| /OK3568_Linux_fs/kernel/drivers/staging/wlan-ng/ |
| H A D | p80211wep.c | 67 int wep_change_key(struct wlandevice *wlandev, int keynum, u8 *key, int keylen) in wep_change_key() argument 69 if (keylen < 0) in wep_change_key() 71 if (keylen >= MAX_KEYLEN) in wep_change_key() 80 wlandev->wep_keylens[keynum] = keylen; in wep_change_key() 81 memcpy(wlandev->wep_keys[keynum], key, keylen); in wep_change_key() 93 u32 i, j, k, crc, keylen; in wep_decrypt() local 113 keylen = wlandev->wep_keylens[keyidx]; in wep_decrypt() 115 if (keylen == 0) in wep_decrypt() 119 memcpy(key + 3, wlandev->wep_keys[keyidx], keylen); in wep_decrypt() 121 keylen += 3; /* add in IV bytes */ in wep_decrypt() [all …]
|
| /OK3568_Linux_fs/kernel/include/crypto/ |
| H A D | blake2s.h | 47 const void *key, size_t keylen) in __blake2s_init() argument 49 state->h[0] = BLAKE2S_IV0 ^ (0x01010000 | keylen << 8 | outlen); in __blake2s_init() 63 if (keylen) { in __blake2s_init() 64 memcpy(state->buf, key, keylen); in __blake2s_init() 65 memset(&state->buf[keylen], 0, BLAKE2S_BLOCK_SIZE - keylen); in __blake2s_init() 78 const size_t keylen) in blake2s_init_key() argument 81 !key || !keylen || keylen > BLAKE2S_KEY_SIZE)); in blake2s_init_key() 83 __blake2s_init(state, outlen, key, keylen); in blake2s_init_key() 91 const size_t keylen) in blake2s() argument 96 outlen > BLAKE2S_HASH_SIZE || keylen > BLAKE2S_KEY_SIZE || in blake2s() [all …]
|
| H A D | xts.h | 12 const u8 *key, unsigned int keylen) in xts_check_key() argument 18 if (keylen % 2) in xts_check_key() 22 if (fips_enabled && !crypto_memneq(key, key + (keylen / 2), keylen / 2)) in xts_check_key() 29 const u8 *key, unsigned int keylen) in xts_verify_key() argument 35 if (keylen % 2) in xts_verify_key() 41 !crypto_memneq(key, key + (keylen / 2), keylen / 2)) in xts_verify_key()
|
| H A D | blake2b.h | 44 const void *key, size_t keylen) in __blake2b_init() argument 46 state->h[0] = BLAKE2B_IV0 ^ (0x01010000 | keylen << 8 | outlen); in __blake2b_init() 60 if (keylen) { in __blake2b_init() 61 memcpy(state->buf, key, keylen); in __blake2b_init() 62 memset(&state->buf[keylen], 0, BLAKE2B_BLOCK_SIZE - keylen); in __blake2b_init()
|
| /OK3568_Linux_fs/kernel/drivers/crypto/amcc/ |
| H A D | crypto4xx_alg.c | 123 unsigned int keylen, in crypto4xx_setkey_aes() argument 131 if (keylen != AES_KEYSIZE_256 && keylen != AES_KEYSIZE_192 && in crypto4xx_setkey_aes() 132 keylen != AES_KEYSIZE_128) in crypto4xx_setkey_aes() 139 rc = crypto4xx_alloc_sa(ctx, SA_AES128_LEN + (keylen-16) / 4); in crypto4xx_setkey_aes() 161 key, keylen); in crypto4xx_setkey_aes() 162 sa->sa_contents.w = SA_AES_CONTENTS | (keylen << 2); in crypto4xx_setkey_aes() 163 sa->sa_command_1.bf.key_len = keylen >> 3; in crypto4xx_setkey_aes() 178 const u8 *key, unsigned int keylen) in crypto4xx_setkey_aes_cbc() argument 180 return crypto4xx_setkey_aes(cipher, key, keylen, CRYPTO_MODE_CBC, in crypto4xx_setkey_aes_cbc() 185 const u8 *key, unsigned int keylen) in crypto4xx_setkey_aes_cfb() argument [all …]
|
| /OK3568_Linux_fs/kernel/fs/hfs/ |
| H A D | bfind.c | 58 u16 off, len, keylen; in __hfs_brec_find() local 69 keylen = hfs_brec_keylen(bnode, rec); in __hfs_brec_find() 70 if (keylen == 0) { in __hfs_brec_find() 74 hfs_bnode_read(bnode, fd->key, off, keylen); in __hfs_brec_find() 88 keylen = hfs_brec_keylen(bnode, e); in __hfs_brec_find() 89 if (keylen == 0) { in __hfs_brec_find() 93 hfs_bnode_read(bnode, fd->key, off, keylen); in __hfs_brec_find() 98 fd->keylength = keylen; in __hfs_brec_find() 99 fd->entryoffset = off + keylen; in __hfs_brec_find() 100 fd->entrylength = len - keylen; in __hfs_brec_find() [all …]
|
| /OK3568_Linux_fs/kernel/fs/cachefiles/ |
| H A D | key.c | 33 char *cachefiles_cook_key(const u8 *raw, int keylen, uint8_t type) in cachefiles_cook_key() argument 40 _enter(",%d", keylen); in cachefiles_cook_key() 42 BUG_ON(keylen < 2 || keylen > 514); in cachefiles_cook_key() 46 for (loop = 2; loop < keylen; loop++) { in cachefiles_cook_key() 54 max = keylen - 2; in cachefiles_cook_key() 63 keylen = (keylen + 2) / 3; in cachefiles_cook_key() 65 max = keylen * 4; in cachefiles_cook_key() 98 for (loop = keylen; loop > 0; loop--) { in cachefiles_cook_key() 117 for (loop = keylen; loop > 0; loop--) { in cachefiles_cook_key()
|
| /OK3568_Linux_fs/kernel/crypto/ |
| H A D | cipher.c | 21 unsigned int keylen) in setkey_unaligned() argument 29 absize = keylen + alignmask; in setkey_unaligned() 35 memcpy(alignbuffer, key, keylen); in setkey_unaligned() 36 ret = cia->cia_setkey(crypto_cipher_tfm(tfm), alignbuffer, keylen); in setkey_unaligned() 37 memset(alignbuffer, 0, keylen); in setkey_unaligned() 44 const u8 *key, unsigned int keylen) in crypto_cipher_setkey() argument 49 if (keylen < cia->cia_min_keysize || keylen > cia->cia_max_keysize) in crypto_cipher_setkey() 53 return setkey_unaligned(tfm, key, keylen); in crypto_cipher_setkey() 55 return cia->cia_setkey(crypto_cipher_tfm(tfm), key, keylen); in crypto_cipher_setkey()
|
| /OK3568_Linux_fs/kernel/fs/hfsplus/ |
| H A D | bfind.c | 117 u16 off, len, keylen; in __hfs_brec_find() local 129 keylen = hfs_brec_keylen(bnode, rec); in __hfs_brec_find() 130 if (keylen == 0) { in __hfs_brec_find() 134 hfs_bnode_read(bnode, fd->key, off, keylen); in __hfs_brec_find() 143 keylen = hfs_brec_keylen(bnode, e); in __hfs_brec_find() 144 if (keylen == 0) { in __hfs_brec_find() 148 hfs_bnode_read(bnode, fd->key, off, keylen); in __hfs_brec_find() 154 fd->keylength = keylen; in __hfs_brec_find() 155 fd->entryoffset = off + keylen; in __hfs_brec_find() 156 fd->entrylength = len - keylen; in __hfs_brec_find() [all …]
|
| /OK3568_Linux_fs/kernel/drivers/crypto/cavium/cpt/ |
| H A D | cptvf_algs.c | 233 u32 keylen) in cvm_xts_setkey() argument 239 const u8 *key2 = key + (keylen / 2); in cvm_xts_setkey() 241 err = xts_check_key(tfm, key, keylen); in cvm_xts_setkey() 244 ctx->key_len = keylen; in cvm_xts_setkey() 245 memcpy(ctx->enc_key, key1, keylen / 2); in cvm_xts_setkey() 246 memcpy(ctx->enc_key + KEY2_OFFSET, key2, keylen / 2); in cvm_xts_setkey() 262 static int cvm_validate_keylen(struct cvm_enc_ctx *ctx, u32 keylen) in cvm_validate_keylen() argument 264 if ((keylen == 16) || (keylen == 24) || (keylen == 32)) { in cvm_validate_keylen() 265 ctx->key_len = keylen; in cvm_validate_keylen() 290 u32 keylen, u8 cipher_type) in cvm_setkey() argument [all …]
|
| /OK3568_Linux_fs/kernel/net/mac80211/ |
| H A D | wep.c | 31 static inline bool ieee80211_wep_weak_iv(u32 iv, int keylen) in ieee80211_wep_weak_iv() argument 40 if (B >= 3 && B < 3 + keylen) in ieee80211_wep_weak_iv() 48 int keylen, int keyidx, u8 *iv) in ieee80211_wep_get_iv() argument 51 if (ieee80211_wep_weak_iv(local->wep_iv, keylen)) in ieee80211_wep_get_iv() 66 int keylen, int keyidx) in ieee80211_wep_add_iv() argument 87 ieee80211_wep_get_iv(local, keylen, keyidx, newhdr + hdrlen); in ieee80211_wep_add_iv() 133 const u8 *key, int keylen, int keyidx) in ieee80211_wep_encrypt() argument 142 iv = ieee80211_wep_add_iv(local, skb, keylen, keyidx); in ieee80211_wep_encrypt() 152 memcpy(rc4key + 3, key, keylen); in ieee80211_wep_encrypt() 157 return ieee80211_wep_encrypt_data(&local->wep_tx_ctx, rc4key, keylen + 3, in ieee80211_wep_encrypt() [all …]
|
| /OK3568_Linux_fs/kernel/drivers/staging/wfx/ |
| H A D | key.c | 36 WARN(key->keylen > sizeof(msg->key_data), "inconsistent data"); in fill_wep_pair() 37 msg->key_length = key->keylen; in fill_wep_pair() 38 memcpy(msg->key_data, key->key, key->keylen); in fill_wep_pair() 46 WARN(key->keylen > sizeof(msg->key_data), "inconsistent data"); in fill_wep_group() 48 msg->key_length = key->keylen; in fill_wep_group() 49 memcpy(msg->key_data, key->key, key->keylen); in fill_wep_group() 58 WARN(key->keylen != sizeof(msg->tkip_key_data) in fill_tkip_pair() 77 WARN(key->keylen != sizeof(msg->tkip_key_data) in fill_tkip_group() 98 WARN(key->keylen != sizeof(msg->aes_key_data), "inconsistent data"); in fill_ccmp_pair() 100 memcpy(msg->aes_key_data, key->key, key->keylen); in fill_ccmp_pair() [all …]
|
| /OK3568_Linux_fs/kernel/drivers/crypto/cavium/nitrox/ |
| H A D | nitrox_skcipher.c | 167 unsigned int keylen) in nitrox_skcipher_setkey() argument 192 memcpy(fctx->crypto.u.key, key, keylen); in nitrox_skcipher_setkey() 198 unsigned int keylen) in nitrox_aes_setkey() argument 202 aes_keylen = flexi_aes_keylen(keylen); in nitrox_aes_setkey() 205 return nitrox_skcipher_setkey(cipher, aes_keylen, key, keylen); in nitrox_aes_setkey() 321 const u8 *key, unsigned int keylen) in nitrox_3des_setkey() argument 324 nitrox_skcipher_setkey(cipher, 0, key, keylen); in nitrox_3des_setkey() 338 const u8 *key, unsigned int keylen) in nitrox_aes_xts_setkey() argument 345 ret = xts_check_key(tfm, key, keylen); in nitrox_aes_xts_setkey() 349 keylen /= 2; in nitrox_aes_xts_setkey() [all …]
|
| /OK3568_Linux_fs/kernel/drivers/crypto/caam/ |
| H A D | key_gen.c | 45 struct alginfo * const adata, const u8 *key_in, u32 keylen, in gen_split_key() argument 54 adata->keylen = split_key_len(adata->algtype & OP_ALG_ALGSEL_MASK); in gen_split_key() 57 local_max = max(keylen, adata->keylen_pad); in gen_split_key() 60 adata->keylen, adata->keylen_pad); in gen_split_key() 62 DUMP_PREFIX_ADDRESS, 16, 4, key_in, keylen, 1); in gen_split_key() 73 memcpy(key_out, key_in, keylen); in gen_split_key() 82 append_key(desc, dma_addr, keylen, CLASS_2 | KEY_DEST_CLASS_REG); in gen_split_key() 100 append_fifo_store(desc, dma_addr, adata->keylen, in gen_split_key()
|
| H A D | caamhash_desc.c | 36 if (state != OP_ALG_AS_UPDATE && adata->keylen) { in cnstr_shdsc_ahash() 46 adata->keylen, CLASS_2 | in cnstr_shdsc_ahash() 98 append_key_as_imm(desc, adata->key_virt, adata->keylen, in cnstr_shdsc_sk_hash() 99 adata->keylen, CLASS_1 | KEY_DEST_CLASS_REG); in cnstr_shdsc_sk_hash() 103 append_key(desc, adata->key_dma, adata->keylen, in cnstr_shdsc_sk_hash() 106 append_key_as_imm(desc, adata->key_virt, adata->keylen, in cnstr_shdsc_sk_hash() 107 adata->keylen, CLASS_1 | in cnstr_shdsc_sk_hash() 138 append_fifo_store(desc, adata->key_dma, adata->keylen, in cnstr_shdsc_sk_hash()
|
| H A D | caamalg_desc.c | 69 adata->keylen_pad, adata->keylen, in cnstr_shdsc_aead_null_encap() 73 append_key(desc, adata->key_dma, adata->keylen, in cnstr_shdsc_aead_null_encap() 148 adata->keylen_pad, adata->keylen, in cnstr_shdsc_aead_null_decap() 152 append_key(desc, adata->key_dma, adata->keylen, in cnstr_shdsc_aead_null_decap() 216 unsigned int enckeylen = cdata->keylen; in init_sh_desc_key_aead() 236 adata->keylen_pad, adata->keylen, in init_sh_desc_key_aead() 240 append_key(desc, adata->key_dma, adata->keylen, in init_sh_desc_key_aead() 647 append_key_as_imm(desc, cdata->key_virt, cdata->keylen, in cnstr_shdsc_gcm_encap() 648 cdata->keylen, CLASS_1 | KEY_DEST_CLASS_REG); in cnstr_shdsc_gcm_encap() 650 append_key(desc, cdata->key_dma, cdata->keylen, CLASS_1 | in cnstr_shdsc_gcm_encap() [all …]
|
| /OK3568_Linux_fs/kernel/drivers/crypto/rockchip/ |
| H A D | rk_crypto_skcipher_utils.c | 62 ctx->key, ctx->keylen); in rk_cipher_fallback() 206 int rk_cipher_setkey(struct crypto_skcipher *cipher, const u8 *key, unsigned int keylen) in rk_cipher_setkey() argument 214 algt->algo, algt->mode, keylen); in rk_cipher_setkey() 231 if (keylen != (AES_KEYSIZE_128 * key_factor) && in rk_cipher_setkey() 232 keylen != (AES_KEYSIZE_192 * key_factor) && in rk_cipher_setkey() 233 keylen != (AES_KEYSIZE_256 * key_factor)) in rk_cipher_setkey() 237 if (keylen != (SM4_KEY_SIZE * key_factor)) in rk_cipher_setkey() 245 memcpy(ctx->key, key, keylen); in rk_cipher_setkey() 246 ctx->keylen = keylen; in rk_cipher_setkey() 379 ret = crypto_aead_setkey(ctx->fallback_aead, ctx->key, ctx->keylen); in rk_aead_fallback() [all …]
|
| /OK3568_Linux_fs/kernel/arch/powerpc/platforms/powernv/ |
| H A D | opal-secvar.c | 74 static int opal_get_next_variable(const char *key, uint64_t *keylen, in opal_get_next_variable() argument 79 if (!key || !keylen) in opal_get_next_variable() 82 *keylen = cpu_to_be64(*keylen); in opal_get_next_variable() 84 rc = opal_secvar_get_next(key, keylen, keybufsize); in opal_get_next_variable() 86 *keylen = be64_to_cpu(*keylen); in opal_get_next_variable()
|
| /OK3568_Linux_fs/kernel/include/crypto/internal/ |
| H A D | blake2b.h | 69 unsigned int keylen; member 73 const u8 *key, unsigned int keylen) in crypto_blake2b_setkey() argument 77 if (keylen == 0 || keylen > BLAKE2B_KEY_SIZE) in crypto_blake2b_setkey() 80 memcpy(tctx->key, key, keylen); in crypto_blake2b_setkey() 81 tctx->keylen = keylen; in crypto_blake2b_setkey() 92 __blake2b_init(state, outlen, tctx->key, tctx->keylen); in crypto_blake2b_init()
|
| H A D | blake2s.h | 83 unsigned int keylen; member 87 const u8 *key, unsigned int keylen) in crypto_blake2s_setkey() argument 91 if (keylen == 0 || keylen > BLAKE2S_KEY_SIZE) in crypto_blake2s_setkey() 94 memcpy(tctx->key, key, keylen); in crypto_blake2s_setkey() 95 tctx->keylen = keylen; in crypto_blake2s_setkey() 106 __blake2s_init(state, outlen, tctx->key, tctx->keylen); in crypto_blake2s_init()
|
| /OK3568_Linux_fs/kernel/drivers/s390/crypto/ |
| H A D | pkey_api.c | 387 static int pkey_nonccatok2pkey(const u8 *key, u32 keylen, in pkey_nonccatok2pkey() argument 398 if (keylen != sizeof(struct protaeskeytoken)) in pkey_nonccatok2pkey() 417 if (keylen < sizeof(struct clearaeskeytoken)) in pkey_nonccatok2pkey() 420 if (keylen != sizeof(*t) + t->len) in pkey_nonccatok2pkey() 457 rc = ep11_check_aes_key(debug_info, 3, key, keylen, 1); in pkey_nonccatok2pkey() 465 rc = ep11_check_aes_key_with_hdr(debug_info, 3, key, keylen, 1); in pkey_nonccatok2pkey() 485 static int pkey_ccainttok2pkey(const u8 *key, u32 keylen, in pkey_ccainttok2pkey() argument 492 if (keylen != sizeof(struct secaeskeytoken)) in pkey_ccainttok2pkey() 496 if (keylen < hdr->len || keylen > MAXCCAVLSCTOKENSIZE) in pkey_ccainttok2pkey() 511 int pkey_keyblob2pkey(const u8 *key, u32 keylen, in pkey_keyblob2pkey() argument [all …]
|
| /OK3568_Linux_fs/kernel/crypto/asymmetric_keys/ |
| H A D | public_key.c | 125 key = kmalloc(pkey->keylen + sizeof(u32) * 2 + pkey->paramlen, in software_key_query() 129 memcpy(key, pkey->key, pkey->keylen); in software_key_query() 130 ptr = key + pkey->keylen; in software_key_query() 136 ret = crypto_akcipher_set_priv_key(tfm, key, pkey->keylen); in software_key_query() 138 ret = crypto_akcipher_set_pub_key(tfm, key, pkey->keylen); in software_key_query() 195 key = kmalloc(pkey->keylen + sizeof(u32) * 2 + pkey->paramlen, in software_key_eds_op() 200 memcpy(key, pkey->key, pkey->keylen); in software_key_eds_op() 201 ptr = key + pkey->keylen; in software_key_eds_op() 207 ret = crypto_akcipher_set_priv_key(tfm, key, pkey->keylen); in software_key_eds_op() 209 ret = crypto_akcipher_set_pub_key(tfm, key, pkey->keylen); in software_key_eds_op() [all …]
|
| /OK3568_Linux_fs/kernel/lib/crypto/ |
| H A D | blake2s-selftest.c | 564 int keylen = (13 * i) % (BLAKE2S_KEY_SIZE + 1); in blake2s_selftest() local 566 blake2s(hash, buf, key + BLAKE2S_KEY_SIZE - keylen, outlen, i, in blake2s_selftest() 567 keylen); in blake2s_selftest() 573 if (!keylen) in blake2s_selftest() 577 key + BLAKE2S_KEY_SIZE - keylen, in blake2s_selftest() 578 keylen); in blake2s_selftest()
|
| /OK3568_Linux_fs/kernel/drivers/crypto/allwinner/sun8i-ss/ |
| H A D | sun8i-ss-cipher.c | 181 op->keylen); in sun8i_ss_cipher() 189 rctx->keylen = op->keylen; in sun8i_ss_cipher() 191 rctx->p_key = dma_map_single(ss->dev, op->key, op->keylen, DMA_TO_DEVICE); in sun8i_ss_cipher() 302 dma_unmap_single(ss->dev, rctx->p_key, op->keylen, DMA_TO_DEVICE); in sun8i_ss_cipher() 419 unsigned int keylen) in sun8i_ss_aes_setkey() argument 424 switch (keylen) { in sun8i_ss_aes_setkey() 432 dev_dbg(ss->dev, "ERROR: Invalid keylen %u\n", keylen); in sun8i_ss_aes_setkey() 436 op->keylen = keylen; in sun8i_ss_aes_setkey() 437 op->key = kmemdup(key, keylen, GFP_KERNEL | GFP_DMA); in sun8i_ss_aes_setkey() 444 return crypto_skcipher_setkey(op->fallback_tfm, key, keylen); in sun8i_ss_aes_setkey() [all …]
|
| /OK3568_Linux_fs/kernel/fs/befs/ |
| H A D | btree.c | 117 int index, u16 * keylen); 335 u16 keylen; in befs_find_key() local 346 thiskey = befs_bt_get_key(sb, node, last, &keylen); in befs_find_key() 348 eq = befs_compare_strings(thiskey, keylen, findkey, findkey_len); in befs_find_key() 363 thiskey = befs_bt_get_key(sb, node, mid, &keylen); in befs_find_key() 364 eq = befs_compare_strings(thiskey, keylen, findkey, in befs_find_key() 421 u16 keylen; in befs_btree_read() local 490 keystart = befs_bt_get_key(sb, this_node, cur_key, &keylen); in befs_btree_read() 494 (int)keylen); in befs_btree_read() 496 if (bufsize < keylen + 1) { in befs_btree_read() [all …]
|