Home
last modified time | relevance | path

Searched full:decrypt (Results 1 – 25 of 212) sorted by relevance

123456789

/linux/arch/riscv/crypto/
H A Daes-riscv64-zvkned.S150 aes_decrypt v20, \keylen // Decrypt the blocks
251 // CBC-decrypt all full blocks. For the last full block, or the last 2
264 aes_decrypt v20, \keylen // Decrypt this set of blocks
284 // P[n-1] = Decrypt(C[n]) ^ C[n-2]
285 // P[n] = Decrypt(C[n-1]) ^ C[n]
287 // We have C[n] in v16, Decrypt(C[n]) in v20, and C[n-2] in v28.
288 // Together with Decrypt(C[n-1]) ^ C[n-2] from the output buffer, this
291 vxor.vv v20, v20, v28 // Decrypt(C[n]) ^ C[n-2] == P[n-1]
292 vle32.v v24, (t1) // Decrypt(C[n-1]) ^ C[n-2]
294 vxor.vv v20, v24, v16 // Decrypt(C[n-1]) ^ C[n-2] ^ C[n] == P[n] ^ C[n-2]
[all …]
H A Daes-riscv64-glue.c231 * If the full message is available in one step, decrypt it in one call in riscv64_aes_cbc_cts_crypt()
480 .decrypt = riscv64_aes_ecb_decrypt,
495 .decrypt = riscv64_aes_cbc_decrypt,
510 .decrypt = riscv64_aes_cbc_cts_decrypt,
529 .decrypt = riscv64_aes_ctr_crypt,
548 .decrypt = riscv64_aes_xts_decrypt,
/linux/drivers/crypto/caam/
H A Dcaamalg_qi.c272 if (ctx->drv_ctx[DECRYPT]) { in aead_setkey()
273 ret = caam_drv_ctx_update(ctx->drv_ctx[DECRYPT], in aead_setkey()
396 if (ctx->drv_ctx[DECRYPT]) { in gcm_setkey()
397 ret = caam_drv_ctx_update(ctx->drv_ctx[DECRYPT], in gcm_setkey()
504 if (ctx->drv_ctx[DECRYPT]) { in rfc4106_setkey()
505 ret = caam_drv_ctx_update(ctx->drv_ctx[DECRYPT], in rfc4106_setkey()
610 if (ctx->drv_ctx[DECRYPT]) { in rfc4543_setkey()
611 ret = caam_drv_ctx_update(ctx->drv_ctx[DECRYPT], in rfc4543_setkey()
641 /* skcipher encrypt, decrypt shared descriptors */ in skcipher_setkey()
657 if (ctx->drv_ctx[DECRYPT]) { in skcipher_setkey()
[all …]
H A Dcaamalg.c1897 .decrypt = skcipher_decrypt,
1916 .decrypt = skcipher_decrypt,
1935 .decrypt = skcipher_decrypt,
1954 .decrypt = skcipher_decrypt,
1975 .decrypt = skcipher_decrypt,
2002 .decrypt = skcipher_decrypt,
2021 .decrypt = skcipher_decrypt,
2039 .decrypt = skcipher_decrypt,
2057 .decrypt = skcipher_decrypt,
2079 .decrypt = ipsec_gcm_decrypt,
[all …]
/linux/drivers/crypto/
H A Dpadlock-aes.c67 struct cword decrypt; member
133 ctx->cword.decrypt.encdec = 1; in aes_set_key()
135 ctx->cword.decrypt.rounds = ctx->cword.encrypt.rounds; in aes_set_key()
137 ctx->cword.decrypt.ksize = ctx->cword.encrypt.ksize; in aes_set_key()
145 ctx->cword.decrypt.keygen = 1; in aes_set_key()
156 &ctx->cword.decrypt == per_cpu(paes_last_cword, cpu)) in aes_set_key()
320 ecb_crypt(in, out, ctx->D, &ctx->cword.decrypt, 1); in padlock_aes_decrypt()
377 padlock_reset_key(&ctx->cword.decrypt); in ecb_aes_decrypt()
383 ctx->D, &ctx->cword.decrypt, in ecb_aes_decrypt()
406 .decrypt = ecb_aes_decrypt,
[all …]
/linux/fs/crypto/
H A Dcrypto.c109 /* Encrypt or decrypt a single "data unit" of file contents. */
242 * fscrypt_decrypt_pagecache_blocks() - Decrypt data from a pagecache folio
243 * @folio: the pagecache folio containing the data to decrypt
244 * @len: size of the data to decrypt, in bytes
245 * @offs: offset within @folio of the data to decrypt, in bytes
247 * Decrypt data that has just been read from an encrypted file. The data must
286 * fscrypt_decrypt_block_inplace() - Decrypt a filesystem block in-place
288 * @page: The page containing the block to decrypt
289 * @len: Size of block to decrypt. This must be a multiple of
291 * @offs: Byte offset within @page at which the block to decrypt begins
[all …]
H A Dbio.c19 * fscrypt_decrypt_bio() - decrypt the contents of a bio
20 * @bio: the bio to decrypt
22 * Decrypt the contents of a "read" bio following successful completion of the
104 * ciphertext blocks which decrypt to the all-zeroes block. The blocks must be
/linux/tools/testing/selftests/bpf/prog_tests/
H A Dcrypto_sanity.c169 if (!ASSERT_OK(err, "attach decrypt filter")) in test_crypto_sanity()
173 if (!ASSERT_NEQ(sockfd, -1, "decrypt socket")) in test_crypto_sanity()
177 if (!ASSERT_EQ(err, sizeof(afalg_dst), "decrypt send")) in test_crypto_sanity()
182 if (!ASSERT_OK(skel->bss->status, "decrypt status")) in test_crypto_sanity()
184 if (!ASSERT_STRNEQ(skel->bss->dst, afalg_plain, sizeof(afalg_plain), "decrypt AF_ALG")) in test_crypto_sanity()
189 ASSERT_OK(err, "bpf_tc_detach decrypt"); in test_crypto_sanity()
/linux/drivers/crypto/inside-secure/
H A Dsafexcel_cipher.c701 * removed from the output for decrypt! in safexcel_send_req()
717 * Save IV from last crypto input word for CBC modes in decrypt in safexcel_send_req()
873 * Special case: AEAD decrypt with only AAD data. in safexcel_send_req()
1057 * Save input IV in case of CBC decrypt mode in safexcel_skcipher_send()
1297 .decrypt = safexcel_decrypt,
1334 .decrypt = safexcel_decrypt,
1408 .decrypt = safexcel_decrypt,
1470 .decrypt = safexcel_decrypt,
1509 .decrypt = safexcel_decrypt,
1569 .decrypt = safexcel_decrypt,
[all …]
/linux/drivers/crypto/cavium/nitrox/
H A Dnitrox_skcipher.c264 creq->ctrl.s.arg = (enc ? ENCRYPT : DECRYPT); in nitrox_skcipher_crypt()
400 .decrypt = nitrox_cbc_decrypt,
419 .decrypt = nitrox_aes_decrypt,
438 .decrypt = nitrox_aes_decrypt,
459 .decrypt = nitrox_aes_decrypt,
476 .decrypt = nitrox_aes_decrypt,
495 .decrypt = nitrox_cbc_decrypt,
514 .decrypt = nitrox_3des_decrypt,
/linux/Documentation/virt/kvm/s390/
H A Ds390-pv-boot.rst17 KVM to decrypt the protected virtual machine.
21 PVM, decrypt the components and verify the data and address list
57 decrypt and verify the PV, as well as control flags and a start PSW.
H A Ds390-pv-dump.rst23 way that the customer is able to decrypt.
63 decrypt the vcpu and memory data and end the dump process. When this
/linux/arch/s390/crypto/
H A Ddes_s390.c157 .decrypt = ecb_des_decrypt,
182 .decrypt = cbc_des_decrypt,
275 .decrypt = ecb_des3_decrypt,
300 .decrypt = cbc_des3_decrypt,
373 .decrypt = ctr_des_crypt,
394 .decrypt = ctr_des3_crypt,
/linux/include/crypto/
H A Dsm4.h41 * sm4_crypt_block - Encrypt or decrypt a single SM4 block
42 * @rk: The rkey_enc for encrypt or rkey_dec for decrypt
/linux/crypto/
H A Dchacha.c118 .decrypt = crypto_chacha_crypt,
134 .decrypt = crypto_xchacha_crypt,
150 .decrypt = crypto_xchacha_crypt,
/linux/drivers/crypto/cavium/cpt/
H A Dcptvf_algs.c351 .decrypt = cvm_decrypt,
369 .decrypt = cvm_decrypt,
386 .decrypt = cvm_decrypt,
404 .decrypt = cvm_decrypt,
422 .decrypt = cvm_decrypt,
/linux/net/rxrpc/
H A Drxkad.c47 * alloc routine, but since we have it to hand, we use it to decrypt RESPONSE
422 * decrypt partial encryption on a packet (level 1 security) in rxkad_verify_packet_1()
442 /* Decrypt the skbuff in-place. TODO: We really want to decrypt in rxkad_verify_packet_1()
485 * wholly decrypt a packet (level 2 security) in rxkad_verify_packet_2()
506 /* Decrypt the skbuff in-place. TODO: We really want to decrypt in rxkad_verify_packet_2()
527 /* decrypt from the session key */ in rxkad_verify_packet_2()
946 * decrypt the kerberos IV ticket in the response in rxkad_decrypt_ticket()
1074 * decrypt th in rxkad_verify_response()
[all...]
/linux/drivers/crypto/marvell/octeontx/
H A Dotx_cptvf_algs.c1238 .decrypt = otx_cpt_skcipher_decrypt,
1255 .decrypt = otx_cpt_skcipher_decrypt,
1272 .decrypt = otx_cpt_skcipher_decrypt,
1289 .decrypt = otx_cpt_skcipher_decrypt,
1306 .decrypt = otx_cpt_skcipher_decrypt,
1325 .decrypt = otx_cpt_aead_decrypt,
1344 .decrypt = otx_cpt_aead_decrypt,
1363 .decrypt = otx_cpt_aead_decrypt,
1382 .decrypt = otx_cpt_aead_decrypt,
1401 .decrypt = otx_cpt_aead_null_decrypt,
[all …]
/linux/drivers/crypto/rockchip/
H A Drk3288_crypto_skcipher.c480 .decrypt = rk_aes_ecb_decrypt,
506 .decrypt = rk_aes_cbc_decrypt,
531 .decrypt = rk_des_ecb_decrypt,
557 .decrypt = rk_des_cbc_decrypt,
582 .decrypt = rk_des3_ede_ecb_decrypt,
608 .decrypt = rk_des3_ede_cbc_decrypt,
/linux/arch/powerpc/crypto/
H A Daes-spe-modes.S188 * called from glue layer to decrypt a single 16 byte block
251 * called from glue layer to decrypt multiple blocks via ECB
335 * called from glue layer to decrypt multiple blocks via CBC
395 xor rW0,rW0,rI0 /* decrypt with initial IV */
410 * called from glue layer to encrypt/decrypt multiple blocks
561 * called from glue layer to decrypt multiple blocks via XTS
/linux/net/sunrpc/auth_gss/
H A Dgss_krb5_mech.c47 .decrypt = gss_krb5_aes_decrypt,
76 .decrypt = gss_krb5_aes_decrypt,
115 .decrypt = gss_krb5_aes_decrypt,
141 .decrypt = gss_krb5_aes_decrypt,
170 .decrypt = krb5_etm_decrypt,
196 .decrypt = krb5_etm_decrypt,
/linux/drivers/crypto/axis/
H A Dartpec6_crypto.c321 bool decrypt; member
342 bool decrypt; member
1100 req_ctx->decrypt = 0; in artpec6_crypto_encrypt()
1145 req_ctx->decrypt = 1; in artpec6_crypto_decrypt()
1267 req_ctx->decrypt = false; in artpec6_crypto_aead_encrypt()
1288 req_ctx->decrypt = true; in artpec6_crypto_aead_decrypt()
1727 cipher_decr = req_ctx->decrypt; in artpec6_crypto_prepare_crypto()
1732 cipher_decr = req_ctx->decrypt; in artpec6_crypto_prepare_crypto()
1742 cipher_decr = req_ctx->decrypt; in artpec6_crypto_prepare_crypto()
1885 if (req_ctx->decrypt) in artpec6_crypto_prepare_aead()
[all …]
/linux/arch/arm64/crypto/
H A Dsm4-neon-glue.c202 .decrypt = sm4_ecb_decrypt,
217 .decrypt = sm4_cbc_decrypt,
233 .decrypt = sm4_ctr_crypt,
/linux/Documentation/block/
H A Dinline-encryption.rst13 en/decrypt data as it goes in/out of the disk. For each I/O request, software
14 can control exactly how the inline encryption hardware will en/decrypt the data
91 say whether to encrypt or decrypt, as that is implicit from the direction of the
92 bio; WRITE means encrypt, and READ means decrypt.
324 in-use encryption keys, then uses these keys to decrypt user data on-disk.
328 keys can be used to decrypt user data on-disk. An example of such an online
400 As inline encryption hardware can only be used to encrypt/decrypt data on-disk,
479 This allows users of blk-crypto to en/decrypt data using a hardware-wrapped
/linux/kernel/bpf/
H A Dcrypto.c268 bool decrypt) in bpf_crypto_crypt() argument
298 err = decrypt ? ctx->type->decrypt(ctx->tfm, psrc, pdst, src_len, piv) in bpf_crypto_crypt()
305 * bpf_crypto_decrypt() - Decrypt buffer using configured context and IV provided.

123456789