Lines Matching defs:keys

2267 	/* Both keys for xts must be aligned to 16 byte boundary
2268 * by padding with zeros. So for 24 byte keys padding 8 zeroes.
3556 struct crypto_authenc_keys keys;
3574 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0)
3584 if (keys.enckeylen < CTR_RFC3686_NONCE_SIZE)
3586 memcpy(aeadctx->nonce, keys.enckey + (keys.enckeylen
3588 keys.enckeylen -= CTR_RFC3686_NONCE_SIZE;
3590 if (keys.enckeylen == AES_KEYSIZE_128) {
3592 } else if (keys.enckeylen == AES_KEYSIZE_192) {
3594 } else if (keys.enckeylen == AES_KEYSIZE_256) {
3605 memcpy(aeadctx->key, keys.enckey, keys.enckeylen);
3606 aeadctx->enckey_len = keys.enckeylen;
3626 if (keys.authkeylen > bs) {
3627 err = crypto_shash_digest(shash, keys.authkey,
3628 keys.authkeylen,
3634 keys.authkeylen = max_authsize;
3636 memcpy(o_ptr, keys.authkey, keys.authkeylen);
3639 memset(pad + keys.authkeylen, 0, bs - keys.authkeylen);
3640 memcpy(pad, o_ptr, keys.authkeylen);
3648 memset(pad + keys.authkeylen, 0, bs - keys.authkeylen);
3649 memcpy(pad, o_ptr, keys.authkeylen);
3660 roundup(keys.enckeylen, 16) +
3667 memzero_explicit(&keys, sizeof(keys));
3672 memzero_explicit(&keys, sizeof(keys));
3683 struct crypto_authenc_keys keys;
3697 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0)
3703 if (keys.enckeylen < CTR_RFC3686_NONCE_SIZE)
3705 memcpy(aeadctx->nonce, keys.enckey + (keys.enckeylen
3707 keys.enckeylen -= CTR_RFC3686_NONCE_SIZE;
3709 if (keys.enckeylen == AES_KEYSIZE_128) {
3711 } else if (keys.enckeylen == AES_KEYSIZE_192) {
3713 } else if (keys.enckeylen == AES_KEYSIZE_256) {
3716 pr_err("Unsupported cipher key %d\n", keys.enckeylen);
3719 memcpy(aeadctx->key, keys.enckey, keys.enckeylen);
3720 aeadctx->enckey_len = keys.enckeylen;
3726 key_ctx_len = sizeof(struct _key_ctx) + roundup(keys.enckeylen, 16);
3731 memzero_explicit(&keys, sizeof(keys));
3735 memzero_explicit(&keys, sizeof(keys));