| /linux/include/crypto/ |
| H A D | gcm.h | 16 static inline int crypto_gcm_check_authsize(unsigned int authsize) in crypto_gcm_check_authsize() argument 18 switch (authsize) { in crypto_gcm_check_authsize() 37 static inline int crypto_rfc4106_check_authsize(unsigned int authsize) in crypto_rfc4106_check_authsize() argument 39 switch (authsize) { in crypto_rfc4106_check_authsize() 70 unsigned int authsize; member 74 unsigned int keysize, unsigned int authsize);
|
| H A D | aead.h | 142 int (*setauthsize)(struct crypto_aead *tfm, unsigned int authsize); 156 unsigned int authsize; member 287 return tfm->authsize; in crypto_aead_authsize() 400 int crypto_aead_setauthsize(struct crypto_aead *tfm, unsigned int authsize); 403 unsigned int authsize) in crypto_sync_aead_setauthsize() argument 405 return crypto_aead_setauthsize(&tfm->base, authsize); in crypto_sync_aead_setauthsize()
|
| /linux/drivers/crypto/nx/ |
| H A D | nx-aes-ccm.c | 70 unsigned int authsize) in ccm_aes_nx_setauthsize() argument 72 switch (authsize) { in ccm_aes_nx_setauthsize() 89 unsigned int authsize) in ccm4309_aes_nx_setauthsize() argument 91 switch (authsize) { in ccm4309_aes_nx_setauthsize() 133 static int generate_b0(u8 *iv, unsigned int assoclen, unsigned int authsize, in generate_b0() argument 136 unsigned int l, lp, m = authsize; in generate_b0() 156 unsigned int authsize, in generate_pat() argument 208 rc = generate_b0(iv, assoclen, authsize, nbytes, b0); in generate_pat() 331 unsigned int authsize = crypto_aead_authsize(crypto_aead_reqtfm(req)); in ccm_nx_decrypt() local 339 nbytes -= authsize; in ccm_nx_decrypt() [all …]
|
| /linux/crypto/ |
| H A D | authencesn.c | 48 unsigned int authsize) in crypto_authenc_esn_setauthsize() argument 50 if (authsize > 0 && authsize < 4) in crypto_authenc_esn_setauthsize() 90 unsigned int authsize = crypto_aead_authsize(authenc_esn); in crypto_authenc_esn_genicv_tail() local 101 scatterwalk_map_and_copy(hash, dst, assoclen + cryptlen, authsize, 1); in crypto_authenc_esn_genicv_tail() 122 unsigned int authsize = crypto_aead_authsize(authenc_esn); in crypto_authenc_esn_genicv() local 128 if (!authsize) in crypto_authenc_esn_genicv() 201 unsigned int authsize = crypto_aead_authsize(authenc_esn); in crypto_authenc_esn_decrypt_tail() local 208 unsigned int cryptlen = req->cryptlen - authsize; in crypto_authenc_esn_decrypt_tail() 215 if (!authsize) in crypto_authenc_esn_decrypt_tail() 226 if (crypto_memneq(ihash, ohash, authsize)) in crypto_authenc_esn_decrypt_tail() [all …]
|
| H A D | aegis128-core.c | 377 unsigned int authsize) in crypto_aegis128_setauthsize() argument 379 if (authsize > AEGIS128_MAX_AUTH_SIZE) in crypto_aegis128_setauthsize() 381 if (authsize < AEGIS128_MIN_AUTH_SIZE) in crypto_aegis128_setauthsize() 390 unsigned int authsize = crypto_aead_authsize(tfm); in crypto_aegis128_encrypt_generic() local 404 authsize, 1); in crypto_aegis128_encrypt_generic() 413 unsigned int authsize = crypto_aead_authsize(tfm); in crypto_aegis128_decrypt_generic() local 414 unsigned int cryptlen = req->cryptlen - authsize; in crypto_aegis128_decrypt_generic() 420 authsize, 0); in crypto_aegis128_decrypt_generic() 429 if (unlikely(crypto_memneq(tag.bytes, zeros, authsize))) { in crypto_aegis128_decrypt_generic() 451 unsigned int authsize = crypto_aead_authsize(tfm); in crypto_aegis128_encrypt_simd() local [all …]
|
| H A D | aead.c | 65 int crypto_aead_setauthsize(struct crypto_aead *tfm, unsigned int authsize) in crypto_aead_setauthsize() argument 69 if ((!authsize && crypto_aead_maxauthsize(tfm)) || in crypto_aead_setauthsize() 70 authsize > crypto_aead_maxauthsize(tfm)) in crypto_aead_setauthsize() 74 err = crypto_aead_alg(tfm)->setauthsize(tfm, authsize); in crypto_aead_setauthsize() 79 tfm->authsize = authsize; in crypto_aead_setauthsize() 125 aead->authsize = alg->maxauthsize; in crypto_aead_init_tfm()
|
| H A D | gcm.c | 143 unsigned int authsize) in crypto_gcm_setauthsize() argument 145 return crypto_gcm_check_authsize(authsize); in crypto_gcm_setauthsize() 465 unsigned int authsize = crypto_aead_authsize(aead); in crypto_gcm_verify() local 466 unsigned int cryptlen = req->cryptlen - authsize; in crypto_gcm_verify() 470 req->assoclen + cryptlen, authsize, 0); in crypto_gcm_verify() 471 return crypto_memneq(iauth_tag, auth_tag, authsize) ? -EBADMSG : 0; in crypto_gcm_verify() 500 unsigned int authsize = crypto_aead_authsize(aead); in crypto_gcm_decrypt() local 504 cryptlen -= authsize; in crypto_gcm_decrypt() 702 unsigned int authsize) in crypto_rfc4106_setauthsize() argument 707 err = crypto_rfc4106_check_authsize(authsize); in crypto_rfc4106_setauthsize() [all …]
|
| H A D | krb5enc.c | 252 unsigned int authsize = crypto_aead_authsize(krb5enc); in krb5enc_verify_hash() local 254 u8 *msg_hash = areq_ctx->tail + authsize; in krb5enc_verify_hash() 256 scatterwalk_map_and_copy(msg_hash, req->src, ahreq->nbytes, authsize, 0); in krb5enc_verify_hash() 258 if (crypto_memneq(msg_hash, calc_hash, authsize)) in krb5enc_verify_hash() 286 unsigned int authsize = crypto_aead_authsize(krb5enc); in krb5enc_dispatch_decrypt_hash() local 292 req->assoclen + req->cryptlen - authsize); in krb5enc_dispatch_decrypt_hash() 315 unsigned int authsize = crypto_aead_authsize(krb5enc); in krb5enc_dispatch_decrypt() local 328 req->cryptlen - authsize, req->iv); in krb5enc_dispatch_decrypt()
|
| /linux/drivers/crypto/cavium/nitrox/ |
| H A D | nitrox_aead.c | 59 unsigned int authsize) in nitrox_aead_setauthsize() argument 66 flags.w0.mac_len = authsize; in nitrox_aead_setauthsize() 69 aead->authsize = authsize; in nitrox_aead_setauthsize() 75 unsigned int authsize) in nitrox_aes_gcm_setauthsize() argument 77 switch (authsize) { in nitrox_aes_gcm_setauthsize() 90 return nitrox_aead_setauthsize(aead, authsize); in nitrox_aes_gcm_setauthsize() 230 rctx->dstlen = rctx->srclen + aead->authsize; in nitrox_aes_gcm_enc() 261 rctx->cryptlen = areq->cryptlen - aead->authsize; in nitrox_aes_gcm_dec() 264 rctx->dstlen = rctx->srclen - aead->authsize; in nitrox_aes_gcm_dec() 379 unsigned int authsize) in nitrox_rfc4106_setauthsize() argument [all …]
|
| /linux/arch/x86/crypto/ |
| H A D | aegis128-aesni-glue.c | 167 unsigned int authsize) in crypto_aegis128_aesni_setauthsize() argument 169 if (authsize > AEGIS128_MAX_AUTH_SIZE) in crypto_aegis128_aesni_setauthsize() 171 if (authsize < AEGIS128_MIN_AUTH_SIZE) in crypto_aegis128_aesni_setauthsize() 209 unsigned int authsize = crypto_aead_authsize(tfm); in crypto_aegis128_aesni_encrypt() local 218 req->assoclen + cryptlen, authsize, 1); in crypto_aegis128_aesni_encrypt() 228 unsigned int authsize = crypto_aead_authsize(tfm); in crypto_aegis128_aesni_decrypt() local 229 unsigned int cryptlen = req->cryptlen - authsize; in crypto_aegis128_aesni_decrypt() 233 req->assoclen + cryptlen, authsize, 0); in crypto_aegis128_aesni_decrypt() 239 return crypto_memneq(tag.bytes, zeros.bytes, authsize) ? -EBADMSG : 0; in crypto_aegis128_aesni_decrypt()
|
| /linux/arch/arm64/crypto/ |
| H A D | sm4-ce-ccm-glue.c | 45 static int ccm_setauthsize(struct crypto_aead *tfm, unsigned int authsize) in ccm_setauthsize() argument 47 if ((authsize & 1) || authsize < 4) in ccm_setauthsize() 221 unsigned int authsize = crypto_aead_authsize(aead); in ccm_decrypt() local 228 err = ccm_format_input(mac, req, req->cryptlen - authsize); in ccm_decrypt() 242 req->assoclen + req->cryptlen - authsize, in ccm_decrypt() 243 authsize, 0); in ccm_decrypt() 245 if (crypto_memneq(authtag, mac, authsize)) in ccm_decrypt()
|
| H A D | aes-ce-ccm-glue.c | 54 static int ccm_setauthsize(struct crypto_aead *tfm, unsigned int authsize) in ccm_setauthsize() argument 56 if ((authsize & 1) || authsize < 4) in ccm_setauthsize() 233 unsigned int authsize = crypto_aead_authsize(aead); in ccm_decrypt() local 237 u32 len = req->cryptlen - authsize; in ccm_decrypt() 289 req->assoclen + req->cryptlen - authsize, in ccm_decrypt() 290 authsize, 0); in ccm_decrypt() 292 if (crypto_memneq(mac, orig_iv, authsize)) in ccm_decrypt()
|
| H A D | sm4-ce-gcm-glue.c | 59 static int gcm_setauthsize(struct crypto_aead *tfm, unsigned int authsize) in gcm_setauthsize() argument 61 switch (authsize) { in gcm_setauthsize() 197 unsigned int authsize = crypto_aead_authsize(aead); in gcm_decrypt() local 210 req->assoclen + req->cryptlen - authsize, in gcm_decrypt() 211 authsize, 0); in gcm_decrypt() 213 if (crypto_memneq(authtag, ghash, authsize)) in gcm_decrypt()
|
| H A D | ghash-ce-glue.c | 60 const u8 tag[], u64 authsize); 221 static int gcm_aes_setauthsize(struct crypto_aead *tfm, unsigned int authsize) in gcm_aes_setauthsize() argument 223 return crypto_gcm_check_authsize(authsize); in gcm_aes_setauthsize() 348 unsigned int authsize = crypto_aead_authsize(aead); in gcm_decrypt() local 359 lengths.b = cpu_to_be64((req->cryptlen - authsize) * 8); in gcm_decrypt() 367 req->assoclen + req->cryptlen - authsize, in gcm_decrypt() 368 authsize, 0); in gcm_decrypt() 392 authsize); in gcm_decrypt() 441 static int rfc4106_setauthsize(struct crypto_aead *tfm, unsigned int authsize) in rfc4106_setauthsize() argument 443 return crypto_rfc4106_check_authsize(authsize); in rfc4106_setauthsize()
|
| /linux/drivers/crypto/qce/ |
| H A D | aead.c | 74 totallen, ctx->authsize, 1); in qce_aead_done() 77 totallen, ctx->authsize, 1); in qce_aead_done() 80 totallen = req->cryptlen + req->assoclen - ctx->authsize; in qce_aead_done() 81 scatterwalk_map_and_copy(tag, req->src, totallen, ctx->authsize, 0); in qce_aead_done() 82 ret = memcmp(result_buf->auth_iv, tag, ctx->authsize); in qce_aead_done() 198 cryptlen = rctx->cryptlen + ctx->authsize; in qce_aead_ccm_prepare_buf_assoclen() 344 cryptlen = rctx->cryptlen + ctx->authsize; in qce_aead_ccm_prepare_buf() 399 rctx->ccm_nonce[0] |= ((ctx->authsize - 2) / 2) << in qce_aead_create_ccm_nonce() 516 rctx->cryptlen = req->cryptlen - ctx->authsize; in qce_aead_crypt() 651 static int qce_aead_setauthsize(struct crypto_aead *tfm, unsigned int authsize) in qce_aead_setauthsize() argument [all …]
|
| /linux/drivers/crypto/inside-secure/eip93/ |
| H A D | eip93-common.c | 206 u32 authsize = rctx->authsize; in check_valid_request() local 220 if (authsize) { in check_valid_request() 222 totlen_dst += authsize; in check_valid_request() 224 totlen_src += authsize; in check_valid_request() 249 if (authsize) { in check_valid_request() 644 u32 authsize = rctx->authsize; in eip93_unmap_dma() local 659 eip93_free_sg_copy(len + rctx->authsize, &rctx->sg_src); in eip93_unmap_dma() 667 authsize = 0; in eip93_unmap_dma() 669 if (authsize) { in eip93_unmap_dma() 672 for (i = 0; i < (authsize / 4); i++) in eip93_unmap_dma() [all …]
|
| /linux/drivers/crypto/caam/ |
| H A D | caamalg_qi.c | 73 unsigned int authsize; member 100 if (!ctx->cdata.keylen || !ctx->authsize) in aead_set_sh_desc() 150 ivsize, ctx->authsize, is_rfc3686, nonce, in aead_set_sh_desc() 165 ivsize, ctx->authsize, alg->caam.geniv, in aead_set_sh_desc() 183 ivsize, ctx->authsize, is_rfc3686, nonce, in aead_set_sh_desc() 190 static int aead_setauthsize(struct crypto_aead *authenc, unsigned int authsize) in aead_setauthsize() argument 194 ctx->authsize = authsize; in aead_setauthsize() 312 if (!ctx->cdata.keylen || !ctx->authsize) in gcm_set_sh_desc() 328 ctx->authsize, true); in gcm_set_sh_desc() 343 ctx->authsize, true); in gcm_set_sh_desc() [all …]
|
| H A D | caamalg.c | 131 unsigned int authsize; member 169 cnstr_shdsc_aead_null_encap(desc, &ctx->adata, ctx->authsize, in aead_null_set_sh_desc() 188 cnstr_shdsc_aead_null_decap(desc, &ctx->adata, ctx->authsize, in aead_null_set_sh_desc() 213 if (!ctx->authsize) in aead_set_sh_desc() 272 ctx->authsize, is_rfc3686, nonce, ctx1_iv_off, in aead_set_sh_desc() 294 ctx->authsize, alg->caam.geniv, is_rfc3686, in aead_set_sh_desc() 318 ctx->authsize, is_rfc3686, nonce, in aead_set_sh_desc() 328 unsigned int authsize) in aead_setauthsize() argument 332 ctx->authsize = authsize; in aead_setauthsize() 347 if (!ctx->cdata.keylen || !ctx->authsize) in gcm_set_sh_desc() [all …]
|
| /linux/drivers/crypto/ccree/ |
| H A D | cc_aead.c | 57 unsigned int authsize; /* Actual (reduced?) size of the MAC/ICv */ member 229 ctx->authsize) != 0) { in cc_aead_complete() 231 ctx->authsize, ctx->cipher_mode); in cc_aead_complete() 244 skip, (skip + ctx->authsize), in cc_aead_complete() 670 unsigned int authsize) in cc_aead_setauthsize() argument 676 if (authsize == 0 || in cc_aead_setauthsize() 677 authsize > crypto_aead_maxauthsize(authenc)) { in cc_aead_setauthsize() 681 ctx->authsize = authsize; in cc_aead_setauthsize() 682 dev_dbg(dev, "authlen=%d\n", ctx->authsize); in cc_aead_setauthsize() 688 unsigned int authsize) in cc_rfc4309_ccm_setauthsize() argument [all …]
|
| H A D | cc_buffer_mgr.c | 538 static bool cc_is_icv_frag(unsigned int sgl_nents, unsigned int authsize, in cc_is_icv_frag() argument 541 return ((sgl_nents > 1) && (last_entry_data_size < authsize)); in cc_is_icv_frag() 657 unsigned int authsize = areq_ctx->req_authsize; in cc_prepare_aead_data_dlli() local 665 offset = *src_last_bytes - authsize; in cc_prepare_aead_data_dlli() 668 offset = *dst_last_bytes - authsize; in cc_prepare_aead_data_dlli() 683 unsigned int authsize = areq_ctx->req_authsize; in cc_prepare_aead_data_mlli() local 695 cc_is_icv_frag(areq_ctx->src.nents, authsize, in cc_prepare_aead_data_mlli() 722 (*src_last_bytes - authsize); in cc_prepare_aead_data_mlli() 724 (*src_last_bytes - authsize); in cc_prepare_aead_data_mlli() 739 cc_is_icv_frag(areq_ctx->src.nents, authsize, in cc_prepare_aead_data_mlli() [all …]
|
| /linux/drivers/crypto/ |
| H A D | omap-aes-gcm.c | 70 dd->authsize, 1); in omap_aes_gcm_done_task() 80 for (i = 0; i < dd->authsize; i++) { in omap_aes_gcm_done_task() 150 dd->authsize = authlen; in omap_aes_gcm_copy_buffers() 194 dd->authsize, 0); in omap_aes_gcm_dma_out_callback() 348 int omap_aes_gcm_setauthsize(struct crypto_aead *tfm, unsigned int authsize) in omap_aes_gcm_setauthsize() argument 350 return crypto_gcm_check_authsize(authsize); in omap_aes_gcm_setauthsize() 354 unsigned int authsize) in omap_aes_4106gcm_setauthsize() argument 356 return crypto_rfc4106_check_authsize(authsize); in omap_aes_4106gcm_setauthsize()
|
| /linux/arch/arm/crypto/ |
| H A D | ghash-ce-glue.c | 201 const char *otag, int authsize); 241 static int gcm_aes_setauthsize(struct crypto_aead *tfm, unsigned int authsize) in gcm_aes_setauthsize() argument 243 return crypto_gcm_check_authsize(authsize); in gcm_aes_setauthsize() 398 int authsize = crypto_aead_authsize(aead); in gcm_decrypt() local 410 req->assoclen + req->cryptlen - authsize, in gcm_decrypt() 411 authsize, 0); in gcm_decrypt() 450 lengths.b = cpu_to_be64((req->cryptlen - authsize) * 8); in gcm_decrypt() 459 ctx->rounds, counter, otag, authsize); in gcm_decrypt() 499 static int rfc4106_setauthsize(struct crypto_aead *tfm, unsigned int authsize) in rfc4106_setauthsize() argument 501 return crypto_rfc4106_check_authsize(authsize); in rfc4106_setauthsize()
|
| /linux/tools/testing/selftests/bpf/progs/ |
| H A D | crypto_bench.c | 15 u32 key_len, authsize; variable 28 .authsize = authsize, in crypto_setup()
|
| /linux/drivers/crypto/intel/ixp4xx/ |
| H A D | ixp4xx_crypto.c | 356 int authsize = crypto_aead_authsize(tfm); in finish_scattered_hmac() local 357 int decryptlen = req->assoclen + req->cryptlen - authsize; in finish_scattered_hmac() 361 decryptlen, authsize, 1); in finish_scattered_hmac() 739 static int setup_auth(struct crypto_tfm *tfm, int encrypt, unsigned int authsize, in setup_auth() argument 755 cfgword = algo->cfgword | (authsize << 6); /* (authsize/4) << 8 */ in setup_auth() 1097 unsigned int authsize = crypto_aead_authsize(tfm); in aead_perform() local 1120 cryptlen = req->cryptlen - authsize; in aead_perform() 1121 eff_cryptlen -= authsize; in aead_perform() 1148 if (lastlen >= authsize) in aead_perform() 1150 buf->buf_len - authsize; in aead_perform() [all …]
|
| /linux/drivers/crypto/tegra/ |
| H A D | tegra-se-aes.c | 47 unsigned int authsize; member 61 unsigned int authsize; member 820 offset, rctx->authsize, 1); in tegra_gcm_do_final() 832 scatterwalk_map_and_copy(mac, rctx->src_sg, offset, rctx->authsize, 0); in tegra_gcm_do_verify() 834 if (crypto_memneq(rctx->outbuf.buf, mac, rctx->authsize)) in tegra_gcm_do_verify() 975 t = rctx->authsize; in tegra_ccm_format_nonce() 1063 memcpy(rctx->authdata, result, rctx->authsize); in tegra_ccm_mac_result() 1065 ret = crypto_memneq(rctx->authdata, result, rctx->authsize); in tegra_ccm_mac_result() 1082 rctx->authsize, 1); in tegra_ccm_ctr_result() 1084 memcpy(rctx->authdata, rctx->outbuf.buf, rctx->authsize); in tegra_ccm_ctr_result() [all …]
|