/linux-6.14.4/crypto/ |
D | tcrypt.c | 50 #define DECRYPT 0 macro 1856 test_cipher_speed("ecb(aes)", DECRYPT, sec, NULL, 0, in do_test() 1860 test_cipher_speed("cbc(aes)", DECRYPT, sec, NULL, 0, in do_test() 1864 test_cipher_speed("lrw(aes)", DECRYPT, sec, NULL, 0, in do_test() 1868 test_cipher_speed("xts(aes)", DECRYPT, sec, NULL, 0, in do_test() 1872 test_cipher_speed("cts(cbc(aes))", DECRYPT, sec, NULL, 0, in do_test() 1876 test_cipher_speed("ctr(aes)", DECRYPT, sec, NULL, 0, in do_test() 1884 test_cipher_speed("ecb(des3_ede)", DECRYPT, sec, in do_test() 1890 test_cipher_speed("cbc(des3_ede)", DECRYPT, sec, in do_test() 1896 test_cipher_speed("ctr(des3_ede)", DECRYPT, sec, in do_test() [all …]
|
D | chacha_generic.c | 84 .decrypt = crypto_chacha_crypt, 99 .decrypt = crypto_xchacha_crypt, 114 .decrypt = crypto_xchacha_crypt,
|
/linux-6.14.4/arch/riscv/crypto/ |
D | aes-riscv64-zvkned.S | 150 aes_decrypt v20, \keylen // Decrypt the blocks 251 // CBC-decrypt all full blocks. For the last full block, or the last 2 264 aes_decrypt v20, \keylen // Decrypt this set of blocks 284 // P[n-1] = Decrypt(C[n]) ^ C[n-2] 285 // P[n] = Decrypt(C[n-1]) ^ C[n] 287 // We have C[n] in v16, Decrypt(C[n]) in v20, and C[n-2] in v28. 288 // Together with Decrypt(C[n-1]) ^ C[n-2] from the output buffer, this 291 vxor.vv v20, v20, v28 // Decrypt(C[n]) ^ C[n-2] == P[n-1] 292 vle32.v v24, (t1) // Decrypt(C[n-1]) ^ C[n-2] 294 vxor.vv v20, v24, v16 // Decrypt(C[n-1]) ^ C[n-2] ^ C[n] == P[n] ^ C[n-2] [all …]
|
/linux-6.14.4/drivers/crypto/caam/ |
D | caamalg_qi.c | 272 if (ctx->drv_ctx[DECRYPT]) { in aead_setkey() 273 ret = caam_drv_ctx_update(ctx->drv_ctx[DECRYPT], in aead_setkey() 396 if (ctx->drv_ctx[DECRYPT]) { in gcm_setkey() 397 ret = caam_drv_ctx_update(ctx->drv_ctx[DECRYPT], in gcm_setkey() 504 if (ctx->drv_ctx[DECRYPT]) { in rfc4106_setkey() 505 ret = caam_drv_ctx_update(ctx->drv_ctx[DECRYPT], in rfc4106_setkey() 610 if (ctx->drv_ctx[DECRYPT]) { in rfc4543_setkey() 611 ret = caam_drv_ctx_update(ctx->drv_ctx[DECRYPT], in rfc4543_setkey() 641 /* skcipher encrypt, decrypt shared descriptors */ in skcipher_setkey() 657 if (ctx->drv_ctx[DECRYPT]) { in skcipher_setkey() [all …]
|
D | caamalg.c | 1897 .decrypt = skcipher_decrypt, 1916 .decrypt = skcipher_decrypt, 1935 .decrypt = skcipher_decrypt, 1954 .decrypt = skcipher_decrypt, 1975 .decrypt = skcipher_decrypt, 2002 .decrypt = skcipher_decrypt, 2021 .decrypt = skcipher_decrypt, 2039 .decrypt = skcipher_decrypt, 2057 .decrypt = skcipher_decrypt, 2079 .decrypt = ipsec_gcm_decrypt, [all …]
|
D | caamalg_qi2.c | 265 flc = &ctx->flc[DECRYPT]; in aead_set_sh_desc() 272 dma_sync_single_for_device(dev, ctx->flc_dma[DECRYPT], in aead_set_sh_desc() 610 flc = &ctx->flc[DECRYPT]; in chachapoly_set_sh_desc() 615 dma_sync_single_for_device(dev, ctx->flc_dma[DECRYPT], in chachapoly_set_sh_desc() 697 flc = &ctx->flc[DECRYPT]; in gcm_set_sh_desc() 701 dma_sync_single_for_device(dev, ctx->flc_dma[DECRYPT], in gcm_set_sh_desc() 790 flc = &ctx->flc[DECRYPT]; in rfc4106_set_sh_desc() 795 dma_sync_single_for_device(dev, ctx->flc_dma[DECRYPT], in rfc4106_set_sh_desc() 891 flc = &ctx->flc[DECRYPT]; in rfc4543_set_sh_desc() 896 dma_sync_single_for_device(dev, ctx->flc_dma[DECRYPT], in rfc4543_set_sh_desc() [all …]
|
/linux-6.14.4/drivers/crypto/ |
D | padlock-aes.c | 67 struct cword decrypt; member 133 ctx->cword.decrypt.encdec = 1; in aes_set_key() 135 ctx->cword.decrypt.rounds = ctx->cword.encrypt.rounds; in aes_set_key() 137 ctx->cword.decrypt.ksize = ctx->cword.encrypt.ksize; in aes_set_key() 145 ctx->cword.decrypt.keygen = 1; in aes_set_key() 156 &ctx->cword.decrypt == per_cpu(paes_last_cword, cpu)) in aes_set_key() 320 ecb_crypt(in, out, ctx->D, &ctx->cword.decrypt, 1); in padlock_aes_decrypt() 377 padlock_reset_key(&ctx->cword.decrypt); in ecb_aes_decrypt() 383 ctx->D, &ctx->cword.decrypt, in ecb_aes_decrypt() 406 .decrypt = ecb_aes_decrypt, [all …]
|
/linux-6.14.4/fs/crypto/ |
D | crypto.c | 107 /* Encrypt or decrypt a single "data unit" of file contents. */ 253 * fscrypt_decrypt_pagecache_blocks() - Decrypt data from a pagecache folio 254 * @folio: the pagecache folio containing the data to decrypt 255 * @len: size of the data to decrypt, in bytes 256 * @offs: offset within @folio of the data to decrypt, in bytes 258 * Decrypt data that has just been read from an encrypted file. The data must 298 * fscrypt_decrypt_block_inplace() - Decrypt a filesystem block in-place 300 * @page: The page containing the block to decrypt 301 * @len: Size of block to decrypt. This must be a multiple of 303 * @offs: Byte offset within @page at which the block to decrypt begins [all …]
|
D | bio.c | 17 * fscrypt_decrypt_bio() - decrypt the contents of a bio 18 * @bio: the bio to decrypt 20 * Decrypt the contents of a "read" bio following successful completion of the 102 * ciphertext blocks which decrypt to the all-zeroes block. The blocks must be
|
/linux-6.14.4/tools/testing/selftests/bpf/prog_tests/ |
D | crypto_sanity.c | 169 if (!ASSERT_OK(err, "attach decrypt filter")) in test_crypto_sanity() 173 if (!ASSERT_NEQ(sockfd, -1, "decrypt socket")) in test_crypto_sanity() 177 if (!ASSERT_EQ(err, sizeof(afalg_dst), "decrypt send")) in test_crypto_sanity() 182 if (!ASSERT_OK(skel->bss->status, "decrypt status")) in test_crypto_sanity() 184 if (!ASSERT_STRNEQ(skel->bss->dst, afalg_plain, sizeof(afalg_plain), "decrypt AF_ALG")) in test_crypto_sanity() 189 ASSERT_OK(err, "bpf_tc_detach decrypt"); in test_crypto_sanity()
|
/linux-6.14.4/include/crypto/ |
D | akcipher.h | 59 * @decrypt: Function performs a decrypt operation as defined by public key 86 int (*decrypt)(struct akcipher_request *req); member 283 * crypto_akcipher_decrypt() - Invoke public key decrypt operation 285 * Function invokes the specific public key decrypt operation for a given 296 return crypto_akcipher_alg(tfm)->decrypt(req); in crypto_akcipher_decrypt() 318 * crypto_akcipher_sync_decrypt() - Invoke public key decrypt operation 320 * Function invokes the specific public key decrypt operation for a given
|
D | skcipher.h | 33 * @cryptlen: Number of bytes to encrypt or decrypt 80 * IV of exactly that size to perform the encrypt or decrypt operation. 120 * @decrypt: Decrypt a single block. This is a reverse counterpart to @encrypt 155 int (*decrypt)(struct skcipher_request *req); member 191 * @decrypt: Decrypt a number of bytes. This is a reverse counterpart to 207 int (*decrypt)(struct crypto_lskcipher *tfm, const u8 *src, member 696 * crypto_skcipher_decrypt() - decrypt ciphertext 700 * Decrypt ciphertext data using the skcipher_request handle. That data 761 * crypto_lskcipher_decrypt() - decrypt ciphertext 771 * Decrypt ciphertext data using the lskcipher handle. [all …]
|
D | sm4.h | 41 * sm4_crypt_block - Encrypt or decrypt a single SM4 block 42 * @rk: The rkey_enc for encrypt or rkey_dec for decrypt
|
/linux-6.14.4/drivers/crypto/amcc/ |
D | crypto4xx_alg.c | 70 const unsigned int ivlen, bool decrypt, in crypto4xx_crypt() argument 84 req->cryptlen, iv, ivlen, decrypt ? ctx->sa_in : ctx->sa_out, in crypto4xx_crypt() 311 bool is_ccm, bool decrypt) in crypto4xx_aead_need_fallback() argument 427 static int crypto4xx_crypt_aes_ccm(struct aead_request *req, bool decrypt) in crypto4xx_crypt_aes_ccm() argument 437 if (decrypt) in crypto4xx_crypt_aes_ccm() 440 if (crypto4xx_aead_need_fallback(req, len, true, decrypt)) in crypto4xx_crypt_aes_ccm() 441 return crypto4xx_aead_fallback(req, ctx, decrypt); in crypto4xx_crypt_aes_ccm() 443 memcpy(tmp_sa, decrypt ? ctx->sa_in : ctx->sa_out, ctx->sa_len * 4); in crypto4xx_crypt_aes_ccm() 574 bool decrypt) in crypto4xx_crypt_aes_gcm() argument 581 if (decrypt) in crypto4xx_crypt_aes_gcm() [all …]
|
/linux-6.14.4/drivers/crypto/ccree/ |
D | cc_cipher.c | 892 "Encrypt" : "Decrypt"), req, iv, nbytes); in cc_cipher_process() 1011 .decrypt = cc_cipher_decrypt, 1029 .decrypt = cc_cipher_decrypt, 1047 .decrypt = cc_cipher_decrypt, 1065 .decrypt = cc_cipher_decrypt, 1083 .decrypt = cc_cipher_decrypt, 1101 .decrypt = cc_cipher_decrypt, 1123 .decrypt = cc_cipher_decrypt, 1140 .decrypt = cc_cipher_decrypt, 1157 .decrypt = cc_cipher_decrypt, [all …]
|
/linux-6.14.4/drivers/crypto/inside-secure/ |
D | safexcel_cipher.c | 701 * removed from the output for decrypt! in safexcel_send_req() 717 * Save IV from last crypto input word for CBC modes in decrypt in safexcel_send_req() 873 * Special case: AEAD decrypt with only AAD data. in safexcel_send_req() 1057 * Save input IV in case of CBC decrypt mode in safexcel_skcipher_send() 1297 .decrypt = safexcel_decrypt, 1334 .decrypt = safexcel_decrypt, 1408 .decrypt = safexcel_decrypt, 1470 .decrypt = safexcel_decrypt, 1509 .decrypt = safexcel_decrypt, 1569 .decrypt = safexcel_decrypt, [all …]
|
/linux-6.14.4/drivers/crypto/intel/keembay/ |
D | keembay-ocs-aes-core.c | 61 * @instruction: Instruction to be executed (encrypt / decrypt). 77 * CCM/GCM decrypt). 79 * used for GCM encrypt / decrypt). 303 * Called by encrypt() / decrypt() skcipher functions. 407 * For CBC decrypt, save last block (iv) to last_ct_blk buffer. in kmb_ocs_sk_prepare_inplace() 417 /* For CTS decrypt, swap last two blocks, if needed. */ in kmb_ocs_sk_prepare_inplace() 488 /* If this is not a CTS decrypt operation with swapping, we are done. */ in kmb_ocs_sk_prepare_notinplace() 575 /* CBC decrypt case. */ in kmb_ocs_sk_run() 602 /* For decrypt crytplen == len(PT) + len(tag). */ in kmb_ocs_aead_validate_input() 630 * Called by encrypt() / decrypt() aead functions. [all …]
|
/linux-6.14.4/arch/sparc/crypto/ |
D | aes_glue.c | 37 void (*decrypt)(const u64 *key, const u32 *input, u32 *output); member 131 .decrypt = aes_sparc64_decrypt_128, 143 .decrypt = aes_sparc64_decrypt_192, 155 .decrypt = aes_sparc64_decrypt_256, 216 ctx->ops->decrypt(&ctx->key[0], (const u32 *) src, (u32 *) dst); in crypto_aes_decrypt() 395 .decrypt = ecb_decrypt, 409 .decrypt = cbc_decrypt, 423 .decrypt = ctr_crypt,
|
/linux-6.14.4/drivers/crypto/cavium/nitrox/ |
D | nitrox_skcipher.c | 264 creq->ctrl.s.arg = (enc ? ENCRYPT : DECRYPT); in nitrox_skcipher_crypt() 400 .decrypt = nitrox_cbc_decrypt, 419 .decrypt = nitrox_aes_decrypt, 438 .decrypt = nitrox_aes_decrypt, 459 .decrypt = nitrox_aes_decrypt, 476 .decrypt = nitrox_aes_decrypt, 495 .decrypt = nitrox_cbc_decrypt, 514 .decrypt = nitrox_3des_decrypt,
|
/linux-6.14.4/arch/arm/crypto/ |
D | chacha-glue.c | 210 .decrypt = chacha_arm, 225 .decrypt = xchacha_arm, 240 .decrypt = xchacha_arm, 260 .decrypt = chacha_neon, 276 .decrypt = xchacha_neon, 292 .decrypt = xchacha_neon,
|
/linux-6.14.4/Documentation/virt/kvm/s390/ |
D | s390-pv-boot.rst | 17 KVM to decrypt the protected virtual machine. 21 PVM, decrypt the components and verify the data and address list 57 decrypt and verify the PV, as well as control flags and a start PSW.
|
/linux-6.14.4/arch/x86/crypto/ |
D | sm4_aesni_avx2_glue.c | 64 .decrypt = sm4_avx_ecb_decrypt, 81 .decrypt = cbc_decrypt, 99 .decrypt = ctr_crypt,
|
/linux-6.14.4/arch/mips/crypto/ |
D | chacha-glue.c | 95 .decrypt = chacha_mips, 110 .decrypt = xchacha_mips, 125 .decrypt = xchacha_mips,
|
/linux-6.14.4/drivers/crypto/aspeed/ |
D | aspeed-hace-crypto.c | 550 (cmd & HACE_CMD_ENCRYPT) ? "encrypt" : "decrypt"); in aspeed_aes_crypt() 678 .decrypt = aspeed_aes_ecb_decrypt, 705 .decrypt = aspeed_aes_cbc_decrypt, 731 .decrypt = aspeed_des_ecb_decrypt, 758 .decrypt = aspeed_des_cbc_decrypt, 784 .decrypt = aspeed_tdes_ecb_decrypt, 811 .decrypt = aspeed_tdes_cbc_decrypt, 841 .decrypt = aspeed_aes_ctr_decrypt, 867 .decrypt = aspeed_des_ctr_decrypt, 893 .decrypt = aspeed_tdes_ctr_decrypt,
|
/linux-6.14.4/arch/s390/crypto/ |
D | des_s390.c | 157 .decrypt = ecb_des_decrypt, 182 .decrypt = cbc_des_decrypt, 275 .decrypt = ecb_des3_decrypt, 300 .decrypt = cbc_des3_decrypt, 373 .decrypt = ctr_des_crypt, 394 .decrypt = ctr_des3_crypt,
|