Home
last modified time | relevance | path

Searched refs:iv_size (Results 1 – 10 of 10) sorted by relevance

/Linux-v5.10/drivers/md/
Ddm-crypt.c169 unsigned int iv_size; member
312 memset(iv, 0, cc->iv_size); in crypt_iv_plain_gen()
321 memset(iv, 0, cc->iv_size); in crypt_iv_plain64_gen()
330 memset(iv, 0, cc->iv_size); in crypt_iv_plain64be_gen()
332 *(__be64 *)&iv[cc->iv_size - sizeof(u64)] = cpu_to_be64(dmreq->iv_sector); in crypt_iv_plain64be_gen()
344 memset(iv, 0, cc->iv_size); in crypt_iv_essiv_gen()
389 memset(iv, 0, cc->iv_size - sizeof(u64)); /* rest is cleared below */ in crypt_iv_benbi_gen()
392 put_unaligned(val, (__be64 *)(iv + cc->iv_size - sizeof(u64))); in crypt_iv_benbi_gen()
400 memset(iv, 0, cc->iv_size); in crypt_iv_null_gen()
516 memcpy(iv, &md5state.hash, cc->iv_size); in crypt_iv_lmk_one()
[all …]
/Linux-v5.10/include/net/
Dtls.h229 u16 iv_size; member
512 prot->iv_size); in tls_advance_record_sn()
522 size_t pkt_len, iv_size = prot->iv_size; in tls_fill_prepend() local
526 pkt_len += iv_size; in tls_fill_prepend()
529 ctx->tx.iv + TLS_CIPHER_AES_GCM_128_SALT_SIZE, iv_size); in tls_fill_prepend()
/Linux-v5.10/drivers/s390/cio/
Dairq.c116 static inline unsigned long iv_size(unsigned long bits) in iv_size() function
138 size = iv_size(bits); in airq_iv_create()
208 cio_dma_free(iv->vector, iv_size(iv->bits)); in airq_iv_release()
/Linux-v5.10/drivers/net/ethernet/chelsio/inline_crypto/ch_ktls/
Dchcr_ktls.h50 u32 iv_size; member
Dchcr_ktls.c88 tx_info->iv_size = TLS_CIPHER_AES_GCM_128_IV_SIZE; in chcr_ktls_save_keys()
1179 cipher_start = TLS_HEADER_SIZE + tx_info->iv_size + 1; in chcr_ktls_xmit_wr_complete()
1358 (!tls_rec_offset ? TLS_HEADER_SIZE + tx_info->iv_size : 0); in chcr_ktls_xmit_wr_short()
1415 memcpy(pos + tx_info->salt_size, &iv_record, tx_info->iv_size); in chcr_ktls_xmit_wr_short()
1416 *(__be32 *)(pos + tx_info->salt_size + tx_info->iv_size) = in chcr_ktls_xmit_wr_short()
1418 (TLS_HEADER_SIZE + tx_info->iv_size)) / AES_BLOCK_LEN) : 0)); in chcr_ktls_xmit_wr_short()
1841 if (tls_rec_offset + data_len <= (TLS_HEADER_SIZE + tx_info->iv_size)) { in chcr_short_record_handler()
1859 if (tls_rec_offset < (TLS_HEADER_SIZE + tx_info->iv_size)) { in chcr_short_record_handler()
1866 (TLS_HEADER_SIZE + tx_info->iv_size)) in chcr_short_record_handler()
/Linux-v5.10/drivers/crypto/hisilicon/sec2/
Dsec_crypto.c1042 u32 iv_size = req->ctx->c_ctx.ivsize; in sec_update_iv() local
1061 sz = sg_pcopy_to_buffer(sgl, sg_nents(sgl), iv, iv_size, in sec_update_iv()
1062 cryptlen - iv_size); in sec_update_iv()
1063 if (unlikely(sz != iv_size)) in sec_update_iv()
1478 sec_max_key_size, ctx_init, ctx_exit, blk_size, iv_size)\ argument
1496 .ivsize = iv_size,\
1500 max_key_size, blk_size, iv_size) \ argument
1502 sec_skcipher_ctx_init, sec_skcipher_ctx_exit, blk_size, iv_size)
1602 ctx_exit, blk_size, iv_size, max_authsize)\ argument
1618 .ivsize = iv_size,\
/Linux-v5.10/net/tls/
Dtls_sw.c506 prot->iv_size + prot->salt_size); in tls_do_encryption()
1469 prot->iv_size); in decrypt_internal()
2080 cipher_overhead += prot->iv_size; in tls_read_size()
2304 u16 nonce_size, tag_size, iv_size, rec_seq_size, salt_size; in tls_set_sw_offload() local
2363 iv_size = TLS_CIPHER_AES_GCM_128_IV_SIZE; in tls_set_sw_offload()
2380 iv_size = TLS_CIPHER_AES_GCM_256_IV_SIZE; in tls_set_sw_offload()
2397 iv_size = TLS_CIPHER_AES_CCM_128_IV_SIZE; in tls_set_sw_offload()
2417 if (iv_size > MAX_IV_SIZE || nonce_size > MAX_IV_SIZE || in tls_set_sw_offload()
2438 prot->iv_size = iv_size; in tls_set_sw_offload()
2440 cctx->iv = kmalloc(iv_size + salt_size, GFP_KERNEL); in tls_set_sw_offload()
[all …]
Dtls_device.c1001 u16 nonce_size, tag_size, iv_size, rec_seq_size; in tls_set_device_offload() local
1039 iv_size = TLS_CIPHER_AES_GCM_128_IV_SIZE; in tls_set_device_offload()
1061 prot->iv_size = iv_size; in tls_set_device_offload()
1062 ctx->tx.iv = kmalloc(iv_size + TLS_CIPHER_AES_GCM_128_SALT_SIZE, in tls_set_device_offload()
1069 memcpy(ctx->tx.iv + TLS_CIPHER_AES_GCM_128_SALT_SIZE, iv, iv_size); in tls_set_device_offload()
/Linux-v5.10/drivers/crypto/
Dsa2ul.c88 u8 iv_size; member
563 if (cfg->iv_size) in sa_format_cmdl_gen()
564 auth_offset += cfg->iv_size; in sa_format_cmdl_gen()
579 if (cfg->iv_size) { in sa_format_cmdl_gen()
583 upd_info->enc_iv.size = cfg->iv_size; in sa_format_cmdl_gen()
586 SA_CMDL_HEADER_SIZE_BYTES + cfg->iv_size; in sa_format_cmdl_gen()
589 (SA_CTX_ENC_AUX2_OFFSET | (cfg->iv_size >> 3)); in sa_format_cmdl_gen()
590 total += SA_CMDL_HEADER_SIZE_BYTES + cfg->iv_size; in sa_format_cmdl_gen()
875 cfg.iv_size = crypto_skcipher_ivsize(tfm); in sa_cipher_setkey()
1440 cfg.iv_size = 0; in sa_sha_setup()
[all …]
/Linux-v5.10/net/tipc/
Dcrypto.c679 unsigned int iv_size, req_size; in tipc_aead_mem_alloc() local
683 iv_size = crypto_aead_ivsize(tfm); in tipc_aead_mem_alloc()
687 len += iv_size; in tipc_aead_mem_alloc()
700 *req = (struct aead_request *)PTR_ALIGN(*iv + iv_size, in tipc_aead_mem_alloc()