/kernel/linux/linux-5.10/include/crypto/ |
H A D | authenc.h | 18 __be32 enckeylen; member 26 unsigned int enckeylen; member
|
/kernel/linux/linux-6.6/include/crypto/ |
H A D | authenc.h | 18 __be32 enckeylen; member 26 unsigned int enckeylen; member
|
/kernel/linux/linux-6.6/drivers/crypto/qce/ |
H A D | aead.c | 607 if (authenc_keys.enckeylen > QCE_MAX_KEY_SIZE || in qce_aead_setkey() 612 err = verify_aead_des_key(tfm, authenc_keys.enckey, authenc_keys.enckeylen); in qce_aead_setkey() 616 err = verify_aead_des3_key(tfm, authenc_keys.enckey, authenc_keys.enckeylen); in qce_aead_setkey() 632 if (authenc_keys.enckeylen != AES_KEYSIZE_128 && in qce_aead_setkey() 633 authenc_keys.enckeylen != AES_KEYSIZE_192 && in qce_aead_setkey() 634 authenc_keys.enckeylen != AES_KEYSIZE_256) in qce_aead_setkey() 636 if (authenc_keys.enckeylen == AES_KEYSIZE_192) in qce_aead_setkey() 640 ctx->enc_keylen = authenc_keys.enckeylen; in qce_aead_setkey() 643 memcpy(ctx->enc_key, authenc_keys.enckey, authenc_keys.enckeylen); in qce_aead_setkey()
|
H A D | common.c | 299 unsigned int enckeylen, unsigned int cryptlen) in qce_xtskey() 302 unsigned int xtsklen = enckeylen / (2 * sizeof(u32)); in qce_xtskey() 304 qce_cpu_to_be32p_array((__be32 *)xtskey, enckey + enckeylen / 2, in qce_xtskey() 305 enckeylen / 2); in qce_xtskey() 298 qce_xtskey(struct qce_device *qce, const u8 *enckey, unsigned int enckeylen, unsigned int cryptlen) qce_xtskey() argument
|
/kernel/linux/linux-5.10/crypto/ |
H A D | authenc.c | 68 keys->enckeylen = be32_to_cpu(param->enckeylen); in crypto_authenc_extractkeys() 73 if (keylen < keys->enckeylen) in crypto_authenc_extractkeys() 76 keys->authkeylen = keylen - keys->enckeylen; in crypto_authenc_extractkeys() 106 err = crypto_skcipher_setkey(enc, keys.enckey, keys.enckeylen); in crypto_authenc_setkey()
|
/kernel/linux/linux-6.6/crypto/ |
H A D | authenc.c | 68 keys->enckeylen = be32_to_cpu(param->enckeylen); in crypto_authenc_extractkeys() 73 if (keylen < keys->enckeylen) in crypto_authenc_extractkeys() 76 keys->authkeylen = keylen - keys->enckeylen; in crypto_authenc_extractkeys() 106 err = crypto_skcipher_setkey(enc, keys.enckey, keys.enckeylen); in crypto_authenc_setkey()
|
/kernel/linux/linux-5.10/drivers/crypto/qce/ |
H A D | common.c | 293 unsigned int enckeylen, unsigned int cryptlen) in qce_xtskey() 296 unsigned int xtsklen = enckeylen / (2 * sizeof(u32)); in qce_xtskey() 299 qce_cpu_to_be32p_array((__be32 *)xtskey, enckey + enckeylen / 2, in qce_xtskey() 300 enckeylen / 2); in qce_xtskey() 292 qce_xtskey(struct qce_device *qce, const u8 *enckey, unsigned int enckeylen, unsigned int cryptlen) qce_xtskey() argument
|
/kernel/linux/linux-5.10/drivers/crypto/marvell/octeontx/ |
H A D | otx_cptvf_algs.c | 841 int enckeylen = 0, authkeylen = 0; in otx_cpt_aead_cbc_aes_sha_setkey() local 855 enckeylen = be32_to_cpu(param->enckeylen); in otx_cpt_aead_cbc_aes_sha_setkey() 858 if (keylen < enckeylen) in otx_cpt_aead_cbc_aes_sha_setkey() 864 authkeylen = keylen - enckeylen; in otx_cpt_aead_cbc_aes_sha_setkey() 867 switch (enckeylen) { in otx_cpt_aead_cbc_aes_sha_setkey() 882 ctx->enc_key_len = enckeylen; in otx_cpt_aead_cbc_aes_sha_setkey() 901 int enckeylen = 0; in otx_cpt_aead_ecb_null_sha_setkey() local 913 enckeylen = be32_to_cpu(param->enckeylen); in otx_cpt_aead_ecb_null_sha_setkey() [all...] |
/kernel/linux/linux-6.6/drivers/crypto/marvell/octeontx2/ |
H A D | otx2_cptvf_algs.c | 898 int enckeylen = 0, authkeylen = 0; in otx2_cpt_aead_cbc_aes_sha_setkey() local 911 enckeylen = be32_to_cpu(param->enckeylen); in otx2_cpt_aead_cbc_aes_sha_setkey() 914 if (keylen < enckeylen) in otx2_cpt_aead_cbc_aes_sha_setkey() 920 authkeylen = keylen - enckeylen; in otx2_cpt_aead_cbc_aes_sha_setkey() 923 switch (enckeylen) { in otx2_cpt_aead_cbc_aes_sha_setkey() 938 ctx->enc_key_len = enckeylen; in otx2_cpt_aead_cbc_aes_sha_setkey() 951 int enckeylen = 0; in otx2_cpt_aead_ecb_null_sha_setkey() local 963 enckeylen = be32_to_cpu(param->enckeylen); in otx2_cpt_aead_ecb_null_sha_setkey() [all...] |
/kernel/linux/linux-6.6/drivers/crypto/marvell/octeontx/ |
H A D | otx_cptvf_algs.c | 843 int enckeylen = 0, authkeylen = 0; in otx_cpt_aead_cbc_aes_sha_setkey() local 857 enckeylen = be32_to_cpu(param->enckeylen); in otx_cpt_aead_cbc_aes_sha_setkey() 860 if (keylen < enckeylen) in otx_cpt_aead_cbc_aes_sha_setkey() 866 authkeylen = keylen - enckeylen; in otx_cpt_aead_cbc_aes_sha_setkey() 869 switch (enckeylen) { in otx_cpt_aead_cbc_aes_sha_setkey() 884 ctx->enc_key_len = enckeylen; in otx_cpt_aead_cbc_aes_sha_setkey() 903 int enckeylen = 0; in otx_cpt_aead_ecb_null_sha_setkey() local 915 enckeylen = be32_to_cpu(param->enckeylen); in otx_cpt_aead_ecb_null_sha_setkey() [all...] |
/kernel/linux/linux-5.10/drivers/crypto/bcm/ |
H A D | cipher.c | 327 cipher_parms.key_len = ctx->enckeylen; in handle_skcipher_req() 1307 cipher_parms.key_len = ctx->enckeylen; in handle_aead_req() 1851 ctx->enckeylen = keylen; in skcipher_setkey() 1875 cipher_parms.key_len = ctx->enckeylen; in skcipher_setkey() 1884 ctx->enckeylen, in skcipher_setkey() 2775 if (keys.enckeylen > MAX_KEY_SIZE || in aead_authenc_setkey() 2779 ctx->enckeylen = keys.enckeylen; in aead_authenc_setkey() 2782 memcpy(ctx->enckey, keys.enckey, keys.enckeylen); in aead_authenc_setkey() 2789 if (verify_aead_des_key(cipher, keys.enckey, keys.enckeylen)) in aead_authenc_setkey() [all...] |
/kernel/linux/linux-6.6/drivers/crypto/bcm/ |
H A D | cipher.c | 327 cipher_parms.key_len = ctx->enckeylen; in handle_skcipher_req() 1304 cipher_parms.key_len = ctx->enckeylen; in handle_aead_req() 1848 ctx->enckeylen = keylen; in skcipher_setkey() 1872 cipher_parms.key_len = ctx->enckeylen; in skcipher_setkey() 1881 ctx->enckeylen, in skcipher_setkey() 2736 if (keys.enckeylen > MAX_KEY_SIZE || in aead_authenc_setkey() 2740 ctx->enckeylen = keys.enckeylen; in aead_authenc_setkey() 2743 memcpy(ctx->enckey, keys.enckey, keys.enckeylen); in aead_authenc_setkey() 2750 if (verify_aead_des_key(cipher, keys.enckey, keys.enckeylen)) in aead_authenc_setkey() [all...] |
/kernel/linux/linux-5.10/drivers/crypto/caam/ |
H A D | caamalg_qi.c | 207 dev_dbg(jrdev, "keylen %d enckeylen %d authkeylen %d\n", in aead_setkey() 208 keys.authkeylen + keys.enckeylen, keys.enckeylen, in aead_setkey() 222 if (ctx->adata.keylen_pad + keys.enckeylen > CAAM_MAX_KEY_SIZE) in aead_setkey() 227 keys.enckeylen); in aead_setkey() 230 keys.enckeylen, ctx->dir); in aead_setkey() 236 keys.enckeylen); in aead_setkey() 241 memcpy(ctx->key + ctx->adata.keylen_pad, keys.enckey, keys.enckeylen); in aead_setkey() 243 ctx->adata.keylen_pad + keys.enckeylen, in aead_setkey() 248 ctx->adata.keylen_pad + keys.enckeylen, in aead_setkey() [all...] |
H A D | caamalg_desc.c | 216 unsigned int enckeylen = cdata->keylen; in init_sh_desc_key_aead() local 228 * | enckeylen = encryption key size + nonce size in init_sh_desc_key_aead() 231 enckeylen -= CTR_RFC3686_NONCE_SIZE; in init_sh_desc_key_aead() 247 append_key_as_imm(desc, cdata->key_virt, enckeylen, in init_sh_desc_key_aead() 248 enckeylen, CLASS_1 | KEY_DEST_CLASS_REG); in init_sh_desc_key_aead() 250 append_key(desc, cdata->key_dma, enckeylen, CLASS_1 | in init_sh_desc_key_aead()
|
H A D | caamalg.c | 588 dev_dbg(jrdev, "keylen %d enckeylen %d authkeylen %d\n", in aead_setkey() 589 keys.authkeylen + keys.enckeylen, keys.enckeylen, in aead_setkey() 603 if (ctx->adata.keylen_pad + keys.enckeylen > CAAM_MAX_KEY_SIZE) in aead_setkey() 608 keys.enckeylen); in aead_setkey() 611 keys.enckeylen, ctx->dir); in aead_setkey() 617 keys.enckeylen); in aead_setkey() 623 memcpy(ctx->key + ctx->adata.keylen_pad, keys.enckey, keys.enckeylen); in aead_setkey() 625 keys.enckeylen, ctx->dir); in aead_setkey() 629 ctx->adata.keylen_pad + keys.enckeylen, in aead_setkey() [all...] |
/kernel/linux/linux-6.6/drivers/crypto/caam/ |
H A D | caamalg_qi.c | 212 dev_dbg(jrdev, "keylen %d enckeylen %d authkeylen %d\n", in aead_setkey() 213 keys.authkeylen + keys.enckeylen, keys.enckeylen, in aead_setkey() 227 if (ctx->adata.keylen_pad + keys.enckeylen > CAAM_MAX_KEY_SIZE) in aead_setkey() 232 keys.enckeylen); in aead_setkey() 235 keys.enckeylen, ctx->dir); in aead_setkey() 241 keys.enckeylen); in aead_setkey() 246 memcpy(ctx->key + ctx->adata.keylen_pad, keys.enckey, keys.enckeylen); in aead_setkey() 248 ctx->adata.keylen_pad + keys.enckeylen, in aead_setkey() 253 ctx->adata.keylen_pad + keys.enckeylen, in aead_setkey() [all...] |
H A D | caamalg_desc.c | 216 unsigned int enckeylen = cdata->keylen; in init_sh_desc_key_aead() local 228 * | enckeylen = encryption key size + nonce size in init_sh_desc_key_aead() 231 enckeylen -= CTR_RFC3686_NONCE_SIZE; in init_sh_desc_key_aead() 247 append_key_as_imm(desc, cdata->key_virt, enckeylen, in init_sh_desc_key_aead() 248 enckeylen, CLASS_1 | KEY_DEST_CLASS_REG); in init_sh_desc_key_aead() 250 append_key(desc, cdata->key_dma, enckeylen, CLASS_1 | in init_sh_desc_key_aead()
|
H A D | caamalg.c | 597 dev_dbg(jrdev, "keylen %d enckeylen %d authkeylen %d\n", in aead_setkey() 598 keys.authkeylen + keys.enckeylen, keys.enckeylen, in aead_setkey() 612 if (ctx->adata.keylen_pad + keys.enckeylen > CAAM_MAX_KEY_SIZE) in aead_setkey() 617 keys.enckeylen); in aead_setkey() 620 keys.enckeylen, ctx->dir); in aead_setkey() 626 keys.enckeylen); in aead_setkey() 632 memcpy(ctx->key + ctx->adata.keylen_pad, keys.enckey, keys.enckeylen); in aead_setkey() 634 keys.enckeylen, ctx->dir); in aead_setkey() 638 ctx->adata.keylen_pad + keys.enckeylen, in aead_setkey() [all...] |
/kernel/linux/linux-5.10/drivers/crypto/chelsio/ |
H A D | chcr_algo.c | 3584 if (keys.enckeylen < CTR_RFC3686_NONCE_SIZE) in chcr_authenc_setkey() 3586 memcpy(aeadctx->nonce, keys.enckey + (keys.enckeylen in chcr_authenc_setkey() 3588 keys.enckeylen -= CTR_RFC3686_NONCE_SIZE; in chcr_authenc_setkey() 3590 if (keys.enckeylen == AES_KEYSIZE_128) { in chcr_authenc_setkey() 3592 } else if (keys.enckeylen == AES_KEYSIZE_192) { in chcr_authenc_setkey() 3594 } else if (keys.enckeylen == AES_KEYSIZE_256) { in chcr_authenc_setkey() 3605 memcpy(aeadctx->key, keys.enckey, keys.enckeylen); in chcr_authenc_setkey() 3606 aeadctx->enckey_len = keys.enckeylen; in chcr_authenc_setkey() 3660 roundup(keys.enckeylen, 16) + in chcr_authenc_setkey() 3703 if (keys.enckeylen < CTR_RFC3686_NONCE_SIZ in chcr_aead_digest_null_setkey() [all...] |
/kernel/linux/linux-6.6/drivers/crypto/chelsio/ |
H A D | chcr_algo.c | 3580 if (keys.enckeylen < CTR_RFC3686_NONCE_SIZE) in chcr_authenc_setkey() 3582 memcpy(aeadctx->nonce, keys.enckey + (keys.enckeylen in chcr_authenc_setkey() 3584 keys.enckeylen -= CTR_RFC3686_NONCE_SIZE; in chcr_authenc_setkey() 3586 if (keys.enckeylen == AES_KEYSIZE_128) { in chcr_authenc_setkey() 3588 } else if (keys.enckeylen == AES_KEYSIZE_192) { in chcr_authenc_setkey() 3590 } else if (keys.enckeylen == AES_KEYSIZE_256) { in chcr_authenc_setkey() 3601 memcpy(aeadctx->key, keys.enckey, keys.enckeylen); in chcr_authenc_setkey() 3602 aeadctx->enckey_len = keys.enckeylen; in chcr_authenc_setkey() 3656 roundup(keys.enckeylen, 16) + in chcr_authenc_setkey() 3699 if (keys.enckeylen < CTR_RFC3686_NONCE_SIZ in chcr_aead_digest_null_setkey() [all...] |
/kernel/linux/linux-5.10/drivers/crypto/ |
H A D | talitos.c | 857 unsigned int enckeylen; member 898 if (keys.authkeylen + keys.enckeylen > TALITOS_MAX_KEY_SIZE) in aead_setkey() 905 memcpy(&ctx->key[keys.authkeylen], keys.enckey, keys.enckeylen); in aead_setkey() 907 ctx->keylen = keys.authkeylen + keys.enckeylen; in aead_setkey() 908 ctx->enckeylen = keys.enckeylen; in aead_setkey() 934 if (keys.authkeylen + keys.enckeylen > TALITOS_MAX_KEY_SIZE) in aead_des3_setkey() 937 err = verify_aead_des3_key(authenc, keys.enckey, keys.enckeylen); in aead_des3_setkey() 945 memcpy(&ctx->key[keys.authkeylen], keys.enckey, keys.enckeylen); in aead_des3_setkey() 947 ctx->keylen = keys.authkeylen + keys.enckeylen; in aead_des3_setkey() [all...] |
H A D | ixp4xx_crypto.c | 1161 if (keys.enckeylen > sizeof(ctx->enckey)) in aead_setkey() 1165 memcpy(ctx->enckey, keys.enckey, keys.enckeylen); in aead_setkey() 1167 ctx->enckey_len = keys.enckeylen; in aead_setkey() 1191 err = verify_aead_des3_key(tfm, keys.enckey, keys.enckeylen); in des3_aead_setkey() 1196 memcpy(ctx->enckey, keys.enckey, keys.enckeylen); in des3_aead_setkey() 1198 ctx->enckey_len = keys.enckeylen; in des3_aead_setkey()
|
/kernel/linux/linux-6.6/drivers/crypto/ |
H A D | talitos.c | 858 unsigned int enckeylen; member 899 if (keys.authkeylen + keys.enckeylen > TALITOS_MAX_KEY_SIZE) in aead_setkey() 906 memcpy(&ctx->key[keys.authkeylen], keys.enckey, keys.enckeylen); in aead_setkey() 908 ctx->keylen = keys.authkeylen + keys.enckeylen; in aead_setkey() 909 ctx->enckeylen = keys.enckeylen; in aead_setkey() 935 if (keys.authkeylen + keys.enckeylen > TALITOS_MAX_KEY_SIZE) in aead_des3_setkey() 938 err = verify_aead_des3_key(authenc, keys.enckey, keys.enckeylen); in aead_des3_setkey() 946 memcpy(&ctx->key[keys.authkeylen], keys.enckey, keys.enckeylen); in aead_des3_setkey() 948 ctx->keylen = keys.authkeylen + keys.enckeylen; in aead_des3_setkey() [all...] |
/kernel/linux/linux-5.10/drivers/crypto/qat/qat_common/ |
H A D | qat_algs.c | 250 sizeof(struct icp_qat_hw_auth_setup) + keys->enckeylen); in qat_alg_aead_init_enc_session() 260 memcpy(cipher->aes.key, keys->enckey, keys->enckeylen); in qat_alg_aead_init_enc_session() 283 cipher_cd_ctrl->cipher_key_sz = keys->enckeylen >> 3; in qat_alg_aead_init_enc_session() 346 memcpy(cipher->aes.key, keys->enckey, keys->enckeylen); in qat_alg_aead_init_dec_session() 370 cipher_cd_ctrl->cipher_key_sz = keys->enckeylen >> 3; in qat_alg_aead_init_dec_session() 506 if (qat_alg_validate_key(keys.enckeylen, &alg, mode)) in qat_alg_aead_init_sessions()
|
/kernel/linux/linux-6.6/drivers/crypto/intel/qat/qat_common/ |
H A D | qat_algs.c | 247 sizeof(struct icp_qat_hw_auth_setup) + keys->enckeylen); in qat_alg_aead_init_enc_session() 257 memcpy(cipher->aes.key, keys->enckey, keys->enckeylen); in qat_alg_aead_init_enc_session() 280 cipher_cd_ctrl->cipher_key_sz = keys->enckeylen >> 3; in qat_alg_aead_init_enc_session() 343 memcpy(cipher->aes.key, keys->enckey, keys->enckeylen); in qat_alg_aead_init_dec_session() 367 cipher_cd_ctrl->cipher_key_sz = keys->enckeylen >> 3; in qat_alg_aead_init_dec_session() 555 if (qat_alg_validate_key(keys.enckeylen, &alg, mode)) in qat_alg_aead_init_sessions()
|