| /linux/drivers/crypto/caam/ |
| H A D | caamalg_desc.h | 61 struct alginfo *adata, unsigned int ivsize, 67 struct alginfo *adata, unsigned int ivsize, 73 struct alginfo *adata, unsigned int ivsize, 79 unsigned int ivsize, unsigned int icvsize, 83 unsigned int ivsize, unsigned int icvsize, 87 unsigned int ivsize, unsigned int icvsize, 91 unsigned int ivsize, unsigned int icvsize, 95 unsigned int ivsize, unsigned int icvsize, 99 unsigned int ivsize, unsigned int icvsize, 103 struct alginfo *adata, unsigned int ivsize, [all …]
|
| H A D | caamalg.c | 201 unsigned int ivsize = crypto_aead_ivsize(aead); in aead_set_sh_desc() local 271 cnstr_shdsc_aead_encap(desc, &ctx->cdata, &ctx->adata, ivsize, in aead_set_sh_desc() 293 cnstr_shdsc_aead_decap(desc, &ctx->cdata, &ctx->adata, ivsize, in aead_set_sh_desc() 317 cnstr_shdsc_aead_givencap(desc, &ctx->cdata, &ctx->adata, ivsize, in aead_set_sh_desc() 342 unsigned int ivsize = crypto_aead_ivsize(aead); in gcm_set_sh_desc() local 364 cnstr_shdsc_gcm_encap(desc, &ctx->cdata, ivsize, ctx->authsize, false); in gcm_set_sh_desc() 381 cnstr_shdsc_gcm_decap(desc, &ctx->cdata, ivsize, ctx->authsize, false); in gcm_set_sh_desc() 407 unsigned int ivsize = crypto_aead_ivsize(aead); in rfc4106_set_sh_desc() local 429 cnstr_shdsc_rfc4106_encap(desc, &ctx->cdata, ivsize, ctx->authsize, in rfc4106_set_sh_desc() 447 cnstr_shdsc_rfc4106_decap(desc, &ctx->cdata, ivsize, ctx->authsize, in rfc4106_set_sh_desc() [all …]
|
| H A D | caamalg_qi.c | 90 unsigned int ivsize = crypto_aead_ivsize(aead); in aead_set_sh_desc() local 150 ivsize, ctx->authsize, is_rfc3686, nonce, in aead_set_sh_desc() 165 ivsize, ctx->authsize, alg->caam.geniv, in aead_set_sh_desc() 183 ivsize, ctx->authsize, is_rfc3686, nonce, in aead_set_sh_desc() 308 unsigned int ivsize = crypto_aead_ivsize(aead); in gcm_set_sh_desc() local 327 cnstr_shdsc_gcm_encap(ctx->sh_desc_enc, &ctx->cdata, ivsize, in gcm_set_sh_desc() 342 cnstr_shdsc_gcm_decap(ctx->sh_desc_dec, &ctx->cdata, ivsize, in gcm_set_sh_desc() 411 unsigned int ivsize = crypto_aead_ivsize(aead); in rfc4106_set_sh_desc() local 431 cnstr_shdsc_rfc4106_encap(ctx->sh_desc_enc, &ctx->cdata, ivsize, in rfc4106_set_sh_desc() 445 cnstr_shdsc_rfc4106_decap(ctx->sh_desc_dec, &ctx->cdata, ivsize, in rfc4106_set_sh_desc() [all …]
|
| H A D | caamalg_desc.c | 290 struct alginfo *adata, unsigned int ivsize, in cnstr_shdsc_aead_encap() argument 316 append_seq_load(desc, ivsize, LDST_CLASS_1_CCB | in cnstr_shdsc_aead_encap() 385 struct alginfo *adata, unsigned int ivsize, in cnstr_shdsc_aead_decap() argument 412 append_seq_load(desc, ivsize, LDST_CLASS_1_CCB | in cnstr_shdsc_aead_decap() 422 ivsize); in cnstr_shdsc_aead_decap() 430 ivsize); in cnstr_shdsc_aead_decap() 444 append_seq_load(desc, ivsize, LDST_CLASS_1_CCB | in cnstr_shdsc_aead_decap() 448 (ctx1_iv_off << MOVE_OFFSET_SHIFT) | ivsize); in cnstr_shdsc_aead_decap() 502 struct alginfo *adata, unsigned int ivsize, in cnstr_shdsc_aead_givencap() argument 530 append_seq_load(desc, ivsize, LDST_CLASS_1_CCB | in cnstr_shdsc_aead_givencap() [all …]
|
| H A D | caamalg_qi2.c | 154 int dst_nents, dma_addr_t iv_dma, int ivsize, in caam_unmap() argument 168 dma_unmap_single(dev, iv_dma, ivsize, iv_dir); in caam_unmap() 179 unsigned int ivsize = crypto_aead_ivsize(aead); in aead_set_sh_desc() local 244 ivsize, ctx->authsize, is_rfc3686, in aead_set_sh_desc() 249 ivsize, ctx->authsize, is_rfc3686, nonce, in aead_set_sh_desc() 270 ivsize, ctx->authsize, alg->caam.geniv, in aead_set_sh_desc() 370 int ivsize = 0; in aead_edesc_alloc() local 450 ivsize = crypto_aead_ivsize(aead); in aead_edesc_alloc() 464 qm_sg_nents = 1 + !!ivsize + mapped_src_nents; in aead_edesc_alloc() 469 1 + !!ivsize + in aead_edesc_alloc() [all …]
|
| /linux/crypto/ |
| H A D | seqiv.c | 56 unsigned int ivsize = 8; in seqiv_aead_encrypt() local 59 if (req->cryptlen < ivsize) in seqiv_aead_encrypt() 75 info = kmemdup(req->iv, ivsize, req->base.flags & in seqiv_aead_encrypt() 87 req->cryptlen - ivsize, info); in seqiv_aead_encrypt() 88 aead_request_set_ad(subreq, req->assoclen + ivsize); in seqiv_aead_encrypt() 90 crypto_xor(info, ctx->salt, ivsize); in seqiv_aead_encrypt() 91 scatterwalk_map_and_copy(info, req->dst, req->assoclen, ivsize, 1); in seqiv_aead_encrypt() 106 unsigned int ivsize = 8; in seqiv_aead_decrypt() local 108 if (req->cryptlen < ivsize + crypto_aead_authsize(geniv)) in seqiv_aead_decrypt() 118 req->cryptlen - ivsize, req->iv); in seqiv_aead_decrypt() [all …]
|
| H A D | essiv.c | 189 int ivsize = crypto_aead_ivsize(tfm); in essiv_aead_crypt() local 190 int ssize = req->assoclen - ivsize; in essiv_aead_crypt() 206 scatterwalk_map_and_copy(req->iv, req->dst, ssize, ivsize, 1); in essiv_aead_crypt() 216 memcpy(iv, req->iv, ivsize); in essiv_aead_crypt() 236 sg_set_buf(rctx->sg + 1, iv, ivsize); in essiv_aead_crypt() 412 int ivsize) in essiv_supported_algorithms() argument 427 if (ivsize != alg->cra_blocksize) in essiv_supported_algorithms() 454 int ivsize; in essiv_create() local 492 ivsize = skcipher_alg->ivsize; in essiv_create() 516 ivsize = aead_alg->ivsize; in essiv_create() [all …]
|
| H A D | chacha.c | 114 .ivsize = CHACHA_IV_SIZE, 130 .ivsize = XCHACHA_IV_SIZE, 146 .ivsize = XCHACHA_IV_SIZE,
|
| H A D | algif_aead.c | 60 unsigned int ivsize = crypto_aead_ivsize(tfm); in aead_sendmsg() local 62 return af_alg_sendmsg(sock, msg, size, ivsize); in aead_sendmsg() 75 unsigned int ivsize = crypto_aead_ivsize(tfm); in _aead_recvmsg() local 130 crypto_aead_reqsize(tfm) + ivsize); in _aead_recvmsg() 136 memcpy(iv, ctx->iv, ivsize); in _aead_recvmsg()
|
| H A D | testmgr.c | 2040 const unsigned int ivsize = crypto_aead_ivsize(tfm); in test_aead_vec_cfg() local 2090 if (WARN_ON(ivsize > MAX_IVLEN)) in test_aead_vec_cfg() 2093 memcpy(iv, vec->iv, ivsize); in test_aead_vec_cfg() 2095 memset(iv, 0, ivsize); in test_aead_vec_cfg() 2279 unsigned int ivsize) in mutate_aead_message() argument 2281 const unsigned int aad_tail_size = aad_iv ? ivsize : 0; in mutate_aead_message() 2314 const unsigned int ivsize = crypto_aead_ivsize(tfm); in generate_aead_message() local 2322 if (suite->aad_iv && vec->alen >= ivsize) in generate_aead_message() 2324 memcpy((u8 *)vec->assoc + vec->alen - ivsize, vec->iv, ivsize); in generate_aead_message() 2344 memcpy(iv, vec->iv, ivsize); in generate_aead_message() [all …]
|
| /linux/drivers/crypto/cavium/nitrox/ |
| H A D | nitrox_skcipher.c | 84 int ivsize = crypto_skcipher_ivsize(cipher); in nitrox_cbc_cipher_callback() local 85 unsigned int start = skreq->cryptlen - ivsize; in nitrox_cbc_cipher_callback() 93 scatterwalk_map_and_copy(skreq->iv, skreq->dst, start, ivsize, in nitrox_cbc_cipher_callback() 98 ivsize, 0); in nitrox_cbc_cipher_callback() 100 memcpy(skreq->iv, nkreq->iv_out, ivsize); in nitrox_cbc_cipher_callback() 208 static int alloc_src_sglist(struct skcipher_request *skreq, int ivsize) in alloc_src_sglist() argument 215 ret = alloc_src_req_buf(nkreq, nents, ivsize); in alloc_src_sglist() 219 nitrox_creq_copy_iv(nkreq->src, skreq->iv, ivsize); in alloc_src_sglist() 220 nitrox_creq_set_src_sg(nkreq, nents, ivsize, skreq->src, in alloc_src_sglist() 226 static int alloc_dst_sglist(struct skcipher_request *skreq, int ivsize) in alloc_dst_sglist() argument [all …]
|
| H A D | nitrox_aead.c | 94 struct scatterlist *src, char *iv, int ivsize, in alloc_src_sglist() argument 106 ret = alloc_src_req_buf(nkreq, nents, ivsize); in alloc_src_sglist() 110 nitrox_creq_copy_iv(nkreq->src, iv, ivsize); in alloc_src_sglist() 111 nitrox_creq_set_src_sg(nkreq, nents, ivsize, src, buflen); in alloc_src_sglist() 117 struct scatterlist *dst, int ivsize, int buflen) in alloc_dst_sglist() argument 136 nitrox_creq_set_dst_sg(nkreq, nents, ivsize, dst, buflen); in alloc_dst_sglist() 167 creq->gph.param2 = cpu_to_be16(rctx->ivsize + rctx->assoclen); in nitrox_set_creq() 169 param3.auth_offset = rctx->ivsize; in nitrox_set_creq() 175 ret = alloc_src_sglist(&rctx->nkreq, rctx->src, rctx->iv, rctx->ivsize, in nitrox_set_creq() 180 ret = alloc_dst_sglist(&rctx->nkreq, rctx->dst, rctx->ivsize, in nitrox_set_creq() [all …]
|
| H A D | nitrox_req.h | 241 int ivsize; member 621 int nents, int ivsize) in alloc_src_req_buf() argument 625 nkreq->src = alloc_req_buf(nents, ivsize, creq->gfp); in alloc_src_req_buf() 637 static inline struct scatterlist *nitrox_creq_src_sg(char *iv, int ivsize) in nitrox_creq_src_sg() argument 639 return (struct scatterlist *)(iv + ivsize); in nitrox_creq_src_sg() 643 int nents, int ivsize, in nitrox_creq_set_src_sg() argument 650 creq->src = nitrox_creq_src_sg(iv, ivsize); in nitrox_creq_set_src_sg() 661 sg = create_single_sg(sg, iv, ivsize); in nitrox_creq_set_src_sg() 701 int nents, int ivsize, in nitrox_creq_set_dst_sg() argument 721 sg = create_single_sg(sg, iv, ivsize); in nitrox_creq_set_dst_sg()
|
| /linux/drivers/crypto/rockchip/ |
| H A D | rk3288_crypto_skcipher.c | 306 int ivsize = crypto_skcipher_ivsize(tfm); in rk_cipher_run() local 324 if (areq->iv && ivsize > 0) { in rk_cipher_run() 326 offset = areq->cryptlen - ivsize; in rk_cipher_run() 328 offset, ivsize, 0); in rk_cipher_run() 343 offset = sgs->length - ivsize; in rk_cipher_run() 344 scatterwalk_map_and_copy(biv, sgs, offset, ivsize, 0); in rk_cipher_run() 366 if (ivsize) { in rk_cipher_run() 367 if (ivsize == DES_BLOCK_SIZE) in rk_cipher_run() 368 memcpy_toio(rkc->reg + RK_CRYPTO_TDES_IV_0, ivtouse, ivsize); in rk_cipher_run() 370 memcpy_toio(rkc->reg + RK_CRYPTO_AES_IV_0, ivtouse, ivsize); in rk_cipher_run() [all …]
|
| /linux/drivers/crypto/amlogic/ |
| H A D | amlogic-gxl-cipher.c | 99 unsigned int keyivlen, ivsize, offset, tloffset; in meson_cipher() local 129 ivsize = crypto_skcipher_ivsize(tfm); in meson_cipher() 130 if (areq->iv && ivsize > 0) { in meson_cipher() 131 if (ivsize > areq->cryptlen) { in meson_cipher() 132 dev_err(mc->dev, "invalid ivsize=%d vs len=%d\n", ivsize, areq->cryptlen); in meson_cipher() 136 memcpy(bkeyiv + 32, areq->iv, ivsize); in meson_cipher() 139 backup_iv = kzalloc(ivsize, GFP_KERNEL); in meson_cipher() 144 offset = areq->cryptlen - ivsize; in meson_cipher() 146 ivsize, 0); in meson_cipher() 245 if (areq->iv && ivsize > 0) { in meson_cipher() [all …]
|
| /linux/drivers/crypto/allwinner/sun4i-ss/ |
| H A D | sun4i-ss-cipher.c | 20 unsigned int ivsize = crypto_skcipher_ivsize(tfm); in sun4i_ss_opti_poll() local 49 if (areq->iv && ivsize > 0 && mode & SS_DECRYPTION) { in sun4i_ss_opti_poll() 51 areq->cryptlen - ivsize, ivsize, 0); in sun4i_ss_opti_poll() 66 for (i = 0; i < 4 && i < ivsize / 4; i++) { in sun4i_ss_opti_poll() 134 memcpy(areq->iv, ctx->backup_iv, ivsize); in sun4i_ss_opti_poll() 135 memzero_explicit(ctx->backup_iv, ivsize); in sun4i_ss_opti_poll() 137 scatterwalk_map_and_copy(areq->iv, areq->dst, areq->cryptlen - ivsize, in sun4i_ss_opti_poll() 138 ivsize, 0); in sun4i_ss_opti_poll() 184 unsigned int ivsize = crypto_skcipher_ivsize(tfm); in sun4i_ss_cipher_poll() local 242 if (areq->iv && ivsize > 0 && mode & SS_DECRYPTION) { in sun4i_ss_cipher_poll() [all …]
|
| /linux/drivers/crypto/marvell/octeontx/ |
| H A D | otx_cptvf_algs.c | 152 u32 start, ivsize; in output_iv_copyback() local 161 ivsize = crypto_skcipher_ivsize(stfm); in output_iv_copyback() 162 start = sreq->cryptlen - ivsize; in output_iv_copyback() 166 ivsize, 0); in output_iv_copyback() 170 start, ivsize, 0); in output_iv_copyback() 172 memcpy(sreq->iv, req_info->iv_out, ivsize); in output_iv_copyback() 242 int ivsize = crypto_skcipher_ivsize(stfm); in create_ctx_hdr() local 243 u32 start = req->cryptlen - ivsize; in create_ctx_hdr() 260 req_info->iv_out = kmalloc(ivsize, flags); in create_ctx_hdr() 265 start, ivsize, 0); in create_ctx_hdr() [all …]
|
| /linux/security/keys/encrypted-keys/ |
| H A D | encrypted.c | 44 static unsigned int ivsize; 92 ivsize = crypto_skcipher_ivsize(tfm); in aes_get_sizes() 636 + strlen(datalen) + 1 + ivsize + 1 + encrypted_datalen; in encrypted_key_alloc() 668 asciilen = (ivsize + 1 + encrypted_datalen + HASH_SIZE) * 2; in encrypted_key_decrypt() 672 hex_encoded_data = hex_encoded_iv + (2 * ivsize) + 2; in encrypted_key_decrypt() 673 ret = hex2bin(epayload->iv, hex_encoded_iv, ivsize); in encrypted_key_decrypt() 722 epayload->encrypted_data = epayload->iv + ivsize + 1; in __ekey_init() 766 get_random_bytes(epayload->iv, ivsize); in encrypted_init() 770 get_random_bytes(epayload->iv, ivsize); in encrypted_init() 887 memcpy(new_epayload->iv, epayload->iv, ivsize); in encrypted_update() 43 static unsigned int ivsize; global() variable [all...] |
| /linux/drivers/crypto/ccree/ |
| H A D | cc_buffer_mgr.h | 45 unsigned int ivsize, unsigned int nbytes, 49 void cc_unmap_cipher_request(struct device *dev, void *ctx, unsigned int ivsize,
|
| H A D | cc_buffer_mgr.c | 340 unsigned int ivsize, struct scatterlist *src, in cc_unmap_cipher_request() argument 347 &req_ctx->gen_ctx.iv_dma_addr, ivsize); in cc_unmap_cipher_request() 349 ivsize, DMA_BIDIRECTIONAL); in cc_unmap_cipher_request() 371 unsigned int ivsize, unsigned int nbytes, in cc_map_cipher_request() argument 389 if (ivsize) { in cc_map_cipher_request() 390 dump_byte_array("iv", info, ivsize); in cc_map_cipher_request() 392 dma_map_single(dev, info, ivsize, DMA_BIDIRECTIONAL); in cc_map_cipher_request() 395 ivsize, info); in cc_map_cipher_request() 399 ivsize, info, &req_ctx->gen_ctx.iv_dma_addr); in cc_map_cipher_request() 453 cc_unmap_cipher_request(dev, req_ctx, ivsize, src, dst); in cc_map_cipher_request()
|
| /linux/drivers/crypto/virtio/ |
| H A D | virtio_crypto_skcipher_algs.c | 328 unsigned int ivsize = crypto_skcipher_ivsize(tfm); in __virtio_crypto_skcipher_do_req() local 381 req_data->u.sym_req.u.cipher.para.iv_len = cpu_to_le32(ivsize); in __virtio_crypto_skcipher_do_req() 396 if (unlikely(req->cryptlen + dst_len + ivsize + in __virtio_crypto_skcipher_do_req() 416 iv = kzalloc_node(ivsize, GFP_ATOMIC, in __virtio_crypto_skcipher_do_req() 422 memcpy(iv, req->iv, ivsize); in __virtio_crypto_skcipher_do_req() 428 sg_init_one(&iv_sg, iv, ivsize); in __virtio_crypto_skcipher_do_req() 582 .ivsize = AES_BLOCK_SIZE,
|
| /linux/net/sunrpc/auth_gss/ |
| H A D | gss_krb5_crypto.c | 479 u8 *iv, unsigned int ivsize) in krb5_cbc_cts_encrypt() argument 524 memcpy(iv, desc.iv, ivsize); in krb5_cbc_cts_encrypt() 734 unsigned int ivsize = crypto_sync_skcipher_ivsize(cipher); in krb5_etm_checksum() local 744 iv = kzalloc(ivsize, GFP_KERNEL); in krb5_etm_checksum() 756 sg_init_one(sg, iv, ivsize); in krb5_etm_checksum() 757 ahash_request_set_crypt(req, sg, NULL, ivsize); in krb5_etm_checksum()
|
| /linux/drivers/crypto/cavium/cpt/ |
| H A D | cptvf_algs.c | 346 .ivsize = AES_BLOCK_SIZE, 364 .ivsize = AES_BLOCK_SIZE, 401 .ivsize = DES_BLOCK_SIZE, 419 .ivsize = DES_BLOCK_SIZE,
|
| /linux/drivers/crypto/bcm/ |
| H A D | cipher.c | 3033 .ivsize = GCM_AES_IV_SIZE, 3056 .ivsize = CCM_AES_IV_SIZE, 3079 .ivsize = GCM_RFC4106_IV_SIZE, 3102 .ivsize = CCM_AES_IV_SIZE, 3125 .ivsize = GCM_RFC4106_IV_SIZE, 3150 .ivsize = AES_BLOCK_SIZE, 3175 .ivsize = AES_BLOCK_SIZE, 3200 .ivsize = AES_BLOCK_SIZE, 3225 .ivsize = DES_BLOCK_SIZE, 3250 .ivsize = DES_BLOCK_SIZE, [all …]
|
| /linux/drivers/crypto/qce/ |
| H A D | cipher.h | 37 unsigned int ivsize; member
|