Searched refs:digest (Results 1 - 25 of 25) sorted by relevance

/deb_dpdk/drivers/crypto/aesni_mb/
H A Daesni_mb_ops.h50 typedef void (*md5_one_block_t)(void *data, void *digest);
52 typedef void (*sha1_one_block_t)(void *data, void *digest);
53 typedef void (*sha224_one_block_t)(void *data, void *digest);
54 typedef void (*sha256_one_block_t)(void *data, void *digest);
55 typedef void (*sha384_one_block_t)(void *data, void *digest);
56 typedef void (*sha512_one_block_t)(void *data, void *digest);
H A Drte_aesni_mb_pmd.c64 typedef void (*hash_one_block_t)(void *data, void *digest);
70 * @param one_block_hash Function pointer to calculate digest on ipad/opad
399 /* Set digest output location */
406 "for temp digest");
414 job->auth_tag_output = op->sym->auth.digest.data;
419 * digest length as specified in the relevant IPsec RFCs
451 * - Returns processed mbuf which is trimmed of output digest used in
452 * verification of supplied digest in the case of a HASH_CIPHER operation
474 /* Verify digest if required */
475 if (memcmp(job->auth_tag_output, op->sym->auth.digest
[all...]
/deb_dpdk/drivers/crypto/aesni_gcm/
H A Daesni_gcm_pmd.c255 if (op->auth.digest.length != 16 &&
256 op->auth.digest.length != 12 &&
257 op->auth.digest.length != 8 &&
258 op->auth.digest.length != 0) {
270 op->auth.digest.data,
271 (uint64_t)op->auth.digest.length);
274 op->auth.digest.length);
287 (uint64_t)op->auth.digest.length);
302 * - Returns processed mbuf which is trimmed of output digest used in
303 * verification of supplied digest i
[all...]
/deb_dpdk/app/test/
H A Dtest_cryptodev.c84 uint8_t *digest; member in struct:crypto_unittest_params
103 const uint8_t *digest,
1225 /* Generate test mbuf data and space for digest */
1229 ut_params->digest = (uint8_t *)rte_pktmbuf_append(ut_params->ibuf,
1231 TEST_ASSERT_NOT_NULL(ut_params->digest, "no room to append digest");
1273 sym_op->auth.digest.data = ut_params->digest;
1274 sym_op->auth.digest.phys_addr = rte_pktmbuf_mtophys_offset(
1276 sym_op->auth.digest
1309 uint8_t *digest = ciphertext + QUOTE_512_BYTES; local
1393 test_AES_CBC_HMAC_SHA512_decrypt_perform(struct rte_cryptodev_sym_session *sess, struct crypto_unittest_params *ut_params, struct crypto_testsuite_params *ts_params, const uint8_t *cipher, const uint8_t *digest, const uint8_t *iv) argument
4578 const uint8_t *digest; member in struct:multi_session_params
5366 } digest; member in struct:test_crypto_vector
[all...]
H A Dtest_cryptodev_blockcipher.c85 digest_len = tdata->digest.len;
88 digest_len = tdata->digest.truncated_len;
128 * decryption/(digest gen)/(digest verify) use ciphertext.data
142 rte_memcpy(buf_p, tdata->digest.data, digest_len);
310 sym_op->auth.digest.data = rte_pktmbuf_mtod_offset
312 sym_op->auth.digest.phys_addr =
317 sym_op->auth.digest.data = rte_pktmbuf_mtod_offset
319 sym_op->auth.digest.phys_addr =
326 sym_op->auth.digest
[all...]
H A Dtest_cryptodev_hash_test_vectors.h72 .digest = {
95 .digest = {
111 .digest = {
136 .digest = {
153 .digest = {
180 .digest = {
198 .digest = {
225 .digest = {
243 .digest = {
274 .digest
[all...]
H A Dtest_cryptodev_kasumi_hash_test_vectors.h67 } digest; member in struct:kasumi_hash_test_data
98 .digest = {
133 .digest = {
170 .digest = {
208 .digest = {
255 .digest = {
299 .digest = {
332 .digest = {
H A Dtest_cryptodev_blockcipher.h115 } digest; member in struct:blockcipher_test_data
H A Dtest_cryptodev_zuc_hash_test_vectors.h63 } digest; member in struct:zuc_hash_test_data
91 .digest = {
125 .digest = {
167 .digest = {
232 .digest = {
353 .digest = {
H A Dtest_cryptodev_snow3g_hash_test_vectors.h63 } digest; member in struct:snow3g_hash_test_data
98 .digest = {
146 .digest = {
435 .digest = {
470 .digest = {
506 .digest = {
543 .digest = {
H A Dtest_cryptodev_aes_test_vectors.h233 .digest = {
278 .digest = {
324 .digest = {
369 .digest = {
415 .digest = {
466 .digest = {
515 .digest = {
564 .digest = {
623 .digest = {
H A Dtest_cryptodev_kasumi_test_vectors.h87 } digest; member in struct:kasumi_test_data
246 .digest = {
401 .digest = {
H A Dtest_cryptodev_snow3g_test_vectors.h85 } digest; member in struct:snow3g_test_data
260 .digest = {
422 .digest = {
H A Dtest_cryptodev_des_test_vectors.h183 .digest = {
226 .digest = {
356 .digest = {
400 .digest = {
528 .digest = {
571 .digest = {
701 .digest = {
745 .digest = {
H A Dtest_cryptodev_perf.c114 uint8_t *digest; member in struct:crypto_params
147 uint8_t *digest; member in struct:crypto_unittest_params
1912 const uint8_t *digest; member in struct:crypto_data_params::crypto_expected_output
1992 ut_params->digest = (uint8_t *)rte_pktmbuf_append(m,
1994 TEST_ASSERT_NOT_NULL(ut_params->digest,
1995 "no room to append digest");
1997 rte_memcpy(ut_params->digest, data_params[0].expected.digest,
2007 op->sym->auth.digest.data = ut_params->digest;
[all...]
H A Dtest_cryptodev_zuc_test_vectors.h85 } digest; member in struct:zuc_test_data
284 .digest = {
/deb_dpdk/examples/ipsec-secgw/
H A Desp.c143 sym_cop->auth.digest.data = rte_pktmbuf_mtod_offset(m, void*,
145 sym_cop->auth.digest.phys_addr = rte_pktmbuf_mtophys_offset(m,
147 sym_cop->auth.digest.length = sa->digest_len;
185 "failed to remove pad_len + digest\n");
377 sym_cop->auth.digest.data = rte_pktmbuf_mtod_offset(m, uint8_t *,
379 sym_cop->auth.digest.phys_addr = rte_pktmbuf_mtophys_offset(m,
381 sym_cop->auth.digest.length = sa->digest_len;
/deb_dpdk/drivers/crypto/zuc/
H A Drte_zuc_pmd.c256 if (unlikely(ops[i]->sym->auth.digest.length != ZUC_DIGEST_LENGTH)) {
258 ZUC_LOG_ERR("digest");
276 ops[i]->sym->auth.digest.length);
281 /* Verify digest. */
282 if (memcmp(dst, ops[i]->sym->auth.digest.data,
283 ops[i]->sym->auth.digest.length) != 0)
286 /* Trim area used for digest from mbuf. */
288 ops[i]->sym->auth.digest.length);
290 dst = (uint32_t *)ops[i]->sym->auth.digest.data;
/deb_dpdk/drivers/crypto/qat/qat_adf/
H A Dqat_algs_build_desc.c66 * This is digest size rounded up to nearest quadword
116 /* returns digest size in bytes per hash algo */
133 /* return maximum digest size in this case */
242 uint8_t digest[qat_hash_get_digest_size( local
258 if (partial_hash_sha1(data_in, digest))
262 rte_bswap32(*(((uint32_t *)digest)+i));
265 if (partial_hash_sha224(data_in, digest))
269 rte_bswap32(*(((uint32_t *)digest)+i));
272 if (partial_hash_sha256(data_in, digest))
276 rte_bswap32(*(((uint32_t *)digest)
[all...]
/deb_dpdk/drivers/crypto/kasumi/
H A Drte_kasumi_pmd.c283 if (unlikely(ops[i]->sym->auth.digest.length != KASUMI_DIGEST_LENGTH)) {
285 KASUMI_LOG_ERR("digest");
309 ops[i]->sym->auth.digest.length);
314 /* Verify digest. */
315 if (memcmp(dst, ops[i]->sym->auth.digest.data,
316 ops[i]->sym->auth.digest.length) != 0)
319 /* Trim area used for digest from mbuf. */
321 ops[i]->sym->auth.digest.length);
323 dst = ops[i]->sym->auth.digest.data;
/deb_dpdk/drivers/crypto/snow3g/
H A Drte_snow3g_pmd.c278 if (unlikely(ops[i]->sym->auth.digest.length != SNOW3G_DIGEST_LENGTH)) {
280 SNOW3G_LOG_ERR("digest");
298 ops[i]->sym->auth.digest.length);
303 /* Verify digest. */
304 if (memcmp(dst, ops[i]->sym->auth.digest.data,
305 ops[i]->sym->auth.digest.length) != 0)
308 /* Trim area used for digest from mbuf. */
310 ops[i]->sym->auth.digest.length);
312 dst = ops[i]->sym->auth.digest.data;
/deb_dpdk/lib/librte_cryptodev/
H A Drte_crypto_sym.h246 RTE_CRYPTO_AUTH_OP_VERIFY, /**< Verify authentication digest */
247 RTE_CRYPTO_AUTH_OP_GENERATE /**< Generate authentication digest */
275 /**< Length of the digest to be returned. If the verify option is set,
276 * this specifies the length of the digest to be compared for the
280 * digest length is compliant with the hash algorithm being used.
544 * pointer to the location where the digest result
545 * should be inserted (in the case of digest generation)
546 * or where the purported digest exists (in the case of
547 * digest verification).
550 * digest resul
576 } digest; /**< Digest parameters */ member in struct:rte_crypto_sym_op::__anon510
[all...]
/deb_dpdk/drivers/crypto/openssl/
H A Drte_openssl_pmd.c734 tag = op->sym->auth.digest.data;
823 op->sym->auth.digest.length);
825 dst = op->sym->auth.digest.data;
849 if (memcmp(dst, op->sym->auth.digest.data,
850 op->sym->auth.digest.length) != 0) {
853 /* Trim area used for digest from mbuf. */
855 op->sym->auth.digest.length);
/deb_dpdk/drivers/crypto/qat/
H A Dqat_crypto.c1084 if (op->sym->auth.digest.phys_addr) {
1090 op->sym->auth.digest.phys_addr;
1159 += op->sym->auth.digest.length;
1162 += op->sym->auth.digest.length;
1206 rte_hexdump(stdout, "digest:", op->sym->auth.digest.data,
1207 op->sym->auth.digest.length);
/deb_dpdk/examples/l2fwd-crypto/
H A Dmain.c492 /* Append space for digest to end of packet */
493 op->sym->auth.digest.data = (uint8_t *)rte_pktmbuf_append(m,
496 op->sym->auth.digest.data = rte_pktmbuf_mtod(m,
500 op->sym->auth.digest.phys_addr = rte_pktmbuf_mtophys_offset(m,
502 op->sym->auth.digest.length = cparams->digest_length;
905 " --digest_size SIZE: size of digest to be generated/verified\n"
1793 /* Check if digest size is supported by the algorithm. */
1800 printf("Unsupported digest length\n");

Completed in 29 milliseconds