Searched refs:aad_size (Results 1 - 6 of 6) sorted by relevance

/linux-master/drivers/crypto/intel/keembay/
H A Docs-aes.h104 u32 aad_size,
H A Docs-aes.c602 dma_addr_t aad_dma_list, u32 aad_size,
715 if (aad_size && aad_dma_list == DMA_MAPPING_ERROR)
739 if (aad_size && aad_dma_list == DMA_MAPPING_ERROR)
919 * @aad_size: The amount of data mapped by @aad_dma_list.
933 u32 aad_size,
943 aad_size, out_tag, tag_size, cipher,
968 bit_len = (u64)aad_size * 8;
978 if (aad_size) {
600 ocs_aes_validate_inputs(dma_addr_t src_dma_list, u32 src_size, const u8 *iv, u32 iv_size, dma_addr_t aad_dma_list, u32 aad_size, const u8 *tag, u32 tag_size, enum ocs_cipher cipher, enum ocs_mode mode, enum ocs_instruction instruction, dma_addr_t dst_dma_list) argument
925 ocs_aes_gcm_op(struct ocs_aes_dev *aes_dev, enum ocs_cipher cipher, enum ocs_instruction instruction, dma_addr_t dst_dma_list, dma_addr_t src_dma_list, u32 src_size, const u8 *iv, dma_addr_t aad_dma_list, u32 aad_size, u8 *out_tag, u32 tag_size) argument
/linux-master/crypto/
H A Dtcrypt.c107 unsigned int aad_size)
121 sg_set_buf(&sg[0], assoc, aad_size);
246 unsigned int aad_size, u8 *keysize, u32 num_mb)
259 if (aad_size >= PAGE_SIZE) {
260 pr_err("associate data length (%u) too big\n", aad_size);
379 memset(assoc, 0xff, aad_size);
383 assoc, aad_size);
387 assoc, aad_size);
389 aead_request_set_ad(cur->req, aad_size);
521 unsigned int aad_size, u
105 sg_init_aead(struct scatterlist *sg, char *xbuf[XBUFSIZE], unsigned int buflen, const void *assoc, unsigned int aad_size) argument
243 test_mb_aead_speed(const char *algo, int enc, int secs, struct aead_speed_template *template, unsigned int tcount, u8 authsize, unsigned int aad_size, u8 *keysize, u32 num_mb) argument
518 test_aead_speed(const char *algo, int enc, unsigned int secs, struct aead_speed_template *template, unsigned int tcount, u8 authsize, unsigned int aad_size, u8 *keysize) argument
[all...]
/linux-master/net/tls/
H A Dtls_sw.c266 aead_request_set_ad(aead_req, prot->aad_size);
376 sg_set_buf(&rec->sg_aead_in[0], rec->aad_space, prot->aad_size);
380 sg_set_buf(&rec->sg_aead_out[0], rec->aad_space, prot->aad_size);
569 aead_request_set_ad(aead_req, prot->aad_size);
1562 sg_set_buf(&sgin[0], dctx->aad, prot->aad_size);
1571 sg_set_buf(&sgout[0], dctx->aad, prot->aad_size);
1579 sg_set_buf(&sgout[0], dctx->aad, prot->aad_size);
2664 prot->aad_size = TLS_HEADER_SIZE;
2667 prot->aad_size = TLS_AAD_SPACE_SIZE;
2672 if (nonce_size > TLS_MAX_IV_SIZE || prot->aad_size > TLS_MAX_AAD_SIZ
[all...]
/linux-master/include/net/
H A Dtls.h214 u16 aad_size; member in struct:tls_prot_info
/linux-master/drivers/crypto/caam/
H A Dregs.h961 u32 aad_size; /* CxAADSZR - Current AAD Size */ member in struct:caam_deco

Completed in 182 milliseconds