| /linux/drivers/md/ |
| H A D | dm-crypt.c | 183 unsigned int iv_size; member 364 memset(iv, 0, cc->iv_size); in crypt_iv_plain_gen() 373 memset(iv, 0, cc->iv_size); in crypt_iv_plain64_gen() 382 memset(iv, 0, cc->iv_size); in crypt_iv_plain64be_gen() 384 *(__be64 *)&iv[cc->iv_size - sizeof(u64)] = cpu_to_be64(dmreq->iv_sector); in crypt_iv_plain64be_gen() 396 memset(iv, 0, cc->iv_size); in crypt_iv_essiv_gen() 442 memset(iv, 0, cc->iv_size - sizeof(u64)); /* rest is cleared below */ in crypt_iv_benbi_gen() 445 put_unaligned(val, (__be64 *)(iv + cc->iv_size - sizeof(u64))); in crypt_iv_benbi_gen() 453 memset(iv, 0, cc->iv_size); in crypt_iv_null_gen() 544 memcpy(iv, ctx.state.h, cc->iv_size); in crypt_iv_lmk_one() [all …]
|
| /linux/net/tls/ |
| H A D | tls.h | 319 prot->iv_size); in tls_advance_record_sn() 339 size_t pkt_len, iv_size = prot->iv_size; in tls_fill_prepend() local 344 pkt_len += iv_size; in tls_fill_prepend() 347 ctx->tx.iv + prot->salt_size, iv_size); in tls_fill_prepend()
|
| H A D | tls_sw.c | 558 prot->iv_size + prot->salt_size); in tls_do_encryption() 1590 prot->iv_size + prot->salt_size); in tls_decrypt_sg() 1594 prot->iv_size); in tls_decrypt_sg() 2472 cipher_overhead += prot->iv_size; in tls_rx_msg_size() 2762 prot->iv_size = cipher_desc->iv; in init_prot_info()
|
| /linux/drivers/s390/cio/ |
| H A D | airq.c | 114 static inline unsigned long iv_size(unsigned long bits) in iv_size() function 138 size = iv_size(bits); in airq_iv_create() 210 cio_dma_free(iv->vector, iv_size(iv->bits)); in airq_iv_release()
|
| /linux/drivers/crypto/ |
| H A D | sa2ul.c | 108 u8 iv_size; member 585 if (cfg->iv_size) in sa_format_cmdl_gen() 586 auth_offset += cfg->iv_size; in sa_format_cmdl_gen() 601 if (cfg->iv_size) { in sa_format_cmdl_gen() 605 upd_info->enc_iv.size = cfg->iv_size; in sa_format_cmdl_gen() 608 SA_CMDL_HEADER_SIZE_BYTES + cfg->iv_size; in sa_format_cmdl_gen() 611 (SA_CTX_ENC_AUX2_OFFSET | (cfg->iv_size >> 3)); in sa_format_cmdl_gen() 612 total += SA_CMDL_HEADER_SIZE_BYTES + cfg->iv_size; in sa_format_cmdl_gen() 903 cfg.iv_size = crypto_skcipher_ivsize(tfm); in sa_cipher_setkey() 1458 cfg.iv_size = 0; in sa_sha_setup() [all …]
|
| /linux/drivers/crypto/intel/keembay/ |
| H A D | ocs-aes.h | 78 u32 iv_size);
|
| /linux/drivers/net/ethernet/chelsio/inline_crypto/ch_ktls/ |
| H A D | chcr_ktls.h | 50 u32 iv_size; member
|
| H A D | chcr_ktls.c | 90 tx_info->iv_size = TLS_CIPHER_AES_GCM_128_IV_SIZE; in chcr_ktls_save_keys() 1183 cipher_start = TLS_HEADER_SIZE + tx_info->iv_size + 1; in chcr_ktls_xmit_wr_complete() 1362 (!tls_rec_offset ? TLS_HEADER_SIZE + tx_info->iv_size : 0); in chcr_ktls_xmit_wr_short() 1419 memcpy(pos + tx_info->salt_size, &iv_record, tx_info->iv_size); in chcr_ktls_xmit_wr_short() 1420 *(__be32 *)(pos + tx_info->salt_size + tx_info->iv_size) = in chcr_ktls_xmit_wr_short() 1422 (TLS_HEADER_SIZE + tx_info->iv_size)) / AES_BLOCK_LEN) : 0)); in chcr_ktls_xmit_wr_short() 1803 if (tls_rec_offset + data_len <= (TLS_HEADER_SIZE + tx_info->iv_size)) { in chcr_short_record_handler() 1821 if (tls_rec_offset < (TLS_HEADER_SIZE + tx_info->iv_size)) { in chcr_short_record_handler() 1828 (TLS_HEADER_SIZE + tx_info->iv_size)) in chcr_short_record_handler()
|
| /linux/drivers/crypto/hisilicon/sec2/ |
| H A D | sec_crypto.c | 1646 u32 iv_size = req->ctx->c_ctx.ivsize; in sec_update_iv() local 1663 sz = sg_pcopy_to_buffer(sgl, sg_nents(sgl), iv, iv_size, in sec_update_iv() 1664 cryptlen - iv_size); in sec_update_iv() 1665 if (unlikely(sz != iv_size)) in sec_update_iv() 1668 sz = (cryptlen + iv_size - 1) / iv_size; in sec_update_iv() 1669 ctr_iv_inc(iv, iv_size, sz); in sec_update_iv() 2372 sec_min_key_size, sec_max_key_size, blk_size, iv_size)\ argument 2391 .ivsize = iv_size,\ 2600 ctx_exit, blk_size, iv_size, max_authsize)\ argument 2618 .ivsize = iv_size,\
|
| /linux/include/net/ |
| H A D | tls.h | 216 u16 iv_size; member
|
| /linux/net/tipc/ |
| H A D | crypto.c | 690 unsigned int iv_size, req_size; in tipc_aead_mem_alloc() local 694 iv_size = crypto_aead_ivsize(tfm); in tipc_aead_mem_alloc() 698 len += iv_size; in tipc_aead_mem_alloc() 711 *req = (struct aead_request *)PTR_ALIGN(*iv + iv_size, in tipc_aead_mem_alloc()
|
| /linux/fs/smb/client/ |
| H A D | smb2ops.c | 4333 unsigned int iv_size = crypto_aead_ivsize(tfm); in smb2_aead_req_alloc() local 4341 len = iv_size; in smb2_aead_req_alloc() 4353 *req = (struct aead_request *)PTR_ALIGN(*iv + iv_size, in smb2_aead_req_alloc()
|