Home
last modified time | relevance | path

Searched full:encrypt (Results 1 – 25 of 417) sorted by relevance

12345678910>>...17

/linux-6.14.4/crypto/
Dtcrypt.c49 #define ENCRYPT 1 macro
156 if (enc == ENCRYPT) in do_mult_aead_op()
268 if (enc == ENCRYPT) in test_mb_aead_speed()
549 if (enc == ENCRYPT) in test_aead_speed()
973 if (enc == ENCRYPT) in do_mult_acipher_op()
1073 if (enc == ENCRYPT) in test_mb_skcipher_speed()
1306 if (enc == ENCRYPT) in test_skcipher_speed()
1854 test_cipher_speed("ecb(aes)", ENCRYPT, sec, NULL, 0, in do_test()
1858 test_cipher_speed("cbc(aes)", ENCRYPT, sec, NULL, 0, in do_test()
1862 test_cipher_speed("lrw(aes)", ENCRYPT, sec, NULL, 0, in do_test()
[all …]
/linux-6.14.4/drivers/crypto/
Dpadlock-aes.c66 struct cword encrypt; member
134 ctx->cword.encrypt.rounds = 10 + (key_len - 16) / 4; in aes_set_key()
135 ctx->cword.decrypt.rounds = ctx->cword.encrypt.rounds; in aes_set_key()
136 ctx->cword.encrypt.ksize = (key_len - 16) / 8; in aes_set_key()
137 ctx->cword.decrypt.ksize = ctx->cword.encrypt.ksize; in aes_set_key()
144 ctx->cword.encrypt.keygen = 1; in aes_set_key()
155 if (&ctx->cword.encrypt == per_cpu(paes_last_cword, cpu) || in aes_set_key()
310 padlock_reset_key(&ctx->cword.encrypt); in padlock_aes_encrypt()
311 ecb_crypt(in, out, ctx->E, &ctx->cword.encrypt, 1); in padlock_aes_encrypt()
312 padlock_store_cword(&ctx->cword.encrypt); in padlock_aes_encrypt()
[all …]
/linux-6.14.4/drivers/crypto/caam/
Dcaamalg.c345 * AES GCM encrypt shared descriptor in gcm_set_sh_desc()
410 * RFC4106 encrypt shared descriptor in rfc4106_set_sh_desc()
478 * RFC4543 encrypt shared descriptor in rfc4543_set_sh_desc()
1073 bool all_contig, bool encrypt) in init_aead_job() argument
1085 sh_desc = encrypt ? ctx->sh_desc_enc : ctx->sh_desc_dec; in init_aead_job()
1086 ptr = encrypt ? ctx->sh_desc_enc_dma : ctx->sh_desc_dec_dma; in init_aead_job()
1122 if (encrypt) in init_aead_job()
1134 bool all_contig, bool encrypt) in init_gcm_job() argument
1143 init_aead_job(req, edesc, all_contig, encrypt); in init_gcm_job()
1148 if (encrypt && generic_gcm && !(req->assoclen + req->cryptlen)) in init_gcm_job()
[all …]
Dcaamalg_qi.c263 if (ctx->drv_ctx[ENCRYPT]) { in aead_setkey()
264 ret = caam_drv_ctx_update(ctx->drv_ctx[ENCRYPT], in aead_setkey()
387 if (ctx->drv_ctx[ENCRYPT]) { in gcm_setkey()
388 ret = caam_drv_ctx_update(ctx->drv_ctx[ENCRYPT], in gcm_setkey()
495 if (ctx->drv_ctx[ENCRYPT]) { in rfc4106_setkey()
496 ret = caam_drv_ctx_update(ctx->drv_ctx[ENCRYPT], in rfc4106_setkey()
601 if (ctx->drv_ctx[ENCRYPT]) { in rfc4543_setkey()
602 ret = caam_drv_ctx_update(ctx->drv_ctx[ENCRYPT], in rfc4543_setkey()
641 /* skcipher encrypt, decrypt shared descriptors */ in skcipher_setkey()
648 if (ctx->drv_ctx[ENCRYPT]) { in skcipher_setkey()
[all …]
Dcaamalg_qi2.c237 flc = &ctx->flc[ENCRYPT]; in aead_set_sh_desc()
251 dma_sync_single_for_device(dev, ctx->flc_dma[ENCRYPT], in aead_set_sh_desc()
352 bool encrypt) in aead_edesc_alloc() argument
383 dst_len = src_len + (encrypt ? authsize : (-authsize)); in aead_edesc_alloc()
428 (encrypt ? authsize : 0); in aead_edesc_alloc()
447 if ((alg->caam.rfc3686 && encrypt) || !alg->caam.geniv) in aead_edesc_alloc()
508 * to skip it when we authenticate or encrypt... in aead_edesc_alloc()
549 (encrypt ? ctx->authsize : (-ctx->authsize)); in aead_edesc_alloc()
601 flc = &ctx->flc[ENCRYPT]; in chachapoly_set_sh_desc()
606 dma_sync_single_for_device(dev, ctx->flc_dma[ENCRYPT], in chachapoly_set_sh_desc()
[all …]
/linux-6.14.4/arch/sparc/crypto/
Ddes_glue.c95 static int __ecb_crypt(struct skcipher_request *req, bool encrypt) in __ecb_crypt() argument
107 if (encrypt) in __ecb_crypt()
136 static int __cbc_crypt(struct skcipher_request *req, bool encrypt) in __cbc_crypt() argument
148 if (encrypt) in __cbc_crypt()
153 if (encrypt) in __cbc_crypt()
244 static int __ecb3_crypt(struct skcipher_request *req, bool encrypt) in __ecb3_crypt() argument
257 if (encrypt) in __ecb3_crypt()
290 static int __cbc3_crypt(struct skcipher_request *req, bool encrypt) in __cbc3_crypt() argument
303 if (encrypt) in __cbc3_crypt()
309 if (encrypt) in __cbc3_crypt()
[all …]
Daes_glue.c36 void (*encrypt)(const u64 *key, const u32 *input, u32 *output); member
130 .encrypt = aes_sparc64_encrypt_128,
142 .encrypt = aes_sparc64_encrypt_192,
154 .encrypt = aes_sparc64_encrypt_256,
209 ctx->ops->encrypt(&ctx->key[0], (const u32 *) src, (u32 *) dst); in crypto_aes_encrypt()
394 .encrypt = ecb_encrypt,
408 .encrypt = cbc_encrypt,
422 .encrypt = ctr_crypt,
/linux-6.14.4/drivers/crypto/intel/ixp4xx/
Dixp4xx_crypto.c153 bool encrypt; member
163 int encrypt; member
179 struct ix_sa_dir encrypt; member
359 if (req_ctx->encrypt) { in finish_scattered_hmac()
399 if (req_ctx->encrypt) { in one_packet()
623 ret = init_sa_dir(&ctx->encrypt); in init_tfm()
628 free_sa_dir(&ctx->encrypt); in init_tfm()
665 free_sa_dir(&ctx->encrypt); in exit_tfm()
739 static int setup_auth(struct crypto_tfm *tfm, int encrypt, unsigned int authsize, in setup_auth() argument
750 dir = encrypt ? &ctx->encrypt : &ctx->decrypt; in setup_auth()
[all …]
/linux-6.14.4/tools/testing/selftests/bpf/prog_tests/
Dcrypto_sanity.c49 static void do_crypt_afalg(const void *src, void *dst, int size, bool encrypt) in do_crypt_afalg() argument
63 *(__u32 *)CMSG_DATA(cmsg) = encrypt ? ALG_OP_ENCRYPT : ALG_OP_DECRYPT; in do_crypt_afalg()
144 if (!ASSERT_OK(err, "attach encrypt filter")) in test_crypto_sanity()
148 if (!ASSERT_NEQ(sockfd, -1, "encrypt socket")) in test_crypto_sanity()
152 if (!ASSERT_EQ(err, sizeof(plain_text), "encrypt send")) in test_crypto_sanity()
157 if (!ASSERT_OK(skel->bss->status, "encrypt status")) in test_crypto_sanity()
159 if (!ASSERT_STRNEQ(skel->bss->dst, afalg_dst, sizeof(afalg_dst), "encrypt AF_ALG")) in test_crypto_sanity()
164 if (!ASSERT_OK(err, "bpf_tc_detach encrypt")) in test_crypto_sanity()
/linux-6.14.4/drivers/crypto/tegra/
Dtegra-se-aes.c38 bool encrypt; member
62 bool encrypt; member
111 if (rctx->encrypt) in tegra_cbc_iv_copyback()
132 static int tegra234_aes_crypto_cfg(u32 alg, bool encrypt) in tegra234_aes_crypto_cfg() argument
141 if (encrypt) in tegra234_aes_crypto_cfg()
146 if (encrypt) in tegra234_aes_crypto_cfg()
151 if (encrypt) in tegra234_aes_crypto_cfg()
168 static int tegra234_aes_cfg(u32 alg, bool encrypt) in tegra234_aes_cfg() argument
175 if (encrypt) in tegra234_aes_cfg()
181 if (encrypt) in tegra234_aes_cfg()
[all …]
/linux-6.14.4/tools/perf/pmu-events/arch/s390/cf_z16/
Dpai_crypto.json1014 "BriefDescription": "PCKMO ENCRYPT DEA KEY",
1015 "PublicDescription": "PCKMO-Encrypt-DEA-key function"
1021 "BriefDescription": "PCKMO ENCRYPT TDEA 128 KEY",
1022 "PublicDescription": "PCKMO-Encrypt-TDEA-128-key function"
1028 "BriefDescription": "PCKMO ENCRYPT TDEA 192 KEY",
1029 "PublicDescription": "PCKMO-Encrypt-TDEA-192-key function"
1035 "BriefDescription": "PCKMO ENCRYPT AES 128 KEY",
1036 "PublicDescription": "PCKMO-Encrypt-AES-128-key function"
1042 "BriefDescription": "PCKMO ENCRYPT AES 192 KEY",
1043 "PublicDescription": "PCKMO-Encrypt-AES-192-key function"
[all …]
/linux-6.14.4/net/ceph/
Dcrypto.c139 * Currently these are encrypt out-buffer (ceph_buffer) and decrypt
207 static int ceph_aes_crypt(const struct ceph_crypto_key *key, bool encrypt, in ceph_aes_crypt() argument
215 int crypt_len = encrypt ? in_len + pad_byte : in_len; in ceph_aes_crypt()
219 if (encrypt) in ceph_aes_crypt()
236 if (encrypt) in ceph_aes_crypt()
243 encrypt ? "en" : "de", ret); in ceph_aes_crypt()
251 if (encrypt) { in ceph_aes_crypt()
271 int ceph_crypt(const struct ceph_crypto_key *key, bool encrypt, in ceph_crypt() argument
279 return ceph_aes_crypt(key, encrypt, buf, buf_len, in_len, in ceph_crypt()
/linux-6.14.4/arch/arm64/crypto/
Dsm4-ce-glue.c155 struct sm4_ctx *ctx, bool encrypt) in sm4_cbc_crypt() argument
174 if (encrypt) in sm4_cbc_crypt()
206 static int sm4_cbc_cts_crypt(struct skcipher_request *req, bool encrypt) in sm4_cbc_cts_crypt() argument
222 return sm4_cbc_crypt(req, ctx, encrypt); in sm4_cbc_cts_crypt()
235 err = sm4_cbc_crypt(&subreq, ctx, encrypt); in sm4_cbc_cts_crypt()
256 if (encrypt) in sm4_cbc_cts_crypt()
321 static int sm4_xts_crypt(struct skcipher_request *req, bool encrypt) in sm4_xts_crypt() argument
366 if (encrypt) in sm4_xts_crypt()
402 if (encrypt) in sm4_xts_crypt()
439 .encrypt = sm4_ecb_encrypt,
[all …]
/linux-6.14.4/drivers/crypto/virtio/
Dvirtio_crypto_skcipher_algs.c35 bool encrypt; member
63 /* Finish the encrypt or decrypt process */ in virtio_crypto_dataq_sym_callback()
115 int encrypt) in virtio_crypto_alg_skcipher_init_session() argument
119 int op = encrypt ? VIRTIO_CRYPTO_OP_ENCRYPT : VIRTIO_CRYPTO_OP_DECRYPT; in virtio_crypto_alg_skcipher_init_session()
180 if (encrypt) in virtio_crypto_alg_skcipher_init_session()
194 int encrypt) in virtio_crypto_alg_skcipher_close_session() argument
219 if (encrypt) in virtio_crypto_alg_skcipher_close_session()
371 if (vc_sym_req->encrypt) { in __virtio_crypto_skcipher_do_req()
425 if (!vc_sym_req->encrypt) in __virtio_crypto_skcipher_do_req()
486 vc_sym_req->encrypt = true; in virtio_crypto_skcipher_encrypt()
[all …]
/linux-6.14.4/include/crypto/
Dakcipher.h55 * @encrypt: Function performs an encrypt operation as defined by public key
85 int (*encrypt)(struct akcipher_request *req); member
266 * crypto_akcipher_encrypt() - Invoke public key encrypt operation
268 * Function invokes the specific public key encrypt operation for a given
279 return crypto_akcipher_alg(tfm)->encrypt(req); in crypto_akcipher_encrypt()
300 * crypto_akcipher_sync_encrypt() - Invoke public key encrypt operation
302 * Function invokes the specific public key encrypt operation for a given
Dskcipher.h33 * @cryptlen: Number of bytes to encrypt or decrypt
80 * IV of exactly that size to perform the encrypt or decrypt operation.
109 * @encrypt: Encrypt a scatterlist of blocks. This function is used to encrypt
120 * @decrypt: Decrypt a single block. This is a reverse counterpart to @encrypt
154 int (*encrypt)(struct skcipher_request *req); member
181 * @encrypt: Encrypt a number of bytes. This function is used to encrypt
192 * @encrypt and the conditions are exactly the same.
205 int (*encrypt)(struct crypto_lskcipher *tfm, const u8 *src, member
683 * crypto_skcipher_encrypt() - encrypt plaintext
687 * Encrypt plaintext data using the skcipher_request handle. That data
[all …]
/linux-6.14.4/fs/crypto/
Dcrypto.c107 /* Encrypt or decrypt a single "data unit" of file contents. */
156 * fscrypt_encrypt_pagecache_blocks() - Encrypt data from a pagecache page
157 * @page: the locked pagecache page containing the data to encrypt
158 * @len: size of the data to encrypt, in bytes
159 * @offs: offset within @page of the data to encrypt, in bytes
222 * fscrypt_encrypt_block_inplace() - Encrypt a filesystem block in-place
224 * @page: The page containing the block to encrypt
225 * @len: Size of block to encrypt. This must be a multiple of
227 * @offs: Byte offset within @page at which the block to encrypt begins
232 * Encrypt a possibly-compressed filesystem block that is located in an
/linux-6.14.4/arch/riscv/crypto/
Daes-riscv64-zvkned.S130 aes_encrypt v16, \keylen // Encrypt
190 // CBC-encrypt all blocks except the last. But don't store the
193 // message is single-block, still encrypt the last (and only) block.
202 aes_encrypt v16, \keylen // Encrypt
210 // Encrypt the last two blocks using ciphertext stealing as follows:
211 // C[n-1] = Encrypt(Encrypt(P[n-1] ^ C[n-2]) ^ P[n])
212 // C[n] = Encrypt(P[n-1] ^ C[n-2])[0..LEN]
218 // v16 already contains Encrypt(P[n-1] ^ C[n-2]).
225 vxor.vv v16, v16, v17 // v16 = Encrypt(P[n-1] ^ C[n-2]) ^ P[n]
/linux-6.14.4/drivers/crypto/ccree/
Dcc_cipher.c892 "Encrypt" : "Decrypt"), req, iv, nbytes); in cc_cipher_process()
1010 .encrypt = cc_cipher_encrypt,
1028 .encrypt = cc_cipher_encrypt,
1046 .encrypt = cc_cipher_encrypt,
1064 .encrypt = cc_cipher_encrypt,
1082 .encrypt = cc_cipher_encrypt,
1100 .encrypt = cc_cipher_encrypt,
1122 .encrypt = cc_cipher_encrypt,
1139 .encrypt = cc_cipher_encrypt,
1156 .encrypt = cc_cipher_encrypt,
[all …]
/linux-6.14.4/drivers/crypto/cavium/nitrox/
Dnitrox_skcipher.c92 if (nkreq->creq.ctrl.s.arg == ENCRYPT) { in nitrox_cbc_cipher_callback()
264 creq->ctrl.s.arg = (enc ? ENCRYPT : DECRYPT); in nitrox_skcipher_crypt()
399 .encrypt = nitrox_aes_encrypt,
418 .encrypt = nitrox_aes_encrypt,
437 .encrypt = nitrox_aes_encrypt,
458 .encrypt = nitrox_aes_encrypt,
475 .encrypt = nitrox_aes_encrypt,
494 .encrypt = nitrox_3des_encrypt,
513 .encrypt = nitrox_3des_encrypt,
/linux-6.14.4/lib/crypto/
Dchacha20poly1305.c213 int encrypt) in chacha20poly1305_crypt_sg_inplace() argument
262 if (!encrypt) in chacha20poly1305_crypt_sg_inplace()
292 if (encrypt) in chacha20poly1305_crypt_sg_inplace()
305 if (encrypt) { in chacha20poly1305_crypt_sg_inplace()
321 scatterwalk_map_and_copy(b.mac[encrypt], src, src_len, in chacha20poly1305_crypt_sg_inplace()
322 sizeof(b.mac[1]), encrypt); in chacha20poly1305_crypt_sg_inplace()
323 ret = encrypt || in chacha20poly1305_crypt_sg_inplace()
/linux-6.14.4/Documentation/filesystems/
Dfscrypt.rst26 at the block device level. This allows it to encrypt different files
30 However, except for filenames, fscrypt does not encrypt filesystem
290 key and a single filenames encryption key. To still encrypt different
691 encrypted, even if it is empty. Users who want to encrypt an entire
717 kernel config, and the superblock must have had the "encrypt"
718 feature flag enabled using ``tune2fs -O encrypt`` or ``mkfs.ext4 -O
719 encrypt``.)
1302 encryption hardware* that can encrypt/decrypt data while it is on its
1311 blk-crypto instead of the kernel crypto API to encrypt/decrypt file
1406 inline encryption hardware will encrypt/decrypt the file contents.
[all …]
/linux-6.14.4/drivers/crypto/inside-secure/
Dsafexcel_cipher.c661 /* For encrypt take the last output word */ in safexcel_handle_req_result()
700 * AEAD has auth tag appended to output for encrypt and in safexcel_send_req()
1296 .encrypt = safexcel_encrypt,
1333 .encrypt = safexcel_encrypt,
1407 .encrypt = safexcel_encrypt,
1469 .encrypt = safexcel_encrypt,
1508 .encrypt = safexcel_encrypt,
1568 .encrypt = safexcel_encrypt,
1607 .encrypt = safexcel_encrypt,
1680 .encrypt = safexcel_aead_encrypt,
[all …]
/linux-6.14.4/drivers/crypto/hisilicon/sec2/
Dsec_crypto.c122 if (req->c_req.encrypt) in sec_alloc_queue_id()
132 if (req->c_req.encrypt) in sec_free_queue_id()
908 if (!c_req->encrypt && ctx->alg_type == SEC_AEAD) { in GEN_SEC_SETKEY_FUNC()
1002 if (!c_req->encrypt && ctx->alg_type == SEC_AEAD) { in sec_cipher_map()
1270 if (c_req->encrypt) in sec_skcipher_bd_fill()
1318 if (c_req->encrypt) in sec_skcipher_bd_fill_v3()
1370 if (req->c_req.encrypt) in sec_update_iv()
1426 ctx->c_ctx.c_mode == SEC_CMODE_CTR) && req->c_req.encrypt) in sec_skcipher_callback()
1476 if (!c_req->encrypt) in set_aead_auth_iv()
1609 sec_auth_bd_fill_xcm(auth_ctx, req->c_req.encrypt, req, sec_sqe); in sec_aead_bd_fill()
[all …]
/linux-6.14.4/drivers/crypto/ccp/
Dccp-crypto-aes.c66 static int ccp_aes_crypt(struct skcipher_request *req, bool encrypt) in ccp_aes_crypt() argument
98 (encrypt) ? CCP_AES_ACTION_ENCRYPT : CCP_AES_ACTION_DECRYPT; in ccp_aes_crypt()
158 static int ccp_aes_rfc3686_crypt(struct skcipher_request *req, bool encrypt) in ccp_aes_rfc3686_crypt() argument
179 return ccp_aes_crypt(req, encrypt); in ccp_aes_rfc3686_crypt()
206 .encrypt = ccp_aes_encrypt,
224 .encrypt = ccp_aes_rfc3686_encrypt,

12345678910>>...17