/openbmc/linux/net/tipc/ |
H A D | crypto.c | 206 struct tipc_aead __rcu *aead[KEY_MAX + 1]; member 240 struct tipc_aead *aead; member 247 struct tipc_aead *aead; member 251 static struct tipc_aead *tipc_aead_get(struct tipc_aead __rcu *aead); 252 static inline void tipc_aead_put(struct tipc_aead *aead); 254 static int tipc_aead_users(struct tipc_aead __rcu *aead); 255 static void tipc_aead_users_inc(struct tipc_aead __rcu *aead, int lim); 256 static void tipc_aead_users_dec(struct tipc_aead __rcu *aead, int lim); 257 static void tipc_aead_users_set(struct tipc_aead __rcu *aead, int val); 258 static struct crypto_aead *tipc_aead_tfm_next(struct tipc_aead *aead); [all …]
|
/openbmc/linux/drivers/crypto/xilinx/ |
H A D | zynqmp-aes-gcm.c | 47 struct aead_engine_alg aead; member 79 struct crypto_aead *aead = crypto_aead_reqtfm(req); in zynqmp_aes_aead_cipher() local 80 struct zynqmp_aead_tfm_ctx *tfm_ctx = crypto_aead_ctx(aead); in zynqmp_aes_aead_cipher() 209 struct crypto_aead *aead = crypto_aead_reqtfm(req); in zynqmp_handle_aes_req() local 210 struct zynqmp_aead_tfm_ctx *tfm_ctx = crypto_aead_ctx(aead); in zynqmp_handle_aes_req() 241 static int zynqmp_aes_aead_setkey(struct crypto_aead *aead, const u8 *key, in zynqmp_aes_aead_setkey() argument 244 struct crypto_tfm *tfm = crypto_aead_tfm(aead); in zynqmp_aes_aead_setkey() 267 tfm_ctx->fbk_cipher->base.crt_flags |= (aead->base.crt_flags & in zynqmp_aes_aead_setkey() 273 static int zynqmp_aes_aead_setauthsize(struct crypto_aead *aead, in zynqmp_aes_aead_setauthsize() argument 276 struct crypto_tfm *tfm = crypto_aead_tfm(aead); in zynqmp_aes_aead_setauthsize() [all …]
|
/openbmc/linux/crypto/ |
H A D | aead.c | 105 struct crypto_aead *aead = crypto_aead_reqtfm(req); in crypto_aead_encrypt() local 106 struct aead_alg *alg = crypto_aead_alg(aead); in crypto_aead_encrypt() 117 if (crypto_aead_get_flags(aead) & CRYPTO_TFM_NEED_KEY) in crypto_aead_encrypt() 128 struct crypto_aead *aead = crypto_aead_reqtfm(req); in crypto_aead_decrypt() local 129 struct aead_alg *alg = crypto_aead_alg(aead); in crypto_aead_decrypt() 140 if (crypto_aead_get_flags(aead) & CRYPTO_TFM_NEED_KEY) in crypto_aead_decrypt() 142 else if (req->cryptlen < crypto_aead_authsize(aead)) in crypto_aead_decrypt() 153 struct crypto_aead *aead = __crypto_aead_cast(tfm); in crypto_aead_exit_tfm() local 154 struct aead_alg *alg = crypto_aead_alg(aead); in crypto_aead_exit_tfm() 156 alg->exit(aead); in crypto_aead_exit_tfm() [all …]
|
H A D | algif_aead.c | 40 struct crypto_aead *aead; member 51 struct crypto_aead *tfm = aeadc->aead; in aead_sufficient_data() 68 struct crypto_aead *tfm = aeadc->aead; in aead_sendmsg() 97 struct crypto_aead *tfm = aeadc->aead; in _aead_recvmsg() 396 if (crypto_aead_get_flags(tfm->aead) & CRYPTO_TFM_NEED_KEY) in aead_check_key() 458 struct crypto_aead *aead; in aead_bind() local 465 aead = crypto_alloc_aead(name, type, mask); in aead_bind() 466 if (IS_ERR(aead)) { in aead_bind() 468 return ERR_CAST(aead); in aead_bind() 473 crypto_free_aead(aead); in aead_bind() [all …]
|
H A D | gcm.c | 44 struct crypto_aead_spawn aead; member 92 static int crypto_gcm_setkey(struct crypto_aead *aead, const u8 *key, in crypto_gcm_setkey() argument 95 struct crypto_gcm_ctx *ctx = crypto_aead_ctx(aead); in crypto_gcm_setkey() 110 crypto_skcipher_set_flags(ctr, crypto_aead_get_flags(aead) & in crypto_gcm_setkey() 138 crypto_ahash_set_flags(ghash, crypto_aead_get_flags(aead) & in crypto_gcm_setkey() 180 struct crypto_aead *aead = crypto_aead_reqtfm(req); in crypto_gcm_init_crypt() local 181 struct crypto_gcm_ctx *ctx = crypto_aead_ctx(aead); in crypto_gcm_init_crypt() 412 struct crypto_aead *aead = crypto_aead_reqtfm(req); in gcm_enc_copy_hash() local 418 crypto_aead_authsize(aead), 1); in gcm_enc_copy_hash() 466 struct crypto_aead *aead = crypto_aead_reqtfm(req); in crypto_gcm_verify() local [all …]
|
H A D | ccm.c | 87 static int crypto_ccm_setkey(struct crypto_aead *aead, const u8 *key, in crypto_ccm_setkey() argument 90 struct crypto_ccm_ctx *ctx = crypto_aead_ctx(aead); in crypto_ccm_setkey() 96 crypto_skcipher_set_flags(ctr, crypto_aead_get_flags(aead) & in crypto_ccm_setkey() 103 crypto_ahash_set_flags(mac, crypto_aead_get_flags(aead) & in crypto_ccm_setkey() 130 struct crypto_aead *aead = crypto_aead_reqtfm(req); in format_input() local 135 m = crypto_aead_authsize(aead); in format_input() 172 struct crypto_aead *aead = crypto_aead_reqtfm(req); in crypto_ccm_auth() local 173 struct crypto_ccm_ctx *ctx = crypto_aead_ctx(aead); in crypto_ccm_auth() 230 struct crypto_aead *aead = crypto_aead_reqtfm(req); in crypto_ccm_encrypt_done() local 237 crypto_aead_authsize(aead), 1); in crypto_ccm_encrypt_done() [all …]
|
H A D | essiv.c | 53 struct crypto_aead *aead; member 102 crypto_aead_clear_flags(tctx->u.aead, CRYPTO_TFM_REQ_MASK); in essiv_aead_setkey() 103 crypto_aead_set_flags(tctx->u.aead, crypto_aead_get_flags(tfm) & in essiv_aead_setkey() 105 err = crypto_aead_setkey(tctx->u.aead, key, keylen); in essiv_aead_setkey() 131 return crypto_aead_setauthsize(tctx->u.aead, authsize); in essiv_aead_setauthsize() 246 aead_request_set_tfm(subreq, tctx->u.aead); in essiv_aead_crypt() 327 struct crypto_aead *aead; in essiv_aead_init_tfm() local 334 aead = crypto_spawn_aead(&ictx->u.aead_spawn); in essiv_aead_init_tfm() 335 if (IS_ERR(aead)) in essiv_aead_init_tfm() 336 return PTR_ERR(aead); in essiv_aead_init_tfm() [all …]
|
H A D | geniv.c | 109 int aead_init_geniv(struct crypto_aead *aead) in aead_init_geniv() argument 111 struct aead_geniv_ctx *ctx = crypto_aead_ctx(aead); in aead_init_geniv() 112 struct aead_instance *inst = aead_alg_instance(aead); in aead_init_geniv() 123 crypto_aead_ivsize(aead)); in aead_init_geniv() 139 crypto_aead_set_reqsize(aead, crypto_aead_reqsize(child) + in aead_init_geniv()
|
/openbmc/linux/drivers/crypto/caam/ |
H A D | caamalg.c | 101 struct aead_engine_alg aead; member 140 static int aead_null_set_sh_desc(struct crypto_aead *aead) in aead_null_set_sh_desc() argument 142 struct caam_ctx *ctx = crypto_aead_ctx_dma(aead); in aead_null_set_sh_desc() 190 static int aead_set_sh_desc(struct crypto_aead *aead) in aead_set_sh_desc() argument 192 struct caam_aead_alg *alg = container_of(crypto_aead_alg(aead), in aead_set_sh_desc() 194 aead.base); in aead_set_sh_desc() 195 unsigned int ivsize = crypto_aead_ivsize(aead); in aead_set_sh_desc() 196 struct caam_ctx *ctx = crypto_aead_ctx_dma(aead); in aead_set_sh_desc() 212 return aead_null_set_sh_desc(aead); in aead_set_sh_desc() 332 static int gcm_set_sh_desc(struct crypto_aead *aead) in gcm_set_sh_desc() argument [all …]
|
H A D | caamalg_qi.c | 50 struct aead_alg aead; member 85 static int aead_set_sh_desc(struct crypto_aead *aead) in aead_set_sh_desc() argument 87 struct caam_aead_alg *alg = container_of(crypto_aead_alg(aead), in aead_set_sh_desc() 88 typeof(*alg), aead); in aead_set_sh_desc() 89 struct caam_ctx *ctx = crypto_aead_ctx_dma(aead); in aead_set_sh_desc() 90 unsigned int ivsize = crypto_aead_ivsize(aead); in aead_set_sh_desc() 200 static int aead_setkey(struct crypto_aead *aead, const u8 *key, in aead_setkey() argument 203 struct caam_ctx *ctx = crypto_aead_ctx_dma(aead); in aead_setkey() 258 ret = aead_set_sh_desc(aead); in aead_setkey() 288 static int des3_aead_setkey(struct crypto_aead *aead, const u8 *key, in des3_aead_setkey() argument [all …]
|
H A D | caamalg_qi2.c | 54 struct aead_alg aead; member 172 static int aead_set_sh_desc(struct crypto_aead *aead) in aead_set_sh_desc() argument 174 struct caam_aead_alg *alg = container_of(crypto_aead_alg(aead), in aead_set_sh_desc() 175 typeof(*alg), aead); in aead_set_sh_desc() 176 struct caam_ctx *ctx = crypto_aead_ctx_dma(aead); in aead_set_sh_desc() 177 unsigned int ivsize = crypto_aead_ivsize(aead); in aead_set_sh_desc() 289 static int aead_setkey(struct crypto_aead *aead, const u8 *key, in aead_setkey() argument 292 struct caam_ctx *ctx = crypto_aead_ctx_dma(aead); in aead_setkey() 323 return aead_set_sh_desc(aead); in aead_setkey() 329 static int des3_aead_setkey(struct crypto_aead *aead, const u8 *key, in des3_aead_setkey() argument [all …]
|
/openbmc/linux/drivers/crypto/cavium/nitrox/ |
H A D | nitrox_aead.c | 33 static int nitrox_aes_gcm_setkey(struct crypto_aead *aead, const u8 *key, in nitrox_aes_gcm_setkey() argument 37 struct nitrox_crypto_ctx *nctx = crypto_aead_ctx(aead); in nitrox_aes_gcm_setkey() 58 static int nitrox_aead_setauthsize(struct crypto_aead *aead, in nitrox_aead_setauthsize() argument 61 struct nitrox_crypto_ctx *nctx = crypto_aead_ctx(aead); in nitrox_aead_setauthsize() 69 aead->authsize = authsize; in nitrox_aead_setauthsize() 74 static int nitrox_aes_gcm_setauthsize(struct crypto_aead *aead, in nitrox_aes_gcm_setauthsize() argument 90 return nitrox_aead_setauthsize(aead, authsize); in nitrox_aes_gcm_setauthsize() 215 struct crypto_aead *aead = crypto_aead_reqtfm(areq); in nitrox_aes_gcm_enc() local 216 struct nitrox_crypto_ctx *nctx = crypto_aead_ctx(aead); in nitrox_aes_gcm_enc() 230 rctx->dstlen = rctx->srclen + aead->authsize; in nitrox_aes_gcm_enc() [all …]
|
/openbmc/linux/net/ipv4/ |
H A D | esp4.c | 46 static void *esp_alloc_tmp(struct crypto_aead *aead, int nfrags, int extralen) in esp_alloc_tmp() argument 52 len += crypto_aead_ivsize(aead); in esp_alloc_tmp() 55 len += crypto_aead_alignmask(aead) & in esp_alloc_tmp() 60 len += sizeof(struct aead_request) + crypto_aead_reqsize(aead); in esp_alloc_tmp() 73 static inline u8 *esp_tmp_iv(struct crypto_aead *aead, void *tmp, int extralen) in esp_tmp_iv() argument 75 return crypto_aead_ivsize(aead) ? in esp_tmp_iv() 77 crypto_aead_alignmask(aead) + 1) : tmp + extralen; in esp_tmp_iv() 80 static inline struct aead_request *esp_tmp_req(struct crypto_aead *aead, u8 *iv) in esp_tmp_req() argument 84 req = (void *)PTR_ALIGN(iv + crypto_aead_ivsize(aead), in esp_tmp_req() 86 aead_request_set_tfm(req, aead); in esp_tmp_req() [all …]
|
H A D | esp4_offload.c | 198 struct crypto_aead *aead; in esp4_gso_segment() local 211 aead = x->data; in esp4_gso_segment() 217 if (!pskb_may_pull(skb, sizeof(*esph) + crypto_aead_ivsize(aead))) in esp4_gso_segment() 220 __skb_pull(skb, sizeof(*esph) + crypto_aead_ivsize(aead)); in esp4_gso_segment() 240 struct crypto_aead *aead = x->data; in esp_input_tail() local 243 if (!pskb_may_pull(skb, sizeof(struct ip_esp_hdr) + crypto_aead_ivsize(aead))) in esp_input_tail() 259 struct crypto_aead *aead; in esp_xmit() local 282 aead = x->data; in esp_xmit() 283 alen = crypto_aead_authsize(aead); in esp_xmit() 288 blksize = ALIGN(crypto_aead_blocksize(aead), 4); in esp_xmit()
|
/openbmc/linux/net/ipv6/ |
H A D | esp6.c | 63 static void *esp_alloc_tmp(struct crypto_aead *aead, int nfrags, int seqihlen) in esp_alloc_tmp() argument 69 len += crypto_aead_ivsize(aead); in esp_alloc_tmp() 72 len += crypto_aead_alignmask(aead) & in esp_alloc_tmp() 77 len += sizeof(struct aead_request) + crypto_aead_reqsize(aead); in esp_alloc_tmp() 90 static inline u8 *esp_tmp_iv(struct crypto_aead *aead, void *tmp, int seqhilen) in esp_tmp_iv() argument 92 return crypto_aead_ivsize(aead) ? in esp_tmp_iv() 94 crypto_aead_alignmask(aead) + 1) : tmp + seqhilen; in esp_tmp_iv() 97 static inline struct aead_request *esp_tmp_req(struct crypto_aead *aead, u8 *iv) in esp_tmp_req() argument 101 req = (void *)PTR_ALIGN(iv + crypto_aead_ivsize(aead), in esp_tmp_req() 103 aead_request_set_tfm(req, aead); in esp_tmp_req() [all …]
|
H A D | esp6_offload.c | 236 struct crypto_aead *aead; in esp6_gso_segment() local 249 aead = x->data; in esp6_gso_segment() 255 if (!pskb_may_pull(skb, sizeof(*esph) + crypto_aead_ivsize(aead))) in esp6_gso_segment() 258 __skb_pull(skb, sizeof(*esph) + crypto_aead_ivsize(aead)); in esp6_gso_segment() 276 struct crypto_aead *aead = x->data; in esp6_input_tail() local 279 if (!pskb_may_pull(skb, sizeof(struct ip_esp_hdr) + crypto_aead_ivsize(aead))) in esp6_input_tail() 295 struct crypto_aead *aead; in esp6_xmit() local 316 aead = x->data; in esp6_xmit() 317 alen = crypto_aead_authsize(aead); in esp6_xmit() 322 blksize = ALIGN(crypto_aead_blocksize(aead), 4); in esp6_xmit()
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-security/trusted-services/corstone1000/ |
H A D | 0002-Fix-in-AEAD-for-psa-arch-test-254.patch | 19 .../crypto/provider/extension/aead/aead_provider.c | 10 ++++++++-- 20 .../aead/serializer/aead_provider_serializer.h | 1 + 22 protocols/service/crypto/packed-c/aead.h | 1 + 50 …nents/service/crypto/provider/extension/aead/aead_provider.c b/components/service/crypto/provider/… 52 --- a/components/service/crypto/provider/extension/aead/aead_provider.c 53 +++ b/components/service/crypto/provider/extension/aead/aead_provider.c 82 psa_status = psa_aead_update(&crypto_context->op.aead, 83 …ce/crypto/provider/extension/aead/serializer/aead_provider_serializer.h b/components/service/crypt… 85 --- a/components/service/crypto/provider/extension/aead/serializer/aead_provider_serializer.h 86 +++ b/components/service/crypto/provider/extension/aead/serializer/aead_provider_serializer.h [all …]
|
/openbmc/linux/Documentation/crypto/ |
H A D | api-aead.rst | 4 .. kernel-doc:: include/crypto/aead.h 7 .. kernel-doc:: include/crypto/aead.h 13 .. kernel-doc:: include/crypto/aead.h 19 .. kernel-doc:: include/crypto/aead.h 22 .. kernel-doc:: include/crypto/aead.h
|
/openbmc/linux/include/crypto/internal/ |
H A D | aead.h | 58 static inline struct aead_instance *aead_alg_instance(struct crypto_aead *aead) in aead_alg_instance() argument 60 return aead_instance(crypto_tfm_alg_instance(&aead->base)); in aead_alg_instance() 120 static inline void crypto_aead_set_reqsize(struct crypto_aead *aead, in crypto_aead_set_reqsize() argument 123 aead->reqsize = reqsize; in crypto_aead_set_reqsize() 126 static inline void crypto_aead_set_reqsize_dma(struct crypto_aead *aead, in crypto_aead_set_reqsize_dma() argument 130 aead->reqsize = reqsize; in crypto_aead_set_reqsize_dma()
|
/openbmc/linux/arch/arm64/crypto/ |
H A D | sm4-ce-ccm-glue.c | 56 struct crypto_aead *aead = crypto_aead_reqtfm(req); in ccm_format_input() local 71 m = crypto_aead_authsize(aead); in ccm_format_input() 93 struct crypto_aead *aead = crypto_aead_reqtfm(req); in ccm_calculate_auth_mac() local 94 struct sm4_ctx *ctx = crypto_aead_ctx(aead); in ccm_calculate_auth_mac() 215 struct crypto_aead *aead = crypto_aead_reqtfm(req); in ccm_encrypt() local 216 struct sm4_ctx *ctx = crypto_aead_ctx(aead); in ccm_encrypt() 235 crypto_aead_authsize(aead), 1); in ccm_encrypt() 242 struct crypto_aead *aead = crypto_aead_reqtfm(req); in ccm_decrypt() local 243 unsigned int authsize = crypto_aead_authsize(aead); in ccm_decrypt() 244 struct sm4_ctx *ctx = crypto_aead_ctx(aead); in ccm_decrypt()
|
H A D | aes-ce-ccm-glue.c | 61 struct crypto_aead *aead = crypto_aead_reqtfm(req); in ccm_init_mac() local 89 maciv[0] |= (crypto_aead_authsize(aead) - 2) << 2; in ccm_init_mac() 99 struct crypto_aead *aead = crypto_aead_reqtfm(req); in ccm_calculate_auth_mac() local 100 struct crypto_aes_ctx *ctx = crypto_aead_ctx(aead); in ccm_calculate_auth_mac() 148 struct crypto_aead *aead = crypto_aead_reqtfm(req); in ccm_encrypt() local 149 struct crypto_aes_ctx *ctx = crypto_aead_ctx(aead); in ccm_encrypt() 194 crypto_aead_authsize(aead), 1); in ccm_encrypt() 201 struct crypto_aead *aead = crypto_aead_reqtfm(req); in ccm_decrypt() local 202 struct crypto_aes_ctx *ctx = crypto_aead_ctx(aead); in ccm_decrypt() 203 unsigned int authsize = crypto_aead_authsize(aead); in ccm_decrypt()
|
H A D | sm4-ce-gcm-glue.c | 75 struct crypto_aead *aead = crypto_aead_reqtfm(req); in gcm_calculate_auth_mac() local 76 struct sm4_gcm_ctx *ctx = crypto_aead_ctx(aead); in gcm_calculate_auth_mac() 144 struct crypto_aead *aead = crypto_aead_reqtfm(req); in gcm_crypt() local 145 struct sm4_gcm_ctx *ctx = crypto_aead_ctx(aead); in gcm_crypt() 200 struct crypto_aead *aead = crypto_aead_reqtfm(req); in gcm_encrypt() local 212 crypto_aead_authsize(aead), 1); in gcm_encrypt() 219 struct crypto_aead *aead = crypto_aead_reqtfm(req); in gcm_decrypt() local 220 unsigned int authsize = crypto_aead_authsize(aead); in gcm_decrypt()
|
H A D | ghash-ce-glue.c | 302 struct crypto_aead *aead = crypto_aead_reqtfm(req); in gcm_calculate_auth_mac() local 303 struct gcm_aes_ctx *ctx = crypto_aead_ctx(aead); in gcm_calculate_auth_mac() 337 struct crypto_aead *aead = crypto_aead_reqtfm(req); in gcm_encrypt() local 338 struct gcm_aes_ctx *ctx = crypto_aead_ctx(aead); in gcm_encrypt() 393 crypto_aead_authsize(aead), 1); in gcm_encrypt() 400 struct crypto_aead *aead = crypto_aead_reqtfm(req); in gcm_decrypt() local 401 struct gcm_aes_ctx *ctx = crypto_aead_ctx(aead); in gcm_decrypt() 402 unsigned int authsize = crypto_aead_authsize(aead); in gcm_decrypt() 502 struct crypto_aead *aead = crypto_aead_reqtfm(req); in rfc4106_encrypt() local 503 struct gcm_aes_ctx *ctx = crypto_aead_ctx(aead); in rfc4106_encrypt() [all …]
|
/openbmc/linux/net/xfrm/ |
H A D | xfrm_algo.c | 31 .aead = { 50 .aead = { 69 .aead = { 88 .aead = { 107 .aead = { 126 .aead = { 145 .aead = { 164 .aead = { 775 const struct xfrm_aead_name *aead = data; in xfrm_aead_name_match() local 776 const char *name = aead->name; in xfrm_aead_name_match() [all …]
|
/openbmc/linux/drivers/crypto/inside-secure/ |
H A D | safexcel_cipher.c | 51 u8 aead; /* !=0=AEAD, 2=IPSec ESP AEAD, 3=IPsec ESP GMAC */ member 138 ctx->aead & EIP197_AEAD_TYPE_IPSEC_ESP) { /* _ESP and _ESP_GMAC */ in safexcel_aead_iv() 182 if (ctx->aead == EIP197_AEAD_TYPE_IPSEC_ESP) { in safexcel_aead_token() 264 if (ctx->aead == EIP197_AEAD_TYPE_IPSEC_ESP) { in safexcel_aead_token() 308 if (unlikely(ctx->aead == EIP197_AEAD_TYPE_IPSEC_ESP_GMAC)) { in safexcel_aead_token() 515 if (ctx->aead) { in safexcel_context_control() 546 ctx->aead == EIP197_AEAD_TYPE_IPSEC_ESP_GMAC)) in safexcel_context_control() 659 if ((!ctx->aead) && (ctx->mode == CONTEXT_CONTROL_CRYPTO_MODE_CBC) && in safexcel_handle_req_result() 698 if (ctx->aead) { in safexcel_send_req() 823 if (ctx->aead) in safexcel_send_req() [all …]
|