/Linux-v5.4/security/keys/ |
D | big_key.c | 205 u8 *enckey; in big_key_preparse() local 232 enckey = kmalloc(ENC_KEY_SIZE, GFP_KERNEL); in big_key_preparse() 233 if (!enckey) { in big_key_preparse() 237 ret = get_random_bytes_wait(enckey, ENC_KEY_SIZE); in big_key_preparse() 242 ret = big_key_crypt(BIG_KEY_ENC, buf, datalen, enckey); in big_key_preparse() 264 prep->payload.data[big_key_data] = enckey; in big_key_preparse() 284 kzfree(enckey); in big_key_preparse() 367 u8 *enckey = (u8 *)key->payload.data[big_key_data]; in big_key_read() local 388 ret = big_key_crypt(BIG_KEY_DEC, buf, enclen, enckey); in big_key_read()
|
/Linux-v5.4/drivers/crypto/qce/ |
D | common.c | 189 static void qce_xtskey(struct qce_device *qce, const u8 *enckey, in qce_xtskey() argument 196 qce_cpu_to_be32p_array((__be32 *)xtskey, enckey + enckeylen / 2, in qce_xtskey() 315 __be32 enckey[QCE_MAX_CIPHER_KEY_SIZE / sizeof(__be32)] = {0}; in qce_setup_regs_ablkcipher() local 330 qce_cpu_to_be32p_array(enckey, ctx->enc_key, keylen); in qce_setup_regs_ablkcipher() 352 qce_write_array(qce, REG_ENCR_KEY0, (u32 *)enckey, enckey_words); in qce_setup_regs_ablkcipher()
|
/Linux-v5.4/include/crypto/ |
D | authenc.h | 23 const u8 *enckey; member
|
/Linux-v5.4/drivers/crypto/ |
D | ixp4xx_crypto.c | 180 u8 enckey[MAX_KEYLEN]; member 1105 ret = setup_cipher(&tfm->base, 0, ctx->enckey, ctx->enckey_len); in aead_setup() 1108 ret = setup_cipher(&tfm->base, 1, ctx->enckey, ctx->enckey_len); in aead_setup() 1155 if (keys.enckeylen > sizeof(ctx->enckey)) in aead_setkey() 1159 memcpy(ctx->enckey, keys.enckey, keys.enckeylen); in aead_setkey() 1186 err = verify_aead_des3_key(tfm, keys.enckey, keys.enckeylen); in des3_aead_setkey() 1191 memcpy(ctx->enckey, keys.enckey, keys.enckeylen); in des3_aead_setkey()
|
D | talitos.c | 905 memcpy(&ctx->key[keys.authkeylen], keys.enckey, keys.enckeylen); in aead_setkey() 938 err = verify_aead_des3_key(authenc, keys.enckey, keys.enckeylen); in aead_des3_setkey() 946 memcpy(&ctx->key[keys.authkeylen], keys.enckey, keys.enckeylen); in aead_des3_setkey()
|
D | picoxcell_crypto.c | 483 memcpy(ctx->cipher_key, keys.enckey, keys.enckeylen); in spacc_aead_setkey()
|
D | atmel-aes.c | 2148 memcpy(ctx->base.key, keys.enckey, keys.enckeylen); in atmel_aes_authenc_setkey()
|
/Linux-v5.4/drivers/crypto/ccree/ |
D | cc_aead.c | 48 u8 *enckey; member 77 if (ctx->enckey) { in cc_aead_exit() 78 dma_free_coherent(dev, AES_MAX_KEY_SIZE, ctx->enckey, in cc_aead_exit() 83 ctx->enckey = NULL; in cc_aead_exit() 148 ctx->enckey = dma_alloc_coherent(dev, AES_MAX_KEY_SIZE, in cc_aead_init() 150 if (!ctx->enckey) { in cc_aead_init() 155 ctx->enckey); in cc_aead_init() 551 const u8 *enckey, *authkey; in cc_aead_setkey() local 565 enckey = keys.enckey; in cc_aead_setkey() 579 memcpy(ctx->ctr_nonce, enckey + ctx->enc_keylen - in cc_aead_setkey() [all …]
|
/Linux-v5.4/drivers/crypto/bcm/ |
D | cipher.c | 333 cipher_parms.key_buf = ctx->enckey; in handle_ablkcipher_req() 1341 cipher_parms.key_buf = ctx->enckey; in handle_aead_req() 1865 ctx->enckey[0] = 0x00; /* 0x00 */ in rc4_setkey() 1866 ctx->enckey[1] = 0x00; /* i */ in rc4_setkey() 1867 ctx->enckey[2] = 0x00; /* 0x00 */ in rc4_setkey() 1868 ctx->enckey[3] = 0x00; /* j */ in rc4_setkey() 1870 ctx->enckey[i + ARC4_STATE_SIZE] = key[i % keylen]; in rc4_setkey() 1911 memcpy(ctx->enckey, key, keylen); in ablkcipher_setkey() 1919 memcpy(ctx->enckey, key + xts_keylen, xts_keylen); in ablkcipher_setkey() 1920 memcpy(ctx->enckey + xts_keylen, key, xts_keylen); in ablkcipher_setkey() [all …]
|
D | cipher.h | 177 u8 enckey[MAX_KEY_SIZE + ARC4_STATE_SIZE]; member
|
/Linux-v5.4/crypto/ |
D | authenc.c | 78 keys->enckey = key + keys->authkeylen; in crypto_authenc_extractkeys() 109 err = crypto_skcipher_setkey(enc, keys.enckey, keys.enckeylen); in crypto_authenc_setkey()
|
D | authencesn.c | 83 err = crypto_skcipher_setkey(enc, keys.enckey, keys.enckeylen); in crypto_authenc_esn_setkey()
|
D | essiv.c | 127 crypto_shash_update(desc, keys.enckey, keys.enckeylen) ?: in essiv_aead_setkey()
|
/Linux-v5.4/drivers/crypto/inside-secure/ |
D | safexcel_cipher.c | 323 ctx->nonce = *(u32 *)(keys.enckey + keys.enckeylen - in safexcel_aead_setkey() 332 err = verify_aead_des3_key(ctfm, keys.enckey, keys.enckeylen); in safexcel_aead_setkey() 337 err = aes_expandkey(&aes, keys.enckey, keys.enckeylen); in safexcel_aead_setkey() 347 memcmp(ctx->key, keys.enckey, keys.enckeylen)) in safexcel_aead_setkey() 391 memcpy(ctx->key, keys.enckey, keys.enckeylen); in safexcel_aead_setkey()
|
/Linux-v5.4/drivers/crypto/caam/ |
D | caamalg_qi.c | 218 memcpy(ctx->key + ctx->adata.keylen_pad, keys.enckey, in aead_setkey() 233 memcpy(ctx->key + ctx->adata.keylen_pad, keys.enckey, keys.enckeylen); in aead_setkey() 286 err = verify_aead_des3_key(aead, keys.enckey, keys.enckeylen) ?: in des3_aead_setkey()
|
D | caamalg.c | 593 memcpy(ctx->key + ctx->adata.keylen_pad, keys.enckey, in aead_setkey() 609 memcpy(ctx->key + ctx->adata.keylen_pad, keys.enckey, keys.enckeylen); in aead_setkey() 637 err = verify_aead_des3_key(aead, keys.enckey, keys.enckeylen) ?: in des3_aead_setkey()
|
D | caamalg_qi2.c | 304 memcpy(ctx->key + ctx->adata.keylen_pad, keys.enckey, keys.enckeylen); in aead_setkey() 335 err = crypto_des3_ede_verify_key(crypto_aead_tfm(aead), keys.enckey) ?: in des3_aead_setkey()
|
/Linux-v5.4/drivers/crypto/qat/qat_common/ |
D | qat_algs.c | 314 memcpy(cipher->aes.key, keys->enckey, keys->enckeylen); in qat_alg_aead_init_enc_session() 400 memcpy(cipher->aes.key, keys->enckey, keys->enckeylen); in qat_alg_aead_init_dec_session()
|
/Linux-v5.4/drivers/crypto/chelsio/ |
D | chcr_algo.c | 3454 memcpy(aeadctx->nonce, keys.enckey + (keys.enckeylen in chcr_authenc_setkey() 3473 memcpy(aeadctx->key, keys.enckey, keys.enckeylen); in chcr_authenc_setkey() 3579 memcpy(aeadctx->nonce, keys.enckey + (keys.enckeylen in chcr_aead_digest_null_setkey() 3593 memcpy(aeadctx->key, keys.enckey, keys.enckeylen); in chcr_aead_digest_null_setkey()
|