| /OK3568_Linux_fs/kernel/drivers/soc/rockchip/ |
| H A D | rockchip_thunderboot_crypto.c | 245 struct crypto_data *crypto_info = platform_get_drvdata(dev_id); in rk_tb_crypto_irq_handle() local 249 if (crypto_info) { in rk_tb_crypto_irq_handle() 252 get_hash_value(crypto_info, crypto_info->hash, SHA256_HASH_SIZE); in rk_tb_crypto_irq_handle() 253 CRYPTO_WRITE(crypto_info, CRYPTO_HASH_CTL, CRYPTO_WRITE_MASK_ALL | 0); in rk_tb_crypto_irq_handle() 254 interrupt_status = CRYPTO_READ(crypto_info, CRYPTO_DMA_INT_ST); in rk_tb_crypto_irq_handle() 255 CRYPTO_WRITE(crypto_info, CRYPTO_DMA_INT_ST, interrupt_status); in rk_tb_crypto_irq_handle() 257 crypto_info->calc_ret = 0; in rk_tb_crypto_irq_handle() 260 if (crypto_info->done_cb) in rk_tb_crypto_irq_handle() 261 crypto_info->done_cb(crypto_info->cb_data, in rk_tb_crypto_irq_handle() 262 crypto_info->calc_ret, in rk_tb_crypto_irq_handle() [all …]
|
| /OK3568_Linux_fs/kernel/drivers/crypto/rockchip/ |
| H A D | rk3288_crypto.c | 260 static int rk_crypto_register(struct rk_crypto_info *crypto_info) in rk_crypto_register() argument 266 rk_cipher_algs[i]->dev = crypto_info; in rk_crypto_register() 302 struct rk_crypto_info *crypto_info = data; in rk_crypto_action() local 304 reset_control_assert(crypto_info->rst); in rk_crypto_action() 316 struct rk_crypto_info *crypto_info; in rk_crypto_probe() local 319 crypto_info = devm_kzalloc(&pdev->dev, in rk_crypto_probe() 320 sizeof(*crypto_info), GFP_KERNEL); in rk_crypto_probe() 321 if (!crypto_info) { in rk_crypto_probe() 326 crypto_info->rst = devm_reset_control_get(dev, "crypto-rst"); in rk_crypto_probe() 327 if (IS_ERR(crypto_info->rst)) { in rk_crypto_probe() [all …]
|
| /OK3568_Linux_fs/kernel/drivers/net/ethernet/mellanox/mlx5/core/accel/ |
| H A D | tls.h | 42 struct tls_crypto_info *crypto_info, 69 struct tls_crypto_info *crypto_info) in mlx5e_ktls_type_check() argument 71 switch (crypto_info->cipher_type) { in mlx5e_ktls_type_check() 73 if (crypto_info->version == TLS_1_2_VERSION) in mlx5e_ktls_type_check() 89 struct tls_crypto_info *crypto_info, in mlx5_ktls_create_key() argument 98 struct tls_crypto_info *crypto_info) { return false; } in mlx5e_ktls_type_check() argument 124 struct tls_crypto_info *crypto_info, 140 struct tls_crypto_info *crypto_info, in mlx5_accel_tls_add_flow() argument
|
| H A D | tls.c | 44 struct tls_crypto_info *crypto_info, in mlx5_accel_tls_add_flow() argument 48 return mlx5_fpga_tls_add_flow(mdev, flow, crypto_info, in mlx5_accel_tls_add_flow() 89 struct tls_crypto_info *crypto_info, in mlx5_ktls_create_key() argument 95 switch (crypto_info->cipher_type) { in mlx5_ktls_create_key() 98 (struct tls12_crypto_info_aes_gcm_128 *)crypto_info; in mlx5_ktls_create_key() 106 (struct tls12_crypto_info_aes_gcm_256 *)crypto_info; in mlx5_ktls_create_key()
|
| /OK3568_Linux_fs/kernel/net/tls/ |
| H A D | tls_main.c | 340 struct tls_crypto_info *crypto_info; in do_tls_getsockopt_conf() local 347 if (!optval || (len < sizeof(*crypto_info))) { in do_tls_getsockopt_conf() 359 crypto_info = &ctx->crypto_send.info; in do_tls_getsockopt_conf() 362 crypto_info = &ctx->crypto_recv.info; in do_tls_getsockopt_conf() 366 if (!TLS_CRYPTO_INFO_READY(crypto_info)) { in do_tls_getsockopt_conf() 371 if (len == sizeof(*crypto_info)) { in do_tls_getsockopt_conf() 372 if (copy_to_user(optval, crypto_info, sizeof(*crypto_info))) in do_tls_getsockopt_conf() 377 switch (crypto_info->cipher_type) { in do_tls_getsockopt_conf() 381 container_of(crypto_info, in do_tls_getsockopt_conf() 405 container_of(crypto_info, in do_tls_getsockopt_conf() [all …]
|
| H A D | tls_sw.c | 2302 struct tls_crypto_info *crypto_info; in tls_set_sw_offload() local 2351 crypto_info = &ctx->crypto_send.info; in tls_set_sw_offload() 2360 crypto_info = &ctx->crypto_recv.info; in tls_set_sw_offload() 2366 switch (crypto_info->cipher_type) { in tls_set_sw_offload() 2371 iv = ((struct tls12_crypto_info_aes_gcm_128 *)crypto_info)->iv; in tls_set_sw_offload() 2374 ((struct tls12_crypto_info_aes_gcm_128 *)crypto_info)->rec_seq; in tls_set_sw_offload() 2376 (struct tls12_crypto_info_aes_gcm_128 *)crypto_info; in tls_set_sw_offload() 2388 iv = ((struct tls12_crypto_info_aes_gcm_256 *)crypto_info)->iv; in tls_set_sw_offload() 2391 ((struct tls12_crypto_info_aes_gcm_256 *)crypto_info)->rec_seq; in tls_set_sw_offload() 2393 (struct tls12_crypto_info_aes_gcm_256 *)crypto_info; in tls_set_sw_offload() [all …]
|
| H A D | tls_device.c | 1022 struct tls_crypto_info *crypto_info; in tls_set_device_offload() local 1045 crypto_info = &ctx->crypto_send.info; in tls_set_device_offload() 1046 if (crypto_info->version != TLS_1_2_VERSION) { in tls_set_device_offload() 1051 switch (crypto_info->cipher_type) { in tls_set_device_offload() 1056 iv = ((struct tls12_crypto_info_aes_gcm_128 *)crypto_info)->iv; in tls_set_device_offload() 1059 ((struct tls12_crypto_info_aes_gcm_128 *)crypto_info)->rec_seq; in tls_set_device_offload() 1072 prot->version = crypto_info->version; in tls_set_device_offload() 1073 prot->cipher_type = crypto_info->cipher_type; in tls_set_device_offload() 1094 rc = tls_sw_fallback_init(sk, offload_ctx, crypto_info); in tls_set_device_offload()
|
| H A D | tls_device_fallback.c | 448 struct tls_crypto_info *crypto_info) in tls_sw_fallback_init() argument 462 key = ((struct tls12_crypto_info_aes_gcm_128 *)crypto_info)->key; in tls_sw_fallback_init()
|
| /OK3568_Linux_fs/kernel/drivers/net/ethernet/chelsio/inline_crypto/chtls/ |
| H A D | chtls_main.c | 470 struct tls_crypto_info crypto_info = { 0 }; in do_chtls_getsockopt() local 472 crypto_info.version = TLS_1_2_VERSION; in do_chtls_getsockopt() 473 if (copy_to_user(optval, &crypto_info, sizeof(struct tls_crypto_info))) in do_chtls_getsockopt() 493 struct tls_crypto_info *crypto_info, tmp_crypto_info; in do_chtls_setsockopt() local 501 if (sockptr_is_null(optval) || optlen < sizeof(*crypto_info)) { in do_chtls_setsockopt() 506 rc = copy_from_sockptr(&tmp_crypto_info, optval, sizeof(*crypto_info)); in do_chtls_setsockopt() 518 crypto_info = (struct tls_crypto_info *)&csk->tlshws.crypto_info; in do_chtls_setsockopt() 526 crypto_info[0] = tmp_crypto_info; in do_chtls_setsockopt() 528 rc = copy_from_sockptr_offset((char *)crypto_info + in do_chtls_setsockopt() 529 sizeof(*crypto_info), in do_chtls_setsockopt() [all …]
|
| H A D | chtls_hw.c | 272 &csk->tlshws.crypto_info; in chtls_key_info() 285 &csk->tlshws.crypto_info; in chtls_key_info()
|
| H A D | chtls.h | 273 } crypto_info; member
|
| /OK3568_Linux_fs/kernel/drivers/net/ethernet/mellanox/mlx5/core/fpga/ |
| H A D | tls.c | 514 struct tls12_crypto_info_aes_gcm_128 *crypto_info = in mlx5_fpga_tls_set_aes_gcm128_ctx() local 517 memcpy(MLX5_ADDR_OF(tls_cmd, cmd, tls_rcd_sn), crypto_info->rec_seq, in mlx5_fpga_tls_set_aes_gcm128_ctx() 521 crypto_info->salt, TLS_CIPHER_AES_GCM_128_SALT_SIZE); in mlx5_fpga_tls_set_aes_gcm128_ctx() 523 crypto_info->key, TLS_CIPHER_AES_GCM_128_KEY_SIZE); in mlx5_fpga_tls_set_aes_gcm128_ctx() 528 crypto_info->key, TLS_CIPHER_AES_GCM_128_KEY_SIZE); in mlx5_fpga_tls_set_aes_gcm128_ctx() 534 struct tls_crypto_info *crypto_info) in mlx5_fpga_tls_set_key_material() argument 538 switch (crypto_info->cipher_type) { in mlx5_fpga_tls_set_key_material() 542 mlx5_fpga_tls_set_aes_gcm128_ctx(cmd, crypto_info, &rcd_sn); in mlx5_fpga_tls_set_key_material() 552 struct tls_crypto_info *crypto_info, in _mlx5_fpga_tls_add_flow() argument 567 ret = mlx5_fpga_tls_set_key_material(cmd, caps, crypto_info); in _mlx5_fpga_tls_add_flow() [all …]
|
| H A D | tls.h | 55 struct tls_crypto_info *crypto_info,
|
| /OK3568_Linux_fs/kernel/drivers/net/ethernet/mellanox/mlx5/core/en_accel/ |
| H A D | ktls.c | 11 struct tls_crypto_info *crypto_info, in mlx5e_ktls_add() argument 18 if (!mlx5e_ktls_type_check(mdev, crypto_info)) in mlx5e_ktls_add() 22 err = mlx5e_ktls_add_tx(netdev, sk, crypto_info, start_offload_tcp_sn); in mlx5e_ktls_add() 24 err = mlx5e_ktls_add_rx(netdev, sk, crypto_info, start_offload_tcp_sn); in mlx5e_ktls_add()
|
| H A D | ktls_tx.c | 52 struct tls12_crypto_info_aes_gcm_128 crypto_info; member 81 struct tls_crypto_info *crypto_info, u32 start_offload_tcp_sn) in mlx5e_ktls_add_tx() argument 97 err = mlx5_ktls_create_key(mdev, crypto_info, &priv_tx->key_id); in mlx5e_ktls_add_tx() 102 priv_tx->crypto_info = in mlx5e_ktls_add_tx() 103 *(struct tls12_crypto_info_aes_gcm_128 *)crypto_info; in mlx5e_ktls_add_tx() 172 mlx5e_ktls_build_static_params(wqe, sq->pc, sq->sqn, &priv_tx->crypto_info, in post_static_params() 282 struct tls12_crypto_info_aes_gcm_128 *info = &priv_tx->crypto_info; in tx_post_resync_params()
|
| H A D | ktls_rx.c | 46 struct tls12_crypto_info_aes_gcm_128 crypto_info; member 149 mlx5e_ktls_build_static_params(wqe, sq->pc, sq->sqn, &priv_rx->crypto_info, in post_static_params() 367 struct tls12_crypto_info_aes_gcm_128 *info = &priv_rx->crypto_info; in resync_handle_seq_match() 582 struct tls_crypto_info *crypto_info, in mlx5e_ktls_add_rx() argument 600 err = mlx5_ktls_create_key(mdev, crypto_info, &priv_rx->key_id); in mlx5e_ktls_add_rx() 604 priv_rx->crypto_info = in mlx5e_ktls_add_rx() 605 *(struct tls12_crypto_info_aes_gcm_128 *)crypto_info; in mlx5e_ktls_add_rx()
|
| H A D | ktls_utils.h | 24 struct tls_crypto_info *crypto_info, u32 start_offload_tcp_sn); 27 struct tls_crypto_info *crypto_info, u32 start_offload_tcp_sn);
|
| H A D | tls.c | 104 struct tls_crypto_info *crypto_info, in mlx5e_tls_add() argument 123 ret = mlx5_accel_tls_add_flow(mdev, flow, crypto_info, in mlx5e_tls_add()
|
| /OK3568_Linux_fs/kernel/Documentation/networking/ |
| H A D | tls.rst | 49 struct tls12_crypto_info_aes_gcm_128 crypto_info; 51 crypto_info.info.version = TLS_1_2_VERSION; 52 crypto_info.info.cipher_type = TLS_CIPHER_AES_GCM_128; 53 memcpy(crypto_info.iv, iv_write, TLS_CIPHER_AES_GCM_128_IV_SIZE); 54 memcpy(crypto_info.rec_seq, seq_number_write, 56 memcpy(crypto_info.key, cipher_key_write, TLS_CIPHER_AES_GCM_128_KEY_SIZE); 57 memcpy(crypto_info.salt, implicit_iv_write, TLS_CIPHER_AES_GCM_128_SALT_SIZE); 59 setsockopt(sock, SOL_TLS, TLS_TX, &crypto_info, sizeof(crypto_info));
|
| H A D | tls-offload.rst | 93 struct tls_crypto_info *crypto_info, 99 Cryptographic information in ``crypto_info`` includes the key, iv, salt 102 sequence number from ``crypto_info``. The driver can add its state
|
| /OK3568_Linux_fs/kernel/drivers/net/ethernet/netronome/nfp/crypto/ |
| H A D | tls.c | 266 struct tls_crypto_info *crypto_info, in nfp_net_tls_add() argument 286 if (!nfp_net_cipher_supported(nn, crypto_info->cipher_type, direction)) in nfp_net_tls_add() 337 tls_ci = (struct tls12_crypto_info_aes_gcm_128 *)crypto_info; in nfp_net_tls_add()
|
| /OK3568_Linux_fs/kernel/include/net/ |
| H A D | tls.h | 300 struct tls_crypto_info *crypto_info, 721 struct tls_crypto_info *crypto_info);
|
| /OK3568_Linux_fs/kernel/drivers/net/ethernet/chelsio/inline_crypto/ch_ktls/ |
| H A D | chcr_ktls.c | 72 struct tls_crypto_info *crypto_info, in chcr_ktls_save_keys() argument 82 switch (crypto_info->cipher_type) { in chcr_ktls_save_keys() 85 (struct tls12_crypto_info_aes_gcm_128 *)crypto_info; in chcr_ktls_save_keys() 130 crypto_info->cipher_type); in chcr_ktls_save_keys() 416 struct tls_crypto_info *crypto_info, in chcr_ktls_dev_add() argument 477 ret = chcr_ktls_save_keys(tx_info, crypto_info, direction); in chcr_ktls_dev_add()
|
| /OK3568_Linux_fs/kernel/drivers/net/ethernet/chelsio/cxgb4/ |
| H A D | cxgb4_main.c | 6449 struct tls_crypto_info *crypto_info, in cxgb4_ktls_dev_add() argument 6466 crypto_info, in cxgb4_ktls_dev_add()
|