/Linux-v4.19/drivers/crypto/mediatek/ |
D | mtk-aes.c | 220 static inline void mtk_aes_set_mode(struct mtk_aes_rec *aes, in mtk_aes_set_mode() argument 224 aes->flags = (aes->flags & AES_FLAGS_BUSY) | rctx->mode; in mtk_aes_set_mode() 261 struct mtk_aes_rec *aes, in mtk_aes_complete() argument 264 aes->flags &= ~AES_FLAGS_BUSY; in mtk_aes_complete() 265 aes->areq->complete(aes->areq, err); in mtk_aes_complete() 267 tasklet_schedule(&aes->queue_task); in mtk_aes_complete() 275 static int mtk_aes_xmit(struct mtk_cryp *cryp, struct mtk_aes_rec *aes) in mtk_aes_xmit() argument 277 struct mtk_ring *ring = cryp->ring[aes->id]; in mtk_aes_xmit() 279 struct scatterlist *ssg = aes->src.sg, *dsg = aes->dst.sg; in mtk_aes_xmit() 280 u32 slen = aes->src.sg_len, dlen = aes->dst.sg_len; in mtk_aes_xmit() [all …]
|
D | mtk-platform.h | 126 typedef int (*mtk_aes_fn)(struct mtk_cryp *cryp, struct mtk_aes_rec *aes); 221 struct mtk_aes_rec *aes[MTK_REC_NUM]; member
|
/Linux-v4.19/drivers/crypto/ccp/ |
D | ccp-crypto-aes-cmac.c | 72 if (!ctx->u.aes.key_len) in ccp_do_cmac_update() 156 cmac_key_sg = (need_pad) ? &ctx->u.aes.k2_sg in ccp_do_cmac_update() 157 : &ctx->u.aes.k1_sg; in ccp_do_cmac_update() 162 rctx->cmd.u.aes.type = ctx->u.aes.type; in ccp_do_cmac_update() 163 rctx->cmd.u.aes.mode = ctx->u.aes.mode; in ccp_do_cmac_update() 164 rctx->cmd.u.aes.action = CCP_AES_ACTION_ENCRYPT; in ccp_do_cmac_update() 165 rctx->cmd.u.aes.key = &ctx->u.aes.key_sg; in ccp_do_cmac_update() 166 rctx->cmd.u.aes.key_len = ctx->u.aes.key_len; in ccp_do_cmac_update() 167 rctx->cmd.u.aes.iv = &rctx->iv_sg; in ccp_do_cmac_update() 168 rctx->cmd.u.aes.iv_len = AES_BLOCK_SIZE; in ccp_do_cmac_update() [all …]
|
D | ccp-crypto-aes-galois.c | 39 ctx->u.aes.type = CCP_AES_TYPE_128; in ccp_aes_gcm_setkey() 42 ctx->u.aes.type = CCP_AES_TYPE_192; in ccp_aes_gcm_setkey() 45 ctx->u.aes.type = CCP_AES_TYPE_256; in ccp_aes_gcm_setkey() 52 ctx->u.aes.mode = CCP_AES_MODE_GCM; in ccp_aes_gcm_setkey() 53 ctx->u.aes.key_len = key_len; in ccp_aes_gcm_setkey() 55 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_gcm_setkey() 56 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); in ccp_aes_gcm_setkey() 77 if (!ctx->u.aes.key_len) in ccp_aes_gcm_crypt() 80 if (ctx->u.aes.mode != CCP_AES_MODE_GCM) in ccp_aes_gcm_crypt() 110 rctx->cmd.u.aes.type = ctx->u.aes.type; in ccp_aes_gcm_crypt() [all …]
|
D | ccp-crypto-aes.c | 34 if (ctx->u.aes.mode != CCP_AES_MODE_ECB) in ccp_aes_complete() 49 ctx->u.aes.type = CCP_AES_TYPE_128; in ccp_aes_setkey() 52 ctx->u.aes.type = CCP_AES_TYPE_192; in ccp_aes_setkey() 55 ctx->u.aes.type = CCP_AES_TYPE_256; in ccp_aes_setkey() 61 ctx->u.aes.mode = alg->mode; in ccp_aes_setkey() 62 ctx->u.aes.key_len = key_len; in ccp_aes_setkey() 64 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_setkey() 65 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); in ccp_aes_setkey() 78 if (!ctx->u.aes.key_len) in ccp_aes_crypt() 81 if (((ctx->u.aes.mode == CCP_AES_MODE_ECB) || in ccp_aes_crypt() [all …]
|
D | ccp-ops.c | 464 struct ccp_aes_engine *aes = &cmd->u.aes; in ccp_run_aes_cmac_cmd() local 471 if (!((aes->key_len == AES_KEYSIZE_128) || in ccp_run_aes_cmac_cmd() 472 (aes->key_len == AES_KEYSIZE_192) || in ccp_run_aes_cmac_cmd() 473 (aes->key_len == AES_KEYSIZE_256))) in ccp_run_aes_cmac_cmd() 476 if (aes->src_len & (AES_BLOCK_SIZE - 1)) in ccp_run_aes_cmac_cmd() 479 if (aes->iv_len != AES_BLOCK_SIZE) in ccp_run_aes_cmac_cmd() 482 if (!aes->key || !aes->iv || !aes->src) in ccp_run_aes_cmac_cmd() 485 if (aes->cmac_final) { in ccp_run_aes_cmac_cmd() 486 if (aes->cmac_key_len != AES_BLOCK_SIZE) in ccp_run_aes_cmac_cmd() 489 if (!aes->cmac_key) in ccp_run_aes_cmac_cmd() [all …]
|
D | ccp-crypto-aes-xts.c | 95 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_xts_setkey() 99 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_xts_setkey() 102 ctx->u.aes.key_len = key_len / 2; in ccp_aes_xts_setkey() 103 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); in ccp_aes_xts_setkey() 105 return crypto_skcipher_setkey(ctx->u.aes.tfm_skcipher, key, key_len); in ccp_aes_xts_setkey() 119 if (!ctx->u.aes.key_len) in ccp_aes_xts_crypt() 148 (ctx->u.aes.key_len != AES_KEYSIZE_128)) in ccp_aes_xts_crypt() 150 if ((ctx->u.aes.key_len != AES_KEYSIZE_128) && in ccp_aes_xts_crypt() 151 (ctx->u.aes.key_len != AES_KEYSIZE_256)) in ccp_aes_xts_crypt() 154 SKCIPHER_REQUEST_ON_STACK(subreq, ctx->u.aes.tfm_skcipher); in ccp_aes_xts_crypt() [all …]
|
D | Makefile | 15 ccp-crypto-aes.o \ 16 ccp-crypto-aes-cmac.o \ 17 ccp-crypto-aes-xts.o \ 18 ccp-crypto-aes-galois.o \
|
/Linux-v4.19/arch/arm64/crypto/ |
D | Makefile | 38 obj-$(CONFIG_CRYPTO_AES_ARM64_CE) += aes-ce-cipher.o 39 aes-ce-cipher-y := aes-ce-core.o aes-ce-glue.o 41 obj-$(CONFIG_CRYPTO_AES_ARM64_CE_CCM) += aes-ce-ccm.o 42 aes-ce-ccm-y := aes-ce-ccm-glue.o aes-ce-ccm-core.o 44 obj-$(CONFIG_CRYPTO_AES_ARM64_CE_BLK) += aes-ce-blk.o 45 aes-ce-blk-y := aes-glue-ce.o aes-ce.o 47 obj-$(CONFIG_CRYPTO_AES_ARM64_NEON_BLK) += aes-neon-blk.o 48 aes-neon-blk-y := aes-glue-neon.o aes-neon.o 62 obj-$(CONFIG_CRYPTO_AES_ARM64) += aes-arm64.o 63 aes-arm64-y := aes-cipher-core.o aes-cipher-glue.o [all …]
|
D | aes-ce.S | 51 aes\de \i0\().16b, \k\().16b 52 aes\mc \i0\().16b, \i0\().16b 54 aes\de \i1\().16b, \k\().16b 55 aes\mc \i1\().16b, \i1\().16b 57 aes\de \i2\().16b, \k\().16b 58 aes\mc \i2\().16b, \i2\().16b 59 aes\de \i3\().16b, \k\().16b 60 aes\mc \i3\().16b, \i3\().16b 76 aes\de \i0\().16b, \k\().16b 78 aes\de \i1\().16b, \k\().16b [all …]
|
/Linux-v4.19/arch/arm/crypto/ |
D | Makefile | 6 obj-$(CONFIG_CRYPTO_AES_ARM) += aes-arm.o 7 obj-$(CONFIG_CRYPTO_AES_ARM_BS) += aes-arm-bs.o 15 ce-obj-$(CONFIG_CRYPTO_AES_ARM_CE) += aes-arm-ce.o 42 aes-arm-y := aes-cipher-core.o aes-cipher-glue.o 43 aes-arm-bs-y := aes-neonbs-core.o aes-neonbs-glue.o 52 aes-arm-ce-y := aes-ce-core.o aes-ce-glue.o
|
/Linux-v4.19/arch/powerpc/crypto/ |
D | Makefile | 8 obj-$(CONFIG_CRYPTO_AES_PPC_SPE) += aes-ppc-spe.o 17 aes-ppc-spe-y := aes-spe-core.o aes-spe-keys.o aes-tab-4k.o aes-spe-modes.o aes-spe-glue.o
|
/Linux-v4.19/drivers/crypto/nx/ |
D | Makefile | 5 nx-aes-cbc.o \ 6 nx-aes-ecb.o \ 7 nx-aes-gcm.o \ 8 nx-aes-ccm.o \ 9 nx-aes-ctr.o \ 10 nx-aes-xcbc.o \
|
/Linux-v4.19/Documentation/devicetree/bindings/crypto/ |
D | omap-aes.txt | 7 - "ti,omap2-aes" for OMAP2. 8 - "ti,omap3-aes" for OMAP3. 9 - "ti,omap4-aes" for OMAP4 and AM33XX. 23 aes: aes@53500000 { 24 compatible = "ti,omap4-aes"; 25 ti,hwmods = "aes";
|
D | atmel-crypto.txt | 8 - compatible : Should be "atmel,at91sam9g46-aes". 17 aes@f8038000 { 18 compatible = "atmel,at91sam9g46-aes";
|
/Linux-v4.19/drivers/crypto/ |
D | Makefile | 2 obj-$(CONFIG_CRYPTO_DEV_ATMEL_AES) += atmel-aes.o 14 obj-$(CONFIG_CRYPTO_DEV_GEODE) += geode-aes.o 26 obj-$(CONFIG_CRYPTO_DEV_OMAP_AES) += omap-aes-driver.o 27 omap-aes-driver-objs := omap-aes.o omap-aes-gcm.o 30 obj-$(CONFIG_CRYPTO_DEV_PADLOCK_AES) += padlock-aes.o
|
/Linux-v4.19/drivers/net/wireless/ti/wl12xx/ |
D | debugfs.c | 94 WL12XX_DEBUGFS_FWSTATS_FILE(aes, encrypt_fail, "%u"); 95 WL12XX_DEBUGFS_FWSTATS_FILE(aes, decrypt_fail, "%u"); 96 WL12XX_DEBUGFS_FWSTATS_FILE(aes, encrypt_packets, "%u"); 97 WL12XX_DEBUGFS_FWSTATS_FILE(aes, decrypt_packets, "%u"); 98 WL12XX_DEBUGFS_FWSTATS_FILE(aes, encrypt_interrupt, "%u"); 99 WL12XX_DEBUGFS_FWSTATS_FILE(aes, decrypt_interrupt, "%u"); 204 DEBUGFS_FWSTATS_ADD(aes, encrypt_fail); in wl12xx_debugfs_add_files() 205 DEBUGFS_FWSTATS_ADD(aes, decrypt_fail); in wl12xx_debugfs_add_files() 206 DEBUGFS_FWSTATS_ADD(aes, encrypt_packets); in wl12xx_debugfs_add_files() 207 DEBUGFS_FWSTATS_ADD(aes, decrypt_packets); in wl12xx_debugfs_add_files() [all …]
|
/Linux-v4.19/drivers/net/wireless/ti/wl1251/ |
D | debugfs.c | 181 DEBUGFS_FWSTATS_FILE(aes, encrypt_fail, 20, "%u"); 182 DEBUGFS_FWSTATS_FILE(aes, decrypt_fail, 20, "%u"); 183 DEBUGFS_FWSTATS_FILE(aes, encrypt_packets, 20, "%u"); 184 DEBUGFS_FWSTATS_FILE(aes, decrypt_packets, 20, "%u"); 185 DEBUGFS_FWSTATS_FILE(aes, encrypt_interrupt, 20, "%u"); 186 DEBUGFS_FWSTATS_FILE(aes, decrypt_interrupt, 20, "%u"); 321 DEBUGFS_FWSTATS_DEL(aes, encrypt_fail); in wl1251_debugfs_delete_files() 322 DEBUGFS_FWSTATS_DEL(aes, decrypt_fail); in wl1251_debugfs_delete_files() 323 DEBUGFS_FWSTATS_DEL(aes, encrypt_packets); in wl1251_debugfs_delete_files() 324 DEBUGFS_FWSTATS_DEL(aes, decrypt_packets); in wl1251_debugfs_delete_files() [all …]
|
/Linux-v4.19/Documentation/device-mapper/ |
D | dm-crypt.txt | 19 aes-cbc-essiv:sha256 20 aes-xts-plain64 31 capi:cbc(aes)-essiv:sha256 32 capi:xts(aes)-plain64 34 capi:gcm(aes)-random 35 capi:authenc(hmac(sha256),xts(aes))-random 148 dmsetup create crypt1 --table "0 `blockdev --getsz $1` crypt aes-cbc-essiv:sha256 babebabebabebabeb… 154 dmsetup create crypt2 --table "0 `blockdev --getsize $1` crypt aes-cbc-essiv:sha256 :32:logon:my_pr…
|
/Linux-v4.19/arch/x86/crypto/ |
D | Makefile | 16 obj-$(CONFIG_CRYPTO_AES_586) += aes-i586.o 20 obj-$(CONFIG_CRYPTO_AES_X86_64) += aes-x86_64.o 70 aes-i586-y := aes-i586-asm_32.o aes_glue.o 74 aes-x86_64-y := aes-x86_64-asm_64.o aes_glue.o
|
/Linux-v4.19/drivers/crypto/marvell/ |
D | cipher.c | 32 struct crypto_aes_ctx aes; member 260 ret = crypto_aes_expand_key(&ctx->aes, key, len); in mv_cesa_aes_setkey() 266 remaining = (ctx->aes.key_length - 16) / 4; in mv_cesa_aes_setkey() 267 offset = ctx->aes.key_length + 24 - remaining; in mv_cesa_aes_setkey() 269 ctx->aes.key_dec[4 + i] = in mv_cesa_aes_setkey() 270 cpu_to_le32(ctx->aes.key_enc[offset + i]); in mv_cesa_aes_setkey() 707 key = ctx->aes.key_dec; in mv_cesa_aes_op() 709 key = ctx->aes.key_enc; in mv_cesa_aes_op() 711 for (i = 0; i < ctx->aes.key_length / sizeof(u32); i++) in mv_cesa_aes_op() 714 if (ctx->aes.key_length == 24) in mv_cesa_aes_op() [all …]
|
/Linux-v4.19/arch/sparc/crypto/ |
D | Makefile | 11 obj-$(CONFIG_CRYPTO_AES_SPARC64) += aes-sparc64.o 22 aes-sparc64-y := aes_asm.o aes_glue.o
|
/Linux-v4.19/Documentation/crypto/ |
D | api.rst | 9 rfc4106(gcm(aes)) is the AEAD cipher with external IV generation and 10 seqniv(rfc4106(gcm(aes))) implies that the kernel crypto API generates
|
D | architecture.rst | 38 - aes 40 - ecb(aes) 42 - cmac(aes) 44 - ccm(aes) 46 - rfc4106(gcm(aes)) 52 - authenc(hmac(sha1),cbc(aes)) 54 In these examples, "aes" and "sha1" are the ciphers and all others are 104 straight C. Now, when using the string "aes" with the kernel crypto API, 281 generic C implementations (gcm.c, aes-generic.c, ctr.c, ghash-generic.c, 334 | (aes) | [all …]
|
/Linux-v4.19/drivers/crypto/qat/qat_c62x/ |
D | adf_c62x_hw_data.c | 125 int aes = get_num_aes(self); in get_sku() local 127 if (aes == 8) in get_sku() 129 else if (aes == 10) in get_sku()
|