/linux/drivers/md/ |
H A D | dm-crypt.c | 182 unsigned int iv_size; member 370 memset(iv, 0, cc->iv_size); in crypt_iv_plain_gen() 379 memset(iv, 0, cc->iv_size); in crypt_iv_plain64_gen() 388 memset(iv, 0, cc->iv_size); in crypt_iv_plain64be_gen() 389 /* iv_size is at least of size u64; usually it is 16 bytes */ in crypt_iv_plain64be_gen() 390 *(__be64 *)&iv[cc->iv_size - sizeof(u64)] = cpu_to_be64(dmreq->iv_sector); in crypt_iv_plain64be_gen() 402 memset(iv, 0, cc->iv_size); in crypt_iv_essiv_gen() 448 memset(iv, 0, cc->iv_size - sizeof(u64)); /* rest is cleared below */ in crypt_iv_benbi_gen() 451 put_unaligned(val, (__be64 *)(iv + cc->iv_size - sizeof(u64))); in crypt_iv_benbi_gen() 459 memset(iv, 0, cc->iv_size); in crypt_iv_null_gen() [all...] |
/linux/net/tls/ |
H A D | tls.h | 317 prot->iv_size); in tls_advance_record_sn() 337 size_t pkt_len, iv_size = prot->iv_size; in tls_fill_prepend() local 342 pkt_len += iv_size; in tls_fill_prepend() 345 ctx->tx.iv + prot->salt_size, iv_size); in tls_fill_prepend()
|
H A D | tls_sw.c | 558 prot->iv_size + prot->salt_size); in tls_do_encryption() 1573 prot->iv_size + prot->salt_size); in tls_decrypt_sg() 1577 prot->iv_size); in tls_decrypt_sg() 2448 cipher_overhead += prot->iv_size; in tls_rx_msg_size() 2739 prot->iv_size = cipher_desc->iv; in init_prot_info()
|
/linux/drivers/crypto/intel/keembay/ |
H A D | keembay-ocs-aes-core.c | 256 int iv_size = crypto_skcipher_ivsize(tfm); in kmb_ocs_sk_validate_input() local 272 if (!req->iv || iv_size != AES_BLOCK_SIZE) in kmb_ocs_sk_validate_input() 277 * that: cryptlen >= iv_size in kmb_ocs_sk_validate_input() 283 if (!req->iv || iv_size != AES_BLOCK_SIZE) in kmb_ocs_sk_validate_input() 293 if (!req->iv || iv_size != AES_BLOCK_SIZE) in kmb_ocs_sk_validate_input() 403 int iv_size = crypto_skcipher_ivsize(tfm); in kmb_ocs_sk_prepare_inplace() local 409 * Note: if we are here, we already checked that cryptlen >= iv_size in kmb_ocs_sk_prepare_inplace() 410 * and iv_size == AES_BLOCK_SIZE (i.e., the size of last_ct_blk); see in kmb_ocs_sk_prepare_inplace() 415 req->cryptlen - iv_size, iv_size, in kmb_ocs_sk_prepare_inplace() 520 int iv_size = crypto_skcipher_ivsize(tfm); kmb_ocs_sk_run() local 600 int iv_size = crypto_aead_ivsize(tfm); kmb_ocs_aead_validate_input() local [all...] |
H A D | ocs-aes.c | 602 const u8 *iv, u32 iv_size, in ocs_aes_validate_inputs() argument 665 if (!iv || iv_size != AES_BLOCK_SIZE) in ocs_aes_validate_inputs() 681 if (!iv || iv_size != AES_BLOCK_SIZE) in ocs_aes_validate_inputs() 697 if (!iv || iv_size != AES_BLOCK_SIZE) in ocs_aes_validate_inputs() 704 if (!iv || iv_size != GCM_AES_IV_SIZE) in ocs_aes_validate_inputs() 731 if (!iv || iv_size != AES_BLOCK_SIZE) in ocs_aes_validate_inputs() 793 * @iv_size: The size (in bytes) of @iv. 805 u32 iv_size) in ocs_aes_op() argument 810 rc = ocs_aes_validate_inputs(src_dma_list, src_size, iv, iv_size, 0, 0, in ocs_aes_op()
|
H A D | ocs-aes.h | 78 u32 iv_size);
|
/linux/drivers/s390/cio/ |
H A D | airq.c | 114 static inline unsigned long iv_size(unsigned long bits) in iv_size() function 138 size = iv_size(bits); in airq_iv_create() 210 cio_dma_free(iv->vector, iv_size(iv->bits)); in airq_iv_release()
|
/linux/drivers/gpu/drm/amd/amdgpu/ |
H A D | amdgpu_ih.c | 301 uint32_t iv_size = 32; in amdgpu_ih_decode_iv_ts_helper() local 305 rptr += iv_size * offset; in amdgpu_ih_decode_iv_ts_helper()
|
/linux/drivers/crypto/hisilicon/sec2/ |
H A D | sec_crypto.c | 1636 u32 iv_size = req->ctx->c_ctx.ivsize; in sec_update_iv() local 1653 sz = sg_pcopy_to_buffer(sgl, sg_nents(sgl), iv, iv_size, in sec_update_iv() 1654 cryptlen - iv_size); in sec_update_iv() 1655 if (unlikely(sz != iv_size)) in sec_update_iv() 1658 sz = (cryptlen + iv_size - 1) / iv_size; in sec_update_iv() 1659 ctr_iv_inc(iv, iv_size, sz); in sec_update_iv() 2356 sec_min_key_size, sec_max_key_size, blk_size, iv_size)\ argument 2375 .ivsize = iv_size,\ 2578 ctx_exit, blk_size, iv_size, max_authsiz argument [all...] |
/linux/include/net/ |
H A D | tls.h | 214 u16 iv_size; member
|
/linux/fs/smb/client/ |
H A D | smb2ops.c | 4203 unsigned int iv_size = crypto_aead_ivsize(tfm); in smb2_aead_req_alloc() local 4211 len = iv_size; in smb2_aead_req_alloc() 4224 *req = (struct aead_request *)PTR_ALIGN(*iv + iv_size, in smb2_aead_req_alloc()
|