/linux-6.14.4/crypto/ |
D | tcrypt.c | 49 #define ENCRYPT 1 macro 156 if (enc == ENCRYPT) in do_mult_aead_op() 268 if (enc == ENCRYPT) in test_mb_aead_speed() 549 if (enc == ENCRYPT) in test_aead_speed() 973 if (enc == ENCRYPT) in do_mult_acipher_op() 1073 if (enc == ENCRYPT) in test_mb_skcipher_speed() 1306 if (enc == ENCRYPT) in test_skcipher_speed() 1854 test_cipher_speed("ecb(aes)", ENCRYPT, sec, NULL, 0, in do_test() 1858 test_cipher_speed("cbc(aes)", ENCRYPT, sec, NULL, 0, in do_test() 1862 test_cipher_speed("lrw(aes)", ENCRYPT, sec, NULL, 0, in do_test() [all …]
|
/linux-6.14.4/drivers/crypto/ |
D | padlock-aes.c | 66 struct cword encrypt; member 134 ctx->cword.encrypt.rounds = 10 + (key_len - 16) / 4; in aes_set_key() 135 ctx->cword.decrypt.rounds = ctx->cword.encrypt.rounds; in aes_set_key() 136 ctx->cword.encrypt.ksize = (key_len - 16) / 8; in aes_set_key() 137 ctx->cword.decrypt.ksize = ctx->cword.encrypt.ksize; in aes_set_key() 144 ctx->cword.encrypt.keygen = 1; in aes_set_key() 155 if (&ctx->cword.encrypt == per_cpu(paes_last_cword, cpu) || in aes_set_key() 310 padlock_reset_key(&ctx->cword.encrypt); in padlock_aes_encrypt() 311 ecb_crypt(in, out, ctx->E, &ctx->cword.encrypt, 1); in padlock_aes_encrypt() 312 padlock_store_cword(&ctx->cword.encrypt); in padlock_aes_encrypt() [all …]
|
/linux-6.14.4/drivers/crypto/caam/ |
D | caamalg.c | 345 * AES GCM encrypt shared descriptor in gcm_set_sh_desc() 410 * RFC4106 encrypt shared descriptor in rfc4106_set_sh_desc() 478 * RFC4543 encrypt shared descriptor in rfc4543_set_sh_desc() 1073 bool all_contig, bool encrypt) in init_aead_job() argument 1085 sh_desc = encrypt ? ctx->sh_desc_enc : ctx->sh_desc_dec; in init_aead_job() 1086 ptr = encrypt ? ctx->sh_desc_enc_dma : ctx->sh_desc_dec_dma; in init_aead_job() 1122 if (encrypt) in init_aead_job() 1134 bool all_contig, bool encrypt) in init_gcm_job() argument 1143 init_aead_job(req, edesc, all_contig, encrypt); in init_gcm_job() 1148 if (encrypt && generic_gcm && !(req->assoclen + req->cryptlen)) in init_gcm_job() [all …]
|
D | caamalg_qi.c | 263 if (ctx->drv_ctx[ENCRYPT]) { in aead_setkey() 264 ret = caam_drv_ctx_update(ctx->drv_ctx[ENCRYPT], in aead_setkey() 387 if (ctx->drv_ctx[ENCRYPT]) { in gcm_setkey() 388 ret = caam_drv_ctx_update(ctx->drv_ctx[ENCRYPT], in gcm_setkey() 495 if (ctx->drv_ctx[ENCRYPT]) { in rfc4106_setkey() 496 ret = caam_drv_ctx_update(ctx->drv_ctx[ENCRYPT], in rfc4106_setkey() 601 if (ctx->drv_ctx[ENCRYPT]) { in rfc4543_setkey() 602 ret = caam_drv_ctx_update(ctx->drv_ctx[ENCRYPT], in rfc4543_setkey() 641 /* skcipher encrypt, decrypt shared descriptors */ in skcipher_setkey() 648 if (ctx->drv_ctx[ENCRYPT]) { in skcipher_setkey() [all …]
|
D | caamalg_qi2.c | 237 flc = &ctx->flc[ENCRYPT]; in aead_set_sh_desc() 251 dma_sync_single_for_device(dev, ctx->flc_dma[ENCRYPT], in aead_set_sh_desc() 352 bool encrypt) in aead_edesc_alloc() argument 383 dst_len = src_len + (encrypt ? authsize : (-authsize)); in aead_edesc_alloc() 428 (encrypt ? authsize : 0); in aead_edesc_alloc() 447 if ((alg->caam.rfc3686 && encrypt) || !alg->caam.geniv) in aead_edesc_alloc() 508 * to skip it when we authenticate or encrypt... in aead_edesc_alloc() 549 (encrypt ? ctx->authsize : (-ctx->authsize)); in aead_edesc_alloc() 601 flc = &ctx->flc[ENCRYPT]; in chachapoly_set_sh_desc() 606 dma_sync_single_for_device(dev, ctx->flc_dma[ENCRYPT], in chachapoly_set_sh_desc() [all …]
|
/linux-6.14.4/arch/sparc/crypto/ |
D | des_glue.c | 95 static int __ecb_crypt(struct skcipher_request *req, bool encrypt) in __ecb_crypt() argument 107 if (encrypt) in __ecb_crypt() 136 static int __cbc_crypt(struct skcipher_request *req, bool encrypt) in __cbc_crypt() argument 148 if (encrypt) in __cbc_crypt() 153 if (encrypt) in __cbc_crypt() 244 static int __ecb3_crypt(struct skcipher_request *req, bool encrypt) in __ecb3_crypt() argument 257 if (encrypt) in __ecb3_crypt() 290 static int __cbc3_crypt(struct skcipher_request *req, bool encrypt) in __cbc3_crypt() argument 303 if (encrypt) in __cbc3_crypt() 309 if (encrypt) in __cbc3_crypt() [all …]
|
D | aes_glue.c | 36 void (*encrypt)(const u64 *key, const u32 *input, u32 *output); member 130 .encrypt = aes_sparc64_encrypt_128, 142 .encrypt = aes_sparc64_encrypt_192, 154 .encrypt = aes_sparc64_encrypt_256, 209 ctx->ops->encrypt(&ctx->key[0], (const u32 *) src, (u32 *) dst); in crypto_aes_encrypt() 394 .encrypt = ecb_encrypt, 408 .encrypt = cbc_encrypt, 422 .encrypt = ctr_crypt,
|
/linux-6.14.4/drivers/crypto/intel/ixp4xx/ |
D | ixp4xx_crypto.c | 153 bool encrypt; member 163 int encrypt; member 179 struct ix_sa_dir encrypt; member 359 if (req_ctx->encrypt) { in finish_scattered_hmac() 399 if (req_ctx->encrypt) { in one_packet() 623 ret = init_sa_dir(&ctx->encrypt); in init_tfm() 628 free_sa_dir(&ctx->encrypt); in init_tfm() 665 free_sa_dir(&ctx->encrypt); in exit_tfm() 739 static int setup_auth(struct crypto_tfm *tfm, int encrypt, unsigned int authsize, in setup_auth() argument 750 dir = encrypt ? &ctx->encrypt : &ctx->decrypt; in setup_auth() [all …]
|
/linux-6.14.4/tools/testing/selftests/bpf/prog_tests/ |
D | crypto_sanity.c | 49 static void do_crypt_afalg(const void *src, void *dst, int size, bool encrypt) in do_crypt_afalg() argument 63 *(__u32 *)CMSG_DATA(cmsg) = encrypt ? ALG_OP_ENCRYPT : ALG_OP_DECRYPT; in do_crypt_afalg() 144 if (!ASSERT_OK(err, "attach encrypt filter")) in test_crypto_sanity() 148 if (!ASSERT_NEQ(sockfd, -1, "encrypt socket")) in test_crypto_sanity() 152 if (!ASSERT_EQ(err, sizeof(plain_text), "encrypt send")) in test_crypto_sanity() 157 if (!ASSERT_OK(skel->bss->status, "encrypt status")) in test_crypto_sanity() 159 if (!ASSERT_STRNEQ(skel->bss->dst, afalg_dst, sizeof(afalg_dst), "encrypt AF_ALG")) in test_crypto_sanity() 164 if (!ASSERT_OK(err, "bpf_tc_detach encrypt")) in test_crypto_sanity()
|
/linux-6.14.4/drivers/crypto/tegra/ |
D | tegra-se-aes.c | 38 bool encrypt; member 62 bool encrypt; member 111 if (rctx->encrypt) in tegra_cbc_iv_copyback() 132 static int tegra234_aes_crypto_cfg(u32 alg, bool encrypt) in tegra234_aes_crypto_cfg() argument 141 if (encrypt) in tegra234_aes_crypto_cfg() 146 if (encrypt) in tegra234_aes_crypto_cfg() 151 if (encrypt) in tegra234_aes_crypto_cfg() 168 static int tegra234_aes_cfg(u32 alg, bool encrypt) in tegra234_aes_cfg() argument 175 if (encrypt) in tegra234_aes_cfg() 181 if (encrypt) in tegra234_aes_cfg() [all …]
|
/linux-6.14.4/tools/perf/pmu-events/arch/s390/cf_z16/ |
D | pai_crypto.json | 1014 "BriefDescription": "PCKMO ENCRYPT DEA KEY", 1015 "PublicDescription": "PCKMO-Encrypt-DEA-key function" 1021 "BriefDescription": "PCKMO ENCRYPT TDEA 128 KEY", 1022 "PublicDescription": "PCKMO-Encrypt-TDEA-128-key function" 1028 "BriefDescription": "PCKMO ENCRYPT TDEA 192 KEY", 1029 "PublicDescription": "PCKMO-Encrypt-TDEA-192-key function" 1035 "BriefDescription": "PCKMO ENCRYPT AES 128 KEY", 1036 "PublicDescription": "PCKMO-Encrypt-AES-128-key function" 1042 "BriefDescription": "PCKMO ENCRYPT AES 192 KEY", 1043 "PublicDescription": "PCKMO-Encrypt-AES-192-key function" [all …]
|
/linux-6.14.4/net/ceph/ |
D | crypto.c | 139 * Currently these are encrypt out-buffer (ceph_buffer) and decrypt 207 static int ceph_aes_crypt(const struct ceph_crypto_key *key, bool encrypt, in ceph_aes_crypt() argument 215 int crypt_len = encrypt ? in_len + pad_byte : in_len; in ceph_aes_crypt() 219 if (encrypt) in ceph_aes_crypt() 236 if (encrypt) in ceph_aes_crypt() 243 encrypt ? "en" : "de", ret); in ceph_aes_crypt() 251 if (encrypt) { in ceph_aes_crypt() 271 int ceph_crypt(const struct ceph_crypto_key *key, bool encrypt, in ceph_crypt() argument 279 return ceph_aes_crypt(key, encrypt, buf, buf_len, in_len, in ceph_crypt()
|
/linux-6.14.4/arch/arm64/crypto/ |
D | sm4-ce-glue.c | 155 struct sm4_ctx *ctx, bool encrypt) in sm4_cbc_crypt() argument 174 if (encrypt) in sm4_cbc_crypt() 206 static int sm4_cbc_cts_crypt(struct skcipher_request *req, bool encrypt) in sm4_cbc_cts_crypt() argument 222 return sm4_cbc_crypt(req, ctx, encrypt); in sm4_cbc_cts_crypt() 235 err = sm4_cbc_crypt(&subreq, ctx, encrypt); in sm4_cbc_cts_crypt() 256 if (encrypt) in sm4_cbc_cts_crypt() 321 static int sm4_xts_crypt(struct skcipher_request *req, bool encrypt) in sm4_xts_crypt() argument 366 if (encrypt) in sm4_xts_crypt() 402 if (encrypt) in sm4_xts_crypt() 439 .encrypt = sm4_ecb_encrypt, [all …]
|
/linux-6.14.4/drivers/crypto/virtio/ |
D | virtio_crypto_skcipher_algs.c | 35 bool encrypt; member 63 /* Finish the encrypt or decrypt process */ in virtio_crypto_dataq_sym_callback() 115 int encrypt) in virtio_crypto_alg_skcipher_init_session() argument 119 int op = encrypt ? VIRTIO_CRYPTO_OP_ENCRYPT : VIRTIO_CRYPTO_OP_DECRYPT; in virtio_crypto_alg_skcipher_init_session() 180 if (encrypt) in virtio_crypto_alg_skcipher_init_session() 194 int encrypt) in virtio_crypto_alg_skcipher_close_session() argument 219 if (encrypt) in virtio_crypto_alg_skcipher_close_session() 371 if (vc_sym_req->encrypt) { in __virtio_crypto_skcipher_do_req() 425 if (!vc_sym_req->encrypt) in __virtio_crypto_skcipher_do_req() 486 vc_sym_req->encrypt = true; in virtio_crypto_skcipher_encrypt() [all …]
|
/linux-6.14.4/include/crypto/ |
D | akcipher.h | 55 * @encrypt: Function performs an encrypt operation as defined by public key 85 int (*encrypt)(struct akcipher_request *req); member 266 * crypto_akcipher_encrypt() - Invoke public key encrypt operation 268 * Function invokes the specific public key encrypt operation for a given 279 return crypto_akcipher_alg(tfm)->encrypt(req); in crypto_akcipher_encrypt() 300 * crypto_akcipher_sync_encrypt() - Invoke public key encrypt operation 302 * Function invokes the specific public key encrypt operation for a given
|
D | skcipher.h | 33 * @cryptlen: Number of bytes to encrypt or decrypt 80 * IV of exactly that size to perform the encrypt or decrypt operation. 109 * @encrypt: Encrypt a scatterlist of blocks. This function is used to encrypt 120 * @decrypt: Decrypt a single block. This is a reverse counterpart to @encrypt 154 int (*encrypt)(struct skcipher_request *req); member 181 * @encrypt: Encrypt a number of bytes. This function is used to encrypt 192 * @encrypt and the conditions are exactly the same. 205 int (*encrypt)(struct crypto_lskcipher *tfm, const u8 *src, member 683 * crypto_skcipher_encrypt() - encrypt plaintext 687 * Encrypt plaintext data using the skcipher_request handle. That data [all …]
|
/linux-6.14.4/fs/crypto/ |
D | crypto.c | 107 /* Encrypt or decrypt a single "data unit" of file contents. */ 156 * fscrypt_encrypt_pagecache_blocks() - Encrypt data from a pagecache page 157 * @page: the locked pagecache page containing the data to encrypt 158 * @len: size of the data to encrypt, in bytes 159 * @offs: offset within @page of the data to encrypt, in bytes 222 * fscrypt_encrypt_block_inplace() - Encrypt a filesystem block in-place 224 * @page: The page containing the block to encrypt 225 * @len: Size of block to encrypt. This must be a multiple of 227 * @offs: Byte offset within @page at which the block to encrypt begins 232 * Encrypt a possibly-compressed filesystem block that is located in an
|
/linux-6.14.4/arch/riscv/crypto/ |
D | aes-riscv64-zvkned.S | 130 aes_encrypt v16, \keylen // Encrypt 190 // CBC-encrypt all blocks except the last. But don't store the 193 // message is single-block, still encrypt the last (and only) block. 202 aes_encrypt v16, \keylen // Encrypt 210 // Encrypt the last two blocks using ciphertext stealing as follows: 211 // C[n-1] = Encrypt(Encrypt(P[n-1] ^ C[n-2]) ^ P[n]) 212 // C[n] = Encrypt(P[n-1] ^ C[n-2])[0..LEN] 218 // v16 already contains Encrypt(P[n-1] ^ C[n-2]). 225 vxor.vv v16, v16, v17 // v16 = Encrypt(P[n-1] ^ C[n-2]) ^ P[n]
|
/linux-6.14.4/drivers/crypto/ccree/ |
D | cc_cipher.c | 892 "Encrypt" : "Decrypt"), req, iv, nbytes); in cc_cipher_process() 1010 .encrypt = cc_cipher_encrypt, 1028 .encrypt = cc_cipher_encrypt, 1046 .encrypt = cc_cipher_encrypt, 1064 .encrypt = cc_cipher_encrypt, 1082 .encrypt = cc_cipher_encrypt, 1100 .encrypt = cc_cipher_encrypt, 1122 .encrypt = cc_cipher_encrypt, 1139 .encrypt = cc_cipher_encrypt, 1156 .encrypt = cc_cipher_encrypt, [all …]
|
/linux-6.14.4/drivers/crypto/cavium/nitrox/ |
D | nitrox_skcipher.c | 92 if (nkreq->creq.ctrl.s.arg == ENCRYPT) { in nitrox_cbc_cipher_callback() 264 creq->ctrl.s.arg = (enc ? ENCRYPT : DECRYPT); in nitrox_skcipher_crypt() 399 .encrypt = nitrox_aes_encrypt, 418 .encrypt = nitrox_aes_encrypt, 437 .encrypt = nitrox_aes_encrypt, 458 .encrypt = nitrox_aes_encrypt, 475 .encrypt = nitrox_aes_encrypt, 494 .encrypt = nitrox_3des_encrypt, 513 .encrypt = nitrox_3des_encrypt,
|
/linux-6.14.4/lib/crypto/ |
D | chacha20poly1305.c | 213 int encrypt) in chacha20poly1305_crypt_sg_inplace() argument 262 if (!encrypt) in chacha20poly1305_crypt_sg_inplace() 292 if (encrypt) in chacha20poly1305_crypt_sg_inplace() 305 if (encrypt) { in chacha20poly1305_crypt_sg_inplace() 321 scatterwalk_map_and_copy(b.mac[encrypt], src, src_len, in chacha20poly1305_crypt_sg_inplace() 322 sizeof(b.mac[1]), encrypt); in chacha20poly1305_crypt_sg_inplace() 323 ret = encrypt || in chacha20poly1305_crypt_sg_inplace()
|
/linux-6.14.4/Documentation/filesystems/ |
D | fscrypt.rst | 26 at the block device level. This allows it to encrypt different files 30 However, except for filenames, fscrypt does not encrypt filesystem 290 key and a single filenames encryption key. To still encrypt different 691 encrypted, even if it is empty. Users who want to encrypt an entire 717 kernel config, and the superblock must have had the "encrypt" 718 feature flag enabled using ``tune2fs -O encrypt`` or ``mkfs.ext4 -O 719 encrypt``.) 1302 encryption hardware* that can encrypt/decrypt data while it is on its 1311 blk-crypto instead of the kernel crypto API to encrypt/decrypt file 1406 inline encryption hardware will encrypt/decrypt the file contents. [all …]
|
/linux-6.14.4/drivers/crypto/inside-secure/ |
D | safexcel_cipher.c | 661 /* For encrypt take the last output word */ in safexcel_handle_req_result() 700 * AEAD has auth tag appended to output for encrypt and in safexcel_send_req() 1296 .encrypt = safexcel_encrypt, 1333 .encrypt = safexcel_encrypt, 1407 .encrypt = safexcel_encrypt, 1469 .encrypt = safexcel_encrypt, 1508 .encrypt = safexcel_encrypt, 1568 .encrypt = safexcel_encrypt, 1607 .encrypt = safexcel_encrypt, 1680 .encrypt = safexcel_aead_encrypt, [all …]
|
/linux-6.14.4/drivers/crypto/hisilicon/sec2/ |
D | sec_crypto.c | 122 if (req->c_req.encrypt) in sec_alloc_queue_id() 132 if (req->c_req.encrypt) in sec_free_queue_id() 908 if (!c_req->encrypt && ctx->alg_type == SEC_AEAD) { in GEN_SEC_SETKEY_FUNC() 1002 if (!c_req->encrypt && ctx->alg_type == SEC_AEAD) { in sec_cipher_map() 1270 if (c_req->encrypt) in sec_skcipher_bd_fill() 1318 if (c_req->encrypt) in sec_skcipher_bd_fill_v3() 1370 if (req->c_req.encrypt) in sec_update_iv() 1426 ctx->c_ctx.c_mode == SEC_CMODE_CTR) && req->c_req.encrypt) in sec_skcipher_callback() 1476 if (!c_req->encrypt) in set_aead_auth_iv() 1609 sec_auth_bd_fill_xcm(auth_ctx, req->c_req.encrypt, req, sec_sqe); in sec_aead_bd_fill() [all …]
|
/linux-6.14.4/drivers/crypto/ccp/ |
D | ccp-crypto-aes.c | 66 static int ccp_aes_crypt(struct skcipher_request *req, bool encrypt) in ccp_aes_crypt() argument 98 (encrypt) ? CCP_AES_ACTION_ENCRYPT : CCP_AES_ACTION_DECRYPT; in ccp_aes_crypt() 158 static int ccp_aes_rfc3686_crypt(struct skcipher_request *req, bool encrypt) in ccp_aes_rfc3686_crypt() argument 179 return ccp_aes_crypt(req, encrypt); in ccp_aes_rfc3686_crypt() 206 .encrypt = ccp_aes_encrypt, 224 .encrypt = ccp_aes_rfc3686_encrypt,
|