/drivers/staging/wlan-ng/ |
D | p80211wep.c | 67 int wep_change_key(struct wlandevice *wlandev, int keynum, u8 *key, int keylen) in wep_change_key() argument 69 if (keylen < 0) in wep_change_key() 71 if (keylen >= MAX_KEYLEN) in wep_change_key() 80 wlandev->wep_keylens[keynum] = keylen; in wep_change_key() 81 memcpy(wlandev->wep_keys[keynum], key, keylen); in wep_change_key() 93 u32 i, j, k, crc, keylen; in wep_decrypt() local 113 keylen = wlandev->wep_keylens[keyidx]; in wep_decrypt() 115 if (keylen == 0) in wep_decrypt() 119 memcpy(key + 3, wlandev->wep_keys[keyidx], keylen); in wep_decrypt() 121 keylen += 3; /* add in IV bytes */ in wep_decrypt() [all …]
|
/drivers/crypto/amcc/ |
D | crypto4xx_alg.c | 123 unsigned int keylen, in crypto4xx_setkey_aes() argument 131 if (keylen != AES_KEYSIZE_256 && keylen != AES_KEYSIZE_192 && in crypto4xx_setkey_aes() 132 keylen != AES_KEYSIZE_128) in crypto4xx_setkey_aes() 139 rc = crypto4xx_alloc_sa(ctx, SA_AES128_LEN + (keylen-16) / 4); in crypto4xx_setkey_aes() 161 key, keylen); in crypto4xx_setkey_aes() 162 sa->sa_contents.w = SA_AES_CONTENTS | (keylen << 2); in crypto4xx_setkey_aes() 163 sa->sa_command_1.bf.key_len = keylen >> 3; in crypto4xx_setkey_aes() 178 const u8 *key, unsigned int keylen) in crypto4xx_setkey_aes_cbc() argument 180 return crypto4xx_setkey_aes(cipher, key, keylen, CRYPTO_MODE_CBC, in crypto4xx_setkey_aes_cbc() 185 const u8 *key, unsigned int keylen) in crypto4xx_setkey_aes_cfb() argument [all …]
|
D | crypto4xx_core.h | 164 const u8 *key, unsigned int keylen); 166 const u8 *key, unsigned int keylen); 168 const u8 *key, unsigned int keylen); 170 const u8 *key, unsigned int keylen); 172 const u8 *key, unsigned int keylen); 174 const u8 *key, unsigned int keylen); 237 const u8 *key, unsigned int keylen); 241 const u8 *key, unsigned int keylen);
|
/drivers/crypto/cavium/cpt/ |
D | cptvf_algs.c | 233 u32 keylen) in cvm_xts_setkey() argument 239 const u8 *key2 = key + (keylen / 2); in cvm_xts_setkey() 241 err = xts_check_key(tfm, key, keylen); in cvm_xts_setkey() 244 ctx->key_len = keylen; in cvm_xts_setkey() 245 memcpy(ctx->enc_key, key1, keylen / 2); in cvm_xts_setkey() 246 memcpy(ctx->enc_key + KEY2_OFFSET, key2, keylen / 2); in cvm_xts_setkey() 262 static int cvm_validate_keylen(struct cvm_enc_ctx *ctx, u32 keylen) in cvm_validate_keylen() argument 264 if ((keylen == 16) || (keylen == 24) || (keylen == 32)) { in cvm_validate_keylen() 265 ctx->key_len = keylen; in cvm_validate_keylen() 290 u32 keylen, u8 cipher_type) in cvm_setkey() argument [all …]
|
/drivers/staging/wfx/ |
D | key.c | 36 WARN(key->keylen > sizeof(msg->key_data), "inconsistent data"); in fill_wep_pair() 37 msg->key_length = key->keylen; in fill_wep_pair() 38 memcpy(msg->key_data, key->key, key->keylen); in fill_wep_pair() 46 WARN(key->keylen > sizeof(msg->key_data), "inconsistent data"); in fill_wep_group() 48 msg->key_length = key->keylen; in fill_wep_group() 49 memcpy(msg->key_data, key->key, key->keylen); in fill_wep_group() 58 WARN(key->keylen != sizeof(msg->tkip_key_data) in fill_tkip_pair() 77 WARN(key->keylen != sizeof(msg->tkip_key_data) in fill_tkip_group() 98 WARN(key->keylen != sizeof(msg->aes_key_data), "inconsistent data"); in fill_ccmp_pair() 100 memcpy(msg->aes_key_data, key->key, key->keylen); in fill_ccmp_pair() [all …]
|
/drivers/crypto/cavium/nitrox/ |
D | nitrox_skcipher.c | 167 unsigned int keylen) in nitrox_skcipher_setkey() argument 192 memcpy(fctx->crypto.u.key, key, keylen); in nitrox_skcipher_setkey() 198 unsigned int keylen) in nitrox_aes_setkey() argument 202 aes_keylen = flexi_aes_keylen(keylen); in nitrox_aes_setkey() 205 return nitrox_skcipher_setkey(cipher, aes_keylen, key, keylen); in nitrox_aes_setkey() 321 const u8 *key, unsigned int keylen) in nitrox_3des_setkey() argument 324 nitrox_skcipher_setkey(cipher, 0, key, keylen); in nitrox_3des_setkey() 338 const u8 *key, unsigned int keylen) in nitrox_aes_xts_setkey() argument 345 ret = xts_check_key(tfm, key, keylen); in nitrox_aes_xts_setkey() 349 keylen /= 2; in nitrox_aes_xts_setkey() [all …]
|
/drivers/crypto/caam/ |
D | key_gen.c | 45 struct alginfo * const adata, const u8 *key_in, u32 keylen, in gen_split_key() argument 54 adata->keylen = split_key_len(adata->algtype & OP_ALG_ALGSEL_MASK); in gen_split_key() 57 local_max = max(keylen, adata->keylen_pad); in gen_split_key() 60 adata->keylen, adata->keylen_pad); in gen_split_key() 62 DUMP_PREFIX_ADDRESS, 16, 4, key_in, keylen, 1); in gen_split_key() 73 memcpy(key_out, key_in, keylen); in gen_split_key() 82 append_key(desc, dma_addr, keylen, CLASS_2 | KEY_DEST_CLASS_REG); in gen_split_key() 100 append_fifo_store(desc, dma_addr, adata->keylen, in gen_split_key()
|
D | caamhash_desc.c | 36 if (state != OP_ALG_AS_UPDATE && adata->keylen) { in cnstr_shdsc_ahash() 46 adata->keylen, CLASS_2 | in cnstr_shdsc_ahash() 98 append_key_as_imm(desc, adata->key_virt, adata->keylen, in cnstr_shdsc_sk_hash() 99 adata->keylen, CLASS_1 | KEY_DEST_CLASS_REG); in cnstr_shdsc_sk_hash() 103 append_key(desc, adata->key_dma, adata->keylen, in cnstr_shdsc_sk_hash() 106 append_key_as_imm(desc, adata->key_virt, adata->keylen, in cnstr_shdsc_sk_hash() 107 adata->keylen, CLASS_1 | in cnstr_shdsc_sk_hash() 138 append_fifo_store(desc, adata->key_dma, adata->keylen, in cnstr_shdsc_sk_hash()
|
D | caamalg_desc.c | 69 adata->keylen_pad, adata->keylen, in cnstr_shdsc_aead_null_encap() 73 append_key(desc, adata->key_dma, adata->keylen, in cnstr_shdsc_aead_null_encap() 148 adata->keylen_pad, adata->keylen, in cnstr_shdsc_aead_null_decap() 152 append_key(desc, adata->key_dma, adata->keylen, in cnstr_shdsc_aead_null_decap() 216 unsigned int enckeylen = cdata->keylen; in init_sh_desc_key_aead() 236 adata->keylen_pad, adata->keylen, in init_sh_desc_key_aead() 240 append_key(desc, adata->key_dma, adata->keylen, in init_sh_desc_key_aead() 647 append_key_as_imm(desc, cdata->key_virt, cdata->keylen, in cnstr_shdsc_gcm_encap() 648 cdata->keylen, CLASS_1 | KEY_DEST_CLASS_REG); in cnstr_shdsc_gcm_encap() 650 append_key(desc, cdata->key_dma, cdata->keylen, CLASS_1 | in cnstr_shdsc_gcm_encap() [all …]
|
D | caamalg_qi.c | 95 if (!ctx->cdata.keylen || !ctx->authsize) in aead_set_sh_desc() 113 ctx->cdata.keylen - CTR_RFC3686_NONCE_SIZE); in aead_set_sh_desc() 129 data_len[1] = ctx->cdata.keylen; in aead_set_sh_desc() 196 unsigned int keylen) in aead_setkey() argument 204 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in aead_setkey() 211 DUMP_PREFIX_ADDRESS, 16, 4, key, keylen, 1); in aead_setkey() 218 ctx->adata.keylen = keys.authkeylen; in aead_setkey() 251 ctx->cdata.keylen = keys.enckeylen; in aead_setkey() 284 unsigned int keylen) in des3_aead_setkey() argument 289 err = crypto_authenc_extractkeys(&keys, key, keylen); in des3_aead_setkey() [all …]
|
D | caamalg.c | 202 if (!ctx->cdata.keylen) in aead_set_sh_desc() 220 ctx->cdata.keylen - CTR_RFC3686_NONCE_SIZE); in aead_set_sh_desc() 236 data_len[1] = ctx->cdata.keylen; in aead_set_sh_desc() 330 ctx->cdata.keylen; in gcm_set_sh_desc() 332 if (!ctx->cdata.keylen || !ctx->authsize) in gcm_set_sh_desc() 395 ctx->cdata.keylen; in rfc4106_set_sh_desc() 397 if (!ctx->cdata.keylen || !ctx->authsize) in rfc4106_set_sh_desc() 463 ctx->cdata.keylen; in rfc4543_set_sh_desc() 465 if (!ctx->cdata.keylen || !ctx->authsize) in rfc4543_set_sh_desc() 529 if (!ctx->cdata.keylen || !ctx->authsize) in chachapoly_set_sh_desc() [all …]
|
/drivers/s390/crypto/ |
D | pkey_api.c | 393 static int pkey_nonccatok2pkey(const u8 *key, u32 keylen, in pkey_nonccatok2pkey() argument 404 if (keylen != sizeof(struct protaeskeytoken)) in pkey_nonccatok2pkey() 423 if (keylen < sizeof(struct clearaeskeytoken)) in pkey_nonccatok2pkey() 426 if (keylen != sizeof(*t) + t->len) in pkey_nonccatok2pkey() 464 rc = ep11_check_aes_key(debug_info, 3, key, keylen, 1); in pkey_nonccatok2pkey() 472 rc = ep11_check_aes_key_with_hdr(debug_info, 3, key, keylen, 1); in pkey_nonccatok2pkey() 492 static int pkey_ccainttok2pkey(const u8 *key, u32 keylen, in pkey_ccainttok2pkey() argument 499 if (keylen != sizeof(struct secaeskeytoken)) in pkey_ccainttok2pkey() 503 if (keylen < hdr->len || keylen > MAXCCAVLSCTOKENSIZE) in pkey_ccainttok2pkey() 518 int pkey_keyblob2pkey(const u8 *key, u32 keylen, in pkey_keyblob2pkey() argument [all …]
|
/drivers/crypto/rockchip/ |
D | rk3288_crypto_skcipher.c | 86 const u8 *key, unsigned int keylen) in rk_aes_setkey() argument 91 if (keylen != AES_KEYSIZE_128 && keylen != AES_KEYSIZE_192 && in rk_aes_setkey() 92 keylen != AES_KEYSIZE_256) in rk_aes_setkey() 94 ctx->keylen = keylen; in rk_aes_setkey() 95 memcpy(ctx->key, key, keylen); in rk_aes_setkey() 97 return crypto_skcipher_setkey(ctx->fallback_tfm, key, keylen); in rk_aes_setkey() 101 const u8 *key, unsigned int keylen) in rk_des_setkey() argument 110 ctx->keylen = keylen; in rk_des_setkey() 111 memcpy(ctx->key, key, keylen); in rk_des_setkey() 113 return crypto_skcipher_setkey(ctx->fallback_tfm, key, keylen); in rk_des_setkey() [all …]
|
/drivers/crypto/allwinner/sun8i-ss/ |
D | sun8i-ss-cipher.c | 181 op->keylen); in sun8i_ss_cipher() 189 rctx->keylen = op->keylen; in sun8i_ss_cipher() 191 rctx->p_key = dma_map_single(ss->dev, op->key, op->keylen, DMA_TO_DEVICE); in sun8i_ss_cipher() 305 dma_unmap_single(ss->dev, rctx->p_key, op->keylen, DMA_TO_DEVICE); in sun8i_ss_cipher() 422 unsigned int keylen) in sun8i_ss_aes_setkey() argument 427 switch (keylen) { in sun8i_ss_aes_setkey() 435 dev_dbg(ss->dev, "ERROR: Invalid keylen %u\n", keylen); in sun8i_ss_aes_setkey() 439 op->keylen = keylen; in sun8i_ss_aes_setkey() 440 op->key = kmemdup(key, keylen, GFP_KERNEL | GFP_DMA); in sun8i_ss_aes_setkey() 447 return crypto_skcipher_setkey(op->fallback_tfm, key, keylen); in sun8i_ss_aes_setkey() [all …]
|
/drivers/crypto/qat/qat_common/ |
D | qat_algs.c | 412 const u8 *key, unsigned int keylen) in qat_alg_skcipher_init_com() argument 432 memcpy(cd->ucs_aes.key, key, keylen); in qat_alg_skcipher_init_com() 433 keylen = keylen / 2; in qat_alg_skcipher_init_com() 437 memcpy(cd->ucs_aes.key, key, keylen); in qat_alg_skcipher_init_com() 438 keylen = round_up(keylen, 16); in qat_alg_skcipher_init_com() 440 memcpy(cd->aes.key, key, keylen); in qat_alg_skcipher_init_com() 444 cd_ctrl->cipher_key_sz = keylen >> 3; in qat_alg_skcipher_init_com() 453 unsigned int keylen, int mode) in qat_alg_skcipher_init_enc() argument 459 qat_alg_skcipher_init_com(ctx, req, enc_cd, key, keylen); in qat_alg_skcipher_init_enc() 464 static void qat_alg_xts_reverse_key(const u8 *key_forward, unsigned int keylen, in qat_alg_xts_reverse_key() argument [all …]
|
/drivers/crypto/qce/ |
D | skcipher.c | 171 unsigned int keylen) in qce_skcipher_setkey() argument 179 if (!key || !keylen) in qce_skcipher_setkey() 187 __keylen = keylen >> 1; in qce_skcipher_setkey() 191 __keylen = keylen; in qce_skcipher_setkey() 197 memcpy(ctx->enc_key, key, keylen); in qce_skcipher_setkey() 205 ret = crypto_skcipher_setkey(ctx->fallback, key, keylen); in qce_skcipher_setkey() 207 ctx->enc_keylen = keylen; in qce_skcipher_setkey() 212 unsigned int keylen) in qce_des_setkey() argument 221 ctx->enc_keylen = keylen; in qce_des_setkey() 222 memcpy(ctx->enc_key, key, keylen); in qce_des_setkey() [all …]
|
/drivers/crypto/vmx/ |
D | aes_xts.c | 54 unsigned int keylen) in p8_aes_xts_setkey() argument 59 ret = xts_verify_key(tfm, key, keylen); in p8_aes_xts_setkey() 66 ret = aes_p8_set_encrypt_key(key + keylen/2, (keylen/2) * 8, &ctx->tweak_key); in p8_aes_xts_setkey() 67 ret |= aes_p8_set_encrypt_key(key, (keylen/2) * 8, &ctx->enc_key); in p8_aes_xts_setkey() 68 ret |= aes_p8_set_decrypt_key(key, (keylen/2) * 8, &ctx->dec_key); in p8_aes_xts_setkey() 73 ret |= crypto_skcipher_setkey(ctx->fallback, key, keylen); in p8_aes_xts_setkey()
|
/drivers/crypto/marvell/octeontx/ |
D | otx_cptvf_algs.c | 394 const u8 *key, u32 keylen) in otx_cpt_skcipher_xts_setkey() argument 397 const u8 *key2 = key + (keylen / 2); in otx_cpt_skcipher_xts_setkey() 401 ret = xts_check_key(crypto_skcipher_tfm(tfm), key, keylen); in otx_cpt_skcipher_xts_setkey() 404 ctx->key_len = keylen; in otx_cpt_skcipher_xts_setkey() 405 memcpy(ctx->enc_key, key1, keylen / 2); in otx_cpt_skcipher_xts_setkey() 406 memcpy(ctx->enc_key + KEY2_OFFSET, key2, keylen / 2); in otx_cpt_skcipher_xts_setkey() 423 u32 keylen, u8 cipher_type) in cpt_des_setkey() argument 427 if (keylen != DES3_EDE_KEY_SIZE) in cpt_des_setkey() 430 ctx->key_len = keylen; in cpt_des_setkey() 433 memcpy(ctx->enc_key, key, keylen); in cpt_des_setkey() [all …]
|
/drivers/crypto/ |
D | omap-aes-gcm.c | 312 unsigned int keylen) in omap_aes_gcm_setkey() argument 317 ret = aes_expandkey(&ctx->actx, key, keylen); in omap_aes_gcm_setkey() 321 memcpy(ctx->octx.key, key, keylen); in omap_aes_gcm_setkey() 322 ctx->octx.keylen = keylen; in omap_aes_gcm_setkey() 328 unsigned int keylen) in omap_aes_4106gcm_setkey() argument 333 if (keylen < 4) in omap_aes_4106gcm_setkey() 335 keylen -= 4; in omap_aes_4106gcm_setkey() 337 ret = aes_expandkey(&ctx->actx, key, keylen); in omap_aes_4106gcm_setkey() 341 memcpy(ctx->octx.key, key, keylen); in omap_aes_4106gcm_setkey() 342 memcpy(ctx->octx.nonce, key + keylen, 4); in omap_aes_4106gcm_setkey() [all …]
|
/drivers/crypto/allwinner/sun8i-ce/ |
D | sun8i-ce-cipher.c | 104 op->keylen); in sun8i_ce_cipher_prepare() 128 len = op->keylen; in sun8i_ce_cipher_prepare() 144 rctx->addr_key = dma_map_single(ce->dev, op->key, op->keylen, DMA_TO_DEVICE); in sun8i_ce_cipher_prepare() 270 dma_unmap_single(ce->dev, rctx->addr_key, op->keylen, DMA_TO_DEVICE); in sun8i_ce_cipher_prepare() 334 dma_unmap_single(ce->dev, rctx->addr_key, op->keylen, DMA_TO_DEVICE); in sun8i_ce_cipher_unprepare() 431 unsigned int keylen) in sun8i_ce_aes_setkey() argument 436 switch (keylen) { in sun8i_ce_aes_setkey() 444 dev_dbg(ce->dev, "ERROR: Invalid keylen %u\n", keylen); in sun8i_ce_aes_setkey() 448 op->keylen = keylen; in sun8i_ce_aes_setkey() 449 op->key = kmemdup(key, keylen, GFP_KERNEL | GFP_DMA); in sun8i_ce_aes_setkey() [all …]
|
/drivers/crypto/marvell/octeontx2/ |
D | otx2_cptvf_algs.c | 408 const u8 *key, u32 keylen) in otx2_cpt_skcipher_xts_setkey() argument 411 const u8 *key2 = key + (keylen / 2); in otx2_cpt_skcipher_xts_setkey() 415 ret = xts_check_key(crypto_skcipher_tfm(tfm), key, keylen); in otx2_cpt_skcipher_xts_setkey() 418 ctx->key_len = keylen; in otx2_cpt_skcipher_xts_setkey() 420 memcpy(ctx->enc_key, key1, keylen / 2); in otx2_cpt_skcipher_xts_setkey() 421 memcpy(ctx->enc_key + KEY2_OFFSET, key2, keylen / 2); in otx2_cpt_skcipher_xts_setkey() 436 return crypto_skcipher_setkey(ctx->fbk_cipher, key, keylen); in otx2_cpt_skcipher_xts_setkey() 440 u32 keylen, u8 cipher_type) in cpt_des_setkey() argument 444 if (keylen != DES3_EDE_KEY_SIZE) in cpt_des_setkey() 447 ctx->key_len = keylen; in cpt_des_setkey() [all …]
|
/drivers/crypto/allwinner/sun4i-ss/ |
D | sun4i-ss-cipher.c | 65 for (i = 0; i < op->keylen / 4; i++) in sun4i_ss_opti_poll() 260 for (i = 0; i < op->keylen / 4; i++) in sun4i_ss_cipher_poll() 584 unsigned int keylen) in sun4i_ss_aes_setkey() argument 589 switch (keylen) { in sun4i_ss_aes_setkey() 600 dev_dbg(ss->dev, "ERROR: Invalid keylen %u\n", keylen); in sun4i_ss_aes_setkey() 603 op->keylen = keylen; in sun4i_ss_aes_setkey() 604 memcpy(op->key, key, keylen); in sun4i_ss_aes_setkey() 609 return crypto_skcipher_setkey(op->fallback_tfm, key, keylen); in sun4i_ss_aes_setkey() 614 unsigned int keylen) in sun4i_ss_des_setkey() argument 623 op->keylen = keylen; in sun4i_ss_des_setkey() [all …]
|
/drivers/crypto/hisilicon/sec/ |
D | sec_algs.c | 144 unsigned int keylen, in sec_alg_skcipher_init_context() argument 151 memcpy(ctx->key, key, keylen); in sec_alg_skcipher_init_context() 228 const u8 *key, unsigned int keylen, in sec_alg_skcipher_setkey() argument 248 sec_alg_skcipher_init_context(tfm, key, keylen, alg); in sec_alg_skcipher_setkey() 254 const u8 *key, unsigned int keylen) in sec_alg_skcipher_setkey_aes_ecb() argument 258 switch (keylen) { in sec_alg_skcipher_setkey_aes_ecb() 272 return sec_alg_skcipher_setkey(tfm, key, keylen, alg); in sec_alg_skcipher_setkey_aes_ecb() 276 const u8 *key, unsigned int keylen) in sec_alg_skcipher_setkey_aes_cbc() argument 280 switch (keylen) { in sec_alg_skcipher_setkey_aes_cbc() 294 return sec_alg_skcipher_setkey(tfm, key, keylen, alg); in sec_alg_skcipher_setkey_aes_cbc() [all …]
|
/drivers/crypto/ccree/ |
D | cc_cipher.c | 47 int keylen; member 302 unsigned int keylen) in cc_cipher_sethkey() argument 310 ctx_p, crypto_tfm_alg_name(tfm), keylen); in cc_cipher_sethkey() 311 dump_byte_array("key", key, keylen); in cc_cipher_sethkey() 316 if (keylen != sizeof(hki)) { in cc_cipher_sethkey() 317 dev_err(dev, "Unsupported protected key size %d.\n", keylen); in cc_cipher_sethkey() 321 memcpy(&hki, key, keylen); in cc_cipher_sethkey() 326 keylen = hki.keylen; in cc_cipher_sethkey() 328 if (validate_keys_sizes(ctx_p, keylen)) { in cc_cipher_sethkey() 329 dev_dbg(dev, "Unsupported key size %d.\n", keylen); in cc_cipher_sethkey() [all …]
|
/drivers/net/ethernet/chelsio/inline_crypto/chtls/ |
D | chtls_hw.c | 252 u32 keylen, u32 optname, in chtls_key_info() argument 263 roundup(keylen, 16) + AEAD_H_SIZE; in chtls_key_info() 273 memcpy(key, gcm_ctx_128->key, keylen); in chtls_key_info() 286 memcpy(key, gcm_ctx_256->key, keylen); in chtls_key_info() 296 pr_err("GCM: Invalid key length %d\n", keylen); in chtls_key_info() 303 ret = aes_expandkey(&aes, key, keylen); in chtls_key_info() 310 csk->tlshws.keylen = key_ctx_size; in chtls_key_info() 328 memcpy(kctx->key, key_p, keylen); in chtls_key_info() 329 memcpy(kctx->key + keylen, ghash_h, AEAD_H_SIZE); in chtls_key_info() 331 memset(key_p, 0, keylen); in chtls_key_info() [all …]
|