/kernel/linux/linux-5.10/arch/x86/crypto/ |
H A D | aes_ctrby8_avx-x86_64.S | 145 * do_aes num_in_par load_keys key_len 148 .macro do_aes b, k, key_len 151 .set klen, \key_len 417 .macro do_aes_load val, key_len 418 do_aes \val, 1, \key_len 421 .macro do_aes_noload val, key_len 422 do_aes \val, 0, \key_len 427 .macro do_aes_ctrmain key_len 429 jb .Ldo_return2\key_len 437 jz .Lmult_of_8_blks\key_len [all...] |
/kernel/linux/linux-6.6/arch/x86/crypto/ |
H A D | aes_ctrby8_avx-x86_64.S | 109 * do_aes num_in_par load_keys key_len 112 .macro do_aes b, k, key_len, xctr 115 .set klen, \key_len 400 .macro do_aes_load val, key_len, xctr 401 do_aes \val, 1, \key_len, \xctr 404 .macro do_aes_noload val, key_len, xctr 405 do_aes \val, 0, \key_len, \xctr 410 .macro do_aes_ctrmain key_len, xctr 412 jb .Ldo_return2\xctr\key_len 425 jz .Lmult_of_8_blks\xctr\key_len [all...] |
/kernel/linux/linux-5.10/drivers/firmware/efi/ |
H A D | apple-properties.c | 57 u32 key_len, val_len, entry_len; in unmarshal_key_value_pairs() local 61 if (sizeof(key_len) > remaining) in unmarshal_key_value_pairs() 64 key_len = *(typeof(key_len) *)ptr; in unmarshal_key_value_pairs() 65 if (key_len + sizeof(val_len) > remaining || in unmarshal_key_value_pairs() 66 key_len < sizeof(key_len) + sizeof(efi_char16_t) || in unmarshal_key_value_pairs() 67 *(efi_char16_t *)(ptr + sizeof(key_len)) == 0) { in unmarshal_key_value_pairs() 73 val_len = *(typeof(val_len) *)(ptr + key_len); in unmarshal_key_value_pairs() 74 if (key_len in unmarshal_key_value_pairs() [all...] |
/kernel/linux/linux-6.6/drivers/firmware/efi/ |
H A D | apple-properties.c | 57 u32 key_len, val_len, entry_len; in unmarshal_key_value_pairs() local 61 if (sizeof(key_len) > remaining) in unmarshal_key_value_pairs() 64 key_len = *(typeof(key_len) *)ptr; in unmarshal_key_value_pairs() 65 if (key_len + sizeof(val_len) > remaining || in unmarshal_key_value_pairs() 66 key_len < sizeof(key_len) + sizeof(efi_char16_t) || in unmarshal_key_value_pairs() 67 *(efi_char16_t *)(ptr + sizeof(key_len)) == 0) { in unmarshal_key_value_pairs() 73 val_len = *(typeof(val_len) *)(ptr + key_len); in unmarshal_key_value_pairs() 74 if (key_len in unmarshal_key_value_pairs() [all...] |
/kernel/linux/linux-5.10/arch/sparc/crypto/ |
H A D | camellia_glue.c | 31 int key_len; member 35 unsigned int key_len, u64 *decrypt_key); 38 unsigned int key_len) in camellia_set_key() 43 if (key_len != 16 && key_len != 24 && key_len != 32) in camellia_set_key() 46 ctx->key_len = key_len; in camellia_set_key() 49 key_len, &ctx->decrypt_key[0]); in camellia_set_key() 54 const u8 *in_key, unsigned int key_len) in camellia_set_key_skcipher() 37 camellia_set_key(struct crypto_tfm *tfm, const u8 *_in_key, unsigned int key_len) camellia_set_key() argument 53 camellia_set_key_skcipher(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) camellia_set_key_skcipher() argument [all...] |
/kernel/linux/linux-6.6/arch/sparc/crypto/ |
H A D | camellia_glue.c | 31 int key_len; member 35 unsigned int key_len, u64 *decrypt_key); 38 unsigned int key_len) in camellia_set_key() 43 if (key_len != 16 && key_len != 24 && key_len != 32) in camellia_set_key() 46 ctx->key_len = key_len; in camellia_set_key() 49 key_len, &ctx->decrypt_key[0]); in camellia_set_key() 54 const u8 *in_key, unsigned int key_len) in camellia_set_key_skcipher() 37 camellia_set_key(struct crypto_tfm *tfm, const u8 *_in_key, unsigned int key_len) camellia_set_key() argument 53 camellia_set_key_skcipher(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) camellia_set_key_skcipher() argument [all...] |
/kernel/linux/linux-5.10/arch/s390/crypto/ |
H A D | aes_s390.c | 44 int key_len; member 55 int key_len; member 72 unsigned int key_len) in setkey_fallback_cip() 80 return crypto_cipher_setkey(sctx->fallback.cip, in_key, key_len); in setkey_fallback_cip() 84 unsigned int key_len) in aes_set_key() 90 fc = (key_len == 16) ? CPACF_KM_AES_128 : in aes_set_key() 91 (key_len == 24) ? CPACF_KM_AES_192 : in aes_set_key() 92 (key_len == 32) ? CPACF_KM_AES_256 : 0; in aes_set_key() 97 return setkey_fallback_cip(tfm, in_key, key_len); in aes_set_key() 99 sctx->key_len in aes_set_key() 71 setkey_fallback_cip(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) setkey_fallback_cip() argument 83 aes_set_key(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) aes_set_key() argument 200 ecb_aes_set_key(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) ecb_aes_set_key() argument 296 cbc_aes_set_key(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) cbc_aes_set_key() argument 389 xts_aes_set_key(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) xts_aes_set_key() argument 532 ctr_aes_set_key(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) ctr_aes_set_key() argument [all...] |
/kernel/linux/linux-6.6/arch/s390/crypto/ |
H A D | aes_s390.c | 45 int key_len; member 56 int key_len; member 73 unsigned int key_len) in setkey_fallback_cip() 81 return crypto_cipher_setkey(sctx->fallback.cip, in_key, key_len); in setkey_fallback_cip() 85 unsigned int key_len) in aes_set_key() 91 fc = (key_len == 16) ? CPACF_KM_AES_128 : in aes_set_key() 92 (key_len == 24) ? CPACF_KM_AES_192 : in aes_set_key() 93 (key_len == 32) ? CPACF_KM_AES_256 : 0; in aes_set_key() 98 return setkey_fallback_cip(tfm, in_key, key_len); in aes_set_key() 100 sctx->key_len in aes_set_key() 72 setkey_fallback_cip(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) setkey_fallback_cip() argument 84 aes_set_key(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) aes_set_key() argument 201 ecb_aes_set_key(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) ecb_aes_set_key() argument 297 cbc_aes_set_key(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) cbc_aes_set_key() argument 390 xts_aes_set_key(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) xts_aes_set_key() argument 529 ctr_aes_set_key(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) ctr_aes_set_key() argument [all...] |
/kernel/linux/linux-5.10/drivers/crypto/ccp/ |
H A D | ccp-crypto-aes-xts.c | 76 unsigned int key_len) in ccp_aes_xts_setkey() 82 ret = xts_verify_key(tfm, key, key_len); in ccp_aes_xts_setkey() 89 switch (key_len) { in ccp_aes_xts_setkey() 91 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_xts_setkey() 95 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_xts_setkey() 98 ctx->u.aes.key_len = key_len / 2; in ccp_aes_xts_setkey() 99 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); in ccp_aes_xts_setkey() 101 return crypto_skcipher_setkey(ctx->u.aes.tfm_skcipher, key, key_len); in ccp_aes_xts_setkey() 116 if (!ctx->u.aes.key_len) in ccp_aes_xts_crypt() 75 ccp_aes_xts_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int key_len) ccp_aes_xts_setkey() argument [all...] |
H A D | ccp-crypto-aes-galois.c | 30 unsigned int key_len) in ccp_aes_gcm_setkey() 34 switch (key_len) { in ccp_aes_gcm_setkey() 49 ctx->u.aes.key_len = key_len; in ccp_aes_gcm_setkey() 51 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_gcm_setkey() 52 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); in ccp_aes_gcm_setkey() 86 if (!ctx->u.aes.key_len) in ccp_aes_gcm_crypt() 124 rctx->cmd.u.aes.key_len = ctx->u.aes.key_len; in ccp_aes_gcm_crypt() 154 ctx->u.aes.key_len in ccp_aes_gcm_cra_init() 29 ccp_aes_gcm_setkey(struct crypto_aead *tfm, const u8 *key, unsigned int key_len) ccp_aes_gcm_setkey() argument [all...] |
/kernel/linux/linux-6.6/drivers/crypto/ccp/ |
H A D | ccp-crypto-aes-xts.c | 76 unsigned int key_len) in ccp_aes_xts_setkey() 82 ret = xts_verify_key(tfm, key, key_len); in ccp_aes_xts_setkey() 89 switch (key_len) { in ccp_aes_xts_setkey() 91 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_xts_setkey() 95 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_xts_setkey() 98 ctx->u.aes.key_len = key_len / 2; in ccp_aes_xts_setkey() 99 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); in ccp_aes_xts_setkey() 101 return crypto_skcipher_setkey(ctx->u.aes.tfm_skcipher, key, key_len); in ccp_aes_xts_setkey() 116 if (!ctx->u.aes.key_len) in ccp_aes_xts_crypt() 75 ccp_aes_xts_setkey(struct crypto_skcipher *tfm, const u8 *key, unsigned int key_len) ccp_aes_xts_setkey() argument [all...] |
H A D | ccp-crypto-aes-galois.c | 30 unsigned int key_len) in ccp_aes_gcm_setkey() 34 switch (key_len) { in ccp_aes_gcm_setkey() 49 ctx->u.aes.key_len = key_len; in ccp_aes_gcm_setkey() 51 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_gcm_setkey() 52 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); in ccp_aes_gcm_setkey() 86 if (!ctx->u.aes.key_len) in ccp_aes_gcm_crypt() 124 rctx->cmd.u.aes.key_len = ctx->u.aes.key_len; in ccp_aes_gcm_crypt() 154 ctx->u.aes.key_len in ccp_aes_gcm_cra_init() 29 ccp_aes_gcm_setkey(struct crypto_aead *tfm, const u8 *key, unsigned int key_len) ccp_aes_gcm_setkey() argument [all...] |
/kernel/linux/linux-5.10/arch/arm64/crypto/ |
H A D | aes-ce-glue.c | 75 unsigned int key_len) in ce_aes_expandkey() 84 u32 kwords = key_len / sizeof(u32); in ce_aes_expandkey() 88 if (key_len != AES_KEYSIZE_128 && in ce_aes_expandkey() 89 key_len != AES_KEYSIZE_192 && in ce_aes_expandkey() 90 key_len != AES_KEYSIZE_256) in ce_aes_expandkey() 93 ctx->key_length = key_len; in ce_aes_expandkey() 107 if (key_len == AES_KEYSIZE_192) { in ce_aes_expandkey() 112 } else if (key_len == AES_KEYSIZE_256) { in ce_aes_expandkey() 143 unsigned int key_len) in ce_aes_setkey() 147 return ce_aes_expandkey(ctx, in_key, key_len); in ce_aes_setkey() 74 ce_aes_expandkey(struct crypto_aes_ctx *ctx, const u8 *in_key, unsigned int key_len) ce_aes_expandkey() argument 142 ce_aes_setkey(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) ce_aes_setkey() argument [all...] |
/kernel/linux/linux-6.6/arch/arm64/crypto/ |
H A D | aes-ce-glue.c | 75 unsigned int key_len) in ce_aes_expandkey() 84 u32 kwords = key_len / sizeof(u32); in ce_aes_expandkey() 88 if (key_len != AES_KEYSIZE_128 && in ce_aes_expandkey() 89 key_len != AES_KEYSIZE_192 && in ce_aes_expandkey() 90 key_len != AES_KEYSIZE_256) in ce_aes_expandkey() 93 ctx->key_length = key_len; in ce_aes_expandkey() 107 if (key_len == AES_KEYSIZE_192) { in ce_aes_expandkey() 112 } else if (key_len == AES_KEYSIZE_256) { in ce_aes_expandkey() 143 unsigned int key_len) in ce_aes_setkey() 147 return ce_aes_expandkey(ctx, in_key, key_len); in ce_aes_setkey() 74 ce_aes_expandkey(struct crypto_aes_ctx *ctx, const u8 *in_key, unsigned int key_len) ce_aes_expandkey() argument 142 ce_aes_setkey(struct crypto_tfm *tfm, const u8 *in_key, unsigned int key_len) ce_aes_setkey() argument [all...] |
/kernel/linux/linux-5.10/net/wireless/ |
H A D | lib80211_crypt_wep.c | 33 u8 key_len; member 77 klen = 3 + wep->key_len; in lib80211_wep_build_iv() 124 memcpy(key + 3, wep->key, wep->key_len); in lib80211_wep_encrypt() 128 klen = 3 + wep->key_len; in lib80211_wep_encrypt() 169 klen = 3 + wep->key_len; in lib80211_wep_decrypt() 172 memcpy(key + 3, wep->key, wep->key_len); in lib80211_wep_decrypt() 206 wep->key_len = len; in lib80211_wep_set_key() 215 if (len < wep->key_len) in lib80211_wep_get_key() 218 memcpy(key, wep->key, wep->key_len); in lib80211_wep_get_key() 220 return wep->key_len; in lib80211_wep_get_key() [all...] |
/kernel/linux/linux-6.6/net/wireless/ |
H A D | lib80211_crypt_wep.c | 33 u8 key_len; member 77 klen = 3 + wep->key_len; in lib80211_wep_build_iv() 124 memcpy(key + 3, wep->key, wep->key_len); in lib80211_wep_encrypt() 128 klen = 3 + wep->key_len; in lib80211_wep_encrypt() 169 klen = 3 + wep->key_len; in lib80211_wep_decrypt() 172 memcpy(key + 3, wep->key, wep->key_len); in lib80211_wep_decrypt() 206 wep->key_len = len; in lib80211_wep_set_key() 215 if (len < wep->key_len) in lib80211_wep_get_key() 218 memcpy(key, wep->key, wep->key_len); in lib80211_wep_get_key() 220 return wep->key_len; in lib80211_wep_get_key() [all...] |
/kernel/linux/linux-6.6/security/keys/trusted-keys/ |
H A D | trusted_core.c | 95 p->key_len = keylen; in datablob_parse() 154 size_t key_len; in trusted_instantiate() local 187 key_len = payload->key_len; in trusted_instantiate() 189 key_len); in trusted_instantiate() 193 if (ret != key_len) { in trusted_instantiate() 263 new_p->key_len = p->key_len; in trusted_update() 264 memcpy(new_p->key, p->key, p->key_len); in trusted_update() 323 static int kernel_get_random(unsigned char *key, size_t key_len) in kernel_get_random() argument [all...] |
/kernel/linux/linux-5.10/drivers/staging/rtl8192u/ieee80211/ |
H A D | ieee80211_crypt_wep.c | 29 u8 key_len; member 85 klen = 3 + wep->key_len; in prism2_wep_encrypt() 107 memcpy(key + 3, wep->key, wep->key_len); in prism2_wep_encrypt() 154 klen = 3 + wep->key_len; in prism2_wep_decrypt() 157 memcpy(key + 3, wep->key, wep->key_len); in prism2_wep_decrypt() 193 wep->key_len = len; in prism2_wep_set_key() 203 if (len < wep->key_len) in prism2_wep_get_key() 206 memcpy(key, wep->key, wep->key_len); in prism2_wep_get_key() 208 return wep->key_len; in prism2_wep_get_key() 217 wep->key_idx, wep->key_len); in prism2_wep_print_stats() [all...] |
/kernel/linux/linux-5.10/drivers/staging/rtl8192e/ |
H A D | rtllib_crypt_wep.c | 24 u8 key_len; member 83 klen = 3 + wep->key_len; in prism2_wep_encrypt() 105 memcpy(key + 3, wep->key, wep->key_len); in prism2_wep_encrypt() 153 klen = 3 + wep->key_len; in prism2_wep_decrypt() 156 memcpy(key + 3, wep->key, wep->key_len); in prism2_wep_decrypt() 192 wep->key_len = len; in prism2_wep_set_key() 202 if (len < wep->key_len) in prism2_wep_get_key() 205 memcpy(key, wep->key, wep->key_len); in prism2_wep_get_key() 207 return wep->key_len; in prism2_wep_get_key() 215 seq_printf(m, "key[%d] alg=WEP len=%d\n", wep->key_idx, wep->key_len); in prism2_wep_print_stats() [all...] |
/kernel/linux/linux-6.6/drivers/staging/rtl8192u/ieee80211/ |
H A D | ieee80211_crypt_wep.c | 29 u8 key_len; member 85 klen = 3 + wep->key_len; in prism2_wep_encrypt() 107 memcpy(key + 3, wep->key, wep->key_len); in prism2_wep_encrypt() 154 klen = 3 + wep->key_len; in prism2_wep_decrypt() 157 memcpy(key + 3, wep->key, wep->key_len); in prism2_wep_decrypt() 193 wep->key_len = len; in prism2_wep_set_key() 203 if (len < wep->key_len) in prism2_wep_get_key() 206 memcpy(key, wep->key, wep->key_len); in prism2_wep_get_key() 208 return wep->key_len; in prism2_wep_get_key() 217 wep->key_idx, wep->key_len); in prism2_wep_print_stats() [all...] |
/kernel/linux/linux-6.6/drivers/staging/rtl8192e/ |
H A D | rtllib_crypt_wep.c | 24 u8 key_len; member 81 klen = 3 + wep->key_len; in prism2_wep_encrypt() 103 memcpy(key + 3, wep->key, wep->key_len); in prism2_wep_encrypt() 150 klen = 3 + wep->key_len; in prism2_wep_decrypt() 153 memcpy(key + 3, wep->key, wep->key_len); in prism2_wep_decrypt() 188 wep->key_len = len; in prism2_wep_set_key() 197 if (len < wep->key_len) in prism2_wep_get_key() 200 memcpy(key, wep->key, wep->key_len); in prism2_wep_get_key() 202 return wep->key_len; in prism2_wep_get_key() 209 seq_printf(m, "key[%d] alg=WEP len=%d\n", wep->key_idx, wep->key_len); in prism2_wep_print_stats() [all...] |
/kernel/linux/linux-5.10/drivers/crypto/nx/ |
H A D | nx-aes-ctr.c | 24 unsigned int key_len) in ctr_aes_nx_set_key() 31 switch (key_len) { in ctr_aes_nx_set_key() 49 memcpy(csbcpb->cpb.aes_ctr.key, in_key, key_len); in ctr_aes_nx_set_key() 56 unsigned int key_len) in ctr3686_aes_nx_set_key() 60 if (key_len < CTR_RFC3686_NONCE_SIZE) in ctr3686_aes_nx_set_key() 64 in_key + key_len - CTR_RFC3686_NONCE_SIZE, in ctr3686_aes_nx_set_key() 67 key_len -= CTR_RFC3686_NONCE_SIZE; in ctr3686_aes_nx_set_key() 69 return ctr_aes_nx_set_key(tfm, in_key, key_len); in ctr3686_aes_nx_set_key() 22 ctr_aes_nx_set_key(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) ctr_aes_nx_set_key() argument 54 ctr3686_aes_nx_set_key(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) ctr3686_aes_nx_set_key() argument
|
/kernel/linux/linux-6.6/arch/powerpc/platforms/pseries/ |
H A D | plpks-secvar.c | 75 static int plpks_get_variable(const char *key, u64 key_len, u8 *data, in plpks_get_variable() argument 81 // We subtract 1 from key_len because we don't need to include the in plpks_get_variable() 83 var.name = kcalloc(key_len - 1, sizeof(wchar_t), GFP_KERNEL); in plpks_get_variable() 86 rc = utf8s_to_utf16s(key, key_len - 1, UTF16_LITTLE_ENDIAN, (wchar_t *)var.name, in plpks_get_variable() 87 key_len - 1); in plpks_get_variable() 115 static int plpks_set_variable(const char *key, u64 key_len, u8 *data, in plpks_set_variable() argument 127 // We subtract 1 from key_len because we don't need to include the in plpks_set_variable() 129 var.name = kcalloc(key_len - 1, sizeof(wchar_t), GFP_KERNEL); in plpks_set_variable() 132 rc = utf8s_to_utf16s(key, key_len - 1, UTF16_LITTLE_ENDIAN, (wchar_t *)var.name, in plpks_set_variable() 133 key_len in plpks_set_variable() [all...] |
/kernel/linux/linux-6.6/drivers/crypto/nx/ |
H A D | nx-aes-ctr.c | 24 unsigned int key_len) in ctr_aes_nx_set_key() 31 switch (key_len) { in ctr_aes_nx_set_key() 49 memcpy(csbcpb->cpb.aes_ctr.key, in_key, key_len); in ctr_aes_nx_set_key() 56 unsigned int key_len) in ctr3686_aes_nx_set_key() 60 if (key_len < CTR_RFC3686_NONCE_SIZE) in ctr3686_aes_nx_set_key() 64 in_key + key_len - CTR_RFC3686_NONCE_SIZE, in ctr3686_aes_nx_set_key() 67 key_len -= CTR_RFC3686_NONCE_SIZE; in ctr3686_aes_nx_set_key() 69 return ctr_aes_nx_set_key(tfm, in_key, key_len); in ctr3686_aes_nx_set_key() 22 ctr_aes_nx_set_key(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) ctr_aes_nx_set_key() argument 54 ctr3686_aes_nx_set_key(struct crypto_skcipher *tfm, const u8 *in_key, unsigned int key_len) ctr3686_aes_nx_set_key() argument
|
/kernel/linux/linux-5.10/drivers/crypto/bcm/ |
H A D | spu2.c | 1000 flow_log(" key: %d\n", cipher_parms->key_len); in spu2_create_request() 1001 flow_dump(" key: ", cipher_parms->key_buf, cipher_parms->key_len); in spu2_create_request() 1007 flow_log(" authkey: %d\n", hash_parms->key_len); in spu2_create_request() 1008 flow_dump(" authkey: ", hash_parms->key_buf, hash_parms->key_len); in spu2_create_request() 1034 hash_parms->key_len = cipher_parms->key_len; in spu2_create_request() 1036 cipher_parms->key_len); in spu2_create_request() 1037 cipher_parms->key_len = 0; in spu2_create_request() 1072 hash_parms->key_len, cipher_parms->key_len, in spu2_create_request() [all...] |