/linux-4.1.27/include/crypto/ |
H A D | authenc.h | 23 __be32 enckeylen; member in struct:crypto_authenc_key_param 31 unsigned int enckeylen; member in struct:crypto_authenc_keys
|
/linux-4.1.27/drivers/crypto/caam/ |
H A D | caamalg.c | 74 /* Note: Nonce is counted in enckeylen */ 194 unsigned int enckeylen; member in struct:caam_ctx 204 unsigned int enckeylen = ctx->enckeylen; append_key_aead() local 209 * | enckeylen = encryption key size + nonce size append_key_aead() 212 enckeylen -= CTR_RFC3686_NONCE_SIZE; append_key_aead() 219 ctx->split_key_pad_len, enckeylen, append_key_aead() local 220 enckeylen, CLASS_1 | KEY_DEST_CLASS_REG); append_key_aead() local 225 enckeylen, CLASS_1 | KEY_DEST_CLASS_REG); append_key_aead() 231 enckeylen); append_key_aead() 470 if (!ctx->enckeylen) aead_set_sh_desc() 494 ctx->split_key_pad_len + ctx->enckeylen + aead_set_sh_desc() 563 ctx->split_key_pad_len + ctx->enckeylen + aead_set_sh_desc() 634 ctx->split_key_pad_len + ctx->enckeylen + aead_set_sh_desc() 749 if (!ctx->enckeylen || !ctx->authsize) gcm_set_sh_desc() 758 ctx->enckeylen <= CAAM_DESC_BYTES_MAX) gcm_set_sh_desc() 769 append_key_as_imm(desc, (void *)ctx->key, ctx->enckeylen, gcm_set_sh_desc() 770 ctx->enckeylen, CLASS_1 | KEY_DEST_CLASS_REG); gcm_set_sh_desc() 772 append_key(desc, ctx->key_dma, ctx->enckeylen, gcm_set_sh_desc() 866 ctx->enckeylen <= CAAM_DESC_BYTES_MAX) gcm_set_sh_desc() 878 append_key_as_imm(desc, (void *)ctx->key, ctx->enckeylen, gcm_set_sh_desc() 879 ctx->enckeylen, CLASS_1 | KEY_DEST_CLASS_REG); gcm_set_sh_desc() 881 append_key(desc, ctx->key_dma, ctx->enckeylen, gcm_set_sh_desc() 979 if (!ctx->enckeylen || !ctx->authsize) rfc4106_set_sh_desc() 988 ctx->enckeylen <= CAAM_DESC_BYTES_MAX) rfc4106_set_sh_desc() 999 append_key_as_imm(desc, (void *)ctx->key, ctx->enckeylen, rfc4106_set_sh_desc() 1000 ctx->enckeylen, CLASS_1 | KEY_DEST_CLASS_REG); rfc4106_set_sh_desc() 1002 append_key(desc, ctx->key_dma, ctx->enckeylen, rfc4106_set_sh_desc() 1021 append_fifo_load_as_imm(desc, (void *)(ctx->key + ctx->enckeylen), rfc4106_set_sh_desc() 1064 ctx->enckeylen <= CAAM_DESC_BYTES_MAX) rfc4106_set_sh_desc() 1075 append_key_as_imm(desc, (void *)ctx->key, ctx->enckeylen, rfc4106_set_sh_desc() 1076 ctx->enckeylen, CLASS_1 | KEY_DEST_CLASS_REG); rfc4106_set_sh_desc() 1078 append_key(desc, ctx->key_dma, ctx->enckeylen, rfc4106_set_sh_desc() 1098 append_fifo_load_as_imm(desc, (void *)(ctx->key + ctx->enckeylen), rfc4106_set_sh_desc() 1141 ctx->split_key_pad_len + ctx->enckeylen <= rfc4106_set_sh_desc() 1154 append_key_as_imm(desc, (void *)ctx->key, ctx->enckeylen, rfc4106_set_sh_desc() 1155 ctx->enckeylen, CLASS_1 | KEY_DEST_CLASS_REG); rfc4106_set_sh_desc() 1157 append_key(desc, ctx->key_dma, ctx->enckeylen, rfc4106_set_sh_desc() 1193 append_data(desc, (void *)(ctx->key + ctx->enckeylen), 4); rfc4106_set_sh_desc() 1261 if (!ctx->enckeylen || !ctx->authsize) rfc4543_set_sh_desc() 1270 ctx->enckeylen <= CAAM_DESC_BYTES_MAX) rfc4543_set_sh_desc() 1281 append_key_as_imm(desc, (void *)ctx->key, ctx->enckeylen, rfc4543_set_sh_desc() 1282 ctx->enckeylen, CLASS_1 | KEY_DEST_CLASS_REG); rfc4543_set_sh_desc() 1284 append_key(desc, ctx->key_dma, ctx->enckeylen, rfc4543_set_sh_desc() 1318 append_data(desc, (void *)(ctx->key + ctx->enckeylen), 4); rfc4543_set_sh_desc() 1386 ctx->enckeylen <= CAAM_DESC_BYTES_MAX) rfc4543_set_sh_desc() 1397 append_key_as_imm(desc, (void *)ctx->key, ctx->enckeylen, rfc4543_set_sh_desc() 1398 ctx->enckeylen, CLASS_1 | KEY_DEST_CLASS_REG); rfc4543_set_sh_desc() 1400 append_key(desc, ctx->key_dma, ctx->enckeylen, rfc4543_set_sh_desc() 1445 append_data(desc, (void *)(ctx->key + ctx->enckeylen), 4); rfc4543_set_sh_desc() 1508 ctx->enckeylen <= CAAM_DESC_BYTES_MAX) rfc4543_set_sh_desc() 1520 append_key_as_imm(desc, (void *)ctx->key, ctx->enckeylen, rfc4543_set_sh_desc() 1521 ctx->enckeylen, CLASS_1 | KEY_DEST_CLASS_REG); rfc4543_set_sh_desc() 1523 append_key(desc, ctx->key_dma, ctx->enckeylen, rfc4543_set_sh_desc() 1578 append_data(desc, (void *)(ctx->key + ctx->enckeylen), 4); rfc4543_set_sh_desc() 1671 if (ctx->split_key_pad_len + keys.enckeylen > CAAM_MAX_KEY_SIZE) aead_setkey() 1675 printk(KERN_ERR "keylen %d enckeylen %d authkeylen %d\n", aead_setkey() 1676 keys.authkeylen + keys.enckeylen, keys.enckeylen, aead_setkey() 1690 memcpy(ctx->key + ctx->split_key_pad_len, keys.enckey, keys.enckeylen); aead_setkey() 1693 keys.enckeylen, DMA_TO_DEVICE); aead_setkey() 1701 ctx->split_key_pad_len + keys.enckeylen, 1); aead_setkey() 1704 ctx->enckeylen = keys.enckeylen; aead_setkey() 1709 keys.enckeylen, DMA_TO_DEVICE); aead_setkey() 1737 ctx->enckeylen = keylen; gcm_setkey() 1741 dma_unmap_single(jrdev, ctx->key_dma, ctx->enckeylen, gcm_setkey() 1769 ctx->enckeylen = keylen - 4; rfc4106_setkey() 1771 ctx->key_dma = dma_map_single(jrdev, ctx->key, ctx->enckeylen, rfc4106_setkey() 1780 dma_unmap_single(jrdev, ctx->key_dma, ctx->enckeylen, rfc4106_setkey() 1808 ctx->enckeylen = keylen - 4; rfc4543_setkey() 1810 ctx->key_dma = dma_map_single(jrdev, ctx->key, ctx->enckeylen, rfc4543_setkey() 1819 dma_unmap_single(jrdev, ctx->key_dma, ctx->enckeylen, rfc4543_setkey() 1874 ctx->enckeylen = keylen; ablkcipher_setkey() 1884 append_key_as_imm(desc, (void *)ctx->key, ctx->enckeylen, ablkcipher_setkey() 1885 ctx->enckeylen, CLASS_1 | ablkcipher_setkey() 1943 append_key_as_imm(desc, (void *)ctx->key, ctx->enckeylen, ablkcipher_setkey() 1944 ctx->enckeylen, CLASS_1 | ablkcipher_setkey() 2006 append_key_as_imm(desc, (void *)ctx->key, ctx->enckeylen, ablkcipher_setkey() 2007 ctx->enckeylen, CLASS_1 | ablkcipher_setkey() 4176 ctx->enckeylen + ctx->split_key_pad_len, caam_cra_exit()
|
/linux-4.1.27/drivers/crypto/qce/ |
H A D | common.c | 198 unsigned int enckeylen, unsigned int cryptlen) qce_xtskey() 201 unsigned int xtsklen = enckeylen / (2 * sizeof(u32)); qce_xtskey() 204 qce_cpu_to_be32p_array((__be32 *)xtskey, enckey + enckeylen / 2, qce_xtskey() 205 enckeylen / 2); qce_xtskey() 197 qce_xtskey(struct qce_device *qce, const u8 *enckey, unsigned int enckeylen, unsigned int cryptlen) qce_xtskey() argument
|
/linux-4.1.27/crypto/ |
H A D | authenc.c | 69 keys->enckeylen = be32_to_cpu(param->enckeylen); crypto_authenc_extractkeys() 74 if (keylen < keys->enckeylen) crypto_authenc_extractkeys() 77 keys->authkeylen = keylen - keys->enckeylen; crypto_authenc_extractkeys() 110 err = crypto_ablkcipher_setkey(enc, keys.enckey, keys.enckeylen); crypto_authenc_setkey()
|
H A D | authencesn.c | 84 err = crypto_ablkcipher_setkey(enc, keys.enckey, keys.enckeylen); crypto_authenc_esn_setkey()
|
/linux-4.1.27/drivers/crypto/qat/qat_common/ |
H A D | qat_algs.c | 291 sizeof(struct icp_qat_hw_auth_setup) + keys->enckeylen); qat_alg_aead_init_enc_session() 301 memcpy(cipher->aes.key, keys->enckey, keys->enckeylen); qat_alg_aead_init_enc_session() 324 cipher_cd_ctrl->cipher_key_sz = keys->enckeylen >> 3; qat_alg_aead_init_enc_session() 386 memcpy(cipher->aes.key, keys->enckey, keys->enckeylen); qat_alg_aead_init_dec_session() 410 cipher_cd_ctrl->cipher_key_sz = keys->enckeylen >> 3; qat_alg_aead_init_dec_session() 530 if (qat_alg_validate_key(keys.enckeylen, &alg)) qat_alg_aead_init_sessions()
|
/linux-4.1.27/drivers/crypto/ |
H A D | ixp4xx_crypto.c | 1159 if (keys.enckeylen > sizeof(ctx->enckey)) aead_setkey() 1163 memcpy(ctx->enckey, keys.enckey, keys.enckeylen); aead_setkey() 1165 ctx->enckey_len = keys.enckeylen; aead_setkey()
|
H A D | talitos.c | 647 unsigned int enckeylen; member in struct:talitos_ctx 688 if (keys.authkeylen + keys.enckeylen > TALITOS_MAX_KEY_SIZE) aead_setkey() 692 memcpy(&ctx->key[keys.authkeylen], keys.enckey, keys.enckeylen); aead_setkey() 694 ctx->keylen = keys.authkeylen + keys.enckeylen; aead_setkey() 695 ctx->enckeylen = keys.enckeylen; aead_setkey() 1000 map_single_talitos_ptr(dev, &desc->ptr[3], ctx->enckeylen, ipsec_esp()
|
H A D | picoxcell_crypto.c | 504 if (keys.enckeylen > AES_MAX_KEY_SIZE) spacc_aead_setkey() 512 err = spacc_aead_aes_setkey(tfm, keys.enckey, keys.enckeylen); spacc_aead_setkey() 514 err = spacc_aead_des_setkey(tfm, keys.enckey, keys.enckeylen); spacc_aead_setkey()
|
/linux-4.1.27/net/ipv4/ |
H A D | esp4.c | 622 param->enckeylen = cpu_to_be32((x->ealg->alg_key_len + 7) / 8); esp_init_authenc()
|
/linux-4.1.27/net/ipv6/ |
H A D | esp6.c | 564 param->enckeylen = cpu_to_be32((x->ealg->alg_key_len + 7) / 8); esp_init_authenc()
|