Home
last modified time | relevance | path

Searched refs:iv (Results 1 – 25 of 213) sorted by relevance

123456789

/linux/drivers/s390/cio/
H A Dairq.c130 struct airq_iv *iv; in airq_iv_create() local
133 iv = kzalloc_obj(*iv); in airq_iv_create()
134 if (!iv) in airq_iv_create()
136 iv->bits = bits; in airq_iv_create()
137 iv->flags = flags; in airq_iv_create()
145 iv->vector = dma_pool_zalloc(airq_iv_cache, GFP_KERNEL, in airq_iv_create()
146 &iv->vector_dma); in airq_iv_create()
147 if (!iv->vector) in airq_iv_create()
150 iv->vector = vec; in airq_iv_create()
152 iv->vector = cio_dma_zalloc(size); in airq_iv_create()
[all …]
/linux/arch/s390/include/asm/
H A Dairq.h53 void airq_iv_release(struct airq_iv *iv);
54 unsigned long airq_iv_alloc(struct airq_iv *iv, unsigned long num);
55 void airq_iv_free(struct airq_iv *iv, unsigned long bit, unsigned long num);
56 unsigned long airq_iv_scan(struct airq_iv *iv, unsigned long start,
59 static inline unsigned long airq_iv_alloc_bit(struct airq_iv *iv) in airq_iv_alloc_bit() argument
61 return airq_iv_alloc(iv, 1); in airq_iv_alloc_bit()
64 static inline void airq_iv_free_bit(struct airq_iv *iv, unsigned long bit) in airq_iv_free_bit() argument
66 airq_iv_free(iv, bit, 1); in airq_iv_free_bit()
69 static inline unsigned long airq_iv_end(struct airq_iv *iv) in airq_iv_end() argument
71 return iv->end; in airq_iv_end()
[all …]
/linux/lib/crypto/
H A Daescfb.c39 * @iv: The initialization vector (IV) to use for this block of data
42 int len, const u8 iv[AES_BLOCK_SIZE]) in aescfb_encrypt()
45 const u8 *v = iv; in aescfb_encrypt()
68 * @iv: The initialization vector (IV) to use for this block of data
71 int len, const u8 iv[AES_BLOCK_SIZE]) in aescfb_decrypt()
75 aescfb_encrypt_block(key, ks[0], iv); in aescfb_decrypt()
112 u8 iv[AES_BLOCK_SIZE] __nonstring; member
121 .iv = "\x00\x01\x02\x03\x04\x05\x06\x07"
145 .iv = "\x00\x01\x02\x03\x04\x05\x06\x07"
170 .iv
[all...]
H A Dchacha20poly1305.c37 u8 iv[CHACHA_IV_SIZE]; in xchacha_init() local
39 memset(iv, 0, 8); in xchacha_init()
40 memcpy(iv + 8, nonce + 16, 8); in xchacha_init()
48 chacha_init(chacha_state, k, iv); in xchacha_init()
51 memzero_explicit(iv, sizeof(iv)); in xchacha_init()
96 __le64 iv[2]; in chacha20poly1305_encrypt() local
100 iv[0] = 0; in chacha20poly1305_encrypt()
101 iv[1] = cpu_to_le64(nonce); in chacha20poly1305_encrypt()
103 chacha_init(&chacha_state, k, (u8 *)iv); in chacha20poly1305_encrypt()
107 memzero_explicit(iv, sizeof(iv)); in chacha20poly1305_encrypt()
[all …]
H A Daesgcm.c141 * @iv: The initialization vector (IV) to use for this block of data
149 const u8 iv[GCM_AES_IV_SIZE], u8 *authtag) in aesgcm_encrypt()
153 memcpy(ctr, iv, GCM_AES_IV_SIZE); in aesgcm_encrypt()
169 * @iv: The initialization vector (IV) to use for this block of data
179 int assoc_len, const u8 iv[GCM_AES_IV_SIZE], in aesgcm_decrypt()
185 memcpy(ctr, iv, GCM_AES_IV_SIZE); in aesgcm_decrypt()
562 u8 iv[GCM_AES_IV_SIZE] __nonstring; member
584 .iv = "\xca\xfe\xba\xbe\xfa\xce\xdb\xad"
594 .iv = "\xca\xfe\xba\xbe\xfa\xce\xdb\xad"
619 .iv
[all...]
/linux/drivers/crypto/ccp/
H A Dccp-crypto-aes.c34 memcpy(req->iv, rctx->iv, AES_BLOCK_SIZE); in ccp_aes_complete()
84 if (!req->iv) in ccp_aes_crypt()
87 memcpy(rctx->iv, req->iv, AES_BLOCK_SIZE); in ccp_aes_crypt()
90 sg_init_one(iv_sg, rctx->iv, iv_len); in ccp_aes_crypt()
102 rctx->cmd.u.aes.iv = iv_sg; in ccp_aes_crypt()
140 req->iv = rctx->rfc3686_info; in ccp_aes_rfc3686_complete()
164 u8 *iv; in ccp_aes_rfc3686_crypt() local
167 iv = rctx->rfc3686_iv; in ccp_aes_rfc3686_crypt()
168 memcpy(iv, ctx->u.aes.nonce, CTR_RFC3686_NONCE_SIZE); in ccp_aes_rfc3686_crypt()
170 iv += CTR_RFC3686_NONCE_SIZE; in ccp_aes_rfc3686_crypt()
[all …]
/linux/arch/arm64/crypto/
H A Dsm4-neon-glue.c24 u8 *iv, unsigned int nblocks);
26 u8 *iv, unsigned int nblocks);
88 const u8 *iv = walk.iv; in sm4_cbc_encrypt() local
93 crypto_xor_cpy(dst, src, iv, SM4_BLOCK_SIZE); in sm4_cbc_encrypt()
95 iv = dst; in sm4_cbc_encrypt()
100 if (iv != walk.iv) in sm4_cbc_encrypt()
101 memcpy(walk.iv, iv, SM4_BLOCK_SIZE); in sm4_cbc_encrypt()
128 walk.iv, nblocks); in sm4_cbc_decrypt()
156 walk.iv, nblocks); in sm4_ctr_crypt()
167 sm4_crypt_block(ctx->rkey_enc, keystream, walk.iv); in sm4_ctr_crypt()
[all …]
H A Daes-neonbs-glue.c35 int rounds, int blocks, u8 iv[]);
38 int rounds, int blocks, u8 iv[]);
41 int rounds, int blocks, u8 iv[]);
43 int rounds, int blocks, u8 iv[]);
49 int rounds, int blocks, u8 iv[]);
54 u32 const rk2[], u8 iv[], int first);
57 u32 const rk2[], u8 iv[], int first);
171 walk.iv); in cbc_encrypt()
196 walk.iv); in cbc_decrypt()
223 walk.iv); in ctr_encrypt()
[all …]
H A Dsm4-ce-ccm-glue.c24 u8 *iv, unsigned int nbytes, u8 *mac);
26 u8 *iv, unsigned int nbytes, u8 *mac);
27 asmlinkage void sm4_ce_ccm_final(const u32 *rkey_enc, u8 *iv, u8 *mac);
56 unsigned int l = req->iv[0] + 1; in ccm_format_input()
66 memset(&req->iv[SM4_BLOCK_SIZE - l], 0, l); in ccm_format_input()
68 memcpy(info, req->iv, SM4_BLOCK_SIZE); in ccm_format_input()
159 const u8 *src, u8 *iv, in ccm_crypt() argument
166 memcpy(ctr0, walk->iv, SM4_BLOCK_SIZE); in ccm_crypt()
167 crypto_inc(walk->iv, SM4_BLOCK_SIZE); in ccm_crypt()
180 walk->src.virt.addr, walk->iv, in ccm_crypt()
/linux/net/mac80211/
H A Dwep.c32 static inline bool ieee80211_wep_weak_iv(u32 iv, int keylen) in ieee80211_wep_weak_iv() argument
39 if ((iv & 0xff00) == 0xff00) { in ieee80211_wep_weak_iv()
40 u8 B = (iv >> 16) & 0xff; in ieee80211_wep_weak_iv()
49 int keylen, int keyidx, u8 *iv) in ieee80211_wep_get_iv() argument
55 if (!iv) in ieee80211_wep_get_iv()
58 *iv++ = (local->wep_iv >> 16) & 0xff; in ieee80211_wep_get_iv()
59 *iv++ = (local->wep_iv >> 8) & 0xff; in ieee80211_wep_get_iv()
60 *iv++ = local->wep_iv & 0xff; in ieee80211_wep_get_iv()
61 *iv++ = keyidx << 6; in ieee80211_wep_get_iv()
136 u8 *iv; in ieee80211_wep_encrypt() local
[all …]
H A Daes_gmac.c21 u8 *zero, *__aad, iv[AES_BLOCK_SIZE]; in ieee80211_aes_gmac() local
57 memcpy(iv, nonce, GMAC_NONCE_LEN); in ieee80211_aes_gmac()
58 memset(iv + GMAC_NONCE_LEN, 0, sizeof(iv) - GMAC_NONCE_LEN); in ieee80211_aes_gmac()
59 iv[AES_BLOCK_SIZE - 1] = 0x01; in ieee80211_aes_gmac()
62 aead_request_set_crypt(aead_req, sg, sg, 0, iv); in ieee80211_aes_gmac()
/linux/net/qrtr/
H A Dns.c114 struct kvec iv; in service_announce_new() local
119 iv.iov_base = &pkt; in service_announce_new()
120 iv.iov_len = sizeof(pkt); in service_announce_new()
132 return kernel_sendmsg(qrtr_ns.sock, &msg, &iv, 1, sizeof(pkt)); in service_announce_new()
140 struct kvec iv; in service_announce_del() local
146 iv.iov_base = &pkt; in service_announce_del()
147 iv.iov_len = sizeof(pkt); in service_announce_del()
159 ret = kernel_sendmsg(qrtr_ns.sock, &msg, &iv, 1, sizeof(pkt)); in service_announce_del()
171 struct kvec iv; in lookup_notify() local
174 iv.iov_base = &pkt; in lookup_notify()
[all …]
/linux/drivers/net/ovpn/
H A Dcrypto_aead.c48 u8 *iv; in ovpn_aead_encrypt() local
109 ovpn_skb_cb(skb)->iv = kmalloc(OVPN_NONCE_SIZE, GFP_ATOMIC); in ovpn_aead_encrypt()
110 if (unlikely(!ovpn_skb_cb(skb)->iv)) in ovpn_aead_encrypt()
113 iv = ovpn_skb_cb(skb)->iv; in ovpn_aead_encrypt()
118 ovpn_pktid_aead_write(pktid, ks->nonce_tail_xmit, iv); in ovpn_aead_encrypt()
122 memcpy(skb->data, iv, OVPN_NONCE_WIRE_SIZE); in ovpn_aead_encrypt()
143 skb->len - ovpn_aead_encap_overhead(ks), iv); in ovpn_aead_encrypt()
159 u8 *iv; in ovpn_aead_decrypt() local
217 ovpn_skb_cb(skb)->iv = kmalloc(OVPN_NONCE_SIZE, GFP_ATOMIC); in ovpn_aead_decrypt()
218 if (unlikely(!ovpn_skb_cb(skb)->iv)) in ovpn_aead_decrypt()
[all …]
/linux/tools/testing/crypto/chacha20-s390/
H A Dtest-cipher.c54 u8 iv[16], key[32]; in test_lib_chacha() local
58 memset(iv, 'I', sizeof(iv)); in test_lib_chacha()
64 print_hex_dump(KERN_INFO, "iv: ", DUMP_PREFIX_OFFSET, in test_lib_chacha()
65 16, 1, iv, 16, 1); in test_lib_chacha()
69 chacha_init(&chacha_state, (u32 *)key, iv); in test_lib_chacha()
84 chacha_init(&chacha_state, (u32 *)key, iv); in test_lib_chacha()
131 u8 iv[16], key[32]; in test_skcipher() local
153 memset(iv, 'I', sizeof(iv)); in test_skcipher()
[all...]
/linux/include/uapi/linux/
H A Dtls.h128 unsigned char iv[TLS_CIPHER_AES_GCM_128_IV_SIZE];
136 unsigned char iv[TLS_CIPHER_AES_GCM_256_IV_SIZE];
144 unsigned char iv[TLS_CIPHER_AES_CCM_128_IV_SIZE];
152 unsigned char iv[TLS_CIPHER_CHACHA20_POLY1305_IV_SIZE];
160 unsigned char iv[TLS_CIPHER_SM4_GCM_IV_SIZE];
168 unsigned char iv[TLS_CIPHER_SM4_CCM_IV_SIZE];
176 unsigned char iv[TLS_CIPHER_ARIA_GCM_128_IV_SIZE];
184 unsigned char iv[TLS_CIPHER_ARIA_GCM_256_IV_SIZE];
127 unsigned char iv[TLS_CIPHER_AES_GCM_128_IV_SIZE]; global() member
135 unsigned char iv[TLS_CIPHER_AES_GCM_256_IV_SIZE]; global() member
143 unsigned char iv[TLS_CIPHER_AES_CCM_128_IV_SIZE]; global() member
151 unsigned char iv[TLS_CIPHER_CHACHA20_POLY1305_IV_SIZE]; global() member
159 unsigned char iv[TLS_CIPHER_SM4_GCM_IV_SIZE]; global() member
167 unsigned char iv[TLS_CIPHER_SM4_CCM_IV_SIZE]; global() member
175 unsigned char iv[TLS_CIPHER_ARIA_GCM_128_IV_SIZE]; global() member
183 unsigned char iv[TLS_CIPHER_ARIA_GCM_256_IV_SIZE]; global() member
/linux/tools/testing/selftests/bpf/progs/
H A Dlinked_list_fail.c11 struct map_value *v, *v2, *iv, *iv2; \
25 iv = bpf_map_lookup_elem(map, &(int){ 0 }); \
26 if (!iv) \
66 CHECK(inner_map, pop_front, &iv->head);
67 CHECK(inner_map, pop_back, &iv->head);
89 CHECK(inner_map, push_front, &iv->head, &f->node2);
90 CHECK(inner_map, push_back, &iv->head, &f->node2);
109 CHECK(kptr_inner_map, op, &f1->lock, &iv->head); \
114 CHECK(global_inner_map, op, &glock, &iv->head); \
119 CHECK(map_inner_map, op, &v->lock, &iv->head); \
[all …]
/linux/io_uring/
H A Drsrc.h74 int io_prep_reg_iovec(struct io_kiocb *req, struct iou_vec *iv,
138 void io_vec_free(struct iou_vec *iv); in io_vec_reset_iovec()
139 int io_vec_realloc(struct iou_vec *iv, unsigned nr_entries); in io_vec_reset_iovec()
141 static inline void io_vec_reset_iovec(struct iou_vec *iv, in io_vec_reset_iovec()
144 io_vec_free(iv); in io_alloc_cache_vec_kasan()
145 iv->iovec = iovec; in io_alloc_cache_vec_kasan()
146 iv->nr = nr; in io_alloc_cache_vec_kasan()
149 static inline void io_alloc_cache_vec_kasan(struct iou_vec *iv)
152 io_vec_free(iv);
135 io_vec_reset_iovec(struct iou_vec * iv,struct iovec * iovec,unsigned nr) io_vec_reset_iovec() argument
143 io_alloc_cache_vec_kasan(struct iou_vec * iv) io_alloc_cache_vec_kasan() argument
/linux/arch/x86/crypto/
H A Daria-avx.h22 u8 *keystream, u8 *iv);
29 u8 *keystream, u8 *iv);
37 u8 *keystream, u8 *iv);
44 u8 *keystream, u8 *iv);
50 u8 *keystream, u8 *iv);
54 u8 *keystream, u8 *iv);
58 u8 *keystream, u8 *iv);
/linux/drivers/crypto/
H A Dpadlock-aes.c203 u8 *iv, struct cword *control_word, int count) in rep_xcrypt_cbc() argument
206 : "+S" (input), "+D" (output), "+a" (iv) in rep_xcrypt_cbc()
208 return iv; in rep_xcrypt_cbc()
226 u8 *iv, struct cword *cword, int count) in cbc_crypt_copy() argument
236 return rep_xcrypt_cbc(tmp, out, key, iv, cword, count); in cbc_crypt_copy()
254 u8 *iv, struct cword *cword, int count) in cbc_crypt() argument
258 return cbc_crypt_copy(in, out, key, iv, cword, count); in cbc_crypt()
260 return rep_xcrypt_cbc(in, out, key, iv, cword, count); in cbc_crypt()
286 u8 *iv, void *control_word, u32 count) in padlock_xcrypt_cbc() argument
291 return cbc_crypt(input, output, key, iv, control_word, count); in padlock_xcrypt_cbc()
[all …]
/linux/net/sunrpc/auth_gss/
H A Dgss_krb5_crypto.c105 void * iv, in krb5_encrypt() argument
124 if (iv) in krb5_encrypt()
125 memcpy(local_iv, iv, crypto_sync_skcipher_ivsize(tfm)); in krb5_encrypt()
225 u8 iv[GSS_KRB5_MAX_BLOCKSIZE]; member
278 thislen, desc->iv); in encryptor()
302 u8 iv[GSS_KRB5_MAX_BLOCKSIZE]; member
335 thislen, desc->iv); in decryptor()
394 u32 offset, u8 *iv, struct page **pages, int encrypt) in gss_krb5_cts_crypt() argument
429 skcipher_request_set_crypt(req, sg, sg, len, iv); in gss_krb5_cts_crypt()
450 memcpy(iv, data, crypto_sync_skcipher_ivsize(cipher)); in gss_krb5_cts_crypt()
[all …]
/linux/drivers/ssb/
H A Dhost_soc.c177 struct ssb_init_invariants *iv) in ssb_host_soc_get_invariants() argument
183 memset(&iv->boardinfo, 0, sizeof(struct ssb_boardinfo)); in ssb_host_soc_get_invariants()
187 err = kstrtou16(strim(buf), 0, &iv->boardinfo.vendor); in ssb_host_soc_get_invariants()
192 if (!iv->boardinfo.vendor) in ssb_host_soc_get_invariants()
193 iv->boardinfo.vendor = SSB_BOARDVENDOR_BCM; in ssb_host_soc_get_invariants()
197 err = kstrtou16(strim(buf), 0, &iv->boardinfo.type); in ssb_host_soc_get_invariants()
203 memset(&iv->sprom, 0, sizeof(struct ssb_sprom)); in ssb_host_soc_get_invariants()
204 ssb_fill_sprom_with_fallback(bus, &iv->sprom); in ssb_host_soc_get_invariants()
207 iv->has_cardbus_slot = !!simple_strtoul(buf, NULL, 10); in ssb_host_soc_get_invariants()
/linux/drivers/net/wireless/intel/ipw2x00/
H A Dlibipw_crypto_wep.c24 u32 iv; member
46 get_random_bytes(&priv->iv, 4); in libipw_wep_init()
73 wep->iv++; in libipw_wep_build_iv()
78 if ((wep->iv & 0xff00) == 0xff00) { in libipw_wep_build_iv()
79 u8 B = (wep->iv >> 16) & 0xff; in libipw_wep_build_iv()
81 wep->iv += 0x0100; in libipw_wep_build_iv()
85 *pos++ = (wep->iv >> 16) & 0xff; in libipw_wep_build_iv()
86 *pos++ = (wep->iv >> 8) & 0xff; in libipw_wep_build_iv()
87 *pos++ = wep->iv & 0xff; in libipw_wep_build_iv()
/linux/net/rxrpc/
H A Drxkad.c197 struct rxrpc_crypt iv; in rxkad_prime_packet_security() local
217 memcpy(&iv, token->kad->session_key, sizeof(iv)); in rxkad_prime_packet_security()
227 skcipher_request_set_crypt(req, &sg, &sg, tmpsize, iv.x); in rxkad_prime_packet_security()
263 struct rxrpc_crypt iv; in rxkad_secure_packet_auth() local
283 memset(&iv, 0, sizeof(iv)); in rxkad_secure_packet_auth()
288 skcipher_request_set_crypt(req, &sg, &sg, 8, iv.x); in rxkad_secure_packet_auth()
305 struct rxrpc_crypt iv; in rxkad_secure_packet_encrypt() local
326 memcpy(&iv, token->kad->session_key, sizeof(iv)); in rxkad_secure_packet_encrypt()
331 skcipher_request_set_crypt(req, &sg, &sg, txb->pkt_len, iv.x); in rxkad_secure_packet_encrypt()
343 struct rxrpc_crypt iv; in rxkad_secure_packet() local
[all …]
/linux/block/
H A Dt10-pi.c136 struct bio_vec iv; in t10_pi_type1_prepare() local
143 bip_for_each_vec(iv, bip, iter) { in t10_pi_type1_prepare()
147 p = bvec_kmap_local(&iv); in t10_pi_type1_prepare()
148 for (j = 0; j < iv.bv_len; j += tuple_sz) { in t10_pi_type1_prepare()
188 struct bio_vec iv; in t10_pi_type1_complete() local
191 bip_for_each_vec(iv, bip, iter) { in t10_pi_type1_complete()
195 p = bvec_kmap_local(&iv); in t10_pi_type1_complete()
196 for (j = 0; j < iv.bv_len && intervals; j += tuple_sz) { in t10_pi_type1_complete()
310 struct bio_vec iv; in ext_pi_type1_prepare() local
317 bip_for_each_vec(iv, bip, iter) { in ext_pi_type1_prepare()
[all …]
/linux/arch/s390/crypto/
H A Ddes_s390.c31 u8 iv[DES_BLOCK_SIZE]; member
116 u8 iv[DES_BLOCK_SIZE]; in cbc_desall_crypt() member
123 memcpy(param.iv, walk.iv, DES_BLOCK_SIZE); in cbc_desall_crypt()
130 memcpy(walk.iv, param.iv, DES_BLOCK_SIZE); in cbc_desall_crypt()
303 static unsigned int __ctrblk_init(u8 *ctrptr, u8 *iv, unsigned int nbytes) in __ctrblk_init() argument
309 memcpy(ctrptr, iv, DES_BLOCK_SIZE); in __ctrblk_init()
333 n = __ctrblk_init(ctrblk, walk.iv, nbytes); in ctr_desall_crypt()
334 ctrptr = (n > DES_BLOCK_SIZE) ? ctrblk : walk.iv; in ctr_desall_crypt()
338 memcpy(walk.iv, ctrptr + n - DES_BLOCK_SIZE, in ctr_desall_crypt()
340 crypto_inc(walk.iv, DES_BLOCK_SIZE); in ctr_desall_crypt()
[all …]

123456789