/linux-4.1.27/drivers/s390/cio/ |
D | airq.c | 123 struct airq_iv *iv; in airq_iv_create() local 126 iv = kzalloc(sizeof(*iv), GFP_KERNEL); in airq_iv_create() 127 if (!iv) in airq_iv_create() 129 iv->bits = bits; in airq_iv_create() 131 iv->vector = kzalloc(size, GFP_KERNEL); in airq_iv_create() 132 if (!iv->vector) in airq_iv_create() 135 iv->avail = kmalloc(size, GFP_KERNEL); in airq_iv_create() 136 if (!iv->avail) in airq_iv_create() 138 memset(iv->avail, 0xff, size); in airq_iv_create() 139 iv->end = 0; in airq_iv_create() [all …]
|
/linux-4.1.27/arch/s390/include/asm/ |
D | airq.h | 46 void airq_iv_release(struct airq_iv *iv); 47 unsigned long airq_iv_alloc(struct airq_iv *iv, unsigned long num); 48 void airq_iv_free(struct airq_iv *iv, unsigned long bit, unsigned long num); 49 unsigned long airq_iv_scan(struct airq_iv *iv, unsigned long start, 52 static inline unsigned long airq_iv_alloc_bit(struct airq_iv *iv) in airq_iv_alloc_bit() argument 54 return airq_iv_alloc(iv, 1); in airq_iv_alloc_bit() 57 static inline void airq_iv_free_bit(struct airq_iv *iv, unsigned long bit) in airq_iv_free_bit() argument 59 airq_iv_free(iv, bit, 1); in airq_iv_free_bit() 62 static inline unsigned long airq_iv_end(struct airq_iv *iv) in airq_iv_end() argument 64 return iv->end; in airq_iv_end() [all …]
|
/linux-4.1.27/crypto/ |
D | testmgr.h | 51 char *iv; member 66 char *iv; member 3275 .iv = "\xfe\xdc\xba\x98\x76\x54\x32\x10", 3287 .iv = "\x12\x34\x56\x78\x90\xab\xcd\xef", 3295 .iv = "\xe5\xc7\xcd\xde\x87\x2b\xf2\x7c", 3303 .iv = "\x43\xe9\x34\x00\x8c\x38\x9c\x0f", 3312 .iv = "\xfe\xdc\xba\x98\x76\x54\x32\x10", 3326 .iv = "\xE7\x82\x1D\xB8\x53\x11\xAC\x47", 3401 .iv = "\x12\x34\x56\x78\x90\xab\xcd\xef", 3409 .iv = "\xe5\xc7\xcd\xde\x87\x2b\xf2\x7c", [all …]
|
D | pcbc.c | 55 u8 *iv = walk->iv; in crypto_pcbc_encrypt_segment() local 58 crypto_xor(iv, src, bsize); in crypto_pcbc_encrypt_segment() 59 fn(crypto_cipher_tfm(tfm), dst, iv); in crypto_pcbc_encrypt_segment() 60 memcpy(iv, dst, bsize); in crypto_pcbc_encrypt_segment() 61 crypto_xor(iv, src, bsize); in crypto_pcbc_encrypt_segment() 79 u8 *iv = walk->iv; in crypto_pcbc_encrypt_inplace() local 84 crypto_xor(iv, src, bsize); in crypto_pcbc_encrypt_inplace() 85 fn(crypto_cipher_tfm(tfm), src, iv); in crypto_pcbc_encrypt_inplace() 86 memcpy(iv, tmpbuf, bsize); in crypto_pcbc_encrypt_inplace() 87 crypto_xor(iv, src, bsize); in crypto_pcbc_encrypt_inplace() [all …]
|
D | cbc.c | 52 u8 *iv = walk->iv; in crypto_cbc_encrypt_segment() local 55 crypto_xor(iv, src, bsize); in crypto_cbc_encrypt_segment() 56 fn(crypto_cipher_tfm(tfm), dst, iv); in crypto_cbc_encrypt_segment() 57 memcpy(iv, dst, bsize); in crypto_cbc_encrypt_segment() 75 u8 *iv = walk->iv; in crypto_cbc_encrypt_inplace() local 78 crypto_xor(src, iv, bsize); in crypto_cbc_encrypt_inplace() 80 iv = src; in crypto_cbc_encrypt_inplace() 85 memcpy(walk->iv, iv, bsize); in crypto_cbc_encrypt_inplace() 124 u8 *iv = walk->iv; in crypto_cbc_decrypt_segment() local 128 crypto_xor(dst, iv, bsize); in crypto_cbc_decrypt_segment() [all …]
|
D | lrw.c | 105 static inline void inc(be128 *iv) in inc() argument 107 be64_add_cpu(&iv->b, 1); in inc() 108 if (!iv->b) in inc() 109 be64_add_cpu(&iv->a, 1); in inc() 149 be128 *iv; in crypt() local 161 iv = (be128 *)w->iv; in crypt() 162 s.t = *iv; in crypt() 174 &ctx->table.mulinc[get_index128(iv)]); in crypt() 175 inc(iv); in crypt() 226 be128 *iv, *src, *dst, *t; in lrw_crypt() local [all …]
|
D | cts.c | 85 u8 iv[bsize]; in cts_cbc_encrypt() local 98 memcpy(iv, desc->info, bsize); in cts_cbc_encrypt() 101 lcldesc.info = iv; in cts_cbc_encrypt() 171 u8 iv[bsize]; in cts_cbc_decrypt() local 184 lcldesc.info = iv; in cts_cbc_decrypt() 188 memset(iv, 0, sizeof(iv)); in cts_cbc_decrypt() 195 memset(iv, 0, sizeof(iv)); in cts_cbc_decrypt() 196 memcpy(iv, s + bsize, lastn); in cts_cbc_decrypt() 198 crypto_xor(tmp, iv, bsize); in cts_cbc_decrypt() 205 memzero_explicit(iv, sizeof(iv)); in cts_cbc_decrypt()
|
D | ccm.c | 127 unsigned int lp = req->iv[0]; in format_input() 133 memcpy(info, req->iv, 16); in format_input() 294 static inline int crypto_ccm_check_iv(const u8 *iv) in crypto_ccm_check_iv() argument 297 if (1 > iv[0] || iv[0] > 7) in crypto_ccm_check_iv() 312 u8 *iv = req->iv; in crypto_ccm_encrypt() local 315 err = crypto_ccm_check_iv(iv); in crypto_ccm_encrypt() 328 memset(iv + 15 - iv[0], 0, iv[0] + 1); in crypto_ccm_encrypt() 345 ablkcipher_request_set_crypt(abreq, pctx->src, dst, cryptlen + 16, iv); in crypto_ccm_encrypt() 384 u8 *iv = req->iv; in crypto_ccm_decrypt() local 391 err = crypto_ccm_check_iv(iv); in crypto_ccm_decrypt() [all …]
|
D | authenc.c | 212 cryptlen, req->iv); in authenc_verify_ahash_update_done() 251 cryptlen, req->iv); in authenc_verify_ahash_done() 324 static int crypto_authenc_genicv(struct aead_request *req, u8 *iv, in crypto_authenc_genicv() argument 345 sg_set_buf(cipher, iv, ivsize); in crypto_authenc_genicv() 346 scatterwalk_crypto_chain(cipher, dst, vdst == iv + ivsize, 2); in crypto_authenc_genicv() 386 u8 *iv = (u8 *)abreq - crypto_ablkcipher_ivsize(ctx->enc); in crypto_authenc_encrypt_done() local 388 err = crypto_authenc_genicv(areq, iv, 0); in crypto_authenc_encrypt_done() 404 u8 *iv = (u8 *)abreq - crypto_ablkcipher_ivsize(enc); in crypto_authenc_encrypt() local 410 ablkcipher_request_set_crypt(abreq, req->src, dst, cryptlen, req->iv); in crypto_authenc_encrypt() 412 memcpy(iv, req->iv, crypto_aead_ivsize(authenc)); in crypto_authenc_encrypt() [all …]
|
D | chainiv.c | 33 char iv[]; member 45 char iv[]; member 68 memcpy(req->giv, ctx->iv, ivsize); in chainiv_givencrypt() 69 memcpy(subreq->info, ctx->iv, ivsize); in chainiv_givencrypt() 75 memcpy(ctx->iv, subreq->info, ivsize); in chainiv_givencrypt() 95 err = crypto_rng_get_bytes(crypto_default_rng, ctx->iv, in chainiv_givencrypt_first() 168 memcpy(req->giv, ctx->iv, ivsize); in async_chainiv_givencrypt_tail() 169 memcpy(subreq->info, ctx->iv, ivsize); in async_chainiv_givencrypt_tail() 175 memcpy(ctx->iv, subreq->info, ivsize); in async_chainiv_givencrypt_tail() 222 err = crypto_rng_get_bytes(crypto_default_rng, ctx->iv, in async_chainiv_givencrypt_first()
|
D | authencesn.c | 241 cryptlen, req->iv); in authenc_esn_verify_ahash_update_done() 290 cryptlen, req->iv); in authenc_esn_verify_ahash_update_done2() 330 cryptlen, req->iv); in authenc_esn_verify_ahash_done() 386 static int crypto_authenc_esn_genicv(struct aead_request *req, u8 *iv, in crypto_authenc_esn_genicv() argument 409 sg_set_buf(cipher, iv, ivsize); in crypto_authenc_esn_genicv() 410 scatterwalk_crypto_chain(cipher, dst, vdst == iv + ivsize, 2); in crypto_authenc_esn_genicv() 461 u8 *iv = (u8 *)(abreq + 1) + in crypto_authenc_esn_encrypt_done() local 464 err = crypto_authenc_esn_genicv(areq, iv, 0); in crypto_authenc_esn_encrypt_done() 480 u8 *iv = (u8 *)abreq - crypto_ablkcipher_ivsize(enc); in crypto_authenc_esn_encrypt() local 486 ablkcipher_request_set_crypt(abreq, req->src, dst, cryptlen, req->iv); in crypto_authenc_esn_encrypt() [all …]
|
D | ablkcipher.c | 141 if (walk->iv != req->info) in ablkcipher_walk_done() 142 memcpy(req->info, walk->iv, tfm->crt_ablkcipher.ivsize); in ablkcipher_walk_done() 198 u8 *iv; in ablkcipher_copy_iv() local 205 iv = (u8 *)ALIGN((unsigned long)walk->iv_buffer, alignmask + 1); in ablkcipher_copy_iv() 206 iv = ablkcipher_get_spot(iv, bs) + aligned_bs; in ablkcipher_copy_iv() 207 iv = ablkcipher_get_spot(iv, bs) + aligned_bs; in ablkcipher_copy_iv() 208 iv = ablkcipher_get_spot(iv, ivsize); in ablkcipher_copy_iv() 210 walk->iv = memcpy(iv, walk->iv, ivsize); in ablkcipher_copy_iv() 285 walk->iv = req->info; in ablkcipher_walk_first() 286 if (unlikely(((unsigned long)walk->iv & alignmask))) { in ablkcipher_walk_first()
|
D | algif_aead.c | 41 void *iv; member 197 if (con.iv && con.iv->ivlen != ivsize) in aead_sendmsg() 207 if (con.iv) in aead_sendmsg() 208 memcpy(ctx->iv, con.iv->iv, ivsize); in aead_sendmsg() 494 ctx->iv); in aead_recvmsg() 592 sock_kzfree_s(sk, ctx->iv, ivlen); in aead_sock_destruct() 609 ctx->iv = sock_kmalloc(sk, ivlen, GFP_KERNEL); in aead_accept_parent() 610 if (!ctx->iv) { in aead_accept_parent() 614 memset(ctx->iv, 0, ivlen); in aead_accept_parent()
|
D | blkcipher.c | 135 if (walk->iv != desc->info) in blkcipher_walk_done() 136 memcpy(desc->info, walk->iv, walk->ivsize); in blkcipher_walk_done() 282 u8 *iv; in blkcipher_copy_iv() local 289 iv = (u8 *)ALIGN((unsigned long)walk->buffer, walk->alignmask + 1); in blkcipher_copy_iv() 290 iv = blkcipher_get_spot(iv, bs) + aligned_bs; in blkcipher_copy_iv() 291 iv = blkcipher_get_spot(iv, bs) + aligned_bs; in blkcipher_copy_iv() 292 iv = blkcipher_get_spot(iv, walk->ivsize); in blkcipher_copy_iv() 294 walk->iv = memcpy(iv, walk->iv, walk->ivsize); in blkcipher_copy_iv() 333 walk->iv = desc->info; in blkcipher_walk_first() 334 if (unlikely(((unsigned long)walk->iv & walk->alignmask))) { in blkcipher_walk_first() [all …]
|
D | ctr.c | 34 u8 iv[CTR_RFC3686_BLOCK_SIZE]; member 60 u8 *ctrblk = walk->iv; in crypto_ctr_crypt_final() 80 u8 *ctrblk = walk->iv; in crypto_ctr_crypt_segment() 108 u8 *ctrblk = walk->iv; in crypto_ctr_crypt_inplace() 287 u8 *iv = rctx->iv; in crypto_rfc3686_crypt() local 290 memcpy(iv, ctx->nonce, CTR_RFC3686_NONCE_SIZE); in crypto_rfc3686_crypt() 291 memcpy(iv + CTR_RFC3686_NONCE_SIZE, req->info, CTR_RFC3686_IV_SIZE); in crypto_rfc3686_crypt() 294 *(__be32 *)(iv + CTR_RFC3686_NONCE_SIZE + CTR_RFC3686_IV_SIZE) = in crypto_rfc3686_crypt() 301 iv); in crypto_rfc3686_crypt()
|
D | algif_skcipher.c | 43 void *iv; member 68 char iv[]; member 337 if (con.iv && con.iv->ivlen != ivsize) in skcipher_sendmsg() 349 if (con.iv) in skcipher_sendmsg() 350 memcpy(ctx->iv, con.iv->iv, ivsize); in skcipher_sendmsg() 539 memcpy(sreq->iv, ctx->iv, GET_IV_SIZE(ctx)); in skcipher_recvmsg_async() 618 len, sreq->iv); in skcipher_recvmsg_async() 680 ctx->iv); in skcipher_recvmsg_sync() 913 sock_kzfree_s(sk, ctx->iv, crypto_ablkcipher_ivsize(tfm)); in skcipher_sock_destruct() 930 ctx->iv = sock_kmalloc(sk, crypto_ablkcipher_ivsize(skcipher), in skcipher_accept_parent_nokey() [all …]
|
D | salsa20_generic.c | 131 static void salsa20_ivsetup(struct salsa20_ctx *ctx, const u8 *iv) in salsa20_ivsetup() argument 133 ctx->input[6] = U8TO32_LITTLE(iv + 0); in salsa20_ivsetup() 134 ctx->input[7] = U8TO32_LITTLE(iv + 4); in salsa20_ivsetup() 189 salsa20_ivsetup(ctx, walk.iv); in encrypt()
|
D | seqiv.c | 70 memcpy(req->areq.iv, subreq->iv, crypto_aead_ivsize(geniv)); in seqiv_aead_complete2() 73 kfree(subreq->iv); in seqiv_aead_complete2() 159 info = areq->iv; in seqiv_aead_givencrypt() 184 if (unlikely(info != areq->iv)) in seqiv_aead_givencrypt()
|
D | xts.c | 112 s.t = (be128 *)w->iv; in crypt() 119 tw(crypto_cipher_tfm(ctx->tweak), w->iv, w->iv); in crypt() 195 req->tweak_fn(req->tweak_ctx, (u8 *)&t_buf[0], walk.iv); in xts_crypt() 225 *(be128 *)walk.iv = *t; in xts_crypt()
|
D | gcm.c | 112 u8 iv[8]; in crypto_gcm_setkey() member 145 sizeof(data->hash), data->iv); in crypto_gcm_setkey() 200 memcpy(req->iv + 12, &counter, 4); in crypto_gcm_init_crypt() 217 req->iv); in crypto_gcm_init_crypt() 904 u8 *iv = PTR_ALIGN((u8 *)(subreq + 1) + crypto_aead_reqsize(child), in crypto_rfc4106_crypt() local 907 memcpy(iv, ctx->nonce, 4); in crypto_rfc4106_crypt() 908 memcpy(iv + 4, req->iv, 8); in crypto_rfc4106_crypt() 913 aead_request_set_crypt(subreq, req->src, req->dst, req->cryptlen, iv); in crypto_rfc4106_crypt() 1133 u8 *iv = PTR_ALIGN((u8 *)(rctx + 1) + crypto_aead_reqsize(ctx->child), in crypto_rfc4543_crypt() local 1136 memcpy(iv, ctx->nonce, 4); in crypto_rfc4543_crypt() [all …]
|
D | testmgr.c | 436 char *iv; in __test_aead() local 441 iv = kzalloc(MAX_IVLEN, GFP_KERNEL); in __test_aead() 442 if (!iv) in __test_aead() 504 if (template[i].iv) in __test_aead() 505 memcpy(iv, template[i].iv, iv_len); in __test_aead() 507 memset(iv, 0, iv_len); in __test_aead() 552 template[i].ilen, iv); in __test_aead() 607 if (template[i].iv) in __test_aead() 608 memcpy(iv, template[i].iv, MAX_IVLEN); in __test_aead() 610 memset(iv, 0, MAX_IVLEN); in __test_aead() [all …]
|
D | af_alg.c | 450 if (cmsg->cmsg_len < CMSG_LEN(sizeof(*con->iv))) in af_alg_cmsg_send() 452 con->iv = (void *)CMSG_DATA(cmsg); in af_alg_cmsg_send() 453 if (cmsg->cmsg_len < CMSG_LEN(con->iv->ivlen + in af_alg_cmsg_send() 454 sizeof(*con->iv))) in af_alg_cmsg_send()
|
D | tcrypt.c | 283 char *iv; in test_aead_speed() local 290 iv = kzalloc(MAX_IVLEN, GFP_KERNEL); in test_aead_speed() 291 if (!iv) in test_aead_speed() 362 memset(iv, 0xff, iv_len); in test_aead_speed() 383 aead_request_set_crypt(req, sg, sgout, *b_size, iv); in test_aead_speed() 415 kfree(iv); in test_aead_speed() 425 char iv[128]; in test_cipher_speed() local 494 memset(&iv, 0xff, iv_len); in test_cipher_speed() 495 crypto_blkcipher_set_iv(tfm, iv, iv_len); in test_cipher_speed() 1087 char iv[128]; in test_acipher_speed() local [all …]
|
D | pcrypt.c | 177 req->cryptlen, req->iv); in pcrypt_aead_encrypt() 219 req->cryptlen, req->iv); in pcrypt_aead_decrypt() 262 areq->cryptlen, areq->iv); in pcrypt_aead_givencrypt()
|
D | drbg.c | 387 unsigned char *iv = pad + drbg_blocklen(drbg); in drbg_ctr_df() local 388 unsigned char *temp = iv + drbg_blocklen(drbg); in drbg_ctr_df() 405 memset(iv, 0, drbg_blocklen(drbg)); in drbg_ctr_df() 435 drbg_string_fill(&S1, iv, drbg_blocklen(drbg)); in drbg_ctr_df() 450 drbg_cpu_to_be32(i, iv); in drbg_ctr_df() 489 memset(iv, 0, drbg_blocklen(drbg)); in drbg_ctr_df()
|
/linux-4.1.27/drivers/staging/wlan-ng/ |
D | p80211wep.c | 152 u8 *iv, u8 *icv) in wep_decrypt() argument 163 key[0] = iv[0]; in wep_decrypt() 164 key[1] = iv[1]; in wep_decrypt() 165 key[2] = iv[2]; in wep_decrypt() 166 keyidx = WEP_KEY(iv[3]); in wep_decrypt() 229 u8 *iv, u8 *icv) in wep_encrypt() argument 246 get_random_bytes(iv, 3); in wep_encrypt() 247 while ((iv[1] == 0xff) && (iv[0] >= 3) && (iv[0] < keylen)) in wep_encrypt() 248 get_random_bytes(iv, 3); in wep_encrypt() 250 iv[3] = (keynum & 0x03) << 6; in wep_encrypt() [all …]
|
D | p80211netdev.h | 232 u8 *iv, u8 *icv); 234 u8 *iv, u8 *icv);
|
D | p80211conv.h | 128 u8 iv[4]; member
|
D | p80211conv.c | 213 p80211_wep->iv, p80211_wep->icv); in skb_ether_to_p80211()
|
D | hfa384x_usb.c | 2749 memcpy(ptr, p80211_wep->iv, sizeof(p80211_wep->iv)); in hfa384x_drvr_txframe() 2750 ptr += sizeof(p80211_wep->iv); in hfa384x_drvr_txframe()
|
/linux-4.1.27/arch/x86/crypto/ |
D | glue_helper-asm-avx2.S | 60 #define load_ctr_16way(iv, bswap, x0, x1, x2, x3, x4, x5, x6, x7, t0, t0x, t1, \ argument 67 vmovdqu (iv), t2x; \ 91 vmovdqu t2x, (iv); 104 #define gf128mul_x_ble(iv, mask, tmp) \ argument 105 vpsrad $31, iv, tmp; \ 106 vpaddq iv, iv, iv; \ 109 vpxor tmp, iv, iv; 111 #define gf128mul_x2_ble(iv, mask1, mask2, tmp0, tmp1) \ argument 112 vpsrad $31, iv, tmp0; \ 113 vpaddq iv, iv, tmp1; \ [all …]
|
D | aesni-intel_glue.c | 64 u8 iv[16]; member 94 const u8 *in, unsigned int len, u8 *iv); 96 const u8 *in, unsigned int len, u8 *iv); 107 const u8 *in, unsigned int len, u8 *iv); 109 const u8 *in, unsigned int len, u8 *iv); 112 const u8 *in, bool enc, u8 *iv); 131 const u8 *in, unsigned long plaintext_len, u8 *iv, 152 const u8 *in, unsigned long ciphertext_len, u8 *iv, 158 asmlinkage void aes_ctr_enc_128_avx_by8(const u8 *in, u8 *iv, 160 asmlinkage void aes_ctr_enc_192_avx_by8(const u8 *in, u8 *iv, [all …]
|
D | glue_helper.c | 101 u128 *iv = (u128 *)walk->iv; in __glue_cbc_encrypt_128bit() local 104 u128_xor(dst, src, iv); in __glue_cbc_encrypt_128bit() 106 iv = dst; in __glue_cbc_encrypt_128bit() 113 *(u128 *)walk->iv = *iv; in __glue_cbc_encrypt_128bit() 185 u128_xor(dst, dst, (u128 *)walk->iv); in __glue_cbc_decrypt_128bit() 186 *(u128 *)walk->iv = last_iv; in __glue_cbc_decrypt_128bit() 227 be128_to_le128(&ctrblk, (be128 *)walk->iv); in glue_ctr_crypt_final_128bit() 233 le128_to_be128((be128 *)walk->iv, &ctrblk); in glue_ctr_crypt_final_128bit() 249 be128_to_le128(&ctrblk, (be128 *)walk->iv); in __glue_ctr_crypt_128bit() 271 le128_to_be128((be128 *)walk->iv, &ctrblk); in __glue_ctr_crypt_128bit() [all …]
|
D | glue_helper-asm-avx.S | 54 #define load_ctr_8way(iv, bswap, x0, x1, x2, x3, x4, x5, x6, x7, t0, t1, t2) \ argument 60 vmovdqu (iv), x7; \ 80 vmovdqu t2, (iv); 93 #define gf128mul_x_ble(iv, mask, tmp) \ argument 94 vpsrad $31, iv, tmp; \ 95 vpaddq iv, iv, iv; \ 98 vpxor tmp, iv, iv; 100 #define load_xts_8way(iv, src, dst, x0, x1, x2, x3, x4, x5, x6, x7, tiv, t0, \ argument 105 vmovdqu (iv), tiv; \ 139 vmovdqu tiv, (iv);
|
D | cast5_avx_glue.c | 47 __be64 *iv); 140 u64 *iv = (u64 *)walk->iv; in __cbc_encrypt() local 143 *dst = *src ^ *iv; in __cbc_encrypt() 145 iv = dst; in __cbc_encrypt() 152 *(u64 *)walk->iv = *iv; in __cbc_encrypt() 222 *dst ^= *(u64 *)walk->iv; in __cbc_decrypt() 223 *(u64 *)walk->iv = last_iv; in __cbc_decrypt() 253 u8 *ctrblk = walk->iv; in ctr_crypt_final() 279 (__be64 *)walk->iv); in __ctr_crypt() 297 ctrblk = *(u64 *)walk->iv; in __ctr_crypt() [all …]
|
D | blowfish_glue.c | 151 u64 *iv = (u64 *)walk->iv; in __cbc_encrypt() local 154 *dst = *src ^ *iv; in __cbc_encrypt() 156 iv = dst; in __cbc_encrypt() 163 *(u64 *)walk->iv = *iv; in __cbc_encrypt() 242 *dst ^= *(u64 *)walk->iv; in __cbc_decrypt() 243 *(u64 *)walk->iv = last_iv; in __cbc_decrypt() 267 u8 *ctrblk = walk->iv; in ctr_crypt_final() 288 u64 ctrblk = be64_to_cpu(*(__be64 *)walk->iv); in __ctr_crypt() 332 *(__be64 *)walk->iv = cpu_to_be64(ctrblk); in __ctr_crypt()
|
D | twofish_glue_3way.c | 65 void twofish_enc_blk_ctr(void *ctx, u128 *dst, const u128 *src, le128 *iv) in twofish_enc_blk_ctr() argument 72 le128_to_be128(&ctrblk, iv); in twofish_enc_blk_ctr() 73 le128_inc(iv); in twofish_enc_blk_ctr() 81 le128 *iv) in twofish_enc_blk_ctr_3way() argument 91 le128_to_be128(&ctrblks[0], iv); in twofish_enc_blk_ctr_3way() 92 le128_inc(iv); in twofish_enc_blk_ctr_3way() 93 le128_to_be128(&ctrblks[1], iv); in twofish_enc_blk_ctr_3way() 94 le128_inc(iv); in twofish_enc_blk_ctr_3way() 95 le128_to_be128(&ctrblks[2], iv); in twofish_enc_blk_ctr_3way() 96 le128_inc(iv); in twofish_enc_blk_ctr_3way()
|
D | des3_ede_glue.c | 158 u64 *iv = (u64 *)walk->iv; in __cbc_encrypt() local 161 *dst = *src ^ *iv; in __cbc_encrypt() 163 iv = dst; in __cbc_encrypt() 170 *(u64 *)walk->iv = *iv; in __cbc_encrypt() 247 *dst ^= *(u64 *)walk->iv; in __cbc_decrypt() 248 *(u64 *)walk->iv = last_iv; in __cbc_decrypt() 273 u8 *ctrblk = walk->iv; in ctr_crypt_final() 294 u64 ctrblk = be64_to_cpu(*(__be64 *)walk->iv); in __ctr_crypt() 333 *(__be64 *)walk->iv = cpu_to_be64(ctrblk); in __ctr_crypt()
|
D | cast6_avx_glue.c | 53 le128 *iv); 56 const u8 *src, le128 *iv); 58 const u8 *src, le128 *iv); 60 static void cast6_xts_enc(void *ctx, u128 *dst, const u128 *src, le128 *iv) in cast6_xts_enc() argument 62 glue_xts_crypt_128bit_one(ctx, dst, src, iv, in cast6_xts_enc() 66 static void cast6_xts_dec(void *ctx, u128 *dst, const u128 *src, le128 *iv) in cast6_xts_dec() argument 68 glue_xts_crypt_128bit_one(ctx, dst, src, iv, in cast6_xts_dec() 72 static void cast6_crypt_ctr(void *ctx, u128 *dst, const u128 *src, le128 *iv) in cast6_crypt_ctr() argument 76 le128_to_be128(&ctrblk, iv); in cast6_crypt_ctr() 77 le128_inc(iv); in cast6_crypt_ctr()
|
D | serpent_avx_glue.c | 58 const u8 *src, le128 *iv); 62 const u8 *src, le128 *iv); 66 const u8 *src, le128 *iv); 69 void __serpent_crypt_ctr(void *ctx, u128 *dst, const u128 *src, le128 *iv) in __serpent_crypt_ctr() argument 73 le128_to_be128(&ctrblk, iv); in __serpent_crypt_ctr() 74 le128_inc(iv); in __serpent_crypt_ctr() 81 void serpent_xts_enc(void *ctx, u128 *dst, const u128 *src, le128 *iv) in serpent_xts_enc() argument 83 glue_xts_crypt_128bit_one(ctx, dst, src, iv, in serpent_xts_enc() 88 void serpent_xts_dec(void *ctx, u128 *dst, const u128 *src, le128 *iv) in serpent_xts_dec() argument 90 glue_xts_crypt_128bit_one(ctx, dst, src, iv, in serpent_xts_dec()
|
D | twofish_avx_glue.c | 59 const u8 *src, le128 *iv); 62 const u8 *src, le128 *iv); 64 const u8 *src, le128 *iv); 72 static void twofish_xts_enc(void *ctx, u128 *dst, const u128 *src, le128 *iv) in twofish_xts_enc() argument 74 glue_xts_crypt_128bit_one(ctx, dst, src, iv, in twofish_xts_enc() 78 static void twofish_xts_dec(void *ctx, u128 *dst, const u128 *src, le128 *iv) in twofish_xts_dec() argument 80 glue_xts_crypt_128bit_one(ctx, dst, src, iv, in twofish_xts_dec()
|
D | camellia_aesni_avx_glue.c | 43 const u8 *src, le128 *iv); 47 const u8 *src, le128 *iv); 51 const u8 *src, le128 *iv); 54 void camellia_xts_enc(void *ctx, u128 *dst, const u128 *src, le128 *iv) in camellia_xts_enc() argument 56 glue_xts_crypt_128bit_one(ctx, dst, src, iv, in camellia_xts_enc() 61 void camellia_xts_dec(void *ctx, u128 *dst, const u128 *src, le128 *iv) in camellia_xts_dec() argument 63 glue_xts_crypt_128bit_one(ctx, dst, src, iv, in camellia_xts_dec()
|
D | camellia_glue.c | 1284 u128 iv = *src; in camellia_decrypt_cbc_2way() local 1288 u128_xor(&dst[1], &dst[1], &iv); in camellia_decrypt_cbc_2way() 1292 void camellia_crypt_ctr(void *ctx, u128 *dst, const u128 *src, le128 *iv) in camellia_crypt_ctr() argument 1299 le128_to_be128(&ctrblk, iv); in camellia_crypt_ctr() 1300 le128_inc(iv); in camellia_crypt_ctr() 1306 void camellia_crypt_ctr_2way(void *ctx, u128 *dst, const u128 *src, le128 *iv) in camellia_crypt_ctr_2way() argument 1315 le128_to_be128(&ctrblks[0], iv); in camellia_crypt_ctr_2way() 1316 le128_inc(iv); in camellia_crypt_ctr_2way() 1317 le128_to_be128(&ctrblks[1], iv); in camellia_crypt_ctr_2way() 1318 le128_inc(iv); in camellia_crypt_ctr_2way()
|
D | salsa20_glue.c | 36 asmlinkage void salsa20_ivsetup(struct salsa20_ctx *ctx, const u8 *iv); 60 salsa20_ivsetup(ctx, walk.iv); in encrypt()
|
D | serpent_sse2_glue.c | 62 static void serpent_crypt_ctr(void *ctx, u128 *dst, const u128 *src, le128 *iv) in serpent_crypt_ctr() argument 66 le128_to_be128(&ctrblk, iv); in serpent_crypt_ctr() 67 le128_inc(iv); in serpent_crypt_ctr() 74 le128 *iv) in serpent_crypt_ctr_xway() argument 83 le128_to_be128(&ctrblks[i], iv); in serpent_crypt_ctr_xway() 84 le128_inc(iv); in serpent_crypt_ctr_xway()
|
D | camellia-aesni-avx2-asm_64.S | 1190 #define gf128mul_x_ble(iv, mask, tmp) \ argument 1191 vpsrad $31, iv, tmp; \ 1192 vpaddq iv, iv, iv; \ 1195 vpxor tmp, iv, iv; 1197 #define gf128mul_x2_ble(iv, mask1, mask2, tmp0, tmp1) \ argument 1198 vpsrad $31, iv, tmp0; \ 1199 vpaddq iv, iv, tmp1; \ 1200 vpsllq $2, iv, iv; \ 1205 vpxor tmp0, iv, iv; \ 1207 vpxor tmp1, iv, iv;
|
D | serpent_avx2_glue.c | 38 le128 *iv); 40 const u8 *src, le128 *iv); 42 const u8 *src, le128 *iv);
|
D | camellia_aesni_avx2_glue.c | 39 const u8 *src, le128 *iv); 42 const u8 *src, le128 *iv); 44 const u8 *src, le128 *iv);
|
D | camellia-aesni-avx-asm_64.S | 1098 #define gf128mul_x_ble(iv, mask, tmp) \ argument 1099 vpsrad $31, iv, tmp; \ 1100 vpaddq iv, iv, iv; \ 1103 vpxor tmp, iv, iv;
|
D | salsa20-i586-asm_32.S | 1081 # iv = arg2 1085 # in6 = *(uint32 *) (iv + 0) 1087 # in7 = *(uint32 *) (iv + 4)
|
D | salsa20-x86_64-asm_64.S | 901 # iv = arg2 905 # in6 = *(uint64 *) (iv + 0)
|
/linux-4.1.27/arch/arm/crypto/ |
D | aesbs-glue.c | 31 struct BS_KEY *key, u8 iv[]); 34 struct BS_KEY *key, u8 const iv[]); 120 u8 *iv = walk.iv; in aesbs_cbc_encrypt() local 123 crypto_xor(src, iv, AES_BLOCK_SIZE); in aesbs_cbc_encrypt() 125 iv = src; in aesbs_cbc_encrypt() 128 memcpy(walk.iv, iv, AES_BLOCK_SIZE); in aesbs_cbc_encrypt() 133 crypto_xor(walk.iv, src, AES_BLOCK_SIZE); in aesbs_cbc_encrypt() 134 AES_encrypt(walk.iv, dst, &ctx->enc); in aesbs_cbc_encrypt() 135 memcpy(walk.iv, dst, AES_BLOCK_SIZE); in aesbs_cbc_encrypt() 159 walk.nbytes, &ctx->dec, walk.iv); in aesbs_cbc_decrypt() [all …]
|
D | aes-ce-glue.c | 33 int rounds, int blocks, u8 iv[]); 35 int rounds, int blocks, u8 iv[]); 41 int rounds, int blocks, u8 iv[], 44 int rounds, int blocks, u8 iv[], 228 walk.iv); in cbc_encrypt() 252 walk.iv); in cbc_decrypt() 275 walk.iv); in ctr_encrypt() 294 num_rounds(ctx), blocks, walk.iv); in ctr_encrypt() 319 walk.iv, (u8 *)ctx->key2.key_enc, first); in xts_encrypt() 344 walk.iv, (u8 *)ctx->key2.key_enc, first); in xts_decrypt()
|
D | aes-ce-core.S | 231 veor q0, q0, q1 @ ..and xor with iv 243 vld1.8 {q6}, [r5] @ keep iv in q6 274 vst1.8 {q6}, [r5] @ keep iv in q6 382 vld1.8 {q0}, [r5] @ load iv
|
/linux-4.1.27/drivers/scsi/ |
D | sd_dif.c | 126 struct bio_vec iv; in sd_dif_prepare() local 136 bip_for_each_vec(iv, bip, iter) { in sd_dif_prepare() 137 pi = kmap_atomic(iv.bv_page) + iv.bv_offset; in sd_dif_prepare() 139 for (j = 0; j < iv.bv_len; j += tuple_sz, pi++) { in sd_dif_prepare() 178 struct bio_vec iv; in sd_dif_complete() local 183 bip_for_each_vec(iv, bip, iter) { in sd_dif_complete() 184 pi = kmap_atomic(iv.bv_page) + iv.bv_offset; in sd_dif_complete() 186 for (j = 0; j < iv.bv_len; j += tuple_sz, pi++) { in sd_dif_complete()
|
/linux-4.1.27/drivers/crypto/nx/ |
D | nx-aes-ccm.c | 139 static inline int crypto_ccm_check_iv(const u8 *iv) in crypto_ccm_check_iv() argument 142 if (1 > iv[0] || iv[0] > 7) in crypto_ccm_check_iv() 149 static int generate_b0(u8 *iv, unsigned int assoclen, unsigned int authsize, in generate_b0() argument 155 memcpy(b0, iv, 16); in generate_b0() 172 static int generate_pat(u8 *iv, in generate_pat() argument 187 memset(iv + 15 - iv[0], 0, iv[0] + 1); in generate_pat() 226 rc = generate_b0(iv, req->assoclen, authsize, nbytes, b0); in generate_pat() 499 u8 *iv = rctx->iv; in ccm4309_aes_nx_encrypt() local 501 iv[0] = 3; in ccm4309_aes_nx_encrypt() 502 memcpy(iv + 1, nx_ctx->priv.ccm.nonce, 3); in ccm4309_aes_nx_encrypt() [all …]
|
D | nx-aes-ctr.c | 101 processed, csbcpb->cpb.aes_ctr.iv); in ctr_aes_nx_crypt() 134 u8 iv[16]; in ctr3686_aes_nx_crypt() local 136 memcpy(iv, nx_ctx->priv.ctr.nonce, CTR_RFC3686_IV_SIZE); in ctr3686_aes_nx_crypt() 137 memcpy(iv + CTR_RFC3686_NONCE_SIZE, in ctr3686_aes_nx_crypt() 139 iv[12] = iv[13] = iv[14] = 0; in ctr3686_aes_nx_crypt() 140 iv[15] = 1; in ctr3686_aes_nx_crypt() 142 desc->info = iv; in ctr3686_aes_nx_crypt()
|
D | nx-aes-gcm.c | 343 desc.info = rctx->iv; in gcm_aes_nx_crypt() 439 char *iv = rctx->iv; in gcm_aes_nx_encrypt() local 441 memcpy(iv, req->iv, 12); in gcm_aes_nx_encrypt() 449 char *iv = rctx->iv; in gcm_aes_nx_decrypt() local 451 memcpy(iv, req->iv, 12); in gcm_aes_nx_decrypt() 460 char *iv = rctx->iv; in gcm4106_aes_nx_encrypt() local 463 memcpy(iv, nonce, NX_GCM4106_NONCE_LEN); in gcm4106_aes_nx_encrypt() 464 memcpy(iv + NX_GCM4106_NONCE_LEN, req->iv, 8); in gcm4106_aes_nx_encrypt() 473 char *iv = rctx->iv; in gcm4106_aes_nx_decrypt() local 476 memcpy(iv, nonce, NX_GCM4106_NONCE_LEN); in gcm4106_aes_nx_decrypt() [all …]
|
D | nx.h | 97 u8 iv[16]; member 109 u8 iv[16]; member
|
D | nx_csbcpb.h | 11 u8 iv[16]; member 42 u8 iv[16]; member
|
D | nx-aes-cbc.c | 88 processed, csbcpb->cpb.aes_cbc.iv); in cbc_aes_nx_crypt()
|
D | nx.c | 277 u8 *iv) in nx_build_sg_lists() argument 290 if (iv) in nx_build_sg_lists() 291 memcpy(iv, desc->info, AES_BLOCK_SIZE); in nx_build_sg_lists()
|
/linux-4.1.27/block/ |
D | blk-integrity.c | 46 struct bio_vec iv, ivprv = { NULL }; in blk_rq_count_integrity_sg() local 52 bio_for_each_integrity_vec(iv, bio, iter) { in blk_rq_count_integrity_sg() 55 if (!BIOVEC_PHYS_MERGEABLE(&ivprv, &iv)) in blk_rq_count_integrity_sg() 58 if (!BIOVEC_SEG_BOUNDARY(q, &ivprv, &iv)) in blk_rq_count_integrity_sg() 61 if (seg_size + iv.bv_len > queue_max_segment_size(q)) in blk_rq_count_integrity_sg() 64 seg_size += iv.bv_len; in blk_rq_count_integrity_sg() 68 seg_size = iv.bv_len; in blk_rq_count_integrity_sg() 72 ivprv = iv; in blk_rq_count_integrity_sg() 92 struct bio_vec iv, ivprv = { NULL }; in blk_rq_map_integrity_sg() local 98 bio_for_each_integrity_vec(iv, bio, iter) { in blk_rq_map_integrity_sg() [all …]
|
D | bio-integrity.c | 134 struct bio_vec *iv; in bio_integrity_add_page() local 141 iv = bip->bip_vec + bip->bip_vcnt; in bio_integrity_add_page() 143 iv->bv_page = page; in bio_integrity_add_page() 144 iv->bv_len = len; in bio_integrity_add_page() 145 iv->bv_offset = offset; in bio_integrity_add_page()
|
/linux-4.1.27/net/mac80211/ |
D | wep.c | 57 static inline bool ieee80211_wep_weak_iv(u32 iv, int keylen) in ieee80211_wep_weak_iv() argument 64 if ((iv & 0xff00) == 0xff00) { in ieee80211_wep_weak_iv() 65 u8 B = (iv >> 16) & 0xff; in ieee80211_wep_weak_iv() 74 int keylen, int keyidx, u8 *iv) in ieee80211_wep_get_iv() argument 80 if (!iv) in ieee80211_wep_get_iv() 83 *iv++ = (local->wep_iv >> 16) & 0xff; in ieee80211_wep_get_iv() 84 *iv++ = (local->wep_iv >> 8) & 0xff; in ieee80211_wep_get_iv() 85 *iv++ = local->wep_iv & 0xff; in ieee80211_wep_get_iv() 86 *iv++ = keyidx << 6; in ieee80211_wep_get_iv() 165 u8 *iv; in ieee80211_wep_encrypt() local [all …]
|
D | aes_gmac.c | 32 u8 zero[GMAC_MIC_LEN], iv[AES_BLOCK_SIZE]; in ieee80211_aes_gmac() local 45 memcpy(iv, nonce, GMAC_NONCE_LEN); in ieee80211_aes_gmac() 46 memset(iv + GMAC_NONCE_LEN, 0, sizeof(iv) - GMAC_NONCE_LEN); in ieee80211_aes_gmac() 47 iv[AES_BLOCK_SIZE - 1] = 0x01; in ieee80211_aes_gmac() 54 aead_request_set_crypt(aead_req, NULL, ct, 0, iv); in ieee80211_aes_gmac()
|
/linux-4.1.27/arch/x86/include/asm/crypto/ |
D | serpent-avx.h | 27 const u8 *src, le128 *iv); 30 const u8 *src, le128 *iv); 32 const u8 *src, le128 *iv); 35 le128 *iv); 37 extern void serpent_xts_enc(void *ctx, u128 *dst, const u128 *src, le128 *iv); 38 extern void serpent_xts_dec(void *ctx, u128 *dst, const u128 *src, le128 *iv);
|
D | camellia.h | 60 const u8 *src, le128 *iv); 63 const u8 *src, le128 *iv); 65 const u8 *src, le128 *iv); 94 le128 *iv); 96 le128 *iv); 98 extern void camellia_xts_enc(void *ctx, u128 *dst, const u128 *src, le128 *iv); 99 extern void camellia_xts_dec(void *ctx, u128 *dst, const u128 *src, le128 *iv);
|
D | twofish.h | 34 le128 *iv); 36 le128 *iv);
|
D | glue_helper.h | 16 le128 *iv); 18 le128 *iv); 143 le128 *iv, common_glue_func_t fn);
|
/linux-4.1.27/net/rxrpc/ |
D | rxkad.c | 118 struct rxrpc_crypt iv; in rxkad_prime_packet_security() local 129 memcpy(&iv, token->kad->session_key, sizeof(iv)); in rxkad_prime_packet_security() 132 desc.info = iv.x; in rxkad_prime_packet_security() 160 struct rxrpc_crypt iv; in rxkad_secure_packet_auth() local 179 memset(&iv, 0, sizeof(iv)); in rxkad_secure_packet_auth() 181 desc.info = iv.x; in rxkad_secure_packet_auth() 207 struct rxrpc_crypt iv; in rxkad_secure_packet_encrypt() local 225 memcpy(&iv, token->kad->session_key, sizeof(iv)); in rxkad_secure_packet_encrypt() 227 desc.info = iv.x; in rxkad_secure_packet_encrypt() 260 struct rxrpc_crypt iv; in rxkad_secure_packet() local [all …]
|
/linux-4.1.27/drivers/crypto/ |
D | padlock-aes.c | 199 u8 *iv, struct cword *control_word, int count) in rep_xcrypt_cbc() argument 202 : "+S" (input), "+D" (output), "+a" (iv) in rep_xcrypt_cbc() 204 return iv; in rep_xcrypt_cbc() 222 u8 *iv, struct cword *cword, int count) in cbc_crypt_copy() argument 232 return rep_xcrypt_cbc(tmp, out, key, iv, cword, count); in cbc_crypt_copy() 250 u8 *iv, struct cword *cword, int count) in cbc_crypt() argument 254 return cbc_crypt_copy(in, out, key, iv, cword, count); in cbc_crypt() 256 return rep_xcrypt_cbc(in, out, key, iv, cword, count); in cbc_crypt() 280 u8 *iv, void *control_word, u32 count) in padlock_xcrypt_cbc() argument 285 return cbc_crypt(input, output, key, iv, control_word, count); in padlock_xcrypt_cbc() [all …]
|
D | ixp4xx_crypto.c | 124 u8 iv[MAX_IVLEN]; /* IV for CBC mode or CTR IV for CTR mode */ member 901 memcpy(crypt->iv, req->info, ivsize); in ablk_perform() 953 u8 iv[CTR_RFC3686_BLOCK_SIZE]; in ablk_rfc3686_crypt() local 958 memcpy(iv, ctx->nonce, CTR_RFC3686_NONCE_SIZE); in ablk_rfc3686_crypt() 959 memcpy(iv + CTR_RFC3686_NONCE_SIZE, info, CTR_RFC3686_IV_SIZE); in ablk_rfc3686_crypt() 962 *(__be32 *)(iv + CTR_RFC3686_NONCE_SIZE + CTR_RFC3686_IV_SIZE) = in ablk_rfc3686_crypt() 965 req->info = iv; in ablk_rfc3686_crypt() 990 int cryptoffset, int eff_cryptlen, u8 *iv) in aead_perform() argument 1033 BUG_ON(ivsize && !req->iv); in aead_perform() 1034 memcpy(crypt->iv, req->iv, ivsize); in aead_perform() [all …]
|
D | geode-aes.c | 95 _writefield(AES_WRITEIV0_REG, op->iv); in geode_aes_crypt() 107 _readfield(AES_WRITEIV0_REG, op->iv); in geode_aes_crypt() 317 op->iv = walk.iv; in geode_cbc_decrypt() 349 op->iv = walk.iv; in geode_cbc_encrypt()
|
D | geode-aes.h | 64 u8 *iv; member
|
D | picoxcell_crypto.c | 222 size_t key_len, const u8 *iv, size_t iv_len) in spacc_cipher_write_ctx() argument 228 memcpy_toio32(iv_ptr, iv, iv_len / 4); in spacc_cipher_write_ctx() 238 const u8 *iv, size_t ivlen, const u8 *hash_key, in spacc_load_ctx() argument 248 spacc_cipher_write_ctx(ctx, ciph_page_addr, ciph_key, ciph_len, iv, in spacc_load_ctx() 332 u8 *iv = giv ? giv : areq->iv; in spacc_aead_make_ddts() local 364 iv_addr = dma_map_single(engine->dev, iv, ivsize, in spacc_aead_make_ddts() 608 ctx->cipher_key_len, aead_req->iv, alg->cra_aead.ivsize, in spacc_aead_submit() 746 memcpy(req->areq.iv, ctx->salt, ivsize); in spacc_aead_givencrypt()
|
D | talitos.c | 645 u8 iv[TALITOS_MAX_IV_LENGTH]; member 1079 map_single_talitos_ptr(dev, &desc->ptr[6], ivsize, ctx->iv, 0, in ipsec_esp() 1117 u8 *iv, in talitos_edesc_alloc() argument 1139 iv_dma = dma_map_single(dev, iv, ivsize, DMA_TO_DEVICE); in talitos_edesc_alloc() 1146 BUG_ON(!iv); in talitos_edesc_alloc() 1217 static struct talitos_edesc *aead_edesc_alloc(struct aead_request *areq, u8 *iv, in aead_edesc_alloc() argument 1225 iv, areq->assoclen, areq->cryptlen, in aead_edesc_alloc() 1237 edesc = aead_edesc_alloc(req, req->iv, 0, true); in aead_encrypt() 1260 edesc = aead_edesc_alloc(req, req->iv, 1, false); in aead_decrypt() 1313 memcpy(req->giv, ctx->iv, crypto_aead_ivsize(authenc)); in aead_givencrypt() [all …]
|
D | s5p-sss.c | 398 uint8_t *key, uint8_t *iv, unsigned int keylen) in s5p_set_aes() argument 402 if (iv) in s5p_set_aes() 403 memcpy(dev->aes_ioaddr + SSS_REG_AES_IV_DATA(0), iv, 0x10); in s5p_set_aes()
|
D | hifn_795x.c | 657 u8 *iv; member 1126 u8 *key, int keylen, u8 *iv, int ivsize, u16 mode) in hifn_setup_crypto_command() argument 1156 memcpy(buf_pos, iv, ivsize); in hifn_setup_crypto_command() 1200 if (rctx->iv && rctx->mode != ACRYPTO_MODE_ECB) in hifn_setup_cmd_desc() 1255 rctx->iv, rctx->ivsize, md); in hifn_setup_cmd_desc() 1585 if (rctx->iv && !rctx->ivsize && rctx->mode != ACRYPTO_MODE_ECB) in hifn_setup_session() 1637 dev->name, rctx->iv, rctx->ivsize, in hifn_setup_session() 1664 rctx.iv = NULL; in hifn_test() 2125 rctx->iv = req->info; in hifn_setup_crypto_req()
|
D | n2_core.c | 960 memcpy(rctx->walk.iv, final_iv, rctx->walk.blocksize); in n2_chunk_complete() 1046 iv_paddr = __pa(rctx->walk.iv); in n2_do_chaining() 1063 iv_paddr = __pa(rctx->walk.iv); in n2_do_chaining()
|
/linux-4.1.27/drivers/staging/rtl8192e/ |
D | rtllib_crypt_wep.c | 26 u32 iv; member 59 get_random_bytes(&priv->iv, 4); in prism2_wep_init() 120 wep->iv++; in prism2_wep_encrypt() 126 if ((wep->iv & 0xff00) == 0xff00) { in prism2_wep_encrypt() 127 u8 B = (wep->iv >> 16) & 0xff; in prism2_wep_encrypt() 130 wep->iv += 0x0100; in prism2_wep_encrypt() 134 *pos++ = key[0] = (wep->iv >> 16) & 0xff; in prism2_wep_encrypt() 135 *pos++ = key[1] = (wep->iv >> 8) & 0xff; in prism2_wep_encrypt() 136 *pos++ = key[2] = wep->iv & 0xff; in prism2_wep_encrypt()
|
/linux-4.1.27/drivers/staging/rtl8192u/ieee80211/ |
D | ieee80211_crypt_wep.c | 30 u32 iv; member 65 get_random_bytes(&priv->iv, 4); in prism2_wep_init() 124 wep->iv++; in prism2_wep_encrypt() 129 if ((wep->iv & 0xff00) == 0xff00) { in prism2_wep_encrypt() 130 u8 B = (wep->iv >> 16) & 0xff; in prism2_wep_encrypt() 133 wep->iv += 0x0100; in prism2_wep_encrypt() 137 *pos++ = key[0] = (wep->iv >> 16) & 0xff; in prism2_wep_encrypt() 138 *pos++ = key[1] = (wep->iv >> 8) & 0xff; in prism2_wep_encrypt() 139 *pos++ = key[2] = wep->iv & 0xff; in prism2_wep_encrypt()
|
/linux-4.1.27/net/wireless/ |
D | lib80211_crypt_wep.c | 33 u32 iv; member 63 get_random_bytes(&priv->iv, 4); in lib80211_wep_init() 107 wep->iv++; in lib80211_wep_build_iv() 112 if ((wep->iv & 0xff00) == 0xff00) { in lib80211_wep_build_iv() 113 u8 B = (wep->iv >> 16) & 0xff; in lib80211_wep_build_iv() 115 wep->iv += 0x0100; in lib80211_wep_build_iv() 119 *pos++ = (wep->iv >> 16) & 0xff; in lib80211_wep_build_iv() 120 *pos++ = (wep->iv >> 8) & 0xff; in lib80211_wep_build_iv() 121 *pos++ = wep->iv & 0xff; in lib80211_wep_build_iv()
|
/linux-4.1.27/drivers/staging/rtl8712/ |
D | rtl871x_security.h | 182 #define GET_TKIP_PN(iv, txpn) \ argument 184 txpn._byte_.TSC0 = iv[2];\ 185 txpn._byte_.TSC1 = iv[0];\ 186 txpn._byte_.TSC2 = iv[4];\ 187 txpn._byte_.TSC3 = iv[5];\ 188 txpn._byte_.TSC4 = iv[6];\ 189 txpn._byte_.TSC5 = iv[7];\
|
D | rtl871x_security.c | 172 u8 *pframe, *payload, *iv; /*,*wepkey*/ in r8712_wep_encrypt() local 188 iv = pframe+pattrib->hdrlen; in r8712_wep_encrypt() 189 memcpy(&wepkey[0], iv, 3); in r8712_wep_encrypt() 228 u8 *pframe, *payload, *iv, wepkey[16]; in r8712_wep_decrypt() local 239 iv = pframe + prxattrib->hdrlen; in r8712_wep_decrypt() 240 keyindex = (iv[3] & 0x3); in r8712_wep_decrypt() 242 memcpy(&wepkey[0], iv, 3); in r8712_wep_decrypt() 583 u8 *pframe, *payload, *iv, *prwskey; in r8712_tkip_encrypt() local 605 iv = pframe + pattrib->hdrlen; in r8712_tkip_encrypt() 608 GET_TKIP_PN(iv, txpn); in r8712_tkip_encrypt() [all …]
|
D | rtl871x_xmit.c | 635 WEP_IV(pattrib->iv, psta->txpn, in r8712_xmitframe_coalesce() 641 TKIP_IV(pattrib->iv, in r8712_xmitframe_coalesce() 646 TKIP_IV(pattrib->iv, psta->txpn, in r8712_xmitframe_coalesce() 651 AES_IV(pattrib->iv, psta->txpn, in r8712_xmitframe_coalesce() 655 AES_IV(pattrib->iv, psta->txpn, in r8712_xmitframe_coalesce() 660 memcpy(pframe, pattrib->iv, pattrib->iv_len); in r8712_xmitframe_coalesce()
|
D | rtl871x_recv.c | 166 u8 *mickey, idx, *iv; in r8712_recvframe_chkmic() local 176 iv = precvframe->u.hdr.rx_data + in r8712_recvframe_chkmic() 178 idx = iv[3]; in r8712_recvframe_chkmic()
|
D | rtl871x_xmit.h | 125 unsigned char iv[8]; member
|
/linux-4.1.27/net/ceph/ |
D | crypto.c | 172 void *iv; in ceph_aes_encrypt() local 192 iv = crypto_blkcipher_crt(tfm)->iv; in ceph_aes_encrypt() 194 memcpy(iv, aes_iv, ivsize); in ceph_aes_encrypt() 232 void *iv; in ceph_aes_encrypt2() local 253 iv = crypto_blkcipher_crt(tfm)->iv; in ceph_aes_encrypt2() 255 memcpy(iv, aes_iv, ivsize); in ceph_aes_encrypt2() 294 void *iv; in ceph_aes_decrypt() local 310 iv = crypto_blkcipher_crt(tfm)->iv; in ceph_aes_decrypt() 312 memcpy(iv, aes_iv, ivsize); in ceph_aes_decrypt() 359 void *iv; in ceph_aes_decrypt2() local [all …]
|
/linux-4.1.27/arch/mips/bcm47xx/ |
D | setup.c | 105 struct ssb_init_invariants *iv) in bcm47xx_get_invariants() argument 110 memset(&iv->boardinfo, 0 , sizeof(struct ssb_boardinfo)); in bcm47xx_get_invariants() 112 bcm47xx_fill_ssb_boardinfo(&iv->boardinfo, NULL); in bcm47xx_get_invariants() 114 memset(&iv->sprom, 0, sizeof(struct ssb_sprom)); in bcm47xx_get_invariants() 115 bcm47xx_fill_sprom(&iv->sprom, NULL, false); in bcm47xx_get_invariants() 118 iv->has_cardbus_slot = !!simple_strtoul(buf, NULL, 10); in bcm47xx_get_invariants()
|
/linux-4.1.27/drivers/crypto/ccp/ |
D | ccp-crypto-aes.c | 35 memcpy(req->info, rctx->iv, AES_BLOCK_SIZE); in ccp_aes_complete() 91 memcpy(rctx->iv, req->info, AES_BLOCK_SIZE); in ccp_aes_crypt() 94 sg_init_one(iv_sg, rctx->iv, iv_len); in ccp_aes_crypt() 106 rctx->cmd.u.aes.iv = iv_sg; in ccp_aes_crypt() 173 u8 *iv; in ccp_aes_rfc3686_crypt() local 176 iv = rctx->rfc3686_iv; in ccp_aes_rfc3686_crypt() 177 memcpy(iv, ctx->u.aes.nonce, CTR_RFC3686_NONCE_SIZE); in ccp_aes_rfc3686_crypt() 179 iv += CTR_RFC3686_NONCE_SIZE; in ccp_aes_rfc3686_crypt() 180 memcpy(iv, req->info, CTR_RFC3686_IV_SIZE); in ccp_aes_rfc3686_crypt() 182 iv += CTR_RFC3686_IV_SIZE; in ccp_aes_rfc3686_crypt() [all …]
|
D | ccp-crypto-aes-cmac.c | 50 memcpy(req->result, rctx->iv, digest_size); in ccp_aes_cmac_complete() 105 sg_init_one(&rctx->iv_sg, rctx->iv, sizeof(rctx->iv)); in ccp_do_cmac_update() 154 rctx->cmd.u.aes.iv = &rctx->iv_sg; in ccp_do_cmac_update() 214 memcpy(state.iv, rctx->iv, sizeof(state.iv)); in ccp_aes_cmac_export() 234 memcpy(rctx->iv, state.iv, sizeof(rctx->iv)); in ccp_aes_cmac_import()
|
D | ccp-crypto.h | 97 u8 iv[AES_BLOCK_SIZE]; member 119 u8 iv[AES_BLOCK_SIZE]; member 135 u8 iv[AES_BLOCK_SIZE]; member
|
D | ccp-crypto-aes-xts.c | 92 memcpy(req->info, rctx->iv, AES_BLOCK_SIZE); in ccp_aes_xts_complete() 160 memcpy(rctx->iv, req->info, AES_BLOCK_SIZE); in ccp_aes_xts_crypt() 161 sg_init_one(&rctx->iv_sg, rctx->iv, AES_BLOCK_SIZE); in ccp_aes_xts_crypt() 171 rctx->cmd.u.xts.iv = &rctx->iv_sg; in ccp_aes_xts_crypt()
|
D | ccp-ops.c | 900 if (!aes->key || !aes->iv || !aes->src) in ccp_run_aes_cmac_cmd() 956 ccp_set_dm_area(&ctx, dm_offset, aes->iv, 0, aes->iv_len); in ccp_run_aes_cmac_cmd() 1015 ccp_get_dm_area(&ctx, dm_offset, aes->iv, 0, aes->iv_len); in ccp_run_aes_cmac_cmd() 1060 if (!aes->iv) in ccp_run_aes_cmd() 1111 ccp_set_dm_area(&ctx, dm_offset, aes->iv, 0, aes->iv_len); in ccp_run_aes_cmd() 1178 ccp_get_dm_area(&ctx, dm_offset, aes->iv, 0, aes->iv_len); in ccp_run_aes_cmd() 1238 if (!xts->key || !xts->iv || !xts->src || !xts->dst) in ccp_run_xts_aes_cmd() 1285 ccp_set_dm_area(&ctx, 0, xts->iv, 0, xts->iv_len); in ccp_run_xts_aes_cmd() 1342 ccp_get_dm_area(&ctx, dm_offset, xts->iv, 0, xts->iv_len); in ccp_run_xts_aes_cmd()
|
/linux-4.1.27/arch/sparc/crypto/ |
D | aes_glue.c | 43 unsigned int len, u64 *iv); 45 unsigned int len, u64 *iv); 47 unsigned int len, u64 *iv); 95 u64 *iv); 99 u64 *iv); 103 u64 *iv); 107 u64 *iv); 111 u64 *iv); 115 u64 *iv); 119 u64 *iv); [all …]
|
D | des_glue.c | 139 unsigned int len, u64 *iv); 160 block_len, (u64 *) walk.iv); in cbc_encrypt() 170 unsigned int len, u64 *iv); 191 block_len, (u64 *) walk.iv); in cbc_decrypt() 311 u64 *iv); 336 (u64 *) walk.iv); in cbc3_encrypt() 347 u64 *iv); 372 (u64 *) walk.iv); in cbc3_decrypt()
|
D | camellia_glue.c | 141 const u64 *key, u64 *iv); 178 (u64 *) walk.iv); in cbc_encrypt() 217 (u64 *) walk.iv); in cbc_decrypt()
|
/linux-4.1.27/arch/arm64/crypto/ |
D | aes-ce-ccm-glue.c | 72 u32 l = req->iv[0] + 1; in ccm_init_mac() 89 memcpy(maciv, req->iv, AES_BLOCK_SIZE - l); in ccm_init_mac() 102 memset(&req->iv[AES_BLOCK_SIZE - l], 0, l); in ccm_init_mac() 152 struct blkcipher_desc desc = { .info = req->iv }; in ccm_encrypt() 169 memcpy(buf, req->iv, AES_BLOCK_SIZE); in ccm_encrypt() 183 num_rounds(ctx), mac, walk.iv); in ccm_encrypt() 208 struct blkcipher_desc desc = { .info = req->iv }; in ccm_decrypt() 225 memcpy(buf, req->iv, AES_BLOCK_SIZE); in ccm_decrypt() 239 num_rounds(ctx), mac, walk.iv); in ccm_decrypt()
|
D | aes-glue.c | 63 int rounds, int blocks, u8 iv[], int first); 65 int rounds, int blocks, u8 iv[], int first); 71 int rounds, int blocks, u8 const rk2[], u8 iv[], 74 int rounds, int blocks, u8 const rk2[], u8 iv[], 158 (u8 *)ctx->key_enc, rounds, blocks, walk.iv, in cbc_encrypt() 181 (u8 *)ctx->key_dec, rounds, blocks, walk.iv, in cbc_decrypt() 205 (u8 *)ctx->key_enc, rounds, blocks, walk.iv, in ctr_encrypt() 226 blocks, walk.iv, first); in ctr_encrypt() 251 (u8 *)ctx->key2.key_enc, walk.iv, first); in xts_encrypt() 275 (u8 *)ctx->key2.key_enc, walk.iv, first); in xts_decrypt()
|
/linux-4.1.27/net/sunrpc/auth_gss/ |
D | gss_krb5_crypto.c | 55 void * iv, in krb5_encrypt() argument 74 if (iv) in krb5_encrypt() 75 memcpy(local_iv, iv, crypto_blkcipher_ivsize(tfm)); in krb5_encrypt() 89 void * iv, in krb5_decrypt() argument 107 if (iv) in krb5_decrypt() 108 memcpy(local_iv,iv, crypto_blkcipher_ivsize(tfm)); in krb5_decrypt() 389 u8 iv[GSS_KRB5_MAX_BLOCKSIZE]; member 470 memset(desc.iv, 0, sizeof(desc.iv)); in gss_encrypt_xdr_buf() 472 desc.desc.info = desc.iv; in gss_encrypt_xdr_buf() 488 u8 iv[GSS_KRB5_MAX_BLOCKSIZE]; member [all …]
|
/linux-4.1.27/drivers/crypto/caam/ |
D | pdb.h | 58 u32 iv[4]; member 64 u32 iv[2]; member 72 u32 iv[2]; member 78 u32 iv[2]; member 268 u32 iv[4]; member 287 u32 iv[4]; member 294 u32 iv[4]; member 311 u32 iv[4]; member
|
/linux-4.1.27/drivers/net/wireless/rt2x00/ |
D | rt2x00crypto.c | 110 memcpy(skbdesc->iv, skb->data + txdesc->iv_offset, txdesc->iv_len); in rt2x00crypto_tx_copy_iv() 121 memcpy(skbdesc->iv, skb->data + txdesc->iv_offset, txdesc->iv_len); in rt2x00crypto_tx_remove_iv() 138 ((!!(skbdesc->iv[0])) * 4) + ((!!(skbdesc->iv[1])) * 4); in rt2x00crypto_tx_insert_iv() 149 memcpy(skb->data + header_length, skbdesc->iv, iv_len); in rt2x00crypto_tx_insert_iv() 224 memcpy(skb->data + transfer, rxdesc->iv, iv_len); in rt2x00crypto_rx_insert_iv()
|
D | rt2x00queue.h | 116 __le32 iv[2]; member 191 __le32 iv[2]; member
|
D | rt2500usb.c | 1121 _rt2x00_desc_write(txd, 3, skbdesc->iv[0]); in rt2500usb_write_tx_desc() 1122 _rt2x00_desc_write(txd, 4, skbdesc->iv[1]); in rt2500usb_write_tx_desc() 1272 _rt2x00_desc_read(rxd, 2, &rxdesc->iv[0]); in rt2500usb_fill_rxdone() 1273 _rt2x00_desc_read(rxd, 3, &rxdesc->iv[1]); in rt2500usb_fill_rxdone()
|
D | rt73usb.c | 1508 _rt2x00_desc_write(txd, 3, skbdesc->iv[0]); in rt73usb_write_tx_desc() 1509 _rt2x00_desc_write(txd, 4, skbdesc->iv[1]); in rt73usb_write_tx_desc() 1704 _rt2x00_desc_read(rxd, 2, &rxdesc->iv[0]); in rt73usb_fill_rxdone() 1705 _rt2x00_desc_read(rxd, 3, &rxdesc->iv[1]); in rt73usb_fill_rxdone()
|
D | rt61pci.c | 1900 _rt2x00_desc_write(txd, 3, skbdesc->iv[0]); in rt61pci_write_tx_desc() 1901 _rt2x00_desc_write(txd, 4, skbdesc->iv[1]); in rt61pci_write_tx_desc() 2106 _rt2x00_desc_read(entry_priv->desc, 2, &rxdesc->iv[0]); in rt61pci_fill_rxdone() 2107 _rt2x00_desc_read(entry_priv->desc, 3, &rxdesc->iv[1]); in rt61pci_fill_rxdone()
|
/linux-4.1.27/drivers/md/ |
D | dm-crypt.c | 82 int (*generator)(struct crypt_config *cc, u8 *iv, 84 int (*post)(struct crypt_config *cc, u8 *iv, 243 static int crypt_iv_plain_gen(struct crypt_config *cc, u8 *iv, in crypt_iv_plain_gen() argument 246 memset(iv, 0, cc->iv_size); in crypt_iv_plain_gen() 247 *(__le32 *)iv = cpu_to_le32(dmreq->iv_sector & 0xffffffff); in crypt_iv_plain_gen() 252 static int crypt_iv_plain64_gen(struct crypt_config *cc, u8 *iv, in crypt_iv_plain64_gen() argument 255 memset(iv, 0, cc->iv_size); in crypt_iv_plain64_gen() 256 *(__le64 *)iv = cpu_to_le64(dmreq->iv_sector); in crypt_iv_plain64_gen() 406 static int crypt_iv_essiv_gen(struct crypt_config *cc, u8 *iv, in crypt_iv_essiv_gen() argument 411 memset(iv, 0, cc->iv_size); in crypt_iv_essiv_gen() [all …]
|
/linux-4.1.27/net/ipv6/ |
D | esp6.c | 100 struct crypto_aead *aead, u8 *iv) in esp_tmp_givreq() argument 104 req = (void *)PTR_ALIGN(iv + crypto_aead_ivsize(aead), in esp_tmp_givreq() 110 static inline struct aead_request *esp_tmp_req(struct crypto_aead *aead, u8 *iv) in esp_tmp_req() argument 114 req = (void *)PTR_ALIGN(iv + crypto_aead_ivsize(aead), in esp_tmp_req() 163 u8 *iv; in esp6_output() local 206 iv = esp_tmp_iv(aead, tmp, seqhilen); in esp6_output() 207 req = esp_tmp_givreq(aead, iv); in esp6_output() 248 aead_givcrypt_set_crypt(req, sg, sg, clen, iv); in esp6_output() 335 u8 *iv; in esp6_input() local 373 iv = esp_tmp_iv(aead, tmp, seqhilen); in esp6_input() [all …]
|
D | mcast.c | 125 int iv; in unsolicited_report_interval() local 128 iv = idev->cnf.mldv1_unsolicited_report_interval; in unsolicited_report_interval() 130 iv = idev->cnf.mldv2_unsolicited_report_interval; in unsolicited_report_interval() 132 return iv > 0 ? iv : 1; in unsolicited_report_interval()
|
/linux-4.1.27/drivers/media/platform/exynos4-is/ |
D | fimc-isp-video.c | 574 struct fimc_is_video *iv; in fimc_isp_video_device_register() local 579 iv = &isp->video_capture; in fimc_isp_video_device_register() 584 INIT_LIST_HEAD(&iv->pending_buf_q); in fimc_isp_video_device_register() 585 INIT_LIST_HEAD(&iv->active_buf_q); in fimc_isp_video_device_register() 586 iv->format = fimc_isp_find_format(NULL, NULL, 0); in fimc_isp_video_device_register() 587 iv->pixfmt.width = IS_DEFAULT_WIDTH; in fimc_isp_video_device_register() 588 iv->pixfmt.height = IS_DEFAULT_HEIGHT; in fimc_isp_video_device_register() 589 iv->pixfmt.pixelformat = iv->format->fourcc; in fimc_isp_video_device_register() 590 iv->pixfmt.colorspace = V4L2_COLORSPACE_SRGB; in fimc_isp_video_device_register() 591 iv->reqbufs_count = 0; in fimc_isp_video_device_register() [all …]
|
/linux-4.1.27/drivers/staging/rtl8188eu/include/ |
D | rtw_security.h | 226 #define GET_TKIP_PN(iv, dot11txpn) \ argument 228 dot11txpn._byte_.TSC0 = iv[2]; \ 229 dot11txpn._byte_.TSC1 = iv[0]; \ 230 dot11txpn._byte_.TSC2 = iv[4]; \ 231 dot11txpn._byte_.TSC3 = iv[5]; \ 232 dot11txpn._byte_.TSC4 = iv[6]; \ 233 dot11txpn._byte_.TSC5 = iv[7]; \
|
D | rtw_xmit.h | 131 u8 iv[18]; member
|
D | rtw_mlme_ext.h | 320 u32 iv; member
|
/linux-4.1.27/drivers/staging/rtl8723au/include/ |
D | rtw_security.h | 183 #define GET_TKIP_PN(iv, dot11txpn)\ argument 185 dot11txpn._byte_.TSC0 = iv[2];\ 186 dot11txpn._byte_.TSC1 = iv[0];\ 187 dot11txpn._byte_.TSC2 = iv[4];\ 188 dot11txpn._byte_.TSC3 = iv[5];\ 189 dot11txpn._byte_.TSC4 = iv[6];\ 190 dot11txpn._byte_.TSC5 = iv[7];\
|
D | rtw_xmit.h | 130 u8 iv[18]; member
|
D | rtw_mlme_ext.h | 330 u32 iv; member
|
/linux-4.1.27/net/ipv4/ |
D | esp4.c | 72 struct crypto_aead *aead, u8 *iv) in esp_tmp_givreq() argument 76 req = (void *)PTR_ALIGN(iv + crypto_aead_ivsize(aead), in esp_tmp_givreq() 82 static inline struct aead_request *esp_tmp_req(struct crypto_aead *aead, u8 *iv) in esp_tmp_req() argument 86 req = (void *)PTR_ALIGN(iv + crypto_aead_ivsize(aead), in esp_tmp_req() 126 u8 *iv; in esp_output() local 179 iv = esp_tmp_iv(aead, tmp, seqhilen); in esp_output() 180 req = esp_tmp_givreq(aead, iv); in esp_output() 256 aead_givcrypt_set_crypt(req, sg, sg, clen, iv); in esp_output() 385 u8 *iv; in esp_input() local 419 iv = esp_tmp_iv(aead, tmp, seqhilen); in esp_input() [all …]
|
/linux-4.1.27/net/mac802154/ |
D | llsec.c | 600 static void llsec_geniv(u8 iv[16], __le64 addr, in llsec_geniv() 606 iv[0] = 1; /* L' = L - 1 = 1 */ in llsec_geniv() 607 memcpy(iv + 1, &addr_bytes, sizeof(addr_bytes)); in llsec_geniv() 608 memcpy(iv + 9, &frame_counter, sizeof(frame_counter)); in llsec_geniv() 609 iv[13] = sec->level; in llsec_geniv() 610 iv[14] = 0; in llsec_geniv() 611 iv[15] = 1; in llsec_geniv() 619 u8 iv[16]; in llsec_do_encrypt_unauth() local 623 .info = iv, in llsec_do_encrypt_unauth() 627 llsec_geniv(iv, sec->params.hwaddr, &hdr->sec); in llsec_do_encrypt_unauth() [all …]
|
/linux-4.1.27/arch/powerpc/crypto/ |
D | aes-spe-glue.c | 62 u32 bytes, u8 *iv); 64 u32 bytes, u8 *iv); 66 u32 bytes, u8 *iv); 68 u32 bytes, u8 *iv, u32 *key_twk); 70 u32 bytes, u8 *iv, u32 *key_twk); 254 ctx->key_enc, ctx->rounds, nbytes, walk.iv); in ppc_cbc_encrypt() 282 ctx->key_dec, ctx->rounds, nbytes, walk.iv); in ppc_cbc_decrypt() 311 ctx->key_enc, ctx->rounds, pbytes , walk.iv); in ppc_ctr_crypt() 342 ctx->key_enc, ctx->rounds, nbytes, walk.iv, twk); in ppc_xts_encrypt() 373 ctx->key_dec, ctx->rounds, nbytes, walk.iv, twk); in ppc_xts_decrypt()
|
/linux-4.1.27/arch/s390/crypto/ |
D | des_s390.c | 31 u8 iv[DES_BLOCK_SIZE]; member 115 u8 iv[DES_BLOCK_SIZE]; in cbc_desall_crypt() member 122 memcpy(param.iv, walk->iv, DES_BLOCK_SIZE); in cbc_desall_crypt() 137 memcpy(walk->iv, param.iv, DES_BLOCK_SIZE); in cbc_desall_crypt() 400 memcpy(ctrptr, walk->iv, DES_BLOCK_SIZE); in ctr_desall_crypt() 430 memcpy(walk->iv, ctrptr, DES_BLOCK_SIZE); in ctr_desall_crypt() 434 memcpy(walk->iv, ctrptr, DES_BLOCK_SIZE); in ctr_desall_crypt() 447 memcpy(walk->iv, ctrbuf, DES_BLOCK_SIZE); in ctr_desall_crypt()
|
D | aes_s390.c | 451 u8 iv[AES_BLOCK_SIZE]; in cbc_aes_crypt() member 458 memcpy(param.iv, walk->iv, AES_BLOCK_SIZE); in cbc_aes_crypt() 473 memcpy(walk->iv, param.iv, AES_BLOCK_SIZE); in cbc_aes_crypt() 637 memcpy(pcc_param.tweak, walk->iv, sizeof(pcc_param.tweak)); in xts_aes_crypt() 791 memcpy(ctrptr, walk->iv, AES_BLOCK_SIZE); in ctr_aes_crypt() 821 memcpy(walk->iv, ctrptr, AES_BLOCK_SIZE); in ctr_aes_crypt() 825 memcpy(walk->iv, ctrptr, AES_BLOCK_SIZE); in ctr_aes_crypt() 840 memcpy(walk->iv, ctrbuf, AES_BLOCK_SIZE); in ctr_aes_crypt()
|
/linux-4.1.27/security/keys/encrypted-keys/ |
D | encrypted.c | 279 u8 *iv = epayload->iv; in datablob_format() local 296 bufp = hex_byte_pack(bufp, iv[i]); in datablob_format() 405 unsigned int key_len, const u8 *iv, in init_blkcipher_desc() argument 424 crypto_blkcipher_set_iv(desc->tfm, iv, ivsize); in init_blkcipher_desc() 480 epayload->iv, ivsize); in derived_key_encrypt() 575 epayload->iv, ivsize); in derived_key_decrypt() 670 ret = hex2bin(epayload->iv, hex_encoded_iv, ivsize); in encrypted_key_decrypt() 717 epayload->iv = epayload->datalen + strlen(datalen) + 1; in __ekey_init() 718 epayload->encrypted_data = epayload->iv + ivsize + 1; in __ekey_init() 759 get_random_bytes(epayload->iv, ivsize); in encrypted_init() [all …]
|
/linux-4.1.27/drivers/crypto/vmx/ |
D | aesp8-ppc.h | 18 const struct aes_key *key, u8 *iv, const int enc); 20 size_t len, const struct aes_key *key, const u8 *iv);
|
D | aes_ctr.c | 93 u8 *ctrblk = walk->iv; in p8_aes_ctr_final() 134 (nbytes & AES_BLOCK_MASK)/AES_BLOCK_SIZE, &ctx->enc_key, walk.iv); in p8_aes_ctr_crypt() 137 crypto_inc(walk.iv, AES_BLOCK_SIZE); in p8_aes_ctr_crypt()
|
D | aes_cbc.c | 118 nbytes & AES_BLOCK_MASK, &ctx->enc_key, walk.iv, 1); in p8_aes_cbc_encrypt() 154 nbytes & AES_BLOCK_MASK, &ctx->dec_key, walk.iv, 0); in p8_aes_cbc_decrypt()
|
/linux-4.1.27/drivers/staging/rtl8192e/rtl8192e/ |
D | rtl_crypto.h | 150 unsigned int nbytes, u8 *iv); 158 unsigned int nbytes, u8 *iv); 326 unsigned int nbytes, u8 *iv) in crypto_cipher_encrypt_iv() argument 330 return tfm->crt_cipher.cit_encrypt_iv(tfm, dst, src, nbytes, iv); in crypto_cipher_encrypt_iv() 345 unsigned int nbytes, u8 *iv) in crypto_cipher_decrypt_iv() argument 349 return tfm->crt_cipher.cit_decrypt_iv(tfm, dst, src, nbytes, iv); in crypto_cipher_decrypt_iv()
|
/linux-4.1.27/drivers/usb/wusbcore/ |
D | crypto.c | 210 void *iv, *dst_buf; in wusb_ccm_mac() local 235 iv = crypto_blkcipher_crt(tfm_cbc)->iv; in wusb_ccm_mac() 237 memset(iv, 0, ivsize); in wusb_ccm_mac() 283 bytewise_xor(mic, &ax, iv, 8); in wusb_ccm_mac()
|
/linux-4.1.27/include/linux/sunrpc/ |
D | gss_krb5.h | 75 void *iv, void *in, void *out, 78 void *iv, void *in, void *out, 266 void *iv, void *in, void *out, int length); 270 void *iv, void *in, void *out, int length);
|
/linux-4.1.27/drivers/net/wireless/p54/ |
D | txrx.c | 462 u8 *iv = (u8 *)(entry_data->align + pad + in p54_rx_frame_sent() local 466 iv[2] = iv[0]; in p54_rx_frame_sent() 467 iv[0] = iv[1]; in p54_rx_frame_sent() 468 iv[1] = (iv[0] | 0x20) & 0x7f; /* WEPSeed - 8.3.2.2 */ in p54_rx_frame_sent() 807 u8 *iv = (u8 *)(skb->data + crypt_offset); in p54_tx_80211() local 812 iv[1] = iv[0]; in p54_tx_80211() 813 iv[0] = iv[2]; in p54_tx_80211() 814 iv[2] = 0; in p54_tx_80211()
|
/linux-4.1.27/drivers/block/ |
D | cryptoloop.c | 149 u32 iv[4] = { 0, }; in cryptoloop_transfer() local 150 iv[0] = cpu_to_le32(IV & 0xffffffff); in cryptoloop_transfer() 155 desc.info = iv; in cryptoloop_transfer()
|
/linux-4.1.27/drivers/crypto/amcc/ |
D | crypto4xx_sa.h | 193 u32 iv[4]; /* for CBC, OFC, and CFB mode */ member 207 u32 iv[4]; /* for CBC, OFC, and CFB mode */ member 221 u32 iv[4]; /* for CBC, OFC, and CFB mode */ member
|
D | crypto4xx_core.h | 186 void *iv, u32 iv_len);
|
D | crypto4xx_core.c | 784 void *iv, u32 iv_len) in crypto4xx_build_pd() argument 874 crypto4xx_memcpy_le(pd_uinfo->sr_va, iv, iv_len); in crypto4xx_build_pd()
|
/linux-4.1.27/net/bluetooth/bnep/ |
D | core.c | 74 struct kvec iv = { data, len }; in bnep_send() local 76 return kernel_sendmsg(sock, &s->msg, &iv, 1, len); in bnep_send() 426 struct kvec iv[3]; in bnep_tx_frame() local 437 iv[il++] = (struct kvec) { &type, 1 }; in bnep_tx_frame() 452 iv[il++] = (struct kvec) { eh->h_source, ETH_ALEN }; in bnep_tx_frame() 457 iv[il++] = (struct kvec) { eh->h_dest, ETH_ALEN }; in bnep_tx_frame() 463 iv[il++] = (struct kvec) { skb->data, skb->len }; in bnep_tx_frame() 468 len = kernel_sendmsg(sock, &s->msg, iv, il, len); in bnep_tx_frame()
|
/linux-4.1.27/include/crypto/ |
D | skcipher.h | 97 unsigned int nbytes, void *iv) in skcipher_givcrypt_set_crypt() argument 99 ablkcipher_request_set_crypt(&req->creq, src, dst, nbytes, iv); in skcipher_givcrypt_set_crypt()
|
D | aead.h | 86 unsigned int nbytes, void *iv) in aead_givcrypt_set_crypt() argument 88 aead_request_set_crypt(&req->areq, src, dst, nbytes, iv); in aead_givcrypt_set_crypt()
|
D | if_alg.h | 46 struct af_alg_iv *iv; member
|
D | algapi.h | 102 u8 *iv; member 123 u8 *iv; member
|
/linux-4.1.27/include/linux/ |
D | memory_hotplug.h | 66 static inline int zone_span_seqretry(struct zone *zone, unsigned iv) in zone_span_seqretry() argument 68 return read_seqretry(&zone->span_seqlock, iv); in zone_span_seqretry() 210 static inline int zone_span_seqretry(struct zone *zone, unsigned iv) in zone_span_seqretry() argument
|
D | crypto.h | 195 u8 *iv; member 621 void *iv; member 1188 unsigned int nbytes, void *iv) in ablkcipher_request_set_crypt() argument 1193 req->info = iv; in ablkcipher_request_set_crypt() 1565 unsigned int cryptlen, u8 *iv) in aead_request_set_crypt() argument 1570 req->iv = iv; in aead_request_set_crypt() 1813 desc->info = crypto_blkcipher_crt(desc->tfm)->iv; in crypto_blkcipher_encrypt() 1866 desc->info = crypto_blkcipher_crt(desc->tfm)->iv; in crypto_blkcipher_decrypt() 1906 memcpy(crypto_blkcipher_crt(tfm)->iv, src, len); in crypto_blkcipher_set_iv() 1922 memcpy(dst, crypto_blkcipher_crt(tfm)->iv, len); in crypto_blkcipher_get_iv()
|
D | ccp.h | 156 struct scatterlist *iv; member 213 struct scatterlist *iv; member
|
/linux-4.1.27/arch/x86/kernel/cpu/mcheck/ |
D | mce.c | 1301 unsigned long iv; in mce_timer_fn() local 1305 iv = __this_cpu_read(mce_next_interval); in mce_timer_fn() 1311 iv = mce_adjust_timer(iv); in mce_timer_fn() 1321 iv = max(iv / 2, (unsigned long) HZ/100); in mce_timer_fn() 1323 iv = min(iv * 2, round_jiffies_relative(check_interval * HZ)); in mce_timer_fn() 1326 __this_cpu_write(mce_next_interval, iv); in mce_timer_fn() 1327 __restart_timer(t, iv); in mce_timer_fn() 1336 unsigned long iv = __this_cpu_read(mce_next_interval); in mce_timer_kick() local 1340 if (interval < iv) in mce_timer_kick() 1654 unsigned long iv = check_interval * HZ; in mce_start_timer() local [all …]
|
/linux-4.1.27/drivers/ssb/ |
D | ssb_private.h | 54 struct ssb_init_invariants *iv); 95 struct ssb_init_invariants *iv); 132 struct ssb_init_invariants *iv);
|
D | pcmcia.c | 622 struct ssb_init_invariants *iv = priv; in ssb_pcmcia_do_get_invariants() local 623 struct ssb_sprom *sprom = &iv->sprom; in ssb_pcmcia_do_get_invariants() 624 struct ssb_boardinfo *bi = &iv->boardinfo; in ssb_pcmcia_do_get_invariants() 705 struct ssb_init_invariants *iv) in ssb_pcmcia_get_invariants() argument 707 struct ssb_sprom *sprom = &iv->sprom; in ssb_pcmcia_get_invariants() 726 ssb_pcmcia_do_get_invariants, iv); in ssb_pcmcia_get_invariants()
|
D | main.c | 762 struct ssb_init_invariants iv; in ssb_fetch_invariants() local 765 memset(&iv, 0, sizeof(iv)); in ssb_fetch_invariants() 766 err = get_invariants(bus, &iv); in ssb_fetch_invariants() 769 memcpy(&bus->boardinfo, &iv.boardinfo, sizeof(iv.boardinfo)); in ssb_fetch_invariants() 770 memcpy(&bus->sprom, &iv.sprom, sizeof(iv.sprom)); in ssb_fetch_invariants() 771 bus->has_cardbus_slot = iv.has_cardbus_slot; in ssb_fetch_invariants()
|
D | sdio.c | 473 struct ssb_init_invariants *iv) in ssb_sdio_get_invariants() argument 475 struct ssb_sprom *sprom = &iv->sprom; in ssb_sdio_get_invariants() 476 struct ssb_boardinfo *bi = &iv->boardinfo; in ssb_sdio_get_invariants()
|
D | pci.c | 936 struct ssb_init_invariants *iv) in ssb_pci_get_invariants() argument 940 err = ssb_pci_sprom_get(bus, &iv->sprom); in ssb_pci_get_invariants() 943 ssb_pci_get_boardinfo(bus, &iv->boardinfo); in ssb_pci_get_invariants()
|
/linux-4.1.27/fs/ext4/ |
D | crypto_fname.c | 67 char iv[EXT4_CRYPTO_BLOCK_SIZE]; in ext4_fname_encrypt() local 101 memset(iv, 0, EXT4_CRYPTO_BLOCK_SIZE); in ext4_fname_encrypt() 106 ablkcipher_request_set_crypt(req, sg, sg, ciphertext_len, iv); in ext4_fname_encrypt() 145 char iv[EXT4_CRYPTO_BLOCK_SIZE]; in ext4_fname_decrypt() local 173 memset(iv, 0, EXT4_CRYPTO_BLOCK_SIZE); in ext4_fname_decrypt() 178 ablkcipher_request_set_crypt(req, sg, sg, iname->len, iv); in ext4_fname_decrypt()
|
/linux-4.1.27/include/keys/ |
D | encrypted-type.h | 26 u8 *iv; /* datablob: iv */ member
|
/linux-4.1.27/include/uapi/linux/ |
D | if_alg.h | 28 __u8 iv[0]; member
|
/linux-4.1.27/drivers/staging/rtl8723au/core/ |
D | rtw_security.c | 155 u8 *pframe, *payload, *iv; /* wepkey */ in rtw_wep_encrypt23a() local 178 iv = pframe + pattrib->hdrlen; in rtw_wep_encrypt23a() 179 memcpy(&wepkey[0], iv, 3); in rtw_wep_encrypt23a() 217 u8 *pframe, *payload, *iv, wepkey[16]; in rtw_wep_decrypt23a() local 230 iv = pframe + prxattrib->hdrlen; in rtw_wep_decrypt23a() 234 memcpy(&wepkey[0], iv, 3); in rtw_wep_decrypt23a() 610 u8 *pframe, *payload, *iv, *prwskey; in rtw_tkip_encrypt23a() local 660 iv = pframe + pattrib->hdrlen; in rtw_tkip_encrypt23a() 663 GET_TKIP_PN(iv, dot11txpn); in rtw_tkip_encrypt23a() 719 u8 *pframe, *payload, *iv, *prwskey; in rtw_tkip_decrypt23a() local [all …]
|
D | rtw_xmit.c | 1139 WEP_IV(pattrib->iv, psta->dot11txpn, in rtw_xmitframe_coalesce23a() 1144 TKIP_IV(pattrib->iv, in rtw_xmitframe_coalesce23a() 1148 TKIP_IV(pattrib->iv, in rtw_xmitframe_coalesce23a() 1153 AES_IV(pattrib->iv, in rtw_xmitframe_coalesce23a() 1157 AES_IV(pattrib->iv, in rtw_xmitframe_coalesce23a() 1163 memcpy(pframe, pattrib->iv, pattrib->iv_len); in rtw_xmitframe_coalesce23a() 1168 pattrib->iv[3], *pframe, *(pframe+1), in rtw_xmitframe_coalesce23a()
|
/linux-4.1.27/drivers/crypto/qce/ |
D | cipher.h | 46 u8 *iv; member
|
D | common.c | 364 qce_xts_swapiv(enciv, rctx->iv, ivsize); in qce_setup_regs_ablkcipher() 366 qce_cpu_to_be32p_array(enciv, rctx->iv, ivsize); in qce_setup_regs_ablkcipher()
|
D | ablkcipher.c | 75 rctx->iv = req->info; in qce_ablkcipher_async_req_handle()
|
/linux-4.1.27/drivers/staging/rtl8188eu/core/ |
D | rtw_security.c | 150 u8 *pframe, *payload, *iv; /* wepkey */ in rtw_wep_encrypt() local 171 iv = pframe+pattrib->hdrlen; in rtw_wep_encrypt() 172 memcpy(&wepkey[0], iv, 3); in rtw_wep_encrypt() 206 u8 *pframe, *payload, *iv, wepkey[16]; in rtw_wep_decrypt() local 216 iv = pframe+prxattrib->hdrlen; in rtw_wep_decrypt() 219 memcpy(&wepkey[0], iv, 3); in rtw_wep_decrypt() 573 u8 *pframe, *payload, *iv, *prwskey; in rtw_tkip_encrypt() local 603 iv = pframe+pattrib->hdrlen; in rtw_tkip_encrypt() 606 GET_TKIP_PN(iv, dot11txpn); in rtw_tkip_encrypt() 653 u8 *pframe, *payload, *iv, *prwskey; in rtw_tkip_decrypt() local [all …]
|
D | rtw_xmit.c | 1031 WEP_IV(pattrib->iv, psta->dot11txpn, pattrib->key_idx); in rtw_xmitframe_coalesce() 1035 TKIP_IV(pattrib->iv, psta->dot11txpn, pattrib->key_idx); in rtw_xmitframe_coalesce() 1037 TKIP_IV(pattrib->iv, psta->dot11txpn, 0); in rtw_xmitframe_coalesce() 1041 AES_IV(pattrib->iv, psta->dot11txpn, pattrib->key_idx); in rtw_xmitframe_coalesce() 1043 AES_IV(pattrib->iv, psta->dot11txpn, 0); in rtw_xmitframe_coalesce() 1047 memcpy(pframe, pattrib->iv, pattrib->iv_len); in rtw_xmitframe_coalesce() 1051 …padapter->securitypriv.dot11PrivacyKeyIndex, pattrib->iv[3], *pframe, *(pframe+1), *(pframe+2), *(… in rtw_xmitframe_coalesce()
|
/linux-4.1.27/Documentation/networking/ |
D | vxge.txt | 40 iv) Jumbo frames 83 iv) vlan_tag_strip
|
D | xfrm_sync.txt | 152 iv) kernel->user to report event when replay threshold or a timeout
|
/linux-4.1.27/kernel/time/ |
D | posix-timers.c | 731 ktime_t now, remaining, iv; in common_timer_get() local 736 iv = timr->it.real.interval; in common_timer_get() 739 if (iv.tv64) in common_timer_get() 740 cur_setting->it_interval = ktime_to_timespec(iv); in common_timer_get() 752 if (iv.tv64 && (timr->it_requeue_pending & REQUEUE_PENDING || in common_timer_get() 754 timr->it_overrun += (unsigned int) hrtimer_forward(timer, now, iv); in common_timer_get()
|
/linux-4.1.27/drivers/net/wireless/b43/ |
D | xmit.c | 335 txhdr->iv[i * 2 + 0] = phase1key[i]; in b43_generate_txhdr() 336 txhdr->iv[i * 2 + 1] = phase1key[i] >> 8; in b43_generate_txhdr() 339 memcpy(txhdr->iv + 10, ((u8 *) wlhdr) + wlhdr_len, 3); in b43_generate_txhdr() 342 ARRAY_SIZE(txhdr->iv)); in b43_generate_txhdr() 343 memcpy(txhdr->iv, ((u8 *) wlhdr) + wlhdr_len, iv_len); in b43_generate_txhdr()
|
D | main.c | 2771 const struct b43_iv *iv; in b43_write_initvals() local 2777 iv = ivals; in b43_write_initvals() 2779 if (array_size < sizeof(iv->offset_size)) in b43_write_initvals() 2781 array_size -= sizeof(iv->offset_size); in b43_write_initvals() 2782 offset = be16_to_cpu(iv->offset_size); in b43_write_initvals() 2790 if (array_size < sizeof(iv->data.d32)) in b43_write_initvals() 2792 array_size -= sizeof(iv->data.d32); in b43_write_initvals() 2794 value = get_unaligned_be32(&iv->data.d32); in b43_write_initvals() 2797 iv = (const struct b43_iv *)((const uint8_t *)iv + in b43_write_initvals() 2803 if (array_size < sizeof(iv->data.d16)) in b43_write_initvals() [all …]
|
D | xmit.h | 37 __u8 iv[16]; /* Encryption IV */ member
|
/linux-4.1.27/sound/pci/ctxfi/ |
D | ctamixer.h | 67 int (*set_invalid_squash)(struct amixer *amixer, unsigned int iv);
|
D | ctamixer.c | 86 static int amixer_set_invalid_squash(struct amixer *amixer, unsigned int iv) in amixer_set_invalid_squash() argument 91 hw->amixer_set_iv(amixer->rsc.ctrl_blk, iv); in amixer_set_invalid_squash()
|
D | cthardware.h | 140 int (*amixer_set_iv)(void *blk, unsigned int iv);
|
D | cthw20k2.c | 618 static int amixer_set_iv(void *blk, unsigned int iv) in amixer_set_iv() argument 622 set_field(&ctl->amoplo, AMOPLO_IV, iv); in amixer_set_iv()
|
/linux-4.1.27/drivers/crypto/ux500/cryp/ |
D | cryp_core.c | 78 u8 *iv; member 285 u32 iv[AES_BLOCK_SIZE / 4]; in cfg_ivs() local 301 iv[i] = uint8p_to_uint32_be(ctx->iv + i*4); in cfg_ivs() 304 status = cfg_iv(device_data, iv[i*2], iv[i*2+1], in cfg_ivs() 394 if (ctx->iv && in cryp_setup_context() 908 ctx->iv = walk.iv; in ablk_crypt()
|
/linux-4.1.27/arch/cris/include/arch-v32/arch/ |
D | cryptocop.h | 85 u8 iv[CRYPTOCOP_MAX_IV_LENGTH]; member
|
/linux-4.1.27/Documentation/device-mapper/ |
D | dm-crypt.txt | 26 in combination with the selected iv mode. 27 Note that for some iv modes the key string can contain additional
|
/linux-4.1.27/drivers/crypto/qat/qat_common/ |
D | qat_algs.c | 659 struct scatterlist *sglout, uint8_t *iv, in qat_alg_sgl_to_bufl() argument 699 bufl->bufers[bufs].addr = dma_map_single(dev, iv, ivlen, in qat_alg_sgl_to_bufl() 850 areq->iv, AES_BLOCK_SIZE, qat_req); in qat_alg_aead_dec() 865 memcpy(cipher_param->u.cipher_IV_array, areq->iv, AES_BLOCK_SIZE); in qat_alg_aead_dec() 881 static int qat_alg_aead_enc_internal(struct aead_request *areq, uint8_t *iv, in qat_alg_aead_enc_internal() argument 894 iv, AES_BLOCK_SIZE, qat_req); in qat_alg_aead_enc_internal() 913 memcpy(cipher_param->u.cipher_IV_array, iv, AES_BLOCK_SIZE); in qat_alg_aead_enc_internal() 933 return qat_alg_aead_enc_internal(areq, areq->iv, 0); in qat_alg_aead_enc()
|
/linux-4.1.27/net/bluetooth/rfcomm/ |
D | core.c | 800 struct kvec iv = { data, len }; in rfcomm_send_frame() local 807 return kernel_sendmsg(s->sock, &msg, &iv, 1, len); in rfcomm_send_frame() 1101 struct kvec iv[3]; in rfcomm_send_test() local 1118 iv[0].iov_base = hdr; in rfcomm_send_test() 1119 iv[0].iov_len = 5; in rfcomm_send_test() 1120 iv[1].iov_base = pattern; in rfcomm_send_test() 1121 iv[1].iov_len = len; in rfcomm_send_test() 1122 iv[2].iov_base = crc; in rfcomm_send_test() 1123 iv[2].iov_len = 1; in rfcomm_send_test() 1127 return kernel_sendmsg(sock, &msg, iv, 3, 6 + len); in rfcomm_send_test()
|
/linux-4.1.27/drivers/media/i2c/ |
D | ov9650.c | 1131 const struct ov965x_interval *iv = &ov965x_intervals[i]; in __ov965x_set_frame_interval() local 1133 if (mbus_fmt->width != iv->size.width || in __ov965x_set_frame_interval() 1134 mbus_fmt->height != iv->size.height) in __ov965x_set_frame_interval() 1136 err = abs64((u64)(iv->interval.numerator * 10000) / in __ov965x_set_frame_interval() 1137 iv->interval.denominator - req_int); in __ov965x_set_frame_interval() 1139 fiv = iv; in __ov965x_set_frame_interval()
|
D | s5k6aa.c | 959 const struct s5k6aa_interval *iv = &s5k6aa_intervals[i]; in __s5k6aa_set_frame_interval() local 961 if (mbus_fmt->width > iv->size.width || in __s5k6aa_set_frame_interval() 962 mbus_fmt->height > iv->size.height) in __s5k6aa_set_frame_interval() 965 err = abs(iv->reg_fr_time - fr_time); in __s5k6aa_set_frame_interval() 967 fiv = iv; in __s5k6aa_set_frame_interval()
|
/linux-4.1.27/drivers/net/wireless/b43legacy/ |
D | main.c | 1815 const struct b43legacy_iv *iv; in b43legacy_write_initvals() local 1821 iv = ivals; in b43legacy_write_initvals() 1823 if (array_size < sizeof(iv->offset_size)) in b43legacy_write_initvals() 1825 array_size -= sizeof(iv->offset_size); in b43legacy_write_initvals() 1826 offset = be16_to_cpu(iv->offset_size); in b43legacy_write_initvals() 1834 if (array_size < sizeof(iv->data.d32)) in b43legacy_write_initvals() 1836 array_size -= sizeof(iv->data.d32); in b43legacy_write_initvals() 1838 value = get_unaligned_be32(&iv->data.d32); in b43legacy_write_initvals() 1841 iv = (const struct b43legacy_iv *)((const uint8_t *)iv + in b43legacy_write_initvals() 1847 if (array_size < sizeof(iv->data.d16)) in b43legacy_write_initvals() [all …]
|
D | xmit.h | 29 __u8 iv[16]; /* Encryption IV */ member
|
D | xmit.c | 258 ARRAY_SIZE(txhdr->iv)); in generate_txhdr_fw3() 259 memcpy(txhdr->iv, ((u8 *)wlhdr) + wlhdr_len, iv_len); in generate_txhdr_fw3()
|
/linux-4.1.27/net/bluetooth/cmtp/ |
D | core.c | 197 struct kvec iv = { data, len }; in cmtp_send_frame() local 207 return kernel_sendmsg(sock, &msg, &iv, 1, len); in cmtp_send_frame()
|
/linux-4.1.27/net/bluetooth/ |
D | a2mp.c | 53 struct kvec iv; in a2mp_send() local 60 iv.iov_base = cmd; in a2mp_send() 61 iv.iov_len = total_len; in a2mp_send() 65 iov_iter_kvec(&msg.msg_iter, WRITE | ITER_KVEC, &iv, 1, total_len); in a2mp_send()
|
D | 6lowpan.c | 527 struct kvec iv; in send_pkt() local 535 iv.iov_base = skb->data; in send_pkt() 536 iv.iov_len = skb->len; in send_pkt() 539 iov_iter_kvec(&msg.msg_iter, WRITE | ITER_KVEC, &iv, 1, skb->len); in send_pkt()
|
D | smp.c | 588 struct kvec iv[2]; in smp_send_cmd() local 596 iv[0].iov_base = &code; in smp_send_cmd() 597 iv[0].iov_len = 1; in smp_send_cmd() 599 iv[1].iov_base = data; in smp_send_cmd() 600 iv[1].iov_len = len; in smp_send_cmd() 604 iov_iter_kvec(&msg.msg_iter, WRITE | ITER_KVEC, iv, 2, 1 + len); in smp_send_cmd()
|
/linux-4.1.27/arch/ia64/include/asm/ |
D | pal.h | 517 iv : 1, /* instruction set field valid */ member 554 iv : 1, /* instruction set field valid */ member 590 iv : 1, /* instruction set field valid */ member 620 iv : 1, /* instruction set field valid */ member 650 iv : 1, /* instruction set field valid */ member
|
/linux-4.1.27/Documentation/devicetree/bindings/powerpc/4xx/ |
D | ppc440spe-adma.txt | 80 iv) Memory Queue Module node
|
D | emac.txt | 137 iv) RGMII node
|
/linux-4.1.27/drivers/media/i2c/s5c73m3/ |
D | s5c73m3-core.c | 911 const struct s5c73m3_interval *iv = &s5c73m3_intervals[i]; in __s5c73m3_set_frame_interval() local 913 if (prev_size->width > iv->size.width || in __s5c73m3_set_frame_interval() 914 prev_size->height > iv->size.height) in __s5c73m3_set_frame_interval() 917 ret = abs(iv->interval.numerator / 1000 - fr_time); in __s5c73m3_set_frame_interval() 919 fiv = iv; in __s5c73m3_set_frame_interval()
|
/linux-4.1.27/fs/ecryptfs/ |
D | crypto.c | 171 int ecryptfs_derive_iv(char *iv, struct ecryptfs_crypt_stat *crypt_stat, in ecryptfs_derive_iv() argument 200 memcpy(iv, dst, crypt_stat->iv_bytes); in ecryptfs_derive_iv() 203 ecryptfs_dump_hex(iv, crypt_stat->iv_bytes); in ecryptfs_derive_iv() 344 unsigned char *iv, int op) in crypt_scatterlist() argument 387 ablkcipher_request_set_crypt(req, src_sg, dst_sg, size, iv); in crypt_scatterlist()
|
D | ecryptfs_kernel.h | 581 void ecryptfs_rotate_iv(unsigned char *iv); 718 int ecryptfs_derive_iv(char *iv, struct ecryptfs_crypt_stat *crypt_stat,
|
D | keystore.c | 605 char iv[ECRYPTFS_MAX_IV_BYTES]; member 837 memset(s->iv, 0, ECRYPTFS_MAX_IV_BYTES); in ecryptfs_write_tag_70_packet() 838 s->desc.info = s->iv; in ecryptfs_write_tag_70_packet() 893 char iv[ECRYPTFS_MAX_IV_BYTES]; member 1037 memset(s->iv, 0, ECRYPTFS_MAX_IV_BYTES); in ecryptfs_parse_tag_70_packet() 1038 s->desc.info = s->iv; in ecryptfs_parse_tag_70_packet()
|
/linux-4.1.27/Documentation/scsi/ |
D | megaraid.txt | 20 iv. Applications have to interface with only module instead of
|
D | ChangeLog.megaraid | 456 iv. In megaraid_mbox_product_info, clear the mailbox contents completely 499 iv. Remove yield() while mailbox handshake in synchronous commands 552 iv. scsi_host_put(), do just before completing HBA shutdown. 594 iv. We now support up to 32 parallel ioctl commands instead of current 1.
|
/linux-4.1.27/drivers/i2c/busses/ |
D | i2c-omap.c | 841 u16 iv, w; in omap_i2c_omap1_isr() local 846 iv = omap_i2c_read_reg(dev, OMAP_I2C_IV_REG); in omap_i2c_omap1_isr() 847 switch (iv) { in omap_i2c_omap1_isr()
|
/linux-4.1.27/Documentation/isdn/ |
D | README.sc | 196 iv) set the eaz of the interface to be the phone number of that 220 "encap" to syncppp. With this done, the rest of the steps, iv) to x) 246 iv) set the packet encapsulation to syncppp
|
/linux-4.1.27/arch/mips/include/asm/octeon/ |
D | cvmx-pip.h | 473 pip_crc_ivx.s.iv = initialization_vector; in cvmx_pip_config_crc()
|
/linux-4.1.27/drivers/staging/vt6656/ |
D | rxtx.c | 717 u8 *iv = ((u8 *)hdr + ieee80211_get_hdrlen_from_skb(skb)); in vnt_fill_txkey() local 726 memcpy(key_buffer, iv, 3); in vnt_fill_txkey() 730 memcpy(key_buffer + 8, iv, 3); in vnt_fill_txkey()
|
/linux-4.1.27/drivers/staging/vt6655/ |
D | rxtx.c | 1217 u8 *iv = ((u8 *)hdr + ieee80211_get_hdrlen_from_skb(skb)); in vnt_fill_txkey() local 1226 memcpy(key_buffer, iv, 3); in vnt_fill_txkey() 1230 memcpy(key_buffer + 8, iv, 3); in vnt_fill_txkey()
|
/linux-4.1.27/include/linux/ssb/ |
D | ssb.h | 519 struct ssb_init_invariants *iv);
|
/linux-4.1.27/net/bluetooth/hidp/ |
D | core.c | 611 struct kvec iv = { data, len }; in hidp_send_frame() local 621 return kernel_sendmsg(sock, &msg, &iv, 1, len); in hidp_send_frame()
|
/linux-4.1.27/Documentation/filesystems/pohmelfs/ |
D | network_protocol.txt | 15 __u64 iv; /* IV sequence */
|
/linux-4.1.27/Documentation/devicetree/bindings/ |
D | xilinx.txt | 264 iv) Xilinx Uartlite
|