| /linux/drivers/crypto/ccp/ |
| H A D | ccp-crypto-aes-cmac.c | 69 if (!ctx->u.aes.key_len) in ccp_do_cmac_update() 153 cmac_key_sg = (need_pad) ? &ctx->u.aes.k2_sg in ccp_do_cmac_update() 154 : &ctx->u.aes.k1_sg; in ccp_do_cmac_update() 159 rctx->cmd.u.aes.type = ctx->u.aes.type; in ccp_do_cmac_update() 160 rctx->cmd.u.aes.mode = ctx->u.aes.mode; in ccp_do_cmac_update() 161 rctx->cmd.u.aes.action = CCP_AES_ACTION_ENCRYPT; in ccp_do_cmac_update() 162 rctx->cmd.u.aes.key = &ctx->u.aes.key_sg; in ccp_do_cmac_update() 163 rctx->cmd.u.aes.key_len = ctx->u.aes.key_len; in ccp_do_cmac_update() 164 rctx->cmd.u.aes.iv = &rctx->iv_sg; in ccp_do_cmac_update() 165 rctx->cmd.u.aes.iv_len = AES_BLOCK_SIZE; in ccp_do_cmac_update() [all …]
|
| H A D | ccp-crypto-aes-galois.c | 36 ctx->u.aes.type = CCP_AES_TYPE_128; in ccp_aes_gcm_setkey() 39 ctx->u.aes.type = CCP_AES_TYPE_192; in ccp_aes_gcm_setkey() 42 ctx->u.aes.type = CCP_AES_TYPE_256; in ccp_aes_gcm_setkey() 48 ctx->u.aes.mode = CCP_AES_MODE_GCM; in ccp_aes_gcm_setkey() 49 ctx->u.aes.key_len = key_len; in ccp_aes_gcm_setkey() 51 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_gcm_setkey() 52 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); in ccp_aes_gcm_setkey() 86 if (!ctx->u.aes.key_len) in ccp_aes_gcm_crypt() 89 if (ctx->u.aes.mode != CCP_AES_MODE_GCM) in ccp_aes_gcm_crypt() 119 rctx->cmd.u.aes.authsize = crypto_aead_authsize(tfm); in ccp_aes_gcm_crypt() [all …]
|
| H A D | ccp-crypto-aes.c | 33 if (ctx->u.aes.mode != CCP_AES_MODE_ECB) in ccp_aes_complete() 47 ctx->u.aes.type = CCP_AES_TYPE_128; in ccp_aes_setkey() 50 ctx->u.aes.type = CCP_AES_TYPE_192; in ccp_aes_setkey() 53 ctx->u.aes.type = CCP_AES_TYPE_256; in ccp_aes_setkey() 58 ctx->u.aes.mode = alg->mode; in ccp_aes_setkey() 59 ctx->u.aes.key_len = key_len; in ccp_aes_setkey() 61 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_setkey() 62 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); in ccp_aes_setkey() 75 if (!ctx->u.aes.key_len) in ccp_aes_crypt() 78 if (((ctx->u.aes.mode == CCP_AES_MODE_ECB) || in ccp_aes_crypt() [all …]
|
| H A D | ccp-ops.c | 479 struct ccp_aes_engine *aes = &cmd->u.aes; in ccp_run_aes_cmac_cmd() local 486 if (!((aes->key_len == AES_KEYSIZE_128) || in ccp_run_aes_cmac_cmd() 487 (aes->key_len == AES_KEYSIZE_192) || in ccp_run_aes_cmac_cmd() 488 (aes->key_len == AES_KEYSIZE_256))) in ccp_run_aes_cmac_cmd() 491 if (aes->src_len & (AES_BLOCK_SIZE - 1)) in ccp_run_aes_cmac_cmd() 494 if (aes->iv_len != AES_BLOCK_SIZE) in ccp_run_aes_cmac_cmd() 497 if (!aes->key || !aes->iv || !aes->src) in ccp_run_aes_cmac_cmd() 500 if (aes->cmac_final) { in ccp_run_aes_cmac_cmd() 501 if (aes->cmac_key_len != AES_BLOCK_SIZE) in ccp_run_aes_cmac_cmd() 504 if (!aes->cmac_key) in ccp_run_aes_cmac_cmd() [all …]
|
| H A D | ccp-crypto-aes-xts.c | 91 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_xts_setkey() 95 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_xts_setkey() 98 ctx->u.aes.key_len = key_len / 2; in ccp_aes_xts_setkey() 99 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); in ccp_aes_xts_setkey() 101 return crypto_skcipher_setkey(ctx->u.aes.tfm_skcipher, key, key_len); in ccp_aes_xts_setkey() 116 if (!ctx->u.aes.key_len) in ccp_aes_xts_crypt() 142 (ctx->u.aes.key_len != AES_KEYSIZE_128)) in ccp_aes_xts_crypt() 144 if ((ctx->u.aes.key_len != AES_KEYSIZE_128) && in ccp_aes_xts_crypt() 145 (ctx->u.aes.key_len != AES_KEYSIZE_256)) in ccp_aes_xts_crypt() 152 ctx->u.aes.tfm_skcipher); in ccp_aes_xts_crypt() [all …]
|
| H A D | Makefile | 25 ccp-crypto-aes.o \ 26 ccp-crypto-aes-cmac.o \ 27 ccp-crypto-aes-xts.o \ 28 ccp-crypto-aes-galois.o \
|
| H A D | ccp-dev-v5.c | 98 } aes; member 137 #define CCP_AES_SIZE(p) ((p)->aes.size) 138 #define CCP_AES_ENCRYPT(p) ((p)->aes.encrypt) 139 #define CCP_AES_MODE(p) ((p)->aes.mode) 140 #define CCP_AES_TYPE(p) ((p)->aes.type) 297 CCP_AES_ENCRYPT(&function) = op->u.aes.action; in ccp5_perform_aes() 298 CCP_AES_MODE(&function) = op->u.aes.mode; in ccp5_perform_aes() 299 CCP_AES_TYPE(&function) = op->u.aes.type; in ccp5_perform_aes() 300 CCP_AES_SIZE(&function) = op->u.aes.size; in ccp5_perform_aes() 1099 .aes = ccp5_perform_aes,
|
| H A D | ccp-dev-v3.c | 154 | (op->u.aes.type << REQ1_AES_TYPE_SHIFT) in ccp_perform_aes() 155 | (op->u.aes.mode << REQ1_AES_MODE_SHIFT) in ccp_perform_aes() 156 | (op->u.aes.action << REQ1_AES_ACTION_SHIFT) in ccp_perform_aes() 167 if (op->u.aes.mode == CCP_AES_MODE_CFB) in ccp_perform_aes() 568 .aes = ccp_perform_aes,
|
| /linux/arch/arm64/crypto/ |
| H A D | aes-ce.S | 53 aes\de \i0\().16b, \k\().16b 54 aes\mc \i0\().16b, \i0\().16b 56 aes\de \i1\().16b, \k\().16b 57 aes\mc \i1\().16b, \i1\().16b 59 aes\de \i2\().16b, \k\().16b 60 aes\mc \i2\().16b, \i2\().16b 61 aes\de \i3\().16b, \k\().16b 62 aes\mc \i3\().16b, \i3\().16b 64 aes\de \i4\().16b, \k\().16b 65 aes\mc \i4\().16b, \i4\().16b [all …]
|
| /linux/arch/riscv/crypto/ |
| H A D | Makefile | 3 obj-$(CONFIG_CRYPTO_AES_RISCV64) += aes-riscv64.o 4 aes-riscv64-y := aes-riscv64-glue.o aes-riscv64-zvkned.o \ 5 aes-riscv64-zvkned-zvbb-zvkg.o aes-riscv64-zvkned-zvkb.o
|
| /linux/drivers/crypto/nx/ |
| H A D | Makefile | 4 nx-aes-cbc.o \ 5 nx-aes-ecb.o \ 6 nx-aes-gcm.o \ 7 nx-aes-ccm.o \ 8 nx-aes-ctr.o \ 9 nx-aes-xcbc.o \
|
| /linux/drivers/net/wireless/ti/wl12xx/ |
| H A D | debugfs.c | 80 WL12XX_DEBUGFS_FWSTATS_FILE(aes, encrypt_fail, "%u"); 81 WL12XX_DEBUGFS_FWSTATS_FILE(aes, decrypt_fail, "%u"); 82 WL12XX_DEBUGFS_FWSTATS_FILE(aes, encrypt_packets, "%u"); 83 WL12XX_DEBUGFS_FWSTATS_FILE(aes, decrypt_packets, "%u"); 84 WL12XX_DEBUGFS_FWSTATS_FILE(aes, encrypt_interrupt, "%u"); 85 WL12XX_DEBUGFS_FWSTATS_FILE(aes, decrypt_interrupt, "%u"); 180 DEBUGFS_FWSTATS_ADD(aes, encrypt_fail); in wl12xx_debugfs_add_files() 181 DEBUGFS_FWSTATS_ADD(aes, decrypt_fail); in wl12xx_debugfs_add_files() 182 DEBUGFS_FWSTATS_ADD(aes, encrypt_packets); in wl12xx_debugfs_add_files() 183 DEBUGFS_FWSTATS_ADD(aes, decrypt_packets); in wl12xx_debugfs_add_files() [all …]
|
| /linux/drivers/net/wireless/ti/wl1251/ |
| H A D | debugfs.c | 162 DEBUGFS_FWSTATS_FILE(aes, encrypt_fail, 20, "%u"); 163 DEBUGFS_FWSTATS_FILE(aes, decrypt_fail, 20, "%u"); 164 DEBUGFS_FWSTATS_FILE(aes, encrypt_packets, 20, "%u"); 165 DEBUGFS_FWSTATS_FILE(aes, decrypt_packets, 20, "%u"); 166 DEBUGFS_FWSTATS_FILE(aes, encrypt_interrupt, 20, "%u"); 167 DEBUGFS_FWSTATS_FILE(aes, decrypt_interrupt, 20, "%u"); 302 DEBUGFS_FWSTATS_DEL(aes, encrypt_fail); in wl1251_debugfs_delete_files() 303 DEBUGFS_FWSTATS_DEL(aes, decrypt_fail); in wl1251_debugfs_delete_files() 304 DEBUGFS_FWSTATS_DEL(aes, encrypt_packets); in wl1251_debugfs_delete_files() 305 DEBUGFS_FWSTATS_DEL(aes, decrypt_packets); in wl1251_debugfs_delete_files() [all …]
|
| /linux/drivers/crypto/intel/keembay/ |
| H A D | Makefile | 4 obj-$(CONFIG_CRYPTO_DEV_KEEMBAY_OCS_AES_SM4) += keembay-ocs-aes.o 5 keembay-ocs-aes-objs := keembay-ocs-aes-core.o ocs-aes.o
|
| H A D | Kconfig | 13 cbc(aes), ctr(aes), ccm(aes), gcm(aes), cbc(sm4), ctr(sm4), ccm(sm4) 17 enabled: ecb(aes), cts(cbc(aes)), ecb(sm4) and cts(cbc(sm4)). 26 Provides OCS version of ecb(aes) and ecb(sm4) 38 Provides OCS version of cts(cbc(aes)) and cts(cbc(sm4)).
|
| /linux/Documentation/admin-guide/device-mapper/ |
| H A D | dm-crypt.rst | 25 aes-cbc-essiv:sha256 26 aes-xts-plain64 40 capi:cbc(aes)-essiv:sha256 41 capi:xts(aes)-plain64 45 capi:gcm(aes)-random 46 capi:authenc(hmac(sha256),xts(aes))-random 199 …dmsetup create crypt1 --table "0 `blockdev --getsz $1` crypt aes-cbc-essiv:sha256 babebabebabebabe… 205 …dmsetup create crypt2 --table "0 `blockdev --getsize $1` crypt aes-cbc-essiv:sha256 :32:logon:my_p…
|
| /linux/arch/arm/boot/dts/ti/omap/ |
| H A D | omap2.dtsi | 58 aes: aes@480a6000 { label 59 compatible = "ti,omap2-aes"; 60 ti,hwmods = "aes";
|
| /linux/drivers/crypto/starfive/ |
| H A D | Makefile | 4 jh7110-crypto-objs := jh7110-cryp.o jh7110-hash.o jh7110-rsa.o jh7110-aes.o
|
| /linux/drivers/crypto/inside-secure/ |
| H A D | safexcel_hash.c | 33 struct aes_enckey *aes; member 825 aes_encrypt(ctx->aes, areq->result, areq->result); in safexcel_ahash_final() 1908 struct crypto_aes_ctx aes; in safexcel_cbcmac_setkey() local 1911 ret = aes_expandkey(&aes, key, len); in safexcel_cbcmac_setkey() 1917 ctx->base.ipad.be[i + 8] = cpu_to_be32(aes.key_enc[i]); in safexcel_cbcmac_setkey() 1931 memzero_explicit(&aes, sizeof(aes)); in safexcel_cbcmac_setkey() 1979 ret = aes_prepareenckey(ctx->aes, key, len); in safexcel_xcbcmac_setkey() 1984 aes_encrypt(ctx->aes, (u8 *)key_tmp + 2 * AES_BLOCK_SIZE, in safexcel_xcbcmac_setkey() 1986 aes_encrypt(ctx->aes, (u8 *)key_tmp, in safexcel_xcbcmac_setkey() 1988 aes_encrypt(ctx->aes, (u8 *)key_tmp + AES_BLOCK_SIZE, in safexcel_xcbcmac_setkey() [all …]
|
| /linux/drivers/crypto/tegra/ |
| H A D | Makefile | 6 tegra-se-y += tegra-se-aes.o
|
| /linux/drivers/net/ethernet/chelsio/inline_crypto/ch_ipsec/ |
| H A D | chcr_ipsec.c | 173 struct aes_enckey aes; in ch_ipsec_setkey() local 207 ret = aes_prepareenckey(&aes, key, keylen); in ch_ipsec_setkey() 213 aes_encrypt(&aes, ghash_h, ghash_h); in ch_ipsec_setkey() 214 memzero_explicit(&aes, sizeof(aes)); in ch_ipsec_setkey()
|
| /linux/drivers/net/wireless/intel/iwlwifi/mvm/ |
| H A D | d3.c | 272 data->rsc_tsc->all_tsc_rsc.aes.unicast_rsc; in iwl_mvm_wowlan_get_rsc_tsc_data() 274 &data->rsc_tsc->all_tsc_rsc.aes.tsc; in iwl_mvm_wowlan_get_rsc_tsc_data() 280 data->rsc_tsc->all_tsc_rsc.aes.multicast_rsc; in iwl_mvm_wowlan_get_rsc_tsc_data() 1422 } tkip, aes; member 1438 } tkip, aes; member 1634 iwl_mvm_set_key_rx_seq_tids(key, status->ptk.aes.seq); in iwl_mvm_set_aes_ptk_rx_seq() 1652 status->ptk.aes.seq[tid].ccmp.pn, in iwl_mvm_set_aes_ptk_rx_seq() 1670 iwl_mvm_aes_sc_to_seq(&sc->aes.multicast_rsc[i], in iwl_mvm_convert_key_counters() 1671 &status->gtk_seq[0].aes.seq[i]); in iwl_mvm_convert_key_counters() 1679 status->ptk.aes.tx_pn = le64_to_cpu(sc->aes.tsc.pn); in iwl_mvm_convert_key_counters() [all …]
|
| /linux/drivers/net/wireless/marvell/mwifiex/ |
| H A D | sta_cmdresp.c | 610 len = le16_to_cpu(key_v2->key_param_set.key_params.aes.key_len); in mwifiex_ret_802_11_key_material_v2() 611 if (len > sizeof(key_v2->key_param_set.key_params.aes.key)) in mwifiex_ret_802_11_key_material_v2() 626 memset(priv->aes_key_v2.key_param_set.key_params.aes.key, 0, in mwifiex_ret_802_11_key_material_v2() 627 sizeof(key_v2->key_param_set.key_params.aes.key)); in mwifiex_ret_802_11_key_material_v2() 628 priv->aes_key_v2.key_param_set.key_params.aes.key_len = in mwifiex_ret_802_11_key_material_v2() 630 memcpy(priv->aes_key_v2.key_param_set.key_params.aes.key, in mwifiex_ret_802_11_key_material_v2() 631 key_v2->key_param_set.key_params.aes.key, len); in mwifiex_ret_802_11_key_material_v2()
|
| /linux/Documentation/crypto/ |
| H A D | api-samples.rst | 33 tfm = crypto_alloc_skcipher("xts(aes)", 0, 0); 35 pr_err("Error allocating xts(aes) handle: %ld\n", PTR_ERR(tfm));
|
| /linux/drivers/net/phy/mscc/ |
| H A D | mscc_macsec.c | 507 struct aes_enckey aes; in vsc8584_macsec_derive_key() local 510 ret = aes_prepareenckey(&aes, key, key_len); in vsc8584_macsec_derive_key() 514 aes_encrypt(&aes, hkey, input); in vsc8584_macsec_derive_key() 515 memzero_explicit(&aes, sizeof(aes)); in vsc8584_macsec_derive_key()
|