Home
last modified time | relevance | path

Searched refs:iv_size (Results 1 – 23 of 23) sorted by relevance

/OK3568_Linux_fs/kernel/crypto/
H A Dfips140-selftests.c68 size_t iv_size; member
82 size_t iv_size; member
235 if (WARN_ON(vec->iv_size > MAX_IV_SIZE)) in fips_test_skcipher()
246 if (crypto_skcipher_ivsize(tfm) != vec->iv_size) { in fips_test_skcipher()
271 memcpy(iv, vec->iv, vec->iv_size); in fips_test_skcipher()
283 memcpy(iv, vec->iv, vec->iv_size); in fips_test_skcipher()
313 if (WARN_ON(vec->iv_size > MAX_IV_SIZE)) in fips_test_aead()
324 if (crypto_aead_ivsize(tfm) != vec->iv_size) { in fips_test_aead()
364 memcpy(iv, vec->iv, vec->iv_size); in fips_test_aead()
380 memcpy(iv, vec->iv, vec->iv_size); in fips_test_aead()
[all …]
/OK3568_Linux_fs/kernel/drivers/md/
H A Ddm-crypt.c169 unsigned int iv_size; member
312 memset(iv, 0, cc->iv_size); in crypt_iv_plain_gen()
321 memset(iv, 0, cc->iv_size); in crypt_iv_plain64_gen()
330 memset(iv, 0, cc->iv_size); in crypt_iv_plain64be_gen()
332 *(__be64 *)&iv[cc->iv_size - sizeof(u64)] = cpu_to_be64(dmreq->iv_sector); in crypt_iv_plain64be_gen()
344 memset(iv, 0, cc->iv_size); in crypt_iv_essiv_gen()
389 memset(iv, 0, cc->iv_size - sizeof(u64)); /* rest is cleared below */ in crypt_iv_benbi_gen()
392 put_unaligned(val, (__be64 *)(iv + cc->iv_size - sizeof(u64))); in crypt_iv_benbi_gen()
400 memset(iv, 0, cc->iv_size); in crypt_iv_null_gen()
516 memcpy(iv, &md5state.hash, cc->iv_size); in crypt_iv_lmk_one()
[all …]
/OK3568_Linux_fs/kernel/drivers/crypto/rockchip/cryptodev_linux/
H A Dcryptlib.h76 void *iv, size_t iv_size) in cryptodev_cipher_set_iv() argument
78 memcpy(cdata->async.iv, iv, min(iv_size, sizeof(cdata->async.iv))); in cryptodev_cipher_set_iv()
82 void *iv, size_t iv_size) in cryptodev_cipher_get_iv() argument
84 memcpy(iv, cdata->async.iv, min(iv_size, sizeof(cdata->async.iv))); in cryptodev_cipher_get_iv()
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/host_include/
H A Dsigned_hdr.h91 uint16_t iv_size; member
114 _x->iv_size + _x->tag_size); })
118 (SHDR_ENC_GET_IV(_x) + _x->iv_size); })
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/host_include/
H A Dsigned_hdr.h91 uint16_t iv_size; member
114 _x->iv_size + _x->tag_size); })
118 (SHDR_ENC_GET_IV(_x) + _x->iv_size); })
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/host_include/mbedtls/
H A Dcipher.h273 unsigned int iv_size; member
324 size_t iv_size; member
550 if( ctx->iv_size != 0 ) in mbedtls_cipher_get_iv_size()
551 return (int) ctx->iv_size; in mbedtls_cipher_get_iv_size()
553 return (int) ctx->cipher_info->iv_size; in mbedtls_cipher_get_iv_size()
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/include/mbedtls/
H A Dcipher.h273 unsigned int iv_size; member
324 size_t iv_size; member
550 if( ctx->iv_size != 0 ) in mbedtls_cipher_get_iv_size()
551 return (int) ctx->iv_size; in mbedtls_cipher_get_iv_size()
553 return (int) ctx->cipher_info->iv_size; in mbedtls_cipher_get_iv_size()
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/include/mbedtls/
H A Dcipher.h273 unsigned int iv_size; member
324 size_t iv_size; member
550 if( ctx->iv_size != 0 ) in mbedtls_cipher_get_iv_size()
551 return (int) ctx->iv_size; in mbedtls_cipher_get_iv_size()
553 return (int) ctx->cipher_info->iv_size; in mbedtls_cipher_get_iv_size()
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/host_include/mbedtls/
H A Dcipher.h273 unsigned int iv_size; member
324 size_t iv_size; member
550 if( ctx->iv_size != 0 ) in mbedtls_cipher_get_iv_size()
551 return (int) ctx->iv_size; in mbedtls_cipher_get_iv_size()
553 return (int) ctx->cipher_info->iv_size; in mbedtls_cipher_get_iv_size()
/OK3568_Linux_fs/kernel/drivers/crypto/rockchip/
H A Drk_crypto_skcipher_utils.c153 uint32_t iv_size; in rk_iv_copyback() local
159 iv_size = rk_get_new_iv(ctx, algt->mode, ctx->is_enc, ctx->iv); in rk_iv_copyback()
161 if (iv_size && req->iv) in rk_iv_copyback()
162 memcpy(req->iv, ctx->iv, iv_size); in rk_iv_copyback()
167 uint32_t iv_size; in rk_update_iv() local
174 iv_size = rk_get_new_iv(ctx, algt->mode, ctx->is_enc, ctx->iv); in rk_update_iv()
176 if (iv_size) in rk_update_iv()
177 algs_ctx->ops.hw_write_iv(rk_dev, ctx->iv, iv_size); in rk_update_iv()
/OK3568_Linux_fs/kernel/samples/crypto/
H A Dfips140_lab_util.c329 size_t iv_size; member
463 if (t->iv_size) in af_alg_process_msg()
464 controllen += CMSG_SPACE(sizeof(struct af_alg_iv) + t->iv_size); in af_alg_process_msg()
477 if (t->iv_size) { in af_alg_process_msg()
482 cmsg->cmsg_len = CMSG_LEN(sizeof(*alg_iv) + t->iv_size); in af_alg_process_msg()
484 alg_iv->ivlen = t->iv_size; in af_alg_process_msg()
485 memcpy(alg_iv->iv, t->iv, t->iv_size); in af_alg_process_msg()
/OK3568_Linux_fs/kernel/include/net/
H A Dtls.h241 u16 iv_size; member
529 prot->iv_size); in tls_advance_record_sn()
539 size_t pkt_len, iv_size = prot->iv_size; in tls_fill_prepend() local
543 pkt_len += iv_size; in tls_fill_prepend()
546 ctx->tx.iv + TLS_CIPHER_AES_GCM_128_SALT_SIZE, iv_size); in tls_fill_prepend()
/OK3568_Linux_fs/kernel/drivers/s390/cio/
H A Dairq.c116 static inline unsigned long iv_size(unsigned long bits) in iv_size() function
138 size = iv_size(bits); in airq_iv_create()
208 cio_dma_free(iv->vector, iv_size(iv->bits)); in airq_iv_release()
/OK3568_Linux_fs/kernel/drivers/crypto/hisilicon/sec2/
H A Dsec_crypto.c1040 u32 iv_size = req->ctx->c_ctx.ivsize; in sec_update_iv() local
1059 sz = sg_pcopy_to_buffer(sgl, sg_nents(sgl), iv, iv_size, in sec_update_iv()
1060 cryptlen - iv_size); in sec_update_iv()
1061 if (unlikely(sz != iv_size)) in sec_update_iv()
1476 sec_max_key_size, ctx_init, ctx_exit, blk_size, iv_size)\ argument
1494 .ivsize = iv_size,\
1498 max_key_size, blk_size, iv_size) \ argument
1500 sec_skcipher_ctx_init, sec_skcipher_ctx_exit, blk_size, iv_size)
1601 ctx_exit, blk_size, iv_size, max_authsize)\ argument
1617 .ivsize = iv_size,\
/OK3568_Linux_fs/kernel/net/tls/
H A Dtls_sw.c516 prot->iv_size + prot->salt_size); in tls_do_encryption()
1479 prot->iv_size); in decrypt_internal()
1486 prot->iv_size + prot->salt_size); in decrypt_internal()
2087 cipher_overhead += prot->iv_size; in tls_read_size()
2311 u16 nonce_size, tag_size, iv_size, rec_seq_size, salt_size; in tls_set_sw_offload() local
2370 iv_size = TLS_CIPHER_AES_GCM_128_IV_SIZE; in tls_set_sw_offload()
2387 iv_size = TLS_CIPHER_AES_GCM_256_IV_SIZE; in tls_set_sw_offload()
2404 iv_size = TLS_CIPHER_AES_CCM_128_IV_SIZE; in tls_set_sw_offload()
2424 if (iv_size > MAX_IV_SIZE || nonce_size > MAX_IV_SIZE || in tls_set_sw_offload()
2445 prot->iv_size = iv_size; in tls_set_sw_offload()
[all …]
H A Dtls_device.c1017 u16 nonce_size, tag_size, iv_size, rec_seq_size; in tls_set_device_offload() local
1055 iv_size = TLS_CIPHER_AES_GCM_128_IV_SIZE; in tls_set_device_offload()
1077 prot->iv_size = iv_size; in tls_set_device_offload()
1078 ctx->tx.iv = kmalloc(iv_size + TLS_CIPHER_AES_GCM_128_SALT_SIZE, in tls_set_device_offload()
1085 memcpy(ctx->tx.iv + TLS_CIPHER_AES_GCM_128_SALT_SIZE, iv, iv_size); in tls_set_device_offload()
/OK3568_Linux_fs/kernel/drivers/crypto/
H A Dsa2ul.c88 u8 iv_size; member
563 if (cfg->iv_size) in sa_format_cmdl_gen()
564 auth_offset += cfg->iv_size; in sa_format_cmdl_gen()
579 if (cfg->iv_size) { in sa_format_cmdl_gen()
583 upd_info->enc_iv.size = cfg->iv_size; in sa_format_cmdl_gen()
586 SA_CMDL_HEADER_SIZE_BYTES + cfg->iv_size; in sa_format_cmdl_gen()
589 (SA_CTX_ENC_AUX2_OFFSET | (cfg->iv_size >> 3)); in sa_format_cmdl_gen()
590 total += SA_CMDL_HEADER_SIZE_BYTES + cfg->iv_size; in sa_format_cmdl_gen()
875 cfg.iv_size = crypto_skcipher_ivsize(tfm); in sa_cipher_setkey()
1444 cfg.iv_size = 0; in sa_sha_setup()
[all …]
/OK3568_Linux_fs/u-boot/arch/arm/mach-exynos/
H A Dclock_init.h111 unsigned iv_size; member
H A Dclock_init_exynos5.c216 .iv_size = 0x7,
319 .iv_size = 0x7,
422 .iv_size = 0x7,
H A Ddmc_init_ddr3.c109 writel(mem->iv_size, &dmc->ivcontrol); in ddr3_mem_ctrl_init()
/OK3568_Linux_fs/kernel/drivers/net/ethernet/chelsio/inline_crypto/ch_ktls/
H A Dchcr_ktls.h50 u32 iv_size; member
H A Dchcr_ktls.c90 tx_info->iv_size = TLS_CIPHER_AES_GCM_128_IV_SIZE; in chcr_ktls_save_keys()
1188 cipher_start = TLS_HEADER_SIZE + tx_info->iv_size + 1; in chcr_ktls_xmit_wr_complete()
1367 (!tls_rec_offset ? TLS_HEADER_SIZE + tx_info->iv_size : 0); in chcr_ktls_xmit_wr_short()
1424 memcpy(pos + tx_info->salt_size, &iv_record, tx_info->iv_size); in chcr_ktls_xmit_wr_short()
1425 *(__be32 *)(pos + tx_info->salt_size + tx_info->iv_size) = in chcr_ktls_xmit_wr_short()
1427 (TLS_HEADER_SIZE + tx_info->iv_size)) / AES_BLOCK_LEN) : 0)); in chcr_ktls_xmit_wr_short()
1808 if (tls_rec_offset + data_len <= (TLS_HEADER_SIZE + tx_info->iv_size)) { in chcr_short_record_handler()
1826 if (tls_rec_offset < (TLS_HEADER_SIZE + tx_info->iv_size)) { in chcr_short_record_handler()
1833 (TLS_HEADER_SIZE + tx_info->iv_size)) in chcr_short_record_handler()
/OK3568_Linux_fs/kernel/net/tipc/
H A Dcrypto.c683 unsigned int iv_size, req_size; in tipc_aead_mem_alloc() local
687 iv_size = crypto_aead_ivsize(tfm); in tipc_aead_mem_alloc()
691 len += iv_size; in tipc_aead_mem_alloc()
704 *req = (struct aead_request *)PTR_ALIGN(*iv + iv_size, in tipc_aead_mem_alloc()