Home
last modified time | relevance | path

Searched refs:AES_KEYSIZE_128 (Results 1 – 25 of 54) sorted by relevance

123

/Linux-v5.10/include/crypto/
Daes.h14 #define AES_KEYSIZE_128 16 macro
40 case AES_KEYSIZE_128: in aes_check_keylen()
/Linux-v5.10/drivers/crypto/
Dgeode-aes.c116 if (len == AES_KEYSIZE_128) { in geode_setkey_cip()
142 if (len == AES_KEYSIZE_128) { in geode_setkey_skcipher()
167 if (unlikely(tctx->keylen != AES_KEYSIZE_128)) { in geode_encrypt()
182 if (unlikely(tctx->keylen != AES_KEYSIZE_128)) { in geode_decrypt()
270 if (unlikely(tctx->keylen != AES_KEYSIZE_128)) { in geode_skcipher_crypt()
Dmxs-dcp.c64 uint8_t aes_key[2 * AES_KEYSIZE_128];
102 uint8_t key[AES_KEYSIZE_128];
224 2 * AES_KEYSIZE_128, in mxs_dcp_run_aes()
267 dma_unmap_single(sdcp->dev, key_phys, 2 * AES_KEYSIZE_128, in mxs_dcp_run_aes()
310 memcpy(key + AES_KEYSIZE_128, req->iv, AES_KEYSIZE_128); in mxs_dcp_aes_block_crypt()
314 memset(key + AES_KEYSIZE_128, 0, AES_KEYSIZE_128); in mxs_dcp_aes_block_crypt()
456 if (unlikely(actx->key_len != AES_KEYSIZE_128)) in mxs_dcp_aes_enqueue()
503 if (len == AES_KEYSIZE_128) { in mxs_dcp_aes_setkey()
Dgeode-aes.h50 u8 key[AES_KEYSIZE_128];
Dsahara.c148 u8 key[AES_KEYSIZE_128];
575 memcpy(dev->iv_base, req->iv, AES_KEYSIZE_128); in sahara_aes_process()
609 if (keylen == AES_KEYSIZE_128) { in sahara_aes_setkey()
659 if (unlikely(ctx->keylen != AES_KEYSIZE_128)) { in sahara_aes_ecb_encrypt()
679 if (unlikely(ctx->keylen != AES_KEYSIZE_128)) { in sahara_aes_ecb_decrypt()
699 if (unlikely(ctx->keylen != AES_KEYSIZE_128)) { in sahara_aes_cbc_encrypt()
719 if (unlikely(ctx->keylen != AES_KEYSIZE_128)) { in sahara_aes_cbc_decrypt()
1423 dev->key_base = dmam_alloc_coherent(&pdev->dev, 2 * AES_KEYSIZE_128, in sahara_probe()
1429 dev->iv_base = dev->key_base + AES_KEYSIZE_128; in sahara_probe()
1430 dev->iv_phys_base = dev->key_phys_base + AES_KEYSIZE_128; in sahara_probe()
Dpicoxcell_crypto.c521 ctx->cipher_key_len != AES_KEYSIZE_128 && in spacc_aead_need_fallback()
788 if (len != AES_KEYSIZE_128 && len != AES_KEYSIZE_256) { in spacc_aes_setkey()
844 ctx->key_len != AES_KEYSIZE_128 && in spacc_ablk_need_fallback()
/Linux-v5.10/drivers/crypto/ccp/
Dccp-crypto-aes-xts.c90 case AES_KEYSIZE_128 * 2: in ccp_aes_xts_setkey()
142 (ctx->u.aes.key_len != AES_KEYSIZE_128)) in ccp_aes_xts_crypt()
144 if ((ctx->u.aes.key_len != AES_KEYSIZE_128) && in ccp_aes_xts_crypt()
Dccp-crypto-aes-galois.c35 case AES_KEYSIZE_128: in ccp_aes_gcm_setkey()
Dccp-crypto-aes.c44 case AES_KEYSIZE_128: in ccp_aes_setkey()
Dccp-ops.c482 if (!((aes->key_len == AES_KEYSIZE_128) || in ccp_run_aes_cmac_cmd()
652 if (!((aes->key_len == AES_KEYSIZE_128) || in ccp_run_aes_gcm_cmd()
921 if (!((aes->key_len == AES_KEYSIZE_128) || in ccp_run_aes_cmd()
1121 if (xts->key_len == AES_KEYSIZE_128) in ccp_run_xts_aes_cmd()
1170 dm_offset = CCP_SB_BYTES - AES_KEYSIZE_128; in ccp_run_xts_aes_cmd()
Dccp-crypto-aes-cmac.c269 case AES_KEYSIZE_128: in ccp_aes_cmac_setkey()
/Linux-v5.10/drivers/crypto/nx/
Dnx-aes-ecb.c31 case AES_KEYSIZE_128: in ecb_aes_nx_set_key()
Dnx-aes-cbc.c31 case AES_KEYSIZE_128: in cbc_aes_nx_set_key()
Dnx-aes-ctr.c32 case AES_KEYSIZE_128: in ctr_aes_nx_set_key()
Dnx-aes-xcbc.c36 case AES_KEYSIZE_128: in nx_xcbc_set_key()
/Linux-v5.10/arch/powerpc/crypto/
Daes-spe-glue.c98 case AES_KEYSIZE_128: in ppc_aes_setkey()
138 case AES_KEYSIZE_128: in ppc_xts_setkey()
141 ppc_expand_key_128(ctx->key_twk, in_key + AES_KEYSIZE_128); in ppc_xts_setkey()
/Linux-v5.10/drivers/crypto/ccree/
Dcc_aead.c273 AES_KEYSIZE_128, NS_BIT, 0); in xcbc_setkey()
279 + AES_KEYSIZE_128), in xcbc_setkey()
280 AES_KEYSIZE_128, NS_BIT, 0); in xcbc_setkey()
286 + 2 * AES_KEYSIZE_128), in xcbc_setkey()
287 AES_KEYSIZE_128, NS_BIT, 0); in xcbc_setkey()
374 if (ctx->auth_keylen != AES_KEYSIZE_128 && in validate_keys_sizes()
395 if (ctx->enc_keylen != AES_KEYSIZE_128 && in validate_keys_sizes()
1043 AES_KEYSIZE_128, NS_BIT); in cc_set_xcbc_desc()
1056 AES_KEYSIZE_128), AES_KEYSIZE_128, NS_BIT); in cc_set_xcbc_desc()
1069 2 * AES_KEYSIZE_128), AES_KEYSIZE_128, NS_BIT); in cc_set_xcbc_desc()
/Linux-v5.10/arch/arm64/crypto/
Daes-ce-glue.c88 if (key_len != AES_KEYSIZE_128 && in ce_aes_expandkey()
/Linux-v5.10/drivers/crypto/qce/
Dcommon.c106 if (key_size == AES_KEYSIZE_128) in qce_auth_cfg()
234 if (aes_key_size == AES_KEYSIZE_128) in qce_encr_cfg()
Dskcipher.c176 case AES_KEYSIZE_128: in qce_skcipher_setkey()
235 (((keylen != AES_KEYSIZE_128 && keylen != AES_KEYSIZE_256) || in qce_skcipher_crypt()
/Linux-v5.10/drivers/crypto/hisilicon/sec/
Dsec_algs.c259 case AES_KEYSIZE_128: in sec_alg_skcipher_setkey_aes_ecb()
281 case AES_KEYSIZE_128: in sec_alg_skcipher_setkey_aes_cbc()
303 case AES_KEYSIZE_128: in sec_alg_skcipher_setkey_aes_ctr()
330 case AES_KEYSIZE_128 * 2: in sec_alg_skcipher_setkey_aes_xts()
/Linux-v5.10/drivers/crypto/marvell/octeontx/
Dotx_cptvf_algs.c408 case 2 * AES_KEYSIZE_128: in otx_cpt_skcipher_xts_setkey()
443 case AES_KEYSIZE_128: in cpt_aes_setkey()
868 case AES_KEYSIZE_128: in otx_cpt_aead_cbc_aes_sha_setkey()
941 case AES_KEYSIZE_128 + AES_GCM_SALT_SIZE: in otx_cpt_aead_gcm_aes_setkey()
943 ctx->enc_key_len = AES_KEYSIZE_128; in otx_cpt_aead_gcm_aes_setkey()
/Linux-v5.10/drivers/crypto/cavium/nitrox/
Dnitrox_req.h535 case AES_KEYSIZE_128: in flexi_aes_keylen()
/Linux-v5.10/arch/x86/crypto/
Daesni-intel_glue.c315 if (key_len != AES_KEYSIZE_128 && key_len != AES_KEYSIZE_192 && in aes_set_key_common()
482 if (ctx->key_length == AES_KEYSIZE_128) in aesni_ctr_enc_avx_tfm()
/Linux-v5.10/arch/sparc/crypto/
Daes_glue.c174 case AES_KEYSIZE_128: in aes_set_key()

123