/linux-master/crypto/ |
H A D | gcm.c | 164 sg = scatterwalk_ffwd(pctx->src + 1, req->src, req->assoclen); 171 sg = scatterwalk_ffwd(pctx->dst + 1, req->dst, req->assoclen); 230 lengths.a = cpu_to_be64(req->assoclen * 8); 347 remain = gcm_remain(req->assoclen); 373 if (req->assoclen) 375 req->src, req->assoclen, flags) ?: 417 req->assoclen + req->cryptlen, 474 req->assoclen + cryptlen, authsize, 0); 729 scatterwalk_map_and_copy(iv + GCM_AES_IV_SIZE, req->src, 0, req->assoclen - 8, 0); 735 sg_set_buf(rctx->src, iv + GCM_AES_IV_SIZE, req->assoclen [all...] |
H A D | authenc.c | 125 req->assoclen + req->cryptlen, 146 req->assoclen + req->cryptlen); 154 scatterwalk_map_and_copy(hash, req->dst, req->assoclen + req->cryptlen, 182 skcipher_request_set_crypt(skreq, req->src, req->dst, req->assoclen, 202 src = scatterwalk_ffwd(areq_ctx->src, req->src, req->assoclen); 210 dst = scatterwalk_ffwd(areq_ctx->dst, req->dst, req->assoclen); 245 src = scatterwalk_ffwd(areq_ctx->src, req->src, req->assoclen); 249 dst = scatterwalk_ffwd(areq_ctx->dst, req->dst, req->assoclen); 288 req->assoclen + req->cryptlen - authsize);
|
H A D | aegis.h | 42 unsigned int assoclen,
|
H A D | essiv.c | 202 req->assoclen - crypto_aead_ivsize(tfm), 207 int ssize = req->assoclen - ivsize; 239 sg = scatterwalk_ffwd(rctx->sg + 2, req->src, req->assoclen); 247 aead_request_set_ad(subreq, req->assoclen);
|
H A D | aegis128-neon-inner.c | 318 unsigned int assoclen, 328 v = st.v[3] ^ (uint8x16_t)vcombine_u64(vmov_n_u64(8ULL * assoclen), 317 crypto_aegis128_final_neon(void *state, void *tag_xor, unsigned int assoclen, unsigned int cryptlen, unsigned int authsize) argument
|
H A D | pcrypt.c | 115 aead_request_set_ad(creq, req->assoclen); 164 aead_request_set_ad(creq, req->assoclen);
|
/linux-master/drivers/crypto/ccree/ |
H A D | cc_aead.c | 236 areq->cryptlen, areq->assoclen); 736 areq_ctx->assoclen, NS_BIT); 794 * if assoclen is ZERO only IV perform 1089 if (areq_ctx->assoclen > 0) 1317 unsigned int assoclen = areq_ctx->assoclen; local 1340 if (!IS_ALIGNED(assoclen, sizeof(u32))) 1351 if (!IS_ALIGNED(assoclen, DES_BLOCK_SIZE)) 1476 if (req_ctx->assoclen > 0) { 1568 if (req_ctx->assoclen > [all...] |
H A D | cc_aead.h | 69 u32 assoclen; /* size of AAD buffer to authenticate */ member in struct:aead_req_ctx
|
H A D | cc_buffer_mgr.c | 56 u32 skip = req->assoclen + req->cryptlen; 291 unsigned int assoclen) 307 if (assoclen > 0) { 517 dev_dbg(dev, "Unmapping src sgl: req->src=%pK areq_ctx->src.nents=%u areq_ctx->assoc.nents=%u assoclen:%u cryptlen=%u\n", 519 areq_ctx->assoclen, req->cryptlen); 599 if (areq_ctx->assoclen == 0) { 609 mapped_nents = sg_nents_for_len(req->src, areq_ctx->assoclen); 643 areq_ctx->assoclen, 0, is_last, 802 unsigned int size_for_map = req->assoclen + req->cryptlen; 804 u32 size_to_skip = req->assoclen; 289 cc_set_aead_conf_buf(struct device *dev, struct aead_req_ctx *areq_ctx, u8 *config_data, struct buffer_array *sg_data, unsigned int assoclen) argument [all...] |
/linux-master/drivers/crypto/starfive/ |
H A D | jh7110-aes.c | 120 writel(upper_32_bits(cryp->assoclen), cryp->base + STARFIVE_AES_ALEN0); 121 writel(lower_32_bits(cryp->assoclen), cryp->base + STARFIVE_AES_ALEN1); 221 if (cryp->assoclen) 396 total_len = ALIGN(cryp->assoclen, AES_BLOCK_SIZE) / sizeof(unsigned int); 425 total_len = cryp->assoclen; 474 cryp->assoclen = 0; 478 cryp->assoclen = areq->assoclen; 495 if (cryp->assoclen) { 496 rctx->adata = kzalloc(cryp->assoclen [all...] |
/linux-master/drivers/crypto/chelsio/ |
H A D | chcr_algo.c | 186 authsize, req->assoclen + 2418 (req->assoclen > aadmax) || 2435 aead_request_set_ad(subreq, req->assoclen); 2479 dnents = sg_nents_xlen(req->dst, req->assoclen + req->cryptlen + 2482 snents = sg_nents_xlen(req->src, req->assoclen + req->cryptlen, 2488 reqctx->imm = (transhdr_len + req->assoclen + req->cryptlen) < 2490 temp = reqctx->imm ? roundup(req->assoclen + req->cryptlen, 16) 2518 chcr_req->sec_cpl.pldlen = htonl(req->assoclen + IV + req->cryptlen); 2521 null ? 0 : IV + req->assoclen, 2522 req->assoclen 2937 ccm_format_packet(struct aead_request *req, u8 *ivptr, unsigned int sub_type, unsigned short op_type, unsigned int assoclen) argument 2980 unsigned int assoclen; local 3054 unsigned int sub_type, assoclen = req->assoclen; local 3152 unsigned int dst_size = 0, temp = 0, kctx_len, assoclen = req->assoclen; local [all...] |
/linux-master/drivers/crypto/caam/ |
H A D | caamalg_qi2.h | 104 * @assoclen: associated data length, in CAAM endianness 105 * @assoclen_dma: bus physical mapped address of req->assoclen 114 unsigned int assoclen; member in struct:aead_edesc
|
/linux-master/net/mac802154/ |
H A D | llsec.c | 662 int authlen, assoclen, datalen, rc; local 673 assoclen = skb->mac_len; 680 sg_init_one(&sg, skb_mac_header(skb), assoclen + datalen + authlen); 683 assoclen += datalen; 689 aead_request_set_ad(req, assoclen); 871 int authlen, datalen, assoclen, rc; local 882 assoclen = skb->mac_len; 887 sg_init_one(&sg, skb_mac_header(skb), assoclen + datalen); 890 assoclen += datalen - authlen; 896 aead_request_set_ad(req, assoclen); [all...] |
/linux-master/drivers/crypto/intel/keembay/ |
H A D | keembay-ocs-aes-core.c | 653 aead_request_set_ad(subreq, req->assoclen); 731 req->assoclen + req->cryptlen); 751 dst_size = req->assoclen + out_size; 759 tag_size, req->assoclen + in_size); 778 dst_size = req->assoclen + in_size + tag_size; 802 &rctx->aad_dst_dll, req->assoclen, 810 out_size, req->assoclen); 836 req->assoclen, 0); 842 req->assoclen); 862 req->assoclen, [all...] |
/linux-master/drivers/crypto/marvell/octeontx2/ |
H A D | otx2_cptvf_algs.c | 1052 rctx->ctrl_word.e.enc_data_offset = req->assoclen; 1056 if (req->assoclen > 248 || !IS_ALIGNED(req->assoclen, 8)) 1076 if (crypto_ipsec_check_assoclen(req->assoclen)) 1086 rctx->ctrl_word.e.iv_offset = req->assoclen - AES_GCM_IV_OFFSET; 1102 req_info->req.param2 = req->cryptlen + req->assoclen; 1106 req_info->req.param2 = req->cryptlen + req->assoclen - mac_len; 1161 u32 inputlen = req->cryptlen + req->assoclen; 1181 outputlen = req->cryptlen + req->assoclen + mac_len; 1183 outputlen = req->cryptlen + req->assoclen [all...] |
/linux-master/net/ipv6/ |
H A D | esp6.c | 575 int assoclen; local 585 assoclen = sizeof(struct ip_esp_hdr); 590 assoclen += sizeof(__be32); 617 assoclen + ivlen + esp->clen + alen); 645 assoclen + ivlen + esp->clen + alen); 656 aead_request_set_ad(req, assoclen); 930 int assoclen; local 948 assoclen = sizeof(struct ip_esp_hdr); 953 assoclen += seqhilen; 1004 aead_request_set_ad(req, assoclen); [all...] |
/linux-master/net/ipv4/ |
H A D | esp4.c | 538 int assoclen; local 548 assoclen = sizeof(struct ip_esp_hdr); 553 assoclen += sizeof(__be32); 580 assoclen + ivlen + esp->clen + alen); 608 assoclen + ivlen + esp->clen + alen); 619 aead_request_set_ad(req, assoclen); 886 int assoclen; local 900 assoclen = sizeof(struct ip_esp_hdr); 905 assoclen += seqhilen; 956 aead_request_set_ad(req, assoclen); [all...] |
/linux-master/drivers/crypto/hisilicon/sec2/ |
H A D | sec_crypto.c | 901 copy_size = aead_req->cryptlen + aead_req->assoclen; 934 copy_size = c_req->c_len + aead_req->assoclen; 955 skip_size = aead_req->assoclen + aead_req->cryptlen - authsize; 1490 if (aead_req->assoclen) 1557 sec_sqe->type2.alen_ivllen = cpu_to_le32(aq->assoclen); 1559 sec_sqe->type2.cipher_src_offset = cpu_to_le16((u16)aq->assoclen); 1583 sqe3->a_len_key = cpu_to_le32(aq->assoclen); 1585 sqe3->cipher_src_offset = cpu_to_le16((u16)aq->assoclen); 1615 sec_sqe->type2.alen_ivllen = cpu_to_le32(c_req->c_len + aq->assoclen); 1617 sec_sqe->type2.cipher_src_offset = cpu_to_le16((u16)aq->assoclen); [all...] |
/linux-master/drivers/crypto/ |
H A D | atmel-aes.c | 1364 if (likely(req->assoclen != 0 || ctx->textlen != 0)) 1385 atmel_aes_write(dd, AES_AADLENR, req->assoclen); 1389 if (unlikely(req->assoclen == 0)) { 1395 padlen = atmel_aes_padlen(req->assoclen, AES_BLOCK_SIZE); 1396 if (unlikely(req->assoclen + padlen > dd->buflen)) 1398 sg_copy_to_buffer(req->src, sg_nents(req->src), dd->buf, req->assoclen); 1402 dd->datalen = req->assoclen + padlen; 1433 src = scatterwalk_ffwd(ctx->src, req->src, req->assoclen); 1435 scatterwalk_ffwd(ctx->dst, req->dst, req->assoclen)); 1473 data[0] = cpu_to_be64(req->assoclen * [all...] |
/linux-master/drivers/crypto/marvell/octeontx/ |
H A D | otx_cptvf_algs.c | 971 rctx->ctrl_word.e.enc_data_offset = req->assoclen; 999 rctx->ctrl_word.e.iv_offset = req->assoclen - AES_GCM_IV_OFFSET; 1015 req_info->req.param2 = req->cryptlen + req->assoclen; 1019 req_info->req.param2 = req->cryptlen + req->assoclen - mac_len; 1076 u32 inputlen = req->cryptlen + req->assoclen; 1096 outputlen = req->cryptlen + req->assoclen + mac_len; 1098 outputlen = req->cryptlen + req->assoclen - mac_len; 1114 inputlen = req->cryptlen + req->assoclen; 1116 inputlen = req->cryptlen + req->assoclen - mac_len; 1136 inputlen = req->cryptlen + req->assoclen; [all...] |
/linux-master/drivers/crypto/inside-secure/ |
H A D | safexcel_cipher.c | 164 u32 cryptlen, u32 assoclen, u32 digestsize) 168 int assocadj = assoclen - ctx->aadskip, aadalign; 676 unsigned int cryptlen, unsigned int assoclen, 689 unsigned int totlen_src = cryptlen + assoclen; 826 assoclen, digestsize); 844 if (assoclen) { 845 if (assoclen >= len) { 846 assoclen -= len; 851 assoclen, 852 len - assoclen); 160 safexcel_aead_token(struct safexcel_cipher_ctx *ctx, u8 *iv, struct safexcel_command_desc *cdesc, struct safexcel_token *atoken, enum safexcel_cipher_direction direction, u32 cryptlen, u32 assoclen, u32 digestsize) argument 673 safexcel_send_req(struct crypto_async_request *base, int ring, struct safexcel_cipher_req *sreq, struct scatterlist *src, struct scatterlist *dst, unsigned int cryptlen, unsigned int assoclen, unsigned int digestsize, u8 *iv, int *commands, int *results) argument [all...] |
/linux-master/drivers/crypto/bcm/ |
H A D | cipher.c | 1319 aead_parms.assoc_size = req->assoclen; 1392 spu->spu_ccm_update_iv(digestsize, &cipher_parms, req->assoclen, 1421 req->assoclen + rctx->total_sent - 1546 if (req->assoclen) 1548 req->assoclen); 1557 icv_offset = req->assoclen + rctx->total_sent; 1566 dump_sg(req->dst, req->assoclen, result_len); 2518 (req->assoclen == 0)) { 2542 (req->assoclen == 0)) { 2555 req->assoclen ! [all...] |
/linux-master/drivers/crypto/amcc/ |
H A D | crypto4xx_alg.c | 327 if (req->assoclen & 0x3 || req->assoclen > 1020) 347 aead_request_set_ad(subreq, req->assoclen); 456 sa, ctx->sa_len, req->assoclen, rctx->dst); 593 ctx->sa_len, req->assoclen, rctx->dst);
|
H A D | crypto4xx_core.c | 600 aead_req->assoclen + aead_req->cryptlen - 685 const unsigned int assoclen, 721 tmp = sg_nents_for_len(src, assoclen + datalen); 730 if (assoclen) { 731 nbytes += assoclen; 732 dst = scatterwalk_ffwd(_dst, dst, assoclen); 822 sa->sa_command_1.bf.hash_crypto_offset = (assoclen >> 2); 921 pd->pd_ctl_len.w = 0x00400000 | (assoclen + datalen); 677 crypto4xx_build_pd(struct crypto_async_request *req, struct crypto4xx_ctx *ctx, struct scatterlist *src, struct scatterlist *dst, const unsigned int datalen, const __le32 *iv, const u32 iv_len, const struct dynamic_sa_ctl *req_sa, const unsigned int sa_len, const unsigned int assoclen, struct scatterlist *_dst) argument
|
/linux-master/drivers/crypto/stm32/ |
H A D | stm32-cryp.c | 553 if (cryp->areq->assoclen) { 603 u32 alen = cryp->areq->assoclen; 654 if (cryp->areq->assoclen) 685 if (cryp->areq->assoclen) { 1190 * <- assoclen -> <- cryptlen -> 1193 * <- assoclen -> <-- cryptlen --> <- authsize -> 1197 * <- assoclen ---> <---------- cryptlen ----------> 1200 * <- assoclen -> <- cryptlen - authsize -> 1207 cryp->header_in = areq->assoclen; 1211 cryp->header_in = areq->assoclen; [all...] |