Home
last modified time | relevance | path

Searched full:encrypt (Results 1 – 25 of 237) sorted by relevance

12345678910

/linux/drivers/crypto/
H A Dpadlock-aes.c66 struct cword encrypt; member
134 ctx->cword.encrypt.rounds = 10 + (key_len - 16) / 4; in aes_set_key()
135 ctx->cword.decrypt.rounds = ctx->cword.encrypt.rounds; in aes_set_key()
136 ctx->cword.encrypt.ksize = (key_len - 16) / 8; in aes_set_key()
137 ctx->cword.decrypt.ksize = ctx->cword.encrypt.ksize; in aes_set_key()
144 ctx->cword.encrypt.keygen = 1; in aes_set_key()
155 if (&ctx->cword.encrypt == per_cpu(paes_last_cword, cpu) || in aes_set_key()
310 padlock_reset_key(&ctx->cword.encrypt); in padlock_aes_encrypt()
311 ecb_crypt(in, out, ctx->E, &ctx->cword.encrypt, 1); in padlock_aes_encrypt()
312 padlock_store_cword(&ctx->cword.encrypt); in padlock_aes_encrypt()
[all …]
/linux/drivers/crypto/caam/
H A Dcaamalg.c345 * AES GCM encrypt shared descriptor in gcm_set_sh_desc()
410 * RFC4106 encrypt shared descriptor in rfc4106_set_sh_desc()
478 * RFC4543 encrypt shared descriptor in rfc4543_set_sh_desc()
1073 bool all_contig, bool encrypt) in init_aead_job() argument
1085 sh_desc = encrypt ? ctx->sh_desc_enc : ctx->sh_desc_dec; in init_aead_job()
1086 ptr = encrypt ? ctx->sh_desc_enc_dma : ctx->sh_desc_dec_dma; in init_aead_job()
1122 if (encrypt) in init_aead_job()
1134 bool all_contig, bool encrypt) in init_gcm_job() argument
1143 init_aead_job(req, edesc, all_contig, encrypt); in init_gcm_job()
1148 if (encrypt && generic_gcm && !(req->assoclen + req->cryptlen)) in init_gcm_job()
[all …]
H A Dcaamalg_qi.c263 if (ctx->drv_ctx[ENCRYPT]) { in aead_setkey()
264 ret = caam_drv_ctx_update(ctx->drv_ctx[ENCRYPT], in aead_setkey()
387 if (ctx->drv_ctx[ENCRYPT]) { in gcm_setkey()
388 ret = caam_drv_ctx_update(ctx->drv_ctx[ENCRYPT], in gcm_setkey()
495 if (ctx->drv_ctx[ENCRYPT]) { in rfc4106_setkey()
496 ret = caam_drv_ctx_update(ctx->drv_ctx[ENCRYPT], in rfc4106_setkey()
601 if (ctx->drv_ctx[ENCRYPT]) { in rfc4543_setkey()
602 ret = caam_drv_ctx_update(ctx->drv_ctx[ENCRYPT], in rfc4543_setkey()
641 /* skcipher encrypt, decrypt shared descriptors */ in skcipher_setkey()
648 if (ctx->drv_ctx[ENCRYPT]) { in skcipher_setkey()
[all …]
/linux/tools/perf/pmu-events/arch/s390/cf_z17/
H A Dpai_crypto.json1014 "BriefDescription": "PCKMO ENCRYPT DEA KEY",
1015 "PublicDescription": "PCKMO-Encrypt-DEA-key function"
1021 "BriefDescription": "PCKMO ENCRYPT TDEA 128 KEY",
1022 "PublicDescription": "PCKMO-Encrypt-TDEA-128-key function"
1028 "BriefDescription": "PCKMO ENCRYPT TDEA 192 KEY",
1029 "PublicDescription": "PCKMO-Encrypt-TDEA-192-key function"
1035 "BriefDescription": "PCKMO ENCRYPT AES 128 KEY",
1036 "PublicDescription": "PCKMO-Encrypt-AES-128-key function"
1042 "BriefDescription": "PCKMO ENCRYPT AES 192 KEY",
1043 "PublicDescription": "PCKMO-Encrypt-AES-192-key function"
[all …]
/linux/drivers/crypto/tegra/
H A Dtegra-se-aes.c38 bool encrypt; member
62 bool encrypt; member
111 if (rctx->encrypt) in tegra_cbc_iv_copyback()
132 static int tegra234_aes_crypto_cfg(u32 alg, bool encrypt) in tegra234_aes_crypto_cfg() argument
141 if (encrypt) in tegra234_aes_crypto_cfg()
146 if (encrypt) in tegra234_aes_crypto_cfg()
151 if (encrypt) in tegra234_aes_crypto_cfg()
168 static int tegra234_aes_cfg(u32 alg, bool encrypt) in tegra234_aes_cfg() argument
175 if (encrypt) in tegra234_aes_cfg()
181 if (encrypt) in tegra234_aes_cfg()
[all …]
/linux/tools/testing/selftests/bpf/prog_tests/
H A Dcrypto_sanity.c49 static void do_crypt_afalg(const void *src, void *dst, int size, bool encrypt) in do_crypt_afalg() argument
63 *(__u32 *)CMSG_DATA(cmsg) = encrypt ? ALG_OP_ENCRYPT : ALG_OP_DECRYPT; in do_crypt_afalg()
144 if (!ASSERT_OK(err, "attach encrypt filter")) in test_crypto_sanity()
148 if (!ASSERT_NEQ(sockfd, -1, "encrypt socket")) in test_crypto_sanity()
152 if (!ASSERT_EQ(err, sizeof(plain_text), "encrypt send")) in test_crypto_sanity()
157 if (!ASSERT_OK(skel->bss->status, "encrypt status")) in test_crypto_sanity()
159 if (!ASSERT_STRNEQ(skel->bss->dst, afalg_dst, sizeof(afalg_dst), "encrypt AF_ALG")) in test_crypto_sanity()
164 if (!ASSERT_OK(err, "bpf_tc_detach encrypt")) in test_crypto_sanity()
/linux/tools/perf/pmu-events/arch/s390/cf_z16/
H A Dpai_crypto.json1014 "BriefDescription": "PCKMO ENCRYPT DEA KEY",
1015 "PublicDescription": "PCKMO-Encrypt-DEA-key function"
1021 "BriefDescription": "PCKMO ENCRYPT TDEA 128 KEY",
1022 "PublicDescription": "PCKMO-Encrypt-TDEA-128-key function"
1028 "BriefDescription": "PCKMO ENCRYPT TDEA 192 KEY",
1029 "PublicDescription": "PCKMO-Encrypt-TDEA-192-key function"
1035 "BriefDescription": "PCKMO ENCRYPT AES 128 KEY",
1036 "PublicDescription": "PCKMO-Encrypt-AES-128-key function"
1042 "BriefDescription": "PCKMO ENCRYPT AES 192 KEY",
1043 "PublicDescription": "PCKMO-Encrypt-AES-192-key function"
[all …]
/linux/net/ceph/
H A Dcrypto.c139 * Currently these are encrypt out-buffer (ceph_buffer) and decrypt
207 static int ceph_aes_crypt(const struct ceph_crypto_key *key, bool encrypt, in ceph_aes_crypt() argument
215 int crypt_len = encrypt ? in_len + pad_byte : in_len; in ceph_aes_crypt()
219 if (encrypt) in ceph_aes_crypt()
236 if (encrypt) in ceph_aes_crypt()
243 encrypt ? "en" : "de", ret); in ceph_aes_crypt()
251 if (encrypt) { in ceph_aes_crypt()
271 int ceph_crypt(const struct ceph_crypto_key *key, bool encrypt, in ceph_crypt() argument
279 return ceph_aes_crypt(key, encrypt, buf, buf_len, in_len, in ceph_crypt()
/linux/arch/riscv/crypto/
H A Daes-riscv64-zvkned.S130 aes_encrypt v16, \keylen // Encrypt
190 // CBC-encrypt all blocks except the last. But don't store the
193 // message is single-block, still encrypt the last (and only) block.
202 aes_encrypt v16, \keylen // Encrypt
210 // Encrypt the last two blocks using ciphertext stealing as follows:
211 // C[n-1] = Encrypt(Encrypt(P[n-1] ^ C[n-2]) ^ P[n])
212 // C[n] = Encrypt(P[n-1] ^ C[n-2])[0..LEN]
218 // v16 already contains Encrypt(P[n-1] ^ C[n-2]).
225 vxor.vv v16, v16, v17 // v16 = Encrypt(P[n-1] ^ C[n-2]) ^ P[n]
/linux/fs/crypto/
H A Dcrypto.c109 /* Encrypt or decrypt a single "data unit" of file contents. */
148 * fscrypt_encrypt_pagecache_blocks() - Encrypt data from a pagecache folio
149 * @folio: the locked pagecache folio containing the data to encrypt
150 * @len: size of the data to encrypt, in bytes
151 * @offs: offset within @page of the data to encrypt, in bytes
212 * fscrypt_encrypt_block_inplace() - Encrypt a filesystem block in-place
214 * @page: The page containing the block to encrypt
215 * @len: Size of block to encrypt. This must be a multiple of
217 * @offs: Byte offset within @page at which the block to encrypt begins
221 * Encrypt a possibly-compressed filesystem block that is located in an
/linux/drivers/crypto/cavium/nitrox/
H A Dnitrox_skcipher.c92 if (nkreq->creq.ctrl.s.arg == ENCRYPT) { in nitrox_cbc_cipher_callback()
264 creq->ctrl.s.arg = (enc ? ENCRYPT : DECRYPT); in nitrox_skcipher_crypt()
399 .encrypt = nitrox_aes_encrypt,
418 .encrypt = nitrox_aes_encrypt,
437 .encrypt = nitrox_aes_encrypt,
458 .encrypt = nitrox_aes_encrypt,
475 .encrypt = nitrox_aes_encrypt,
494 .encrypt = nitrox_3des_encrypt,
513 .encrypt = nitrox_3des_encrypt,
/linux/drivers/crypto/inside-secure/
H A Dsafexcel_cipher.c661 /* For encrypt take the last output word */ in safexcel_handle_req_result()
700 * AEAD has auth tag appended to output for encrypt and in safexcel_send_req()
1296 .encrypt = safexcel_encrypt,
1333 .encrypt = safexcel_encrypt,
1407 .encrypt = safexcel_encrypt,
1469 .encrypt = safexcel_encrypt,
1508 .encrypt = safexcel_encrypt,
1568 .encrypt = safexcel_encrypt,
1607 .encrypt = safexcel_encrypt,
1680 .encrypt = safexcel_aead_encrypt,
[all …]
/linux/lib/crypto/
H A Dchacha20poly1305.c215 int encrypt) in chacha20poly1305_crypt_sg_inplace() argument
264 if (!encrypt) in chacha20poly1305_crypt_sg_inplace()
294 if (encrypt) in chacha20poly1305_crypt_sg_inplace()
307 if (encrypt) { in chacha20poly1305_crypt_sg_inplace()
323 sg_copy_buffer(src, sg_nents(src), b.mac[encrypt], in chacha20poly1305_crypt_sg_inplace()
324 sizeof(b.mac[1]), src_len, !encrypt); in chacha20poly1305_crypt_sg_inplace()
325 ret = encrypt || in chacha20poly1305_crypt_sg_inplace()
/linux/Documentation/filesystems/
H A Dfscrypt.rst26 at the block device level. This allows it to encrypt different files
30 However, except for filenames, fscrypt does not encrypt filesystem
317 key and a single filenames encryption key. To still encrypt different
710 encrypted, even if it is empty. Users who want to encrypt an entire
736 kernel config, and the superblock must have had the "encrypt"
737 feature flag enabled using ``tune2fs -O encrypt`` or ``mkfs.ext4 -O
738 encrypt``.)
1324 hardware* that can encrypt/decrypt data while it is on its way to/from
1333 blk-crypto instead of the kernel crypto API to encrypt/decrypt file
1400 Implementation-wise, to encrypt/decrypt the contents of files that are
[all …]
/linux/fs/ubifs/
H A Dcrypto.c28 * ubifs_encrypt - Encrypt data.
30 * @dn: data node to encrypt
35 * This function encrypt a possibly-compressed data in the data node.
/linux/security/keys/trusted-keys/
H A Dtrusted_dcp.c33 * encrypt the trusted key payload using AES-128-GCM.
45 * @blob_key: Random AES 128 key which is used to encrypt @payload,
159 * If we encrypt our buffer has extra space for the auth tag. in do_aead_crypto()
221 pr_err("Unable to encrypt blob payload: %i\n", ret); in trusted_dcp_seal()
227 pr_err("Unable to encrypt blob key: %i\n", ret); in trusted_dcp_seal()
/linux/drivers/crypto/hisilicon/sec/
H A Dsec_algs.c630 *sec_alg_alloc_and_fill_el(struct sec_bd_info *template, int encrypt, in sec_alg_alloc_and_fill_el() argument
648 if (encrypt) in sec_alg_alloc_and_fill_el()
708 bool encrypt) in sec_alg_skcipher_crypto() argument
774 encrypt ? 1 : 0, in sec_alg_skcipher_crypto()
948 .encrypt = sec_alg_skcipher_encrypt,
968 .encrypt = sec_alg_skcipher_encrypt,
988 .encrypt = sec_alg_skcipher_encrypt,
1008 .encrypt = sec_alg_skcipher_encrypt,
1029 .encrypt = sec_alg_skcipher_encrypt,
1049 .encrypt = sec_alg_skcipher_encrypt,
[all …]
/linux/arch/arm64/mm/
H A Dpageattr.c268 bool encrypt) in __set_memory_enc_dec() argument
283 if (encrypt) in __set_memory_enc_dec()
299 if (encrypt) in __set_memory_enc_dec()
320 WARN(ret, "Failed to encrypt memory, %d pages will be leaked", in realm_set_memory_encrypted()
337 .encrypt = realm_set_memory_encrypted,
/linux/arch/s390/crypto/
H A Ddes_s390.c156 .encrypt = ecb_des_encrypt,
181 .encrypt = cbc_des_encrypt,
274 .encrypt = ecb_des3_encrypt,
299 .encrypt = cbc_des3_encrypt,
372 .encrypt = ctr_des_crypt,
393 .encrypt = ctr_des3_crypt,
/linux/include/crypto/
H A Dsm4.h41 * sm4_crypt_block - Encrypt or decrypt a single SM4 block
42 * @rk: The rkey_enc for encrypt or rkey_dec for decrypt
/linux/crypto/
H A Dchacha.c117 .encrypt = crypto_chacha_crypt,
133 .encrypt = crypto_xchacha_crypt,
149 .encrypt = crypto_xchacha_crypt,
/linux/drivers/crypto/ccp/
H A Dccp-crypto-aes-xts.c105 unsigned int encrypt) in ccp_aes_xts_crypt() argument
159 ret = encrypt ? crypto_skcipher_encrypt(&rctx->fallback_req) : in ccp_aes_xts_crypt()
171 rctx->cmd.u.xts.action = (encrypt) ? CCP_AES_ACTION_ENCRYPT in ccp_aes_xts_crypt()
256 alg->encrypt = ccp_aes_xts_encrypt; in ccp_register_aes_xts_alg()
/linux/arch/x86/mm/
H A Dmem_encrypt_boot.S25 * RDX - length to encrypt
77 * Routine used to encrypt memory in place.
126 /* Copy/encrypt up to 2MB at a time */
/linux/net/sunrpc/auth_gss/
H A Dgss_krb5_test.c469 .desc = "Encrypt with aes128-cts-hmac-sha1-96 case 1",
477 .desc = "Encrypt with aes128-cts-hmac-sha1-96 case 2",
485 .desc = "Encrypt with aes128-cts-hmac-sha1-96 case 3",
493 .desc = "Encrypt with aes128-cts-hmac-sha1-96 case 4",
501 .desc = "Encrypt with aes128-cts-hmac-sha1-96 case 5",
509 .desc = "Encrypt with aes128-cts-hmac-sha1-96 case 6",
1019 .desc = "Encrypt empty plaintext with camellia128-cts-cmac",
1028 .desc = "Encrypt 1 byte with camellia128-cts-cmac",
1037 .desc = "Encrypt 9 bytes with camellia128-cts-cmac",
1046 .desc = "Encrypt 13 bytes with camellia128-cts-cmac",
[all …]
/linux/drivers/crypto/cavium/cpt/
H A Dcptvf_algs.c350 .encrypt = cvm_encrypt,
368 .encrypt = cvm_encrypt,
385 .encrypt = cvm_encrypt,
403 .encrypt = cvm_encrypt,
421 .encrypt = cvm_encrypt,

12345678910