/Linux-v5.4/drivers/crypto/mediatek/ |
D | mtk-aes.c | 222 static inline void mtk_aes_set_mode(struct mtk_aes_rec *aes, in mtk_aes_set_mode() argument 226 aes->flags = (aes->flags & AES_FLAGS_BUSY) | rctx->mode; in mtk_aes_set_mode() 263 struct mtk_aes_rec *aes, in mtk_aes_complete() argument 266 aes->flags &= ~AES_FLAGS_BUSY; in mtk_aes_complete() 267 aes->areq->complete(aes->areq, err); in mtk_aes_complete() 269 tasklet_schedule(&aes->queue_task); in mtk_aes_complete() 277 static int mtk_aes_xmit(struct mtk_cryp *cryp, struct mtk_aes_rec *aes) in mtk_aes_xmit() argument 279 struct mtk_ring *ring = cryp->ring[aes->id]; in mtk_aes_xmit() 281 struct scatterlist *ssg = aes->src.sg, *dsg = aes->dst.sg; in mtk_aes_xmit() 282 u32 slen = aes->src.sg_len, dlen = aes->dst.sg_len; in mtk_aes_xmit() [all …]
|
D | mtk-platform.h | 122 typedef int (*mtk_aes_fn)(struct mtk_cryp *cryp, struct mtk_aes_rec *aes); 217 struct mtk_aes_rec *aes[MTK_REC_NUM]; member
|
/Linux-v5.4/drivers/crypto/ccp/ |
D | ccp-crypto-aes-cmac.c | 69 if (!ctx->u.aes.key_len) in ccp_do_cmac_update() 153 cmac_key_sg = (need_pad) ? &ctx->u.aes.k2_sg in ccp_do_cmac_update() 154 : &ctx->u.aes.k1_sg; in ccp_do_cmac_update() 159 rctx->cmd.u.aes.type = ctx->u.aes.type; in ccp_do_cmac_update() 160 rctx->cmd.u.aes.mode = ctx->u.aes.mode; in ccp_do_cmac_update() 161 rctx->cmd.u.aes.action = CCP_AES_ACTION_ENCRYPT; in ccp_do_cmac_update() 162 rctx->cmd.u.aes.key = &ctx->u.aes.key_sg; in ccp_do_cmac_update() 163 rctx->cmd.u.aes.key_len = ctx->u.aes.key_len; in ccp_do_cmac_update() 164 rctx->cmd.u.aes.iv = &rctx->iv_sg; in ccp_do_cmac_update() 165 rctx->cmd.u.aes.iv_len = AES_BLOCK_SIZE; in ccp_do_cmac_update() [all …]
|
D | ccp-crypto-aes-galois.c | 36 ctx->u.aes.type = CCP_AES_TYPE_128; in ccp_aes_gcm_setkey() 39 ctx->u.aes.type = CCP_AES_TYPE_192; in ccp_aes_gcm_setkey() 42 ctx->u.aes.type = CCP_AES_TYPE_256; in ccp_aes_gcm_setkey() 49 ctx->u.aes.mode = CCP_AES_MODE_GCM; in ccp_aes_gcm_setkey() 50 ctx->u.aes.key_len = key_len; in ccp_aes_gcm_setkey() 52 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_gcm_setkey() 53 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); in ccp_aes_gcm_setkey() 87 if (!ctx->u.aes.key_len) in ccp_aes_gcm_crypt() 90 if (ctx->u.aes.mode != CCP_AES_MODE_GCM) in ccp_aes_gcm_crypt() 120 rctx->cmd.u.aes.authsize = crypto_aead_authsize(tfm); in ccp_aes_gcm_crypt() [all …]
|
D | ccp-crypto-aes.c | 31 if (ctx->u.aes.mode != CCP_AES_MODE_ECB) in ccp_aes_complete() 46 ctx->u.aes.type = CCP_AES_TYPE_128; in ccp_aes_setkey() 49 ctx->u.aes.type = CCP_AES_TYPE_192; in ccp_aes_setkey() 52 ctx->u.aes.type = CCP_AES_TYPE_256; in ccp_aes_setkey() 58 ctx->u.aes.mode = alg->mode; in ccp_aes_setkey() 59 ctx->u.aes.key_len = key_len; in ccp_aes_setkey() 61 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_setkey() 62 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); in ccp_aes_setkey() 75 if (!ctx->u.aes.key_len) in ccp_aes_crypt() 78 if (((ctx->u.aes.mode == CCP_AES_MODE_ECB) || in ccp_aes_crypt() [all …]
|
D | ccp-crypto-aes-xts.c | 92 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_xts_setkey() 96 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_xts_setkey() 99 ctx->u.aes.key_len = key_len / 2; in ccp_aes_xts_setkey() 100 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); in ccp_aes_xts_setkey() 102 return crypto_sync_skcipher_setkey(ctx->u.aes.tfm_skcipher, key, key_len); in ccp_aes_xts_setkey() 116 if (!ctx->u.aes.key_len) in ccp_aes_xts_crypt() 142 (ctx->u.aes.key_len != AES_KEYSIZE_128)) in ccp_aes_xts_crypt() 144 if ((ctx->u.aes.key_len != AES_KEYSIZE_128) && in ccp_aes_xts_crypt() 145 (ctx->u.aes.key_len != AES_KEYSIZE_256)) in ccp_aes_xts_crypt() 149 ctx->u.aes.tfm_skcipher); in ccp_aes_xts_crypt() [all …]
|
D | ccp-ops.c | 459 struct ccp_aes_engine *aes = &cmd->u.aes; in ccp_run_aes_cmac_cmd() local 466 if (!((aes->key_len == AES_KEYSIZE_128) || in ccp_run_aes_cmac_cmd() 467 (aes->key_len == AES_KEYSIZE_192) || in ccp_run_aes_cmac_cmd() 468 (aes->key_len == AES_KEYSIZE_256))) in ccp_run_aes_cmac_cmd() 471 if (aes->src_len & (AES_BLOCK_SIZE - 1)) in ccp_run_aes_cmac_cmd() 474 if (aes->iv_len != AES_BLOCK_SIZE) in ccp_run_aes_cmac_cmd() 477 if (!aes->key || !aes->iv || !aes->src) in ccp_run_aes_cmac_cmd() 480 if (aes->cmac_final) { in ccp_run_aes_cmac_cmd() 481 if (aes->cmac_key_len != AES_BLOCK_SIZE) in ccp_run_aes_cmac_cmd() 484 if (!aes->cmac_key) in ccp_run_aes_cmac_cmd() [all …]
|
D | Makefile | 15 ccp-crypto-aes.o \ 16 ccp-crypto-aes-cmac.o \ 17 ccp-crypto-aes-xts.o \ 18 ccp-crypto-aes-galois.o \
|
/Linux-v5.4/arch/arm64/crypto/ |
D | Makefile | 32 obj-$(CONFIG_CRYPTO_AES_ARM64_CE) += aes-ce-cipher.o 33 aes-ce-cipher-y := aes-ce-core.o aes-ce-glue.o 35 obj-$(CONFIG_CRYPTO_AES_ARM64_CE_CCM) += aes-ce-ccm.o 36 aes-ce-ccm-y := aes-ce-ccm-glue.o aes-ce-ccm-core.o 38 obj-$(CONFIG_CRYPTO_AES_ARM64_CE_BLK) += aes-ce-blk.o 39 aes-ce-blk-y := aes-glue-ce.o aes-ce.o 41 obj-$(CONFIG_CRYPTO_AES_ARM64_NEON_BLK) += aes-neon-blk.o 42 aes-neon-blk-y := aes-glue-neon.o aes-neon.o 56 obj-$(CONFIG_CRYPTO_AES_ARM64) += aes-arm64.o 57 aes-arm64-y := aes-cipher-core.o aes-cipher-glue.o [all …]
|
D | aes-ce.S | 58 aes\de \i0\().16b, \k\().16b 59 aes\mc \i0\().16b, \i0\().16b 61 aes\de \i1\().16b, \k\().16b 62 aes\mc \i1\().16b, \i1\().16b 64 aes\de \i2\().16b, \k\().16b 65 aes\mc \i2\().16b, \i2\().16b 66 aes\de \i3\().16b, \k\().16b 67 aes\mc \i3\().16b, \i3\().16b 69 aes\de \i4\().16b, \k\().16b 70 aes\mc \i4\().16b, \i4\().16b [all …]
|
/Linux-v5.4/arch/arm/crypto/ |
D | Makefile | 6 obj-$(CONFIG_CRYPTO_AES_ARM) += aes-arm.o 7 obj-$(CONFIG_CRYPTO_AES_ARM_BS) += aes-arm-bs.o 15 ce-obj-$(CONFIG_CRYPTO_AES_ARM_CE) += aes-arm-ce.o 42 aes-arm-y := aes-cipher-core.o aes-cipher-glue.o 43 aes-arm-bs-y := aes-neonbs-core.o aes-neonbs-glue.o 52 aes-arm-ce-y := aes-ce-core.o aes-ce-glue.o
|
/Linux-v5.4/arch/powerpc/crypto/ |
D | Makefile | 8 obj-$(CONFIG_CRYPTO_AES_PPC_SPE) += aes-ppc-spe.o 17 aes-ppc-spe-y := aes-spe-core.o aes-spe-keys.o aes-tab-4k.o aes-spe-modes.o aes-spe-glue.o
|
/Linux-v5.4/drivers/crypto/nx/ |
D | Makefile | 5 nx-aes-cbc.o \ 6 nx-aes-ecb.o \ 7 nx-aes-gcm.o \ 8 nx-aes-ccm.o \ 9 nx-aes-ctr.o \ 10 nx-aes-xcbc.o \
|
/Linux-v5.4/Documentation/devicetree/bindings/crypto/ |
D | omap-aes.txt | 7 - "ti,omap2-aes" for OMAP2. 8 - "ti,omap3-aes" for OMAP3. 9 - "ti,omap4-aes" for OMAP4 and AM33XX. 23 aes: aes@53500000 { 24 compatible = "ti,omap4-aes"; 25 ti,hwmods = "aes";
|
D | atmel-crypto.txt | 8 - compatible : Should be "atmel,at91sam9g46-aes". 17 aes@f8038000 { 18 compatible = "atmel,at91sam9g46-aes";
|
/Linux-v5.4/drivers/net/wireless/ti/wl12xx/ |
D | debugfs.c | 80 WL12XX_DEBUGFS_FWSTATS_FILE(aes, encrypt_fail, "%u"); 81 WL12XX_DEBUGFS_FWSTATS_FILE(aes, decrypt_fail, "%u"); 82 WL12XX_DEBUGFS_FWSTATS_FILE(aes, encrypt_packets, "%u"); 83 WL12XX_DEBUGFS_FWSTATS_FILE(aes, decrypt_packets, "%u"); 84 WL12XX_DEBUGFS_FWSTATS_FILE(aes, encrypt_interrupt, "%u"); 85 WL12XX_DEBUGFS_FWSTATS_FILE(aes, decrypt_interrupt, "%u"); 180 DEBUGFS_FWSTATS_ADD(aes, encrypt_fail); in wl12xx_debugfs_add_files() 181 DEBUGFS_FWSTATS_ADD(aes, decrypt_fail); in wl12xx_debugfs_add_files() 182 DEBUGFS_FWSTATS_ADD(aes, encrypt_packets); in wl12xx_debugfs_add_files() 183 DEBUGFS_FWSTATS_ADD(aes, decrypt_packets); in wl12xx_debugfs_add_files() [all …]
|
/Linux-v5.4/drivers/crypto/ |
D | Makefile | 2 obj-$(CONFIG_CRYPTO_DEV_ATMEL_AES) += atmel-aes.o 16 obj-$(CONFIG_CRYPTO_DEV_GEODE) += geode-aes.o 27 obj-$(CONFIG_CRYPTO_DEV_OMAP_AES) += omap-aes-driver.o 28 omap-aes-driver-objs := omap-aes.o omap-aes-gcm.o 31 obj-$(CONFIG_CRYPTO_DEV_PADLOCK_AES) += padlock-aes.o
|
/Linux-v5.4/drivers/net/wireless/ti/wl1251/ |
D | debugfs.c | 162 DEBUGFS_FWSTATS_FILE(aes, encrypt_fail, 20, "%u"); 163 DEBUGFS_FWSTATS_FILE(aes, decrypt_fail, 20, "%u"); 164 DEBUGFS_FWSTATS_FILE(aes, encrypt_packets, 20, "%u"); 165 DEBUGFS_FWSTATS_FILE(aes, decrypt_packets, 20, "%u"); 166 DEBUGFS_FWSTATS_FILE(aes, encrypt_interrupt, 20, "%u"); 167 DEBUGFS_FWSTATS_FILE(aes, decrypt_interrupt, 20, "%u"); 302 DEBUGFS_FWSTATS_DEL(aes, encrypt_fail); in wl1251_debugfs_delete_files() 303 DEBUGFS_FWSTATS_DEL(aes, decrypt_fail); in wl1251_debugfs_delete_files() 304 DEBUGFS_FWSTATS_DEL(aes, encrypt_packets); in wl1251_debugfs_delete_files() 305 DEBUGFS_FWSTATS_DEL(aes, decrypt_packets); in wl1251_debugfs_delete_files() [all …]
|
/Linux-v5.4/drivers/crypto/inside-secure/ |
D | safexcel_cipher.c | 276 struct crypto_aes_ctx aes; in safexcel_skcipher_aes_setkey() local 279 ret = aes_expandkey(&aes, key, len); in safexcel_skcipher_aes_setkey() 287 if (ctx->key[i] != cpu_to_le32(aes.key_enc[i])) { in safexcel_skcipher_aes_setkey() 295 ctx->key[i] = cpu_to_le32(aes.key_enc[i]); in safexcel_skcipher_aes_setkey() 299 memzero_explicit(&aes, sizeof(aes)); in safexcel_skcipher_aes_setkey() 311 struct crypto_aes_ctx aes; in safexcel_aead_setkey() local 337 err = aes_expandkey(&aes, keys.enckey, keys.enckeylen); in safexcel_aead_setkey() 1282 struct crypto_aes_ctx aes; in safexcel_skcipher_aesctr_setkey() local 1290 ret = aes_expandkey(&aes, key, keylen); in safexcel_skcipher_aesctr_setkey() 1298 if (ctx->key[i] != cpu_to_le32(aes.key_enc[i])) { in safexcel_skcipher_aesctr_setkey() [all …]
|
/Linux-v5.4/Documentation/admin-guide/device-mapper/ |
D | dm-crypt.rst | 25 aes-cbc-essiv:sha256 26 aes-xts-plain64 40 capi:cbc(aes)-essiv:sha256 41 capi:xts(aes)-plain64 45 capi:gcm(aes)-random 46 capi:authenc(hmac(sha256),xts(aes))-random 160 …dmsetup create crypt1 --table "0 `blockdev --getsz $1` crypt aes-cbc-essiv:sha256 babebabebabebabe… 166 …dmsetup create crypt2 --table "0 `blockdev --getsize $1` crypt aes-cbc-essiv:sha256 :32:logon:my_p…
|
/Linux-v5.4/drivers/crypto/marvell/ |
D | cipher.c | 29 struct crypto_aes_ctx aes; member 257 ret = aes_expandkey(&ctx->aes, key, len); in mv_cesa_aes_setkey() 263 remaining = (ctx->aes.key_length - 16) / 4; in mv_cesa_aes_setkey() 264 offset = ctx->aes.key_length + 24 - remaining; in mv_cesa_aes_setkey() 266 ctx->aes.key_dec[4 + i] = in mv_cesa_aes_setkey() 267 cpu_to_le32(ctx->aes.key_enc[offset + i]); in mv_cesa_aes_setkey() 692 key = ctx->aes.key_dec; in mv_cesa_aes_op() 694 key = ctx->aes.key_enc; in mv_cesa_aes_op() 696 for (i = 0; i < ctx->aes.key_length / sizeof(u32); i++) in mv_cesa_aes_op() 699 if (ctx->aes.key_length == 24) in mv_cesa_aes_op() [all …]
|
/Linux-v5.4/arch/sparc/crypto/ |
D | Makefile | 11 obj-$(CONFIG_CRYPTO_AES_SPARC64) += aes-sparc64.o 22 aes-sparc64-y := aes_asm.o aes_glue.o
|
/Linux-v5.4/drivers/crypto/qat/qat_c62x/ |
D | adf_c62x_hw_data.c | 125 int aes = get_num_aes(self); in get_sku() local 127 if (aes == 8) in get_sku() 129 else if (aes == 10) in get_sku()
|
/Linux-v5.4/Documentation/crypto/ |
D | architecture.rst | 38 - aes 40 - ecb(aes) 42 - cmac(aes) 44 - ccm(aes) 46 - rfc4106(gcm(aes)) 52 - authenc(hmac(sha1),cbc(aes)) 54 In these examples, "aes" and "sha1" are the ciphers and all others are 104 straight C. Now, when using the string "aes" with the kernel crypto API, 262 generic C implementations (gcm.c, aes-generic.c, ctr.c, ghash-generic.c, 315 | (aes) | [all …]
|
/Linux-v5.4/drivers/crypto/chelsio/chtls/ |
D | chtls_hw.c | 217 struct crypto_aes_ctx aes; in chtls_key_info() local 237 ret = aes_expandkey(&aes, key, keylen); in chtls_key_info() 242 aes_encrypt(&aes, ghash_h, ghash_h); in chtls_key_info() 243 memzero_explicit(&aes, sizeof(aes)); in chtls_key_info()
|