/linux-master/drivers/s390/cio/ |
H A D | airq.c | 130 struct airq_iv *iv; local 133 iv = kzalloc(sizeof(*iv), GFP_KERNEL); 134 if (!iv) 136 iv->bits = bits; 137 iv->flags = flags; 145 iv->vector = dma_pool_zalloc(airq_iv_cache, GFP_KERNEL, 146 &iv->vector_dma); 147 if (!iv->vector) 150 iv 202 airq_iv_release(struct airq_iv *iv) argument 225 airq_iv_alloc(struct airq_iv *iv, unsigned long num) argument 260 airq_iv_free(struct airq_iv *iv, unsigned long bit, unsigned long num) argument 291 airq_iv_scan(struct airq_iv *iv, unsigned long start, unsigned long end) argument [all...] |
/linux-master/arch/s390/include/asm/ |
H A D | airq.h | 53 void airq_iv_release(struct airq_iv *iv); 54 unsigned long airq_iv_alloc(struct airq_iv *iv, unsigned long num); 55 void airq_iv_free(struct airq_iv *iv, unsigned long bit, unsigned long num); 56 unsigned long airq_iv_scan(struct airq_iv *iv, unsigned long start, 59 static inline unsigned long airq_iv_alloc_bit(struct airq_iv *iv) argument 61 return airq_iv_alloc(iv, 1); 64 static inline void airq_iv_free_bit(struct airq_iv *iv, unsigned long bit) argument 66 airq_iv_free(iv, bit, 1); 69 static inline unsigned long airq_iv_end(struct airq_iv *iv) argument 71 return iv 74 airq_iv_lock(struct airq_iv *iv, unsigned long bit) argument 80 airq_iv_unlock(struct airq_iv *iv, unsigned long bit) argument 86 airq_iv_set_data(struct airq_iv *iv, unsigned long bit, unsigned int data) argument 92 airq_iv_get_data(struct airq_iv *iv, unsigned long bit) argument 98 airq_iv_set_ptr(struct airq_iv *iv, unsigned long bit, unsigned long ptr) argument 104 airq_iv_get_ptr(struct airq_iv *iv, unsigned long bit) argument [all...] |
/linux-master/arch/riscv/crypto/ |
H A D | chacha-riscv64-glue.c | 17 size_t len, const u32 iv[4]); 21 u32 iv[CHACHA_IV_SIZE / sizeof(u32)]; local 30 iv[0] = get_unaligned_le32(req->iv); 31 iv[1] = get_unaligned_le32(req->iv + 4); 32 iv[2] = get_unaligned_le32(req->iv + 8); 33 iv[3] = get_unaligned_le32(req->iv [all...] |
/linux-master/drivers/staging/wlan-ng/ |
H A D | p80211wep.c | 70 u8 *iv, u8 *icv) 81 key[0] = iv[0]; 82 key[1] = iv[1]; 83 key[2] = iv[2]; 84 keyidx = WEP_KEY(iv[3]); 141 u8 *dst, u32 len, int keynum, u8 *iv, u8 *icv) 158 get_random_bytes(iv, 3); 159 while ((iv[1] == 0xff) && (iv[0] >= 3) && (iv[ 69 wep_decrypt(struct wlandevice *wlandev, u8 *buf, u32 len, int key_override, u8 *iv, u8 *icv) argument 140 wep_encrypt(struct wlandevice *wlandev, u8 *buf, u8 *dst, u32 len, int keynum, u8 *iv, u8 *icv) argument [all...] |
/linux-master/crypto/ |
H A D | cbc.c | 17 u8 *iv) 22 crypto_xor(iv, src, bsize); 23 crypto_lskcipher_encrypt(tfm, iv, dst, bsize, NULL); 24 memcpy(iv, dst, bsize); 34 u8 *iv = oiv; local 40 crypto_xor(src, iv, bsize); 42 iv = src; 47 memcpy(oiv, iv, bsize); 54 u8 *dst, unsigned len, u8 *iv, u32 flags) 62 rem = crypto_cbc_encrypt_inplace(cipher, dst, len, iv); 15 crypto_cbc_encrypt_segment(struct crypto_lskcipher *tfm, const u8 *src, u8 *dst, unsigned nbytes, u8 *iv) argument 53 crypto_cbc_encrypt(struct crypto_lskcipher *tfm, const u8 *src, u8 *dst, unsigned len, u8 *iv, u32 flags) argument 74 const u8 *iv = oiv; local 94 crypto_cbc_decrypt_inplace(struct crypto_lskcipher *tfm, u8 *src, unsigned nbytes, u8 *iv) argument 122 crypto_cbc_decrypt(struct crypto_lskcipher *tfm, const u8 *src, u8 *dst, unsigned len, u8 *iv, u32 flags) argument [all...] |
H A D | pcbc.c | 28 u8 * const iv = walk->iv; local 31 crypto_xor(iv, src, bsize); 32 crypto_cipher_encrypt_one(tfm, dst, iv); 33 crypto_xor_cpy(iv, dst, src, bsize); 49 u8 * const iv = walk->iv; local 54 crypto_xor(iv, src, bsize); 55 crypto_cipher_encrypt_one(tfm, src, iv); 56 crypto_xor_cpy(iv, tmpbu 95 u8 * const iv = walk->iv; local 116 u8 * const iv = walk->iv; local [all...] |
H A D | aegis-neon.h | 6 void crypto_aegis128_init_neon(void *state, const void *key, const void *iv);
|
/linux-master/drivers/crypto/nx/ |
H A D | nx-aes-ctr.c | 72 static int ctr_aes_nx_crypt(struct skcipher_request *req, u8 *iv) argument 86 rc = nx_build_sg_lists(nx_ctx, iv, req->dst, req->src, 88 csbcpb->cpb.aes_ctr.iv); 102 memcpy(iv, csbcpb->cpb.aes_cbc.cv, AES_BLOCK_SIZE); 119 u8 iv[16]; local 121 memcpy(iv, nx_ctx->priv.ctr.nonce, CTR_RFC3686_NONCE_SIZE); 122 memcpy(iv + CTR_RFC3686_NONCE_SIZE, req->iv, CTR_RFC3686_IV_SIZE); 123 iv[12] = iv[1 [all...] |
H A D | nx-aes-ccm.c | 123 static inline int crypto_ccm_check_iv(const u8 *iv) argument 126 if (1 > iv[0] || iv[0] > 7) 133 static int generate_b0(u8 *iv, unsigned int assoclen, unsigned int authsize, argument 138 memcpy(b0, iv, 16); 153 static int generate_pat(u8 *iv, argument 169 memset(iv + 15 - iv[0], 0, iv[0] + 1); 208 rc = generate_b0(iv, assocle 326 ccm_nx_decrypt(struct aead_request *req, u8 *iv, unsigned int assoclen) argument 404 ccm_nx_encrypt(struct aead_request *req, u8 *iv, unsigned int assoclen) argument 481 u8 *iv = rctx->iv; local 505 u8 *iv = rctx->iv; local [all...] |
/linux-master/include/crypto/ |
H A D | chacha.h | 65 void chacha_init_arch(u32 *state, const u32 *key, const u8 *iv); 66 static inline void chacha_init_generic(u32 *state, const u32 *key, const u8 *iv) argument 77 state[12] = get_unaligned_le32(iv + 0); 78 state[13] = get_unaligned_le32(iv + 4); 79 state[14] = get_unaligned_le32(iv + 8); 80 state[15] = get_unaligned_le32(iv + 12); 83 static inline void chacha_init(u32 *state, const u32 *key, const u8 *iv) argument 86 chacha_init_arch(state, key, iv); 88 chacha_init_generic(state, key, iv);
|
H A D | gcm.h | 78 const u8 iv[GCM_AES_IV_SIZE], u8 *authtag); 82 int assoc_len, const u8 iv[GCM_AES_IV_SIZE],
|
/linux-master/include/uapi/linux/ |
H A D | tls.h | 127 unsigned char iv[TLS_CIPHER_AES_GCM_128_IV_SIZE]; member in struct:tls12_crypto_info_aes_gcm_128 135 unsigned char iv[TLS_CIPHER_AES_GCM_256_IV_SIZE]; member in struct:tls12_crypto_info_aes_gcm_256 143 unsigned char iv[TLS_CIPHER_AES_CCM_128_IV_SIZE]; member in struct:tls12_crypto_info_aes_ccm_128 151 unsigned char iv[TLS_CIPHER_CHACHA20_POLY1305_IV_SIZE]; member in struct:tls12_crypto_info_chacha20_poly1305 159 unsigned char iv[TLS_CIPHER_SM4_GCM_IV_SIZE]; member in struct:tls12_crypto_info_sm4_gcm 167 unsigned char iv[TLS_CIPHER_SM4_CCM_IV_SIZE]; member in struct:tls12_crypto_info_sm4_ccm 175 unsigned char iv[TLS_CIPHER_ARIA_GCM_128_IV_SIZE]; member in struct:tls12_crypto_info_aria_gcm_128 183 unsigned char iv[TLS_CIPHER_ARIA_GCM_256_IV_SIZE]; member in struct:tls12_crypto_info_aria_gcm_256
|
H A D | if_alg.h | 45 __u8 iv[]; member in struct:af_alg_iv
|
/linux-master/arch/arm64/crypto/ |
H A D | sm4-ce.h | 13 u8 *iv, unsigned int nblocks);
|
H A D | sm4-neon-glue.c | 24 u8 *iv, unsigned int nblocks); 26 u8 *iv, unsigned int nblocks); 91 const u8 *iv = walk.iv; local 96 crypto_xor_cpy(dst, src, iv, SM4_BLOCK_SIZE); 98 iv = dst; 103 if (iv != walk.iv) 104 memcpy(walk.iv, iv, SM4_BLOCK_SIZ [all...] |
/linux-master/arch/x86/crypto/ |
H A D | sm4_aesni_avx_glue.c | 27 const u8 *src, u8 *iv); 29 const u8 *src, u8 *iv); 102 const u8 *iv = walk.iv; local 107 crypto_xor_cpy(dst, src, iv, SM4_BLOCK_SIZE); 109 iv = dst; 114 if (iv != walk.iv) 115 memcpy(walk.iv, iv, SM4_BLOCK_SIZ 150 u8 iv[SM4_BLOCK_SIZE]; local [all...] |
H A D | aria-avx.h | 22 u8 *keystream, u8 *iv); 29 u8 *keystream, u8 *iv); 37 u8 *keystream, u8 *iv); 44 u8 *keystream, u8 *iv); 50 u8 *keystream, u8 *iv); 54 u8 *keystream, u8 *iv); 58 u8 *keystream, u8 *iv);
|
H A D | aesni-intel_glue.c | 99 const u8 *in, unsigned int len, u8 *iv); 101 const u8 *in, unsigned int len, u8 *iv); 103 const u8 *in, unsigned int len, u8 *iv); 105 const u8 *in, unsigned int len, u8 *iv); 111 const u8 *in, unsigned int len, u8 *iv); 114 const u8 *in, unsigned int len, u8 *iv); 119 const u8 *in, unsigned int len, u8 *iv); 125 u8 *iv, 139 asmlinkage void aes_ctr_enc_128_avx_by8(const u8 *in, u8 *iv, 141 asmlinkage void aes_ctr_enc_192_avx_by8(const u8 *in, u8 *iv, 491 aesni_ctr_enc_avx_tfm(struct crypto_aes_ctx *ctx, u8 *out, const u8 *in, unsigned int len, u8 *iv) argument 542 aesni_xctr_enc_avx_tfm(struct crypto_aes_ctx *ctx, u8 *out, const u8 *in, unsigned int len, u8 *iv, unsigned int byte_ctr) argument 668 gcmaes_crypt_by_sg(bool enc, struct aead_request *req, unsigned int assoclen, u8 *hash_subkey, u8 *iv, void *aes_ctx, u8 *auth_tag, unsigned long auth_tag_len) argument 778 gcmaes_encrypt(struct aead_request *req, unsigned int assoclen, u8 *hash_subkey, u8 *iv, void *aes_ctx) argument 797 gcmaes_decrypt(struct aead_request *req, unsigned int assoclen, u8 *hash_subkey, u8 *iv, void *aes_ctx) argument 830 u8 *iv = PTR_ALIGN(&ivbuf[0], AESNI_ALIGN); local 858 u8 *iv = PTR_ALIGN(&ivbuf[0], AESNI_ALIGN); local 1158 u8 *iv = PTR_ALIGN(&ivbuf[0], AESNI_ALIGN); local 1175 u8 *iv = PTR_ALIGN(&ivbuf[0], AESNI_ALIGN); local [all...] |
/linux-master/include/keys/ |
H A D | encrypted-type.h | 23 u8 *iv; /* datablob: iv */ member in struct:encrypted_key_payload
|
/linux-master/arch/powerpc/crypto/ |
H A D | aesp8-ppc.h | 23 const struct aes_key *key, u8 *iv, const int enc); 26 const u8 *iv); 28 const struct aes_key *key1, const struct aes_key *key2, u8 *iv); 30 const struct aes_key *key1, const struct aes_key *key2, u8 *iv);
|
/linux-master/drivers/crypto/ccp/ |
H A D | ccp-crypto-aes.c | 33 memcpy(req->iv, rctx->iv, AES_BLOCK_SIZE); 83 if (!req->iv) 86 memcpy(rctx->iv, req->iv, AES_BLOCK_SIZE); 89 sg_init_one(iv_sg, rctx->iv, iv_len); 101 rctx->cmd.u.aes.iv = iv_sg; 139 req->iv = rctx->rfc3686_info; 163 u8 *iv; local 166 iv [all...] |
/linux-master/net/mac80211/ |
H A D | aes_gmac.c | 21 u8 *zero, *__aad, iv[AES_BLOCK_SIZE]; local 55 memcpy(iv, nonce, GMAC_NONCE_LEN); 56 memset(iv + GMAC_NONCE_LEN, 0, sizeof(iv) - GMAC_NONCE_LEN); 57 iv[AES_BLOCK_SIZE - 1] = 0x01; 60 aead_request_set_crypt(aead_req, sg, sg, 0, iv);
|
/linux-master/arch/mips/crypto/ |
H A D | chacha-glue.c | 23 void chacha_init_arch(u32 *state, const u32 *key, const u8 *iv) argument 25 chacha_init_generic(state, key, iv); 30 const struct chacha_ctx *ctx, const u8 *iv) 38 chacha_init_generic(state, ctx->key, iv); 59 return chacha_mips_stream_xor(req, ctx, req->iv); 70 chacha_init_generic(state, ctx->key, req->iv); 75 memcpy(&real_iv[0], req->iv + 24, 8); 76 memcpy(&real_iv[8], req->iv + 16, 8); 29 chacha_mips_stream_xor(struct skcipher_request *req, const struct chacha_ctx *ctx, const u8 *iv) argument
|
/linux-master/lib/crypto/ |
H A D | chacha20poly1305.c | 39 u8 iv[CHACHA_IV_SIZE]; local 41 memset(iv, 0, 8); 42 memcpy(iv + 8, nonce + 16, 8); 50 chacha_init(chacha_state, k, iv); 53 memzero_explicit(iv, sizeof(iv)); 97 __le64 iv[2]; local 101 iv[0] = 0; 102 iv[1] = cpu_to_le64(nonce); 104 chacha_init(chacha_state, k, (u8 *)iv); 175 __le64 iv[2]; local 226 __le64 iv[2]; member in struct:__anon517::__anon518 [all...] |
/linux-master/drivers/crypto/ccree/ |
H A D | cc_cipher.h | 23 u8 *iv; member in struct:cipher_req_ctx
|