| /linux/net/key/ |
| H A D | af_key.c | 821 if (x->aalg && x->aalg->alg_key_len) { in __pfkey_xfrm_state2msg() 823 PFKEY_ALIGN8((x->aalg->alg_key_len + 7) / 8); in __pfkey_xfrm_state2msg() 869 if (x->aalg) { in __pfkey_xfrm_state2msg() 870 struct xfrm_algo_desc *a = xfrm_aalg_get_byname(x->aalg->alg_name, 0); in __pfkey_xfrm_state2msg() 984 key->sadb_key_bits = x->aalg->alg_key_len; in __pfkey_xfrm_state2msg() 986 memcpy(key + 1, x->aalg->alg_key, (x->aalg->alg_key_len+7)/8); in __pfkey_xfrm_state2msg() 1193 x->aalg = kmalloc(sizeof(*x->aalg) + keysize, GFP_KERNEL); in pfkey_msg2xfrm_state() 1194 if (!x->aalg) { in pfkey_msg2xfrm_state() 1198 strcpy(x->aalg->alg_name, a->name); in pfkey_msg2xfrm_state() 1199 x->aalg->alg_key_len = 0; in pfkey_msg2xfrm_state() [all …]
|
| /linux/net/ipv4/ |
| H A D | esp4.c | 1029 x->aalg ? x->aalg->alg_name : "digest_null", in esp_init_authenc() 1039 x->aalg ? x->aalg->alg_name : "digest_null", in esp_init_authenc() 1056 keylen = (x->aalg ? (x->aalg->alg_key_len + 7) / 8 : 0) + in esp_init_authenc() 1070 if (x->aalg) { in esp_init_authenc() 1073 memcpy(p, x->aalg->alg_key, (x->aalg->alg_key_len + 7) / 8); in esp_init_authenc() 1074 p += (x->aalg->alg_key_len + 7) / 8; in esp_init_authenc() 1076 aalg_desc = xfrm_aalg_get_byname(x->aalg->alg_name, 0); in esp_init_authenc() 1087 aead, x->aalg->alg_trunc_len / 8); in esp_init_authenc()
|
| H A D | ah4.c | 477 if (!x->aalg) { in ah_init_state() 491 ahash = crypto_alloc_ahash(x->aalg->alg_name, 0, 0); in ah_init_state() 498 if (crypto_ahash_setkey(ahash, x->aalg->alg_key, in ah_init_state() 499 (x->aalg->alg_key_len + 7) / 8)) { in ah_init_state() 510 aalg_desc = xfrm_aalg_get_byname(x->aalg->alg_name, 0); in ah_init_state() 520 ahp->icv_trunc_len = x->aalg->alg_trunc_len/8; in ah_init_state()
|
| /linux/net/ipv6/ |
| H A D | esp6.c | 1066 x->aalg ? x->aalg->alg_name : "digest_null", in esp_init_authenc() 1076 x->aalg ? x->aalg->alg_name : "digest_null", in esp_init_authenc() 1093 keylen = (x->aalg ? (x->aalg->alg_key_len + 7) / 8 : 0) + in esp_init_authenc() 1107 if (x->aalg) { in esp_init_authenc() 1110 memcpy(p, x->aalg->alg_key, (x->aalg->alg_key_len + 7) / 8); in esp_init_authenc() 1111 p += (x->aalg->alg_key_len + 7) / 8; in esp_init_authenc() 1113 aalg_desc = xfrm_aalg_get_byname(x->aalg->alg_name, 0); in esp_init_authenc() 1124 aead, x->aalg->alg_trunc_len / 8); in esp_init_authenc()
|
| H A D | ah6.c | 684 if (!x->aalg) { in ah6_init_state() 698 ahash = crypto_alloc_ahash(x->aalg->alg_name, 0, 0); in ah6_init_state() 705 if (crypto_ahash_setkey(ahash, x->aalg->alg_key, in ah6_init_state() 706 (x->aalg->alg_key_len + 7) / 8)) { in ah6_init_state() 717 aalg_desc = xfrm_aalg_get_byname(x->aalg->alg_name, 0); in ah6_init_state() 727 ahp->icv_trunc_len = x->aalg->alg_trunc_len/8; in ah6_init_state()
|
| /linux/drivers/net/ethernet/netronome/nfp/crypto/ |
| H A D | ipsec.c | 320 if (x->aalg) in nfp_net_xfrm_add_state() 321 trunc_len = x->aalg->alg_trunc_len; in nfp_net_xfrm_add_state() 367 if (x->aalg) { in nfp_net_xfrm_add_state() 368 key_len = DIV_ROUND_UP(x->aalg->alg_key_len, BITS_PER_BYTE); in nfp_net_xfrm_add_state() 374 cfg->auth_key[i] = get_unaligned_be32(x->aalg->alg_key + in nfp_net_xfrm_add_state()
|
| /linux/drivers/crypto/ |
| H A D | omap-aes.c | 1097 struct aead_engine_alg *aalg; in omap_aes_probe() local 1204 aalg = &dd->pdata->aead_algs_info->algs_list[i]; in omap_aes_probe() 1206 pr_debug("reg alg: %s\n", aalg->base.base.cra_name); in omap_aes_probe() 1208 err = crypto_engine_register_aead(aalg); in omap_aes_probe() 1219 aalg = &dd->pdata->aead_algs_info->algs_list[i]; in omap_aes_probe() 1220 crypto_engine_unregister_aead(aalg); in omap_aes_probe() 1247 struct aead_engine_alg *aalg; in omap_aes_remove() local 1262 aalg = &dd->pdata->aead_algs_info->algs_list[i]; in omap_aes_remove() 1263 crypto_engine_unregister_aead(aalg); in omap_aes_remove()
|
| H A D | sa2ul.c | 105 int aalg; member 1455 cfg.aalg = ad->aalg_id; in sa_sha_setup() 1801 cfg.aalg = ad->aalg_id; in sa_aead_setkey()
|
| /linux/net/xfrm/ |
| H A D | xfrm_user.c | 925 if ((err = attach_auth_trunc(&x->aalg, &x->props.aalgo, in xfrm_state_construct() 929 if ((err = attach_auth(&x->aalg, &x->props.aalgo, in xfrm_state_construct() 1367 if (x->aalg) { in copy_to_user_state_extra() 1368 ret = copy_to_user_auth(x->aalg, skb); in copy_to_user_state_extra() 3662 if (x->aalg) { in xfrm_sa_len() 3664 (x->aalg->alg_key_len + 7) / 8); in xfrm_sa_len() 3665 l += nla_total_size(xfrm_alg_auth_len(x->aalg)); in xfrm_sa_len()
|
| H A D | xfrm_state.c | 603 kfree_sensitive(x->aalg); in xfrm_state_gc_destroy() 1986 if (orig->aalg) { in xfrm_state_clone_and_setup() 1987 x->aalg = xfrm_algo_auth_clone(orig->aalg); in xfrm_state_clone_and_setup() 1988 if (!x->aalg) in xfrm_state_clone_and_setup()
|
| /linux/drivers/crypto/hisilicon/sec2/ |
| H A D | sec_crypto.c | 1458 #define GEN_SEC_AEAD_SETKEY_FUNC(name, aalg, calg, cmode) \ argument 1461 return sec_aead_setkey(tfm, key, keylen, aalg, calg, cmode); \
|
| /linux/drivers/crypto/bcm/ |
| H A D | cipher.c | 4154 struct aead_alg *aalg = container_of(alg, struct aead_alg, base); in aead_cra_init() local 4155 struct iproc_alg_s *cipher_alg = container_of(aalg, struct iproc_alg_s, in aead_cra_init()
|
| /linux/include/net/ |
| H A D | xfrm.h | 237 struct xfrm_algo_auth *aalg; member
|