/Linux-v5.4/drivers/staging/wlan-ng/ |
D | p80211wep.c | 121 int wep_change_key(struct wlandevice *wlandev, int keynum, u8 *key, int keylen) in wep_change_key() argument 123 if (keylen < 0) in wep_change_key() 125 if (keylen >= MAX_KEYLEN) in wep_change_key() 134 wlandev->wep_keylens[keynum] = keylen; in wep_change_key() 135 memcpy(wlandev->wep_keys[keynum], key, keylen); in wep_change_key() 147 u32 i, j, k, crc, keylen; in wep_decrypt() local 167 keylen = wlandev->wep_keylens[keyidx]; in wep_decrypt() 169 if (keylen == 0) in wep_decrypt() 173 memcpy(key + 3, wlandev->wep_keys[keyidx], keylen); in wep_decrypt() 175 keylen += 3; /* add in IV bytes */ in wep_decrypt() [all …]
|
/Linux-v5.4/include/crypto/ |
D | xts.h | 14 const u8 *key, unsigned int keylen) in xts_check_key() argument 22 if (keylen % 2) { in xts_check_key() 29 !crypto_memneq(key, key + (keylen / 2), keylen / 2)) { in xts_check_key() 38 const u8 *key, unsigned int keylen) in xts_verify_key() argument 44 if (keylen % 2) { in xts_verify_key() 52 !crypto_memneq(key, key + (keylen / 2), keylen / 2)) { in xts_verify_key()
|
/Linux-v5.4/fs/cachefiles/ |
D | key.c | 33 char *cachefiles_cook_key(const u8 *raw, int keylen, uint8_t type) in cachefiles_cook_key() argument 40 _enter(",%d", keylen); in cachefiles_cook_key() 42 BUG_ON(keylen < 2 || keylen > 514); in cachefiles_cook_key() 46 for (loop = 2; loop < keylen; loop++) { in cachefiles_cook_key() 54 max = keylen - 2; in cachefiles_cook_key() 63 keylen = (keylen + 2) / 3; in cachefiles_cook_key() 65 max = keylen * 4; in cachefiles_cook_key() 98 for (loop = keylen; loop > 0; loop--) { in cachefiles_cook_key() 117 for (loop = keylen; loop > 0; loop--) { in cachefiles_cook_key()
|
/Linux-v5.4/fs/hfs/ |
D | bfind.c | 46 u16 off, len, keylen; in __hfs_brec_find() local 57 keylen = hfs_brec_keylen(bnode, rec); in __hfs_brec_find() 58 if (keylen == 0) { in __hfs_brec_find() 62 hfs_bnode_read(bnode, fd->key, off, keylen); in __hfs_brec_find() 76 keylen = hfs_brec_keylen(bnode, e); in __hfs_brec_find() 77 if (keylen == 0) { in __hfs_brec_find() 81 hfs_bnode_read(bnode, fd->key, off, keylen); in __hfs_brec_find() 86 fd->keylength = keylen; in __hfs_brec_find() 87 fd->entryoffset = off + keylen; in __hfs_brec_find() 88 fd->entrylength = len - keylen; in __hfs_brec_find() [all …]
|
/Linux-v5.4/drivers/crypto/amcc/ |
D | crypto4xx_alg.c | 123 unsigned int keylen, in crypto4xx_setkey_aes() argument 131 if (keylen != AES_KEYSIZE_256 && in crypto4xx_setkey_aes() 132 keylen != AES_KEYSIZE_192 && keylen != AES_KEYSIZE_128) { in crypto4xx_setkey_aes() 142 rc = crypto4xx_alloc_sa(ctx, SA_AES128_LEN + (keylen-16) / 4); in crypto4xx_setkey_aes() 164 key, keylen); in crypto4xx_setkey_aes() 165 sa->sa_contents.w = SA_AES_CONTENTS | (keylen << 2); in crypto4xx_setkey_aes() 166 sa->sa_command_1.bf.key_len = keylen >> 3; in crypto4xx_setkey_aes() 181 const u8 *key, unsigned int keylen) in crypto4xx_setkey_aes_cbc() argument 183 return crypto4xx_setkey_aes(cipher, key, keylen, CRYPTO_MODE_CBC, in crypto4xx_setkey_aes_cbc() 188 const u8 *key, unsigned int keylen) in crypto4xx_setkey_aes_cfb() argument [all …]
|
D | crypto4xx_core.h | 163 const u8 *key, unsigned int keylen); 165 const u8 *key, unsigned int keylen); 167 const u8 *key, unsigned int keylen); 169 const u8 *key, unsigned int keylen); 171 const u8 *key, unsigned int keylen); 173 const u8 *key, unsigned int keylen); 236 const u8 *key, unsigned int keylen); 240 const u8 *key, unsigned int keylen);
|
/Linux-v5.4/crypto/ |
D | cipher.c | 20 unsigned int keylen) in setkey_unaligned() argument 28 absize = keylen + alignmask; in setkey_unaligned() 34 memcpy(alignbuffer, key, keylen); in setkey_unaligned() 35 ret = cia->cia_setkey(tfm, alignbuffer, keylen); in setkey_unaligned() 36 memset(alignbuffer, 0, keylen); in setkey_unaligned() 42 static int setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) in setkey() argument 48 if (keylen < cia->cia_min_keysize || keylen > cia->cia_max_keysize) { in setkey() 54 return setkey_unaligned(tfm, key, keylen); in setkey() 56 return cia->cia_setkey(tfm, key, keylen); in setkey()
|
/Linux-v5.4/fs/hfsplus/ |
D | bfind.c | 117 u16 off, len, keylen; in __hfs_brec_find() local 129 keylen = hfs_brec_keylen(bnode, rec); in __hfs_brec_find() 130 if (keylen == 0) { in __hfs_brec_find() 134 hfs_bnode_read(bnode, fd->key, off, keylen); in __hfs_brec_find() 143 keylen = hfs_brec_keylen(bnode, e); in __hfs_brec_find() 144 if (keylen == 0) { in __hfs_brec_find() 148 hfs_bnode_read(bnode, fd->key, off, keylen); in __hfs_brec_find() 154 fd->keylength = keylen; in __hfs_brec_find() 155 fd->entryoffset = off + keylen; in __hfs_brec_find() 156 fd->entrylength = len - keylen; in __hfs_brec_find() [all …]
|
/Linux-v5.4/drivers/crypto/cavium/cpt/ |
D | cptvf_algs.c | 231 u32 keylen) in cvm_xts_setkey() argument 237 const u8 *key2 = key + (keylen / 2); in cvm_xts_setkey() 239 err = xts_check_key(tfm, key, keylen); in cvm_xts_setkey() 242 ctx->key_len = keylen; in cvm_xts_setkey() 243 memcpy(ctx->enc_key, key1, keylen / 2); in cvm_xts_setkey() 244 memcpy(ctx->enc_key + KEY2_OFFSET, key2, keylen / 2); in cvm_xts_setkey() 260 static int cvm_validate_keylen(struct cvm_enc_ctx *ctx, u32 keylen) in cvm_validate_keylen() argument 262 if ((keylen == 16) || (keylen == 24) || (keylen == 32)) { in cvm_validate_keylen() 263 ctx->key_len = keylen; in cvm_validate_keylen() 288 u32 keylen, u8 cipher_type) in cvm_setkey() argument [all …]
|
/Linux-v5.4/drivers/crypto/cavium/nitrox/ |
D | nitrox_skcipher.c | 94 unsigned int keylen) in nitrox_skcipher_setkey() argument 119 memcpy(fctx->crypto.u.key, key, keylen); in nitrox_skcipher_setkey() 125 unsigned int keylen) in nitrox_aes_setkey() argument 129 aes_keylen = flexi_aes_keylen(keylen); in nitrox_aes_setkey() 134 return nitrox_skcipher_setkey(cipher, aes_keylen, key, keylen); in nitrox_aes_setkey() 258 const u8 *key, unsigned int keylen) in nitrox_3des_setkey() argument 261 nitrox_skcipher_setkey(cipher, 0, key, keylen); in nitrox_3des_setkey() 275 const u8 *key, unsigned int keylen) in nitrox_aes_xts_setkey() argument 282 ret = xts_check_key(tfm, key, keylen); in nitrox_aes_xts_setkey() 286 keylen /= 2; in nitrox_aes_xts_setkey() [all …]
|
/Linux-v5.4/drivers/crypto/caam/ |
D | key_gen.c | 45 struct alginfo * const adata, const u8 *key_in, u32 keylen, in gen_split_key() argument 54 adata->keylen = split_key_len(adata->algtype & OP_ALG_ALGSEL_MASK); in gen_split_key() 57 local_max = max(keylen, adata->keylen_pad); in gen_split_key() 60 adata->keylen, adata->keylen_pad); in gen_split_key() 62 DUMP_PREFIX_ADDRESS, 16, 4, key_in, keylen, 1); in gen_split_key() 73 memcpy(key_out, key_in, keylen); in gen_split_key() 82 append_key(desc, dma_addr, keylen, CLASS_2 | KEY_DEST_CLASS_REG); in gen_split_key() 100 append_fifo_store(desc, dma_addr, adata->keylen, in gen_split_key()
|
D | caamhash_desc.c | 36 if (state != OP_ALG_AS_UPDATE && adata->keylen) { in cnstr_shdsc_ahash() 46 adata->keylen, CLASS_2 | in cnstr_shdsc_ahash() 98 append_key_as_imm(desc, adata->key_virt, adata->keylen, in cnstr_shdsc_sk_hash() 99 adata->keylen, CLASS_1 | KEY_DEST_CLASS_REG); in cnstr_shdsc_sk_hash() 103 append_key(desc, adata->key_dma, adata->keylen, in cnstr_shdsc_sk_hash() 106 append_key_as_imm(desc, adata->key_virt, adata->keylen, in cnstr_shdsc_sk_hash() 107 adata->keylen, CLASS_1 | in cnstr_shdsc_sk_hash() 138 append_fifo_store(desc, adata->key_dma, adata->keylen, in cnstr_shdsc_sk_hash()
|
D | caamalg_desc.c | 69 adata->keylen_pad, adata->keylen, in cnstr_shdsc_aead_null_encap() 73 append_key(desc, adata->key_dma, adata->keylen, in cnstr_shdsc_aead_null_encap() 148 adata->keylen_pad, adata->keylen, in cnstr_shdsc_aead_null_decap() 152 append_key(desc, adata->key_dma, adata->keylen, in cnstr_shdsc_aead_null_decap() 216 unsigned int enckeylen = cdata->keylen; in init_sh_desc_key_aead() 236 adata->keylen_pad, adata->keylen, in init_sh_desc_key_aead() 240 append_key(desc, adata->key_dma, adata->keylen, in init_sh_desc_key_aead() 646 append_key_as_imm(desc, cdata->key_virt, cdata->keylen, in cnstr_shdsc_gcm_encap() 647 cdata->keylen, CLASS_1 | KEY_DEST_CLASS_REG); in cnstr_shdsc_gcm_encap() 649 append_key(desc, cdata->key_dma, cdata->keylen, CLASS_1 | in cnstr_shdsc_gcm_encap() [all …]
|
D | caamalg_qi.c | 87 if (!ctx->cdata.keylen || !ctx->authsize) in aead_set_sh_desc() 105 ctx->cdata.keylen - CTR_RFC3686_NONCE_SIZE); in aead_set_sh_desc() 121 data_len[1] = ctx->cdata.keylen; in aead_set_sh_desc() 188 unsigned int keylen) in aead_setkey() argument 196 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in aead_setkey() 203 DUMP_PREFIX_ADDRESS, 16, 4, key, keylen, 1); in aead_setkey() 210 ctx->adata.keylen = keys.authkeylen; in aead_setkey() 243 ctx->cdata.keylen = keys.enckeylen; in aead_setkey() 277 unsigned int keylen) in des3_aead_setkey() argument 282 err = crypto_authenc_extractkeys(&keys, key, keylen); in des3_aead_setkey() [all …]
|
/Linux-v5.4/net/mac80211/ |
D | wep.c | 33 static inline bool ieee80211_wep_weak_iv(u32 iv, int keylen) in ieee80211_wep_weak_iv() argument 42 if (B >= 3 && B < 3 + keylen) in ieee80211_wep_weak_iv() 50 int keylen, int keyidx, u8 *iv) in ieee80211_wep_get_iv() argument 53 if (ieee80211_wep_weak_iv(local->wep_iv, keylen)) in ieee80211_wep_get_iv() 68 int keylen, int keyidx) in ieee80211_wep_add_iv() argument 89 ieee80211_wep_get_iv(local, keylen, keyidx, newhdr + hdrlen); in ieee80211_wep_add_iv() 135 const u8 *key, int keylen, int keyidx) in ieee80211_wep_encrypt() argument 144 iv = ieee80211_wep_add_iv(local, skb, keylen, keyidx); in ieee80211_wep_encrypt() 154 memcpy(rc4key + 3, key, keylen); in ieee80211_wep_encrypt() 159 return ieee80211_wep_encrypt_data(&local->wep_tx_ctx, rc4key, keylen + 3, in ieee80211_wep_encrypt() [all …]
|
/Linux-v5.4/crypto/asymmetric_keys/ |
D | public_key.c | 122 key = kmalloc(pkey->keylen + sizeof(u32) * 2 + pkey->paramlen, in software_key_query() 126 memcpy(key, pkey->key, pkey->keylen); in software_key_query() 127 ptr = key + pkey->keylen; in software_key_query() 133 ret = crypto_akcipher_set_priv_key(tfm, key, pkey->keylen); in software_key_query() 135 ret = crypto_akcipher_set_pub_key(tfm, key, pkey->keylen); in software_key_query() 191 key = kmalloc(pkey->keylen + sizeof(u32) * 2 + pkey->paramlen, in software_key_eds_op() 196 memcpy(key, pkey->key, pkey->keylen); in software_key_eds_op() 197 ptr = key + pkey->keylen; in software_key_eds_op() 203 ret = crypto_akcipher_set_priv_key(tfm, key, pkey->keylen); in software_key_eds_op() 205 ret = crypto_akcipher_set_pub_key(tfm, key, pkey->keylen); in software_key_eds_op() [all …]
|
/Linux-v5.4/drivers/crypto/ |
D | omap-aes-gcm.c | 195 ret = crypto_skcipher_setkey(ctx->ctr, (u8 *)ctx->key, ctx->keylen); in do_encrypt_iv() 373 unsigned int keylen) in omap_aes_gcm_setkey() argument 377 if (keylen != AES_KEYSIZE_128 && keylen != AES_KEYSIZE_192 && in omap_aes_gcm_setkey() 378 keylen != AES_KEYSIZE_256) in omap_aes_gcm_setkey() 381 memcpy(ctx->key, key, keylen); in omap_aes_gcm_setkey() 382 ctx->keylen = keylen; in omap_aes_gcm_setkey() 388 unsigned int keylen) in omap_aes_4106gcm_setkey() argument 392 if (keylen < 4) in omap_aes_4106gcm_setkey() 395 keylen -= 4; in omap_aes_4106gcm_setkey() 396 if (keylen != AES_KEYSIZE_128 && keylen != AES_KEYSIZE_192 && in omap_aes_4106gcm_setkey() [all …]
|
/Linux-v5.4/fs/befs/ |
D | btree.c | 117 int index, u16 * keylen); 335 u16 keylen; in befs_find_key() local 346 thiskey = befs_bt_get_key(sb, node, last, &keylen); in befs_find_key() 348 eq = befs_compare_strings(thiskey, keylen, findkey, findkey_len); in befs_find_key() 363 thiskey = befs_bt_get_key(sb, node, mid, &keylen); in befs_find_key() 364 eq = befs_compare_strings(thiskey, keylen, findkey, in befs_find_key() 421 u16 keylen; in befs_btree_read() local 490 keystart = befs_bt_get_key(sb, this_node, cur_key, &keylen); in befs_btree_read() 494 (int)keylen); in befs_btree_read() 496 if (bufsize < keylen + 1) { in befs_btree_read() [all …]
|
/Linux-v5.4/drivers/crypto/vmx/ |
D | aes_xts.c | 54 unsigned int keylen) in p8_aes_xts_setkey() argument 59 ret = xts_verify_key(tfm, key, keylen); in p8_aes_xts_setkey() 66 ret = aes_p8_set_encrypt_key(key + keylen/2, (keylen/2) * 8, &ctx->tweak_key); in p8_aes_xts_setkey() 67 ret |= aes_p8_set_encrypt_key(key, (keylen/2) * 8, &ctx->enc_key); in p8_aes_xts_setkey() 68 ret |= aes_p8_set_decrypt_key(key, (keylen/2) * 8, &ctx->dec_key); in p8_aes_xts_setkey() 73 ret |= crypto_skcipher_setkey(ctx->fallback, key, keylen); in p8_aes_xts_setkey()
|
/Linux-v5.4/drivers/crypto/sunxi-ss/ |
D | sun4i-ss-cipher.c | 47 for (i = 0; i < op->keylen; i += 4) in sun4i_ss_opti_poll() 207 for (i = 0; i < op->keylen; i += 4) in sun4i_ss_cipher_poll() 511 unsigned int keylen) in sun4i_ss_aes_setkey() argument 516 switch (keylen) { in sun4i_ss_aes_setkey() 527 dev_err(ss->dev, "ERROR: Invalid keylen %u\n", keylen); in sun4i_ss_aes_setkey() 531 op->keylen = keylen; in sun4i_ss_aes_setkey() 532 memcpy(op->key, key, keylen); in sun4i_ss_aes_setkey() 537 return crypto_sync_skcipher_setkey(op->fallback_tfm, key, keylen); in sun4i_ss_aes_setkey() 542 unsigned int keylen) in sun4i_ss_des_setkey() argument 551 op->keylen = keylen; in sun4i_ss_des_setkey() [all …]
|
/Linux-v5.4/drivers/s390/crypto/ |
D | pkey_api.c | 305 static int pkey_nonccatok2pkey(const u8 *key, u32 keylen, in pkey_nonccatok2pkey() argument 313 if (keylen != sizeof(struct protaeskeytoken)) in pkey_nonccatok2pkey() 333 static int pkey_ccainttok2pkey(const u8 *key, u32 keylen, in pkey_ccainttok2pkey() argument 340 if (keylen != sizeof(struct secaeskeytoken)) in pkey_ccainttok2pkey() 344 if (keylen < hdr->len || keylen > MAXCCAVLSCTOKENSIZE) in pkey_ccainttok2pkey() 359 int pkey_keyblob2pkey(const u8 *key, u32 keylen, in pkey_keyblob2pkey() argument 365 if (keylen < sizeof(struct keytoken_header)) { in pkey_keyblob2pkey() 366 DEBUG_ERR("%s invalid keylen %d\n", __func__, keylen); in pkey_keyblob2pkey() 372 rc = pkey_nonccatok2pkey(key, keylen, protkey); in pkey_keyblob2pkey() 375 rc = pkey_ccainttok2pkey(key, keylen, protkey); in pkey_keyblob2pkey() [all …]
|
/Linux-v5.4/drivers/crypto/chelsio/chtls/ |
D | chtls_hw.c | 211 u32 keylen, u32 optname) in chtls_key_info() argument 224 roundup(keylen, 16) + AEAD_H_SIZE; in chtls_key_info() 226 if (keylen == AES_KEYSIZE_128) { in chtls_key_info() 229 pr_err("GCM: Invalid key length %d\n", keylen); in chtls_key_info() 232 memcpy(key, gcm_ctx->key, keylen); in chtls_key_info() 237 ret = aes_expandkey(&aes, key, keylen); in chtls_key_info() 244 csk->tlshws.keylen = key_ctx_size; in chtls_key_info() 262 memcpy(kctx->key, gcm_ctx->key, keylen); in chtls_key_info() 263 memcpy(kctx->key + keylen, ghash_h, AEAD_H_SIZE); in chtls_key_info() 265 memset(gcm_ctx->key, 0, keylen); in chtls_key_info() [all …]
|
/Linux-v5.4/drivers/crypto/rockchip/ |
D | rk3288_crypto_ablkcipher.c | 31 const u8 *key, unsigned int keylen) in rk_aes_setkey() argument 36 if (keylen != AES_KEYSIZE_128 && keylen != AES_KEYSIZE_192 && in rk_aes_setkey() 37 keylen != AES_KEYSIZE_256) { in rk_aes_setkey() 41 ctx->keylen = keylen; in rk_aes_setkey() 42 memcpy_toio(ctx->dev->reg + RK_CRYPTO_AES_KEY_0, key, keylen); in rk_aes_setkey() 47 const u8 *key, unsigned int keylen) in rk_des_setkey() argument 56 ctx->keylen = keylen; in rk_des_setkey() 57 memcpy_toio(ctx->dev->reg + RK_CRYPTO_TDES_KEY1_0, key, keylen); in rk_des_setkey() 62 const u8 *key, unsigned int keylen) in rk_tdes_setkey() argument 71 ctx->keylen = keylen; in rk_tdes_setkey() [all …]
|
/Linux-v5.4/net/netfilter/ |
D | nf_conncount.c | 59 unsigned int keylen; member 313 u8 keylen = data->keylen; in insert_tree() local 325 diff = key_diff(key, rbconn->key, keylen); in insert_tree() 370 memcpy(rbconn->key, key, sizeof(u32) * keylen); in insert_tree() 395 u8 keylen = data->keylen; in count_tree() local 397 hash = jhash2(key, data->keylen, conncount_rnd) % CONNCOUNT_SLOTS; in count_tree() 406 diff = key_diff(key, rbconn->key, keylen); in count_tree() 517 unsigned int keylen) in nf_conncount_init() argument 522 if (keylen % sizeof(u32) || in nf_conncount_init() 523 keylen / sizeof(u32) > MAX_KEYLEN || in nf_conncount_init() [all …]
|
/Linux-v5.4/drivers/crypto/hisilicon/sec/ |
D | sec_algs.c | 144 unsigned int keylen, in sec_alg_skcipher_init_context() argument 151 memcpy(ctx->key, key, keylen); in sec_alg_skcipher_init_context() 227 const u8 *key, unsigned int keylen, in sec_alg_skcipher_setkey() argument 247 sec_alg_skcipher_init_context(tfm, key, keylen, alg); in sec_alg_skcipher_setkey() 253 const u8 *key, unsigned int keylen) in sec_alg_skcipher_setkey_aes_ecb() argument 257 switch (keylen) { in sec_alg_skcipher_setkey_aes_ecb() 271 return sec_alg_skcipher_setkey(tfm, key, keylen, alg); in sec_alg_skcipher_setkey_aes_ecb() 275 const u8 *key, unsigned int keylen) in sec_alg_skcipher_setkey_aes_cbc() argument 279 switch (keylen) { in sec_alg_skcipher_setkey_aes_cbc() 293 return sec_alg_skcipher_setkey(tfm, key, keylen, alg); in sec_alg_skcipher_setkey_aes_cbc() [all …]
|