| /linux-6.15/include/crypto/ |
| H A D | blake2s.h | 47 const void *key, size_t keylen) in __blake2s_init() argument 63 if (keylen) { in __blake2s_init() 64 memcpy(state->buf, key, keylen); in __blake2s_init() 65 memset(&state->buf[keylen], 0, BLAKE2S_BLOCK_SIZE - keylen); in __blake2s_init() 78 const size_t keylen) in blake2s_init_key() argument 81 !key || !keylen || keylen > BLAKE2S_KEY_SIZE)); in blake2s_init_key() 83 __blake2s_init(state, outlen, key, keylen); in blake2s_init_key() 91 const size_t keylen) in blake2s() argument 96 outlen > BLAKE2S_HASH_SIZE || keylen > BLAKE2S_KEY_SIZE || in blake2s() 97 (!key && keylen))); in blake2s() [all …]
|
| H A D | xts.h | 12 const u8 *key, unsigned int keylen) in xts_verify_key() argument 18 if (keylen % 2) in xts_verify_key() 25 if (fips_enabled && keylen != 32 && keylen != 64) in xts_verify_key() 34 !crypto_memneq(key, key + (keylen / 2), keylen / 2)) in xts_verify_key()
|
| H A D | blake2b.h | 43 const void *key, size_t keylen) in __blake2b_init() argument 45 state->h[0] = BLAKE2B_IV0 ^ (0x01010000 | keylen << 8 | outlen); in __blake2b_init() 59 if (keylen) { in __blake2b_init() 60 memcpy(state->buf, key, keylen); in __blake2b_init() 61 memset(&state->buf[keylen], 0, BLAKE2B_BLOCK_SIZE - keylen); in __blake2b_init()
|
| /linux-6.15/fs/cachefiles/ |
| H A D | key.c | 41 unsigned int acc, i, n, nle, nbe, keylen = object->cookie->key_len; in cachefiles_cook_key() local 45 _enter(",%u,%*phN", keylen, keylen, key); in cachefiles_cook_key() 47 BUG_ON(keylen > NAME_MAX - 3); in cachefiles_cook_key() 50 for (i = 0; i < keylen; i++) { in cachefiles_cook_key() 57 len = 1 + keylen; in cachefiles_cook_key() 63 memcpy(name + 1, key, keylen); in cachefiles_cook_key() 71 n = round_up(keylen, 4); in cachefiles_cook_key() 81 b64len = DIV_ROUND_UP(keylen, 3); in cachefiles_cook_key() 82 pad = b64len * 3 - keylen; in cachefiles_cook_key() 84 _debug("len=%u nbe=%u nle=%u b64=%u", keylen, nbe, nle, b64len); in cachefiles_cook_key() [all …]
|
| /linux-6.15/drivers/crypto/amcc/ |
| H A D | crypto4xx_alg.c | 123 unsigned int keylen, in crypto4xx_setkey_aes() argument 131 if (keylen != AES_KEYSIZE_256 && keylen != AES_KEYSIZE_192 && in crypto4xx_setkey_aes() 132 keylen != AES_KEYSIZE_128) in crypto4xx_setkey_aes() 161 key, keylen); in crypto4xx_setkey_aes() 276 unsigned int keylen) in crypto4xx_sk_setup_fallback() argument 355 unsigned int keylen) in crypto4xx_aead_setup_fallback() argument 368 unsigned int keylen) in crypto4xx_setkey_aes_ccm() argument 484 switch (keylen) { in crypto4xx_aes_gcm_validate_keylen() 495 unsigned int keylen) in crypto4xx_compute_gcm_hash_key_sw() argument 553 key, keylen); in crypto4xx_setkey_aes_gcm() [all …]
|
| /linux-6.15/fs/hfs/ |
| H A D | bfind.c | 58 u16 off, len, keylen; in __hfs_brec_find() local 70 if (keylen == 0) { in __hfs_brec_find() 89 if (keylen == 0) { in __hfs_brec_find() 98 fd->keylength = keylen; in __hfs_brec_find() 99 fd->entryoffset = off + keylen; in __hfs_brec_find() 100 fd->entrylength = len - keylen; in __hfs_brec_find() 179 u16 off, len, keylen; in hfs_brec_goto() local 225 if (keylen == 0) { in hfs_brec_goto() 230 fd->keylength = keylen; in hfs_brec_goto() 231 fd->entryoffset = off + keylen; in hfs_brec_goto() [all …]
|
| /linux-6.15/fs/hfsplus/ |
| H A D | bfind.c | 106 u16 off, len, keylen; in __hfs_brec_find() local 119 if (keylen == 0) { in __hfs_brec_find() 133 if (keylen == 0) { in __hfs_brec_find() 143 fd->keylength = keylen; in __hfs_brec_find() 144 fd->entryoffset = off + keylen; in __hfs_brec_find() 145 fd->entrylength = len - keylen; in __hfs_brec_find() 225 u16 off, len, keylen; in hfs_brec_goto() local 271 if (keylen == 0) { in hfs_brec_goto() 276 fd->keylength = keylen; in hfs_brec_goto() 277 fd->entryoffset = off + keylen; in hfs_brec_goto() [all …]
|
| /linux-6.15/arch/riscv/crypto/ |
| H A D | aes-riscv64-zvkned.S | 61 aes_crypt v16, \enc, \keylen 86 .macro __aes_ecb_crypt enc, keylen argument 94 aes_crypt v16, \enc, \keylen 125 .macro aes_cbc_encrypt keylen argument 141 .macro aes_cbc_decrypt keylen argument 188 .macro aes_cbc_cts_encrypt keylen argument 227 aes_encrypt v16, \keylen 236 .macro aes_cbc_cts_decrypt keylen argument 318 .macro aes_cbc_cts_crypt keylen argument 321 aes_cbc_cts_encrypt \keylen [all …]
|
| H A D | aes-macros.S | 96 .macro aes_encrypt data, keylen argument 107 .if \keylen == 128 109 .elseif \keylen == 192 123 .macro aes_decrypt data, keylen argument 124 .if \keylen == 128 126 .elseif \keylen == 192 150 .macro aes_crypt data, enc, keylen argument 152 aes_encrypt \data, \keylen 154 aes_decrypt \data, \keylen
|
| /linux-6.15/drivers/s390/crypto/ |
| H A D | pkey_pckmo.c | 28 static bool is_pckmo_key(const u8 *key, u32 keylen) in is_pckmo_key() argument 33 if (keylen < sizeof(*hdr)) in is_pckmo_key() 224 if (keylen < sizeof(*hdr)) in pckmo_key2protkey() 234 if (keylen < sizeof(*t)) in pckmo_key2protkey() 270 if (keylen < sizeof(*t) || in pckmo_key2protkey() 271 keylen < sizeof(*t) + t->len) in pckmo_key2protkey() 361 if (keylen < sizeof(*hdr)) in pckmo_verify_key() 371 if (keylen < sizeof(*t)) in pckmo_verify_key() 408 const u8 *key, u32 keylen, in pkey_pckmo_key2protkey() argument 411 return pckmo_key2protkey(key, keylen, in pkey_pckmo_key2protkey() [all …]
|
| H A D | pkey_api.c | 33 key, keylen, in key2protkey() 40 key, keylen, in key2protkey() 77 if (!ukey || keylen < MINKEYBLOBBUFSIZE || keylen > KEYBLOBBUFSIZE) in _copy_key_from_user() 80 return memdup_user(ukey, keylen); in _copy_key_from_user() 170 u32 keylen; in pkey_ioctl_clr2protk() local 179 if (!keylen) { in pkey_ioctl_clr2protk() 194 t->len = keylen; in pkey_ioctl_clr2protk() 425 if (kgs.keylen < klen) { in pkey_ioctl_genseck2() 434 kgs.keylen = klen; in pkey_ioctl_genseck2() 483 if (kcs.keylen < klen) { in pkey_ioctl_clr2seck2() [all …]
|
| H A D | pkey_base.h | 158 bool (*is_supported_key)(const u8 *key, u32 keylen); 161 const u8 *key, u32 keylen, 165 const u8 *key, u32 keylen, 177 int (*verify_key)(const u8 *key, u32 keylen, 180 int (*apqns_for_key)(const u8 *key, u32 keylen, u32 flags, 196 const struct pkey_handler *pkey_handler_get_keybased(const u8 *key, u32 keylen); 201 const u8 *key, u32 keylen, 205 const u8 *key, u32 keylen, 217 int pkey_handler_verify_key(const u8 *key, u32 keylen, 220 int pkey_handler_apqns_for_key(const u8 *key, u32 keylen, u32 flags,
|
| H A D | pkey_base.c | 101 if (h->is_supported_key(key, keylen)) { in pkey_handler_get_keybased() 152 const u8 *key, u32 keylen, in pkey_handler_key_to_protkey() argument 158 h = pkey_handler_get_keybased(key, keylen); in pkey_handler_key_to_protkey() 160 rc = h->key_to_protkey(apqns, nr_apqns, key, keylen, in pkey_handler_key_to_protkey() 178 const u8 *key, u32 keylen, in pkey_handler_slowpath_key_to_protkey() argument 200 key, keylen, in pkey_handler_slowpath_key_to_protkey() 251 int pkey_handler_verify_key(const u8 *key, u32 keylen, in pkey_handler_verify_key() argument 258 h = pkey_handler_get_keybased(key, keylen); in pkey_handler_verify_key() 260 rc = h->verify_key(key, keylen, card, dom, in pkey_handler_verify_key() 275 h = pkey_handler_get_keybased(key, keylen); in pkey_handler_apqns_for_key() [all …]
|
| /linux-6.15/drivers/crypto/cavium/cpt/ |
| H A D | cptvf_algs.c | 233 u32 keylen) in cvm_xts_setkey() argument 238 const u8 *key2 = key + (keylen / 2); in cvm_xts_setkey() 243 ctx->key_len = keylen; in cvm_xts_setkey() 263 if ((keylen == 16) || (keylen == 24) || (keylen == 32)) { in cvm_validate_keylen() 264 ctx->key_len = keylen; in cvm_validate_keylen() 289 u32 keylen, u8 cipher_type) in cvm_setkey() argument 295 memcpy(ctx->enc_key, key, keylen); in cvm_setkey() 303 u32 keylen) in cvm_cbc_aes_setkey() argument 309 u32 keylen) in cvm_ecb_aes_setkey() argument 315 u32 keylen) in cvm_cbc_des3_setkey() argument [all …]
|
| /linux-6.15/crypto/asymmetric_keys/ |
| H A D | public_key.c | 185 memcpy(key, pkey->key, pkey->keylen); in software_key_query() 186 ptr = key + pkey->keylen; in software_key_query() 199 ret = crypto_sig_set_privkey(sig, key, pkey->keylen); in software_key_query() 201 ret = crypto_sig_set_pubkey(sig, key, pkey->keylen); in software_key_query() 285 memcpy(key, pkey->key, pkey->keylen); in software_key_eds_op() 286 ptr = key + pkey->keylen; in software_key_eds_op() 301 ret = crypto_sig_set_pubkey(sig, key, pkey->keylen); in software_key_eds_op() 409 memcpy(key, pkey->key, pkey->keylen); in public_key_verify_signature() 410 ptr = key + pkey->keylen; in public_key_verify_signature() 416 ret = crypto_sig_set_privkey(tfm, key, pkey->keylen); in public_key_verify_signature() [all …]
|
| /linux-6.15/crypto/ |
| H A D | cipher.c | 21 unsigned int keylen) in setkey_unaligned() argument 29 absize = keylen + alignmask; in setkey_unaligned() 35 memcpy(alignbuffer, key, keylen); in setkey_unaligned() 36 ret = cia->cia_setkey(crypto_cipher_tfm(tfm), alignbuffer, keylen); in setkey_unaligned() 43 const u8 *key, unsigned int keylen) in crypto_cipher_setkey() argument 48 if (keylen < cia->cia_min_keysize || keylen > cia->cia_max_keysize) in crypto_cipher_setkey() 52 return setkey_unaligned(tfm, key, keylen); in crypto_cipher_setkey() 54 return cia->cia_setkey(crypto_cipher_tfm(tfm), key, keylen); in crypto_cipher_setkey()
|
| /linux-6.15/arch/s390/crypto/ |
| H A D | paes_s390.c | 63 unsigned int keylen; member 94 unsigned int keylen) in _key_to_kb() argument 96 switch (keylen) { in _key_to_kb() 102 kb->keylen = make_clrkey_token(key, keylen, kb->keybuf); in _key_to_kb() 115 kb->keylen = keylen; in _key_to_kb() 124 unsigned int keylen) in _xts_key_to_kb() argument 126 size_t cklen = keylen / 2; in _xts_key_to_kb() 130 switch (keylen) { in _xts_key_to_kb() 149 kb->keylen = keylen; in _xts_key_to_kb() 484 if (ctx->kb.keylen % 2) in __xts_paes_convert_key() [all …]
|
| /linux-6.15/drivers/crypto/caam/ |
| H A D | key_gen.c | 45 struct alginfo * const adata, const u8 *key_in, u32 keylen, in gen_split_key() argument 54 adata->keylen = split_key_len(adata->algtype & OP_ALG_ALGSEL_MASK); in gen_split_key() 57 local_max = max(keylen, adata->keylen_pad); in gen_split_key() 60 adata->keylen, adata->keylen_pad); in gen_split_key() 62 DUMP_PREFIX_ADDRESS, 16, 4, key_in, keylen, 1); in gen_split_key() 73 memcpy(key_out, key_in, keylen); in gen_split_key() 82 append_key(desc, dma_addr, keylen, CLASS_2 | KEY_DEST_CLASS_REG); in gen_split_key() 100 append_fifo_store(desc, dma_addr, adata->keylen, in gen_split_key()
|
| H A D | caamhash_desc.c | 36 if (state != OP_ALG_AS_UPDATE && adata->keylen) { in cnstr_shdsc_ahash() 46 adata->keylen, CLASS_2 | in cnstr_shdsc_ahash() 98 append_key_as_imm(desc, adata->key_virt, adata->keylen, in cnstr_shdsc_sk_hash() 99 adata->keylen, CLASS_1 | KEY_DEST_CLASS_REG); in cnstr_shdsc_sk_hash() 103 append_key(desc, adata->key_dma, adata->keylen, in cnstr_shdsc_sk_hash() 106 append_key_as_imm(desc, adata->key_virt, adata->keylen, in cnstr_shdsc_sk_hash() 107 adata->keylen, CLASS_1 | in cnstr_shdsc_sk_hash() 138 append_fifo_store(desc, adata->key_dma, adata->keylen, in cnstr_shdsc_sk_hash()
|
| /linux-6.15/net/mac80211/ |
| H A D | wep.c | 41 if (B >= 3 && B < 3 + keylen) in ieee80211_wep_weak_iv() 49 int keylen, int keyidx, u8 *iv) in ieee80211_wep_get_iv() argument 52 if (ieee80211_wep_weak_iv(local->wep_iv, keylen)) in ieee80211_wep_get_iv() 67 int keylen, int keyidx) in ieee80211_wep_add_iv() argument 134 const u8 *key, int keylen, int keyidx) in ieee80211_wep_encrypt() argument 143 iv = ieee80211_wep_add_iv(local, skb, keylen, keyidx); in ieee80211_wep_encrypt() 153 memcpy(rc4key + 3, key, keylen); in ieee80211_wep_encrypt() 218 klen = 3 + key->conf.keylen; in ieee80211_wep_decrypt() 224 memcpy(rc4key + 3, key->conf.key, key->conf.keylen); in ieee80211_wep_decrypt() 278 tx->key->conf.keylen, in wep_encrypt_skb() [all …]
|
| /linux-6.15/drivers/net/wireless/silabs/wfx/ |
| H A D | key.c | 36 WARN(key->keylen > sizeof(msg->key_data), "inconsistent data"); in fill_wep_pair() 37 msg->key_length = key->keylen; in fill_wep_pair() 38 memcpy(msg->key_data, key->key, key->keylen); in fill_wep_pair() 46 WARN(key->keylen > sizeof(msg->key_data), "inconsistent data"); in fill_wep_group() 48 msg->key_length = key->keylen; in fill_wep_group() 49 memcpy(msg->key_data, key->key, key->keylen); in fill_wep_group() 93 WARN(key->keylen != sizeof(msg->aes_key_data), "inconsistent data"); in fill_ccmp_pair() 95 memcpy(msg->aes_key_data, key->key, key->keylen); in fill_ccmp_pair() 102 WARN(key->keylen != sizeof(msg->aes_key_data), "inconsistent data"); in fill_ccmp_group() 103 memcpy(msg->aes_key_data, key->key, key->keylen); in fill_ccmp_group() [all …]
|
| /linux-6.15/include/crypto/internal/ |
| H A D | blake2b.h | 69 unsigned int keylen; member 73 const u8 *key, unsigned int keylen) in crypto_blake2b_setkey() argument 77 if (keylen == 0 || keylen > BLAKE2B_KEY_SIZE) in crypto_blake2b_setkey() 80 memcpy(tctx->key, key, keylen); in crypto_blake2b_setkey() 81 tctx->keylen = keylen; in crypto_blake2b_setkey() 92 __blake2b_init(state, outlen, tctx->key, tctx->keylen); in crypto_blake2b_init()
|
| /linux-6.15/drivers/crypto/tegra/ |
| H A D | tegra-se-key.c | 52 const u32 *key, u32 keylen, u16 slot, u32 alg) in tegra_key_prep_ins_cmd() argument 62 cpuvaddr[i++] = se->manifest(se->owner, alg, keylen); in tegra_key_prep_ins_cmd() 68 for (j = 0; j < keylen / 4; j++) { in tegra_key_prep_ins_cmd() 94 slot, se->manifest(se->owner, alg, keylen)); in tegra_key_prep_ins_cmd() 115 u32 keylen, u16 slot, u32 alg) in tegra_key_insert() argument 123 size = tegra_key_prep_ins_cmd(se, addr, keyval, keylen, slot, alg); in tegra_key_insert() 156 u32 keylen, u32 alg, u32 *keyid) in tegra_key_submit_reserved() argument 158 return tegra_key_insert(se, key, keylen, *keyid, alg); in tegra_key_submit_reserved() 161 int tegra_key_submit(struct tegra_se *se, const u8 *key, u32 keylen, u32 alg, u32 *keyid) in tegra_key_submit() argument 174 ret = tegra_key_insert(se, key, keylen, *keyid, alg); in tegra_key_submit()
|
| /linux-6.15/drivers/crypto/cavium/nitrox/ |
| H A D | nitrox_skcipher.c | 167 unsigned int keylen) in nitrox_skcipher_setkey() argument 192 memcpy(fctx->crypto.u.key, key, keylen); in nitrox_skcipher_setkey() 198 unsigned int keylen) in nitrox_aes_setkey() argument 202 aes_keylen = flexi_aes_keylen(keylen); in nitrox_aes_setkey() 338 const u8 *key, unsigned int keylen) in nitrox_aes_xts_setkey() argument 348 keylen /= 2; in nitrox_aes_xts_setkey() 350 aes_keylen = flexi_aes_keylen(keylen); in nitrox_aes_xts_setkey() 356 memcpy(fctx->auth.u.key2, (key + keylen), keylen); in nitrox_aes_xts_setkey() 368 if (keylen < CTR_RFC3686_NONCE_SIZE) in nitrox_aes_ctr_rfc3686_setkey() 376 keylen -= CTR_RFC3686_NONCE_SIZE; in nitrox_aes_ctr_rfc3686_setkey() [all …]
|
| /linux-6.15/drivers/crypto/intel/qat/qat_common/ |
| H A D | qat_algs.c | 432 memcpy(cd->ucs_aes.key, key, keylen); in qat_alg_skcipher_init_com() 433 keylen = keylen / 2; in qat_alg_skcipher_init_com() 438 keylen = round_up(keylen, 16); in qat_alg_skcipher_init_com() 440 memcpy(cd->aes.key, key, keylen); in qat_alg_skcipher_init_com() 444 cd_ctrl->cipher_key_sz = keylen >> 3; in qat_alg_skcipher_init_com() 472 if (keylen == AES_KEYSIZE_128) { in qat_alg_xts_reverse_key() 576 unsigned int keylen, in qat_alg_skcipher_init_sessions() argument 590 unsigned int keylen) in qat_alg_aead_rekey() argument 604 unsigned int keylen) in qat_alg_aead_newkey() argument 656 unsigned int keylen) in qat_alg_aead_setkey() argument [all …]
|