/kernel/linux/linux-6.6/lib/crypto/ |
H A D | aesgcm.c | 77 const u8 *assoc, int assoc_len, __be32 *ctr, u8 *authtag) in aesgcm_mac() 79 be128 tail = { cpu_to_be64(assoc_len * 8), cpu_to_be64(src_len * 8) }; in aesgcm_mac() 83 aesgcm_ghash(&ghash, &ctx->ghash_key, assoc, assoc_len); in aesgcm_mac() 128 * @assoc_len: The size in bytes of the associated data 136 int crypt_len, const u8 *assoc, int assoc_len, in aesgcm_encrypt() 144 aesgcm_mac(ctx, dst, crypt_len, assoc, assoc_len, ctr, authtag); in aesgcm_encrypt() 156 * @assoc_len: The size in bytes of the associated data 167 int assoc_len, const u8 iv[GCM_AES_IV_SIZE], in aesgcm_decrypt() 175 aesgcm_mac(ctx, src, crypt_len, assoc, assoc_len, ctr, tagbuf); in aesgcm_decrypt() 76 aesgcm_mac(const struct aesgcm_ctx *ctx, const u8 *src, int src_len, const u8 *assoc, int assoc_len, __be32 *ctr, u8 *authtag) aesgcm_mac() argument 135 aesgcm_encrypt(const struct aesgcm_ctx *ctx, u8 *dst, const u8 *src, int crypt_len, const u8 *assoc, int assoc_len, const u8 iv[GCM_AES_IV_SIZE], u8 *authtag) aesgcm_encrypt() argument 165 aesgcm_decrypt(const struct aesgcm_ctx *ctx, u8 *dst, const u8 *src, int crypt_len, const u8 *assoc, int assoc_len, const u8 iv[GCM_AES_IV_SIZE], const u8 *authtag) aesgcm_decrypt() argument
|
/kernel/linux/linux-6.6/include/crypto/ |
H A D | gcm.h | 77 int crypt_len, const u8 *assoc, int assoc_len, 82 int assoc_len, const u8 iv[GCM_AES_IV_SIZE],
|
/kernel/linux/linux-5.10/net/bluetooth/ |
H A D | a2mp.c | 419 size_t assoc_len; in a2mp_getampassoc_rsp() local 424 assoc_len = len - sizeof(*rsp); in a2mp_getampassoc_rsp() 427 assoc_len); in a2mp_getampassoc_rsp() 437 assoc = kmemdup(rsp->amp_assoc, assoc_len, GFP_KERNEL); in a2mp_getampassoc_rsp() 444 ctrl->assoc_len = assoc_len; in a2mp_getampassoc_rsp() 445 ctrl->assoc_rem_len = assoc_len; in a2mp_getampassoc_rsp() 509 size_t assoc_len = le16_to_cpu(hdr->len) - sizeof(*req); in a2mp_createphyslink_req() local 512 assoc = kmemdup(req->amp_assoc, assoc_len, GFP_KERNEL); in a2mp_createphyslink_req() 520 ctrl->assoc_len in a2mp_createphyslink_req() [all...] |
H A D | amp.h | 16 __u16 assoc_len; member
|
H A D | amp.c | 347 ctrl->assoc_rem_len = ctrl->assoc_len; in amp_write_rem_assoc_frag() 363 BT_DBG("hcon %p ctrl %p frag_len %u assoc_len %u rem_len %u", in amp_write_rem_assoc_frag() 364 hcon, ctrl, frag_len, ctrl->assoc_len, ctrl->assoc_rem_len); in amp_write_rem_assoc_frag()
|
/kernel/linux/linux-5.10/drivers/crypto/ |
H A D | omap-aes-gcm.c | 48 alen = ALIGN(dd->assoc_len, AES_BLOCK_SIZE); in omap_aes_gcm_done_task() 52 nsg = !!(dd->assoc_len && dd->total); in omap_aes_gcm_done_task() 147 dd->assoc_len = assoclen; in omap_aes_gcm_copy_buffers()
|
H A D | omap-aes.h | 180 size_t assoc_len; member
|
H A D | picoxcell_crypto.c | 562 u32 ctrl, proc_len, assoc_len; in spacc_aead_submit() local 574 assoc_len = aead_req->assoclen; in spacc_aead_submit() 575 proc_len = aead_req->cryptlen + assoc_len; in spacc_aead_submit() 585 writel(assoc_len, engine->regs + SPA_AAD_LEN_REG_OFFSET); in spacc_aead_submit()
|
H A D | omap-aes.c | 194 omap_aes_write(dd, AES_REG_A_LEN, dd->assoc_len); in omap_aes_dma_trigger_omap4()
|
/kernel/linux/linux-6.6/drivers/crypto/ |
H A D | omap-aes-gcm.c | 51 alen = ALIGN(dd->assoc_len, AES_BLOCK_SIZE); in omap_aes_gcm_done_task() 55 nsg = !!(dd->assoc_len && dd->total); in omap_aes_gcm_done_task() 150 dd->assoc_len = assoclen; in omap_aes_gcm_copy_buffers()
|
H A D | omap-aes.h | 178 size_t assoc_len; member
|
H A D | omap-aes.c | 192 omap_aes_write(dd, AES_REG_A_LEN, dd->assoc_len); in omap_aes_dma_trigger_omap4()
|
/kernel/linux/linux-5.10/drivers/crypto/bcm/ |
H A D | spu2.h | 185 unsigned int assoc_len, unsigned int iv_len,
|
H A D | spu.c | 481 * @assoc_len: length of associated data (bytes) 488 unsigned int assoc_len, unsigned int iv_len, in spum_assoc_resp_len() 494 if (assoc_len) in spum_assoc_resp_len() 495 buflen = assoc_len; in spum_assoc_resp_len() 487 spum_assoc_resp_len(enum spu_cipher_mode cipher_mode, unsigned int assoc_len, unsigned int iv_len, bool is_encrypt) spum_assoc_resp_len() argument
|
H A D | spu.h | 233 unsigned int assoc_len, unsigned int iv_len,
|
H A D | cipher.h | 372 unsigned int assoc_len,
|
H A D | spu2.c | 863 * @assoc_len: length of additional associated data, in bytes 870 unsigned int assoc_len, unsigned int iv_len, in spu2_assoc_resp_len() 873 u32 resp_len = assoc_len; in spu2_assoc_resp_len() 869 spu2_assoc_resp_len(enum spu_cipher_mode cipher_mode, unsigned int assoc_len, unsigned int iv_len, bool is_encrypt) spu2_assoc_resp_len() argument
|
H A D | cipher.c | 1028 * @assoc_len: Length of associated data included in the crypto request 1048 unsigned int assoc_len, in spu_aead_rx_sg_create() 1062 assoc_len + resp_len); in spu_aead_rx_sg_create() 1063 assoc_buf_len = assoc_len; in spu_aead_rx_sg_create() 1068 assoc_len, ret_iv_len, in spu_aead_rx_sg_create() 1147 * @assoc_len: length of associated data 1169 unsigned int assoc_len, in spu_aead_tx_sg_create() 1195 if (assoc_len) { in spu_aead_tx_sg_create() 1198 assoc_nents, assoc_len); in spu_aead_tx_sg_create() 1199 if (written < assoc_len) { in spu_aead_tx_sg_create() 1044 spu_aead_rx_sg_create(struct brcm_message *mssg, struct aead_request *req, struct iproc_reqctx_s *rctx, u8 rx_frag_num, unsigned int assoc_len, u32 ret_iv_len, unsigned int resp_len, unsigned int digestsize, u32 stat_pad_len) spu_aead_rx_sg_create() argument 1164 spu_aead_tx_sg_create(struct brcm_message *mssg, struct iproc_reqctx_s *rctx, u8 tx_frag_num, u32 spu_hdr_len, struct scatterlist *assoc, unsigned int assoc_len, int assoc_nents, unsigned int aead_iv_len, unsigned int chunksize, u32 aad_pad_len, u32 pad_len, bool incl_icv) spu_aead_tx_sg_create() argument [all...] |
/kernel/linux/linux-6.6/drivers/crypto/bcm/ |
H A D | spu2.h | 185 unsigned int assoc_len, unsigned int iv_len,
|
H A D | spu.c | 479 * @assoc_len: length of associated data (bytes) 486 unsigned int assoc_len, unsigned int iv_len, in spum_assoc_resp_len() 492 if (assoc_len) in spum_assoc_resp_len() 493 buflen = assoc_len; in spum_assoc_resp_len() 485 spum_assoc_resp_len(enum spu_cipher_mode cipher_mode, unsigned int assoc_len, unsigned int iv_len, bool is_encrypt) spum_assoc_resp_len() argument
|
H A D | spu.h | 234 unsigned int assoc_len, unsigned int iv_len,
|
H A D | cipher.h | 370 unsigned int assoc_len,
|
H A D | spu2.c | 868 * @assoc_len: length of additional associated data, in bytes 875 unsigned int assoc_len, unsigned int iv_len, in spu2_assoc_resp_len() 878 u32 resp_len = assoc_len; in spu2_assoc_resp_len() 874 spu2_assoc_resp_len(enum spu_cipher_mode cipher_mode, unsigned int assoc_len, unsigned int iv_len, bool is_encrypt) spu2_assoc_resp_len() argument
|
H A D | cipher.c | 1025 * @assoc_len: Length of associated data included in the crypto request 1045 unsigned int assoc_len, in spu_aead_rx_sg_create() 1059 assoc_len + resp_len); in spu_aead_rx_sg_create() 1060 assoc_buf_len = assoc_len; in spu_aead_rx_sg_create() 1065 assoc_len, ret_iv_len, in spu_aead_rx_sg_create() 1144 * @assoc_len: length of associated data 1166 unsigned int assoc_len, in spu_aead_tx_sg_create() 1192 if (assoc_len) { in spu_aead_tx_sg_create() 1195 assoc_nents, assoc_len); in spu_aead_tx_sg_create() 1196 if (written < assoc_len) { in spu_aead_tx_sg_create() 1041 spu_aead_rx_sg_create(struct brcm_message *mssg, struct aead_request *req, struct iproc_reqctx_s *rctx, u8 rx_frag_num, unsigned int assoc_len, u32 ret_iv_len, unsigned int resp_len, unsigned int digestsize, u32 stat_pad_len) spu_aead_rx_sg_create() argument 1161 spu_aead_tx_sg_create(struct brcm_message *mssg, struct iproc_reqctx_s *rctx, u8 tx_frag_num, u32 spu_hdr_len, struct scatterlist *assoc, unsigned int assoc_len, int assoc_nents, unsigned int aead_iv_len, unsigned int chunksize, u32 aad_pad_len, u32 pad_len, bool incl_icv) spu_aead_tx_sg_create() argument [all...] |