/crypto/ |
D | cipher.c | 20 unsigned int keylen) in setkey_unaligned() argument 28 absize = keylen + alignmask; in setkey_unaligned() 34 memcpy(alignbuffer, key, keylen); in setkey_unaligned() 35 ret = cia->cia_setkey(tfm, alignbuffer, keylen); in setkey_unaligned() 36 memset(alignbuffer, 0, keylen); in setkey_unaligned() 42 static int setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) in setkey() argument 48 if (keylen < cia->cia_min_keysize || keylen > cia->cia_max_keysize) { in setkey() 54 return setkey_unaligned(tfm, key, keylen); in setkey() 56 return cia->cia_setkey(tfm, key, keylen); in setkey()
|
D | blowfish_common.c | 344 int blowfish_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) in blowfish_setkey() argument 364 ((u32)key[(j + 1) % keylen] << 16) | in blowfish_setkey() 365 ((u32)key[(j + 2) % keylen] << 8) | in blowfish_setkey() 366 ((u32)key[(j + 3) % keylen])); in blowfish_setkey() 369 j = (j + 4) % keylen; in blowfish_setkey()
|
D | hmac.c | 41 const u8 *inkey, unsigned int keylen) in hmac_setkey() argument 56 if (keylen > bs) { in hmac_setkey() 59 err = crypto_shash_digest(shash, inkey, keylen, ipad); in hmac_setkey() 63 keylen = ds; in hmac_setkey() 65 memcpy(ipad, inkey, keylen); in hmac_setkey() 67 memset(ipad + keylen, 0, bs - keylen); in hmac_setkey()
|
D | ablkcipher.c | 296 unsigned int keylen) in setkey_unaligned() argument 304 absize = keylen + alignmask; in setkey_unaligned() 310 memcpy(alignbuffer, key, keylen); in setkey_unaligned() 311 ret = cipher->setkey(tfm, alignbuffer, keylen); in setkey_unaligned() 312 memset(alignbuffer, 0, keylen); in setkey_unaligned() 318 unsigned int keylen) in setkey() argument 323 if (keylen < cipher->min_keysize || keylen > cipher->max_keysize) { in setkey() 329 return setkey_unaligned(tfm, key, keylen); in setkey() 331 return cipher->setkey(tfm, key, keylen); in setkey()
|
D | aead.c | 28 unsigned int keylen) in setkey_unaligned() argument 35 absize = keylen + alignmask; in setkey_unaligned() 41 memcpy(alignbuffer, key, keylen); in setkey_unaligned() 42 ret = crypto_aead_alg(tfm)->setkey(tfm, alignbuffer, keylen); in setkey_unaligned() 43 memset(alignbuffer, 0, keylen); in setkey_unaligned() 49 const u8 *key, unsigned int keylen) in crypto_aead_setkey() argument 55 err = setkey_unaligned(tfm, key, keylen); in crypto_aead_setkey() 57 err = crypto_aead_alg(tfm)->setkey(tfm, key, keylen); in crypto_aead_setkey() 216 const u8 *key, unsigned int keylen) in aead_geniv_setkey() argument 220 return crypto_aead_setkey(ctx->child, key, keylen); in aead_geniv_setkey()
|
D | des_generic.c | 20 unsigned int keylen) in des_setkey() argument 25 err = des_expand_key(dctx, key, keylen); in des_setkey() 55 unsigned int keylen) in des3_ede_setkey() argument 60 err = des3_ede_expand_key(dctx, key, keylen); in des3_ede_setkey()
|
D | blkcipher.c | 369 unsigned int keylen) in setkey_unaligned() argument 377 absize = keylen + alignmask; in setkey_unaligned() 383 memcpy(alignbuffer, key, keylen); in setkey_unaligned() 384 ret = cipher->setkey(tfm, alignbuffer, keylen); in setkey_unaligned() 385 memset(alignbuffer, 0, keylen); in setkey_unaligned() 390 static int setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) in setkey() argument 395 if (keylen < cipher->min_keysize || keylen > cipher->max_keysize) { in setkey() 401 return setkey_unaligned(tfm, key, keylen); in setkey() 403 return cipher->setkey(tfm, key, keylen); in setkey() 407 unsigned int keylen) in async_setkey() argument [all …]
|
D | shash.c | 24 unsigned int keylen) in shash_no_setkey() argument 31 unsigned int keylen) in shash_setkey_unaligned() argument 39 absize = keylen + (alignmask & ~(crypto_tfm_ctx_alignment() - 1)); in shash_setkey_unaligned() 45 memcpy(alignbuffer, key, keylen); in shash_setkey_unaligned() 46 err = shash->setkey(tfm, alignbuffer, keylen); in shash_setkey_unaligned() 59 unsigned int keylen) in crypto_shash_setkey() argument 66 err = shash_setkey_unaligned(tfm, key, keylen); in crypto_shash_setkey() 68 err = shash->setkey(tfm, key, keylen); in crypto_shash_setkey() 223 unsigned int keylen) in shash_async_setkey() argument 227 return crypto_shash_setkey(*ctx, key, keylen); in shash_async_setkey()
|
D | rsa.c | 157 unsigned int keylen) in rsa_set_pub_key() argument 166 ret = rsa_parse_pub_key(&raw_key, key, keylen); in rsa_set_pub_key() 191 unsigned int keylen) in rsa_set_priv_key() argument 200 ret = rsa_parse_priv_key(&raw_key, key, keylen); in rsa_set_priv_key()
|
D | skcipher.c | 599 const u8 *key, unsigned int keylen) in skcipher_setkey_blkcipher() argument 608 err = crypto_blkcipher_setkey(blkcipher, key, keylen); in skcipher_setkey_blkcipher() 698 const u8 *key, unsigned int keylen) in skcipher_setkey_ablkcipher() argument 708 err = crypto_ablkcipher_setkey(ablkcipher, key, keylen); in skcipher_setkey_ablkcipher() 798 const u8 *key, unsigned int keylen) in skcipher_setkey_unaligned() argument 806 absize = keylen + alignmask; in skcipher_setkey_unaligned() 812 memcpy(alignbuffer, key, keylen); in skcipher_setkey_unaligned() 813 ret = cipher->setkey(tfm, alignbuffer, keylen); in skcipher_setkey_unaligned() 819 unsigned int keylen) in skcipher_setkey() argument 825 if (keylen < cipher->min_keysize || keylen > cipher->max_keysize) { in skcipher_setkey() [all …]
|
D | ahash.c | 169 unsigned int keylen) in ahash_setkey_unaligned() argument 176 absize = keylen + alignmask; in ahash_setkey_unaligned() 182 memcpy(alignbuffer, key, keylen); in ahash_setkey_unaligned() 183 ret = tfm->setkey(tfm, alignbuffer, keylen); in ahash_setkey_unaligned() 189 unsigned int keylen) in ahash_nosetkey() argument 204 unsigned int keylen) in crypto_ahash_setkey() argument 210 err = ahash_setkey_unaligned(tfm, key, keylen); in crypto_ahash_setkey() 212 err = tfm->setkey(tfm, key, keylen); in crypto_ahash_setkey()
|
D | crypto_null.c | 60 unsigned int keylen) in null_hash_setkey() argument 64 unsigned int keylen) in null_skcipher_setkey() argument 68 unsigned int keylen) in null_setkey() argument
|
D | xts.c | 41 unsigned int keylen) in setkey() argument 48 err = xts_verify_key(parent, key, keylen); in setkey() 52 keylen /= 2; in setkey() 63 err = crypto_cipher_setkey(tweak, key + keylen, keylen); in setkey() 74 err = crypto_skcipher_setkey(child, key, keylen); in setkey()
|
D | authenc.c | 47 unsigned int keylen) in crypto_authenc_extractkeys() argument 52 if (!RTA_OK(rta, keylen)) in crypto_authenc_extractkeys() 71 keylen -= rta->rta_len; in crypto_authenc_extractkeys() 73 if (keylen < keys->enckeylen) in crypto_authenc_extractkeys() 76 keys->authkeylen = keylen - keys->enckeylen; in crypto_authenc_extractkeys() 85 unsigned int keylen) in crypto_authenc_setkey() argument 93 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in crypto_authenc_setkey()
|
D | ctr.c | 170 const u8 *key, unsigned int keylen) in crypto_rfc3686_setkey() argument 177 if (keylen < CTR_RFC3686_NONCE_SIZE) in crypto_rfc3686_setkey() 180 memcpy(ctx->nonce, key + (keylen - CTR_RFC3686_NONCE_SIZE), in crypto_rfc3686_setkey() 183 keylen -= CTR_RFC3686_NONCE_SIZE; in crypto_rfc3686_setkey() 188 err = crypto_skcipher_setkey(child, key, keylen); in crypto_rfc3686_setkey()
|
D | xxhash_generic.c | 21 unsigned int keylen) in xxhash64_setkey() argument 25 if (keylen != sizeof(tctx->seed)) { in xxhash64_setkey()
|
D | crc32_generic.c | 59 unsigned int keylen) in crc32_setkey() argument 63 if (keylen != sizeof(u32)) { in crc32_setkey()
|
D | ccm.c | 89 unsigned int keylen) in crypto_ccm_setkey() argument 99 err = crypto_skcipher_setkey(ctr, key, keylen); in crypto_ccm_setkey() 108 err = crypto_ahash_setkey(mac, key, keylen); in crypto_ccm_setkey() 603 unsigned int keylen) in crypto_rfc4309_setkey() argument 609 if (keylen < 3) in crypto_rfc4309_setkey() 612 keylen -= 3; in crypto_rfc4309_setkey() 613 memcpy(ctx->nonce, key + keylen, 3); in crypto_rfc4309_setkey() 618 err = crypto_aead_setkey(child, key, keylen); in crypto_rfc4309_setkey() 833 const u8 *inkey, unsigned int keylen) in crypto_cbcmac_digest_setkey() argument 837 return crypto_cipher_setkey(ctx->child, inkey, keylen); in crypto_cbcmac_digest_setkey()
|
D | crc32c_generic.c | 73 unsigned int keylen) in chksum_setkey() argument 77 if (keylen != sizeof(mctx->key)) { in chksum_setkey()
|
D | essiv.c | 66 const u8 *key, unsigned int keylen) in essiv_skcipher_setkey() argument 77 err = crypto_skcipher_setkey(tctx->u.skcipher, key, keylen); in essiv_skcipher_setkey() 85 err = crypto_shash_digest(desc, key, keylen, salt); in essiv_skcipher_setkey() 103 unsigned int keylen) in essiv_aead_setkey() argument 114 err = crypto_aead_setkey(tctx->u.aead, key, keylen); in essiv_aead_setkey() 120 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) { in essiv_aead_setkey()
|
D | gcm.c | 94 unsigned int keylen) in crypto_gcm_setkey() argument 113 err = crypto_skcipher_setkey(ctr, key, keylen); in crypto_gcm_setkey() 726 unsigned int keylen) in crypto_rfc4106_setkey() argument 732 if (keylen < 4) in crypto_rfc4106_setkey() 735 keylen -= 4; in crypto_rfc4106_setkey() 736 memcpy(ctx->nonce, key + keylen, 4); in crypto_rfc4106_setkey() 741 err = crypto_aead_setkey(child, key, keylen); in crypto_rfc4106_setkey() 955 unsigned int keylen) in crypto_rfc4543_setkey() argument 961 if (keylen < 4) in crypto_rfc4543_setkey() 964 keylen -= 4; in crypto_rfc4543_setkey() [all …]
|
D | ghash-generic.c | 56 const u8 *key, unsigned int keylen) in ghash_setkey() argument 61 if (keylen != GHASH_BLOCK_SIZE) { in ghash_setkey()
|
D | ecrdsa.c | 191 unsigned int keylen) in ecrdsa_set_pub_key() argument 199 err = asn1_ber_decoder(&ecrdsa_pub_key_decoder, ctx, key, keylen); in ecrdsa_set_pub_key() 205 ecrdsa_unpack_u32(&algo, (u8 *)key + keylen)); in ecrdsa_set_pub_key()
|
D | michael_mic.c | 134 unsigned int keylen) in michael_setkey() argument 140 if (keylen != 8) { in michael_setkey()
|
/crypto/asymmetric_keys/ |
D | public_key.c | 122 key = kmalloc(pkey->keylen + sizeof(u32) * 2 + pkey->paramlen, in software_key_query() 126 memcpy(key, pkey->key, pkey->keylen); in software_key_query() 127 ptr = key + pkey->keylen; in software_key_query() 133 ret = crypto_akcipher_set_priv_key(tfm, key, pkey->keylen); in software_key_query() 135 ret = crypto_akcipher_set_pub_key(tfm, key, pkey->keylen); in software_key_query() 192 key = kmalloc(pkey->keylen + sizeof(u32) * 2 + pkey->paramlen, in software_key_eds_op() 197 memcpy(key, pkey->key, pkey->keylen); in software_key_eds_op() 198 ptr = key + pkey->keylen; in software_key_eds_op() 204 ret = crypto_akcipher_set_priv_key(tfm, key, pkey->keylen); in software_key_eds_op() 206 ret = crypto_akcipher_set_pub_key(tfm, key, pkey->keylen); in software_key_eds_op() [all …]
|