/linux-6.3-rc2/drivers/md/ |
A D | dm-crypt.c | 174 unsigned int iv_size; member 317 memset(iv, 0, cc->iv_size); in crypt_iv_plain_gen() 326 memset(iv, 0, cc->iv_size); in crypt_iv_plain64_gen() 335 memset(iv, 0, cc->iv_size); in crypt_iv_plain64be_gen() 349 memset(iv, 0, cc->iv_size); in crypt_iv_essiv_gen() 693 if (cc->iv_size > 8) in crypt_iv_tcw_gen() 695 cc->iv_size - 8); in crypt_iv_tcw_gen() 1258 u8 *ptr = iv_of_dmreq(cc, dmreq) + cc->iv_size + cc->iv_size; in org_sector_of_dmreq() 2752 if (cc->iv_size) in crypt_ctr_ivmode() 2754 cc->iv_size = max(cc->iv_size, in crypt_ctr_ivmode() [all …]
|
/linux-6.3-rc2/drivers/crypto/keembay/ |
A D | keembay-ocs-aes-core.c | 259 int iv_size = crypto_skcipher_ivsize(tfm); in kmb_ocs_sk_validate_input() local 406 int iv_size = crypto_skcipher_ivsize(tfm); in kmb_ocs_sk_prepare_inplace() local 418 req->cryptlen - iv_size, iv_size, 0); in kmb_ocs_sk_prepare_inplace() 554 req->cryptlen, req->iv, iv_size); in kmb_ocs_sk_run() 574 req->cryptlen - iv_size, in kmb_ocs_sk_run() 575 iv_size, 0); in kmb_ocs_sk_run() 583 req->cryptlen - iv_size, in kmb_ocs_sk_run() 584 iv_size, 0); in kmb_ocs_sk_run() 603 int iv_size = crypto_aead_ivsize(tfm); in kmb_ocs_aead_validate_input() local 615 if (iv_size != GCM_AES_IV_SIZE) in kmb_ocs_aead_validate_input() [all …]
|
A D | ocs-aes.c | 601 const u8 *iv, u32 iv_size, in ocs_aes_validate_inputs() argument 664 if (!iv || iv_size != AES_BLOCK_SIZE) in ocs_aes_validate_inputs() 680 if (!iv || iv_size != AES_BLOCK_SIZE) in ocs_aes_validate_inputs() 696 if (!iv || iv_size != AES_BLOCK_SIZE) in ocs_aes_validate_inputs() 703 if (!iv || iv_size != GCM_AES_IV_SIZE) in ocs_aes_validate_inputs() 730 if (!iv || iv_size != AES_BLOCK_SIZE) in ocs_aes_validate_inputs() 804 u32 iv_size) in ocs_aes_op() argument 809 rc = ocs_aes_validate_inputs(src_dma_list, src_size, iv, iv_size, 0, 0, in ocs_aes_op()
|
A D | ocs-aes.h | 78 u32 iv_size);
|
/linux-6.3-rc2/net/tls/ |
A D | tls.h | 260 prot->iv_size); in tls_advance_record_sn() 280 size_t pkt_len, iv_size = prot->iv_size; in tls_fill_prepend() local 285 pkt_len += iv_size; in tls_fill_prepend() 288 ctx->tx.iv + prot->salt_size, iv_size); in tls_fill_prepend()
|
A D | tls_sw.c | 521 prot->iv_size + prot->salt_size); in tls_do_encryption() 1538 prot->iv_size + prot->salt_size); in tls_decrypt_sg() 1542 prot->iv_size); in tls_decrypt_sg() 2265 cipher_overhead += prot->iv_size; in tls_rx_msg_size() 2569 iv_size = TLS_CIPHER_AES_GCM_128_IV_SIZE; in tls_set_sw_offload() 2586 iv_size = TLS_CIPHER_AES_GCM_256_IV_SIZE; in tls_set_sw_offload() 2603 iv_size = TLS_CIPHER_AES_CCM_128_IV_SIZE; in tls_set_sw_offload() 2637 iv_size = TLS_CIPHER_SM4_GCM_IV_SIZE; in tls_set_sw_offload() 2654 iv_size = TLS_CIPHER_SM4_CCM_IV_SIZE; in tls_set_sw_offload() 2727 prot->iv_size = iv_size; in tls_set_sw_offload() [all …]
|
A D | tls_device.c | 1139 prot->iv_size = cipher_sz->iv; in tls_set_device_offload()
|
/linux-6.3-rc2/drivers/s390/cio/ |
A D | airq.c | 116 static inline unsigned long iv_size(unsigned long bits) in iv_size() function 140 size = iv_size(bits); in airq_iv_create() 212 cio_dma_free(iv->vector, iv_size(iv->bits)); in airq_iv_release()
|
/linux-6.3-rc2/drivers/gpu/drm/amd/amdgpu/ |
A D | amdgpu_ih.c | 286 uint32_t iv_size = 32; in amdgpu_ih_decode_iv_ts_helper() local 290 rptr += iv_size * offset; in amdgpu_ih_decode_iv_ts_helper()
|
/linux-6.3-rc2/drivers/net/ethernet/chelsio/inline_crypto/ch_ktls/ |
A D | chcr_ktls.h | 50 u32 iv_size; member
|
A D | chcr_ktls.c | 89 tx_info->iv_size = TLS_CIPHER_AES_GCM_128_IV_SIZE; in chcr_ktls_save_keys() 1187 cipher_start = TLS_HEADER_SIZE + tx_info->iv_size + 1; in chcr_ktls_xmit_wr_complete() 1366 (!tls_rec_offset ? TLS_HEADER_SIZE + tx_info->iv_size : 0); in chcr_ktls_xmit_wr_short() 1423 memcpy(pos + tx_info->salt_size, &iv_record, tx_info->iv_size); in chcr_ktls_xmit_wr_short() 1424 *(__be32 *)(pos + tx_info->salt_size + tx_info->iv_size) = in chcr_ktls_xmit_wr_short() 1426 (TLS_HEADER_SIZE + tx_info->iv_size)) / AES_BLOCK_LEN) : 0)); in chcr_ktls_xmit_wr_short() 1806 if (tls_rec_offset + data_len <= (TLS_HEADER_SIZE + tx_info->iv_size)) { in chcr_short_record_handler() 1824 if (tls_rec_offset < (TLS_HEADER_SIZE + tx_info->iv_size)) { in chcr_short_record_handler() 1831 (TLS_HEADER_SIZE + tx_info->iv_size)) in chcr_short_record_handler()
|
/linux-6.3-rc2/drivers/crypto/hisilicon/sec2/ |
A D | sec_crypto.c | 1391 u32 iv_size = req->ctx->c_ctx.ivsize; in sec_update_iv() local 1411 sz = sg_pcopy_to_buffer(sgl, sg_nents(sgl), iv, iv_size, in sec_update_iv() 1412 cryptlen - iv_size); in sec_update_iv() 1413 if (unlikely(sz != iv_size)) in sec_update_iv() 1416 sz = cryptlen / iv_size; in sec_update_iv() 1417 if (cryptlen % iv_size) in sec_update_iv() 1419 ctr_iv_inc(iv, iv_size, sz); in sec_update_iv() 2167 .ivsize = iv_size,\ 2171 max_key_size, blk_size, iv_size) \ argument 2413 ctx_exit, blk_size, iv_size, max_authsize)\ argument [all …]
|
/linux-6.3-rc2/drivers/crypto/ |
A D | sa2ul.c | 107 u8 iv_size; member 584 if (cfg->iv_size) in sa_format_cmdl_gen() 585 auth_offset += cfg->iv_size; in sa_format_cmdl_gen() 600 if (cfg->iv_size) { in sa_format_cmdl_gen() 604 upd_info->enc_iv.size = cfg->iv_size; in sa_format_cmdl_gen() 607 SA_CMDL_HEADER_SIZE_BYTES + cfg->iv_size; in sa_format_cmdl_gen() 610 (SA_CTX_ENC_AUX2_OFFSET | (cfg->iv_size >> 3)); in sa_format_cmdl_gen() 611 total += SA_CMDL_HEADER_SIZE_BYTES + cfg->iv_size; in sa_format_cmdl_gen() 902 cfg.iv_size = crypto_skcipher_ivsize(tfm); in sa_cipher_setkey() 1466 cfg.iv_size = 0; in sa_sha_setup() [all …]
|
/linux-6.3-rc2/include/net/ |
A D | tls.h | 228 u16 iv_size; member
|
/linux-6.3-rc2/net/tipc/ |
A D | crypto.c | 690 unsigned int iv_size, req_size; in tipc_aead_mem_alloc() local 694 iv_size = crypto_aead_ivsize(tfm); in tipc_aead_mem_alloc() 698 len += iv_size; in tipc_aead_mem_alloc() 711 *req = (struct aead_request *)PTR_ALIGN(*iv + iv_size, in tipc_aead_mem_alloc()
|
/linux-6.3-rc2/fs/cifs/ |
A D | smb2ops.c | 4248 unsigned int iv_size = crypto_aead_ivsize(tfm); in smb2_aead_req_alloc() local 4256 len = iv_size; in smb2_aead_req_alloc() 4269 *req = (struct aead_request *)PTR_ALIGN(*iv + iv_size, in smb2_aead_req_alloc()
|