/kernel/linux/linux-5.10/drivers/crypto/ |
H A D | padlock-aes.c | 66 struct cword encrypt; member 134 ctx->cword.encrypt.rounds = 10 + (key_len - 16) / 4; in aes_set_key() 135 ctx->cword.decrypt.rounds = ctx->cword.encrypt.rounds; in aes_set_key() 136 ctx->cword.encrypt.ksize = (key_len - 16) / 8; in aes_set_key() 137 ctx->cword.decrypt.ksize = ctx->cword.encrypt.ksize; in aes_set_key() 144 ctx->cword.encrypt.keygen = 1; in aes_set_key() 155 if (&ctx->cword.encrypt == per_cpu(paes_last_cword, cpu) || in aes_set_key() 310 padlock_reset_key(&ctx->cword.encrypt); in padlock_aes_encrypt() 311 ecb_crypt(in, out, ctx->E, &ctx->cword.encrypt, 1); in padlock_aes_encrypt() 312 padlock_store_cword(&ctx->cword.encrypt); in padlock_aes_encrypt() [all...] |
H A D | ixp4xx_crypto.c | 153 bool encrypt; member 162 int encrypt; member 178 struct ix_sa_dir encrypt; member 352 if (req_ctx->encrypt) { in finish_scattered_hmac() 392 if (req_ctx->encrypt) { in one_packet() 581 ret = init_sa_dir(&ctx->encrypt); in init_tfm() 586 free_sa_dir(&ctx->encrypt); in init_tfm() 606 free_sa_dir(&ctx->encrypt); in exit_tfm() 676 static int setup_auth(struct crypto_tfm *tfm, int encrypt, unsigned authsize, in setup_auth() argument 687 dir = encrypt in setup_auth() 751 setup_cipher(struct crypto_tfm *tfm, int encrypt, const u8 *key, int key_len) setup_cipher() argument 883 ablk_perform(struct skcipher_request *req, int encrypt) ablk_perform() argument 994 aead_perform(struct aead_request *req, int encrypt, int cryptoffset, int eff_cryptlen, u8 *iv) aead_perform() argument [all...] |
/kernel/linux/linux-6.6/drivers/crypto/ |
H A D | padlock-aes.c | 66 struct cword encrypt; member 134 ctx->cword.encrypt.rounds = 10 + (key_len - 16) / 4; in aes_set_key() 135 ctx->cword.decrypt.rounds = ctx->cword.encrypt.rounds; in aes_set_key() 136 ctx->cword.encrypt.ksize = (key_len - 16) / 8; in aes_set_key() 137 ctx->cword.decrypt.ksize = ctx->cword.encrypt.ksize; in aes_set_key() 144 ctx->cword.encrypt.keygen = 1; in aes_set_key() 155 if (&ctx->cword.encrypt == per_cpu(paes_last_cword, cpu) || in aes_set_key() 310 padlock_reset_key(&ctx->cword.encrypt); in padlock_aes_encrypt() 311 ecb_crypt(in, out, ctx->E, &ctx->cword.encrypt, 1); in padlock_aes_encrypt() 312 padlock_store_cword(&ctx->cword.encrypt); in padlock_aes_encrypt() [all...] |
/kernel/linux/linux-5.10/drivers/crypto/caam/ |
H A D | caamalg.c | 336 * AES GCM encrypt shared descriptor in gcm_set_sh_desc() 401 * RFC4106 encrypt shared descriptor in rfc4106_set_sh_desc() 469 * RFC4543 encrypt shared descriptor in rfc4543_set_sh_desc() 1058 bool all_contig, bool encrypt) in init_aead_job() 1070 sh_desc = encrypt ? ctx->sh_desc_enc : ctx->sh_desc_dec; in init_aead_job() 1071 ptr = encrypt ? ctx->sh_desc_enc_dma : ctx->sh_desc_dec_dma; in init_aead_job() 1107 if (encrypt) in init_aead_job() 1119 bool all_contig, bool encrypt) in init_gcm_job() 1128 init_aead_job(req, edesc, all_contig, encrypt); in init_gcm_job() 1133 if (encrypt in init_gcm_job() 1056 init_aead_job(struct aead_request *req, struct aead_edesc *edesc, bool all_contig, bool encrypt) init_aead_job() argument 1117 init_gcm_job(struct aead_request *req, struct aead_edesc *edesc, bool all_contig, bool encrypt) init_gcm_job() argument 1147 init_chachapoly_job(struct aead_request *req, struct aead_edesc *edesc, bool all_contig, bool encrypt) init_chachapoly_job() argument 1181 init_authenc_job(struct aead_request *req, struct aead_edesc *edesc, bool all_contig, bool encrypt) init_authenc_job() argument 1233 init_skcipher_job(struct skcipher_request *req, struct skcipher_edesc *edesc, const bool encrypt) init_skcipher_job() argument 1289 aead_edesc_alloc(struct aead_request *req, int desc_bytes, bool *all_contig_ptr, bool encrypt) aead_edesc_alloc() argument 1457 chachapoly_crypt(struct aead_request *req, bool encrypt) chachapoly_crypt() argument 1491 aead_crypt(struct aead_request *req, bool encrypt) aead_crypt() argument 1547 gcm_crypt(struct aead_request *req, bool encrypt) gcm_crypt() argument 1784 skcipher_crypt(struct skcipher_request *req, bool encrypt) skcipher_crypt() argument [all...] |
H A D | caamalg_qi.c | 636 /* skcipher encrypt, decrypt shared descriptors */ in skcipher_setkey() 759 /* xts skcipher encrypt, decrypt shared descriptors */ in xts_skcipher_setkey() 937 bool encrypt) in aead_edesc_alloc() 957 drv_ctx = get_drv_ctx(ctx, encrypt ? ENCRYPT : DECRYPT); in aead_edesc_alloc() 970 (encrypt ? authsize : 0); in aead_edesc_alloc() 989 dst_len = src_len + (encrypt ? authsize : (-authsize)); in aead_edesc_alloc() 1035 if ((alg->caam.rfc3686 && encrypt) || !alg->caam.geniv) in aead_edesc_alloc() 1131 (encrypt ? ctx->authsize : (-ctx->authsize)); in aead_edesc_alloc() 1156 static inline int aead_crypt(struct aead_request *req, bool encrypt) in aead_crypt() argument 1167 edesc = aead_edesc_alloc(req, encrypt); in aead_crypt() 936 aead_edesc_alloc(struct aead_request *req, bool encrypt) aead_edesc_alloc() argument 1244 skcipher_edesc_alloc(struct skcipher_request *req, bool encrypt) skcipher_edesc_alloc() argument 1404 skcipher_crypt(struct skcipher_request *req, bool encrypt) skcipher_crypt() argument [all...] |
/kernel/linux/linux-6.6/drivers/crypto/caam/ |
H A D | caamalg.c | 345 * AES GCM encrypt shared descriptor in gcm_set_sh_desc() 410 * RFC4106 encrypt shared descriptor in rfc4106_set_sh_desc() 478 * RFC4543 encrypt shared descriptor in rfc4543_set_sh_desc() 1073 bool all_contig, bool encrypt) in init_aead_job() 1085 sh_desc = encrypt ? ctx->sh_desc_enc : ctx->sh_desc_dec; in init_aead_job() 1086 ptr = encrypt ? ctx->sh_desc_enc_dma : ctx->sh_desc_dec_dma; in init_aead_job() 1122 if (encrypt) in init_aead_job() 1134 bool all_contig, bool encrypt) in init_gcm_job() 1143 init_aead_job(req, edesc, all_contig, encrypt); in init_gcm_job() 1148 if (encrypt in init_gcm_job() 1071 init_aead_job(struct aead_request *req, struct aead_edesc *edesc, bool all_contig, bool encrypt) init_aead_job() argument 1132 init_gcm_job(struct aead_request *req, struct aead_edesc *edesc, bool all_contig, bool encrypt) init_gcm_job() argument 1162 init_chachapoly_job(struct aead_request *req, struct aead_edesc *edesc, bool all_contig, bool encrypt) init_chachapoly_job() argument 1196 init_authenc_job(struct aead_request *req, struct aead_edesc *edesc, bool all_contig, bool encrypt) init_authenc_job() argument 1249 init_skcipher_job(struct skcipher_request *req, struct skcipher_edesc *edesc, const bool encrypt) init_skcipher_job() argument 1305 aead_edesc_alloc(struct aead_request *req, int desc_bytes, bool *all_contig_ptr, bool encrypt) aead_edesc_alloc() argument 1472 chachapoly_crypt(struct aead_request *req, bool encrypt) chachapoly_crypt() argument 1506 aead_crypt(struct aead_request *req, bool encrypt) aead_crypt() argument 1565 gcm_crypt(struct aead_request *req, bool encrypt) gcm_crypt() argument 1810 skcipher_crypt(struct skcipher_request *req, bool encrypt) skcipher_crypt() argument [all...] |
H A D | caamalg_qi.c | 641 /* skcipher encrypt, decrypt shared descriptors */ in skcipher_setkey() 764 /* xts skcipher encrypt, decrypt shared descriptors */ in xts_skcipher_setkey() 942 bool encrypt) in aead_edesc_alloc() 962 drv_ctx = get_drv_ctx(ctx, encrypt ? ENCRYPT : DECRYPT); in aead_edesc_alloc() 975 (encrypt ? authsize : 0); in aead_edesc_alloc() 994 dst_len = src_len + (encrypt ? authsize : (-authsize)); in aead_edesc_alloc() 1040 if ((alg->caam.rfc3686 && encrypt) || !alg->caam.geniv) in aead_edesc_alloc() 1136 (encrypt ? ctx->authsize : (-ctx->authsize)); in aead_edesc_alloc() 1161 static inline int aead_crypt(struct aead_request *req, bool encrypt) in aead_crypt() argument 1172 edesc = aead_edesc_alloc(req, encrypt); in aead_crypt() 941 aead_edesc_alloc(struct aead_request *req, bool encrypt) aead_edesc_alloc() argument 1254 skcipher_edesc_alloc(struct skcipher_request *req, bool encrypt) skcipher_edesc_alloc() argument 1420 skcipher_crypt(struct skcipher_request *req, bool encrypt) skcipher_crypt() argument [all...] |
/kernel/linux/linux-5.10/arch/sparc/crypto/ |
H A D | des_glue.c | 95 static int __ecb_crypt(struct skcipher_request *req, bool encrypt) in __ecb_crypt() argument 107 if (encrypt) in __ecb_crypt() 136 static int __cbc_crypt(struct skcipher_request *req, bool encrypt) in __cbc_crypt() argument 148 if (encrypt) in __cbc_crypt() 153 if (encrypt) in __cbc_crypt() 244 static int __ecb3_crypt(struct skcipher_request *req, bool encrypt) in __ecb3_crypt() argument 257 if (encrypt) in __ecb3_crypt() 290 static int __cbc3_crypt(struct skcipher_request *req, bool encrypt) in __cbc3_crypt() argument 303 if (encrypt) in __cbc3_crypt() 309 if (encrypt) in __cbc3_crypt() [all...] |
H A D | aes_glue.c | 36 void (*encrypt)(const u64 *key, const u32 *input, u32 *output); member 130 .encrypt = aes_sparc64_encrypt_128, 142 .encrypt = aes_sparc64_encrypt_192, 154 .encrypt = aes_sparc64_encrypt_256, 209 ctx->ops->encrypt(&ctx->key[0], (const u32 *) src, (u32 *) dst); in crypto_aes_encrypt() 394 .encrypt = ecb_encrypt, 408 .encrypt = cbc_encrypt, 422 .encrypt = ctr_crypt,
|
/kernel/linux/linux-6.6/arch/sparc/crypto/ |
H A D | des_glue.c | 95 static int __ecb_crypt(struct skcipher_request *req, bool encrypt) in __ecb_crypt() argument 107 if (encrypt) in __ecb_crypt() 136 static int __cbc_crypt(struct skcipher_request *req, bool encrypt) in __cbc_crypt() argument 148 if (encrypt) in __cbc_crypt() 153 if (encrypt) in __cbc_crypt() 244 static int __ecb3_crypt(struct skcipher_request *req, bool encrypt) in __ecb3_crypt() argument 257 if (encrypt) in __ecb3_crypt() 290 static int __cbc3_crypt(struct skcipher_request *req, bool encrypt) in __cbc3_crypt() argument 303 if (encrypt) in __cbc3_crypt() 309 if (encrypt) in __cbc3_crypt() [all...] |
H A D | aes_glue.c | 36 void (*encrypt)(const u64 *key, const u32 *input, u32 *output); member 130 .encrypt = aes_sparc64_encrypt_128, 142 .encrypt = aes_sparc64_encrypt_192, 154 .encrypt = aes_sparc64_encrypt_256, 209 ctx->ops->encrypt(&ctx->key[0], (const u32 *) src, (u32 *) dst); in crypto_aes_encrypt() 394 .encrypt = ecb_encrypt, 408 .encrypt = cbc_encrypt, 422 .encrypt = ctr_crypt,
|
/kernel/linux/linux-6.6/drivers/crypto/intel/ixp4xx/ |
H A D | ixp4xx_crypto.c | 153 bool encrypt; member 163 int encrypt; member 179 struct ix_sa_dir encrypt; member 359 if (req_ctx->encrypt) { in finish_scattered_hmac() 399 if (req_ctx->encrypt) { in one_packet() 620 ret = init_sa_dir(&ctx->encrypt); in init_tfm() 625 free_sa_dir(&ctx->encrypt); in init_tfm() 662 free_sa_dir(&ctx->encrypt); in exit_tfm() 736 static int setup_auth(struct crypto_tfm *tfm, int encrypt, unsigned int authsize, in setup_auth() argument 747 dir = encrypt in setup_auth() 811 setup_cipher(struct crypto_tfm *tfm, int encrypt, const u8 *key, int key_len) setup_cipher() argument 954 ixp4xx_cipher_fallback(struct skcipher_request *areq, int encrypt) ixp4xx_cipher_fallback() argument 973 ablk_perform(struct skcipher_request *req, int encrypt) ablk_perform() argument 1088 aead_perform(struct aead_request *req, int encrypt, int cryptoffset, int eff_cryptlen, u8 *iv) aead_perform() argument [all...] |
/kernel/linux/linux-5.10/net/ceph/ |
H A D | crypto.c | 150 * Currently these are encrypt out-buffer (ceph_buffer) and decrypt 218 static int ceph_aes_crypt(const struct ceph_crypto_key *key, bool encrypt, in ceph_aes_crypt() argument 226 int crypt_len = encrypt ? in_len + pad_byte : in_len; in ceph_aes_crypt() 230 if (encrypt) in ceph_aes_crypt() 247 if (encrypt) in ceph_aes_crypt() 254 encrypt ? "en" : "de", ret); in ceph_aes_crypt() 262 if (encrypt) { in ceph_aes_crypt() 282 int ceph_crypt(const struct ceph_crypto_key *key, bool encrypt, in ceph_crypt() argument 290 return ceph_aes_crypt(key, encrypt, buf, buf_len, in_len, in ceph_crypt()
|
/kernel/linux/linux-6.6/net/ceph/ |
H A D | crypto.c | 151 * Currently these are encrypt out-buffer (ceph_buffer) and decrypt 219 static int ceph_aes_crypt(const struct ceph_crypto_key *key, bool encrypt, in ceph_aes_crypt() argument 227 int crypt_len = encrypt ? in_len + pad_byte : in_len; in ceph_aes_crypt() 231 if (encrypt) in ceph_aes_crypt() 248 if (encrypt) in ceph_aes_crypt() 255 encrypt ? "en" : "de", ret); in ceph_aes_crypt() 263 if (encrypt) { in ceph_aes_crypt() 283 int ceph_crypt(const struct ceph_crypto_key *key, bool encrypt, in ceph_crypt() argument 291 return ceph_aes_crypt(key, encrypt, buf, buf_len, in_len, in ceph_crypt()
|
/kernel/linux/linux-5.10/drivers/crypto/ccree/ |
H A D | cc_cipher.c | 1013 .encrypt = cc_cipher_encrypt, 1031 .encrypt = cc_cipher_encrypt, 1049 .encrypt = cc_cipher_encrypt, 1067 .encrypt = cc_cipher_encrypt, 1085 .encrypt = cc_cipher_encrypt, 1103 .encrypt = cc_cipher_encrypt, 1121 .encrypt = cc_cipher_encrypt, 1143 .encrypt = cc_cipher_encrypt, 1160 .encrypt = cc_cipher_encrypt, 1177 .encrypt [all...] |
/kernel/linux/linux-6.6/drivers/crypto/ccree/ |
H A D | cc_cipher.c | 1016 .encrypt = cc_cipher_encrypt, 1034 .encrypt = cc_cipher_encrypt, 1052 .encrypt = cc_cipher_encrypt, 1070 .encrypt = cc_cipher_encrypt, 1088 .encrypt = cc_cipher_encrypt, 1106 .encrypt = cc_cipher_encrypt, 1124 .encrypt = cc_cipher_encrypt, 1146 .encrypt = cc_cipher_encrypt, 1163 .encrypt = cc_cipher_encrypt, 1180 .encrypt [all...] |
/kernel/linux/linux-6.6/arch/x86/crypto/ |
H A D | sm4_aesni_avx2_glue.c | 71 .encrypt = sm4_avx_ecb_encrypt, 88 .encrypt = sm4_cbc_encrypt, 106 .encrypt = sm4_cfb_encrypt, 124 .encrypt = ctr_crypt,
|
/kernel/linux/linux-5.10/drivers/crypto/virtio/ |
H A D | virtio_crypto_algs.c | 38 bool encrypt; member 66 /* Finish the encrypt or decrypt process */ in virtio_crypto_dataq_sym_callback() 118 int encrypt) in virtio_crypto_alg_skcipher_init_session() 122 int op = encrypt ? VIRTIO_CRYPTO_OP_ENCRYPT : VIRTIO_CRYPTO_OP_DECRYPT; in virtio_crypto_alg_skcipher_init_session() 183 if (encrypt) in virtio_crypto_alg_skcipher_init_session() 197 int encrypt) in virtio_crypto_alg_skcipher_close_session() 222 if (encrypt) in virtio_crypto_alg_skcipher_close_session() 374 if (vc_sym_req->encrypt) { in __virtio_crypto_skcipher_do_req() 428 if (!vc_sym_req->encrypt) in __virtio_crypto_skcipher_do_req() 489 vc_sym_req->encrypt in virtio_crypto_skcipher_encrypt() 114 virtio_crypto_alg_skcipher_init_session( struct virtio_crypto_skcipher_ctx *ctx, uint32_t alg, const uint8_t *key, unsigned int keylen, int encrypt) virtio_crypto_alg_skcipher_init_session() argument 195 virtio_crypto_alg_skcipher_close_session( struct virtio_crypto_skcipher_ctx *ctx, int encrypt) virtio_crypto_alg_skcipher_close_session() argument [all...] |
/kernel/linux/linux-6.6/drivers/crypto/virtio/ |
H A D | virtio_crypto_skcipher_algs.c | 35 bool encrypt; member 63 /* Finish the encrypt or decrypt process */ in virtio_crypto_dataq_sym_callback() 115 int encrypt) in virtio_crypto_alg_skcipher_init_session() 119 int op = encrypt ? VIRTIO_CRYPTO_OP_ENCRYPT : VIRTIO_CRYPTO_OP_DECRYPT; in virtio_crypto_alg_skcipher_init_session() 180 if (encrypt) in virtio_crypto_alg_skcipher_init_session() 194 int encrypt) in virtio_crypto_alg_skcipher_close_session() 219 if (encrypt) in virtio_crypto_alg_skcipher_close_session() 371 if (vc_sym_req->encrypt) { in __virtio_crypto_skcipher_do_req() 425 if (!vc_sym_req->encrypt) in __virtio_crypto_skcipher_do_req() 486 vc_sym_req->encrypt in virtio_crypto_skcipher_encrypt() 111 virtio_crypto_alg_skcipher_init_session( struct virtio_crypto_skcipher_ctx *ctx, uint32_t alg, const uint8_t *key, unsigned int keylen, int encrypt) virtio_crypto_alg_skcipher_init_session() argument 192 virtio_crypto_alg_skcipher_close_session( struct virtio_crypto_skcipher_ctx *ctx, int encrypt) virtio_crypto_alg_skcipher_close_session() argument [all...] |
/kernel/linux/linux-6.6/arch/arm64/crypto/ |
H A D | sm4-ce-glue.c | 160 struct sm4_ctx *ctx, bool encrypt) in sm4_cbc_crypt() 179 if (encrypt) in sm4_cbc_crypt() 211 static int sm4_cbc_cts_crypt(struct skcipher_request *req, bool encrypt) in sm4_cbc_cts_crypt() argument 227 return sm4_cbc_crypt(req, ctx, encrypt); in sm4_cbc_cts_crypt() 240 err = sm4_cbc_crypt(&subreq, ctx, encrypt); in sm4_cbc_cts_crypt() 261 if (encrypt) in sm4_cbc_cts_crypt() 410 static int sm4_xts_crypt(struct skcipher_request *req, bool encrypt) in sm4_xts_crypt() argument 455 if (encrypt) in sm4_xts_crypt() 491 if (encrypt) in sm4_xts_crypt() 528 .encrypt 159 sm4_cbc_crypt(struct skcipher_request *req, struct sm4_ctx *ctx, bool encrypt) sm4_cbc_crypt() argument [all...] |
/kernel/linux/linux-5.10/arch/arm/crypto/ |
H A D | chacha-glue.c | 208 .encrypt = chacha_arm, 223 .encrypt = xchacha_arm, 238 .encrypt = xchacha_arm, 258 .encrypt = chacha_neon, 274 .encrypt = xchacha_neon, 290 .encrypt = xchacha_neon,
|
/kernel/linux/linux-6.6/arch/arm/crypto/ |
H A D | chacha-glue.c | 209 .encrypt = chacha_arm, 224 .encrypt = xchacha_arm, 239 .encrypt = xchacha_arm, 259 .encrypt = chacha_neon, 275 .encrypt = xchacha_neon, 291 .encrypt = xchacha_neon,
|
/kernel/linux/linux-5.10/drivers/crypto/cavium/nitrox/ |
H A D | nitrox_skcipher.c | 401 .encrypt = nitrox_aes_encrypt, 420 .encrypt = nitrox_aes_encrypt, 439 .encrypt = nitrox_aes_encrypt, 458 .encrypt = nitrox_aes_encrypt, 479 .encrypt = nitrox_aes_encrypt, 496 .encrypt = nitrox_aes_encrypt, 515 .encrypt = nitrox_3des_encrypt, 534 .encrypt = nitrox_3des_encrypt,
|
/kernel/linux/linux-6.6/drivers/crypto/cavium/nitrox/ |
H A D | nitrox_skcipher.c | 399 .encrypt = nitrox_aes_encrypt, 418 .encrypt = nitrox_aes_encrypt, 437 .encrypt = nitrox_aes_encrypt, 456 .encrypt = nitrox_aes_encrypt, 477 .encrypt = nitrox_aes_encrypt, 494 .encrypt = nitrox_aes_encrypt, 513 .encrypt = nitrox_3des_encrypt, 532 .encrypt = nitrox_3des_encrypt,
|
/kernel/linux/linux-5.10/drivers/crypto/inside-secure/ |
H A D | safexcel_cipher.c | 655 /* For encrypt take the last output word */ in safexcel_handle_req_result() 694 * AEAD has auth tag appended to output for encrypt and in safexcel_send_req() 1276 .encrypt = safexcel_encrypt, 1313 .encrypt = safexcel_encrypt, 1351 .encrypt = safexcel_encrypt, 1389 .encrypt = safexcel_encrypt, 1463 .encrypt = safexcel_encrypt, 1525 .encrypt = safexcel_encrypt, 1564 .encrypt = safexcel_encrypt, 1624 .encrypt [all...] |