| /linux/include/crypto/ |
| H A D | blake2s.h | 56 const void *key, size_t keylen) in __blake2s_init() argument 58 ctx->h[0] = BLAKE2S_IV0 ^ (0x01010000 | keylen << 8 | outlen); in __blake2s_init() 72 if (keylen) { in __blake2s_init() 73 memcpy(ctx->buf, key, keylen); in __blake2s_init() 74 memset(&ctx->buf[keylen], 0, BLAKE2S_BLOCK_SIZE - keylen); in __blake2s_init() 101 const void *key, size_t keylen) in blake2s_init_key() argument 104 !key || !keylen || keylen > BLAKE2S_KEY_SIZE)); in blake2s_init_key() 106 __blake2s_init(ctx, outlen, key, keylen); in blake2s_init_key() 145 static inline void blake2s(const u8 *key, size_t keylen, in blake2s() argument 152 outlen > BLAKE2S_HASH_SIZE || keylen > BLAKE2S_KEY_SIZE || in blake2s() [all …]
|
| H A D | blake2b.h | 52 const void *key, size_t keylen) in __blake2b_init() argument 54 ctx->h[0] = BLAKE2B_IV0 ^ (0x01010000 | keylen << 8 | outlen); in __blake2b_init() 68 if (keylen) { in __blake2b_init() 69 memcpy(ctx->buf, key, keylen); in __blake2b_init() 70 memset(&ctx->buf[keylen], 0, BLAKE2B_BLOCK_SIZE - keylen); in __blake2b_init() 97 const void *key, size_t keylen) in blake2b_init_key() argument 100 !key || !keylen || keylen > BLAKE2B_KEY_SIZE)); in blake2b_init_key() 102 __blake2b_init(ctx, outlen, key, keylen); in blake2b_init_key() 141 static inline void blake2b(const u8 *key, size_t keylen, in blake2b() argument 148 outlen > BLAKE2B_HASH_SIZE || keylen > BLAKE2B_KEY_SIZE || in blake2b() [all …]
|
| H A D | xts.h | 12 const u8 *key, unsigned int keylen) in xts_verify_key() argument 18 if (keylen % 2) in xts_verify_key() 25 if (fips_enabled && keylen != 32 && keylen != 64) in xts_verify_key() 34 !crypto_memneq(key, key + (keylen / 2), keylen / 2)) in xts_verify_key()
|
| /linux/fs/cachefiles/ |
| H A D | key.c | 41 unsigned int acc, i, n, nle, nbe, keylen = object->cookie->key_len; in cachefiles_cook_key() local 45 _enter(",%u,%*phN", keylen, keylen, key); in cachefiles_cook_key() 47 BUG_ON(keylen > NAME_MAX - 3); in cachefiles_cook_key() 50 for (i = 0; i < keylen; i++) { in cachefiles_cook_key() 57 len = 1 + keylen; in cachefiles_cook_key() 63 memcpy(name + 1, key, keylen); in cachefiles_cook_key() 71 n = round_up(keylen, 4); in cachefiles_cook_key() 81 b64len = DIV_ROUND_UP(keylen, 3); in cachefiles_cook_key() 82 pad = b64len * 3 - keylen; in cachefiles_cook_key() 84 _debug("len=%u nbe=%u nle=%u b64=%u", keylen, nbe, nle, b64len); in cachefiles_cook_key() [all …]
|
| /linux/drivers/crypto/ti/ |
| H A D | dthev2-aes.c | 98 ctx->keylen = 0; in dthe_cipher_init_tfm() 109 ctx->keylen = 0; in dthe_cipher_xts_init_tfm() 128 static int dthe_aes_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int keylen) in dthe_aes_setkey() argument 132 if (keylen != AES_KEYSIZE_128 && keylen != AES_KEYSIZE_192 && keylen != AES_KEYSIZE_256) in dthe_aes_setkey() 135 ctx->keylen = keylen; in dthe_aes_setkey() 136 memcpy(ctx->key, key, keylen); in dthe_aes_setkey() 141 static int dthe_aes_ecb_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int keylen) in dthe_aes_ecb_setkey() argument 147 return dthe_aes_setkey(tfm, key, keylen); in dthe_aes_ecb_setkey() 150 static int dthe_aes_cbc_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int keylen) in dthe_aes_cbc_setkey() argument 156 return dthe_aes_setkey(tfm, key, keylen); in dthe_aes_cbc_setkey() [all …]
|
| /linux/crypto/ |
| H A D | df_sp80090a.c | 19 u8 keylen); 21 const unsigned char *key, u8 keylen) in drbg_kcapi_symsetkey() argument 23 aes_expandkey(aesctx, key, keylen); in drbg_kcapi_symsetkey() 41 u8 keylen) in drbg_ctr_bcc() argument 50 drbg_kcapi_symsetkey(aesctx, key, keylen); in drbg_ctr_bcc() 140 u8 keylen; in crypto_drbg_ctr_df() local 144 keylen = statelen - blocklen_bytes; in crypto_drbg_ctr_df() 182 while (templen < (keylen + (blocklen_bytes))) { in crypto_drbg_ctr_df() 191 blocklen_bytes, keylen); in crypto_drbg_ctr_df() 198 X = temp + (keylen); in crypto_drbg_ctr_df() [all …]
|
| H A D | cipher.c | 21 unsigned int keylen) in setkey_unaligned() argument 29 absize = keylen + alignmask; in setkey_unaligned() 35 memcpy(alignbuffer, key, keylen); in setkey_unaligned() 36 ret = cia->cia_setkey(crypto_cipher_tfm(tfm), alignbuffer, keylen); in setkey_unaligned() 43 const u8 *key, unsigned int keylen) in crypto_cipher_setkey() argument 48 if (keylen < cia->cia_min_keysize || keylen > cia->cia_max_keysize) in crypto_cipher_setkey() 52 return setkey_unaligned(tfm, key, keylen); in crypto_cipher_setkey() 54 return cia->cia_setkey(crypto_cipher_tfm(tfm), key, keylen); in crypto_cipher_setkey()
|
| H A D | blake2b.c | 13 unsigned int keylen; member 18 const u8 *key, unsigned int keylen) in crypto_blake2b_setkey() argument 22 if (keylen > BLAKE2B_KEY_SIZE) in crypto_blake2b_setkey() 24 memcpy(tctx->key, key, keylen); in crypto_blake2b_setkey() 25 tctx->keylen = keylen; in crypto_blake2b_setkey() 37 tctx->key, tctx->keylen); in crypto_blake2b_init() 60 blake2b(tctx->key, tctx->keylen, data, len, out, digestsize); in crypto_blake2b_digest()
|
| /linux/arch/riscv/crypto/ |
| H A D | aes-riscv64-zvkned.S | 59 .macro __aes_crypt_zvkned enc, keylen argument 61 aes_crypt v16, \enc, \keylen 86 .macro __aes_ecb_crypt enc, keylen argument 94 aes_crypt v16, \enc, \keylen 125 .macro aes_cbc_encrypt keylen argument 130 aes_encrypt v16, \keylen // Encrypt 141 .macro aes_cbc_decrypt keylen argument 150 aes_decrypt v20, \keylen // Decrypt the blocks 188 .macro aes_cbc_cts_encrypt keylen argument 202 aes_encrypt v16, \keylen // Encrypt [all …]
|
| H A D | aes-macros.S | 96 .macro aes_encrypt data, keylen argument 107 .if \keylen == 128 109 .elseif \keylen == 192 123 .macro aes_decrypt data, keylen argument 124 .if \keylen == 128 126 .elseif \keylen == 192 150 .macro aes_crypt data, enc, keylen argument 152 aes_encrypt \data, \keylen 154 aes_decrypt \data, \keylen
|
| /linux/drivers/crypto/cavium/cpt/ |
| H A D | cptvf_algs.c | 233 u32 keylen) in cvm_xts_setkey() argument 238 const u8 *key2 = key + (keylen / 2); in cvm_xts_setkey() 240 err = xts_verify_key(cipher, key, keylen); in cvm_xts_setkey() 243 ctx->key_len = keylen; in cvm_xts_setkey() 244 memcpy(ctx->enc_key, key1, keylen / 2); in cvm_xts_setkey() 245 memcpy(ctx->enc_key + KEY2_OFFSET, key2, keylen / 2); in cvm_xts_setkey() 261 static int cvm_validate_keylen(struct cvm_enc_ctx *ctx, u32 keylen) in cvm_validate_keylen() argument 263 if ((keylen == 16) || (keylen == 24) || (keylen == 32)) { in cvm_validate_keylen() 264 ctx->key_len = keylen; in cvm_validate_keylen() 289 u32 keylen, u8 cipher_type) in cvm_setkey() argument [all …]
|
| /linux/net/mac80211/ |
| H A D | wep.c | 32 static inline bool ieee80211_wep_weak_iv(u32 iv, int keylen) in ieee80211_wep_weak_iv() argument 41 if (B >= 3 && B < 3 + keylen) in ieee80211_wep_weak_iv() 49 int keylen, int keyidx, u8 *iv) in ieee80211_wep_get_iv() argument 52 if (ieee80211_wep_weak_iv(local->wep_iv, keylen)) in ieee80211_wep_get_iv() 67 int keylen, int keyidx) in ieee80211_wep_add_iv() argument 88 ieee80211_wep_get_iv(local, keylen, keyidx, newhdr + hdrlen); in ieee80211_wep_add_iv() 134 const u8 *key, int keylen, int keyidx) in ieee80211_wep_encrypt() argument 143 iv = ieee80211_wep_add_iv(local, skb, keylen, keyidx); in ieee80211_wep_encrypt() 153 memcpy(rc4key + 3, key, keylen); in ieee80211_wep_encrypt() 158 return ieee80211_wep_encrypt_data(&local->wep_tx_ctx, rc4key, keylen + 3, in ieee80211_wep_encrypt() [all …]
|
| /linux/drivers/crypto/caam/ |
| H A D | key_gen.c | 45 struct alginfo * const adata, const u8 *key_in, u32 keylen, in gen_split_key() argument 54 adata->keylen = split_key_len(adata->algtype & OP_ALG_ALGSEL_MASK); in gen_split_key() 57 local_max = max(keylen, adata->keylen_pad); in gen_split_key() 60 adata->keylen, adata->keylen_pad); in gen_split_key() 62 DUMP_PREFIX_ADDRESS, 16, 4, key_in, keylen, 1); in gen_split_key() 73 memcpy(key_out, key_in, keylen); in gen_split_key() 82 append_key(desc, dma_addr, keylen, CLASS_2 | KEY_DEST_CLASS_REG); in gen_split_key() 100 append_fifo_store(desc, dma_addr, adata->keylen, in gen_split_key()
|
| H A D | caamhash_desc.c | 36 if (state != OP_ALG_AS_UPDATE && adata->keylen) { in cnstr_shdsc_ahash() 46 adata->keylen, CLASS_2 | in cnstr_shdsc_ahash() 98 append_key_as_imm(desc, adata->key_virt, adata->keylen, in cnstr_shdsc_sk_hash() 99 adata->keylen, CLASS_1 | KEY_DEST_CLASS_REG); in cnstr_shdsc_sk_hash() 103 append_key(desc, adata->key_dma, adata->keylen, in cnstr_shdsc_sk_hash() 106 append_key_as_imm(desc, adata->key_virt, adata->keylen, in cnstr_shdsc_sk_hash() 107 adata->keylen, CLASS_1 | in cnstr_shdsc_sk_hash() 138 append_fifo_store(desc, adata->key_dma, adata->keylen, in cnstr_shdsc_sk_hash()
|
| H A D | caamalg_qi.c | 100 if (!ctx->cdata.keylen || !ctx->authsize) in aead_set_sh_desc() 118 ctx->cdata.keylen - CTR_RFC3686_NONCE_SIZE); in aead_set_sh_desc() 134 data_len[1] = ctx->cdata.keylen; in aead_set_sh_desc() 201 unsigned int keylen) in aead_setkey() argument 209 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in aead_setkey() 216 DUMP_PREFIX_ADDRESS, 16, 4, key, keylen, 1); in aead_setkey() 223 ctx->adata.keylen = keys.authkeylen; in aead_setkey() 256 ctx->cdata.keylen = keys.enckeylen; in aead_setkey() 289 unsigned int keylen) in des3_aead_setkey() argument 294 err = crypto_authenc_extractkeys(&keys, key, keylen); in des3_aead_setkey() [all …]
|
| H A D | caamalg_desc.c | 70 adata->keylen_pad, adata->keylen, in cnstr_shdsc_aead_null_encap() 74 append_key(desc, adata->key_dma, adata->keylen, in cnstr_shdsc_aead_null_encap() 149 adata->keylen_pad, adata->keylen, in cnstr_shdsc_aead_null_decap() 153 append_key(desc, adata->key_dma, adata->keylen, in cnstr_shdsc_aead_null_decap() 217 unsigned int enckeylen = cdata->keylen; in init_sh_desc_key_aead() 237 adata->keylen_pad, adata->keylen, in init_sh_desc_key_aead() 241 append_key(desc, adata->key_dma, adata->keylen, in init_sh_desc_key_aead() 648 append_key_as_imm(desc, cdata->key_virt, cdata->keylen, in cnstr_shdsc_gcm_encap() 649 cdata->keylen, CLASS_1 | KEY_DEST_CLASS_REG); in cnstr_shdsc_gcm_encap() 651 append_key(desc, cdata->key_dma, cdata->keylen, CLASS_1 | in cnstr_shdsc_gcm_encap() [all …]
|
| H A D | caamalg.c | 217 if (!ctx->cdata.keylen) in aead_set_sh_desc() 235 ctx->cdata.keylen - CTR_RFC3686_NONCE_SIZE); in aead_set_sh_desc() 251 data_len[1] = ctx->cdata.keylen; in aead_set_sh_desc() 345 ctx->cdata.keylen; in gcm_set_sh_desc() 347 if (!ctx->cdata.keylen || !ctx->authsize) in gcm_set_sh_desc() 410 ctx->cdata.keylen; in rfc4106_set_sh_desc() 412 if (!ctx->cdata.keylen || !ctx->authsize) in rfc4106_set_sh_desc() 478 ctx->cdata.keylen; in rfc4543_set_sh_desc() 480 if (!ctx->cdata.keylen || !ctx->authsize) in rfc4543_set_sh_desc() 544 if (!ctx->cdata.keylen || !ctx->authsize) in chachapoly_set_sh_desc() [all …]
|
| /linux/drivers/net/wireless/silabs/wfx/ |
| H A D | key.c | 36 WARN(key->keylen > sizeof(msg->key_data), "inconsistent data"); in fill_wep_pair() 37 msg->key_length = key->keylen; in fill_wep_pair() 38 memcpy(msg->key_data, key->key, key->keylen); in fill_wep_pair() 46 WARN(key->keylen > sizeof(msg->key_data), "inconsistent data"); in fill_wep_group() 48 msg->key_length = key->keylen; in fill_wep_group() 49 memcpy(msg->key_data, key->key, key->keylen); in fill_wep_group() 58 WARN(key->keylen != sizeof(msg->tkip_key_data) + sizeof(msg->tx_mic_key) + in fill_tkip_pair() 74 WARN(key->keylen != sizeof(msg->tkip_key_data) + 2 * sizeof(msg->rx_mic_key), in fill_tkip_group() 93 WARN(key->keylen != sizeof(msg->aes_key_data), "inconsistent data"); in fill_ccmp_pair() 95 memcpy(msg->aes_key_data, key->key, key->keylen); in fill_ccmp_pair() [all …]
|
| /linux/drivers/crypto/cavium/nitrox/ |
| H A D | nitrox_skcipher.c | 167 unsigned int keylen) in nitrox_skcipher_setkey() argument 192 memcpy(fctx->crypto.u.key, key, keylen); in nitrox_skcipher_setkey() 198 unsigned int keylen) in nitrox_aes_setkey() argument 202 aes_keylen = flexi_aes_keylen(keylen); in nitrox_aes_setkey() 205 return nitrox_skcipher_setkey(cipher, aes_keylen, key, keylen); in nitrox_aes_setkey() 321 const u8 *key, unsigned int keylen) in nitrox_3des_setkey() argument 324 nitrox_skcipher_setkey(cipher, 0, key, keylen); in nitrox_3des_setkey() 338 const u8 *key, unsigned int keylen) in nitrox_aes_xts_setkey() argument 344 ret = xts_verify_key(cipher, key, keylen); in nitrox_aes_xts_setkey() 348 keylen /= 2; in nitrox_aes_xts_setkey() [all …]
|
| /linux/drivers/crypto/rockchip/ |
| H A D | rk3288_crypto_skcipher.c | 109 const u8 *key, unsigned int keylen) in rk_aes_setkey() argument 114 if (keylen != AES_KEYSIZE_128 && keylen != AES_KEYSIZE_192 && in rk_aes_setkey() 115 keylen != AES_KEYSIZE_256) in rk_aes_setkey() 117 ctx->keylen = keylen; in rk_aes_setkey() 118 memcpy(ctx->key, key, keylen); in rk_aes_setkey() 120 return crypto_skcipher_setkey(ctx->fallback_tfm, key, keylen); in rk_aes_setkey() 124 const u8 *key, unsigned int keylen) in rk_des_setkey() argument 133 ctx->keylen = keylen; in rk_des_setkey() 134 memcpy(ctx->key, key, keylen); in rk_des_setkey() 136 return crypto_skcipher_setkey(ctx->fallback_tfm, key, keylen); in rk_des_setkey() [all …]
|
| /linux/fs/befs/ |
| H A D | btree.c | 117 int index, u16 * keylen); 335 u16 keylen; in befs_find_key() local 346 thiskey = befs_bt_get_key(sb, node, last, &keylen); in befs_find_key() 348 eq = befs_compare_strings(thiskey, keylen, findkey, findkey_len); in befs_find_key() 363 thiskey = befs_bt_get_key(sb, node, mid, &keylen); in befs_find_key() 364 eq = befs_compare_strings(thiskey, keylen, findkey, in befs_find_key() 421 u16 keylen; in befs_btree_read() local 490 keystart = befs_bt_get_key(sb, this_node, cur_key, &keylen); in befs_btree_read() 494 (int)keylen); in befs_btree_read() 496 if (bufsize < keylen + 1) { in befs_btree_read() [all …]
|
| /linux/arch/powerpc/platforms/powernv/ |
| H A D | opal-secvar.c | 73 static int opal_get_next_variable(const char *key, u64 *keylen, u64 keybufsize) in opal_get_next_variable() argument 77 if (!key || !keylen) in opal_get_next_variable() 80 *keylen = cpu_to_be64(*keylen); in opal_get_next_variable() 82 rc = opal_secvar_get_next(key, keylen, keybufsize); in opal_get_next_variable() 84 *keylen = be64_to_cpu(*keylen); in opal_get_next_variable()
|
| /linux/include/linux/ |
| H A D | sed-opal-key.h | 15 int sed_read_key(char *keyname, char *key, u_int *keylen); 16 int sed_write_key(char *keyname, char *key, u_int keylen); 19 int sed_read_key(char *keyname, char *key, u_int *keylen) { in sed_read_key() argument 23 int sed_write_key(char *keyname, char *key, u_int keylen) { in sed_write_key() argument
|
| /linux/drivers/crypto/allwinner/sun4i-ss/ |
| H A D | sun4i-ss-cipher.c | 62 for (i = 0; i < op->keylen / 4; i++) in sun4i_ss_opti_poll() 254 for (i = 0; i < op->keylen / 4; i++) in sun4i_ss_cipher_poll() 578 unsigned int keylen) in sun4i_ss_aes_setkey() argument 583 switch (keylen) { in sun4i_ss_aes_setkey() 594 dev_dbg(ss->dev, "ERROR: Invalid keylen %u\n", keylen); in sun4i_ss_aes_setkey() 597 op->keylen = keylen; in sun4i_ss_aes_setkey() 598 memcpy(op->key, key, keylen); in sun4i_ss_aes_setkey() 603 return crypto_skcipher_setkey(op->fallback_tfm, key, keylen); in sun4i_ss_aes_setkey() 608 unsigned int keylen) in sun4i_ss_des_setkey() argument 617 op->keylen = keylen; in sun4i_ss_des_setkey() [all …]
|
| /linux/drivers/crypto/hisilicon/sec/ |
| H A D | sec_algs.c | 144 unsigned int keylen, in sec_alg_skcipher_init_context() argument 151 memcpy(ctx->key, key, keylen); in sec_alg_skcipher_init_context() 228 const u8 *key, unsigned int keylen, in sec_alg_skcipher_setkey() argument 248 sec_alg_skcipher_init_context(tfm, key, keylen, alg); in sec_alg_skcipher_setkey() 254 const u8 *key, unsigned int keylen) in sec_alg_skcipher_setkey_aes_ecb() argument 258 switch (keylen) { in sec_alg_skcipher_setkey_aes_ecb() 272 return sec_alg_skcipher_setkey(tfm, key, keylen, alg); in sec_alg_skcipher_setkey_aes_ecb() 276 const u8 *key, unsigned int keylen) in sec_alg_skcipher_setkey_aes_cbc() argument 280 switch (keylen) { in sec_alg_skcipher_setkey_aes_cbc() 294 return sec_alg_skcipher_setkey(tfm, key, keylen, alg); in sec_alg_skcipher_setkey_aes_cbc() [all …]
|