Lines Matching defs:keylen

190 	if (!ctx->cdata.keylen || !ctx->authsize)
208 ctx->cdata.keylen - CTR_RFC3686_NONCE_SIZE);
224 data_len[1] = ctx->cdata.keylen;
290 unsigned int keylen)
296 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0)
299 dev_dbg(dev, "keylen %d enckeylen %d authkeylen %d\n",
303 DUMP_PREFIX_ADDRESS, 16, 4, key, keylen, 1);
305 ctx->adata.keylen = keys.authkeylen;
320 ctx->cdata.keylen = keys.enckeylen;
330 unsigned int keylen)
335 err = crypto_authenc_extractkeys(&keys, key, keylen);
344 aead_setkey(aead, key, keylen);
598 if (!ctx->cdata.keylen || !ctx->authsize)
635 unsigned int keylen)
641 if (keylen != CHACHA_KEY_SIZE + saltlen)
644 memcpy(ctx->key, key, keylen);
646 ctx->cdata.keylen = keylen - saltlen;
659 ctx->cdata.keylen;
661 if (!ctx->cdata.keylen || !ctx->authsize)
724 const u8 *key, unsigned int keylen)
730 ret = aes_check_keylen(keylen);
734 DUMP_PREFIX_ADDRESS, 16, 4, key, keylen, 1);
736 memcpy(ctx->key, key, keylen);
737 dma_sync_single_for_device(dev, ctx->key_dma, keylen, ctx->dir);
738 ctx->cdata.keylen = keylen;
751 ctx->cdata.keylen;
753 if (!ctx->cdata.keylen || !ctx->authsize)
819 const u8 *key, unsigned int keylen)
825 ret = aes_check_keylen(keylen - 4);
830 DUMP_PREFIX_ADDRESS, 16, 4, key, keylen, 1);
832 memcpy(ctx->key, key, keylen);
837 ctx->cdata.keylen = keylen - 4;
838 dma_sync_single_for_device(dev, ctx->key_dma, ctx->cdata.keylen,
852 ctx->cdata.keylen;
854 if (!ctx->cdata.keylen || !ctx->authsize)
918 const u8 *key, unsigned int keylen)
924 ret = aes_check_keylen(keylen - 4);
929 DUMP_PREFIX_ADDRESS, 16, 4, key, keylen, 1);
931 memcpy(ctx->key, key, keylen);
936 ctx->cdata.keylen = keylen - 4;
937 dma_sync_single_for_device(dev, ctx->key_dma, ctx->cdata.keylen,
944 unsigned int keylen, const u32 ctx1_iv_off)
957 DUMP_PREFIX_ADDRESS, 16, 4, key, keylen, 1);
959 ctx->cdata.keylen = keylen;
987 const u8 *key, unsigned int keylen)
991 err = aes_check_keylen(keylen);
995 return skcipher_setkey(skcipher, key, keylen, 0);
999 const u8 *key, unsigned int keylen)
1010 keylen -= CTR_RFC3686_NONCE_SIZE;
1012 err = aes_check_keylen(keylen);
1016 return skcipher_setkey(skcipher, key, keylen, ctx1_iv_off);
1020 const u8 *key, unsigned int keylen)
1032 err = aes_check_keylen(keylen);
1036 return skcipher_setkey(skcipher, key, keylen, ctx1_iv_off);
1040 const u8 *key, unsigned int keylen)
1042 if (keylen != CHACHA_KEY_SIZE)
1045 return skcipher_setkey(skcipher, key, keylen, 0);
1049 const u8 *key, unsigned int keylen)
1052 skcipher_setkey(skcipher, key, keylen, 0);
1056 const u8 *key, unsigned int keylen)
1059 skcipher_setkey(skcipher, key, keylen, 0);
1063 unsigned int keylen)
1072 err = xts_verify_key(skcipher, key, keylen);
1078 if (keylen != 2 * AES_KEYSIZE_128 && keylen != 2 * AES_KEYSIZE_256)
1082 err = crypto_skcipher_setkey(ctx->fallback, key, keylen);
1087 ctx->cdata.keylen = keylen;
3214 static int hash_digest_key(struct caam_hash_ctx *ctx, u32 *keylen, u8 *key,
3237 key_dma = dma_map_single(ctx->dev, key, *keylen, DMA_BIDIRECTIONAL);
3250 append_seq_fifo_load(desc, *keylen, FIFOLD_CLASS_CLASS2 |
3266 dpaa2_fl_set_len(in_fle, *keylen);
3272 DUMP_PREFIX_ADDRESS, 16, 4, key, *keylen, 1);
3299 dma_unmap_single(ctx->dev, key_dma, *keylen, DMA_BIDIRECTIONAL);
3305 *keylen = digestsize;
3311 unsigned int keylen)
3319 dev_dbg(ctx->dev, "keylen %d blocksize %d\n", keylen, blocksize);
3321 if (keylen > blocksize) {
3323 ALIGN(keylen, dma_get_cache_alignment());
3325 if (aligned_len < keylen)
3331 ret = hash_digest_key(ctx, &keylen, hashed_key, digestsize);
3337 ctx->adata.keylen = keylen;
3352 if (keylen > ctx->adata.keylen_pad) {
3353 memcpy(ctx->key, key, keylen);