| /crypto/ |
| A D | testmgr.h | 67 const char *iv; member 107 const char *iv; member 12117 .iv = zeroed_string, 12149 .iv = zeroed_string, 17067 .iv = "", 17086 .iv = "", 17379 .iv = "", 17400 .iv = "", 21166 .iv = zeroed_string, 21781 .iv = zeroed_string, [all …]
|
| A D | cbc.c | 17 u8 *iv) in crypto_cbc_encrypt_segment() argument 22 crypto_xor(iv, src, bsize); in crypto_cbc_encrypt_segment() 24 memcpy(iv, dst, bsize); in crypto_cbc_encrypt_segment() 34 u8 *iv = oiv; in crypto_cbc_encrypt_inplace() local 40 crypto_xor(src, iv, bsize); in crypto_cbc_encrypt_inplace() 42 iv = src; in crypto_cbc_encrypt_inplace() 47 memcpy(oiv, iv, bsize); in crypto_cbc_encrypt_inplace() 74 const u8 *iv = oiv; in crypto_cbc_decrypt_segment() local 82 iv = src; in crypto_cbc_decrypt_segment() 88 memcpy(oiv, iv, bsize); in crypto_cbc_decrypt_segment() [all …]
|
| A D | pcbc.c | 28 u8 * const iv = walk->iv; in crypto_pcbc_encrypt_segment() local 31 crypto_xor(iv, src, bsize); in crypto_pcbc_encrypt_segment() 32 crypto_cipher_encrypt_one(tfm, dst, iv); in crypto_pcbc_encrypt_segment() 33 crypto_xor_cpy(iv, dst, src, bsize); in crypto_pcbc_encrypt_segment() 49 u8 * const iv = walk->iv; in crypto_pcbc_encrypt_inplace() local 54 crypto_xor(iv, dst, bsize); in crypto_pcbc_encrypt_inplace() 95 u8 * const iv = walk->iv; in crypto_pcbc_decrypt_segment() local 99 crypto_xor(dst, iv, bsize); in crypto_pcbc_decrypt_segment() 100 crypto_xor_cpy(iv, dst, src, bsize); in crypto_pcbc_decrypt_segment() 116 u8 * const iv = walk->iv; in crypto_pcbc_decrypt_inplace() local [all …]
|
| A D | xctr.c | 43 crypto_xor(walk->iv, (u8 *)&ctr32, sizeof(ctr32)); in crypto_xctr_crypt_final() 44 crypto_cipher_encrypt_one(tfm, keystream, walk->iv); in crypto_xctr_crypt_final() 46 crypto_xor(walk->iv, (u8 *)&ctr32, sizeof(ctr32)); in crypto_xctr_crypt_final() 60 crypto_xor(walk->iv, (u8 *)&ctr32, sizeof(ctr32)); in crypto_xctr_crypt_segment() 61 fn(crypto_cipher_tfm(tfm), dst, walk->iv); in crypto_xctr_crypt_segment() 63 crypto_xor(walk->iv, (u8 *)&ctr32, sizeof(ctr32)); in crypto_xctr_crypt_segment() 87 crypto_xor(walk->iv, (u8 *)&ctr32, sizeof(ctr32)); in crypto_xctr_crypt_inplace() 88 fn(crypto_cipher_tfm(tfm), keystream, walk->iv); in crypto_xctr_crypt_inplace() 90 crypto_xor(walk->iv, (u8 *)&ctr32, sizeof(ctr32)); in crypto_xctr_crypt_inplace()
|
| A D | lrw.c | 148 __be32 *iv; in lrw_xor_tweak() local 162 iv = (__be32 *)w.iv; in lrw_xor_tweak() 163 counter[0] = be32_to_cpu(iv[3]); in lrw_xor_tweak() 164 counter[1] = be32_to_cpu(iv[2]); in lrw_xor_tweak() 165 counter[2] = be32_to_cpu(iv[1]); in lrw_xor_tweak() 166 counter[3] = be32_to_cpu(iv[0]); in lrw_xor_tweak() 186 iv[0] = cpu_to_be32(counter[3]); in lrw_xor_tweak() 187 iv[1] = cpu_to_be32(counter[2]); in lrw_xor_tweak() 188 iv[2] = cpu_to_be32(counter[1]); in lrw_xor_tweak() 189 iv[3] = cpu_to_be32(counter[0]); in lrw_xor_tweak() [all …]
|
| A D | seqiv.c | 33 memcpy(req->iv, subreq->iv, crypto_aead_ivsize(geniv)); in seqiv_aead_encrypt_complete2() 36 kfree_sensitive(subreq->iv); in seqiv_aead_encrypt_complete2() 65 info = req->iv; in seqiv_aead_encrypt() 73 info = kmemdup(req->iv, ivsize, req->base.flags & in seqiv_aead_encrypt() 92 if (unlikely(info != req->iv)) in seqiv_aead_encrypt() 116 req->cryptlen - ivsize, req->iv); in seqiv_aead_decrypt() 119 scatterwalk_map_and_copy(req->iv, req->src, req->assoclen, ivsize, 0); in seqiv_aead_decrypt()
|
| A D | ccm.c | 128 unsigned int lp = req->iv[0]; in format_input() 134 memcpy(info, req->iv, 16); in format_input() 241 if (1 > iv[0] || iv[0] > 7) in crypto_ccm_check_iv() 251 u8 *iv = req->iv; in crypto_ccm_init_crypt() local 263 memset(iv + 15 - iv[0], 0, iv[0] + 1); in crypto_ccm_init_crypt() 291 u8 *iv = req->iv; in crypto_ccm_encrypt() local 352 u8 *iv = pctx->idata; in crypto_ccm_decrypt() local 368 memcpy(iv, req->iv, 16); in crypto_ccm_decrypt() 610 iv[0] = 3; in crypto_rfc4309_crypt() 613 memcpy(iv + 4, req->iv, 8); in crypto_rfc4309_crypt() [all …]
|
| A D | ctr.c | 24 u8 iv[CTR_RFC3686_BLOCK_SIZE]; member 33 u8 *ctrblk = walk->iv; in crypto_ctr_crypt_final() 52 u8 *ctrblk = walk->iv; in crypto_ctr_crypt_segment() 81 u8 *ctrblk = walk->iv; in crypto_ctr_crypt_inplace() 199 u8 *iv = rctx->iv; in crypto_rfc3686_crypt() local 202 memcpy(iv, ctx->nonce, CTR_RFC3686_NONCE_SIZE); in crypto_rfc3686_crypt() 203 memcpy(iv + CTR_RFC3686_NONCE_SIZE, req->iv, CTR_RFC3686_IV_SIZE); in crypto_rfc3686_crypt() 206 *(__be32 *)(iv + CTR_RFC3686_NONCE_SIZE + CTR_RFC3686_IV_SIZE) = in crypto_rfc3686_crypt() 213 req->cryptlen, iv); in crypto_rfc3686_crypt()
|
| A D | lskcipher.c | 71 u8 *iv, int (*crypt)(struct crypto_lskcipher *tfm, const u8 *src, in crypto_lskcipher_crypt_unaligned() argument 72 u8 *dst, unsigned len, u8 *iv, u32 flags)) in crypto_lskcipher_crypt_unaligned() 89 memcpy(tiv, iv, ivsize + statesize); in crypto_lskcipher_crypt_unaligned() 117 memcpy(iv, tiv, ivsize + statesize); in crypto_lskcipher_crypt_unaligned() 124 u8 *dst, unsigned len, u8 *iv, in crypto_lskcipher_crypt() argument 127 unsigned len, u8 *iv, in crypto_lskcipher_crypt() 134 return crypto_lskcipher_crypt_unaligned(tfm, src, dst, len, iv, in crypto_lskcipher_crypt() 141 u8 *dst, unsigned len, u8 *iv) in crypto_lskcipher_encrypt() argument 150 u8 *dst, unsigned len, u8 *iv) in crypto_lskcipher_decrypt() argument 175 memcpy(ivs, req->iv, ivsize); in crypto_lskcipher_crypt_sg() [all …]
|
| A D | chacha.c | 50 const u8 iv[CHACHA_IV_SIZE], bool arch) in chacha_stream_xor() 58 chacha_init(&state, ctx->key, iv); in chacha_stream_xor() 84 return chacha_stream_xor(req, ctx, req->iv, false); in crypto_chacha_crypt_generic() 92 return chacha_stream_xor(req, ctx, req->iv, true); in crypto_chacha_crypt_arch() 104 chacha_init(&state, ctx->key, req->iv); in crypto_xchacha_crypt() 112 memcpy(&real_iv[0], req->iv + 24, 8); /* stream position */ in crypto_xchacha_crypt() 113 memcpy(&real_iv[8], req->iv + 16, 8); /* remaining 64 nonce bits */ in crypto_xchacha_crypt()
|
| A D | chacha20poly1305.c | 33 u8 iv[CHACHA_IV_SIZE]; member 70 static void chacha_iv(u8 *iv, struct aead_request *req, u32 icb) in chacha_iv() argument 75 memcpy(iv, &leicb, sizeof(leicb)); in chacha_iv() 76 memcpy(iv + sizeof(leicb), ctx->salt, ctx->saltlen); in chacha_iv() 77 memcpy(iv + sizeof(leicb) + ctx->saltlen, req->iv, in chacha_iv() 110 chacha_iv(creq->iv, req, 1); in chacha_decrypt() 121 rctx->cryptlen, creq->iv); in chacha_decrypt() 221 chacha_iv(creq->iv, req, 0); in poly_genkey() 227 POLY1305_KEY_SIZE, creq->iv); in poly_genkey() 252 chacha_iv(creq->iv, req, 1); in chacha_encrypt() [all …]
|
| A D | scatterwalk.c | 257 u8 *iv; in skcipher_copy_iv() local 267 iv = PTR_ALIGN(walk->buffer, alignmask + 1) + aligned_stride; in skcipher_copy_iv() 269 walk->iv = memcpy(iv, walk->iv, walk->ivsize); in skcipher_copy_iv() 281 if (unlikely(((unsigned long)walk->iv & walk->alignmask))) { in skcipher_walk_first() 371 if (walk->iv != walk->oiv) in skcipher_walk_done() 372 memcpy(walk->oiv, walk->iv, walk->ivsize); in skcipher_walk_done()
|
| A D | gcm.c | 62 u8 iv[16]; member 96 u8 iv[16]; in crypto_gcm_setkey() member 125 sizeof(data->hash), data->iv); in crypto_gcm_setkey() 155 memcpy(pctx->iv, req->iv, GCM_AES_IV_SIZE); in crypto_gcm_init_common() 187 pctx->iv); in crypto_gcm_init_crypt() 727 memcpy(iv, ctx->nonce, 4); in crypto_rfc4106_crypt() 728 memcpy(iv + 4, req->iv, 8); in crypto_rfc4106_crypt() 749 req->cryptlen, iv); in crypto_rfc4106_crypt() 937 memcpy(iv, ctx->nonce, 4); in crypto_rfc4543_crypt() 938 memcpy(iv + 4, req->iv, 8); in crypto_rfc4543_crypt() [all …]
|
| A D | essiv.c | 147 crypto_cipher_encrypt_one(tctx->essiv_cipher, req->iv, req->iv); in essiv_skcipher_crypt() 151 req->iv); in essiv_skcipher_crypt() 192 crypto_cipher_encrypt_one(tctx->essiv_cipher, req->iv, req->iv); in essiv_aead_crypt() 201 scatterwalk_map_and_copy(req->iv, req->dst, in essiv_aead_crypt() 205 u8 *iv = (u8 *)aead_request_ctx(req) + tctx->ivoffset; in essiv_aead_crypt() local 218 memcpy(iv, req->iv, ivsize); in essiv_aead_crypt() 238 sg_set_buf(rctx->sg + 1, iv, ivsize); in essiv_aead_crypt() 250 aead_request_set_crypt(subreq, src, req->dst, req->cryptlen, req->iv); in essiv_aead_crypt()
|
| A D | cts.c | 124 skcipher_request_set_crypt(subreq, sg, sg, bsize, req->iv); in cts_cbc_encrypt() 163 req->iv); in crypto_cts_encrypt() 173 offset, req->iv); in crypto_cts_encrypt() 258 req->iv); in crypto_cts_decrypt() 271 memcpy(space, req->iv, bsize); in crypto_cts_decrypt() 277 offset, req->iv); in crypto_cts_decrypt()
|
| A D | aegis128-neon.c | 25 const u8 *iv) in crypto_aegis128_init_simd() argument 28 crypto_aegis128_init_neon(state, key, iv); in crypto_aegis128_init_simd()
|
| A D | echainiv.c | 41 info = req->iv; in echainiv_encrypt() 92 req->cryptlen - ivsize, req->iv); in echainiv_decrypt() 95 scatterwalk_map_and_copy(req->iv, req->src, req->assoclen, ivsize, 0); in echainiv_decrypt()
|
| A D | algif_skcipher.c | 157 areq->first_rsgl.sgl.sgt.sgl, len, ctx->iv); in _skcipher_recvmsg() 367 sock_kzfree_s(sk, ctx->iv, crypto_skcipher_ivsize(tfm)); in skcipher_sock_destruct() 386 ctx->iv = sock_kmalloc(sk, crypto_skcipher_ivsize(tfm), in skcipher_accept_parent_nokey() 388 if (!ctx->iv) { in skcipher_accept_parent_nokey() 392 memset(ctx->iv, 0, crypto_skcipher_ivsize(tfm)); in skcipher_accept_parent_nokey()
|
| A D | algif_aead.c | 252 areq->first_rsgl.sgl.sgt.sgl, used, ctx->iv); in _aead_recvmsg() 454 sock_kzfree_s(sk, ctx->iv, ivlen); in aead_sock_destruct() 472 ctx->iv = sock_kmalloc(sk, ivlen, GFP_KERNEL); in aead_accept_parent_nokey() 473 if (!ctx->iv) { in aead_accept_parent_nokey() 477 memset(ctx->iv, 0, ivlen); in aead_accept_parent_nokey()
|
| A D | aegis128-core.c | 100 const u8 *iv) in crypto_aegis128_init() argument 106 crypto_xor(key_iv.bytes, iv, AEGIS_BLOCK_SIZE); in crypto_aegis128_init() 397 crypto_aegis128_init(&state, &ctx->key, req->iv); in crypto_aegis128_encrypt_generic() 423 crypto_aegis128_init(&state, &ctx->key, req->iv); in crypto_aegis128_decrypt_generic() 461 crypto_aegis128_init_simd(&state, &ctx->key, req->iv); in crypto_aegis128_encrypt_simd() 489 crypto_aegis128_init_simd(&state, &ctx->key, req->iv); in crypto_aegis128_decrypt_simd()
|
| A D | skcipher.c | 50 walk->iv = req->iv; in skcipher_walk_virt() 51 walk->oiv = req->iv; in skcipher_walk_virt() 81 walk->iv = req->iv; in skcipher_walk_aead_common() 82 walk->oiv = req->iv; in skcipher_walk_aead_common()
|
| A D | testmgr.c | 2098 if (vec->iv) in test_aead_vec_cfg() 2099 memcpy(iv, vec->iv, ivsize); in test_aead_vec_cfg() 2136 req->iv != iv || in test_aead_vec_cfg() 2149 if (req->iv != iv) in test_aead_vec_cfg() 2350 memcpy(iv, vec->iv, ivsize); in generate_aead_message() 2852 if (vec->iv) in test_skcipher_vec_cfg() 2853 memcpy(iv, vec->iv, ivsize); in test_skcipher_vec_cfg() 2857 iv = NULL; in test_skcipher_vec_cfg() 2885 req->iv != iv || in test_skcipher_vec_cfg() 2896 if (req->iv != iv) in test_skcipher_vec_cfg() [all …]
|
| A D | af_alg.c | 571 if (cmsg->cmsg_len < CMSG_LEN(sizeof(*con->iv))) in af_alg_cmsg_send() 573 con->iv = (void *)CMSG_DATA(cmsg); in af_alg_cmsg_send() 574 if (cmsg->cmsg_len < CMSG_LEN(con->iv->ivlen + in af_alg_cmsg_send() 575 sizeof(*con->iv))) in af_alg_cmsg_send() 968 if (con.iv && con.iv->ivlen != ivsize) in af_alg_sendmsg() 987 if (con.iv) in af_alg_sendmsg() 988 memcpy(ctx->iv, con.iv->iv, ivsize); in af_alg_sendmsg()
|
| /crypto/krb5/ |
| A D | rfc8009_aes2.c | 183 u8 *iv, *ad; in rfc8009_encrypt() local 203 iv = buffer + krb5_aead_size(aead); in rfc8009_encrypt() 232 aead_request_set_crypt(req, bsg, bsg, secure_len, iv); in rfc8009_encrypt() 261 u8 *iv, *ad; in rfc8009_decrypt() local 276 iv = buffer + krb5_aead_size(aead); in rfc8009_decrypt() 288 aead_request_set_crypt(req, bsg, bsg, *_len, iv); in rfc8009_decrypt()
|
| A D | rfc3961_simplified.c | 104 static int rfc3961_do_encrypt(struct crypto_sync_skcipher *tfm, void *iv, in rfc3961_do_encrypt() argument 120 if (iv) in rfc3961_do_encrypt() 121 memcpy(local_iv, iv, crypto_sync_skcipher_ivsize(tfm)); in rfc3961_do_encrypt() 550 u8 *iv; in krb5_aead_encrypt() local 588 iv = buffer + krb5_aead_size(aead); in krb5_aead_encrypt() 592 aead_request_set_crypt(req, sg, sg, secure_len, iv); in krb5_aead_encrypt() 617 u8 *iv; in krb5_aead_decrypt() local 633 iv = buffer + krb5_aead_size(aead); in krb5_aead_decrypt() 637 aead_request_set_crypt(req, sg, sg, *_len, iv); in krb5_aead_decrypt()
|