/Linux-v4.19/drivers/crypto/ |
D | geode-aes.c | 126 if (len == AES_KEYSIZE_128) { in geode_setkey_cip() 159 if (len == AES_KEYSIZE_128) { in geode_setkey_blk() 222 if (unlikely(op->keylen != AES_KEYSIZE_128)) { in geode_encrypt() 243 if (unlikely(op->keylen != AES_KEYSIZE_128)) { in geode_decrypt() 314 if (unlikely(op->keylen != AES_KEYSIZE_128)) in geode_cbc_decrypt() 346 if (unlikely(op->keylen != AES_KEYSIZE_128)) in geode_cbc_encrypt() 427 if (unlikely(op->keylen != AES_KEYSIZE_128)) in geode_ecb_decrypt() 457 if (unlikely(op->keylen != AES_KEYSIZE_128)) in geode_ecb_encrypt()
|
D | mxs-dcp.c | 52 uint8_t aes_key[2 * AES_KEYSIZE_128]; 89 uint8_t key[AES_KEYSIZE_128]; 205 2 * AES_KEYSIZE_128, in mxs_dcp_run_aes() 241 dma_unmap_single(sdcp->dev, key_phys, 2 * AES_KEYSIZE_128, in mxs_dcp_run_aes() 282 memcpy(key + AES_KEYSIZE_128, req->info, AES_KEYSIZE_128); in mxs_dcp_aes_block_crypt() 286 memset(key + AES_KEYSIZE_128, 0, AES_KEYSIZE_128); in mxs_dcp_aes_block_crypt() 409 if (unlikely(actx->key_len != AES_KEYSIZE_128)) in mxs_dcp_aes_enqueue() 457 if (len == AES_KEYSIZE_128) { in mxs_dcp_aes_setkey()
|
D | geode-aes.h | 63 u8 key[AES_KEYSIZE_128];
|
D | sahara.c | 151 u8 key[AES_KEYSIZE_128]; 577 memcpy(dev->iv_base, req->info, AES_KEYSIZE_128); in sahara_aes_process() 612 if (keylen == AES_KEYSIZE_128) { in sahara_aes_setkey() 668 if (unlikely(ctx->keylen != AES_KEYSIZE_128)) { in sahara_aes_ecb_encrypt() 690 if (unlikely(ctx->keylen != AES_KEYSIZE_128)) { in sahara_aes_ecb_decrypt() 712 if (unlikely(ctx->keylen != AES_KEYSIZE_128)) { in sahara_aes_cbc_encrypt() 734 if (unlikely(ctx->keylen != AES_KEYSIZE_128)) { in sahara_aes_cbc_decrypt() 1451 dev->key_base = dmam_alloc_coherent(&pdev->dev, 2 * AES_KEYSIZE_128, in sahara_probe() 1457 dev->iv_base = dev->key_base + AES_KEYSIZE_128; in sahara_probe() 1458 dev->iv_phys_base = dev->key_phys_base + AES_KEYSIZE_128; in sahara_probe()
|
D | omap-aes-gcm.c | 381 if (keylen != AES_KEYSIZE_128 && keylen != AES_KEYSIZE_192 && in omap_aes_gcm_setkey() 400 if (keylen != AES_KEYSIZE_128 && keylen != AES_KEYSIZE_192 && in omap_aes_4106gcm_setkey()
|
/Linux-v4.19/drivers/crypto/ccree/ |
D | cc_ivgen.c | 16 #define CC_IVPOOL_META_SIZE (CC_AES_IV_SIZE + AES_KEYSIZE_128) 56 set_din_sram(&iv_seq[idx], ivgen_ctx->ctr_key, AES_KEYSIZE_128); in cc_gen_iv_pool() 116 ivgen_ctx->ctr_iv = ivgen_ctx->pool + AES_KEYSIZE_128; in cc_init_iv_sram()
|
D | cc_aead.c | 282 AES_KEYSIZE_128, NS_BIT, 0); in xcbc_setkey() 288 + AES_KEYSIZE_128), in xcbc_setkey() 289 AES_KEYSIZE_128, NS_BIT, 0); in xcbc_setkey() 295 + 2 * AES_KEYSIZE_128), in xcbc_setkey() 296 AES_KEYSIZE_128, NS_BIT, 0); in xcbc_setkey() 382 if (ctx->auth_keylen != AES_KEYSIZE_128 && in validate_keys_sizes() 403 if (ctx->enc_keylen != AES_KEYSIZE_128 && in validate_keys_sizes() 1034 AES_KEYSIZE_128, NS_BIT); in cc_set_xcbc_desc() 1047 AES_KEYSIZE_128), AES_KEYSIZE_128, NS_BIT); in cc_set_xcbc_desc() 1060 2 * AES_KEYSIZE_128), AES_KEYSIZE_128, NS_BIT); in cc_set_xcbc_desc()
|
/Linux-v4.19/arch/powerpc/crypto/ |
D | aes-spe-glue.c | 99 if (key_len != AES_KEYSIZE_128 && in ppc_aes_setkey() 107 case AES_KEYSIZE_128: in ppc_aes_setkey() 138 if (key_len != AES_KEYSIZE_128 && in ppc_xts_setkey() 146 case AES_KEYSIZE_128: in ppc_xts_setkey() 149 ppc_expand_key_128(ctx->key_twk, in_key + AES_KEYSIZE_128); in ppc_xts_setkey()
|
/Linux-v4.19/drivers/crypto/ccp/ |
D | ccp-crypto-aes-xts.c | 94 case AES_KEYSIZE_128 * 2: in ccp_aes_xts_setkey() 148 (ctx->u.aes.key_len != AES_KEYSIZE_128)) in ccp_aes_xts_crypt() 150 if ((ctx->u.aes.key_len != AES_KEYSIZE_128) && in ccp_aes_xts_crypt()
|
D | ccp-crypto-aes-galois.c | 38 case AES_KEYSIZE_128: in ccp_aes_gcm_setkey()
|
D | ccp-crypto-aes.c | 48 case AES_KEYSIZE_128: in ccp_aes_setkey()
|
/Linux-v4.19/include/crypto/ |
D | aes.h | 14 #define AES_KEYSIZE_128 16 macro
|
/Linux-v4.19/arch/x86/crypto/ |
D | aesni-intel_glue.c | 212 if ((plaintext_len < AVX_GEN2_OPTSIZE) || (aes_ctx-> key_length != AES_KEYSIZE_128)){ in aesni_gcm_enc_avx() 230 if ((ciphertext_len < AVX_GEN2_OPTSIZE) || (aes_ctx-> key_length != AES_KEYSIZE_128)) { in aesni_gcm_dec_avx() 267 if ((plaintext_len < AVX_GEN2_OPTSIZE) || (aes_ctx-> key_length != AES_KEYSIZE_128)) { in aesni_gcm_enc_avx2() 289 if ((ciphertext_len < AVX_GEN2_OPTSIZE) || (aes_ctx-> key_length != AES_KEYSIZE_128)) { in aesni_gcm_dec_avx2() 357 if (key_len != AES_KEYSIZE_128 && key_len != AES_KEYSIZE_192 && in aes_set_key_common() 541 if (ctx->key_length == AES_KEYSIZE_128) in aesni_ctr_enc_avx_tfm() 926 if (((struct crypto_aes_ctx *)aes_ctx)->key_length != AES_KEYSIZE_128 || in gcmaes_encrypt() 998 if (((struct crypto_aes_ctx *)aes_ctx)->key_length != AES_KEYSIZE_128 || in gcmaes_decrypt()
|
/Linux-v4.19/drivers/crypto/nx/ |
D | nx-aes-ecb.c | 43 case AES_KEYSIZE_128: in ecb_aes_nx_set_key()
|
D | nx-aes-cbc.c | 43 case AES_KEYSIZE_128: in cbc_aes_nx_set_key()
|
D | nx-aes-ctr.c | 44 case AES_KEYSIZE_128: in ctr_aes_nx_set_key()
|
D | nx-aes-xcbc.c | 48 case AES_KEYSIZE_128: in nx_xcbc_set_key()
|
/Linux-v4.19/drivers/crypto/chelsio/chtls/ |
D | chtls_hw.c | 216 unsigned char key[AES_KEYSIZE_128]; in chtls_key_info() 229 if (keylen == AES_KEYSIZE_128) { in chtls_key_info()
|
/Linux-v4.19/drivers/crypto/hisilicon/sec/ |
D | sec_algs.c | 263 case AES_KEYSIZE_128: in sec_alg_skcipher_setkey_aes_ecb() 285 case AES_KEYSIZE_128: in sec_alg_skcipher_setkey_aes_cbc() 307 case AES_KEYSIZE_128: in sec_alg_skcipher_setkey_aes_ctr() 334 case AES_KEYSIZE_128 * 2: in sec_alg_skcipher_setkey_aes_xts()
|
/Linux-v4.19/arch/arm64/crypto/ |
D | aes-ce-glue.c | 93 if (key_len != AES_KEYSIZE_128 && in ce_aes_expandkey()
|
/Linux-v4.19/drivers/crypto/qce/ |
D | ablkcipher.c | 173 case AES_KEYSIZE_128: in qce_ablkcipher_setkey() 213 if (IS_AES(rctx->flags) && ctx->enc_keylen != AES_KEYSIZE_128 && in qce_ablkcipher_crypt()
|
D | common.c | 61 if (aes_key_size == AES_KEYSIZE_128) in qce_encr_cfg() 112 if (key_size == AES_KEYSIZE_128) in qce_auth_cfg()
|
/Linux-v4.19/crypto/ |
D | aes_generic.c | 1222 if (key_len != AES_KEYSIZE_128 && key_len != AES_KEYSIZE_192 && in crypto_aes_expand_key() 1239 case AES_KEYSIZE_128: in crypto_aes_expand_key()
|
D | aes_ti.c | 176 if (key_len != AES_KEYSIZE_128 && in aesti_expand_key()
|
/Linux-v4.19/drivers/crypto/cavium/nitrox/ |
D | nitrox_algs.c | 57 case AES_KEYSIZE_128: in flexi_aes_keylen()
|