/openbmc/linux/drivers/crypto/ccp/ |
H A D | ccp-crypto-aes-cmac.c | 69 if (!ctx->u.aes.key_len) in ccp_do_cmac_update() 153 cmac_key_sg = (need_pad) ? &ctx->u.aes.k2_sg in ccp_do_cmac_update() 154 : &ctx->u.aes.k1_sg; in ccp_do_cmac_update() 159 rctx->cmd.u.aes.type = ctx->u.aes.type; in ccp_do_cmac_update() 160 rctx->cmd.u.aes.mode = ctx->u.aes.mode; in ccp_do_cmac_update() 161 rctx->cmd.u.aes.action = CCP_AES_ACTION_ENCRYPT; in ccp_do_cmac_update() 162 rctx->cmd.u.aes.key = &ctx->u.aes.key_sg; in ccp_do_cmac_update() 163 rctx->cmd.u.aes.key_len = ctx->u.aes.key_len; in ccp_do_cmac_update() 164 rctx->cmd.u.aes.iv = &rctx->iv_sg; in ccp_do_cmac_update() 165 rctx->cmd.u.aes.iv_len = AES_BLOCK_SIZE; in ccp_do_cmac_update() [all …]
|
H A D | ccp-crypto-aes-galois.c | 36 ctx->u.aes.type = CCP_AES_TYPE_128; in ccp_aes_gcm_setkey() 39 ctx->u.aes.type = CCP_AES_TYPE_192; in ccp_aes_gcm_setkey() 42 ctx->u.aes.type = CCP_AES_TYPE_256; in ccp_aes_gcm_setkey() 48 ctx->u.aes.mode = CCP_AES_MODE_GCM; in ccp_aes_gcm_setkey() 49 ctx->u.aes.key_len = key_len; in ccp_aes_gcm_setkey() 51 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_gcm_setkey() 52 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); in ccp_aes_gcm_setkey() 86 if (!ctx->u.aes.key_len) in ccp_aes_gcm_crypt() 89 if (ctx->u.aes.mode != CCP_AES_MODE_GCM) in ccp_aes_gcm_crypt() 119 rctx->cmd.u.aes.authsize = crypto_aead_authsize(tfm); in ccp_aes_gcm_crypt() [all …]
|
H A D | ccp-crypto-aes.c | 32 if (ctx->u.aes.mode != CCP_AES_MODE_ECB) in ccp_aes_complete() 46 ctx->u.aes.type = CCP_AES_TYPE_128; in ccp_aes_setkey() 49 ctx->u.aes.type = CCP_AES_TYPE_192; in ccp_aes_setkey() 52 ctx->u.aes.type = CCP_AES_TYPE_256; in ccp_aes_setkey() 57 ctx->u.aes.mode = alg->mode; in ccp_aes_setkey() 58 ctx->u.aes.key_len = key_len; in ccp_aes_setkey() 60 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_setkey() 61 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); in ccp_aes_setkey() 74 if (!ctx->u.aes.key_len) in ccp_aes_crypt() 77 if (((ctx->u.aes.mode == CCP_AES_MODE_ECB) || in ccp_aes_crypt() [all …]
|
H A D | ccp-ops.c | 478 struct ccp_aes_engine *aes = &cmd->u.aes; in ccp_run_aes_cmac_cmd() local 485 if (!((aes->key_len == AES_KEYSIZE_128) || in ccp_run_aes_cmac_cmd() 486 (aes->key_len == AES_KEYSIZE_192) || in ccp_run_aes_cmac_cmd() 487 (aes->key_len == AES_KEYSIZE_256))) in ccp_run_aes_cmac_cmd() 490 if (aes->src_len & (AES_BLOCK_SIZE - 1)) in ccp_run_aes_cmac_cmd() 493 if (aes->iv_len != AES_BLOCK_SIZE) in ccp_run_aes_cmac_cmd() 496 if (!aes->key || !aes->iv || !aes->src) in ccp_run_aes_cmac_cmd() 499 if (aes->cmac_final) { in ccp_run_aes_cmac_cmd() 500 if (aes->cmac_key_len != AES_BLOCK_SIZE) in ccp_run_aes_cmac_cmd() 503 if (!aes->cmac_key) in ccp_run_aes_cmac_cmd() [all …]
|
H A D | ccp-crypto-aes-xts.c | 91 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_xts_setkey() 95 memcpy(ctx->u.aes.key, key, key_len); in ccp_aes_xts_setkey() 98 ctx->u.aes.key_len = key_len / 2; in ccp_aes_xts_setkey() 99 sg_init_one(&ctx->u.aes.key_sg, ctx->u.aes.key, key_len); in ccp_aes_xts_setkey() 101 return crypto_skcipher_setkey(ctx->u.aes.tfm_skcipher, key, key_len); in ccp_aes_xts_setkey() 116 if (!ctx->u.aes.key_len) in ccp_aes_xts_crypt() 142 (ctx->u.aes.key_len != AES_KEYSIZE_128)) in ccp_aes_xts_crypt() 144 if ((ctx->u.aes.key_len != AES_KEYSIZE_128) && in ccp_aes_xts_crypt() 145 (ctx->u.aes.key_len != AES_KEYSIZE_256)) in ccp_aes_xts_crypt() 152 ctx->u.aes.tfm_skcipher); in ccp_aes_xts_crypt() [all …]
|
H A D | Makefile | 19 ccp-crypto-aes.o \ 20 ccp-crypto-aes-cmac.o \ 21 ccp-crypto-aes-xts.o \ 22 ccp-crypto-aes-galois.o \
|
/openbmc/linux/arch/arm64/crypto/ |
H A D | Makefile | 50 obj-$(CONFIG_CRYPTO_AES_ARM64_CE) += aes-ce-cipher.o 51 aes-ce-cipher-y := aes-ce-core.o aes-ce-glue.o 53 obj-$(CONFIG_CRYPTO_AES_ARM64_CE_CCM) += aes-ce-ccm.o 54 aes-ce-ccm-y := aes-ce-ccm-glue.o aes-ce-ccm-core.o 56 obj-$(CONFIG_CRYPTO_AES_ARM64_CE_BLK) += aes-ce-blk.o 57 aes-ce-blk-y := aes-glue-ce.o aes-ce.o 59 obj-$(CONFIG_CRYPTO_AES_ARM64_NEON_BLK) += aes-neon-blk.o 60 aes-neon-blk-y := aes-glue-neon.o aes-neon.o 78 obj-$(CONFIG_CRYPTO_AES_ARM64) += aes-arm64.o 79 aes-arm64-y := aes-cipher-core.o aes-cipher-glue.o [all …]
|
H A D | aes-ce.S | 58 aes\de \i0\().16b, \k\().16b 59 aes\mc \i0\().16b, \i0\().16b 61 aes\de \i1\().16b, \k\().16b 62 aes\mc \i1\().16b, \i1\().16b 64 aes\de \i2\().16b, \k\().16b 65 aes\mc \i2\().16b, \i2\().16b 66 aes\de \i3\().16b, \k\().16b 67 aes\mc \i3\().16b, \i3\().16b 69 aes\de \i4\().16b, \k\().16b 70 aes\mc \i4\().16b, \i4\().16b [all …]
|
/openbmc/qemu/tests/qemu-iotests/ |
H A D | 149.out | 1 # ================= dm-crypt aes-256-xts-plain64-sha1 ================= 3 truncate TEST_DIR/luks-aes-256-xts-plain64-sha1.img --size 4194304MB 5 …mat --type luks1 --cipher aes-xts-plain64 --key-size 512 --hash sha1 --key-slot 0 --key-file - --i… 7 sudo cryptsetup -q -v luksOpen TEST_DIR/luks-aes-256-xts-plain64-sha1.img qiotest-145-aes-256-xts-p… 9 sudo chown UID:GID /dev/mapper/qiotest-145-aes-256-xts-plain64-sha1 10 … 100M 10M --image-opts driver=host_device,filename=/dev/mapper/qiotest-145-aes-256-xts-plain64-sha1 15 sudo chown UID:GID /dev/mapper/qiotest-145-aes-256-xts-plain64-sha1 16 …5728M 10M --image-opts driver=host_device,filename=/dev/mapper/qiotest-145-aes-256-xts-plain64-sha1 21 sudo cryptsetup -q -v luksClose qiotest-145-aes-256-xts-plain64-sha1 23 …ase64 --image-opts driver=luks,key-secret=sec0,file.filename=TEST_DIR/luks-aes-256-xts-plain64-sha… [all …]
|
H A D | 082.out | 60 encrypt.format=<str> - Encrypt the image, format choices: 'aes', 'luks' 66 …on=<bool (on/off)> - Encrypt the image with format 'aes'. (Deprecated in favor of encrypt.format=a… 86 encrypt.format=<str> - Encrypt the image, format choices: 'aes', 'luks' 92 …on=<bool (on/off)> - Encrypt the image with format 'aes'. (Deprecated in favor of encrypt.format=a… 112 encrypt.format=<str> - Encrypt the image, format choices: 'aes', 'luks' 118 …on=<bool (on/off)> - Encrypt the image with format 'aes'. (Deprecated in favor of encrypt.format=a… 138 encrypt.format=<str> - Encrypt the image, format choices: 'aes', 'luks' 144 …on=<bool (on/off)> - Encrypt the image with format 'aes'. (Deprecated in favor of encrypt.format=a… 164 encrypt.format=<str> - Encrypt the image, format choices: 'aes', 'luks' 170 …on=<bool (on/off)> - Encrypt the image with format 'aes'. (Deprecated in favor of encrypt.format=a… [all …]
|
/openbmc/linux/arch/powerpc/crypto/ |
H A D | Makefile | 8 obj-$(CONFIG_CRYPTO_AES_PPC_SPE) += aes-ppc-spe.o 16 obj-$(CONFIG_CRYPTO_AES_GCM_P10) += aes-gcm-p10-crypto.o 20 aes-ppc-spe-y := aes-spe-core.o aes-spe-keys.o aes-tab-4k.o aes-spe-modes.o aes-spe-glue.o 27 aes-gcm-p10-crypto-y := aes-gcm-p10-glue.o aes-gcm-p10.o ghashp10-ppc.o aesp10-ppc.o
|
/openbmc/linux/arch/arm/crypto/ |
H A D | Makefile | 6 obj-$(CONFIG_CRYPTO_AES_ARM) += aes-arm.o 7 obj-$(CONFIG_CRYPTO_AES_ARM_BS) += aes-arm-bs.o 19 obj-$(CONFIG_CRYPTO_AES_ARM_CE) += aes-arm-ce.o 26 aes-arm-y := aes-cipher-core.o aes-cipher-glue.o 27 aes-arm-bs-y := aes-neonbs-core.o aes-neonbs-glue.o 38 aes-arm-ce-y := aes-ce-core.o aes-ce-glue.o
|
/openbmc/linux/Documentation/devicetree/bindings/crypto/ |
H A D | omap-aes.txt | 7 - "ti,omap2-aes" for OMAP2. 8 - "ti,omap3-aes" for OMAP3. 9 - "ti,omap4-aes" for OMAP4 and AM33XX. 23 aes: aes@53500000 { 24 compatible = "ti,omap4-aes"; 25 ti,hwmods = "aes";
|
/openbmc/linux/drivers/crypto/nx/ |
H A D | Makefile | 4 nx-aes-cbc.o \ 5 nx-aes-ecb.o \ 6 nx-aes-gcm.o \ 7 nx-aes-ccm.o \ 8 nx-aes-ctr.o \ 9 nx-aes-xcbc.o \
|
/openbmc/linux/drivers/net/wireless/ti/wl12xx/ |
H A D | debugfs.c | 80 WL12XX_DEBUGFS_FWSTATS_FILE(aes, encrypt_fail, "%u"); 81 WL12XX_DEBUGFS_FWSTATS_FILE(aes, decrypt_fail, "%u"); 82 WL12XX_DEBUGFS_FWSTATS_FILE(aes, encrypt_packets, "%u"); 83 WL12XX_DEBUGFS_FWSTATS_FILE(aes, decrypt_packets, "%u"); 84 WL12XX_DEBUGFS_FWSTATS_FILE(aes, encrypt_interrupt, "%u"); 85 WL12XX_DEBUGFS_FWSTATS_FILE(aes, decrypt_interrupt, "%u"); 180 DEBUGFS_FWSTATS_ADD(aes, encrypt_fail); in wl12xx_debugfs_add_files() 181 DEBUGFS_FWSTATS_ADD(aes, decrypt_fail); in wl12xx_debugfs_add_files() 182 DEBUGFS_FWSTATS_ADD(aes, encrypt_packets); in wl12xx_debugfs_add_files() 183 DEBUGFS_FWSTATS_ADD(aes, decrypt_packets); in wl12xx_debugfs_add_files() [all …]
|
/openbmc/linux/drivers/crypto/ |
H A D | Makefile | 4 obj-$(CONFIG_CRYPTO_DEV_ATMEL_AES) += atmel-aes.o 19 obj-$(CONFIG_CRYPTO_DEV_GEODE) += geode-aes.o 28 obj-$(CONFIG_CRYPTO_DEV_OMAP_AES) += omap-aes-driver.o 29 omap-aes-driver-objs := omap-aes.o omap-aes-gcm.o 32 obj-$(CONFIG_CRYPTO_DEV_PADLOCK_AES) += padlock-aes.o
|
/openbmc/qemu/tests/bench/ |
H A D | benchmark-crypto-cipher.c | 192 ADD_TEST(ecb, aes, 128, chunk); \ in main() 193 ADD_TEST(ecb, aes, 256, chunk); \ in main() 194 ADD_TEST(cbc, aes, 128, chunk); \ in main() 195 ADD_TEST(cbc, aes, 256, chunk); \ in main() 196 ADD_TEST(ctr, aes, 128, chunk); \ in main() 197 ADD_TEST(ctr, aes, 256, chunk); \ in main() 198 ADD_TEST(xts, aes, 128, chunk); \ in main() 199 ADD_TEST(xts, aes, 256, chunk); \ in main()
|
/openbmc/linux/drivers/crypto/intel/keembay/ |
H A D | Makefile | 4 obj-$(CONFIG_CRYPTO_DEV_KEEMBAY_OCS_AES_SM4) += keembay-ocs-aes.o 5 keembay-ocs-aes-objs := keembay-ocs-aes-core.o ocs-aes.o
|
H A D | Kconfig | 13 cbc(aes), ctr(aes), ccm(aes), gcm(aes), cbc(sm4), ctr(sm4), ccm(sm4) 17 enabled: ecb(aes), cts(cbc(aes)), ecb(sm4) and cts(cbc(sm4)). 26 Provides OCS version of ecb(aes) and ecb(sm4) 38 Provides OCS version of cts(cbc(aes)) and cts(cbc(sm4)).
|
/openbmc/linux/drivers/net/wireless/ti/wl1251/ |
H A D | debugfs.c | 162 DEBUGFS_FWSTATS_FILE(aes, encrypt_fail, 20, "%u"); 163 DEBUGFS_FWSTATS_FILE(aes, decrypt_fail, 20, "%u"); 164 DEBUGFS_FWSTATS_FILE(aes, encrypt_packets, 20, "%u"); 165 DEBUGFS_FWSTATS_FILE(aes, decrypt_packets, 20, "%u"); 166 DEBUGFS_FWSTATS_FILE(aes, encrypt_interrupt, 20, "%u"); 167 DEBUGFS_FWSTATS_FILE(aes, decrypt_interrupt, 20, "%u"); 302 DEBUGFS_FWSTATS_DEL(aes, encrypt_fail); in wl1251_debugfs_delete_files() 303 DEBUGFS_FWSTATS_DEL(aes, decrypt_fail); in wl1251_debugfs_delete_files() 304 DEBUGFS_FWSTATS_DEL(aes, encrypt_packets); in wl1251_debugfs_delete_files() 305 DEBUGFS_FWSTATS_DEL(aes, decrypt_packets); in wl1251_debugfs_delete_files() [all …]
|
/openbmc/qemu/target/s390x/ |
H A D | cpu_features_def.h.inc | 197 DEF_FEAT(KMAC_AES_128, "kmac-aes-128", KMAC, 18, "KMAC AES-128") 198 DEF_FEAT(KMAC_AES_192, "kmac-aes-192", KMAC, 19, "KMAC AES-192") 199 DEF_FEAT(KMAC_AES_256, "kmac-aes-256", KMAC, 20, "KMAC AES-256") 211 DEF_FEAT(KMC_AES_128, "kmc-aes-128", KMC, 18, "KMC AES-128") 212 DEF_FEAT(KMC_AES_192, "kmc-aes-192", KMC, 19, "KMC AES-192") 213 DEF_FEAT(KMC_AES_256, "kmc-aes-256", KMC, 20, "KMC AES-256") 226 DEF_FEAT(KM_AES_128, "km-aes-128", KM, 18, "KM AES-128") 227 DEF_FEAT(KM_AES_192, "km-aes-192", KM, 19, "KM AES-192") 228 DEF_FEAT(KM_AES_256, "km-aes-256", KM, 20, "KM AES-256") 232 DEF_FEAT(KM_XTS_AES_128, "km-xts-aes-128", KM, 50, "KM XTS-AES-128") [all …]
|
/openbmc/u-boot/arch/x86/cpu/intel_common/ |
H A D | report_platform.c | 19 int vt, txt, aes; in report_cpu_info() local 33 aes = (cpuidr.ecx & (1 << 25)) ? 1 : 0; in report_cpu_info() 37 mode[aes], mode[txt], mode[vt]); in report_cpu_info()
|
/openbmc/qemu/tests/tcg/aarch64/ |
H A D | Makefile.target | 81 AARCH64_TESTS += test-aes 82 test-aes: CFLAGS += -O -march=armv8-a+aes 83 test-aes: test-aes-main.c.inc
|
/openbmc/linux/Documentation/admin-guide/device-mapper/ |
H A D | dm-crypt.rst | 25 aes-cbc-essiv:sha256 26 aes-xts-plain64 40 capi:cbc(aes)-essiv:sha256 41 capi:xts(aes)-plain64 45 capi:gcm(aes)-random 46 capi:authenc(hmac(sha256),xts(aes))-random 168 …dmsetup create crypt1 --table "0 `blockdev --getsz $1` crypt aes-cbc-essiv:sha256 babebabebabebabe… 174 …dmsetup create crypt2 --table "0 `blockdev --getsize $1` crypt aes-cbc-essiv:sha256 :32:logon:my_p…
|
/openbmc/linux/drivers/crypto/starfive/ |
H A D | jh7110-aes.c | 241 rctx->csr.aes.v = 0; in starfive_aes_hw_init() 242 rctx->csr.aes.aesrst = 1; in starfive_aes_hw_init() 243 writel(rctx->csr.aes.v, cryp->base + STARFIVE_AES_CSR); in starfive_aes_hw_init() 248 rctx->csr.aes.v = 0; in starfive_aes_hw_init() 252 rctx->csr.aes.keymode = STARFIVE_AES_KEYMODE_128; in starfive_aes_hw_init() 255 rctx->csr.aes.keymode = STARFIVE_AES_KEYMODE_192; in starfive_aes_hw_init() 258 rctx->csr.aes.keymode = STARFIVE_AES_KEYMODE_256; in starfive_aes_hw_init() 262 rctx->csr.aes.mode = hw_mode; in starfive_aes_hw_init() 263 rctx->csr.aes.cmode = !is_encrypt(cryp); in starfive_aes_hw_init() 264 rctx->csr.aes.ie = 1; in starfive_aes_hw_init() [all …]
|