| /linux/net/tipc/ |
| H A D | crypto.c | 206 struct tipc_aead __rcu *aead[KEY_MAX + 1]; member 240 struct tipc_aead *aead; member 247 struct tipc_aead *aead; member 251 static struct tipc_aead *tipc_aead_get(struct tipc_aead __rcu *aead); 252 static inline void tipc_aead_put(struct tipc_aead *aead); 254 static int tipc_aead_users(struct tipc_aead __rcu *aead); 255 static void tipc_aead_users_inc(struct tipc_aead __rcu *aead, int lim); 256 static void tipc_aead_users_dec(struct tipc_aead __rcu *aead, int lim); 257 static void tipc_aead_users_set(struct tipc_aead __rcu *aead, int val); 258 static struct crypto_aead *tipc_aead_tfm_next(struct tipc_aead *aead); [all …]
|
| /linux/crypto/ |
| H A D | aead.c | 86 struct crypto_aead *aead = crypto_aead_reqtfm(req); in crypto_aead_encrypt() local 88 if (crypto_aead_get_flags(aead) & CRYPTO_TFM_NEED_KEY) in crypto_aead_encrypt() 91 return crypto_aead_alg(aead)->encrypt(req); in crypto_aead_encrypt() 97 struct crypto_aead *aead = crypto_aead_reqtfm(req); in crypto_aead_decrypt() local 99 if (crypto_aead_get_flags(aead) & CRYPTO_TFM_NEED_KEY) in crypto_aead_decrypt() 102 if (req->cryptlen < crypto_aead_authsize(aead)) in crypto_aead_decrypt() 105 return crypto_aead_alg(aead)->decrypt(req); in crypto_aead_decrypt() 111 struct crypto_aead *aead = __crypto_aead_cast(tfm); in crypto_aead_exit_tfm() local 112 struct aead_alg *alg = crypto_aead_alg(aead); in crypto_aead_exit_tfm() 114 alg->exit(aead); in crypto_aead_exit_tfm() [all …]
|
| H A D | essiv.c | 53 struct crypto_aead *aead; member 102 crypto_aead_clear_flags(tctx->u.aead, CRYPTO_TFM_REQ_MASK); in essiv_aead_setkey() 103 crypto_aead_set_flags(tctx->u.aead, crypto_aead_get_flags(tfm) & in essiv_aead_setkey() 105 err = crypto_aead_setkey(tctx->u.aead, key, keylen); in essiv_aead_setkey() 131 return crypto_aead_setauthsize(tctx->u.aead, authsize); in essiv_aead_setauthsize() 244 aead_request_set_tfm(subreq, tctx->u.aead); in essiv_aead_crypt() 325 struct crypto_aead *aead; in essiv_aead_init_tfm() local 332 aead = crypto_spawn_aead(&ictx->u.aead_spawn); in essiv_aead_init_tfm() 333 if (IS_ERR(aead)) in essiv_aead_init_tfm() 334 return PTR_ERR(aead); in essiv_aead_init_tfm() [all …]
|
| H A D | testmgr.c | 148 struct aead_test_suite aead; member 2438 &ctx->test_desc->suite.aead, in try_to_generate_inauthentic_testvec() 2560 &ctx->test_desc->suite.aead, in test_aead_vs_generic_impl() 2611 for (i = 0; i < test_desc->suite.aead.count; i++) in test_aead_slow() 2613 test_desc->suite.aead.vecs[i].klen); in test_aead_slow() 2660 const struct aead_test_suite *suite = &desc->suite.aead; in alg_test_aead() 4080 .aead = __VECS(aegis128_tv_template) 4087 .aead = __VECS(hmac_md5_ecb_cipher_null_tv_template) 4095 .aead = __VECS(hmac_sha1_aes_cbc_tv_temp) 4102 .aead = __VECS(hmac_sha1_des_cbc_tv_temp) [all …]
|
| /linux/drivers/crypto/caam/ |
| H A D | caamalg.c | 104 struct aead_engine_alg aead; member 146 static int aead_null_set_sh_desc(struct crypto_aead *aead) in aead_null_set_sh_desc() argument 148 struct caam_ctx *ctx = crypto_aead_ctx_dma(aead); in aead_null_set_sh_desc() 196 static int aead_set_sh_desc(struct crypto_aead *aead) in aead_set_sh_desc() argument 198 struct caam_aead_alg *alg = container_of(crypto_aead_alg(aead), in aead_set_sh_desc() 200 aead.base); in aead_set_sh_desc() 201 unsigned int ivsize = crypto_aead_ivsize(aead); in aead_set_sh_desc() 202 struct caam_ctx *ctx = crypto_aead_ctx_dma(aead); in aead_set_sh_desc() 218 return aead_null_set_sh_desc(aead); in aead_set_sh_desc() 338 static int gcm_set_sh_desc(struct crypto_aead *aead) in gcm_set_sh_desc() argument [all …]
|
| H A D | caamalg_qi.c | 50 struct aead_alg aead; member 85 static int aead_set_sh_desc(struct crypto_aead *aead) in aead_set_sh_desc() argument 87 struct caam_aead_alg *alg = container_of(crypto_aead_alg(aead), in aead_set_sh_desc() 88 typeof(*alg), aead); in aead_set_sh_desc() 89 struct caam_ctx *ctx = crypto_aead_ctx_dma(aead); in aead_set_sh_desc() 90 unsigned int ivsize = crypto_aead_ivsize(aead); in aead_set_sh_desc() 200 static int aead_setkey(struct crypto_aead *aead, const u8 *key, in aead_setkey() argument 203 struct caam_ctx *ctx = crypto_aead_ctx_dma(aead); in aead_setkey() 258 ret = aead_set_sh_desc(aead); in aead_setkey() 288 static int des3_aead_setkey(struct crypto_aead *aead, const u8 *key, in des3_aead_setkey() argument [all …]
|
| /linux/drivers/crypto/cavium/nitrox/ |
| H A D | nitrox_aead.c | 33 static int nitrox_aes_gcm_setkey(struct crypto_aead *aead, const u8 *key, in nitrox_aes_gcm_setkey() argument 37 struct nitrox_crypto_ctx *nctx = crypto_aead_ctx(aead); in nitrox_aes_gcm_setkey() 58 static int nitrox_aead_setauthsize(struct crypto_aead *aead, in nitrox_aead_setauthsize() argument 61 struct nitrox_crypto_ctx *nctx = crypto_aead_ctx(aead); in nitrox_aead_setauthsize() 69 aead->authsize = authsize; in nitrox_aead_setauthsize() 74 static int nitrox_aes_gcm_setauthsize(struct crypto_aead *aead, in nitrox_aes_gcm_setauthsize() argument 90 return nitrox_aead_setauthsize(aead, authsize); in nitrox_aes_gcm_setauthsize() 215 struct crypto_aead *aead = crypto_aead_reqtfm(areq); in nitrox_aes_gcm_enc() local 216 struct nitrox_crypto_ctx *nctx = crypto_aead_ctx(aead); in nitrox_aes_gcm_enc() 230 rctx->dstlen = rctx->srclen + aead->authsize; in nitrox_aes_gcm_enc() [all …]
|
| /linux/arch/arm64/crypto/ |
| H A D | sm4-ce-ccm-glue.c | 55 struct crypto_aead *aead = crypto_aead_reqtfm(req); in ccm_format_input() local 70 m = crypto_aead_authsize(aead); in ccm_format_input() 92 struct crypto_aead *aead = crypto_aead_reqtfm(req); in ccm_calculate_auth_mac() local 93 struct sm4_ctx *ctx = crypto_aead_ctx(aead); in ccm_calculate_auth_mac() 193 struct crypto_aead *aead = crypto_aead_reqtfm(req); in ccm_encrypt() local 194 struct sm4_ctx *ctx = crypto_aead_ctx(aead); in ccm_encrypt() 213 crypto_aead_authsize(aead), 1); in ccm_encrypt() 220 struct crypto_aead *aead = crypto_aead_reqtfm(req); in ccm_decrypt() local 221 unsigned int authsize = crypto_aead_authsize(aead); in ccm_decrypt() 222 struct sm4_ctx *ctx = crypto_aead_ctx(aead); in ccm_decrypt()
|
| H A D | aes-ce-ccm-glue.c | 65 struct crypto_aead *aead = crypto_aead_reqtfm(req); in ccm_init_mac() local 93 maciv[0] |= (crypto_aead_authsize(aead) - 2) << 2; in ccm_init_mac() 135 struct crypto_aead *aead = crypto_aead_reqtfm(req); in ccm_calculate_auth_mac() local 136 struct crypto_aes_ctx *ctx = crypto_aead_ctx(aead); in ccm_calculate_auth_mac() 169 struct crypto_aead *aead = crypto_aead_reqtfm(req); in ccm_encrypt() local 170 struct crypto_aes_ctx *ctx = crypto_aead_ctx(aead); in ccm_encrypt() 226 crypto_aead_authsize(aead), 1); in ccm_encrypt() 233 struct crypto_aead *aead = crypto_aead_reqtfm(req); in ccm_decrypt() local 234 struct crypto_aes_ctx *ctx = crypto_aead_ctx(aead); in ccm_decrypt() 235 unsigned int authsize = crypto_aead_authsize(aead); in ccm_decrypt()
|
| H A D | sm4-ce-gcm-glue.c | 73 struct crypto_aead *aead = crypto_aead_reqtfm(req); in gcm_calculate_auth_mac() local 74 struct sm4_gcm_ctx *ctx = crypto_aead_ctx(aead); in gcm_calculate_auth_mac() 137 struct crypto_aead *aead = crypto_aead_reqtfm(req); in gcm_crypt() local 138 struct sm4_gcm_ctx *ctx = crypto_aead_ctx(aead); in gcm_crypt() 177 struct crypto_aead *aead = crypto_aead_reqtfm(req); in gcm_encrypt() local 189 crypto_aead_authsize(aead), 1); in gcm_encrypt() 196 struct crypto_aead *aead = crypto_aead_reqtfm(req); in gcm_decrypt() local 197 unsigned int authsize = crypto_aead_authsize(aead); in gcm_decrypt()
|
| H A D | ghash-ce-glue.c | 271 struct crypto_aead *aead = crypto_aead_reqtfm(req); in gcm_calculate_auth_mac() local 272 struct gcm_aes_ctx *ctx = crypto_aead_ctx(aead); in gcm_calculate_auth_mac() 297 struct crypto_aead *aead = crypto_aead_reqtfm(req); in gcm_encrypt() local 298 struct gcm_aes_ctx *ctx = crypto_aead_ctx(aead); in gcm_encrypt() 352 crypto_aead_authsize(aead), 1); in gcm_encrypt() 359 struct crypto_aead *aead = crypto_aead_reqtfm(req); in gcm_decrypt() local 360 struct gcm_aes_ctx *ctx = crypto_aead_ctx(aead); in gcm_decrypt() 361 unsigned int authsize = crypto_aead_authsize(aead); in gcm_decrypt() 461 struct crypto_aead *aead = crypto_aead_reqtfm(req); in rfc4106_encrypt() local 462 struct gcm_aes_ctx *ctx = crypto_aead_ctx(aead); in rfc4106_encrypt() [all …]
|
| /linux/include/crypto/internal/ |
| H A D | aead.h | 58 static inline struct aead_instance *aead_alg_instance(struct crypto_aead *aead) in aead_alg_instance() argument 60 return aead_instance(crypto_tfm_alg_instance(&aead->base)); in aead_alg_instance() 120 static inline void crypto_aead_set_reqsize(struct crypto_aead *aead, in crypto_aead_set_reqsize() argument 123 aead->reqsize = reqsize; in crypto_aead_set_reqsize() 126 static inline void crypto_aead_set_reqsize_dma(struct crypto_aead *aead, in crypto_aead_set_reqsize_dma() argument 130 aead->reqsize = reqsize; in crypto_aead_set_reqsize_dma()
|
| /linux/net/xfrm/ |
| H A D | xfrm_algo.c | 9 #include <crypto/aead.h> 32 .aead = { 51 .aead = { 70 .aead = { 89 .aead = { 108 .aead = { 127 .aead = { 146 .aead = { 165 .aead = { 770 const struct xfrm_aead_name *aead in xfrm_aead_name_match() local [all...] |
| /linux/security/keys/trusted-keys/ |
| H A D | trusted_dcp.c | 134 struct crypto_aead *aead; in do_aead_crypto() local 138 aead = crypto_alloc_aead("gcm(aes)", 0, CRYPTO_ALG_ASYNC); in do_aead_crypto() 139 if (IS_ERR(aead)) { in do_aead_crypto() 140 ret = PTR_ERR(aead); in do_aead_crypto() 144 ret = crypto_aead_setauthsize(aead, DCP_BLOB_AUTHLEN); in do_aead_crypto() 150 aead_req = aead_request_alloc(aead, GFP_KERNEL); in do_aead_crypto() 171 if (crypto_aead_setkey(aead, key, AES_KEYSIZE_128)) { in do_aead_crypto() 185 crypto_free_aead(aead); in do_aead_crypto()
|
| /linux/drivers/crypto/inside-secure/ |
| H A D | safexcel_cipher.c | 51 u8 aead; /* !=0=AEAD, 2=IPSec ESP AEAD, 3=IPsec ESP GMAC */ member 138 ctx->aead & EIP197_AEAD_TYPE_IPSEC_ESP) { /* _ESP and _ESP_GMAC */ in safexcel_aead_iv() 182 if (ctx->aead == EIP197_AEAD_TYPE_IPSEC_ESP) { in safexcel_aead_token() 264 if (ctx->aead == EIP197_AEAD_TYPE_IPSEC_ESP) { in safexcel_aead_token() 308 if (unlikely(ctx->aead == EIP197_AEAD_TYPE_IPSEC_ESP_GMAC)) { in safexcel_aead_token() 515 if (ctx->aead) { in safexcel_context_control() 546 ctx->aead == EIP197_AEAD_TYPE_IPSEC_ESP_GMAC)) in safexcel_context_control() 659 if ((!ctx->aead) && (ctx->mode == CONTEXT_CONTROL_CRYPTO_MODE_CBC) && in safexcel_handle_req_result() 698 if (ctx->aead) { in safexcel_send_req() 823 if (ctx->aead) in safexcel_send_req() [all …]
|
| /linux/net/ipv4/ |
| H A D | esp4_offload.c | 211 struct crypto_aead *aead; in esp4_gso_segment() local 224 aead = x->data; in esp4_gso_segment() 230 if (!pskb_may_pull(skb, sizeof(*esph) + crypto_aead_ivsize(aead))) in esp4_gso_segment() 233 __skb_pull(skb, sizeof(*esph) + crypto_aead_ivsize(aead)); in esp4_gso_segment() 253 struct crypto_aead *aead = x->data; in esp_input_tail() local 256 if (!pskb_may_pull(skb, sizeof(struct ip_esp_hdr) + crypto_aead_ivsize(aead))) in esp_input_tail() 272 struct crypto_aead *aead; in esp_xmit() local 296 aead = x->data; in esp_xmit() 297 alen = crypto_aead_authsize(aead); in esp_xmit() 302 blksize = ALIGN(crypto_aead_blocksize(aead), 4); in esp_xmit()
|
| /linux/net/ipv6/ |
| H A D | esp6_offload.c | 251 struct crypto_aead *aead; in esp6_gso_segment() local 264 aead = x->data; in esp6_gso_segment() 270 if (!pskb_may_pull(skb, sizeof(*esph) + crypto_aead_ivsize(aead))) in esp6_gso_segment() 273 __skb_pull(skb, sizeof(*esph) + crypto_aead_ivsize(aead)); in esp6_gso_segment() 291 struct crypto_aead *aead = x->data; in esp6_input_tail() local 294 if (!pskb_may_pull(skb, sizeof(struct ip_esp_hdr) + crypto_aead_ivsize(aead))) in esp6_input_tail() 310 struct crypto_aead *aead; in esp6_xmit() local 331 aead = x->data; in esp6_xmit() 332 alen = crypto_aead_authsize(aead); in esp6_xmit() 337 blksize = ALIGN(crypto_aead_blocksize(aead), 4); in esp6_xmit()
|
| /linux/tools/testing/selftests/net/ |
| H A D | l2tp.sh | 246 spi 0x1000 proto esp aead 'rfc4106(gcm(aes))' \ 251 spi 0x1001 proto esp aead 'rfc4106(gcm(aes))' \ 256 spi 0x1000 proto esp aead 'rfc4106(gcm(aes))' \ 261 spi 0x1001 proto esp aead 'rfc4106(gcm(aes))' \ 285 spi 0x1000 proto esp aead 'rfc4106(gcm(aes))' \ 290 spi 0x1001 proto esp aead 'rfc4106(gcm(aes))' \ 295 spi 0x1000 proto esp aead 'rfc4106(gcm(aes))' \ 300 spi 0x1001 proto esp aead 'rfc4106(gcm(aes))' \
|
| /linux/net/tls/ |
| H A D | tls_device_fallback.c | 33 #include <crypto/aead.h> 41 struct crypto_aead *aead, char *aad, in chain_to_walk() 112 struct crypto_aead *aead) in tls_enc_record() 114 aead_request_set_tfm(aead_req, aead); in tls_enc_record() 118 static struct aead_request *tls_alloc_aead_request(struct crypto_aead *aead, in tls_enc_record() 122 crypto_aead_reqsize(aead); in tls_enc_record() 127 tls_init_aead_request(aead_req, aead); in tls_init_aead_request() 132 struct crypto_aead *aead, struct scatterlist *sg_in, in tls_init_aead_request() 143 rc = tls_enc_record(aead_req, aead, aad, iv, in tls_alloc_aead_request() 52 tls_enc_record(struct aead_request * aead_req,struct crypto_aead * aead,char * aad,char * iv,__be64 rcd_sn,struct scatter_walk * in,struct scatter_walk * out,int * in_len,struct tls_prot_info * prot) tls_enc_record() argument 128 tls_init_aead_request(struct aead_request * aead_req,struct crypto_aead * aead) tls_init_aead_request() argument 134 tls_alloc_aead_request(struct crypto_aead * aead,gfp_t flags) tls_alloc_aead_request() argument 148 tls_enc_records(struct aead_request * aead_req,struct crypto_aead * aead,struct scatterlist * sg_in,struct scatterlist * sg_out,char * aad,char * iv,u64 rcd_sn,int len,struct tls_prot_info * prot) tls_enc_records() argument
|
| /linux/drivers/net/ethernet/intel/ixgbevf/ |
| H A D | ipsec.c | 37 memcpy(sam->key, xs->aead->alg_key, sizeof(sam->key)); in ixgbevf_ipsec_set_pf_sa() 220 if (!xs->aead) { in ixgbevf_ipsec_parse_proto_keys() 225 if (xs->aead->alg_icv_len != IXGBE_IPSEC_AUTH_BITS) { in ixgbevf_ipsec_parse_proto_keys() 231 key_data = &xs->aead->alg_key[0]; in ixgbevf_ipsec_parse_proto_keys() 232 key_len = xs->aead->alg_key_len; in ixgbevf_ipsec_parse_proto_keys() 233 alg_name = xs->aead->alg_name; in ixgbevf_ipsec_parse_proto_keys() 315 rsa.decrypt = xs->ealg || xs->aead; in ixgbevf_ipsec_add_sa() 370 tsa.encrypt = xs->ealg || xs->aead; in ixgbevf_ipsec_add_sa()
|
| /linux/drivers/net/ethernet/chelsio/inline_crypto/ch_ipsec/ |
| H A D | chcr_ipsec.c | 146 int authsize = x->aead->alg_icv_len / 8; in ch_ipsec_setauthsize() 169 int keylen = (x->aead->alg_key_len + 7) / 8; in ch_ipsec_setkey() 170 unsigned char *key = x->aead->alg_key; in ch_ipsec_setkey() 262 if (!x->aead) { in ch_ipsec_xfrm_add_state() 266 if (x->aead->alg_icv_len != 128 && in ch_ipsec_xfrm_add_state() 267 x->aead->alg_icv_len != 96) { in ch_ipsec_xfrm_add_state() 271 if ((x->aead->alg_key_len != 128 + 32) && in ch_ipsec_xfrm_add_state() 272 (x->aead->alg_key_len != 256 + 32)) { in ch_ipsec_xfrm_add_state()
|
| /linux/drivers/net/ethernet/mellanox/mlx5/core/en_accel/ |
| H A D | ipsec_rxtx.c | 202 struct crypto_aead *aead; in mlx5e_ipsec_set_state() local 207 aead = x->data; in mlx5e_ipsec_set_state() 208 alen = crypto_aead_authsize(aead); in mlx5e_ipsec_set_state() 209 blksize = ALIGN(crypto_aead_blocksize(aead), 4); in mlx5e_ipsec_set_state()
|
| /linux/net/rxrpc/ |
| H A D | rxgk_common.h | 70 struct crypto_aead *aead, in rxgk_decrypt_skb() argument 84 ret = crypto_krb5_decrypt(krb5, aead, sg, nr_sg, in rxgk_decrypt_skb()
|
| /linux/drivers/crypto/qce/ |
| H A D | Makefile | 9 qcrypto-$(CONFIG_CRYPTO_DEV_QCE_AEAD) += aead.o
|
| H A D | aead.h | 51 return container_of(alg, struct qce_alg_template, alg.aead); in to_aead_tmpl()
|