| /Linux-v5.4/include/crypto/ |
| D | aes.h | 14 #define AES_KEYSIZE_128 16 macro 40 case AES_KEYSIZE_128: in aes_check_keylen()
|
| /Linux-v5.4/drivers/crypto/ |
| D | geode-aes.c | 122 if (len == AES_KEYSIZE_128) { in geode_setkey_cip() 155 if (len == AES_KEYSIZE_128) { in geode_setkey_blk() 218 if (unlikely(op->keylen != AES_KEYSIZE_128)) { in geode_encrypt() 239 if (unlikely(op->keylen != AES_KEYSIZE_128)) { in geode_decrypt() 310 if (unlikely(op->keylen != AES_KEYSIZE_128)) in geode_cbc_decrypt() 342 if (unlikely(op->keylen != AES_KEYSIZE_128)) in geode_cbc_encrypt() 423 if (unlikely(op->keylen != AES_KEYSIZE_128)) in geode_ecb_decrypt() 453 if (unlikely(op->keylen != AES_KEYSIZE_128)) in geode_ecb_encrypt()
|
| D | mxs-dcp.c | 63 uint8_t aes_key[2 * AES_KEYSIZE_128]; 101 uint8_t key[AES_KEYSIZE_128]; 222 2 * AES_KEYSIZE_128, in mxs_dcp_run_aes() 265 dma_unmap_single(sdcp->dev, key_phys, 2 * AES_KEYSIZE_128, in mxs_dcp_run_aes() 308 memcpy(key + AES_KEYSIZE_128, req->info, AES_KEYSIZE_128); in mxs_dcp_aes_block_crypt() 312 memset(key + AES_KEYSIZE_128, 0, AES_KEYSIZE_128); in mxs_dcp_aes_block_crypt() 455 if (unlikely(actx->key_len != AES_KEYSIZE_128)) in mxs_dcp_aes_enqueue() 503 if (len == AES_KEYSIZE_128) { in mxs_dcp_aes_setkey()
|
| D | geode-aes.h | 59 u8 key[AES_KEYSIZE_128];
|
| D | sahara.c | 148 u8 key[AES_KEYSIZE_128]; 574 memcpy(dev->iv_base, req->info, AES_KEYSIZE_128); in sahara_aes_process() 609 if (keylen == AES_KEYSIZE_128) { in sahara_aes_setkey() 665 if (unlikely(ctx->keylen != AES_KEYSIZE_128)) { in sahara_aes_ecb_encrypt() 687 if (unlikely(ctx->keylen != AES_KEYSIZE_128)) { in sahara_aes_ecb_decrypt() 709 if (unlikely(ctx->keylen != AES_KEYSIZE_128)) { in sahara_aes_cbc_encrypt() 731 if (unlikely(ctx->keylen != AES_KEYSIZE_128)) { in sahara_aes_cbc_decrypt() 1442 dev->key_base = dmam_alloc_coherent(&pdev->dev, 2 * AES_KEYSIZE_128, in sahara_probe() 1448 dev->iv_base = dev->key_base + AES_KEYSIZE_128; in sahara_probe() 1449 dev->iv_phys_base = dev->key_phys_base + AES_KEYSIZE_128; in sahara_probe()
|
| D | omap-aes-gcm.c | 377 if (keylen != AES_KEYSIZE_128 && keylen != AES_KEYSIZE_192 && in omap_aes_gcm_setkey() 396 if (keylen != AES_KEYSIZE_128 && keylen != AES_KEYSIZE_192 && in omap_aes_4106gcm_setkey()
|
| D | picoxcell_crypto.c | 524 ctx->cipher_key_len != AES_KEYSIZE_128 && in spacc_aead_need_fallback() 793 if (len != AES_KEYSIZE_128 && len != AES_KEYSIZE_256) { in spacc_aes_setkey() 856 ctx->key_len != AES_KEYSIZE_128 && in spacc_ablk_need_fallback()
|
| /Linux-v5.4/arch/powerpc/crypto/ |
| D | aes-spe-glue.c | 94 if (key_len != AES_KEYSIZE_128 && in ppc_aes_setkey() 102 case AES_KEYSIZE_128: in ppc_aes_setkey() 133 if (key_len != AES_KEYSIZE_128 && in ppc_xts_setkey() 141 case AES_KEYSIZE_128: in ppc_xts_setkey() 144 ppc_expand_key_128(ctx->key_twk, in_key + AES_KEYSIZE_128); in ppc_xts_setkey()
|
| /Linux-v5.4/drivers/crypto/ccp/ |
| D | ccp-crypto-aes-xts.c | 91 case AES_KEYSIZE_128 * 2: in ccp_aes_xts_setkey() 142 (ctx->u.aes.key_len != AES_KEYSIZE_128)) in ccp_aes_xts_crypt() 144 if ((ctx->u.aes.key_len != AES_KEYSIZE_128) && in ccp_aes_xts_crypt()
|
| D | ccp-crypto-aes-galois.c | 35 case AES_KEYSIZE_128: in ccp_aes_gcm_setkey()
|
| D | ccp-crypto-aes.c | 45 case AES_KEYSIZE_128: in ccp_aes_setkey()
|
| D | ccp-ops.c | 466 if (!((aes->key_len == AES_KEYSIZE_128) || in ccp_run_aes_cmac_cmd() 637 if (!((aes->key_len == AES_KEYSIZE_128) || in ccp_run_aes_gcm_cmd() 906 if (!((aes->key_len == AES_KEYSIZE_128) || in ccp_run_aes_cmd() 1106 if (xts->key_len == AES_KEYSIZE_128) in ccp_run_xts_aes_cmd() 1155 dm_offset = CCP_SB_BYTES - AES_KEYSIZE_128; in ccp_run_xts_aes_cmd()
|
| D | ccp-crypto-aes-cmac.c | 269 case AES_KEYSIZE_128: in ccp_aes_cmac_setkey()
|
| /Linux-v5.4/drivers/crypto/nx/ |
| D | nx-aes-cbc.c | 31 case AES_KEYSIZE_128: in cbc_aes_nx_set_key()
|
| D | nx-aes-ecb.c | 31 case AES_KEYSIZE_128: in ecb_aes_nx_set_key()
|
| D | nx-aes-ctr.c | 32 case AES_KEYSIZE_128: in ctr_aes_nx_set_key()
|
| D | nx-aes-xcbc.c | 36 case AES_KEYSIZE_128: in nx_xcbc_set_key()
|
| /Linux-v5.4/drivers/crypto/ccree/ |
| D | cc_aead.c | 277 AES_KEYSIZE_128, NS_BIT, 0); in xcbc_setkey() 283 + AES_KEYSIZE_128), in xcbc_setkey() 284 AES_KEYSIZE_128, NS_BIT, 0); in xcbc_setkey() 290 + 2 * AES_KEYSIZE_128), in xcbc_setkey() 291 AES_KEYSIZE_128, NS_BIT, 0); in xcbc_setkey() 377 if (ctx->auth_keylen != AES_KEYSIZE_128 && in validate_keys_sizes() 398 if (ctx->enc_keylen != AES_KEYSIZE_128 && in validate_keys_sizes() 1053 AES_KEYSIZE_128, NS_BIT); in cc_set_xcbc_desc() 1066 AES_KEYSIZE_128), AES_KEYSIZE_128, NS_BIT); in cc_set_xcbc_desc() 1079 2 * AES_KEYSIZE_128), AES_KEYSIZE_128, NS_BIT); in cc_set_xcbc_desc()
|
| /Linux-v5.4/drivers/crypto/chelsio/chtls/ |
| D | chtls_hw.c | 213 unsigned char key[AES_KEYSIZE_128]; in chtls_key_info() 226 if (keylen == AES_KEYSIZE_128) { in chtls_key_info()
|
| /Linux-v5.4/drivers/crypto/hisilicon/sec/ |
| D | sec_algs.c | 258 case AES_KEYSIZE_128: in sec_alg_skcipher_setkey_aes_ecb() 280 case AES_KEYSIZE_128: in sec_alg_skcipher_setkey_aes_cbc() 302 case AES_KEYSIZE_128: in sec_alg_skcipher_setkey_aes_ctr() 329 case AES_KEYSIZE_128 * 2: in sec_alg_skcipher_setkey_aes_xts()
|
| /Linux-v5.4/arch/arm64/crypto/ |
| D | aes-ce-glue.c | 88 if (key_len != AES_KEYSIZE_128 && in ce_aes_expandkey()
|
| /Linux-v5.4/drivers/crypto/qce/ |
| D | ablkcipher.c | 163 case AES_KEYSIZE_128: in qce_ablkcipher_setkey() 222 if (IS_AES(rctx->flags) && ctx->enc_keylen != AES_KEYSIZE_128 && in qce_ablkcipher_crypt()
|
| D | common.c | 53 if (aes_key_size == AES_KEYSIZE_128) in qce_encr_cfg() 104 if (key_size == AES_KEYSIZE_128) in qce_auth_cfg()
|
| /Linux-v5.4/drivers/crypto/cavium/nitrox/ |
| D | nitrox_req.h | 531 case AES_KEYSIZE_128: in flexi_aes_keylen()
|
| /Linux-v5.4/arch/x86/crypto/ |
| D | aesni-intel_glue.c | 324 if (key_len != AES_KEYSIZE_128 && key_len != AES_KEYSIZE_192 && in aes_set_key_common() 494 if (ctx->key_length == AES_KEYSIZE_128) in aesni_ctr_enc_avx_tfm()
|