• Home
  • Raw
  • Download

Lines Matching +full:0 +full:x6c000000

77 	0, 0, 16, 24, 40, 48, 64, 72, 88,
84 0, 32, 32, 48, 48, 64, 64, 80, 80,
91 0x01000000, 0x02000000, 0x04000000, 0x08000000,
92 0x10000000, 0x20000000, 0x40000000, 0x80000000,
93 0x1B000000, 0x36000000, 0x6C000000
136 memset(&reqctx->hctx_wr, 0, sizeof(struct chcr_hctx_per_wr)); in chcr_init_hctx_per_wr()
143 int nents = 0; in sg_nents_xlen()
145 unsigned int skip_len = 0; in sg_nents_xlen()
150 skip_len = 0; in sg_nents_xlen()
154 skip = 0; in sg_nents_xlen()
162 skip_len = 0; in sg_nents_xlen()
182 int cmp = 0; in chcr_verify_tag()
198 *err = 0; in chcr_verify_tag()
240 for (i = 0; i < nk; i++) in get_aes_decrypt_key()
243 i = 0; in get_aes_decrypt_key()
251 } else if (nk == 8 && (i % 4 == 0)) { in get_aes_decrypt_key()
259 for (k = 0, j = i % nk; k < nk; k++) { in get_aes_decrypt_key()
262 if (j < 0) in get_aes_decrypt_key()
273 base_hash = crypto_alloc_shash("sha1", 0, 0); in chcr_alloc_shash()
276 base_hash = crypto_alloc_shash("sha224", 0, 0); in chcr_alloc_shash()
279 base_hash = crypto_alloc_shash("sha256", 0, 0); in chcr_alloc_shash()
282 base_hash = crypto_alloc_shash("sha384", 0, 0); in chcr_alloc_shash()
285 base_hash = crypto_alloc_shash("sha512", 0, 0); in chcr_alloc_shash()
341 for (i = 0; i < (ds / sizeof(u64)); i++) in chcr_change_order()
345 for (i = 0; i < (ds / sizeof(u32)); i++) in chcr_change_order()
359 return 0; in is_hmac()
366 walk->nents = 0; in dsgl_walk_init()
378 | CPL_RX_PHYS_DSGL_ISRDMA_V(0)); in dsgl_walk_end()
380 htonl(CPL_RX_PHYS_DSGL_PCIRLXORDER_V(0) | in dsgl_walk_end()
381 CPL_RX_PHYS_DSGL_PCINOSNOOP_V(0) | in dsgl_walk_end()
382 CPL_RX_PHYS_DSGL_PCITPHNTENB_V(0) | in dsgl_walk_end()
383 CPL_RX_PHYS_DSGL_PCITPHNT_V(0) | in dsgl_walk_end()
384 CPL_RX_PHYS_DSGL_DCAID_V(0) | in dsgl_walk_end()
388 phys_cpl->rss_hdr_int.hash_val = 0; in dsgl_walk_end()
404 if ((j % 8) == 0) in dsgl_walk_add_page()
414 int skip_len = 0; in dsgl_walk_add_sg()
415 unsigned int left_size = slen, len = 0; in dsgl_walk_add_sg()
424 skip_len = 0; in dsgl_walk_add_sg()
428 skip = 0; in dsgl_walk_add_sg()
434 offset = 0; in dsgl_walk_add_sg()
443 if ((j % 8) == 0) in dsgl_walk_add_sg()
450 skip_len = 0; in dsgl_walk_add_sg()
460 walk->nents = 0; in ulptx_walk_init()
461 walk->pair_idx = 0; in ulptx_walk_init()
464 walk->last_sg_len = 0; in ulptx_walk_init()
481 if (walk->nents == 0) { in ulptx_walk_add_page()
500 int skip_len = 0; in ulptx_walk_add_sg()
508 skip_len = 0; in ulptx_walk_add_sg()
512 skip = 0; in ulptx_walk_add_sg()
516 if (sg && (walk->nents == 0)) { in ulptx_walk_add_sg()
528 skip_len = 0; in ulptx_walk_add_sg()
548 skip_len = 0; in ulptx_walk_add_sg()
568 int ret = 0; in cxgb4_is_crypto_q_full()
592 return 0; in generate_copy_rrkey()
600 int srclen = 0; in chcr_hash_ent_in_wr()
602 int soffset = 0, sless; in chcr_hash_ent_in_wr()
606 srcskip = 0; in chcr_hash_ent_in_wr()
616 soffset = 0; in chcr_hash_ent_in_wr()
617 srcskip = 0; in chcr_hash_ent_in_wr()
630 int srclen = 0, dstlen = 0; in chcr_sg_ent_in_wr()
632 int offset = 0, soffset = 0, less, sless = 0; in chcr_sg_ent_in_wr()
636 srcskip = 0; in chcr_sg_ent_in_wr()
640 dstskip = 0; in chcr_sg_ent_in_wr()
649 offset = 0; in chcr_sg_ent_in_wr()
660 offset = 0; in chcr_sg_ent_in_wr()
663 dstskip = 0; in chcr_sg_ent_in_wr()
668 srcskip = 0; in chcr_sg_ent_in_wr()
669 soffset = 0; in chcr_sg_ent_in_wr()
750 unsigned int temp = 0, transhdr_len, dst_size; in create_cipher_wr()
780 FILL_SEC_CPL_CIPHERSTOP_HI(0, 0, IV + 1, 0); in create_cipher_wr()
783 FILL_SEC_CPL_AUTHINSERT(0, 0, 0, 0); in create_cipher_wr()
784 chcr_req->sec_cpl.seqno_numivs = FILL_SEC_CPL_SCMD0_SEQNO(reqctx->op, 0, in create_cipher_wr()
786 0, 0, IV >> 1); in create_cipher_wr()
787 chcr_req->sec_cpl.ivgen_hdrlen = FILL_SEC_CPL_IVGEN_HDRLEN(0, 0, 0, in create_cipher_wr()
788 0, 1, dst_size); in create_cipher_wr()
819 + (reqctx->imm ? (wrparam->bytes) : 0); in create_cipher_wr()
820 create_wreq(c_ctx(tfm), chcr_req, &(wrparam->req->base), reqctx->imm, 0, in create_cipher_wr()
838 int ck_size = 0; in chcr_keyctx_ck_size()
847 ck_size = 0; in chcr_keyctx_ck_size()
857 int err = 0; in chcr_cipher_fallback_setkey()
876 u16 alignment = 0; in chcr_aes_cbc_setkey()
884 alignment = ck_size == CHCR_KEYCTX_CIPHER_KEY_SIZE_192 ? 8 : 0; in chcr_aes_cbc_setkey()
892 0, 0, context_size); in chcr_aes_cbc_setkey()
894 return 0; in chcr_aes_cbc_setkey()
897 ablkctx->enckey_len = 0; in chcr_aes_cbc_setkey()
908 u16 alignment = 0; in chcr_aes_ctr_setkey()
915 alignment = (ck_size == CHCR_KEYCTX_CIPHER_KEY_SIZE_192) ? 8 : 0; in chcr_aes_ctr_setkey()
922 0, 0, context_size); in chcr_aes_ctr_setkey()
925 return 0; in chcr_aes_ctr_setkey()
928 ablkctx->enckey_len = 0; in chcr_aes_ctr_setkey()
939 u16 alignment = 0; in chcr_aes_rfc3686_setkey()
953 alignment = (ck_size == CHCR_KEYCTX_CIPHER_KEY_SIZE_192) ? 8 : 0; in chcr_aes_rfc3686_setkey()
960 0, 0, context_size); in chcr_aes_rfc3686_setkey()
963 return 0; in chcr_aes_rfc3686_setkey()
966 ablkctx->enckey_len = 0; in chcr_aes_rfc3686_setkey()
1023 for (i = 0; i < round8; i++) in chcr_update_tweak()
1026 for (i = 0; i < (round % 8); i++) in chcr_update_tweak()
1041 int ret = 0; in chcr_update_cipher_iv()
1051 ret = chcr_update_tweak(req, iv, 0); in chcr_update_cipher_iv()
1075 int ret = 0; in chcr_final_cipher_iv()
1114 bytes = chcr_sg_ent_in_wr(reqctx->srcsg, reqctx->dstsg, 0, in chcr_handle_cipher_resp()
1129 if (unlikely(bytes == 0)) { in chcr_handle_cipher_resp()
1154 skb->dev = u_ctx->lldi.ports[0]; in chcr_handle_cipher_resp()
1159 return 0; in chcr_handle_cipher_resp()
1179 reqctx->processed = 0; in process_cipher()
1182 if ((ablkctx->enckey_len == 0) || (ivsize > AES_BLOCK_SIZE) || in process_cipher()
1183 (req->nbytes == 0) || in process_cipher()
1196 unsigned int dnents = 0, transhdr_len, phys_dsgl, kctx_len; in process_cipher()
1199 CHCR_DST_SG_SIZE, 0); in process_cipher()
1208 reqctx->imm = 0; in process_cipher()
1212 bytes = chcr_sg_ent_in_wr(req->src, req->dst, 0, in process_cipher()
1214 0, 0); in process_cipher()
1240 if (unlikely(bytes == 0)) { in process_cipher()
1255 reqctx->src_ofst = 0; in process_cipher()
1256 reqctx->dst_ofst = 0; in process_cipher()
1268 return 0; in process_cipher()
1279 int err, isfull = 0; in chcr_aes_encrypt()
1282 if (unlikely(cxgb4_is_crypto_q_full(u_ctx->lldi.ports[0], in chcr_aes_encrypt()
1293 skb->dev = u_ctx->lldi.ports[0]; in chcr_aes_encrypt()
1304 int err, isfull = 0; in chcr_aes_decrypt()
1306 if (unlikely(cxgb4_is_crypto_q_full(u_ctx->lldi.ports[0], in chcr_aes_decrypt()
1317 skb->dev = u_ctx->lldi.ports[0]; in chcr_aes_decrypt()
1329 int err = 0, rxq_perchan, rxq_idx; in chcr_device_init()
1347 ctx->dev->rx_channel_id = 0; in chcr_device_init()
1372 ablkctx->sw_cipher = crypto_alloc_skcipher(alg->cra_name, 0, in chcr_cra_init()
1381 ablkctx->aes_generic = crypto_alloc_cipher("aes-generic", 0, 0); in chcr_cra_init()
1402 ablkctx->sw_cipher = crypto_alloc_skcipher("ctr(aes)", 0, in chcr_rfc3686_init()
1456 return 0; in get_alg_config()
1478 unsigned int nents = 0, transhdr_len; in create_hash_wr()
1479 unsigned int temp = 0; in create_hash_wr()
1483 int error = 0; in create_hash_wr()
1490 nents += param->bfr_len ? 1 : 0; in create_hash_wr()
1501 FILL_SEC_CPL_OP_IVINSR(h_ctx(tfm)->dev->rx_channel_id, 2, 0); in create_hash_wr()
1505 FILL_SEC_CPL_CIPHERSTOP_HI(0, 0, 0, 0); in create_hash_wr()
1507 FILL_SEC_CPL_AUTHINSERT(0, 1, 0, 0); in create_hash_wr()
1509 FILL_SEC_CPL_SCMD0_SEQNO(0, 0, 0, param->alg_prm.auth_mode, in create_hash_wr()
1510 param->opad_needed, 0); in create_hash_wr()
1513 FILL_SEC_CPL_IVGEN_HDRLEN(param->last, param->more, 0, 1, 0, 0); in create_hash_wr()
1525 param->alg_prm.mk_size, 0, in create_hash_wr()
1532 if (param->bfr_len != 0) { in create_hash_wr()
1543 req_ctx->hctx_wr.dma_addr = 0; in create_hash_wr()
1548 (param->sg_len + param->bfr_len) : 0); in create_hash_wr()
1552 temp, 0); in create_hash_wr()
1566 u8 remainder = 0, bs; in chcr_ahash_update()
1569 int error, isfull = 0; in chcr_ahash_update()
1573 if (unlikely(cxgb4_is_crypto_q_full(u_ctx->lldi.ports[0], in chcr_ahash_update()
1585 + req_ctx->reqlen, nbytes, 0); in chcr_ahash_update()
1587 return 0; in chcr_ahash_update()
1596 HASH_SPACE_LEFT(params.kctx_len), 0); in chcr_ahash_update()
1601 params.opad_needed = 0; in chcr_ahash_update()
1603 params.last = 0; in chcr_ahash_update()
1605 params.scmd1 = 0; in chcr_ahash_update()
1625 skb->dev = u_ctx->lldi.ports[0]; in chcr_ahash_update()
1637 memset(bfr_ptr, 0, bs); in create_last_hash_block()
1638 *bfr_ptr = 0x80; in create_last_hash_block()
1659 params.opad_needed = 0; in chcr_ahash_final()
1660 params.sg_len = 0; in chcr_ahash_final()
1668 params.opad_needed = 0; in chcr_ahash_final()
1675 if (req_ctx->reqlen == 0) { in chcr_ahash_final()
1677 params.last = 0; in chcr_ahash_final()
1679 params.scmd1 = 0; in chcr_ahash_final()
1685 params.more = 0; in chcr_ahash_final()
1691 req_ctx->reqlen = 0; in chcr_ahash_final()
1692 skb->dev = u_ctx->lldi.ports[0]; in chcr_ahash_final()
1706 int error, isfull = 0; in chcr_ahash_finup()
1711 if (unlikely(cxgb4_is_crypto_q_full(u_ctx->lldi.ports[0], in chcr_ahash_finup()
1728 params.opad_needed = 0; in chcr_ahash_finup()
1732 HASH_SPACE_LEFT(params.kctx_len), 0); in chcr_ahash_finup()
1736 params.opad_needed = 0; in chcr_ahash_finup()
1738 params.last = 0; in chcr_ahash_finup()
1743 params.scmd1 = 0; in chcr_ahash_finup()
1746 params.more = 0; in chcr_ahash_finup()
1756 if ((req_ctx->reqlen + req->nbytes) == 0) { in chcr_ahash_finup()
1758 params.last = 0; in chcr_ahash_finup()
1760 params.scmd1 = 0; in chcr_ahash_finup()
1768 req_ctx->reqlen = 0; in chcr_ahash_finup()
1770 skb->dev = u_ctx->lldi.ports[0]; in chcr_ahash_finup()
1788 int error, isfull = 0; in chcr_ahash_digest()
1794 if (unlikely(cxgb4_is_crypto_q_full(u_ctx->lldi.ports[0], in chcr_ahash_digest()
1812 params.opad_needed = 0; in chcr_ahash_digest()
1815 HASH_SPACE_LEFT(params.kctx_len), 0); in chcr_ahash_digest()
1819 params.opad_needed = 0; in chcr_ahash_digest()
1821 params.last = 0; in chcr_ahash_digest()
1823 params.scmd1 = 0; in chcr_ahash_digest()
1830 params.more = 0; in chcr_ahash_digest()
1834 params.bfr_len = 0; in chcr_ahash_digest()
1839 if (req->nbytes == 0) { in chcr_ahash_digest()
1840 create_last_hash_block(req_ctx->reqbfr, bs, 0); in chcr_ahash_digest()
1851 skb->dev = u_ctx->lldi.ports[0]; in chcr_ahash_digest()
1879 params.opad_needed = 0; in chcr_ahash_continue()
1881 params.sg_len = chcr_hash_ent_in_wr(hctx_wr->srcsg, 0, in chcr_ahash_continue()
1890 params.opad_needed = 0; in chcr_ahash_continue()
1892 params.last = 0; in chcr_ahash_continue()
1896 params.scmd1 = 0; in chcr_ahash_continue()
1899 params.more = 0; in chcr_ahash_continue()
1903 params.bfr_len = 0; in chcr_ahash_continue()
1911 skb->dev = u_ctx->lldi.ports[0]; in chcr_ahash_continue()
1914 return 0; in chcr_ahash_continue()
1941 hctx_wr->dma_addr = 0; in chcr_handle_ahash_resp()
1946 hctx_wr->result = 0; in chcr_handle_ahash_resp()
2011 return 0; in chcr_ahash_export()
2027 return 0; in chcr_ahash_import()
2036 unsigned int i, err = 0, updated_digestsize; in chcr_ahash_setkey()
2055 memset(hmacctx->ipad + keylen, 0, bs - keylen); in chcr_ahash_setkey()
2058 for (i = 0; i < bs / sizeof(int); i++) { in chcr_ahash_setkey()
2087 unsigned short context_size = 0; in chcr_aes_xts_setkey()
2103 0, context_size); in chcr_aes_xts_setkey()
2105 return 0; in chcr_aes_xts_setkey()
2108 ablkctx->enckey_len = 0; in chcr_aes_xts_setkey()
2119 req_ctx->data_len = 0; in chcr_sha_init()
2120 req_ctx->reqlen = 0; in chcr_sha_init()
2125 return 0; in chcr_sha_init()
2156 return 0; in chcr_hmac_init()
2203 if (aeadctx->enckey_len == 0) in chcr_aead_common_init()
2219 CHCR_SRC_SG_SIZE, 0); in chcr_aead_common_init()
2222 return 0; in chcr_aead_common_init()
2233 if (((req->cryptlen - (op_type ? authsize : 0)) == 0) || in chcr_aead_need_fallback()
2238 return 0; in chcr_aead_need_fallback()
2270 unsigned int dst_size = 0, temp, subtype = get_aead_subtype(tfm); in create_authenc_wr()
2271 unsigned int kctx_len = 0, dnents; in create_authenc_wr()
2275 int null = 0; in create_authenc_wr()
2280 if (req->cryptlen == 0) in create_authenc_wr()
2283 reqctx->b0_len = 0; in create_authenc_wr()
2291 assoclen = 0; in create_authenc_wr()
2292 reqctx->aad_nents = 0; in create_authenc_wr()
2294 dnents = sg_nents_xlen(req->dst, assoclen, CHCR_DST_SG_SIZE, 0); in create_authenc_wr()
2326 temp = (reqctx->op == CHCR_ENCRYPT_OP) ? 0 : authsize; in create_authenc_wr()
2338 assoclen ? 1 : 0, assoclen, in create_authenc_wr()
2340 (temp & 0x1F0) >> 4); in create_authenc_wr()
2342 temp & 0xF, in create_authenc_wr()
2343 null ? 0 : assoclen + IV + 1, in create_authenc_wr()
2351 (reqctx->op == CHCR_ENCRYPT_OP) ? 1 : 0, in create_authenc_wr()
2355 chcr_req->sec_cpl.ivgen_hdrlen = FILL_SEC_CPL_IVGEN_HDRLEN(0, 0, 1, in create_authenc_wr()
2356 0, 0, dst_size); in create_authenc_wr()
2386 kctx_len + (reqctx->imm ? (assoclen + IV + req->cryptlen) : 0); in create_authenc_wr()
2388 transhdr_len, temp, 0); in create_authenc_wr()
2411 return 0; in chcr_aead_dma_map()
2419 reqctx->b0_dma = 0; in chcr_aead_dma_map()
2440 return 0; in chcr_aead_dma_map()
2488 buf, assoclen, 0); in chcr_add_aead_src_ent()
2499 ulptx_walk_add_sg(&ulp_walk, req->src, assoclen, 0); in chcr_add_aead_src_ent()
2522 dsgl_walk_add_sg(&dsgl_walk, req->dst, assoclen, 0); in chcr_add_aead_dst_ent()
2588 param->sg_len, 0); in chcr_add_hash_src_ent()
2606 int error = 0; in chcr_hash_dma_map()
2609 return 0; in chcr_hash_dma_map()
2615 return 0; in chcr_hash_dma_map()
2628 req_ctx->hctx_wr.is_sg_map = 0; in chcr_hash_dma_unmap()
2656 return 0; in chcr_cipher_dma_map()
2679 memset(block, 0, csize); in set_msg_len()
2690 return 0; in set_msg_len()
2707 lp = b0[0]; in generate_b0()
2724 if (iv[0] < 1 || iv[0] > 7) in crypto_ccm_check_iv()
2727 return 0; in crypto_ccm_check_iv()
2737 int rc = 0; in ccm_format_packet()
2740 reqctx->iv[0] = 3; in ccm_format_packet()
2741 memcpy(reqctx->iv + 1, &aeadctx->salt[0], 3); in ccm_format_packet()
2743 memset(reqctx->iv + 12, 0, 4); in ccm_format_packet()
2753 memset(reqctx->iv + 15 - reqctx->iv[0], 0, reqctx->iv[0] + 1); in ccm_format_packet()
2768 unsigned int tag_offset = 0, auth_offset = 0; in fill_sec_cpl_for_aead()
2776 ((assoclen) ? CCM_AAD_FIELD_SIZE : 0); in fill_sec_cpl_for_aead()
2779 (assoclen + IV + 1 + ccm_xtra) : 0; in fill_sec_cpl_for_aead()
2784 auth_offset = 0; in fill_sec_cpl_for_aead()
2795 + IV + 1 + ccm_xtra, 0); in fill_sec_cpl_for_aead()
2797 sec_cpl->cipherstop_lo_authinsert = FILL_SEC_CPL_AUTHINSERT(0, in fill_sec_cpl_for_aead()
2799 (op_type == CHCR_ENCRYPT_OP) ? 0 : in fill_sec_cpl_for_aead()
2802 (op_type == CHCR_ENCRYPT_OP) ? 0 : 1, in fill_sec_cpl_for_aead()
2806 sec_cpl->ivgen_hdrlen = FILL_SEC_CPL_IVGEN_HDRLEN(0, 0, 1, 0, in fill_sec_cpl_for_aead()
2807 0, dst_size); in fill_sec_cpl_for_aead()
2827 return 0; in aead_ccm_validate_input()
2842 unsigned int dst_size = 0, kctx_len, dnents, temp; in create_aead_ccm_wr()
2853 reqctx->b0_len = CCM_B0_SIZE + (assoclen ? CCM_AAD_FIELD_SIZE : 0); in create_aead_ccm_wr()
2861 dnents = sg_nents_xlen(req->dst, assoclen, CHCR_DST_SG_SIZE, 0); in create_aead_ccm_wr()
2911 reqctx->b0_len) : 0); in create_aead_ccm_wr()
2912 create_wreq(a_ctx(tfm), chcr_req, &req->base, reqctx->imm, 0, in create_aead_ccm_wr()
2913 transhdr_len, temp, 0); in create_aead_ccm_wr()
2935 unsigned int transhdr_len, dnents = 0; in create_gcm_wr()
2936 unsigned int dst_size = 0, temp = 0, kctx_len, assoclen = req->assoclen; in create_gcm_wr()
2946 reqctx->b0_len = 0; in create_gcm_wr()
2950 dnents = sg_nents_xlen(req->dst, assoclen, CHCR_DST_SG_SIZE, 0); in create_gcm_wr()
2981 temp = (reqctx->op == CHCR_ENCRYPT_OP) ? 0 : authsize; in create_gcm_wr()
2988 assoclen ? 1 : 0, assoclen, in create_gcm_wr()
2989 assoclen + IV + 1, 0); in create_gcm_wr()
2991 FILL_SEC_CPL_AUTHINSERT(0, assoclen + IV + 1, in create_gcm_wr()
2995 CHCR_ENCRYPT_OP) ? 1 : 0, in create_gcm_wr()
2999 chcr_req->sec_cpl.ivgen_hdrlen = FILL_SEC_CPL_IVGEN_HDRLEN(0, 0, 1, in create_gcm_wr()
3000 0, 0, dst_size); in create_gcm_wr()
3007 /* S A L T | IV | 0x00000001 */ in create_gcm_wr()
3015 *((unsigned int *)(reqctx->iv + 12)) = htonl(0x01); in create_gcm_wr()
3024 kctx_len + (reqctx->imm ? (assoclen + IV + req->cryptlen) : 0); in create_gcm_wr()
3042 aeadctx->sw_cipher = crypto_alloc_aead(alg->base.cra_name, 0, in chcr_aead_cra_init()
3214 int key_ctx_size = 0; in chcr_ccm_common_setkey()
3228 aeadctx->enckey_len = 0; in chcr_ccm_common_setkey()
3231 aeadctx->key_ctx_hdr = FILL_KEY_CTX_HDR(ck_size, mk_size, 0, 0, in chcr_ccm_common_setkey()
3236 return 0; in chcr_ccm_common_setkey()
3266 aeadctx->enckey_len = 0; in chcr_aead_rfc4309_setkey()
3290 int ret = 0, key_ctx_size = 0; in chcr_gcm_setkey()
3292 aeadctx->enckey_len = 0; in chcr_gcm_setkey()
3327 0, 0, in chcr_gcm_setkey()
3329 /* Calculate the H = CIPH(K, 0 repeated 16 times). in chcr_gcm_setkey()
3332 cipher = crypto_alloc_cipher("aes-generic", 0, 0); in chcr_gcm_setkey()
3334 aeadctx->enckey_len = 0; in chcr_gcm_setkey()
3341 aeadctx->enckey_len = 0; in chcr_gcm_setkey()
3344 memset(gctx->ghash_h, 0, AEAD_H_SIZE); in chcr_gcm_setkey()
3362 int err = 0, i, key_ctx_len = 0; in chcr_authenc_setkey()
3363 unsigned char ck_size = 0; in chcr_authenc_setkey()
3364 unsigned char pad[CHCR_HASH_MAX_BLOCK_SIZE_128] = { 0 }; in chcr_authenc_setkey()
3380 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) { in chcr_authenc_setkey()
3424 aeadctx->enckey_len = 0; in chcr_authenc_setkey()
3450 memset(pad + keys.authkeylen, 0, bs - keys.authkeylen); in chcr_authenc_setkey()
3452 for (i = 0; i < bs >> 2; i++) in chcr_authenc_setkey()
3459 memset(pad + keys.authkeylen, 0, bs - keys.authkeylen); in chcr_authenc_setkey()
3461 for (i = 0; i < bs >> 2; i++) in chcr_authenc_setkey()
3474 0, 1, key_ctx_len >> 4); in chcr_authenc_setkey()
3479 return 0; in chcr_authenc_setkey()
3482 aeadctx->enckey_len = 0; in chcr_authenc_setkey()
3498 int key_ctx_len = 0; in chcr_aead_digest_null_setkey()
3499 unsigned char ck_size = 0; in chcr_aead_digest_null_setkey()
3511 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) { in chcr_aead_digest_null_setkey()
3543 aeadctx->key_ctx_hdr = FILL_KEY_CTX_HDR(ck_size, CHCR_KEYCTX_NO_KEY, 0, in chcr_aead_digest_null_setkey()
3544 0, key_ctx_len >> 4); in chcr_aead_digest_null_setkey()
3547 return 0; in chcr_aead_digest_null_setkey()
3549 aeadctx->enckey_len = 0; in chcr_aead_digest_null_setkey()
3561 int isfull = 0; in chcr_aead_op()
3568 if (cxgb4_is_crypto_q_full(u_ctx->lldi.ports[0], in chcr_aead_op()
3581 skb->dev = u_ctx->lldi.ports[0]; in chcr_aead_op()
3600 return chcr_aead_op(req, 0, create_authenc_wr); in chcr_aead_encrypt()
3603 return chcr_aead_op(req, 0, create_aead_ccm_wr); in chcr_aead_encrypt()
3605 return chcr_aead_op(req, 0, create_gcm_wr); in chcr_aead_encrypt()
3620 size = 0; in chcr_aead_decrypt()
3642 .is_registered = 0,
3661 .is_registered = 0,
3680 .is_registered = 0,
3700 .is_registered = 0,
3723 .is_registered = 0,
3735 .is_registered = 0,
3747 .is_registered = 0,
3759 .is_registered = 0,
3771 .is_registered = 0,
3784 .is_registered = 0,
3796 .is_registered = 0,
3808 .is_registered = 0,
3820 .is_registered = 0,
3832 .is_registered = 0,
3845 .is_registered = 0,
3864 .is_registered = 0,
3884 .is_registered = 0,
3903 .is_registered = 0,
3922 .is_registered = 0,
3943 .is_registered = 0,
3965 .is_registered = 0,
3985 .is_registered = 0,
4006 .is_registered = 0,
4027 .is_registered = 0,
4041 .maxauthsize = 0,
4048 .is_registered = 0,
4069 .is_registered = 0,
4091 .is_registered = 0,
4111 .is_registered = 0,
4132 .is_registered = 0,
4153 .is_registered = 0,
4167 .maxauthsize = 0,
4183 for (i = 0; i < ARRAY_SIZE(driver_algs); i++) { in chcr_unregister_alg()
4201 driver_algs[i].is_registered = 0; in chcr_unregister_alg()
4203 return 0; in chcr_unregister_alg()
4217 int err = 0, i; in chcr_register_alg()
4220 for (i = 0; i < ARRAY_SIZE(driver_algs); i++) { in chcr_register_alg()
4234 driver_algs[i].alg.crypto.cra_alignmask = 0; in chcr_register_alg()
4263 a_hash->halg.base.cra_alignmask = 0; in chcr_register_alg()
4290 return 0; in chcr_register_alg()
4315 return 0; in stop_crypto()