Lines Matching defs:key
691 /* Currently, only XTS mode need fallback tfm when using 192bit key */
750 static int sec_skcipher_3des_setkey(struct crypto_skcipher *tfm, const u8 *key,
758 ret = verify_skcipher_des3_key(tfm, key);
792 pr_err("hisi_sec2: xts mode key error!\n");
798 pr_err("hisi_sec2: sm4 key error!\n");
812 pr_err("hisi_sec2: aes key error!\n");
821 static int sec_skcipher_setkey(struct crypto_skcipher *tfm, const u8 *key,
831 ret = xts_verify_key(tfm, key, keylen);
833 dev_err(dev, "xts mode key err!\n");
843 ret = sec_skcipher_3des_setkey(tfm, key, keylen, c_mode);
854 dev_err(dev, "set sec key err!\n");
858 memcpy(c_ctx->c_key, key, keylen);
860 ret = crypto_sync_skcipher_setkey(c_ctx->fbtfm, key, keylen);
862 dev_err(dev, "failed to set fallback skcipher key!\n");
870 static int sec_setkey_##name(struct crypto_skcipher *tfm, const u8 *key,\
873 return sec_skcipher_setkey(tfm, key, keylen, c_alg, c_mode); \
1081 pr_err("hisi_sec2: aead aes key error!\n");
1096 pr_err("hisi_sec2: aead auth key error!\n");
1131 struct crypto_aead *tfm, const u8 *key,
1137 return crypto_aead_setkey(a_ctx->fallback_aead_tfm, key, keylen);
1140 static int sec_aead_setkey(struct crypto_aead *tfm, const u8 *key,
1161 dev_err(dev, "set sec aes ccm cipher key err!\n");
1164 memcpy(c_ctx->c_key, key, keylen);
1167 ret = sec_aead_fallback_setkey(a_ctx, tfm, key, keylen);
1175 if (crypto_authenc_extractkeys(&keys, key, keylen))
1180 dev_err(dev, "set sec cipher key err!\n");
1186 dev_err(dev, "set sec auth key err!\n");
1192 dev_err(dev, "MAC or AUTH key length error!\n");
1205 static int sec_setkey_##name(struct crypto_aead *tfm, const u8 *key, \
1208 return sec_aead_setkey(tfm, key, keylen, aalg, calg, maclen, cmode);\