/linux-4.4.14/drivers/crypto/nx/ |
D | nx-aes-ccm.c | 82 unsigned int authsize) in ccm_aes_nx_setauthsize() argument 84 switch (authsize) { in ccm_aes_nx_setauthsize() 101 unsigned int authsize) in ccm4309_aes_nx_setauthsize() argument 103 switch (authsize) { in ccm4309_aes_nx_setauthsize() 145 static int generate_b0(u8 *iv, unsigned int assoclen, unsigned int authsize, in generate_b0() argument 148 unsigned int l, lp, m = authsize; in generate_b0() 171 unsigned int authsize, in generate_pat() argument 223 rc = generate_b0(iv, assoclen, authsize, nbytes, b0); in generate_pat() 348 unsigned int authsize = crypto_aead_authsize(crypto_aead_reqtfm(req)); in ccm_nx_decrypt() local 356 nbytes -= authsize; in ccm_nx_decrypt() [all …]
|
D | nx-aes-gcm.c | 96 unsigned int authsize) in gcm4106_aes_nx_setauthsize() argument 98 switch (authsize) { in gcm4106_aes_nx_setauthsize()
|
/linux-4.4.14/crypto/ |
D | authencesn.c | 55 unsigned int authsize) in crypto_authenc_esn_setauthsize() argument 57 if (authsize > 0 && authsize < 4) in crypto_authenc_esn_setauthsize() 109 unsigned int authsize = crypto_aead_authsize(authenc_esn); in crypto_authenc_esn_genicv_tail() local 120 scatterwalk_map_and_copy(hash, dst, assoclen + cryptlen, authsize, 1); in crypto_authenc_esn_genicv_tail() 143 unsigned int authsize = crypto_aead_authsize(authenc_esn); in crypto_authenc_esn_genicv() local 149 if (!authsize) in crypto_authenc_esn_genicv() 234 unsigned int authsize = crypto_aead_authsize(authenc_esn); in crypto_authenc_esn_decrypt_tail() local 242 unsigned int cryptlen = req->cryptlen - authsize; in crypto_authenc_esn_decrypt_tail() 253 if (crypto_memneq(ihash, ohash, authsize)) in crypto_authenc_esn_decrypt_tail() 282 unsigned int authsize = crypto_aead_authsize(authenc_esn); in crypto_authenc_esn_decrypt() local [all …]
|
D | aead.c | 64 int crypto_aead_setauthsize(struct crypto_aead *tfm, unsigned int authsize) in crypto_aead_setauthsize() argument 68 if (authsize > crypto_aead_maxauthsize(tfm)) in crypto_aead_setauthsize() 72 err = crypto_aead_alg(tfm)->setauthsize(tfm, authsize); in crypto_aead_setauthsize() 77 tfm->authsize = authsize; in crypto_aead_setauthsize() 95 aead->authsize = alg->maxauthsize; in crypto_aead_init_tfm() 184 unsigned int authsize) in aead_geniv_setauthsize() argument 188 return crypto_aead_setauthsize(ctx->child, authsize); in aead_geniv_setauthsize()
|
D | gcm.c | 177 unsigned int authsize) in crypto_gcm_setauthsize() argument 179 switch (authsize) { in crypto_gcm_setauthsize() 514 unsigned int authsize = crypto_aead_authsize(aead); in crypto_gcm_verify() local 515 unsigned int cryptlen = req->cryptlen - authsize; in crypto_gcm_verify() 519 req->assoclen + cryptlen, authsize, 0); in crypto_gcm_verify() 520 return crypto_memneq(iauth_tag, auth_tag, authsize) ? -EBADMSG : 0; in crypto_gcm_verify() 549 unsigned int authsize = crypto_aead_authsize(aead); in crypto_gcm_decrypt() local 553 cryptlen -= authsize; in crypto_gcm_decrypt() 807 unsigned int authsize) in crypto_rfc4106_setauthsize() argument 811 switch (authsize) { in crypto_rfc4106_setauthsize() [all …]
|
D | ccm.c | 111 unsigned int authsize) in crypto_ccm_setauthsize() argument 113 switch (authsize) { in crypto_ccm_setauthsize() 389 unsigned int authsize = crypto_aead_authsize(aead); in crypto_ccm_decrypt_done() local 390 unsigned int cryptlen = req->cryptlen - authsize; in crypto_ccm_decrypt_done() 399 if (!err && crypto_memneq(pctx->auth_tag, pctx->odata, authsize)) in crypto_ccm_decrypt_done() 412 unsigned int authsize = crypto_aead_authsize(aead); in crypto_ccm_decrypt() local 419 cryptlen -= authsize; in crypto_ccm_decrypt() 426 authsize, 0); in crypto_ccm_decrypt() 445 if (crypto_memneq(authtag, odata, authsize)) in crypto_ccm_decrypt() 689 unsigned int authsize) in crypto_rfc4309_setauthsize() argument [all …]
|
D | authenc.c | 245 unsigned int authsize = crypto_aead_authsize(authenc); in crypto_authenc_decrypt_tail() local 246 u8 *ihash = ahreq->result + authsize; in crypto_authenc_decrypt_tail() 249 scatterwalk_map_and_copy(ihash, req->src, ahreq->nbytes, authsize, 0); in crypto_authenc_decrypt_tail() 251 if (crypto_memneq(ihash, ahreq->result, authsize)) in crypto_authenc_decrypt_tail() 267 req->cryptlen - authsize, req->iv); in crypto_authenc_decrypt_tail() 289 unsigned int authsize = crypto_aead_authsize(authenc); in crypto_authenc_decrypt() local 304 req->assoclen + req->cryptlen - authsize); in crypto_authenc_decrypt()
|
D | testmgr.c | 441 unsigned int authsize, iv_len; in __test_aead() local 538 authsize = abs(template[i].rlen - template[i].ilen); in __test_aead() 539 ret = crypto_aead_setauthsize(tfm, authsize); in __test_aead() 542 d, authsize, j, algo); in __test_aead() 550 template[i].ilen + (enc ? authsize : 0)); in __test_aead() 560 template[i].rlen + (enc ? 0 : authsize)); in __test_aead() 643 authsize = abs(template[i].rlen - template[i].ilen); in __test_aead() 691 n += authsize; in __test_aead() 698 ret = crypto_aead_setauthsize(tfm, authsize); in __test_aead() 701 d, authsize, j, algo); in __test_aead() [all …]
|
D | pcrypt.c | 111 unsigned int authsize) in pcrypt_aead_setauthsize() argument 115 return crypto_aead_setauthsize(ctx->child, authsize); in pcrypt_aead_setauthsize()
|
D | algif_aead.c | 526 static int aead_setauthsize(void *private, unsigned int authsize) in aead_setauthsize() argument 528 return crypto_aead_setauthsize(private, authsize); in aead_setauthsize()
|
D | chacha20poly1305.c | 506 unsigned int authsize) in chachapoly_setauthsize() argument 508 if (authsize != POLY1305_DIGEST_SIZE) in chachapoly_setauthsize()
|
D | tcrypt.c | 303 unsigned int tcount, u8 authsize, in test_aead_speed() argument 393 ret = crypto_aead_setauthsize(tfm, authsize); in test_aead_speed() 413 *b_size + (enc ? authsize : 0)); in test_aead_speed() 416 *b_size + (enc ? authsize : 0)); in test_aead_speed()
|
D | cryptd.c | 676 unsigned int authsize) in cryptd_aead_setauthsize() argument 681 return crypto_aead_setauthsize(child, authsize); in cryptd_aead_setauthsize()
|
/linux-4.4.14/arch/arm64/crypto/ |
D | aes-ce-ccm-glue.c | 61 static int ccm_setauthsize(struct crypto_aead *tfm, unsigned int authsize) in ccm_setauthsize() argument 63 if ((authsize & 1) || authsize < 4) in ccm_setauthsize() 216 unsigned int authsize = crypto_aead_authsize(aead); in ccm_decrypt() local 225 u32 len = req->cryptlen - authsize; in ccm_decrypt() 271 scatterwalk_map_and_copy(buf, src, req->cryptlen - authsize, in ccm_decrypt() 272 authsize, 0); in ccm_decrypt() 274 if (crypto_memneq(mac, buf, authsize)) in ccm_decrypt()
|
/linux-4.4.14/include/crypto/ |
D | aead.h | 137 int (*setauthsize)(struct crypto_aead *tfm, unsigned int authsize); 152 unsigned int authsize; member 232 return tfm->authsize; in crypto_aead_authsize() 299 int crypto_aead_setauthsize(struct crypto_aead *tfm, unsigned int authsize);
|
D | if_alg.h | 57 int (*setauthsize)(void *private, unsigned int authsize);
|
/linux-4.4.14/drivers/crypto/ |
D | ixp4xx_crypto.c | 351 int authsize = crypto_aead_authsize(tfm); in finish_scattered_hmac() local 352 int decryptlen = req->assoclen + req->cryptlen - authsize; in finish_scattered_hmac() 356 req->dst, decryptlen, authsize, 1); in finish_scattered_hmac() 661 static int setup_auth(struct crypto_tfm *tfm, int encrypt, unsigned authsize, in setup_auth() argument 677 cfgword = algo->cfgword | ( authsize << 6); /* (authsize/4) << 8 */ in setup_auth() 993 unsigned authsize = crypto_aead_authsize(tfm); in aead_perform() local 1016 cryptlen = req->cryptlen -authsize; in aead_perform() 1017 eff_cryptlen -= authsize; in aead_perform() 1054 if (lastlen >= authsize) in aead_perform() 1056 buf->buf_len - authsize; in aead_perform() [all …]
|
D | talitos.c | 947 unsigned int authsize = crypto_aead_authsize(authenc); in ipsec_esp_encrypt_done() local 961 memcpy((char *)sg_virt(sg) + sg->length - authsize, in ipsec_esp_encrypt_done() 962 icvdata, authsize); in ipsec_esp_encrypt_done() 976 unsigned int authsize = crypto_aead_authsize(authenc); in ipsec_esp_decrypt_swauth_done() local 988 icv = (char *)sg_virt(sg) + sg->length - authsize; in ipsec_esp_decrypt_swauth_done() 994 icv = oicv + authsize; in ipsec_esp_decrypt_swauth_done() 998 err = crypto_memneq(oicv, icv, authsize) ? -EBADMSG : 0; in ipsec_esp_decrypt_swauth_done() 1087 unsigned int authsize = crypto_aead_authsize(aead); in ipsec_esp() local 1140 desc->ptr[4].j_extent = authsize; in ipsec_esp() 1144 sg_link_tbl_len += authsize; in ipsec_esp() [all …]
|
D | picoxcell_crypto.c | 489 unsigned int authsize) in spacc_aead_setauthsize() argument 493 return crypto_aead_setauthsize(ctx->sw_cipher, authsize); in spacc_aead_setauthsize() 550 unsigned int authsize = crypto_aead_authsize(aead); in spacc_aead_submit() local 575 proc_len -= authsize; in spacc_aead_submit() 579 writel(authsize, engine->regs + SPA_ICV_LEN_REG_OFFSET); in spacc_aead_submit()
|
/linux-4.4.14/drivers/crypto/caam/ |
D | caamalg.c | 195 unsigned int authsize; member 324 append_seq_store(desc, ctx->authsize, LDST_CLASS_2_CCB | in aead_null_set_sh_desc() 409 append_seq_fifo_load(desc, ctx->authsize, FIFOLD_CLASS_CLASS2 | in aead_null_set_sh_desc() 516 append_seq_store(desc, ctx->authsize, LDST_CLASS_2_CCB | in aead_set_sh_desc() 586 append_seq_fifo_load(desc, ctx->authsize, FIFOLD_CLASS_CLASS2 | in aead_set_sh_desc() 649 append_math_sub_imm_u32(desc, REG3, SEQOUTLEN, IMM, ctx->authsize); in aead_set_sh_desc() 694 append_seq_store(desc, ctx->authsize, LDST_CLASS_2_CCB | in aead_set_sh_desc() 715 unsigned int authsize) in aead_setauthsize() argument 719 ctx->authsize = authsize; in aead_setauthsize() 734 if (!ctx->enckeylen || !ctx->authsize) in gcm_set_sh_desc() [all …]
|
/linux-4.4.14/Documentation/DocBook/ |
D | crypto-API.xml.db | 26 API-crypto-aead-authsize
|
/linux-4.4.14/arch/x86/crypto/ |
D | aesni-intel_glue.c | 914 unsigned int authsize) in common_rfc4106_set_authsize() argument 916 switch (authsize) { in common_rfc4106_set_authsize() 931 unsigned int authsize) in rfc4106_set_authsize() argument 936 return crypto_aead_setauthsize(&cryptd_tfm->base, authsize); in rfc4106_set_authsize()
|