Home
last modified time | relevance | path

Searched refs:aes (Results 1 – 25 of 106) sorted by relevance

12345

/Linux-v6.6/drivers/crypto/ccp/
Dccp-crypto-aes-cmac.c69 if (!ctx->u.aes.key_len) in ccp_do_cmac_update()
153 cmac_key_sg = (need_pad) ? &ctx->u.aes.k2_sg in ccp_do_cmac_update()
154 : &ctx->u.aes.k1_sg; in ccp_do_cmac_update()
159 rctx->cmd.u.aes.type = ctx->u.aes.type; in ccp_do_cmac_update()
160 rctx->cmd.u.aes.mode = ctx->u.aes.mode; in ccp_do_cmac_update()
161 rctx->cmd.u.aes.action = CCP_AES_ACTION_ENCRYPT; in ccp_do_cmac_update()
162 rctx->cmd.u.aes.key = &ctx->u.aes.key_sg; in ccp_do_cmac_update()
163 rctx->cmd.u.aes.key_len = ctx->u.aes.key_len; in ccp_do_cmac_update()
164 rctx->cmd.u.aes.iv = &rctx->iv_sg; in ccp_do_cmac_update()
165 rctx->cmd.u.aes.iv_len = AES_BLOCK_SIZE; in ccp_do_cmac_update()
[all …]
Dccp-crypto-aes-galois.c36 ctx->u.aes.type = CCP_AES_TYPE_128; in ccp_aes_gcm_setkey()
39 ctx->u.aes.type = CCP_AES_TYPE_192; in ccp_aes_gcm_setkey()
42 ctx->u.aes.type = CCP_AES_TYPE_256; in ccp_aes_gcm_setkey()
48 ctx->u.aes.mode = CCP_AES_MODE_GCM; in ccp_aes_gcm_setkey()
49 ctx->u.aes.key_len = key_len; in ccp_aes_gcm_setkey()
51 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_gcm_setkey()
52 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); in ccp_aes_gcm_setkey()
86 if (!ctx->u.aes.key_len) in ccp_aes_gcm_crypt()
89 if (ctx->u.aes.mode != CCP_AES_MODE_GCM) in ccp_aes_gcm_crypt()
119 rctx->cmd.u.aes.authsize = crypto_aead_authsize(tfm); in ccp_aes_gcm_crypt()
[all …]
Dccp-crypto-aes.c32 if (ctx->u.aes.mode != CCP_AES_MODE_ECB) in ccp_aes_complete()
46 ctx->u.aes.type = CCP_AES_TYPE_128; in ccp_aes_setkey()
49 ctx->u.aes.type = CCP_AES_TYPE_192; in ccp_aes_setkey()
52 ctx->u.aes.type = CCP_AES_TYPE_256; in ccp_aes_setkey()
57 ctx->u.aes.mode = alg->mode; in ccp_aes_setkey()
58 ctx->u.aes.key_len = key_len; in ccp_aes_setkey()
60 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_setkey()
61 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); in ccp_aes_setkey()
74 if (!ctx->u.aes.key_len) in ccp_aes_crypt()
77 if (((ctx->u.aes.mode == CCP_AES_MODE_ECB) || in ccp_aes_crypt()
[all …]
Dccp-ops.c475 struct ccp_aes_engine *aes = &cmd->u.aes; in ccp_run_aes_cmac_cmd() local
482 if (!((aes->key_len == AES_KEYSIZE_128) || in ccp_run_aes_cmac_cmd()
483 (aes->key_len == AES_KEYSIZE_192) || in ccp_run_aes_cmac_cmd()
484 (aes->key_len == AES_KEYSIZE_256))) in ccp_run_aes_cmac_cmd()
487 if (aes->src_len & (AES_BLOCK_SIZE - 1)) in ccp_run_aes_cmac_cmd()
490 if (aes->iv_len != AES_BLOCK_SIZE) in ccp_run_aes_cmac_cmd()
493 if (!aes->key || !aes->iv || !aes->src) in ccp_run_aes_cmac_cmd()
496 if (aes->cmac_final) { in ccp_run_aes_cmac_cmd()
497 if (aes->cmac_key_len != AES_BLOCK_SIZE) in ccp_run_aes_cmac_cmd()
500 if (!aes->cmac_key) in ccp_run_aes_cmac_cmd()
[all …]
Dccp-crypto-aes-xts.c91 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_xts_setkey()
95 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_xts_setkey()
98 ctx->u.aes.key_len = key_len / 2; in ccp_aes_xts_setkey()
99 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); in ccp_aes_xts_setkey()
101 return crypto_skcipher_setkey(ctx->u.aes.tfm_skcipher, key, key_len); in ccp_aes_xts_setkey()
116 if (!ctx->u.aes.key_len) in ccp_aes_xts_crypt()
142 (ctx->u.aes.key_len != AES_KEYSIZE_128)) in ccp_aes_xts_crypt()
144 if ((ctx->u.aes.key_len != AES_KEYSIZE_128) && in ccp_aes_xts_crypt()
145 (ctx->u.aes.key_len != AES_KEYSIZE_256)) in ccp_aes_xts_crypt()
152 ctx->u.aes.tfm_skcipher); in ccp_aes_xts_crypt()
[all …]
DMakefile19 ccp-crypto-aes.o \
20 ccp-crypto-aes-cmac.o \
21 ccp-crypto-aes-xts.o \
22 ccp-crypto-aes-galois.o \
/Linux-v6.6/arch/arm64/crypto/
DMakefile50 obj-$(CONFIG_CRYPTO_AES_ARM64_CE) += aes-ce-cipher.o
51 aes-ce-cipher-y := aes-ce-core.o aes-ce-glue.o
53 obj-$(CONFIG_CRYPTO_AES_ARM64_CE_CCM) += aes-ce-ccm.o
54 aes-ce-ccm-y := aes-ce-ccm-glue.o aes-ce-ccm-core.o
56 obj-$(CONFIG_CRYPTO_AES_ARM64_CE_BLK) += aes-ce-blk.o
57 aes-ce-blk-y := aes-glue-ce.o aes-ce.o
59 obj-$(CONFIG_CRYPTO_AES_ARM64_NEON_BLK) += aes-neon-blk.o
60 aes-neon-blk-y := aes-glue-neon.o aes-neon.o
78 obj-$(CONFIG_CRYPTO_AES_ARM64) += aes-arm64.o
79 aes-arm64-y := aes-cipher-core.o aes-cipher-glue.o
[all …]
Daes-ce.S58 aes\de \i0\().16b, \k\().16b
59 aes\mc \i0\().16b, \i0\().16b
61 aes\de \i1\().16b, \k\().16b
62 aes\mc \i1\().16b, \i1\().16b
64 aes\de \i2\().16b, \k\().16b
65 aes\mc \i2\().16b, \i2\().16b
66 aes\de \i3\().16b, \k\().16b
67 aes\mc \i3\().16b, \i3\().16b
69 aes\de \i4\().16b, \k\().16b
70 aes\mc \i4\().16b, \i4\().16b
[all …]
/Linux-v6.6/arch/powerpc/crypto/
DMakefile8 obj-$(CONFIG_CRYPTO_AES_PPC_SPE) += aes-ppc-spe.o
16 obj-$(CONFIG_CRYPTO_AES_GCM_P10) += aes-gcm-p10-crypto.o
20 aes-ppc-spe-y := aes-spe-core.o aes-spe-keys.o aes-tab-4k.o aes-spe-modes.o aes-spe-glue.o
27 aes-gcm-p10-crypto-y := aes-gcm-p10-glue.o aes-gcm-p10.o ghashp10-ppc.o aesp10-ppc.o
/Linux-v6.6/arch/arm/crypto/
DMakefile6 obj-$(CONFIG_CRYPTO_AES_ARM) += aes-arm.o
7 obj-$(CONFIG_CRYPTO_AES_ARM_BS) += aes-arm-bs.o
19 obj-$(CONFIG_CRYPTO_AES_ARM_CE) += aes-arm-ce.o
26 aes-arm-y := aes-cipher-core.o aes-cipher-glue.o
27 aes-arm-bs-y := aes-neonbs-core.o aes-neonbs-glue.o
38 aes-arm-ce-y := aes-ce-core.o aes-ce-glue.o
/Linux-v6.6/Documentation/devicetree/bindings/crypto/
Domap-aes.txt7 - "ti,omap2-aes" for OMAP2.
8 - "ti,omap3-aes" for OMAP3.
9 - "ti,omap4-aes" for OMAP4 and AM33XX.
23 aes: aes@53500000 {
24 compatible = "ti,omap4-aes";
25 ti,hwmods = "aes";
/Linux-v6.6/drivers/crypto/nx/
DMakefile4 nx-aes-cbc.o \
5 nx-aes-ecb.o \
6 nx-aes-gcm.o \
7 nx-aes-ccm.o \
8 nx-aes-ctr.o \
9 nx-aes-xcbc.o \
/Linux-v6.6/drivers/net/wireless/ti/wl12xx/
Ddebugfs.c80 WL12XX_DEBUGFS_FWSTATS_FILE(aes, encrypt_fail, "%u");
81 WL12XX_DEBUGFS_FWSTATS_FILE(aes, decrypt_fail, "%u");
82 WL12XX_DEBUGFS_FWSTATS_FILE(aes, encrypt_packets, "%u");
83 WL12XX_DEBUGFS_FWSTATS_FILE(aes, decrypt_packets, "%u");
84 WL12XX_DEBUGFS_FWSTATS_FILE(aes, encrypt_interrupt, "%u");
85 WL12XX_DEBUGFS_FWSTATS_FILE(aes, decrypt_interrupt, "%u");
180 DEBUGFS_FWSTATS_ADD(aes, encrypt_fail); in wl12xx_debugfs_add_files()
181 DEBUGFS_FWSTATS_ADD(aes, decrypt_fail); in wl12xx_debugfs_add_files()
182 DEBUGFS_FWSTATS_ADD(aes, encrypt_packets); in wl12xx_debugfs_add_files()
183 DEBUGFS_FWSTATS_ADD(aes, decrypt_packets); in wl12xx_debugfs_add_files()
[all …]
/Linux-v6.6/drivers/crypto/
DMakefile4 obj-$(CONFIG_CRYPTO_DEV_ATMEL_AES) += atmel-aes.o
19 obj-$(CONFIG_CRYPTO_DEV_GEODE) += geode-aes.o
28 obj-$(CONFIG_CRYPTO_DEV_OMAP_AES) += omap-aes-driver.o
29 omap-aes-driver-objs := omap-aes.o omap-aes-gcm.o
32 obj-$(CONFIG_CRYPTO_DEV_PADLOCK_AES) += padlock-aes.o
/Linux-v6.6/drivers/crypto/intel/keembay/
DMakefile4 obj-$(CONFIG_CRYPTO_DEV_KEEMBAY_OCS_AES_SM4) += keembay-ocs-aes.o
5 keembay-ocs-aes-objs := keembay-ocs-aes-core.o ocs-aes.o
DKconfig13 cbc(aes), ctr(aes), ccm(aes), gcm(aes), cbc(sm4), ctr(sm4), ccm(sm4)
17 enabled: ecb(aes), cts(cbc(aes)), ecb(sm4) and cts(cbc(sm4)).
26 Provides OCS version of ecb(aes) and ecb(sm4)
38 Provides OCS version of cts(cbc(aes)) and cts(cbc(sm4)).
/Linux-v6.6/drivers/net/wireless/ti/wl1251/
Ddebugfs.c162 DEBUGFS_FWSTATS_FILE(aes, encrypt_fail, 20, "%u");
163 DEBUGFS_FWSTATS_FILE(aes, decrypt_fail, 20, "%u");
164 DEBUGFS_FWSTATS_FILE(aes, encrypt_packets, 20, "%u");
165 DEBUGFS_FWSTATS_FILE(aes, decrypt_packets, 20, "%u");
166 DEBUGFS_FWSTATS_FILE(aes, encrypt_interrupt, 20, "%u");
167 DEBUGFS_FWSTATS_FILE(aes, decrypt_interrupt, 20, "%u");
302 DEBUGFS_FWSTATS_DEL(aes, encrypt_fail); in wl1251_debugfs_delete_files()
303 DEBUGFS_FWSTATS_DEL(aes, decrypt_fail); in wl1251_debugfs_delete_files()
304 DEBUGFS_FWSTATS_DEL(aes, encrypt_packets); in wl1251_debugfs_delete_files()
305 DEBUGFS_FWSTATS_DEL(aes, decrypt_packets); in wl1251_debugfs_delete_files()
[all …]
/Linux-v6.6/Documentation/admin-guide/device-mapper/
Ddm-crypt.rst25 aes-cbc-essiv:sha256
26 aes-xts-plain64
40 capi:cbc(aes)-essiv:sha256
41 capi:xts(aes)-plain64
45 capi:gcm(aes)-random
46 capi:authenc(hmac(sha256),xts(aes))-random
168 …dmsetup create crypt1 --table "0 `blockdev --getsz $1` crypt aes-cbc-essiv:sha256 babebabebabebabe…
174 …dmsetup create crypt2 --table "0 `blockdev --getsize $1` crypt aes-cbc-essiv:sha256 :32:logon:my_p…
/Linux-v6.6/drivers/crypto/starfive/
Djh7110-aes.c241 rctx->csr.aes.v = 0; in starfive_aes_hw_init()
242 rctx->csr.aes.aesrst = 1; in starfive_aes_hw_init()
243 writel(rctx->csr.aes.v, cryp->base + STARFIVE_AES_CSR); in starfive_aes_hw_init()
248 rctx->csr.aes.v = 0; in starfive_aes_hw_init()
252 rctx->csr.aes.keymode = STARFIVE_AES_KEYMODE_128; in starfive_aes_hw_init()
255 rctx->csr.aes.keymode = STARFIVE_AES_KEYMODE_192; in starfive_aes_hw_init()
258 rctx->csr.aes.keymode = STARFIVE_AES_KEYMODE_256; in starfive_aes_hw_init()
262 rctx->csr.aes.mode = hw_mode; in starfive_aes_hw_init()
263 rctx->csr.aes.cmode = !is_encrypt(cryp); in starfive_aes_hw_init()
264 rctx->csr.aes.ie = 1; in starfive_aes_hw_init()
[all …]
/Linux-v6.6/drivers/crypto/marvell/cesa/
Dcipher.c31 struct crypto_aes_ctx aes; member
270 ret = aes_expandkey(&ctx->aes, key, len); in mv_cesa_aes_setkey()
274 remaining = (ctx->aes.key_length - 16) / 4; in mv_cesa_aes_setkey()
275 offset = ctx->aes.key_length + 24 - remaining; in mv_cesa_aes_setkey()
277 ctx->aes.key_dec[4 + i] = ctx->aes.key_enc[offset + i]; in mv_cesa_aes_setkey()
707 key = ctx->aes.key_dec; in mv_cesa_aes_op()
709 key = ctx->aes.key_enc; in mv_cesa_aes_op()
711 for (i = 0; i < ctx->aes.key_length / sizeof(u32); i++) in mv_cesa_aes_op()
714 if (ctx->aes.key_length == 24) in mv_cesa_aes_op()
716 else if (ctx->aes.key_length == 32) in mv_cesa_aes_op()
/Linux-v6.6/drivers/crypto/inside-secure/
Dsafexcel_cipher.c377 struct crypto_aes_ctx aes; in safexcel_skcipher_aes_setkey() local
380 ret = aes_expandkey(&aes, key, len); in safexcel_skcipher_aes_setkey()
386 if (le32_to_cpu(ctx->key[i]) != aes.key_enc[i]) { in safexcel_skcipher_aes_setkey()
394 ctx->key[i] = cpu_to_le32(aes.key_enc[i]); in safexcel_skcipher_aes_setkey()
398 memzero_explicit(&aes, sizeof(aes)); in safexcel_skcipher_aes_setkey()
409 struct crypto_aes_ctx aes; in safexcel_aead_setkey() local
440 err = aes_expandkey(&aes, keys.enckey, keys.enckeylen); in safexcel_aead_setkey()
1434 struct crypto_aes_ctx aes; in safexcel_skcipher_aesctr_setkey() local
1442 ret = aes_expandkey(&aes, key, keylen); in safexcel_skcipher_aesctr_setkey()
1448 if (le32_to_cpu(ctx->key[i]) != aes.key_enc[i]) { in safexcel_skcipher_aesctr_setkey()
[all …]
/Linux-v6.6/arch/sparc/crypto/
DMakefile11 obj-$(CONFIG_CRYPTO_AES_SPARC64) += aes-sparc64.o
22 aes-sparc64-y := aes_asm.o aes_glue.o
/Linux-v6.6/drivers/crypto/intel/qat/qat_c62x/
Dadf_c62x_hw_data.c94 int aes = self->get_num_aes(self); in get_sku() local
96 if (aes == 8) in get_sku()
98 else if (aes == 10) in get_sku()
/Linux-v6.6/Documentation/crypto/
Darchitecture.rst38 - aes
40 - ecb(aes)
42 - cmac(aes)
44 - ccm(aes)
46 - rfc4106(gcm(aes))
52 - authenc(hmac(sha1),cbc(aes))
54 In these examples, "aes" and "sha1" are the ciphers and all others are
104 straight C. Now, when using the string "aes" with the kernel crypto API,
258 generic C implementations (gcm.c, aes-generic.c, ctr.c, ghash-generic.c,
311 | (aes) |
[all …]
/Linux-v6.6/drivers/net/ethernet/chelsio/inline_crypto/chtls/
Dchtls_hw.c259 struct crypto_aes_ctx aes; in chtls_key_info() local
303 ret = aes_expandkey(&aes, key, keylen); in chtls_key_info()
308 aes_encrypt(&aes, ghash_h, ghash_h); in chtls_key_info()
309 memzero_explicit(&aes, sizeof(aes)); in chtls_key_info()

12345