Home
last modified time | relevance | path

Searched refs:aad_size (Results 1 - 10 of 10) sorted by relevance

/kernel/linux/linux-6.6/drivers/crypto/intel/keembay/
H A Docs-aes.c602 dma_addr_t aad_dma_list, u32 aad_size, in ocs_aes_validate_inputs()
715 if (aad_size && aad_dma_list == DMA_MAPPING_ERROR) in ocs_aes_validate_inputs()
739 if (aad_size && aad_dma_list == DMA_MAPPING_ERROR) in ocs_aes_validate_inputs()
919 * @aad_size: The amount of data mapped by @aad_dma_list.
933 u32 aad_size, in ocs_aes_gcm_op()
943 aad_size, out_tag, tag_size, cipher, in ocs_aes_gcm_op()
968 bit_len = (u64)aad_size * 8; in ocs_aes_gcm_op()
978 if (aad_size) { in ocs_aes_gcm_op()
600 ocs_aes_validate_inputs(dma_addr_t src_dma_list, u32 src_size, const u8 *iv, u32 iv_size, dma_addr_t aad_dma_list, u32 aad_size, const u8 *tag, u32 tag_size, enum ocs_cipher cipher, enum ocs_mode mode, enum ocs_instruction instruction, dma_addr_t dst_dma_list) ocs_aes_validate_inputs() argument
925 ocs_aes_gcm_op(struct ocs_aes_dev *aes_dev, enum ocs_cipher cipher, enum ocs_instruction instruction, dma_addr_t dst_dma_list, dma_addr_t src_dma_list, u32 src_size, const u8 *iv, dma_addr_t aad_dma_list, u32 aad_size, u8 *out_tag, u32 tag_size) ocs_aes_gcm_op() argument
H A Docs-aes.h104 u32 aad_size,
/kernel/linux/linux-5.10/crypto/
H A Dtcrypt.c115 unsigned int aad_size) in sg_init_aead()
129 sg_set_buf(&sg[0], assoc, aad_size); in sg_init_aead()
254 unsigned int aad_size, u8 *keysize, u32 num_mb) in test_mb_aead_speed()
267 if (aad_size >= PAGE_SIZE) { in test_mb_aead_speed()
268 pr_err("associate data length (%u) too big\n", aad_size); in test_mb_aead_speed()
380 memset(assoc, 0xff, aad_size); in test_mb_aead_speed()
384 assoc, aad_size); in test_mb_aead_speed()
388 assoc, aad_size); in test_mb_aead_speed()
390 aead_request_set_ad(cur->req, aad_size); in test_mb_aead_speed()
522 unsigned int aad_size, u in test_aead_speed()
113 sg_init_aead(struct scatterlist *sg, char *xbuf[XBUFSIZE], unsigned int buflen, const void *assoc, unsigned int aad_size) sg_init_aead() argument
251 test_mb_aead_speed(const char *algo, int enc, int secs, struct aead_speed_template *template, unsigned int tcount, u8 authsize, unsigned int aad_size, u8 *keysize, u32 num_mb) test_mb_aead_speed() argument
519 test_aead_speed(const char *algo, int enc, unsigned int secs, struct aead_speed_template *template, unsigned int tcount, u8 authsize, unsigned int aad_size, u8 *keysize) test_aead_speed() argument
[all...]
/kernel/linux/linux-6.6/crypto/
H A Dtcrypt.c107 unsigned int aad_size) in sg_init_aead()
121 sg_set_buf(&sg[0], assoc, aad_size); in sg_init_aead()
246 unsigned int aad_size, u8 *keysize, u32 num_mb) in test_mb_aead_speed()
259 if (aad_size >= PAGE_SIZE) { in test_mb_aead_speed()
260 pr_err("associate data length (%u) too big\n", aad_size); in test_mb_aead_speed()
379 memset(assoc, 0xff, aad_size); in test_mb_aead_speed()
383 assoc, aad_size); in test_mb_aead_speed()
387 assoc, aad_size); in test_mb_aead_speed()
389 aead_request_set_ad(cur->req, aad_size); in test_mb_aead_speed()
521 unsigned int aad_size, u in test_aead_speed()
105 sg_init_aead(struct scatterlist *sg, char *xbuf[XBUFSIZE], unsigned int buflen, const void *assoc, unsigned int aad_size) sg_init_aead() argument
243 test_mb_aead_speed(const char *algo, int enc, int secs, struct aead_speed_template *template, unsigned int tcount, u8 authsize, unsigned int aad_size, u8 *keysize, u32 num_mb) test_mb_aead_speed() argument
518 test_aead_speed(const char *algo, int enc, unsigned int secs, struct aead_speed_template *template, unsigned int tcount, u8 authsize, unsigned int aad_size, u8 *keysize) test_aead_speed() argument
[all...]
/kernel/linux/linux-5.10/net/tls/
H A Dtls_sw.c242 aead_request_set_ad(aead_req, prot->aad_size); in tls_do_decryption()
348 sg_set_buf(&rec->sg_aead_in[0], rec->aad_space, prot->aad_size); in tls_get_rec()
352 sg_set_buf(&rec->sg_aead_out[0], rec->aad_space, prot->aad_size); in tls_get_rec()
522 aead_request_set_ad(aead_req, prot->aad_size); in tls_do_encryption()
1454 mem_size = mem_size + prot->aad_size; in decrypt_internal()
1470 iv = aad + prot->aad_size; in decrypt_internal()
1502 sg_set_buf(&sgin[0], aad, prot->aad_size); in decrypt_internal()
1514 sg_set_buf(&sgout[0], aad, prot->aad_size); in decrypt_internal()
2442 prot->aad_size = TLS_HEADER_SIZE; in tls_set_sw_offload()
2445 prot->aad_size in tls_set_sw_offload()
[all...]
/kernel/linux/linux-6.6/net/tls/
H A Dtls_sw.c266 aead_request_set_ad(aead_req, prot->aad_size); in tls_do_decryption()
376 sg_set_buf(&rec->sg_aead_in[0], rec->aad_space, prot->aad_size); in tls_get_rec()
380 sg_set_buf(&rec->sg_aead_out[0], rec->aad_space, prot->aad_size); in tls_get_rec()
569 aead_request_set_ad(aead_req, prot->aad_size); in tls_do_encryption()
1562 sg_set_buf(&sgin[0], dctx->aad, prot->aad_size); in tls_decrypt_sg()
1571 sg_set_buf(&sgout[0], dctx->aad, prot->aad_size); in tls_decrypt_sg()
1579 sg_set_buf(&sgout[0], dctx->aad, prot->aad_size); in tls_decrypt_sg()
2712 prot->aad_size = TLS_HEADER_SIZE; in tls_set_sw_offload()
2715 prot->aad_size = TLS_AAD_SPACE_SIZE; in tls_set_sw_offload()
2720 if (nonce_size > MAX_IV_SIZE || prot->aad_size > TLS_MAX_AAD_SIZ in tls_set_sw_offload()
[all...]
/kernel/linux/linux-6.6/include/net/
H A Dtls.h215 u16 aad_size; member
/kernel/linux/linux-5.10/include/net/
H A Dtls.h236 u16 aad_size; member
/kernel/linux/linux-5.10/drivers/crypto/caam/
H A Dregs.h953 u32 aad_size; /* CxAADSZR - Current AAD Size */ member
/kernel/linux/linux-6.6/drivers/crypto/caam/
H A Dregs.h961 u32 aad_size; /* CxAADSZR - Current AAD Size */ member

Completed in 21 milliseconds