| /drivers/crypto/caam/ |
| A D | caamalg.c | 2083 .aead.op = { 2105 .aead.op = { 2128 .aead.op = { 2153 .aead.op = { 2177 .aead.op = { 2201 .aead.op = { 2225 .aead.op = { 2249 .aead.op = { 2273 .aead.op = { 2296 .aead.op = { [all …]
|
| A D | caamalg_qi.c | 1592 .aead = { 1611 .aead = { 1631 .aead = { 1651 .aead = { 1672 .aead = { 1695 .aead = { 1716 .aead = { 1739 .aead = { 1760 .aead = { 1783 .aead = { [all …]
|
| A D | caamalg_qi2.c | 1802 .aead = { 1821 .aead = { 1841 .aead = { 1861 .aead = { 1882 .aead = { 1905 .aead = { 1926 .aead = { 1949 .aead = { 1970 .aead = { 1993 .aead = { [all …]
|
| /drivers/crypto/xilinx/ |
| A D | zynqmp-aes-gcm.c | 47 struct aead_engine_alg aead; member 244 struct crypto_tfm *tfm = crypto_aead_tfm(aead); in zynqmp_aes_aead_setkey() 276 struct crypto_tfm *tfm = crypto_aead_tfm(aead); in zynqmp_aes_aead_setauthsize() 288 struct aead_alg *alg = crypto_aead_alg(aead); in zynqmp_aes_aead_encrypt() 301 struct aead_alg *alg = crypto_aead_alg(aead); in zynqmp_aes_aead_decrypt() 312 struct crypto_tfm *tfm = crypto_aead_tfm(aead); in zynqmp_aes_aead_init() 316 struct aead_alg *alg = crypto_aead_alg(aead); in zynqmp_aes_aead_init() 331 crypto_aead_set_reqsize(aead, in zynqmp_aes_aead_init() 340 struct crypto_tfm *tfm = crypto_aead_tfm(aead); in zynqmp_aes_aead_exit() 352 .alg.aead.base = { [all …]
|
| /drivers/crypto/cavium/nitrox/ |
| A D | nitrox_aead.c | 69 aead->authsize = authsize; in nitrox_aead_setauthsize() 90 return nitrox_aead_setauthsize(aead, authsize); in nitrox_aes_gcm_setauthsize() 230 rctx->dstlen = rctx->srclen + aead->authsize; in nitrox_aes_gcm_enc() 261 rctx->cryptlen = areq->cryptlen - aead->authsize; in nitrox_aes_gcm_dec() 264 rctx->dstlen = rctx->srclen - aead->authsize; in nitrox_aes_gcm_dec() 311 ret = nitrox_aead_init(aead); in nitrox_gcm_common_init() 330 ret = nitrox_gcm_common_init(aead); in nitrox_aes_gcm_init() 334 crypto_aead_set_reqsize(aead, in nitrox_aes_gcm_init() 370 ret = nitrox_aes_gcm_setkey(aead, key, keylen); in nitrox_rfc4106_setkey() 390 return nitrox_aead_setauthsize(aead, authsize); in nitrox_rfc4106_setauthsize() [all …]
|
| /drivers/net/ovpn/ |
| A D | crypto_aead.c | 251 struct crypto_aead *aead; in ovpn_aead_init() local 254 aead = crypto_alloc_aead(alg_name, 0, 0); in ovpn_aead_init() 255 if (IS_ERR(aead)) { in ovpn_aead_init() 256 ret = PTR_ERR(aead); in ovpn_aead_init() 258 aead = NULL; in ovpn_aead_init() 262 ret = crypto_aead_setkey(aead, key, keylen); in ovpn_aead_init() 269 ret = crypto_aead_setauthsize(aead, OVPN_AUTH_TAG_SIZE); in ovpn_aead_init() 277 if (crypto_aead_ivsize(aead) != OVPN_NONCE_SIZE) { in ovpn_aead_init() 284 pr_debug("*** IV size=%u\n", crypto_aead_ivsize(aead)); in ovpn_aead_init() 290 return aead; in ovpn_aead_init() [all …]
|
| /drivers/crypto/inside-secure/eip93/ |
| A D | eip93-aead.c | 264 .alg.aead = { 292 .alg.aead = { 320 .alg.aead = { 348 .alg.aead = { 377 .alg.aead = { 406 .alg.aead = { 435 .alg.aead = { 464 .alg.aead = { 492 .alg.aead = { 520 .alg.aead = { [all …]
|
| /drivers/net/ethernet/netronome/nfp/crypto/ |
| A D | ipsec.c | 327 if (x->aead) { in nfp_net_xfrm_add_state() 385 if (x->aead && !strcmp(x->aead->alg_name, "rfc7539esp(chacha20,poly1305)")) { in nfp_net_xfrm_add_state() 391 if (x->aead->alg_icv_len != 128) { in nfp_net_xfrm_add_state() 398 if (x->aead->alg_key_len - 32 != 256) { in nfp_net_xfrm_add_state() 423 if (!x->aead) { in nfp_net_xfrm_add_state() 428 if (x->aead->alg_icv_len != 128) { in nfp_net_xfrm_add_state() 436 if (set_aes_keylen(cfg, x->props.ealgo, x->aead->alg_key_len - 32)) { in nfp_net_xfrm_add_state() 457 if (x->aead) { in nfp_net_xfrm_add_state() 461 key_len = DIV_ROUND_UP(x->aead->alg_key_len, BITS_PER_BYTE); in nfp_net_xfrm_add_state() 473 if (!strcmp(x->aead->alg_name, "rfc7539esp(chacha20,poly1305)")) in nfp_net_xfrm_add_state() [all …]
|
| /drivers/crypto/inside-secure/ |
| A D | safexcel_cipher.c | 823 if (ctx->aead) in safexcel_send_req() 1678 .alg.aead = { 1714 .alg.aead = { 1750 .alg.aead = { 1786 .alg.aead = { 1822 .alg.aead = { 1859 .alg.aead = { 1896 .alg.aead = { 1933 .alg.aead = { 1970 .alg.aead = { [all …]
|
| /drivers/net/netdevsim/ |
| A D | ipsec.c | 97 if (!xs->aead) { in nsim_ipsec_parse_proto_keys() 102 if (xs->aead->alg_icv_len != NSIM_IPSEC_AUTH_BITS) { in nsim_ipsec_parse_proto_keys() 108 key_data = &xs->aead->alg_key[0]; in nsim_ipsec_parse_proto_keys() 109 key_len = xs->aead->alg_key_len; in nsim_ipsec_parse_proto_keys() 110 alg_name = xs->aead->alg_name; in nsim_ipsec_parse_proto_keys() 173 sa.crypt = xs->ealg || xs->aead; in nsim_ipsec_add_sa()
|
| /drivers/crypto/amcc/ |
| A D | crypto4xx_alg.c | 310 struct crypto_aead *aead = crypto_aead_reqtfm(req); in crypto4xx_aead_need_fallback() local 313 if (aead->authsize & 3) in crypto4xx_aead_need_fallback() 339 aead_request_set_tfm(subreq, ctx->sw_cipher.aead); in crypto4xx_aead_fallback() 354 crypto_aead_clear_flags(ctx->sw_cipher.aead, CRYPTO_TFM_REQ_MASK); in crypto4xx_aead_setup_fallback() 355 crypto_aead_set_flags(ctx->sw_cipher.aead, in crypto4xx_aead_setup_fallback() 357 return crypto_aead_setkey(ctx->sw_cipher.aead, key, keylen); in crypto4xx_aead_setup_fallback() 428 struct crypto_aead *aead = crypto_aead_reqtfm(req); in crypto4xx_crypt_aes_ccm() local 435 len -= crypto_aead_authsize(aead); in crypto4xx_crypt_aes_ccm() 441 sa->sa_command_0.bf.digest_len = crypto_aead_authsize(aead) >> 2; in crypto4xx_crypt_aes_ccm() 472 return crypto_aead_setauthsize(ctx->sw_cipher.aead, authsize); in crypto4xx_setauthsize_aead()
|
| A D | crypto4xx_core.c | 946 ctx->sw_cipher.aead = crypto_alloc_aead(alg->base.cra_name, 0, in crypto4xx_aead_init() 949 if (IS_ERR(ctx->sw_cipher.aead)) in crypto4xx_aead_init() 950 return PTR_ERR(ctx->sw_cipher.aead); in crypto4xx_aead_init() 952 amcc_alg = container_of(alg, struct crypto4xx_alg, alg.u.aead); in crypto4xx_aead_init() 955 crypto_aead_reqsize(ctx->sw_cipher.aead), in crypto4xx_aead_init() 965 crypto_free_aead(ctx->sw_cipher.aead); in crypto4xx_aead_exit() 986 rc = crypto_register_aead(&alg->alg.u.aead); in crypto4xx_register_alg() 1015 crypto_unregister_aead(&alg->alg.u.aead); in crypto4xx_unregister_alg() 1230 { .type = CRYPTO_ALG_TYPE_AEAD, .u.aead = { 1251 { .type = CRYPTO_ALG_TYPE_AEAD, .u.aead = {
|
| A D | crypto4xx_core.h | 125 struct crypto_aead *aead; member 137 struct aead_alg aead; member
|
| /drivers/net/ethernet/intel/ixgbe/ |
| A D | ixgbe_ipsec.c | 436 if (!xs->aead) { in ixgbe_ipsec_parse_proto_keys() 447 key_data = &xs->aead->alg_key[0]; in ixgbe_ipsec_parse_proto_keys() 448 key_len = xs->aead->alg_key_len; in ixgbe_ipsec_parse_proto_keys() 449 alg_name = xs->aead->alg_name; in ixgbe_ipsec_parse_proto_keys() 618 rsa.decrypt = xs->ealg || xs->aead; in ixgbe_ipsec_add_sa() 728 tsa.encrypt = xs->ealg || xs->aead; in ixgbe_ipsec_add_sa() 924 xs->aead = kzalloc(aead_len, GFP_ATOMIC); in ixgbe_ipsec_vf_add_sa() 925 if (unlikely(!xs->aead)) { in ixgbe_ipsec_vf_add_sa() 931 xs->geniv = algo->uinfo.aead.geniv; in ixgbe_ipsec_vf_add_sa() 933 xs->aead->alg_key_len = IXGBE_IPSEC_KEY_BITS; in ixgbe_ipsec_vf_add_sa() [all …]
|
| /drivers/crypto/bcm/ |
| A D | cipher.c | 3031 .alg.aead = { 3054 .alg.aead = { 3077 .alg.aead = { 3100 .alg.aead = { 3123 .alg.aead = { 3146 .alg.aead = { 3171 .alg.aead = { 3196 .alg.aead = { 3221 .alg.aead = { 3246 .alg.aead = { [all …]
|
| /drivers/net/ethernet/intel/ixgbevf/ |
| A D | ipsec.c | 37 memcpy(sam->key, xs->aead->alg_key, sizeof(sam->key)); in ixgbevf_ipsec_set_pf_sa() 220 if (!xs->aead) { in ixgbevf_ipsec_parse_proto_keys() 225 if (xs->aead->alg_icv_len != IXGBE_IPSEC_AUTH_BITS) { in ixgbevf_ipsec_parse_proto_keys() 231 key_data = &xs->aead->alg_key[0]; in ixgbevf_ipsec_parse_proto_keys() 232 key_len = xs->aead->alg_key_len; in ixgbevf_ipsec_parse_proto_keys() 233 alg_name = xs->aead->alg_name; in ixgbevf_ipsec_parse_proto_keys() 312 rsa.decrypt = xs->ealg || xs->aead; in ixgbevf_ipsec_add_sa() 367 tsa.encrypt = xs->ealg || xs->aead; in ixgbevf_ipsec_add_sa()
|
| /drivers/crypto/ |
| A D | talitos.c | 2267 .alg.aead = { 2289 .alg.aead = { 2310 .alg.aead = { 2335 .alg.aead = { 2359 .alg.aead = { 2381 .alg.aead = { 2402 .alg.aead = { 2427 .alg.aead = { 2451 .alg.aead = { 2473 .alg.aead = { [all …]
|
| A D | omap-aes-gcm.c | 94 struct crypto_aead *aead = crypto_aead_reqtfm(req); in omap_aes_gcm_copy_buffers() local 95 unsigned int authlen = crypto_aead_authsize(aead); in omap_aes_gcm_copy_buffers() 241 struct crypto_aead *aead = crypto_aead_reqtfm(req); in omap_aes_gcm_crypt() local 242 unsigned int authlen = crypto_aead_authsize(aead); in omap_aes_gcm_crypt()
|
| A D | sa2ul.c | 160 struct aead_alg aead; member 1718 if (IS_ERR(ctx->fallback.aead)) { in sa_cra_init_aead() 1721 return PTR_ERR(ctx->fallback.aead); in sa_cra_init_aead() 1725 crypto_aead_reqsize(ctx->fallback.aead)); in sa_cra_init_aead() 1762 crypto_free_aead(ctx->fallback.aead); in sa_exit_tfm_aead() 1838 crypto_aead_set_flags(ctx->fallback.aead, in sa_aead_setkey() 1899 aead_request_set_tfm(subreq, ctx->fallback.aead); in sa_aead_run() 2120 .alg.aead = { 2147 .alg.aead = { 2197 alg_name = sa_algs[i].alg.aead.base.cra_name; in sa_register_algos() [all …]
|
| /drivers/net/ethernet/mellanox/mlx5/core/en_accel/ |
| A D | ipsec.c | 397 struct crypto_aead *aead; in mlx5e_ipsec_build_accel_xfrm_attrs() local 404 crypto_data_len = (x->aead->alg_key_len + 7) / 8; in mlx5e_ipsec_build_accel_xfrm_attrs() 411 aead = x->data; in mlx5e_ipsec_build_accel_xfrm_attrs() 412 geniv_ctx = crypto_aead_ctx(aead); in mlx5e_ipsec_build_accel_xfrm_attrs() 413 ivsize = crypto_aead_ivsize(aead); in mlx5e_ipsec_build_accel_xfrm_attrs() 415 memcpy(&aes_gcm->salt, x->aead->alg_key + key_len, in mlx5e_ipsec_build_accel_xfrm_attrs() 421 aes_gcm->icv_len = x->aead->alg_icv_len; in mlx5e_ipsec_build_accel_xfrm_attrs() 538 if (!x->aead) { in mlx5e_xfrm_validate_state() 542 if (x->aead->alg_icv_len != 128) { in mlx5e_xfrm_validate_state() 546 if ((x->aead->alg_key_len != 128 + 32) && in mlx5e_xfrm_validate_state() [all …]
|
| A D | ipsec_rxtx.c | 202 struct crypto_aead *aead; in mlx5e_ipsec_set_state() local 207 aead = x->data; in mlx5e_ipsec_set_state() 208 alen = crypto_aead_authsize(aead); in mlx5e_ipsec_set_state() 209 blksize = ALIGN(crypto_aead_blocksize(aead), 4); in mlx5e_ipsec_set_state()
|
| /drivers/crypto/chelsio/ |
| A D | chcr_algo.c | 4060 .alg.aead = { 4079 .alg.aead = { 4099 .alg.aead = { 4118 .alg.aead = { 4137 .alg.aead = { 4158 .alg.aead = { 4180 .alg.aead = { 4200 .alg.aead = { 4221 .alg.aead = { 4242 .alg.aead = { [all …]
|
| /drivers/net/ethernet/chelsio/inline_crypto/ch_ipsec/ |
| A D | chcr_ipsec.c | 146 int authsize = x->aead->alg_icv_len / 8; in ch_ipsec_setauthsize() 169 int keylen = (x->aead->alg_key_len + 7) / 8; in ch_ipsec_setkey() 170 unsigned char *key = x->aead->alg_key; in ch_ipsec_setkey() 262 if (!x->aead) { in ch_ipsec_xfrm_add_state() 266 if (x->aead->alg_icv_len != 128 && in ch_ipsec_xfrm_add_state() 267 x->aead->alg_icv_len != 96) { in ch_ipsec_xfrm_add_state() 271 if ((x->aead->alg_key_len != 128 + 32) && in ch_ipsec_xfrm_add_state() 272 (x->aead->alg_key_len != 256 + 32)) { in ch_ipsec_xfrm_add_state()
|
| /drivers/net/ethernet/marvell/octeontx2/nic/ |
| A D | cn10k_ipsec.c | 523 int key_len = (x->aead->alg_key_len + 7) / 8; in cn10k_outb_prepare_sa() 525 u8 *key = x->aead->alg_key; in cn10k_outb_prepare_sa() 623 if (!x->aead) { in cn10k_ipsec_validate_state() 629 if (x->aead->alg_icv_len != 128) { in cn10k_ipsec_validate_state() 634 if (x->aead->alg_key_len != 128 + 32 && in cn10k_ipsec_validate_state() 635 x->aead->alg_key_len != 192 + 32 && in cn10k_ipsec_validate_state() 636 x->aead->alg_key_len != 256 + 32) { in cn10k_ipsec_validate_state() 1001 inst.dlen = dlen + ETH_HLEN - (x->aead->alg_icv_len / 8); in cn10k_ipsec_transmit()
|
| /drivers/crypto/intel/keembay/ |
| A D | keembay-ocs-aes-core.c | 54 struct crypto_aead *aead; member 216 crypto_aead_clear_flags(tctx->sw_cipher.aead, CRYPTO_TFM_REQ_MASK); in kmb_ocs_aead_set_key() 217 crypto_aead_set_flags(tctx->sw_cipher.aead, in kmb_ocs_aead_set_key() 220 return crypto_aead_setkey(tctx->sw_cipher.aead, in_key, key_len); in kmb_ocs_aead_set_key() 648 aead_request_set_tfm(subreq, tctx->sw_cipher.aead); in kmb_ocs_aead_common() 654 rc = crypto_aead_setauthsize(tctx->sw_cipher.aead, in kmb_ocs_aead_common() 1206 tctx->sw_cipher.aead = blk; in ocs_aes_aead_cra_init() 1211 crypto_aead_reqsize(tctx->sw_cipher.aead)))); in ocs_aes_aead_cra_init() 1252 if (tctx->sw_cipher.aead) { in ocs_aead_cra_exit() 1253 crypto_free_aead(tctx->sw_cipher.aead); in ocs_aead_cra_exit() [all …]
|