/kernel/linux/linux-6.6/drivers/crypto/intel/keembay/ |
H A D | ocs-aes.c | 602 dma_addr_t aad_dma_list, u32 aad_size, in ocs_aes_validate_inputs() 715 if (aad_size && aad_dma_list == DMA_MAPPING_ERROR) in ocs_aes_validate_inputs() 739 if (aad_size && aad_dma_list == DMA_MAPPING_ERROR) in ocs_aes_validate_inputs() 919 * @aad_size: The amount of data mapped by @aad_dma_list. 933 u32 aad_size, in ocs_aes_gcm_op() 943 aad_size, out_tag, tag_size, cipher, in ocs_aes_gcm_op() 968 bit_len = (u64)aad_size * 8; in ocs_aes_gcm_op() 978 if (aad_size) { in ocs_aes_gcm_op() 600 ocs_aes_validate_inputs(dma_addr_t src_dma_list, u32 src_size, const u8 *iv, u32 iv_size, dma_addr_t aad_dma_list, u32 aad_size, const u8 *tag, u32 tag_size, enum ocs_cipher cipher, enum ocs_mode mode, enum ocs_instruction instruction, dma_addr_t dst_dma_list) ocs_aes_validate_inputs() argument 925 ocs_aes_gcm_op(struct ocs_aes_dev *aes_dev, enum ocs_cipher cipher, enum ocs_instruction instruction, dma_addr_t dst_dma_list, dma_addr_t src_dma_list, u32 src_size, const u8 *iv, dma_addr_t aad_dma_list, u32 aad_size, u8 *out_tag, u32 tag_size) ocs_aes_gcm_op() argument
|
H A D | ocs-aes.h | 104 u32 aad_size,
|
/kernel/linux/linux-5.10/crypto/ |
H A D | tcrypt.c | 115 unsigned int aad_size) in sg_init_aead() 129 sg_set_buf(&sg[0], assoc, aad_size); in sg_init_aead() 254 unsigned int aad_size, u8 *keysize, u32 num_mb) in test_mb_aead_speed() 267 if (aad_size >= PAGE_SIZE) { in test_mb_aead_speed() 268 pr_err("associate data length (%u) too big\n", aad_size); in test_mb_aead_speed() 380 memset(assoc, 0xff, aad_size); in test_mb_aead_speed() 384 assoc, aad_size); in test_mb_aead_speed() 388 assoc, aad_size); in test_mb_aead_speed() 390 aead_request_set_ad(cur->req, aad_size); in test_mb_aead_speed() 522 unsigned int aad_size, u in test_aead_speed() 113 sg_init_aead(struct scatterlist *sg, char *xbuf[XBUFSIZE], unsigned int buflen, const void *assoc, unsigned int aad_size) sg_init_aead() argument 251 test_mb_aead_speed(const char *algo, int enc, int secs, struct aead_speed_template *template, unsigned int tcount, u8 authsize, unsigned int aad_size, u8 *keysize, u32 num_mb) test_mb_aead_speed() argument 519 test_aead_speed(const char *algo, int enc, unsigned int secs, struct aead_speed_template *template, unsigned int tcount, u8 authsize, unsigned int aad_size, u8 *keysize) test_aead_speed() argument [all...] |
/kernel/linux/linux-6.6/crypto/ |
H A D | tcrypt.c | 107 unsigned int aad_size) in sg_init_aead() 121 sg_set_buf(&sg[0], assoc, aad_size); in sg_init_aead() 246 unsigned int aad_size, u8 *keysize, u32 num_mb) in test_mb_aead_speed() 259 if (aad_size >= PAGE_SIZE) { in test_mb_aead_speed() 260 pr_err("associate data length (%u) too big\n", aad_size); in test_mb_aead_speed() 379 memset(assoc, 0xff, aad_size); in test_mb_aead_speed() 383 assoc, aad_size); in test_mb_aead_speed() 387 assoc, aad_size); in test_mb_aead_speed() 389 aead_request_set_ad(cur->req, aad_size); in test_mb_aead_speed() 521 unsigned int aad_size, u in test_aead_speed() 105 sg_init_aead(struct scatterlist *sg, char *xbuf[XBUFSIZE], unsigned int buflen, const void *assoc, unsigned int aad_size) sg_init_aead() argument 243 test_mb_aead_speed(const char *algo, int enc, int secs, struct aead_speed_template *template, unsigned int tcount, u8 authsize, unsigned int aad_size, u8 *keysize, u32 num_mb) test_mb_aead_speed() argument 518 test_aead_speed(const char *algo, int enc, unsigned int secs, struct aead_speed_template *template, unsigned int tcount, u8 authsize, unsigned int aad_size, u8 *keysize) test_aead_speed() argument [all...] |
/kernel/linux/linux-5.10/net/tls/ |
H A D | tls_sw.c | 242 aead_request_set_ad(aead_req, prot->aad_size); in tls_do_decryption() 348 sg_set_buf(&rec->sg_aead_in[0], rec->aad_space, prot->aad_size); in tls_get_rec() 352 sg_set_buf(&rec->sg_aead_out[0], rec->aad_space, prot->aad_size); in tls_get_rec() 522 aead_request_set_ad(aead_req, prot->aad_size); in tls_do_encryption() 1454 mem_size = mem_size + prot->aad_size; in decrypt_internal() 1470 iv = aad + prot->aad_size; in decrypt_internal() 1502 sg_set_buf(&sgin[0], aad, prot->aad_size); in decrypt_internal() 1514 sg_set_buf(&sgout[0], aad, prot->aad_size); in decrypt_internal() 2442 prot->aad_size = TLS_HEADER_SIZE; in tls_set_sw_offload() 2445 prot->aad_size in tls_set_sw_offload() [all...] |
/kernel/linux/linux-6.6/net/tls/ |
H A D | tls_sw.c | 266 aead_request_set_ad(aead_req, prot->aad_size); in tls_do_decryption() 376 sg_set_buf(&rec->sg_aead_in[0], rec->aad_space, prot->aad_size); in tls_get_rec() 380 sg_set_buf(&rec->sg_aead_out[0], rec->aad_space, prot->aad_size); in tls_get_rec() 569 aead_request_set_ad(aead_req, prot->aad_size); in tls_do_encryption() 1562 sg_set_buf(&sgin[0], dctx->aad, prot->aad_size); in tls_decrypt_sg() 1571 sg_set_buf(&sgout[0], dctx->aad, prot->aad_size); in tls_decrypt_sg() 1579 sg_set_buf(&sgout[0], dctx->aad, prot->aad_size); in tls_decrypt_sg() 2712 prot->aad_size = TLS_HEADER_SIZE; in tls_set_sw_offload() 2715 prot->aad_size = TLS_AAD_SPACE_SIZE; in tls_set_sw_offload() 2720 if (nonce_size > MAX_IV_SIZE || prot->aad_size > TLS_MAX_AAD_SIZ in tls_set_sw_offload() [all...] |
/kernel/linux/linux-6.6/include/net/ |
H A D | tls.h | 215 u16 aad_size; member
|
/kernel/linux/linux-5.10/include/net/ |
H A D | tls.h | 236 u16 aad_size; member
|
/kernel/linux/linux-5.10/drivers/crypto/caam/ |
H A D | regs.h | 953 u32 aad_size; /* CxAADSZR - Current AAD Size */ member
|
/kernel/linux/linux-6.6/drivers/crypto/caam/ |
H A D | regs.h | 961 u32 aad_size; /* CxAADSZR - Current AAD Size */ member
|