/Linux-v4.19/arch/x86/crypto/ |
D | aes_ctrby8_avx-x86_64.S | 155 .macro do_aes b, k, key_len 158 .set klen, \key_len 426 .macro do_aes_load val, key_len 427 do_aes \val, 1, \key_len 430 .macro do_aes_noload val, key_len 431 do_aes \val, 0, \key_len 436 .macro do_aes_ctrmain key_len 438 jb .Ldo_return2\key_len 446 jz .Lmult_of_8_blks\key_len 450 jg .Lgt4\key_len [all …]
|
/Linux-v4.19/drivers/firmware/efi/ |
D | apple-properties.c | 67 u32 key_len, val_len; in unmarshal_key_value_pairs() local 70 if (sizeof(key_len) > remaining) in unmarshal_key_value_pairs() 73 key_len = *(typeof(key_len) *)ptr; in unmarshal_key_value_pairs() 74 if (key_len + sizeof(val_len) > remaining || in unmarshal_key_value_pairs() 75 key_len < sizeof(key_len) + sizeof(efi_char16_t) || in unmarshal_key_value_pairs() 76 *(efi_char16_t *)(ptr + sizeof(key_len)) == 0) { in unmarshal_key_value_pairs() 82 val_len = *(typeof(val_len) *)(ptr + key_len); in unmarshal_key_value_pairs() 83 if (key_len + val_len > remaining || in unmarshal_key_value_pairs() 86 ptr - (void *)dev_header + key_len); in unmarshal_key_value_pairs() 91 key = kzalloc((key_len - sizeof(key_len)) * 4 + 1, GFP_KERNEL); in unmarshal_key_value_pairs() [all …]
|
/Linux-v4.19/arch/sparc/crypto/ |
D | camellia_glue.c | 29 int key_len; member 33 unsigned int key_len, u64 *decrypt_key); 36 unsigned int key_len) in camellia_set_key() argument 42 if (key_len != 16 && key_len != 24 && key_len != 32) { in camellia_set_key() 47 ctx->key_len = key_len; in camellia_set_key() 50 key_len, &ctx->decrypt_key[0]); in camellia_set_key() 55 u32 *output, unsigned int key_len); 63 (u32 *) dst, ctx->key_len); in camellia_encrypt() 72 (u32 *) dst, ctx->key_len); in camellia_decrypt() 75 extern void camellia_sparc64_load_keys(const u64 *key, unsigned int key_len); [all …]
|
/Linux-v4.19/arch/s390/crypto/ |
D | aes_s390.c | 44 int key_len; member 55 int key_len; member 72 unsigned int key_len) in setkey_fallback_cip() argument 81 ret = crypto_cipher_setkey(sctx->fallback.cip, in_key, key_len); in setkey_fallback_cip() 91 unsigned int key_len) in aes_set_key() argument 97 fc = (key_len == 16) ? CPACF_KM_AES_128 : in aes_set_key() 98 (key_len == 24) ? CPACF_KM_AES_192 : in aes_set_key() 99 (key_len == 32) ? CPACF_KM_AES_256 : 0; in aes_set_key() 104 return setkey_fallback_cip(tfm, in_key, key_len); in aes_set_key() 106 sctx->key_len = key_len; in aes_set_key() [all …]
|
/Linux-v4.19/drivers/crypto/ccp/ |
D | ccp-crypto-aes-xts.c | 79 unsigned int key_len) in ccp_aes_xts_setkey() argument 86 ret = xts_check_key(xfm, key, key_len); in ccp_aes_xts_setkey() 93 switch (key_len) { in ccp_aes_xts_setkey() 95 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_xts_setkey() 99 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_xts_setkey() 102 ctx->u.aes.key_len = key_len / 2; in ccp_aes_xts_setkey() 103 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); in ccp_aes_xts_setkey() 105 return crypto_skcipher_setkey(ctx->u.aes.tfm_skcipher, key, key_len); in ccp_aes_xts_setkey() 119 if (!ctx->u.aes.key_len) in ccp_aes_xts_crypt() 148 (ctx->u.aes.key_len != AES_KEYSIZE_128)) in ccp_aes_xts_crypt() [all …]
|
D | ccp-crypto-aes.c | 41 unsigned int key_len) in ccp_aes_setkey() argument 47 switch (key_len) { in ccp_aes_setkey() 62 ctx->u.aes.key_len = key_len; in ccp_aes_setkey() 64 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_setkey() 65 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); in ccp_aes_setkey() 78 if (!ctx->u.aes.key_len) in ccp_aes_crypt() 105 rctx->cmd.u.aes.key_len = ctx->u.aes.key_len; in ccp_aes_crypt() 132 ctx->u.aes.key_len = 0; in ccp_aes_cra_init() 156 unsigned int key_len) in ccp_aes_rfc3686_setkey() argument 160 if (key_len < CTR_RFC3686_NONCE_SIZE) in ccp_aes_rfc3686_setkey() [all …]
|
D | ccp-crypto-aes-galois.c | 33 unsigned int key_len) in ccp_aes_gcm_setkey() argument 37 switch (key_len) { in ccp_aes_gcm_setkey() 53 ctx->u.aes.key_len = key_len; in ccp_aes_gcm_setkey() 55 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_gcm_setkey() 56 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); in ccp_aes_gcm_setkey() 77 if (!ctx->u.aes.key_len) in ccp_aes_gcm_crypt() 114 rctx->cmd.u.aes.key_len = ctx->u.aes.key_len; in ccp_aes_gcm_crypt() 144 ctx->u.aes.key_len = 0; in ccp_aes_gcm_cra_init()
|
D | ccp-crypto-des3.c | 40 unsigned int key_len) in ccp_des3_setkey() argument 70 ctx->u.des3.key_len = key_len; in ccp_des3_setkey() 72 memcpy(ctx->u.des3.key, key, key_len); in ccp_des3_setkey() 73 sg_init_one(&ctx->u.des3.key_sg, ctx->u.des3.key, key_len); in ccp_des3_setkey() 86 if (!ctx->u.des3.key_len) in ccp_des3_crypt() 113 rctx->cmd.u.des3.key_len = ctx->u.des3.key_len; in ccp_des3_crypt() 140 ctx->u.des3.key_len = 0; in ccp_des3_cra_init()
|
D | ccp-crypto-aes-cmac.c | 72 if (!ctx->u.aes.key_len) in ccp_do_cmac_update() 166 rctx->cmd.u.aes.key_len = ctx->u.aes.key_len; in ccp_do_cmac_update() 260 unsigned int key_len) in ccp_aes_cmac_setkey() argument 270 switch (key_len) { in ccp_aes_cmac_setkey() 287 ctx->u.aes.key_len = 0; in ccp_aes_cmac_setkey() 290 ret = crypto_cipher_setkey(ctx->u.aes.tfm_cipher, key, key_len); in ccp_aes_cmac_setkey() 331 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_cmac_setkey() 332 ctx->u.aes.key_len = key_len; in ccp_aes_cmac_setkey() 333 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); in ccp_aes_cmac_setkey() 345 ctx->u.aes.key_len = 0; in ccp_aes_cmac_cra_init()
|
/Linux-v4.19/crypto/ |
D | aes_generic.c | 1218 unsigned int key_len) in crypto_aes_expand_key() argument 1222 if (key_len != AES_KEYSIZE_128 && key_len != AES_KEYSIZE_192 && in crypto_aes_expand_key() 1223 key_len != AES_KEYSIZE_256) in crypto_aes_expand_key() 1226 ctx->key_length = key_len; in crypto_aes_expand_key() 1233 ctx->key_dec[key_len + 24] = ctx->key_enc[0]; in crypto_aes_expand_key() 1234 ctx->key_dec[key_len + 25] = ctx->key_enc[1]; in crypto_aes_expand_key() 1235 ctx->key_dec[key_len + 26] = ctx->key_enc[2]; in crypto_aes_expand_key() 1236 ctx->key_dec[key_len + 27] = ctx->key_enc[3]; in crypto_aes_expand_key() 1238 switch (key_len) { in crypto_aes_expand_key() 1263 ctx->key_dec[0] = ctx->key_enc[key_len + 24]; in crypto_aes_expand_key() [all …]
|
D | aes_ti.c | 171 unsigned int key_len) in aesti_expand_key() argument 173 u32 kwords = key_len / sizeof(u32); in aesti_expand_key() 176 if (key_len != AES_KEYSIZE_128 && in aesti_expand_key() 177 key_len != AES_KEYSIZE_192 && in aesti_expand_key() 178 key_len != AES_KEYSIZE_256) in aesti_expand_key() 181 ctx->key_length = key_len; in aesti_expand_key() 195 if (key_len == 24) { in aesti_expand_key() 200 } else if (key_len == 32) { in aesti_expand_key() 216 ctx->key_dec[0] = ctx->key_enc[key_len + 24]; in aesti_expand_key() 217 ctx->key_dec[1] = ctx->key_enc[key_len + 25]; in aesti_expand_key() [all …]
|
/Linux-v4.19/arch/arm64/crypto/ |
D | aes-ce-glue.c | 80 unsigned int key_len) in ce_aes_expandkey() argument 89 u32 kwords = key_len / sizeof(u32); in ce_aes_expandkey() 93 if (key_len != AES_KEYSIZE_128 && in ce_aes_expandkey() 94 key_len != AES_KEYSIZE_192 && in ce_aes_expandkey() 95 key_len != AES_KEYSIZE_256) in ce_aes_expandkey() 98 ctx->key_length = key_len; in ce_aes_expandkey() 112 if (key_len == AES_KEYSIZE_192) { in ce_aes_expandkey() 117 } else if (key_len == AES_KEYSIZE_256) { in ce_aes_expandkey() 148 unsigned int key_len) in ce_aes_setkey() argument 153 ret = ce_aes_expandkey(ctx, in_key, key_len); in ce_aes_setkey()
|
D | aes-neonbs-glue.c | 74 unsigned int key_len) in aesbs_setkey() argument 80 err = crypto_aes_expand_key(&rk, in_key, key_len); in aesbs_setkey() 84 ctx->rounds = 6 + key_len / 4; in aesbs_setkey() 133 unsigned int key_len) in aesbs_cbc_setkey() argument 139 err = crypto_aes_expand_key(&rk, in_key, key_len); in aesbs_cbc_setkey() 143 ctx->key.rounds = 6 + key_len / 4; in aesbs_cbc_setkey() 206 unsigned int key_len) in aesbs_ctr_setkey_sync() argument 211 err = crypto_aes_expand_key(&ctx->fallback, in_key, key_len); in aesbs_ctr_setkey_sync() 215 ctx->key.rounds = 6 + key_len / 4; in aesbs_ctr_setkey_sync() 266 unsigned int key_len) in aesbs_xts_setkey() argument [all …]
|
/Linux-v4.19/drivers/crypto/nx/ |
D | nx-aes-ctr.c | 36 unsigned int key_len) in ctr_aes_nx_set_key() argument 43 switch (key_len) { in ctr_aes_nx_set_key() 61 memcpy(csbcpb->cpb.aes_ctr.key, in_key, key_len); in ctr_aes_nx_set_key() 68 unsigned int key_len) in ctr3686_aes_nx_set_key() argument 72 if (key_len < CTR_RFC3686_NONCE_SIZE) in ctr3686_aes_nx_set_key() 76 in_key + key_len - CTR_RFC3686_NONCE_SIZE, in ctr3686_aes_nx_set_key() 79 key_len -= CTR_RFC3686_NONCE_SIZE; in ctr3686_aes_nx_set_key() 81 return ctr_aes_nx_set_key(tfm, in_key, key_len); in ctr3686_aes_nx_set_key()
|
/Linux-v4.19/drivers/crypto/bcm/ |
D | spu2.c | 1011 flow_log(" key: %d\n", cipher_parms->key_len); in spu2_create_request() 1012 flow_dump(" key: ", cipher_parms->key_buf, cipher_parms->key_len); in spu2_create_request() 1018 flow_log(" authkey: %d\n", hash_parms->key_len); in spu2_create_request() 1019 flow_dump(" authkey: ", hash_parms->key_buf, hash_parms->key_len); in spu2_create_request() 1045 hash_parms->key_len = cipher_parms->key_len; in spu2_create_request() 1047 cipher_parms->key_len); in spu2_create_request() 1048 cipher_parms->key_len = 0; in spu2_create_request() 1083 hash_parms->key_len, cipher_parms->key_len, in spu2_create_request() 1090 spu2_fmd_ctrl2_write(fmd, cipher_offset, hash_parms->key_len, 0, in spu2_create_request() 1091 cipher_parms->key_len, cipher_parms->iv_len); in spu2_create_request() [all …]
|
D | spu.c | 667 flow_log(" key: %d\n", cipher_parms->key_len); in spum_create_request() 668 flow_dump(" key: ", cipher_parms->key_buf, cipher_parms->key_len); in spum_create_request() 674 flow_log(" authkey: %d\n", hash_parms->key_len); in spum_create_request() 675 flow_dump(" authkey: ", hash_parms->key_buf, hash_parms->key_len); in spum_create_request() 723 if (hash_parms->key_len) { in spum_create_request() 724 memcpy(ptr, hash_parms->key_buf, hash_parms->key_len); in spum_create_request() 725 ptr += hash_parms->key_len; in spum_create_request() 726 buf_len += hash_parms->key_len; in spum_create_request() 727 sctx_words += hash_parms->key_len / 4; in spum_create_request() 757 if (cipher_parms->key_len) { in spum_create_request() [all …]
|
/Linux-v4.19/net/wireless/ |
D | lib80211_crypt_wep.c | 36 u8 key_len; member 101 klen = 3 + wep->key_len; in lib80211_wep_build_iv() 151 memcpy(key + 3, wep->key, wep->key_len); in lib80211_wep_encrypt() 155 klen = 3 + wep->key_len; in lib80211_wep_encrypt() 203 klen = 3 + wep->key_len; in lib80211_wep_decrypt() 206 memcpy(key + 3, wep->key, wep->key_len); in lib80211_wep_decrypt() 247 wep->key_len = len; in lib80211_wep_set_key() 256 if (len < wep->key_len) in lib80211_wep_get_key() 259 memcpy(key, wep->key, wep->key_len); in lib80211_wep_get_key() 261 return wep->key_len; in lib80211_wep_get_key() [all …]
|
/Linux-v4.19/drivers/staging/rtl8192u/ieee80211/ |
D | ieee80211_crypt_wep.c | 33 u8 key_len; member 106 klen = 3 + wep->key_len; in prism2_wep_encrypt() 128 memcpy(key + 3, wep->key, wep->key_len); in prism2_wep_encrypt() 187 klen = 3 + wep->key_len; in prism2_wep_decrypt() 190 memcpy(key + 3, wep->key, wep->key_len); in prism2_wep_decrypt() 237 wep->key_len = len; in prism2_wep_set_key() 247 if (len < wep->key_len) in prism2_wep_get_key() 250 memcpy(key, wep->key, wep->key_len); in prism2_wep_get_key() 252 return wep->key_len; in prism2_wep_get_key() 261 wep->key_idx, wep->key_len); in prism2_wep_print_stats()
|
/Linux-v4.19/drivers/staging/rtl8192e/ |
D | rtllib_crypt_wep.c | 28 u8 key_len; member 113 klen = 3 + wep->key_len; in prism2_wep_encrypt() 135 memcpy(key + 3, wep->key, wep->key_len); in prism2_wep_encrypt() 193 klen = 3 + wep->key_len; in prism2_wep_decrypt() 196 memcpy(key + 3, wep->key, wep->key_len); in prism2_wep_decrypt() 240 wep->key_len = len; in prism2_wep_set_key() 250 if (len < wep->key_len) in prism2_wep_get_key() 253 memcpy(key, wep->key, wep->key_len); in prism2_wep_get_key() 255 return wep->key_len; in prism2_wep_get_key() 263 seq_printf(m, "key[%d] alg=WEP len=%d\n", wep->key_idx, wep->key_len); in prism2_wep_print_stats()
|
/Linux-v4.19/arch/arm/crypto/ |
D | aes-ce-glue.c | 66 unsigned int key_len) in ce_aes_expandkey() argument 75 u32 kwords = key_len / sizeof(u32); in ce_aes_expandkey() 79 if (key_len != AES_KEYSIZE_128 && in ce_aes_expandkey() 80 key_len != AES_KEYSIZE_192 && in ce_aes_expandkey() 81 key_len != AES_KEYSIZE_256) in ce_aes_expandkey() 84 memcpy(ctx->key_enc, in_key, key_len); in ce_aes_expandkey() 85 ctx->key_length = key_len; in ce_aes_expandkey() 103 if (key_len == AES_KEYSIZE_192) { in ce_aes_expandkey() 108 } else if (key_len == AES_KEYSIZE_256) { in ce_aes_expandkey() 138 unsigned int key_len) in ce_aes_setkey() argument [all …]
|
D | aes-neonbs-glue.c | 61 unsigned int key_len) in aesbs_setkey() argument 67 err = crypto_aes_expand_key(&rk, in_key, key_len); in aesbs_setkey() 71 ctx->rounds = 6 + key_len / 4; in aesbs_setkey() 120 unsigned int key_len) in aesbs_cbc_setkey() argument 126 err = crypto_aes_expand_key(&rk, in_key, key_len); in aesbs_cbc_setkey() 130 ctx->key.rounds = 6 + key_len / 4; in aesbs_cbc_setkey() 136 return crypto_cipher_setkey(ctx->enc_tfm, in_key, key_len); in aesbs_cbc_setkey() 238 unsigned int key_len) in aesbs_xts_setkey() argument 243 err = xts_verify_key(tfm, in_key, key_len); in aesbs_xts_setkey() 247 key_len /= 2; in aesbs_xts_setkey() [all …]
|
/Linux-v4.19/net/mac80211/ |
D | fils_aead.c | 69 static int aes_siv_encrypt(const u8 *key, size_t key_len, in aes_siv_encrypt() argument 82 key_len /= 2; /* S2V key || CTR key */ in aes_siv_encrypt() 94 res = crypto_shash_setkey(tfm, key, key_len); in aes_siv_encrypt() 125 res = crypto_skcipher_setkey(tfm2, key + key_len, key_len); in aes_siv_encrypt() 147 static int aes_siv_decrypt(const u8 *key, size_t key_len, in aes_siv_decrypt() argument 162 key_len /= 2; /* S2V key || CTR key */ in aes_siv_decrypt() 182 res = crypto_skcipher_setkey(tfm2, key + key_len, key_len); in aes_siv_decrypt() 209 res = crypto_shash_setkey(tfm, key, key_len); in aes_siv_decrypt()
|
/Linux-v4.19/arch/powerpc/crypto/ |
D | aes-spe-glue.c | 78 unsigned int key_len); 95 unsigned int key_len) in ppc_aes_setkey() argument 99 if (key_len != AES_KEYSIZE_128 && in ppc_aes_setkey() 100 key_len != AES_KEYSIZE_192 && in ppc_aes_setkey() 101 key_len != AES_KEYSIZE_256) { in ppc_aes_setkey() 106 switch (key_len) { in ppc_aes_setkey() 121 ppc_generate_decrypt_key(ctx->key_dec, ctx->key_enc, key_len); in ppc_aes_setkey() 127 unsigned int key_len) in ppc_xts_setkey() argument 132 err = xts_check_key(tfm, in_key, key_len); in ppc_xts_setkey() 136 key_len >>= 1; in ppc_xts_setkey() [all …]
|
/Linux-v4.19/drivers/net/ethernet/netronome/nfp/ |
D | nfp_net_debugdump.c | 233 u32 tl_len, key_len; in nfp_calc_hwinfo_field_sz() local 237 key_len = strnlen(spec->data, tl_len); in nfp_calc_hwinfo_field_sz() 238 if (key_len == tl_len) in nfp_calc_hwinfo_field_sz() 245 return sizeof(struct nfp_dump_tl) + ALIGN8(key_len + strlen(value) + 2); in nfp_calc_hwinfo_field_sz() 268 u32 tl_len, key_len; in nfp_calc_rtsym_dump_sz() local 273 key_len = strnlen(spec_rtsym->rtsym, tl_len); in nfp_calc_rtsym_dump_sz() 274 if (key_len == tl_len) in nfp_calc_rtsym_dump_sz() 286 return ALIGN8(offsetof(struct nfp_dump_rtsym, rtsym) + key_len + 1) + in nfp_calc_rtsym_dump_sz() 455 u32 tl_len, key_len, val_len; in nfp_dump_hwinfo_field() local 461 key_len = strnlen(spec->data, tl_len); in nfp_dump_hwinfo_field() [all …]
|
/Linux-v4.19/drivers/firmware/google/ |
D | vpd_decode.c | 52 s32 key_len; in vpd_decode_string() local 71 &key_len, &decoded_len); in vpd_decode_string() 77 *consumed += key_len; in vpd_decode_string() 90 return callback(key, key_len, value, value_len, in vpd_decode_string()
|