| /OK3568_Linux_fs/external/security/librkcrypto/test/c_mode/ |
| H A D | aes_cmac.c | 28 …unsigned char plain[AES_BLOCK_SIZE] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00… in rk_derive_mac_key() 29 …unsigned char Rb[AES_BLOCK_SIZE] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0… in rk_derive_mac_key() 30 unsigned char c0[AES_BLOCK_SIZE]; in rk_derive_mac_key() 35 rk_left_shift(AES_BLOCK_SIZE, c0, k1); in rk_derive_mac_key() 39 rk_left_shift(AES_BLOCK_SIZE, c0, k1); in rk_derive_mac_key() 40 rk_array_xor(AES_BLOCK_SIZE, k1, Rb, k1); in rk_derive_mac_key() 45 rk_left_shift(AES_BLOCK_SIZE, k1, k2); in rk_derive_mac_key() 49 rk_left_shift(AES_BLOCK_SIZE, k1, k2); in rk_derive_mac_key() 50 rk_array_xor(AES_BLOCK_SIZE, k2, Rb, k2); in rk_derive_mac_key() 57 unsigned char IVtemp[AES_BLOCK_SIZE]; in rk_aes_genarate_cmac() [all …]
|
| H A D | aes_cts.c | 14 for(n=0; n<AES_BLOCK_SIZE && n<len; ++n) in rk_crypto_cbc128_encrypt() 16 for(; n<AES_BLOCK_SIZE; ++n) in rk_crypto_cbc128_encrypt() 20 if (len<=AES_BLOCK_SIZE) break; in rk_crypto_cbc128_encrypt() 21 len -= AES_BLOCK_SIZE; in rk_crypto_cbc128_encrypt() 22 in += AES_BLOCK_SIZE; in rk_crypto_cbc128_encrypt() 23 out += AES_BLOCK_SIZE; in rk_crypto_cbc128_encrypt() 25 memcpy(ivec,iv,AES_BLOCK_SIZE); in rk_crypto_cbc128_encrypt() 33 unsigned char tmp_buf[AES_BLOCK_SIZE]; in rk_crypto_cbc128_decrypt() 39 for(n=0; n<AES_BLOCK_SIZE && n<len; ++n) { in rk_crypto_cbc128_decrypt() 44 if (len<=AES_BLOCK_SIZE) { in rk_crypto_cbc128_decrypt() [all …]
|
| /OK3568_Linux_fs/external/rkwifibt/drivers/rtl8821cs/core/crypto/ |
| H A D | aes-ccm.c | 31 u8 aad_buf[2 * AES_BLOCK_SIZE]; in aes_ccm_auth_start() 32 u8 b[AES_BLOCK_SIZE]; in aes_ccm_auth_start() 40 WPA_PUT_BE16(&b[AES_BLOCK_SIZE - L], plain_len); in aes_ccm_auth_start() 42 wpa_hexdump_key(_MSG_EXCESSIVE_, "CCM B_0", b, AES_BLOCK_SIZE); in aes_ccm_auth_start() 55 if (aad_len > AES_BLOCK_SIZE - 2) { in aes_ccm_auth_start() 56 xor_aes_block(&aad_buf[AES_BLOCK_SIZE], x); in aes_ccm_auth_start() 58 aes_encrypt(aes, &aad_buf[AES_BLOCK_SIZE], x); in aes_ccm_auth_start() 65 size_t last = len % AES_BLOCK_SIZE; in aes_ccm_auth() 68 for (i = 0; i < len / AES_BLOCK_SIZE; i++) { in aes_ccm_auth() 71 data += AES_BLOCK_SIZE; in aes_ccm_auth() [all …]
|
| H A D | aes-siv.c | 16 static const u8 zero[AES_BLOCK_SIZE]; 24 for (i = 0; i < AES_BLOCK_SIZE - 1; i++) in dbl() 26 pad[AES_BLOCK_SIZE - 1] <<= 1; in dbl() 28 pad[AES_BLOCK_SIZE - 1] ^= 0x87; in dbl() 36 for (i = 0; i < AES_BLOCK_SIZE; i++) in xor() 55 os_memset(pad, 0, AES_BLOCK_SIZE); in pad_block() 58 if (len < AES_BLOCK_SIZE) in pad_block() 66 u8 tmp[AES_BLOCK_SIZE], tmp2[AES_BLOCK_SIZE]; in aes_s2v() 75 tmp[AES_BLOCK_SIZE - 1] = 1; in aes_s2v() 96 if (len[i] >= AES_BLOCK_SIZE) { in aes_s2v() [all …]
|
| /OK3568_Linux_fs/kernel/drivers/net/wireless/rockchip_wlan/rtl8821cs/core/crypto/ |
| H A D | aes-ccm.c | 32 u8 aad_buf[2 * AES_BLOCK_SIZE]; in aes_ccm_auth_start() 33 u8 b[AES_BLOCK_SIZE]; in aes_ccm_auth_start() 41 WPA_PUT_BE16(&b[AES_BLOCK_SIZE - L], plain_len); in aes_ccm_auth_start() 43 wpa_hexdump_key(_MSG_EXCESSIVE_, "CCM B_0", b, AES_BLOCK_SIZE); in aes_ccm_auth_start() 56 if (aad_len > AES_BLOCK_SIZE - 2) { in aes_ccm_auth_start() 57 xor_aes_block(&aad_buf[AES_BLOCK_SIZE], x); in aes_ccm_auth_start() 59 aes_encrypt(aes, &aad_buf[AES_BLOCK_SIZE], x); in aes_ccm_auth_start() 66 size_t last = len % AES_BLOCK_SIZE; in aes_ccm_auth() 69 for (i = 0; i < len / AES_BLOCK_SIZE; i++) { in aes_ccm_auth() 72 data += AES_BLOCK_SIZE; in aes_ccm_auth() [all …]
|
| H A D | aes-siv.c | 17 static const u8 zero[AES_BLOCK_SIZE]; 25 for (i = 0; i < AES_BLOCK_SIZE - 1; i++) in dbl() 27 pad[AES_BLOCK_SIZE - 1] <<= 1; in dbl() 29 pad[AES_BLOCK_SIZE - 1] ^= 0x87; in dbl() 37 for (i = 0; i < AES_BLOCK_SIZE; i++) in xor() 56 os_memset(pad, 0, AES_BLOCK_SIZE); in pad_block() 59 if (len < AES_BLOCK_SIZE) in pad_block() 67 u8 tmp[AES_BLOCK_SIZE], tmp2[AES_BLOCK_SIZE]; in aes_s2v() 76 tmp[AES_BLOCK_SIZE - 1] = 1; in aes_s2v() 97 if (len[i] >= AES_BLOCK_SIZE) { in aes_s2v() [all …]
|
| /OK3568_Linux_fs/kernel/drivers/net/wireless/rockchip_wlan/rtl8723ds/core/crypto/ |
| H A D | aes-ccm.c | 32 u8 aad_buf[2 * AES_BLOCK_SIZE]; in aes_ccm_auth_start() 33 u8 b[AES_BLOCK_SIZE]; in aes_ccm_auth_start() 41 WPA_PUT_BE16(&b[AES_BLOCK_SIZE - L], plain_len); in aes_ccm_auth_start() 43 wpa_hexdump_key(_MSG_EXCESSIVE_, "CCM B_0", b, AES_BLOCK_SIZE); in aes_ccm_auth_start() 56 if (aad_len > AES_BLOCK_SIZE - 2) { in aes_ccm_auth_start() 57 xor_aes_block(&aad_buf[AES_BLOCK_SIZE], x); in aes_ccm_auth_start() 59 aes_encrypt(aes, &aad_buf[AES_BLOCK_SIZE], x); in aes_ccm_auth_start() 66 size_t last = len % AES_BLOCK_SIZE; in aes_ccm_auth() 69 for (i = 0; i < len / AES_BLOCK_SIZE; i++) { in aes_ccm_auth() 72 data += AES_BLOCK_SIZE; in aes_ccm_auth() [all …]
|
| H A D | aes-siv.c | 17 static const u8 zero[AES_BLOCK_SIZE]; 25 for (i = 0; i < AES_BLOCK_SIZE - 1; i++) in dbl() 27 pad[AES_BLOCK_SIZE - 1] <<= 1; in dbl() 29 pad[AES_BLOCK_SIZE - 1] ^= 0x87; in dbl() 37 for (i = 0; i < AES_BLOCK_SIZE; i++) in xor() 56 os_memset(pad, 0, AES_BLOCK_SIZE); in pad_block() 59 if (len < AES_BLOCK_SIZE) in pad_block() 67 u8 tmp[AES_BLOCK_SIZE], tmp2[AES_BLOCK_SIZE]; in aes_s2v() 76 tmp[AES_BLOCK_SIZE - 1] = 1; in aes_s2v() 97 if (len[i] >= AES_BLOCK_SIZE) { in aes_s2v() [all …]
|
| /OK3568_Linux_fs/kernel/drivers/net/wireless/rockchip_wlan/rtl8723cs/core/crypto/ |
| H A D | aes-ccm.c | 31 u8 aad_buf[2 * AES_BLOCK_SIZE]; in aes_ccm_auth_start() 32 u8 b[AES_BLOCK_SIZE]; in aes_ccm_auth_start() 40 WPA_PUT_BE16(&b[AES_BLOCK_SIZE - L], plain_len); in aes_ccm_auth_start() 42 wpa_hexdump_key(_MSG_EXCESSIVE_, "CCM B_0", b, AES_BLOCK_SIZE); in aes_ccm_auth_start() 55 if (aad_len > AES_BLOCK_SIZE - 2) { in aes_ccm_auth_start() 56 xor_aes_block(&aad_buf[AES_BLOCK_SIZE], x); in aes_ccm_auth_start() 58 aes_encrypt(aes, &aad_buf[AES_BLOCK_SIZE], x); in aes_ccm_auth_start() 65 size_t last = len % AES_BLOCK_SIZE; in aes_ccm_auth() 68 for (i = 0; i < len / AES_BLOCK_SIZE; i++) { in aes_ccm_auth() 71 data += AES_BLOCK_SIZE; in aes_ccm_auth() [all …]
|
| H A D | aes-siv.c | 16 static const u8 zero[AES_BLOCK_SIZE]; 24 for (i = 0; i < AES_BLOCK_SIZE - 1; i++) in dbl() 26 pad[AES_BLOCK_SIZE - 1] <<= 1; in dbl() 28 pad[AES_BLOCK_SIZE - 1] ^= 0x87; in dbl() 36 for (i = 0; i < AES_BLOCK_SIZE; i++) in xor() 55 os_memset(pad, 0, AES_BLOCK_SIZE); in pad_block() 58 if (len < AES_BLOCK_SIZE) in pad_block() 66 u8 tmp[AES_BLOCK_SIZE], tmp2[AES_BLOCK_SIZE]; in aes_s2v() 75 tmp[AES_BLOCK_SIZE - 1] = 1; in aes_s2v() 96 if (len[i] >= AES_BLOCK_SIZE) { in aes_s2v() [all …]
|
| /OK3568_Linux_fs/external/rkwifibt/drivers/rtl8852be/core/crypto/ |
| H A D | aes-ccm.c | 31 u8 aad_buf[2 * AES_BLOCK_SIZE]; in aes_ccm_auth_start() 32 u8 b[AES_BLOCK_SIZE]; in aes_ccm_auth_start() 40 WPA_PUT_BE16(&b[AES_BLOCK_SIZE - L], plain_len); in aes_ccm_auth_start() 42 wpa_hexdump_key(_MSG_EXCESSIVE_, "CCM B_0", b, AES_BLOCK_SIZE); in aes_ccm_auth_start() 55 if (aad_len > AES_BLOCK_SIZE - 2) { in aes_ccm_auth_start() 56 xor_aes_block(&aad_buf[AES_BLOCK_SIZE], x); in aes_ccm_auth_start() 58 aes_encrypt(aes, &aad_buf[AES_BLOCK_SIZE], x); in aes_ccm_auth_start() 65 size_t last = len % AES_BLOCK_SIZE; in aes_ccm_auth() 68 for (i = 0; i < len / AES_BLOCK_SIZE; i++) { in aes_ccm_auth() 71 data += AES_BLOCK_SIZE; in aes_ccm_auth() [all …]
|
| H A D | aes-siv.c | 16 static const u8 zero[AES_BLOCK_SIZE]; 24 for (i = 0; i < AES_BLOCK_SIZE - 1; i++) in dbl() 26 pad[AES_BLOCK_SIZE - 1] <<= 1; in dbl() 28 pad[AES_BLOCK_SIZE - 1] ^= 0x87; in dbl() 36 for (i = 0; i < AES_BLOCK_SIZE; i++) in xor() 55 os_memset(pad, 0, AES_BLOCK_SIZE); in pad_block() 58 if (len < AES_BLOCK_SIZE) in pad_block() 66 u8 tmp[AES_BLOCK_SIZE], tmp2[AES_BLOCK_SIZE]; in aes_s2v() 75 tmp[AES_BLOCK_SIZE - 1] = 1; in aes_s2v() 96 if (len[i] >= AES_BLOCK_SIZE) { in aes_s2v() [all …]
|
| /OK3568_Linux_fs/external/rkwifibt/drivers/rtl8822cs/core/crypto/ |
| H A D | aes-ccm.c | 31 u8 aad_buf[2 * AES_BLOCK_SIZE]; in aes_ccm_auth_start() 32 u8 b[AES_BLOCK_SIZE]; in aes_ccm_auth_start() 40 WPA_PUT_BE16(&b[AES_BLOCK_SIZE - L], plain_len); in aes_ccm_auth_start() 42 wpa_hexdump_key(_MSG_EXCESSIVE_, "CCM B_0", b, AES_BLOCK_SIZE); in aes_ccm_auth_start() 55 if (aad_len > AES_BLOCK_SIZE - 2) { in aes_ccm_auth_start() 56 xor_aes_block(&aad_buf[AES_BLOCK_SIZE], x); in aes_ccm_auth_start() 58 aes_encrypt(aes, &aad_buf[AES_BLOCK_SIZE], x); in aes_ccm_auth_start() 65 size_t last = len % AES_BLOCK_SIZE; in aes_ccm_auth() 68 for (i = 0; i < len / AES_BLOCK_SIZE; i++) { in aes_ccm_auth() 71 data += AES_BLOCK_SIZE; in aes_ccm_auth() [all …]
|
| H A D | aes-siv.c | 16 static const u8 zero[AES_BLOCK_SIZE]; 24 for (i = 0; i < AES_BLOCK_SIZE - 1; i++) in dbl() 26 pad[AES_BLOCK_SIZE - 1] <<= 1; in dbl() 28 pad[AES_BLOCK_SIZE - 1] ^= 0x87; in dbl() 36 for (i = 0; i < AES_BLOCK_SIZE; i++) in xor() 55 os_memset(pad, 0, AES_BLOCK_SIZE); in pad_block() 58 if (len < AES_BLOCK_SIZE) in pad_block() 66 u8 tmp[AES_BLOCK_SIZE], tmp2[AES_BLOCK_SIZE]; in aes_s2v() 75 tmp[AES_BLOCK_SIZE - 1] = 1; in aes_s2v() 96 if (len[i] >= AES_BLOCK_SIZE) { in aes_s2v() [all …]
|
| /OK3568_Linux_fs/external/rkwifibt/drivers/rtl8723ds/core/crypto/ |
| H A D | aes-ccm.c | 31 u8 aad_buf[2 * AES_BLOCK_SIZE]; in aes_ccm_auth_start() 32 u8 b[AES_BLOCK_SIZE]; in aes_ccm_auth_start() 40 WPA_PUT_BE16(&b[AES_BLOCK_SIZE - L], plain_len); in aes_ccm_auth_start() 42 wpa_hexdump_key(_MSG_EXCESSIVE_, "CCM B_0", b, AES_BLOCK_SIZE); in aes_ccm_auth_start() 55 if (aad_len > AES_BLOCK_SIZE - 2) { in aes_ccm_auth_start() 56 xor_aes_block(&aad_buf[AES_BLOCK_SIZE], x); in aes_ccm_auth_start() 58 aes_encrypt(aes, &aad_buf[AES_BLOCK_SIZE], x); in aes_ccm_auth_start() 65 size_t last = len % AES_BLOCK_SIZE; in aes_ccm_auth() 68 for (i = 0; i < len / AES_BLOCK_SIZE; i++) { in aes_ccm_auth() 71 data += AES_BLOCK_SIZE; in aes_ccm_auth() [all …]
|
| H A D | aes-siv.c | 16 static const u8 zero[AES_BLOCK_SIZE]; 24 for (i = 0; i < AES_BLOCK_SIZE - 1; i++) in dbl() 26 pad[AES_BLOCK_SIZE - 1] <<= 1; in dbl() 28 pad[AES_BLOCK_SIZE - 1] ^= 0x87; in dbl() 36 for (i = 0; i < AES_BLOCK_SIZE; i++) in xor() 55 os_memset(pad, 0, AES_BLOCK_SIZE); in pad_block() 58 if (len < AES_BLOCK_SIZE) in pad_block() 66 u8 tmp[AES_BLOCK_SIZE], tmp2[AES_BLOCK_SIZE]; in aes_s2v() 75 tmp[AES_BLOCK_SIZE - 1] = 1; in aes_s2v() 96 if (len[i] >= AES_BLOCK_SIZE) { in aes_s2v() [all …]
|
| /OK3568_Linux_fs/external/rkwifibt/drivers/rtl8852bs/core/crypto/ |
| H A D | aes-ccm.c | 31 u8 aad_buf[2 * AES_BLOCK_SIZE]; in aes_ccm_auth_start() 32 u8 b[AES_BLOCK_SIZE]; in aes_ccm_auth_start() 40 WPA_PUT_BE16(&b[AES_BLOCK_SIZE - L], plain_len); in aes_ccm_auth_start() 42 wpa_hexdump_key(_MSG_EXCESSIVE_, "CCM B_0", b, AES_BLOCK_SIZE); in aes_ccm_auth_start() 55 if (aad_len > AES_BLOCK_SIZE - 2) { in aes_ccm_auth_start() 56 xor_aes_block(&aad_buf[AES_BLOCK_SIZE], x); in aes_ccm_auth_start() 58 aes_encrypt(aes, &aad_buf[AES_BLOCK_SIZE], x); in aes_ccm_auth_start() 65 size_t last = len % AES_BLOCK_SIZE; in aes_ccm_auth() 68 for (i = 0; i < len / AES_BLOCK_SIZE; i++) { in aes_ccm_auth() 71 data += AES_BLOCK_SIZE; in aes_ccm_auth() [all …]
|
| H A D | aes-siv.c | 16 static const u8 zero[AES_BLOCK_SIZE]; 24 for (i = 0; i < AES_BLOCK_SIZE - 1; i++) in dbl() 26 pad[AES_BLOCK_SIZE - 1] <<= 1; in dbl() 28 pad[AES_BLOCK_SIZE - 1] ^= 0x87; in dbl() 36 for (i = 0; i < AES_BLOCK_SIZE; i++) in xor() 55 os_memset(pad, 0, AES_BLOCK_SIZE); in pad_block() 58 if (len < AES_BLOCK_SIZE) in pad_block() 66 u8 tmp[AES_BLOCK_SIZE], tmp2[AES_BLOCK_SIZE]; in aes_s2v() 75 tmp[AES_BLOCK_SIZE - 1] = 1; in aes_s2v() 96 if (len[i] >= AES_BLOCK_SIZE) { in aes_s2v() [all …]
|
| /OK3568_Linux_fs/external/rkwifibt/drivers/rtl8188fu/core/crypto/ |
| H A D | aes-ccm.c | 31 u8 aad_buf[2 * AES_BLOCK_SIZE]; in aes_ccm_auth_start() 32 u8 b[AES_BLOCK_SIZE]; in aes_ccm_auth_start() 40 WPA_PUT_BE16(&b[AES_BLOCK_SIZE - L], plain_len); in aes_ccm_auth_start() 42 wpa_hexdump_key(_MSG_EXCESSIVE_, "CCM B_0", b, AES_BLOCK_SIZE); in aes_ccm_auth_start() 55 if (aad_len > AES_BLOCK_SIZE - 2) { in aes_ccm_auth_start() 56 xor_aes_block(&aad_buf[AES_BLOCK_SIZE], x); in aes_ccm_auth_start() 58 aes_encrypt(aes, &aad_buf[AES_BLOCK_SIZE], x); in aes_ccm_auth_start() 65 size_t last = len % AES_BLOCK_SIZE; in aes_ccm_auth() 68 for (i = 0; i < len / AES_BLOCK_SIZE; i++) { in aes_ccm_auth() 71 data += AES_BLOCK_SIZE; in aes_ccm_auth() [all …]
|
| H A D | aes-siv.c | 16 static const u8 zero[AES_BLOCK_SIZE]; 24 for (i = 0; i < AES_BLOCK_SIZE - 1; i++) in dbl() 26 pad[AES_BLOCK_SIZE - 1] <<= 1; in dbl() 28 pad[AES_BLOCK_SIZE - 1] ^= 0x87; in dbl() 36 for (i = 0; i < AES_BLOCK_SIZE; i++) in xor() 55 os_memset(pad, 0, AES_BLOCK_SIZE); in pad_block() 58 if (len < AES_BLOCK_SIZE) in pad_block() 66 u8 tmp[AES_BLOCK_SIZE], tmp2[AES_BLOCK_SIZE]; in aes_s2v() 75 tmp[AES_BLOCK_SIZE - 1] = 1; in aes_s2v() 96 if (len[i] >= AES_BLOCK_SIZE) { in aes_s2v() [all …]
|
| /OK3568_Linux_fs/external/rkwifibt/drivers/rtl8189fs/core/crypto/ |
| H A D | aes-ccm.c | 31 u8 aad_buf[2 * AES_BLOCK_SIZE]; in aes_ccm_auth_start() 32 u8 b[AES_BLOCK_SIZE]; in aes_ccm_auth_start() 40 WPA_PUT_BE16(&b[AES_BLOCK_SIZE - L], plain_len); in aes_ccm_auth_start() 42 wpa_hexdump_key(_MSG_EXCESSIVE_, "CCM B_0", b, AES_BLOCK_SIZE); in aes_ccm_auth_start() 55 if (aad_len > AES_BLOCK_SIZE - 2) { in aes_ccm_auth_start() 56 xor_aes_block(&aad_buf[AES_BLOCK_SIZE], x); in aes_ccm_auth_start() 58 aes_encrypt(aes, &aad_buf[AES_BLOCK_SIZE], x); in aes_ccm_auth_start() 65 size_t last = len % AES_BLOCK_SIZE; in aes_ccm_auth() 68 for (i = 0; i < len / AES_BLOCK_SIZE; i++) { in aes_ccm_auth() 71 data += AES_BLOCK_SIZE; in aes_ccm_auth() [all …]
|
| H A D | aes-siv.c | 16 static const u8 zero[AES_BLOCK_SIZE]; 24 for (i = 0; i < AES_BLOCK_SIZE - 1; i++) in dbl() 26 pad[AES_BLOCK_SIZE - 1] <<= 1; in dbl() 28 pad[AES_BLOCK_SIZE - 1] ^= 0x87; in dbl() 36 for (i = 0; i < AES_BLOCK_SIZE; i++) in xor() 55 os_memset(pad, 0, AES_BLOCK_SIZE); in pad_block() 58 if (len < AES_BLOCK_SIZE) in pad_block() 66 u8 tmp[AES_BLOCK_SIZE], tmp2[AES_BLOCK_SIZE]; in aes_s2v() 75 tmp[AES_BLOCK_SIZE - 1] = 1; in aes_s2v() 96 if (len[i] >= AES_BLOCK_SIZE) { in aes_s2v() [all …]
|
| /OK3568_Linux_fs/kernel/arch/arm64/crypto/ |
| H A D | aes-glue.c | 128 u8 dg[AES_BLOCK_SIZE]; 183 while ((blocks = (walk.nbytes / AES_BLOCK_SIZE))) { in ecb_encrypt() 188 err = skcipher_walk_done(&walk, walk.nbytes % AES_BLOCK_SIZE); in ecb_encrypt() 203 while ((blocks = (walk.nbytes / AES_BLOCK_SIZE))) { in ecb_decrypt() 208 err = skcipher_walk_done(&walk, walk.nbytes % AES_BLOCK_SIZE); in ecb_decrypt() 221 while ((blocks = (walk->nbytes / AES_BLOCK_SIZE))) { in cbc_encrypt_walk() 226 err = skcipher_walk_done(walk, walk->nbytes % AES_BLOCK_SIZE); in cbc_encrypt_walk() 250 while ((blocks = (walk->nbytes / AES_BLOCK_SIZE))) { in cbc_decrypt_walk() 255 err = skcipher_walk_done(walk, walk->nbytes % AES_BLOCK_SIZE); in cbc_decrypt_walk() 276 int cbc_blocks = DIV_ROUND_UP(req->cryptlen, AES_BLOCK_SIZE) - 2; in cts_cbc_encrypt() [all …]
|
| H A D | aes-neonbs-glue.c | 57 u8 rk[13 * (8 * AES_BLOCK_SIZE) + 32]; 59 } __aligned(AES_BLOCK_SIZE); 103 while (walk.nbytes >= AES_BLOCK_SIZE) { in __ecb_crypt() 104 unsigned int blocks = walk.nbytes / AES_BLOCK_SIZE; in __ecb_crypt() 108 walk.stride / AES_BLOCK_SIZE); in __ecb_crypt() 115 walk.nbytes - blocks * AES_BLOCK_SIZE); in __ecb_crypt() 163 while (walk.nbytes >= AES_BLOCK_SIZE) { in cbc_encrypt() 164 unsigned int blocks = walk.nbytes / AES_BLOCK_SIZE; in cbc_encrypt() 172 err = skcipher_walk_done(&walk, walk.nbytes % AES_BLOCK_SIZE); in cbc_encrypt() 186 while (walk.nbytes >= AES_BLOCK_SIZE) { in cbc_decrypt() [all …]
|
| /OK3568_Linux_fs/kernel/arch/arm/crypto/ |
| H A D | aes-neonbs-glue.c | 49 u8 rk[13 * (8 * AES_BLOCK_SIZE) + 32] __aligned(AES_BLOCK_SIZE); 99 while (walk.nbytes >= AES_BLOCK_SIZE) { in __ecb_crypt() 100 unsigned int blocks = walk.nbytes / AES_BLOCK_SIZE; in __ecb_crypt() 104 walk.stride / AES_BLOCK_SIZE); in __ecb_crypt() 111 walk.nbytes - blocks * AES_BLOCK_SIZE); in __ecb_crypt() 173 while (walk.nbytes >= AES_BLOCK_SIZE) { in cbc_decrypt() 174 unsigned int blocks = walk.nbytes / AES_BLOCK_SIZE; in cbc_decrypt() 178 walk.stride / AES_BLOCK_SIZE); in cbc_decrypt() 186 walk.nbytes - blocks * AES_BLOCK_SIZE); in cbc_decrypt() 240 u8 buf[AES_BLOCK_SIZE]; in ctr_encrypt() [all …]
|