/openbmc/linux/lib/crypto/ |
H A D | aes.c | 202 u32 *rki = ctx->key_enc + (i * kwords); in aes_expandkey() 231 ctx->key_dec[0] = ctx->key_enc[key_len + 24]; in aes_expandkey() 232 ctx->key_dec[1] = ctx->key_enc[key_len + 25]; in aes_expandkey() 233 ctx->key_dec[2] = ctx->key_enc[key_len + 26]; in aes_expandkey() 234 ctx->key_dec[3] = ctx->key_enc[key_len + 27]; in aes_expandkey() 243 ctx->key_dec[i] = ctx->key_enc[0]; in aes_expandkey() 244 ctx->key_dec[i + 1] = ctx->key_enc[1]; in aes_expandkey() 245 ctx->key_dec[i + 2] = ctx->key_enc[2]; in aes_expandkey() 246 ctx->key_dec[i + 3] = ctx->key_enc[3]; in aes_expandkey() 260 const u32 *rkp = ctx->key_enc + 4; in aes_encrypt() [all …]
|
/openbmc/linux/arch/powerpc/crypto/ |
H A D | aes-spe-glue.c | 42 u32 key_enc[AES_MAX_KEYLENGTH_U32]; member 48 u32 key_enc[AES_MAX_KEYLENGTH_U32]; member 100 ppc_expand_key_128(ctx->key_enc, in_key); in ppc_aes_setkey() 104 ppc_expand_key_192(ctx->key_enc, in_key); in ppc_aes_setkey() 108 ppc_expand_key_256(ctx->key_enc, in_key); in ppc_aes_setkey() 140 ppc_expand_key_128(ctx->key_enc, in_key); in ppc_xts_setkey() 145 ppc_expand_key_192(ctx->key_enc, in_key); in ppc_xts_setkey() 150 ppc_expand_key_256(ctx->key_enc, in_key); in ppc_xts_setkey() 197 ctx->key_enc, ctx->rounds, nbytes); in ppc_ecb_crypt() 236 ctx->key_enc, ctx->rounds, nbytes, in ppc_cbc_crypt() [all …]
|
/openbmc/linux/arch/arm64/crypto/ |
H A D | aes-ce-glue.c | 56 __aes_ce_encrypt(ctx->key_enc, dst, src, num_rounds(ctx)); in aes_cipher_encrypt() 85 struct aes_block *key_enc, *key_dec; in ce_aes_expandkey() local 95 ctx->key_enc[i] = get_unaligned_le32(in_key + i * sizeof(u32)); in ce_aes_expandkey() 99 u32 *rki = ctx->key_enc + (i * kwords); in ce_aes_expandkey() 128 key_enc = (struct aes_block *)ctx->key_enc; in ce_aes_expandkey() 132 key_dec[0] = key_enc[j]; in ce_aes_expandkey() 134 __aes_ce_invert(key_dec + i, key_enc + j); in ce_aes_expandkey() 135 key_dec[i] = key_enc[0]; in ce_aes_expandkey()
|
H A D | aes-ce-ccm-glue.c | 117 ctx->key_enc, num_rounds(ctx)); in ccm_calculate_auth_mac() 131 macp = ce_aes_ccm_auth_data(mac, p, n, macp, ctx->key_enc, in ccm_calculate_auth_mac() 178 walk.nbytes - tail, ctx->key_enc, in ccm_encrypt() 188 ce_aes_ccm_final(mac, buf, ctx->key_enc, num_rounds(ctx)); in ccm_encrypt() 232 walk.nbytes - tail, ctx->key_enc, in ccm_decrypt() 242 ce_aes_ccm_final(mac, buf, ctx->key_enc, num_rounds(ctx)); in ccm_decrypt()
|
H A D | aes-glue.c | 192 ctx->key_enc, rounds, blocks); in ecb_encrypt() 230 ctx->key_enc, rounds, blocks, walk->iv); in cbc_encrypt_walk() 421 ctx->key1.key_enc, rounds, blocks, in essiv_cbc_encrypt() 422 req->iv, ctx->key2.key_enc); in essiv_cbc_encrypt() 444 req->iv, ctx->key2.key_enc); in essiv_cbc_decrypt() 584 ctx->key1.key_enc, rounds, nbytes, in xts_encrypt() 585 ctx->key2.key_enc, walk.iv, first); in xts_encrypt() 606 ctx->key1.key_enc, rounds, walk.nbytes, in xts_encrypt() 607 ctx->key2.key_enc, walk.iv, first); in xts_encrypt() 657 ctx->key2.key_enc, walk.iv, first); in xts_decrypt() [all …]
|
H A D | aes-neonbs-glue.c | 88 aesbs_convert_key(ctx->rk, rk.key_enc, ctx->rounds); in aesbs_setkey() 146 memcpy(ctx->enc, rk.key_enc, sizeof(ctx->enc)); in aesbs_cbc_ctr_setkey() 149 aesbs_convert_key(ctx->key.rk, rk.key_enc, ctx->key.rounds); in aesbs_cbc_ctr_setkey() 271 memcpy(ctx->twkey, rk.key_enc, sizeof(ctx->twkey)); in aesbs_xts_setkey() 338 neon_aes_xts_encrypt(out, in, ctx->cts.key_enc, in __xts_crypt() 372 neon_aes_xts_encrypt(out, in, ctx->cts.key_enc, ctx->key.rounds, in __xts_crypt()
|
H A D | aes-cipher-glue.c | 20 __aes_arm64_encrypt(ctx->key_enc, out, in, rounds); in aes_arm64_encrypt()
|
H A D | ghash-ce-glue.c | 374 dg, iv, ctx->aes_key.key_enc, nrounds, in gcm_encrypt() 444 dg, iv, ctx->aes_key.key_enc, in gcm_decrypt()
|
/openbmc/linux/arch/arm/crypto/ |
H A D | aes-ce-glue.c | 80 struct aes_block *key_enc, *key_dec; in ce_aes_expandkey() local 94 u32 *rki = ctx->key_enc + (i * kwords); in ce_aes_expandkey() 124 key_enc = (struct aes_block *)ctx->key_enc; in ce_aes_expandkey() 128 key_dec[0] = key_enc[j]; in ce_aes_expandkey() 130 ce_aes_invert(key_dec + i, key_enc + j); in ce_aes_expandkey() 131 key_dec[i] = key_enc[0]; in ce_aes_expandkey() 218 ctx->key_enc, num_rounds(ctx), blocks, in cbc_encrypt_walk() 488 ctx->key2.key_enc, first); in xts_encrypt() 510 ctx->key2.key_enc, first); in xts_encrypt() 560 ctx->key2.key_enc, first); in xts_decrypt() [all …]
|
H A D | aes-cipher-glue.c | 21 __aes_arm_encrypt(ctx->key_enc, rounds, in, out); in aes_arm_encrypt()
|
H A D | aes-neonbs-glue.c | 82 aesbs_convert_key(ctx->rk, rk.key_enc, ctx->rounds); in aesbs_setkey() 141 aesbs_convert_key(ctx->key.rk, rk.key_enc, ctx->key.rounds); in aesbs_cbc_setkey() 229 aesbs_convert_key(ctx->key.rk, ctx->fallback.key_enc, ctx->key.rounds); in aesbs_ctr_setkey_sync()
|
H A D | ghash-ce-glue.c | 396 memcpy(ctx->rk, aes_ctx.key_enc, sizeof(ctx->rk)); in gcm_aes_setkey()
|
/openbmc/linux/crypto/ |
H A D | aes_generic.c | 1180 const u32 *kp = ctx->key_enc + 4; in crypto_aes_encrypt() 1183 b0[0] = ctx->key_enc[0] ^ get_unaligned_le32(in); in crypto_aes_encrypt() 1184 b0[1] = ctx->key_enc[1] ^ get_unaligned_le32(in + 4); in crypto_aes_encrypt() 1185 b0[2] = ctx->key_enc[2] ^ get_unaligned_le32(in + 8); in crypto_aes_encrypt() 1186 b0[3] = ctx->key_enc[3] ^ get_unaligned_le32(in + 12); in crypto_aes_encrypt()
|
/openbmc/linux/include/crypto/ |
H A D | aes.h | 26 u32 key_enc[AES_MAX_KEYLENGTH_U32]; member
|
/openbmc/linux/drivers/crypto/inside-secure/ |
H A D | safexcel_cipher.c | 386 if (le32_to_cpu(ctx->key[i]) != aes.key_enc[i]) { in safexcel_skcipher_aes_setkey() 394 ctx->key[i] = cpu_to_le32(aes.key_enc[i]); in safexcel_skcipher_aes_setkey() 1451 if (le32_to_cpu(ctx->key[i]) != aes.key_enc[i]) { in safexcel_skcipher_aesctr_setkey() 1459 ctx->key[i] = cpu_to_le32(aes.key_enc[i]); in safexcel_skcipher_aesctr_setkey() 2489 if (le32_to_cpu(ctx->key[i]) != aes.key_enc[i]) { in safexcel_skcipher_aesxts_setkey() 2497 ctx->key[i] = cpu_to_le32(aes.key_enc[i]); in safexcel_skcipher_aesxts_setkey() 2507 aes.key_enc[i]) { in safexcel_skcipher_aesxts_setkey() 2516 cpu_to_le32(aes.key_enc[i]); in safexcel_skcipher_aesxts_setkey() 2606 ctx->key[i] = cpu_to_le32(aes.key_enc[i]); in safexcel_aead_gcm_setkey() 2707 ctx->key[i] = cpu_to_le32(aes.key_enc[i]); in safexcel_aead_ccm_setkey() [all …]
|
H A D | safexcel_hash.c | 2001 ctx->base.ipad.be[i + 8] = cpu_to_be32(aes.key_enc[i]); in safexcel_cbcmac_setkey() 2154 ctx->base.ipad.word[i + 8] = swab32(ctx->aes->key_enc[i]); in safexcel_cmac_setkey()
|
/openbmc/linux/drivers/crypto/ |
H A D | sa2ul.c | 478 ctx.key_enc[52] = ctx.key_enc[51] ^ ctx.key_enc[46]; in sa_aes_inv_key() 479 ctx.key_enc[53] = ctx.key_enc[52] ^ ctx.key_enc[47]; in sa_aes_inv_key() 498 memcpy(inv_key, &ctx.key_enc[key_pos], key_sz); in sa_aes_inv_key()
|
H A D | padlock-aes.c | 150 memcpy(ctx->E, gen_aes.key_enc, AES_MAX_KEYLENGTH); in aes_set_key()
|
/openbmc/linux/drivers/crypto/marvell/cesa/ |
H A D | cipher.c | 277 ctx->aes.key_dec[4 + i] = ctx->aes.key_enc[offset + i]; in mv_cesa_aes_setkey() 709 key = ctx->aes.key_enc; in mv_cesa_aes_op()
|
/openbmc/linux/drivers/crypto/intel/qat/qat_common/ |
H A D | qat_algs.c | 474 key = (u8 *)aes_expanded.key_enc + (AES_BLOCK_SIZE * nrounds); in qat_alg_xts_reverse_key() 479 key = (u8 *)aes_expanded.key_enc + (AES_BLOCK_SIZE * nrounds); in qat_alg_xts_reverse_key()
|
/openbmc/linux/drivers/crypto/aspeed/ |
H A D | aspeed-hace-crypto.c | 637 memcpy(ctx->key, gen_aes_key.key_enc, AES_MAX_KEYLENGTH); in aspeed_aes_setkey()
|