Searched refs:aad_size (Results 1 - 6 of 6) sorted by relevance
/linux-master/drivers/crypto/intel/keembay/ |
H A D | ocs-aes.h | 104 u32 aad_size,
|
H A D | ocs-aes.c | 602 dma_addr_t aad_dma_list, u32 aad_size, 715 if (aad_size && aad_dma_list == DMA_MAPPING_ERROR) 739 if (aad_size && aad_dma_list == DMA_MAPPING_ERROR) 919 * @aad_size: The amount of data mapped by @aad_dma_list. 933 u32 aad_size, 943 aad_size, out_tag, tag_size, cipher, 968 bit_len = (u64)aad_size * 8; 978 if (aad_size) { 600 ocs_aes_validate_inputs(dma_addr_t src_dma_list, u32 src_size, const u8 *iv, u32 iv_size, dma_addr_t aad_dma_list, u32 aad_size, const u8 *tag, u32 tag_size, enum ocs_cipher cipher, enum ocs_mode mode, enum ocs_instruction instruction, dma_addr_t dst_dma_list) argument 925 ocs_aes_gcm_op(struct ocs_aes_dev *aes_dev, enum ocs_cipher cipher, enum ocs_instruction instruction, dma_addr_t dst_dma_list, dma_addr_t src_dma_list, u32 src_size, const u8 *iv, dma_addr_t aad_dma_list, u32 aad_size, u8 *out_tag, u32 tag_size) argument
|
/linux-master/crypto/ |
H A D | tcrypt.c | 107 unsigned int aad_size) 121 sg_set_buf(&sg[0], assoc, aad_size); 246 unsigned int aad_size, u8 *keysize, u32 num_mb) 259 if (aad_size >= PAGE_SIZE) { 260 pr_err("associate data length (%u) too big\n", aad_size); 379 memset(assoc, 0xff, aad_size); 383 assoc, aad_size); 387 assoc, aad_size); 389 aead_request_set_ad(cur->req, aad_size); 521 unsigned int aad_size, u 105 sg_init_aead(struct scatterlist *sg, char *xbuf[XBUFSIZE], unsigned int buflen, const void *assoc, unsigned int aad_size) argument 243 test_mb_aead_speed(const char *algo, int enc, int secs, struct aead_speed_template *template, unsigned int tcount, u8 authsize, unsigned int aad_size, u8 *keysize, u32 num_mb) argument 518 test_aead_speed(const char *algo, int enc, unsigned int secs, struct aead_speed_template *template, unsigned int tcount, u8 authsize, unsigned int aad_size, u8 *keysize) argument [all...] |
/linux-master/net/tls/ |
H A D | tls_sw.c | 266 aead_request_set_ad(aead_req, prot->aad_size); 376 sg_set_buf(&rec->sg_aead_in[0], rec->aad_space, prot->aad_size); 380 sg_set_buf(&rec->sg_aead_out[0], rec->aad_space, prot->aad_size); 569 aead_request_set_ad(aead_req, prot->aad_size); 1562 sg_set_buf(&sgin[0], dctx->aad, prot->aad_size); 1571 sg_set_buf(&sgout[0], dctx->aad, prot->aad_size); 1579 sg_set_buf(&sgout[0], dctx->aad, prot->aad_size); 2664 prot->aad_size = TLS_HEADER_SIZE; 2667 prot->aad_size = TLS_AAD_SPACE_SIZE; 2672 if (nonce_size > TLS_MAX_IV_SIZE || prot->aad_size > TLS_MAX_AAD_SIZ [all...] |
/linux-master/include/net/ |
H A D | tls.h | 214 u16 aad_size; member in struct:tls_prot_info
|
/linux-master/drivers/crypto/caam/ |
H A D | regs.h | 961 u32 aad_size; /* CxAADSZR - Current AAD Size */ member in struct:caam_deco
|
Completed in 182 milliseconds