/kernel/linux/linux-5.10/security/keys/ |
H A D | big_key.c | 60 u8 *buf, *enckey; in big_key_preparse() local 89 enckey = kmalloc(CHACHA20POLY1305_KEY_SIZE, GFP_KERNEL); in big_key_preparse() 90 if (!enckey) { in big_key_preparse() 94 ret = get_random_bytes_wait(enckey, CHACHA20POLY1305_KEY_SIZE); in big_key_preparse() 100 0, enckey); in big_key_preparse() 120 prep->payload.data[big_key_data] = enckey; in big_key_preparse() 141 kfree_sensitive(enckey); in big_key_preparse() 241 u8 *buf, *enckey = (u8 *)key->payload.data[big_key_data]; in big_key_read() local 264 enckey) ? 0 : -EBADMSG; in big_key_read()
|
/kernel/linux/linux-6.6/security/keys/ |
H A D | big_key.c | 61 u8 *buf, *enckey; in big_key_preparse() local 92 enckey = kmalloc(CHACHA20POLY1305_KEY_SIZE, GFP_KERNEL); in big_key_preparse() 93 if (!enckey) { in big_key_preparse() 97 ret = get_random_bytes_wait(enckey, CHACHA20POLY1305_KEY_SIZE); in big_key_preparse() 103 0, enckey); in big_key_preparse() 123 payload->data = enckey; in big_key_preparse() 143 kfree_sensitive(enckey); in big_key_preparse() 238 u8 *buf, *enckey = payload->data; in big_key_read() local 261 enckey) ? 0 : -EBADMSG; in big_key_read()
|
/kernel/linux/linux-6.6/drivers/crypto/qce/ |
H A D | common.c | 298 static void qce_xtskey(struct qce_device *qce, const u8 *enckey, in qce_xtskey() argument 304 qce_cpu_to_be32p_array((__be32 *)xtskey, enckey + enckeylen / 2, in qce_xtskey() 321 __be32 enckey[QCE_MAX_CIPHER_KEY_SIZE / sizeof(__be32)] = {0}; in qce_setup_regs_skcipher() local 336 qce_cpu_to_be32p_array(enckey, ctx->enc_key, keylen); in qce_setup_regs_skcipher() 358 qce_write_array(qce, REG_ENCR_KEY0, (u32 *)enckey, enckey_words); in qce_setup_regs_skcipher() 427 u32 enckey[QCE_MAX_CIPHER_KEY_SIZE / sizeof(u32)] = {0}; in qce_setup_regs_aead() local 445 enckey_words = qce_be32_to_cpu_array(enckey, ctx->enc_key, enc_keylen); in qce_setup_regs_aead() 446 qce_write_array(qce, REG_ENCR_KEY0, enckey, enckey_words); in qce_setup_regs_aead()
|
H A D | aead.c | 612 err = verify_aead_des_key(tfm, authenc_keys.enckey, authenc_keys.enckeylen); in qce_aead_setkey() 616 err = verify_aead_des3_key(tfm, authenc_keys.enckey, authenc_keys.enckeylen); in qce_aead_setkey() 625 memcpy(_key, authenc_keys.enckey, DES3_EDE_KEY_SIZE); in qce_aead_setkey() 643 memcpy(ctx->enc_key, authenc_keys.enckey, authenc_keys.enckeylen); in qce_aead_setkey()
|
/kernel/linux/linux-5.10/drivers/crypto/qce/ |
H A D | common.c | 292 static void qce_xtskey(struct qce_device *qce, const u8 *enckey, in qce_xtskey() argument 299 qce_cpu_to_be32p_array((__be32 *)xtskey, enckey + enckeylen / 2, in qce_xtskey() 316 __be32 enckey[QCE_MAX_CIPHER_KEY_SIZE / sizeof(__be32)] = {0}; in qce_setup_regs_skcipher() local 331 qce_cpu_to_be32p_array(enckey, ctx->enc_key, keylen); in qce_setup_regs_skcipher() 353 qce_write_array(qce, REG_ENCR_KEY0, (u32 *)enckey, enckey_words); in qce_setup_regs_skcipher()
|
/kernel/linux/linux-5.10/include/crypto/ |
H A D | authenc.h | 23 const u8 *enckey; member
|
/kernel/linux/linux-6.6/include/crypto/ |
H A D | authenc.h | 23 const u8 *enckey; member
|
/kernel/linux/linux-5.10/drivers/crypto/ccree/ |
H A D | cc_aead.c | 49 u8 *enckey; member 72 /* Unmap enckey buffer */ in cc_aead_exit() 73 if (ctx->enckey) { in cc_aead_exit() 74 dma_free_coherent(dev, AES_MAX_KEY_SIZE, ctx->enckey, in cc_aead_exit() 76 dev_dbg(dev, "Freed enckey DMA buffer enckey_dma_addr=%pad\n", in cc_aead_exit() 79 ctx->enckey = NULL; in cc_aead_exit() 144 ctx->enckey = dma_alloc_coherent(dev, AES_MAX_KEY_SIZE, in cc_aead_init() 146 if (!ctx->enckey) { in cc_aead_init() 150 dev_dbg(dev, "Allocated enckey buffer in context ctx->enckey in cc_aead_init() 549 const u8 *enckey, *authkey; cc_aead_setkey() local [all...] |
/kernel/linux/linux-6.6/drivers/crypto/ccree/ |
H A D | cc_aead.c | 49 u8 *enckey; member 72 /* Unmap enckey buffer */ in cc_aead_exit() 73 if (ctx->enckey) { in cc_aead_exit() 74 dma_free_coherent(dev, AES_MAX_KEY_SIZE, ctx->enckey, in cc_aead_exit() 76 dev_dbg(dev, "Freed enckey DMA buffer enckey_dma_addr=%pad\n", in cc_aead_exit() 79 ctx->enckey = NULL; in cc_aead_exit() 144 ctx->enckey = dma_alloc_coherent(dev, AES_MAX_KEY_SIZE, in cc_aead_init() 146 if (!ctx->enckey) { in cc_aead_init() 150 dev_dbg(dev, "Allocated enckey buffer in context ctx->enckey in cc_aead_init() 549 const u8 *enckey, *authkey; cc_aead_setkey() local [all...] |
/kernel/linux/linux-5.10/drivers/crypto/ |
H A D | ixp4xx_crypto.c | 183 u8 enckey[MAX_KEYLEN]; member 1122 ret = setup_cipher(&tfm->base, 0, ctx->enckey, ctx->enckey_len); in aead_setup() 1125 ret = setup_cipher(&tfm->base, 1, ctx->enckey, ctx->enckey_len); in aead_setup() 1161 if (keys.enckeylen > sizeof(ctx->enckey)) in aead_setkey() 1165 memcpy(ctx->enckey, keys.enckey, keys.enckeylen); in aead_setkey() 1191 err = verify_aead_des3_key(tfm, keys.enckey, keys.enckeylen); in des3_aead_setkey() 1196 memcpy(ctx->enckey, keys.enckey, keys.enckeylen); in des3_aead_setkey()
|
/kernel/linux/linux-6.6/drivers/crypto/intel/ixp4xx/ |
H A D | ixp4xx_crypto.c | 184 u8 enckey[MAX_KEYLEN]; member 1217 ret = setup_cipher(&tfm->base, 0, ctx->enckey, ctx->enckey_len); in aead_setup() 1220 ret = setup_cipher(&tfm->base, 1, ctx->enckey, ctx->enckey_len); in aead_setup() 1256 if (keys.enckeylen > sizeof(ctx->enckey)) in aead_setkey() 1260 memcpy(ctx->enckey, keys.enckey, keys.enckeylen); in aead_setkey() 1286 err = verify_aead_des3_key(tfm, keys.enckey, keys.enckeylen); in des3_aead_setkey() 1291 memcpy(ctx->enckey, keys.enckey, keys.enckeylen); in des3_aead_setkey()
|
/kernel/linux/linux-5.10/crypto/ |
H A D | authenc.c | 78 keys->enckey = key + keys->authkeylen; in crypto_authenc_extractkeys() 106 err = crypto_skcipher_setkey(enc, keys.enckey, keys.enckeylen); in crypto_authenc_setkey()
|
H A D | authencesn.c | 80 err = crypto_skcipher_setkey(enc, keys.enckey, keys.enckeylen); in crypto_authenc_esn_setkey()
|
H A D | essiv.c | 113 crypto_shash_update(desc, keys.enckey, keys.enckeylen) ?: in essiv_aead_setkey()
|
/kernel/linux/linux-6.6/crypto/ |
H A D | authenc.c | 78 keys->enckey = key + keys->authkeylen; in crypto_authenc_extractkeys() 106 err = crypto_skcipher_setkey(enc, keys.enckey, keys.enckeylen); in crypto_authenc_setkey()
|
H A D | authencesn.c | 80 err = crypto_skcipher_setkey(enc, keys.enckey, keys.enckeylen); in crypto_authenc_esn_setkey()
|
H A D | essiv.c | 114 crypto_shash_update(desc, keys.enckey, keys.enckeylen) ?: in essiv_aead_setkey()
|
/kernel/linux/linux-5.10/drivers/crypto/bcm/ |
H A D | cipher.c | 328 cipher_parms.key_buf = ctx->enckey; in handle_skcipher_req() 1306 cipher_parms.key_buf = ctx->enckey; in handle_aead_req() 1850 memcpy(ctx->enckey, key, keylen); in skcipher_setkey() 1858 memcpy(ctx->enckey, key + xts_keylen, xts_keylen); in skcipher_setkey() 1859 memcpy(ctx->enckey + xts_keylen, key, xts_keylen); in skcipher_setkey() 1874 cipher_parms.key_buf = ctx->enckey; in skcipher_setkey() 2782 memcpy(ctx->enckey, keys.enckey, keys.enckeylen); in aead_authenc_setkey() 2789 if (verify_aead_des_key(cipher, keys.enckey, keys.enckeylen)) in aead_authenc_setkey() 2795 if (verify_aead_des3_key(cipher, keys.enckey, key in aead_authenc_setkey() [all...] |
H A D | cipher.h | 179 u8 enckey[MAX_KEY_SIZE + ARC4_STATE_SIZE]; member
|
/kernel/linux/linux-6.6/drivers/crypto/bcm/ |
H A D | cipher.c | 328 cipher_parms.key_buf = ctx->enckey; in handle_skcipher_req() 1303 cipher_parms.key_buf = ctx->enckey; in handle_aead_req() 1847 memcpy(ctx->enckey, key, keylen); in skcipher_setkey() 1855 memcpy(ctx->enckey, key + xts_keylen, xts_keylen); in skcipher_setkey() 1856 memcpy(ctx->enckey + xts_keylen, key, xts_keylen); in skcipher_setkey() 1871 cipher_parms.key_buf = ctx->enckey; in skcipher_setkey() 2743 memcpy(ctx->enckey, keys.enckey, keys.enckeylen); in aead_authenc_setkey() 2750 if (verify_aead_des_key(cipher, keys.enckey, keys.enckeylen)) in aead_authenc_setkey() 2756 if (verify_aead_des3_key(cipher, keys.enckey, key in aead_authenc_setkey() [all...] |
H A D | cipher.h | 180 u8 enckey[MAX_KEY_SIZE + ARC4_STATE_SIZE]; member
|
/kernel/linux/linux-6.6/drivers/s390/crypto/ |
H A D | zcrypt_ep11misc.c | 1080 const u8 *enckey, size_t enckeysize, in _ep11_unwrapkey() 1171 p += asn1tag_write(p, 0x04, enckey, enckeysize); in _ep11_unwrapkey() 1225 const u8 *enckey, size_t enckeysize, in ep11_unwrapkey() 1241 rc = _ep11_unwrapkey(card, domain, kek, keksize, enckey, enckeysize, in ep11_unwrapkey() 1078 _ep11_unwrapkey(u16 card, u16 domain, const u8 *kek, size_t keksize, const u8 *enckey, size_t enckeysize, u32 mech, const u8 *iv, u32 keybitsize, u32 keygenflags, u8 *keybuf, size_t *keybufsize) _ep11_unwrapkey() argument 1223 ep11_unwrapkey(u16 card, u16 domain, const u8 *kek, size_t keksize, const u8 *enckey, size_t enckeysize, u32 mech, const u8 *iv, u32 keybitsize, u32 keygenflags, u8 *keybuf, size_t *keybufsize, u8 keybufver) ep11_unwrapkey() argument
|
/kernel/linux/linux-5.10/drivers/crypto/inside-secure/ |
H A D | safexcel_cipher.c | 421 ctx->nonce = *(u32 *)(keys.enckey + keys.enckeylen - in safexcel_aead_setkey() 430 err = verify_aead_des_key(ctfm, keys.enckey, keys.enckeylen); in safexcel_aead_setkey() 435 err = verify_aead_des3_key(ctfm, keys.enckey, keys.enckeylen); in safexcel_aead_setkey() 440 err = aes_expandkey(&aes, keys.enckey, keys.enckeylen); in safexcel_aead_setkey() 456 ((u32 *)keys.enckey)[i]) { in safexcel_aead_setkey() 494 ctx->key[i] = cpu_to_le32(((u32 *)keys.enckey)[i]); in safexcel_aead_setkey()
|
/kernel/linux/linux-6.6/drivers/crypto/inside-secure/ |
H A D | safexcel_cipher.c | 421 ctx->nonce = *(u32 *)(keys.enckey + keys.enckeylen - in safexcel_aead_setkey() 430 err = verify_aead_des_key(ctfm, keys.enckey, keys.enckeylen); in safexcel_aead_setkey() 435 err = verify_aead_des3_key(ctfm, keys.enckey, keys.enckeylen); in safexcel_aead_setkey() 440 err = aes_expandkey(&aes, keys.enckey, keys.enckeylen); in safexcel_aead_setkey() 456 ((u32 *)keys.enckey)[i]) { in safexcel_aead_setkey() 494 ctx->key[i] = cpu_to_le32(((u32 *)keys.enckey)[i]); in safexcel_aead_setkey()
|
/kernel/linux/linux-5.10/drivers/s390/crypto/ |
H A D | zcrypt_ep11misc.c | 930 const u8 *enckey, size_t enckeysize, in ep11_unwrapkey() 1011 p += asn1tag_write(p, 0x04, enckey, enckeysize); in ep11_unwrapkey() 928 ep11_unwrapkey(u16 card, u16 domain, const u8 *kek, size_t keksize, const u8 *enckey, size_t enckeysize, u32 mech, const u8 *iv, u32 keybitsize, u32 keygenflags, u8 *keybuf, size_t *keybufsize) ep11_unwrapkey() argument
|