/Linux-v5.4/include/crypto/ |
D | authenc.h | 18 __be32 enckeylen; member 26 unsigned int enckeylen; member
|
/Linux-v5.4/crypto/ |
D | authenc.c | 68 keys->enckeylen = be32_to_cpu(param->enckeylen); in crypto_authenc_extractkeys() 73 if (keylen < keys->enckeylen) in crypto_authenc_extractkeys() 76 keys->authkeylen = keylen - keys->enckeylen; in crypto_authenc_extractkeys() 109 err = crypto_skcipher_setkey(enc, keys.enckey, keys.enckeylen); in crypto_authenc_setkey()
|
D | authencesn.c | 83 err = crypto_skcipher_setkey(enc, keys.enckey, keys.enckeylen); in crypto_authenc_esn_setkey()
|
D | essiv.c | 127 crypto_shash_update(desc, keys.enckey, keys.enckeylen) ?: in essiv_aead_setkey()
|
/Linux-v5.4/drivers/crypto/qce/ |
D | common.c | 190 unsigned int enckeylen, unsigned int cryptlen) in qce_xtskey() argument 193 unsigned int xtsklen = enckeylen / (2 * sizeof(u32)); in qce_xtskey() 196 qce_cpu_to_be32p_array((__be32 *)xtskey, enckey + enckeylen / 2, in qce_xtskey() 197 enckeylen / 2); in qce_xtskey()
|
/Linux-v5.4/drivers/crypto/bcm/ |
D | cipher.c | 332 cipher_parms.key_len = ctx->enckeylen; in handle_ablkcipher_req() 1342 cipher_parms.key_len = ctx->enckeylen; in handle_aead_req() 1863 ctx->enckeylen = ARC4_MAX_KEY_SIZE + ARC4_STATE_SIZE; in rc4_setkey() 1912 ctx->enckeylen = keylen; in ablkcipher_setkey() 1936 cipher_parms.key_len = ctx->enckeylen; in ablkcipher_setkey() 1945 ctx->enckeylen, in ablkcipher_setkey() 2836 if (keys.enckeylen > MAX_KEY_SIZE || in aead_authenc_setkey() 2840 ctx->enckeylen = keys.enckeylen; in aead_authenc_setkey() 2843 memcpy(ctx->enckey, keys.enckey, keys.enckeylen); in aead_authenc_setkey() 2850 if (verify_aead_des_key(cipher, keys.enckey, keys.enckeylen)) in aead_authenc_setkey() [all …]
|
D | cipher.h | 178 unsigned int enckeylen; member
|
/Linux-v5.4/drivers/crypto/caam/ |
D | caamalg_qi.c | 200 keys.authkeylen + keys.enckeylen, keys.enckeylen, in aead_setkey() 214 if (ctx->adata.keylen_pad + keys.enckeylen > CAAM_MAX_KEY_SIZE) in aead_setkey() 219 keys.enckeylen); in aead_setkey() 222 keys.enckeylen, ctx->dir); in aead_setkey() 228 keys.enckeylen); in aead_setkey() 233 memcpy(ctx->key + ctx->adata.keylen_pad, keys.enckey, keys.enckeylen); in aead_setkey() 235 ctx->adata.keylen_pad + keys.enckeylen, in aead_setkey() 240 ctx->adata.keylen_pad + keys.enckeylen, 1); in aead_setkey() 243 ctx->cdata.keylen = keys.enckeylen; in aead_setkey() 286 err = verify_aead_des3_key(aead, keys.enckey, keys.enckeylen) ?: in des3_aead_setkey()
|
D | caamalg.c | 575 keys.authkeylen + keys.enckeylen, keys.enckeylen, in aead_setkey() 589 if (ctx->adata.keylen_pad + keys.enckeylen > CAAM_MAX_KEY_SIZE) in aead_setkey() 594 keys.enckeylen); in aead_setkey() 597 keys.enckeylen, ctx->dir); in aead_setkey() 603 keys.enckeylen); in aead_setkey() 609 memcpy(ctx->key + ctx->adata.keylen_pad, keys.enckey, keys.enckeylen); in aead_setkey() 611 keys.enckeylen, ctx->dir); in aead_setkey() 615 ctx->adata.keylen_pad + keys.enckeylen, 1); in aead_setkey() 618 ctx->cdata.keylen = keys.enckeylen; in aead_setkey() 637 err = verify_aead_des3_key(aead, keys.enckey, keys.enckeylen) ?: in des3_aead_setkey()
|
D | caamalg_desc.c | 216 unsigned int enckeylen = cdata->keylen; in init_sh_desc_key_aead() local 231 enckeylen -= CTR_RFC3686_NONCE_SIZE; in init_sh_desc_key_aead() 247 append_key_as_imm(desc, cdata->key_virt, enckeylen, in init_sh_desc_key_aead() 248 enckeylen, CLASS_1 | KEY_DEST_CLASS_REG); in init_sh_desc_key_aead() 250 append_key(desc, cdata->key_dma, enckeylen, CLASS_1 | in init_sh_desc_key_aead()
|
D | caamalg_qi2.c | 291 keys.authkeylen + keys.enckeylen, keys.enckeylen, in aead_setkey() 300 if (ctx->adata.keylen_pad + keys.enckeylen > CAAM_MAX_KEY_SIZE) in aead_setkey() 304 memcpy(ctx->key + ctx->adata.keylen_pad, keys.enckey, keys.enckeylen); in aead_setkey() 306 keys.enckeylen, ctx->dir); in aead_setkey() 309 ctx->adata.keylen_pad + keys.enckeylen, 1); in aead_setkey() 311 ctx->cdata.keylen = keys.enckeylen; in aead_setkey() 332 if (keys.enckeylen != DES3_EDE_KEY_SIZE) in des3_aead_setkey()
|
/Linux-v5.4/drivers/crypto/chelsio/ |
D | chcr_algo.c | 3452 if (keys.enckeylen < CTR_RFC3686_NONCE_SIZE) in chcr_authenc_setkey() 3454 memcpy(aeadctx->nonce, keys.enckey + (keys.enckeylen in chcr_authenc_setkey() 3456 keys.enckeylen -= CTR_RFC3686_NONCE_SIZE; in chcr_authenc_setkey() 3458 if (keys.enckeylen == AES_KEYSIZE_128) { in chcr_authenc_setkey() 3460 } else if (keys.enckeylen == AES_KEYSIZE_192) { in chcr_authenc_setkey() 3462 } else if (keys.enckeylen == AES_KEYSIZE_256) { in chcr_authenc_setkey() 3473 memcpy(aeadctx->key, keys.enckey, keys.enckeylen); in chcr_authenc_setkey() 3474 aeadctx->enckey_len = keys.enckeylen; in chcr_authenc_setkey() 3530 roundup(keys.enckeylen, 16) + in chcr_authenc_setkey() 3577 if (keys.enckeylen < CTR_RFC3686_NONCE_SIZE) in chcr_aead_digest_null_setkey() [all …]
|
/Linux-v5.4/drivers/crypto/ |
D | ixp4xx_crypto.c | 1155 if (keys.enckeylen > sizeof(ctx->enckey)) in aead_setkey() 1159 memcpy(ctx->enckey, keys.enckey, keys.enckeylen); in aead_setkey() 1161 ctx->enckey_len = keys.enckeylen; in aead_setkey() 1186 err = verify_aead_des3_key(tfm, keys.enckey, keys.enckeylen); in des3_aead_setkey() 1191 memcpy(ctx->enckey, keys.enckey, keys.enckeylen); in des3_aead_setkey() 1193 ctx->enckey_len = keys.enckeylen; in des3_aead_setkey()
|
D | talitos.c | 857 unsigned int enckeylen; member 898 if (keys.authkeylen + keys.enckeylen > TALITOS_MAX_KEY_SIZE) in aead_setkey() 905 memcpy(&ctx->key[keys.authkeylen], keys.enckey, keys.enckeylen); in aead_setkey() 907 ctx->keylen = keys.authkeylen + keys.enckeylen; in aead_setkey() 908 ctx->enckeylen = keys.enckeylen; in aead_setkey() 935 if (keys.authkeylen + keys.enckeylen > TALITOS_MAX_KEY_SIZE) in aead_des3_setkey() 938 err = verify_aead_des3_key(authenc, keys.enckey, keys.enckeylen); in aead_des3_setkey() 946 memcpy(&ctx->key[keys.authkeylen], keys.enckey, keys.enckeylen); in aead_des3_setkey() 948 ctx->keylen = keys.authkeylen + keys.enckeylen; in aead_des3_setkey() 949 ctx->enckeylen = keys.enckeylen; in aead_des3_setkey() [all …]
|
D | picoxcell_crypto.c | 477 if (keys.enckeylen > AES_MAX_KEY_SIZE) in spacc_aead_setkey() 483 memcpy(ctx->cipher_key, keys.enckey, keys.enckeylen); in spacc_aead_setkey() 484 ctx->cipher_key_len = keys.enckeylen; in spacc_aead_setkey()
|
D | atmel-aes.c | 2132 if (keys.enckeylen > sizeof(ctx->base.key)) in atmel_aes_authenc_setkey() 2147 ctx->base.keylen = keys.enckeylen; in atmel_aes_authenc_setkey() 2148 memcpy(ctx->base.key, keys.enckey, keys.enckeylen); in atmel_aes_authenc_setkey()
|
/Linux-v5.4/drivers/crypto/qat/qat_common/ |
D | qat_algs.c | 304 sizeof(struct icp_qat_hw_auth_setup) + keys->enckeylen); in qat_alg_aead_init_enc_session() 314 memcpy(cipher->aes.key, keys->enckey, keys->enckeylen); in qat_alg_aead_init_enc_session() 337 cipher_cd_ctrl->cipher_key_sz = keys->enckeylen >> 3; in qat_alg_aead_init_enc_session() 400 memcpy(cipher->aes.key, keys->enckey, keys->enckeylen); in qat_alg_aead_init_dec_session() 424 cipher_cd_ctrl->cipher_key_sz = keys->enckeylen >> 3; in qat_alg_aead_init_dec_session() 560 if (qat_alg_validate_key(keys.enckeylen, &alg, mode)) in qat_alg_aead_init_sessions()
|
/Linux-v5.4/drivers/crypto/inside-secure/ |
D | safexcel_cipher.c | 319 if (keys.enckeylen < (AES_MIN_KEY_SIZE + in safexcel_aead_setkey() 323 ctx->nonce = *(u32 *)(keys.enckey + keys.enckeylen - in safexcel_aead_setkey() 326 keys.enckeylen -= CONTEXT_CONTROL_CRYPTO_MODE_CTR_LOAD; in safexcel_aead_setkey() 332 err = verify_aead_des3_key(ctfm, keys.enckey, keys.enckeylen); in safexcel_aead_setkey() 337 err = aes_expandkey(&aes, keys.enckey, keys.enckeylen); in safexcel_aead_setkey() 347 memcmp(ctx->key, keys.enckey, keys.enckeylen)) in safexcel_aead_setkey() 391 memcpy(ctx->key, keys.enckey, keys.enckeylen); in safexcel_aead_setkey() 392 ctx->key_len = keys.enckeylen; in safexcel_aead_setkey()
|
/Linux-v5.4/drivers/md/ |
D | dm-crypt.c | 1837 unsigned enckeylen, unsigned authkeylen) in crypt_copy_authenckey() argument 1844 param->enckeylen = cpu_to_be32(enckeylen); in crypt_copy_authenckey() 1848 memcpy(p, key + enckeylen, authkeylen); in crypt_copy_authenckey() 1850 memcpy(p, key, enckeylen); in crypt_copy_authenckey()
|
/Linux-v5.4/net/ipv6/ |
D | esp6.c | 837 param->enckeylen = cpu_to_be32((x->ealg->alg_key_len + 7) / 8); in esp_init_authenc()
|
/Linux-v5.4/net/ipv4/ |
D | esp4.c | 942 param->enckeylen = cpu_to_be32((x->ealg->alg_key_len + 7) / 8); in esp_init_authenc()
|
/Linux-v5.4/drivers/crypto/ccree/ |
D | cc_aead.c | 567 ctx->enc_keylen = keys.enckeylen; in cc_aead_setkey() 658 err = verify_aead_des3_key(aead, keys.enckey, keys.enckeylen) ?: in cc_des3_aead_setkey()
|