Searched refs:auth_len (Results 1 – 9 of 9) sorted by relevance
| /Linux-v5.10/drivers/crypto/bcm/ |
| D | spu.c | 627 unsigned int auth_len; in spum_create_request() local 629 auth_len = real_db_size; in spum_create_request() 635 auth_len -= hash_parms->digestsize; in spum_create_request() 639 auth_len -= hash_parms->pad_len; in spum_create_request() 664 auth_offset, auth_len, cipher_offset, cipher_len); in spum_create_request() 774 auth_len = cipher_offset + aead_parms->data_pad_len; in spum_create_request() 789 bdesc->length_mac = cpu_to_be16(auth_len); in spum_create_request() 798 auth_len += spum_wordalign_padlen(auth_len); in spum_create_request() 800 bdesc->offset_icv = cpu_to_be16(auth_len); in spum_create_request()
|
| /Linux-v5.10/net/sctp/ |
| D | auth.c | 260 __u32 auth_len; in sctp_auth_asoc_set_secret() local 262 auth_len = first_vector->len + last_vector->len; in sctp_auth_asoc_set_secret() 264 auth_len += ep_key->key->len; in sctp_auth_asoc_set_secret() 266 secret = sctp_auth_create_key(auth_len, gfp); in sctp_auth_asoc_set_secret()
|
| D | output.c | 415 int auth_len = 0; in sctp_packet_pack() local 434 auth_len = padded; in sctp_packet_pack() 435 else if (auth_len + padded + packet->overhead > in sctp_packet_pack()
|
| /Linux-v5.10/drivers/crypto/ |
| D | sa2ul.c | 1380 size_t auth_len; in sa_sha_run() local 1382 auth_len = req->nbytes; in sa_sha_run() 1384 if (!auth_len) in sa_sha_run() 1387 if (auth_len > SA_MAX_DATA_SZ || in sa_sha_run() 1388 (auth_len >= SA_UNSAFE_DATA_SZ_MIN && in sa_sha_run() 1389 auth_len <= SA_UNSAFE_DATA_SZ_MAX)) { in sa_sha_run() 1398 subreq->nbytes = auth_len; in sa_sha_run() 1411 sa_req.size = auth_len; in sa_sha_run() 1412 sa_req.auth_size = auth_len; in sa_sha_run() 1674 u16 auth_len; in sa_aead_dma_in_callback() local [all …]
|
| D | ixp4xx_crypto.c | 126 u16 auth_len; /* Authentication data length */ member 130 u16 auth_len; /* Authentication data length */ member 641 crypt->auth_len = HMAC_PAD_BLOCKLEN; in register_chain_var() 1017 crypt->auth_len = req->assoclen + cryptlen; in aead_perform() 1021 buf = chainup_buffers(dev, req->src, crypt->auth_len, in aead_perform() 1041 buf = chainup_buffers(dev, req->dst, crypt->auth_len, in aead_perform()
|
| /Linux-v5.10/drivers/crypto/qat/qat_common/ |
| D | icp_qat_fw_la.h | 287 __u32 auth_len; member
|
| D | qat_algs.c | 855 auth_param->auth_len = areq->assoclen + cipher_param->cipher_length; in qat_alg_aead_dec() 902 auth_param->auth_len = areq->assoclen + areq->cryptlen; in qat_alg_aead_enc()
|
| /Linux-v5.10/net/key/ |
| D | af_key.c | 1619 int len, auth_len, enc_len, i; in compose_sadb_supported() local 1621 auth_len = xfrm_count_pfkey_auth_supported(); in compose_sadb_supported() 1622 if (auth_len) { in compose_sadb_supported() 1623 auth_len *= sizeof(struct sadb_alg); in compose_sadb_supported() 1624 auth_len += sizeof(struct sadb_supported); in compose_sadb_supported() 1633 len = enc_len + auth_len + sizeof(struct sadb_msg); in compose_sadb_supported() 1644 if (auth_len) { in compose_sadb_supported() 1648 sp = skb_put(skb, auth_len); in compose_sadb_supported() 1651 sp->sadb_supported_len = auth_len / sizeof(uint64_t); in compose_sadb_supported()
|
| /Linux-v5.10/fs/ubifs/ |
| D | journal.c | 727 int err, lnum, offs, compr_type, out_len, compr_len, auth_len; in ubifs_jnl_write_data() local 741 auth_len = ubifs_auth_node_sz(c); in ubifs_jnl_write_data() 743 data = kmalloc(dlen + auth_len, GFP_NOFS | __GFP_NOWARN); in ubifs_jnl_write_data() 783 write_len = ALIGN(dlen, 8) + auth_len; in ubifs_jnl_write_data()
|