Lines Matching refs:dkc
69 struct default_key_c *dkc = ti->private; in default_key_dtr() local
72 if (dkc->dev) { in default_key_dtr()
73 err = blk_crypto_evict_key(bdev_get_queue(dkc->dev->bdev), in default_key_dtr()
74 &dkc->key); in default_key_dtr()
77 dm_put_device(ti, dkc->dev); in default_key_dtr()
79 kfree_sensitive(dkc->cipher_string); in default_key_dtr()
80 kfree_sensitive(dkc); in default_key_dtr()
86 struct default_key_c *dkc = ti->private; in default_key_ctr_optional() local
113 &dkc->sector_size, &dummy) == 1) { in default_key_ctr_optional()
114 if (dkc->sector_size < SECTOR_SIZE || in default_key_ctr_optional()
115 dkc->sector_size > 4096 || in default_key_ctr_optional()
116 !is_power_of_2(dkc->sector_size)) { in default_key_ctr_optional()
123 dkc->is_hw_wrapped = true; in default_key_ctr_optional()
131 if (dkc->sector_size != SECTOR_SIZE && !iv_large_sectors) { in default_key_ctr_optional()
149 struct default_key_c *dkc; in default_key_ctr() local
163 dkc = kzalloc(sizeof(*dkc), GFP_KERNEL); in default_key_ctr()
164 if (!dkc) { in default_key_ctr()
168 ti->private = dkc; in default_key_ctr()
171 dkc->cipher_string = kstrdup(argv[0], GFP_KERNEL); in default_key_ctr()
172 if (!dkc->cipher_string) { in default_key_ctr()
177 cipher = lookup_cipher(dkc->cipher_string); in default_key_ctr()
200 if (sscanf(argv[2], "%llu%c", &dkc->iv_offset, &dummy) != 1) { in default_key_ctr()
208 &dkc->dev); in default_key_ctr()
221 dkc->start = tmpll; in default_key_ctr()
224 dkc->sector_size = SECTOR_SIZE; in default_key_ctr()
230 dkc->sector_bits = ilog2(dkc->sector_size); in default_key_ctr()
231 if (ti->len & ((dkc->sector_size >> SECTOR_SHIFT) - 1)) { in default_key_ctr()
237 dkc->max_dun = (dkc->iv_offset + ti->len - 1) >> in default_key_ctr()
238 (dkc->sector_bits - SECTOR_SHIFT); in default_key_ctr()
239 dun_bytes = DIV_ROUND_UP(fls64(dkc->max_dun), 8); in default_key_ctr()
241 err = blk_crypto_init_key(&dkc->key, raw_key, raw_key_size, in default_key_ctr()
242 dkc->is_hw_wrapped, cipher->mode_num, in default_key_ctr()
243 dun_bytes, dkc->sector_size); in default_key_ctr()
249 err = blk_crypto_start_using_key(&dkc->key, in default_key_ctr()
250 bdev_get_queue(dkc->dev->bdev)); in default_key_ctr()
270 const struct default_key_c *dkc = ti->private; in default_key_map() local
274 bio_set_dev(bio, dkc->dev->bdev); in default_key_map()
285 bio->bi_iter.bi_sector = dkc->start + sector_in_target; in default_key_map()
303 dun[0] = dkc->iv_offset + sector_in_target; /* 512-byte sectors */ in default_key_map()
304 if (dun[0] & ((dkc->sector_size >> SECTOR_SHIFT) - 1)) in default_key_map()
306 dun[0] >>= dkc->sector_bits - SECTOR_SHIFT; /* crypto sectors */ in default_key_map()
312 if (WARN_ON_ONCE(dun[0] > dkc->max_dun)) in default_key_map()
315 bio_crypt_set_ctx(bio, &dkc->key, dun, GFP_NOIO); in default_key_map()
324 const struct default_key_c *dkc = ti->private; in default_key_status() local
335 DMEMIT("%s - %llu %s %llu", dkc->cipher_string, dkc->iv_offset, in default_key_status()
336 dkc->dev->name, (unsigned long long)dkc->start); in default_key_status()
339 if (dkc->sector_size != SECTOR_SIZE) in default_key_status()
341 if (dkc->is_hw_wrapped) in default_key_status()
347 if (dkc->sector_size != SECTOR_SIZE) { in default_key_status()
348 DMEMIT(" sector_size:%u", dkc->sector_size); in default_key_status()
351 if (dkc->is_hw_wrapped) in default_key_status()
361 const struct default_key_c *dkc = ti->private; in default_key_prepare_ioctl() local
362 const struct dm_dev *dev = dkc->dev; in default_key_prepare_ioctl()
367 if (dkc->start != 0 || in default_key_prepare_ioctl()
377 const struct default_key_c *dkc = ti->private; in default_key_iterate_devices() local
379 return fn(ti, dkc->dev, dkc->start, ti->len, data); in default_key_iterate_devices()
385 const struct default_key_c *dkc = ti->private; in default_key_io_hints() local
386 const unsigned int sector_size = dkc->sector_size; in default_key_io_hints()