Searched refs:giv (Results 1 - 18 of 18) sorted by relevance

/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/crypto/
H A Deseqiv.c47 memcpy(req->giv, PTR_ALIGN((u8 *)reqctx->tail,
91 u8 *giv; local
102 giv = req->giv;
115 if (vsrc != giv + ivsize && vdst != giv + ivsize) {
116 giv = PTR_ALIGN((u8 *)reqctx->tail,
126 sg_set_buf(reqctx->src, giv, ivsize);
127 eseqiv_chain(reqctx->src, osrc, vsrc == giv + ivsize);
132 sg_set_buf(reqctx->dst, giv, ivsiz
[all...]
H A Dchainiv.c68 memcpy(req->giv, ctx->iv, ivsize);
168 memcpy(req->giv, ctx->iv, ivsize);
H A Dseqiv.c135 memcpy(req->giv, info, ivsize);
181 memcpy(req->giv, info, ivsize);
H A Dauthenc.c430 err = crypto_authenc_genicv(areq, greq->giv, 0);
442 u8 *iv = req->giv;
H A Dpcrypt.c264 aead_givcrypt_set_giv(creq, req->giv, req->seq);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/crypto/
H A Deseqiv.c47 memcpy(req->giv, PTR_ALIGN((u8 *)reqctx->tail,
91 u8 *giv; local
102 giv = req->giv;
115 if (vsrc != giv + ivsize && vdst != giv + ivsize) {
116 giv = PTR_ALIGN((u8 *)reqctx->tail,
126 sg_set_buf(reqctx->src, giv, ivsize);
127 eseqiv_chain(reqctx->src, osrc, vsrc == giv + ivsize);
132 sg_set_buf(reqctx->dst, giv, ivsiz
[all...]
H A Dchainiv.c68 memcpy(req->giv, ctx->iv, ivsize);
168 memcpy(req->giv, ctx->iv, ivsize);
H A Dseqiv.c135 memcpy(req->giv, info, ivsize);
181 memcpy(req->giv, info, ivsize);
H A Dauthenc.c430 err = crypto_authenc_genicv(areq, greq->giv, 0);
442 u8 *iv = req->giv;
H A Dpcrypt.c264 aead_givcrypt_set_giv(creq, req->giv, req->seq);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/include/crypto/
H A Daead.h23 * @giv: Space for generated IV
28 u8 *giv; member in struct:aead_givcrypt_request
99 u8 *giv, u64 seq)
101 req->giv = giv;
98 aead_givcrypt_set_giv(struct aead_givcrypt_request *req, u8 *giv, u64 seq) argument
H A Dskcipher.h23 * @giv: Space for generated IV
28 u8 *giv; member in struct:skcipher_givcrypt_request
103 struct skcipher_givcrypt_request *req, u8 *giv, u64 seq)
105 req->giv = giv;
102 skcipher_givcrypt_set_giv( struct skcipher_givcrypt_request *req, u8 *giv, u64 seq) argument
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/include/crypto/
H A Daead.h23 * @giv: Space for generated IV
28 u8 *giv; member in struct:aead_givcrypt_request
99 u8 *giv, u64 seq)
101 req->giv = giv;
98 aead_givcrypt_set_giv(struct aead_givcrypt_request *req, u8 *giv, u64 seq) argument
H A Dskcipher.h23 * @giv: Space for generated IV
28 u8 *giv; member in struct:skcipher_givcrypt_request
103 struct skcipher_givcrypt_request *req, u8 *giv, u64 seq)
105 req->giv = giv;
102 skcipher_givcrypt_set_giv( struct skcipher_givcrypt_request *req, u8 *giv, u64 seq) argument
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/drivers/crypto/
H A Dtalitos.c1011 u8 *giv, u64 seq,
1033 map_single_talitos_ptr(dev, &desc->ptr[2], ivsize, giv ?: areq->iv, 0,
1374 memcpy(req->giv, ctx->iv, crypto_aead_ivsize(authenc));
1376 *(__be64 *)req->giv ^= cpu_to_be64(req->seq);
1378 return ipsec_esp(edesc, areq, req->giv, req->seq,
1437 u8 *giv,
1457 map_single_talitos_ptr(dev, &desc->ptr[1], ivsize, giv ?: areq->info, 0,
1010 ipsec_esp(struct talitos_edesc *edesc, struct aead_request *areq, u8 *giv, u64 seq, void (*callback) (struct device *dev, struct talitos_desc *desc, void *context, int error)) argument
1435 common_nonsnoop(struct talitos_edesc *edesc, struct ablkcipher_request *areq, u8 *giv, void (*callback) (struct device *dev, struct talitos_desc *desc, void *context, int error)) argument
H A Dixp4xx_crypto.c1220 memset(req->giv, 0, ivsize - sizeof(u64));
1224 memcpy(req->giv + ivsize - len, &seq, len);
1226 req->areq.cryptlen +ivsize, req->giv);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/drivers/crypto/
H A Dtalitos.c1011 u8 *giv, u64 seq,
1033 map_single_talitos_ptr(dev, &desc->ptr[2], ivsize, giv ?: areq->iv, 0,
1374 memcpy(req->giv, ctx->iv, crypto_aead_ivsize(authenc));
1376 *(__be64 *)req->giv ^= cpu_to_be64(req->seq);
1378 return ipsec_esp(edesc, areq, req->giv, req->seq,
1437 u8 *giv,
1457 map_single_talitos_ptr(dev, &desc->ptr[1], ivsize, giv ?: areq->info, 0,
1010 ipsec_esp(struct talitos_edesc *edesc, struct aead_request *areq, u8 *giv, u64 seq, void (*callback) (struct device *dev, struct talitos_desc *desc, void *context, int error)) argument
1435 common_nonsnoop(struct talitos_edesc *edesc, struct ablkcipher_request *areq, u8 *giv, void (*callback) (struct device *dev, struct talitos_desc *desc, void *context, int error)) argument
H A Dixp4xx_crypto.c1220 memset(req->giv, 0, ivsize - sizeof(u64));
1224 memcpy(req->giv + ivsize - len, &seq, len);
1226 req->areq.cryptlen +ivsize, req->giv);

Completed in 275 milliseconds