Home
last modified time | relevance | path

Searched full:decrypt (Results 1 – 25 of 425) sorted by relevance

12345678910>>...17

/openbmc/linux/crypto/
H A Dtcrypt.c50 #define DECRYPT 0 macro
1861 test_cipher_speed("ecb(aes)", DECRYPT, sec, NULL, 0, in do_test()
1865 test_cipher_speed("cbc(aes)", DECRYPT, sec, NULL, 0, in do_test()
1869 test_cipher_speed("lrw(aes)", DECRYPT, sec, NULL, 0, in do_test()
1873 test_cipher_speed("xts(aes)", DECRYPT, sec, NULL, 0, in do_test()
1877 test_cipher_speed("cts(cbc(aes))", DECRYPT, sec, NULL, 0, in do_test()
1881 test_cipher_speed("ctr(aes)", DECRYPT, sec, NULL, 0, in do_test()
1885 test_cipher_speed("cfb(aes)", DECRYPT, sec, NULL, 0, in do_test()
1893 test_cipher_speed("ecb(des3_ede)", DECRYPT, sec, in do_test()
1899 test_cipher_speed("cbc(des3_ede)", DECRYPT, sec, in do_test()
[all …]
H A Dchacha_generic.c84 .decrypt = crypto_chacha_crypt,
99 .decrypt = crypto_xchacha_crypt,
114 .decrypt = crypto_xchacha_crypt,
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-connectivity/vpnc/vpnc/
H A D0002-Fix-vpnc-install-for-cross-compile.patch25 - install -m644 cisco-decrypt.1 $(DESTDIR)$(MANDIR)/man1
32 + install -m 644 cisco-decrypt.1 $(DESTDIR)$(MANDIR)/man1
37 - install -m755 cisco-decrypt $(DESTDIR)$(BINDIR)
39 + install -m 755 cisco-decrypt $(DESTDIR)$(BINDIR)
43 - install -s -m755 cisco-decrypt $(DESTDIR)$(BINDIR)
45 + install -s -m 755 cisco-decrypt $(DESTDIR)$(BINDIR)
/openbmc/linux/drivers/crypto/caam/
H A Dcaamalg_qi.c272 if (ctx->drv_ctx[DECRYPT]) { in aead_setkey()
273 ret = caam_drv_ctx_update(ctx->drv_ctx[DECRYPT], in aead_setkey()
396 if (ctx->drv_ctx[DECRYPT]) { in gcm_setkey()
397 ret = caam_drv_ctx_update(ctx->drv_ctx[DECRYPT], in gcm_setkey()
504 if (ctx->drv_ctx[DECRYPT]) { in rfc4106_setkey()
505 ret = caam_drv_ctx_update(ctx->drv_ctx[DECRYPT], in rfc4106_setkey()
610 if (ctx->drv_ctx[DECRYPT]) { in rfc4543_setkey()
611 ret = caam_drv_ctx_update(ctx->drv_ctx[DECRYPT], in rfc4543_setkey()
641 /* skcipher encrypt, decrypt shared descriptors */ in skcipher_setkey()
657 if (ctx->drv_ctx[DECRYPT]) { in skcipher_setkey()
[all …]
H A Dcaamalg.c1897 .decrypt = skcipher_decrypt,
1916 .decrypt = skcipher_decrypt,
1935 .decrypt = skcipher_decrypt,
1954 .decrypt = skcipher_decrypt,
1975 .decrypt = skcipher_decrypt,
2002 .decrypt = skcipher_decrypt,
2021 .decrypt = skcipher_decrypt,
2039 .decrypt = skcipher_decrypt,
2057 .decrypt = skcipher_decrypt,
2079 .decrypt = ipsec_gcm_decrypt,
[all …]
H A Dcaamalg_qi2.c265 flc = &ctx->flc[DECRYPT]; in aead_set_sh_desc()
272 dma_sync_single_for_device(dev, ctx->flc_dma[DECRYPT], in aead_set_sh_desc()
610 flc = &ctx->flc[DECRYPT]; in chachapoly_set_sh_desc()
615 dma_sync_single_for_device(dev, ctx->flc_dma[DECRYPT], in chachapoly_set_sh_desc()
697 flc = &ctx->flc[DECRYPT]; in gcm_set_sh_desc()
701 dma_sync_single_for_device(dev, ctx->flc_dma[DECRYPT], in gcm_set_sh_desc()
790 flc = &ctx->flc[DECRYPT]; in rfc4106_set_sh_desc()
795 dma_sync_single_for_device(dev, ctx->flc_dma[DECRYPT], in rfc4106_set_sh_desc()
891 flc = &ctx->flc[DECRYPT]; in rfc4543_set_sh_desc()
896 dma_sync_single_for_device(dev, ctx->flc_dma[DECRYPT], in rfc4543_set_sh_desc()
[all …]
/openbmc/qemu/crypto/
H A Dcipher-nettle.c.inc80 #define DEFINE_ECB(NAME, TYPE, BLEN, ENCRYPT, DECRYPT) \
98 DECRYPT(&ctx->key, len, out, in); \
109 #define DEFINE_CBC(NAME, TYPE, BLEN, ENCRYPT, DECRYPT) \
127 cbc_decrypt(&ctx->key, DECRYPT, BLEN, ctx->iv, len, out, in); \
158 #define DEFINE__XTS(NAME, TYPE, BLEN, ENCRYPT, DECRYPT) \
167 DECRYPT((const void *)ctx, length, dst, src); \
194 #define DEFINE__XTS(NAME, TYPE, BLEN, ENCRYPT, DECRYPT) \
213 xts_decrypt_message(&ctx->key, &ctx->key_xts, DECRYPT, ENCRYPT, \
219 #define DEFINE_XTS(NAME, TYPE, BLEN, ENCRYPT, DECRYPT) \
221 DEFINE__XTS(NAME, TYPE, BLEN, ENCRYPT, DECRYPT) \
[all …]
/openbmc/linux/drivers/crypto/
H A Dpadlock-aes.c67 struct cword decrypt; member
133 ctx->cword.decrypt.encdec = 1; in aes_set_key()
135 ctx->cword.decrypt.rounds = ctx->cword.encrypt.rounds; in aes_set_key()
137 ctx->cword.decrypt.ksize = ctx->cword.encrypt.ksize; in aes_set_key()
145 ctx->cword.decrypt.keygen = 1; in aes_set_key()
156 &ctx->cword.decrypt == per_cpu(paes_last_cword, cpu)) in aes_set_key()
320 ecb_crypt(in, out, ctx->D, &ctx->cword.decrypt, 1); in padlock_aes_decrypt()
377 padlock_reset_key(&ctx->cword.decrypt); in ecb_aes_decrypt()
383 ctx->D, &ctx->cword.decrypt, in ecb_aes_decrypt()
406 .decrypt = ecb_aes_decrypt,
[all …]
/openbmc/linux/fs/crypto/
H A Dcrypto.c100 /* Encrypt or decrypt a single filesystem block of file contents */
239 * fscrypt_decrypt_pagecache_blocks() - Decrypt filesystem blocks in a
241 * @folio: The locked pagecache folio containing the block(s) to decrypt
242 * @len: Total size of the block(s) to decrypt. Must be a nonzero
244 * @offs: Byte offset within @folio of the first block to decrypt. Must be
285 * fscrypt_decrypt_block_inplace() - Decrypt a filesystem block in-place
287 * @page: The page containing the block to decrypt
288 * @len: Size of block to decrypt. This must be a multiple of
290 * @offs: Byte offset within @page at which the block to decrypt begins
294 * Decrypt a possibly-compressed filesystem block that is located in an
H A Dbio.c17 * fscrypt_decrypt_bio() - decrypt the contents of a bio
18 * @bio: the bio to decrypt
20 * Decrypt the contents of a "read" bio following successful completion of the
102 * ciphertext blocks which decrypt to the all-zeroes block. The blocks must be
/openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/
H A Dpython3-rsa_4.9.bb11 pyrsa-decrypt \
19 ALTERNATIVE_LINK_NAME[pyrsa-decrypt] = "${bindir}/pyrsa-decrypt"
/openbmc/u-boot/include/
H A Duboot_aes.h54 * aes_decrypt() - Decrypt single block of data with AES 128
86 * Decrypt multiple blocks of data with AES CBC.
90 * @src Source data to decrypt
92 * @num_aes_blocks Number of AES blocks to decrypt
/openbmc/linux/drivers/crypto/ccree/
H A Dcc_cipher.c898 "Encrypt" : "Decrypt"), req, iv, nbytes); in cc_cipher_process()
1017 .decrypt = cc_cipher_decrypt,
1035 .decrypt = cc_cipher_decrypt,
1053 .decrypt = cc_cipher_decrypt,
1071 .decrypt = cc_cipher_decrypt,
1089 .decrypt = cc_cipher_decrypt,
1107 .decrypt = cc_cipher_decrypt,
1125 .decrypt = cc_cipher_decrypt,
1147 .decrypt = cc_cipher_decrypt,
1164 .decrypt = cc_cipher_decrypt,
[all …]
/openbmc/linux/drivers/crypto/amcc/
H A Dcrypto4xx_alg.c70 const unsigned int ivlen, bool decrypt, in crypto4xx_crypt() argument
84 req->cryptlen, iv, ivlen, decrypt ? ctx->sa_in : ctx->sa_out, in crypto4xx_crypt()
325 bool is_ccm, bool decrypt) in crypto4xx_aead_need_fallback() argument
441 static int crypto4xx_crypt_aes_ccm(struct aead_request *req, bool decrypt) in crypto4xx_crypt_aes_ccm() argument
451 if (decrypt) in crypto4xx_crypt_aes_ccm()
454 if (crypto4xx_aead_need_fallback(req, len, true, decrypt)) in crypto4xx_crypt_aes_ccm()
455 return crypto4xx_aead_fallback(req, ctx, decrypt); in crypto4xx_crypt_aes_ccm()
457 memcpy(tmp_sa, decrypt ? ctx->sa_in : ctx->sa_out, ctx->sa_len * 4); in crypto4xx_crypt_aes_ccm()
588 bool decrypt) in crypto4xx_crypt_aes_gcm() argument
595 if (decrypt) in crypto4xx_crypt_aes_gcm()
[all …]
/openbmc/linux/include/crypto/
H A Dakcipher.h61 * @decrypt_cnt: number of decrypt requests
62 * @decrypt_tlen: total data size handled by decrypt requests
91 * @decrypt: Function performs a decrypt operation as defined by public key
121 int (*decrypt)(struct akcipher_request *req); member
352 * crypto_akcipher_decrypt() - Invoke public key decrypt operation
354 * Function invokes the specific public key decrypt operation for a given
373 return crypto_akcipher_errstat(alg, alg->decrypt(req)); in crypto_akcipher_decrypt()
395 * crypto_akcipher_sync_decrypt() - Invoke public key decrypt operation
397 * Function invokes the specific public key decrypt operation for a given
H A Dskcipher.h22 * @cryptlen: Number of bytes to encrypt or decrypt
56 * @decrypt_cnt: number of decrypt requests
57 * @decrypt_tlen: total data size handled by decrypt requests
101 * @decrypt: Decrypt a single block. This is a reverse counterpart to @encrypt
115 * IV of exactly that size to perform the encrypt or decrypt operation.
130 int (*decrypt)(struct skcipher_request *req); member
448 * crypto_skcipher_decrypt() - decrypt ciphertext
452 * Decrypt ciphertext data using the skcipher_request handle. That data
514 * encrypt and decrypt API calls. During the allocation, the provided skcipher
/openbmc/linux/drivers/crypto/cavium/nitrox/
H A Dnitrox_skcipher.c264 creq->ctrl.s.arg = (enc ? ENCRYPT : DECRYPT); in nitrox_skcipher_crypt()
400 .decrypt = nitrox_cbc_decrypt,
419 .decrypt = nitrox_aes_decrypt,
438 .decrypt = nitrox_aes_decrypt,
457 .decrypt = nitrox_aes_decrypt,
478 .decrypt = nitrox_aes_decrypt,
495 .decrypt = nitrox_aes_decrypt,
514 .decrypt = nitrox_cbc_decrypt,
533 .decrypt = nitrox_3des_decrypt,
/openbmc/linux/drivers/crypto/inside-secure/
H A Dsafexcel_cipher.c701 * removed from the output for decrypt! in safexcel_send_req()
717 * Save IV from last crypto input word for CBC modes in decrypt in safexcel_send_req()
873 * Special case: AEAD decrypt with only AAD data. in safexcel_send_req()
1057 * Save input IV in case of CBC decrypt mode in safexcel_skcipher_send()
1297 .decrypt = safexcel_decrypt,
1334 .decrypt = safexcel_decrypt,
1372 .decrypt = safexcel_decrypt,
1410 .decrypt = safexcel_decrypt,
1484 .decrypt = safexcel_decrypt,
1546 .decrypt = safexcel_decrypt,
[all …]
/openbmc/linux/drivers/crypto/aspeed/
H A Daspeed-hace-crypto.c598 (cmd & HACE_CMD_ENCRYPT) ? "encrypt" : "decrypt"); in aspeed_aes_crypt()
746 .decrypt = aspeed_aes_ecb_decrypt,
773 .decrypt = aspeed_aes_cbc_decrypt,
800 .decrypt = aspeed_aes_cfb_decrypt,
827 .decrypt = aspeed_aes_ofb_decrypt,
853 .decrypt = aspeed_des_ecb_decrypt,
880 .decrypt = aspeed_des_cbc_decrypt,
907 .decrypt = aspeed_des_cfb_decrypt,
934 .decrypt = aspeed_des_ofb_decrypt,
960 .decrypt = aspeed_tdes_ecb_decrypt,
[all …]
/openbmc/linux/arch/x86/crypto/
H A Dsm4_aesni_avx2_glue.c72 .decrypt = sm4_avx_ecb_decrypt,
89 .decrypt = cbc_decrypt,
107 .decrypt = cfb_decrypt,
125 .decrypt = ctr_crypt,
/openbmc/linux/drivers/crypto/intel/keembay/
H A Dkeembay-ocs-aes-core.c61 * @instruction: Instruction to be executed (encrypt / decrypt).
77 * CCM/GCM decrypt).
79 * used for GCM encrypt / decrypt).
303 * Called by encrypt() / decrypt() skcipher functions.
407 * For CBC decrypt, save last block (iv) to last_ct_blk buffer. in kmb_ocs_sk_prepare_inplace()
417 /* For CTS decrypt, swap last two blocks, if needed. */ in kmb_ocs_sk_prepare_inplace()
488 /* If this is not a CTS decrypt operation with swapping, we are done. */ in kmb_ocs_sk_prepare_notinplace()
575 /* CBC decrypt case. */ in kmb_ocs_sk_run()
602 /* For decrypt crytplen == len(PT) + len(tag). */ in kmb_ocs_aead_validate_input()
630 * Called by encrypt() / decrypt() aead functions.
[all …]
/openbmc/linux/arch/sparc/crypto/
H A Daes_glue.c37 void (*decrypt)(const u64 *key, const u32 *input, u32 *output); member
131 .decrypt = aes_sparc64_decrypt_128,
143 .decrypt = aes_sparc64_decrypt_192,
155 .decrypt = aes_sparc64_decrypt_256,
216 ctx->ops->decrypt(&ctx->key[0], (const u32 *) src, (u32 *) dst); in crypto_aes_decrypt()
395 .decrypt = ecb_decrypt,
409 .decrypt = cbc_decrypt,
423 .decrypt = ctr_crypt,
/openbmc/linux/arch/arm/crypto/
H A Dchacha-glue.c210 .decrypt = chacha_arm,
225 .decrypt = xchacha_arm,
240 .decrypt = xchacha_arm,
260 .decrypt = chacha_neon,
276 .decrypt = xchacha_neon,
292 .decrypt = xchacha_neon,
/openbmc/linux/Documentation/virt/kvm/s390/
H A Ds390-pv-boot.rst17 KVM to decrypt the protected virtual machine.
21 PVM, decrypt the components and verify the data and address list
57 decrypt and verify the PV, as well as control flags and a start PSW.
/openbmc/linux/arch/mips/crypto/
H A Dchacha-glue.c95 .decrypt = chacha_mips,
110 .decrypt = xchacha_mips,
125 .decrypt = xchacha_mips,

12345678910>>...17