/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/crypto/ |
H A D | eseqiv.c | 95 unsigned int ivsize; local 113 ivsize = crypto_ablkcipher_ivsize(geniv); 115 if (vsrc != giv + ivsize && vdst != giv + ivsize) { 126 sg_set_buf(reqctx->src, giv, ivsize); 127 eseqiv_chain(reqctx->src, osrc, vsrc == giv + ivsize); 132 sg_set_buf(reqctx->dst, giv, ivsize); 133 eseqiv_chain(reqctx->dst, odst, vdst == giv + ivsize); 139 req->creq.nbytes + ivsize, 142 memcpy(req->creq.info, ctx->salt, ivsize); [all...] |
H A D | seqiv.c | 85 unsigned int ivsize) 87 unsigned int len = ivsize; 89 if (ivsize > sizeof(u64)) { 90 memset(info, 0, ivsize - sizeof(u64)); 94 memcpy(info + ivsize - len, &seq, len); 95 crypto_xor(info, ctx->salt, ivsize); 106 unsigned int ivsize; local 115 ivsize = crypto_ablkcipher_ivsize(geniv); 119 info = kmalloc(ivsize, req->creq.base.flags & 134 seqiv_geniv(ctx, info, req->seq, ivsize); 84 seqiv_geniv(struct seqiv_ctx *ctx, u8 *info, u64 seq, unsigned int ivsize) argument 152 unsigned int ivsize; local [all...] |
H A D | ablkcipher.c | 143 memcpy(req->info, walk->iv, tfm->crt_ablkcipher.ivsize); 196 unsigned int ivsize = tfm->crt_ablkcipher.ivsize; local 198 unsigned int size = aligned_bs * 2 + ivsize + max(aligned_bs, ivsize) - 210 iv = ablkcipher_get_spot(iv, ivsize); 212 walk->iv = memcpy(iv, walk->iv, ivsize); 369 if (alg->ivsize > PAGE_SIZE / 8) 375 if (!alg->ivsize) { 380 crt->ivsize [all...] |
H A D | chainiv.c | 53 unsigned int ivsize; local 66 ivsize = crypto_ablkcipher_ivsize(geniv); 68 memcpy(req->giv, ctx->iv, ivsize); 69 memcpy(subreq->info, ctx->iv, ivsize); 75 memcpy(ctx->iv, subreq->info, ivsize); 166 unsigned int ivsize = crypto_ablkcipher_ivsize(geniv); local 168 memcpy(req->giv, ctx->iv, ivsize); 169 memcpy(subreq->info, ctx->iv, ivsize); 175 memcpy(ctx->iv, subreq->info, ivsize); 325 inst->alg.cra_ctxsize += inst->alg.cra_ablkcipher.ivsize; [all...] |
H A D | aead.c | 96 if (max(alg->maxauthsize, alg->ivsize) > PAGE_SIZE / 8) 106 crt->ivsize = alg->ivsize; 122 seq_printf(m, "ivsize : %u\n", aead->ivsize); 151 if (max(alg->maxauthsize, alg->ivsize) > PAGE_SIZE / 8) 157 if (!alg->ivsize) { 162 crt->ivsize = alg->ivsize; 178 seq_printf(m, "ivsize [all...] |
H A D | blkcipher.c | 283 unsigned int ivsize = crypto_blkcipher_ivsize(tfm); local 285 unsigned int size = aligned_bs * 2 + ivsize + max(aligned_bs, ivsize) - 297 iv = blkcipher_get_spot(iv, ivsize); 299 walk->iv = memcpy(iv, walk->iv, ivsize); 437 cipher->ivsize) { 439 len += cipher->ivsize; 453 if (!alg->ivsize) { 458 crt->ivsize = alg->ivsize; 547 unsigned int ivsize; member in struct:__anon10699 [all...] |
H A D | algboss.c | 252 CRYPTO_ALG_TYPE_BLKCIPHER ? alg->cra_blkcipher.ivsize : 253 alg->cra_ablkcipher.ivsize)) || 255 alg->cra_type == &crypto_nivaead_type && alg->cra_aead.ivsize))
|
H A D | authenc.c | 335 unsigned int ivsize = crypto_aead_ivsize(authenc); local 345 if (ivsize) { 347 sg_set_buf(cipher, iv, ivsize); 348 authenc_chain(cipher, dst, vdst == iv + ivsize); 350 cryptlen += ivsize; 491 unsigned int ivsize = crypto_aead_ivsize(authenc); local 499 if (ivsize) { 501 sg_set_buf(cipher, iv, ivsize); 502 authenc_chain(cipher, src, vsrc == iv + ivsize); 504 cryptlen += ivsize; [all...] |
H A D | ctr.c | 209 inst->alg.cra_blkcipher.ivsize = alg->cra_blocksize; 343 if (alg->cra_blkcipher.ivsize != CTR_RFC3686_BLOCK_SIZE) 360 inst->alg.cra_blkcipher.ivsize = CTR_RFC3686_IV_SIZE;
|
H A D | crypto_null.c | 153 .ivsize = NULL_IV_SIZE,
|
H A D | gcm.c | 740 if (ctr->cra_ablkcipher.ivsize != 16) 763 inst->alg.cra_aead.ivsize = 16; 1002 if (alg->cra_aead.ivsize != 16) 1024 inst->alg.cra_aead.ivsize = 8; 1268 if (alg->cra_aead.ivsize != 16) 1290 inst->alg.cra_aead.ivsize = 8;
|
H A D | ccm.c | 531 if (ctr->cra_ablkcipher.ivsize != 16) 549 inst->alg.cra_aead.ivsize = 16; 791 if (alg->cra_aead.ivsize != 16) 813 inst->alg.cra_aead.ivsize = 8;
|
H A D | salsa20_generic.c | 232 .ivsize = SALSA20_IV_SIZE,
|
H A D | pcrypt.c | 364 inst->alg.cra_aead.ivsize = alg->cra_aead.ivsize;
|
H A D | cbc.c | 246 inst->alg.cra_blkcipher.ivsize = alg->cra_blocksize;
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/ceph/ |
H A D | crypto.c | 89 int ivsize; local 107 ivsize = crypto_blkcipher_ivsize(tfm); 109 memcpy(iv, aes_iv, ivsize); 140 int ivsize; local 159 ivsize = crypto_blkcipher_ivsize(tfm); 161 memcpy(iv, aes_iv, ivsize); 193 int ivsize; local 208 ivsize = crypto_blkcipher_ivsize(tfm); 210 memcpy(iv, aes_iv, ivsize); 254 int ivsize; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/x86/crypto/ |
H A D | salsa20_glue.c | 40 u32 keysize, u32 ivsize); 108 .ivsize = SALSA20_IV_SIZE,
|
H A D | fpu.c | 125 inst->alg.cra_blkcipher.ivsize = alg->cra_blkcipher.ivsize;
|
H A D | aesni-intel_glue.c | 385 .ivsize = AES_BLOCK_SIZE, 531 .ivsize = AES_BLOCK_SIZE, 567 .ivsize = AES_BLOCK_SIZE, 606 .ivsize = CTR_RFC3686_IV_SIZE, 646 .ivsize = AES_BLOCK_SIZE, 685 .ivsize = AES_BLOCK_SIZE, 724 .ivsize = AES_BLOCK_SIZE,
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/crypto/ |
H A D | ixp4xx_crypto.c | 881 unsigned ivsize = crypto_ablkcipher_ivsize(tfm); local 910 BUG_ON(ivsize && !req->info); 911 memcpy(crypt->iv, req->info, ivsize); 1005 unsigned ivsize = crypto_aead_ivsize(tfm); local 1042 crypt->auth_len = req->assoclen + ivsize + cryptlen; 1043 BUG_ON(ivsize && !req->iv); 1044 memcpy(crypt->iv, req->iv, ivsize); 1059 sg_set_buf(&req_ctx->ivlist, iv, ivsize); 1060 buf = chainup_buffers(dev, &req_ctx->ivlist, ivsize, buf, flags, 1193 unsigned ivsize local 1200 unsigned ivsize = crypto_aead_ivsize(crypto_aead_reqtfm(req)); local 1209 unsigned len, ivsize = crypto_aead_ivsize(tfm); local [all...] |
H A D | hifn_795x.c | 658 unsigned int ivsize; member in struct:hifn_request_context 1103 u8 *key, int keylen, u8 *iv, int ivsize, u16 mode) 1132 if (ivsize) { 1133 memcpy(buf_pos, iv, ivsize); 1134 buf_pos += ivsize; 1232 rctx->iv, rctx->ivsize, md); 1562 if (rctx->iv && !rctx->ivsize && rctx->mode != ACRYPTO_MODE_ECB) 1614 dev->name, rctx->iv, rctx->ivsize, 1640 rctx.ivsize = 0; 2079 unsigned ivsize; local 1101 hifn_setup_crypto_command(struct hifn_device *dev, u8 *buf, unsigned dlen, unsigned slen, u8 *key, int keylen, u8 *iv, int ivsize, u16 mode) argument [all...] |
H A D | talitos.c | 1022 unsigned int ivsize = crypto_aead_ivsize(aead); local 1030 map_single_talitos_ptr(dev, &desc->ptr[1], areq->assoclen + ivsize, 1033 map_single_talitos_ptr(dev, &desc->ptr[2], ivsize, giv ?: areq->iv, 0, 1118 map_single_talitos_ptr(dev, &desc->ptr[6], ivsize, ctx->iv, 0, 1447 unsigned int ivsize; local 1456 ivsize = crypto_ablkcipher_ivsize(cipher); 1457 map_single_talitos_ptr(dev, &desc->ptr[1], ivsize, giv ?: areq->info, 0, 1520 map_single_talitos_ptr(dev, &desc->ptr[5], ivsize, ctx->iv, 0, 1917 .ivsize = AES_BLOCK_SIZE, 1943 .ivsize [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/ |
H A D | crypto.h | 203 unsigned int ivsize; member in struct:ablkcipher_alg 217 unsigned int ivsize; member in struct:aead_alg 235 unsigned int ivsize; member in struct:blkcipher_alg 330 unsigned int ivsize; member in struct:ablkcipher_tfm 344 unsigned int ivsize; member in struct:aead_tfm 607 return crypto_ablkcipher_crt(tfm)->ivsize; 748 return crypto_aead_crt(tfm)->ivsize; 926 return crypto_blkcipher_alg(tfm)->ivsize;
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/usb/wusbcore/ |
H A D | crypto.c | 196 size_t ivsize, dst_size; local 223 ivsize = crypto_blkcipher_ivsize(tfm_cbc); 224 memset(iv, 0, ivsize);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/s390/crypto/ |
H A D | des_s390.c | 217 .ivsize = DES_BLOCK_SIZE, 372 .ivsize = DES_BLOCK_SIZE,
|