Lines Matching defs:keylen
185 if (!ctx->cdata.keylen || !ctx->authsize)
203 ctx->cdata.keylen - CTR_RFC3686_NONCE_SIZE);
219 data_len[1] = ctx->cdata.keylen;
285 unsigned int keylen)
291 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0)
294 dev_dbg(dev, "keylen %d enckeylen %d authkeylen %d\n",
298 DUMP_PREFIX_ADDRESS, 16, 4, key, keylen, 1);
300 ctx->adata.keylen = keys.authkeylen;
315 ctx->cdata.keylen = keys.enckeylen;
325 unsigned int keylen)
330 err = crypto_authenc_extractkeys(&keys, key, keylen);
339 aead_setkey(aead, key, keylen);
593 if (!ctx->cdata.keylen || !ctx->authsize)
630 unsigned int keylen)
636 if (keylen != CHACHA_KEY_SIZE + saltlen)
639 memcpy(ctx->key, key, keylen);
641 ctx->cdata.keylen = keylen - saltlen;
654 ctx->cdata.keylen;
656 if (!ctx->cdata.keylen || !ctx->authsize)
719 const u8 *key, unsigned int keylen)
725 ret = aes_check_keylen(keylen);
729 DUMP_PREFIX_ADDRESS, 16, 4, key, keylen, 1);
731 memcpy(ctx->key, key, keylen);
732 dma_sync_single_for_device(dev, ctx->key_dma, keylen, ctx->dir);
733 ctx->cdata.keylen = keylen;
746 ctx->cdata.keylen;
748 if (!ctx->cdata.keylen || !ctx->authsize)
814 const u8 *key, unsigned int keylen)
820 ret = aes_check_keylen(keylen - 4);
825 DUMP_PREFIX_ADDRESS, 16, 4, key, keylen, 1);
827 memcpy(ctx->key, key, keylen);
832 ctx->cdata.keylen = keylen - 4;
833 dma_sync_single_for_device(dev, ctx->key_dma, ctx->cdata.keylen,
847 ctx->cdata.keylen;
849 if (!ctx->cdata.keylen || !ctx->authsize)
913 const u8 *key, unsigned int keylen)
919 ret = aes_check_keylen(keylen - 4);
924 DUMP_PREFIX_ADDRESS, 16, 4, key, keylen, 1);
926 memcpy(ctx->key, key, keylen);
931 ctx->cdata.keylen = keylen - 4;
932 dma_sync_single_for_device(dev, ctx->key_dma, ctx->cdata.keylen,
939 unsigned int keylen, const u32 ctx1_iv_off)
952 DUMP_PREFIX_ADDRESS, 16, 4, key, keylen, 1);
954 ctx->cdata.keylen = keylen;
982 const u8 *key, unsigned int keylen)
986 err = aes_check_keylen(keylen);
990 return skcipher_setkey(skcipher, key, keylen, 0);
994 const u8 *key, unsigned int keylen)
1005 keylen -= CTR_RFC3686_NONCE_SIZE;
1007 err = aes_check_keylen(keylen);
1011 return skcipher_setkey(skcipher, key, keylen, ctx1_iv_off);
1015 const u8 *key, unsigned int keylen)
1027 err = aes_check_keylen(keylen);
1031 return skcipher_setkey(skcipher, key, keylen, ctx1_iv_off);
1035 const u8 *key, unsigned int keylen)
1037 if (keylen != CHACHA_KEY_SIZE)
1040 return skcipher_setkey(skcipher, key, keylen, 0);
1044 const u8 *key, unsigned int keylen)
1047 skcipher_setkey(skcipher, key, keylen, 0);
1051 const u8 *key, unsigned int keylen)
1054 skcipher_setkey(skcipher, key, keylen, 0);
1058 unsigned int keylen)
1067 err = xts_verify_key(skcipher, key, keylen);
1073 if (keylen != 2 * AES_KEYSIZE_128 && keylen != 2 * AES_KEYSIZE_256)
1077 err = crypto_skcipher_setkey(ctx->fallback, key, keylen);
1082 ctx->cdata.keylen = keylen;
3207 static int hash_digest_key(struct caam_hash_ctx *ctx, u32 *keylen, u8 *key,
3230 key_dma = dma_map_single(ctx->dev, key, *keylen, DMA_BIDIRECTIONAL);
3243 append_seq_fifo_load(desc, *keylen, FIFOLD_CLASS_CLASS2 |
3259 dpaa2_fl_set_len(in_fle, *keylen);
3265 DUMP_PREFIX_ADDRESS, 16, 4, key, *keylen, 1);
3292 dma_unmap_single(ctx->dev, key_dma, *keylen, DMA_BIDIRECTIONAL);
3298 *keylen = digestsize;
3304 unsigned int keylen)
3312 dev_dbg(ctx->dev, "keylen %d blocksize %d\n", keylen, blocksize);
3314 if (keylen > blocksize) {
3315 hashed_key = kmemdup(key, keylen, GFP_KERNEL | GFP_DMA);
3318 ret = hash_digest_key(ctx, &keylen, hashed_key, digestsize);
3324 ctx->adata.keylen = keylen;
3339 if (keylen > ctx->adata.keylen_pad) {
3340 memcpy(ctx->key, key, keylen);