/linux-4.4.14/drivers/s390/cio/ |
D | airq.c | 123 struct airq_iv *iv; in airq_iv_create() local 126 iv = kzalloc(sizeof(*iv), GFP_KERNEL); in airq_iv_create() 127 if (!iv) in airq_iv_create() 129 iv->bits = bits; in airq_iv_create() 131 iv->vector = kzalloc(size, GFP_KERNEL); in airq_iv_create() 132 if (!iv->vector) in airq_iv_create() 135 iv->avail = kmalloc(size, GFP_KERNEL); in airq_iv_create() 136 if (!iv->avail) in airq_iv_create() 138 memset(iv->avail, 0xff, size); in airq_iv_create() 139 iv->end = 0; in airq_iv_create() [all …]
|
/linux-4.4.14/arch/s390/include/asm/ |
D | airq.h | 46 void airq_iv_release(struct airq_iv *iv); 47 unsigned long airq_iv_alloc(struct airq_iv *iv, unsigned long num); 48 void airq_iv_free(struct airq_iv *iv, unsigned long bit, unsigned long num); 49 unsigned long airq_iv_scan(struct airq_iv *iv, unsigned long start, 52 static inline unsigned long airq_iv_alloc_bit(struct airq_iv *iv) in airq_iv_alloc_bit() argument 54 return airq_iv_alloc(iv, 1); in airq_iv_alloc_bit() 57 static inline void airq_iv_free_bit(struct airq_iv *iv, unsigned long bit) in airq_iv_free_bit() argument 59 airq_iv_free(iv, bit, 1); in airq_iv_free_bit() 62 static inline unsigned long airq_iv_end(struct airq_iv *iv) in airq_iv_end() argument 64 return iv->end; in airq_iv_end() [all …]
|
/linux-4.4.14/crypto/ |
D | testmgr.h | 69 char *iv; member 85 char *iv; member 3804 .iv = "\xfe\xdc\xba\x98\x76\x54\x32\x10", 3816 .iv = "\x12\x34\x56\x78\x90\xab\xcd\xef", 3824 .iv = "\xe5\xc7\xcd\xde\x87\x2b\xf2\x7c", 3832 .iv = "\x43\xe9\x34\x00\x8c\x38\x9c\x0f", 3841 .iv = "\xfe\xdc\xba\x98\x76\x54\x32\x10", 3855 .iv = "\xE7\x82\x1D\xB8\x53\x11\xAC\x47", 3930 .iv = "\x12\x34\x56\x78\x90\xab\xcd\xef", 3938 .iv = "\xe5\xc7\xcd\xde\x87\x2b\xf2\x7c", [all …]
|
D | pcbc.c | 55 u8 *iv = walk->iv; in crypto_pcbc_encrypt_segment() local 58 crypto_xor(iv, src, bsize); in crypto_pcbc_encrypt_segment() 59 fn(crypto_cipher_tfm(tfm), dst, iv); in crypto_pcbc_encrypt_segment() 60 memcpy(iv, dst, bsize); in crypto_pcbc_encrypt_segment() 61 crypto_xor(iv, src, bsize); in crypto_pcbc_encrypt_segment() 79 u8 *iv = walk->iv; in crypto_pcbc_encrypt_inplace() local 84 crypto_xor(iv, src, bsize); in crypto_pcbc_encrypt_inplace() 85 fn(crypto_cipher_tfm(tfm), src, iv); in crypto_pcbc_encrypt_inplace() 86 memcpy(iv, tmpbuf, bsize); in crypto_pcbc_encrypt_inplace() 87 crypto_xor(iv, src, bsize); in crypto_pcbc_encrypt_inplace() [all …]
|
D | chainiv.c | 33 char iv[]; member 45 char iv[]; member 68 memcpy(req->giv, ctx->iv, ivsize); in chainiv_givencrypt() 69 memcpy(subreq->info, ctx->iv, ivsize); in chainiv_givencrypt() 75 memcpy(ctx->iv, subreq->info, ivsize); in chainiv_givencrypt() 83 static int chainiv_init_common(struct crypto_tfm *tfm, char iv[]) in chainiv_init_common() argument 90 if (iv) { in chainiv_init_common() 91 err = crypto_rng_get_bytes(crypto_default_rng, iv, in chainiv_init_common() 103 char *iv; in chainiv_init() local 107 iv = NULL; in chainiv_init() [all …]
|
D | cbc.c | 52 u8 *iv = walk->iv; in crypto_cbc_encrypt_segment() local 55 crypto_xor(iv, src, bsize); in crypto_cbc_encrypt_segment() 56 fn(crypto_cipher_tfm(tfm), dst, iv); in crypto_cbc_encrypt_segment() 57 memcpy(iv, dst, bsize); in crypto_cbc_encrypt_segment() 75 u8 *iv = walk->iv; in crypto_cbc_encrypt_inplace() local 78 crypto_xor(src, iv, bsize); in crypto_cbc_encrypt_inplace() 80 iv = src; in crypto_cbc_encrypt_inplace() 85 memcpy(walk->iv, iv, bsize); in crypto_cbc_encrypt_inplace() 124 u8 *iv = walk->iv; in crypto_cbc_decrypt_segment() local 128 crypto_xor(dst, iv, bsize); in crypto_cbc_decrypt_segment() [all …]
|
D | echainiv.c | 75 echainiv_write_iv(subreq->iv, ivsize); in echainiv_encrypt_complete2() 77 if (req->iv != subreq->iv) in echainiv_encrypt_complete2() 78 memcpy(req->iv, subreq->iv, ivsize); in echainiv_encrypt_complete2() 81 if (req->iv != subreq->iv) in echainiv_encrypt_complete2() 82 kzfree(subreq->iv); in echainiv_encrypt_complete2() 112 info = req->iv; in echainiv_encrypt() 134 memcpy(info, req->iv, ivsize); in echainiv_encrypt() 170 req->cryptlen - ivsize, req->iv); in echainiv_decrypt() 173 scatterwalk_map_and_copy(req->iv, req->src, req->assoclen, ivsize, 0); in echainiv_decrypt()
|
D | lrw.c | 105 static inline void inc(be128 *iv) in inc() argument 107 be64_add_cpu(&iv->b, 1); in inc() 108 if (!iv->b) in inc() 109 be64_add_cpu(&iv->a, 1); in inc() 149 be128 *iv; in crypt() local 161 iv = (be128 *)w->iv; in crypt() 162 s.t = *iv; in crypt() 174 &ctx->table.mulinc[get_index128(iv)]); in crypt() 175 inc(iv); in crypt() 226 be128 *iv, *src, *dst, *t; in lrw_crypt() local [all …]
|
D | cts.c | 85 u8 iv[bsize]; in cts_cbc_encrypt() local 98 memcpy(iv, desc->info, bsize); in cts_cbc_encrypt() 101 lcldesc.info = iv; in cts_cbc_encrypt() 171 u8 iv[bsize]; in cts_cbc_decrypt() local 184 lcldesc.info = iv; in cts_cbc_decrypt() 188 memset(iv, 0, sizeof(iv)); in cts_cbc_decrypt() 195 memset(iv, 0, sizeof(iv)); in cts_cbc_decrypt() 196 memcpy(iv, s + bsize, lastn); in cts_cbc_decrypt() 198 crypto_xor(tmp, iv, bsize); in cts_cbc_decrypt() 205 memzero_explicit(iv, sizeof(iv)); in cts_cbc_decrypt()
|
D | ccm.c | 133 unsigned int lp = req->iv[0]; in format_input() 139 memcpy(info, req->iv, 16); in format_input() 301 static inline int crypto_ccm_check_iv(const u8 *iv) in crypto_ccm_check_iv() argument 304 if (1 > iv[0] || iv[0] > 7) in crypto_ccm_check_iv() 314 u8 *iv = req->iv; in crypto_ccm_init_crypt() local 317 err = crypto_ccm_check_iv(iv); in crypto_ccm_init_crypt() 326 memset(iv + 15 - iv[0], 0, iv[0] + 1); in crypto_ccm_init_crypt() 354 u8 *iv = req->iv; in crypto_ccm_encrypt() local 372 ablkcipher_request_set_crypt(abreq, pctx->src, dst, cryptlen + 16, iv); in crypto_ccm_encrypt() 416 u8 *iv = req->iv; in crypto_ccm_decrypt() local [all …]
|
D | algif_aead.c | 42 void *iv; member 199 if (con.iv && con.iv->ivlen != ivsize) in aead_sendmsg() 209 if (con.iv) in aead_sendmsg() 210 memcpy(ctx->iv, con.iv->iv, ivsize); in aead_sendmsg() 445 used, ctx->iv); in aead_recvmsg() 544 sock_kzfree_s(sk, ctx->iv, ivlen); in aead_sock_destruct() 561 ctx->iv = sock_kmalloc(sk, ivlen, GFP_KERNEL); in aead_accept_parent() 562 if (!ctx->iv) { in aead_accept_parent() 566 memset(ctx->iv, 0, ivlen); in aead_accept_parent()
|
D | ablkcipher.c | 141 if (walk->iv != req->info) in ablkcipher_walk_done() 142 memcpy(req->info, walk->iv, tfm->crt_ablkcipher.ivsize); in ablkcipher_walk_done() 198 u8 *iv; in ablkcipher_copy_iv() local 205 iv = (u8 *)ALIGN((unsigned long)walk->iv_buffer, alignmask + 1); in ablkcipher_copy_iv() 206 iv = ablkcipher_get_spot(iv, bs) + aligned_bs; in ablkcipher_copy_iv() 207 iv = ablkcipher_get_spot(iv, bs) + aligned_bs; in ablkcipher_copy_iv() 208 iv = ablkcipher_get_spot(iv, ivsize); in ablkcipher_copy_iv() 210 walk->iv = memcpy(iv, walk->iv, ivsize); in ablkcipher_copy_iv() 280 walk->iv = req->info; in ablkcipher_walk_first() 286 if (unlikely(((unsigned long)walk->iv & alignmask))) { in ablkcipher_walk_first()
|
D | blkcipher.c | 136 if (walk->iv != desc->info) in blkcipher_walk_done() 137 memcpy(desc->info, walk->iv, walk->ivsize); in blkcipher_walk_done() 283 u8 *iv; in blkcipher_copy_iv() local 290 iv = (u8 *)ALIGN((unsigned long)walk->buffer, walk->alignmask + 1); in blkcipher_copy_iv() 291 iv = blkcipher_get_spot(iv, bs) + aligned_bs; in blkcipher_copy_iv() 292 iv = blkcipher_get_spot(iv, bs) + aligned_bs; in blkcipher_copy_iv() 293 iv = blkcipher_get_spot(iv, walk->ivsize); in blkcipher_copy_iv() 295 walk->iv = memcpy(iv, walk->iv, walk->ivsize); in blkcipher_copy_iv() 329 walk->iv = desc->info; in blkcipher_walk_first() 335 if (unlikely(((unsigned long)walk->iv & walk->alignmask))) { in blkcipher_walk_first() [all …]
|
D | ctr.c | 34 u8 iv[CTR_RFC3686_BLOCK_SIZE]; member 60 u8 *ctrblk = walk->iv; in crypto_ctr_crypt_final() 80 u8 *ctrblk = walk->iv; in crypto_ctr_crypt_segment() 108 u8 *ctrblk = walk->iv; in crypto_ctr_crypt_inplace() 287 u8 *iv = rctx->iv; in crypto_rfc3686_crypt() local 290 memcpy(iv, ctx->nonce, CTR_RFC3686_NONCE_SIZE); in crypto_rfc3686_crypt() 291 memcpy(iv + CTR_RFC3686_NONCE_SIZE, req->info, CTR_RFC3686_IV_SIZE); in crypto_rfc3686_crypt() 294 *(__be32 *)(iv + CTR_RFC3686_NONCE_SIZE + CTR_RFC3686_IV_SIZE) = in crypto_rfc3686_crypt() 301 iv); in crypto_rfc3686_crypt()
|
D | seqiv.c | 73 memcpy(req->iv, subreq->iv, crypto_aead_ivsize(geniv)); in seqiv_aead_encrypt_complete2() 76 kzfree(subreq->iv); in seqiv_aead_encrypt_complete2() 165 info = req->iv; in seqiv_aead_encrypt() 186 memcpy(info, req->iv, ivsize); in seqiv_aead_encrypt() 200 if (unlikely(info != req->iv)) in seqiv_aead_encrypt() 224 req->cryptlen - ivsize, req->iv); in seqiv_aead_decrypt() 227 scatterwalk_map_and_copy(req->iv, req->src, req->assoclen, ivsize, 0); in seqiv_aead_decrypt()
|
D | algif_skcipher.c | 43 void *iv; member 329 if (con.iv && con.iv->ivlen != ivsize) in skcipher_sendmsg() 341 if (con.iv) in skcipher_sendmsg() 342 memcpy(ctx->iv, con.iv->iv, ivsize); in skcipher_sendmsg() 519 char *iv; in skcipher_recvmsg_async() local 526 iv = (char *)(req + 1) + reqsize; in skcipher_recvmsg_async() 537 memcpy(iv, ctx->iv, ivsize); in skcipher_recvmsg_async() 616 len, iv); in skcipher_recvmsg_async() 682 ctx->iv); in skcipher_recvmsg_sync() 915 sock_kzfree_s(sk, ctx->iv, crypto_skcipher_ivsize(tfm)); in skcipher_sock_destruct() [all …]
|
D | chacha20_generic.c | 104 void crypto_chacha20_init(u32 *state, struct chacha20_ctx *ctx, u8 *iv) in crypto_chacha20_init() argument 120 state[12] = le32_to_cpuvp(iv + 0); in crypto_chacha20_init() 121 state[13] = le32_to_cpuvp(iv + 4); in crypto_chacha20_init() 122 state[14] = le32_to_cpuvp(iv + 8); in crypto_chacha20_init() 123 state[15] = le32_to_cpuvp(iv + 12); in crypto_chacha20_init() 153 crypto_chacha20_init(state, crypto_blkcipher_ctx(desc->tfm), walk.iv); in crypto_chacha20_crypt()
|
D | chacha20poly1305.c | 54 u8 iv[CHACHA20_IV_SIZE]; member 86 static void chacha_iv(u8 *iv, struct aead_request *req, u32 icb) in chacha_iv() argument 91 memcpy(iv, &leicb, sizeof(leicb)); in chacha_iv() 92 memcpy(iv + sizeof(leicb), ctx->salt, ctx->saltlen); in chacha_iv() 93 memcpy(iv + sizeof(leicb) + ctx->saltlen, req->iv, in chacha_iv() 133 chacha_iv(creq->iv, req, 1); in chacha_decrypt() 148 rctx->cryptlen, creq->iv); in chacha_decrypt() 390 chacha_iv(creq->iv, req, 0); in poly_genkey() 396 POLY1305_KEY_SIZE, creq->iv); in poly_genkey() 418 chacha_iv(creq->iv, req, 1); in chacha_encrypt() [all …]
|
D | gcm.c | 68 u8 iv[16]; member 120 u8 iv[8]; in crypto_gcm_setkey() member 151 sizeof(data->hash), data->iv); in crypto_gcm_setkey() 202 memcpy(pctx->iv, req->iv, 12); in crypto_gcm_init_common() 203 memcpy(pctx->iv + 12, &counter, 4); in crypto_gcm_init_common() 234 pctx->iv); in crypto_gcm_init_crypt() 831 u8 *iv = PTR_ALIGN((u8 *)(subreq + 1) + crypto_aead_reqsize(child), in crypto_rfc4106_crypt() local 834 scatterwalk_map_and_copy(iv + 12, req->src, 0, req->assoclen - 8, 0); in crypto_rfc4106_crypt() 836 memcpy(iv, ctx->nonce, 4); in crypto_rfc4106_crypt() 837 memcpy(iv + 4, req->iv, 8); in crypto_rfc4106_crypt() [all …]
|
D | salsa20_generic.c | 131 static void salsa20_ivsetup(struct salsa20_ctx *ctx, const u8 *iv) in salsa20_ivsetup() argument 133 ctx->input[6] = U8TO32_LITTLE(iv + 0); in salsa20_ivsetup() 134 ctx->input[7] = U8TO32_LITTLE(iv + 4); in salsa20_ivsetup() 189 salsa20_ivsetup(ctx, walk.iv); in encrypt()
|
D | xts.c | 112 s.t = (be128 *)w->iv; in crypt() 119 tw(crypto_cipher_tfm(ctx->tweak), w->iv, w->iv); in crypt() 195 req->tweak_fn(req->tweak_ctx, (u8 *)&t_buf[0], walk.iv); in xts_crypt() 225 *(be128 *)walk.iv = *t; in xts_crypt()
|
D | testmgr.c | 445 char *iv; in __test_aead() local 450 iv = kzalloc(MAX_IVLEN, GFP_KERNEL); in __test_aead() 451 if (!iv) in __test_aead() 512 if (template[i].iv) in __test_aead() 513 memcpy(iv, template[i].iv, iv_len); in __test_aead() 515 memset(iv, 0, iv_len); in __test_aead() 564 template[i].ilen, iv); in __test_aead() 619 if (template[i].iv) in __test_aead() 620 memcpy(iv, template[i].iv, MAX_IVLEN); in __test_aead() 622 memset(iv, 0, MAX_IVLEN); in __test_aead() [all …]
|
D | af_alg.c | 453 if (cmsg->cmsg_len < CMSG_LEN(sizeof(*con->iv))) in af_alg_cmsg_send() 455 con->iv = (void *)CMSG_DATA(cmsg); in af_alg_cmsg_send() 456 if (cmsg->cmsg_len < CMSG_LEN(con->iv->ivlen + in af_alg_cmsg_send() 457 sizeof(*con->iv))) in af_alg_cmsg_send()
|
D | tcrypt.c | 315 char *iv; in test_aead_speed() local 323 iv = kzalloc(MAX_IVLEN, GFP_KERNEL); in test_aead_speed() 324 if (!iv) in test_aead_speed() 397 memset(iv, 0xff, iv_len); in test_aead_speed() 421 aead_request_set_crypt(req, sg, sgout, *b_size, iv); in test_aead_speed() 453 kfree(iv); in test_aead_speed() 463 char iv[128]; in test_cipher_speed() local 532 memset(&iv, 0xff, iv_len); in test_cipher_speed() 533 crypto_blkcipher_set_iv(tfm, iv, iv_len); in test_cipher_speed() 1116 char iv[128]; in test_acipher_speed() local [all …]
|
D | skcipher.c | 61 .info = req->iv, in skcipher_crypt_blkcipher() 156 req->iv); in skcipher_crypt_ablkcipher()
|
D | drbg.c | 390 unsigned char *iv = pad + drbg_blocklen(drbg); in drbg_ctr_df() local 391 unsigned char *temp = iv + drbg_blocklen(drbg); in drbg_ctr_df() 408 memset(iv, 0, drbg_blocklen(drbg)); in drbg_ctr_df() 438 drbg_string_fill(&S1, iv, drbg_blocklen(drbg)); in drbg_ctr_df() 453 drbg_cpu_to_be32(i, iv); in drbg_ctr_df() 492 memset(iv, 0, drbg_blocklen(drbg)); in drbg_ctr_df()
|
D | pcrypt.c | 170 req->cryptlen, req->iv); in pcrypt_aead_encrypt() 212 req->cryptlen, req->iv); in pcrypt_aead_decrypt()
|
D | authenc.c | 225 ablkcipher_request_set_crypt(abreq, src, dst, cryptlen, req->iv); in crypto_authenc_encrypt() 267 req->cryptlen - authsize, req->iv); in crypto_authenc_decrypt_tail()
|
D | authencesn.c | 221 ablkcipher_request_set_crypt(abreq, src, dst, cryptlen, req->iv); in crypto_authenc_esn_encrypt() 262 ablkcipher_request_set_crypt(abreq, dst, dst, cryptlen, req->iv); in crypto_authenc_esn_decrypt_tail()
|
/linux-4.4.14/drivers/staging/wlan-ng/ |
D | p80211wep.c | 147 u8 *iv, u8 *icv) in wep_decrypt() argument 158 key[0] = iv[0]; in wep_decrypt() 159 key[1] = iv[1]; in wep_decrypt() 160 key[2] = iv[2]; in wep_decrypt() 161 keyidx = WEP_KEY(iv[3]); in wep_decrypt() 220 u8 *iv, u8 *icv) in wep_encrypt() argument 237 get_random_bytes(iv, 3); in wep_encrypt() 238 while ((iv[1] == 0xff) && (iv[0] >= 3) && (iv[0] < keylen)) in wep_encrypt() 239 get_random_bytes(iv, 3); in wep_encrypt() 241 iv[3] = (keynum & 0x03) << 6; in wep_encrypt() [all …]
|
D | p80211netdev.h | 232 u8 *iv, u8 *icv); 234 u8 *iv, u8 *icv);
|
D | p80211conv.h | 125 u8 iv[4]; member
|
D | p80211conv.c | 215 p80211_wep->iv, p80211_wep->icv); in skb_ether_to_p80211()
|
/linux-4.4.14/arch/x86/crypto/ |
D | glue_helper-asm-avx2.S | 60 #define load_ctr_16way(iv, bswap, x0, x1, x2, x3, x4, x5, x6, x7, t0, t0x, t1, \ argument 67 vmovdqu (iv), t2x; \ 91 vmovdqu t2x, (iv); 104 #define gf128mul_x_ble(iv, mask, tmp) \ argument 105 vpsrad $31, iv, tmp; \ 106 vpaddq iv, iv, iv; \ 109 vpxor tmp, iv, iv; 111 #define gf128mul_x2_ble(iv, mask1, mask2, tmp0, tmp1) \ argument 112 vpsrad $31, iv, tmp0; \ 113 vpaddq iv, iv, tmp1; \ [all …]
|
D | aesni-intel_glue.c | 68 u8 iv[16]; member 94 const u8 *in, unsigned int len, u8 *iv); 96 const u8 *in, unsigned int len, u8 *iv); 107 const u8 *in, unsigned int len, u8 *iv); 109 const u8 *in, unsigned int len, u8 *iv); 112 const u8 *in, bool enc, u8 *iv); 131 const u8 *in, unsigned long plaintext_len, u8 *iv, 152 const u8 *in, unsigned long ciphertext_len, u8 *iv, 158 asmlinkage void aes_ctr_enc_128_avx_by8(const u8 *in, u8 *iv, 160 asmlinkage void aes_ctr_enc_192_avx_by8(const u8 *in, u8 *iv, [all …]
|
D | glue_helper.c | 101 u128 *iv = (u128 *)walk->iv; in __glue_cbc_encrypt_128bit() local 104 u128_xor(dst, src, iv); in __glue_cbc_encrypt_128bit() 106 iv = dst; in __glue_cbc_encrypt_128bit() 113 *(u128 *)walk->iv = *iv; in __glue_cbc_encrypt_128bit() 185 u128_xor(dst, dst, (u128 *)walk->iv); in __glue_cbc_decrypt_128bit() 186 *(u128 *)walk->iv = last_iv; in __glue_cbc_decrypt_128bit() 227 be128_to_le128(&ctrblk, (be128 *)walk->iv); in glue_ctr_crypt_final_128bit() 233 le128_to_be128((be128 *)walk->iv, &ctrblk); in glue_ctr_crypt_final_128bit() 249 be128_to_le128(&ctrblk, (be128 *)walk->iv); in __glue_ctr_crypt_128bit() 271 le128_to_be128((be128 *)walk->iv, &ctrblk); in __glue_ctr_crypt_128bit() [all …]
|
D | glue_helper-asm-avx.S | 54 #define load_ctr_8way(iv, bswap, x0, x1, x2, x3, x4, x5, x6, x7, t0, t1, t2) \ argument 60 vmovdqu (iv), x7; \ 80 vmovdqu t2, (iv); 93 #define gf128mul_x_ble(iv, mask, tmp) \ argument 94 vpsrad $31, iv, tmp; \ 95 vpaddq iv, iv, iv; \ 98 vpxor tmp, iv, iv; 100 #define load_xts_8way(iv, src, dst, x0, x1, x2, x3, x4, x5, x6, x7, tiv, t0, \ argument 105 vmovdqu (iv), tiv; \ 139 vmovdqu tiv, (iv);
|
D | cast5_avx_glue.c | 46 __be64 *iv); 139 u64 *iv = (u64 *)walk->iv; in __cbc_encrypt() local 142 *dst = *src ^ *iv; in __cbc_encrypt() 144 iv = dst; in __cbc_encrypt() 151 *(u64 *)walk->iv = *iv; in __cbc_encrypt() 221 *dst ^= *(u64 *)walk->iv; in __cbc_decrypt() 222 *(u64 *)walk->iv = last_iv; in __cbc_decrypt() 252 u8 *ctrblk = walk->iv; in ctr_crypt_final() 278 (__be64 *)walk->iv); in __ctr_crypt() 296 ctrblk = *(u64 *)walk->iv; in __ctr_crypt() [all …]
|
D | blowfish_glue.c | 151 u64 *iv = (u64 *)walk->iv; in __cbc_encrypt() local 154 *dst = *src ^ *iv; in __cbc_encrypt() 156 iv = dst; in __cbc_encrypt() 163 *(u64 *)walk->iv = *iv; in __cbc_encrypt() 242 *dst ^= *(u64 *)walk->iv; in __cbc_decrypt() 243 *(u64 *)walk->iv = last_iv; in __cbc_decrypt() 267 u8 *ctrblk = walk->iv; in ctr_crypt_final() 288 u64 ctrblk = be64_to_cpu(*(__be64 *)walk->iv); in __ctr_crypt() 332 *(__be64 *)walk->iv = cpu_to_be64(ctrblk); in __ctr_crypt()
|
D | twofish_glue_3way.c | 65 void twofish_enc_blk_ctr(void *ctx, u128 *dst, const u128 *src, le128 *iv) in twofish_enc_blk_ctr() argument 72 le128_to_be128(&ctrblk, iv); in twofish_enc_blk_ctr() 73 le128_inc(iv); in twofish_enc_blk_ctr() 81 le128 *iv) in twofish_enc_blk_ctr_3way() argument 91 le128_to_be128(&ctrblks[0], iv); in twofish_enc_blk_ctr_3way() 92 le128_inc(iv); in twofish_enc_blk_ctr_3way() 93 le128_to_be128(&ctrblks[1], iv); in twofish_enc_blk_ctr_3way() 94 le128_inc(iv); in twofish_enc_blk_ctr_3way() 95 le128_to_be128(&ctrblks[2], iv); in twofish_enc_blk_ctr_3way() 96 le128_inc(iv); in twofish_enc_blk_ctr_3way()
|
D | des3_ede_glue.c | 158 u64 *iv = (u64 *)walk->iv; in __cbc_encrypt() local 161 *dst = *src ^ *iv; in __cbc_encrypt() 163 iv = dst; in __cbc_encrypt() 170 *(u64 *)walk->iv = *iv; in __cbc_encrypt() 247 *dst ^= *(u64 *)walk->iv; in __cbc_decrypt() 248 *(u64 *)walk->iv = last_iv; in __cbc_decrypt() 273 u8 *ctrblk = walk->iv; in ctr_crypt_final() 294 u64 ctrblk = be64_to_cpu(*(__be64 *)walk->iv); in __ctr_crypt() 333 *(__be64 *)walk->iv = cpu_to_be64(ctrblk); in __ctr_crypt()
|
D | cast6_avx_glue.c | 52 le128 *iv); 55 const u8 *src, le128 *iv); 57 const u8 *src, le128 *iv); 59 static void cast6_xts_enc(void *ctx, u128 *dst, const u128 *src, le128 *iv) in cast6_xts_enc() argument 61 glue_xts_crypt_128bit_one(ctx, dst, src, iv, in cast6_xts_enc() 65 static void cast6_xts_dec(void *ctx, u128 *dst, const u128 *src, le128 *iv) in cast6_xts_dec() argument 67 glue_xts_crypt_128bit_one(ctx, dst, src, iv, in cast6_xts_dec() 71 static void cast6_crypt_ctr(void *ctx, u128 *dst, const u128 *src, le128 *iv) in cast6_crypt_ctr() argument 75 le128_to_be128(&ctrblk, iv); in cast6_crypt_ctr() 76 le128_inc(iv); in cast6_crypt_ctr()
|
D | serpent_avx_glue.c | 57 const u8 *src, le128 *iv); 61 const u8 *src, le128 *iv); 65 const u8 *src, le128 *iv); 68 void __serpent_crypt_ctr(void *ctx, u128 *dst, const u128 *src, le128 *iv) in __serpent_crypt_ctr() argument 72 le128_to_be128(&ctrblk, iv); in __serpent_crypt_ctr() 73 le128_inc(iv); in __serpent_crypt_ctr() 80 void serpent_xts_enc(void *ctx, u128 *dst, const u128 *src, le128 *iv) in serpent_xts_enc() argument 82 glue_xts_crypt_128bit_one(ctx, dst, src, iv, in serpent_xts_enc() 87 void serpent_xts_dec(void *ctx, u128 *dst, const u128 *src, le128 *iv) in serpent_xts_dec() argument 89 glue_xts_crypt_128bit_one(ctx, dst, src, iv, in serpent_xts_dec()
|
D | twofish_avx_glue.c | 57 const u8 *src, le128 *iv); 60 const u8 *src, le128 *iv); 62 const u8 *src, le128 *iv); 70 static void twofish_xts_enc(void *ctx, u128 *dst, const u128 *src, le128 *iv) in twofish_xts_enc() argument 72 glue_xts_crypt_128bit_one(ctx, dst, src, iv, in twofish_xts_enc() 76 static void twofish_xts_dec(void *ctx, u128 *dst, const u128 *src, le128 *iv) in twofish_xts_dec() argument 78 glue_xts_crypt_128bit_one(ctx, dst, src, iv, in twofish_xts_dec()
|
D | camellia_aesni_avx_glue.c | 42 const u8 *src, le128 *iv); 46 const u8 *src, le128 *iv); 50 const u8 *src, le128 *iv); 53 void camellia_xts_enc(void *ctx, u128 *dst, const u128 *src, le128 *iv) in camellia_xts_enc() argument 55 glue_xts_crypt_128bit_one(ctx, dst, src, iv, in camellia_xts_enc() 60 void camellia_xts_dec(void *ctx, u128 *dst, const u128 *src, le128 *iv) in camellia_xts_dec() argument 62 glue_xts_crypt_128bit_one(ctx, dst, src, iv, in camellia_xts_dec()
|
D | camellia_glue.c | 1284 u128 iv = *src; in camellia_decrypt_cbc_2way() local 1288 u128_xor(&dst[1], &dst[1], &iv); in camellia_decrypt_cbc_2way() 1292 void camellia_crypt_ctr(void *ctx, u128 *dst, const u128 *src, le128 *iv) in camellia_crypt_ctr() argument 1299 le128_to_be128(&ctrblk, iv); in camellia_crypt_ctr() 1300 le128_inc(iv); in camellia_crypt_ctr() 1306 void camellia_crypt_ctr_2way(void *ctx, u128 *dst, const u128 *src, le128 *iv) in camellia_crypt_ctr_2way() argument 1315 le128_to_be128(&ctrblks[0], iv); in camellia_crypt_ctr_2way() 1316 le128_inc(iv); in camellia_crypt_ctr_2way() 1317 le128_to_be128(&ctrblks[1], iv); in camellia_crypt_ctr_2way() 1318 le128_inc(iv); in camellia_crypt_ctr_2way()
|
D | salsa20_glue.c | 36 asmlinkage void salsa20_ivsetup(struct salsa20_ctx *ctx, const u8 *iv); 60 salsa20_ivsetup(ctx, walk.iv); in encrypt()
|
D | serpent_sse2_glue.c | 62 static void serpent_crypt_ctr(void *ctx, u128 *dst, const u128 *src, le128 *iv) in serpent_crypt_ctr() argument 66 le128_to_be128(&ctrblk, iv); in serpent_crypt_ctr() 67 le128_inc(iv); in serpent_crypt_ctr() 74 le128 *iv) in serpent_crypt_ctr_xway() argument 83 le128_to_be128(&ctrblks[i], iv); in serpent_crypt_ctr_xway() 84 le128_inc(iv); in serpent_crypt_ctr_xway()
|
D | camellia-aesni-avx2-asm_64.S | 1190 #define gf128mul_x_ble(iv, mask, tmp) \ argument 1191 vpsrad $31, iv, tmp; \ 1192 vpaddq iv, iv, iv; \ 1195 vpxor tmp, iv, iv; 1197 #define gf128mul_x2_ble(iv, mask1, mask2, tmp0, tmp1) \ argument 1198 vpsrad $31, iv, tmp0; \ 1199 vpaddq iv, iv, tmp1; \ 1200 vpsllq $2, iv, iv; \ 1205 vpxor tmp0, iv, iv; \ 1207 vpxor tmp1, iv, iv;
|
D | serpent_avx2_glue.c | 37 le128 *iv); 39 const u8 *src, le128 *iv); 41 const u8 *src, le128 *iv);
|
D | camellia_aesni_avx2_glue.c | 38 const u8 *src, le128 *iv); 41 const u8 *src, le128 *iv); 43 const u8 *src, le128 *iv);
|
D | chacha20_glue.c | 81 crypto_chacha20_init(state, crypto_blkcipher_ctx(desc->tfm), walk.iv); in chacha20_simd()
|
D | camellia-aesni-avx-asm_64.S | 1098 #define gf128mul_x_ble(iv, mask, tmp) \ argument 1099 vpsrad $31, iv, tmp; \ 1100 vpaddq iv, iv, iv; \ 1103 vpxor tmp, iv, iv;
|
D | salsa20-i586-asm_32.S | 1081 # iv = arg2 1085 # in6 = *(uint32 *) (iv + 0) 1087 # in7 = *(uint32 *) (iv + 4)
|
/linux-4.4.14/arch/arm/crypto/ |
D | aesbs-glue.c | 31 struct BS_KEY *key, u8 iv[]); 34 struct BS_KEY *key, u8 const iv[]); 120 u8 *iv = walk.iv; in aesbs_cbc_encrypt() local 123 crypto_xor(src, iv, AES_BLOCK_SIZE); in aesbs_cbc_encrypt() 125 iv = src; in aesbs_cbc_encrypt() 128 memcpy(walk.iv, iv, AES_BLOCK_SIZE); in aesbs_cbc_encrypt() 133 crypto_xor(walk.iv, src, AES_BLOCK_SIZE); in aesbs_cbc_encrypt() 134 AES_encrypt(walk.iv, dst, &ctx->enc); in aesbs_cbc_encrypt() 135 memcpy(walk.iv, dst, AES_BLOCK_SIZE); in aesbs_cbc_encrypt() 159 walk.nbytes, &ctx->dec, walk.iv); in aesbs_cbc_decrypt() [all …]
|
D | aes-ce-glue.c | 33 int rounds, int blocks, u8 iv[]); 35 int rounds, int blocks, u8 iv[]); 41 int rounds, int blocks, u8 iv[], 44 int rounds, int blocks, u8 iv[], 228 walk.iv); in cbc_encrypt() 252 walk.iv); in cbc_decrypt() 275 walk.iv); in ctr_encrypt() 294 num_rounds(ctx), blocks, walk.iv); in ctr_encrypt() 319 walk.iv, (u8 *)ctx->key2.key_enc, first); in xts_encrypt() 344 walk.iv, (u8 *)ctx->key2.key_enc, first); in xts_decrypt()
|
D | aes-ce-core.S | 230 veor q0, q0, q1 @ ..and xor with iv 242 vld1.8 {q6}, [r5] @ keep iv in q6 273 vst1.8 {q6}, [r5] @ keep iv in q6 381 vld1.8 {q0}, [r5] @ load iv
|
/linux-4.4.14/drivers/crypto/nx/ |
D | nx-aes-ccm.c | 135 static inline int crypto_ccm_check_iv(const u8 *iv) in crypto_ccm_check_iv() argument 138 if (1 > iv[0] || iv[0] > 7) in crypto_ccm_check_iv() 145 static int generate_b0(u8 *iv, unsigned int assoclen, unsigned int authsize, in generate_b0() argument 151 memcpy(b0, iv, 16); in generate_b0() 168 static int generate_pat(u8 *iv, in generate_pat() argument 184 memset(iv + 15 - iv[0], 0, iv[0] + 1); in generate_pat() 223 rc = generate_b0(iv, assoclen, authsize, nbytes, b0); in generate_pat() 497 u8 *iv = rctx->iv; in ccm4309_aes_nx_encrypt() local 499 iv[0] = 3; in ccm4309_aes_nx_encrypt() 500 memcpy(iv + 1, nx_ctx->priv.ccm.nonce, 3); in ccm4309_aes_nx_encrypt() [all …]
|
D | nx-aes-ctr.c | 101 processed, csbcpb->cpb.aes_ctr.iv); in ctr_aes_nx_crypt() 134 u8 iv[16]; in ctr3686_aes_nx_crypt() local 136 memcpy(iv, nx_ctx->priv.ctr.nonce, CTR_RFC3686_IV_SIZE); in ctr3686_aes_nx_crypt() 137 memcpy(iv + CTR_RFC3686_NONCE_SIZE, in ctr3686_aes_nx_crypt() 139 iv[12] = iv[13] = iv[14] = 0; in ctr3686_aes_nx_crypt() 140 iv[15] = 1; in ctr3686_aes_nx_crypt() 142 desc->info = iv; in ctr3686_aes_nx_crypt()
|
D | nx-aes-gcm.c | 335 desc.info = rctx->iv; in gcm_aes_nx_crypt() 434 char *iv = rctx->iv; in gcm_aes_nx_encrypt() local 436 memcpy(iv, req->iv, 12); in gcm_aes_nx_encrypt() 444 char *iv = rctx->iv; in gcm_aes_nx_decrypt() local 446 memcpy(iv, req->iv, 12); in gcm_aes_nx_decrypt() 456 char *iv = rctx->iv; in gcm4106_aes_nx_encrypt() local 459 memcpy(iv, nonce, NX_GCM4106_NONCE_LEN); in gcm4106_aes_nx_encrypt() 460 memcpy(iv + NX_GCM4106_NONCE_LEN, req->iv, 8); in gcm4106_aes_nx_encrypt() 473 char *iv = rctx->iv; in gcm4106_aes_nx_decrypt() local 476 memcpy(iv, nonce, NX_GCM4106_NONCE_LEN); in gcm4106_aes_nx_decrypt() [all …]
|
D | nx.h | 97 u8 iv[16]; member 109 u8 iv[16]; member
|
D | nx_csbcpb.h | 11 u8 iv[16]; member 42 u8 iv[16]; member
|
D | nx-aes-cbc.c | 88 processed, csbcpb->cpb.aes_cbc.iv); in cbc_aes_nx_crypt()
|
D | nx.c | 277 u8 *iv) in nx_build_sg_lists() argument 290 if (iv) in nx_build_sg_lists() 291 memcpy(iv, desc->info, AES_BLOCK_SIZE); in nx_build_sg_lists()
|
/linux-4.4.14/drivers/scsi/ |
D | sd_dif.c | 131 struct bio_vec iv; in sd_dif_prepare() local 141 bip_for_each_vec(iv, bip, iter) { in sd_dif_prepare() 142 pi = kmap_atomic(iv.bv_page) + iv.bv_offset; in sd_dif_prepare() 144 for (j = 0; j < iv.bv_len; j += tuple_sz, pi++) { in sd_dif_prepare() 183 struct bio_vec iv; in sd_dif_complete() local 188 bip_for_each_vec(iv, bip, iter) { in sd_dif_complete() 189 pi = kmap_atomic(iv.bv_page) + iv.bv_offset; in sd_dif_complete() 191 for (j = 0; j < iv.bv_len; j += tuple_sz, pi++) { in sd_dif_complete()
|
/linux-4.4.14/block/ |
D | blk-integrity.c | 43 struct bio_vec iv, ivprv = { NULL }; in blk_rq_count_integrity_sg() local 49 bio_for_each_integrity_vec(iv, bio, iter) { in blk_rq_count_integrity_sg() 52 if (!BIOVEC_PHYS_MERGEABLE(&ivprv, &iv)) in blk_rq_count_integrity_sg() 55 if (!BIOVEC_SEG_BOUNDARY(q, &ivprv, &iv)) in blk_rq_count_integrity_sg() 58 if (seg_size + iv.bv_len > queue_max_segment_size(q)) in blk_rq_count_integrity_sg() 61 seg_size += iv.bv_len; in blk_rq_count_integrity_sg() 65 seg_size = iv.bv_len; in blk_rq_count_integrity_sg() 69 ivprv = iv; in blk_rq_count_integrity_sg() 89 struct bio_vec iv, ivprv = { NULL }; in blk_rq_map_integrity_sg() local 95 bio_for_each_integrity_vec(iv, bio, iter) { in blk_rq_map_integrity_sg() [all …]
|
D | bio-integrity.c | 139 struct bio_vec *iv; in bio_integrity_add_page() local 146 iv = bip->bip_vec + bip->bip_vcnt; in bio_integrity_add_page() 153 iv->bv_page = page; in bio_integrity_add_page() 154 iv->bv_len = len; in bio_integrity_add_page() 155 iv->bv_offset = offset; in bio_integrity_add_page()
|
/linux-4.4.14/net/mac80211/ |
D | wep.c | 57 static inline bool ieee80211_wep_weak_iv(u32 iv, int keylen) in ieee80211_wep_weak_iv() argument 64 if ((iv & 0xff00) == 0xff00) { in ieee80211_wep_weak_iv() 65 u8 B = (iv >> 16) & 0xff; in ieee80211_wep_weak_iv() 74 int keylen, int keyidx, u8 *iv) in ieee80211_wep_get_iv() argument 80 if (!iv) in ieee80211_wep_get_iv() 83 *iv++ = (local->wep_iv >> 16) & 0xff; in ieee80211_wep_get_iv() 84 *iv++ = (local->wep_iv >> 8) & 0xff; in ieee80211_wep_get_iv() 85 *iv++ = local->wep_iv & 0xff; in ieee80211_wep_get_iv() 86 *iv++ = keyidx << 6; in ieee80211_wep_get_iv() 165 u8 *iv; in ieee80211_wep_encrypt() local [all …]
|
D | aes_gmac.c | 32 u8 zero[GMAC_MIC_LEN], iv[AES_BLOCK_SIZE]; in ieee80211_aes_gmac() local 46 memcpy(iv, nonce, GMAC_NONCE_LEN); in ieee80211_aes_gmac() 47 memset(iv + GMAC_NONCE_LEN, 0, sizeof(iv) - GMAC_NONCE_LEN); in ieee80211_aes_gmac() 48 iv[AES_BLOCK_SIZE - 1] = 0x01; in ieee80211_aes_gmac() 51 aead_request_set_crypt(aead_req, sg, sg, 0, iv); in ieee80211_aes_gmac()
|
/linux-4.4.14/arch/x86/include/asm/crypto/ |
D | serpent-avx.h | 27 const u8 *src, le128 *iv); 30 const u8 *src, le128 *iv); 32 const u8 *src, le128 *iv); 35 le128 *iv); 37 extern void serpent_xts_enc(void *ctx, u128 *dst, const u128 *src, le128 *iv); 38 extern void serpent_xts_dec(void *ctx, u128 *dst, const u128 *src, le128 *iv);
|
D | camellia.h | 60 const u8 *src, le128 *iv); 63 const u8 *src, le128 *iv); 65 const u8 *src, le128 *iv); 94 le128 *iv); 96 le128 *iv); 98 extern void camellia_xts_enc(void *ctx, u128 *dst, const u128 *src, le128 *iv); 99 extern void camellia_xts_dec(void *ctx, u128 *dst, const u128 *src, le128 *iv);
|
D | twofish.h | 34 le128 *iv); 36 le128 *iv);
|
D | glue_helper.h | 16 le128 *iv); 18 le128 *iv); 143 le128 *iv, common_glue_func_t fn);
|
/linux-4.4.14/arch/mips/bcm47xx/ |
D | setup.c | 105 struct ssb_init_invariants *iv) in bcm47xx_get_invariants() argument 111 memset(&iv->boardinfo, 0 , sizeof(struct ssb_boardinfo)); in bcm47xx_get_invariants() 115 err = kstrtou16(strim(buf), 0, &iv->boardinfo.vendor); in bcm47xx_get_invariants() 120 if (!iv->boardinfo.vendor) in bcm47xx_get_invariants() 121 iv->boardinfo.vendor = SSB_BOARDVENDOR_BCM; in bcm47xx_get_invariants() 125 err = kstrtou16(strim(buf), 0, &iv->boardinfo.type); in bcm47xx_get_invariants() 131 memset(&iv->sprom, 0, sizeof(struct ssb_sprom)); in bcm47xx_get_invariants() 132 bcm47xx_fill_sprom(&iv->sprom, NULL, false); in bcm47xx_get_invariants() 135 iv->has_cardbus_slot = !!simple_strtoul(buf, NULL, 10); in bcm47xx_get_invariants()
|
/linux-4.4.14/net/rxrpc/ |
D | rxkad.c | 118 struct rxrpc_crypt iv; in rxkad_prime_packet_security() local 129 memcpy(&iv, token->kad->session_key, sizeof(iv)); in rxkad_prime_packet_security() 132 desc.info = iv.x; in rxkad_prime_packet_security() 160 struct rxrpc_crypt iv; in rxkad_secure_packet_auth() local 179 memset(&iv, 0, sizeof(iv)); in rxkad_secure_packet_auth() 181 desc.info = iv.x; in rxkad_secure_packet_auth() 207 struct rxrpc_crypt iv; in rxkad_secure_packet_encrypt() local 225 memcpy(&iv, token->kad->session_key, sizeof(iv)); in rxkad_secure_packet_encrypt() 227 desc.info = iv.x; in rxkad_secure_packet_encrypt() 260 struct rxrpc_crypt iv; in rxkad_secure_packet() local [all …]
|
/linux-4.4.14/drivers/crypto/ |
D | padlock-aes.c | 199 u8 *iv, struct cword *control_word, int count) in rep_xcrypt_cbc() argument 202 : "+S" (input), "+D" (output), "+a" (iv) in rep_xcrypt_cbc() 204 return iv; in rep_xcrypt_cbc() 222 u8 *iv, struct cword *cword, int count) in cbc_crypt_copy() argument 232 return rep_xcrypt_cbc(tmp, out, key, iv, cword, count); in cbc_crypt_copy() 250 u8 *iv, struct cword *cword, int count) in cbc_crypt() argument 254 return cbc_crypt_copy(in, out, key, iv, cword, count); in cbc_crypt() 256 return rep_xcrypt_cbc(in, out, key, iv, cword, count); in cbc_crypt() 280 u8 *iv, void *control_word, u32 count) in padlock_xcrypt_cbc() argument 285 return cbc_crypt(input, output, key, iv, control_word, count); in padlock_xcrypt_cbc() [all …]
|
D | geode-aes.c | 95 _writefield(AES_WRITEIV0_REG, op->iv); in geode_aes_crypt() 107 _readfield(AES_WRITEIV0_REG, op->iv); in geode_aes_crypt() 317 op->iv = walk.iv; in geode_cbc_decrypt() 349 op->iv = walk.iv; in geode_cbc_encrypt()
|
D | ixp4xx_crypto.c | 124 u8 iv[MAX_IVLEN]; /* IV for CBC mode or CTR IV for CTR mode */ member 917 memcpy(crypt->iv, req->info, ivsize); in ablk_perform() 969 u8 iv[CTR_RFC3686_BLOCK_SIZE]; in ablk_rfc3686_crypt() local 974 memcpy(iv, ctx->nonce, CTR_RFC3686_NONCE_SIZE); in ablk_rfc3686_crypt() 975 memcpy(iv + CTR_RFC3686_NONCE_SIZE, info, CTR_RFC3686_IV_SIZE); in ablk_rfc3686_crypt() 978 *(__be32 *)(iv + CTR_RFC3686_NONCE_SIZE + CTR_RFC3686_IV_SIZE) = in ablk_rfc3686_crypt() 981 req->info = iv; in ablk_rfc3686_crypt() 988 int cryptoffset, int eff_cryptlen, u8 *iv) in aead_perform() argument 1033 BUG_ON(ivsize && !req->iv); in aead_perform() 1034 memcpy(crypt->iv, req->iv, ivsize); in aead_perform() [all …]
|
D | geode-aes.h | 64 u8 *iv; member
|
D | s5p-sss.c | 380 uint8_t *key, uint8_t *iv, unsigned int keylen) in s5p_set_aes() argument 384 if (iv) in s5p_set_aes() 385 memcpy(dev->aes_ioaddr + SSS_REG_AES_IV_DATA(0), iv, 0x10); in s5p_set_aes()
|
D | hifn_795x.c | 655 u8 *iv; member 1124 u8 *key, int keylen, u8 *iv, int ivsize, u16 mode) in hifn_setup_crypto_command() argument 1154 memcpy(buf_pos, iv, ivsize); in hifn_setup_crypto_command() 1198 if (rctx->iv && rctx->mode != ACRYPTO_MODE_ECB) in hifn_setup_cmd_desc() 1253 rctx->iv, rctx->ivsize, md); in hifn_setup_cmd_desc() 1583 if (rctx->iv && !rctx->ivsize && rctx->mode != ACRYPTO_MODE_ECB) in hifn_setup_session() 1635 dev->name, rctx->iv, rctx->ivsize, in hifn_setup_session() 1662 rctx.iv = NULL; in hifn_test() 2123 rctx->iv = req->info; in hifn_setup_crypto_req()
|
D | picoxcell_crypto.c | 234 size_t key_len, const u8 *iv, size_t iv_len) in spacc_cipher_write_ctx() argument 240 memcpy_toio32(iv_ptr, iv, iv_len / 4); in spacc_cipher_write_ctx() 250 const u8 *iv, size_t ivlen, const u8 *hash_key, in spacc_load_ctx() argument 260 spacc_cipher_write_ctx(ctx, ciph_page_addr, ciph_key, ciph_len, iv, in spacc_load_ctx() 532 req->iv); in spacc_aead_do_fallback() 559 ctx->cipher_key_len, aead_req->iv, crypto_aead_ivsize(aead), in spacc_aead_submit()
|
D | talitos.c | 815 u8 iv[TALITOS_MAX_IV_LENGTH]; member 1209 map_single_talitos_ptr(dev, &desc->ptr[6], ivsize, ctx->iv, in ipsec_esp() 1226 u8 *iv, in talitos_edesc_alloc() argument 1250 iv_dma = dma_map_single(dev, iv, ivsize, DMA_TO_DEVICE); in talitos_edesc_alloc() 1306 static struct talitos_edesc *aead_edesc_alloc(struct aead_request *areq, u8 *iv, in aead_edesc_alloc() argument 1315 iv, areq->assoclen, areq->cryptlen, in aead_edesc_alloc() 1327 edesc = aead_edesc_alloc(req, req->iv, 0, true); in aead_encrypt() 1350 edesc = aead_edesc_alloc(req, req->iv, 1, false); in aead_decrypt() 1592 map_single_talitos_ptr(dev, &desc->ptr[5], ivsize, ctx->iv, in common_nonsnoop()
|
/linux-4.4.14/drivers/staging/rtl8192u/ieee80211/ |
D | ieee80211_crypt_wep.c | 30 u32 iv; member 57 get_random_bytes(&priv->iv, 4); in prism2_wep_init() 110 wep->iv++; in prism2_wep_encrypt() 115 if ((wep->iv & 0xff00) == 0xff00) { in prism2_wep_encrypt() 116 u8 B = (wep->iv >> 16) & 0xff; in prism2_wep_encrypt() 119 wep->iv += 0x0100; in prism2_wep_encrypt() 123 *pos++ = key[0] = (wep->iv >> 16) & 0xff; in prism2_wep_encrypt() 124 *pos++ = key[1] = (wep->iv >> 8) & 0xff; in prism2_wep_encrypt() 125 *pos++ = key[2] = wep->iv & 0xff; in prism2_wep_encrypt()
|
/linux-4.4.14/drivers/staging/rtl8192e/ |
D | rtllib_crypt_wep.c | 26 u32 iv; member 59 get_random_bytes(&priv->iv, 4); in prism2_wep_init() 120 wep->iv++; in prism2_wep_encrypt() 126 if ((wep->iv & 0xff00) == 0xff00) { in prism2_wep_encrypt() 127 u8 B = (wep->iv >> 16) & 0xff; in prism2_wep_encrypt() 130 wep->iv += 0x0100; in prism2_wep_encrypt() 134 *pos++ = key[0] = (wep->iv >> 16) & 0xff; in prism2_wep_encrypt() 135 *pos++ = key[1] = (wep->iv >> 8) & 0xff; in prism2_wep_encrypt() 136 *pos++ = key[2] = wep->iv & 0xff; in prism2_wep_encrypt()
|
/linux-4.4.14/net/wireless/ |
D | lib80211_crypt_wep.c | 33 u32 iv; member 63 get_random_bytes(&priv->iv, 4); in lib80211_wep_init() 107 wep->iv++; in lib80211_wep_build_iv() 112 if ((wep->iv & 0xff00) == 0xff00) { in lib80211_wep_build_iv() 113 u8 B = (wep->iv >> 16) & 0xff; in lib80211_wep_build_iv() 115 wep->iv += 0x0100; in lib80211_wep_build_iv() 119 *pos++ = (wep->iv >> 16) & 0xff; in lib80211_wep_build_iv() 120 *pos++ = (wep->iv >> 8) & 0xff; in lib80211_wep_build_iv() 121 *pos++ = wep->iv & 0xff; in lib80211_wep_build_iv()
|
/linux-4.4.14/drivers/staging/rtl8712/ |
D | rtl871x_security.h | 182 #define GET_TKIP_PN(iv, txpn) \ argument 184 txpn._byte_.TSC0 = iv[2];\ 185 txpn._byte_.TSC1 = iv[0];\ 186 txpn._byte_.TSC2 = iv[4];\ 187 txpn._byte_.TSC3 = iv[5];\ 188 txpn._byte_.TSC4 = iv[6];\ 189 txpn._byte_.TSC5 = iv[7];\
|
D | rtl871x_security.c | 169 u8 *pframe, *payload, *iv; /*,*wepkey*/ in r8712_wep_encrypt() local 185 iv = pframe + pattrib->hdrlen; in r8712_wep_encrypt() 186 memcpy(&wepkey[0], iv, 3); in r8712_wep_encrypt() 226 u8 *pframe, *payload, *iv, wepkey[16]; in r8712_wep_decrypt() local 237 iv = pframe + prxattrib->hdrlen; in r8712_wep_decrypt() 238 keyindex = (iv[3] & 0x3); in r8712_wep_decrypt() 240 memcpy(&wepkey[0], iv, 3); in r8712_wep_decrypt() 581 u8 *pframe, *payload, *iv, *prwskey; in r8712_tkip_encrypt() local 603 iv = pframe + pattrib->hdrlen; in r8712_tkip_encrypt() 606 GET_TKIP_PN(iv, txpn); in r8712_tkip_encrypt() [all …]
|
D | rtl871x_xmit.c | 637 WEP_IV(pattrib->iv, psta->txpn, in r8712_xmitframe_coalesce() 643 TKIP_IV(pattrib->iv, in r8712_xmitframe_coalesce() 648 TKIP_IV(pattrib->iv, psta->txpn, in r8712_xmitframe_coalesce() 653 AES_IV(pattrib->iv, psta->txpn, in r8712_xmitframe_coalesce() 657 AES_IV(pattrib->iv, psta->txpn, in r8712_xmitframe_coalesce() 662 memcpy(pframe, pattrib->iv, pattrib->iv_len); in r8712_xmitframe_coalesce()
|
D | rtl871x_recv.c | 166 u8 *mickey, idx, *iv; in r8712_recvframe_chkmic() local 176 iv = precvframe->u.hdr.rx_data + in r8712_recvframe_chkmic() 178 idx = iv[3]; in r8712_recvframe_chkmic()
|
D | rtl871x_xmit.h | 125 unsigned char iv[8]; member
|
/linux-4.4.14/net/ceph/ |
D | crypto.c | 168 void *iv; in ceph_aes_encrypt() local 188 iv = crypto_blkcipher_crt(tfm)->iv; in ceph_aes_encrypt() 190 memcpy(iv, aes_iv, ivsize); in ceph_aes_encrypt() 228 void *iv; in ceph_aes_encrypt2() local 249 iv = crypto_blkcipher_crt(tfm)->iv; in ceph_aes_encrypt2() 251 memcpy(iv, aes_iv, ivsize); in ceph_aes_encrypt2() 290 void *iv; in ceph_aes_decrypt() local 306 iv = crypto_blkcipher_crt(tfm)->iv; in ceph_aes_decrypt() 308 memcpy(iv, aes_iv, ivsize); in ceph_aes_decrypt() 355 void *iv; in ceph_aes_decrypt2() local [all …]
|
/linux-4.4.14/drivers/crypto/ccp/ |
D | ccp-crypto-aes.c | 35 memcpy(req->info, rctx->iv, AES_BLOCK_SIZE); in ccp_aes_complete() 91 memcpy(rctx->iv, req->info, AES_BLOCK_SIZE); in ccp_aes_crypt() 94 sg_init_one(iv_sg, rctx->iv, iv_len); in ccp_aes_crypt() 106 rctx->cmd.u.aes.iv = iv_sg; in ccp_aes_crypt() 173 u8 *iv; in ccp_aes_rfc3686_crypt() local 176 iv = rctx->rfc3686_iv; in ccp_aes_rfc3686_crypt() 177 memcpy(iv, ctx->u.aes.nonce, CTR_RFC3686_NONCE_SIZE); in ccp_aes_rfc3686_crypt() 179 iv += CTR_RFC3686_NONCE_SIZE; in ccp_aes_rfc3686_crypt() 180 memcpy(iv, req->info, CTR_RFC3686_IV_SIZE); in ccp_aes_rfc3686_crypt() 182 iv += CTR_RFC3686_IV_SIZE; in ccp_aes_rfc3686_crypt() [all …]
|
D | ccp-crypto-aes-cmac.c | 50 memcpy(req->result, rctx->iv, digest_size); in ccp_aes_cmac_complete() 105 sg_init_one(&rctx->iv_sg, rctx->iv, sizeof(rctx->iv)); in ccp_do_cmac_update() 167 rctx->cmd.u.aes.iv = &rctx->iv_sg; in ccp_do_cmac_update() 232 memcpy(state.iv, rctx->iv, sizeof(state.iv)); in ccp_aes_cmac_export() 252 memcpy(rctx->iv, state.iv, sizeof(rctx->iv)); in ccp_aes_cmac_import()
|
D | ccp-crypto.h | 97 u8 iv[AES_BLOCK_SIZE]; member 119 u8 iv[AES_BLOCK_SIZE]; member 135 u8 iv[AES_BLOCK_SIZE]; member
|
D | ccp-crypto-aes-xts.c | 92 memcpy(req->info, rctx->iv, AES_BLOCK_SIZE); in ccp_aes_xts_complete() 160 memcpy(rctx->iv, req->info, AES_BLOCK_SIZE); in ccp_aes_xts_crypt() 161 sg_init_one(&rctx->iv_sg, rctx->iv, AES_BLOCK_SIZE); in ccp_aes_xts_crypt() 171 rctx->cmd.u.xts.iv = &rctx->iv_sg; in ccp_aes_xts_crypt()
|
D | ccp-ops.c | 904 if (!aes->key || !aes->iv || !aes->src) in ccp_run_aes_cmac_cmd() 960 ccp_set_dm_area(&ctx, dm_offset, aes->iv, 0, aes->iv_len); in ccp_run_aes_cmac_cmd() 1019 ccp_get_dm_area(&ctx, dm_offset, aes->iv, 0, aes->iv_len); in ccp_run_aes_cmac_cmd() 1064 if (!aes->iv) in ccp_run_aes_cmd() 1115 ccp_set_dm_area(&ctx, dm_offset, aes->iv, 0, aes->iv_len); in ccp_run_aes_cmd() 1182 ccp_get_dm_area(&ctx, dm_offset, aes->iv, 0, aes->iv_len); in ccp_run_aes_cmd() 1242 if (!xts->key || !xts->iv || !xts->src || !xts->dst) in ccp_run_xts_aes_cmd() 1289 ccp_set_dm_area(&ctx, 0, xts->iv, 0, xts->iv_len); in ccp_run_xts_aes_cmd() 1346 ccp_get_dm_area(&ctx, dm_offset, xts->iv, 0, xts->iv_len); in ccp_run_xts_aes_cmd()
|
/linux-4.4.14/arch/sparc/crypto/ |
D | aes_glue.c | 43 unsigned int len, u64 *iv); 45 unsigned int len, u64 *iv); 47 unsigned int len, u64 *iv); 95 u64 *iv); 99 u64 *iv); 103 u64 *iv); 107 u64 *iv); 111 u64 *iv); 115 u64 *iv); 119 u64 *iv); [all …]
|
D | des_glue.c | 139 unsigned int len, u64 *iv); 160 block_len, (u64 *) walk.iv); in cbc_encrypt() 170 unsigned int len, u64 *iv); 191 block_len, (u64 *) walk.iv); in cbc_decrypt() 311 u64 *iv); 336 (u64 *) walk.iv); in cbc3_encrypt() 347 u64 *iv); 372 (u64 *) walk.iv); in cbc3_decrypt()
|
D | camellia_glue.c | 141 const u64 *key, u64 *iv); 178 (u64 *) walk.iv); in cbc_encrypt() 217 (u64 *) walk.iv); in cbc_decrypt()
|
/linux-4.4.14/net/sunrpc/auth_gss/ |
D | gss_krb5_crypto.c | 55 void * iv, in krb5_encrypt() argument 74 if (iv) in krb5_encrypt() 75 memcpy(local_iv, iv, crypto_blkcipher_ivsize(tfm)); in krb5_encrypt() 89 void * iv, in krb5_decrypt() argument 107 if (iv) in krb5_decrypt() 108 memcpy(local_iv,iv, crypto_blkcipher_ivsize(tfm)); in krb5_decrypt() 389 u8 iv[GSS_KRB5_MAX_BLOCKSIZE]; member 470 memset(desc.iv, 0, sizeof(desc.iv)); in gss_encrypt_xdr_buf() 472 desc.desc.info = desc.iv; in gss_encrypt_xdr_buf() 488 u8 iv[GSS_KRB5_MAX_BLOCKSIZE]; member [all …]
|
/linux-4.4.14/arch/arm64/crypto/ |
D | aes-ce-ccm-glue.c | 72 u32 l = req->iv[0] + 1; in ccm_init_mac() 89 memcpy(maciv, req->iv, AES_BLOCK_SIZE - l); in ccm_init_mac() 102 memset(&req->iv[AES_BLOCK_SIZE - l], 0, l); in ccm_init_mac() 152 struct blkcipher_desc desc = { .info = req->iv }; in ccm_encrypt() 173 memcpy(buf, req->iv, AES_BLOCK_SIZE); in ccm_encrypt() 192 num_rounds(ctx), mac, walk.iv); in ccm_encrypt() 217 struct blkcipher_desc desc = { .info = req->iv }; in ccm_decrypt() 238 memcpy(buf, req->iv, AES_BLOCK_SIZE); in ccm_decrypt() 257 num_rounds(ctx), mac, walk.iv); in ccm_decrypt()
|
D | aes-glue.c | 63 int rounds, int blocks, u8 iv[], int first); 65 int rounds, int blocks, u8 iv[], int first); 71 int rounds, int blocks, u8 const rk2[], u8 iv[], 74 int rounds, int blocks, u8 const rk2[], u8 iv[], 158 (u8 *)ctx->key_enc, rounds, blocks, walk.iv, in cbc_encrypt() 181 (u8 *)ctx->key_dec, rounds, blocks, walk.iv, in cbc_decrypt() 205 (u8 *)ctx->key_enc, rounds, blocks, walk.iv, in ctr_encrypt() 226 blocks, walk.iv, first); in ctr_encrypt() 251 (u8 *)ctx->key2.key_enc, walk.iv, first); in xts_encrypt() 275 (u8 *)ctx->key2.key_enc, walk.iv, first); in xts_decrypt()
|
/linux-4.4.14/drivers/crypto/caam/ |
D | pdb.h | 58 u32 iv[4]; member 64 u32 iv[2]; member 72 u32 iv[2]; member 78 u32 iv[2]; member 268 u32 iv[4]; member 287 u32 iv[4]; member 294 u32 iv[4]; member 311 u32 iv[4]; member
|
/linux-4.4.14/drivers/net/wireless/rt2x00/ |
D | rt2x00crypto.c | 110 memcpy(skbdesc->iv, skb->data + txdesc->iv_offset, txdesc->iv_len); in rt2x00crypto_tx_copy_iv() 121 memcpy(skbdesc->iv, skb->data + txdesc->iv_offset, txdesc->iv_len); in rt2x00crypto_tx_remove_iv() 138 ((!!(skbdesc->iv[0])) * 4) + ((!!(skbdesc->iv[1])) * 4); in rt2x00crypto_tx_insert_iv() 149 memcpy(skb->data + header_length, skbdesc->iv, iv_len); in rt2x00crypto_tx_insert_iv() 224 memcpy(skb->data + transfer, rxdesc->iv, iv_len); in rt2x00crypto_rx_insert_iv()
|
D | rt2x00queue.h | 116 __le32 iv[2]; member 191 __le32 iv[2]; member
|
D | rt2500usb.c | 1119 _rt2x00_desc_write(txd, 3, skbdesc->iv[0]); in rt2500usb_write_tx_desc() 1120 _rt2x00_desc_write(txd, 4, skbdesc->iv[1]); in rt2500usb_write_tx_desc() 1270 _rt2x00_desc_read(rxd, 2, &rxdesc->iv[0]); in rt2500usb_fill_rxdone() 1271 _rt2x00_desc_read(rxd, 3, &rxdesc->iv[1]); in rt2500usb_fill_rxdone()
|
D | rt73usb.c | 1506 _rt2x00_desc_write(txd, 3, skbdesc->iv[0]); in rt73usb_write_tx_desc() 1507 _rt2x00_desc_write(txd, 4, skbdesc->iv[1]); in rt73usb_write_tx_desc() 1702 _rt2x00_desc_read(rxd, 2, &rxdesc->iv[0]); in rt73usb_fill_rxdone() 1703 _rt2x00_desc_read(rxd, 3, &rxdesc->iv[1]); in rt73usb_fill_rxdone()
|
/linux-4.4.14/drivers/md/ |
D | dm-crypt.c | 82 int (*generator)(struct crypt_config *cc, u8 *iv, 84 int (*post)(struct crypt_config *cc, u8 *iv, 244 static int crypt_iv_plain_gen(struct crypt_config *cc, u8 *iv, in crypt_iv_plain_gen() argument 247 memset(iv, 0, cc->iv_size); in crypt_iv_plain_gen() 248 *(__le32 *)iv = cpu_to_le32(dmreq->iv_sector & 0xffffffff); in crypt_iv_plain_gen() 253 static int crypt_iv_plain64_gen(struct crypt_config *cc, u8 *iv, in crypt_iv_plain64_gen() argument 256 memset(iv, 0, cc->iv_size); in crypt_iv_plain64_gen() 257 *(__le64 *)iv = cpu_to_le64(dmreq->iv_sector); in crypt_iv_plain64_gen() 407 static int crypt_iv_essiv_gen(struct crypt_config *cc, u8 *iv, in crypt_iv_essiv_gen() argument 412 memset(iv, 0, cc->iv_size); in crypt_iv_essiv_gen() [all …]
|
/linux-4.4.14/Documentation/DocBook/ |
D | s390-drivers.xml.db | 62 API-airq-iv-create 63 API-airq-iv-release 64 API-airq-iv-alloc 65 API-airq-iv-free 66 API-airq-iv-scan
|
D | crypto-API.xml.db | 47 API-crypto-blkcipher-encrypt-iv 49 API-crypto-blkcipher-decrypt-iv 50 API-crypto-blkcipher-set-iv 51 API-crypto-blkcipher-get-iv
|
D | 80211.xml.db | 148 API-ieee80211-get-tkip-p1k-iv
|
/linux-4.4.14/include/crypto/ |
D | skcipher.h | 32 u8 *iv; member 138 unsigned int nbytes, void *iv) in skcipher_givcrypt_set_crypt() argument 140 ablkcipher_request_set_crypt(&req->creq, src, dst, nbytes, iv); in skcipher_givcrypt_set_crypt() 497 unsigned int cryptlen, void *iv) in skcipher_request_set_crypt() argument 502 req->iv = iv; in skcipher_request_set_crypt()
|
D | aead.h | 92 u8 *iv; member 512 unsigned int cryptlen, u8 *iv) in aead_request_set_crypt() argument 517 req->iv = iv; in aead_request_set_crypt()
|
D | chacha20.h | 19 void crypto_chacha20_init(u32 *state, struct chacha20_ctx *ctx, u8 *iv);
|
D | if_alg.h | 46 struct af_alg_iv *iv; member
|
D | algapi.h | 105 u8 *iv; member 126 u8 *iv; member
|
/linux-4.4.14/drivers/media/platform/exynos4-is/ |
D | fimc-isp-video.c | 576 struct fimc_is_video *iv; in fimc_isp_video_device_register() local 581 iv = &isp->video_capture; in fimc_isp_video_device_register() 586 INIT_LIST_HEAD(&iv->pending_buf_q); in fimc_isp_video_device_register() 587 INIT_LIST_HEAD(&iv->active_buf_q); in fimc_isp_video_device_register() 588 iv->format = fimc_isp_find_format(NULL, NULL, 0); in fimc_isp_video_device_register() 589 iv->pixfmt.width = IS_DEFAULT_WIDTH; in fimc_isp_video_device_register() 590 iv->pixfmt.height = IS_DEFAULT_HEIGHT; in fimc_isp_video_device_register() 591 iv->pixfmt.pixelformat = iv->format->fourcc; in fimc_isp_video_device_register() 592 iv->pixfmt.colorspace = V4L2_COLORSPACE_SRGB; in fimc_isp_video_device_register() 593 iv->reqbufs_count = 0; in fimc_isp_video_device_register() [all …]
|
/linux-4.4.14/drivers/staging/rtl8723au/include/ |
D | rtw_security.h | 183 #define GET_TKIP_PN(iv, dot11txpn)\ argument 185 dot11txpn._byte_.TSC0 = iv[2];\ 186 dot11txpn._byte_.TSC1 = iv[0];\ 187 dot11txpn._byte_.TSC2 = iv[4];\ 188 dot11txpn._byte_.TSC3 = iv[5];\ 189 dot11txpn._byte_.TSC4 = iv[6];\ 190 dot11txpn._byte_.TSC5 = iv[7];\
|
D | rtw_xmit.h | 130 u8 iv[18]; member
|
/linux-4.4.14/drivers/staging/rtl8188eu/include/ |
D | rtw_security.h | 226 #define GET_TKIP_PN(iv, dot11txpn) \ argument 228 dot11txpn._byte_.TSC0 = iv[2]; \ 229 dot11txpn._byte_.TSC1 = iv[0]; \ 230 dot11txpn._byte_.TSC2 = iv[4]; \ 231 dot11txpn._byte_.TSC3 = iv[5]; \ 232 dot11txpn._byte_.TSC4 = iv[6]; \ 233 dot11txpn._byte_.TSC5 = iv[7]; \
|
D | rtw_xmit.h | 131 u8 iv[18]; member
|
/linux-4.4.14/net/mac802154/ |
D | llsec.c | 602 static void llsec_geniv(u8 iv[16], __le64 addr, in llsec_geniv() 608 iv[0] = 1; /* L' = L - 1 = 1 */ in llsec_geniv() 609 memcpy(iv + 1, &addr_bytes, sizeof(addr_bytes)); in llsec_geniv() 610 memcpy(iv + 9, &frame_counter, sizeof(frame_counter)); in llsec_geniv() 611 iv[13] = sec->level; in llsec_geniv() 612 iv[14] = 0; in llsec_geniv() 613 iv[15] = 1; in llsec_geniv() 621 u8 iv[16]; in llsec_do_encrypt_unauth() local 625 .info = iv, in llsec_do_encrypt_unauth() 629 llsec_geniv(iv, sec->params.hwaddr, &hdr->sec); in llsec_do_encrypt_unauth() [all …]
|
/linux-4.4.14/arch/powerpc/crypto/ |
D | aes-spe-glue.c | 62 u32 bytes, u8 *iv); 64 u32 bytes, u8 *iv); 66 u32 bytes, u8 *iv); 68 u32 bytes, u8 *iv, u32 *key_twk); 70 u32 bytes, u8 *iv, u32 *key_twk); 254 ctx->key_enc, ctx->rounds, nbytes, walk.iv); in ppc_cbc_encrypt() 282 ctx->key_dec, ctx->rounds, nbytes, walk.iv); in ppc_cbc_decrypt() 311 ctx->key_enc, ctx->rounds, pbytes , walk.iv); in ppc_ctr_crypt() 342 ctx->key_enc, ctx->rounds, nbytes, walk.iv, twk); in ppc_xts_encrypt() 373 ctx->key_dec, ctx->rounds, nbytes, walk.iv, twk); in ppc_xts_decrypt()
|
/linux-4.4.14/net/ipv6/ |
D | esp6.c | 99 static inline struct aead_request *esp_tmp_req(struct crypto_aead *aead, u8 *iv) in esp_tmp_req() argument 103 req = (void *)PTR_ALIGN(iv + crypto_aead_ivsize(aead), in esp_tmp_req() 167 u8 *iv; in esp6_output() local 210 iv = esp_tmp_iv(aead, tmp, seqhilen); in esp6_output() 211 req = esp_tmp_req(aead, iv); in esp6_output() 255 aead_request_set_crypt(req, sg, sg, ivlen + clen, iv); in esp6_output() 261 memset(iv, 0, ivlen); in esp6_output() 262 memcpy(iv + ivlen - min(ivlen, 8), (u8 *)&seqno + 8 - min(ivlen, 8), in esp6_output() 368 u8 *iv; in esp6_input() local 403 iv = esp_tmp_iv(aead, tmp, seqhilen); in esp6_input() [all …]
|
D | mcast.c | 125 int iv; in unsolicited_report_interval() local 128 iv = idev->cnf.mldv1_unsolicited_report_interval; in unsolicited_report_interval() 130 iv = idev->cnf.mldv2_unsolicited_report_interval; in unsolicited_report_interval() 132 return iv > 0 ? iv : 1; in unsolicited_report_interval()
|
/linux-4.4.14/arch/s390/crypto/ |
D | des_s390.c | 32 u8 iv[DES_BLOCK_SIZE]; member 116 u8 iv[DES_BLOCK_SIZE]; in cbc_desall_crypt() member 123 memcpy(param.iv, walk->iv, DES_BLOCK_SIZE); in cbc_desall_crypt() 138 memcpy(walk->iv, param.iv, DES_BLOCK_SIZE); in cbc_desall_crypt() 401 memcpy(ctrptr, walk->iv, DES_BLOCK_SIZE); in ctr_desall_crypt() 431 memcpy(walk->iv, ctrptr, DES_BLOCK_SIZE); in ctr_desall_crypt() 435 memcpy(walk->iv, ctrptr, DES_BLOCK_SIZE); in ctr_desall_crypt() 448 memcpy(walk->iv, ctrbuf, DES_BLOCK_SIZE); in ctr_desall_crypt()
|
D | aes_s390.c | 452 u8 iv[AES_BLOCK_SIZE]; in cbc_aes_crypt() member 459 memcpy(param.iv, walk->iv, AES_BLOCK_SIZE); in cbc_aes_crypt() 474 memcpy(walk->iv, param.iv, AES_BLOCK_SIZE); in cbc_aes_crypt() 638 memcpy(pcc_param.tweak, walk->iv, sizeof(pcc_param.tweak)); in xts_aes_crypt() 792 memcpy(ctrptr, walk->iv, AES_BLOCK_SIZE); in ctr_aes_crypt() 822 memcpy(walk->iv, ctrptr, AES_BLOCK_SIZE); in ctr_aes_crypt() 826 memcpy(walk->iv, ctrptr, AES_BLOCK_SIZE); in ctr_aes_crypt() 841 memcpy(walk->iv, ctrbuf, AES_BLOCK_SIZE); in ctr_aes_crypt()
|
/linux-4.4.14/net/ipv4/ |
D | esp4.c | 71 static inline struct aead_request *esp_tmp_req(struct crypto_aead *aead, u8 *iv) in esp_tmp_req() argument 75 req = (void *)PTR_ALIGN(iv + crypto_aead_ivsize(aead), in esp_tmp_req() 130 u8 *iv; in esp_output() local 183 iv = esp_tmp_iv(aead, tmp, seqhilen); in esp_output() 184 req = esp_tmp_req(aead, iv); in esp_output() 263 aead_request_set_crypt(req, sg, sg, ivlen + clen, iv); in esp_output() 269 memset(iv, 0, ivlen); in esp_output() 270 memcpy(iv + ivlen - min(ivlen, 8), (u8 *)&seqno + 8 - min(ivlen, 8), in esp_output() 418 u8 *iv; in esp_input() local 449 iv = esp_tmp_iv(aead, tmp, seqhilen); in esp_input() [all …]
|
/linux-4.4.14/security/keys/encrypted-keys/ |
D | encrypted.c | 279 u8 *iv = epayload->iv; in datablob_format() local 296 bufp = hex_byte_pack(bufp, iv[i]); in datablob_format() 405 unsigned int key_len, const u8 *iv, in init_blkcipher_desc() argument 424 crypto_blkcipher_set_iv(desc->tfm, iv, ivsize); in init_blkcipher_desc() 480 epayload->iv, ivsize); in derived_key_encrypt() 575 epayload->iv, ivsize); in derived_key_decrypt() 670 ret = hex2bin(epayload->iv, hex_encoded_iv, ivsize); in encrypted_key_decrypt() 717 epayload->iv = epayload->datalen + strlen(datalen) + 1; in __ekey_init() 718 epayload->encrypted_data = epayload->iv + ivsize + 1; in __ekey_init() 759 get_random_bytes(epayload->iv, ivsize); in encrypted_init() [all …]
|
/linux-4.4.14/drivers/crypto/vmx/ |
D | aesp8-ppc.h | 18 const struct aes_key *key, u8 *iv, const int enc); 21 const u8 *iv);
|
D | aes_ctr.c | 96 u8 *ctrblk = walk->iv; in p8_aes_ctr_final() 144 walk.iv); in p8_aes_ctr_crypt() 151 crypto_inc(walk.iv, AES_BLOCK_SIZE); in p8_aes_ctr_crypt()
|
D | aes_cbc.c | 127 &ctx->enc_key, walk.iv, 1); in p8_aes_cbc_encrypt() 168 &ctx->dec_key, walk.iv, 0); in p8_aes_cbc_decrypt()
|
/linux-4.4.14/drivers/usb/wusbcore/ |
D | crypto.c | 210 void *iv, *dst_buf; in wusb_ccm_mac() local 235 iv = crypto_blkcipher_crt(tfm_cbc)->iv; in wusb_ccm_mac() 237 memset(iv, 0, ivsize); in wusb_ccm_mac() 283 bytewise_xor(mic, &ax, iv, 8); in wusb_ccm_mac()
|
/linux-4.4.14/include/linux/sunrpc/ |
D | gss_krb5.h | 75 void *iv, void *in, void *out, 78 void *iv, void *in, void *out, 266 void *iv, void *in, void *out, int length); 270 void *iv, void *in, void *out, int length);
|
/linux-4.4.14/fs/f2fs/ |
D | crypto_fname.c | 78 char iv[F2FS_CRYPTO_BLOCK_SIZE]; in f2fs_fname_encrypt() local 119 memset(iv, 0, F2FS_CRYPTO_BLOCK_SIZE); in f2fs_fname_encrypt() 124 ablkcipher_request_set_crypt(req, &src_sg, &dst_sg, ciphertext_len, iv); in f2fs_fname_encrypt() 157 char iv[F2FS_CRYPTO_BLOCK_SIZE]; in f2fs_fname_decrypt() local 175 memset(iv, 0, F2FS_CRYPTO_BLOCK_SIZE); in f2fs_fname_decrypt() 180 ablkcipher_request_set_crypt(req, &src_sg, &dst_sg, iname->len, iv); in f2fs_fname_decrypt()
|
/linux-4.4.14/drivers/net/wireless/p54/ |
D | txrx.c | 462 u8 *iv = (u8 *)(entry_data->align + pad + in p54_rx_frame_sent() local 466 iv[2] = iv[0]; in p54_rx_frame_sent() 467 iv[0] = iv[1]; in p54_rx_frame_sent() 468 iv[1] = (iv[0] | 0x20) & 0x7f; /* WEPSeed - 8.3.2.2 */ in p54_rx_frame_sent() 807 u8 *iv = (u8 *)(skb->data + crypt_offset); in p54_tx_80211() local 812 iv[1] = iv[0]; in p54_tx_80211() 813 iv[0] = iv[2]; in p54_tx_80211() 814 iv[2] = 0; in p54_tx_80211()
|
/linux-4.4.14/drivers/block/ |
D | cryptoloop.c | 149 u32 iv[4] = { 0, }; in cryptoloop_transfer() local 150 iv[0] = cpu_to_le32(IV & 0xffffffff); in cryptoloop_transfer() 155 desc.info = iv; in cryptoloop_transfer()
|
/linux-4.4.14/drivers/crypto/amcc/ |
D | crypto4xx_sa.h | 193 u32 iv[4]; /* for CBC, OFC, and CFB mode */ member 207 u32 iv[4]; /* for CBC, OFC, and CFB mode */ member 221 u32 iv[4]; /* for CBC, OFC, and CFB mode */ member
|
D | crypto4xx_core.h | 186 void *iv, u32 iv_len);
|
/linux-4.4.14/fs/ext4/ |
D | crypto_fname.c | 73 char iv[EXT4_CRYPTO_BLOCK_SIZE]; in ext4_fname_encrypt() local 115 memset(iv, 0, EXT4_CRYPTO_BLOCK_SIZE); in ext4_fname_encrypt() 120 ablkcipher_request_set_crypt(req, &src_sg, &dst_sg, ciphertext_len, iv); in ext4_fname_encrypt() 154 char iv[EXT4_CRYPTO_BLOCK_SIZE]; in ext4_fname_decrypt() local 176 memset(iv, 0, EXT4_CRYPTO_BLOCK_SIZE); in ext4_fname_decrypt() 181 ablkcipher_request_set_crypt(req, &src_sg, &dst_sg, iname->len, iv); in ext4_fname_decrypt()
|
/linux-4.4.14/net/bluetooth/bnep/ |
D | core.c | 74 struct kvec iv = { data, len }; in bnep_send() local 76 return kernel_sendmsg(sock, &s->msg, &iv, 1, len); in bnep_send() 426 struct kvec iv[3]; in bnep_tx_frame() local 437 iv[il++] = (struct kvec) { &type, 1 }; in bnep_tx_frame() 452 iv[il++] = (struct kvec) { eh->h_source, ETH_ALEN }; in bnep_tx_frame() 457 iv[il++] = (struct kvec) { eh->h_dest, ETH_ALEN }; in bnep_tx_frame() 463 iv[il++] = (struct kvec) { skb->data, skb->len }; in bnep_tx_frame() 468 len = kernel_sendmsg(sock, &s->msg, iv, il, len); in bnep_tx_frame()
|
/linux-4.4.14/drivers/crypto/marvell/ |
D | hash.c | 1218 memcpy(tmpl.ctx.hash.iv, ctx->iv, sizeof(ctx->iv)); in mv_cesa_ahmac_md5_init() 1237 ctx->iv[i] = be32_to_cpu(istate.hash[i]); in mv_cesa_ahmac_md5_setkey() 1240 ctx->iv[i + 8] = be32_to_cpu(ostate.hash[i]); in mv_cesa_ahmac_md5_setkey() 1288 memcpy(tmpl.ctx.hash.iv, ctx->iv, sizeof(ctx->iv)); in mv_cesa_ahmac_sha1_init() 1307 ctx->iv[i] = be32_to_cpu(istate.state[i]); in mv_cesa_ahmac_sha1_setkey() 1310 ctx->iv[i + 8] = be32_to_cpu(ostate.state[i]); in mv_cesa_ahmac_sha1_setkey() 1364 ctx->iv[i] = be32_to_cpu(istate.state[i]); in mv_cesa_ahmac_sha256_setkey() 1367 ctx->iv[i + 8] = be32_to_cpu(ostate.state[i]); in mv_cesa_ahmac_sha256_setkey() 1378 memcpy(tmpl.ctx.hash.iv, ctx->iv, sizeof(ctx->iv)); in mv_cesa_ahmac_sha256_init()
|
D | cesa.h | 241 u32 iv[4]; member 252 u32 iv[16]; member 495 u32 iv[16]; member
|
D | cipher.c | 491 memcpy(tmpl->ctx.blkcipher.iv, req->info, DES_BLOCK_SIZE); in mv_cesa_cbc_des_op() 611 memcpy(tmpl->ctx.blkcipher.iv, req->info, DES3_EDE_BLOCK_SIZE); in mv_cesa_cbc_des3_op() 752 memcpy(tmpl->ctx.blkcipher.iv, req->info, AES_BLOCK_SIZE); in mv_cesa_cbc_aes_op()
|
/linux-4.4.14/include/linux/ |
D | memory_hotplug.h | 67 static inline int zone_span_seqretry(struct zone *zone, unsigned iv) in zone_span_seqretry() argument 69 return read_seqretry(&zone->span_seqlock, iv); in zone_span_seqretry() 211 static inline int zone_span_seqretry(struct zone *zone, unsigned iv) in zone_span_seqretry() argument
|
D | ccp.h | 156 struct scatterlist *iv; member 213 struct scatterlist *iv; member
|
D | crypto.h | 506 void *iv; member 1055 unsigned int nbytes, void *iv) in ablkcipher_request_set_crypt() argument 1060 req->info = iv; in ablkcipher_request_set_crypt() 1286 desc->info = crypto_blkcipher_crt(desc->tfm)->iv; in crypto_blkcipher_encrypt() 1339 desc->info = crypto_blkcipher_crt(desc->tfm)->iv; in crypto_blkcipher_decrypt() 1379 memcpy(crypto_blkcipher_crt(tfm)->iv, src, len); in crypto_blkcipher_set_iv() 1395 memcpy(dst, crypto_blkcipher_crt(tfm)->iv, len); in crypto_blkcipher_get_iv()
|
/linux-4.4.14/arch/x86/kernel/cpu/mcheck/ |
D | mce.c | 1270 unsigned long iv; in mce_timer_fn() local 1274 iv = __this_cpu_read(mce_next_interval); in mce_timer_fn() 1280 iv = mce_adjust_timer(iv); in mce_timer_fn() 1290 iv = max(iv / 2, (unsigned long) HZ/100); in mce_timer_fn() 1292 iv = min(iv * 2, round_jiffies_relative(check_interval * HZ)); in mce_timer_fn() 1295 __this_cpu_write(mce_next_interval, iv); in mce_timer_fn() 1296 __restart_timer(t, iv); in mce_timer_fn() 1305 unsigned long iv = __this_cpu_read(mce_next_interval); in mce_timer_kick() local 1309 if (interval < iv) in mce_timer_kick() 1644 unsigned long iv = check_interval * HZ; in mce_start_timer() local [all …]
|
/linux-4.4.14/drivers/ssb/ |
D | ssb_private.h | 54 struct ssb_init_invariants *iv); 93 struct ssb_init_invariants *iv); 134 struct ssb_init_invariants *iv);
|
D | main.c | 602 struct ssb_init_invariants iv; in ssb_fetch_invariants() local 605 memset(&iv, 0, sizeof(iv)); in ssb_fetch_invariants() 606 err = get_invariants(bus, &iv); in ssb_fetch_invariants() 609 memcpy(&bus->boardinfo, &iv.boardinfo, sizeof(iv.boardinfo)); in ssb_fetch_invariants() 610 memcpy(&bus->sprom, &iv.sprom, sizeof(iv.sprom)); in ssb_fetch_invariants() 611 bus->has_cardbus_slot = iv.has_cardbus_slot; in ssb_fetch_invariants()
|
D | pcmcia.c | 621 struct ssb_init_invariants *iv = priv; in ssb_pcmcia_do_get_invariants() local 622 struct ssb_sprom *sprom = &iv->sprom; in ssb_pcmcia_do_get_invariants() 623 struct ssb_boardinfo *bi = &iv->boardinfo; in ssb_pcmcia_do_get_invariants() 704 struct ssb_init_invariants *iv) in ssb_pcmcia_get_invariants() argument 706 struct ssb_sprom *sprom = &iv->sprom; in ssb_pcmcia_get_invariants() 725 ssb_pcmcia_do_get_invariants, iv); in ssb_pcmcia_get_invariants()
|
D | sdio.c | 473 struct ssb_init_invariants *iv) in ssb_sdio_get_invariants() argument 475 struct ssb_sprom *sprom = &iv->sprom; in ssb_sdio_get_invariants() 476 struct ssb_boardinfo *bi = &iv->boardinfo; in ssb_sdio_get_invariants()
|
D | pci.c | 936 struct ssb_init_invariants *iv) in ssb_pci_get_invariants() argument 940 err = ssb_pci_sprom_get(bus, &iv->sprom); in ssb_pci_get_invariants() 943 ssb_pci_get_boardinfo(bus, &iv->boardinfo); in ssb_pci_get_invariants()
|
/linux-4.4.14/include/keys/ |
D | encrypted-type.h | 26 u8 *iv; /* datablob: iv */ member
|
/linux-4.4.14/tools/vm/ |
D | slabinfo-gnuplot.sh | 160 egrep -iv '\-\-|Name|Slabs'\ 169 egrep -iv '\-\-|Name|Slabs'\
|
/linux-4.4.14/include/uapi/linux/ |
D | if_alg.h | 28 __u8 iv[0]; member
|
/linux-4.4.14/drivers/staging/rtl8723au/core/ |
D | rtw_security.c | 155 u8 *pframe, *payload, *iv; /* wepkey */ in rtw_wep_encrypt23a() local 178 iv = pframe + pattrib->hdrlen; in rtw_wep_encrypt23a() 179 memcpy(&wepkey[0], iv, 3); in rtw_wep_encrypt23a() 219 u8 *pframe, *payload, *iv, wepkey[16]; in rtw_wep_decrypt23a() local 232 iv = pframe + prxattrib->hdrlen; in rtw_wep_decrypt23a() 236 memcpy(&wepkey[0], iv, 3); in rtw_wep_decrypt23a() 611 u8 *pframe, *payload, *iv, *prwskey; in rtw_tkip_encrypt23a() local 659 iv = pframe + pattrib->hdrlen; in rtw_tkip_encrypt23a() 662 GET_TKIP_PN(iv, dot11txpn); in rtw_tkip_encrypt23a() 719 u8 *pframe, *payload, *iv, *prwskey; in rtw_tkip_decrypt23a() local [all …]
|
D | rtw_xmit.c | 1139 WEP_IV(pattrib->iv, psta->dot11txpn, in rtw_xmitframe_coalesce23a() 1144 TKIP_IV(pattrib->iv, in rtw_xmitframe_coalesce23a() 1148 TKIP_IV(pattrib->iv, in rtw_xmitframe_coalesce23a() 1153 AES_IV(pattrib->iv, in rtw_xmitframe_coalesce23a() 1157 AES_IV(pattrib->iv, in rtw_xmitframe_coalesce23a() 1163 memcpy(pframe, pattrib->iv, pattrib->iv_len); in rtw_xmitframe_coalesce23a() 1168 pattrib->iv[3], *pframe, *(pframe+1), in rtw_xmitframe_coalesce23a()
|
/linux-4.4.14/drivers/crypto/qce/ |
D | cipher.h | 44 u8 *iv; member
|
D | common.c | 364 qce_xts_swapiv(enciv, rctx->iv, ivsize); in qce_setup_regs_ablkcipher() 366 qce_cpu_to_be32p_array(enciv, rctx->iv, ivsize); in qce_setup_regs_ablkcipher()
|
D | ablkcipher.c | 73 rctx->iv = req->info; in qce_ablkcipher_async_req_handle()
|
/linux-4.4.14/drivers/staging/rtl8188eu/core/ |
D | rtw_security.c | 150 u8 *pframe, *payload, *iv; /* wepkey */ in rtw_wep_encrypt() local 171 iv = pframe+pattrib->hdrlen; in rtw_wep_encrypt() 172 memcpy(&wepkey[0], iv, 3); in rtw_wep_encrypt() 206 u8 *pframe, *payload, *iv, wepkey[16]; in rtw_wep_decrypt() local 216 iv = pframe+prxattrib->hdrlen; in rtw_wep_decrypt() 219 memcpy(&wepkey[0], iv, 3); in rtw_wep_decrypt() 573 u8 *pframe, *payload, *iv, *prwskey; in rtw_tkip_encrypt() local 603 iv = pframe+pattrib->hdrlen; in rtw_tkip_encrypt() 606 GET_TKIP_PN(iv, dot11txpn); in rtw_tkip_encrypt() 653 u8 *pframe, *payload, *iv, *prwskey; in rtw_tkip_decrypt() local [all …]
|
D | rtw_xmit.c | 1032 WEP_IV(pattrib->iv, psta->dot11txpn, pattrib->key_idx); in rtw_xmitframe_coalesce() 1036 TKIP_IV(pattrib->iv, psta->dot11txpn, pattrib->key_idx); in rtw_xmitframe_coalesce() 1038 TKIP_IV(pattrib->iv, psta->dot11txpn, 0); in rtw_xmitframe_coalesce() 1042 AES_IV(pattrib->iv, psta->dot11txpn, pattrib->key_idx); in rtw_xmitframe_coalesce() 1044 AES_IV(pattrib->iv, psta->dot11txpn, 0); in rtw_xmitframe_coalesce() 1048 memcpy(pframe, pattrib->iv, pattrib->iv_len); in rtw_xmitframe_coalesce() 1052 …padapter->securitypriv.dot11PrivacyKeyIndex, pattrib->iv[3], *pframe, *(pframe+1), *(pframe+2), *(… in rtw_xmitframe_coalesce()
|
/linux-4.4.14/Documentation/networking/ |
D | vxge.txt | 40 iv) Jumbo frames 83 iv) vlan_tag_strip
|
/linux-4.4.14/kernel/time/ |
D | posix-timers.c | 738 ktime_t now, remaining, iv; in common_timer_get() local 743 iv = timr->it.real.interval; in common_timer_get() 746 if (iv.tv64) in common_timer_get() 747 cur_setting->it_interval = ktime_to_timespec(iv); in common_timer_get() 759 if (iv.tv64 && (timr->it_requeue_pending & REQUEUE_PENDING || in common_timer_get() 761 timr->it_overrun += (unsigned int) hrtimer_forward(timer, now, iv); in common_timer_get()
|
/linux-4.4.14/drivers/net/wireless/b43/ |
D | xmit.c | 335 txhdr->iv[i * 2 + 0] = phase1key[i]; in b43_generate_txhdr() 336 txhdr->iv[i * 2 + 1] = phase1key[i] >> 8; in b43_generate_txhdr() 339 memcpy(txhdr->iv + 10, ((u8 *) wlhdr) + wlhdr_len, 3); in b43_generate_txhdr() 342 ARRAY_SIZE(txhdr->iv)); in b43_generate_txhdr() 343 memcpy(txhdr->iv, ((u8 *) wlhdr) + wlhdr_len, iv_len); in b43_generate_txhdr()
|
D | main.c | 2771 const struct b43_iv *iv; in b43_write_initvals() local 2777 iv = ivals; in b43_write_initvals() 2779 if (array_size < sizeof(iv->offset_size)) in b43_write_initvals() 2781 array_size -= sizeof(iv->offset_size); in b43_write_initvals() 2782 offset = be16_to_cpu(iv->offset_size); in b43_write_initvals() 2790 if (array_size < sizeof(iv->data.d32)) in b43_write_initvals() 2792 array_size -= sizeof(iv->data.d32); in b43_write_initvals() 2794 value = get_unaligned_be32(&iv->data.d32); in b43_write_initvals() 2797 iv = (const struct b43_iv *)((const uint8_t *)iv + in b43_write_initvals() 2803 if (array_size < sizeof(iv->data.d16)) in b43_write_initvals() [all …]
|
D | xmit.h | 37 __u8 iv[16]; /* Encryption IV */ member
|
/linux-4.4.14/sound/pci/ctxfi/ |
D | ctamixer.h | 67 int (*set_invalid_squash)(struct amixer *amixer, unsigned int iv);
|
D | ctamixer.c | 86 static int amixer_set_invalid_squash(struct amixer *amixer, unsigned int iv) in amixer_set_invalid_squash() argument 91 hw->amixer_set_iv(amixer->rsc.ctrl_blk, iv); in amixer_set_invalid_squash()
|
D | cthardware.h | 140 int (*amixer_set_iv)(void *blk, unsigned int iv);
|
/linux-4.4.14/drivers/crypto/ux500/cryp/ |
D | cryp_core.c | 78 u8 *iv; member 285 u32 iv[AES_BLOCK_SIZE / 4]; in cfg_ivs() local 301 iv[i] = uint8p_to_uint32_be(ctx->iv + i*4); in cfg_ivs() 304 status = cfg_iv(device_data, iv[i*2], iv[i*2+1], in cfg_ivs() 394 if (ctx->iv && in cryp_setup_context() 908 ctx->iv = walk.iv; in ablk_crypt()
|
/linux-4.4.14/arch/cris/include/arch-v32/arch/ |
D | cryptocop.h | 85 u8 iv[CRYPTOCOP_MAX_IV_LENGTH]; member
|
/linux-4.4.14/Documentation/device-mapper/ |
D | dm-crypt.txt | 26 in combination with the selected iv mode. 27 Note that for some iv modes the key string can contain additional
|
/linux-4.4.14/net/bluetooth/rfcomm/ |
D | core.c | 800 struct kvec iv = { data, len }; in rfcomm_send_frame() local 807 return kernel_sendmsg(s->sock, &msg, &iv, 1, len); in rfcomm_send_frame() 1101 struct kvec iv[3]; in rfcomm_send_test() local 1118 iv[0].iov_base = hdr; in rfcomm_send_test() 1119 iv[0].iov_len = 5; in rfcomm_send_test() 1120 iv[1].iov_base = pattern; in rfcomm_send_test() 1121 iv[1].iov_len = len; in rfcomm_send_test() 1122 iv[2].iov_base = crc; in rfcomm_send_test() 1123 iv[2].iov_len = 1; in rfcomm_send_test() 1127 return kernel_sendmsg(sock, &msg, iv, 3, 6 + len); in rfcomm_send_test()
|
/linux-4.4.14/drivers/media/i2c/ |
D | ov9650.c | 1131 const struct ov965x_interval *iv = &ov965x_intervals[i]; in __ov965x_set_frame_interval() local 1133 if (mbus_fmt->width != iv->size.width || in __ov965x_set_frame_interval() 1134 mbus_fmt->height != iv->size.height) in __ov965x_set_frame_interval() 1136 err = abs((u64)(iv->interval.numerator * 10000) / in __ov965x_set_frame_interval() 1137 iv->interval.denominator - req_int); in __ov965x_set_frame_interval() 1139 fiv = iv; in __ov965x_set_frame_interval()
|
D | s5k6aa.c | 959 const struct s5k6aa_interval *iv = &s5k6aa_intervals[i]; in __s5k6aa_set_frame_interval() local 961 if (mbus_fmt->width > iv->size.width || in __s5k6aa_set_frame_interval() 962 mbus_fmt->height > iv->size.height) in __s5k6aa_set_frame_interval() 965 err = abs(iv->reg_fr_time - fr_time); in __s5k6aa_set_frame_interval() 967 fiv = iv; in __s5k6aa_set_frame_interval()
|
/linux-4.4.14/drivers/net/wireless/b43legacy/ |
D | main.c | 1815 const struct b43legacy_iv *iv; in b43legacy_write_initvals() local 1821 iv = ivals; in b43legacy_write_initvals() 1823 if (array_size < sizeof(iv->offset_size)) in b43legacy_write_initvals() 1825 array_size -= sizeof(iv->offset_size); in b43legacy_write_initvals() 1826 offset = be16_to_cpu(iv->offset_size); in b43legacy_write_initvals() 1834 if (array_size < sizeof(iv->data.d32)) in b43legacy_write_initvals() 1836 array_size -= sizeof(iv->data.d32); in b43legacy_write_initvals() 1838 value = get_unaligned_be32(&iv->data.d32); in b43legacy_write_initvals() 1841 iv = (const struct b43legacy_iv *)((const uint8_t *)iv + in b43legacy_write_initvals() 1847 if (array_size < sizeof(iv->data.d16)) in b43legacy_write_initvals() [all …]
|
D | xmit.h | 29 __u8 iv[16]; /* Encryption IV */ member
|
D | xmit.c | 258 ARRAY_SIZE(txhdr->iv)); in generate_txhdr_fw3() 259 memcpy(txhdr->iv, ((u8 *)wlhdr) + wlhdr_len, iv_len); in generate_txhdr_fw3()
|
/linux-4.4.14/net/bluetooth/cmtp/ |
D | core.c | 197 struct kvec iv = { data, len }; in cmtp_send_frame() local 207 return kernel_sendmsg(sock, &msg, &iv, 1, len); in cmtp_send_frame()
|
/linux-4.4.14/net/bluetooth/ |
D | a2mp.c | 54 struct kvec iv; in a2mp_send() local 61 iv.iov_base = cmd; in a2mp_send() 62 iv.iov_len = total_len; in a2mp_send() 66 iov_iter_kvec(&msg.msg_iter, WRITE | ITER_KVEC, &iv, 1, total_len); in a2mp_send()
|
D | 6lowpan.c | 509 struct kvec iv; in send_pkt() local 517 iv.iov_base = skb->data; in send_pkt() 518 iv.iov_len = skb->len; in send_pkt() 521 iov_iter_kvec(&msg.msg_iter, WRITE | ITER_KVEC, &iv, 1, skb->len); in send_pkt()
|
/linux-4.4.14/arch/ia64/include/asm/ |
D | pal.h | 517 iv : 1, /* instruction set field valid */ member 554 iv : 1, /* instruction set field valid */ member 590 iv : 1, /* instruction set field valid */ member 620 iv : 1, /* instruction set field valid */ member 650 iv : 1, /* instruction set field valid */ member
|
/linux-4.4.14/drivers/net/wireless/mediatek/mt7601u/ |
D | mac.h | 125 __le32 iv; member
|
/linux-4.4.14/Documentation/devicetree/bindings/powerpc/4xx/ |
D | ppc440spe-adma.txt | 80 iv) Memory Queue Module node
|
D | emac.txt | 137 iv) RGMII node
|
/linux-4.4.14/fs/ecryptfs/ |
D | crypto.c | 171 int ecryptfs_derive_iv(char *iv, struct ecryptfs_crypt_stat *crypt_stat, in ecryptfs_derive_iv() argument 200 memcpy(iv, dst, crypt_stat->iv_bytes); in ecryptfs_derive_iv() 203 ecryptfs_dump_hex(iv, crypt_stat->iv_bytes); in ecryptfs_derive_iv() 343 unsigned char *iv, int op) in crypt_scatterlist() argument 386 ablkcipher_request_set_crypt(req, src_sg, dst_sg, size, iv); in crypt_scatterlist()
|
D | ecryptfs_kernel.h | 580 void ecryptfs_rotate_iv(unsigned char *iv); 717 int ecryptfs_derive_iv(char *iv, struct ecryptfs_crypt_stat *crypt_stat,
|
D | keystore.c | 605 char iv[ECRYPTFS_MAX_IV_BYTES]; member 837 memset(s->iv, 0, ECRYPTFS_MAX_IV_BYTES); in ecryptfs_write_tag_70_packet() 838 s->desc.info = s->iv; in ecryptfs_write_tag_70_packet() 893 char iv[ECRYPTFS_MAX_IV_BYTES]; member 1037 memset(s->iv, 0, ECRYPTFS_MAX_IV_BYTES); in ecryptfs_parse_tag_70_packet() 1038 s->desc.info = s->iv; in ecryptfs_parse_tag_70_packet()
|
/linux-4.4.14/drivers/media/i2c/s5c73m3/ |
D | s5c73m3-core.c | 911 const struct s5c73m3_interval *iv = &s5c73m3_intervals[i]; in __s5c73m3_set_frame_interval() local 913 if (prev_size->width > iv->size.width || in __s5c73m3_set_frame_interval() 914 prev_size->height > iv->size.height) in __s5c73m3_set_frame_interval() 917 ret = abs(iv->interval.numerator / 1000 - fr_time); in __s5c73m3_set_frame_interval() 919 fiv = iv; in __s5c73m3_set_frame_interval()
|
/linux-4.4.14/Documentation/scsi/ |
D | megaraid.txt | 20 iv. Applications have to interface with only module instead of
|
D | ChangeLog.megaraid | 456 iv. In megaraid_mbox_product_info, clear the mailbox contents completely 499 iv. Remove yield() while mailbox handshake in synchronous commands 552 iv. scsi_host_put(), do just before completing HBA shutdown. 594 iv. We now support up to 32 parallel ioctl commands instead of current 1.
|
/linux-4.4.14/drivers/crypto/qat/qat_common/ |
D | qat_algs.c | 841 memcpy(cipher_param->u.cipher_IV_array, areq->iv, AES_BLOCK_SIZE); in qat_alg_aead_dec() 865 uint8_t *iv = areq->iv; in qat_alg_aead_enc() local 883 memcpy(cipher_param->u.cipher_IV_array, iv, AES_BLOCK_SIZE); in qat_alg_aead_enc()
|
/linux-4.4.14/Documentation/isdn/ |
D | README.sc | 196 iv) set the eaz of the interface to be the phone number of that 220 "encap" to syncppp. With this done, the rest of the steps, iv) to x) 246 iv) set the packet encapsulation to syncppp
|
/linux-4.4.14/drivers/i2c/busses/ |
D | i2c-omap.c | 840 u16 iv, w; in omap_i2c_omap1_isr() local 845 iv = omap_i2c_read_reg(omap, OMAP_I2C_IV_REG); in omap_i2c_omap1_isr() 846 switch (iv) { in omap_i2c_omap1_isr()
|
/linux-4.4.14/arch/mips/include/asm/octeon/ |
D | cvmx-pip.h | 473 pip_crc_ivx.s.iv = initialization_vector; in cvmx_pip_config_crc()
|
/linux-4.4.14/drivers/staging/vt6656/ |
D | rxtx.c | 723 u8 *iv = ((u8 *)hdr + ieee80211_get_hdrlen_from_skb(skb)); in vnt_fill_txkey() local 732 memcpy(key_buffer, iv, 3); in vnt_fill_txkey() 736 memcpy(key_buffer + 8, iv, 3); in vnt_fill_txkey()
|
/linux-4.4.14/drivers/staging/vt6655/ |
D | rxtx.c | 1214 u8 *iv = ((u8 *)hdr + ieee80211_get_hdrlen_from_skb(skb)); in vnt_fill_txkey() local 1223 memcpy(key_buffer, iv, 3); in vnt_fill_txkey() 1227 memcpy(key_buffer + 8, iv, 3); in vnt_fill_txkey()
|