/arch/x86/crypto/ |
D | aes_ctrby8_avx-x86_64.S | 149 .macro do_aes b, k, key_len argument 152 .set klen, \key_len 418 .macro do_aes_load val, key_len argument 419 do_aes \val, 1, \key_len 422 .macro do_aes_noload val, key_len argument 423 do_aes \val, 0, \key_len 428 .macro do_aes_ctrmain key_len argument 430 jb .Ldo_return2\key_len 438 jz .Lmult_of_8_blks\key_len 442 jg .Lgt4\key_len [all …]
|
D | aesni-intel_glue.c | 85 unsigned int key_len); 319 const u8 *in_key, unsigned int key_len) in aes_set_key_common() argument 325 if (key_len != AES_KEYSIZE_128 && key_len != AES_KEYSIZE_192 && in aes_set_key_common() 326 key_len != AES_KEYSIZE_256) { in aes_set_key_common() 332 err = aes_expandkey(ctx, in_key, key_len); in aes_set_key_common() 335 err = aesni_set_key(ctx, in_key, key_len); in aes_set_key_common() 343 unsigned int key_len) in aes_set_key() argument 345 return aes_set_key_common(tfm, crypto_tfm_ctx(tfm), in_key, key_len); in aes_set_key() 623 rfc4106_set_hash_subkey(u8 *hash_subkey, const u8 *key, unsigned int key_len) in rfc4106_set_hash_subkey() argument 628 ret = aes_expandkey(&ctx, key, key_len); in rfc4106_set_hash_subkey() [all …]
|
D | camellia_glue.c | 1230 unsigned int key_len, u32 *flags) in __camellia_setkey() argument 1232 if (key_len != 16 && key_len != 24 && key_len != 32) { in __camellia_setkey() 1237 cctx->key_length = key_len; in __camellia_setkey() 1239 switch (key_len) { in __camellia_setkey() 1256 unsigned int key_len) in camellia_setkey() argument 1258 return __camellia_setkey(crypto_tfm_ctx(tfm), key, key_len, in camellia_setkey() 1263 unsigned int key_len) in camellia_setkey_skcipher() argument 1265 return camellia_setkey(&tfm->base, key, key_len); in camellia_setkey_skcipher()
|
D | aesni-intel_asm.S | 1843 movl (FRAME_OFFSET+16)(%esp), %edx # key_len
|
/arch/sparc/crypto/ |
D | camellia_glue.c | 30 int key_len; member 34 unsigned int key_len, u64 *decrypt_key); 37 unsigned int key_len) in camellia_set_key() argument 43 if (key_len != 16 && key_len != 24 && key_len != 32) { in camellia_set_key() 48 ctx->key_len = key_len; in camellia_set_key() 51 key_len, &ctx->decrypt_key[0]); in camellia_set_key() 56 u32 *output, unsigned int key_len); 64 (u32 *) dst, ctx->key_len); in camellia_encrypt() 73 (u32 *) dst, ctx->key_len); in camellia_decrypt() 76 extern void camellia_sparc64_load_keys(const u64 *key, unsigned int key_len); [all …]
|
D | aes_glue.c | 165 unsigned int key_len); 168 unsigned int key_len) in aes_set_key() argument 173 switch (key_len) { in aes_set_key() 194 aes_sparc64_key_expand((const u32 *)in_key, &ctx->key[0], key_len); in aes_set_key() 195 ctx->key_length = key_len; in aes_set_key()
|
/arch/arm64/crypto/ |
D | aes-ce-glue.c | 75 unsigned int key_len) in ce_aes_expandkey() argument 84 u32 kwords = key_len / sizeof(u32); in ce_aes_expandkey() 88 if (key_len != AES_KEYSIZE_128 && in ce_aes_expandkey() 89 key_len != AES_KEYSIZE_192 && in ce_aes_expandkey() 90 key_len != AES_KEYSIZE_256) in ce_aes_expandkey() 93 ctx->key_length = key_len; in ce_aes_expandkey() 107 if (key_len == AES_KEYSIZE_192) { in ce_aes_expandkey() 112 } else if (key_len == AES_KEYSIZE_256) { in ce_aes_expandkey() 143 unsigned int key_len) in ce_aes_setkey() argument 148 ret = ce_aes_expandkey(ctx, in_key, key_len); in ce_aes_setkey()
|
D | aes-ce-setkey.h | 4 unsigned int key_len); 6 unsigned int key_len);
|
D | aes-neonbs-glue.c | 78 unsigned int key_len) in aesbs_setkey() argument 84 err = aes_expandkey(&rk, in_key, key_len); in aesbs_setkey() 88 ctx->rounds = 6 + key_len / 4; in aesbs_setkey() 137 unsigned int key_len) in aesbs_cbc_setkey() argument 143 err = aes_expandkey(&rk, in_key, key_len); in aesbs_cbc_setkey() 147 ctx->key.rounds = 6 + key_len / 4; in aesbs_cbc_setkey() 210 unsigned int key_len) in aesbs_ctr_setkey_sync() argument 215 err = aes_expandkey(&ctx->fallback, in_key, key_len); in aesbs_ctr_setkey_sync() 219 ctx->key.rounds = 6 + key_len / 4; in aesbs_ctr_setkey_sync() 270 unsigned int key_len) in aesbs_xts_setkey() argument [all …]
|
D | aes-glue.c | 132 unsigned int key_len) in skcipher_aes_setkey() argument 137 ret = aes_expandkey(ctx, in_key, key_len); in skcipher_aes_setkey() 145 const u8 *in_key, unsigned int key_len) in xts_set_key() argument 150 ret = xts_verify_key(tfm, in_key, key_len); in xts_set_key() 154 ret = aes_expandkey(&ctx->key1, in_key, key_len / 2); in xts_set_key() 156 ret = aes_expandkey(&ctx->key2, &in_key[key_len / 2], in xts_set_key() 157 key_len / 2); in xts_set_key() 167 unsigned int key_len) in essiv_cbc_set_key() argument 174 ret = aes_expandkey(&ctx->key1, in_key, key_len); in essiv_cbc_set_key() 179 crypto_shash_digest(desc, in_key, key_len, digest); in essiv_cbc_set_key() [all …]
|
D | aes-ce-ccm-glue.c | 47 unsigned int key_len) in ccm_setkey() argument 52 ret = ce_aes_expandkey(ctx, in_key, key_len); in ccm_setkey()
|
/arch/s390/crypto/ |
D | aes_s390.c | 44 int key_len; member 55 int key_len; member 72 unsigned int key_len) in setkey_fallback_cip() argument 81 ret = crypto_cipher_setkey(sctx->fallback.cip, in_key, key_len); in setkey_fallback_cip() 91 unsigned int key_len) in aes_set_key() argument 97 fc = (key_len == 16) ? CPACF_KM_AES_128 : in aes_set_key() 98 (key_len == 24) ? CPACF_KM_AES_192 : in aes_set_key() 99 (key_len == 32) ? CPACF_KM_AES_256 : 0; in aes_set_key() 104 return setkey_fallback_cip(tfm, in_key, key_len); in aes_set_key() 106 sctx->key_len = key_len; in aes_set_key() [all …]
|
D | paes_s390.c | 143 unsigned int key_len) in ecb_paes_set_key() argument 149 rc = _copy_key_to_kb(&ctx->kb, in_key, key_len); in ecb_paes_set_key() 262 unsigned int key_len) in cbc_paes_set_key() argument 268 rc = _copy_key_to_kb(&ctx->kb, in_key, key_len); in cbc_paes_set_key() 400 unsigned int ckey_len, key_len; in xts_paes_set_key() local 405 key_len = xts_key_len / 2; in xts_paes_set_key() 409 rc = _copy_key_to_kb(&ctx->kb[0], in_key, key_len); in xts_paes_set_key() 412 rc = _copy_key_to_kb(&ctx->kb[1], in_key + key_len, key_len); in xts_paes_set_key() 559 unsigned int key_len) in ctr_paes_set_key() argument 565 rc = _copy_key_to_kb(&ctx->kb, in_key, key_len); in ctr_paes_set_key()
|
D | des_s390.c | 35 unsigned int key_len) in des_setkey() argument 44 memcpy(ctx->key, key, key_len); in des_setkey() 222 unsigned int key_len) in des3_setkey() argument 231 memcpy(ctx->key, key, key_len); in des3_setkey()
|
/arch/arm/crypto/ |
D | aes-neonbs-glue.c | 67 unsigned int key_len) in aesbs_setkey() argument 73 err = aes_expandkey(&rk, in_key, key_len); in aesbs_setkey() 77 ctx->rounds = 6 + key_len / 4; in aesbs_setkey() 126 unsigned int key_len) in aesbs_cbc_setkey() argument 132 err = aes_expandkey(&rk, in_key, key_len); in aesbs_cbc_setkey() 136 ctx->key.rounds = 6 + key_len / 4; in aesbs_cbc_setkey() 142 return crypto_cipher_setkey(ctx->enc_tfm, in_key, key_len); in aesbs_cbc_setkey() 202 unsigned int key_len) in aesbs_ctr_setkey_sync() argument 207 err = aes_expandkey(&ctx->fallback, in_key, key_len); in aesbs_ctr_setkey_sync() 211 ctx->key.rounds = 6 + key_len / 4; in aesbs_ctr_setkey_sync() [all …]
|
D | aes-ce-glue.c | 70 unsigned int key_len) in ce_aes_expandkey() argument 79 u32 kwords = key_len / sizeof(u32); in ce_aes_expandkey() 83 if (key_len != AES_KEYSIZE_128 && in ce_aes_expandkey() 84 key_len != AES_KEYSIZE_192 && in ce_aes_expandkey() 85 key_len != AES_KEYSIZE_256) in ce_aes_expandkey() 88 ctx->key_length = key_len; in ce_aes_expandkey() 103 if (key_len == AES_KEYSIZE_192) { in ce_aes_expandkey() 108 } else if (key_len == AES_KEYSIZE_256) { in ce_aes_expandkey() 138 unsigned int key_len) in ce_aes_setkey() argument 143 ret = ce_aes_expandkey(ctx, in_key, key_len); in ce_aes_setkey() [all …]
|
/arch/powerpc/crypto/ |
D | aes-spe-glue.c | 73 unsigned int key_len); 90 unsigned int key_len) in ppc_aes_setkey() argument 94 if (key_len != AES_KEYSIZE_128 && in ppc_aes_setkey() 95 key_len != AES_KEYSIZE_192 && in ppc_aes_setkey() 96 key_len != AES_KEYSIZE_256) { in ppc_aes_setkey() 101 switch (key_len) { in ppc_aes_setkey() 116 ppc_generate_decrypt_key(ctx->key_dec, ctx->key_enc, key_len); in ppc_aes_setkey() 122 unsigned int key_len) in ppc_xts_setkey() argument 127 err = xts_check_key(tfm, in_key, key_len); in ppc_xts_setkey() 131 key_len >>= 1; in ppc_xts_setkey() [all …]
|
/arch/x86/include/asm/crypto/ |
D | camellia.h | 29 unsigned int key_len, u32 *flags);
|