/linux-4.1.27/drivers/crypto/ |
D | geode-aes.c | 124 if (len == AES_KEYSIZE_128) { in geode_setkey_cip() 157 if (len == AES_KEYSIZE_128) { in geode_setkey_blk() 220 if (unlikely(op->keylen != AES_KEYSIZE_128)) { in geode_encrypt() 241 if (unlikely(op->keylen != AES_KEYSIZE_128)) { in geode_decrypt() 312 if (unlikely(op->keylen != AES_KEYSIZE_128)) in geode_cbc_decrypt() 344 if (unlikely(op->keylen != AES_KEYSIZE_128)) in geode_cbc_encrypt() 425 if (unlikely(op->keylen != AES_KEYSIZE_128)) in geode_ecb_decrypt() 455 if (unlikely(op->keylen != AES_KEYSIZE_128)) in geode_ecb_encrypt()
|
D | mxs-dcp.c | 52 uint8_t aes_key[2 * AES_KEYSIZE_128]; 89 uint8_t key[AES_KEYSIZE_128]; 205 2 * AES_KEYSIZE_128, in mxs_dcp_run_aes() 241 dma_unmap_single(sdcp->dev, key_phys, 2 * AES_KEYSIZE_128, in mxs_dcp_run_aes() 282 memcpy(key + AES_KEYSIZE_128, req->info, AES_KEYSIZE_128); in mxs_dcp_aes_block_crypt() 286 memset(key + AES_KEYSIZE_128, 0, AES_KEYSIZE_128); in mxs_dcp_aes_block_crypt() 403 if (unlikely(actx->key_len != AES_KEYSIZE_128)) in mxs_dcp_aes_enqueue() 451 if (len == AES_KEYSIZE_128) { in mxs_dcp_aes_setkey()
|
D | sahara.c | 152 u8 key[AES_KEYSIZE_128]; 601 memcpy(dev->iv_base, req->info, AES_KEYSIZE_128); in sahara_aes_process() 636 if (keylen == AES_KEYSIZE_128) { in sahara_aes_setkey() 642 if (keylen != AES_KEYSIZE_128 && in sahara_aes_setkey() 698 if (unlikely(ctx->keylen != AES_KEYSIZE_128)) { in sahara_aes_ecb_encrypt() 716 if (unlikely(ctx->keylen != AES_KEYSIZE_128)) { in sahara_aes_ecb_decrypt() 734 if (unlikely(ctx->keylen != AES_KEYSIZE_128)) { in sahara_aes_cbc_encrypt() 752 if (unlikely(ctx->keylen != AES_KEYSIZE_128)) { in sahara_aes_cbc_decrypt() 1531 dev->key_base = dma_alloc_coherent(&pdev->dev, 2 * AES_KEYSIZE_128, in sahara_probe() 1538 dev->iv_base = dev->key_base + AES_KEYSIZE_128; in sahara_probe() [all …]
|
D | geode-aes.h | 63 u8 key[AES_KEYSIZE_128];
|
D | picoxcell_crypto.c | 476 if (len != AES_KEYSIZE_128 && len != AES_KEYSIZE_256) { in spacc_aead_aes_setkey() 559 ctx->cipher_key_len != AES_KEYSIZE_128 && in spacc_aead_need_fallback() 860 if (len != AES_KEYSIZE_128 && len != AES_KEYSIZE_256 && in spacc_aes_setkey() 873 } else if (len != AES_KEYSIZE_128 && len != AES_KEYSIZE_256 && in spacc_aes_setkey() 921 ctx->key_len != AES_KEYSIZE_128 && in spacc_ablk_need_fallback()
|
D | mv_cesa.c | 201 case AES_KEYSIZE_128: in mv_setkey_aes() 284 case AES_KEYSIZE_128: in mv_process_current_q()
|
D | s5p-sss.c | 554 if (keylen != AES_KEYSIZE_128 && in s5p_aes_setkey()
|
D | atmel-aes.c | 507 if (dd->ctx->keylen == AES_KEYSIZE_128) in atmel_aes_write_ctrl() 828 if (keylen != AES_KEYSIZE_128 && keylen != AES_KEYSIZE_192 && in atmel_aes_setkey()
|
D | omap-aes.c | 750 if (keylen != AES_KEYSIZE_128 && keylen != AES_KEYSIZE_192 && in omap_aes_setkey()
|
D | n2_core.c | 724 case AES_KEYSIZE_128: in n2_aes_setkey()
|
/linux-4.1.27/arch/powerpc/crypto/ |
D | aes-spe-glue.c | 97 if (key_len != AES_KEYSIZE_128 && in ppc_aes_setkey() 105 case AES_KEYSIZE_128: in ppc_aes_setkey() 131 if (key_len != AES_KEYSIZE_128 && in ppc_xts_setkey() 139 case AES_KEYSIZE_128: in ppc_xts_setkey() 142 ppc_expand_key_128(ctx->key_twk, in_key + AES_KEYSIZE_128); in ppc_xts_setkey()
|
/linux-4.1.27/include/crypto/ |
D | aes.h | 13 #define AES_KEYSIZE_128 16 macro
|
/linux-4.1.27/arch/arm/crypto/ |
D | aes_glue.c | 34 case AES_KEYSIZE_128: in aes_set_key()
|
D | aes-ce-glue.c | 77 if (key_len != AES_KEYSIZE_128 && in ce_aes_expandkey()
|
/linux-4.1.27/drivers/crypto/ccp/ |
D | ccp-crypto-aes-xts.c | 106 case AES_KEYSIZE_128 * 2: in ccp_aes_xts_setkey() 148 (ctx->u.aes.key_len != AES_KEYSIZE_128)) { in ccp_aes_xts_crypt()
|
D | ccp-crypto-aes.c | 48 case AES_KEYSIZE_128: in ccp_aes_setkey()
|
D | ccp-ops.c | 889 if (!((aes->key_len == AES_KEYSIZE_128) || in ccp_run_aes_cmac_cmd() 1042 if (!((aes->key_len == AES_KEYSIZE_128) || in ccp_run_aes_cmd() 1229 if (xts->key_len != AES_KEYSIZE_128) in ccp_run_xts_aes_cmd() 1265 dm_offset = CCP_KSB_BYTES - AES_KEYSIZE_128; in ccp_run_xts_aes_cmd()
|
D | ccp-crypto-aes-cmac.c | 253 case AES_KEYSIZE_128: in ccp_aes_cmac_setkey()
|
/linux-4.1.27/arch/x86/crypto/ |
D | aesni-intel_glue.c | 187 if ((plaintext_len < AVX_GEN2_OPTSIZE) || (aes_ctx-> key_length != AES_KEYSIZE_128)){ in aesni_gcm_enc_avx() 203 if ((ciphertext_len < AVX_GEN2_OPTSIZE) || (aes_ctx-> key_length != AES_KEYSIZE_128)) { in aesni_gcm_dec_avx() 238 if ((plaintext_len < AVX_GEN2_OPTSIZE) || (aes_ctx-> key_length != AES_KEYSIZE_128)) { in aesni_gcm_enc_avx2() 258 if ((ciphertext_len < AVX_GEN2_OPTSIZE) || (aes_ctx-> key_length != AES_KEYSIZE_128)) { in aesni_gcm_dec_avx2() 310 if (key_len != AES_KEYSIZE_128 && key_len != AES_KEYSIZE_192 && in aes_set_key_common() 495 if (ctx->key_length == AES_KEYSIZE_128) in aesni_ctr_enc_avx_tfm() 909 if (key_len != AES_KEYSIZE_128 && key_len != AES_KEYSIZE_192 && in common_rfc4106_set_key() 1021 if (unlikely(key_len != AES_KEYSIZE_128 && in __driver_rfc4106_encrypt() 1106 if (unlikely(key_len != AES_KEYSIZE_128 && in __driver_rfc4106_decrypt()
|
/linux-4.1.27/drivers/crypto/nx/ |
D | nx-aes-cbc.c | 43 case AES_KEYSIZE_128: in cbc_aes_nx_set_key()
|
D | nx-aes-ecb.c | 43 case AES_KEYSIZE_128: in ecb_aes_nx_set_key()
|
D | nx-aes-ctr.c | 44 case AES_KEYSIZE_128: in ctr_aes_nx_set_key()
|
D | nx-aes-xcbc.c | 48 case AES_KEYSIZE_128: in nx_xcbc_set_key()
|
D | nx-aes-gcm.c | 46 case AES_KEYSIZE_128: in gcm_aes_nx_set_key()
|
D | nx-aes-ccm.c | 46 case AES_KEYSIZE_128: in ccm_aes_nx_set_key()
|
/linux-4.1.27/arch/arm64/crypto/ |
D | aes-ce-cipher.c | 163 if (key_len != AES_KEYSIZE_128 && in ce_aes_expandkey()
|
/linux-4.1.27/drivers/crypto/qce/ |
D | ablkcipher.c | 175 case AES_KEYSIZE_128: in qce_ablkcipher_setkey() 215 if (IS_AES(rctx->flags) && ctx->enc_keylen != AES_KEYSIZE_128 && in qce_ablkcipher_crypt()
|
D | common.c | 61 if (aes_key_size == AES_KEYSIZE_128) in qce_encr_cfg() 112 if (key_size == AES_KEYSIZE_128) in qce_auth_cfg()
|
D | sha.c | 92 rctx->authklen = AES_KEYSIZE_128; in qce_ahash_async_req_handle()
|
/linux-4.1.27/crypto/ |
D | aes_generic.c | 1222 if (key_len != AES_KEYSIZE_128 && key_len != AES_KEYSIZE_192 && in crypto_aes_expand_key() 1234 case AES_KEYSIZE_128: in crypto_aes_expand_key()
|
/linux-4.1.27/drivers/crypto/amcc/ |
D | crypto4xx_alg.c | 116 keylen != AES_KEYSIZE_192 && keylen != AES_KEYSIZE_128) { in crypto4xx_setkey_aes()
|
/linux-4.1.27/arch/sparc/crypto/ |
D | aes_glue.c | 173 case AES_KEYSIZE_128: in aes_set_key()
|
/linux-4.1.27/drivers/crypto/qat/qat_common/ |
D | qat_algs.c | 503 case AES_KEYSIZE_128: in qat_alg_validate_key()
|
/linux-4.1.27/drivers/crypto/ux500/cryp/ |
D | cryp_core.c | 953 case AES_KEYSIZE_128: in aes_ablkcipher_setkey()
|