AES_KEYSIZE_128
if (key_len != AES_KEYSIZE_128 &&
case AES_KEYSIZE_128:
ppc_expand_key_128(ctx->key_twk, in_key + AES_KEYSIZE_128);
case AES_KEYSIZE_128:
case AES_KEYSIZE_128:
AES_KEYSIZE_128 : AES_KEYSIZE_256;
case AES_KEYSIZE_128:
#define AES_KEY_BYTES AES_KEYSIZE_128
keylen != AES_KEYSIZE_128)
case AES_KEYSIZE_128:
if (keylen != AES_KEYSIZE_128 && keylen != AES_KEYSIZE_192 &&
if (keylen != AES_KEYSIZE_128 &&
keylen != AES_KEYSIZE_128)
if (keylen == AES_KEYSIZE_128)
case AES_KEYSIZE_128:
case AES_KEYSIZE_128:
case AES_KEYSIZE_128:
case AES_KEYSIZE_128:
if (keylen != 2 * AES_KEYSIZE_128 && keylen != 2 * AES_KEYSIZE_256)
if (keylen != 2 * AES_KEYSIZE_128 && keylen != 2 * AES_KEYSIZE_256)
if (keylen != 2 * AES_KEYSIZE_128 && keylen != 2 * AES_KEYSIZE_256)
if (keylen != AES_KEYSIZE_128)
case AES_KEYSIZE_128:
case AES_KEYSIZE_128:
case AES_KEYSIZE_128:
(ctx->u.aes.key_len != AES_KEYSIZE_128))
if ((ctx->u.aes.key_len != AES_KEYSIZE_128) &&
case AES_KEYSIZE_128 * 2:
case AES_KEYSIZE_128:
if (xts->key_len == AES_KEYSIZE_128)
dm_offset = CCP_SB_BYTES - AES_KEYSIZE_128;
if (!((aes->key_len == AES_KEYSIZE_128) ||
if (!((aes->key_len == AES_KEYSIZE_128) ||
if (!((aes->key_len == AES_KEYSIZE_128) ||
AES_KEYSIZE_128, NS_BIT);
AES_KEYSIZE_128), AES_KEYSIZE_128, NS_BIT);
2 * AES_KEYSIZE_128), AES_KEYSIZE_128, NS_BIT);
AES_KEYSIZE_128, NS_BIT, 0);
+ AES_KEYSIZE_128),
AES_KEYSIZE_128, NS_BIT, 0);
+ 2 * AES_KEYSIZE_128),
AES_KEYSIZE_128, NS_BIT, 0);
if (ctx->auth_keylen != AES_KEYSIZE_128 &&
if (ctx->enc_keylen != AES_KEYSIZE_128 &&
case AES_KEYSIZE_128:
case AES_KEYSIZE_128:
if (keylen == AES_KEYSIZE_128) {
if (keylen == AES_KEYSIZE_128) {
if (keys.enckeylen == AES_KEYSIZE_128) {
if (keys.enckeylen == AES_KEYSIZE_128) {
if (keylen == AES_KEYSIZE_128)
if (len == AES_KEYSIZE_128) {
if (len == AES_KEYSIZE_128) {
if (unlikely(tctx->keylen != AES_KEYSIZE_128)) {
if (unlikely(tctx->keylen != AES_KEYSIZE_128)) {
if (unlikely(tctx->keylen != AES_KEYSIZE_128)) {
u8 key[AES_KEYSIZE_128];
case AES_KEYSIZE_128:
case AES_KEYSIZE_128:
case AES_KEYSIZE_128:
case AES_KEYSIZE_128 * 2:
case AES_KEYSIZE_128:
keylen != AES_KEYSIZE_128) {
case AES_KEYSIZE_128:
AES_KEYSIZE_128;
case AES_KEYSIZE_128:
if (keylen == AES_KEYSIZE_128) {
case AES_KEYSIZE_128:
case AES_KEYSIZE_128 << 1:
case 2 * AES_KEYSIZE_128:
case AES_KEYSIZE_128:
case AES_KEYSIZE_128:
case AES_KEYSIZE_128 + AES_GCM_SALT_SIZE:
ctx->enc_key_len = AES_KEYSIZE_128;
case 2 * AES_KEYSIZE_128:
case AES_KEYSIZE_128:
case AES_KEYSIZE_128:
case AES_KEYSIZE_128 + AES_GCM_SALT_SIZE:
ctx->enc_key_len = AES_KEYSIZE_128;
uint8_t key[AES_KEYSIZE_128];
key_phys = dma_map_single(sdcp->dev, sdcp->coh->aes_key + AES_KEYSIZE_128,
AES_KEYSIZE_128, DMA_TO_DEVICE);
2 * AES_KEYSIZE_128, DMA_TO_DEVICE);
dma_unmap_single(sdcp->dev, key_phys, AES_KEYSIZE_128,
dma_unmap_single(sdcp->dev, key_phys, 2 * AES_KEYSIZE_128,
memcpy(key + AES_KEYSIZE_128, req->iv, AES_KEYSIZE_128);
memset(key + AES_KEYSIZE_128, 0, AES_KEYSIZE_128);
if (unlikely(actx->key_len != AES_KEYSIZE_128 && !actx->key_referenced))
if (len == AES_KEYSIZE_128) {
uint8_t aes_key[2 * AES_KEYSIZE_128];
case AES_KEYSIZE_128:
case AES_KEYSIZE_128:
case AES_KEYSIZE_128:
case AES_KEYSIZE_128:
case AES_KEYSIZE_128:
case AES_KEYSIZE_128:
if (keylen != AES_KEYSIZE_128 && keylen != AES_KEYSIZE_192 &&
if (keylen != AES_KEYSIZE_128 && keylen != AES_KEYSIZE_256 && keylen != AES_KEYSIZE_192)
if (authenc_keys.enckeylen != AES_KEYSIZE_128 &&
if (key_size == AES_KEYSIZE_128)
if (aes_key_size == AES_KEYSIZE_128)
rctx->authklen = AES_KEYSIZE_128;
case AES_KEYSIZE_128:
((keylen != AES_KEYSIZE_128 && keylen != AES_KEYSIZE_256) ||
if (keylen != AES_KEYSIZE_128 && keylen != AES_KEYSIZE_192 &&
if (keylen != AES_KEYSIZE_128 &&
case AES_KEYSIZE_128:
if (keylen != AES_KEYSIZE_128 && keylen != AES_KEYSIZE_192 &&
dev->key_base = dmam_alloc_coherent(&pdev->dev, 2 * AES_KEYSIZE_128,
dev->iv_base = dev->key_base + AES_KEYSIZE_128;
dev->iv_phys_base = dev->key_phys_base + AES_KEYSIZE_128;
u8 key[AES_KEYSIZE_128];
if (keylen == AES_KEYSIZE_128) {
if (unlikely(ctx->keylen != AES_KEYSIZE_128))
if (ctx->keylen >= AES_KEYSIZE_128) {
case AES_KEYSIZE_128:
if (keylen != AES_KEYSIZE_128 &&
if (keylen != AES_KEYSIZE_128 &&
if (keylen != AES_KEYSIZE_128 && keylen != AES_KEYSIZE_192 &&
if (keylen != AES_KEYSIZE_128 && keylen != AES_KEYSIZE_192 &&
case AES_KEYSIZE_128:
if (keylen == AES_KEYSIZE_128 || keylen == AES_KEYSIZE_192 ||
case AES_KEYSIZE_128:
case AES_KEYSIZE_128:
if (keylen != AES_KEYSIZE_128 && keylen != AES_KEYSIZE_192 && keylen != AES_KEYSIZE_256)
if (keylen != 2 * AES_KEYSIZE_128 &&
if (ctx->keylen > AES_KEYSIZE_128) {
if (ctx->keylen > AES_KEYSIZE_128) {
if (ctx->keylen == AES_KEYSIZE_128)
case AES_KEYSIZE_128:
if (tfm_ctx->keylen == AES_KEYSIZE_128)
if (tfm_ctx->keylen == AES_KEYSIZE_128 ||
if (keylen == AES_KEYSIZE_256 || keylen == AES_KEYSIZE_128) {
if (keylen == AES_KEYSIZE_128) {
case AES_KEYSIZE_128:
if (key_len == AES_KEYSIZE_128)
if (key_len == AES_KEYSIZE_128) {
memcpy(k->raw_key, in_key, AES_KEYSIZE_128);
if (key->len == AES_KEYSIZE_128) {
if (key->len == AES_KEYSIZE_128)
if (key->len == AES_KEYSIZE_128)
const u8 in_key[AES_KEYSIZE_128]);
if (key_len == AES_KEYSIZE_128)
sg_init_one(&src_sg, in, AES_KEYSIZE_128);
sg_init_one(&dst_sg, out, AES_KEYSIZE_128);
skcipher_request_set_crypt(req, &src_sg, &dst_sg, AES_KEYSIZE_128,
if (crypto_aead_setkey(aead, key, AES_KEYSIZE_128)) {
plain_blob_key = kmalloc(AES_KEYSIZE_128, GFP_KERNEL);
get_random_bytes(b->nonce, AES_KEYSIZE_128);
get_random_bytes(plain_blob_key, AES_KEYSIZE_128);
memzero_explicit(plain_blob_key, AES_KEYSIZE_128);
plain_blob_key = kmalloc(AES_KEYSIZE_128, GFP_KERNEL);
memzero_explicit(plain_blob_key, AES_KEYSIZE_128);
__u8 blob_key[AES_KEYSIZE_128];
__u8 nonce[AES_KEYSIZE_128];