Lines Matching defs:key
79 u8 *key;
93 /* use for hmac with key large then mode block size */
382 /* Loading hash opad xor key state */
464 /* If HMAC then load hash IPAD xor key, if HASH then load initial
726 static int cc_hash_setkey(struct crypto_ahash *ahash, const u8 *key,
754 ctx->key_params.key = NULL;
757 ctx->key_params.key = kmemdup(key, keylen, GFP_KERNEL);
758 if (!ctx->key_params.key)
762 dma_map_single(dev, ctx->key_params.key, keylen,
765 dev_err(dev, "Mapping key va=0x%p len=%u for DMA failed\n",
766 ctx->key_params.key, keylen);
767 kfree_sensitive(ctx->key_params.key);
770 dev_dbg(dev, "mapping key-buffer: key_dma_addr=%pad keylen=%u\n",
799 /* Get hashed key */
855 /* calc derived HMAC key */
873 /* Prepare ipad key */
890 /* Get the IPAD/OPAD xor key (Note, IPAD is the initial digest
912 dev_dbg(dev, "Unmapped key-buffer: key_dma_addr=%pad keylen=%u\n",
916 kfree_sensitive(ctx->key_params.key);
922 const u8 *key, unsigned int keylen)
944 ctx->key_params.key = kmemdup(key, keylen, GFP_KERNEL);
945 if (!ctx->key_params.key)
949 dma_map_single(dev, ctx->key_params.key, keylen, DMA_TO_DEVICE);
951 dev_err(dev, "Mapping key va=0x%p len=%u for DMA failed\n",
952 key, keylen);
953 kfree_sensitive(ctx->key_params.key);
956 dev_dbg(dev, "mapping key-buffer: key_dma_addr=%pad keylen=%u\n",
960 /* 1. Load the AES key */
999 dev_dbg(dev, "Unmapped key-buffer: key_dma_addr=%pad keylen=%u\n",
1002 kfree_sensitive(ctx->key_params.key);
1008 const u8 *key, unsigned int keylen)
1028 /* STAT_PHASE_1: Copy key to ctx */
1033 memcpy(ctx->opad_tmp_keys_buff, key, keylen);
1268 /* Load key for ECB decryption */