/linux-6.12.1/drivers/crypto/ccp/ |
D | ccp-crypto-aes-cmac.c | 69 if (!ctx->u.aes.key_len) in ccp_do_cmac_update() 153 cmac_key_sg = (need_pad) ? &ctx->u.aes.k2_sg in ccp_do_cmac_update() 154 : &ctx->u.aes.k1_sg; in ccp_do_cmac_update() 159 rctx->cmd.u.aes.type = ctx->u.aes.type; in ccp_do_cmac_update() 160 rctx->cmd.u.aes.mode = ctx->u.aes.mode; in ccp_do_cmac_update() 161 rctx->cmd.u.aes.action = CCP_AES_ACTION_ENCRYPT; in ccp_do_cmac_update() 162 rctx->cmd.u.aes.key = &ctx->u.aes.key_sg; in ccp_do_cmac_update() 163 rctx->cmd.u.aes.key_len = ctx->u.aes.key_len; in ccp_do_cmac_update() 164 rctx->cmd.u.aes.iv = &rctx->iv_sg; in ccp_do_cmac_update() 165 rctx->cmd.u.aes.iv_len = AES_BLOCK_SIZE; in ccp_do_cmac_update() [all …]
|
D | ccp-crypto-aes-galois.c | 36 ctx->u.aes.type = CCP_AES_TYPE_128; in ccp_aes_gcm_setkey() 39 ctx->u.aes.type = CCP_AES_TYPE_192; in ccp_aes_gcm_setkey() 42 ctx->u.aes.type = CCP_AES_TYPE_256; in ccp_aes_gcm_setkey() 48 ctx->u.aes.mode = CCP_AES_MODE_GCM; in ccp_aes_gcm_setkey() 49 ctx->u.aes.key_len = key_len; in ccp_aes_gcm_setkey() 51 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_gcm_setkey() 52 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); in ccp_aes_gcm_setkey() 86 if (!ctx->u.aes.key_len) in ccp_aes_gcm_crypt() 89 if (ctx->u.aes.mode != CCP_AES_MODE_GCM) in ccp_aes_gcm_crypt() 119 rctx->cmd.u.aes.authsize = crypto_aead_authsize(tfm); in ccp_aes_gcm_crypt() [all …]
|
D | ccp-crypto-aes.c | 32 if (ctx->u.aes.mode != CCP_AES_MODE_ECB) in ccp_aes_complete() 46 ctx->u.aes.type = CCP_AES_TYPE_128; in ccp_aes_setkey() 49 ctx->u.aes.type = CCP_AES_TYPE_192; in ccp_aes_setkey() 52 ctx->u.aes.type = CCP_AES_TYPE_256; in ccp_aes_setkey() 57 ctx->u.aes.mode = alg->mode; in ccp_aes_setkey() 58 ctx->u.aes.key_len = key_len; in ccp_aes_setkey() 60 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_setkey() 61 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); in ccp_aes_setkey() 74 if (!ctx->u.aes.key_len) in ccp_aes_crypt() 77 if (((ctx->u.aes.mode == CCP_AES_MODE_ECB) || in ccp_aes_crypt() [all …]
|
D | ccp-ops.c | 478 struct ccp_aes_engine *aes = &cmd->u.aes; in ccp_run_aes_cmac_cmd() local 485 if (!((aes->key_len == AES_KEYSIZE_128) || in ccp_run_aes_cmac_cmd() 486 (aes->key_len == AES_KEYSIZE_192) || in ccp_run_aes_cmac_cmd() 487 (aes->key_len == AES_KEYSIZE_256))) in ccp_run_aes_cmac_cmd() 490 if (aes->src_len & (AES_BLOCK_SIZE - 1)) in ccp_run_aes_cmac_cmd() 493 if (aes->iv_len != AES_BLOCK_SIZE) in ccp_run_aes_cmac_cmd() 496 if (!aes->key || !aes->iv || !aes->src) in ccp_run_aes_cmac_cmd() 499 if (aes->cmac_final) { in ccp_run_aes_cmac_cmd() 500 if (aes->cmac_key_len != AES_BLOCK_SIZE) in ccp_run_aes_cmac_cmd() 503 if (!aes->cmac_key) in ccp_run_aes_cmac_cmd() [all …]
|
D | ccp-crypto-aes-xts.c | 91 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_xts_setkey() 95 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_xts_setkey() 98 ctx->u.aes.key_len = key_len / 2; in ccp_aes_xts_setkey() 99 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); in ccp_aes_xts_setkey() 101 return crypto_skcipher_setkey(ctx->u.aes.tfm_skcipher, key, key_len); in ccp_aes_xts_setkey() 116 if (!ctx->u.aes.key_len) in ccp_aes_xts_crypt() 142 (ctx->u.aes.key_len != AES_KEYSIZE_128)) in ccp_aes_xts_crypt() 144 if ((ctx->u.aes.key_len != AES_KEYSIZE_128) && in ccp_aes_xts_crypt() 145 (ctx->u.aes.key_len != AES_KEYSIZE_256)) in ccp_aes_xts_crypt() 152 ctx->u.aes.tfm_skcipher); in ccp_aes_xts_crypt() [all …]
|
D | Makefile | 20 ccp-crypto-aes.o \ 21 ccp-crypto-aes-cmac.o \ 22 ccp-crypto-aes-xts.o \ 23 ccp-crypto-aes-galois.o \
|
/linux-6.12.1/arch/arm64/crypto/ |
D | Makefile | 50 obj-$(CONFIG_CRYPTO_AES_ARM64_CE) += aes-ce-cipher.o 51 aes-ce-cipher-y := aes-ce-core.o aes-ce-glue.o 53 obj-$(CONFIG_CRYPTO_AES_ARM64_CE_CCM) += aes-ce-ccm.o 54 aes-ce-ccm-y := aes-ce-ccm-glue.o aes-ce-ccm-core.o 56 obj-$(CONFIG_CRYPTO_AES_ARM64_CE_BLK) += aes-ce-blk.o 57 aes-ce-blk-y := aes-glue-ce.o aes-ce.o 59 obj-$(CONFIG_CRYPTO_AES_ARM64_NEON_BLK) += aes-neon-blk.o 60 aes-neon-blk-y := aes-glue-neon.o aes-neon.o 78 obj-$(CONFIG_CRYPTO_AES_ARM64) += aes-arm64.o 79 aes-arm64-y := aes-cipher-core.o aes-cipher-glue.o [all …]
|
D | aes-ce.S | 53 aes\de \i0\().16b, \k\().16b 54 aes\mc \i0\().16b, \i0\().16b 56 aes\de \i1\().16b, \k\().16b 57 aes\mc \i1\().16b, \i1\().16b 59 aes\de \i2\().16b, \k\().16b 60 aes\mc \i2\().16b, \i2\().16b 61 aes\de \i3\().16b, \k\().16b 62 aes\mc \i3\().16b, \i3\().16b 64 aes\de \i4\().16b, \k\().16b 65 aes\mc \i4\().16b, \i4\().16b [all …]
|
/linux-6.12.1/arch/powerpc/crypto/ |
D | Makefile | 8 obj-$(CONFIG_CRYPTO_AES_PPC_SPE) += aes-ppc-spe.o 16 obj-$(CONFIG_CRYPTO_AES_GCM_P10) += aes-gcm-p10-crypto.o 22 aes-ppc-spe-y := aes-spe-core.o aes-spe-keys.o aes-tab-4k.o aes-spe-modes.o aes-spe-glue.o 29 aes-gcm-p10-crypto-y := aes-gcm-p10-glue.o aes-gcm-p10.o ghashp10-ppc.o aesp10-ppc.o 32 vmx-crypto-objs := vmx.o aesp8-ppc.o ghashp8-ppc.o aes.o aes_cbc.o aes_ctr.o aes_xts.o ghash.o
|
/linux-6.12.1/arch/arm/crypto/ |
D | Makefile | 6 obj-$(CONFIG_CRYPTO_AES_ARM) += aes-arm.o 7 obj-$(CONFIG_CRYPTO_AES_ARM_BS) += aes-arm-bs.o 19 obj-$(CONFIG_CRYPTO_AES_ARM_CE) += aes-arm-ce.o 26 aes-arm-y := aes-cipher-core.o aes-cipher-glue.o 27 aes-arm-bs-y := aes-neonbs-core.o aes-neonbs-glue.o 38 aes-arm-ce-y := aes-ce-core.o aes-ce-glue.o
|
/linux-6.12.1/Documentation/devicetree/bindings/crypto/ |
D | omap-aes.txt | 7 - "ti,omap2-aes" for OMAP2. 8 - "ti,omap3-aes" for OMAP3. 9 - "ti,omap4-aes" for OMAP4 and AM33XX. 23 aes: aes@53500000 { 24 compatible = "ti,omap4-aes"; 25 ti,hwmods = "aes";
|
/linux-6.12.1/drivers/crypto/nx/ |
D | Makefile | 4 nx-aes-cbc.o \ 5 nx-aes-ecb.o \ 6 nx-aes-gcm.o \ 7 nx-aes-ccm.o \ 8 nx-aes-ctr.o \ 9 nx-aes-xcbc.o \
|
/linux-6.12.1/drivers/net/wireless/ti/wl12xx/ |
D | debugfs.c | 80 WL12XX_DEBUGFS_FWSTATS_FILE(aes, encrypt_fail, "%u"); 81 WL12XX_DEBUGFS_FWSTATS_FILE(aes, decrypt_fail, "%u"); 82 WL12XX_DEBUGFS_FWSTATS_FILE(aes, encrypt_packets, "%u"); 83 WL12XX_DEBUGFS_FWSTATS_FILE(aes, decrypt_packets, "%u"); 84 WL12XX_DEBUGFS_FWSTATS_FILE(aes, encrypt_interrupt, "%u"); 85 WL12XX_DEBUGFS_FWSTATS_FILE(aes, decrypt_interrupt, "%u"); 180 DEBUGFS_FWSTATS_ADD(aes, encrypt_fail); in wl12xx_debugfs_add_files() 181 DEBUGFS_FWSTATS_ADD(aes, decrypt_fail); in wl12xx_debugfs_add_files() 182 DEBUGFS_FWSTATS_ADD(aes, encrypt_packets); in wl12xx_debugfs_add_files() 183 DEBUGFS_FWSTATS_ADD(aes, decrypt_packets); in wl12xx_debugfs_add_files() [all …]
|
/linux-6.12.1/arch/riscv/crypto/ |
D | Makefile | 3 obj-$(CONFIG_CRYPTO_AES_RISCV64) += aes-riscv64.o 4 aes-riscv64-y := aes-riscv64-glue.o aes-riscv64-zvkned.o \ 5 aes-riscv64-zvkned-zvbb-zvkg.o aes-riscv64-zvkned-zvkb.o
|
/linux-6.12.1/drivers/crypto/ |
D | Makefile | 4 obj-$(CONFIG_CRYPTO_DEV_ATMEL_AES) += atmel-aes.o 19 obj-$(CONFIG_CRYPTO_DEV_GEODE) += geode-aes.o 28 obj-$(CONFIG_CRYPTO_DEV_OMAP_AES) += omap-aes-driver.o 29 omap-aes-driver-objs := omap-aes.o omap-aes-gcm.o 32 obj-$(CONFIG_CRYPTO_DEV_PADLOCK_AES) += padlock-aes.o
|
/linux-6.12.1/drivers/crypto/intel/keembay/ |
D | Makefile | 4 obj-$(CONFIG_CRYPTO_DEV_KEEMBAY_OCS_AES_SM4) += keembay-ocs-aes.o 5 keembay-ocs-aes-objs := keembay-ocs-aes-core.o ocs-aes.o
|
D | Kconfig | 13 cbc(aes), ctr(aes), ccm(aes), gcm(aes), cbc(sm4), ctr(sm4), ccm(sm4) 17 enabled: ecb(aes), cts(cbc(aes)), ecb(sm4) and cts(cbc(sm4)). 26 Provides OCS version of ecb(aes) and ecb(sm4) 38 Provides OCS version of cts(cbc(aes)) and cts(cbc(sm4)).
|
/linux-6.12.1/drivers/net/wireless/ti/wl1251/ |
D | debugfs.c | 162 DEBUGFS_FWSTATS_FILE(aes, encrypt_fail, 20, "%u"); 163 DEBUGFS_FWSTATS_FILE(aes, decrypt_fail, 20, "%u"); 164 DEBUGFS_FWSTATS_FILE(aes, encrypt_packets, 20, "%u"); 165 DEBUGFS_FWSTATS_FILE(aes, decrypt_packets, 20, "%u"); 166 DEBUGFS_FWSTATS_FILE(aes, encrypt_interrupt, 20, "%u"); 167 DEBUGFS_FWSTATS_FILE(aes, decrypt_interrupt, 20, "%u"); 302 DEBUGFS_FWSTATS_DEL(aes, encrypt_fail); in wl1251_debugfs_delete_files() 303 DEBUGFS_FWSTATS_DEL(aes, decrypt_fail); in wl1251_debugfs_delete_files() 304 DEBUGFS_FWSTATS_DEL(aes, encrypt_packets); in wl1251_debugfs_delete_files() 305 DEBUGFS_FWSTATS_DEL(aes, decrypt_packets); in wl1251_debugfs_delete_files() [all …]
|
/linux-6.12.1/drivers/crypto/marvell/cesa/ |
D | cipher.c | 31 struct crypto_aes_ctx aes; member 270 ret = aes_expandkey(&ctx->aes, key, len); in mv_cesa_aes_setkey() 274 remaining = (ctx->aes.key_length - 16) / 4; in mv_cesa_aes_setkey() 275 offset = ctx->aes.key_length + 24 - remaining; in mv_cesa_aes_setkey() 277 ctx->aes.key_dec[4 + i] = ctx->aes.key_enc[offset + i]; in mv_cesa_aes_setkey() 707 key = ctx->aes.key_dec; in mv_cesa_aes_op() 709 key = ctx->aes.key_enc; in mv_cesa_aes_op() 711 for (i = 0; i < ctx->aes.key_length / sizeof(u32); i++) in mv_cesa_aes_op() 714 if (ctx->aes.key_length == 24) in mv_cesa_aes_op() 716 else if (ctx->aes.key_length == 32) in mv_cesa_aes_op()
|
/linux-6.12.1/drivers/crypto/inside-secure/ |
D | safexcel_cipher.c | 377 struct crypto_aes_ctx aes; in safexcel_skcipher_aes_setkey() local 380 ret = aes_expandkey(&aes, key, len); in safexcel_skcipher_aes_setkey() 386 if (le32_to_cpu(ctx->key[i]) != aes.key_enc[i]) { in safexcel_skcipher_aes_setkey() 394 ctx->key[i] = cpu_to_le32(aes.key_enc[i]); in safexcel_skcipher_aes_setkey() 398 memzero_explicit(&aes, sizeof(aes)); in safexcel_skcipher_aes_setkey() 409 struct crypto_aes_ctx aes; in safexcel_aead_setkey() local 440 err = aes_expandkey(&aes, keys.enckey, keys.enckeylen); in safexcel_aead_setkey() 1361 struct crypto_aes_ctx aes; in safexcel_skcipher_aesctr_setkey() local 1369 ret = aes_expandkey(&aes, key, keylen); in safexcel_skcipher_aesctr_setkey() 1375 if (le32_to_cpu(ctx->key[i]) != aes.key_enc[i]) { in safexcel_skcipher_aesctr_setkey() [all …]
|
/linux-6.12.1/Documentation/admin-guide/device-mapper/ |
D | dm-crypt.rst | 25 aes-cbc-essiv:sha256 26 aes-xts-plain64 40 capi:cbc(aes)-essiv:sha256 41 capi:xts(aes)-plain64 45 capi:gcm(aes)-random 46 capi:authenc(hmac(sha256),xts(aes))-random 194 …dmsetup create crypt1 --table "0 `blockdev --getsz $1` crypt aes-cbc-essiv:sha256 babebabebabebabe… 200 …dmsetup create crypt2 --table "0 `blockdev --getsize $1` crypt aes-cbc-essiv:sha256 :32:logon:my_p…
|
/linux-6.12.1/arch/sparc/crypto/ |
D | Makefile | 11 obj-$(CONFIG_CRYPTO_AES_SPARC64) += aes-sparc64.o 22 aes-sparc64-y := aes_asm.o aes_glue.o
|
/linux-6.12.1/drivers/crypto/intel/qat/qat_c62x/ |
D | adf_c62x_hw_data.c | 96 int aes = self->get_num_aes(self); in get_sku() local 98 if (aes == 8) in get_sku() 100 else if (aes == 10) in get_sku()
|
/linux-6.12.1/drivers/crypto/starfive/ |
D | jh7110-aes.c | 231 rctx->csr.aes.v = 0; in starfive_aes_hw_init() 232 rctx->csr.aes.aesrst = 1; in starfive_aes_hw_init() 233 writel(rctx->csr.aes.v, cryp->base + STARFIVE_AES_CSR); in starfive_aes_hw_init() 238 rctx->csr.aes.v = 0; in starfive_aes_hw_init() 242 rctx->csr.aes.keymode = STARFIVE_AES_KEYMODE_128; in starfive_aes_hw_init() 245 rctx->csr.aes.keymode = STARFIVE_AES_KEYMODE_192; in starfive_aes_hw_init() 248 rctx->csr.aes.keymode = STARFIVE_AES_KEYMODE_256; in starfive_aes_hw_init() 252 rctx->csr.aes.mode = hw_mode; in starfive_aes_hw_init() 253 rctx->csr.aes.cmode = !is_encrypt(cryp); in starfive_aes_hw_init() 254 rctx->csr.aes.stmode = STARFIVE_AES_MODE_XFB_1; in starfive_aes_hw_init() [all …]
|
/linux-6.12.1/Documentation/crypto/ |
D | architecture.rst | 38 - aes 40 - ecb(aes) 42 - cmac(aes) 44 - ccm(aes) 46 - rfc4106(gcm(aes)) 52 - authenc(hmac(sha1),cbc(aes)) 54 In these examples, "aes" and "sha1" are the ciphers and all others are 104 straight C. Now, when using the string "aes" with the kernel crypto API, 258 generic C implementations (gcm.c, aes-generic.c, ctr.c, ghash-generic.c, 311 | (aes) | [all …]
|