Lines Matching refs:key

90   } ks;         // AES key schedule to use
91 int key_set; // Set if key initialised
132 const AES_KEY *key, uint8_t ivec[16], int enc);
134 const AES_KEY *key, const uint8_t ivec[16]);
143 const AES_KEY *key, uint8_t ivec[16], int enc) {
148 size_t len, const AES_KEY *key,
157 int vpaes_set_encrypt_key(const uint8_t *userKey, int bits, AES_KEY *key);
158 int vpaes_set_decrypt_key(const uint8_t *userKey, int bits, AES_KEY *key);
160 void vpaes_encrypt(const uint8_t *in, uint8_t *out, const AES_KEY *key);
161 void vpaes_decrypt(const uint8_t *in, uint8_t *out, const AES_KEY *key);
164 const AES_KEY *key, uint8_t *ivec, int enc);
173 AES_KEY *key) {
177 AES_KEY *key) {
180 static void vpaes_encrypt(const uint8_t *in, uint8_t *out, const AES_KEY *key) {
183 static void vpaes_decrypt(const uint8_t *in, uint8_t *out, const AES_KEY *key) {
187 const AES_KEY *key, uint8_t *ivec, int enc) {
192 static int aes_init_key(EVP_CIPHER_CTX *ctx, const uint8_t *key,
200 ret = aes_hw_set_decrypt_key(key, ctx->key_len * 8, &dat->ks.ks);
207 ret = AES_set_decrypt_key(key, ctx->key_len * 8, &dat->ks.ks);
211 ret = vpaes_set_decrypt_key(key, ctx->key_len * 8, &dat->ks.ks);
216 ret = AES_set_decrypt_key(key, ctx->key_len * 8, &dat->ks.ks);
222 ret = aes_hw_set_encrypt_key(key, ctx->key_len * 8, &dat->ks.ks);
231 ret = AES_set_encrypt_key(key, ctx->key_len * 8, &dat->ks.ks);
235 ret = vpaes_set_encrypt_key(key, ctx->key_len * 8, &dat->ks.ks);
240 ret = AES_set_encrypt_key(key, ctx->key_len * 8, &dat->ks.ks);
309 block128_f *out_block, const uint8_t *key,
312 aes_hw_set_encrypt_key(key, key_bytes * 8, aes_key);
323 AES_set_encrypt_key(key, key_bytes * 8, aes_key);
334 vpaes_set_encrypt_key(key, key_bytes * 8, aes_key);
344 AES_set_encrypt_key(key, key_bytes * 8, aes_key);
354 static int aes_gcm_init_key(EVP_CIPHER_CTX *ctx, const uint8_t *key,
357 if (!iv && !key) {
360 if (key) {
362 aes_ctr_set_key(&gctx->ks.ks, &gctx->gcm, NULL, key, ctx->key_len);
373 // If key set use IV, otherwise copy
887 size_t *out_tag_len, const uint8_t *key,
906 aes_ctr_set_key(&gcm_ctx->ks.ks, &gcm_ctx->gcm, NULL, key, key_len);
911 static int aead_aes_gcm_init(EVP_AEAD_CTX *ctx, const uint8_t *key,
920 if (!aead_aes_gcm_init_impl(gcm_ctx, &actual_tag_len, key, key_len,
959 const AES_KEY *key = &gcm_ctx->ks.ks;
962 CRYPTO_gcm128_setiv(&gcm, key, nonce, nonce_len);
969 if (!CRYPTO_gcm128_encrypt_ctr32(&gcm, key, in, out, in_len,
974 if (!CRYPTO_gcm128_encrypt(&gcm, key, in, out, in_len)) {
981 if (!CRYPTO_gcm128_encrypt_ctr32(&gcm, key, extra_in, out_tag,
986 if (!CRYPTO_gcm128_encrypt(&gcm, key, extra_in, out_tag, extra_in_len)) {
1017 const AES_KEY *key = &gcm_ctx->ks.ks;
1020 CRYPTO_gcm128_setiv(&gcm, key, nonce, nonce_len);
1027 if (!CRYPTO_gcm128_decrypt_ctr32(&gcm, key, in, out, in_len,
1032 if (!CRYPTO_gcm128_decrypt(&gcm, key, in, out, in_len)) {
1081 static int aead_aes_gcm_tls12_init(EVP_AEAD_CTX *ctx, const uint8_t *key,
1092 if (!aead_aes_gcm_init_impl(&gcm_ctx->gcm_ctx, &actual_tag_len, key, key_len,
1169 static int aead_aes_gcm_tls13_init(EVP_AEAD_CTX *ctx, const uint8_t *key,
1181 if (!aead_aes_gcm_init_impl(&gcm_ctx->gcm_ctx, &actual_tag_len, key, key_len,