Lines Matching defs:keylen

898 static inline int chcr_keyctx_ck_size(unsigned int keylen)
902 if (keylen == AES_KEYSIZE_128)
904 else if (keylen == AES_KEYSIZE_192)
906 else if (keylen == AES_KEYSIZE_256)
915 unsigned int keylen)
923 return crypto_skcipher_setkey(ablkctx->sw_cipher, key, keylen);
928 unsigned int keylen)
935 err = chcr_cipher_fallback_setkey(cipher, key, keylen);
939 ck_size = chcr_keyctx_ck_size(keylen);
941 memcpy(ablkctx->key, key, keylen);
942 ablkctx->enckey_len = keylen;
943 get_aes_decrypt_key(ablkctx->rrkey, ablkctx->key, keylen << 3);
945 keylen + alignment) >> 4;
959 unsigned int keylen)
966 err = chcr_cipher_fallback_setkey(cipher, key, keylen);
969 ck_size = chcr_keyctx_ck_size(keylen);
971 memcpy(ablkctx->key, key, keylen);
972 ablkctx->enckey_len = keylen;
974 keylen + alignment) >> 4;
989 unsigned int keylen)
996 if (keylen < CTR_RFC3686_NONCE_SIZE)
998 memcpy(ablkctx->nonce, key + (keylen - CTR_RFC3686_NONCE_SIZE),
1001 keylen -= CTR_RFC3686_NONCE_SIZE;
1002 err = chcr_cipher_fallback_setkey(cipher, key, keylen);
1006 ck_size = chcr_keyctx_ck_size(keylen);
1008 memcpy(ablkctx->key, key, keylen);
1009 ablkctx->enckey_len = keylen;
1011 keylen + alignment) >> 4;
1063 unsigned int keylen;
1069 keylen = ablkctx->enckey_len / 2;
1070 key = ablkctx->key + keylen;
1076 ret = aes_expandkey(&aes, key, keylen - 8);
1078 ret = aes_expandkey(&aes, key, keylen);
2195 unsigned int keylen)
2209 if (keylen > bs) {
2210 err = crypto_shash_digest(shash, key, keylen,
2214 keylen = digestsize;
2216 memcpy(hmacctx->ipad, key, keylen);
2218 memset(hmacctx->ipad + keylen, 0, bs - keylen);
3423 unsigned int keylen)
3429 key_ctx_size = sizeof(struct _key_ctx) + roundup(keylen, 16) * 2;
3430 if (keylen == AES_KEYSIZE_128) {
3433 } else if (keylen == AES_KEYSIZE_192) {
3436 } else if (keylen == AES_KEYSIZE_256) {
3445 memcpy(aeadctx->key, key, keylen);
3446 aeadctx->enckey_len = keylen;
3453 unsigned int keylen)
3461 error = crypto_aead_setkey(aeadctx->sw_cipher, key, keylen);
3464 return chcr_ccm_common_setkey(aead, key, keylen);
3468 unsigned int keylen)
3473 if (keylen < 3) {
3480 error = crypto_aead_setkey(aeadctx->sw_cipher, key, keylen);
3483 keylen -= 3;
3484 memcpy(aeadctx->salt, key + keylen, 3);
3485 return chcr_ccm_common_setkey(aead, key, keylen);
3489 unsigned int keylen)
3501 ret = crypto_aead_setkey(aeadctx->sw_cipher, key, keylen);
3506 keylen > 3) {
3507 keylen -= 4; /* nonce/salt is present in the last 4 bytes */
3508 memcpy(aeadctx->salt, key + keylen, 4);
3510 if (keylen == AES_KEYSIZE_128) {
3512 } else if (keylen == AES_KEYSIZE_192) {
3514 } else if (keylen == AES_KEYSIZE_256) {
3517 pr_err("GCM: Invalid key length %d\n", keylen);
3522 memcpy(aeadctx->key, key, keylen);
3523 aeadctx->enckey_len = keylen;
3524 key_ctx_size = sizeof(struct _key_ctx) + roundup(keylen, 16) +
3533 ret = aes_expandkey(&aes, key, keylen);
3547 unsigned int keylen)
3566 err = crypto_aead_setkey(aeadctx->sw_cipher, key, keylen);
3570 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0)
3675 const u8 *key, unsigned int keylen)
3689 err = crypto_aead_setkey(aeadctx->sw_cipher, key, keylen);
3693 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0)