Home
last modified time | relevance | path

Searched full:decrypt (Results 1 – 25 of 371) sorted by relevance

12345678910>>...15

/linux-6.14.4/crypto/
Dtcrypt.c50 #define DECRYPT 0 macro
1856 test_cipher_speed("ecb(aes)", DECRYPT, sec, NULL, 0, in do_test()
1860 test_cipher_speed("cbc(aes)", DECRYPT, sec, NULL, 0, in do_test()
1864 test_cipher_speed("lrw(aes)", DECRYPT, sec, NULL, 0, in do_test()
1868 test_cipher_speed("xts(aes)", DECRYPT, sec, NULL, 0, in do_test()
1872 test_cipher_speed("cts(cbc(aes))", DECRYPT, sec, NULL, 0, in do_test()
1876 test_cipher_speed("ctr(aes)", DECRYPT, sec, NULL, 0, in do_test()
1884 test_cipher_speed("ecb(des3_ede)", DECRYPT, sec, in do_test()
1890 test_cipher_speed("cbc(des3_ede)", DECRYPT, sec, in do_test()
1896 test_cipher_speed("ctr(des3_ede)", DECRYPT, sec, in do_test()
[all …]
Dchacha_generic.c84 .decrypt = crypto_chacha_crypt,
99 .decrypt = crypto_xchacha_crypt,
114 .decrypt = crypto_xchacha_crypt,
/linux-6.14.4/arch/riscv/crypto/
Daes-riscv64-zvkned.S150 aes_decrypt v20, \keylen // Decrypt the blocks
251 // CBC-decrypt all full blocks. For the last full block, or the last 2
264 aes_decrypt v20, \keylen // Decrypt this set of blocks
284 // P[n-1] = Decrypt(C[n]) ^ C[n-2]
285 // P[n] = Decrypt(C[n-1]) ^ C[n]
287 // We have C[n] in v16, Decrypt(C[n]) in v20, and C[n-2] in v28.
288 // Together with Decrypt(C[n-1]) ^ C[n-2] from the output buffer, this
291 vxor.vv v20, v20, v28 // Decrypt(C[n]) ^ C[n-2] == P[n-1]
292 vle32.v v24, (t1) // Decrypt(C[n-1]) ^ C[n-2]
294 vxor.vv v20, v24, v16 // Decrypt(C[n-1]) ^ C[n-2] ^ C[n] == P[n] ^ C[n-2]
[all …]
/linux-6.14.4/drivers/crypto/caam/
Dcaamalg_qi.c272 if (ctx->drv_ctx[DECRYPT]) { in aead_setkey()
273 ret = caam_drv_ctx_update(ctx->drv_ctx[DECRYPT], in aead_setkey()
396 if (ctx->drv_ctx[DECRYPT]) { in gcm_setkey()
397 ret = caam_drv_ctx_update(ctx->drv_ctx[DECRYPT], in gcm_setkey()
504 if (ctx->drv_ctx[DECRYPT]) { in rfc4106_setkey()
505 ret = caam_drv_ctx_update(ctx->drv_ctx[DECRYPT], in rfc4106_setkey()
610 if (ctx->drv_ctx[DECRYPT]) { in rfc4543_setkey()
611 ret = caam_drv_ctx_update(ctx->drv_ctx[DECRYPT], in rfc4543_setkey()
641 /* skcipher encrypt, decrypt shared descriptors */ in skcipher_setkey()
657 if (ctx->drv_ctx[DECRYPT]) { in skcipher_setkey()
[all …]
Dcaamalg.c1897 .decrypt = skcipher_decrypt,
1916 .decrypt = skcipher_decrypt,
1935 .decrypt = skcipher_decrypt,
1954 .decrypt = skcipher_decrypt,
1975 .decrypt = skcipher_decrypt,
2002 .decrypt = skcipher_decrypt,
2021 .decrypt = skcipher_decrypt,
2039 .decrypt = skcipher_decrypt,
2057 .decrypt = skcipher_decrypt,
2079 .decrypt = ipsec_gcm_decrypt,
[all …]
Dcaamalg_qi2.c265 flc = &ctx->flc[DECRYPT]; in aead_set_sh_desc()
272 dma_sync_single_for_device(dev, ctx->flc_dma[DECRYPT], in aead_set_sh_desc()
610 flc = &ctx->flc[DECRYPT]; in chachapoly_set_sh_desc()
615 dma_sync_single_for_device(dev, ctx->flc_dma[DECRYPT], in chachapoly_set_sh_desc()
697 flc = &ctx->flc[DECRYPT]; in gcm_set_sh_desc()
701 dma_sync_single_for_device(dev, ctx->flc_dma[DECRYPT], in gcm_set_sh_desc()
790 flc = &ctx->flc[DECRYPT]; in rfc4106_set_sh_desc()
795 dma_sync_single_for_device(dev, ctx->flc_dma[DECRYPT], in rfc4106_set_sh_desc()
891 flc = &ctx->flc[DECRYPT]; in rfc4543_set_sh_desc()
896 dma_sync_single_for_device(dev, ctx->flc_dma[DECRYPT], in rfc4543_set_sh_desc()
[all …]
/linux-6.14.4/drivers/crypto/
Dpadlock-aes.c67 struct cword decrypt; member
133 ctx->cword.decrypt.encdec = 1; in aes_set_key()
135 ctx->cword.decrypt.rounds = ctx->cword.encrypt.rounds; in aes_set_key()
137 ctx->cword.decrypt.ksize = ctx->cword.encrypt.ksize; in aes_set_key()
145 ctx->cword.decrypt.keygen = 1; in aes_set_key()
156 &ctx->cword.decrypt == per_cpu(paes_last_cword, cpu)) in aes_set_key()
320 ecb_crypt(in, out, ctx->D, &ctx->cword.decrypt, 1); in padlock_aes_decrypt()
377 padlock_reset_key(&ctx->cword.decrypt); in ecb_aes_decrypt()
383 ctx->D, &ctx->cword.decrypt, in ecb_aes_decrypt()
406 .decrypt = ecb_aes_decrypt,
[all …]
/linux-6.14.4/fs/crypto/
Dcrypto.c107 /* Encrypt or decrypt a single "data unit" of file contents. */
253 * fscrypt_decrypt_pagecache_blocks() - Decrypt data from a pagecache folio
254 * @folio: the pagecache folio containing the data to decrypt
255 * @len: size of the data to decrypt, in bytes
256 * @offs: offset within @folio of the data to decrypt, in bytes
258 * Decrypt data that has just been read from an encrypted file. The data must
298 * fscrypt_decrypt_block_inplace() - Decrypt a filesystem block in-place
300 * @page: The page containing the block to decrypt
301 * @len: Size of block to decrypt. This must be a multiple of
303 * @offs: Byte offset within @page at which the block to decrypt begins
[all …]
Dbio.c17 * fscrypt_decrypt_bio() - decrypt the contents of a bio
18 * @bio: the bio to decrypt
20 * Decrypt the contents of a "read" bio following successful completion of the
102 * ciphertext blocks which decrypt to the all-zeroes block. The blocks must be
/linux-6.14.4/tools/testing/selftests/bpf/prog_tests/
Dcrypto_sanity.c169 if (!ASSERT_OK(err, "attach decrypt filter")) in test_crypto_sanity()
173 if (!ASSERT_NEQ(sockfd, -1, "decrypt socket")) in test_crypto_sanity()
177 if (!ASSERT_EQ(err, sizeof(afalg_dst), "decrypt send")) in test_crypto_sanity()
182 if (!ASSERT_OK(skel->bss->status, "decrypt status")) in test_crypto_sanity()
184 if (!ASSERT_STRNEQ(skel->bss->dst, afalg_plain, sizeof(afalg_plain), "decrypt AF_ALG")) in test_crypto_sanity()
189 ASSERT_OK(err, "bpf_tc_detach decrypt"); in test_crypto_sanity()
/linux-6.14.4/include/crypto/
Dakcipher.h59 * @decrypt: Function performs a decrypt operation as defined by public key
86 int (*decrypt)(struct akcipher_request *req); member
283 * crypto_akcipher_decrypt() - Invoke public key decrypt operation
285 * Function invokes the specific public key decrypt operation for a given
296 return crypto_akcipher_alg(tfm)->decrypt(req); in crypto_akcipher_decrypt()
318 * crypto_akcipher_sync_decrypt() - Invoke public key decrypt operation
320 * Function invokes the specific public key decrypt operation for a given
Dskcipher.h33 * @cryptlen: Number of bytes to encrypt or decrypt
80 * IV of exactly that size to perform the encrypt or decrypt operation.
120 * @decrypt: Decrypt a single block. This is a reverse counterpart to @encrypt
155 int (*decrypt)(struct skcipher_request *req); member
191 * @decrypt: Decrypt a number of bytes. This is a reverse counterpart to
207 int (*decrypt)(struct crypto_lskcipher *tfm, const u8 *src, member
696 * crypto_skcipher_decrypt() - decrypt ciphertext
700 * Decrypt ciphertext data using the skcipher_request handle. That data
761 * crypto_lskcipher_decrypt() - decrypt ciphertext
771 * Decrypt ciphertext data using the lskcipher handle.
[all …]
Dsm4.h41 * sm4_crypt_block - Encrypt or decrypt a single SM4 block
42 * @rk: The rkey_enc for encrypt or rkey_dec for decrypt
/linux-6.14.4/drivers/crypto/amcc/
Dcrypto4xx_alg.c70 const unsigned int ivlen, bool decrypt, in crypto4xx_crypt() argument
84 req->cryptlen, iv, ivlen, decrypt ? ctx->sa_in : ctx->sa_out, in crypto4xx_crypt()
311 bool is_ccm, bool decrypt) in crypto4xx_aead_need_fallback() argument
427 static int crypto4xx_crypt_aes_ccm(struct aead_request *req, bool decrypt) in crypto4xx_crypt_aes_ccm() argument
437 if (decrypt) in crypto4xx_crypt_aes_ccm()
440 if (crypto4xx_aead_need_fallback(req, len, true, decrypt)) in crypto4xx_crypt_aes_ccm()
441 return crypto4xx_aead_fallback(req, ctx, decrypt); in crypto4xx_crypt_aes_ccm()
443 memcpy(tmp_sa, decrypt ? ctx->sa_in : ctx->sa_out, ctx->sa_len * 4); in crypto4xx_crypt_aes_ccm()
574 bool decrypt) in crypto4xx_crypt_aes_gcm() argument
581 if (decrypt) in crypto4xx_crypt_aes_gcm()
[all …]
/linux-6.14.4/drivers/crypto/ccree/
Dcc_cipher.c892 "Encrypt" : "Decrypt"), req, iv, nbytes); in cc_cipher_process()
1011 .decrypt = cc_cipher_decrypt,
1029 .decrypt = cc_cipher_decrypt,
1047 .decrypt = cc_cipher_decrypt,
1065 .decrypt = cc_cipher_decrypt,
1083 .decrypt = cc_cipher_decrypt,
1101 .decrypt = cc_cipher_decrypt,
1123 .decrypt = cc_cipher_decrypt,
1140 .decrypt = cc_cipher_decrypt,
1157 .decrypt = cc_cipher_decrypt,
[all …]
/linux-6.14.4/drivers/crypto/inside-secure/
Dsafexcel_cipher.c701 * removed from the output for decrypt! in safexcel_send_req()
717 * Save IV from last crypto input word for CBC modes in decrypt in safexcel_send_req()
873 * Special case: AEAD decrypt with only AAD data. in safexcel_send_req()
1057 * Save input IV in case of CBC decrypt mode in safexcel_skcipher_send()
1297 .decrypt = safexcel_decrypt,
1334 .decrypt = safexcel_decrypt,
1408 .decrypt = safexcel_decrypt,
1470 .decrypt = safexcel_decrypt,
1509 .decrypt = safexcel_decrypt,
1569 .decrypt = safexcel_decrypt,
[all …]
/linux-6.14.4/drivers/crypto/intel/keembay/
Dkeembay-ocs-aes-core.c61 * @instruction: Instruction to be executed (encrypt / decrypt).
77 * CCM/GCM decrypt).
79 * used for GCM encrypt / decrypt).
303 * Called by encrypt() / decrypt() skcipher functions.
407 * For CBC decrypt, save last block (iv) to last_ct_blk buffer. in kmb_ocs_sk_prepare_inplace()
417 /* For CTS decrypt, swap last two blocks, if needed. */ in kmb_ocs_sk_prepare_inplace()
488 /* If this is not a CTS decrypt operation with swapping, we are done. */ in kmb_ocs_sk_prepare_notinplace()
575 /* CBC decrypt case. */ in kmb_ocs_sk_run()
602 /* For decrypt crytplen == len(PT) + len(tag). */ in kmb_ocs_aead_validate_input()
630 * Called by encrypt() / decrypt() aead functions.
[all …]
/linux-6.14.4/arch/sparc/crypto/
Daes_glue.c37 void (*decrypt)(const u64 *key, const u32 *input, u32 *output); member
131 .decrypt = aes_sparc64_decrypt_128,
143 .decrypt = aes_sparc64_decrypt_192,
155 .decrypt = aes_sparc64_decrypt_256,
216 ctx->ops->decrypt(&ctx->key[0], (const u32 *) src, (u32 *) dst); in crypto_aes_decrypt()
395 .decrypt = ecb_decrypt,
409 .decrypt = cbc_decrypt,
423 .decrypt = ctr_crypt,
/linux-6.14.4/drivers/crypto/cavium/nitrox/
Dnitrox_skcipher.c264 creq->ctrl.s.arg = (enc ? ENCRYPT : DECRYPT); in nitrox_skcipher_crypt()
400 .decrypt = nitrox_cbc_decrypt,
419 .decrypt = nitrox_aes_decrypt,
438 .decrypt = nitrox_aes_decrypt,
459 .decrypt = nitrox_aes_decrypt,
476 .decrypt = nitrox_aes_decrypt,
495 .decrypt = nitrox_cbc_decrypt,
514 .decrypt = nitrox_3des_decrypt,
/linux-6.14.4/arch/arm/crypto/
Dchacha-glue.c210 .decrypt = chacha_arm,
225 .decrypt = xchacha_arm,
240 .decrypt = xchacha_arm,
260 .decrypt = chacha_neon,
276 .decrypt = xchacha_neon,
292 .decrypt = xchacha_neon,
/linux-6.14.4/Documentation/virt/kvm/s390/
Ds390-pv-boot.rst17 KVM to decrypt the protected virtual machine.
21 PVM, decrypt the components and verify the data and address list
57 decrypt and verify the PV, as well as control flags and a start PSW.
/linux-6.14.4/arch/x86/crypto/
Dsm4_aesni_avx2_glue.c64 .decrypt = sm4_avx_ecb_decrypt,
81 .decrypt = cbc_decrypt,
99 .decrypt = ctr_crypt,
/linux-6.14.4/arch/mips/crypto/
Dchacha-glue.c95 .decrypt = chacha_mips,
110 .decrypt = xchacha_mips,
125 .decrypt = xchacha_mips,
/linux-6.14.4/drivers/crypto/aspeed/
Daspeed-hace-crypto.c550 (cmd & HACE_CMD_ENCRYPT) ? "encrypt" : "decrypt"); in aspeed_aes_crypt()
678 .decrypt = aspeed_aes_ecb_decrypt,
705 .decrypt = aspeed_aes_cbc_decrypt,
731 .decrypt = aspeed_des_ecb_decrypt,
758 .decrypt = aspeed_des_cbc_decrypt,
784 .decrypt = aspeed_tdes_ecb_decrypt,
811 .decrypt = aspeed_tdes_cbc_decrypt,
841 .decrypt = aspeed_aes_ctr_decrypt,
867 .decrypt = aspeed_des_ctr_decrypt,
893 .decrypt = aspeed_tdes_ctr_decrypt,
/linux-6.14.4/arch/s390/crypto/
Ddes_s390.c157 .decrypt = ecb_des_decrypt,
182 .decrypt = cbc_des_decrypt,
275 .decrypt = ecb_des3_decrypt,
300 .decrypt = cbc_des3_decrypt,
373 .decrypt = ctr_des_crypt,
394 .decrypt = ctr_des3_crypt,

12345678910>>...15