| /linux/drivers/crypto/ |
| H A D | padlock-aes.c | 66 struct cword encrypt; member 134 ctx->cword.encrypt.rounds = 10 + (key_len - 16) / 4; in aes_set_key() 135 ctx->cword.decrypt.rounds = ctx->cword.encrypt.rounds; in aes_set_key() 136 ctx->cword.encrypt.ksize = (key_len - 16) / 8; in aes_set_key() 137 ctx->cword.decrypt.ksize = ctx->cword.encrypt.ksize; in aes_set_key() 144 ctx->cword.encrypt.keygen = 1; in aes_set_key() 155 if (&ctx->cword.encrypt == per_cpu(paes_last_cword, cpu) || in aes_set_key() 310 padlock_reset_key(&ctx->cword.encrypt); in padlock_aes_encrypt() 311 ecb_crypt(in, out, ctx->E, &ctx->cword.encrypt, 1); in padlock_aes_encrypt() 312 padlock_store_cword(&ctx->cword.encrypt); in padlock_aes_encrypt() [all …]
|
| /linux/drivers/crypto/caam/ |
| H A D | caamalg.c | 345 * AES GCM encrypt shared descriptor in gcm_set_sh_desc() 410 * RFC4106 encrypt shared descriptor in rfc4106_set_sh_desc() 478 * RFC4543 encrypt shared descriptor in rfc4543_set_sh_desc() 1073 bool all_contig, bool encrypt) in init_aead_job() argument 1085 sh_desc = encrypt ? ctx->sh_desc_enc : ctx->sh_desc_dec; in init_aead_job() 1086 ptr = encrypt ? ctx->sh_desc_enc_dma : ctx->sh_desc_dec_dma; in init_aead_job() 1122 if (encrypt) in init_aead_job() 1134 bool all_contig, bool encrypt) in init_gcm_job() argument 1143 init_aead_job(req, edesc, all_contig, encrypt); in init_gcm_job() 1148 if (encrypt && generic_gcm && !(req->assoclen + req->cryptlen)) in init_gcm_job() [all …]
|
| H A D | caamalg_qi.c | 263 if (ctx->drv_ctx[ENCRYPT]) { in aead_setkey() 264 ret = caam_drv_ctx_update(ctx->drv_ctx[ENCRYPT], in aead_setkey() 387 if (ctx->drv_ctx[ENCRYPT]) { in gcm_setkey() 388 ret = caam_drv_ctx_update(ctx->drv_ctx[ENCRYPT], in gcm_setkey() 495 if (ctx->drv_ctx[ENCRYPT]) { in rfc4106_setkey() 496 ret = caam_drv_ctx_update(ctx->drv_ctx[ENCRYPT], in rfc4106_setkey() 601 if (ctx->drv_ctx[ENCRYPT]) { in rfc4543_setkey() 602 ret = caam_drv_ctx_update(ctx->drv_ctx[ENCRYPT], in rfc4543_setkey() 641 /* skcipher encrypt, decrypt shared descriptors */ in skcipher_setkey() 648 if (ctx->drv_ctx[ENCRYPT]) { in skcipher_setkey() [all …]
|
| /linux/tools/perf/pmu-events/arch/s390/cf_z17/ |
| H A D | pai_crypto.json | 1014 "BriefDescription": "PCKMO ENCRYPT DEA KEY", 1015 "PublicDescription": "PCKMO-Encrypt-DEA-key function" 1021 "BriefDescription": "PCKMO ENCRYPT TDEA 128 KEY", 1022 "PublicDescription": "PCKMO-Encrypt-TDEA-128-key function" 1028 "BriefDescription": "PCKMO ENCRYPT TDEA 192 KEY", 1029 "PublicDescription": "PCKMO-Encrypt-TDEA-192-key function" 1035 "BriefDescription": "PCKMO ENCRYPT AES 128 KEY", 1036 "PublicDescription": "PCKMO-Encrypt-AES-128-key function" 1042 "BriefDescription": "PCKMO ENCRYPT AES 192 KEY", 1043 "PublicDescription": "PCKMO-Encrypt-AES-192-key function" [all …]
|
| /linux/drivers/crypto/tegra/ |
| H A D | tegra-se-aes.c | 38 bool encrypt; member 62 bool encrypt; member 111 if (rctx->encrypt) in tegra_cbc_iv_copyback() 132 static int tegra234_aes_crypto_cfg(u32 alg, bool encrypt) in tegra234_aes_crypto_cfg() argument 141 if (encrypt) in tegra234_aes_crypto_cfg() 146 if (encrypt) in tegra234_aes_crypto_cfg() 151 if (encrypt) in tegra234_aes_crypto_cfg() 168 static int tegra234_aes_cfg(u32 alg, bool encrypt) in tegra234_aes_cfg() argument 175 if (encrypt) in tegra234_aes_cfg() 181 if (encrypt) in tegra234_aes_cfg() [all …]
|
| /linux/tools/testing/selftests/bpf/prog_tests/ |
| H A D | crypto_sanity.c | 49 static void do_crypt_afalg(const void *src, void *dst, int size, bool encrypt) in do_crypt_afalg() argument 63 *(__u32 *)CMSG_DATA(cmsg) = encrypt ? ALG_OP_ENCRYPT : ALG_OP_DECRYPT; in do_crypt_afalg() 144 if (!ASSERT_OK(err, "attach encrypt filter")) in test_crypto_sanity() 148 if (!ASSERT_NEQ(sockfd, -1, "encrypt socket")) in test_crypto_sanity() 152 if (!ASSERT_EQ(err, sizeof(plain_text), "encrypt send")) in test_crypto_sanity() 157 if (!ASSERT_OK(skel->bss->status, "encrypt status")) in test_crypto_sanity() 159 if (!ASSERT_STRNEQ(skel->bss->dst, afalg_dst, sizeof(afalg_dst), "encrypt AF_ALG")) in test_crypto_sanity() 164 if (!ASSERT_OK(err, "bpf_tc_detach encrypt")) in test_crypto_sanity()
|
| /linux/tools/perf/pmu-events/arch/s390/cf_z16/ |
| H A D | pai_crypto.json | 1014 "BriefDescription": "PCKMO ENCRYPT DEA KEY", 1015 "PublicDescription": "PCKMO-Encrypt-DEA-key function" 1021 "BriefDescription": "PCKMO ENCRYPT TDEA 128 KEY", 1022 "PublicDescription": "PCKMO-Encrypt-TDEA-128-key function" 1028 "BriefDescription": "PCKMO ENCRYPT TDEA 192 KEY", 1029 "PublicDescription": "PCKMO-Encrypt-TDEA-192-key function" 1035 "BriefDescription": "PCKMO ENCRYPT AES 128 KEY", 1036 "PublicDescription": "PCKMO-Encrypt-AES-128-key function" 1042 "BriefDescription": "PCKMO ENCRYPT AES 192 KEY", 1043 "PublicDescription": "PCKMO-Encrypt-AES-192-key function" [all …]
|
| /linux/net/ceph/ |
| H A D | crypto.c | 139 * Currently these are encrypt out-buffer (ceph_buffer) and decrypt 207 static int ceph_aes_crypt(const struct ceph_crypto_key *key, bool encrypt, in ceph_aes_crypt() argument 215 int crypt_len = encrypt ? in_len + pad_byte : in_len; in ceph_aes_crypt() 219 if (encrypt) in ceph_aes_crypt() 236 if (encrypt) in ceph_aes_crypt() 243 encrypt ? "en" : "de", ret); in ceph_aes_crypt() 251 if (encrypt) { in ceph_aes_crypt() 271 int ceph_crypt(const struct ceph_crypto_key *key, bool encrypt, in ceph_crypt() argument 279 return ceph_aes_crypt(key, encrypt, buf, buf_len, in_len, in ceph_crypt()
|
| /linux/arch/riscv/crypto/ |
| H A D | aes-riscv64-zvkned.S | 130 aes_encrypt v16, \keylen // Encrypt 190 // CBC-encrypt all blocks except the last. But don't store the 193 // message is single-block, still encrypt the last (and only) block. 202 aes_encrypt v16, \keylen // Encrypt 210 // Encrypt the last two blocks using ciphertext stealing as follows: 211 // C[n-1] = Encrypt(Encrypt(P[n-1] ^ C[n-2]) ^ P[n]) 212 // C[n] = Encrypt(P[n-1] ^ C[n-2])[0..LEN] 218 // v16 already contains Encrypt(P[n-1] ^ C[n-2]). 225 vxor.vv v16, v16, v17 // v16 = Encrypt(P[n-1] ^ C[n-2]) ^ P[n]
|
| /linux/fs/crypto/ |
| H A D | crypto.c | 109 /* Encrypt or decrypt a single "data unit" of file contents. */ 148 * fscrypt_encrypt_pagecache_blocks() - Encrypt data from a pagecache folio 149 * @folio: the locked pagecache folio containing the data to encrypt 150 * @len: size of the data to encrypt, in bytes 151 * @offs: offset within @page of the data to encrypt, in bytes 212 * fscrypt_encrypt_block_inplace() - Encrypt a filesystem block in-place 214 * @page: The page containing the block to encrypt 215 * @len: Size of block to encrypt. This must be a multiple of 217 * @offs: Byte offset within @page at which the block to encrypt begins 221 * Encrypt a possibly-compressed filesystem block that is located in an
|
| /linux/drivers/crypto/cavium/nitrox/ |
| H A D | nitrox_skcipher.c | 92 if (nkreq->creq.ctrl.s.arg == ENCRYPT) { in nitrox_cbc_cipher_callback() 264 creq->ctrl.s.arg = (enc ? ENCRYPT : DECRYPT); in nitrox_skcipher_crypt() 399 .encrypt = nitrox_aes_encrypt, 418 .encrypt = nitrox_aes_encrypt, 437 .encrypt = nitrox_aes_encrypt, 458 .encrypt = nitrox_aes_encrypt, 475 .encrypt = nitrox_aes_encrypt, 494 .encrypt = nitrox_3des_encrypt, 513 .encrypt = nitrox_3des_encrypt,
|
| /linux/drivers/crypto/inside-secure/ |
| H A D | safexcel_cipher.c | 661 /* For encrypt take the last output word */ in safexcel_handle_req_result() 700 * AEAD has auth tag appended to output for encrypt and in safexcel_send_req() 1296 .encrypt = safexcel_encrypt, 1333 .encrypt = safexcel_encrypt, 1407 .encrypt = safexcel_encrypt, 1469 .encrypt = safexcel_encrypt, 1508 .encrypt = safexcel_encrypt, 1568 .encrypt = safexcel_encrypt, 1607 .encrypt = safexcel_encrypt, 1680 .encrypt = safexcel_aead_encrypt, [all …]
|
| /linux/lib/crypto/ |
| H A D | chacha20poly1305.c | 215 int encrypt) in chacha20poly1305_crypt_sg_inplace() argument 264 if (!encrypt) in chacha20poly1305_crypt_sg_inplace() 294 if (encrypt) in chacha20poly1305_crypt_sg_inplace() 307 if (encrypt) { in chacha20poly1305_crypt_sg_inplace() 323 sg_copy_buffer(src, sg_nents(src), b.mac[encrypt], in chacha20poly1305_crypt_sg_inplace() 324 sizeof(b.mac[1]), src_len, !encrypt); in chacha20poly1305_crypt_sg_inplace() 325 ret = encrypt || in chacha20poly1305_crypt_sg_inplace()
|
| /linux/Documentation/filesystems/ |
| H A D | fscrypt.rst | 26 at the block device level. This allows it to encrypt different files 30 However, except for filenames, fscrypt does not encrypt filesystem 317 key and a single filenames encryption key. To still encrypt different 710 encrypted, even if it is empty. Users who want to encrypt an entire 736 kernel config, and the superblock must have had the "encrypt" 737 feature flag enabled using ``tune2fs -O encrypt`` or ``mkfs.ext4 -O 738 encrypt``.) 1324 hardware* that can encrypt/decrypt data while it is on its way to/from 1333 blk-crypto instead of the kernel crypto API to encrypt/decrypt file 1400 Implementation-wise, to encrypt/decrypt the contents of files that are [all …]
|
| /linux/fs/ubifs/ |
| H A D | crypto.c | 28 * ubifs_encrypt - Encrypt data. 30 * @dn: data node to encrypt 35 * This function encrypt a possibly-compressed data in the data node.
|
| /linux/security/keys/trusted-keys/ |
| H A D | trusted_dcp.c | 33 * encrypt the trusted key payload using AES-128-GCM. 45 * @blob_key: Random AES 128 key which is used to encrypt @payload, 159 * If we encrypt our buffer has extra space for the auth tag. in do_aead_crypto() 221 pr_err("Unable to encrypt blob payload: %i\n", ret); in trusted_dcp_seal() 227 pr_err("Unable to encrypt blob key: %i\n", ret); in trusted_dcp_seal()
|
| /linux/drivers/crypto/hisilicon/sec/ |
| H A D | sec_algs.c | 630 *sec_alg_alloc_and_fill_el(struct sec_bd_info *template, int encrypt, in sec_alg_alloc_and_fill_el() argument 648 if (encrypt) in sec_alg_alloc_and_fill_el() 708 bool encrypt) in sec_alg_skcipher_crypto() argument 774 encrypt ? 1 : 0, in sec_alg_skcipher_crypto() 948 .encrypt = sec_alg_skcipher_encrypt, 968 .encrypt = sec_alg_skcipher_encrypt, 988 .encrypt = sec_alg_skcipher_encrypt, 1008 .encrypt = sec_alg_skcipher_encrypt, 1029 .encrypt = sec_alg_skcipher_encrypt, 1049 .encrypt = sec_alg_skcipher_encrypt, [all …]
|
| /linux/arch/arm64/mm/ |
| H A D | pageattr.c | 268 bool encrypt) in __set_memory_enc_dec() argument 283 if (encrypt) in __set_memory_enc_dec() 299 if (encrypt) in __set_memory_enc_dec() 320 WARN(ret, "Failed to encrypt memory, %d pages will be leaked", in realm_set_memory_encrypted() 337 .encrypt = realm_set_memory_encrypted,
|
| /linux/arch/s390/crypto/ |
| H A D | des_s390.c | 156 .encrypt = ecb_des_encrypt, 181 .encrypt = cbc_des_encrypt, 274 .encrypt = ecb_des3_encrypt, 299 .encrypt = cbc_des3_encrypt, 372 .encrypt = ctr_des_crypt, 393 .encrypt = ctr_des3_crypt,
|
| /linux/include/crypto/ |
| H A D | sm4.h | 41 * sm4_crypt_block - Encrypt or decrypt a single SM4 block 42 * @rk: The rkey_enc for encrypt or rkey_dec for decrypt
|
| /linux/crypto/ |
| H A D | chacha.c | 117 .encrypt = crypto_chacha_crypt, 133 .encrypt = crypto_xchacha_crypt, 149 .encrypt = crypto_xchacha_crypt,
|
| /linux/drivers/crypto/ccp/ |
| H A D | ccp-crypto-aes-xts.c | 105 unsigned int encrypt) in ccp_aes_xts_crypt() argument 159 ret = encrypt ? crypto_skcipher_encrypt(&rctx->fallback_req) : in ccp_aes_xts_crypt() 171 rctx->cmd.u.xts.action = (encrypt) ? CCP_AES_ACTION_ENCRYPT in ccp_aes_xts_crypt() 256 alg->encrypt = ccp_aes_xts_encrypt; in ccp_register_aes_xts_alg()
|
| /linux/arch/x86/mm/ |
| H A D | mem_encrypt_boot.S | 25 * RDX - length to encrypt 77 * Routine used to encrypt memory in place. 126 /* Copy/encrypt up to 2MB at a time */
|
| /linux/net/sunrpc/auth_gss/ |
| H A D | gss_krb5_test.c | 469 .desc = "Encrypt with aes128-cts-hmac-sha1-96 case 1", 477 .desc = "Encrypt with aes128-cts-hmac-sha1-96 case 2", 485 .desc = "Encrypt with aes128-cts-hmac-sha1-96 case 3", 493 .desc = "Encrypt with aes128-cts-hmac-sha1-96 case 4", 501 .desc = "Encrypt with aes128-cts-hmac-sha1-96 case 5", 509 .desc = "Encrypt with aes128-cts-hmac-sha1-96 case 6", 1019 .desc = "Encrypt empty plaintext with camellia128-cts-cmac", 1028 .desc = "Encrypt 1 byte with camellia128-cts-cmac", 1037 .desc = "Encrypt 9 bytes with camellia128-cts-cmac", 1046 .desc = "Encrypt 13 bytes with camellia128-cts-cmac", [all …]
|
| /linux/drivers/crypto/cavium/cpt/ |
| H A D | cptvf_algs.c | 350 .encrypt = cvm_encrypt, 368 .encrypt = cvm_encrypt, 385 .encrypt = cvm_encrypt, 403 .encrypt = cvm_encrypt, 421 .encrypt = cvm_encrypt,
|