/kernel/linux/linux-5.10/drivers/crypto/bcm/ |
H A D | spu.c | 627 unsigned int auth_len; in spum_create_request() local 629 auth_len = real_db_size; in spum_create_request() 635 auth_len -= hash_parms->digestsize; in spum_create_request() 639 auth_len -= hash_parms->pad_len; in spum_create_request() 663 flow_log(" auth_offset:%u auth_len:%u cipher_offset:%u cipher_len:%u\n", in spum_create_request() 664 auth_offset, auth_len, cipher_offset, cipher_len); in spum_create_request() 774 auth_len = cipher_offset + aead_parms->data_pad_len; in spum_create_request() 789 bdesc->length_mac = cpu_to_be16(auth_len); in spum_create_request() 798 auth_len += spum_wordalign_padlen(auth_len); in spum_create_request() [all...] |
/kernel/linux/linux-6.6/drivers/crypto/bcm/ |
H A D | spu.c | 625 unsigned int auth_len; in spum_create_request() local 627 auth_len = real_db_size; in spum_create_request() 633 auth_len -= hash_parms->digestsize; in spum_create_request() 637 auth_len -= hash_parms->pad_len; in spum_create_request() 661 flow_log(" auth_offset:%u auth_len:%u cipher_offset:%u cipher_len:%u\n", in spum_create_request() 662 auth_offset, auth_len, cipher_offset, cipher_len); in spum_create_request() 772 auth_len = cipher_offset + aead_parms->data_pad_len; in spum_create_request() 787 bdesc->length_mac = cpu_to_be16(auth_len); in spum_create_request() 796 auth_len += spum_wordalign_padlen(auth_len); in spum_create_request() [all...] |
/kernel/linux/linux-5.10/net/sctp/ |
H A D | auth.c | 260 __u32 auth_len; in sctp_auth_asoc_set_secret() local 262 auth_len = first_vector->len + last_vector->len; in sctp_auth_asoc_set_secret() 264 auth_len += ep_key->key->len; in sctp_auth_asoc_set_secret() 266 secret = sctp_auth_create_key(auth_len, gfp); in sctp_auth_asoc_set_secret()
|
H A D | output.c | 415 int auth_len = 0; in sctp_packet_pack() local 434 auth_len = padded; in sctp_packet_pack() 435 else if (auth_len + padded + packet->overhead > in sctp_packet_pack()
|
/kernel/linux/linux-6.6/net/sctp/ |
H A D | auth.c | 260 __u32 auth_len; in sctp_auth_asoc_set_secret() local 262 auth_len = first_vector->len + last_vector->len; in sctp_auth_asoc_set_secret() 264 auth_len += ep_key->key->len; in sctp_auth_asoc_set_secret() 266 secret = sctp_auth_create_key(auth_len, gfp); in sctp_auth_asoc_set_secret()
|
H A D | output.c | 445 int auth_len = 0; in sctp_packet_pack() local 464 auth_len = padded; in sctp_packet_pack() 465 else if (auth_len + padded + packet->overhead > in sctp_packet_pack()
|
/kernel/linux/linux-5.10/drivers/crypto/ |
H A D | sa2ul.c | 1384 size_t auth_len; in sa_sha_run() local 1386 auth_len = req->nbytes; in sa_sha_run() 1388 if (!auth_len) in sa_sha_run() 1391 if (auth_len > SA_MAX_DATA_SZ || in sa_sha_run() 1392 (auth_len >= SA_UNSAFE_DATA_SZ_MIN && in sa_sha_run() 1393 auth_len <= SA_UNSAFE_DATA_SZ_MAX)) { in sa_sha_run() 1402 subreq->nbytes = auth_len; in sa_sha_run() 1415 sa_req.size = auth_len; in sa_sha_run() 1416 sa_req.auth_size = auth_len; in sa_sha_run() 1678 u16 auth_len; in sa_aead_dma_in_callback() local [all...] |
H A D | ixp4xx_crypto.c | 126 u16 auth_len; /* Authentication data length */ member 130 u16 auth_len; /* Authentication data length */ member 657 crypt->auth_len = HMAC_PAD_BLOCKLEN; in register_chain_var() 1039 crypt->auth_len = req->assoclen + cryptlen; in aead_perform() 1043 buf = chainup_buffers(dev, req->src, crypt->auth_len, in aead_perform() 1063 buf = chainup_buffers(dev, req->dst, crypt->auth_len, in aead_perform()
|
/kernel/linux/linux-6.6/drivers/crypto/ |
H A D | sa2ul.c | 1407 size_t auth_len; in sa_sha_run() local 1409 auth_len = req->nbytes; in sa_sha_run() 1411 if (!auth_len) in sa_sha_run() 1414 if (auth_len > SA_MAX_DATA_SZ || in sa_sha_run() 1415 (auth_len >= SA_UNSAFE_DATA_SZ_MIN && in sa_sha_run() 1416 auth_len <= SA_UNSAFE_DATA_SZ_MAX)) { in sa_sha_run() 1425 subreq->nbytes = auth_len; in sa_sha_run() 1438 sa_req.size = auth_len; in sa_sha_run() 1439 sa_req.auth_size = auth_len; in sa_sha_run()
|
/kernel/linux/linux-6.6/drivers/crypto/intel/ixp4xx/ |
H A D | ixp4xx_crypto.c | 126 u16 auth_len; /* Authentication data length */ member 130 u16 auth_len; /* Authentication data length */ member 717 crypt->auth_len = HMAC_PAD_BLOCKLEN; in register_chain_var() 1133 crypt->auth_len = req->assoclen + cryptlen; in aead_perform() 1137 buf = chainup_buffers(dev, req->src, crypt->auth_len, in aead_perform() 1157 buf = chainup_buffers(dev, req->dst, crypt->auth_len, in aead_perform()
|
/kernel/linux/linux-5.10/drivers/crypto/qat/qat_common/ |
H A D | icp_qat_fw_la.h | 287 __u32 auth_len; member
|
H A D | qat_algs.c | 879 auth_param->auth_len = areq->assoclen + cipher_param->cipher_length; in qat_alg_aead_dec() 926 auth_param->auth_len = areq->assoclen + areq->cryptlen; in qat_alg_aead_enc()
|
/kernel/linux/linux-6.6/drivers/crypto/intel/qat/qat_common/ |
H A D | icp_qat_fw_la.h | 294 __u32 auth_len; member
|
H A D | qat_algs.c | 820 auth_param->auth_len = areq->assoclen + cipher_param->cipher_length; in qat_alg_aead_dec() 866 auth_param->auth_len = areq->assoclen + areq->cryptlen; in qat_alg_aead_enc()
|
/kernel/linux/linux-5.10/fs/ubifs/ |
H A D | journal.c | 727 int err, lnum, offs, compr_type, out_len, compr_len, auth_len; in ubifs_jnl_write_data() local 741 auth_len = ubifs_auth_node_sz(c); in ubifs_jnl_write_data() 743 data = kmalloc(dlen + auth_len, GFP_NOFS | __GFP_NOWARN); in ubifs_jnl_write_data() 783 write_len = ALIGN(dlen, 8) + auth_len; in ubifs_jnl_write_data()
|
/kernel/linux/linux-6.6/fs/ubifs/ |
H A D | journal.c | 727 int err, lnum, offs, compr_type, out_len, compr_len, auth_len; in ubifs_jnl_write_data() local 741 auth_len = ubifs_auth_node_sz(c); in ubifs_jnl_write_data() 743 data = kmalloc(dlen + auth_len, GFP_NOFS | __GFP_NOWARN); in ubifs_jnl_write_data() 783 write_len = ALIGN(dlen, 8) + auth_len; in ubifs_jnl_write_data()
|
/kernel/linux/linux-5.10/net/key/ |
H A D | af_key.c | 1619 int len, auth_len, enc_len, i; in compose_sadb_supported() local 1621 auth_len = xfrm_count_pfkey_auth_supported(); in compose_sadb_supported() 1622 if (auth_len) { in compose_sadb_supported() 1623 auth_len *= sizeof(struct sadb_alg); in compose_sadb_supported() 1624 auth_len += sizeof(struct sadb_supported); in compose_sadb_supported() 1633 len = enc_len + auth_len + sizeof(struct sadb_msg); in compose_sadb_supported() 1644 if (auth_len) { in compose_sadb_supported() 1648 sp = skb_put(skb, auth_len); in compose_sadb_supported() 1651 sp->sadb_supported_len = auth_len / sizeof(uint64_t); in compose_sadb_supported()
|
/kernel/linux/linux-6.6/net/key/ |
H A D | af_key.c | 1614 int len, auth_len, enc_len, i; in compose_sadb_supported() local 1616 auth_len = xfrm_count_pfkey_auth_supported(); in compose_sadb_supported() 1617 if (auth_len) { in compose_sadb_supported() 1618 auth_len *= sizeof(struct sadb_alg); in compose_sadb_supported() 1619 auth_len += sizeof(struct sadb_supported); in compose_sadb_supported() 1628 len = enc_len + auth_len + sizeof(struct sadb_msg); in compose_sadb_supported() 1639 if (auth_len) { in compose_sadb_supported() 1643 sp = skb_put(skb, auth_len); in compose_sadb_supported() 1646 sp->sadb_supported_len = auth_len / sizeof(uint64_t); in compose_sadb_supported()
|