Home
last modified time | relevance | path

Searched refs:AES_BLOCK_SIZE (Results 1 – 25 of 105) sorted by relevance

12345

/Linux-v5.15/arch/arm64/crypto/
Daes-glue.c130 u8 dg[AES_BLOCK_SIZE];
185 while ((blocks = (walk.nbytes / AES_BLOCK_SIZE))) { in ecb_encrypt()
190 err = skcipher_walk_done(&walk, walk.nbytes % AES_BLOCK_SIZE); in ecb_encrypt()
205 while ((blocks = (walk.nbytes / AES_BLOCK_SIZE))) { in ecb_decrypt()
210 err = skcipher_walk_done(&walk, walk.nbytes % AES_BLOCK_SIZE); in ecb_decrypt()
223 while ((blocks = (walk->nbytes / AES_BLOCK_SIZE))) { in cbc_encrypt_walk()
228 err = skcipher_walk_done(walk, walk->nbytes % AES_BLOCK_SIZE); in cbc_encrypt_walk()
252 while ((blocks = (walk->nbytes / AES_BLOCK_SIZE))) { in cbc_decrypt_walk()
257 err = skcipher_walk_done(walk, walk->nbytes % AES_BLOCK_SIZE); in cbc_decrypt_walk()
278 int cbc_blocks = DIV_ROUND_UP(req->cryptlen, AES_BLOCK_SIZE) - 2; in cts_cbc_encrypt()
[all …]
Daes-neonbs-glue.c57 u8 rk[13 * (8 * AES_BLOCK_SIZE) + 32];
59 } __aligned(AES_BLOCK_SIZE);
108 while (walk.nbytes >= AES_BLOCK_SIZE) { in __ecb_crypt()
109 unsigned int blocks = walk.nbytes / AES_BLOCK_SIZE; in __ecb_crypt()
113 walk.stride / AES_BLOCK_SIZE); in __ecb_crypt()
120 walk.nbytes - blocks * AES_BLOCK_SIZE); in __ecb_crypt()
168 while (walk.nbytes >= AES_BLOCK_SIZE) { in cbc_encrypt()
169 unsigned int blocks = walk.nbytes / AES_BLOCK_SIZE; in cbc_encrypt()
177 err = skcipher_walk_done(&walk, walk.nbytes % AES_BLOCK_SIZE); in cbc_encrypt()
191 while (walk.nbytes >= AES_BLOCK_SIZE) { in cbc_decrypt()
[all …]
Daes-ce-ccm-glue.c64 __be32 *n = (__be32 *)&maciv[AES_BLOCK_SIZE - 8]; in ccm_init_mac()
82 memcpy(maciv, req->iv, AES_BLOCK_SIZE - l); in ccm_init_mac()
95 memset(&req->iv[AES_BLOCK_SIZE - l], 0, l); in ccm_init_mac()
108 if (*macp > 0 && *macp < AES_BLOCK_SIZE) { in ccm_update_mac()
109 int added = min(abytes, AES_BLOCK_SIZE - *macp); in ccm_update_mac()
118 while (abytes >= AES_BLOCK_SIZE) { in ccm_update_mac()
120 crypto_xor(mac, in, AES_BLOCK_SIZE); in ccm_update_mac()
122 in += AES_BLOCK_SIZE; in ccm_update_mac()
123 abytes -= AES_BLOCK_SIZE; in ccm_update_mac()
177 u8 buf[AES_BLOCK_SIZE]; in ccm_crypt_fallback()
[all …]
Dghash-ce-glue.c241 aes_encrypt(&ctx->aes_key, key, (u8[AES_BLOCK_SIZE]){}); in gcm_setkey()
347 u8 buf[AES_BLOCK_SIZE]; in gcm_encrypt()
348 u8 iv[AES_BLOCK_SIZE]; in gcm_encrypt()
373 if (unlikely(nbytes > 0 && nbytes < AES_BLOCK_SIZE)) { in gcm_encrypt()
377 nbytes &= ~(AES_BLOCK_SIZE - 1); in gcm_encrypt()
390 if (unlikely(nbytes > 0 && nbytes < AES_BLOCK_SIZE)) in gcm_encrypt()
397 while (walk.nbytes >= AES_BLOCK_SIZE) { in gcm_encrypt()
398 int blocks = walk.nbytes / AES_BLOCK_SIZE; in gcm_encrypt()
405 crypto_xor_cpy(dst, src, buf, AES_BLOCK_SIZE); in gcm_encrypt()
406 crypto_inc(iv, AES_BLOCK_SIZE); in gcm_encrypt()
[all …]
/Linux-v5.15/arch/arm/crypto/
Daes-neonbs-glue.c49 u8 rk[13 * (8 * AES_BLOCK_SIZE) + 32] __aligned(AES_BLOCK_SIZE);
99 while (walk.nbytes >= AES_BLOCK_SIZE) { in __ecb_crypt()
100 unsigned int blocks = walk.nbytes / AES_BLOCK_SIZE; in __ecb_crypt()
104 walk.stride / AES_BLOCK_SIZE); in __ecb_crypt()
111 walk.nbytes - blocks * AES_BLOCK_SIZE); in __ecb_crypt()
173 while (walk.nbytes >= AES_BLOCK_SIZE) { in cbc_decrypt()
174 unsigned int blocks = walk.nbytes / AES_BLOCK_SIZE; in cbc_decrypt()
178 walk.stride / AES_BLOCK_SIZE); in cbc_decrypt()
186 walk.nbytes - blocks * AES_BLOCK_SIZE); in cbc_decrypt()
240 u8 buf[AES_BLOCK_SIZE]; in ctr_encrypt()
[all …]
Daes-ce-glue.c54 u8 b[AES_BLOCK_SIZE];
177 while ((blocks = (walk.nbytes / AES_BLOCK_SIZE))) { in ecb_encrypt()
182 err = skcipher_walk_done(&walk, walk.nbytes % AES_BLOCK_SIZE); in ecb_encrypt()
197 while ((blocks = (walk.nbytes / AES_BLOCK_SIZE))) { in ecb_decrypt()
202 err = skcipher_walk_done(&walk, walk.nbytes % AES_BLOCK_SIZE); in ecb_decrypt()
215 while ((blocks = (walk->nbytes / AES_BLOCK_SIZE))) { in cbc_encrypt_walk()
221 err = skcipher_walk_done(walk, walk->nbytes % AES_BLOCK_SIZE); in cbc_encrypt_walk()
245 while ((blocks = (walk->nbytes / AES_BLOCK_SIZE))) { in cbc_decrypt_walk()
251 err = skcipher_walk_done(walk, walk->nbytes % AES_BLOCK_SIZE); in cbc_decrypt_walk()
271 int cbc_blocks = DIV_ROUND_UP(req->cryptlen, AES_BLOCK_SIZE) - 2; in cts_cbc_encrypt()
[all …]
/Linux-v5.15/net/mac80211/
Dfils_aead.c28 u8 d[AES_BLOCK_SIZE], tmp[AES_BLOCK_SIZE] = {}; in aes_s2v()
35 crypto_shash_digest(desc, tmp, AES_BLOCK_SIZE, d); in aes_s2v()
41 crypto_xor(d, tmp, AES_BLOCK_SIZE); in aes_s2v()
46 if (len[i] >= AES_BLOCK_SIZE) { in aes_s2v()
49 crypto_shash_update(desc, addr[i], len[i] - AES_BLOCK_SIZE); in aes_s2v()
50 crypto_xor(d, addr[i] + len[i] - AES_BLOCK_SIZE, in aes_s2v()
51 AES_BLOCK_SIZE); in aes_s2v()
60 crypto_shash_finup(desc, d, AES_BLOCK_SIZE, v); in aes_s2v()
71 u8 v[AES_BLOCK_SIZE]; in aes_siv_encrypt()
106 memcpy(out, v, AES_BLOCK_SIZE); in aes_siv_encrypt()
[all …]
/Linux-v5.15/drivers/crypto/nx/
Dnx-aes-xcbc.c23 u8 state[AES_BLOCK_SIZE];
25 u8 buffer[AES_BLOCK_SIZE];
64 u8 keys[2][AES_BLOCK_SIZE]; in nx_xcbc_empty()
71 memcpy(key, csbcpb->cpb.aes_xcbc.key, AES_BLOCK_SIZE); in nx_xcbc_empty()
72 memcpy(csbcpb->cpb.aes_ecb.key, key, AES_BLOCK_SIZE); in nx_xcbc_empty()
107 memcpy(csbcpb->cpb.aes_ecb.key, keys[0], AES_BLOCK_SIZE); in nx_xcbc_empty()
114 len = AES_BLOCK_SIZE; in nx_xcbc_empty()
118 if (len != AES_BLOCK_SIZE) in nx_xcbc_empty()
132 memcpy(csbcpb->cpb.aes_xcbc.key, key, AES_BLOCK_SIZE); in nx_xcbc_empty()
189 if (total <= AES_BLOCK_SIZE) { in nx_xcbc_update()
[all …]
Dnx-aes-gcm.c112 if (nbytes <= AES_BLOCK_SIZE) { in nx_gca()
155 AES_BLOCK_SIZE); in nx_gca()
164 memcpy(out, csbcpb_aead->cpb.aes_gca.out_pat, AES_BLOCK_SIZE); in nx_gca()
192 memcpy(csbcpb->cpb.aes_gcm.iv_or_cnt, iv, AES_BLOCK_SIZE); in gmac()
224 csbcpb->cpb.aes_gcm.out_pat_or_mac, AES_BLOCK_SIZE); in gmac()
226 csbcpb->cpb.aes_gcm.out_s0, AES_BLOCK_SIZE); in gmac()
248 char out[AES_BLOCK_SIZE]; in gcm_empty()
266 len = AES_BLOCK_SIZE; in gcm_empty()
272 if (len != AES_BLOCK_SIZE) in gcm_empty()
376 memcpy(rctx->iv, csbcpb->cpb.aes_gcm.out_cnt, AES_BLOCK_SIZE); in gcm_aes_nx_crypt()
[all …]
Dnx-aes-ccm.c311 AES_BLOCK_SIZE); in generate_pat()
324 memcpy(out, result, AES_BLOCK_SIZE); in generate_pat()
384 memcpy(iv, csbcpb->cpb.aes_ccm.out_ctr, AES_BLOCK_SIZE); in ccm_nx_decrypt()
386 csbcpb->cpb.aes_ccm.out_pat_or_mac, AES_BLOCK_SIZE); in ccm_nx_decrypt()
388 csbcpb->cpb.aes_ccm.out_s0, AES_BLOCK_SIZE); in ccm_nx_decrypt()
453 memcpy(iv, csbcpb->cpb.aes_ccm.out_ctr, AES_BLOCK_SIZE); in ccm_nx_encrypt()
455 csbcpb->cpb.aes_ccm.out_pat_or_mac, AES_BLOCK_SIZE); in ccm_nx_encrypt()
457 csbcpb->cpb.aes_ccm.out_s0, AES_BLOCK_SIZE); in ccm_nx_encrypt()
540 .ivsize = AES_BLOCK_SIZE,
541 .maxauthsize = AES_BLOCK_SIZE,
[all …]
/Linux-v5.15/arch/powerpc/crypto/
Daes-spe-glue.c192 nbytes = round_down(nbytes, AES_BLOCK_SIZE); in ppc_ecb_crypt()
231 nbytes = round_down(nbytes, AES_BLOCK_SIZE); in ppc_cbc_crypt()
273 nbytes = round_down(nbytes, AES_BLOCK_SIZE); in ppc_ctr_crypt()
300 nbytes = round_down(nbytes, AES_BLOCK_SIZE); in ppc_xts_crypt()
324 int tail = req->cryptlen % AES_BLOCK_SIZE; in ppc_xts_encrypt()
325 int offset = req->cryptlen - tail - AES_BLOCK_SIZE; in ppc_xts_encrypt()
327 u8 b[2][AES_BLOCK_SIZE]; in ppc_xts_encrypt()
330 if (req->cryptlen < AES_BLOCK_SIZE) in ppc_xts_encrypt()
344 scatterwalk_map_and_copy(b[0], req->dst, offset, AES_BLOCK_SIZE, 0); in ppc_xts_encrypt()
346 scatterwalk_map_and_copy(b[0], req->src, offset + AES_BLOCK_SIZE, tail, 0); in ppc_xts_encrypt()
[all …]
/Linux-v5.15/arch/s390/crypto/
Daes_s390.c66 u8 buf[AES_BLOCK_SIZE];
113 cpacf_km(sctx->fc, &sctx->key, out, in, AES_BLOCK_SIZE); in crypto_aes_encrypt()
125 &sctx->key, out, in, AES_BLOCK_SIZE); in crypto_aes_decrypt()
159 .cra_blocksize = AES_BLOCK_SIZE,
236 n = nbytes & ~(AES_BLOCK_SIZE - 1); in ecb_aes_crypt()
285 .base.cra_blocksize = AES_BLOCK_SIZE,
326 u8 iv[AES_BLOCK_SIZE]; in cbc_aes_crypt()
336 memcpy(param.iv, walk.iv, AES_BLOCK_SIZE); in cbc_aes_crypt()
340 n = nbytes & ~(AES_BLOCK_SIZE - 1); in cbc_aes_crypt()
343 memcpy(walk.iv, param.iv, AES_BLOCK_SIZE); in cbc_aes_crypt()
[all …]
Dpaes_s390.c231 n = nbytes & ~(AES_BLOCK_SIZE - 1); in ecb_paes_crypt()
261 .base.cra_blocksize = AES_BLOCK_SIZE,
333 u8 iv[AES_BLOCK_SIZE]; in cbc_paes_crypt()
341 memcpy(param.iv, walk.iv, AES_BLOCK_SIZE); in cbc_paes_crypt()
348 n = nbytes & ~(AES_BLOCK_SIZE - 1); in cbc_paes_crypt()
352 memcpy(walk.iv, param.iv, AES_BLOCK_SIZE); in cbc_paes_crypt()
380 .base.cra_blocksize = AES_BLOCK_SIZE,
388 .ivsize = AES_BLOCK_SIZE,
525 n = nbytes & ~(AES_BLOCK_SIZE - 1); in xts_paes_crypt()
557 .base.cra_blocksize = AES_BLOCK_SIZE,
[all …]
/Linux-v5.15/drivers/crypto/ccp/
Dccp-crypto.h109 u8 k1[AES_BLOCK_SIZE];
110 u8 k2[AES_BLOCK_SIZE];
115 u8 iv[AES_BLOCK_SIZE];
118 u8 tag[AES_BLOCK_SIZE];
122 u8 rfc3686_iv[AES_BLOCK_SIZE];
142 u8 iv[AES_BLOCK_SIZE];
146 u8 buf[AES_BLOCK_SIZE];
150 u8 pad[AES_BLOCK_SIZE];
158 u8 iv[AES_BLOCK_SIZE];
161 u8 buf[AES_BLOCK_SIZE];
[all …]
Dccp-crypto-aes.c32 memcpy(req->iv, rctx->iv, AES_BLOCK_SIZE); in ccp_aes_complete()
79 (req->cryptlen & (AES_BLOCK_SIZE - 1))) in ccp_aes_crypt()
86 memcpy(rctx->iv, req->iv, AES_BLOCK_SIZE); in ccp_aes_crypt()
88 iv_len = AES_BLOCK_SIZE; in ccp_aes_crypt()
218 .base.cra_blocksize = AES_BLOCK_SIZE,
258 .blocksize = AES_BLOCK_SIZE,
267 .blocksize = AES_BLOCK_SIZE,
268 .ivsize = AES_BLOCK_SIZE,
277 .ivsize = AES_BLOCK_SIZE,
286 .ivsize = AES_BLOCK_SIZE,
[all …]
/Linux-v5.15/drivers/crypto/vmx/
Daes_ctr.c73 u8 keystream[AES_BLOCK_SIZE]; in p8_aes_ctr_final()
87 crypto_inc(ctrblk, AES_BLOCK_SIZE); in p8_aes_ctr_final()
107 while ((nbytes = walk.nbytes) >= AES_BLOCK_SIZE) { in p8_aes_ctr_crypt()
113 nbytes / AES_BLOCK_SIZE, in p8_aes_ctr_crypt()
120 crypto_inc(walk.iv, AES_BLOCK_SIZE); in p8_aes_ctr_crypt()
121 } while ((nbytes -= AES_BLOCK_SIZE) >= AES_BLOCK_SIZE); in p8_aes_ctr_crypt()
147 .ivsize = AES_BLOCK_SIZE,
148 .chunksize = AES_BLOCK_SIZE,
Daes_xts.c84 u8 tweak[AES_BLOCK_SIZE]; in p8_aes_xts_crypt()
87 if (req->cryptlen < AES_BLOCK_SIZE) in p8_aes_xts_crypt()
120 round_down(nbytes, AES_BLOCK_SIZE), in p8_aes_xts_crypt()
125 round_down(nbytes, AES_BLOCK_SIZE), in p8_aes_xts_crypt()
131 ret = skcipher_walk_done(&walk, nbytes % AES_BLOCK_SIZE); in p8_aes_xts_crypt()
152 .base.cra_blocksize = AES_BLOCK_SIZE,
161 .ivsize = AES_BLOCK_SIZE,
Daes_cbc.c95 round_down(nbytes, AES_BLOCK_SIZE), in p8_aes_cbc_crypt()
102 ret = skcipher_walk_done(&walk, nbytes % AES_BLOCK_SIZE); in p8_aes_cbc_crypt()
123 .base.cra_blocksize = AES_BLOCK_SIZE,
132 .ivsize = AES_BLOCK_SIZE,
/Linux-v5.15/drivers/crypto/
Dpadlock-aes.c36 #define ecb_fetch_bytes (ecb_fetch_blocks * AES_BLOCK_SIZE)
40 #define cbc_fetch_bytes (cbc_fetch_blocks * AES_BLOCK_SIZE)
218 u8 buf[AES_BLOCK_SIZE * (MAX_ECB_FETCH_BLOCKS - 1) + PADLOCK_ALIGNMENT - 1]; in ecb_crypt_copy()
221 memcpy(tmp, in, count * AES_BLOCK_SIZE); in ecb_crypt_copy()
232 u8 buf[AES_BLOCK_SIZE * (MAX_CBC_FETCH_BLOCKS - 1) + PADLOCK_ALIGNMENT - 1]; in cbc_crypt_copy()
235 memcpy(tmp, in, count * AES_BLOCK_SIZE); in cbc_crypt_copy()
329 .cra_blocksize = AES_BLOCK_SIZE,
359 nbytes / AES_BLOCK_SIZE); in ecb_aes_encrypt()
360 nbytes &= AES_BLOCK_SIZE - 1; in ecb_aes_encrypt()
384 nbytes / AES_BLOCK_SIZE); in ecb_aes_decrypt()
[all …]
Datmel-aes.c119 __be32 iv[AES_BLOCK_SIZE / sizeof(u32)];
132 __be32 j0[AES_BLOCK_SIZE / sizeof(u32)];
133 u32 tag[AES_BLOCK_SIZE / sizeof(u32)];
134 __be32 ghash[AES_BLOCK_SIZE / sizeof(u32)];
158 u8 lastc[AES_BLOCK_SIZE];
395 atmel_aes_read_n(dd, offset, value, SIZE_IN_WORDS(AES_BLOCK_SIZE)); in atmel_aes_read_block()
401 atmel_aes_write_n(dd, offset, value, SIZE_IN_WORDS(AES_BLOCK_SIZE)); in atmel_aes_write_block()
530 crypto_inc((u8 *)ctx->iv, AES_BLOCK_SIZE); in atmel_aes_ctr_update_req_iv()
613 dd->datalen -= AES_BLOCK_SIZE; in atmel_aes_cpu_transfer()
615 if (dd->datalen < AES_BLOCK_SIZE) in atmel_aes_cpu_transfer()
[all …]
/Linux-v5.15/arch/sparc/crypto/
Daes_glue.c235 round_down(nbytes, AES_BLOCK_SIZE)); in ecb_encrypt()
236 err = skcipher_walk_done(&walk, nbytes % AES_BLOCK_SIZE); in ecb_encrypt()
260 round_down(nbytes, AES_BLOCK_SIZE)); in ecb_decrypt()
261 err = skcipher_walk_done(&walk, nbytes % AES_BLOCK_SIZE); in ecb_decrypt()
284 round_down(nbytes, AES_BLOCK_SIZE), in cbc_encrypt()
286 err = skcipher_walk_done(&walk, nbytes % AES_BLOCK_SIZE); in cbc_encrypt()
310 round_down(nbytes, AES_BLOCK_SIZE), in cbc_decrypt()
312 err = skcipher_walk_done(&walk, nbytes % AES_BLOCK_SIZE); in cbc_decrypt()
323 u64 keystream[AES_BLOCK_SIZE / sizeof(u64)]; in ctr_crypt_final()
329 keystream, AES_BLOCK_SIZE); in ctr_crypt_final()
[all …]
/Linux-v5.15/arch/x86/crypto/
Daesni-intel_glue.c42 #define AES_BLOCK_MASK (~(AES_BLOCK_SIZE - 1))
293 nbytes &= AES_BLOCK_SIZE - 1; in ecb_encrypt()
315 nbytes &= AES_BLOCK_SIZE - 1; in ecb_decrypt()
337 nbytes &= AES_BLOCK_SIZE - 1; in cbc_encrypt()
359 nbytes &= AES_BLOCK_SIZE - 1; in cbc_decrypt()
370 int cbc_blocks = DIV_ROUND_UP(req->cryptlen, AES_BLOCK_SIZE) - 2; in cts_cbc_encrypt()
381 if (req->cryptlen <= AES_BLOCK_SIZE) { in cts_cbc_encrypt()
382 if (req->cryptlen < AES_BLOCK_SIZE) in cts_cbc_encrypt()
389 cbc_blocks * AES_BLOCK_SIZE, in cts_cbc_encrypt()
396 if (req->cryptlen == AES_BLOCK_SIZE) in cts_cbc_encrypt()
[all …]
/Linux-v5.15/drivers/crypto/ccree/
Dcc_aead.h17 #define CCM_CONFIG_BUF_SIZE (AES_BLOCK_SIZE * 3)
52 u8 ctr_iv[AES_BLOCK_SIZE] ____cacheline_aligned;
55 u8 gcm_iv_inc1[AES_BLOCK_SIZE] ____cacheline_aligned;
56 u8 gcm_iv_inc2[AES_BLOCK_SIZE] ____cacheline_aligned;
57 u8 hkey[AES_BLOCK_SIZE] ____cacheline_aligned;
/Linux-v5.15/drivers/crypto/keembay/
Dkeembay-ocs-aes-core.c97 u8 last_ct_blk[AES_BLOCK_SIZE];
105 u8 in_tag[AES_BLOCK_SIZE];
108 u8 out_tag[AES_BLOCK_SIZE];
230 u8 tmp_buf1[AES_BLOCK_SIZE], tmp_buf2[AES_BLOCK_SIZE]; in sg_swap_blocks()
236 sg_pcopy_to_buffer(sgl, nents, tmp_buf1, AES_BLOCK_SIZE, blk1_offset); in sg_swap_blocks()
237 sg_pcopy_to_buffer(sgl, nents, tmp_buf2, AES_BLOCK_SIZE, blk2_offset); in sg_swap_blocks()
238 sg_pcopy_from_buffer(sgl, nents, tmp_buf1, AES_BLOCK_SIZE, blk2_offset); in sg_swap_blocks()
239 sg_pcopy_from_buffer(sgl, nents, tmp_buf2, AES_BLOCK_SIZE, blk1_offset); in sg_swap_blocks()
264 if (req->cryptlen % AES_BLOCK_SIZE != 0) in kmb_ocs_sk_validate_input()
271 if (req->cryptlen % AES_BLOCK_SIZE != 0) in kmb_ocs_sk_validate_input()
[all …]
/Linux-v5.15/drivers/crypto/qat/qat_common/
Dqat_algs.c294 cipher_cd_ctrl->cipher_state_sz = AES_BLOCK_SIZE >> 3; in qat_alg_aead_init_enc_session()
381 cipher_cd_ctrl->cipher_state_sz = AES_BLOCK_SIZE >> 3; in qat_alg_aead_init_dec_session()
458 cd_ctrl->cipher_state_sz = AES_BLOCK_SIZE >> 3; in qat_alg_skcipher_init_com()
487 key = (u8 *)aes_expanded.key_enc + (AES_BLOCK_SIZE * nrounds); in qat_alg_xts_reverse_key()
488 memcpy(key_reverse, key, AES_BLOCK_SIZE); in qat_alg_xts_reverse_key()
492 key = (u8 *)aes_expanded.key_enc + (AES_BLOCK_SIZE * nrounds); in qat_alg_xts_reverse_key()
493 memcpy(key_reverse, key, AES_BLOCK_SIZE); in qat_alg_xts_reverse_key()
494 memcpy(key_reverse + AES_BLOCK_SIZE, key - AES_BLOCK_SIZE, in qat_alg_xts_reverse_key()
495 AES_BLOCK_SIZE); in qat_alg_xts_reverse_key()
854 memcpy(qat_req->iv, sreq->iv, AES_BLOCK_SIZE); in qat_alg_update_iv_ctr_mode()
[all …]

12345