/linux-master/crypto/ |
H A D | chacha_generic.c | 80 .ivsize = CHACHA_IV_SIZE, 95 .ivsize = XCHACHA_IV_SIZE, 110 .ivsize = XCHACHA_IV_SIZE,
|
H A D | lskcipher.c | 75 unsigned ivsize = crypto_lskcipher_ivsize(tfm); local 89 memcpy(tiv, iv, ivsize + statesize); 117 memcpy(iv, tiv, ivsize + statesize); 169 unsigned ivsize; local 173 ivsize = crypto_lskcipher_ivsize(tfm); 175 memcpy(ivs, req->iv, ivsize); 196 memcpy(req->iv, ivs, ivsize); 258 seq_printf(m, "ivsize : %u\n", skcipher->co.ivsize); 277 rblkcipher.ivsize [all...] |
H A D | ecb.c | 134 inst->alg.co.ivsize = cipher_alg->cra_blocksize; 159 inst->alg.co.ivsize = 0; 188 inst->alg.co.ivsize = 0; 189 if (cipher_alg->co.ivsize)
|
H A D | aead.c | 147 raead.ivsize = aead->ivsize; 162 seq_printf(m, "ivsize : %u\n", aead->ivsize); 215 if (max3(alg->maxauthsize, alg->ivsize, alg->chunksize) >
|
H A D | bpf_crypto_skcipher.c | 62 .ivsize = bpf_crypto_lskcipher_ivsize,
|
H A D | skcipher.c | 169 memcpy(walk->oiv, walk->iv, walk->ivsize); 208 memcpy(walk->oiv, walk->iv, walk->ivsize); 399 unsigned ivsize = walk->ivsize; local 411 size += ivsize; 413 size += aligned_bs + ivsize; 426 walk->iv = memcpy(iv, walk->iv, walk->ivsize); 469 walk->ivsize = crypto_skcipher_ivsize(tfm); 539 walk->ivsize = crypto_aead_ivsize(tfm); 782 seq_printf(m, "ivsize [all...] |
/linux-master/arch/mips/crypto/ |
H A D | chacha-glue.c | 91 .ivsize = CHACHA_IV_SIZE, 106 .ivsize = XCHACHA_IV_SIZE, 121 .ivsize = XCHACHA_IV_SIZE,
|
/linux-master/arch/arm/crypto/ |
H A D | chacha-glue.c | 206 .ivsize = CHACHA_IV_SIZE, 221 .ivsize = XCHACHA_IV_SIZE, 236 .ivsize = XCHACHA_IV_SIZE, 255 .ivsize = CHACHA_IV_SIZE, 271 .ivsize = XCHACHA_IV_SIZE, 287 .ivsize = XCHACHA_IV_SIZE,
|
/linux-master/drivers/crypto/allwinner/sun4i-ss/ |
H A D | sun4i-ss-cipher.c | 20 unsigned int ivsize = crypto_skcipher_ivsize(tfm); local 49 if (areq->iv && ivsize > 0 && mode & SS_DECRYPTION) { 51 areq->cryptlen - ivsize, ivsize, 0); 66 for (i = 0; i < 4 && i < ivsize / 4; i++) { 134 memcpy(areq->iv, ctx->backup_iv, ivsize); 135 memzero_explicit(ctx->backup_iv, ivsize); 137 scatterwalk_map_and_copy(areq->iv, areq->dst, areq->cryptlen - ivsize, 138 ivsize, 0); 184 unsigned int ivsize local [all...] |
/linux-master/arch/x86/crypto/ |
H A D | sm4_aesni_avx2_glue.c | 77 .ivsize = SM4_BLOCK_SIZE, 94 .ivsize = SM4_BLOCK_SIZE,
|
/linux-master/include/uapi/linux/ |
H A D | cryptouser.h | 178 unsigned int ivsize; member in struct:crypto_report_blkcipher 186 unsigned int ivsize; member in struct:crypto_report_aead
|
/linux-master/drivers/crypto/qce/ |
H A D | aead.c | 363 unsigned int msglen_size, ivsize; local 376 ivsize = rctx->ivsize; 384 rctx->iv[ivsize - i - 1] = 0; 396 memcpy(&rctx->ccm_nonce[0], rctx->iv, rctx->ivsize); 426 rctx->ivsize = AES_BLOCK_SIZE; 429 rctx->ivsize = crypto_aead_ivsize(tfm); 696 unsigned int ivsize; member in struct:qce_aead_def 706 .ivsize = DES_BLOCK_SIZE, 714 .ivsize [all...] |
H A D | common.c | 281 static void qce_xts_swapiv(__be32 *dst, const u8 *src, unsigned int ivsize) argument 286 if (ivsize > QCE_AES_IV_LENGTH) 291 for (i = (QCE_AES_IV_LENGTH - ivsize), j = ivsize - 1; 326 unsigned int ivsize = rctx->ivsize; local 362 qce_xts_swapiv(enciv, rctx->iv, ivsize); 364 qce_cpu_to_be32p_array(enciv, rctx->iv, ivsize); 434 unsigned int enc_ivsize = rctx->ivsize;
|
/linux-master/fs/crypto/ |
H A D | keysetup.c | 22 .ivsize = 16, 30 .ivsize = 16, 37 .ivsize = 16, 45 .ivsize = 16, 52 .ivsize = 16, 60 .ivsize = 16, 67 .ivsize = 32, 75 .ivsize = 32, 128 if (WARN_ON_ONCE(crypto_skcipher_ivsize(tfm) != mode->ivsize)) { 582 WARN_ON_ONCE(mode->ivsize > FSCRYPT_MAX_IV_SIZ [all...] |
/linux-master/drivers/crypto/intel/ixp4xx/ |
H A D | ixp4xx_crypto.c | 394 unsigned int ivsize = crypto_skcipher_ivsize(tfm); local 397 if (ivsize > 0) { 398 offset = req->cryptlen - ivsize; 401 offset, ivsize, 0); 403 memcpy(req->iv, req_ctx->iv, ivsize); 404 memzero_explicit(req_ctx->iv, ivsize); 977 unsigned int ivsize = crypto_skcipher_ivsize(tfm); local 1012 BUG_ON(ivsize && !req->iv); 1013 memcpy(crypt->iv, req->iv, ivsize); 1014 if (ivsize > 1093 unsigned int ivsize = crypto_aead_ivsize(tfm); local [all...] |
/linux-master/drivers/crypto/marvell/octeontx/ |
H A D | otx_cptvf_algs.c | 151 u32 start, ivsize; local 160 ivsize = crypto_skcipher_ivsize(stfm); 161 start = sreq->cryptlen - ivsize; 165 ivsize, 0); 169 start, ivsize, 0); 171 memcpy(sreq->iv, req_info->iv_out, ivsize); 241 int ivsize = crypto_skcipher_ivsize(stfm); local 242 u32 start = req->cryptlen - ivsize; 259 req_info->iv_out = kmalloc(ivsize, flags); 264 start, ivsize, [all...] |
/linux-master/drivers/crypto/marvell/octeontx2/ |
H A D | otx2_cptvf_algs.c | 134 u32 start, ivsize; local 143 ivsize = crypto_skcipher_ivsize(stfm); 144 start = sreq->cryptlen - ivsize; 148 ivsize, 0); 152 start, ivsize, 0); 154 memcpy(sreq->iv, req_info->iv_out, ivsize); 227 int ivsize = crypto_skcipher_ivsize(stfm); local 228 u32 start = req->cryptlen - ivsize; 245 req_info->iv_out = kmalloc(ivsize, flags); 250 start, ivsize, [all...] |
/linux-master/include/crypto/ |
H A D | aead.h | 68 * rfc4543, and rfc7539esp ciphers. For these ciphers, the final 'ivsize' bytes 122 * @ivsize: see struct skcipher_alg 137 * All fields except @ivsize is mandatory and must be filled. 148 unsigned int ivsize; member in struct:aead_alg 224 return alg->ivsize;
|
/linux-master/arch/arm64/crypto/ |
H A D | chacha-neon-glue.c | 174 .ivsize = CHACHA_IV_SIZE, 190 .ivsize = XCHACHA_IV_SIZE, 206 .ivsize = XCHACHA_IV_SIZE,
|
/linux-master/drivers/crypto/ccp/ |
H A D | ccp-crypto-aes-galois.c | 171 .ivsize = GCM_AES_IV_SIZE, 192 unsigned int ivsize; member in struct:ccp_aes_aead_def 203 .ivsize = AES_BLOCK_SIZE,
|
/linux-master/drivers/crypto/ |
H A D | talitos.c | 993 unsigned int ivsize = crypto_aead_ivsize(aead); local 1014 sg_pcopy_to_buffer(areq->dst, dst_nents, ctx->iv, ivsize, 1015 areq->assoclen + cryptlen - ivsize); 1028 unsigned int ivsize = crypto_aead_ivsize(authenc); local 1035 dma_unmap_single(dev, edesc->iv_dma, ivsize, DMA_TO_DEVICE); 1205 unsigned int ivsize = crypto_aead_ivsize(aead); local 1239 to_talitos_ptr(civ_ptr, edesc->iv_dma, ivsize, is_sec1); 1300 map_single_talitos_ptr(dev, &desc->ptr[6], ivsize, ctx->iv, 1326 unsigned int ivsize, 1394 alloc_len += ivsize; 1319 talitos_edesc_alloc(struct device *dev, struct scatterlist *src, struct scatterlist *dst, u8 *iv, unsigned int assoclen, unsigned int cryptlen, unsigned int authsize, unsigned int ivsize, int icv_stashing, u32 cryptoflags, bool encrypt) argument 1423 unsigned int ivsize = crypto_aead_ivsize(authenc); local 1553 unsigned int ivsize = crypto_skcipher_ivsize(cipher); local 1577 unsigned int ivsize = crypto_skcipher_ivsize(cipher); local 1644 unsigned int ivsize = crypto_skcipher_ivsize(cipher); local [all...] |
H A D | atmel-tdes.c | 527 unsigned int ivsize = crypto_skcipher_ivsize(skcipher); local 529 if (req->cryptlen < ivsize) 534 req->cryptlen - ivsize, ivsize, 0); 536 memcpy(req->iv, rctx->lastc, ivsize); 657 unsigned int ivsize = crypto_skcipher_ivsize(skcipher); local 659 if (req->cryptlen >= ivsize) 661 req->cryptlen - ivsize, 662 ivsize, 0); 816 .ivsize [all...] |
/linux-master/arch/powerpc/crypto/ |
H A D | chacha-p10-glue.c | 160 .ivsize = CHACHA_IV_SIZE, 175 .ivsize = XCHACHA_IV_SIZE, 190 .ivsize = XCHACHA_IV_SIZE,
|
/linux-master/security/keys/encrypted-keys/ |
H A D | encrypted.c | 46 static unsigned int ivsize; variable 96 ivsize = crypto_skcipher_ivsize(tfm); 663 + strlen(datalen) + 1 + ivsize + 1 + encrypted_datalen; 695 asciilen = (ivsize + 1 + encrypted_datalen + HASH_SIZE) * 2; 699 hex_encoded_data = hex_encoded_iv + (2 * ivsize) + 2; 700 ret = hex2bin(epayload->iv, hex_encoded_iv, ivsize); 749 epayload->encrypted_data = epayload->iv + ivsize + 1; 793 get_random_bytes(epayload->iv, ivsize); 797 get_random_bytes(epayload->iv, ivsize); 914 memcpy(new_epayload->iv, epayload->iv, ivsize); [all...] |
/linux-master/drivers/crypto/virtio/ |
H A D | virtio_crypto_skcipher_algs.c | 330 unsigned int ivsize = crypto_skcipher_ivsize(tfm); local 383 req_data->u.sym_req.u.cipher.para.iv_len = cpu_to_le32(ivsize); 398 if (unlikely(req->cryptlen + dst_len + ivsize + 418 iv = kzalloc_node(ivsize, GFP_ATOMIC, 424 memcpy(iv, req->iv, ivsize); 430 sg_init_one(&iv_sg, iv, ivsize); 593 .ivsize = AES_BLOCK_SIZE,
|