/arch/x86/crypto/ |
D | aes_ctrby8_avx-x86_64.S | 155 .macro do_aes b, k, key_len, xctr 158 .set klen, \key_len 443 .macro do_aes_load val, key_len, xctr 444 do_aes \val, 1, \key_len, \xctr 447 .macro do_aes_noload val, key_len, xctr 448 do_aes \val, 0, \key_len, \xctr 453 .macro do_aes_ctrmain key_len, xctr 455 jb .Ldo_return2\xctr\key_len 468 jz .Lmult_of_8_blks\xctr\key_len 472 jg .Lgt4\xctr\key_len [all …]
|
D | camellia_glue.c | 1231 unsigned int key_len) in __camellia_setkey() argument 1233 if (key_len != 16 && key_len != 24 && key_len != 32) in __camellia_setkey() 1236 cctx->key_length = key_len; in __camellia_setkey() 1238 switch (key_len) { in __camellia_setkey() 1255 unsigned int key_len) in camellia_setkey() argument 1257 return __camellia_setkey(crypto_tfm_ctx(tfm), key, key_len); in camellia_setkey() 1261 unsigned int key_len) in camellia_setkey_skcipher() argument 1263 return camellia_setkey(&tfm->base, key, key_len); in camellia_setkey_skcipher()
|
D | aesni-intel_glue.c | 84 unsigned int key_len); 233 const u8 *in_key, unsigned int key_len) in aes_set_key_common() argument 238 if (key_len != AES_KEYSIZE_128 && key_len != AES_KEYSIZE_192 && in aes_set_key_common() 239 key_len != AES_KEYSIZE_256) in aes_set_key_common() 243 err = aes_expandkey(ctx, in_key, key_len); in aes_set_key_common() 246 err = aesni_set_key(ctx, in_key, key_len); in aes_set_key_common() 254 unsigned int key_len) in aes_set_key() argument 256 return aes_set_key_common(tfm, crypto_tfm_ctx(tfm), in_key, key_len); in aes_set_key() 598 rfc4106_set_hash_subkey(u8 *hash_subkey, const u8 *key, unsigned int key_len) in rfc4106_set_hash_subkey() argument 603 ret = aes_expandkey(&ctx, key, key_len); in rfc4106_set_hash_subkey() [all …]
|
D | sm4_aesni_avx2_glue.c | 30 unsigned int key_len) in sm4_skcipher_setkey() argument 34 return sm4_expandkey(ctx, key, key_len); in sm4_skcipher_setkey()
|
D | camellia.h | 24 unsigned int key_len);
|
D | sm4_aesni_avx_glue.c | 34 unsigned int key_len) in sm4_skcipher_setkey() argument 38 return sm4_expandkey(ctx, key, key_len); in sm4_skcipher_setkey()
|
D | aesni-intel_asm.S | 1834 movl (FRAME_OFFSET+16)(%esp), %edx # key_len
|
/arch/sparc/crypto/ |
D | camellia_glue.c | 31 int key_len; member 35 unsigned int key_len, u64 *decrypt_key); 38 unsigned int key_len) in camellia_set_key() argument 43 if (key_len != 16 && key_len != 24 && key_len != 32) in camellia_set_key() 46 ctx->key_len = key_len; in camellia_set_key() 49 key_len, &ctx->decrypt_key[0]); in camellia_set_key() 54 const u8 *in_key, unsigned int key_len) in camellia_set_key_skcipher() argument 56 return camellia_set_key(crypto_skcipher_tfm(tfm), in_key, key_len); in camellia_set_key_skcipher() 60 u32 *output, unsigned int key_len); 68 (u32 *) dst, ctx->key_len); in camellia_encrypt() [all …]
|
D | aes_glue.c | 166 unsigned int key_len); 169 unsigned int key_len) in aes_set_key() argument 173 switch (key_len) { in aes_set_key() 193 aes_sparc64_key_expand((const u32 *)in_key, &ctx->key[0], key_len); in aes_set_key() 194 ctx->key_length = key_len; in aes_set_key() 200 unsigned int key_len) in aes_set_key_skcipher() argument 202 return aes_set_key(crypto_skcipher_tfm(tfm), in_key, key_len); in aes_set_key_skcipher()
|
/arch/s390/crypto/ |
D | aes_s390.c | 45 int key_len; member 56 int key_len; member 73 unsigned int key_len) in setkey_fallback_cip() argument 81 return crypto_cipher_setkey(sctx->fallback.cip, in_key, key_len); in setkey_fallback_cip() 85 unsigned int key_len) in aes_set_key() argument 91 fc = (key_len == 16) ? CPACF_KM_AES_128 : in aes_set_key() 92 (key_len == 24) ? CPACF_KM_AES_192 : in aes_set_key() 93 (key_len == 32) ? CPACF_KM_AES_256 : 0; in aes_set_key() 98 return setkey_fallback_cip(tfm, in_key, key_len); in aes_set_key() 100 sctx->key_len = key_len; in aes_set_key() [all …]
|
D | des_s390.c | 36 unsigned int key_len) in des_setkey() argument 45 memcpy(ctx->key, key, key_len); in des_setkey() 50 unsigned int key_len) in des_setkey_skcipher() argument 52 return des_setkey(crypto_skcipher_tfm(tfm), key, key_len); in des_setkey_skcipher() 201 unsigned int key_len) in des3_setkey() argument 210 memcpy(ctx->key, key, key_len); in des3_setkey() 215 unsigned int key_len) in des3_setkey_skcipher() argument 217 return des3_setkey(crypto_skcipher_tfm(tfm), key, key_len); in des3_setkey_skcipher()
|
D | paes_s390.c | 197 unsigned int key_len) in ecb_paes_set_key() argument 203 rc = _key_to_kb(&ctx->kb, in_key, key_len); in ecb_paes_set_key() 312 unsigned int key_len) in cbc_paes_set_key() argument 318 rc = _key_to_kb(&ctx->kb, in_key, key_len); in cbc_paes_set_key() 456 unsigned int ckey_len, key_len; in xts_paes_set_key() local 461 key_len = xts_key_len / 2; in xts_paes_set_key() 465 rc = _key_to_kb(&ctx->kb[0], in_key, key_len); in xts_paes_set_key() 468 rc = _key_to_kb(&ctx->kb[1], in_key + key_len, key_len); in xts_paes_set_key() 610 unsigned int key_len) in ctr_paes_set_key() argument 616 rc = _key_to_kb(&ctx->kb, in_key, key_len); in ctr_paes_set_key()
|
/arch/arm64/crypto/ |
D | aes-ce-glue.c | 75 unsigned int key_len) in ce_aes_expandkey() argument 84 u32 kwords = key_len / sizeof(u32); in ce_aes_expandkey() 88 if (key_len != AES_KEYSIZE_128 && in ce_aes_expandkey() 89 key_len != AES_KEYSIZE_192 && in ce_aes_expandkey() 90 key_len != AES_KEYSIZE_256) in ce_aes_expandkey() 93 ctx->key_length = key_len; in ce_aes_expandkey() 107 if (key_len == AES_KEYSIZE_192) { in ce_aes_expandkey() 112 } else if (key_len == AES_KEYSIZE_256) { in ce_aes_expandkey() 143 unsigned int key_len) in ce_aes_setkey() argument 147 return ce_aes_expandkey(ctx, in_key, key_len); in ce_aes_setkey()
|
D | aes-ce-setkey.h | 4 unsigned int key_len); 6 unsigned int key_len);
|
D | aes-neonbs-glue.c | 73 unsigned int key_len) in aesbs_setkey() argument 79 err = aes_expandkey(&rk, in_key, key_len); in aesbs_setkey() 83 ctx->rounds = 6 + key_len / 4; in aesbs_setkey() 132 unsigned int key_len) in aesbs_cbc_setkey() argument 138 err = aes_expandkey(&rk, in_key, key_len); in aesbs_cbc_setkey() 142 ctx->key.rounds = 6 + key_len / 4; in aesbs_cbc_setkey() 247 unsigned int key_len) in aesbs_xts_setkey() argument 253 err = xts_verify_key(tfm, in_key, key_len); in aesbs_xts_setkey() 257 key_len /= 2; in aesbs_xts_setkey() 258 err = aes_expandkey(&ctx->cts, in_key, key_len); in aesbs_xts_setkey() [all …]
|
D | sm4-ce-glue.c | 21 unsigned int key_len) in sm4_ce_setkey() argument 25 return sm4_expandkey(ctx, key, key_len); in sm4_ce_setkey()
|
D | aes-glue.c | 138 unsigned int key_len) in skcipher_aes_setkey() argument 142 return aes_expandkey(ctx, in_key, key_len); in skcipher_aes_setkey() 146 const u8 *in_key, unsigned int key_len) in xts_set_key() argument 151 ret = xts_verify_key(tfm, in_key, key_len); in xts_set_key() 155 ret = aes_expandkey(&ctx->key1, in_key, key_len / 2); in xts_set_key() 157 ret = aes_expandkey(&ctx->key2, &in_key[key_len / 2], in xts_set_key() 158 key_len / 2); in xts_set_key() 164 unsigned int key_len) in essiv_cbc_set_key() argument 170 ret = aes_expandkey(&ctx->key1, in_key, key_len); in essiv_cbc_set_key() 174 crypto_shash_tfm_digest(ctx->hash, in_key, key_len, digest); in essiv_cbc_set_key() [all …]
|
D | aes-ce-ccm-glue.c | 47 unsigned int key_len) in ccm_setkey() argument 51 return ce_aes_expandkey(ctx, in_key, key_len); in ccm_setkey()
|
/arch/powerpc/include/asm/ |
D | secvar.h | 17 int (*get)(const char *key, uint64_t key_len, u8 *data, 19 int (*get_next)(const char *key, uint64_t *key_len, 21 int (*set)(const char *key, uint64_t key_len, u8 *data,
|
D | opal.h | 298 int opal_secvar_get(const char *key, uint64_t key_len, u8 *data, 300 int opal_secvar_get_next(const char *key, uint64_t *key_len, 302 int opal_secvar_enqueue_update(const char *key, uint64_t key_len, u8 *data,
|
/arch/arm/crypto/ |
D | aes-neonbs-glue.c | 69 unsigned int key_len) in aesbs_setkey() argument 75 err = aes_expandkey(&rk, in_key, key_len); in aesbs_setkey() 79 ctx->rounds = 6 + key_len / 4; in aesbs_setkey() 128 unsigned int key_len) in aesbs_cbc_setkey() argument 134 err = aes_expandkey(&rk, in_key, key_len); in aesbs_cbc_setkey() 138 ctx->key.rounds = 6 + key_len / 4; in aesbs_cbc_setkey() 145 return crypto_skcipher_setkey(ctx->enc_tfm, in_key, key_len); in aesbs_cbc_setkey() 217 unsigned int key_len) in aesbs_ctr_setkey_sync() argument 222 err = aes_expandkey(&ctx->fallback, in_key, key_len); in aesbs_ctr_setkey_sync() 226 ctx->key.rounds = 6 + key_len / 4; in aesbs_ctr_setkey_sync() [all …]
|
D | aes-ce-glue.c | 70 unsigned int key_len) in ce_aes_expandkey() argument 79 u32 kwords = key_len / sizeof(u32); in ce_aes_expandkey() 83 if (key_len != AES_KEYSIZE_128 && in ce_aes_expandkey() 84 key_len != AES_KEYSIZE_192 && in ce_aes_expandkey() 85 key_len != AES_KEYSIZE_256) in ce_aes_expandkey() 88 ctx->key_length = key_len; in ce_aes_expandkey() 103 if (key_len == AES_KEYSIZE_192) { in ce_aes_expandkey() 108 } else if (key_len == AES_KEYSIZE_256) { in ce_aes_expandkey() 138 unsigned int key_len) in ce_aes_setkey() argument 142 return ce_aes_expandkey(ctx, in_key, key_len); in ce_aes_setkey() [all …]
|
/arch/powerpc/crypto/ |
D | aes-spe-glue.c | 76 unsigned int key_len); 93 unsigned int key_len) in ppc_aes_setkey() argument 97 switch (key_len) { in ppc_aes_setkey() 114 ppc_generate_decrypt_key(ctx->key_dec, ctx->key_enc, key_len); in ppc_aes_setkey() 120 const u8 *in_key, unsigned int key_len) in ppc_aes_setkey_skcipher() argument 122 return ppc_aes_setkey(crypto_skcipher_tfm(tfm), in_key, key_len); in ppc_aes_setkey_skcipher() 126 unsigned int key_len) in ppc_xts_setkey() argument 131 err = xts_verify_key(tfm, in_key, key_len); in ppc_xts_setkey() 135 key_len >>= 1; in ppc_xts_setkey() 137 switch (key_len) { in ppc_xts_setkey() [all …]
|