/linux-master/drivers/crypto/marvell/octeontx/ |
H A D | otx_cptvf_algs.h | 176 u32 auth_key_len; member in struct:otx_cpt_aead_ctx
|
H A D | otx_cptvf_algs.c | 741 int authkeylen = ctx->auth_key_len; 879 ctx->auth_key_len = authkeylen; 920 ctx->auth_key_len = keylen; 977 memcpy(fctx->enc.encr_key, ctx->key + ctx->auth_key_len, 1060 req_info->req.param1 = ctx->auth_key_len; 1065 req_info->in[*argcnt].size = round_up(ctx->auth_key_len, 8); 1066 req_info->req.dlen += round_up(ctx->auth_key_len, 8);
|
/linux-master/drivers/crypto/marvell/octeontx2/ |
H A D | otx2_cptvf_algs.h | 172 u32 auth_key_len; member in struct:otx2_cpt_aead_ctx
|
H A D | otx2_cptvf_algs.c | 830 int authkeylen = ctx->auth_key_len; 967 ctx->auth_key_len = authkeylen; 1002 ctx->auth_key_len = keylen; 1061 memcpy(fctx->enc.encr_key, ctx->key + ctx->auth_key_len, 1147 req_info->req.param1 = ctx->auth_key_len; 1152 req_info->in[*argcnt].size = round_up(ctx->auth_key_len, 8); 1153 req_info->req.dlen += round_up(ctx->auth_key_len, 8);
|
/linux-master/drivers/crypto/bcm/ |
H A D | spu2.c | 646 * @auth_key_len: Length of authentication key, in bytes 663 u64 auth_key_len, u64 cipher_key_len, 679 if (auth_key_len) 680 ctrl1 |= ((auth_key_len << SPU2_HASH_KEY_LEN_SHIFT) & 727 * @auth_key_len: Length of authentication key, in bytes 733 u64 auth_key_len, u64 auth_iv_len, 819 * @auth_key_len: Length of authentication key, in bytes 827 u16 spu2_response_hdr_len(u16 auth_key_len, u16 enc_key_len, bool is_hash) argument 661 spu2_fmd_ctrl1_write(struct SPU2_FMD *fmd, bool is_inbound, u64 assoc_size, u64 auth_key_len, u64 cipher_key_len, bool gen_iv, bool hash_iv, bool return_iv, u64 ret_iv_len, u64 ret_iv_offset, u64 cipher_iv_len, u64 digest_size, bool return_payload, bool return_md) argument 732 spu2_fmd_ctrl2_write(struct SPU2_FMD *fmd, u64 cipher_offset, u64 auth_key_len, u64 auth_iv_len, u64 cipher_key_len, u64 cipher_iv_len) argument
|
H A D | spu.h | 228 u16 spum_response_hdr_len(u16 auth_key_len, u16 enc_key_len, bool is_hash);
|
H A D | spu2.h | 179 u16 spu2_response_hdr_len(u16 auth_key_len, u16 enc_key_len, bool is_hash);
|
H A D | cipher.h | 362 u16 (*spu_response_hdr_len)(u16 auth_key_len, u16 enc_key_len,
|
H A D | spu.c | 398 * @auth_key_len: authentication key length (bytes) 404 u16 spum_response_hdr_len(u16 auth_key_len, u16 enc_key_len, bool is_hash) argument
|
/linux-master/include/uapi/linux/ |
H A D | virtio_crypto.h | 157 __le32 auth_key_len; member in struct:virtio_crypto_mac_session_para
|
/linux-master/drivers/crypto/ |
H A D | n2_core.c | 523 unsigned long auth_key, unsigned int auth_key_len) 564 ent->control = control_word_base(nbytes, auth_key_len, 0, 520 n2_do_async_digest(struct ahash_request *req, unsigned int auth_type, unsigned int digest_size, unsigned int result_size, void *hash_loc, unsigned long auth_key, unsigned int auth_key_len) argument
|