/linux-6.3-rc2/drivers/crypto/rockchip/ |
A D | rk3288_crypto.c | 315 if (!crypto_info) { in rk_crypto_probe() 320 crypto_info->dev = &pdev->dev; in rk_crypto_probe() 324 if (!crypto_info->variant) { in rk_crypto_probe() 330 if (IS_ERR(crypto_info->rst)) { in rk_crypto_probe() 331 err = PTR_ERR(crypto_info->rst); in rk_crypto_probe() 340 if (IS_ERR(crypto_info->reg)) { in rk_crypto_probe() 341 err = PTR_ERR(crypto_info->reg); in rk_crypto_probe() 350 if (crypto_info->irq < 0) { in rk_crypto_probe() 351 err = crypto_info->irq; in rk_crypto_probe() 385 register_debugfs(crypto_info); in rk_crypto_probe() [all …]
|
/linux-6.3-rc2/drivers/net/ethernet/mellanox/mlx5/core/en_accel/ |
A D | ktls_txrx.c | 24 union mlx5e_crypto_info *crypto_info, in fill_static_params() argument 35 switch (crypto_info->crypto_info.cipher_type) { in fill_static_params() 38 &crypto_info->crypto_info_128; in fill_static_params() 45 &crypto_info->crypto_info_256; in fill_static_params() 52 crypto_info->crypto_info.cipher_type); in fill_static_params() 76 union mlx5e_crypto_info *crypto_info, in mlx5e_ktls_build_static_params() argument 97 fill_static_params(&wqe->params, crypto_info, key_id, resync_tcp_sn); in mlx5e_ktls_build_static_params()
|
A D | ktls.c | 13 struct tls_crypto_info *crypto_info) in mlx5_ktls_create_key() argument 18 switch (crypto_info->cipher_type) { in mlx5_ktls_create_key() 21 (struct tls12_crypto_info_aes_gcm_128 *)crypto_info; in mlx5_ktls_create_key() 29 (struct tls12_crypto_info_aes_gcm_256 *)crypto_info; in mlx5_ktls_create_key() 50 struct tls_crypto_info *crypto_info, in mlx5e_ktls_add() argument 57 if (!mlx5e_ktls_type_check(mdev, crypto_info)) in mlx5e_ktls_add() 61 err = mlx5e_ktls_add_tx(netdev, sk, crypto_info, start_offload_tcp_sn); in mlx5e_ktls_add() 63 err = mlx5e_ktls_add_rx(netdev, sk, crypto_info, start_offload_tcp_sn); in mlx5e_ktls_add()
|
A D | ktls.h | 16 struct tls_crypto_info *crypto_info); 36 struct tls_crypto_info *crypto_info) in mlx5e_ktls_type_check() argument 38 switch (crypto_info->cipher_type) { in mlx5e_ktls_type_check() 40 if (crypto_info->version == TLS_1_2_VERSION) in mlx5e_ktls_type_check() 44 if (crypto_info->version == TLS_1_2_VERSION) in mlx5e_ktls_type_check()
|
A D | ktls_utils.h | 23 struct tls_crypto_info *crypto_info, u32 start_offload_tcp_sn); 26 struct tls_crypto_info *crypto_info, u32 start_offload_tcp_sn); 31 struct tls_crypto_info crypto_info; member 81 union mlx5e_crypto_info *crypto_info,
|
A D | ktls_rx.c | 46 union mlx5e_crypto_info crypto_info; member 376 switch (priv_rx->crypto_info.crypto_info.cipher_type) { in resync_handle_seq_match() 379 &priv_rx->crypto_info.crypto_info_128; in resync_handle_seq_match() 387 &priv_rx->crypto_info.crypto_info_256; in resync_handle_seq_match() 395 priv_rx->crypto_info.crypto_info.cipher_type); in resync_handle_seq_match() 608 struct tls_crypto_info *crypto_info, in mlx5e_ktls_add_rx() argument 633 switch (crypto_info->cipher_type) { in mlx5e_ktls_add_rx() 635 priv_rx->crypto_info.crypto_info_128 = in mlx5e_ktls_add_rx() 636 *(struct tls12_crypto_info_aes_gcm_128 *)crypto_info; in mlx5e_ktls_add_rx() 639 priv_rx->crypto_info.crypto_info_256 = in mlx5e_ktls_add_rx() [all …]
|
A D | ktls_tx.c | 97 union mlx5e_crypto_info crypto_info; member 455 struct tls_crypto_info *crypto_info, u32 start_offload_tcp_sn) in mlx5e_ktls_add_tx() argument 472 dek = mlx5_ktls_create_key(priv->tls->dek_pool, crypto_info); in mlx5e_ktls_add_tx() 480 switch (crypto_info->cipher_type) { in mlx5e_ktls_add_tx() 482 priv_tx->crypto_info.crypto_info_128 = in mlx5e_ktls_add_tx() 483 *(struct tls12_crypto_info_aes_gcm_128 *)crypto_info; in mlx5e_ktls_add_tx() 486 priv_tx->crypto_info.crypto_info_256 = in mlx5e_ktls_add_tx() 487 *(struct tls12_crypto_info_aes_gcm_256 *)crypto_info; in mlx5e_ktls_add_tx() 491 crypto_info->cipher_type); in mlx5e_ktls_add_tx() 684 switch (priv_tx->crypto_info.crypto_info.cipher_type) { in tx_post_resync_params() [all …]
|
/linux-6.3-rc2/net/tls/ |
A D | tls_main.c | 391 if (copy_to_user(optval, crypto_info, sizeof(*crypto_info))) in do_tls_getsockopt_conf() 400 container_of(crypto_info, in do_tls_getsockopt_conf() 422 container_of(crypto_info, in do_tls_getsockopt_conf() 443 container_of(crypto_info, in do_tls_getsockopt_conf() 461 container_of(crypto_info, in do_tls_getsockopt_conf() 481 container_of(crypto_info, in do_tls_getsockopt_conf() 499 container_of(crypto_info, in do_tls_getsockopt_conf() 518 container_of(crypto_info, in do_tls_getsockopt_conf() 540 container_of(crypto_info, in do_tls_getsockopt_conf() 681 rc = copy_from_sockptr(crypto_info, optval, sizeof(*crypto_info)); in do_tls_setsockopt_conf() [all …]
|
A D | tls_device.c | 1081 struct tls_crypto_info *crypto_info; in tls_set_device_offload() local 1105 crypto_info = &ctx->crypto_send.info; in tls_set_device_offload() 1106 if (crypto_info->version != TLS_1_2_VERSION) { in tls_set_device_offload() 1111 switch (crypto_info->cipher_type) { in tls_set_device_offload() 1113 iv = ((struct tls12_crypto_info_aes_gcm_128 *)crypto_info)->iv; in tls_set_device_offload() 1115 ((struct tls12_crypto_info_aes_gcm_128 *)crypto_info)->rec_seq; in tls_set_device_offload() 1118 iv = ((struct tls12_crypto_info_aes_gcm_256 *)crypto_info)->iv; in tls_set_device_offload() 1126 cipher_sz = &tls_cipher_size_desc[crypto_info->cipher_type]; in tls_set_device_offload() 1134 prot->version = crypto_info->version; in tls_set_device_offload() 1135 prot->cipher_type = crypto_info->cipher_type; in tls_set_device_offload() [all …]
|
A D | tls_device_fallback.c | 472 struct tls_crypto_info *crypto_info) in tls_sw_fallback_init() argument 487 switch (crypto_info->cipher_type) { in tls_sw_fallback_init() 489 key = ((struct tls12_crypto_info_aes_gcm_128 *)crypto_info)->key; in tls_sw_fallback_init() 492 key = ((struct tls12_crypto_info_aes_gcm_256 *)crypto_info)->key; in tls_sw_fallback_init() 498 cipher_sz = &tls_cipher_size_desc[crypto_info->cipher_type]; in tls_sw_fallback_init()
|
A D | tls_sw.c | 2500 struct tls_crypto_info *crypto_info; in tls_set_sw_offload() local 2545 crypto_info = &ctx->crypto_send.info; in tls_set_sw_offload() 2555 crypto_info = &ctx->crypto_recv.info; in tls_set_sw_offload() 2562 switch (crypto_info->cipher_type) { in tls_set_sw_offload() 2566 gcm_128_info = (void *)crypto_info; in tls_set_sw_offload() 2583 gcm_256_info = (void *)crypto_info; in tls_set_sw_offload() 2600 ccm_128_info = (void *)crypto_info; in tls_set_sw_offload() 2634 sm4_gcm_info = (void *)crypto_info; in tls_set_sw_offload() 2651 sm4_ccm_info = (void *)crypto_info; in tls_set_sw_offload() 2685 gcm_256_info = (void *)crypto_info; in tls_set_sw_offload() [all …]
|
A D | tls.h | 131 struct tls_crypto_info *crypto_info);
|
/linux-6.3-rc2/drivers/net/ethernet/chelsio/inline_crypto/chtls/ |
A D | chtls_main.c | 470 struct tls_crypto_info crypto_info = { 0 }; in do_chtls_getsockopt() local 472 crypto_info.version = TLS_1_2_VERSION; in do_chtls_getsockopt() 518 crypto_info = (struct tls_crypto_info *)&csk->tlshws.crypto_info; in do_chtls_setsockopt() 526 crypto_info[0] = tmp_crypto_info; in do_chtls_setsockopt() 529 sizeof(*crypto_info), in do_chtls_setsockopt() 530 optval, sizeof(*crypto_info), in do_chtls_setsockopt() 532 - sizeof(*crypto_info)); in do_chtls_setsockopt() 544 crypto_info[0] = tmp_crypto_info; in do_chtls_setsockopt() 546 sizeof(*crypto_info), in do_chtls_setsockopt() 547 optval, sizeof(*crypto_info), in do_chtls_setsockopt() [all …]
|
A D | chtls_hw.c | 272 &csk->tlshws.crypto_info; in chtls_key_info() 285 &csk->tlshws.crypto_info; in chtls_key_info()
|
A D | chtls.h | 275 } crypto_info; member
|
/linux-6.3-rc2/drivers/net/ethernet/fungible/funeth/ |
A D | funeth_ktls.c | 20 struct tls_crypto_info *crypto_info, in fun_ktls_add() argument 38 if (crypto_info->version == TLS_1_2_VERSION) in fun_ktls_add() 43 switch (crypto_info->cipher_type) { in fun_ktls_add() 45 struct tls12_crypto_info_aes_gcm_128 *c = (void *)crypto_info; in fun_ktls_add()
|
/linux-6.3-rc2/Documentation/networking/ |
A D | tls.rst | 49 struct tls12_crypto_info_aes_gcm_128 crypto_info; 51 crypto_info.info.version = TLS_1_2_VERSION; 52 crypto_info.info.cipher_type = TLS_CIPHER_AES_GCM_128; 53 memcpy(crypto_info.iv, iv_write, TLS_CIPHER_AES_GCM_128_IV_SIZE); 54 memcpy(crypto_info.rec_seq, seq_number_write, 56 memcpy(crypto_info.key, cipher_key_write, TLS_CIPHER_AES_GCM_128_KEY_SIZE); 57 memcpy(crypto_info.salt, implicit_iv_write, TLS_CIPHER_AES_GCM_128_SALT_SIZE); 59 setsockopt(sock, SOL_TLS, TLS_TX, &crypto_info, sizeof(crypto_info));
|
A D | tls-offload.rst | 93 struct tls_crypto_info *crypto_info, 99 Cryptographic information in ``crypto_info`` includes the key, iv, salt 102 sequence number from ``crypto_info``. The driver can add its state
|
/linux-6.3-rc2/drivers/net/ethernet/netronome/nfp/crypto/ |
A D | tls.c | 266 struct tls_crypto_info *crypto_info, in nfp_net_tls_add() argument 286 if (!nfp_net_cipher_supported(nn, crypto_info->cipher_type, direction)) in nfp_net_tls_add() 337 tls_ci = (struct tls12_crypto_info_aes_gcm_128 *)crypto_info; in nfp_net_tls_add()
|
/linux-6.3-rc2/drivers/net/ethernet/chelsio/inline_crypto/ch_ktls/ |
A D | chcr_ktls.c | 71 struct tls_crypto_info *crypto_info, in chcr_ktls_save_keys() argument 81 switch (crypto_info->cipher_type) { in chcr_ktls_save_keys() 84 (struct tls12_crypto_info_aes_gcm_128 *)crypto_info; in chcr_ktls_save_keys() 129 crypto_info->cipher_type); in chcr_ktls_save_keys() 415 struct tls_crypto_info *crypto_info, in chcr_ktls_dev_add() argument 476 ret = chcr_ktls_save_keys(tx_info, crypto_info, direction); in chcr_ktls_dev_add()
|
/linux-6.3-rc2/include/net/ |
A D | tls.h | 289 struct tls_crypto_info *crypto_info,
|
/linux-6.3-rc2/drivers/net/ethernet/chelsio/cxgb4/ |
A D | cxgb4_main.c | 6439 struct tls_crypto_info *crypto_info, in cxgb4_ktls_dev_add() argument 6456 crypto_info, in cxgb4_ktls_dev_add()
|