| /linux/drivers/s390/cio/ |
| H A D | airq.c | 130 struct airq_iv *iv; in airq_iv_create() local 133 iv = kzalloc_obj(*iv); in airq_iv_create() 134 if (!iv) in airq_iv_create() 136 iv->bits = bits; in airq_iv_create() 137 iv->flags = flags; in airq_iv_create() 145 iv->vector = dma_pool_zalloc(airq_iv_cache, GFP_KERNEL, in airq_iv_create() 146 &iv->vector_dma); in airq_iv_create() 147 if (!iv->vector) in airq_iv_create() 150 iv->vector = vec; in airq_iv_create() 152 iv->vector = cio_dma_zalloc(size); in airq_iv_create() [all …]
|
| /linux/arch/s390/include/asm/ |
| H A D | airq.h | 53 void airq_iv_release(struct airq_iv *iv); 54 unsigned long airq_iv_alloc(struct airq_iv *iv, unsigned long num); 55 void airq_iv_free(struct airq_iv *iv, unsigned long bit, unsigned long num); 56 unsigned long airq_iv_scan(struct airq_iv *iv, unsigned long start, 59 static inline unsigned long airq_iv_alloc_bit(struct airq_iv *iv) in airq_iv_alloc_bit() argument 61 return airq_iv_alloc(iv, 1); in airq_iv_alloc_bit() 64 static inline void airq_iv_free_bit(struct airq_iv *iv, unsigned long bit) in airq_iv_free_bit() argument 66 airq_iv_free(iv, bit, 1); in airq_iv_free_bit() 69 static inline unsigned long airq_iv_end(struct airq_iv *iv) in airq_iv_end() argument 71 return iv->end; in airq_iv_end() [all …]
|
| /linux/lib/crypto/ |
| H A D | aescfb.c | 39 * @iv: The initialization vector (IV) to use for this block of data 42 int len, const u8 iv[AES_BLOCK_SIZE]) in aescfb_encrypt() 45 const u8 *v = iv; in aescfb_encrypt() 68 * @iv: The initialization vector (IV) to use for this block of data 71 int len, const u8 iv[AES_BLOCK_SIZE]) in aescfb_decrypt() 75 aescfb_encrypt_block(key, ks[0], iv); in aescfb_decrypt() 112 u8 iv[AES_BLOCK_SIZE] __nonstring; member 121 .iv = "\x00\x01\x02\x03\x04\x05\x06\x07" 145 .iv = "\x00\x01\x02\x03\x04\x05\x06\x07" 170 .iv [all...] |
| H A D | chacha20poly1305.c | 37 u8 iv[CHACHA_IV_SIZE]; in xchacha_init() local 39 memset(iv, 0, 8); in xchacha_init() 40 memcpy(iv + 8, nonce + 16, 8); in xchacha_init() 48 chacha_init(chacha_state, k, iv); in xchacha_init() 51 memzero_explicit(iv, sizeof(iv)); in xchacha_init() 96 __le64 iv[2]; in chacha20poly1305_encrypt() local 100 iv[0] = 0; in chacha20poly1305_encrypt() 101 iv[1] = cpu_to_le64(nonce); in chacha20poly1305_encrypt() 103 chacha_init(&chacha_state, k, (u8 *)iv); in chacha20poly1305_encrypt() 107 memzero_explicit(iv, sizeof(iv)); in chacha20poly1305_encrypt() [all …]
|
| H A D | aesgcm.c | 141 * @iv: The initialization vector (IV) to use for this block of data 149 const u8 iv[GCM_AES_IV_SIZE], u8 *authtag) in aesgcm_encrypt() 153 memcpy(ctr, iv, GCM_AES_IV_SIZE); in aesgcm_encrypt() 169 * @iv: The initialization vector (IV) to use for this block of data 179 int assoc_len, const u8 iv[GCM_AES_IV_SIZE], in aesgcm_decrypt() 185 memcpy(ctr, iv, GCM_AES_IV_SIZE); in aesgcm_decrypt() 562 u8 iv[GCM_AES_IV_SIZE] __nonstring; member 584 .iv = "\xca\xfe\xba\xbe\xfa\xce\xdb\xad" 594 .iv = "\xca\xfe\xba\xbe\xfa\xce\xdb\xad" 619 .iv [all...] |
| /linux/drivers/crypto/ccp/ |
| H A D | ccp-crypto-aes.c | 34 memcpy(req->iv, rctx->iv, AES_BLOCK_SIZE); in ccp_aes_complete() 84 if (!req->iv) in ccp_aes_crypt() 87 memcpy(rctx->iv, req->iv, AES_BLOCK_SIZE); in ccp_aes_crypt() 90 sg_init_one(iv_sg, rctx->iv, iv_len); in ccp_aes_crypt() 102 rctx->cmd.u.aes.iv = iv_sg; in ccp_aes_crypt() 140 req->iv = rctx->rfc3686_info; in ccp_aes_rfc3686_complete() 164 u8 *iv; in ccp_aes_rfc3686_crypt() local 167 iv = rctx->rfc3686_iv; in ccp_aes_rfc3686_crypt() 168 memcpy(iv, ctx->u.aes.nonce, CTR_RFC3686_NONCE_SIZE); in ccp_aes_rfc3686_crypt() 170 iv += CTR_RFC3686_NONCE_SIZE; in ccp_aes_rfc3686_crypt() [all …]
|
| /linux/arch/arm64/crypto/ |
| H A D | sm4-neon-glue.c | 24 u8 *iv, unsigned int nblocks); 26 u8 *iv, unsigned int nblocks); 88 const u8 *iv = walk.iv; in sm4_cbc_encrypt() local 93 crypto_xor_cpy(dst, src, iv, SM4_BLOCK_SIZE); in sm4_cbc_encrypt() 95 iv = dst; in sm4_cbc_encrypt() 100 if (iv != walk.iv) in sm4_cbc_encrypt() 101 memcpy(walk.iv, iv, SM4_BLOCK_SIZE); in sm4_cbc_encrypt() 128 walk.iv, nblocks); in sm4_cbc_decrypt() 156 walk.iv, nblocks); in sm4_ctr_crypt() 167 sm4_crypt_block(ctx->rkey_enc, keystream, walk.iv); in sm4_ctr_crypt() [all …]
|
| H A D | aes-neonbs-glue.c | 35 int rounds, int blocks, u8 iv[]); 38 int rounds, int blocks, u8 iv[]); 41 int rounds, int blocks, u8 iv[]); 43 int rounds, int blocks, u8 iv[]); 49 int rounds, int blocks, u8 iv[]); 54 u32 const rk2[], u8 iv[], int first); 57 u32 const rk2[], u8 iv[], int first); 171 walk.iv); in cbc_encrypt() 196 walk.iv); in cbc_decrypt() 223 walk.iv); in ctr_encrypt() [all …]
|
| H A D | sm4-ce-ccm-glue.c | 24 u8 *iv, unsigned int nbytes, u8 *mac); 26 u8 *iv, unsigned int nbytes, u8 *mac); 27 asmlinkage void sm4_ce_ccm_final(const u32 *rkey_enc, u8 *iv, u8 *mac); 56 unsigned int l = req->iv[0] + 1; in ccm_format_input() 66 memset(&req->iv[SM4_BLOCK_SIZE - l], 0, l); in ccm_format_input() 68 memcpy(info, req->iv, SM4_BLOCK_SIZE); in ccm_format_input() 159 const u8 *src, u8 *iv, in ccm_crypt() argument 166 memcpy(ctr0, walk->iv, SM4_BLOCK_SIZE); in ccm_crypt() 167 crypto_inc(walk->iv, SM4_BLOCK_SIZE); in ccm_crypt() 180 walk->src.virt.addr, walk->iv, in ccm_crypt()
|
| /linux/net/mac80211/ |
| H A D | wep.c | 32 static inline bool ieee80211_wep_weak_iv(u32 iv, int keylen) in ieee80211_wep_weak_iv() argument 39 if ((iv & 0xff00) == 0xff00) { in ieee80211_wep_weak_iv() 40 u8 B = (iv >> 16) & 0xff; in ieee80211_wep_weak_iv() 49 int keylen, int keyidx, u8 *iv) in ieee80211_wep_get_iv() argument 55 if (!iv) in ieee80211_wep_get_iv() 58 *iv++ = (local->wep_iv >> 16) & 0xff; in ieee80211_wep_get_iv() 59 *iv++ = (local->wep_iv >> 8) & 0xff; in ieee80211_wep_get_iv() 60 *iv++ = local->wep_iv & 0xff; in ieee80211_wep_get_iv() 61 *iv++ = keyidx << 6; in ieee80211_wep_get_iv() 136 u8 *iv; in ieee80211_wep_encrypt() local [all …]
|
| H A D | aes_gmac.c | 21 u8 *zero, *__aad, iv[AES_BLOCK_SIZE]; in ieee80211_aes_gmac() local 57 memcpy(iv, nonce, GMAC_NONCE_LEN); in ieee80211_aes_gmac() 58 memset(iv + GMAC_NONCE_LEN, 0, sizeof(iv) - GMAC_NONCE_LEN); in ieee80211_aes_gmac() 59 iv[AES_BLOCK_SIZE - 1] = 0x01; in ieee80211_aes_gmac() 62 aead_request_set_crypt(aead_req, sg, sg, 0, iv); in ieee80211_aes_gmac()
|
| /linux/net/qrtr/ |
| H A D | ns.c | 114 struct kvec iv; in service_announce_new() local 119 iv.iov_base = &pkt; in service_announce_new() 120 iv.iov_len = sizeof(pkt); in service_announce_new() 132 return kernel_sendmsg(qrtr_ns.sock, &msg, &iv, 1, sizeof(pkt)); in service_announce_new() 140 struct kvec iv; in service_announce_del() local 146 iv.iov_base = &pkt; in service_announce_del() 147 iv.iov_len = sizeof(pkt); in service_announce_del() 159 ret = kernel_sendmsg(qrtr_ns.sock, &msg, &iv, 1, sizeof(pkt)); in service_announce_del() 171 struct kvec iv; in lookup_notify() local 174 iv.iov_base = &pkt; in lookup_notify() [all …]
|
| /linux/drivers/net/ovpn/ |
| H A D | crypto_aead.c | 48 u8 *iv; in ovpn_aead_encrypt() local 109 ovpn_skb_cb(skb)->iv = kmalloc(OVPN_NONCE_SIZE, GFP_ATOMIC); in ovpn_aead_encrypt() 110 if (unlikely(!ovpn_skb_cb(skb)->iv)) in ovpn_aead_encrypt() 113 iv = ovpn_skb_cb(skb)->iv; in ovpn_aead_encrypt() 118 ovpn_pktid_aead_write(pktid, ks->nonce_tail_xmit, iv); in ovpn_aead_encrypt() 122 memcpy(skb->data, iv, OVPN_NONCE_WIRE_SIZE); in ovpn_aead_encrypt() 143 skb->len - ovpn_aead_encap_overhead(ks), iv); in ovpn_aead_encrypt() 159 u8 *iv; in ovpn_aead_decrypt() local 217 ovpn_skb_cb(skb)->iv = kmalloc(OVPN_NONCE_SIZE, GFP_ATOMIC); in ovpn_aead_decrypt() 218 if (unlikely(!ovpn_skb_cb(skb)->iv)) in ovpn_aead_decrypt() [all …]
|
| /linux/tools/testing/crypto/chacha20-s390/ |
| H A D | test-cipher.c | 54 u8 iv[16], key[32]; in test_lib_chacha() local 58 memset(iv, 'I', sizeof(iv)); in test_lib_chacha() 64 print_hex_dump(KERN_INFO, "iv: ", DUMP_PREFIX_OFFSET, in test_lib_chacha() 65 16, 1, iv, 16, 1); in test_lib_chacha() 69 chacha_init(&chacha_state, (u32 *)key, iv); in test_lib_chacha() 84 chacha_init(&chacha_state, (u32 *)key, iv); in test_lib_chacha() 131 u8 iv[16], key[32]; in test_skcipher() local 153 memset(iv, 'I', sizeof(iv)); in test_skcipher() [all...] |
| /linux/include/uapi/linux/ |
| H A D | tls.h | 128 unsigned char iv[TLS_CIPHER_AES_GCM_128_IV_SIZE]; 136 unsigned char iv[TLS_CIPHER_AES_GCM_256_IV_SIZE]; 144 unsigned char iv[TLS_CIPHER_AES_CCM_128_IV_SIZE]; 152 unsigned char iv[TLS_CIPHER_CHACHA20_POLY1305_IV_SIZE]; 160 unsigned char iv[TLS_CIPHER_SM4_GCM_IV_SIZE]; 168 unsigned char iv[TLS_CIPHER_SM4_CCM_IV_SIZE]; 176 unsigned char iv[TLS_CIPHER_ARIA_GCM_128_IV_SIZE]; 184 unsigned char iv[TLS_CIPHER_ARIA_GCM_256_IV_SIZE]; 127 unsigned char iv[TLS_CIPHER_AES_GCM_128_IV_SIZE]; global() member 135 unsigned char iv[TLS_CIPHER_AES_GCM_256_IV_SIZE]; global() member 143 unsigned char iv[TLS_CIPHER_AES_CCM_128_IV_SIZE]; global() member 151 unsigned char iv[TLS_CIPHER_CHACHA20_POLY1305_IV_SIZE]; global() member 159 unsigned char iv[TLS_CIPHER_SM4_GCM_IV_SIZE]; global() member 167 unsigned char iv[TLS_CIPHER_SM4_CCM_IV_SIZE]; global() member 175 unsigned char iv[TLS_CIPHER_ARIA_GCM_128_IV_SIZE]; global() member 183 unsigned char iv[TLS_CIPHER_ARIA_GCM_256_IV_SIZE]; global() member
|
| /linux/tools/testing/selftests/bpf/progs/ |
| H A D | linked_list_fail.c | 11 struct map_value *v, *v2, *iv, *iv2; \ 25 iv = bpf_map_lookup_elem(map, &(int){ 0 }); \ 26 if (!iv) \ 66 CHECK(inner_map, pop_front, &iv->head); 67 CHECK(inner_map, pop_back, &iv->head); 89 CHECK(inner_map, push_front, &iv->head, &f->node2); 90 CHECK(inner_map, push_back, &iv->head, &f->node2); 109 CHECK(kptr_inner_map, op, &f1->lock, &iv->head); \ 114 CHECK(global_inner_map, op, &glock, &iv->head); \ 119 CHECK(map_inner_map, op, &v->lock, &iv->head); \ [all …]
|
| /linux/io_uring/ |
| H A D | rsrc.h | 74 int io_prep_reg_iovec(struct io_kiocb *req, struct iou_vec *iv, 138 void io_vec_free(struct iou_vec *iv); in io_vec_reset_iovec() 139 int io_vec_realloc(struct iou_vec *iv, unsigned nr_entries); in io_vec_reset_iovec() 141 static inline void io_vec_reset_iovec(struct iou_vec *iv, in io_vec_reset_iovec() 144 io_vec_free(iv); in io_alloc_cache_vec_kasan() 145 iv->iovec = iovec; in io_alloc_cache_vec_kasan() 146 iv->nr = nr; in io_alloc_cache_vec_kasan() 149 static inline void io_alloc_cache_vec_kasan(struct iou_vec *iv) 152 io_vec_free(iv); 135 io_vec_reset_iovec(struct iou_vec * iv,struct iovec * iovec,unsigned nr) io_vec_reset_iovec() argument 143 io_alloc_cache_vec_kasan(struct iou_vec * iv) io_alloc_cache_vec_kasan() argument
|
| /linux/arch/x86/crypto/ |
| H A D | aria-avx.h | 22 u8 *keystream, u8 *iv); 29 u8 *keystream, u8 *iv); 37 u8 *keystream, u8 *iv); 44 u8 *keystream, u8 *iv); 50 u8 *keystream, u8 *iv); 54 u8 *keystream, u8 *iv); 58 u8 *keystream, u8 *iv);
|
| /linux/drivers/crypto/ |
| H A D | padlock-aes.c | 203 u8 *iv, struct cword *control_word, int count) in rep_xcrypt_cbc() argument 206 : "+S" (input), "+D" (output), "+a" (iv) in rep_xcrypt_cbc() 208 return iv; in rep_xcrypt_cbc() 226 u8 *iv, struct cword *cword, int count) in cbc_crypt_copy() argument 236 return rep_xcrypt_cbc(tmp, out, key, iv, cword, count); in cbc_crypt_copy() 254 u8 *iv, struct cword *cword, int count) in cbc_crypt() argument 258 return cbc_crypt_copy(in, out, key, iv, cword, count); in cbc_crypt() 260 return rep_xcrypt_cbc(in, out, key, iv, cword, count); in cbc_crypt() 286 u8 *iv, void *control_word, u32 count) in padlock_xcrypt_cbc() argument 291 return cbc_crypt(input, output, key, iv, control_word, count); in padlock_xcrypt_cbc() [all …]
|
| /linux/net/sunrpc/auth_gss/ |
| H A D | gss_krb5_crypto.c | 105 void * iv, in krb5_encrypt() argument 124 if (iv) in krb5_encrypt() 125 memcpy(local_iv, iv, crypto_sync_skcipher_ivsize(tfm)); in krb5_encrypt() 225 u8 iv[GSS_KRB5_MAX_BLOCKSIZE]; member 278 thislen, desc->iv); in encryptor() 302 u8 iv[GSS_KRB5_MAX_BLOCKSIZE]; member 335 thislen, desc->iv); in decryptor() 394 u32 offset, u8 *iv, struct page **pages, int encrypt) in gss_krb5_cts_crypt() argument 429 skcipher_request_set_crypt(req, sg, sg, len, iv); in gss_krb5_cts_crypt() 450 memcpy(iv, data, crypto_sync_skcipher_ivsize(cipher)); in gss_krb5_cts_crypt() [all …]
|
| /linux/drivers/ssb/ |
| H A D | host_soc.c | 177 struct ssb_init_invariants *iv) in ssb_host_soc_get_invariants() argument 183 memset(&iv->boardinfo, 0, sizeof(struct ssb_boardinfo)); in ssb_host_soc_get_invariants() 187 err = kstrtou16(strim(buf), 0, &iv->boardinfo.vendor); in ssb_host_soc_get_invariants() 192 if (!iv->boardinfo.vendor) in ssb_host_soc_get_invariants() 193 iv->boardinfo.vendor = SSB_BOARDVENDOR_BCM; in ssb_host_soc_get_invariants() 197 err = kstrtou16(strim(buf), 0, &iv->boardinfo.type); in ssb_host_soc_get_invariants() 203 memset(&iv->sprom, 0, sizeof(struct ssb_sprom)); in ssb_host_soc_get_invariants() 204 ssb_fill_sprom_with_fallback(bus, &iv->sprom); in ssb_host_soc_get_invariants() 207 iv->has_cardbus_slot = !!simple_strtoul(buf, NULL, 10); in ssb_host_soc_get_invariants()
|
| /linux/drivers/net/wireless/intel/ipw2x00/ |
| H A D | libipw_crypto_wep.c | 24 u32 iv; member 46 get_random_bytes(&priv->iv, 4); in libipw_wep_init() 73 wep->iv++; in libipw_wep_build_iv() 78 if ((wep->iv & 0xff00) == 0xff00) { in libipw_wep_build_iv() 79 u8 B = (wep->iv >> 16) & 0xff; in libipw_wep_build_iv() 81 wep->iv += 0x0100; in libipw_wep_build_iv() 85 *pos++ = (wep->iv >> 16) & 0xff; in libipw_wep_build_iv() 86 *pos++ = (wep->iv >> 8) & 0xff; in libipw_wep_build_iv() 87 *pos++ = wep->iv & 0xff; in libipw_wep_build_iv()
|
| /linux/net/rxrpc/ |
| H A D | rxkad.c | 197 struct rxrpc_crypt iv; in rxkad_prime_packet_security() local 217 memcpy(&iv, token->kad->session_key, sizeof(iv)); in rxkad_prime_packet_security() 227 skcipher_request_set_crypt(req, &sg, &sg, tmpsize, iv.x); in rxkad_prime_packet_security() 263 struct rxrpc_crypt iv; in rxkad_secure_packet_auth() local 283 memset(&iv, 0, sizeof(iv)); in rxkad_secure_packet_auth() 288 skcipher_request_set_crypt(req, &sg, &sg, 8, iv.x); in rxkad_secure_packet_auth() 305 struct rxrpc_crypt iv; in rxkad_secure_packet_encrypt() local 326 memcpy(&iv, token->kad->session_key, sizeof(iv)); in rxkad_secure_packet_encrypt() 331 skcipher_request_set_crypt(req, &sg, &sg, txb->pkt_len, iv.x); in rxkad_secure_packet_encrypt() 343 struct rxrpc_crypt iv; in rxkad_secure_packet() local [all …]
|
| /linux/block/ |
| H A D | t10-pi.c | 136 struct bio_vec iv; in t10_pi_type1_prepare() local 143 bip_for_each_vec(iv, bip, iter) { in t10_pi_type1_prepare() 147 p = bvec_kmap_local(&iv); in t10_pi_type1_prepare() 148 for (j = 0; j < iv.bv_len; j += tuple_sz) { in t10_pi_type1_prepare() 188 struct bio_vec iv; in t10_pi_type1_complete() local 191 bip_for_each_vec(iv, bip, iter) { in t10_pi_type1_complete() 195 p = bvec_kmap_local(&iv); in t10_pi_type1_complete() 196 for (j = 0; j < iv.bv_len && intervals; j += tuple_sz) { in t10_pi_type1_complete() 310 struct bio_vec iv; in ext_pi_type1_prepare() local 317 bip_for_each_vec(iv, bip, iter) { in ext_pi_type1_prepare() [all …]
|
| /linux/arch/s390/crypto/ |
| H A D | des_s390.c | 31 u8 iv[DES_BLOCK_SIZE]; member 116 u8 iv[DES_BLOCK_SIZE]; in cbc_desall_crypt() member 123 memcpy(param.iv, walk.iv, DES_BLOCK_SIZE); in cbc_desall_crypt() 130 memcpy(walk.iv, param.iv, DES_BLOCK_SIZE); in cbc_desall_crypt() 303 static unsigned int __ctrblk_init(u8 *ctrptr, u8 *iv, unsigned int nbytes) in __ctrblk_init() argument 309 memcpy(ctrptr, iv, DES_BLOCK_SIZE); in __ctrblk_init() 333 n = __ctrblk_init(ctrblk, walk.iv, nbytes); in ctr_desall_crypt() 334 ctrptr = (n > DES_BLOCK_SIZE) ? ctrblk : walk.iv; in ctr_desall_crypt() 338 memcpy(walk.iv, ctrptr + n - DES_BLOCK_SIZE, in ctr_desall_crypt() 340 crypto_inc(walk.iv, DES_BLOCK_SIZE); in ctr_desall_crypt() [all …]
|