/linux-master/drivers/scsi/ |
H A D | sd_dif.c | 72 bi.tag_size = sizeof(u16) + sizeof(u32); 74 bi.tag_size = sizeof(u16); 79 bi.profile->name, bi.tag_size);
|
/linux-master/block/ |
H A D | blk-integrity.c | 146 if (b1->tag_size && b2->tag_size && (b1->tag_size != b2->tag_size)) { 149 b1->tag_size, b2->tag_size); 235 return sysfs_emit(page, "%u\n", bi->tag_size); 308 static DEVICE_ATTR_RO(tag_size); 372 bi->tag_size = template->tag_size; [all...] |
/linux-master/arch/arm/kernel/ |
H A D | atags_compat.c | 85 tag->hdr.size = tag_size(tag_mem32); 120 tag->hdr.size = tag_size(tag_core); 127 tag->hdr.size = tag_size(tag_ramdisk); 135 tag->hdr.size = tag_size(tag_initrd); 141 tag->hdr.size = tag_size(tag_serialnr); 147 tag->hdr.size = tag_size(tag_revision); 164 tag->hdr.size = tag_size(tag_memclk); 173 tag->hdr.size = tag_size(tag_videotext); 189 tag->hdr.size = tag_size(tag_acorn);
|
H A D | atags_parse.c | 46 { tag_size(tag_core), ATAG_CORE }, 48 { tag_size(tag_mem32), ATAG_MEM },
|
/linux-master/drivers/crypto/intel/keembay/ |
H A D | ocs-aes.h | 106 u32 tag_size); 118 u32 tag_size);
|
H A D | ocs-aes.c | 603 const u8 *tag, u32 tag_size, 722 /* Just ensure that tag_size doesn't cause overflows. */ 723 if (tag_size > (AES_MAX_TAG_SIZE_U32 * sizeof(u32))) 742 /* Just ensure that tag_size doesn't cause overflows. */ 743 if (tag_size > (AES_MAX_TAG_SIZE_U32 * sizeof(u32))) 892 u8 *tag, u32 tag_size) 906 memcpy(tag, tag_u32, tag_size); 921 * @tag_size: The size (in bytes) of @out_tag. 935 u32 tag_size) 943 aad_size, out_tag, tag_size, ciphe 600 ocs_aes_validate_inputs(dma_addr_t src_dma_list, u32 src_size, const u8 *iv, u32 iv_size, dma_addr_t aad_dma_list, u32 aad_size, const u8 *tag, u32 tag_size, enum ocs_cipher cipher, enum ocs_mode mode, enum ocs_instruction instruction, dma_addr_t dst_dma_list) argument 891 ocs_aes_gcm_read_tag(struct ocs_aes_dev *aes_dev, u8 *tag, u32 tag_size) argument 925 ocs_aes_gcm_op(struct ocs_aes_dev *aes_dev, enum ocs_cipher cipher, enum ocs_instruction instruction, dma_addr_t dst_dma_list, dma_addr_t src_dma_list, u32 src_size, const u8 *iv, dma_addr_t aad_dma_list, u32 aad_size, u8 *out_tag, u32 tag_size) argument 1023 ocs_aes_ccm_write_encrypted_tag(struct ocs_aes_dev *aes_dev, const u8 *in_tag, u32 tag_size) argument 1054 ocs_aes_ccm_write_b0(const struct ocs_aes_dev *aes_dev, const u8 *iv, u32 adata_size, u32 tag_size, u32 cryptlen) argument 1307 ocs_aes_ccm_op(struct ocs_aes_dev *aes_dev, enum ocs_cipher cipher, enum ocs_instruction instruction, dma_addr_t dst_dma_list, dma_addr_t src_dma_list, u32 src_size, u8 *iv, dma_addr_t adata_dma_list, u32 adata_size, u8 *in_tag, u32 tag_size) argument [all...] |
H A D | keembay-ocs-aes-core.c | 599 int tag_size = crypto_aead_authsize(tfm); local 603 if (instruction == OCS_DECRYPT && req->cryptlen < tag_size) 722 const int tag_size = crypto_aead_authsize(crypto_aead_reqtfm(req)); local 745 in_size = req->cryptlen - tag_size; 759 tag_size, req->assoclen + in_size); 775 out_size = (rctx->mode == OCS_MODE_CCM) ? in_size + tag_size : 778 dst_size = req->assoclen + in_size + tag_size; 890 const int tag_size = crypto_aead_authsize(crypto_aead_reqtfm(req)); local 906 rctx->in_tag, tag_size); 916 rctx->out_tag, tag_size); [all...] |
/linux-master/drivers/gpu/drm/nouveau/nvkm/subdev/ltc/ |
H A D | gf100.c | 160 u32 tag_size, tag_margin, tag_align; local 186 tag_size = (ltc->num_tags / 64) * 0x6000 + tag_margin; 187 tag_size += tag_align; 189 ret = nvkm_ram_get(device, NVKM_RAM_MM_NORMAL, 0x01, 12, tag_size,
|
/linux-master/include/soc/bcm2835/ |
H A D | raspberrypi-firmware.h | 180 void *data, size_t tag_size); 196 void *data, size_t tag_size) 195 rpi_firmware_property_list(struct rpi_firmware *fw, void *data, size_t tag_size) argument
|
/linux-master/drivers/firmware/ |
H A D | raspberrypi.c | 78 * @tag_size: Size of tags buffer. 89 void *data, size_t tag_size) 91 size_t size = tag_size + 12; 110 memcpy(&buf[2], data, tag_size); 117 memcpy(data, &buf[2], tag_size); 88 rpi_firmware_property_list(struct rpi_firmware *fw, void *data, size_t tag_size) argument
|
/linux-master/arch/arm/include/uapi/asm/ |
H A D | setup.h | 182 #define tag_size(type) ((sizeof(struct tag_header) + sizeof(struct type)) >> 2) macro
|
/linux-master/drivers/md/ |
H A D | dm-integrity.c | 167 unsigned int tag_size; member in struct:dm_integrity_c 448 ms += (__u64)offset * ic->tag_size >> (SECTOR_SHIFT + ic->log2_buffer_sectors); 449 mo = (offset * ic->tag_size) & ((1U << SECTOR_SHIFT << ic->log2_buffer_sectors) - 1); 1439 if (likely(is_power_of_2(ic->tag_size))) { 1456 if (unlikely(hash_offset == ic->tag_size)) { 1476 if (unlikely(!is_power_of_2(ic->tag_size))) 1477 hash_offset = (hash_offset + to_copy) % ic->tag_size; 1684 if (unlikely(digest_size < ic->tag_size)) 1685 memset(result + digest_size, 0, ic->tag_size - digest_size); 1691 get_random_bytes(result, ic->tag_size); [all...] |
H A D | dm-crypt.c | 1182 if (bi->tag_size != cc->on_disk_tag_size || 1205 if ((cc->integrity_tag_size + cc->integrity_iv_size) != bi->tag_size) {
|
/linux-master/net/tls/ |
H A D | tls.h | 338 pkt_len = plaintext_len + prot->tag_size; 368 size += prot->tag_size;
|
H A D | tls_device.c | 329 if (unlikely(pfrag->size - pfrag->offset < prot->tag_size) && 330 !skb_page_frag_refill(prot->tag_size, pfrag, sk->sk_allocation)) { 335 tls_append_frag(record, pfrag, prot->tag_size);
|
H A D | tls_sw.c | 268 data_len + prot->tag_size, 2387 cipher_overhead = prot->tag_size; 2679 prot->tag_size = cipher_desc->tag; 2680 prot->overhead_size = prot->prepend_size + prot->tag_size + prot->tail_size; 2759 rc = crypto_aead_setauthsize(*aead, prot->tag_size);
|
/linux-master/arch/arm/boot/compressed/ |
H A D | atags_to_fdt.c | 149 (atag->hdr.size != tag_size(tag_core) &&
|
/linux-master/drivers/target/ |
H A D | target_core_transport.c | 310 * @tag_size: Size in bytes of the private data a target driver associates with 314 unsigned int tag_num, unsigned int tag_size) 318 se_sess->sess_cmd_map = kvcalloc(tag_size, tag_num, 342 * @tag_size: Size in bytes of the private data a target driver associates with 347 transport_init_session_tags(unsigned int tag_num, unsigned int tag_size, argument 353 if (tag_num != 0 && !tag_size) { 355 " %u, but zero tag_size\n", tag_num); 358 if (!tag_num && tag_size) { 359 pr_err("init_session_tags called with percpu-ida tag_size:" 360 " %u, but zero tag_num\n", tag_size); 313 transport_alloc_session_tags(struct se_session *se_sess, unsigned int tag_num, unsigned int tag_size) argument 458 target_setup_session(struct se_portal_group *tpg, unsigned int tag_num, unsigned int tag_size, enum target_prot_op prot_op, const char *initiatorname, void *private, int (*callback)(struct se_portal_group *, struct se_session *, void *)) argument [all...] |
/linux-master/include/net/ |
H A D | tls.h | 209 u16 tag_size; 208 u16 tag_size; member in struct:tls_prot_info
|
/linux-master/drivers/target/iscsi/ |
H A D | iscsi_target_nego.c | 1119 int sessiontype = 0, ret = 0, tag_num, tag_size; local 1328 tag_size = sizeof(struct iscsit_cmd) + conn->conn_transport->priv_size; 1330 ret = transport_alloc_session_tags(sess->se_sess, tag_num, tag_size);
|
/linux-master/drivers/nvdimm/ |
H A D | core.c | 522 bi.tag_size = meta_size;
|
/linux-master/drivers/infiniband/ulp/srpt/ |
H A D | ib_srpt.c | 2165 int i, tag_num, tag_size, ret; local 2320 tag_size = 1; /* ib_srpt does not use se_sess->sess_cmd_map */ 2328 tag_size, TARGET_PROT_NORMAL, 2340 tag_size, TARGET_PROT_NORMAL, i_port_id, 2346 tag_size, TARGET_PROT_NORMAL,
|
/linux-master/drivers/nvme/host/ |
H A D | core.c | 1764 integrity.tag_size = sizeof(u16) + sizeof(u32); 1769 integrity.tag_size = sizeof(u16) + 6; 1782 integrity.tag_size = sizeof(u16); 1787 integrity.tag_size = sizeof(u16);
|
/linux-master/include/linux/ |
H A D | blkdev.h | 114 unsigned char tag_size; member in struct:blk_integrity
|