Lines Matching refs:keylen
455 get_aes_decrypt_key(tc->tctx->dec_key, tc->tctx->init.key, tc->tctx->init.keylen); in setup_key_dl_desc()
459 key_desc->dma_descr->after = key_desc->dma_descr->buf + tc->tctx->init.keylen/8; in setup_key_dl_desc()
462 key_desc->dma_descr->after = key_desc->dma_descr->buf + tc->tctx->init.keylen/8; in setup_key_dl_desc()
466 switch (tc->tctx->init.keylen) { in setup_key_dl_desc()
1463 if (tinit->keylen != 0) { in transform_ok()
1464 …_API(printk("transform_ok: non-zero keylength, %d, for a digest/csum algorithm\n", tinit->keylen)); in transform_ok()
1469 if (tinit->keylen != 64) { in transform_ok()
1470 DEBUG_API(printk("transform_ok: keylen %d invalid for DES\n", tinit->keylen)); in transform_ok()
1475 if (tinit->keylen != 192) { in transform_ok()
1476 DEBUG_API(printk("transform_ok: keylen %d invalid for 3DES\n", tinit->keylen)); in transform_ok()
1481 if (tinit->keylen != 128 && tinit->keylen != 192 && tinit->keylen != 256) { in transform_ok()
1482 DEBUG_API(printk("transform_ok: keylen %d invalid for AES\n", tinit->keylen)); in transform_ok()
2987 if (!access_ok(VERIFY_READ, sop.key, sop.keylen)) return -EFAULT; in cryptocop_ioctl_create_session()
3017 copy_from_user(ti_cipher.key, sop.key, sop.keylen/8); in cryptocop_ioctl_create_session()
3018 ti_cipher.keylen = sop.keylen; in cryptocop_ioctl_create_session()