| /OK3568_Linux_fs/kernel/crypto/ |
| H A D | fips140-selftests.c | 68 size_t iv_size; member 82 size_t iv_size; member 235 if (WARN_ON(vec->iv_size > MAX_IV_SIZE)) in fips_test_skcipher() 246 if (crypto_skcipher_ivsize(tfm) != vec->iv_size) { in fips_test_skcipher() 271 memcpy(iv, vec->iv, vec->iv_size); in fips_test_skcipher() 283 memcpy(iv, vec->iv, vec->iv_size); in fips_test_skcipher() 313 if (WARN_ON(vec->iv_size > MAX_IV_SIZE)) in fips_test_aead() 324 if (crypto_aead_ivsize(tfm) != vec->iv_size) { in fips_test_aead() 364 memcpy(iv, vec->iv, vec->iv_size); in fips_test_aead() 380 memcpy(iv, vec->iv, vec->iv_size); in fips_test_aead() [all …]
|
| /OK3568_Linux_fs/kernel/drivers/md/ |
| H A D | dm-crypt.c | 169 unsigned int iv_size; member 312 memset(iv, 0, cc->iv_size); in crypt_iv_plain_gen() 321 memset(iv, 0, cc->iv_size); in crypt_iv_plain64_gen() 330 memset(iv, 0, cc->iv_size); in crypt_iv_plain64be_gen() 332 *(__be64 *)&iv[cc->iv_size - sizeof(u64)] = cpu_to_be64(dmreq->iv_sector); in crypt_iv_plain64be_gen() 344 memset(iv, 0, cc->iv_size); in crypt_iv_essiv_gen() 389 memset(iv, 0, cc->iv_size - sizeof(u64)); /* rest is cleared below */ in crypt_iv_benbi_gen() 392 put_unaligned(val, (__be64 *)(iv + cc->iv_size - sizeof(u64))); in crypt_iv_benbi_gen() 400 memset(iv, 0, cc->iv_size); in crypt_iv_null_gen() 516 memcpy(iv, &md5state.hash, cc->iv_size); in crypt_iv_lmk_one() [all …]
|
| /OK3568_Linux_fs/kernel/drivers/crypto/rockchip/cryptodev_linux/ |
| H A D | cryptlib.h | 76 void *iv, size_t iv_size) in cryptodev_cipher_set_iv() argument 78 memcpy(cdata->async.iv, iv, min(iv_size, sizeof(cdata->async.iv))); in cryptodev_cipher_set_iv() 82 void *iv, size_t iv_size) in cryptodev_cipher_get_iv() argument 84 memcpy(iv, cdata->async.iv, min(iv_size, sizeof(cdata->async.iv))); in cryptodev_cipher_get_iv()
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/host_include/ |
| H A D | signed_hdr.h | 91 uint16_t iv_size; member 114 _x->iv_size + _x->tag_size); }) 118 (SHDR_ENC_GET_IV(_x) + _x->iv_size); })
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/host_include/ |
| H A D | signed_hdr.h | 91 uint16_t iv_size; member 114 _x->iv_size + _x->tag_size); }) 118 (SHDR_ENC_GET_IV(_x) + _x->iv_size); })
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/host_include/mbedtls/ |
| H A D | cipher.h | 273 unsigned int iv_size; member 324 size_t iv_size; member 550 if( ctx->iv_size != 0 ) in mbedtls_cipher_get_iv_size() 551 return (int) ctx->iv_size; in mbedtls_cipher_get_iv_size() 553 return (int) ctx->cipher_info->iv_size; in mbedtls_cipher_get_iv_size()
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/include/mbedtls/ |
| H A D | cipher.h | 273 unsigned int iv_size; member 324 size_t iv_size; member 550 if( ctx->iv_size != 0 ) in mbedtls_cipher_get_iv_size() 551 return (int) ctx->iv_size; in mbedtls_cipher_get_iv_size() 553 return (int) ctx->cipher_info->iv_size; in mbedtls_cipher_get_iv_size()
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/include/mbedtls/ |
| H A D | cipher.h | 273 unsigned int iv_size; member 324 size_t iv_size; member 550 if( ctx->iv_size != 0 ) in mbedtls_cipher_get_iv_size() 551 return (int) ctx->iv_size; in mbedtls_cipher_get_iv_size() 553 return (int) ctx->cipher_info->iv_size; in mbedtls_cipher_get_iv_size()
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/host_include/mbedtls/ |
| H A D | cipher.h | 273 unsigned int iv_size; member 324 size_t iv_size; member 550 if( ctx->iv_size != 0 ) in mbedtls_cipher_get_iv_size() 551 return (int) ctx->iv_size; in mbedtls_cipher_get_iv_size() 553 return (int) ctx->cipher_info->iv_size; in mbedtls_cipher_get_iv_size()
|
| /OK3568_Linux_fs/kernel/drivers/crypto/rockchip/ |
| H A D | rk_crypto_skcipher_utils.c | 153 uint32_t iv_size; in rk_iv_copyback() local 159 iv_size = rk_get_new_iv(ctx, algt->mode, ctx->is_enc, ctx->iv); in rk_iv_copyback() 161 if (iv_size && req->iv) in rk_iv_copyback() 162 memcpy(req->iv, ctx->iv, iv_size); in rk_iv_copyback() 167 uint32_t iv_size; in rk_update_iv() local 174 iv_size = rk_get_new_iv(ctx, algt->mode, ctx->is_enc, ctx->iv); in rk_update_iv() 176 if (iv_size) in rk_update_iv() 177 algs_ctx->ops.hw_write_iv(rk_dev, ctx->iv, iv_size); in rk_update_iv()
|
| /OK3568_Linux_fs/kernel/samples/crypto/ |
| H A D | fips140_lab_util.c | 329 size_t iv_size; member 463 if (t->iv_size) in af_alg_process_msg() 464 controllen += CMSG_SPACE(sizeof(struct af_alg_iv) + t->iv_size); in af_alg_process_msg() 477 if (t->iv_size) { in af_alg_process_msg() 482 cmsg->cmsg_len = CMSG_LEN(sizeof(*alg_iv) + t->iv_size); in af_alg_process_msg() 484 alg_iv->ivlen = t->iv_size; in af_alg_process_msg() 485 memcpy(alg_iv->iv, t->iv, t->iv_size); in af_alg_process_msg()
|
| /OK3568_Linux_fs/kernel/include/net/ |
| H A D | tls.h | 241 u16 iv_size; member 529 prot->iv_size); in tls_advance_record_sn() 539 size_t pkt_len, iv_size = prot->iv_size; in tls_fill_prepend() local 543 pkt_len += iv_size; in tls_fill_prepend() 546 ctx->tx.iv + TLS_CIPHER_AES_GCM_128_SALT_SIZE, iv_size); in tls_fill_prepend()
|
| /OK3568_Linux_fs/kernel/drivers/s390/cio/ |
| H A D | airq.c | 116 static inline unsigned long iv_size(unsigned long bits) in iv_size() function 138 size = iv_size(bits); in airq_iv_create() 208 cio_dma_free(iv->vector, iv_size(iv->bits)); in airq_iv_release()
|
| /OK3568_Linux_fs/kernel/drivers/crypto/hisilicon/sec2/ |
| H A D | sec_crypto.c | 1040 u32 iv_size = req->ctx->c_ctx.ivsize; in sec_update_iv() local 1059 sz = sg_pcopy_to_buffer(sgl, sg_nents(sgl), iv, iv_size, in sec_update_iv() 1060 cryptlen - iv_size); in sec_update_iv() 1061 if (unlikely(sz != iv_size)) in sec_update_iv() 1476 sec_max_key_size, ctx_init, ctx_exit, blk_size, iv_size)\ argument 1494 .ivsize = iv_size,\ 1498 max_key_size, blk_size, iv_size) \ argument 1500 sec_skcipher_ctx_init, sec_skcipher_ctx_exit, blk_size, iv_size) 1601 ctx_exit, blk_size, iv_size, max_authsize)\ argument 1617 .ivsize = iv_size,\
|
| /OK3568_Linux_fs/kernel/net/tls/ |
| H A D | tls_sw.c | 516 prot->iv_size + prot->salt_size); in tls_do_encryption() 1479 prot->iv_size); in decrypt_internal() 1486 prot->iv_size + prot->salt_size); in decrypt_internal() 2087 cipher_overhead += prot->iv_size; in tls_read_size() 2311 u16 nonce_size, tag_size, iv_size, rec_seq_size, salt_size; in tls_set_sw_offload() local 2370 iv_size = TLS_CIPHER_AES_GCM_128_IV_SIZE; in tls_set_sw_offload() 2387 iv_size = TLS_CIPHER_AES_GCM_256_IV_SIZE; in tls_set_sw_offload() 2404 iv_size = TLS_CIPHER_AES_CCM_128_IV_SIZE; in tls_set_sw_offload() 2424 if (iv_size > MAX_IV_SIZE || nonce_size > MAX_IV_SIZE || in tls_set_sw_offload() 2445 prot->iv_size = iv_size; in tls_set_sw_offload() [all …]
|
| H A D | tls_device.c | 1017 u16 nonce_size, tag_size, iv_size, rec_seq_size; in tls_set_device_offload() local 1055 iv_size = TLS_CIPHER_AES_GCM_128_IV_SIZE; in tls_set_device_offload() 1077 prot->iv_size = iv_size; in tls_set_device_offload() 1078 ctx->tx.iv = kmalloc(iv_size + TLS_CIPHER_AES_GCM_128_SALT_SIZE, in tls_set_device_offload() 1085 memcpy(ctx->tx.iv + TLS_CIPHER_AES_GCM_128_SALT_SIZE, iv, iv_size); in tls_set_device_offload()
|
| /OK3568_Linux_fs/kernel/drivers/crypto/ |
| H A D | sa2ul.c | 88 u8 iv_size; member 563 if (cfg->iv_size) in sa_format_cmdl_gen() 564 auth_offset += cfg->iv_size; in sa_format_cmdl_gen() 579 if (cfg->iv_size) { in sa_format_cmdl_gen() 583 upd_info->enc_iv.size = cfg->iv_size; in sa_format_cmdl_gen() 586 SA_CMDL_HEADER_SIZE_BYTES + cfg->iv_size; in sa_format_cmdl_gen() 589 (SA_CTX_ENC_AUX2_OFFSET | (cfg->iv_size >> 3)); in sa_format_cmdl_gen() 590 total += SA_CMDL_HEADER_SIZE_BYTES + cfg->iv_size; in sa_format_cmdl_gen() 875 cfg.iv_size = crypto_skcipher_ivsize(tfm); in sa_cipher_setkey() 1444 cfg.iv_size = 0; in sa_sha_setup() [all …]
|
| /OK3568_Linux_fs/u-boot/arch/arm/mach-exynos/ |
| H A D | clock_init.h | 111 unsigned iv_size; member
|
| H A D | clock_init_exynos5.c | 216 .iv_size = 0x7, 319 .iv_size = 0x7, 422 .iv_size = 0x7,
|
| H A D | dmc_init_ddr3.c | 109 writel(mem->iv_size, &dmc->ivcontrol); in ddr3_mem_ctrl_init()
|
| /OK3568_Linux_fs/kernel/drivers/net/ethernet/chelsio/inline_crypto/ch_ktls/ |
| H A D | chcr_ktls.h | 50 u32 iv_size; member
|
| H A D | chcr_ktls.c | 90 tx_info->iv_size = TLS_CIPHER_AES_GCM_128_IV_SIZE; in chcr_ktls_save_keys() 1188 cipher_start = TLS_HEADER_SIZE + tx_info->iv_size + 1; in chcr_ktls_xmit_wr_complete() 1367 (!tls_rec_offset ? TLS_HEADER_SIZE + tx_info->iv_size : 0); in chcr_ktls_xmit_wr_short() 1424 memcpy(pos + tx_info->salt_size, &iv_record, tx_info->iv_size); in chcr_ktls_xmit_wr_short() 1425 *(__be32 *)(pos + tx_info->salt_size + tx_info->iv_size) = in chcr_ktls_xmit_wr_short() 1427 (TLS_HEADER_SIZE + tx_info->iv_size)) / AES_BLOCK_LEN) : 0)); in chcr_ktls_xmit_wr_short() 1808 if (tls_rec_offset + data_len <= (TLS_HEADER_SIZE + tx_info->iv_size)) { in chcr_short_record_handler() 1826 if (tls_rec_offset < (TLS_HEADER_SIZE + tx_info->iv_size)) { in chcr_short_record_handler() 1833 (TLS_HEADER_SIZE + tx_info->iv_size)) in chcr_short_record_handler()
|
| /OK3568_Linux_fs/kernel/net/tipc/ |
| H A D | crypto.c | 683 unsigned int iv_size, req_size; in tipc_aead_mem_alloc() local 687 iv_size = crypto_aead_ivsize(tfm); in tipc_aead_mem_alloc() 691 len += iv_size; in tipc_aead_mem_alloc() 704 *req = (struct aead_request *)PTR_ALIGN(*iv + iv_size, in tipc_aead_mem_alloc()
|