Lines Matching defs:keylen
47 int keylen;
302 unsigned int keylen)
309 dev_dbg(dev, "Setting HW key in context @%p for %s. keylen=%u\n",
310 ctx_p, crypto_tfm_alg_name(tfm), keylen);
311 dump_byte_array("key", key, keylen);
316 if (keylen != sizeof(hki)) {
317 dev_err(dev, "Unsupported protected key size %d.\n", keylen);
321 memcpy(&hki, key, keylen);
326 keylen = hki.keylen;
328 if (validate_keys_sizes(ctx_p, keylen)) {
329 dev_dbg(dev, "Unsupported key size %d.\n", keylen);
333 ctx_p->keylen = keylen;
402 unsigned int keylen)
412 dev_dbg(dev, "Setting key in context @%p for %s. keylen=%u\n",
413 ctx_p, crypto_tfm_alg_name(tfm), keylen);
414 dump_byte_array("key", key, keylen);
418 if (validate_keys_sizes(ctx_p, keylen)) {
419 dev_dbg(dev, "Invalid key size %d.\n", keylen);
426 if (keylen != AES_KEYSIZE_256) {
434 return crypto_skcipher_setkey(ctx_p->fallback_tfm, key, keylen);
437 dev_dbg(dev, "Unsupported key size %d and no fallback.\n", keylen);
454 if ((keylen == DES3_EDE_KEY_SIZE &&
463 xts_verify_key(sktfm, key, keylen)) {
472 memcpy(ctx_p->user.key, key, keylen);
479 ctx_p->user.key, keylen,
480 ctx_p->user.key + keylen);
486 keylen <<= 1;
490 ctx_p->keylen = keylen;
622 unsigned int key_len = (ctx_p->keylen / 2);
699 unsigned int key_len = ctx_p->keylen;