/kernel/linux/linux-5.10/include/crypto/ |
H A D | aes.h | 14 #define AES_KEYSIZE_128 16 macro 40 case AES_KEYSIZE_128: in aes_check_keylen()
|
/kernel/linux/linux-6.6/include/crypto/ |
H A D | aes.h | 14 #define AES_KEYSIZE_128 16 macro 40 case AES_KEYSIZE_128: in aes_check_keylen()
|
/kernel/linux/linux-5.10/drivers/crypto/ |
H A D | geode-aes.c | 116 if (len == AES_KEYSIZE_128) { in geode_setkey_cip() 142 if (len == AES_KEYSIZE_128) { in geode_setkey_skcipher() 167 if (unlikely(tctx->keylen != AES_KEYSIZE_128)) { in geode_encrypt() 182 if (unlikely(tctx->keylen != AES_KEYSIZE_128)) { in geode_decrypt() 270 if (unlikely(tctx->keylen != AES_KEYSIZE_128)) { in geode_skcipher_crypt()
|
H A D | mxs-dcp.c | 64 uint8_t aes_key[2 * AES_KEYSIZE_128]; 102 uint8_t key[AES_KEYSIZE_128]; 229 2 * AES_KEYSIZE_128, DMA_TO_DEVICE); in mxs_dcp_run_aes() 286 dma_unmap_single(sdcp->dev, key_phys, 2 * AES_KEYSIZE_128, in mxs_dcp_run_aes() 326 memcpy(key + AES_KEYSIZE_128, req->iv, AES_KEYSIZE_128); in mxs_dcp_aes_block_crypt() 330 memset(key + AES_KEYSIZE_128, 0, AES_KEYSIZE_128); in mxs_dcp_aes_block_crypt() 455 if (unlikely(actx->key_len != AES_KEYSIZE_128)) in mxs_dcp_aes_enqueue() 502 if (len == AES_KEYSIZE_128) { in mxs_dcp_aes_setkey() [all...] |
H A D | geode-aes.h | 50 u8 key[AES_KEYSIZE_128];
|
H A D | sahara.c | 145 u8 key[AES_KEYSIZE_128]; 635 if (keylen == AES_KEYSIZE_128) { in sahara_aes_setkey() 683 if (unlikely(ctx->keylen != AES_KEYSIZE_128)) in sahara_aes_crypt() 1391 dev->key_base = dmam_alloc_coherent(&pdev->dev, 2 * AES_KEYSIZE_128, in sahara_probe() 1397 dev->iv_base = dev->key_base + AES_KEYSIZE_128; in sahara_probe() 1398 dev->iv_phys_base = dev->key_phys_base + AES_KEYSIZE_128; in sahara_probe()
|
/kernel/linux/linux-6.6/drivers/crypto/ |
H A D | geode-aes.c | 117 if (len == AES_KEYSIZE_128) { in geode_setkey_cip() 143 if (len == AES_KEYSIZE_128) { in geode_setkey_skcipher() 168 if (unlikely(tctx->keylen != AES_KEYSIZE_128)) { in geode_encrypt() 183 if (unlikely(tctx->keylen != AES_KEYSIZE_128)) { in geode_decrypt() 271 if (unlikely(tctx->keylen != AES_KEYSIZE_128)) { in geode_skcipher_crypt()
|
H A D | mxs-dcp.c | 65 uint8_t aes_key[2 * AES_KEYSIZE_128]; 103 uint8_t key[AES_KEYSIZE_128]; 230 2 * AES_KEYSIZE_128, DMA_TO_DEVICE); in mxs_dcp_run_aes() 287 dma_unmap_single(sdcp->dev, key_phys, 2 * AES_KEYSIZE_128, in mxs_dcp_run_aes() 327 memcpy(key + AES_KEYSIZE_128, req->iv, AES_KEYSIZE_128); in mxs_dcp_aes_block_crypt() 331 memset(key + AES_KEYSIZE_128, 0, AES_KEYSIZE_128); in mxs_dcp_aes_block_crypt() 456 if (unlikely(actx->key_len != AES_KEYSIZE_128)) in mxs_dcp_aes_enqueue() 503 if (len == AES_KEYSIZE_128) { in mxs_dcp_aes_setkey() [all...] |
H A D | geode-aes.h | 50 u8 key[AES_KEYSIZE_128];
|
H A D | sahara.c | 145 u8 key[AES_KEYSIZE_128]; 635 if (keylen == AES_KEYSIZE_128) { in sahara_aes_setkey() 683 if (unlikely(ctx->keylen != AES_KEYSIZE_128)) in sahara_aes_crypt() 1385 dev->key_base = dmam_alloc_coherent(&pdev->dev, 2 * AES_KEYSIZE_128, in sahara_probe() 1391 dev->iv_base = dev->key_base + AES_KEYSIZE_128; in sahara_probe() 1392 dev->iv_phys_base = dev->key_phys_base + AES_KEYSIZE_128; in sahara_probe()
|
/kernel/linux/linux-5.10/drivers/crypto/ccp/ |
H A D | ccp-crypto-aes-xts.c | 90 case AES_KEYSIZE_128 * 2: in ccp_aes_xts_setkey() 142 (ctx->u.aes.key_len != AES_KEYSIZE_128)) in ccp_aes_xts_crypt() 144 if ((ctx->u.aes.key_len != AES_KEYSIZE_128) && in ccp_aes_xts_crypt()
|
/kernel/linux/linux-6.6/drivers/crypto/ccp/ |
H A D | ccp-crypto-aes-xts.c | 90 case AES_KEYSIZE_128 * 2: in ccp_aes_xts_setkey() 142 (ctx->u.aes.key_len != AES_KEYSIZE_128)) in ccp_aes_xts_crypt() 144 if ((ctx->u.aes.key_len != AES_KEYSIZE_128) && in ccp_aes_xts_crypt()
|
/kernel/linux/linux-5.10/drivers/crypto/ccree/ |
H A D | cc_aead.c | 273 AES_KEYSIZE_128, NS_BIT, 0); in xcbc_setkey() 279 + AES_KEYSIZE_128), in xcbc_setkey() 280 AES_KEYSIZE_128, NS_BIT, 0); in xcbc_setkey() 286 + 2 * AES_KEYSIZE_128), in xcbc_setkey() 287 AES_KEYSIZE_128, NS_BIT, 0); in xcbc_setkey() 374 if (ctx->auth_keylen != AES_KEYSIZE_128 && in validate_keys_sizes() 395 if (ctx->enc_keylen != AES_KEYSIZE_128 && in validate_keys_sizes() 1043 AES_KEYSIZE_128, NS_BIT); in cc_set_xcbc_desc() 1056 AES_KEYSIZE_128), AES_KEYSIZE_128, NS_BI in cc_set_xcbc_desc() [all...] |
/kernel/linux/linux-6.6/drivers/crypto/ccree/ |
H A D | cc_aead.c | 273 AES_KEYSIZE_128, NS_BIT, 0); in xcbc_setkey() 279 + AES_KEYSIZE_128), in xcbc_setkey() 280 AES_KEYSIZE_128, NS_BIT, 0); in xcbc_setkey() 286 + 2 * AES_KEYSIZE_128), in xcbc_setkey() 287 AES_KEYSIZE_128, NS_BIT, 0); in xcbc_setkey() 374 if (ctx->auth_keylen != AES_KEYSIZE_128 && in validate_keys_sizes() 395 if (ctx->enc_keylen != AES_KEYSIZE_128 && in validate_keys_sizes() 1043 AES_KEYSIZE_128, NS_BIT); in cc_set_xcbc_desc() 1056 AES_KEYSIZE_128), AES_KEYSIZE_128, NS_BI in cc_set_xcbc_desc() [all...] |
/kernel/linux/linux-5.10/drivers/crypto/nx/ |
H A D | nx-aes-cbc.c | 31 case AES_KEYSIZE_128: in cbc_aes_nx_set_key()
|
H A D | nx-aes-ecb.c | 31 case AES_KEYSIZE_128: in ecb_aes_nx_set_key()
|
H A D | nx-aes-ctr.c | 32 case AES_KEYSIZE_128: in ctr_aes_nx_set_key()
|
/kernel/linux/linux-6.6/drivers/crypto/nx/ |
H A D | nx-aes-ecb.c | 31 case AES_KEYSIZE_128: in ecb_aes_nx_set_key()
|
H A D | nx-aes-cbc.c | 31 case AES_KEYSIZE_128: in cbc_aes_nx_set_key()
|
H A D | nx-aes-ctr.c | 32 case AES_KEYSIZE_128: in ctr_aes_nx_set_key()
|
/kernel/linux/linux-5.10/arch/powerpc/crypto/ |
H A D | aes-spe-glue.c | 98 case AES_KEYSIZE_128: in ppc_aes_setkey() 138 case AES_KEYSIZE_128: in ppc_xts_setkey() 141 ppc_expand_key_128(ctx->key_twk, in_key + AES_KEYSIZE_128); in ppc_xts_setkey()
|
/kernel/linux/linux-6.6/arch/powerpc/crypto/ |
H A D | aes-spe-glue.c | 98 case AES_KEYSIZE_128: in ppc_aes_setkey() 138 case AES_KEYSIZE_128: in ppc_xts_setkey() 141 ppc_expand_key_128(ctx->key_twk, in_key + AES_KEYSIZE_128); in ppc_xts_setkey()
|
/kernel/linux/linux-5.10/arch/arm64/crypto/ |
H A D | aes-ce-glue.c | 88 if (key_len != AES_KEYSIZE_128 && in ce_aes_expandkey()
|
/kernel/linux/linux-6.6/arch/arm64/crypto/ |
H A D | aes-ce-glue.c | 88 if (key_len != AES_KEYSIZE_128 && in ce_aes_expandkey()
|
/kernel/linux/linux-5.10/drivers/crypto/qce/ |
H A D | skcipher.c | 181 case AES_KEYSIZE_128: in qce_skcipher_setkey() 240 (((keylen != AES_KEYSIZE_128 && keylen != AES_KEYSIZE_256) || in qce_skcipher_crypt()
|