| /linux/arch/riscv/crypto/ |
| H A D | aes-riscv64-zvkned.S | 150 aes_decrypt v20, \keylen // Decrypt the blocks 251 // CBC-decrypt all full blocks. For the last full block, or the last 2 264 aes_decrypt v20, \keylen // Decrypt this set of blocks 284 // P[n-1] = Decrypt(C[n]) ^ C[n-2] 285 // P[n] = Decrypt(C[n-1]) ^ C[n] 287 // We have C[n] in v16, Decrypt(C[n]) in v20, and C[n-2] in v28. 288 // Together with Decrypt(C[n-1]) ^ C[n-2] from the output buffer, this 291 vxor.vv v20, v20, v28 // Decrypt(C[n]) ^ C[n-2] == P[n-1] 292 vle32.v v24, (t1) // Decrypt(C[n-1]) ^ C[n-2] 294 vxor.vv v20, v24, v16 // Decrypt(C[n-1]) ^ C[n-2] ^ C[n] == P[n] ^ C[n-2] [all …]
|
| H A D | aes-riscv64-glue.c | 231 * If the full message is available in one step, decrypt it in one call in riscv64_aes_cbc_cts_crypt() 480 .decrypt = riscv64_aes_ecb_decrypt, 495 .decrypt = riscv64_aes_cbc_decrypt, 510 .decrypt = riscv64_aes_cbc_cts_decrypt, 529 .decrypt = riscv64_aes_ctr_crypt, 548 .decrypt = riscv64_aes_xts_decrypt,
|
| /linux/drivers/crypto/caam/ |
| H A D | caamalg_qi.c | 272 if (ctx->drv_ctx[DECRYPT]) { in aead_setkey() 273 ret = caam_drv_ctx_update(ctx->drv_ctx[DECRYPT], in aead_setkey() 396 if (ctx->drv_ctx[DECRYPT]) { in gcm_setkey() 397 ret = caam_drv_ctx_update(ctx->drv_ctx[DECRYPT], in gcm_setkey() 504 if (ctx->drv_ctx[DECRYPT]) { in rfc4106_setkey() 505 ret = caam_drv_ctx_update(ctx->drv_ctx[DECRYPT], in rfc4106_setkey() 610 if (ctx->drv_ctx[DECRYPT]) { in rfc4543_setkey() 611 ret = caam_drv_ctx_update(ctx->drv_ctx[DECRYPT], in rfc4543_setkey() 641 /* skcipher encrypt, decrypt shared descriptors */ in skcipher_setkey() 657 if (ctx->drv_ctx[DECRYPT]) { in skcipher_setkey() [all …]
|
| H A D | caamalg.c | 1897 .decrypt = skcipher_decrypt, 1916 .decrypt = skcipher_decrypt, 1935 .decrypt = skcipher_decrypt, 1954 .decrypt = skcipher_decrypt, 1975 .decrypt = skcipher_decrypt, 2002 .decrypt = skcipher_decrypt, 2021 .decrypt = skcipher_decrypt, 2039 .decrypt = skcipher_decrypt, 2057 .decrypt = skcipher_decrypt, 2079 .decrypt = ipsec_gcm_decrypt, [all …]
|
| /linux/drivers/crypto/ |
| H A D | padlock-aes.c | 67 struct cword decrypt; member 133 ctx->cword.decrypt.encdec = 1; in aes_set_key() 135 ctx->cword.decrypt.rounds = ctx->cword.encrypt.rounds; in aes_set_key() 137 ctx->cword.decrypt.ksize = ctx->cword.encrypt.ksize; in aes_set_key() 145 ctx->cword.decrypt.keygen = 1; in aes_set_key() 156 &ctx->cword.decrypt == per_cpu(paes_last_cword, cpu)) in aes_set_key() 320 ecb_crypt(in, out, ctx->D, &ctx->cword.decrypt, 1); in padlock_aes_decrypt() 377 padlock_reset_key(&ctx->cword.decrypt); in ecb_aes_decrypt() 383 ctx->D, &ctx->cword.decrypt, in ecb_aes_decrypt() 406 .decrypt = ecb_aes_decrypt, [all …]
|
| /linux/fs/crypto/ |
| H A D | crypto.c | 109 /* Encrypt or decrypt a single "data unit" of file contents. */ 242 * fscrypt_decrypt_pagecache_blocks() - Decrypt data from a pagecache folio 243 * @folio: the pagecache folio containing the data to decrypt 244 * @len: size of the data to decrypt, in bytes 245 * @offs: offset within @folio of the data to decrypt, in bytes 247 * Decrypt data that has just been read from an encrypted file. The data must 286 * fscrypt_decrypt_block_inplace() - Decrypt a filesystem block in-place 288 * @page: The page containing the block to decrypt 289 * @len: Size of block to decrypt. This must be a multiple of 291 * @offs: Byte offset within @page at which the block to decrypt begins [all …]
|
| H A D | bio.c | 19 * fscrypt_decrypt_bio() - decrypt the contents of a bio 20 * @bio: the bio to decrypt 22 * Decrypt the contents of a "read" bio following successful completion of the 104 * ciphertext blocks which decrypt to the all-zeroes block. The blocks must be
|
| /linux/tools/testing/selftests/bpf/prog_tests/ |
| H A D | crypto_sanity.c | 169 if (!ASSERT_OK(err, "attach decrypt filter")) in test_crypto_sanity() 173 if (!ASSERT_NEQ(sockfd, -1, "decrypt socket")) in test_crypto_sanity() 177 if (!ASSERT_EQ(err, sizeof(afalg_dst), "decrypt send")) in test_crypto_sanity() 182 if (!ASSERT_OK(skel->bss->status, "decrypt status")) in test_crypto_sanity() 184 if (!ASSERT_STRNEQ(skel->bss->dst, afalg_plain, sizeof(afalg_plain), "decrypt AF_ALG")) in test_crypto_sanity() 189 ASSERT_OK(err, "bpf_tc_detach decrypt"); in test_crypto_sanity()
|
| /linux/drivers/crypto/inside-secure/ |
| H A D | safexcel_cipher.c | 701 * removed from the output for decrypt! in safexcel_send_req() 717 * Save IV from last crypto input word for CBC modes in decrypt in safexcel_send_req() 873 * Special case: AEAD decrypt with only AAD data. in safexcel_send_req() 1057 * Save input IV in case of CBC decrypt mode in safexcel_skcipher_send() 1297 .decrypt = safexcel_decrypt, 1334 .decrypt = safexcel_decrypt, 1408 .decrypt = safexcel_decrypt, 1470 .decrypt = safexcel_decrypt, 1509 .decrypt = safexcel_decrypt, 1569 .decrypt = safexcel_decrypt, [all …]
|
| /linux/drivers/crypto/cavium/nitrox/ |
| H A D | nitrox_skcipher.c | 264 creq->ctrl.s.arg = (enc ? ENCRYPT : DECRYPT); in nitrox_skcipher_crypt() 400 .decrypt = nitrox_cbc_decrypt, 419 .decrypt = nitrox_aes_decrypt, 438 .decrypt = nitrox_aes_decrypt, 459 .decrypt = nitrox_aes_decrypt, 476 .decrypt = nitrox_aes_decrypt, 495 .decrypt = nitrox_cbc_decrypt, 514 .decrypt = nitrox_3des_decrypt,
|
| /linux/Documentation/virt/kvm/s390/ |
| H A D | s390-pv-boot.rst | 17 KVM to decrypt the protected virtual machine. 21 PVM, decrypt the components and verify the data and address list 57 decrypt and verify the PV, as well as control flags and a start PSW.
|
| H A D | s390-pv-dump.rst | 23 way that the customer is able to decrypt. 63 decrypt the vcpu and memory data and end the dump process. When this
|
| /linux/arch/s390/crypto/ |
| H A D | des_s390.c | 157 .decrypt = ecb_des_decrypt, 182 .decrypt = cbc_des_decrypt, 275 .decrypt = ecb_des3_decrypt, 300 .decrypt = cbc_des3_decrypt, 373 .decrypt = ctr_des_crypt, 394 .decrypt = ctr_des3_crypt,
|
| /linux/include/crypto/ |
| H A D | sm4.h | 41 * sm4_crypt_block - Encrypt or decrypt a single SM4 block 42 * @rk: The rkey_enc for encrypt or rkey_dec for decrypt
|
| /linux/crypto/ |
| H A D | chacha.c | 118 .decrypt = crypto_chacha_crypt, 134 .decrypt = crypto_xchacha_crypt, 150 .decrypt = crypto_xchacha_crypt,
|
| /linux/drivers/crypto/cavium/cpt/ |
| H A D | cptvf_algs.c | 351 .decrypt = cvm_decrypt, 369 .decrypt = cvm_decrypt, 386 .decrypt = cvm_decrypt, 404 .decrypt = cvm_decrypt, 422 .decrypt = cvm_decrypt,
|
| /linux/net/rxrpc/ |
| H A D | rxkad.c | 47 * alloc routine, but since we have it to hand, we use it to decrypt RESPONSE 422 * decrypt partial encryption on a packet (level 1 security) in rxkad_verify_packet_1() 442 /* Decrypt the skbuff in-place. TODO: We really want to decrypt in rxkad_verify_packet_1() 485 * wholly decrypt a packet (level 2 security) in rxkad_verify_packet_2() 506 /* Decrypt the skbuff in-place. TODO: We really want to decrypt in rxkad_verify_packet_2() 527 /* decrypt from the session key */ in rxkad_verify_packet_2() 946 * decrypt the kerberos IV ticket in the response in rxkad_decrypt_ticket() 1074 * decrypt th in rxkad_verify_response() [all...] |
| /linux/drivers/crypto/marvell/octeontx/ |
| H A D | otx_cptvf_algs.c | 1238 .decrypt = otx_cpt_skcipher_decrypt, 1255 .decrypt = otx_cpt_skcipher_decrypt, 1272 .decrypt = otx_cpt_skcipher_decrypt, 1289 .decrypt = otx_cpt_skcipher_decrypt, 1306 .decrypt = otx_cpt_skcipher_decrypt, 1325 .decrypt = otx_cpt_aead_decrypt, 1344 .decrypt = otx_cpt_aead_decrypt, 1363 .decrypt = otx_cpt_aead_decrypt, 1382 .decrypt = otx_cpt_aead_decrypt, 1401 .decrypt = otx_cpt_aead_null_decrypt, [all …]
|
| /linux/drivers/crypto/rockchip/ |
| H A D | rk3288_crypto_skcipher.c | 480 .decrypt = rk_aes_ecb_decrypt, 506 .decrypt = rk_aes_cbc_decrypt, 531 .decrypt = rk_des_ecb_decrypt, 557 .decrypt = rk_des_cbc_decrypt, 582 .decrypt = rk_des3_ede_ecb_decrypt, 608 .decrypt = rk_des3_ede_cbc_decrypt,
|
| /linux/arch/powerpc/crypto/ |
| H A D | aes-spe-modes.S | 188 * called from glue layer to decrypt a single 16 byte block 251 * called from glue layer to decrypt multiple blocks via ECB 335 * called from glue layer to decrypt multiple blocks via CBC 395 xor rW0,rW0,rI0 /* decrypt with initial IV */ 410 * called from glue layer to encrypt/decrypt multiple blocks 561 * called from glue layer to decrypt multiple blocks via XTS
|
| /linux/net/sunrpc/auth_gss/ |
| H A D | gss_krb5_mech.c | 47 .decrypt = gss_krb5_aes_decrypt, 76 .decrypt = gss_krb5_aes_decrypt, 115 .decrypt = gss_krb5_aes_decrypt, 141 .decrypt = gss_krb5_aes_decrypt, 170 .decrypt = krb5_etm_decrypt, 196 .decrypt = krb5_etm_decrypt,
|
| /linux/drivers/crypto/axis/ |
| H A D | artpec6_crypto.c | 321 bool decrypt; member 342 bool decrypt; member 1100 req_ctx->decrypt = 0; in artpec6_crypto_encrypt() 1145 req_ctx->decrypt = 1; in artpec6_crypto_decrypt() 1267 req_ctx->decrypt = false; in artpec6_crypto_aead_encrypt() 1288 req_ctx->decrypt = true; in artpec6_crypto_aead_decrypt() 1727 cipher_decr = req_ctx->decrypt; in artpec6_crypto_prepare_crypto() 1732 cipher_decr = req_ctx->decrypt; in artpec6_crypto_prepare_crypto() 1742 cipher_decr = req_ctx->decrypt; in artpec6_crypto_prepare_crypto() 1885 if (req_ctx->decrypt) in artpec6_crypto_prepare_aead() [all …]
|
| /linux/arch/arm64/crypto/ |
| H A D | sm4-neon-glue.c | 202 .decrypt = sm4_ecb_decrypt, 217 .decrypt = sm4_cbc_decrypt, 233 .decrypt = sm4_ctr_crypt,
|
| /linux/Documentation/block/ |
| H A D | inline-encryption.rst | 13 en/decrypt data as it goes in/out of the disk. For each I/O request, software 14 can control exactly how the inline encryption hardware will en/decrypt the data 91 say whether to encrypt or decrypt, as that is implicit from the direction of the 92 bio; WRITE means encrypt, and READ means decrypt. 324 in-use encryption keys, then uses these keys to decrypt user data on-disk. 328 keys can be used to decrypt user data on-disk. An example of such an online 400 As inline encryption hardware can only be used to encrypt/decrypt data on-disk, 479 This allows users of blk-crypto to en/decrypt data using a hardware-wrapped
|
| /linux/kernel/bpf/ |
| H A D | crypto.c | 268 bool decrypt) in bpf_crypto_crypt() argument 298 err = decrypt ? ctx->type->decrypt(ctx->tfm, psrc, pdst, src_len, piv) in bpf_crypto_crypt() 305 * bpf_crypto_decrypt() - Decrypt buffer using configured context and IV provided.
|