Home
last modified time | relevance | path

Searched refs:cryptlen (Results 1 – 25 of 109) sorted by relevance

12345

/openbmc/linux/crypto/
H A Dauthencesn.c97 unsigned int cryptlen = req->cryptlen; in crypto_authenc_esn_genicv_tail() local
103 scatterwalk_map_and_copy(tmp + 1, dst, assoclen + cryptlen, 4, 0); in crypto_authenc_esn_genicv_tail()
106 scatterwalk_map_and_copy(hash, dst, assoclen + cryptlen, authsize, 1); in crypto_authenc_esn_genicv_tail()
130 unsigned int cryptlen = req->cryptlen; in crypto_authenc_esn_genicv() local
140 scatterwalk_map_and_copy(tmp + 1, dst, assoclen + cryptlen, 4, 1); in crypto_authenc_esn_genicv()
146 ahash_request_set_crypt(ahreq, dst, hash, assoclen + cryptlen); in crypto_authenc_esn_genicv()
188 unsigned int cryptlen = req->cryptlen; in crypto_authenc_esn_encrypt() local
208 skcipher_request_set_crypt(skreq, src, dst, cryptlen, req->iv); in crypto_authenc_esn_encrypt()
229 unsigned int cryptlen = req->cryptlen - authsize; in crypto_authenc_esn_decrypt_tail() local
240 scatterwalk_map_and_copy(tmp + 1, dst, assoclen + cryptlen, 4, 0); in crypto_authenc_esn_decrypt_tail()
[all …]
H A Daegis128-core.c346 u64 assoclen, u64 cryptlen) in crypto_aegis128_final() argument
349 u64 cryptbits = cryptlen * 8; in crypto_aegis128_final()
394 unsigned int cryptlen = req->cryptlen; in crypto_aegis128_encrypt_generic() local
403 crypto_aegis128_final(&state, &tag, req->assoclen, cryptlen); in crypto_aegis128_encrypt_generic()
405 scatterwalk_map_and_copy(tag.bytes, req->dst, req->assoclen + cryptlen, in crypto_aegis128_encrypt_generic()
416 unsigned int cryptlen = req->cryptlen - authsize; in crypto_aegis128_decrypt_generic() local
421 scatterwalk_map_and_copy(tag.bytes, req->src, req->assoclen + cryptlen, in crypto_aegis128_decrypt_generic()
429 crypto_aegis128_final(&state, &tag, req->assoclen, cryptlen); in crypto_aegis128_decrypt_generic()
455 unsigned int cryptlen = req->cryptlen; in crypto_aegis128_encrypt_simd() local
467 crypto_aegis128_final_simd(&state, &tag, req->assoclen, cryptlen, 0); in crypto_aegis128_encrypt_simd()
[all …]
H A Dkeywrap.c130 u64 t = 6 * ((req->cryptlen) >> 3); in crypto_kw_decrypt()
138 if (req->cryptlen < (2 * SEMIBSIZE) || req->cryptlen % SEMIBSIZE) in crypto_kw_decrypt()
154 unsigned int nbytes = req->cryptlen; in crypto_kw_decrypt()
208 if (req->cryptlen < (2 * SEMIBSIZE) || req->cryptlen % SEMIBSIZE) in crypto_kw_encrypt()
227 unsigned int nbytes = req->cryptlen; in crypto_kw_encrypt()
H A Dchacha20poly1305.c39 __le64 cryptlen; member
59 unsigned int cryptlen; member
101 req->assoclen + rctx->cryptlen, in poly_verify_tag()
113 req->assoclen + rctx->cryptlen, in poly_copy_tag()
131 if (rctx->cryptlen == 0) in chacha_decrypt()
145 rctx->cryptlen, creq->iv); in chacha_decrypt()
158 if (rctx->cryptlen == req->cryptlen) /* encrypting */ in poly_tail_continue()
178 preq->tail.cryptlen = cpu_to_le64(rctx->cryptlen); in poly_tail()
207 padlen = -rctx->cryptlen % POLY1305_BLOCK_SIZE; in poly_cipherpad()
236 if (rctx->cryptlen == req->cryptlen) /* encrypting */ in poly_cipher()
[all …]
H A Dccm.c128 unsigned int cryptlen) in format_input() argument
146 return set_msg_len(info + 16 - l, cryptlen, l); in format_input()
169 unsigned int cryptlen) in crypto_ccm_auth() argument
182 err = format_input(odata, req, cryptlen); in crypto_ccm_auth()
218 cryptlen += ilen; in crypto_ccm_auth()
221 ahash_request_set_crypt(ahreq, plain, odata, cryptlen); in crypto_ccm_auth()
236 req->assoclen + req->cryptlen, in crypto_ccm_encrypt_done()
292 unsigned int cryptlen = req->cryptlen; in crypto_ccm_encrypt() local
301 err = crypto_ccm_auth(req, sg_next(pctx->src), cryptlen); in crypto_ccm_encrypt()
312 skcipher_request_set_crypt(skreq, pctx->src, dst, cryptlen + 16, iv); in crypto_ccm_encrypt()
[all …]
H A Dgcm.c58 unsigned int cryptlen; member
178 unsigned int cryptlen) in crypto_gcm_init_crypt() argument
190 cryptlen + sizeof(pctx->auth_tag), in crypto_gcm_init_crypt()
231 lengths.b = cpu_to_be64(gctx->cryptlen * 8); in gcm_hash_len()
291 remain = gcm_remain(gctx->cryptlen); in gcm_hash_crypt_continue()
320 if (gctx->cryptlen) in gcm_hash_assoc_remain_continue()
322 gctx->src, gctx->cryptlen, flags) ?: in gcm_hash_assoc_remain_continue()
417 req->assoclen + req->cryptlen, in gcm_enc_copy_hash()
428 gctx->cryptlen = req->cryptlen; in gcm_encrypt_continue()
456 crypto_gcm_init_crypt(req, req->cryptlen); in crypto_gcm_encrypt()
[all …]
H A Dechainiv.c37 if (req->cryptlen < ivsize) in echainiv_encrypt()
51 req->assoclen + req->cryptlen, in echainiv_encrypt()
62 req->cryptlen, info); in echainiv_encrypt()
94 if (req->cryptlen < ivsize) in echainiv_decrypt()
104 req->cryptlen - ivsize, req->iv); in echainiv_decrypt()
H A Dseqiv.c58 if (req->cryptlen < ivsize) in seqiv_aead_encrypt()
74 req->assoclen + req->cryptlen, in seqiv_aead_encrypt()
96 req->cryptlen - ivsize, info); in seqiv_aead_encrypt()
117 if (req->cryptlen < ivsize + crypto_aead_authsize(geniv)) in seqiv_aead_decrypt()
127 req->cryptlen - ivsize, req->iv); in seqiv_aead_decrypt()
H A Dxts.c87 const bool cts = (req->cryptlen % XTS_BLOCK_SIZE); in xts_xor_tweak()
164 int offset = req->cryptlen & ~(XTS_BLOCK_SIZE - 1); in xts_cts_final()
167 int tail = req->cryptlen % XTS_BLOCK_SIZE; in xts_cts_final()
209 if (!err && unlikely(req->cryptlen % XTS_BLOCK_SIZE)) { in xts_encrypt_done()
229 if (!err && unlikely(req->cryptlen % XTS_BLOCK_SIZE)) { in xts_decrypt_done()
247 if (req->cryptlen < XTS_BLOCK_SIZE) in xts_init_crypt()
253 req->cryptlen & ~(XTS_BLOCK_SIZE - 1), NULL); in xts_init_crypt()
272 if (err || likely((req->cryptlen % XTS_BLOCK_SIZE) == 0)) in xts_encrypt()
289 if (err || likely((req->cryptlen % XTS_BLOCK_SIZE) == 0)) in xts_decrypt()
/openbmc/linux/drivers/crypto/allwinner/sun8i-ce/
H A Dsun8i-ce-cipher.c34 if (sg_nents_for_len(areq->src, areq->cryptlen) > MAX_SG || in sun8i_ce_cipher_need_fallback()
35 sg_nents_for_len(areq->dst, areq->cryptlen) > MAX_SG) { in sun8i_ce_cipher_need_fallback()
40 if (areq->cryptlen < crypto_skcipher_ivsize(tfm)) { in sun8i_ce_cipher_need_fallback()
45 if (areq->cryptlen == 0) { in sun8i_ce_cipher_need_fallback()
50 if (areq->cryptlen % 16) { in sun8i_ce_cipher_need_fallback()
55 len = areq->cryptlen; in sun8i_ce_cipher_need_fallback()
71 len = areq->cryptlen; in sun8i_ce_cipher_need_fallback()
112 areq->cryptlen, areq->iv); in sun8i_ce_cipher_fallback()
138 int ns = sg_nents_for_len(areq->src, areq->cryptlen); in sun8i_ce_cipher_prepare()
139 int nd = sg_nents_for_len(areq->dst, areq->cryptlen); in sun8i_ce_cipher_prepare()
[all …]
/openbmc/linux/arch/x86/crypto/
H A Daegis128-aesni-glue.c44 void *state, void *tag_xor, unsigned int cryptlen,
167 unsigned int cryptlen, in crypto_aegis128_aesni_crypt() argument
182 crypto_aegis128_aesni_final(&state, tag_xor, req->assoclen, cryptlen); in crypto_aegis128_aesni_crypt()
198 unsigned int cryptlen = req->cryptlen; in crypto_aegis128_aesni_encrypt() local
200 crypto_aegis128_aesni_crypt(req, &tag, cryptlen, &OPS); in crypto_aegis128_aesni_encrypt()
203 req->assoclen + cryptlen, authsize, 1); in crypto_aegis128_aesni_encrypt()
220 unsigned int cryptlen = req->cryptlen - authsize; in crypto_aegis128_aesni_decrypt() local
223 req->assoclen + cryptlen, authsize, 0); in crypto_aegis128_aesni_decrypt()
225 crypto_aegis128_aesni_crypt(req, &tag, cryptlen, &OPS); in crypto_aegis128_aesni_decrypt()
H A Daesni-intel_glue.c383 int cbc_blocks = DIV_ROUND_UP(req->cryptlen, AES_BLOCK_SIZE) - 2; in cts_cbc_encrypt()
394 if (req->cryptlen <= AES_BLOCK_SIZE) { in cts_cbc_encrypt()
395 if (req->cryptlen < AES_BLOCK_SIZE) in cts_cbc_encrypt()
409 if (req->cryptlen == AES_BLOCK_SIZE) in cts_cbc_encrypt()
412 dst = src = scatterwalk_ffwd(sg_src, req->src, subreq.cryptlen); in cts_cbc_encrypt()
415 subreq.cryptlen); in cts_cbc_encrypt()
420 req->cryptlen - cbc_blocks * AES_BLOCK_SIZE, in cts_cbc_encrypt()
439 int cbc_blocks = DIV_ROUND_UP(req->cryptlen, AES_BLOCK_SIZE) - 2; in cts_cbc_decrypt()
450 if (req->cryptlen <= AES_BLOCK_SIZE) { in cts_cbc_decrypt()
451 if (req->cryptlen < AES_BLOCK_SIZE) in cts_cbc_decrypt()
[all …]
/openbmc/linux/arch/arm/crypto/
H A Daes-ce-glue.c271 int cbc_blocks = DIV_ROUND_UP(req->cryptlen, AES_BLOCK_SIZE) - 2; in cts_cbc_encrypt()
282 if (req->cryptlen <= AES_BLOCK_SIZE) { in cts_cbc_encrypt()
283 if (req->cryptlen < AES_BLOCK_SIZE) in cts_cbc_encrypt()
298 if (req->cryptlen == AES_BLOCK_SIZE) in cts_cbc_encrypt()
301 dst = src = scatterwalk_ffwd(sg_src, req->src, subreq.cryptlen); in cts_cbc_encrypt()
304 subreq.cryptlen); in cts_cbc_encrypt()
309 req->cryptlen - cbc_blocks * AES_BLOCK_SIZE, in cts_cbc_encrypt()
329 int cbc_blocks = DIV_ROUND_UP(req->cryptlen, AES_BLOCK_SIZE) - 2; in cts_cbc_decrypt()
340 if (req->cryptlen <= AES_BLOCK_SIZE) { in cts_cbc_decrypt()
341 if (req->cryptlen < AES_BLOCK_SIZE) in cts_cbc_decrypt()
[all …]
/openbmc/linux/drivers/crypto/qce/
H A Daead.c71 totallen = req->cryptlen + req->assoclen; in qce_aead_done()
80 totallen = req->cryptlen + req->assoclen - ctx->authsize; in qce_aead_done()
124 totallen = rctx->cryptlen + assoclen; in qce_aead_prepare_dst_buf()
152 sg = qce_sgtable_add(&rctx->dst_tbl, msg_sg, rctx->cryptlen); in qce_aead_prepare_dst_buf()
157 totallen = rctx->cryptlen + rctx->assoclen; in qce_aead_prepare_dst_buf()
192 unsigned int adata_header_len, cryptlen, totallen; in qce_aead_ccm_prepare_buf_assoclen() local
198 cryptlen = rctx->cryptlen + ctx->authsize; in qce_aead_ccm_prepare_buf_assoclen()
200 cryptlen = rctx->cryptlen; in qce_aead_ccm_prepare_buf_assoclen()
201 totallen = cryptlen + req->assoclen; in qce_aead_ccm_prepare_buf_assoclen()
257 sg = qce_sgtable_add(&rctx->src_tbl, msg_sg, cryptlen); in qce_aead_ccm_prepare_buf_assoclen()
[all …]
H A Dskcipher.c79 rctx->cryptlen = req->cryptlen; in qce_skcipher_async_req_handle()
85 rctx->src_nents = sg_nents_for_len(req->src, req->cryptlen); in qce_skcipher_async_req_handle()
87 rctx->dst_nents = sg_nents_for_len(req->dst, req->cryptlen); in qce_skcipher_async_req_handle()
110 sg = qce_sgtable_add(&rctx->dst_tbl, req->dst, req->cryptlen); in qce_skcipher_async_req_handle()
271 if (!req->cryptlen) in qce_skcipher_crypt()
279 if (!IS_ALIGNED(req->cryptlen, blocksize)) in qce_skcipher_crypt()
292 (IS_XTS(rctx->flags) && ((req->cryptlen <= aes_sw_max_len) || in qce_skcipher_crypt()
293 (req->cryptlen > QCE_SECTOR_SIZE && in qce_skcipher_crypt()
294 req->cryptlen % QCE_SECTOR_SIZE))))) { in qce_skcipher_crypt()
301 req->dst, req->cryptlen, req->iv); in qce_skcipher_crypt()
/openbmc/linux/drivers/crypto/allwinner/sun8i-ss/
H A Dsun8i-ss-cipher.c33 if (areq->cryptlen == 0 || areq->cryptlen % 16) { in sun8i_ss_need_fallback()
38 if (sg_nents_for_len(areq->src, areq->cryptlen) > 8 || in sun8i_ss_need_fallback()
39 sg_nents_for_len(areq->dst, areq->cryptlen) > 8) { in sun8i_ss_need_fallback()
44 len = areq->cryptlen; in sun8i_ss_need_fallback()
59 len = areq->cryptlen; in sun8i_ss_need_fallback()
112 areq->cryptlen, areq->iv); in sun8i_ss_cipher_fallback()
128 unsigned int len = areq->cryptlen; in sun8i_ss_setup_ivs()
137 offset = areq->cryptlen - ivsize; in sun8i_ss_setup_ivs()
197 int nsgs = sg_nents_for_len(areq->src, areq->cryptlen); in sun8i_ss_cipher()
198 int nsgd = sg_nents_for_len(areq->dst, areq->cryptlen); in sun8i_ss_cipher()
[all …]
/openbmc/linux/drivers/crypto/
H A Domap-aes-gcm.c94 int alen, clen, cryptlen, assoclen, ret; in omap_aes_gcm_copy_buffers() local
102 cryptlen = req->cryptlen; in omap_aes_gcm_copy_buffers()
108 cryptlen -= authlen; in omap_aes_gcm_copy_buffers()
111 clen = ALIGN(cryptlen, AES_BLOCK_SIZE); in omap_aes_gcm_copy_buffers()
113 nsg = !!(assoclen && cryptlen); in omap_aes_gcm_copy_buffers()
131 if (cryptlen) { in omap_aes_gcm_copy_buffers()
137 ret = omap_crypto_align_sg(&tmp, cryptlen, in omap_aes_gcm_copy_buffers()
149 dd->total = cryptlen; in omap_aes_gcm_copy_buffers()
162 if (cryptlen) { in omap_aes_gcm_copy_buffers()
163 ret = omap_crypto_align_sg(&dd->out_sg, cryptlen, in omap_aes_gcm_copy_buffers()
[all …]
/openbmc/linux/drivers/crypto/allwinner/sun4i-ss/
H A Dsun4i-ss-cipher.c30 unsigned int ileft = areq->cryptlen; in sun4i_ss_opti_poll()
31 unsigned int oleft = areq->cryptlen; in sun4i_ss_opti_poll()
41 if (!areq->cryptlen) in sun4i_ss_opti_poll()
51 areq->cryptlen - ivsize, ivsize, 0); in sun4i_ss_opti_poll()
57 algt->stat_bytes += areq->cryptlen; in sun4i_ss_opti_poll()
74 ileft = areq->cryptlen / 4; in sun4i_ss_opti_poll()
75 oleft = areq->cryptlen / 4; in sun4i_ss_opti_poll()
137 scatterwalk_map_and_copy(areq->iv, areq->dst, areq->cryptlen - ivsize, in sun4i_ss_opti_poll()
166 areq->cryptlen, areq->iv); in sun4i_ss_cipher_poll_fallback()
196 unsigned int ileft = areq->cryptlen; in sun4i_ss_cipher_poll()
[all …]
/openbmc/linux/drivers/crypto/cavium/nitrox/
H A Dnitrox_aead.c165 creq->gph.param0 = cpu_to_be16(rctx->cryptlen); in nitrox_set_creq()
166 creq->gph.param1 = cpu_to_be16(rctx->cryptlen + rctx->assoclen); in nitrox_set_creq()
227 rctx->cryptlen = areq->cryptlen; in nitrox_aes_gcm_enc()
229 rctx->srclen = areq->assoclen + areq->cryptlen; in nitrox_aes_gcm_enc()
261 rctx->cryptlen = areq->cryptlen - aead->authsize; in nitrox_aes_gcm_dec()
263 rctx->srclen = areq->cryptlen + areq->assoclen; in nitrox_aes_gcm_dec()
449 aead_rctx->cryptlen = areq->cryptlen; in nitrox_rfc4106_enc()
451 aead_rctx->srclen = aead_rctx->assoclen + aead_rctx->cryptlen; in nitrox_rfc4106_enc()
481 aead_rctx->cryptlen = areq->cryptlen - aead->authsize; in nitrox_rfc4106_dec()
484 areq->cryptlen - GCM_RFC4106_IV_SIZE + areq->assoclen; in nitrox_rfc4106_dec()
/openbmc/linux/arch/arm64/crypto/
H A Daes-glue.c282 int cbc_blocks = DIV_ROUND_UP(req->cryptlen, AES_BLOCK_SIZE) - 2; in cts_cbc_encrypt()
292 if (req->cryptlen <= AES_BLOCK_SIZE) { in cts_cbc_encrypt()
293 if (req->cryptlen < AES_BLOCK_SIZE) in cts_cbc_encrypt()
308 if (req->cryptlen == AES_BLOCK_SIZE) in cts_cbc_encrypt()
311 dst = src = scatterwalk_ffwd(sg_src, req->src, subreq.cryptlen); in cts_cbc_encrypt()
314 subreq.cryptlen); in cts_cbc_encrypt()
319 req->cryptlen - cbc_blocks * AES_BLOCK_SIZE, in cts_cbc_encrypt()
339 int cbc_blocks = DIV_ROUND_UP(req->cryptlen, AES_BLOCK_SIZE) - 2; in cts_cbc_decrypt()
349 if (req->cryptlen <= AES_BLOCK_SIZE) { in cts_cbc_decrypt()
350 if (req->cryptlen < AES_BLOCK_SIZE) in cts_cbc_decrypt()
[all …]
/openbmc/linux/drivers/crypto/gemini/
H A Dsl3516-ce-cipher.c34 if (areq->cryptlen == 0 || areq->cryptlen % 16) { in sl3516_ce_need_fallback()
119 areq->cryptlen, areq->iv); in sl3516_ce_cipher_fallback()
147 areq->cryptlen, in sl3516_ce_cipher()
179 len = areq->cryptlen; in sl3516_ce_cipher()
189 areq->cryptlen, i, rctx->t_src[i].len, sg->offset, todo); in sl3516_ce_cipher()
196 dev_err(ce->dev, "remaining len %d/%u nr_sgs=%d\n", len, areq->cryptlen, nr_sgs); in sl3516_ce_cipher()
201 len = areq->cryptlen; in sl3516_ce_cipher()
211 areq->cryptlen, i, rctx->t_dst[i].len, sg->offset, todo); in sl3516_ce_cipher()
234 ecb->cipher.algorithm_len = areq->cryptlen; in sl3516_ce_cipher()
/openbmc/linux/drivers/crypto/intel/keembay/
H A Dkeembay-ocs-aes-core.c261 if (req->cryptlen % AES_BLOCK_SIZE != 0) in kmb_ocs_sk_validate_input()
268 if (req->cryptlen % AES_BLOCK_SIZE != 0) in kmb_ocs_sk_validate_input()
289 if (req->cryptlen < AES_BLOCK_SIZE) in kmb_ocs_sk_validate_input()
326 req->cryptlen, req->iv); in kmb_ocs_sk_common()
343 if (!req->cryptlen && mode != OCS_MODE_CTS) in kmb_ocs_sk_common()
415 req->cryptlen - iv_size, iv_size, 0); in kmb_ocs_sk_prepare_inplace()
420 req->cryptlen - AES_BLOCK_SIZE, in kmb_ocs_sk_prepare_inplace()
421 req->cryptlen - (2 * AES_BLOCK_SIZE)); in kmb_ocs_sk_prepare_inplace()
434 req->cryptlen, 0); in kmb_ocs_sk_prepare_inplace()
454 rctx->src_nents = sg_nents_for_len(req->src, req->cryptlen); in kmb_ocs_sk_prepare_notinplace()
[all …]
/openbmc/linux/drivers/crypto/stm32/
H A Dstm32-cryp.c529 return is_encrypt(cryp) ? cryp->areq->cryptlen : in stm32_cryp_get_input_text_len()
530 cryp->areq->cryptlen - cryp->authsize; in stm32_cryp_get_input_text_len()
966 if (req->cryptlen % AES_BLOCK_SIZE) in stm32_cryp_aes_ecb_encrypt()
969 if (req->cryptlen == 0) in stm32_cryp_aes_ecb_encrypt()
977 if (req->cryptlen % AES_BLOCK_SIZE) in stm32_cryp_aes_ecb_decrypt()
980 if (req->cryptlen == 0) in stm32_cryp_aes_ecb_decrypt()
988 if (req->cryptlen % AES_BLOCK_SIZE) in stm32_cryp_aes_cbc_encrypt()
991 if (req->cryptlen == 0) in stm32_cryp_aes_cbc_encrypt()
999 if (req->cryptlen % AES_BLOCK_SIZE) in stm32_cryp_aes_cbc_decrypt()
1002 if (req->cryptlen == 0) in stm32_cryp_aes_cbc_decrypt()
[all …]
/openbmc/linux/drivers/crypto/xilinx/
H A Dzynqmp-aes-gcm.c93 dma_size = req->cryptlen + ZYNQMP_AES_KEY_SIZE in zynqmp_aes_aead_cipher()
96 dma_size = req->cryptlen + GCM_AES_IV_SIZE; in zynqmp_aes_aead_cipher()
109 data_size = req->cryptlen; in zynqmp_aes_aead_cipher()
110 scatterwalk_map_and_copy(kbuf, req->src, 0, req->cryptlen, 0); in zynqmp_aes_aead_cipher()
191 req->cryptlen < ZYNQMP_AES_MIN_INPUT_BLK_SIZE) { in zynqmp_fallback_check()
194 if ((req->cryptlen % ZYNQMP_AES_WORD_LEN) != 0) in zynqmp_fallback_check()
198 req->cryptlen <= ZYNQMP_AES_AUTH_SIZE) { in zynqmp_fallback_check()
224 areq->cryptlen, areq->iv); in zynqmp_handle_aes_req()
/openbmc/linux/drivers/crypto/virtio/
H A Dvirtio_crypto_skcipher_algs.c343 src_nents = sg_nents_for_len(req->src, req->cryptlen); in __virtio_crypto_skcipher_do_req()
385 cpu_to_le32(req->cryptlen); in __virtio_crypto_skcipher_do_req()
394 dst_len = min_t(unsigned int, req->cryptlen, dst_len); in __virtio_crypto_skcipher_do_req()
396 req->cryptlen, dst_len); in __virtio_crypto_skcipher_do_req()
398 if (unlikely(req->cryptlen + dst_len + ivsize + in __virtio_crypto_skcipher_do_req()
427 req->cryptlen - AES_BLOCK_SIZE, in __virtio_crypto_skcipher_do_req()
477 if (!req->cryptlen) in virtio_crypto_skcipher_encrypt()
479 if (req->cryptlen % AES_BLOCK_SIZE) in virtio_crypto_skcipher_encrypt()
502 if (!req->cryptlen) in virtio_crypto_skcipher_decrypt()
504 if (req->cryptlen % AES_BLOCK_SIZE) in virtio_crypto_skcipher_decrypt()
[all …]

12345