key, key, key_len); in test_blake2s_with_guarded_key_buf() 83 blake2s(key, key_len, test_buf, data_len, in test_blake2s_with_guarded_key_buf() 85 blake2s(guarded_key, key_len, test_buf, data_len, in test_blake2s_with_guarded_key_buf() 89 blake2s_init_key(&ctx, BLAKE2S_HASH_SIZE, guarded_key, key_len); in test_blake2s_with_guarded_key_buf()
|
| /linux/lib/crypto/ |
| H A D | aes.c | 259 const u8 *in_key, int key_len) in aes_expandkey_generic() argument 261 u32 kwords = key_len / sizeof(u32); in aes_expandkey_generic() 276 if (key_len == AES_KEYSIZE_192) { in aes_expandkey_generic() 281 } else if (key_len == AES_KEYSIZE_256) { in aes_expandkey_generic() 298 inv_rndkeys[0] = rndkeys[key_len + 24]; in aes_expandkey_generic() 299 inv_rndkeys[1] = rndkeys[key_len + 25]; in aes_expandkey_generic() 300 inv_rndkeys[2] = rndkeys[key_len + 26]; in aes_expandkey_generic() 301 inv_rndkeys[3] = rndkeys[key_len + 27]; in aes_expandkey_generic() 303 for (i = 4, j = key_len + 20; j > 0; i += 4, j -= 4) { in aes_expandkey_generic() 318 unsigned int key_len) in aes_expandkey() argument [all …]
|
| /linux/drivers/crypto/ccp/ |
| H A D | ccp-crypto-aes-xts.c | 76 unsigned int key_len) in ccp_aes_xts_setkey() argument 82 ret = xts_verify_key(tfm, key, key_len); in ccp_aes_xts_setkey() 89 switch (key_len) { in ccp_aes_xts_setkey() 91 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_xts_setkey() 95 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_xts_setkey() 98 ctx->u.aes.key_len = key_len / 2; in ccp_aes_xts_setkey() 99 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); in ccp_aes_xts_setkey() 101 return crypto_skcipher_setkey(ctx->u.aes.tfm_skcipher, key, key_len); in ccp_aes_xts_setkey() 116 if (!ctx->u.aes.key_len) in ccp_aes_xts_crypt() 142 (ctx->u.aes.key_len != AES_KEYSIZE_128)) in ccp_aes_xts_crypt() [all …]
|
| H A D | ccp-crypto-aes.c | 40 unsigned int key_len) in ccp_aes_setkey() argument 45 switch (key_len) { in ccp_aes_setkey() 59 ctx->u.aes.key_len = key_len; in ccp_aes_setkey() 61 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_setkey() 62 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); in ccp_aes_setkey() 75 if (!ctx->u.aes.key_len) in ccp_aes_crypt() 101 rctx->cmd.u.aes.key_len = ctx->u.aes.key_len; in ccp_aes_crypt() 126 ctx->u.aes.key_len = 0; in ccp_aes_init_tfm() 146 unsigned int key_len) in ccp_aes_rfc3686_setkey() argument 150 if (key_len < CTR_RFC3686_NONCE_SIZE) in ccp_aes_rfc3686_setkey() [all …]
|
| H A D | ccp-crypto-aes-galois.c | 30 unsigned int key_len) in ccp_aes_gcm_setkey() argument 34 switch (key_len) { in ccp_aes_gcm_setkey() 49 ctx->u.aes.key_len = key_len; in ccp_aes_gcm_setkey() 51 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_gcm_setkey() 52 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); in ccp_aes_gcm_setkey() 86 if (!ctx->u.aes.key_len) in ccp_aes_gcm_crypt() 124 rctx->cmd.u.aes.key_len = ctx->u.aes.key_len; in ccp_aes_gcm_crypt() 154 ctx->u.aes.key_len = 0; in ccp_aes_gcm_cra_init()
|
| H A D | ccp-crypto-des3.c | 39 unsigned int key_len) in ccp_des3_setkey() argument 54 ctx->u.des3.key_len = key_len; in ccp_des3_setkey() 56 memcpy(ctx->u.des3.key, key, key_len); in ccp_des3_setkey() 57 sg_init_one(&ctx->u.des3.key_sg, ctx->u.des3.key, key_len); in ccp_des3_setkey() 70 if (!ctx->u.des3.key_len) in ccp_des3_crypt() 97 rctx->cmd.u.des3.key_len = ctx->u.des3.key_len; in ccp_des3_crypt() 122 ctx->u.des3.key_len = 0; in ccp_des3_init_tfm()
|
| H A D | ccp-crypto-aes-cmac.c | 69 if (!ctx->u.aes.key_len) in ccp_do_cmac_update() 163 rctx->cmd.u.aes.key_len = ctx->u.aes.key_len; in ccp_do_cmac_update() 257 unsigned int key_len) in ccp_aes_cmac_setkey() argument 268 switch (key_len) { in ccp_aes_cmac_setkey() 284 ctx->u.aes.key_len = 0; in ccp_aes_cmac_setkey() 287 ret = aes_prepareenckey(&aes, key, key_len); in ccp_aes_cmac_setkey() 328 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_cmac_setkey() 329 ctx->u.aes.key_len = key_len; in ccp_aes_cmac_setkey() 330 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); in ccp_aes_cmac_setkey() 341 ctx->u.aes.key_len = 0; in ccp_aes_cmac_cra_init()
|
| H A D | ccp-crypto-sha.c | 162 rctx->cmd.u.sha.opad = ctx->u.sha.key_len ? in ccp_do_sha_update() 164 rctx->cmd.u.sha.opad_len = ctx->u.sha.key_len ? in ccp_do_sha_update() 197 if (ctx->u.sha.key_len) { in ccp_sha_init() 273 unsigned int key_len) in ccp_sha_setkey() argument 282 ctx->u.sha.key_len = 0; in ccp_sha_setkey() 289 if (key_len > block_size) { in ccp_sha_setkey() 291 ret = crypto_shash_tfm_digest(shash, key, key_len, in ccp_sha_setkey() 296 key_len = digest_size; in ccp_sha_setkey() 298 memcpy(ctx->u.sha.key, key, key_len); in ccp_sha_setkey() 309 ctx->u.sha.key_len = key_len; in ccp_sha_setkey() [all …]
|
| /linux/drivers/net/wireless/intel/ipw2x00/ |
| H A D | libipw_crypto_wep.c | 27 u8 key_len; member 71 klen = 3 + wep->key_len; in libipw_wep_build_iv() 118 memcpy(key + 3, wep->key, wep->key_len); in libipw_wep_encrypt() 122 klen = 3 + wep->key_len; in libipw_wep_encrypt() 163 klen = 3 + wep->key_len; in libipw_wep_decrypt() 166 memcpy(key + 3, wep->key, wep->key_len); in libipw_wep_decrypt() 200 wep->key_len = len; in libipw_wep_set_key() 209 if (len < wep->key_len) in libipw_wep_get_key() 212 memcpy(key, wep->key, wep->key_len); in libipw_wep_get_key() 214 return wep->key_len; in libipw_wep_get_key() [all …]
|
| /linux/security/keys/trusted-keys/ |
| H A D | trusted_core.c | 104 p->key_len = keylen; in datablob_parse() 163 size_t key_len; in trusted_instantiate() local 196 key_len = payload->key_len; in trusted_instantiate() 198 key_len); in trusted_instantiate() 202 if (ret != key_len) { in trusted_instantiate() 272 new_p->key_len = p->key_len; in trusted_update() 273 memcpy(new_p->key, p->key, p->key_len); in trusted_update() 332 static int kernel_get_random(unsigned char *key, size_t key_len) in kernel_get_random() argument 334 return get_random_bytes_wait(key, key_len) ?: key_len; in kernel_get_random() 339 int (*get_random)(unsigned char *key, size_t key_len); in init_trusted()
|
| H A D | trusted_caam.c | 96 .input = p->key, .input_len = p->key_len, in trusted_caam_seal() 106 info.pkey_info.plain_key_sz = p->key_len; in trusted_caam_seal() 120 p->key_len = p->blob_len + sizeof(struct caam_pkey_info); in trusted_caam_seal() 145 p->key_len = p->blob_len + sizeof(struct caam_pkey_info); in trusted_caam_unseal() 156 p->key_len = info.output_len; in trusted_caam_unseal()
|
| H A D | trusted_dcp.c | 206 blen = calc_blob_len(p->key_len); in trusted_dcp_seal() 218 ret = do_aead_crypto(p->key, b->payload, p->key_len, plain_blob_key, in trusted_dcp_seal() 231 put_unaligned_le32(p->key_len, &b->payload_len); in trusted_dcp_seal() 255 p->key_len = le32_to_cpu(b->payload_len); in trusted_dcp_unseal() 256 blen = calc_blob_len(p->key_len); in trusted_dcp_unseal() 276 ret = do_aead_crypto(b->payload, p->key, p->key_len + DCP_BLOB_AUTHLEN, in trusted_dcp_unseal()
|
| /linux/drivers/nvme/common/ |
| H A D | auth.c | 156 u32 nvme_auth_key_struct_size(u32 key_len) in nvme_auth_key_struct_size() argument 160 return struct_size(&key, key, key_len); in nvme_auth_key_struct_size() 170 int ret, key_len; in nvme_auth_extract_key() local 181 key_len = base64_decode(secret, allocated_len, key->key, true, BASE64_STD); in nvme_auth_extract_key() 182 if (key_len < 0) { in nvme_auth_extract_key() 184 key_len); in nvme_auth_extract_key() 185 ret = key_len; in nvme_auth_extract_key() 189 if (key_len != 36 && key_len != 52 && in nvme_auth_extract_key() 190 key_len != 68) { in nvme_auth_extract_key() 191 pr_err("Invalid key len %d\n", key_len); in nvme_auth_extract_key() [all …]
|
| /linux/tools/testing/selftests/bpf/progs/ |
| H A D | crypto_bench.c | 15 u32 key_len, authsize; variable 27 .key_len = key_len, in crypto_setup() 34 if (!cipher[0] || !key_len || key_len > 256) { in crypto_setup()
|
| /linux/net/mac80211/ |
| H A D | fils_aead.c | 66 static int aes_siv_encrypt(const u8 *key, size_t key_len, in aes_siv_encrypt() argument 79 key_len /= 2; /* S2V key || CTR key */ in aes_siv_encrypt() 91 res = crypto_shash_setkey(tfm, key, key_len); in aes_siv_encrypt() 122 res = crypto_skcipher_setkey(tfm2, key + key_len, key_len); in aes_siv_encrypt() 144 static int aes_siv_decrypt(const u8 *key, size_t key_len, in aes_siv_decrypt() argument 159 key_len /= 2; /* S2V key || CTR key */ in aes_siv_decrypt() 179 res = crypto_skcipher_setkey(tfm2, key + key_len, key_len); in aes_siv_decrypt() 206 res = crypto_shash_setkey(tfm, key, key_len); in aes_siv_decrypt()
|
| /linux/drivers/net/ethernet/netronome/nfp/ |
| H A D | nfp_net_debugdump.c | 204 u32 tl_len, key_len; in nfp_calc_hwinfo_field_sz() local 208 key_len = strnlen(spec->data, tl_len); in nfp_calc_hwinfo_field_sz() 209 if (key_len == tl_len) in nfp_calc_hwinfo_field_sz() 216 return sizeof(struct nfp_dump_tl) + ALIGN8(key_len + strlen(value) + 2); in nfp_calc_hwinfo_field_sz() 239 u32 tl_len, key_len; in nfp_calc_rtsym_dump_sz() local 243 key_len = strnlen(spec_rtsym->rtsym, tl_len); in nfp_calc_rtsym_dump_sz() 244 if (key_len == tl_len) in nfp_calc_rtsym_dump_sz() 251 return ALIGN8(offsetof(struct nfp_dump_rtsym, rtsym) + key_len + 1) + in nfp_calc_rtsym_dump_sz() 420 u32 tl_len, key_len, val_len; in nfp_dump_hwinfo_field() local 426 key_len = strnlen(spec->data, tl_len); in nfp_dump_hwinfo_field() [all …]
|
| /linux/lib/crypto/powerpc/ |
| H A D | aes.h | 47 const u8 *in_key, int key_len, int nrounds) in aes_preparekey_arch() argument 49 if (key_len == AES_KEYSIZE_128) in aes_preparekey_arch() 51 else if (key_len == AES_KEYSIZE_192) in aes_preparekey_arch() 58 key_len); in aes_preparekey_arch() 131 const u8 *in_key, int key_len, int nrounds) in aes_preparekey_arch() argument 133 const int keybits = 8 * key_len; in aes_preparekey_arch() 158 in_key, key_len); in aes_preparekey_arch()
|
| /linux/arch/arm64/crypto/ |
| H A D | aes-neonbs-glue.c | 76 unsigned int key_len) in aesbs_setkey() argument 82 err = aes_expandkey(&rk, in_key, key_len); in aesbs_setkey() 86 ctx->rounds = 6 + key_len / 4; in aesbs_setkey() 133 unsigned int key_len) in aesbs_cbc_ctr_setkey() argument 139 err = aes_expandkey(&rk, in_key, key_len); in aesbs_cbc_ctr_setkey() 143 ctx->key.rounds = 6 + key_len / 4; in aesbs_cbc_ctr_setkey() 251 unsigned int key_len) in aesbs_xts_setkey() argument 257 err = xts_verify_key(tfm, in_key, key_len); in aesbs_xts_setkey() 261 key_len /= 2; in aesbs_xts_setkey() 262 err = aes_expandkey(&ctx->cts, in_key, key_len); in aesbs_xts_setkey() [all …]
|
| /linux/drivers/crypto/hisilicon/sec/ |
| H A D | sec_algs.c | 25 unsigned key_len : 2; member 33 .key_len = SEC_KEY_LEN_DES, 38 .key_len = SEC_KEY_LEN_DES, 43 .key_len = SEC_KEY_LEN_3DES_3_KEY, 48 .key_len = SEC_KEY_LEN_3DES_2_KEY, 53 .key_len = SEC_KEY_LEN_3DES_3_KEY, 58 .key_len = SEC_KEY_LEN_3DES_2_KEY, 63 .key_len = SEC_KEY_LEN_AES_128, 68 .key_len = SEC_KEY_LEN_AES_192, 73 .key_len = SEC_KEY_LEN_AES_256, [all …]
|
| /linux/drivers/crypto/ |
| H A D | padlock-aes.c | 77 aes_hw_extkey_available(uint8_t key_len) in aes_hw_extkey_available() argument 82 if (key_len == 16) in aes_hw_extkey_available() 108 unsigned int key_len) in aes_set_key() argument 115 if (key_len % 8) in aes_set_key() 134 ctx->cword.encrypt.rounds = 10 + (key_len - 16) / 4; in aes_set_key() 136 ctx->cword.encrypt.ksize = (key_len - 16) / 8; in aes_set_key() 140 if (aes_hw_extkey_available(key_len)) in aes_set_key() 147 if (aes_expandkey(&gen_aes, in_key, key_len)) in aes_set_key() 163 unsigned int key_len) in aes_set_key_skcipher() argument 165 return aes_set_key(crypto_skcipher_tfm(tfm), in_key, key_len); in aes_set_key_skcipher()
|
| /linux/drivers/s390/crypto/ |
| H A D | zcrypt_cca_key.h | 174 int short_len, long_len, pad_len, key_len, size; in zcrypt_type6_crt_key() local 190 key_len = 3 * long_len + 2 * short_len + pad_len + crt->inputdatalength; in zcrypt_type6_crt_key() 191 size = sizeof(*key) + key_len + sizeof(*pub) + 3; in zcrypt_type6_crt_key() 203 key->pvt.section_length = sizeof(key->pvt) + key_len; in zcrypt_type6_crt_key() 224 pub = (struct cca_public_sec *)(key->key_parts + key_len); in zcrypt_type6_crt_key()
|
| /linux/crypto/ |
| H A D | twofish_common.c | 570 unsigned int key_len) in __twofish_setkey() argument 586 if (key_len % 8) in __twofish_setkey() 610 if (key_len == 24 || key_len == 32) { /* 192- or 256-bit key */ in __twofish_setkey() 622 if (key_len == 32) { /* 256-bit key */ in __twofish_setkey() 654 } else if (key_len == 24) { /* 192-bit key */ in __twofish_setkey() 686 int twofish_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int key_len) in twofish_setkey() argument 688 return __twofish_setkey(crypto_tfm_ctx(tfm), key, key_len); in twofish_setkey()
|
| /linux/drivers/net/wireless/microchip/wilc1000/ |
| H A D | fw.h | 52 u8 key_len; member 59 u8 key_len; member 67 u8 key_len; member 75 u8 key_len; member
|