Lines Matching refs:data
115 * catch SPU message headers and the response data.
120 * @chunksize: Number of bytes of response data expected
141 u32 datalen; /* Number of bytes of response data expected */
180 * headers and the request data.
185 * @chunksize: Number of bytes of request data
204 u32 datalen; /* Number of bytes of response data expected */
284 * data.
293 * to synchronize access to request data structures.
310 int chunk_start; /* Beginning of data for current SPU msg */
480 /* See how much data was returned */
560 * the request data.
566 * @hash_carry_len: Number of bytes of data carried over from previous req
567 * @new_data_len: Number of bytes of new request data
588 u32 datalen; /* Number of bytes of response data expected */
636 * src scatterlist to avoid copying the data to be hashed. This function is
643 * lock step like this, there is no need to synchronize access to request data
649 * -EAGAIN: non-final request included a small amount of data, which for
667 unsigned int chunksize = 0; /* length of hash carry + new data */
669 * length of new data, not from hash carry, to be submitted in
675 u32 db_size; /* Length of data field, incl gcm and hash padding */
724 * Compute the amount remaining to hash. This may include data
734 * If this is not a final request and the request data is not a multiple
735 * of a full block, then simply park the extra data and prefix it to the
736 * data for the next request.
740 u16 new_len; /* len of data to add to hash carry */
762 /* if we have hash carry, then prefix it to the data in this request */
1023 * message headers and the response data.
1028 * @assoc_len: Length of associated data included in the crypto request
1030 * @resp_len: Number of bytes of response data expected to be written to
1055 u32 datalen; /* Number of bytes of response data expected */
1060 /* RFC4543: only pad after data, not after AAD */
1073 /* ICV (after data) must be in the next 32-bit word for CCM */
1096 * assoc data in the response
1105 * dst sg catches just the data. digest caught in separate buf.
1116 /* If GCM/CCM data is padded, catch padding in separate buffer */
1140 * request data.
1146 * @assoc: crypto API associated data scatterlist
1147 * @assoc_len: length of associated data
1148 * @assoc_nents: number of scatterlist entries containing assoc data
1150 * @chunksize: Number of bytes of request data
1153 * @incl_icv: If true, write separate ICV buffer after data and
1179 u32 datalen; /* Number of bytes of data to write */
1180 u32 written; /* Number of bytes of data written */
1196 /* Copy in each associated data sg entry from request */
1325 * 8-byte IV is included assoc data in request. SPU2
1372 /* General case data padding (CCM decrypt special case below) */
1402 * RFC4543: data is included in AAD, so don't pad after AAD
1403 * and pad data based on both AAD + data size
1493 /* no rx frags to catch output data */
1542 /* See how much data was returned */
1568 packet_log("response data: ");
1683 * we saved data in hash carry, but tell crypto
1930 /* SPU2 hardware does not compute hash of zero length data */
1953 * we saved data in hash carry, but tell crypto API
2051 /* Set the key using data we already have from setkey */
2112 /* Copy data from req scatterlist to tmp buffer */
2208 /* Copy data from req scatterlist to tmp buffer */
2587 areq->data = rctx->old_data;
2612 rctx->old_data = req->base.data;
2625 req->base.data = rctx->old_data;
2648 ("%s() Error: associated data too long. (%u > %u bytes)\n",
2666 /* assoc data is at start of src sg */
2670 * Init current position in src scatterlist to be after assoc data.
2671 * src_skip set to buffer offset where data begins. (Assoc data could
2676 pr_err("%s() Error: Unable to find start of src data\n",
2688 * Expect req->dst to have room for assoc data followed by
2689 * output data and ICV, if encrypt. So initialize dst_sg
2694 pr_err("%s() Error: Unable to find start of dst data\n",
4646 .data = &spum_ns2_types,
4650 .data = &spum_nsp_types,
4654 .data = &spu2_types,
4658 .data = &spu2_v2_types,