Home
last modified time | relevance | path

Searched refs:keylen (Results 1 – 25 of 194) sorted by relevance

12345678

/linux/include/crypto/
H A Dblake2s.h56 const void *key, size_t keylen) in __blake2s_init() argument
58 ctx->h[0] = BLAKE2S_IV0 ^ (0x01010000 | keylen << 8 | outlen); in __blake2s_init()
72 if (keylen) { in __blake2s_init()
73 memcpy(ctx->buf, key, keylen); in __blake2s_init()
74 memset(&ctx->buf[keylen], 0, BLAKE2S_BLOCK_SIZE - keylen); in __blake2s_init()
101 const void *key, size_t keylen) in blake2s_init_key() argument
104 !key || !keylen || keylen > BLAKE2S_KEY_SIZE)); in blake2s_init_key()
106 __blake2s_init(ctx, outlen, key, keylen); in blake2s_init_key()
145 static inline void blake2s(const u8 *key, size_t keylen, in blake2s() argument
152 outlen > BLAKE2S_HASH_SIZE || keylen > BLAKE2S_KEY_SIZE || in blake2s()
[all …]
H A Dblake2b.h52 const void *key, size_t keylen) in __blake2b_init() argument
54 ctx->h[0] = BLAKE2B_IV0 ^ (0x01010000 | keylen << 8 | outlen); in __blake2b_init()
68 if (keylen) { in __blake2b_init()
69 memcpy(ctx->buf, key, keylen); in __blake2b_init()
70 memset(&ctx->buf[keylen], 0, BLAKE2B_BLOCK_SIZE - keylen); in __blake2b_init()
97 const void *key, size_t keylen) in blake2b_init_key() argument
100 !key || !keylen || keylen > BLAKE2B_KEY_SIZE)); in blake2b_init_key()
102 __blake2b_init(ctx, outlen, key, keylen); in blake2b_init_key()
141 static inline void blake2b(const u8 *key, size_t keylen, in blake2b() argument
148 outlen > BLAKE2B_HASH_SIZE || keylen > BLAKE2B_KEY_SIZE || in blake2b()
[all …]
H A Dxts.h12 const u8 *key, unsigned int keylen) in xts_verify_key() argument
18 if (keylen % 2) in xts_verify_key()
25 if (fips_enabled && keylen != 32 && keylen != 64) in xts_verify_key()
34 !crypto_memneq(key, key + (keylen / 2), keylen / 2)) in xts_verify_key()
/linux/fs/cachefiles/
H A Dkey.c41 unsigned int acc, i, n, nle, nbe, keylen = object->cookie->key_len; in cachefiles_cook_key() local
45 _enter(",%u,%*phN", keylen, keylen, key); in cachefiles_cook_key()
47 BUG_ON(keylen > NAME_MAX - 3); in cachefiles_cook_key()
50 for (i = 0; i < keylen; i++) { in cachefiles_cook_key()
57 len = 1 + keylen; in cachefiles_cook_key()
63 memcpy(name + 1, key, keylen); in cachefiles_cook_key()
71 n = round_up(keylen, 4); in cachefiles_cook_key()
81 b64len = DIV_ROUND_UP(keylen, 3); in cachefiles_cook_key()
82 pad = b64len * 3 - keylen; in cachefiles_cook_key()
84 _debug("len=%u nbe=%u nle=%u b64=%u", keylen, nbe, nle, b64len); in cachefiles_cook_key()
[all …]
/linux/drivers/crypto/ti/
H A Ddthev2-aes.c98 ctx->keylen = 0; in dthe_cipher_init_tfm()
109 ctx->keylen = 0; in dthe_cipher_xts_init_tfm()
128 static int dthe_aes_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int keylen) in dthe_aes_setkey() argument
132 if (keylen != AES_KEYSIZE_128 && keylen != AES_KEYSIZE_192 && keylen != AES_KEYSIZE_256) in dthe_aes_setkey()
135 ctx->keylen = keylen; in dthe_aes_setkey()
136 memcpy(ctx->key, key, keylen); in dthe_aes_setkey()
141 static int dthe_aes_ecb_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int keylen) in dthe_aes_ecb_setkey() argument
147 return dthe_aes_setkey(tfm, key, keylen); in dthe_aes_ecb_setkey()
150 static int dthe_aes_cbc_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int keylen) in dthe_aes_cbc_setkey() argument
156 return dthe_aes_setkey(tfm, key, keylen); in dthe_aes_cbc_setkey()
[all …]
/linux/drivers/crypto/cavium/cpt/
H A Dcptvf_algs.c233 u32 keylen) in cvm_xts_setkey() argument
238 const u8 *key2 = key + (keylen / 2); in cvm_xts_setkey()
240 err = xts_verify_key(cipher, key, keylen); in cvm_xts_setkey()
243 ctx->key_len = keylen; in cvm_xts_setkey()
244 memcpy(ctx->enc_key, key1, keylen / 2); in cvm_xts_setkey()
245 memcpy(ctx->enc_key + KEY2_OFFSET, key2, keylen / 2); in cvm_xts_setkey()
261 static int cvm_validate_keylen(struct cvm_enc_ctx *ctx, u32 keylen) in cvm_validate_keylen() argument
263 if ((keylen == 16) || (keylen == 24) || (keylen == 32)) { in cvm_validate_keylen()
264 ctx->key_len = keylen; in cvm_validate_keylen()
289 u32 keylen, u8 cipher_type) in cvm_setkey() argument
[all …]
/linux/tools/perf/util/
H A Dblake2s.h35 const void *key, size_t keylen) in __blake2s_init() argument
37 ctx->h[0] = BLAKE2S_IV0 ^ (0x01010000 | keylen << 8 | outlen); in __blake2s_init()
51 if (keylen) { in __blake2s_init()
52 memcpy(ctx->buf, key, keylen); in __blake2s_init()
53 memset(&ctx->buf[keylen], 0, BLAKE2S_BLOCK_SIZE - keylen); in __blake2s_init()
64 const void *key, size_t keylen) in blake2s_init_key() argument
66 __blake2s_init(ctx, outlen, key, keylen); in blake2s_init_key()
/linux/crypto/
H A Dcipher.c21 unsigned int keylen) in setkey_unaligned() argument
29 absize = keylen + alignmask; in setkey_unaligned()
35 memcpy(alignbuffer, key, keylen); in setkey_unaligned()
36 ret = cia->cia_setkey(crypto_cipher_tfm(tfm), alignbuffer, keylen); in setkey_unaligned()
43 const u8 *key, unsigned int keylen) in crypto_cipher_setkey() argument
48 if (keylen < cia->cia_min_keysize || keylen > cia->cia_max_keysize) in crypto_cipher_setkey()
52 return setkey_unaligned(tfm, key, keylen); in crypto_cipher_setkey()
54 return cia->cia_setkey(crypto_cipher_tfm(tfm), key, keylen); in crypto_cipher_setkey()
H A Dblake2b.c13 unsigned int keylen; member
18 const u8 *key, unsigned int keylen) in crypto_blake2b_setkey() argument
22 if (keylen > BLAKE2B_KEY_SIZE) in crypto_blake2b_setkey()
24 memcpy(tctx->key, key, keylen); in crypto_blake2b_setkey()
25 tctx->keylen = keylen; in crypto_blake2b_setkey()
37 tctx->key, tctx->keylen); in crypto_blake2b_init()
60 blake2b(tctx->key, tctx->keylen, data, len, out, digestsize); in crypto_blake2b_digest()
/linux/net/mac80211/
H A Dwep.c32 static inline bool ieee80211_wep_weak_iv(u32 iv, int keylen) in ieee80211_wep_weak_iv() argument
41 if (B >= 3 && B < 3 + keylen) in ieee80211_wep_weak_iv()
49 int keylen, int keyidx, u8 *iv) in ieee80211_wep_get_iv() argument
52 if (ieee80211_wep_weak_iv(local->wep_iv, keylen)) in ieee80211_wep_get_iv()
67 int keylen, int keyidx) in ieee80211_wep_add_iv() argument
88 ieee80211_wep_get_iv(local, keylen, keyidx, newhdr + hdrlen); in ieee80211_wep_add_iv()
134 const u8 *key, int keylen, int keyidx) in ieee80211_wep_encrypt() argument
143 iv = ieee80211_wep_add_iv(local, skb, keylen, keyidx); in ieee80211_wep_encrypt()
153 memcpy(rc4key + 3, key, keylen); in ieee80211_wep_encrypt()
158 return ieee80211_wep_encrypt_data(&local->wep_tx_ctx, rc4key, keylen + 3, in ieee80211_wep_encrypt()
[all …]
/linux/drivers/s390/crypto/
H A Dpkey_api.c26 const u8 *key, size_t keylen, in key2protkey() argument
34 key, keylen, in key2protkey()
41 key, keylen, in key2protkey()
55 int pkey_key2protkey(const u8 *key, u32 keylen, in pkey_key2protkey() argument
60 rc = key2protkey(NULL, 0, key, keylen, in pkey_key2protkey()
64 rc = key2protkey(NULL, 0, key, keylen, in pkey_key2protkey()
76 static void *_copy_key_from_user(void __user *ukey, size_t keylen) in _copy_key_from_user() argument
78 if (!ukey || keylen < MINKEYBLOBBUFSIZE || keylen > KEYBLOBBUFSIZE) in _copy_key_from_user()
81 return memdup_user(ukey, keylen); in _copy_key_from_user()
172 u32 keylen; in pkey_ioctl_clr2protk() local
[all …]
/linux/drivers/net/wireless/silabs/wfx/
H A Dkey.c36 WARN(key->keylen > sizeof(msg->key_data), "inconsistent data"); in fill_wep_pair()
37 msg->key_length = key->keylen; in fill_wep_pair()
38 memcpy(msg->key_data, key->key, key->keylen); in fill_wep_pair()
46 WARN(key->keylen > sizeof(msg->key_data), "inconsistent data"); in fill_wep_group()
48 msg->key_length = key->keylen; in fill_wep_group()
49 memcpy(msg->key_data, key->key, key->keylen); in fill_wep_group()
58 WARN(key->keylen != sizeof(msg->tkip_key_data) + sizeof(msg->tx_mic_key) + in fill_tkip_pair()
74 WARN(key->keylen != sizeof(msg->tkip_key_data) + 2 * sizeof(msg->rx_mic_key), in fill_tkip_group()
93 WARN(key->keylen != sizeof(msg->aes_key_data), "inconsistent data"); in fill_ccmp_pair()
95 memcpy(msg->aes_key_data, key->key, key->keylen); in fill_ccmp_pair()
[all …]
/linux/drivers/crypto/caam/
H A Dkey_gen.c45 struct alginfo * const adata, const u8 *key_in, u32 keylen, in gen_split_key() argument
54 adata->keylen = split_key_len(adata->algtype & OP_ALG_ALGSEL_MASK); in gen_split_key()
57 local_max = max(keylen, adata->keylen_pad); in gen_split_key()
60 adata->keylen, adata->keylen_pad); in gen_split_key()
62 DUMP_PREFIX_ADDRESS, 16, 4, key_in, keylen, 1); in gen_split_key()
73 memcpy(key_out, key_in, keylen); in gen_split_key()
82 append_key(desc, dma_addr, keylen, CLASS_2 | KEY_DEST_CLASS_REG); in gen_split_key()
100 append_fifo_store(desc, dma_addr, adata->keylen, in gen_split_key()
H A Dcaamhash_desc.c36 if (state != OP_ALG_AS_UPDATE && adata->keylen) { in cnstr_shdsc_ahash()
46 adata->keylen, CLASS_2 | in cnstr_shdsc_ahash()
98 append_key_as_imm(desc, adata->key_virt, adata->keylen, in cnstr_shdsc_sk_hash()
99 adata->keylen, CLASS_1 | KEY_DEST_CLASS_REG); in cnstr_shdsc_sk_hash()
103 append_key(desc, adata->key_dma, adata->keylen, in cnstr_shdsc_sk_hash()
106 append_key_as_imm(desc, adata->key_virt, adata->keylen, in cnstr_shdsc_sk_hash()
107 adata->keylen, CLASS_1 | in cnstr_shdsc_sk_hash()
138 append_fifo_store(desc, adata->key_dma, adata->keylen, in cnstr_shdsc_sk_hash()
H A Dcaamalg_qi.c100 if (!ctx->cdata.keylen || !ctx->authsize) in aead_set_sh_desc()
118 ctx->cdata.keylen - CTR_RFC3686_NONCE_SIZE); in aead_set_sh_desc()
134 data_len[1] = ctx->cdata.keylen; in aead_set_sh_desc()
201 unsigned int keylen) in aead_setkey() argument
209 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in aead_setkey()
216 DUMP_PREFIX_ADDRESS, 16, 4, key, keylen, 1); in aead_setkey()
223 ctx->adata.keylen = keys.authkeylen; in aead_setkey()
256 ctx->cdata.keylen = keys.enckeylen; in aead_setkey()
289 unsigned int keylen) in des3_aead_setkey() argument
294 err = crypto_authenc_extractkeys(&keys, key, keylen); in des3_aead_setkey()
[all …]
H A Dcaamalg_desc.c70 adata->keylen_pad, adata->keylen, in cnstr_shdsc_aead_null_encap()
74 append_key(desc, adata->key_dma, adata->keylen, in cnstr_shdsc_aead_null_encap()
149 adata->keylen_pad, adata->keylen, in cnstr_shdsc_aead_null_decap()
153 append_key(desc, adata->key_dma, adata->keylen, in cnstr_shdsc_aead_null_decap()
217 unsigned int enckeylen = cdata->keylen; in init_sh_desc_key_aead()
237 adata->keylen_pad, adata->keylen, in init_sh_desc_key_aead()
241 append_key(desc, adata->key_dma, adata->keylen, in init_sh_desc_key_aead()
648 append_key_as_imm(desc, cdata->key_virt, cdata->keylen, in cnstr_shdsc_gcm_encap()
649 cdata->keylen, CLASS_1 | KEY_DEST_CLASS_REG); in cnstr_shdsc_gcm_encap()
651 append_key(desc, cdata->key_dma, cdata->keylen, CLASS_1 | in cnstr_shdsc_gcm_encap()
[all …]
H A Dcaamalg.c217 if (!ctx->cdata.keylen) in aead_set_sh_desc()
235 ctx->cdata.keylen - CTR_RFC3686_NONCE_SIZE); in aead_set_sh_desc()
251 data_len[1] = ctx->cdata.keylen; in aead_set_sh_desc()
345 ctx->cdata.keylen; in gcm_set_sh_desc()
347 if (!ctx->cdata.keylen || !ctx->authsize) in gcm_set_sh_desc()
410 ctx->cdata.keylen; in rfc4106_set_sh_desc()
412 if (!ctx->cdata.keylen || !ctx->authsize) in rfc4106_set_sh_desc()
478 ctx->cdata.keylen; in rfc4543_set_sh_desc()
480 if (!ctx->cdata.keylen || !ctx->authsize) in rfc4543_set_sh_desc()
544 if (!ctx->cdata.keylen || !ctx->authsize) in chachapoly_set_sh_desc()
[all …]
/linux/drivers/crypto/cavium/nitrox/
H A Dnitrox_skcipher.c167 unsigned int keylen) in nitrox_skcipher_setkey() argument
192 memcpy(fctx->crypto.u.key, key, keylen); in nitrox_skcipher_setkey()
198 unsigned int keylen) in nitrox_aes_setkey() argument
202 aes_keylen = flexi_aes_keylen(keylen); in nitrox_aes_setkey()
205 return nitrox_skcipher_setkey(cipher, aes_keylen, key, keylen); in nitrox_aes_setkey()
321 const u8 *key, unsigned int keylen) in nitrox_3des_setkey() argument
324 nitrox_skcipher_setkey(cipher, 0, key, keylen); in nitrox_3des_setkey()
338 const u8 *key, unsigned int keylen) in nitrox_aes_xts_setkey() argument
344 ret = xts_verify_key(cipher, key, keylen); in nitrox_aes_xts_setkey()
348 keylen /= 2; in nitrox_aes_xts_setkey()
[all …]
/linux/drivers/crypto/rockchip/
H A Drk3288_crypto_skcipher.c109 const u8 *key, unsigned int keylen) in rk_aes_setkey() argument
114 if (keylen != AES_KEYSIZE_128 && keylen != AES_KEYSIZE_192 && in rk_aes_setkey()
115 keylen != AES_KEYSIZE_256) in rk_aes_setkey()
117 ctx->keylen = keylen; in rk_aes_setkey()
118 memcpy(ctx->key, key, keylen); in rk_aes_setkey()
120 return crypto_skcipher_setkey(ctx->fallback_tfm, key, keylen); in rk_aes_setkey()
124 const u8 *key, unsigned int keylen) in rk_des_setkey() argument
133 ctx->keylen = keylen; in rk_des_setkey()
134 memcpy(ctx->key, key, keylen); in rk_des_setkey()
136 return crypto_skcipher_setkey(ctx->fallback_tfm, key, keylen); in rk_des_setkey()
[all …]
/linux/fs/befs/
H A Dbtree.c117 int index, u16 * keylen);
334 u16 keylen; in befs_find_key() local
345 thiskey = befs_bt_get_key(sb, node, last, &keylen); in befs_find_key()
347 eq = befs_compare_strings(thiskey, keylen, findkey, findkey_len); in befs_find_key()
362 thiskey = befs_bt_get_key(sb, node, mid, &keylen); in befs_find_key()
363 eq = befs_compare_strings(thiskey, keylen, findkey, in befs_find_key()
420 u16 keylen; in befs_btree_read() local
489 keystart = befs_bt_get_key(sb, this_node, cur_key, &keylen); in befs_btree_read()
493 (int)keylen); in befs_btree_read()
495 if (bufsize < keylen + 1) { in befs_btree_read()
[all …]
/linux/arch/powerpc/platforms/powernv/
H A Dopal-secvar.c73 static int opal_get_next_variable(const char *key, u64 *keylen, u64 keybufsize) in opal_get_next_variable() argument
77 if (!key || !keylen) in opal_get_next_variable()
80 *keylen = cpu_to_be64(*keylen); in opal_get_next_variable()
82 rc = opal_secvar_get_next(key, keylen, keybufsize); in opal_get_next_variable()
84 *keylen = be64_to_cpu(*keylen); in opal_get_next_variable()
/linux/drivers/crypto/virtio/
H A Dvirtio_crypto_akcipher_algs.c100 const uint8_t *key, unsigned int keylen) in virtio_crypto_alg_akcipher_init_session() argument
111 pkey = kmemdup(key, keylen, GFP_KERNEL); in virtio_crypto_alg_akcipher_init_session()
130 sg_init_one(&key_sg, pkey, keylen); in virtio_crypto_alg_akcipher_init_session()
339 unsigned int keylen, in virtio_crypto_rsa_set_key() argument
357 ret = rsa_parse_priv_key(&rsa_key, key, keylen); in virtio_crypto_rsa_set_key()
360 ret = rsa_parse_pub_key(&rsa_key, key, keylen); in virtio_crypto_rsa_set_key()
394 para.keylen = cpu_to_le32(keylen); in virtio_crypto_rsa_set_key()
398 return virtio_crypto_alg_akcipher_init_session(ctx, &header, &para, key, keylen); in virtio_crypto_rsa_set_key()
403 unsigned int keylen) in virtio_crypto_rsa_raw_set_priv_key() argument
405 return virtio_crypto_rsa_set_key(tfm, key, keylen, 1, in virtio_crypto_rsa_raw_set_priv_key()
[all …]
/linux/drivers/crypto/qce/
H A Dskcipher.c171 unsigned int keylen) in qce_skcipher_setkey() argument
179 if (!key || !keylen) in qce_skcipher_setkey()
187 __keylen = keylen >> 1; in qce_skcipher_setkey()
191 __keylen = keylen; in qce_skcipher_setkey()
197 memcpy(ctx->enc_key, key, keylen); in qce_skcipher_setkey()
205 ret = crypto_skcipher_setkey(ctx->fallback, key, keylen); in qce_skcipher_setkey()
207 ctx->enc_keylen = keylen; in qce_skcipher_setkey()
212 unsigned int keylen) in qce_des_setkey() argument
221 ctx->enc_keylen = keylen; in qce_des_setkey()
222 memcpy(ctx->enc_key, key, keylen); in qce_des_setkey()
[all …]
/linux/include/linux/
H A Dsed-opal-key.h15 int sed_read_key(char *keyname, char *key, u_int *keylen);
16 int sed_write_key(char *keyname, char *key, u_int keylen);
19 int sed_read_key(char *keyname, char *key, u_int *keylen) { in sed_read_key() argument
23 int sed_write_key(char *keyname, char *key, u_int keylen) { in sed_write_key() argument
/linux/drivers/crypto/allwinner/sun4i-ss/
H A Dsun4i-ss-cipher.c62 for (i = 0; i < op->keylen / 4; i++) in sun4i_ss_opti_poll()
254 for (i = 0; i < op->keylen / 4; i++) in sun4i_ss_cipher_poll()
578 unsigned int keylen) in sun4i_ss_aes_setkey() argument
583 switch (keylen) { in sun4i_ss_aes_setkey()
594 dev_dbg(ss->dev, "ERROR: Invalid keylen %u\n", keylen); in sun4i_ss_aes_setkey()
597 op->keylen = keylen; in sun4i_ss_aes_setkey()
598 memcpy(op->key, key, keylen); in sun4i_ss_aes_setkey()
603 return crypto_skcipher_setkey(op->fallback_tfm, key, keylen); in sun4i_ss_aes_setkey()
608 unsigned int keylen) in sun4i_ss_des_setkey() argument
617 op->keylen = keylen; in sun4i_ss_des_setkey()
[all …]

12345678