| /linux/security/keys/trusted-keys/ |
| H A D | trusted_dcp.c | 58 __u8 blob_key[AES_KEYSIZE_128]; 59 __u8 nonce[AES_KEYSIZE_128]; 112 sg_init_one(&src_sg, in, AES_KEYSIZE_128); in do_dcp_crypto() 113 sg_init_one(&dst_sg, out, AES_KEYSIZE_128); in do_dcp_crypto() 114 skcipher_request_set_crypt(req, &src_sg, &dst_sg, AES_KEYSIZE_128, in do_dcp_crypto() 171 if (crypto_aead_setkey(aead, key, AES_KEYSIZE_128)) { in do_aead_crypto() 210 plain_blob_key = kmalloc(AES_KEYSIZE_128, GFP_KERNEL); in trusted_dcp_seal() 215 get_random_bytes(b->nonce, AES_KEYSIZE_128); in trusted_dcp_seal() 216 get_random_bytes(plain_blob_key, AES_KEYSIZE_128); in trusted_dcp_seal() 236 memzero_explicit(plain_blob_key, AES_KEYSIZE_128); in trusted_dcp_seal() [all …]
|
| /linux/lib/crypto/s390/ |
| H A D | aes.h | 24 if (key_len == AES_KEYSIZE_128) { in aes_preparekey_arch() 26 memcpy(k->raw_key, in_key, AES_KEYSIZE_128); in aes_preparekey_arch() 48 if (key->len == AES_KEYSIZE_128) { in aes_crypt_s390()
|
| /linux/drivers/crypto/ |
| H A D | mxs-dcp.c | 66 uint8_t aes_key[2 * AES_KEYSIZE_128]; 104 uint8_t key[AES_KEYSIZE_128]; 236 key_phys = dma_map_single(sdcp->dev, sdcp->coh->aes_key + AES_KEYSIZE_128, in mxs_dcp_run_aes() 237 AES_KEYSIZE_128, DMA_TO_DEVICE); in mxs_dcp_run_aes() 240 2 * AES_KEYSIZE_128, DMA_TO_DEVICE); in mxs_dcp_run_aes() 305 dma_unmap_single(sdcp->dev, key_phys, AES_KEYSIZE_128, in mxs_dcp_run_aes() 308 dma_unmap_single(sdcp->dev, key_phys, 2 * AES_KEYSIZE_128, in mxs_dcp_run_aes() 347 memcpy(key + AES_KEYSIZE_128, req->iv, AES_KEYSIZE_128); in mxs_dcp_aes_block_crypt() 351 memset(key + AES_KEYSIZE_128, 0, AES_KEYSIZE_128); in mxs_dcp_aes_block_crypt() 476 if (unlikely(actx->key_len != AES_KEYSIZE_128 && !actx->key_referenced)) in mxs_dcp_aes_enqueue() [all …]
|
| H A D | geode-aes.c | 117 if (len == AES_KEYSIZE_128) { in geode_setkey_cip() 143 if (len == AES_KEYSIZE_128) { in geode_setkey_skcipher() 168 if (unlikely(tctx->keylen != AES_KEYSIZE_128)) { in geode_encrypt() 183 if (unlikely(tctx->keylen != AES_KEYSIZE_128)) { in geode_decrypt() 271 if (unlikely(tctx->keylen != AES_KEYSIZE_128)) { in geode_skcipher_crypt()
|
| H A D | geode-aes.h | 50 u8 key[AES_KEYSIZE_128];
|
| H A D | sahara.c | 142 u8 key[AES_KEYSIZE_128]; 627 if (keylen == AES_KEYSIZE_128) { in sahara_aes_setkey() 674 if (unlikely(ctx->keylen != AES_KEYSIZE_128)) in sahara_aes_crypt() 1333 dev->key_base = dmam_alloc_coherent(&pdev->dev, 2 * AES_KEYSIZE_128, in sahara_probe() 1337 dev->iv_base = dev->key_base + AES_KEYSIZE_128; in sahara_probe() 1338 dev->iv_phys_base = dev->key_phys_base + AES_KEYSIZE_128; in sahara_probe()
|
| /linux/lib/crypto/x86/ |
| H A D | aes.h | 13 const u8 in_key[AES_KEYSIZE_128]); 42 if (key_len == AES_KEYSIZE_128) in aes_preparekey_arch()
|
| /linux/drivers/crypto/ti/ |
| H A D | dthev2-aes.c | 132 if (keylen != AES_KEYSIZE_128 && keylen != AES_KEYSIZE_192 && keylen != AES_KEYSIZE_256) in dthe_aes_setkey() 163 if (keylen != 2 * AES_KEYSIZE_128 && in dthe_aes_xts_setkey() 193 if (ctx->keylen > AES_KEYSIZE_128) { in dthe_aes_set_ctrl_key() 210 if (ctx->keylen > AES_KEYSIZE_128) { in dthe_aes_set_ctrl_key() 223 if (ctx->keylen == AES_KEYSIZE_128) in dthe_aes_set_ctrl_key()
|
| /linux/drivers/crypto/ccp/ |
| H A D | ccp-crypto-aes-xts.c | 90 case AES_KEYSIZE_128 * 2: in ccp_aes_xts_setkey() 142 (ctx->u.aes.key_len != AES_KEYSIZE_128)) in ccp_aes_xts_crypt() 144 if ((ctx->u.aes.key_len != AES_KEYSIZE_128) && in ccp_aes_xts_crypt()
|
| H A D | ccp-crypto-aes-galois.c | 35 case AES_KEYSIZE_128: in ccp_aes_gcm_setkey()
|
| /linux/lib/crypto/sparc/ |
| H A D | aes.h | 78 if (key->len == AES_KEYSIZE_128) in aes_sparc64_encrypt() 108 if (key->len == AES_KEYSIZE_128) in aes_sparc64_decrypt()
|
| /linux/arch/powerpc/crypto/ |
| H A D | aes-spe-glue.c | 74 case AES_KEYSIZE_128: in ppc_aes_setkey_skcipher() 108 case AES_KEYSIZE_128: in ppc_xts_setkey() 111 ppc_expand_key_128(ctx->key_twk, in_key + AES_KEYSIZE_128); in ppc_xts_setkey()
|
| /linux/include/crypto/ |
| H A D | aes.h | 14 #define AES_KEYSIZE_128 16 macro 134 case AES_KEYSIZE_128: in aes_check_keylen()
|
| /linux/drivers/crypto/ccree/ |
| H A D | cc_aead.c | 273 AES_KEYSIZE_128, NS_BIT, 0); in xcbc_setkey() 279 + AES_KEYSIZE_128), in xcbc_setkey() 280 AES_KEYSIZE_128, NS_BIT, 0); in xcbc_setkey() 286 + 2 * AES_KEYSIZE_128), in xcbc_setkey() 287 AES_KEYSIZE_128, NS_BIT, 0); in xcbc_setkey() 374 if (ctx->auth_keylen != AES_KEYSIZE_128 && in validate_keys_sizes() 395 if (ctx->enc_keylen != AES_KEYSIZE_128 && in validate_keys_sizes() 1043 AES_KEYSIZE_128, NS_BIT); in cc_set_xcbc_desc() 1056 AES_KEYSIZE_128), AES_KEYSIZE_128, NS_BIT); in cc_set_xcbc_desc() 1069 2 * AES_KEYSIZE_128), AES_KEYSIZE_128, NS_BIT); in cc_set_xcbc_desc()
|
| /linux/drivers/crypto/nx/ |
| H A D | nx-aes-ecb.c | 33 case AES_KEYSIZE_128: in ecb_aes_nx_set_key()
|
| H A D | nx-aes-cbc.c | 33 case AES_KEYSIZE_128: in cbc_aes_nx_set_key()
|
| H A D | nx-aes-ctr.c | 34 case AES_KEYSIZE_128: in ctr_aes_nx_set_key()
|
| /linux/drivers/crypto/hisilicon/sec/ |
| H A D | sec_algs.c | 259 case AES_KEYSIZE_128: in sec_alg_skcipher_setkey_aes_ecb() 281 case AES_KEYSIZE_128: in sec_alg_skcipher_setkey_aes_cbc() 303 case AES_KEYSIZE_128: in sec_alg_skcipher_setkey_aes_ctr() 330 case AES_KEYSIZE_128 * 2: in sec_alg_skcipher_setkey_aes_xts()
|
| /linux/drivers/crypto/starfive/ |
| H A D | jh7110-aes.c | 174 if (ctx->keylen >= AES_KEYSIZE_128) { in starfive_aes_write_key() 241 case AES_KEYSIZE_128: in starfive_aes_hw_init() 863 if (keylen != AES_KEYSIZE_128 && in starfive_aes_setkey() 882 if (keylen != AES_KEYSIZE_128 && in starfive_aes_aead_setkey()
|
| /linux/drivers/crypto/qce/ |
| H A D | skcipher.c | 195 case AES_KEYSIZE_128: in qce_skcipher_setkey() 291 ((keylen != AES_KEYSIZE_128 && keylen != AES_KEYSIZE_256) || in qce_skcipher_crypt()
|
| H A D | common.c | 112 if (key_size == AES_KEYSIZE_128) in qce_auth_cfg() 238 if (aes_key_size == AES_KEYSIZE_128) in qce_encr_cfg()
|
| /linux/drivers/crypto/marvell/octeontx/ |
| H A D | otx_cptvf_algs.c | 410 case 2 * AES_KEYSIZE_128: in otx_cpt_skcipher_xts_setkey() 445 case AES_KEYSIZE_128: in cpt_aes_setkey() 776 case AES_KEYSIZE_128: in aead_hmac_init() 862 case AES_KEYSIZE_128 + AES_GCM_SALT_SIZE: in otx_cpt_aead_gcm_aes_setkey() 864 ctx->enc_key_len = AES_KEYSIZE_128; in otx_cpt_aead_gcm_aes_setkey()
|
| /linux/drivers/crypto/xilinx/ |
| H A D | zynqmp-aes-gcm.c | 304 if (tfm_ctx->keylen == AES_KEYSIZE_128) in versal_aes_aead_cipher() 388 if (tfm_ctx->keylen == AES_KEYSIZE_128 || in zynqmp_fallback_check() 520 if (keylen == AES_KEYSIZE_256 || keylen == AES_KEYSIZE_128) { in versal_aes_aead_setkey()
|
| /linux/lib/crypto/powerpc/ |
| H A D | aes.h | 49 if (key_len == AES_KEYSIZE_128) in aes_preparekey_arch()
|
| /linux/drivers/crypto/marvell/octeontx2/ |
| H A D | otx2_cptvf_algs.c | 430 case 2 * AES_KEYSIZE_128: in otx2_cpt_skcipher_xts_setkey() 468 case AES_KEYSIZE_128: in cpt_aes_setkey() 866 case AES_KEYSIZE_128: in aead_hmac_init() 945 case AES_KEYSIZE_128 + AES_GCM_SALT_SIZE: in otx2_cpt_aead_gcm_aes_setkey() 947 ctx->enc_key_len = AES_KEYSIZE_128; in otx2_cpt_aead_gcm_aes_setkey()
|