/openbmc/linux/crypto/ |
H A D | tcrypt.c | 50 #define DECRYPT 0 macro 1861 test_cipher_speed("ecb(aes)", DECRYPT, sec, NULL, 0, in do_test() 1865 test_cipher_speed("cbc(aes)", DECRYPT, sec, NULL, 0, in do_test() 1869 test_cipher_speed("lrw(aes)", DECRYPT, sec, NULL, 0, in do_test() 1873 test_cipher_speed("xts(aes)", DECRYPT, sec, NULL, 0, in do_test() 1877 test_cipher_speed("cts(cbc(aes))", DECRYPT, sec, NULL, 0, in do_test() 1881 test_cipher_speed("ctr(aes)", DECRYPT, sec, NULL, 0, in do_test() 1885 test_cipher_speed("cfb(aes)", DECRYPT, sec, NULL, 0, in do_test() 1893 test_cipher_speed("ecb(des3_ede)", DECRYPT, sec, in do_test() 1899 test_cipher_speed("cbc(des3_ede)", DECRYPT, sec, in do_test() [all …]
|
H A D | chacha_generic.c | 84 .decrypt = crypto_chacha_crypt, 99 .decrypt = crypto_xchacha_crypt, 114 .decrypt = crypto_xchacha_crypt,
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-connectivity/vpnc/vpnc/ |
H A D | 0002-Fix-vpnc-install-for-cross-compile.patch | 25 - install -m644 cisco-decrypt.1 $(DESTDIR)$(MANDIR)/man1 32 + install -m 644 cisco-decrypt.1 $(DESTDIR)$(MANDIR)/man1 37 - install -m755 cisco-decrypt $(DESTDIR)$(BINDIR) 39 + install -m 755 cisco-decrypt $(DESTDIR)$(BINDIR) 43 - install -s -m755 cisco-decrypt $(DESTDIR)$(BINDIR) 45 + install -s -m 755 cisco-decrypt $(DESTDIR)$(BINDIR)
|
/openbmc/linux/drivers/crypto/caam/ |
H A D | caamalg_qi.c | 272 if (ctx->drv_ctx[DECRYPT]) { in aead_setkey() 273 ret = caam_drv_ctx_update(ctx->drv_ctx[DECRYPT], in aead_setkey() 396 if (ctx->drv_ctx[DECRYPT]) { in gcm_setkey() 397 ret = caam_drv_ctx_update(ctx->drv_ctx[DECRYPT], in gcm_setkey() 504 if (ctx->drv_ctx[DECRYPT]) { in rfc4106_setkey() 505 ret = caam_drv_ctx_update(ctx->drv_ctx[DECRYPT], in rfc4106_setkey() 610 if (ctx->drv_ctx[DECRYPT]) { in rfc4543_setkey() 611 ret = caam_drv_ctx_update(ctx->drv_ctx[DECRYPT], in rfc4543_setkey() 641 /* skcipher encrypt, decrypt shared descriptors */ in skcipher_setkey() 657 if (ctx->drv_ctx[DECRYPT]) { in skcipher_setkey() [all …]
|
H A D | caamalg.c | 1897 .decrypt = skcipher_decrypt, 1916 .decrypt = skcipher_decrypt, 1935 .decrypt = skcipher_decrypt, 1954 .decrypt = skcipher_decrypt, 1975 .decrypt = skcipher_decrypt, 2002 .decrypt = skcipher_decrypt, 2021 .decrypt = skcipher_decrypt, 2039 .decrypt = skcipher_decrypt, 2057 .decrypt = skcipher_decrypt, 2079 .decrypt = ipsec_gcm_decrypt, [all …]
|
H A D | caamalg_qi2.c | 265 flc = &ctx->flc[DECRYPT]; in aead_set_sh_desc() 272 dma_sync_single_for_device(dev, ctx->flc_dma[DECRYPT], in aead_set_sh_desc() 610 flc = &ctx->flc[DECRYPT]; in chachapoly_set_sh_desc() 615 dma_sync_single_for_device(dev, ctx->flc_dma[DECRYPT], in chachapoly_set_sh_desc() 697 flc = &ctx->flc[DECRYPT]; in gcm_set_sh_desc() 701 dma_sync_single_for_device(dev, ctx->flc_dma[DECRYPT], in gcm_set_sh_desc() 790 flc = &ctx->flc[DECRYPT]; in rfc4106_set_sh_desc() 795 dma_sync_single_for_device(dev, ctx->flc_dma[DECRYPT], in rfc4106_set_sh_desc() 891 flc = &ctx->flc[DECRYPT]; in rfc4543_set_sh_desc() 896 dma_sync_single_for_device(dev, ctx->flc_dma[DECRYPT], in rfc4543_set_sh_desc() [all …]
|
/openbmc/qemu/crypto/ |
H A D | cipher-nettle.c.inc | 80 #define DEFINE_ECB(NAME, TYPE, BLEN, ENCRYPT, DECRYPT) \ 98 DECRYPT(&ctx->key, len, out, in); \ 109 #define DEFINE_CBC(NAME, TYPE, BLEN, ENCRYPT, DECRYPT) \ 127 cbc_decrypt(&ctx->key, DECRYPT, BLEN, ctx->iv, len, out, in); \ 158 #define DEFINE__XTS(NAME, TYPE, BLEN, ENCRYPT, DECRYPT) \ 167 DECRYPT((const void *)ctx, length, dst, src); \ 194 #define DEFINE__XTS(NAME, TYPE, BLEN, ENCRYPT, DECRYPT) \ 213 xts_decrypt_message(&ctx->key, &ctx->key_xts, DECRYPT, ENCRYPT, \ 219 #define DEFINE_XTS(NAME, TYPE, BLEN, ENCRYPT, DECRYPT) \ 221 DEFINE__XTS(NAME, TYPE, BLEN, ENCRYPT, DECRYPT) \ [all …]
|
/openbmc/linux/drivers/crypto/ |
H A D | padlock-aes.c | 67 struct cword decrypt; member 133 ctx->cword.decrypt.encdec = 1; in aes_set_key() 135 ctx->cword.decrypt.rounds = ctx->cword.encrypt.rounds; in aes_set_key() 137 ctx->cword.decrypt.ksize = ctx->cword.encrypt.ksize; in aes_set_key() 145 ctx->cword.decrypt.keygen = 1; in aes_set_key() 156 &ctx->cword.decrypt == per_cpu(paes_last_cword, cpu)) in aes_set_key() 320 ecb_crypt(in, out, ctx->D, &ctx->cword.decrypt, 1); in padlock_aes_decrypt() 377 padlock_reset_key(&ctx->cword.decrypt); in ecb_aes_decrypt() 383 ctx->D, &ctx->cword.decrypt, in ecb_aes_decrypt() 406 .decrypt = ecb_aes_decrypt, [all …]
|
/openbmc/linux/fs/crypto/ |
H A D | crypto.c | 100 /* Encrypt or decrypt a single filesystem block of file contents */ 239 * fscrypt_decrypt_pagecache_blocks() - Decrypt filesystem blocks in a 241 * @folio: The locked pagecache folio containing the block(s) to decrypt 242 * @len: Total size of the block(s) to decrypt. Must be a nonzero 244 * @offs: Byte offset within @folio of the first block to decrypt. Must be 285 * fscrypt_decrypt_block_inplace() - Decrypt a filesystem block in-place 287 * @page: The page containing the block to decrypt 288 * @len: Size of block to decrypt. This must be a multiple of 290 * @offs: Byte offset within @page at which the block to decrypt begins 294 * Decrypt a possibly-compressed filesystem block that is located in an
|
H A D | bio.c | 17 * fscrypt_decrypt_bio() - decrypt the contents of a bio 18 * @bio: the bio to decrypt 20 * Decrypt the contents of a "read" bio following successful completion of the 102 * ciphertext blocks which decrypt to the all-zeroes block. The blocks must be
|
/openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/ |
H A D | python3-rsa_4.9.bb | 11 pyrsa-decrypt \ 19 ALTERNATIVE_LINK_NAME[pyrsa-decrypt] = "${bindir}/pyrsa-decrypt"
|
/openbmc/u-boot/include/ |
H A D | uboot_aes.h | 54 * aes_decrypt() - Decrypt single block of data with AES 128 86 * Decrypt multiple blocks of data with AES CBC. 90 * @src Source data to decrypt 92 * @num_aes_blocks Number of AES blocks to decrypt
|
/openbmc/linux/drivers/crypto/ccree/ |
H A D | cc_cipher.c | 898 "Encrypt" : "Decrypt"), req, iv, nbytes); in cc_cipher_process() 1017 .decrypt = cc_cipher_decrypt, 1035 .decrypt = cc_cipher_decrypt, 1053 .decrypt = cc_cipher_decrypt, 1071 .decrypt = cc_cipher_decrypt, 1089 .decrypt = cc_cipher_decrypt, 1107 .decrypt = cc_cipher_decrypt, 1125 .decrypt = cc_cipher_decrypt, 1147 .decrypt = cc_cipher_decrypt, 1164 .decrypt = cc_cipher_decrypt, [all …]
|
/openbmc/linux/drivers/crypto/amcc/ |
H A D | crypto4xx_alg.c | 70 const unsigned int ivlen, bool decrypt, in crypto4xx_crypt() argument 84 req->cryptlen, iv, ivlen, decrypt ? ctx->sa_in : ctx->sa_out, in crypto4xx_crypt() 325 bool is_ccm, bool decrypt) in crypto4xx_aead_need_fallback() argument 441 static int crypto4xx_crypt_aes_ccm(struct aead_request *req, bool decrypt) in crypto4xx_crypt_aes_ccm() argument 451 if (decrypt) in crypto4xx_crypt_aes_ccm() 454 if (crypto4xx_aead_need_fallback(req, len, true, decrypt)) in crypto4xx_crypt_aes_ccm() 455 return crypto4xx_aead_fallback(req, ctx, decrypt); in crypto4xx_crypt_aes_ccm() 457 memcpy(tmp_sa, decrypt ? ctx->sa_in : ctx->sa_out, ctx->sa_len * 4); in crypto4xx_crypt_aes_ccm() 588 bool decrypt) in crypto4xx_crypt_aes_gcm() argument 595 if (decrypt) in crypto4xx_crypt_aes_gcm() [all …]
|
/openbmc/linux/include/crypto/ |
H A D | akcipher.h | 61 * @decrypt_cnt: number of decrypt requests 62 * @decrypt_tlen: total data size handled by decrypt requests 91 * @decrypt: Function performs a decrypt operation as defined by public key 121 int (*decrypt)(struct akcipher_request *req); member 352 * crypto_akcipher_decrypt() - Invoke public key decrypt operation 354 * Function invokes the specific public key decrypt operation for a given 373 return crypto_akcipher_errstat(alg, alg->decrypt(req)); in crypto_akcipher_decrypt() 395 * crypto_akcipher_sync_decrypt() - Invoke public key decrypt operation 397 * Function invokes the specific public key decrypt operation for a given
|
H A D | skcipher.h | 22 * @cryptlen: Number of bytes to encrypt or decrypt 56 * @decrypt_cnt: number of decrypt requests 57 * @decrypt_tlen: total data size handled by decrypt requests 101 * @decrypt: Decrypt a single block. This is a reverse counterpart to @encrypt 115 * IV of exactly that size to perform the encrypt or decrypt operation. 130 int (*decrypt)(struct skcipher_request *req); member 448 * crypto_skcipher_decrypt() - decrypt ciphertext 452 * Decrypt ciphertext data using the skcipher_request handle. That data 514 * encrypt and decrypt API calls. During the allocation, the provided skcipher
|
/openbmc/linux/drivers/crypto/cavium/nitrox/ |
H A D | nitrox_skcipher.c | 264 creq->ctrl.s.arg = (enc ? ENCRYPT : DECRYPT); in nitrox_skcipher_crypt() 400 .decrypt = nitrox_cbc_decrypt, 419 .decrypt = nitrox_aes_decrypt, 438 .decrypt = nitrox_aes_decrypt, 457 .decrypt = nitrox_aes_decrypt, 478 .decrypt = nitrox_aes_decrypt, 495 .decrypt = nitrox_aes_decrypt, 514 .decrypt = nitrox_cbc_decrypt, 533 .decrypt = nitrox_3des_decrypt,
|
/openbmc/linux/drivers/crypto/inside-secure/ |
H A D | safexcel_cipher.c | 701 * removed from the output for decrypt! in safexcel_send_req() 717 * Save IV from last crypto input word for CBC modes in decrypt in safexcel_send_req() 873 * Special case: AEAD decrypt with only AAD data. in safexcel_send_req() 1057 * Save input IV in case of CBC decrypt mode in safexcel_skcipher_send() 1297 .decrypt = safexcel_decrypt, 1334 .decrypt = safexcel_decrypt, 1372 .decrypt = safexcel_decrypt, 1410 .decrypt = safexcel_decrypt, 1484 .decrypt = safexcel_decrypt, 1546 .decrypt = safexcel_decrypt, [all …]
|
/openbmc/linux/drivers/crypto/aspeed/ |
H A D | aspeed-hace-crypto.c | 598 (cmd & HACE_CMD_ENCRYPT) ? "encrypt" : "decrypt"); in aspeed_aes_crypt() 746 .decrypt = aspeed_aes_ecb_decrypt, 773 .decrypt = aspeed_aes_cbc_decrypt, 800 .decrypt = aspeed_aes_cfb_decrypt, 827 .decrypt = aspeed_aes_ofb_decrypt, 853 .decrypt = aspeed_des_ecb_decrypt, 880 .decrypt = aspeed_des_cbc_decrypt, 907 .decrypt = aspeed_des_cfb_decrypt, 934 .decrypt = aspeed_des_ofb_decrypt, 960 .decrypt = aspeed_tdes_ecb_decrypt, [all …]
|
/openbmc/linux/arch/x86/crypto/ |
H A D | sm4_aesni_avx2_glue.c | 72 .decrypt = sm4_avx_ecb_decrypt, 89 .decrypt = cbc_decrypt, 107 .decrypt = cfb_decrypt, 125 .decrypt = ctr_crypt,
|
/openbmc/linux/drivers/crypto/intel/keembay/ |
H A D | keembay-ocs-aes-core.c | 61 * @instruction: Instruction to be executed (encrypt / decrypt). 77 * CCM/GCM decrypt). 79 * used for GCM encrypt / decrypt). 303 * Called by encrypt() / decrypt() skcipher functions. 407 * For CBC decrypt, save last block (iv) to last_ct_blk buffer. in kmb_ocs_sk_prepare_inplace() 417 /* For CTS decrypt, swap last two blocks, if needed. */ in kmb_ocs_sk_prepare_inplace() 488 /* If this is not a CTS decrypt operation with swapping, we are done. */ in kmb_ocs_sk_prepare_notinplace() 575 /* CBC decrypt case. */ in kmb_ocs_sk_run() 602 /* For decrypt crytplen == len(PT) + len(tag). */ in kmb_ocs_aead_validate_input() 630 * Called by encrypt() / decrypt() aead functions. [all …]
|
/openbmc/linux/arch/sparc/crypto/ |
H A D | aes_glue.c | 37 void (*decrypt)(const u64 *key, const u32 *input, u32 *output); member 131 .decrypt = aes_sparc64_decrypt_128, 143 .decrypt = aes_sparc64_decrypt_192, 155 .decrypt = aes_sparc64_decrypt_256, 216 ctx->ops->decrypt(&ctx->key[0], (const u32 *) src, (u32 *) dst); in crypto_aes_decrypt() 395 .decrypt = ecb_decrypt, 409 .decrypt = cbc_decrypt, 423 .decrypt = ctr_crypt,
|
/openbmc/linux/arch/arm/crypto/ |
H A D | chacha-glue.c | 210 .decrypt = chacha_arm, 225 .decrypt = xchacha_arm, 240 .decrypt = xchacha_arm, 260 .decrypt = chacha_neon, 276 .decrypt = xchacha_neon, 292 .decrypt = xchacha_neon,
|
/openbmc/linux/Documentation/virt/kvm/s390/ |
H A D | s390-pv-boot.rst | 17 KVM to decrypt the protected virtual machine. 21 PVM, decrypt the components and verify the data and address list 57 decrypt and verify the PV, as well as control flags and a start PSW.
|
/openbmc/linux/arch/mips/crypto/ |
H A D | chacha-glue.c | 95 .decrypt = chacha_mips, 110 .decrypt = xchacha_mips, 125 .decrypt = xchacha_mips,
|