Lines Matching defs:keylen

1061 				  unsigned int keylen, u8 *ipad, u8 *opad)
1068 if (keylen <= blocksize) {
1069 memcpy(ipad, key, keylen);
1071 keydup = kmemdup(key, keylen, GFP_KERNEL);
1077 sg_init_one(&sg, keydup, keylen);
1078 ahash_request_set_crypt(areq, &sg, ipad, keylen);
1093 keylen = crypto_ahash_digestsize(crypto_ahash_reqtfm(areq));
1096 memset(ipad + keylen, 0, blocksize - keylen);
1141 unsigned int keylen,
1171 ret = safexcel_hmac_init_pad(areq, blocksize, key, keylen, ipad, opad);
1192 unsigned int keylen, const char *alg,
1199 ret = __safexcel_hmac_setkey(alg, key, keylen, &istate, &ostate);
1215 unsigned int keylen, const char *alg,
1220 return safexcel_hmac_setkey(&ctx->base, key, keylen, alg, state_sz);
1224 unsigned int keylen)
1226 return safexcel_hmac_alg_setkey(tfm, key, keylen, "safexcel-sha1",
1377 unsigned int keylen)
1379 return safexcel_hmac_alg_setkey(tfm, key, keylen, "safexcel-sha224",
1449 unsigned int keylen)
1451 return safexcel_hmac_alg_setkey(tfm, key, keylen, "safexcel-sha256",
1635 unsigned int keylen)
1637 return safexcel_hmac_alg_setkey(tfm, key, keylen, "safexcel-sha512",
1707 unsigned int keylen)
1709 return safexcel_hmac_alg_setkey(tfm, key, keylen, "safexcel-sha384",
1860 unsigned int keylen)
1862 return safexcel_hmac_alg_setkey(tfm, key, keylen, "safexcel-md5",
1941 unsigned int keylen)
1945 if (keylen != sizeof(u32))
2329 unsigned int keylen)
2331 return safexcel_hmac_alg_setkey(tfm, key, keylen, "safexcel-sm3",
2802 unsigned int keylen)
2807 if (keylen > crypto_ahash_blocksize(tfm)) {
2812 ret = crypto_shash_digest(ctx->shdesc, key, keylen,
2814 keylen = crypto_shash_digestsize(ctx->shpre);
2820 if (keylen > crypto_ahash_blocksize(tfm) / 2)
2825 keylen - crypto_ahash_blocksize(tfm) / 2);
2832 if (keylen <= crypto_ahash_blocksize(tfm) / 2) {
2833 memcpy(&ctx->base.ipad, key, keylen);
2839 keylen - crypto_ahash_blocksize(tfm) / 2);
2844 if (keylen <= crypto_ahash_blocksize(tfm) / 2) {
2845 memset(ctx->base.ipad.byte + keylen, 0,
2846 crypto_ahash_blocksize(tfm) / 2 - keylen);
2849 memset(ctx->base.opad.byte + keylen -
2851 crypto_ahash_blocksize(tfm) - keylen);