/linux/drivers/s390/cio/ |
A D | airq.c | 133 iv = kzalloc(sizeof(*iv), GFP_KERNEL); in airq_iv_create() 134 if (!iv) in airq_iv_create() 159 iv->end = 0; in airq_iv_create() 180 return iv; in airq_iv_create() 186 if (iv->flags & AIRQ_IV_CACHELINE && iv->vector) in airq_iv_create() 190 kfree(iv); in airq_iv_create() 208 cio_dma_free(iv->vector, iv_size(iv->bits)); in airq_iv_release() 210 kfree(iv); in airq_iv_release() 230 bit = find_first_bit_inv(iv->avail, iv->bits); in airq_iv_alloc() 273 while (iv->end > 0 && !test_bit_inv(iv->end - 1, iv->avail)) in airq_iv_free() [all …]
|
/linux/arch/s390/include/asm/ |
A D | airq.h | 51 void airq_iv_release(struct airq_iv *iv); 59 return airq_iv_alloc(iv, 1); in airq_iv_alloc_bit() 64 airq_iv_free(iv, bit, 1); in airq_iv_free_bit() 67 static inline unsigned long airq_iv_end(struct airq_iv *iv) in airq_iv_end() argument 69 return iv->end; in airq_iv_end() 75 bit_spin_lock(bit ^ be_to_le, iv->bitlock); in airq_iv_lock() 81 bit_spin_unlock(bit ^ be_to_le, iv->bitlock); in airq_iv_unlock() 87 iv->data[bit] = data; in airq_iv_set_data() 93 return iv->data[bit]; in airq_iv_get_data() 99 iv->ptr[bit] = ptr; in airq_iv_set_ptr() [all …]
|
/linux/crypto/ |
A D | testmgr.h | 66 const char *iv; member 107 const char *iv; member 10558 .iv = zeroed_string, 10590 .iv = zeroed_string, 14727 .iv = "", 14746 .iv = "", 15039 .iv = "", 15060 .iv = "", 18875 .iv = zeroed_string, 19490 .iv = zeroed_string, [all …]
|
A D | cfb.c | 51 u8 *iv = walk->iv; in crypto_cfb_final() local 65 u8 *iv = walk->iv; in crypto_cfb_encrypt_segment() local 70 iv = dst; in crypto_cfb_encrypt_segment() 76 memcpy(walk->iv, iv, bsize); in crypto_cfb_encrypt_segment() 87 u8 *iv = walk->iv; in crypto_cfb_encrypt_inplace() local 93 iv = src; in crypto_cfb_encrypt_inplace() 98 memcpy(walk->iv, iv, bsize); in crypto_cfb_encrypt_inplace() 135 u8 *iv = walk->iv; in crypto_cfb_decrypt_segment() local 140 iv = src; in crypto_cfb_decrypt_segment() 146 memcpy(walk->iv, iv, bsize); in crypto_cfb_decrypt_segment() [all …]
|
A D | cbc.c | 27 u8 *iv = walk->iv; in crypto_cbc_encrypt_segment() local 34 crypto_xor(iv, src, bsize); in crypto_cbc_encrypt_segment() 35 fn(tfm, dst, iv); in crypto_cbc_encrypt_segment() 36 memcpy(iv, dst, bsize); in crypto_cbc_encrypt_segment() 54 u8 *iv = walk->iv; in crypto_cbc_encrypt_inplace() local 61 crypto_xor(src, iv, bsize); in crypto_cbc_encrypt_inplace() 63 iv = src; in crypto_cbc_encrypt_inplace() 68 memcpy(walk->iv, iv, bsize); in crypto_cbc_encrypt_inplace() 102 u8 *iv = walk->iv; in crypto_cbc_decrypt_segment() local 111 iv = src; in crypto_cbc_decrypt_segment() [all …]
|
A D | pcbc.c | 28 u8 * const iv = walk->iv; in crypto_pcbc_encrypt_segment() local 31 crypto_xor(iv, src, bsize); in crypto_pcbc_encrypt_segment() 32 crypto_cipher_encrypt_one(tfm, dst, iv); in crypto_pcbc_encrypt_segment() 33 crypto_xor_cpy(iv, dst, src, bsize); in crypto_pcbc_encrypt_segment() 49 u8 * const iv = walk->iv; in crypto_pcbc_encrypt_inplace() local 54 crypto_xor(iv, src, bsize); in crypto_pcbc_encrypt_inplace() 95 u8 * const iv = walk->iv; in crypto_pcbc_decrypt_segment() local 99 crypto_xor(dst, iv, bsize); in crypto_pcbc_decrypt_segment() 100 crypto_xor_cpy(iv, dst, src, bsize); in crypto_pcbc_decrypt_segment() 116 u8 * const iv = walk->iv; in crypto_pcbc_decrypt_inplace() local [all …]
|
A D | ofb.c | 31 u8 * const iv = walk.iv; in crypto_ofb_crypt() local 35 crypto_cipher_encrypt_one(cipher, iv, iv); in crypto_ofb_crypt() 36 crypto_xor_cpy(dst, src, iv, bsize); in crypto_ofb_crypt() 45 crypto_cipher_encrypt_one(cipher, walk.iv, walk.iv); in crypto_ofb_crypt() 46 crypto_xor_cpy(walk.dst.virt.addr, walk.src.virt.addr, walk.iv, in crypto_ofb_crypt()
|
/linux/arch/x86/crypto/ |
A D | sm4_aesni_avx_glue.c | 27 const u8 *src, u8 *iv); 29 const u8 *src, u8 *iv); 104 const u8 *iv = walk.iv; in sm4_cbc_encrypt() local 111 iv = dst; in sm4_cbc_encrypt() 116 if (iv != walk.iv) in sm4_cbc_encrypt() 117 memcpy(walk.iv, iv, SM4_BLOCK_SIZE); in sm4_cbc_encrypt() 171 memcpy(walk.iv, iv, SM4_BLOCK_SIZE); in sm4_avx_cbc_decrypt() 203 const u8 *iv = walk.iv; in sm4_cfb_encrypt() local 210 iv = dst; in sm4_cfb_encrypt() 215 if (iv != walk.iv) in sm4_cfb_encrypt() [all …]
|
A D | aesni-intel_glue.c | 118 u8 *iv, 145 u8 *iv, 168 u8 *iv, 390 req->iv); in cts_cbc_encrypt() 408 req->iv); in cts_cbc_encrypt() 464 req->iv); in cts_cbc_decrypt() 780 *(iv+4+i) = req->iv[i]; in helper_rfc4106_encrypt() 808 *(iv+4+i) = req->iv[i]; in helper_rfc4106_decrypt() 878 aesni_enc(aes_ctx(ctx->raw_tweak_ctx), walk.iv, walk.iv); in xts_crypt() 1073 memcpy(iv, req->iv, 12); in generic_gcmaes_encrypt() [all …]
|
/linux/drivers/crypto/nx/ |
A D | nx-aes-ccm.c | 126 if (1 > iv[0] || iv[0] > 7) in crypto_ccm_check_iv() 139 memcpy(b0, iv, 16); in generate_b0() 172 memset(iv + 15 - iv[0], 0, iv[0] + 1); in generate_pat() 330 u8 *iv, in ccm_nx_decrypt() argument 408 u8 *iv, in ccm_nx_encrypt() argument 484 u8 *iv = rctx->iv; in ccm4309_aes_nx_encrypt() local 486 iv[0] = 3; in ccm4309_aes_nx_encrypt() 488 memcpy(iv + 4, req->iv, 8); in ccm4309_aes_nx_encrypt() 508 u8 *iv = rctx->iv; in ccm4309_aes_nx_decrypt() local 510 iv[0] = 3; in ccm4309_aes_nx_decrypt() [all …]
|
A D | nx-aes-ctr.c | 72 static int ctr_aes_nx_crypt(struct skcipher_request *req, u8 *iv) in ctr_aes_nx_crypt() argument 86 rc = nx_build_sg_lists(nx_ctx, iv, req->dst, req->src, in ctr_aes_nx_crypt() 88 csbcpb->cpb.aes_ctr.iv); in ctr_aes_nx_crypt() 102 memcpy(iv, csbcpb->cpb.aes_cbc.cv, AES_BLOCK_SIZE); in ctr_aes_nx_crypt() 119 u8 iv[16]; in ctr3686_aes_nx_crypt() local 121 memcpy(iv, nx_ctx->priv.ctr.nonce, CTR_RFC3686_NONCE_SIZE); in ctr3686_aes_nx_crypt() 122 memcpy(iv + CTR_RFC3686_NONCE_SIZE, req->iv, CTR_RFC3686_IV_SIZE); in ctr3686_aes_nx_crypt() 123 iv[12] = iv[13] = iv[14] = 0; in ctr3686_aes_nx_crypt() 124 iv[15] = 1; in ctr3686_aes_nx_crypt() 126 return ctr_aes_nx_crypt(req, iv); in ctr3686_aes_nx_crypt()
|
A D | nx-aes-gcm.c | 326 rc = gcm_empty(req, rctx->iv, enc); in gcm_aes_nx_crypt() 328 rc = gmac(req, rctx->iv, assoclen); in gcm_aes_nx_crypt() 419 char *iv = rctx->iv; in gcm_aes_nx_encrypt() local 421 memcpy(iv, req->iv, GCM_AES_IV_SIZE); in gcm_aes_nx_encrypt() 429 char *iv = rctx->iv; in gcm_aes_nx_decrypt() local 431 memcpy(iv, req->iv, GCM_AES_IV_SIZE); in gcm_aes_nx_decrypt() 441 char *iv = rctx->iv; in gcm4106_aes_nx_encrypt() local 444 memcpy(iv, nonce, NX_GCM4106_NONCE_LEN); in gcm4106_aes_nx_encrypt() 445 memcpy(iv + NX_GCM4106_NONCE_LEN, req->iv, 8); in gcm4106_aes_nx_encrypt() 458 char *iv = rctx->iv; in gcm4106_aes_nx_decrypt() local [all …]
|
/linux/drivers/staging/wlan-ng/ |
A D | p80211wep.c | 91 u8 *iv, u8 *icv) in wep_decrypt() argument 102 key[0] = iv[0]; in wep_decrypt() 103 key[1] = iv[1]; in wep_decrypt() 104 key[2] = iv[2]; in wep_decrypt() 105 keyidx = WEP_KEY(iv[3]); in wep_decrypt() 179 get_random_bytes(iv, 3); in wep_encrypt() 180 while ((iv[1] == 0xff) && (iv[0] >= 3) && (iv[0] < keylen)) in wep_encrypt() 181 get_random_bytes(iv, 3); in wep_encrypt() 185 key[0] = iv[0]; in wep_encrypt() 186 key[1] = iv[1]; in wep_encrypt() [all …]
|
/linux/lib/crypto/ |
A D | chacha20poly1305.c | 39 u8 iv[CHACHA_IV_SIZE]; in xchacha_init() local 41 memset(iv, 0, 8); in xchacha_init() 53 memzero_explicit(iv, sizeof(iv)); in xchacha_init() 97 __le64 iv[2]; in chacha20poly1305_encrypt() local 101 iv[0] = 0; in chacha20poly1305_encrypt() 107 memzero_explicit(iv, sizeof(iv)); in chacha20poly1305_encrypt() 175 __le64 iv[2]; in chacha20poly1305_decrypt() local 180 iv[0] = 0; in chacha20poly1305_decrypt() 188 memzero_explicit(iv, sizeof(iv)); in chacha20poly1305_decrypt() 226 __le64 iv[2]; in chacha20poly1305_crypt_sg_inplace() member [all …]
|
/linux/drivers/crypto/ccp/ |
A D | ccp-crypto-aes.c | 32 memcpy(req->iv, rctx->iv, AES_BLOCK_SIZE); in ccp_aes_complete() 83 if (!req->iv) in ccp_aes_crypt() 86 memcpy(rctx->iv, req->iv, AES_BLOCK_SIZE); in ccp_aes_crypt() 101 rctx->cmd.u.aes.iv = iv_sg; in ccp_aes_crypt() 141 req->iv = rctx->rfc3686_info; in ccp_aes_rfc3686_complete() 165 u8 *iv; in ccp_aes_rfc3686_crypt() local 168 iv = rctx->rfc3686_iv; in ccp_aes_rfc3686_crypt() 171 iv += CTR_RFC3686_NONCE_SIZE; in ccp_aes_rfc3686_crypt() 172 memcpy(iv, req->iv, CTR_RFC3686_IV_SIZE); in ccp_aes_rfc3686_crypt() 174 iv += CTR_RFC3686_IV_SIZE; in ccp_aes_rfc3686_crypt() [all …]
|
/linux/net/mac80211/ |
A D | wep.c | 38 if ((iv & 0xff00) == 0xff00) { in ieee80211_wep_weak_iv() 39 u8 B = (iv >> 16) & 0xff; in ieee80211_wep_weak_iv() 48 int keylen, int keyidx, u8 *iv) in ieee80211_wep_get_iv() argument 54 if (!iv) in ieee80211_wep_get_iv() 57 *iv++ = (local->wep_iv >> 16) & 0xff; in ieee80211_wep_get_iv() 58 *iv++ = (local->wep_iv >> 8) & 0xff; in ieee80211_wep_get_iv() 59 *iv++ = local->wep_iv & 0xff; in ieee80211_wep_get_iv() 60 *iv++ = keyidx << 6; in ieee80211_wep_get_iv() 135 u8 *iv; in ieee80211_wep_encrypt() local 143 if (!iv) in ieee80211_wep_encrypt() [all …]
|
/linux/include/crypto/ |
A D | chacha.h | 58 void chacha_init_arch(u32 *state, const u32 *key, const u8 *iv); 59 static inline void chacha_init_generic(u32 *state, const u32 *key, const u8 *iv) in chacha_init_generic() argument 70 state[12] = get_unaligned_le32(iv + 0); in chacha_init_generic() 71 state[13] = get_unaligned_le32(iv + 4); in chacha_init_generic() 72 state[14] = get_unaligned_le32(iv + 8); in chacha_init_generic() 73 state[15] = get_unaligned_le32(iv + 12); in chacha_init_generic() 76 static inline void chacha_init(u32 *state, const u32 *key, const u8 *iv) in chacha_init() argument 79 chacha_init_arch(state, key, iv); in chacha_init() 81 chacha_init_generic(state, key, iv); in chacha_init()
|
/linux/drivers/crypto/amcc/ |
A D | crypto4xx_alg.c | 75 __le32 iv[AES_IV_SIZE]; in crypto4xx_crypt() local 81 crypto4xx_memcpy_to_le32(iv, req->iv, ivlen); in crypto4xx_crypt() 345 if (is_ccm && !(req->iv[0] == 1 || req->iv[0] == 3)) in crypto4xx_aead_need_fallback() 360 req->iv); in crypto4xx_aead_fallback() 446 __le32 iv[16]; in crypto4xx_crypt_aes_ccm() local 460 if (req->iv[0] == 1) { in crypto4xx_crypt_aes_ccm() 466 crypto4xx_memcpy_to_le32(iv, req->iv, 16 - (req->iv[0] + 1)); in crypto4xx_crypt_aes_ccm() 469 len, iv, sizeof(iv), in crypto4xx_crypt_aes_ccm() 592 __le32 iv[4]; in crypto4xx_crypt_aes_gcm() local 601 crypto4xx_memcpy_to_le32(iv, req->iv, GCM_AES_IV_SIZE); in crypto4xx_crypt_aes_gcm() [all …]
|
/linux/net/qrtr/ |
A D | ns.c | 109 struct kvec iv; in service_announce_new() local 114 iv.iov_base = &pkt; in service_announce_new() 135 struct kvec iv; in service_announce_del() local 141 iv.iov_base = &pkt; in service_announce_del() 166 struct kvec iv; in lookup_notify() local 169 iv.iov_base = &pkt; in lookup_notify() 309 struct kvec iv; in say_hello() local 312 iv.iov_base = &pkt; in say_hello() 350 struct kvec iv; in ctrl_cmd_bye() local 432 struct kvec iv; in ctrl_cmd_del_client() local [all …]
|
/linux/block/ |
A D | blk-integrity.c | 29 struct bio_vec iv, ivprv = { NULL }; in blk_rq_count_integrity_sg() local 35 bio_for_each_integrity_vec(iv, bio, iter) { in blk_rq_count_integrity_sg() 38 if (!biovec_phys_mergeable(q, &ivprv, &iv)) in blk_rq_count_integrity_sg() 43 seg_size += iv.bv_len; in blk_rq_count_integrity_sg() 47 seg_size = iv.bv_len; in blk_rq_count_integrity_sg() 51 ivprv = iv; in blk_rq_count_integrity_sg() 71 struct bio_vec iv, ivprv = { NULL }; in blk_rq_map_integrity_sg() local 77 bio_for_each_integrity_vec(iv, bio, iter) { in blk_rq_map_integrity_sg() 85 sg->length += iv.bv_len; in blk_rq_map_integrity_sg() 95 sg_set_page(sg, iv.bv_page, iv.bv_len, iv.bv_offset); in blk_rq_map_integrity_sg() [all …]
|
/linux/drivers/crypto/ |
A D | padlock-aes.c | 206 : "+S" (input), "+D" (output), "+a" (iv) in rep_xcrypt_cbc() 208 return iv; in rep_xcrypt_cbc() 226 u8 *iv, struct cword *cword, int count) in cbc_crypt_copy() argument 254 u8 *iv, struct cword *cword, int count) in cbc_crypt() argument 286 u8 *iv, void *control_word, u32 count) in padlock_xcrypt_cbc() argument 297 : "+S" (input), "+D" (output), "+a" (iv) in padlock_xcrypt_cbc() 301 : "+S" (input), "+D" (output), "+a" (iv) in padlock_xcrypt_cbc() 303 return iv; in padlock_xcrypt_cbc() 424 walk.iv, &ctx->cword.encrypt, in cbc_aes_encrypt() 426 memcpy(walk.iv, iv, AES_BLOCK_SIZE); in cbc_aes_encrypt() [all …]
|
/linux/net/rxrpc/ |
A D | rxkad.c | 189 struct rxrpc_crypt iv; in rxkad_prime_packet_security() local 209 memcpy(&iv, token->kad->session_key, sizeof(iv)); in rxkad_prime_packet_security() 287 memset(&iv, 0, sizeof(iv)); in rxkad_secure_packet_auth() 336 memcpy(&iv, token->kad->session_key, sizeof(iv)); in rxkad_secure_packet_encrypt() 398 memcpy(&iv, call->conn->rxkad.csum_iv.x, sizeof(iv)); in rxkad_secure_packet() 471 memset(&iv, 0, sizeof(iv)); in rxkad_verify_packet_1() 562 memcpy(&iv, token->kad->session_key, sizeof(iv)); in rxkad_verify_packet_2() 637 memcpy(&iv, call->conn->rxkad.csum_iv.x, sizeof(iv)); in rxkad_verify_packet() 877 memcpy(&iv, s2->session_key, sizeof(iv)); in rxkad_encrypt_response() 1006 memcpy(&iv, &server_key->payload.data[2], sizeof(iv)); in rxkad_decrypt_ticket() [all …]
|
/linux/drivers/staging/rtl8192u/ieee80211/ |
A D | ieee80211_crypt_wep.c | 26 u32 iv; member 49 get_random_bytes(&priv->iv, 4); in prism2_wep_init() 87 wep->iv++; in prism2_wep_encrypt() 93 if ((wep->iv & 0xff00) == 0xff00) { in prism2_wep_encrypt() 94 u8 B = (wep->iv >> 16) & 0xff; in prism2_wep_encrypt() 97 wep->iv += 0x0100; in prism2_wep_encrypt() 101 *pos++ = key[0] = (wep->iv >> 16) & 0xff; in prism2_wep_encrypt() 102 *pos++ = key[1] = (wep->iv >> 8) & 0xff; in prism2_wep_encrypt() 103 *pos++ = key[2] = wep->iv & 0xff; in prism2_wep_encrypt()
|
/linux/drivers/ssb/ |
A D | host_soc.c | 177 struct ssb_init_invariants *iv) in ssb_host_soc_get_invariants() argument 183 memset(&iv->boardinfo, 0, sizeof(struct ssb_boardinfo)); in ssb_host_soc_get_invariants() 187 err = kstrtou16(strim(buf), 0, &iv->boardinfo.vendor); in ssb_host_soc_get_invariants() 192 if (!iv->boardinfo.vendor) in ssb_host_soc_get_invariants() 193 iv->boardinfo.vendor = SSB_BOARDVENDOR_BCM; in ssb_host_soc_get_invariants() 197 err = kstrtou16(strim(buf), 0, &iv->boardinfo.type); in ssb_host_soc_get_invariants() 203 memset(&iv->sprom, 0, sizeof(struct ssb_sprom)); in ssb_host_soc_get_invariants() 204 ssb_fill_sprom_with_fallback(bus, &iv->sprom); in ssb_host_soc_get_invariants() 207 iv->has_cardbus_slot = !!simple_strtoul(buf, NULL, 10); in ssb_host_soc_get_invariants()
|
/linux/arch/arm64/crypto/ |
A D | aes-neonbs-glue.c | 34 int rounds, int blocks, u8 iv[]); 40 int rounds, int blocks, u8 iv[]); 42 int rounds, int blocks, u8 iv[]); 48 int rounds, int blocks, u8 iv[]); 170 walk.iv); in cbc_encrypt() 196 walk.iv); in cbc_decrypt() 273 int rounds, int blocks, u8 iv[])) in __xts_crypt() argument 300 req->iv); in __xts_crypt() 324 neon_aes_ecb_encrypt(walk.iv, walk.iv, in __xts_crypt() 330 walk.iv); in __xts_crypt() [all …]
|