Lines Matching defs:in

63  * To use a priority other than the default, set the priority in the insmod or
82 * Bits 3 and 4 in the first byte encode the channel number (the dma ringset).
101 * channel in round robin order.
124 * The scatterlist that gets allocated here is freed in spu_chunk_cleanup()
139 struct scatterlist *sg; /* used to build sgs in mbox message */
153 /* If XTS tweak in payload, add buffer to receive encrypted tweak */
159 /* Copy in each dst sg entry from request, up to chunksize */
188 * The scatterlist that gets allocated here is freed in spu_chunk_cleanup()
202 struct scatterlist *sg; /* used to build sgs in mbox message */
218 /* if XTS tweak in payload, copy from IV (where crypto API puts it) */
223 /* Copy in each src sg entry from request, up to chunksize */
255 * not in atomic context and we can wait and try again.
282 * handle_skcipher_req() - Submit as much of a block cipher request as fits in
283 * a single SPU request message, starting at the current position in the request
292 * Because requests are submitted in lock step like this, there is no need
312 /* IV or ctr value to use in this SPU msg */
318 /* number of entries in src and dst sg in mailbox message. */
346 /* Count number of sg entries to be included in this request */
369 * CBC Decrypt: next IV is the last ciphertext block in
430 mssg->ctx = rctx; /* Will be returned in response */
512 * @digestsize: length of hash digest, in bytes
516 * The scatterlist that gets allocated here is freed in spu_chunk_cleanup()
531 struct scatterlist *sg; /* used to build sgs in mbox message */
563 * @spu_hdr_len: length in bytes of SPU message header
568 * The scatterlist that gets allocated here is freed in spu_chunk_cleanup()
585 struct scatterlist *sg; /* used to build sgs in mbox message */
604 /* Copy in each src sg entry from request, up to chunksize */
631 * Builds a SPU request message embedded in a mailbox message and submits the
635 * called either on the thread from the crypto API, or, in the case that the
636 * crypto API request is too large to fit in a single SPU request message,
640 * chunk before submitting the next chunk. Because requests are submitted in
662 /* number of bytes still to be hashed in this req */
667 * length of new data, not from hash carry, to be submitted in
688 * number of entries in src and dst sg. Always includes SPU msg header.
760 /* if we have hash carry, then prefix it to the data in this request */
767 /* Count number of sg entries to be used in this request */
771 /* AES hashing keeps key size in type field, so need to copy it here */
830 * Determine total length of padding required. Put all padding in one
862 mssg->ctx = rctx; /* Will be returned in response */
1025 * @assoc_len: Length of associated data included in the crypto request
1026 * @ret_iv_len: Length of IV returned in response
1029 * @digestsize: Length of hash digest, in bytes
1033 * The scatterlist that gets allocated here is freed in spu_chunk_cleanup()
1050 struct scatterlist *sg; /* used to build sgs in mbox message */
1070 /* ICV (after data) must be in the next 32-bit word for CCM */
1076 /* have to catch gcm pad in separate buffer */
1093 * assoc data in the response
1101 * Copy in each dst sg entry from request, up to chunksize.
1102 * dst sg catches just the data. digest caught in separate buf.
1113 /* If GCM/CCM data is padded, catch padding in separate buffer */
1119 /* Always catch ICV in separate buffer */
1142 * @spu_hdr_len: length of SPU message header in bytes
1153 * The scatterlist that gets allocated here is freed in spu_chunk_cleanup()
1173 struct scatterlist *sg; /* used to build sgs in mbox message */
1193 /* Copy in each associated data sg entry from request */
1246 * Unlike other operation types, we assume the length of the request fits in
1251 * truncated algs like sha-224, the SPU returns just the truncated hash in
1281 /* number of entries in src and dst sg. Always includes SPU msg header.
1322 * 8-byte IV is included assoc data in request. SPU2
1339 * be included in this mailbox message. For dst sg, don't count space
1340 * for digest. Digest gets caught in a separate buffer and copied back
1399 * RFC4543: data is included in AAD, so don't pad after AAD
1437 /* Determine total length of padding. Put all padding in one buffer. */
1469 mssg->ctx = rctx; /* Will be returned in response */
1476 * Always catch ICV in separate buffer. Have to for GCM/CCM because of
1486 * in output.
1553 * API doesn't expect ICV in dst buffer.
1680 * we saved data in hash carry, but tell crypto
1732 /* Initialize current position in src and dst scatterlists */
1850 /* SPU needs XTS keys in the reverse order the crypto API presents */
1919 /* Initialize position in src scatterlist */
1931 flow_log("Doing %sfinal %s zero-len hash request in software\n",
1950 * we saved data in hash carry, but tell crypto API
2028 * supported by the hardware, we need to handle it in software
2101 * supported by the hardware, we need to handle it in software
2153 * supported by the hardware, we need to handle it in software
2195 * supported by the hardware, we need to handle it in software
2300 static int ahash_import(struct ahash_request *req, const void *in)
2303 struct spu_hash_export_s *spu_exp = (struct spu_hash_export_s *)in;
2390 * Full HMAC operation in SPUM is not verified,
2392 * outer hashing in software.
2481 * SPU2 supports full HMAC implementation in the
2483 * outer hash in software.
2514 * and AAD are both 0 bytes long. So use fallback in this case.
2550 * 16 or 20 bytes long. So use fallback in this case.
2631 * Init current position in src scatterlist to be after assoc data.
2633 * end in the middle of a buffer.)
2786 /* setkey the fallback just in case we needto use it */
2853 /* setkey the fallback just in case we need to use it */
2889 * @keylen: Length of key plus salt, in bytes
2921 * @keylen: Length of key plus salt, in bytes
2954 * @keylen: Length of key plus salt, in bytes
2991 /* setkey the fallback just in case we needto use it */
4142 * in state size.
4465 /* setkey set in alg initialization */