/linux-master/net/tls/ |
H A D | tls.h | 316 prot->iv_size); 336 size_t pkt_len, iv_size = prot->iv_size; local 341 pkt_len += iv_size; 344 ctx->tx.iv + prot->salt_size, iv_size);
|
H A D | tls_sw.c | 558 prot->iv_size + prot->salt_size); 1544 prot->iv_size + prot->salt_size); 1548 prot->iv_size); 2389 cipher_overhead += prot->iv_size; 2680 prot->iv_size = cipher_desc->iv;
|
/linux-master/drivers/md/ |
H A D | dm-crypt.c | 180 unsigned int iv_size; member in struct:crypt_config 324 memset(iv, 0, cc->iv_size); 333 memset(iv, 0, cc->iv_size); 342 memset(iv, 0, cc->iv_size); 343 /* iv_size is at least of size u64; usually it is 16 bytes */ 344 *(__be64 *)&iv[cc->iv_size - sizeof(u64)] = cpu_to_be64(dmreq->iv_sector); 356 memset(iv, 0, cc->iv_size); 402 memset(iv, 0, cc->iv_size - sizeof(u64)); /* rest is cleared below */ 405 put_unaligned(val, (__be64 *)(iv + cc->iv_size - sizeof(u64))); 413 memset(iv, 0, cc->iv_size); [all...] |
/linux-master/drivers/crypto/intel/keembay/ |
H A D | ocs-aes.h | 78 u32 iv_size);
|
H A D | keembay-ocs-aes-core.c | 256 int iv_size = crypto_skcipher_ivsize(tfm); local 272 if (!req->iv || iv_size != AES_BLOCK_SIZE) 277 * that: cryptlen >= iv_size 283 if (!req->iv || iv_size != AES_BLOCK_SIZE) 293 if (!req->iv || iv_size != AES_BLOCK_SIZE) 403 int iv_size = crypto_skcipher_ivsize(tfm); local 409 * Note: if we are here, we already checked that cryptlen >= iv_size 410 * and iv_size == AES_BLOCK_SIZE (i.e., the size of last_ct_blk); see 415 req->cryptlen - iv_size, iv_size, 520 int iv_size = crypto_skcipher_ivsize(tfm); local 600 int iv_size = crypto_aead_ivsize(tfm); local [all...] |
H A D | ocs-aes.c | 601 const u8 *iv, u32 iv_size, 664 if (!iv || iv_size != AES_BLOCK_SIZE) 680 if (!iv || iv_size != AES_BLOCK_SIZE) 696 if (!iv || iv_size != AES_BLOCK_SIZE) 703 if (!iv || iv_size != GCM_AES_IV_SIZE) 730 if (!iv || iv_size != AES_BLOCK_SIZE) 792 * @iv_size: The size (in bytes) of @iv. 804 u32 iv_size) 809 rc = ocs_aes_validate_inputs(src_dma_list, src_size, iv, iv_size, 0, 0, 600 ocs_aes_validate_inputs(dma_addr_t src_dma_list, u32 src_size, const u8 *iv, u32 iv_size, dma_addr_t aad_dma_list, u32 aad_size, const u8 *tag, u32 tag_size, enum ocs_cipher cipher, enum ocs_mode mode, enum ocs_instruction instruction, dma_addr_t dst_dma_list) argument 796 ocs_aes_op(struct ocs_aes_dev *aes_dev, enum ocs_mode mode, enum ocs_cipher cipher, enum ocs_instruction instruction, dma_addr_t dst_dma_list, dma_addr_t src_dma_list, u32 src_size, u8 *iv, u32 iv_size) argument
|
/linux-master/drivers/net/ethernet/chelsio/inline_crypto/ch_ktls/ |
H A D | chcr_ktls.h | 50 u32 iv_size; member in struct:chcr_ktls_info
|
H A D | chcr_ktls.c | 90 tx_info->iv_size = TLS_CIPHER_AES_GCM_128_IV_SIZE; 1183 cipher_start = TLS_HEADER_SIZE + tx_info->iv_size + 1; 1362 (!tls_rec_offset ? TLS_HEADER_SIZE + tx_info->iv_size : 0); 1419 memcpy(pos + tx_info->salt_size, &iv_record, tx_info->iv_size); 1420 *(__be32 *)(pos + tx_info->salt_size + tx_info->iv_size) = 1422 (TLS_HEADER_SIZE + tx_info->iv_size)) / AES_BLOCK_LEN) : 0)); 1802 if (tls_rec_offset + data_len <= (TLS_HEADER_SIZE + tx_info->iv_size)) { 1820 if (tls_rec_offset < (TLS_HEADER_SIZE + tx_info->iv_size)) { 1827 (TLS_HEADER_SIZE + tx_info->iv_size))
|
/linux-master/drivers/s390/cio/ |
H A D | airq.c | 113 static inline unsigned long iv_size(unsigned long bits) function 137 size = iv_size(bits); 209 cio_dma_free(iv->vector, iv_size(iv->bits));
|
/linux-master/drivers/gpu/drm/amd/amdgpu/ |
H A D | amdgpu_ih.c | 290 uint32_t iv_size = 32; local 294 rptr += iv_size * offset;
|
/linux-master/drivers/crypto/ |
H A D | sa2ul.c | 99 * @iv_size: Initialization Vector size 108 u8 iv_size; member in struct:sa_cmdl_cfg 585 if (cfg->iv_size) 586 auth_offset += cfg->iv_size; 601 if (cfg->iv_size) { 605 upd_info->enc_iv.size = cfg->iv_size; 608 SA_CMDL_HEADER_SIZE_BYTES + cfg->iv_size; 611 (SA_CTX_ENC_AUX2_OFFSET | (cfg->iv_size >> 3)); 612 total += SA_CMDL_HEADER_SIZE_BYTES + cfg->iv_size; 903 cfg.iv_size [all...] |
/linux-master/drivers/crypto/hisilicon/sec2/ |
H A D | sec_crypto.c | 1392 u32 iv_size = req->ctx->c_ctx.ivsize; local 1412 sz = sg_pcopy_to_buffer(sgl, sg_nents(sgl), iv, iv_size, 1413 cryptlen - iv_size); 1414 if (unlikely(sz != iv_size)) 1417 sz = cryptlen / iv_size; 1418 if (cryptlen % iv_size) 1420 ctr_iv_inc(iv, iv_size, sz); 2147 sec_min_key_size, sec_max_key_size, blk_size, iv_size)\ 2166 .ivsize = iv_size,\ 2387 ctx_exit, blk_size, iv_size, max_authsiz [all...] |
/linux-master/include/net/ |
H A D | tls.h | 211 u16 iv_size; member in struct:tls_prot_info
|
/linux-master/net/tipc/ |
H A D | crypto.c | 690 unsigned int iv_size, req_size; local 694 iv_size = crypto_aead_ivsize(tfm); 698 len += iv_size; 711 *req = (struct aead_request *)PTR_ALIGN(*iv + iv_size,
|
/linux-master/fs/smb/client/ |
H A D | smb2ops.c | 4110 unsigned int iv_size = crypto_aead_ivsize(tfm); local 4118 len = iv_size; 4131 *req = (struct aead_request *)PTR_ALIGN(*iv + iv_size,
|