/linux-6.3-rc2/include/crypto/ |
A D | gcm.h | 16 static inline int crypto_gcm_check_authsize(unsigned int authsize) in crypto_gcm_check_authsize() argument 18 switch (authsize) { in crypto_gcm_check_authsize() 37 static inline int crypto_rfc4106_check_authsize(unsigned int authsize) in crypto_rfc4106_check_authsize() argument 39 switch (authsize) { in crypto_rfc4106_check_authsize() 70 unsigned int authsize; member 74 unsigned int keysize, unsigned int authsize);
|
A D | aead.h | 141 int (*setauthsize)(struct crypto_aead *tfm, unsigned int authsize); 155 unsigned int authsize; member 242 return tfm->authsize; in crypto_aead_authsize() 319 int crypto_aead_setauthsize(struct crypto_aead *tfm, unsigned int authsize);
|
/linux-6.3-rc2/drivers/crypto/nx/ |
A D | nx-aes-ccm.c | 70 unsigned int authsize) in ccm_aes_nx_setauthsize() argument 72 switch (authsize) { in ccm_aes_nx_setauthsize() 89 unsigned int authsize) in ccm4309_aes_nx_setauthsize() argument 91 switch (authsize) { in ccm4309_aes_nx_setauthsize() 136 unsigned int l, lp, m = authsize; in generate_b0() 156 unsigned int authsize, in generate_pat() argument 208 rc = generate_b0(iv, assoclen, authsize, nbytes, b0); in generate_pat() 341 nbytes -= authsize; in ccm_nx_decrypt() 345 req->src, nbytes + req->assoclen, authsize, in ccm_nx_decrypt() 398 authsize) ? -EBADMSG : 0; in ccm_nx_decrypt() [all …]
|
/linux-6.3-rc2/arch/x86/crypto/ |
A D | aegis128-aesni-glue.c | 156 unsigned int authsize) in crypto_aegis128_aesni_setauthsize() argument 158 if (authsize > AEGIS128_MAX_AUTH_SIZE) in crypto_aegis128_aesni_setauthsize() 160 if (authsize < AEGIS128_MIN_AUTH_SIZE) in crypto_aegis128_aesni_setauthsize() 197 unsigned int authsize = crypto_aead_authsize(tfm); in crypto_aegis128_aesni_encrypt() local 203 req->assoclen + cryptlen, authsize, 1); in crypto_aegis128_aesni_encrypt() 219 unsigned int authsize = crypto_aead_authsize(tfm); in crypto_aegis128_aesni_decrypt() local 220 unsigned int cryptlen = req->cryptlen - authsize; in crypto_aegis128_aesni_decrypt() 223 req->assoclen + cryptlen, authsize, 0); in crypto_aegis128_aesni_decrypt() 227 return crypto_memneq(tag.bytes, zeros.bytes, authsize) ? -EBADMSG : 0; in crypto_aegis128_aesni_decrypt()
|
/linux-6.3-rc2/crypto/ |
A D | authencesn.c | 50 unsigned int authsize) in crypto_authenc_esn_setauthsize() argument 52 if (authsize > 0 && authsize < 4) in crypto_authenc_esn_setauthsize() 95 unsigned int authsize = crypto_aead_authsize(authenc_esn); in crypto_authenc_esn_genicv_tail() local 128 unsigned int authsize = crypto_aead_authsize(authenc_esn); in crypto_authenc_esn_genicv() local 134 if (!authsize) in crypto_authenc_esn_genicv() 229 unsigned int cryptlen = req->cryptlen - authsize; in crypto_authenc_esn_decrypt_tail() 235 if (!authsize) in crypto_authenc_esn_decrypt_tail() 243 if (crypto_memneq(ihash, ohash, authsize)) in crypto_authenc_esn_decrypt_tail() 284 cryptlen -= authsize; in crypto_authenc_esn_decrypt() 293 authsize, 0); in crypto_authenc_esn_decrypt() [all …]
|
A D | aegis128-core.c | 379 unsigned int authsize) in crypto_aegis128_setauthsize() argument 381 if (authsize > AEGIS128_MAX_AUTH_SIZE) in crypto_aegis128_setauthsize() 383 if (authsize < AEGIS128_MIN_AUTH_SIZE) in crypto_aegis128_setauthsize() 392 unsigned int authsize = crypto_aead_authsize(tfm); in crypto_aegis128_encrypt_generic() local 406 authsize, 1); in crypto_aegis128_encrypt_generic() 416 unsigned int cryptlen = req->cryptlen - authsize; in crypto_aegis128_decrypt_generic() 422 authsize, 0); in crypto_aegis128_decrypt_generic() 470 authsize, 1); in crypto_aegis128_encrypt_simd() 479 unsigned int cryptlen = req->cryptlen - authsize; in crypto_aegis128_decrypt_simd() 488 authsize, 0); in crypto_aegis128_decrypt_simd() [all …]
|
A D | aead.c | 64 int crypto_aead_setauthsize(struct crypto_aead *tfm, unsigned int authsize) in crypto_aead_setauthsize() argument 68 if ((!authsize && crypto_aead_maxauthsize(tfm)) || in crypto_aead_setauthsize() 69 authsize > crypto_aead_maxauthsize(tfm)) in crypto_aead_setauthsize() 73 err = crypto_aead_alg(tfm)->setauthsize(tfm, authsize); in crypto_aead_setauthsize() 78 tfm->authsize = authsize; in crypto_aead_setauthsize() 134 aead->authsize = alg->maxauthsize; in crypto_aead_init_tfm()
|
A D | aegis128-neon.c | 20 unsigned int authsize); 69 unsigned int authsize) in crypto_aegis128_final_simd() argument 75 authsize); in crypto_aegis128_final_simd()
|
A D | gcm.c | 147 unsigned int authsize) in crypto_gcm_setauthsize() argument 149 return crypto_gcm_check_authsize(authsize); in crypto_gcm_setauthsize() 470 unsigned int cryptlen = req->cryptlen - authsize; in crypto_gcm_verify() 474 req->assoclen + cryptlen, authsize, 0); in crypto_gcm_verify() 508 cryptlen -= authsize; in crypto_gcm_decrypt() 708 unsigned int authsize) in crypto_rfc4106_setauthsize() argument 713 err = crypto_rfc4106_check_authsize(authsize); in crypto_rfc4106_setauthsize() 916 unsigned int authsize) in crypto_rfc4543_setauthsize() argument 920 if (authsize != 16) in crypto_rfc4543_setauthsize() 950 enc ? 0 : authsize, iv); in crypto_rfc4543_crypt() [all …]
|
A D | ccm.c | 109 unsigned int authsize) in crypto_ccm_setauthsize() argument 111 switch (authsize) { in crypto_ccm_setauthsize() 328 unsigned int authsize = crypto_aead_authsize(aead); in crypto_ccm_decrypt_done() local 329 unsigned int cryptlen = req->cryptlen - authsize; in crypto_ccm_decrypt_done() 351 unsigned int authsize = crypto_aead_authsize(aead); in crypto_ccm_decrypt() local 358 cryptlen -= authsize; in crypto_ccm_decrypt() 365 authsize, 0); in crypto_ccm_decrypt() 386 if (crypto_memneq(authtag, odata, authsize)) in crypto_ccm_decrypt() 587 unsigned int authsize) in crypto_rfc4309_setauthsize() argument 591 switch (authsize) { in crypto_rfc4309_setauthsize() [all …]
|
A D | authenc.c | 239 unsigned int authsize = crypto_aead_authsize(authenc); in crypto_authenc_decrypt_tail() local 240 u8 *ihash = ahreq->result + authsize; in crypto_authenc_decrypt_tail() 243 scatterwalk_map_and_copy(ihash, req->src, ahreq->nbytes, authsize, 0); in crypto_authenc_decrypt_tail() 245 if (crypto_memneq(ihash, ahreq->result, authsize)) in crypto_authenc_decrypt_tail() 258 req->cryptlen - authsize, req->iv); in crypto_authenc_decrypt_tail() 279 unsigned int authsize = crypto_aead_authsize(authenc); in crypto_authenc_decrypt() local 294 req->assoclen + req->cryptlen - authsize); in crypto_authenc_decrypt()
|
/linux-6.3-rc2/drivers/crypto/cavium/nitrox/ |
A D | nitrox_aead.c | 59 unsigned int authsize) in nitrox_aead_setauthsize() argument 66 flags.w0.mac_len = authsize; in nitrox_aead_setauthsize() 69 aead->authsize = authsize; in nitrox_aead_setauthsize() 75 unsigned int authsize) in nitrox_aes_gcm_setauthsize() argument 77 switch (authsize) { in nitrox_aes_gcm_setauthsize() 90 return nitrox_aead_setauthsize(aead, authsize); in nitrox_aes_gcm_setauthsize() 230 rctx->dstlen = rctx->srclen + aead->authsize; in nitrox_aes_gcm_enc() 264 rctx->dstlen = rctx->srclen - aead->authsize; in nitrox_aes_gcm_dec() 379 unsigned int authsize) in nitrox_rfc4106_setauthsize() argument 381 switch (authsize) { in nitrox_rfc4106_setauthsize() [all …]
|
/linux-6.3-rc2/arch/arm64/crypto/ |
A D | sm4-ce-ccm-glue.c | 46 static int ccm_setauthsize(struct crypto_aead *tfm, unsigned int authsize) in ccm_setauthsize() argument 48 if ((authsize & 1) || authsize < 4) in ccm_setauthsize() 243 unsigned int authsize = crypto_aead_authsize(aead); in ccm_decrypt() local 250 err = ccm_format_input(mac, req, req->cryptlen - authsize); in ccm_decrypt() 264 req->assoclen + req->cryptlen - authsize, in ccm_decrypt() 265 authsize, 0); in ccm_decrypt() 267 if (crypto_memneq(authtag, mac, authsize)) in ccm_decrypt()
|
A D | aes-ce-ccm-glue.c | 52 static int ccm_setauthsize(struct crypto_aead *tfm, unsigned int authsize) in ccm_setauthsize() argument 54 if ((authsize & 1) || authsize < 4) in ccm_setauthsize() 203 unsigned int authsize = crypto_aead_authsize(aead); in ccm_decrypt() local 207 u32 len = req->cryptlen - authsize; in ccm_decrypt() 251 req->assoclen + req->cryptlen - authsize, in ccm_decrypt() 252 authsize, 0); in ccm_decrypt() 254 if (crypto_memneq(mac, buf, authsize)) in ccm_decrypt()
|
A D | sm4-ce-gcm-glue.c | 61 static int gcm_setauthsize(struct crypto_aead *tfm, unsigned int authsize) in gcm_setauthsize() argument 63 switch (authsize) { in gcm_setauthsize() 220 unsigned int authsize = crypto_aead_authsize(aead); in gcm_decrypt() local 233 req->assoclen + req->cryptlen - authsize, in gcm_decrypt() 234 authsize, 0); in gcm_decrypt() 236 if (crypto_memneq(authtag, ghash, authsize)) in gcm_decrypt()
|
A D | ghash-ce-glue.c | 64 const u8 tag[], u64 authsize); 264 static int gcm_aes_setauthsize(struct crypto_aead *tfm, unsigned int authsize) in gcm_aes_setauthsize() argument 266 return crypto_gcm_check_authsize(authsize); in gcm_aes_setauthsize() 402 unsigned int authsize = crypto_aead_authsize(aead); in gcm_decrypt() local 414 lengths.b = cpu_to_be64((req->cryptlen - authsize) * 8); in gcm_decrypt() 422 req->assoclen + req->cryptlen - authsize, in gcm_decrypt() 423 authsize, 0); in gcm_decrypt() 445 nrounds, tag, otag, authsize); in gcm_decrypt() 495 static int rfc4106_setauthsize(struct crypto_aead *tfm, unsigned int authsize) in rfc4106_setauthsize() argument 497 return crypto_rfc4106_check_authsize(authsize); in rfc4106_setauthsize()
|
/linux-6.3-rc2/drivers/crypto/qce/ |
A D | aead.c | 74 totallen, ctx->authsize, 1); in qce_aead_done() 77 totallen, ctx->authsize, 1); in qce_aead_done() 80 totallen = req->cryptlen + req->assoclen - ctx->authsize; in qce_aead_done() 82 ret = memcmp(result_buf->auth_iv, tag, ctx->authsize); in qce_aead_done() 198 cryptlen = rctx->cryptlen + ctx->authsize; in qce_aead_ccm_prepare_buf_assoclen() 344 cryptlen = rctx->cryptlen + ctx->authsize; in qce_aead_ccm_prepare_buf() 399 rctx->ccm_nonce[0] |= ((ctx->authsize - 2) / 2) << in qce_aead_create_ccm_nonce() 516 rctx->cryptlen = req->cryptlen - ctx->authsize; in qce_aead_crypt() 657 if (authsize < 4 || authsize > 16 || authsize % 2) in qce_aead_setauthsize() 659 if (IS_CCM_RFC4309(flags) && (authsize < 8 || authsize % 4)) in qce_aead_setauthsize() [all …]
|
/linux-6.3-rc2/drivers/crypto/caam/ |
A D | caamalg.c | 124 unsigned int authsize; member 204 if (!ctx->authsize) in aead_set_sh_desc() 323 ctx->authsize = authsize; in aead_setauthsize() 388 ctx->authsize = authsize; in gcm_setauthsize() 456 ctx->authsize = authsize; in rfc4106_setauthsize() 519 if (authsize != 16) in rfc4543_setauthsize() 522 ctx->authsize = authsize; in rfc4543_setauthsize() 561 ctx->authsize = authsize; in chachapoly_setauthsize() 1073 int authsize = ctx->authsize; in init_aead_job() local 1314 unsigned int authsize = ctx->authsize; in aead_edesc_alloc() local [all …]
|
A D | caamalg_qi.c | 73 unsigned int authsize; member 194 ctx->authsize = authsize; in aead_setauthsize() 357 ctx->authsize = authsize; in gcm_setauthsize() 432 ctx->authsize, true); in rfc4106_set_sh_desc() 446 ctx->authsize, true); in rfc4106_set_sh_desc() 461 ctx->authsize = authsize; in rfc4106_setauthsize() 564 if (authsize != 16) in rfc4543_setauthsize() 567 ctx->authsize = authsize; in rfc4543_setauthsize() 956 unsigned int authsize = ctx->authsize; in aead_edesc_alloc() local 994 dst_len = src_len + (encrypt ? authsize : (-authsize)); in aead_edesc_alloc() [all …]
|
/linux-6.3-rc2/drivers/crypto/ |
A D | omap-aes-gcm.c | 68 dd->authsize, 1); in omap_aes_gcm_done_task() 78 for (i = 0; i < dd->authsize; i++) { in omap_aes_gcm_done_task() 148 dd->authsize = authlen; in omap_aes_gcm_copy_buffers() 192 dd->authsize, 0); in omap_aes_gcm_dma_out_callback() 348 int omap_aes_gcm_setauthsize(struct crypto_aead *tfm, unsigned int authsize) in omap_aes_gcm_setauthsize() argument 350 return crypto_gcm_check_authsize(authsize); in omap_aes_gcm_setauthsize() 354 unsigned int authsize) in omap_aes_4106gcm_setauthsize() argument 356 return crypto_rfc4106_check_authsize(authsize); in omap_aes_4106gcm_setauthsize()
|
A D | ixp4xx_crypto.c | 354 int authsize = crypto_aead_authsize(tfm); in finish_scattered_hmac() local 359 decryptlen, authsize, 1); in finish_scattered_hmac() 1115 cryptlen = req->cryptlen - authsize; in aead_perform() 1116 eff_cryptlen -= authsize; in aead_perform() 1143 if (lastlen >= authsize) in aead_perform() 1145 buf->buf_len - authsize; in aead_perform() 1165 if (lastlen >= authsize) in aead_perform() 1167 buf->buf_len - authsize; in aead_perform() 1171 if (unlikely(lastlen < authsize)) { in aead_perform() 1236 if ((authsize >> 2) < 1 || (authsize >> 2) > max || (authsize & 3)) in aead_setauthsize() [all …]
|
/linux-6.3-rc2/drivers/crypto/ccree/ |
A D | cc_aead.c | 229 ctx->authsize) != 0) { in cc_aead_complete() 670 unsigned int authsize) in cc_aead_setauthsize() argument 676 if (authsize == 0 || in cc_aead_setauthsize() 681 ctx->authsize = authsize; in cc_aead_setauthsize() 690 switch (authsize) { in cc_rfc4309_ccm_setauthsize() 703 unsigned int authsize) in cc_ccm_setauthsize() argument 705 switch (authsize) { in cc_ccm_setauthsize() 1521 ctx->authsize, NS_BIT); in cc_ccm() 2144 switch (authsize) { in cc_gcm_setauthsize() 2168 switch (authsize) { in cc_rfc4106_gcm_setauthsize() [all …]
|
A D | cc_buffer_mgr.c | 722 (*src_last_bytes - authsize); in cc_prepare_aead_data_mlli() 724 (*src_last_bytes - authsize); in cc_prepare_aead_data_mlli() 754 (*src_last_bytes - authsize); in cc_prepare_aead_data_mlli() 756 (*src_last_bytes - authsize); in cc_prepare_aead_data_mlli() 778 (*dst_last_bytes - authsize); in cc_prepare_aead_data_mlli() 780 (*dst_last_bytes - authsize); in cc_prepare_aead_data_mlli() 816 authsize : 0; in cc_aead_chain_data() 844 size_for_map += authsize; in cc_aead_chain_data() 846 size_for_map -= authsize; in cc_aead_chain_data() 975 (req->cryptlen - authsize); in cc_map_aead_request() [all …]
|
/linux-6.3-rc2/lib/crypto/ |
A D | aesgcm.c | 47 unsigned int keysize, unsigned int authsize) in aesgcm_expandkey() argument 52 ret = crypto_gcm_check_authsize(authsize) ?: in aesgcm_expandkey() 57 ctx->authsize = authsize; in aesgcm_expandkey() 89 crypto_xor_cpy(authtag, buf, (u8 *)&ghash, ctx->authsize); in aesgcm_mac() 176 if (crypto_memneq(authtag, tagbuf, ctx->authsize)) { in aesgcm_decrypt()
|
/linux-6.3-rc2/drivers/crypto/xilinx/ |
A D | zynqmp-aes-gcm.c | 68 u32 authsize; member 183 if (tfm_ctx->authsize != ZYNQMP_AES_AUTH_SIZE) in zynqmp_fallback_check() 271 unsigned int authsize) in zynqmp_aes_aead_setauthsize() argument 277 tfm_ctx->authsize = authsize; in zynqmp_aes_aead_setauthsize() 278 return crypto_aead_setauthsize(tfm_ctx->fbk_cipher, authsize); in zynqmp_aes_aead_setauthsize()
|