/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/crypto/ |
H A D | eseqiv.c | 47 memcpy(req->giv, PTR_ALIGN((u8 *)reqctx->tail, 91 u8 *giv; local 102 giv = req->giv; 115 if (vsrc != giv + ivsize && vdst != giv + ivsize) { 116 giv = PTR_ALIGN((u8 *)reqctx->tail, 126 sg_set_buf(reqctx->src, giv, ivsize); 127 eseqiv_chain(reqctx->src, osrc, vsrc == giv + ivsize); 132 sg_set_buf(reqctx->dst, giv, ivsiz [all...] |
H A D | chainiv.c | 68 memcpy(req->giv, ctx->iv, ivsize); 168 memcpy(req->giv, ctx->iv, ivsize);
|
H A D | seqiv.c | 135 memcpy(req->giv, info, ivsize); 181 memcpy(req->giv, info, ivsize);
|
H A D | authenc.c | 430 err = crypto_authenc_genicv(areq, greq->giv, 0); 442 u8 *iv = req->giv;
|
H A D | pcrypt.c | 264 aead_givcrypt_set_giv(creq, req->giv, req->seq);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/crypto/ |
H A D | eseqiv.c | 47 memcpy(req->giv, PTR_ALIGN((u8 *)reqctx->tail, 91 u8 *giv; local 102 giv = req->giv; 115 if (vsrc != giv + ivsize && vdst != giv + ivsize) { 116 giv = PTR_ALIGN((u8 *)reqctx->tail, 126 sg_set_buf(reqctx->src, giv, ivsize); 127 eseqiv_chain(reqctx->src, osrc, vsrc == giv + ivsize); 132 sg_set_buf(reqctx->dst, giv, ivsiz [all...] |
H A D | chainiv.c | 68 memcpy(req->giv, ctx->iv, ivsize); 168 memcpy(req->giv, ctx->iv, ivsize);
|
H A D | seqiv.c | 135 memcpy(req->giv, info, ivsize); 181 memcpy(req->giv, info, ivsize);
|
H A D | authenc.c | 430 err = crypto_authenc_genicv(areq, greq->giv, 0); 442 u8 *iv = req->giv;
|
H A D | pcrypt.c | 264 aead_givcrypt_set_giv(creq, req->giv, req->seq);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/include/crypto/ |
H A D | aead.h | 23 * @giv: Space for generated IV 28 u8 *giv; member in struct:aead_givcrypt_request 99 u8 *giv, u64 seq) 101 req->giv = giv; 98 aead_givcrypt_set_giv(struct aead_givcrypt_request *req, u8 *giv, u64 seq) argument
|
H A D | skcipher.h | 23 * @giv: Space for generated IV 28 u8 *giv; member in struct:skcipher_givcrypt_request 103 struct skcipher_givcrypt_request *req, u8 *giv, u64 seq) 105 req->giv = giv; 102 skcipher_givcrypt_set_giv( struct skcipher_givcrypt_request *req, u8 *giv, u64 seq) argument
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/include/crypto/ |
H A D | aead.h | 23 * @giv: Space for generated IV 28 u8 *giv; member in struct:aead_givcrypt_request 99 u8 *giv, u64 seq) 101 req->giv = giv; 98 aead_givcrypt_set_giv(struct aead_givcrypt_request *req, u8 *giv, u64 seq) argument
|
H A D | skcipher.h | 23 * @giv: Space for generated IV 28 u8 *giv; member in struct:skcipher_givcrypt_request 103 struct skcipher_givcrypt_request *req, u8 *giv, u64 seq) 105 req->giv = giv; 102 skcipher_givcrypt_set_giv( struct skcipher_givcrypt_request *req, u8 *giv, u64 seq) argument
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/drivers/crypto/ |
H A D | talitos.c | 1011 u8 *giv, u64 seq, 1033 map_single_talitos_ptr(dev, &desc->ptr[2], ivsize, giv ?: areq->iv, 0, 1374 memcpy(req->giv, ctx->iv, crypto_aead_ivsize(authenc)); 1376 *(__be64 *)req->giv ^= cpu_to_be64(req->seq); 1378 return ipsec_esp(edesc, areq, req->giv, req->seq, 1437 u8 *giv, 1457 map_single_talitos_ptr(dev, &desc->ptr[1], ivsize, giv ?: areq->info, 0, 1010 ipsec_esp(struct talitos_edesc *edesc, struct aead_request *areq, u8 *giv, u64 seq, void (*callback) (struct device *dev, struct talitos_desc *desc, void *context, int error)) argument 1435 common_nonsnoop(struct talitos_edesc *edesc, struct ablkcipher_request *areq, u8 *giv, void (*callback) (struct device *dev, struct talitos_desc *desc, void *context, int error)) argument
|
H A D | ixp4xx_crypto.c | 1220 memset(req->giv, 0, ivsize - sizeof(u64)); 1224 memcpy(req->giv + ivsize - len, &seq, len); 1226 req->areq.cryptlen +ivsize, req->giv);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/drivers/crypto/ |
H A D | talitos.c | 1011 u8 *giv, u64 seq, 1033 map_single_talitos_ptr(dev, &desc->ptr[2], ivsize, giv ?: areq->iv, 0, 1374 memcpy(req->giv, ctx->iv, crypto_aead_ivsize(authenc)); 1376 *(__be64 *)req->giv ^= cpu_to_be64(req->seq); 1378 return ipsec_esp(edesc, areq, req->giv, req->seq, 1437 u8 *giv, 1457 map_single_talitos_ptr(dev, &desc->ptr[1], ivsize, giv ?: areq->info, 0, 1010 ipsec_esp(struct talitos_edesc *edesc, struct aead_request *areq, u8 *giv, u64 seq, void (*callback) (struct device *dev, struct talitos_desc *desc, void *context, int error)) argument 1435 common_nonsnoop(struct talitos_edesc *edesc, struct ablkcipher_request *areq, u8 *giv, void (*callback) (struct device *dev, struct talitos_desc *desc, void *context, int error)) argument
|
H A D | ixp4xx_crypto.c | 1220 memset(req->giv, 0, ivsize - sizeof(u64)); 1224 memcpy(req->giv + ivsize - len, &seq, len); 1226 req->areq.cryptlen +ivsize, req->giv);
|