/linux-4.4.14/arch/powerpc/crypto/ |
D | aes-spe-glue.c | 99 key_len != AES_KEYSIZE_256) { in ppc_aes_setkey() 113 case AES_KEYSIZE_256: in ppc_aes_setkey() 133 key_len != AES_KEYSIZE_256) { in ppc_xts_setkey() 149 case AES_KEYSIZE_256: in ppc_xts_setkey() 152 ppc_expand_key_256(ctx->key_twk, in_key + AES_KEYSIZE_256); in ppc_xts_setkey()
|
/linux-4.4.14/arch/arm64/crypto/ |
D | aes-ce-cipher.c | 165 key_len != AES_KEYSIZE_256) in ce_aes_expandkey() 186 } else if (key_len == AES_KEYSIZE_256) { in ce_aes_expandkey()
|
/linux-4.4.14/include/crypto/ |
D | aes.h | 15 #define AES_KEYSIZE_256 32 macro
|
/linux-4.4.14/arch/arm/crypto/ |
D | aes_glue.c | 40 case AES_KEYSIZE_256: in aes_set_key()
|
D | aes-ce-glue.c | 79 key_len != AES_KEYSIZE_256) in ce_aes_expandkey() 101 } else if (key_len == AES_KEYSIZE_256) { in ce_aes_expandkey()
|
/linux-4.4.14/drivers/crypto/qce/ |
D | common.h | 24 #define QCE_MAX_CIPHER_KEY_SIZE AES_KEYSIZE_256
|
D | ablkcipher.c | 166 case AES_KEYSIZE_256: in qce_ablkcipher_setkey() 206 ctx->enc_keylen != AES_KEYSIZE_256) { in qce_ablkcipher_crypt()
|
D | common.c | 63 else if (aes_key_size == AES_KEYSIZE_256) in qce_encr_cfg() 114 else if (key_size == AES_KEYSIZE_256) in qce_auth_cfg()
|
/linux-4.4.14/drivers/crypto/nx/ |
D | nx-aes-ecb.c | 51 case AES_KEYSIZE_256: in ecb_aes_nx_set_key()
|
D | nx-aes-cbc.c | 51 case AES_KEYSIZE_256: in cbc_aes_nx_set_key()
|
D | nx-aes-ctr.c | 52 case AES_KEYSIZE_256: in ctr_aes_nx_set_key()
|
D | nx-aes-gcm.c | 55 case AES_KEYSIZE_256: in gcm_aes_nx_set_key()
|
/linux-4.4.14/drivers/crypto/ |
D | s5p-sss.c | 387 if (keylen == AES_KEYSIZE_256) in s5p_set_aes() 416 else if (dev->ctx->keylen == AES_KEYSIZE_256) in s5p_aes_crypt_start() 538 keylen != AES_KEYSIZE_256) in s5p_aes_setkey()
|
D | geode-aes.c | 129 if (len != AES_KEYSIZE_192 && len != AES_KEYSIZE_256) { in geode_setkey_cip() 162 if (len != AES_KEYSIZE_192 && len != AES_KEYSIZE_256) { in geode_setkey_blk()
|
D | mv_cesa.c | 187 case AES_KEYSIZE_256: in compute_aes_dec_key() 208 case AES_KEYSIZE_256: in mv_setkey_aes() 295 case AES_KEYSIZE_256: in mv_process_current_q()
|
D | picoxcell_crypto.c | 515 ctx->cipher_key_len != AES_KEYSIZE_256) in spacc_aead_need_fallback() 771 if (len != AES_KEYSIZE_128 && len != AES_KEYSIZE_256 && in spacc_aes_setkey() 784 } else if (len != AES_KEYSIZE_128 && len != AES_KEYSIZE_256 && in spacc_aes_setkey() 833 ctx->key_len != AES_KEYSIZE_256; in spacc_ablk_need_fallback()
|
D | omap-aes.c | 104 u32 key[AES_KEYSIZE_256 / sizeof(u32)]; 749 keylen != AES_KEYSIZE_256) in omap_aes_setkey()
|
D | atmel-aes.c | 86 u32 key[AES_KEYSIZE_256 / sizeof(u32)]; 829 keylen != AES_KEYSIZE_256) { in atmel_aes_setkey()
|
D | mxs-dcp.c | 457 if (len != AES_KEYSIZE_192 && len != AES_KEYSIZE_256) { in mxs_dcp_aes_setkey()
|
D | sahara.c | 617 keylen != AES_KEYSIZE_192 && keylen != AES_KEYSIZE_256) in sahara_aes_setkey()
|
D | n2_core.c | 730 case AES_KEYSIZE_256: in n2_aes_setkey()
|
/linux-4.4.14/crypto/ |
D | aes_generic.c | 1223 key_len != AES_KEYSIZE_256) in crypto_aes_expand_key() 1247 case AES_KEYSIZE_256: in crypto_aes_expand_key()
|
/linux-4.4.14/drivers/crypto/amcc/ |
D | crypto4xx_alg.c | 115 if (keylen != AES_KEYSIZE_256 && in crypto4xx_setkey_aes()
|
/linux-4.4.14/drivers/crypto/ccp/ |
D | ccp-crypto-aes.c | 54 case AES_KEYSIZE_256: in ccp_aes_setkey()
|
D | ccp-crypto-aes-cmac.c | 277 case AES_KEYSIZE_256: in ccp_aes_cmac_setkey()
|
D | ccp-ops.c | 895 (aes->key_len == AES_KEYSIZE_256))) in ccp_run_aes_cmac_cmd() 1048 (aes->key_len == AES_KEYSIZE_256))) in ccp_run_aes_cmd()
|
/linux-4.4.14/arch/sparc/crypto/ |
D | aes_glue.c | 183 case AES_KEYSIZE_256: in aes_set_key()
|
/linux-4.4.14/drivers/crypto/qat/qat_common/ |
D | qat_algs.c | 509 case AES_KEYSIZE_256: in qat_alg_validate_key() 520 case AES_KEYSIZE_256 << 1: in qat_alg_validate_key()
|
/linux-4.4.14/drivers/crypto/ux500/cryp/ |
D | cryp_core.c | 961 case AES_KEYSIZE_256: in aes_ablkcipher_setkey()
|
/linux-4.4.14/arch/x86/crypto/ |
D | aesni-intel_glue.c | 312 key_len != AES_KEYSIZE_256) { in aes_set_key_common()
|