Lines Matching defs:keys
2262 /* Both keys for xts must be aligned to 16 byte boundary
2263 * by padding with zeros. So for 24 byte keys padding 8 zeroes.
3552 struct crypto_authenc_keys keys;
3570 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0)
3580 if (keys.enckeylen < CTR_RFC3686_NONCE_SIZE)
3582 memcpy(aeadctx->nonce, keys.enckey + (keys.enckeylen
3584 keys.enckeylen -= CTR_RFC3686_NONCE_SIZE;
3586 if (keys.enckeylen == AES_KEYSIZE_128) {
3588 } else if (keys.enckeylen == AES_KEYSIZE_192) {
3590 } else if (keys.enckeylen == AES_KEYSIZE_256) {
3601 memcpy(aeadctx->key, keys.enckey, keys.enckeylen);
3602 aeadctx->enckey_len = keys.enckeylen;
3622 if (keys.authkeylen > bs) {
3623 err = crypto_shash_digest(shash, keys.authkey,
3624 keys.authkeylen,
3630 keys.authkeylen = max_authsize;
3632 memcpy(o_ptr, keys.authkey, keys.authkeylen);
3635 memset(pad + keys.authkeylen, 0, bs - keys.authkeylen);
3636 memcpy(pad, o_ptr, keys.authkeylen);
3644 memset(pad + keys.authkeylen, 0, bs - keys.authkeylen);
3645 memcpy(pad, o_ptr, keys.authkeylen);
3656 roundup(keys.enckeylen, 16) +
3663 memzero_explicit(&keys, sizeof(keys));
3668 memzero_explicit(&keys, sizeof(keys));
3679 struct crypto_authenc_keys keys;
3693 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0)
3699 if (keys.enckeylen < CTR_RFC3686_NONCE_SIZE)
3701 memcpy(aeadctx->nonce, keys.enckey + (keys.enckeylen
3703 keys.enckeylen -= CTR_RFC3686_NONCE_SIZE;
3705 if (keys.enckeylen == AES_KEYSIZE_128) {
3707 } else if (keys.enckeylen == AES_KEYSIZE_192) {
3709 } else if (keys.enckeylen == AES_KEYSIZE_256) {
3712 pr_err("Unsupported cipher key %d\n", keys.enckeylen);
3715 memcpy(aeadctx->key, keys.enckey, keys.enckeylen);
3716 aeadctx->enckey_len = keys.enckeylen;
3722 key_ctx_len = sizeof(struct _key_ctx) + roundup(keys.enckeylen, 16);
3727 memzero_explicit(&keys, sizeof(keys));
3731 memzero_explicit(&keys, sizeof(keys));