/linux-4.4.14/drivers/crypto/ |
D | geode-aes.c | 124 if (len == AES_KEYSIZE_128) { in geode_setkey_cip() 157 if (len == AES_KEYSIZE_128) { in geode_setkey_blk() 220 if (unlikely(op->keylen != AES_KEYSIZE_128)) { in geode_encrypt() 241 if (unlikely(op->keylen != AES_KEYSIZE_128)) { in geode_decrypt() 312 if (unlikely(op->keylen != AES_KEYSIZE_128)) in geode_cbc_decrypt() 344 if (unlikely(op->keylen != AES_KEYSIZE_128)) in geode_cbc_encrypt() 425 if (unlikely(op->keylen != AES_KEYSIZE_128)) in geode_ecb_decrypt() 455 if (unlikely(op->keylen != AES_KEYSIZE_128)) in geode_ecb_encrypt()
|
D | mxs-dcp.c | 52 uint8_t aes_key[2 * AES_KEYSIZE_128]; 89 uint8_t key[AES_KEYSIZE_128]; 205 2 * AES_KEYSIZE_128, in mxs_dcp_run_aes() 241 dma_unmap_single(sdcp->dev, key_phys, 2 * AES_KEYSIZE_128, in mxs_dcp_run_aes() 282 memcpy(key + AES_KEYSIZE_128, req->info, AES_KEYSIZE_128); in mxs_dcp_aes_block_crypt() 286 memset(key + AES_KEYSIZE_128, 0, AES_KEYSIZE_128); in mxs_dcp_aes_block_crypt() 403 if (unlikely(actx->key_len != AES_KEYSIZE_128)) in mxs_dcp_aes_enqueue() 451 if (len == AES_KEYSIZE_128) { in mxs_dcp_aes_setkey()
|
D | geode-aes.h | 63 u8 key[AES_KEYSIZE_128];
|
D | sahara.c | 152 u8 key[AES_KEYSIZE_128]; 575 memcpy(dev->iv_base, req->info, AES_KEYSIZE_128); in sahara_aes_process() 610 if (keylen == AES_KEYSIZE_128) { in sahara_aes_setkey() 616 if (keylen != AES_KEYSIZE_128 && in sahara_aes_setkey() 672 if (unlikely(ctx->keylen != AES_KEYSIZE_128)) { in sahara_aes_ecb_encrypt() 690 if (unlikely(ctx->keylen != AES_KEYSIZE_128)) { in sahara_aes_ecb_decrypt() 708 if (unlikely(ctx->keylen != AES_KEYSIZE_128)) { in sahara_aes_cbc_encrypt() 726 if (unlikely(ctx->keylen != AES_KEYSIZE_128)) { in sahara_aes_cbc_decrypt() 1467 dev->key_base = dmam_alloc_coherent(&pdev->dev, 2 * AES_KEYSIZE_128, in sahara_probe() 1473 dev->iv_base = dev->key_base + AES_KEYSIZE_128; in sahara_probe() [all …]
|
D | picoxcell_crypto.c | 514 ctx->cipher_key_len != AES_KEYSIZE_128 && in spacc_aead_need_fallback() 771 if (len != AES_KEYSIZE_128 && len != AES_KEYSIZE_256 && in spacc_aes_setkey() 784 } else if (len != AES_KEYSIZE_128 && len != AES_KEYSIZE_256 && in spacc_aes_setkey() 832 ctx->key_len != AES_KEYSIZE_128 && in spacc_ablk_need_fallback()
|
D | mv_cesa.c | 206 case AES_KEYSIZE_128: in mv_setkey_aes() 289 case AES_KEYSIZE_128: in mv_process_current_q()
|
D | s5p-sss.c | 536 if (keylen != AES_KEYSIZE_128 && in s5p_aes_setkey()
|
D | atmel-aes.c | 507 if (dd->ctx->keylen == AES_KEYSIZE_128) in atmel_aes_write_ctrl() 828 if (keylen != AES_KEYSIZE_128 && keylen != AES_KEYSIZE_192 && in atmel_aes_setkey()
|
D | omap-aes.c | 748 if (keylen != AES_KEYSIZE_128 && keylen != AES_KEYSIZE_192 && in omap_aes_setkey()
|
D | n2_core.c | 724 case AES_KEYSIZE_128: in n2_aes_setkey()
|
/linux-4.4.14/arch/powerpc/crypto/ |
D | aes-spe-glue.c | 97 if (key_len != AES_KEYSIZE_128 && in ppc_aes_setkey() 105 case AES_KEYSIZE_128: in ppc_aes_setkey() 131 if (key_len != AES_KEYSIZE_128 && in ppc_xts_setkey() 139 case AES_KEYSIZE_128: in ppc_xts_setkey() 142 ppc_expand_key_128(ctx->key_twk, in_key + AES_KEYSIZE_128); in ppc_xts_setkey()
|
/linux-4.4.14/include/crypto/ |
D | aes.h | 13 #define AES_KEYSIZE_128 16 macro
|
/linux-4.4.14/arch/arm/crypto/ |
D | aes_glue.c | 34 case AES_KEYSIZE_128: in aes_set_key()
|
D | aes-ce-glue.c | 77 if (key_len != AES_KEYSIZE_128 && in ce_aes_expandkey()
|
/linux-4.4.14/drivers/crypto/ccp/ |
D | ccp-crypto-aes-xts.c | 106 case AES_KEYSIZE_128 * 2: in ccp_aes_xts_setkey() 148 (ctx->u.aes.key_len != AES_KEYSIZE_128)) { in ccp_aes_xts_crypt()
|
D | ccp-crypto-aes.c | 48 case AES_KEYSIZE_128: in ccp_aes_setkey()
|
D | ccp-ops.c | 893 if (!((aes->key_len == AES_KEYSIZE_128) || in ccp_run_aes_cmac_cmd() 1046 if (!((aes->key_len == AES_KEYSIZE_128) || in ccp_run_aes_cmd() 1233 if (xts->key_len != AES_KEYSIZE_128) in ccp_run_xts_aes_cmd() 1269 dm_offset = CCP_KSB_BYTES - AES_KEYSIZE_128; in ccp_run_xts_aes_cmd()
|
D | ccp-crypto-aes-cmac.c | 271 case AES_KEYSIZE_128: in ccp_aes_cmac_setkey()
|
/linux-4.4.14/drivers/crypto/nx/ |
D | nx-aes-ecb.c | 43 case AES_KEYSIZE_128: in ecb_aes_nx_set_key()
|
D | nx-aes-cbc.c | 43 case AES_KEYSIZE_128: in cbc_aes_nx_set_key()
|
D | nx-aes-ctr.c | 44 case AES_KEYSIZE_128: in ctr_aes_nx_set_key()
|
D | nx-aes-xcbc.c | 48 case AES_KEYSIZE_128: in nx_xcbc_set_key()
|
D | nx-aes-ccm.c | 46 case AES_KEYSIZE_128: in ccm_aes_nx_set_key()
|
D | nx-aes-gcm.c | 45 case AES_KEYSIZE_128: in gcm_aes_nx_set_key()
|
/linux-4.4.14/arch/arm64/crypto/ |
D | aes-ce-cipher.c | 163 if (key_len != AES_KEYSIZE_128 && in ce_aes_expandkey()
|
/linux-4.4.14/drivers/crypto/qce/ |
D | ablkcipher.c | 165 case AES_KEYSIZE_128: in qce_ablkcipher_setkey() 205 if (IS_AES(rctx->flags) && ctx->enc_keylen != AES_KEYSIZE_128 && in qce_ablkcipher_crypt()
|
D | common.c | 61 if (aes_key_size == AES_KEYSIZE_128) in qce_encr_cfg() 112 if (key_size == AES_KEYSIZE_128) in qce_auth_cfg()
|
D | sha.c | 91 rctx->authklen = AES_KEYSIZE_128; in qce_ahash_async_req_handle()
|
/linux-4.4.14/arch/x86/crypto/ |
D | aesni-intel_glue.c | 187 if ((plaintext_len < AVX_GEN2_OPTSIZE) || (aes_ctx-> key_length != AES_KEYSIZE_128)){ in aesni_gcm_enc_avx() 203 if ((ciphertext_len < AVX_GEN2_OPTSIZE) || (aes_ctx-> key_length != AES_KEYSIZE_128)) { in aesni_gcm_dec_avx() 238 if ((plaintext_len < AVX_GEN2_OPTSIZE) || (aes_ctx-> key_length != AES_KEYSIZE_128)) { in aesni_gcm_enc_avx2() 258 if ((ciphertext_len < AVX_GEN2_OPTSIZE) || (aes_ctx-> key_length != AES_KEYSIZE_128)) { in aesni_gcm_dec_avx2() 311 if (key_len != AES_KEYSIZE_128 && key_len != AES_KEYSIZE_192 && in aes_set_key_common() 496 if (ctx->key_length == AES_KEYSIZE_128) in aesni_ctr_enc_avx_tfm()
|
/linux-4.4.14/crypto/ |
D | aes_generic.c | 1222 if (key_len != AES_KEYSIZE_128 && key_len != AES_KEYSIZE_192 && in crypto_aes_expand_key() 1234 case AES_KEYSIZE_128: in crypto_aes_expand_key()
|
/linux-4.4.14/drivers/crypto/amcc/ |
D | crypto4xx_alg.c | 116 keylen != AES_KEYSIZE_192 && keylen != AES_KEYSIZE_128) { in crypto4xx_setkey_aes()
|
/linux-4.4.14/arch/sparc/crypto/ |
D | aes_glue.c | 173 case AES_KEYSIZE_128: in aes_set_key()
|
/linux-4.4.14/drivers/crypto/qat/qat_common/ |
D | qat_algs.c | 503 case AES_KEYSIZE_128: in qat_alg_validate_key() 517 case AES_KEYSIZE_128 << 1: in qat_alg_validate_key()
|
/linux-4.4.14/drivers/crypto/ux500/cryp/ |
D | cryp_core.c | 953 case AES_KEYSIZE_128: in aes_ablkcipher_setkey()
|