Home
last modified time | relevance | path

Searched refs:aes (Results 1 – 25 of 169) sorted by relevance

1234567

/openbmc/linux/drivers/crypto/ccp/
H A Dccp-crypto-aes-cmac.c69 if (!ctx->u.aes.key_len) in ccp_do_cmac_update()
153 cmac_key_sg = (need_pad) ? &ctx->u.aes.k2_sg in ccp_do_cmac_update()
154 : &ctx->u.aes.k1_sg; in ccp_do_cmac_update()
159 rctx->cmd.u.aes.type = ctx->u.aes.type; in ccp_do_cmac_update()
160 rctx->cmd.u.aes.mode = ctx->u.aes.mode; in ccp_do_cmac_update()
161 rctx->cmd.u.aes.action = CCP_AES_ACTION_ENCRYPT; in ccp_do_cmac_update()
162 rctx->cmd.u.aes.key = &ctx->u.aes.key_sg; in ccp_do_cmac_update()
163 rctx->cmd.u.aes.key_len = ctx->u.aes.key_len; in ccp_do_cmac_update()
164 rctx->cmd.u.aes.iv = &rctx->iv_sg; in ccp_do_cmac_update()
165 rctx->cmd.u.aes.iv_len = AES_BLOCK_SIZE; in ccp_do_cmac_update()
[all …]
H A Dccp-crypto-aes-galois.c36 ctx->u.aes.type = CCP_AES_TYPE_128; in ccp_aes_gcm_setkey()
39 ctx->u.aes.type = CCP_AES_TYPE_192; in ccp_aes_gcm_setkey()
42 ctx->u.aes.type = CCP_AES_TYPE_256; in ccp_aes_gcm_setkey()
48 ctx->u.aes.mode = CCP_AES_MODE_GCM; in ccp_aes_gcm_setkey()
49 ctx->u.aes.key_len = key_len; in ccp_aes_gcm_setkey()
51 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_gcm_setkey()
52 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); in ccp_aes_gcm_setkey()
86 if (!ctx->u.aes.key_len) in ccp_aes_gcm_crypt()
89 if (ctx->u.aes.mode != CCP_AES_MODE_GCM) in ccp_aes_gcm_crypt()
119 rctx->cmd.u.aes.authsize = crypto_aead_authsize(tfm); in ccp_aes_gcm_crypt()
[all …]
H A Dccp-crypto-aes.c32 if (ctx->u.aes.mode != CCP_AES_MODE_ECB) in ccp_aes_complete()
46 ctx->u.aes.type = CCP_AES_TYPE_128; in ccp_aes_setkey()
49 ctx->u.aes.type = CCP_AES_TYPE_192; in ccp_aes_setkey()
52 ctx->u.aes.type = CCP_AES_TYPE_256; in ccp_aes_setkey()
57 ctx->u.aes.mode = alg->mode; in ccp_aes_setkey()
58 ctx->u.aes.key_len = key_len; in ccp_aes_setkey()
60 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_setkey()
61 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); in ccp_aes_setkey()
74 if (!ctx->u.aes.key_len) in ccp_aes_crypt()
77 if (((ctx->u.aes.mode == CCP_AES_MODE_ECB) || in ccp_aes_crypt()
[all …]
H A Dccp-ops.c478 struct ccp_aes_engine *aes = &cmd->u.aes; in ccp_run_aes_cmac_cmd() local
485 if (!((aes->key_len == AES_KEYSIZE_128) || in ccp_run_aes_cmac_cmd()
486 (aes->key_len == AES_KEYSIZE_192) || in ccp_run_aes_cmac_cmd()
487 (aes->key_len == AES_KEYSIZE_256))) in ccp_run_aes_cmac_cmd()
490 if (aes->src_len & (AES_BLOCK_SIZE - 1)) in ccp_run_aes_cmac_cmd()
493 if (aes->iv_len != AES_BLOCK_SIZE) in ccp_run_aes_cmac_cmd()
496 if (!aes->key || !aes->iv || !aes->src) in ccp_run_aes_cmac_cmd()
499 if (aes->cmac_final) { in ccp_run_aes_cmac_cmd()
500 if (aes->cmac_key_len != AES_BLOCK_SIZE) in ccp_run_aes_cmac_cmd()
503 if (!aes->cmac_key) in ccp_run_aes_cmac_cmd()
[all …]
H A Dccp-crypto-aes-xts.c91 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_xts_setkey()
95 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_xts_setkey()
98 ctx->u.aes.key_len = key_len / 2; in ccp_aes_xts_setkey()
99 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); in ccp_aes_xts_setkey()
101 return crypto_skcipher_setkey(ctx->u.aes.tfm_skcipher, key, key_len); in ccp_aes_xts_setkey()
116 if (!ctx->u.aes.key_len) in ccp_aes_xts_crypt()
142 (ctx->u.aes.key_len != AES_KEYSIZE_128)) in ccp_aes_xts_crypt()
144 if ((ctx->u.aes.key_len != AES_KEYSIZE_128) && in ccp_aes_xts_crypt()
145 (ctx->u.aes.key_len != AES_KEYSIZE_256)) in ccp_aes_xts_crypt()
152 ctx->u.aes.tfm_skcipher); in ccp_aes_xts_crypt()
[all …]
H A DMakefile19 ccp-crypto-aes.o \
20 ccp-crypto-aes-cmac.o \
21 ccp-crypto-aes-xts.o \
22 ccp-crypto-aes-galois.o \
/openbmc/linux/arch/arm64/crypto/
H A DMakefile50 obj-$(CONFIG_CRYPTO_AES_ARM64_CE) += aes-ce-cipher.o
51 aes-ce-cipher-y := aes-ce-core.o aes-ce-glue.o
53 obj-$(CONFIG_CRYPTO_AES_ARM64_CE_CCM) += aes-ce-ccm.o
54 aes-ce-ccm-y := aes-ce-ccm-glue.o aes-ce-ccm-core.o
56 obj-$(CONFIG_CRYPTO_AES_ARM64_CE_BLK) += aes-ce-blk.o
57 aes-ce-blk-y := aes-glue-ce.o aes-ce.o
59 obj-$(CONFIG_CRYPTO_AES_ARM64_NEON_BLK) += aes-neon-blk.o
60 aes-neon-blk-y := aes-glue-neon.o aes-neon.o
78 obj-$(CONFIG_CRYPTO_AES_ARM64) += aes-arm64.o
79 aes-arm64-y := aes-cipher-core.o aes-cipher-glue.o
[all …]
H A Daes-ce.S58 aes\de \i0\().16b, \k\().16b
59 aes\mc \i0\().16b, \i0\().16b
61 aes\de \i1\().16b, \k\().16b
62 aes\mc \i1\().16b, \i1\().16b
64 aes\de \i2\().16b, \k\().16b
65 aes\mc \i2\().16b, \i2\().16b
66 aes\de \i3\().16b, \k\().16b
67 aes\mc \i3\().16b, \i3\().16b
69 aes\de \i4\().16b, \k\().16b
70 aes\mc \i4\().16b, \i4\().16b
[all …]
/openbmc/qemu/tests/qemu-iotests/
H A D149.out1 # ================= dm-crypt aes-256-xts-plain64-sha1 =================
3 truncate TEST_DIR/luks-aes-256-xts-plain64-sha1.img --size 4194304MB
5 …mat --type luks1 --cipher aes-xts-plain64 --key-size 512 --hash sha1 --key-slot 0 --key-file - --i…
7 sudo cryptsetup -q -v luksOpen TEST_DIR/luks-aes-256-xts-plain64-sha1.img qiotest-145-aes-256-xts-p…
9 sudo chown UID:GID /dev/mapper/qiotest-145-aes-256-xts-plain64-sha1
10 … 100M 10M --image-opts driver=host_device,filename=/dev/mapper/qiotest-145-aes-256-xts-plain64-sha1
15 sudo chown UID:GID /dev/mapper/qiotest-145-aes-256-xts-plain64-sha1
16 …5728M 10M --image-opts driver=host_device,filename=/dev/mapper/qiotest-145-aes-256-xts-plain64-sha1
21 sudo cryptsetup -q -v luksClose qiotest-145-aes-256-xts-plain64-sha1
23 …ase64 --image-opts driver=luks,key-secret=sec0,file.filename=TEST_DIR/luks-aes-256-xts-plain64-sha…
[all …]
H A D082.out60 encrypt.format=<str> - Encrypt the image, format choices: 'aes', 'luks'
66 …on=<bool (on/off)> - Encrypt the image with format 'aes'. (Deprecated in favor of encrypt.format=a…
86 encrypt.format=<str> - Encrypt the image, format choices: 'aes', 'luks'
92 …on=<bool (on/off)> - Encrypt the image with format 'aes'. (Deprecated in favor of encrypt.format=a…
112 encrypt.format=<str> - Encrypt the image, format choices: 'aes', 'luks'
118 …on=<bool (on/off)> - Encrypt the image with format 'aes'. (Deprecated in favor of encrypt.format=a…
138 encrypt.format=<str> - Encrypt the image, format choices: 'aes', 'luks'
144 …on=<bool (on/off)> - Encrypt the image with format 'aes'. (Deprecated in favor of encrypt.format=a…
164 encrypt.format=<str> - Encrypt the image, format choices: 'aes', 'luks'
170 …on=<bool (on/off)> - Encrypt the image with format 'aes'. (Deprecated in favor of encrypt.format=a…
[all …]
/openbmc/linux/arch/powerpc/crypto/
H A DMakefile8 obj-$(CONFIG_CRYPTO_AES_PPC_SPE) += aes-ppc-spe.o
16 obj-$(CONFIG_CRYPTO_AES_GCM_P10) += aes-gcm-p10-crypto.o
20 aes-ppc-spe-y := aes-spe-core.o aes-spe-keys.o aes-tab-4k.o aes-spe-modes.o aes-spe-glue.o
27 aes-gcm-p10-crypto-y := aes-gcm-p10-glue.o aes-gcm-p10.o ghashp10-ppc.o aesp10-ppc.o
/openbmc/linux/arch/arm/crypto/
H A DMakefile6 obj-$(CONFIG_CRYPTO_AES_ARM) += aes-arm.o
7 obj-$(CONFIG_CRYPTO_AES_ARM_BS) += aes-arm-bs.o
19 obj-$(CONFIG_CRYPTO_AES_ARM_CE) += aes-arm-ce.o
26 aes-arm-y := aes-cipher-core.o aes-cipher-glue.o
27 aes-arm-bs-y := aes-neonbs-core.o aes-neonbs-glue.o
38 aes-arm-ce-y := aes-ce-core.o aes-ce-glue.o
/openbmc/linux/Documentation/devicetree/bindings/crypto/
H A Domap-aes.txt7 - "ti,omap2-aes" for OMAP2.
8 - "ti,omap3-aes" for OMAP3.
9 - "ti,omap4-aes" for OMAP4 and AM33XX.
23 aes: aes@53500000 {
24 compatible = "ti,omap4-aes";
25 ti,hwmods = "aes";
/openbmc/linux/drivers/crypto/nx/
H A DMakefile4 nx-aes-cbc.o \
5 nx-aes-ecb.o \
6 nx-aes-gcm.o \
7 nx-aes-ccm.o \
8 nx-aes-ctr.o \
9 nx-aes-xcbc.o \
/openbmc/linux/drivers/net/wireless/ti/wl12xx/
H A Ddebugfs.c80 WL12XX_DEBUGFS_FWSTATS_FILE(aes, encrypt_fail, "%u");
81 WL12XX_DEBUGFS_FWSTATS_FILE(aes, decrypt_fail, "%u");
82 WL12XX_DEBUGFS_FWSTATS_FILE(aes, encrypt_packets, "%u");
83 WL12XX_DEBUGFS_FWSTATS_FILE(aes, decrypt_packets, "%u");
84 WL12XX_DEBUGFS_FWSTATS_FILE(aes, encrypt_interrupt, "%u");
85 WL12XX_DEBUGFS_FWSTATS_FILE(aes, decrypt_interrupt, "%u");
180 DEBUGFS_FWSTATS_ADD(aes, encrypt_fail); in wl12xx_debugfs_add_files()
181 DEBUGFS_FWSTATS_ADD(aes, decrypt_fail); in wl12xx_debugfs_add_files()
182 DEBUGFS_FWSTATS_ADD(aes, encrypt_packets); in wl12xx_debugfs_add_files()
183 DEBUGFS_FWSTATS_ADD(aes, decrypt_packets); in wl12xx_debugfs_add_files()
[all …]
/openbmc/linux/drivers/crypto/
H A DMakefile4 obj-$(CONFIG_CRYPTO_DEV_ATMEL_AES) += atmel-aes.o
19 obj-$(CONFIG_CRYPTO_DEV_GEODE) += geode-aes.o
28 obj-$(CONFIG_CRYPTO_DEV_OMAP_AES) += omap-aes-driver.o
29 omap-aes-driver-objs := omap-aes.o omap-aes-gcm.o
32 obj-$(CONFIG_CRYPTO_DEV_PADLOCK_AES) += padlock-aes.o
/openbmc/qemu/tests/bench/
H A Dbenchmark-crypto-cipher.c192 ADD_TEST(ecb, aes, 128, chunk); \ in main()
193 ADD_TEST(ecb, aes, 256, chunk); \ in main()
194 ADD_TEST(cbc, aes, 128, chunk); \ in main()
195 ADD_TEST(cbc, aes, 256, chunk); \ in main()
196 ADD_TEST(ctr, aes, 128, chunk); \ in main()
197 ADD_TEST(ctr, aes, 256, chunk); \ in main()
198 ADD_TEST(xts, aes, 128, chunk); \ in main()
199 ADD_TEST(xts, aes, 256, chunk); \ in main()
/openbmc/linux/drivers/crypto/intel/keembay/
H A DMakefile4 obj-$(CONFIG_CRYPTO_DEV_KEEMBAY_OCS_AES_SM4) += keembay-ocs-aes.o
5 keembay-ocs-aes-objs := keembay-ocs-aes-core.o ocs-aes.o
H A DKconfig13 cbc(aes), ctr(aes), ccm(aes), gcm(aes), cbc(sm4), ctr(sm4), ccm(sm4)
17 enabled: ecb(aes), cts(cbc(aes)), ecb(sm4) and cts(cbc(sm4)).
26 Provides OCS version of ecb(aes) and ecb(sm4)
38 Provides OCS version of cts(cbc(aes)) and cts(cbc(sm4)).
/openbmc/linux/drivers/net/wireless/ti/wl1251/
H A Ddebugfs.c162 DEBUGFS_FWSTATS_FILE(aes, encrypt_fail, 20, "%u");
163 DEBUGFS_FWSTATS_FILE(aes, decrypt_fail, 20, "%u");
164 DEBUGFS_FWSTATS_FILE(aes, encrypt_packets, 20, "%u");
165 DEBUGFS_FWSTATS_FILE(aes, decrypt_packets, 20, "%u");
166 DEBUGFS_FWSTATS_FILE(aes, encrypt_interrupt, 20, "%u");
167 DEBUGFS_FWSTATS_FILE(aes, decrypt_interrupt, 20, "%u");
302 DEBUGFS_FWSTATS_DEL(aes, encrypt_fail); in wl1251_debugfs_delete_files()
303 DEBUGFS_FWSTATS_DEL(aes, decrypt_fail); in wl1251_debugfs_delete_files()
304 DEBUGFS_FWSTATS_DEL(aes, encrypt_packets); in wl1251_debugfs_delete_files()
305 DEBUGFS_FWSTATS_DEL(aes, decrypt_packets); in wl1251_debugfs_delete_files()
[all …]
/openbmc/qemu/target/s390x/
H A Dcpu_features_def.h.inc197 DEF_FEAT(KMAC_AES_128, "kmac-aes-128", KMAC, 18, "KMAC AES-128")
198 DEF_FEAT(KMAC_AES_192, "kmac-aes-192", KMAC, 19, "KMAC AES-192")
199 DEF_FEAT(KMAC_AES_256, "kmac-aes-256", KMAC, 20, "KMAC AES-256")
211 DEF_FEAT(KMC_AES_128, "kmc-aes-128", KMC, 18, "KMC AES-128")
212 DEF_FEAT(KMC_AES_192, "kmc-aes-192", KMC, 19, "KMC AES-192")
213 DEF_FEAT(KMC_AES_256, "kmc-aes-256", KMC, 20, "KMC AES-256")
226 DEF_FEAT(KM_AES_128, "km-aes-128", KM, 18, "KM AES-128")
227 DEF_FEAT(KM_AES_192, "km-aes-192", KM, 19, "KM AES-192")
228 DEF_FEAT(KM_AES_256, "km-aes-256", KM, 20, "KM AES-256")
232 DEF_FEAT(KM_XTS_AES_128, "km-xts-aes-128", KM, 50, "KM XTS-AES-128")
[all …]
/openbmc/u-boot/arch/x86/cpu/intel_common/
H A Dreport_platform.c19 int vt, txt, aes; in report_cpu_info() local
33 aes = (cpuidr.ecx & (1 << 25)) ? 1 : 0; in report_cpu_info()
37 mode[aes], mode[txt], mode[vt]); in report_cpu_info()
/openbmc/qemu/tests/tcg/aarch64/
H A DMakefile.target81 AARCH64_TESTS += test-aes
82 test-aes: CFLAGS += -O -march=armv8-a+aes
83 test-aes: test-aes-main.c.inc
/openbmc/linux/Documentation/admin-guide/device-mapper/
H A Ddm-crypt.rst25 aes-cbc-essiv:sha256
26 aes-xts-plain64
40 capi:cbc(aes)-essiv:sha256
41 capi:xts(aes)-plain64
45 capi:gcm(aes)-random
46 capi:authenc(hmac(sha256),xts(aes))-random
168 …dmsetup create crypt1 --table "0 `blockdev --getsz $1` crypt aes-cbc-essiv:sha256 babebabebabebabe…
174 …dmsetup create crypt2 --table "0 `blockdev --getsize $1` crypt aes-cbc-essiv:sha256 :32:logon:my_p…
/openbmc/linux/drivers/crypto/starfive/
H A Djh7110-aes.c241 rctx->csr.aes.v = 0; in starfive_aes_hw_init()
242 rctx->csr.aes.aesrst = 1; in starfive_aes_hw_init()
243 writel(rctx->csr.aes.v, cryp->base + STARFIVE_AES_CSR); in starfive_aes_hw_init()
248 rctx->csr.aes.v = 0; in starfive_aes_hw_init()
252 rctx->csr.aes.keymode = STARFIVE_AES_KEYMODE_128; in starfive_aes_hw_init()
255 rctx->csr.aes.keymode = STARFIVE_AES_KEYMODE_192; in starfive_aes_hw_init()
258 rctx->csr.aes.keymode = STARFIVE_AES_KEYMODE_256; in starfive_aes_hw_init()
262 rctx->csr.aes.mode = hw_mode; in starfive_aes_hw_init()
263 rctx->csr.aes.cmode = !is_encrypt(cryp); in starfive_aes_hw_init()
264 rctx->csr.aes.ie = 1; in starfive_aes_hw_init()
[all …]

1234567