/linux-4.1.27/crypto/ |
H A D | authencesn.c | 40 unsigned int cryptlen; member in struct:authenc_esn_request_ctx 109 areq_ctx->cryptlen); authenc_esn_geniv_ahash_update_done() 129 areq_ctx->cryptlen, authenc_esn_geniv_ahash_update_done() 159 areq_ctx->cryptlen, authenc_esn_geniv_ahash_update_done2() 180 areq_ctx->cryptlen, authenc_esn_geniv_ahash_done() 199 unsigned int cryptlen = req->cryptlen; authenc_esn_verify_ahash_update_done() local 205 areq_ctx->cryptlen); authenc_esn_verify_ahash_update_done() 227 cryptlen -= authsize; authenc_esn_verify_ahash_update_done() 229 scatterwalk_map_and_copy(ihash, areq_ctx->sg, areq_ctx->cryptlen, authenc_esn_verify_ahash_update_done() 241 cryptlen, req->iv); authenc_esn_verify_ahash_update_done() 260 unsigned int cryptlen = req->cryptlen; authenc_esn_verify_ahash_update_done2() local 276 cryptlen -= authsize; authenc_esn_verify_ahash_update_done2() 278 scatterwalk_map_and_copy(ihash, areq_ctx->sg, areq_ctx->cryptlen, authenc_esn_verify_ahash_update_done2() 290 cryptlen, req->iv); authenc_esn_verify_ahash_update_done2() 310 unsigned int cryptlen = req->cryptlen; authenc_esn_verify_ahash_done() local 316 cryptlen -= authsize; authenc_esn_verify_ahash_done() 318 scatterwalk_map_and_copy(ihash, areq_ctx->sg, areq_ctx->cryptlen, authenc_esn_verify_ahash_done() 330 cryptlen, req->iv); authenc_esn_verify_ahash_done() 366 ahash_request_set_crypt(ahreq, areq_ctx->sg, hash, areq_ctx->cryptlen); crypto_authenc_esn_ahash() 399 unsigned int cryptlen = req->cryptlen; crypto_authenc_esn_genicv() local 412 cryptlen += ivsize; crypto_authenc_esn_genicv() 433 areq_ctx->cryptlen = cryptlen; crypto_authenc_esn_genicv() 446 scatterwalk_map_and_copy(hash, dst, cryptlen, crypto_authenc_esn_genicv() 477 unsigned int cryptlen = req->cryptlen; crypto_authenc_esn_encrypt() local 486 ablkcipher_request_set_crypt(abreq, req->src, dst, cryptlen, req->iv); crypto_authenc_esn_encrypt() 523 skcipher_givcrypt_set_crypt(greq, areq->src, areq->dst, areq->cryptlen, crypto_authenc_esn_givencrypt() 551 scatterwalk_map_and_copy(ihash, areq_ctx->sg, areq_ctx->cryptlen, crypto_authenc_esn_verify() 557 unsigned int cryptlen) crypto_authenc_esn_iverify() 580 cryptlen += ivsize; crypto_authenc_esn_iverify() 601 areq_ctx->cryptlen = cryptlen; crypto_authenc_esn_iverify() 618 unsigned int cryptlen = req->cryptlen; crypto_authenc_esn_decrypt() local 623 if (cryptlen < authsize) crypto_authenc_esn_decrypt() 625 cryptlen -= authsize; crypto_authenc_esn_decrypt() 627 err = crypto_authenc_esn_iverify(req, iv, cryptlen); crypto_authenc_esn_decrypt() 634 ablkcipher_request_set_crypt(abreq, req->src, req->dst, cryptlen, iv); crypto_authenc_esn_decrypt() 556 crypto_authenc_esn_iverify(struct aead_request *req, u8 *iv, unsigned int cryptlen) crypto_authenc_esn_iverify() argument
|
H A D | authenc.c | 40 unsigned int cryptlen; member in struct:authenc_request_ctx 135 areq_ctx->cryptlen); authenc_geniv_ahash_update_done() 145 areq_ctx->cryptlen, authenc_geniv_ahash_update_done() 164 areq_ctx->cryptlen, authenc_geniv_ahash_done() 182 unsigned int cryptlen = req->cryptlen; authenc_verify_ahash_update_done() local 188 areq_ctx->cryptlen); authenc_verify_ahash_update_done() 198 cryptlen -= authsize; authenc_verify_ahash_update_done() 200 scatterwalk_map_and_copy(ihash, areq_ctx->sg, areq_ctx->cryptlen, authenc_verify_ahash_update_done() 212 cryptlen, req->iv); authenc_verify_ahash_update_done() 231 unsigned int cryptlen = req->cryptlen; authenc_verify_ahash_done() local 237 cryptlen -= authsize; authenc_verify_ahash_done() 239 scatterwalk_map_and_copy(ihash, areq_ctx->sg, areq_ctx->cryptlen, authenc_verify_ahash_done() 251 cryptlen, req->iv); authenc_verify_ahash_done() 287 areq_ctx->cryptlen); crypto_authenc_ahash_fb() 313 areq_ctx->cryptlen); crypto_authenc_ahash() 334 unsigned int cryptlen = req->cryptlen; crypto_authenc_genicv() local 348 cryptlen += ivsize; crypto_authenc_genicv() 357 cryptlen += req->assoclen; crypto_authenc_genicv() 360 areq_ctx->cryptlen = cryptlen; crypto_authenc_genicv() 370 scatterwalk_map_and_copy(hash, dst, cryptlen, crypto_authenc_genicv() 401 unsigned int cryptlen = req->cryptlen; crypto_authenc_encrypt() local 410 ablkcipher_request_set_crypt(abreq, req->src, dst, cryptlen, req->iv); crypto_authenc_encrypt() 447 skcipher_givcrypt_set_crypt(greq, areq->src, areq->dst, areq->cryptlen, crypto_authenc_givencrypt() 476 scatterwalk_map_and_copy(ihash, areq_ctx->sg, areq_ctx->cryptlen, crypto_authenc_verify() 482 unsigned int cryptlen) crypto_authenc_iverify() 503 cryptlen += ivsize; crypto_authenc_iverify() 512 cryptlen += req->assoclen; crypto_authenc_iverify() 515 areq_ctx->cryptlen = cryptlen; crypto_authenc_iverify() 526 unsigned int cryptlen = req->cryptlen; crypto_authenc_decrypt() local 531 if (cryptlen < authsize) crypto_authenc_decrypt() 533 cryptlen -= authsize; crypto_authenc_decrypt() 535 err = crypto_authenc_iverify(req, iv, cryptlen); crypto_authenc_decrypt() 542 ablkcipher_request_set_crypt(abreq, req->src, req->dst, cryptlen, iv); crypto_authenc_decrypt() 481 crypto_authenc_iverify(struct aead_request *req, u8 *iv, unsigned int cryptlen) crypto_authenc_iverify() argument
|
H A D | ccm.c | 124 unsigned int cryptlen) format_input() 142 return set_msg_len(info + 16 - l, cryptlen, l); format_input() 246 unsigned int cryptlen) crypto_ccm_auth() 258 err = format_input(odata, req, cryptlen); crypto_ccm_auth() 274 if (cryptlen) crypto_ccm_auth() 275 get_data_to_compute(cipher, pctx, plain, cryptlen); crypto_ccm_auth() 289 scatterwalk_map_and_copy(odata, req->dst, req->cryptlen, crypto_ccm_encrypt_done() 310 unsigned int cryptlen = req->cryptlen; crypto_ccm_encrypt() local 321 err = crypto_ccm_auth(req, req->src, cryptlen); crypto_ccm_encrypt() 345 ablkcipher_request_set_crypt(abreq, pctx->src, dst, cryptlen + 16, iv); crypto_ccm_encrypt() 351 scatterwalk_map_and_copy(odata, req->dst, cryptlen, crypto_ccm_encrypt() 363 unsigned int cryptlen = req->cryptlen - authsize; crypto_ccm_decrypt_done() local 366 err = crypto_ccm_auth(req, req->dst, cryptlen); crypto_ccm_decrypt_done() 381 unsigned int cryptlen = req->cryptlen; crypto_ccm_decrypt() local 387 if (cryptlen < authsize) crypto_ccm_decrypt() 389 cryptlen -= authsize; crypto_ccm_decrypt() 397 scatterwalk_map_and_copy(authtag, req->src, cryptlen, authsize, 0); crypto_ccm_decrypt() 416 ablkcipher_request_set_crypt(abreq, pctx->src, dst, cryptlen + 16, iv); crypto_ccm_decrypt() 421 err = crypto_ccm_auth(req, req->dst, cryptlen); crypto_ccm_decrypt() 696 aead_request_set_crypt(subreq, req->src, req->dst, req->cryptlen, iv); crypto_rfc4309_crypt() 123 format_input(u8 *info, struct aead_request *req, unsigned int cryptlen) format_input() argument 245 crypto_ccm_auth(struct aead_request *req, struct scatterlist *plain, unsigned int cryptlen) crypto_ccm_auth() argument
|
H A D | gcm.c | 61 unsigned int cryptlen; member in struct:crypto_gcm_ghash_ctx 191 unsigned int cryptlen) crypto_gcm_init_crypt() 216 cryptlen + sizeof(pctx->auth_tag), crypto_gcm_init_crypt() 267 lengths.b = cpu_to_be64(gctx->cryptlen * 8); gcm_hash_len() 356 remain = gcm_remain(gctx->cryptlen); __gcm_hash_crypt_done() 381 if (!err && gctx->cryptlen) { __gcm_hash_assoc_remain_done() 382 remain = gcm_remain(gctx->cryptlen); __gcm_hash_assoc_remain_done() 386 gctx->src, gctx->cryptlen); __gcm_hash_assoc_remain_done() 486 remain = gcm_remain(gctx->cryptlen); gcm_hash() 488 err = gcm_hash_update(req, pctx, compl, gctx->src, gctx->cryptlen); gcm_hash() 513 scatterwalk_map_and_copy(auth_tag, req->dst, req->cryptlen, gcm_enc_copy_hash() 552 crypto_gcm_init_crypt(abreq, req, req->cryptlen); crypto_gcm_encrypt() 557 gctx->cryptlen = req->cryptlen; crypto_gcm_encrypt() 581 unsigned int cryptlen = req->cryptlen - authsize; crypto_gcm_verify() local 584 scatterwalk_map_and_copy(iauth_tag, req->src, cryptlen, authsize, 0); crypto_gcm_verify() 608 crypto_gcm_init_crypt(abreq, req, gctx->cryptlen); gcm_dec_hash_done() 626 unsigned int cryptlen = req->cryptlen; crypto_gcm_decrypt() local 629 if (cryptlen < authsize) crypto_gcm_decrypt() 631 cryptlen -= authsize; crypto_gcm_decrypt() 634 gctx->cryptlen = cryptlen; crypto_gcm_decrypt() 643 crypto_gcm_init_crypt(abreq, req, cryptlen); crypto_gcm_decrypt() 913 aead_request_set_crypt(subreq, req->src, req->dst, req->cryptlen, iv); crypto_rfc4106_crypt() 1111 req->cryptlen, crypto_rfc4543_done() 1144 req->cryptlen - authsize, crypto_rfc4543_crypt() 1156 assoclen += 8 + req->cryptlen - (enc ? 0 : authsize); crypto_rfc4543_crypt() 1187 unsigned int nbytes = req->cryptlen - (enc ? 0 : authsize); crypto_rfc4543_copy_src_to_dst() 1213 scatterwalk_map_and_copy(rctx->auth_tag, req->dst, req->cryptlen, crypto_rfc4543_encrypt() 189 crypto_gcm_init_crypt(struct ablkcipher_request *ablk_req, struct aead_request *req, unsigned int cryptlen) crypto_gcm_init_crypt() argument
|
H A D | pcrypt.c | 177 req->cryptlen, req->iv); pcrypt_aead_encrypt() 219 req->cryptlen, req->iv); pcrypt_aead_decrypt() 262 areq->cryptlen, areq->iv); pcrypt_aead_givencrypt()
|
H A D | seqiv.c | 176 aead_request_set_crypt(subreq, areq->src, areq->dst, areq->cryptlen, seqiv_aead_givencrypt()
|
/linux-4.1.27/drivers/crypto/qce/ |
H A D | cipher.h | 42 * @cryptlen: crypto length 57 unsigned int cryptlen; member in struct:qce_cipher_reqctx
|
H A D | common.c | 198 unsigned int enckeylen, unsigned int cryptlen) qce_xtskey() 209 xtsdusize = min_t(u32, QCE_SECTOR_SIZE, cryptlen); qce_xtskey() 354 rctx->cryptlen); qce_setup_regs_ablkcipher() 375 qce_write(qce, REG_ENCR_SEG_SIZE, rctx->cryptlen); qce_setup_regs_ablkcipher() 197 qce_xtskey(struct qce_device *qce, const u8 *enckey, unsigned int enckeylen, unsigned int cryptlen) qce_xtskey() argument
|
H A D | ablkcipher.c | 77 rctx->cryptlen = req->nbytes; qce_ablkcipher_async_req_handle()
|
/linux-4.1.27/drivers/crypto/caam/ |
H A D | caamalg.c | 293 /* cryptlen = seqoutlen - authsize */ aead_null_set_sh_desc() 298 * assoclen = (assoclen + cryptlen) - cryptlen aead_null_set_sh_desc() 306 /* Prepare to read and write cryptlen bytes */ aead_null_set_sh_desc() 327 /* Read and write cryptlen bytes */ aead_null_set_sh_desc() 384 /* assoclen + cryptlen = seqinlen - ivsize - authsize */ aead_null_set_sh_desc() 387 /* assoclen = (assoclen + cryptlen) - cryptlen */ aead_null_set_sh_desc() 395 /* Prepare to read and write cryptlen bytes */ aead_null_set_sh_desc() 412 /* Read and write cryptlen bytes */ aead_null_set_sh_desc() 509 /* cryptlen = seqoutlen - authsize */ aead_set_sh_desc() 512 /* assoclen + cryptlen = seqinlen - ivsize */ aead_set_sh_desc() 515 /* assoclen = (assoclen + cryptlen) - cryptlen */ aead_set_sh_desc() 535 /* Read and write cryptlen bytes */ aead_set_sh_desc() 578 /* assoclen + cryptlen = seqinlen - ivsize - authsize */ aead_set_sh_desc() 581 /* assoclen = (assoclen + cryptlen) - cryptlen */ aead_set_sh_desc() 606 /* Read and write cryptlen bytes */ aead_set_sh_desc() 667 /* ivsize + cryptlen = seqoutlen - authsize */ aead_set_sh_desc() 670 /* assoclen = seqinlen - (ivsize + cryptlen) */ aead_set_sh_desc() 697 /* Will write ivsize + cryptlen */ aead_set_sh_desc() 704 /* Will read cryptlen */ aead_set_sh_desc() 780 /* cryptlen = seqoutlen - authsize */ gcm_set_sh_desc() 783 /* assoclen + cryptlen = seqinlen - ivsize */ gcm_set_sh_desc() 786 /* assoclen = (assoclen + cryptlen) - cryptlen */ gcm_set_sh_desc() 789 /* if cryptlen is ZERO jump to zero-payload commands */ gcm_set_sh_desc() 889 /* assoclen + cryptlen = seqinlen - ivsize - icvsize */ gcm_set_sh_desc() 893 /* assoclen = (assoclen + cryptlen) - cryptlen */ gcm_set_sh_desc() 901 /* jump to zero-payload command if cryptlen is zero */ gcm_set_sh_desc() 1010 /* cryptlen = seqoutlen - authsize */ rfc4106_set_sh_desc() 1014 /* assoclen + cryptlen = seqinlen - ivsize */ rfc4106_set_sh_desc() 1017 /* assoclen = (assoclen + cryptlen) - cryptlen */ rfc4106_set_sh_desc() 1031 /* Will read cryptlen bytes */ rfc4106_set_sh_desc() 1086 /* assoclen + cryptlen = seqinlen - ivsize - icvsize */ rfc4106_set_sh_desc() 1090 /* assoclen = (assoclen + cryptlen) - cryptlen */ rfc4106_set_sh_desc() 1094 /* Will write cryptlen bytes */ rfc4106_set_sh_desc() 1108 /* Will read cryptlen bytes */ rfc4106_set_sh_desc() 1180 /* ivsize + cryptlen = seqoutlen - authsize */ rfc4106_set_sh_desc() 1183 /* assoclen = seqinlen - (ivsize + cryptlen) */ rfc4106_set_sh_desc() 1186 /* Will write ivsize + cryptlen */ rfc4106_set_sh_desc() 1208 /* Will read cryptlen */ rfc4106_set_sh_desc() 1308 /* cryptlen = seqoutlen - authsize */ rfc4543_set_sh_desc() 1311 /* assoclen = (seqinlen - ivsize) - cryptlen */ rfc4543_set_sh_desc() 1329 /* Will read cryptlen bytes */ rfc4543_set_sh_desc() 1332 /* Will write cryptlen bytes */ rfc4543_set_sh_desc() 1354 /* Read and write cryptlen bytes */ rfc4543_set_sh_desc() 1416 /* assoclen + cryptlen = (seqinlen - ivsize) - icvsize */ rfc4543_set_sh_desc() 1427 /* assoclen = (assoclen + cryptlen) - cryptlen */ rfc4543_set_sh_desc() 1456 /* Will read cryptlen bytes */ rfc4543_set_sh_desc() 1459 /* Will write cryptlen bytes */ rfc4543_set_sh_desc() 1474 /* In-snoop cryptlen data */ rfc4543_set_sh_desc() 1555 /* ivsize + cryptlen = seqoutlen - authsize */ rfc4543_set_sh_desc() 1558 /* assoclen = seqinlen - (ivsize + cryptlen) */ rfc4543_set_sh_desc() 1561 /* Will write ivsize + cryptlen */ rfc4543_set_sh_desc() 1592 /* Will read cryptlen */ rfc4543_set_sh_desc() 1604 /* Read and write cryptlen bytes */ rfc4543_set_sh_desc() 2212 edesc->src_nents ? 100 : req->cryptlen + aead_encrypt_done() 2243 req->cryptlen - ctx->authsize, 1); aead_decrypt_done() 2262 ((req->cryptlen > 1500) ? 1500 : req->cryptlen) + aead_decrypt_done() 2361 debug("assoclen %d cryptlen %d authsize %d\n", init_aead_job() 2362 req->assoclen, req->cryptlen, authsize); init_aead_job() 2371 edesc->src_nents ? 100 : req->cryptlen, 1); init_aead_job() 2398 append_seq_in_ptr(desc, src_dma, req->assoclen + ivsize + req->cryptlen, init_aead_job() 2420 append_seq_out_ptr(desc, dst_dma, req->cryptlen + authsize, init_aead_job() 2423 append_seq_out_ptr(desc, dst_dma, req->cryptlen - authsize, init_aead_job() 2446 debug("assoclen %d cryptlen %d authsize %d\n", init_aead_giv_job() 2447 req->assoclen, req->cryptlen, authsize); init_aead_giv_job() 2455 edesc->src_nents > 1 ? 100 : req->cryptlen, 1); init_aead_giv_job() 2480 append_seq_in_ptr(desc, src_dma, req->assoclen + ivsize + req->cryptlen, init_aead_giv_job() 2499 append_seq_out_ptr(desc, dst_dma, ivsize + req->cryptlen + authsize, init_aead_giv_job() 2634 src_nents = sg_count(req->src, req->cryptlen, &src_chained); aead_edesc_alloc() 2636 req->cryptlen + aead_edesc_alloc() 2641 req->cryptlen + aead_edesc_alloc() 2811 req->cryptlen, 1); aead_decrypt() 2859 src_nents = sg_count(req->src, req->cryptlen, &src_chained); aead_giv_edesc_alloc() 2862 dst_nents = sg_count(req->dst, req->cryptlen + ctx->authsize, aead_giv_edesc_alloc() 3023 req->cryptlen, 1); aead_givencrypt()
|
/linux-4.1.27/arch/arm64/crypto/ |
H A D | aes-ce-ccm-glue.c | 156 u32 len = req->cryptlen; ccm_encrypt() 197 scatterwalk_map_and_copy(mac, req->dst, req->cryptlen, ccm_encrypt() 212 u32 len = req->cryptlen - authsize; ccm_decrypt() 253 scatterwalk_map_and_copy(buf, req->src, req->cryptlen - authsize, ccm_decrypt()
|
/linux-4.1.27/drivers/crypto/ |
H A D | ixp4xx_crypto.c | 342 int decryptlen = req->cryptlen - authsize; finish_scattered_hmac() 998 unsigned int cryptlen; aead_perform() local 1012 cryptlen = req->cryptlen; aead_perform() 1015 /* req->cryptlen includes the authsize when decrypting */ aead_perform() 1016 cryptlen = req->cryptlen -authsize; aead_perform() 1032 crypt->auth_len = req->assoclen + ivsize + cryptlen; aead_perform() 1054 if (unlikely(hmac_inconsistent(req->src, cryptlen, authsize))) { aead_perform() 1063 req->src, cryptlen, authsize, 0); aead_perform() 1070 buf = chainup_buffers(dev, req->src, cryptlen + authsize, buf, flags, aead_perform() 1177 req->cryptlen, req->iv); aead_encrypt() 1184 req->cryptlen, req->iv); aead_decrypt() 1208 req->areq.cryptlen +ivsize, req->giv); aead_givencrypt()
|
H A D | talitos.c | 903 * stop at cryptlen bytes 906 int cryptlen, struct talitos_ptr *link_tbl_ptr) sg_to_link_tbl() 915 cryptlen -= sg_dma_len(sg); sg_to_link_tbl() 919 /* adjust (decrease) last one (or two) entry's len to cryptlen */ sg_to_link_tbl() 921 while (be16_to_cpu(link_tbl_ptr->len) <= (-cryptlen)) { sg_to_link_tbl() 923 cryptlen += be16_to_cpu(link_tbl_ptr->len); sg_to_link_tbl() 929 + cryptlen); sg_to_link_tbl() 949 unsigned int cryptlen = areq->cryptlen; ipsec_esp() local 1006 * map and adjust cipher len to aead request cryptlen. ipsec_esp() 1010 desc->ptr[4].len = cpu_to_be16(cryptlen); ipsec_esp() 1021 sg_link_tbl_len = cryptlen; ipsec_esp() 1024 sg_link_tbl_len = cryptlen + authsize; ipsec_esp() 1042 desc->ptr[5].len = cpu_to_be16(cryptlen); ipsec_esp() 1058 sg_count = sg_to_link_tbl(areq->dst, sg_count, cryptlen, ipsec_esp() 1119 unsigned int cryptlen, talitos_edesc_alloc() 1133 if (cryptlen + authsize > TALITOS_MAX_DATA_LEN) { talitos_edesc_alloc() 1158 src_nents = sg_count(src, cryptlen + authsize, &src_chained); talitos_edesc_alloc() 1162 src_nents = sg_count(src, cryptlen + (encrypt ? 0 : authsize), talitos_edesc_alloc() 1165 dst_nents = sg_count(dst, cryptlen + (encrypt ? authsize : 0), talitos_edesc_alloc() 1225 iv, areq->assoclen, areq->cryptlen, aead_edesc_alloc() 1257 req->cryptlen -= authsize; aead_decrypt() 1372 unsigned int cryptlen = areq->nbytes; common_nonsnoop() local 1393 desc->ptr[3].len = cpu_to_be16(cryptlen); common_nonsnoop() 1404 sg_count = sg_to_link_tbl(areq->src, sg_count, cryptlen, common_nonsnoop() 1420 desc->ptr[4].len = cpu_to_be16(cryptlen); common_nonsnoop() 1438 sg_count = sg_to_link_tbl(areq->dst, sg_count, cryptlen, common_nonsnoop() 905 sg_to_link_tbl(struct scatterlist *sg, int sg_count, int cryptlen, struct talitos_ptr *link_tbl_ptr) sg_to_link_tbl() argument 1113 talitos_edesc_alloc(struct device *dev, struct scatterlist *assoc, struct scatterlist *src, struct scatterlist *dst, u8 *iv, unsigned int assoclen, unsigned int cryptlen, unsigned int authsize, unsigned int ivsize, int icv_stashing, u32 cryptoflags, bool encrypt) talitos_edesc_alloc() argument
|
H A D | picoxcell_crypto.c | 328 unsigned nents = sg_count(areq->src, areq->cryptlen); spacc_aead_make_ddts() 412 unsigned nents = sg_count(areq->src, areq->cryptlen); spacc_aead_free_ddts() 417 sg_count(areq->dst, areq->cryptlen), spacc_aead_free_ddts() 617 proc_len = aead_req->cryptlen + assoc_len; spacc_aead_submit()
|
/linux-4.1.27/drivers/crypto/nx/ |
H A D | nx-aes-ccm.c | 150 unsigned int cryptlen, u8 *b0) generate_b0() 167 rc = set_msg_len(b0 + 16 - l, cryptlen, l); generate_b0() 350 unsigned int nbytes = req->cryptlen; ccm_nx_decrypt() 427 unsigned int nbytes = req->cryptlen; ccm_nx_encrypt() 149 generate_b0(u8 *iv, unsigned int assoclen, unsigned int authsize, unsigned int cryptlen, u8 *b0) generate_b0() argument
|
H A D | nx-aes-gcm.c | 336 unsigned int nbytes = req->cryptlen; gcm_aes_nx_crypt()
|
/linux-4.1.27/arch/x86/crypto/ |
H A D | aesni-intel_glue.c | 1047 src = kmalloc(req->cryptlen + auth_tag_len + req->assoclen, __driver_rfc4106_encrypt() 1051 assoc = (src + req->cryptlen + auth_tag_len); __driver_rfc4106_encrypt() 1052 scatterwalk_map_and_copy(src, req->src, 0, req->cryptlen, 0); __driver_rfc4106_encrypt() 1058 aesni_gcm_enc_tfm(aes_ctx, dst, src, (unsigned long)req->cryptlen, iv, __driver_rfc4106_encrypt() 1060 + ((unsigned long)req->cryptlen), auth_tag_len); __driver_rfc4106_encrypt() 1075 req->cryptlen + auth_tag_len, 1); __driver_rfc4106_encrypt() 1101 if (unlikely((req->cryptlen < auth_tag_len) || __driver_rfc4106_decrypt() 1115 tempCipherLen = (unsigned long)(req->cryptlen - auth_tag_len); __driver_rfc4106_decrypt() 1137 src = kmalloc(req->cryptlen + req->assoclen, GFP_ATOMIC); __driver_rfc4106_decrypt() 1140 assoc = (src + req->cryptlen); __driver_rfc4106_decrypt() 1141 scatterwalk_map_and_copy(src, req->src, 0, req->cryptlen, 0); __driver_rfc4106_decrypt()
|
/linux-4.1.27/drivers/crypto/qat/qat_common/ |
H A D | qat_algs.c | 863 cipher_param->cipher_length = areq->cryptlen - digst_size; qat_alg_aead_dec() 910 cipher_param->cipher_length = areq->cryptlen + AES_BLOCK_SIZE; qat_alg_aead_enc_internal() 914 cipher_param->cipher_length = areq->cryptlen; qat_alg_aead_enc_internal() 918 auth_param->auth_len = areq->assoclen + areq->cryptlen + AES_BLOCK_SIZE; qat_alg_aead_enc_internal()
|
/linux-4.1.27/include/linux/ |
H A D | crypto.h | 182 * @cryptlen: Length of data to be encrypted or decrypted 193 unsigned int cryptlen; member in struct:aead_request 1421 if (req->cryptlen < crypto_aead_authsize(crypto_aead_reqtfm(req))) crypto_aead_decrypt() 1537 * @cryptlen: number of bytes to process from @src 1565 unsigned int cryptlen, u8 *iv) aead_request_set_crypt() 1569 req->cryptlen = cryptlen; aead_request_set_crypt() 1562 aead_request_set_crypt(struct aead_request *req, struct scatterlist *src, struct scatterlist *dst, unsigned int cryptlen, u8 *iv) aead_request_set_crypt() argument
|