Lines Matching defs:keylen
47 int keylen;
299 unsigned int keylen)
306 dev_dbg(dev, "Setting HW key in context @%p for %s. keylen=%u\n",
307 ctx_p, crypto_tfm_alg_name(tfm), keylen);
308 dump_byte_array("key", key, keylen);
313 if (keylen != sizeof(hki)) {
314 dev_err(dev, "Unsupported protected key size %d.\n", keylen);
318 memcpy(&hki, key, keylen);
323 keylen = hki.keylen;
325 if (validate_keys_sizes(ctx_p, keylen)) {
326 dev_dbg(dev, "Unsupported key size %d.\n", keylen);
330 ctx_p->keylen = keylen;
399 unsigned int keylen)
409 dev_dbg(dev, "Setting key in context @%p for %s. keylen=%u\n",
410 ctx_p, crypto_tfm_alg_name(tfm), keylen);
411 dump_byte_array("key", key, keylen);
415 if (validate_keys_sizes(ctx_p, keylen)) {
416 dev_dbg(dev, "Invalid key size %d.\n", keylen);
423 if (keylen != AES_KEYSIZE_256) {
431 return crypto_skcipher_setkey(ctx_p->fallback_tfm, key, keylen);
434 dev_dbg(dev, "Unsupported key size %d and no fallback.\n", keylen);
451 if ((keylen == DES3_EDE_KEY_SIZE &&
460 xts_check_key(tfm, key, keylen)) {
469 memcpy(ctx_p->user.key, key, keylen);
476 ctx_p->user.key, keylen,
477 ctx_p->user.key + keylen);
483 keylen <<= 1;
487 ctx_p->keylen = keylen;
619 unsigned int key_len = (ctx_p->keylen / 2);
696 unsigned int key_len = ctx_p->keylen;