Lines Matching defs:keylen

905 static inline int chcr_keyctx_ck_size(unsigned int keylen)
909 if (keylen == AES_KEYSIZE_128)
911 else if (keylen == AES_KEYSIZE_192)
913 else if (keylen == AES_KEYSIZE_256)
922 unsigned int keylen)
930 return crypto_skcipher_setkey(ablkctx->sw_cipher, key, keylen);
935 unsigned int keylen)
942 err = chcr_cipher_fallback_setkey(cipher, key, keylen);
946 ck_size = chcr_keyctx_ck_size(keylen);
948 memcpy(ablkctx->key, key, keylen);
949 ablkctx->enckey_len = keylen;
950 get_aes_decrypt_key(ablkctx->rrkey, ablkctx->key, keylen << 3);
952 keylen + alignment) >> 4;
966 unsigned int keylen)
973 err = chcr_cipher_fallback_setkey(cipher, key, keylen);
976 ck_size = chcr_keyctx_ck_size(keylen);
978 memcpy(ablkctx->key, key, keylen);
979 ablkctx->enckey_len = keylen;
981 keylen + alignment) >> 4;
996 unsigned int keylen)
1003 if (keylen < CTR_RFC3686_NONCE_SIZE)
1005 memcpy(ablkctx->nonce, key + (keylen - CTR_RFC3686_NONCE_SIZE),
1008 keylen -= CTR_RFC3686_NONCE_SIZE;
1009 err = chcr_cipher_fallback_setkey(cipher, key, keylen);
1013 ck_size = chcr_keyctx_ck_size(keylen);
1015 memcpy(ablkctx->key, key, keylen);
1016 ablkctx->enckey_len = keylen;
1018 keylen + alignment) >> 4;
1070 unsigned int keylen;
1076 keylen = ablkctx->enckey_len / 2;
1077 key = ablkctx->key + keylen;
1083 ret = aes_expandkey(&aes, key, keylen - 8);
1085 ret = aes_expandkey(&aes, key, keylen);
2201 unsigned int keylen)
2215 if (keylen > bs) {
2216 err = crypto_shash_digest(shash, key, keylen,
2220 keylen = digestsize;
2222 memcpy(hmacctx->ipad, key, keylen);
2224 memset(hmacctx->ipad + keylen, 0, bs - keylen);
3427 unsigned int keylen)
3433 key_ctx_size = sizeof(struct _key_ctx) + roundup(keylen, 16) * 2;
3434 if (keylen == AES_KEYSIZE_128) {
3437 } else if (keylen == AES_KEYSIZE_192) {
3440 } else if (keylen == AES_KEYSIZE_256) {
3449 memcpy(aeadctx->key, key, keylen);
3450 aeadctx->enckey_len = keylen;
3457 unsigned int keylen)
3465 error = crypto_aead_setkey(aeadctx->sw_cipher, key, keylen);
3468 return chcr_ccm_common_setkey(aead, key, keylen);
3472 unsigned int keylen)
3477 if (keylen < 3) {
3484 error = crypto_aead_setkey(aeadctx->sw_cipher, key, keylen);
3487 keylen -= 3;
3488 memcpy(aeadctx->salt, key + keylen, 3);
3489 return chcr_ccm_common_setkey(aead, key, keylen);
3493 unsigned int keylen)
3505 ret = crypto_aead_setkey(aeadctx->sw_cipher, key, keylen);
3510 keylen > 3) {
3511 keylen -= 4; /* nonce/salt is present in the last 4 bytes */
3512 memcpy(aeadctx->salt, key + keylen, 4);
3514 if (keylen == AES_KEYSIZE_128) {
3516 } else if (keylen == AES_KEYSIZE_192) {
3518 } else if (keylen == AES_KEYSIZE_256) {
3521 pr_err("GCM: Invalid key length %d\n", keylen);
3526 memcpy(aeadctx->key, key, keylen);
3527 aeadctx->enckey_len = keylen;
3528 key_ctx_size = sizeof(struct _key_ctx) + roundup(keylen, 16) +
3537 ret = aes_expandkey(&aes, key, keylen);
3551 unsigned int keylen)
3570 err = crypto_aead_setkey(aeadctx->sw_cipher, key, keylen);
3574 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0)
3679 const u8 *key, unsigned int keylen)
3693 err = crypto_aead_setkey(aeadctx->sw_cipher, key, keylen);
3697 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0)