/linux-4.1.27/drivers/crypto/nx/ |
H A D | nx-aes-ccm.c | 149 static int generate_b0(u8 *iv, unsigned int assoclen, unsigned int authsize, generate_b0() argument 164 if (assoclen) generate_b0() 197 * assoclen is an unsigned int, thus it cannot hold a length generate_pat() 203 if (!req->assoclen) { generate_pat() 205 } else if (req->assoclen <= 14) { generate_pat() 211 iauth_len = req->assoclen; generate_pat() 212 } else if (req->assoclen <= 65280) { generate_pat() 226 rc = generate_b0(iv, req->assoclen, authsize, nbytes, b0); generate_pat() 236 if (req->assoclen <= 65280) { generate_pat() 237 *(u16 *)b1 = (u16)req->assoclen; generate_pat() 242 *(u32 *)&b1[2] = (u32)req->assoclen; generate_pat() 249 if (!req->assoclen) { generate_pat() 251 } else if (req->assoclen <= 14) { generate_pat() 283 atomic64_add(req->assoclen, &(nx_ctx->stats->aes_bytes)); generate_pat() 297 to_process = min_t(u32, req->assoclen - processed, generate_pat() 305 if ((to_process + processed) < req->assoclen) { generate_pat() 331 atomic64_add(req->assoclen, generate_pat() 335 } while (processed < req->assoclen); generate_pat()
|
H A D | nx-aes-gcm.c | 132 unsigned int nbytes = req->assoclen; nx_gca() 183 atomic64_add(req->assoclen, &(nx_ctx->stats->aes_bytes)); nx_gca() 199 unsigned int nbytes = req->assoclen; gmac() 254 atomic64_add(req->assoclen, &(nx_ctx->stats->aes_bytes)); gmac() 348 if (req->assoclen == 0) gcm_aes_nx_crypt() 359 csbcpb->cpb.aes_gcm.bit_length_aad = req->assoclen * 8; gcm_aes_nx_crypt() 360 if (req->assoclen) { gcm_aes_nx_crypt()
|
/linux-4.1.27/include/crypto/ |
H A D | aead.h | 93 unsigned int assoclen) aead_givcrypt_set_assoc() 95 aead_request_set_assoc(&req->areq, assoc, assoclen); aead_givcrypt_set_assoc() 91 aead_givcrypt_set_assoc(struct aead_givcrypt_request *req, struct scatterlist *assoc, unsigned int assoclen) aead_givcrypt_set_assoc() argument
|
/linux-4.1.27/crypto/ |
H A D | algif_aead.c | 360 size_t assoclen = 0; aead_recvmsg() local 455 assoclen = ctx->aead_assoclen; aead_recvmsg() 464 if (sg->length <= assoclen) { aead_recvmsg() 468 assoclen -= sg->length; aead_recvmsg() 471 } else if (!assoclen) { aead_recvmsg() 483 assoclen, sg->offset); aead_recvmsg() 486 sg->length -= assoclen; aead_recvmsg() 487 sg->offset += assoclen; aead_recvmsg()
|
H A D | gcm.c | 266 lengths.a = cpu_to_be64(req->assoclen * 8); gcm_hash_len() 411 remain = gcm_remain(req->assoclen); __gcm_hash_assoc_done() 435 if (!err && req->assoclen) { __gcm_hash_init_done() 436 remain = gcm_remain(req->assoclen); __gcm_hash_init_done() 440 req->assoc, req->assoclen); __gcm_hash_init_done() 475 remain = gcm_remain(req->assoclen); gcm_hash() 477 err = gcm_hash_update(req, pctx, compl, req->assoc, req->assoclen); gcm_hash() 914 aead_request_set_assoc(subreq, req->assoc, req->assoclen); crypto_rfc4106_crypt() 1130 unsigned int assoclen = req->assoclen; crypto_rfc4543_crypt() local 1156 assoclen += 8 + req->cryptlen - (enc ? 0 : authsize); crypto_rfc4543_crypt() 1158 if (req->assoc->length == req->assoclen) { crypto_rfc4543_crypt() 1163 BUG_ON(req->assoclen > sizeof(rctx->assocbuf)); crypto_rfc4543_crypt() 1166 req->assoclen, 0); crypto_rfc4543_crypt() 1169 sg_set_buf(assoc, rctx->assocbuf, req->assoclen); crypto_rfc4543_crypt() 1177 aead_request_set_assoc(subreq, assoc, assoclen); crypto_rfc4543_crypt()
|
H A D | ccm.c | 139 if (req->assoclen) format_input() 252 unsigned int assoclen = req->assoclen; crypto_ccm_auth() local 266 if (assoclen) { crypto_ccm_auth() 267 pctx->ilen = format_adata(idata, assoclen); crypto_ccm_auth() 268 get_data_to_compute(cipher, pctx, req->assoc, req->assoclen); crypto_ccm_auth() 697 aead_request_set_assoc(subreq, req->assoc, req->assoclen); crypto_rfc4309_crypt()
|
H A D | authenc.c | 278 ahash_request_set_crypt(ahreq, req->assoc, hash, req->assoclen); crypto_authenc_ahash_fb() 351 if (req->assoclen && sg_is_last(assoc)) { crypto_authenc_genicv() 357 cryptlen += req->assoclen; crypto_authenc_genicv() 506 if (req->assoclen && sg_is_last(assoc)) { crypto_authenc_iverify() 512 cryptlen += req->assoclen; crypto_authenc_iverify()
|
H A D | pcrypt.c | 178 aead_request_set_assoc(creq, req->assoc, req->assoclen); pcrypt_aead_encrypt() 220 aead_request_set_assoc(creq, req->assoc, req->assoclen); pcrypt_aead_decrypt() 263 aead_givcrypt_set_assoc(creq, areq->assoc, areq->assoclen); pcrypt_aead_givencrypt()
|
H A D | seqiv.c | 178 aead_request_set_assoc(subreq, areq->assoc, areq->assoclen); seqiv_aead_givencrypt()
|
/linux-4.1.27/net/ipv4/ |
H A D | esp4.c | 134 int assoclen; esp_output() local 162 assoclen = sizeof(*esph); esp_output() 169 assoclen += seqhilen; esp_output() 257 aead_givcrypt_set_assoc(req, asg, assoclen); esp_output() 380 int assoclen; esp_input() local 402 assoclen = sizeof(*esph); esp_input() 409 assoclen += seqhilen; esp_input() 445 aead_request_set_assoc(req, asg, assoclen); esp_input()
|
/linux-4.1.27/net/ipv6/ |
H A D | esp6.c | 160 int assoclen; esp6_output() local 189 assoclen = sizeof(*esph); esp6_output() 196 assoclen += seqhilen; esp6_output() 249 aead_givcrypt_set_assoc(req, asg, assoclen); esp6_output() 329 int assoclen; esp6_input() local 357 assoclen = sizeof(*esph); esp6_input() 364 assoclen += seqhilen; esp6_input() 399 aead_request_set_assoc(req, asg, assoclen); esp6_input()
|
/linux-4.1.27/arch/arm64/crypto/ |
H A D | aes-ce-ccm-glue.c | 99 if (req->assoclen) ccm_init_mac() 112 u32 len = req->assoclen; ccm_calculate_auth_mac() 165 if (req->assoclen) ccm_encrypt() 221 if (req->assoclen) ccm_decrypt()
|
/linux-4.1.27/net/mac802154/ |
H A D | llsec.c | 651 int authlen, assoclen, datalen, rc; llsec_do_encrypt_auth() local 664 assoclen = skb->mac_len; llsec_do_encrypt_auth() 673 assoclen += datalen; llsec_do_encrypt_auth() 684 aead_request_set_assoc(req, assoc, assoclen); llsec_do_encrypt_auth() 860 int authlen, datalen, assoclen, rc; llsec_do_decrypt_auth() local 873 assoclen = skb->mac_len; llsec_do_decrypt_auth() 882 assoclen += datalen - authlen; llsec_do_decrypt_auth() 890 aead_request_set_assoc(req, assoc, assoclen); llsec_do_decrypt_auth()
|
/linux-4.1.27/drivers/crypto/caam/ |
H A D | caamalg.c | 298 * assoclen = (assoclen + cryptlen) - cryptlen aead_null_set_sh_desc() 384 /* assoclen + cryptlen = seqinlen - ivsize - authsize */ aead_null_set_sh_desc() 387 /* assoclen = (assoclen + cryptlen) - cryptlen */ aead_null_set_sh_desc() 512 /* assoclen + cryptlen = seqinlen - ivsize */ aead_set_sh_desc() 515 /* assoclen = (assoclen + cryptlen) - cryptlen */ aead_set_sh_desc() 578 /* assoclen + cryptlen = seqinlen - ivsize - authsize */ aead_set_sh_desc() 581 /* assoclen = (assoclen + cryptlen) - cryptlen */ aead_set_sh_desc() 670 /* assoclen = seqinlen - (ivsize + cryptlen) */ aead_set_sh_desc() 783 /* assoclen + cryptlen = seqinlen - ivsize */ gcm_set_sh_desc() 786 /* assoclen = (assoclen + cryptlen) - cryptlen */ gcm_set_sh_desc() 797 /* if assoclen is ZERO, skip reading the assoc data */ gcm_set_sh_desc() 822 /* if assoclen is ZERO, jump to IV reading - is the only input data */ gcm_set_sh_desc() 889 /* assoclen + cryptlen = seqinlen - ivsize - icvsize */ gcm_set_sh_desc() 893 /* assoclen = (assoclen + cryptlen) - cryptlen */ gcm_set_sh_desc() 930 /* if assoclen is ZERO, jump to ICV reading */ gcm_set_sh_desc() 1014 /* assoclen + cryptlen = seqinlen - ivsize */ rfc4106_set_sh_desc() 1017 /* assoclen = (assoclen + cryptlen) - cryptlen */ rfc4106_set_sh_desc() 1086 /* assoclen + cryptlen = seqinlen - ivsize - icvsize */ rfc4106_set_sh_desc() 1090 /* assoclen = (assoclen + cryptlen) - cryptlen */ rfc4106_set_sh_desc() 1183 /* assoclen = seqinlen - (ivsize + cryptlen) */ rfc4106_set_sh_desc() 1311 /* assoclen = (seqinlen - ivsize) - cryptlen */ rfc4543_set_sh_desc() 1416 /* assoclen + cryptlen = (seqinlen - ivsize) - icvsize */ rfc4543_set_sh_desc() 1427 /* assoclen = (assoclen + cryptlen) - cryptlen */ rfc4543_set_sh_desc() 1558 /* assoclen = seqinlen - (ivsize + cryptlen) */ rfc4543_set_sh_desc() 2206 req->assoclen , 1); aead_encrypt_done() 2261 sizeof(struct iphdr) + req->assoclen + aead_decrypt_done() 2361 debug("assoclen %d cryptlen %d authsize %d\n", init_aead_job() 2362 req->assoclen, req->cryptlen, authsize); init_aead_job() 2365 req->assoclen , 1); init_aead_job() 2398 append_seq_in_ptr(desc, src_dma, req->assoclen + ivsize + req->cryptlen, init_aead_job() 2446 debug("assoclen %d cryptlen %d authsize %d\n", init_aead_giv_job() 2447 req->assoclen, req->cryptlen, authsize); init_aead_giv_job() 2450 req->assoclen , 1); init_aead_giv_job() 2480 append_seq_in_ptr(desc, src_dma, req->assoclen + ivsize + req->cryptlen, init_aead_giv_job() 2631 assoc_nents = sg_count(req->assoc, req->assoclen, &assoc_chained); aead_edesc_alloc() 2678 req->assoclen == sg_dma_address(req->src)); aead_edesc_alloc() 2681 req->assoclen == iv_dma && !src_nents && aead_edesc_alloc() 2858 assoc_nents = sg_count(req->assoc, req->assoclen, &assoc_chained); aead_giv_edesc_alloc() 2897 sg_dma_address(req->assoc) + req->assoclen != aead_giv_edesc_alloc() 2902 sg_dma_address(req->assoc) + req->assoclen != iv_dma || aead_giv_edesc_alloc()
|
/linux-4.1.27/arch/x86/crypto/ |
H A D | aesni-intel_glue.c | 1017 if (unlikely(req->assoclen != 8 && req->assoclen != 12)) __driver_rfc4106_encrypt() 1047 src = kmalloc(req->cryptlen + auth_tag_len + req->assoclen, __driver_rfc4106_encrypt() 1054 req->assoclen, 0); __driver_rfc4106_encrypt() 1059 ctx->hash_subkey, assoc, (unsigned long)req->assoclen, dst __driver_rfc4106_encrypt() 1102 (req->assoclen != 8 && req->assoclen != 12))) __driver_rfc4106_decrypt() 1137 src = kmalloc(req->cryptlen + req->assoclen, GFP_ATOMIC); __driver_rfc4106_decrypt() 1143 req->assoclen, 0); __driver_rfc4106_decrypt() 1148 ctx->hash_subkey, assoc, (unsigned long)req->assoclen, __driver_rfc4106_decrypt()
|
/linux-4.1.27/drivers/crypto/ |
H A D | ixp4xx_crypto.c | 1032 crypt->auth_len = req->assoclen + ivsize + cryptlen; aead_perform() 1041 buf = chainup_buffers(dev, req->assoc, req->assoclen, &src_hook, aead_perform() 1176 return aead_perform(req, 1, req->assoclen + ivsize, aead_encrypt() 1183 return aead_perform(req, 0, req->assoclen + ivsize, aead_decrypt() 1207 return aead_perform(&req->areq, 1, req->areq.assoclen, aead_givencrypt()
|
H A D | talitos.c | 800 else if (areq->assoclen) ipsec_esp_unmap() 960 desc->ptr[1].len = cpu_to_be16(areq->assoclen + ivsize); ipsec_esp() 971 areq->assoclen, tbl_ptr); ipsec_esp() 984 if (areq->assoclen) ipsec_esp() 1118 unsigned int assoclen, talitos_edesc_alloc() 1141 if (assoclen) { talitos_edesc_alloc() 1148 assoc_nents = sg_count(assoc, assoclen, &assoc_chained); talitos_edesc_alloc() 1153 if (assoc_nents || sg_dma_address(assoc) + assoclen != iv_dma) talitos_edesc_alloc() 1189 else if (assoclen) talitos_edesc_alloc() 1225 iv, areq->assoclen, areq->cryptlen, aead_edesc_alloc() 1113 talitos_edesc_alloc(struct device *dev, struct scatterlist *assoc, struct scatterlist *src, struct scatterlist *dst, u8 *iv, unsigned int assoclen, unsigned int cryptlen, unsigned int authsize, unsigned int ivsize, int icv_stashing, u32 cryptoflags, bool encrypt) talitos_edesc_alloc() argument
|
H A D | picoxcell_crypto.c | 348 sg_count(areq->assoc, areq->assoclen), DMA_TO_DEVICE); spacc_aead_make_ddts() 423 sg_count(areq->assoc, areq->assoclen), DMA_TO_DEVICE); spacc_aead_free_ddts() 616 assoc_len = aead_req->assoclen; spacc_aead_submit()
|
/linux-4.1.27/drivers/crypto/qat/qat_common/ |
H A D | qat_algs.c | 864 cipher_param->cipher_offset = areq->assoclen + AES_BLOCK_SIZE; qat_alg_aead_dec() 868 auth_param->auth_len = areq->assoclen + qat_alg_aead_dec() 911 cipher_param->cipher_offset = areq->assoclen; qat_alg_aead_enc_internal() 915 cipher_param->cipher_offset = areq->assoclen + AES_BLOCK_SIZE; qat_alg_aead_enc_internal() 918 auth_param->auth_len = areq->assoclen + areq->cryptlen + AES_BLOCK_SIZE; qat_alg_aead_enc_internal()
|
/linux-4.1.27/include/linux/ |
H A D | crypto.h | 181 * @assoclen: Length in bytes of associated data for authentication 192 unsigned int assoclen; member in struct:aead_request 1577 * @assoclen: number of bytes to process from @assoc 1584 unsigned int assoclen) aead_request_set_assoc() 1587 req->assoclen = assoclen; aead_request_set_assoc() 1582 aead_request_set_assoc(struct aead_request *req, struct scatterlist *assoc, unsigned int assoclen) aead_request_set_assoc() argument
|