Searched refs:ivsize (Results 26 - 50 of 172) sorted by relevance

1234567

/linux-master/crypto/
H A Dchacha_generic.c80 .ivsize = CHACHA_IV_SIZE,
95 .ivsize = XCHACHA_IV_SIZE,
110 .ivsize = XCHACHA_IV_SIZE,
H A Dlskcipher.c75 unsigned ivsize = crypto_lskcipher_ivsize(tfm); local
89 memcpy(tiv, iv, ivsize + statesize);
117 memcpy(iv, tiv, ivsize + statesize);
169 unsigned ivsize; local
173 ivsize = crypto_lskcipher_ivsize(tfm);
175 memcpy(ivs, req->iv, ivsize);
196 memcpy(req->iv, ivs, ivsize);
258 seq_printf(m, "ivsize : %u\n", skcipher->co.ivsize);
277 rblkcipher.ivsize
[all...]
H A Decb.c134 inst->alg.co.ivsize = cipher_alg->cra_blocksize;
159 inst->alg.co.ivsize = 0;
188 inst->alg.co.ivsize = 0;
189 if (cipher_alg->co.ivsize)
H A Daead.c147 raead.ivsize = aead->ivsize;
162 seq_printf(m, "ivsize : %u\n", aead->ivsize);
215 if (max3(alg->maxauthsize, alg->ivsize, alg->chunksize) >
H A Dbpf_crypto_skcipher.c62 .ivsize = bpf_crypto_lskcipher_ivsize,
H A Dskcipher.c169 memcpy(walk->oiv, walk->iv, walk->ivsize);
208 memcpy(walk->oiv, walk->iv, walk->ivsize);
399 unsigned ivsize = walk->ivsize; local
411 size += ivsize;
413 size += aligned_bs + ivsize;
426 walk->iv = memcpy(iv, walk->iv, walk->ivsize);
469 walk->ivsize = crypto_skcipher_ivsize(tfm);
539 walk->ivsize = crypto_aead_ivsize(tfm);
782 seq_printf(m, "ivsize
[all...]
/linux-master/arch/mips/crypto/
H A Dchacha-glue.c91 .ivsize = CHACHA_IV_SIZE,
106 .ivsize = XCHACHA_IV_SIZE,
121 .ivsize = XCHACHA_IV_SIZE,
/linux-master/arch/arm/crypto/
H A Dchacha-glue.c206 .ivsize = CHACHA_IV_SIZE,
221 .ivsize = XCHACHA_IV_SIZE,
236 .ivsize = XCHACHA_IV_SIZE,
255 .ivsize = CHACHA_IV_SIZE,
271 .ivsize = XCHACHA_IV_SIZE,
287 .ivsize = XCHACHA_IV_SIZE,
/linux-master/drivers/crypto/allwinner/sun4i-ss/
H A Dsun4i-ss-cipher.c20 unsigned int ivsize = crypto_skcipher_ivsize(tfm); local
49 if (areq->iv && ivsize > 0 && mode & SS_DECRYPTION) {
51 areq->cryptlen - ivsize, ivsize, 0);
66 for (i = 0; i < 4 && i < ivsize / 4; i++) {
134 memcpy(areq->iv, ctx->backup_iv, ivsize);
135 memzero_explicit(ctx->backup_iv, ivsize);
137 scatterwalk_map_and_copy(areq->iv, areq->dst, areq->cryptlen - ivsize,
138 ivsize, 0);
184 unsigned int ivsize local
[all...]
/linux-master/arch/x86/crypto/
H A Dsm4_aesni_avx2_glue.c77 .ivsize = SM4_BLOCK_SIZE,
94 .ivsize = SM4_BLOCK_SIZE,
/linux-master/include/uapi/linux/
H A Dcryptouser.h178 unsigned int ivsize; member in struct:crypto_report_blkcipher
186 unsigned int ivsize; member in struct:crypto_report_aead
/linux-master/drivers/crypto/qce/
H A Daead.c363 unsigned int msglen_size, ivsize; local
376 ivsize = rctx->ivsize;
384 rctx->iv[ivsize - i - 1] = 0;
396 memcpy(&rctx->ccm_nonce[0], rctx->iv, rctx->ivsize);
426 rctx->ivsize = AES_BLOCK_SIZE;
429 rctx->ivsize = crypto_aead_ivsize(tfm);
696 unsigned int ivsize; member in struct:qce_aead_def
706 .ivsize = DES_BLOCK_SIZE,
714 .ivsize
[all...]
H A Dcommon.c281 static void qce_xts_swapiv(__be32 *dst, const u8 *src, unsigned int ivsize) argument
286 if (ivsize > QCE_AES_IV_LENGTH)
291 for (i = (QCE_AES_IV_LENGTH - ivsize), j = ivsize - 1;
326 unsigned int ivsize = rctx->ivsize; local
362 qce_xts_swapiv(enciv, rctx->iv, ivsize);
364 qce_cpu_to_be32p_array(enciv, rctx->iv, ivsize);
434 unsigned int enc_ivsize = rctx->ivsize;
/linux-master/fs/crypto/
H A Dkeysetup.c22 .ivsize = 16,
30 .ivsize = 16,
37 .ivsize = 16,
45 .ivsize = 16,
52 .ivsize = 16,
60 .ivsize = 16,
67 .ivsize = 32,
75 .ivsize = 32,
128 if (WARN_ON_ONCE(crypto_skcipher_ivsize(tfm) != mode->ivsize)) {
582 WARN_ON_ONCE(mode->ivsize > FSCRYPT_MAX_IV_SIZ
[all...]
/linux-master/drivers/crypto/intel/ixp4xx/
H A Dixp4xx_crypto.c394 unsigned int ivsize = crypto_skcipher_ivsize(tfm); local
397 if (ivsize > 0) {
398 offset = req->cryptlen - ivsize;
401 offset, ivsize, 0);
403 memcpy(req->iv, req_ctx->iv, ivsize);
404 memzero_explicit(req_ctx->iv, ivsize);
977 unsigned int ivsize = crypto_skcipher_ivsize(tfm); local
1012 BUG_ON(ivsize && !req->iv);
1013 memcpy(crypt->iv, req->iv, ivsize);
1014 if (ivsize >
1093 unsigned int ivsize = crypto_aead_ivsize(tfm); local
[all...]
/linux-master/drivers/crypto/marvell/octeontx/
H A Dotx_cptvf_algs.c151 u32 start, ivsize; local
160 ivsize = crypto_skcipher_ivsize(stfm);
161 start = sreq->cryptlen - ivsize;
165 ivsize, 0);
169 start, ivsize, 0);
171 memcpy(sreq->iv, req_info->iv_out, ivsize);
241 int ivsize = crypto_skcipher_ivsize(stfm); local
242 u32 start = req->cryptlen - ivsize;
259 req_info->iv_out = kmalloc(ivsize, flags);
264 start, ivsize,
[all...]
/linux-master/drivers/crypto/marvell/octeontx2/
H A Dotx2_cptvf_algs.c134 u32 start, ivsize; local
143 ivsize = crypto_skcipher_ivsize(stfm);
144 start = sreq->cryptlen - ivsize;
148 ivsize, 0);
152 start, ivsize, 0);
154 memcpy(sreq->iv, req_info->iv_out, ivsize);
227 int ivsize = crypto_skcipher_ivsize(stfm); local
228 u32 start = req->cryptlen - ivsize;
245 req_info->iv_out = kmalloc(ivsize, flags);
250 start, ivsize,
[all...]
/linux-master/include/crypto/
H A Daead.h68 * rfc4543, and rfc7539esp ciphers. For these ciphers, the final 'ivsize' bytes
122 * @ivsize: see struct skcipher_alg
137 * All fields except @ivsize is mandatory and must be filled.
148 unsigned int ivsize; member in struct:aead_alg
224 return alg->ivsize;
/linux-master/arch/arm64/crypto/
H A Dchacha-neon-glue.c174 .ivsize = CHACHA_IV_SIZE,
190 .ivsize = XCHACHA_IV_SIZE,
206 .ivsize = XCHACHA_IV_SIZE,
/linux-master/drivers/crypto/ccp/
H A Dccp-crypto-aes-galois.c171 .ivsize = GCM_AES_IV_SIZE,
192 unsigned int ivsize; member in struct:ccp_aes_aead_def
203 .ivsize = AES_BLOCK_SIZE,
/linux-master/drivers/crypto/
H A Dtalitos.c993 unsigned int ivsize = crypto_aead_ivsize(aead); local
1014 sg_pcopy_to_buffer(areq->dst, dst_nents, ctx->iv, ivsize,
1015 areq->assoclen + cryptlen - ivsize);
1028 unsigned int ivsize = crypto_aead_ivsize(authenc); local
1035 dma_unmap_single(dev, edesc->iv_dma, ivsize, DMA_TO_DEVICE);
1205 unsigned int ivsize = crypto_aead_ivsize(aead); local
1239 to_talitos_ptr(civ_ptr, edesc->iv_dma, ivsize, is_sec1);
1300 map_single_talitos_ptr(dev, &desc->ptr[6], ivsize, ctx->iv,
1326 unsigned int ivsize,
1394 alloc_len += ivsize;
1319 talitos_edesc_alloc(struct device *dev, struct scatterlist *src, struct scatterlist *dst, u8 *iv, unsigned int assoclen, unsigned int cryptlen, unsigned int authsize, unsigned int ivsize, int icv_stashing, u32 cryptoflags, bool encrypt) argument
1423 unsigned int ivsize = crypto_aead_ivsize(authenc); local
1553 unsigned int ivsize = crypto_skcipher_ivsize(cipher); local
1577 unsigned int ivsize = crypto_skcipher_ivsize(cipher); local
1644 unsigned int ivsize = crypto_skcipher_ivsize(cipher); local
[all...]
H A Datmel-tdes.c527 unsigned int ivsize = crypto_skcipher_ivsize(skcipher); local
529 if (req->cryptlen < ivsize)
534 req->cryptlen - ivsize, ivsize, 0);
536 memcpy(req->iv, rctx->lastc, ivsize);
657 unsigned int ivsize = crypto_skcipher_ivsize(skcipher); local
659 if (req->cryptlen >= ivsize)
661 req->cryptlen - ivsize,
662 ivsize, 0);
816 .ivsize
[all...]
/linux-master/arch/powerpc/crypto/
H A Dchacha-p10-glue.c160 .ivsize = CHACHA_IV_SIZE,
175 .ivsize = XCHACHA_IV_SIZE,
190 .ivsize = XCHACHA_IV_SIZE,
/linux-master/security/keys/encrypted-keys/
H A Dencrypted.c46 static unsigned int ivsize; variable
96 ivsize = crypto_skcipher_ivsize(tfm);
663 + strlen(datalen) + 1 + ivsize + 1 + encrypted_datalen;
695 asciilen = (ivsize + 1 + encrypted_datalen + HASH_SIZE) * 2;
699 hex_encoded_data = hex_encoded_iv + (2 * ivsize) + 2;
700 ret = hex2bin(epayload->iv, hex_encoded_iv, ivsize);
749 epayload->encrypted_data = epayload->iv + ivsize + 1;
793 get_random_bytes(epayload->iv, ivsize);
797 get_random_bytes(epayload->iv, ivsize);
914 memcpy(new_epayload->iv, epayload->iv, ivsize);
[all...]
/linux-master/drivers/crypto/virtio/
H A Dvirtio_crypto_skcipher_algs.c330 unsigned int ivsize = crypto_skcipher_ivsize(tfm); local
383 req_data->u.sym_req.u.cipher.para.iv_len = cpu_to_le32(ivsize);
398 if (unlikely(req->cryptlen + dst_len + ivsize +
418 iv = kzalloc_node(ivsize, GFP_ATOMIC,
424 memcpy(iv, req->iv, ivsize);
430 sg_init_one(&iv_sg, iv, ivsize);
593 .ivsize = AES_BLOCK_SIZE,

Completed in 219 milliseconds

1234567