| /f-stack/dpdk/app/test/ |
| H A D | test_cryptodev_security_pdcp_test_vectors.h | 27 uint8_t auth_key_len; member 39 .auth_key_len = 0, 48 .auth_key_len = 0, 57 .auth_key_len = 16, 66 .auth_key_len = 16, 75 .auth_key_len = 16, 84 .auth_key_len = 16, 93 .auth_key_len = 16, 102 .auth_key_len = 16, 111 .auth_key_len = 0, [all …]
|
| H A D | test_cryptodev_security_pdcp_sdap_test_vectors.h | 19 uint8_t auth_key_len; member 46 .auth_key_len = 16, 75 .auth_key_len = 16, 104 .auth_key_len = 16, 134 .auth_key_len = 16, 163 .auth_key_len = 16, 193 .auth_key_len = 16, 222 .auth_key_len = 16, 251 .auth_key_len = 16, 283 .auth_key_len = 16, [all …]
|
| H A D | test_cryptodev.c | 7756 const uint8_t *auth_key, uint32_t auth_key_len, in test_pdcp_proto() argument 7815 ut_params->auth_xform.auth.key.length = auth_key_len; in test_pdcp_proto() 8085 pdcp_test_params[i].auth_key_len; in test_pdcp_proto_SGL() 8220 pdcp_test_params[i].auth_key_len, pdcp_test_bearer[i], in test_pdcp_proto_cplane_encap() 8236 pdcp_test_params[i].auth_key_len, pdcp_test_bearer[i], in test_pdcp_proto_uplane_encap() 8252 pdcp_test_params[i].auth_key_len, pdcp_test_bearer[i], in test_pdcp_proto_uplane_encap_with_int() 8268 pdcp_test_params[i].auth_key_len, pdcp_test_bearer[i], in test_pdcp_proto_cplane_decap() 8284 pdcp_test_params[i].auth_key_len, pdcp_test_bearer[i], in test_pdcp_proto_uplane_decap() 8300 pdcp_test_params[i].auth_key_len, pdcp_test_bearer[i], in test_pdcp_proto_uplane_decap_with_int() 8391 cur_test->auth_key, cur_test->param.auth_key_len, in test_PDCP_SDAP_PROTO_encap_all() [all …]
|
| /f-stack/dpdk/drivers/crypto/octeontx2/ |
| H A D | otx2_cryptodev_sec.c | 207 int cipher_key_len, auth_key_len; in crypto_sec_ipsec_outb_session_create() local 293 auth_key_len = 0; in crypto_sec_ipsec_outb_session_create() 306 auth_key_len = auth_xform->auth.key.length; in crypto_sec_ipsec_outb_session_create() 320 RTE_SET_USED(auth_key_len); in crypto_sec_ipsec_outb_session_create() 347 int cipher_key_len, auth_key_len; in crypto_sec_ipsec_inb_session_create() local 375 auth_key_len = 0; in crypto_sec_ipsec_inb_session_create() 390 auth_key_len = auth_xform->auth.key.length; in crypto_sec_ipsec_inb_session_create() 404 RTE_SET_USED(auth_key_len); in crypto_sec_ipsec_inb_session_create()
|
| /f-stack/dpdk/drivers/net/octeontx2/ |
| H A D | otx2_ethdev_sec.c | 354 int cipher_key_len, auth_key_len, ret; in eth_sec_ipsec_out_sess_create() local 409 auth_key_len = 0; in eth_sec_ipsec_out_sess_create() 419 auth_key_len = auth_xform->auth.key.length; in eth_sec_ipsec_out_sess_create() 448 if (auth_key_len && auth_key) { in eth_sec_ipsec_out_sess_create() 449 ret = hmac_init(ctl, qp, auth_key, auth_key_len, sa->hmac_key); in eth_sec_ipsec_out_sess_create() 470 int cipher_key_len, auth_key_len, ret; in eth_sec_ipsec_in_sess_create() local 500 auth_key_len = 0; in eth_sec_ipsec_in_sess_create() 512 auth_key_len = auth_xform->auth.key.length; in eth_sec_ipsec_in_sess_create() 533 if (auth_key_len && auth_key) { in eth_sec_ipsec_in_sess_create() 538 ret = hmac_init(ctl, qp, auth_key, auth_key_len, sa->hmac_key); in eth_sec_ipsec_in_sess_create()
|
| /f-stack/freebsd/sys/ |
| H A D | ktls.h | 111 int auth_key_len; member 126 int auth_key_len; member 152 uint16_t auth_key_len; member
|
| /f-stack/freebsd/kern/ |
| H A D | uipc_ktls.c | 466 if (en->auth_key_len < 0 || en->auth_key_len > TLS_MAX_PARAM_SIZE) in ktls_create_session() 500 if (en->auth_key_len != 0) in ktls_create_session() 530 if (en->auth_key_len == 0) in ktls_create_session() 610 if (en->auth_key_len != 0) { in ktls_create_session() 611 tls->params.auth_key_len = en->auth_key_len; in ktls_create_session() 612 tls->params.auth_key = malloc(en->auth_key_len, M_KTLS, in ktls_create_session() 615 en->auth_key_len); in ktls_create_session() 675 tls_new->params.auth_key = malloc(tls->params.auth_key_len, in ktls_clone_session() 678 tls->params.auth_key_len); in ktls_clone_session() 736 tls->params.auth_key_len = 0; in ktls_cleanup()
|
| /f-stack/dpdk/lib/librte_vhost/ |
| H A D | vhost_user.h | 103 uint32_t auth_key_len; member
|
| H A D | virtio_crypto.h | 124 uint32_t auth_key_len; member
|
| H A D | vhost_crypto.c | 324 if (param->auth_key_len > VHOST_USER_CRYPTO_MAX_HMAC_KEY_LENGTH) { in transform_chain_param() 330 xform_auth->auth.key.length = param->auth_key_len; in transform_chain_param()
|
| /f-stack/dpdk/drivers/crypto/bcmfs/ |
| H A D | bcmfs_sym_engine.c | 456 uint64_t assoc_size, uint64_t auth_key_len, in spu2_fmd_ctrl1_write() argument 470 if (auth_key_len != 0) in spu2_fmd_ctrl1_write() 471 ctrl1 |= ((auth_key_len << SPU2_HASH_KEY_LEN_SHIFT) & in spu2_fmd_ctrl1_write() 520 uint64_t auth_key_len __rte_unused, in spu2_fmd_ctrl2_write()
|
| /f-stack/dpdk/drivers/common/cpt/ |
| H A D | cpt_mcode_defines.h | 312 uint64_t auth_key_len :8; member
|
| H A D | cpt_ucode.h | 253 if (cpt_ctx->auth_key_len > 64) in cpt_fc_ciph_set_key() 522 key_len = ctx->auth_key_len; in cpt_digest_gen_prep() 2487 cpt_ctx->auth_key_len = key_len; in cpt_fc_auth_set_key()
|
| /f-stack/dpdk/examples/ipsec-secgw/ |
| H A D | sa.c | 447 rule->auth_key_len = algo->key_len; in parse_sa_tokens() 474 APP_CHECK(key_len == rule->auth_key_len, status, in parse_sa_tokens() 1180 sa->auth_key_len; in sa_add_rules() 1201 sa->auth_key_len; in sa_add_rules()
|
| H A D | ipsec.h | 132 uint16_t auth_key_len; member
|
| /f-stack/dpdk/drivers/crypto/virtio/ |
| H A D | virtio_cryptodev.c | 129 .auth_key_len; in virtio_crypto_send_command() 1266 para->u.mac_param.auth_key_len = in virtio_crypto_sym_pad_op_ctrl_req()
|
| /f-stack/freebsd/opencrypto/ |
| H A D | ktls_ocf.c | 641 mac_csp.csp_auth_klen = tls->params.auth_key_len; in ktls_ocf_try()
|
| /f-stack/dpdk/drivers/crypto/mvsam/ |
| H A D | rte_mrvl_pmd.c | 323 sess->sam_sess_params.auth_key_len = auth_xform->auth.key.length; in mrvl_crypto_set_auth_session_parameters()
|
| /f-stack/freebsd/netinet/ |
| H A D | tcp_usrreq.c | 2028 tls->auth_key_len = tls_v0.auth_key_len; in copyin_tls_enable()
|