Home
last modified time | relevance | path

Searched refs:m (Results 1 – 19 of 19) sorted by relevance

/crypto/
Dproc.c64 static void *c_start(struct seq_file *m, loff_t *pos) in c_start() argument
70 static void *c_next(struct seq_file *m, void *p, loff_t *pos) in c_next() argument
75 static void c_stop(struct seq_file *m, void *p) in c_stop() argument
80 static int c_show(struct seq_file *m, void *p) in c_show() argument
84 seq_printf(m, "name : %s\n", alg->cra_name); in c_show()
85 seq_printf(m, "driver : %s\n", alg->cra_driver_name); in c_show()
86 seq_printf(m, "module : %s\n", module_name(alg->cra_module)); in c_show()
87 seq_printf(m, "priority : %d\n", alg->cra_priority); in c_show()
88 seq_printf(m, "refcnt : %d\n", atomic_read(&alg->cra_refcnt)); in c_show()
89 seq_printf(m, "selftest : %s\n", in c_show()
[all …]
Dablkcipher.c411 static void crypto_ablkcipher_show(struct seq_file *m, struct crypto_alg *alg)
413 static void crypto_ablkcipher_show(struct seq_file *m, struct crypto_alg *alg) in crypto_ablkcipher_show() argument
417 seq_printf(m, "type : ablkcipher\n"); in crypto_ablkcipher_show()
418 seq_printf(m, "async : %s\n", alg->cra_flags & CRYPTO_ALG_ASYNC ? in crypto_ablkcipher_show()
420 seq_printf(m, "blocksize : %u\n", alg->cra_blocksize); in crypto_ablkcipher_show()
421 seq_printf(m, "min keysize : %u\n", ablkcipher->min_keysize); in crypto_ablkcipher_show()
422 seq_printf(m, "max keysize : %u\n", ablkcipher->max_keysize); in crypto_ablkcipher_show()
423 seq_printf(m, "ivsize : %u\n", ablkcipher->ivsize); in crypto_ablkcipher_show()
424 seq_printf(m, "geniv : %s\n", ablkcipher->geniv ?: "<default>"); in crypto_ablkcipher_show()
492 static void crypto_givcipher_show(struct seq_file *m, struct crypto_alg *alg)
[all …]
Daead.c142 static void crypto_aead_show(struct seq_file *m, struct crypto_alg *alg)
144 static void crypto_aead_show(struct seq_file *m, struct crypto_alg *alg) in crypto_aead_show() argument
148 seq_printf(m, "type : aead\n"); in crypto_aead_show()
149 seq_printf(m, "async : %s\n", alg->cra_flags & CRYPTO_ALG_ASYNC ? in crypto_aead_show()
151 seq_printf(m, "blocksize : %u\n", alg->cra_blocksize); in crypto_aead_show()
152 seq_printf(m, "ivsize : %u\n", aead->ivsize); in crypto_aead_show()
153 seq_printf(m, "maxauthsize : %u\n", aead->maxauthsize); in crypto_aead_show()
154 seq_printf(m, "geniv : %s\n", aead->geniv ?: "<built-in>"); in crypto_aead_show()
228 static void crypto_nivaead_show(struct seq_file *m, struct crypto_alg *alg)
230 static void crypto_nivaead_show(struct seq_file *m, struct crypto_alg *alg) in crypto_nivaead_show() argument
[all …]
Drng.c87 static void crypto_rng_show(struct seq_file *m, struct crypto_alg *alg)
89 static void crypto_rng_show(struct seq_file *m, struct crypto_alg *alg) in crypto_rng_show() argument
91 seq_printf(m, "type : rng\n"); in crypto_rng_show()
92 seq_printf(m, "seedsize : %u\n", alg->cra_rng.seedsize); in crypto_rng_show()
Dtwofish_common.c549 #define CALC_K(a, j, k, l, m, n) \ argument
551 y = CALC_K_2 (m, n, m, n, 4); \
562 #define CALC_K192(a, j, k, l, m, n) \ argument
564 y = CALC_K192_2 (n, n, m, m, 4); \
575 #define CALC_K256(a, j, k, l, m, n) \ argument
577 y = CALC_K256_2 (m, n, 4); \
Dpcompress.c72 static void crypto_pcomp_show(struct seq_file *m, struct crypto_alg *alg)
74 static void crypto_pcomp_show(struct seq_file *m, struct crypto_alg *alg) in crypto_pcomp_show() argument
76 seq_printf(m, "type : pcomp\n"); in crypto_pcomp_show()
Dtwofish_generic.c99 #define INPACK(n, x, m) \ argument
100 x = le32_to_cpu(src[n]) ^ ctx->w[m]
102 #define OUTUNPACK(n, x, m) \ argument
103 x ^= ctx->w[m]; \
Dcast6_generic.c35 #define F1(D, r, m) ((I = ((m) + (D))), (I = rol32(I, (r))), \ argument
37 #define F2(D, r, m) ((I = ((m) ^ (D))), (I = rol32(I, (r))), \ argument
39 #define F3(D, r, m) ((I = ((m) - (D))), (I = rol32(I, (r))), \ argument
Dvmac.c80 u64 m = MUL32(_i1, _i2>>32) + MUL32(_i1>>32, _i2); \
83 ADD128(rh, rl, (m >> 32), (m << 32)); \
367 static void vhash_update(const unsigned char *m, in vhash_update() argument
383 mptr = (u64 *)m; in vhash_update()
409 static u64 vhash(unsigned char m[], unsigned int mbytes, in vhash() argument
419 mptr = (u64 *)m; in vhash()
461 static u64 vmac(unsigned char m[], unsigned int mbytes, in vmac() argument
483 h = vhash(m, mbytes, (u64 *)0, &ctx->__vmac_ctx); in vmac()
Dcast5_generic.c303 #define F1(D, m, r) ((I = ((m) + (D))), (I = rol32(I, (r))), \ argument
305 #define F2(D, m, r) ((I = ((m) ^ (D))), (I = rol32(I, (r))), \ argument
307 #define F3(D, m, r) ((I = ((m) - (D))), (I = rol32(I, (r))), \ argument
Dahash.c533 static void crypto_ahash_show(struct seq_file *m, struct crypto_alg *alg)
535 static void crypto_ahash_show(struct seq_file *m, struct crypto_alg *alg) in crypto_ahash_show() argument
537 seq_printf(m, "type : ahash\n"); in crypto_ahash_show()
538 seq_printf(m, "async : %s\n", alg->cra_flags & CRYPTO_ALG_ASYNC ? in crypto_ahash_show()
540 seq_printf(m, "blocksize : %u\n", alg->cra_blocksize); in crypto_ahash_show()
541 seq_printf(m, "digestsize : %u\n", in crypto_ahash_show()
Dblkcipher.c540 static void crypto_blkcipher_show(struct seq_file *m, struct crypto_alg *alg)
542 static void crypto_blkcipher_show(struct seq_file *m, struct crypto_alg *alg) in crypto_blkcipher_show() argument
544 seq_printf(m, "type : blkcipher\n"); in crypto_blkcipher_show()
545 seq_printf(m, "blocksize : %u\n", alg->cra_blocksize); in crypto_blkcipher_show()
546 seq_printf(m, "min keysize : %u\n", alg->cra_blkcipher.min_keysize); in crypto_blkcipher_show()
547 seq_printf(m, "max keysize : %u\n", alg->cra_blkcipher.max_keysize); in crypto_blkcipher_show()
548 seq_printf(m, "ivsize : %u\n", alg->cra_blkcipher.ivsize); in crypto_blkcipher_show()
549 seq_printf(m, "geniv : %s\n", alg->cra_blkcipher.geniv ?: in crypto_blkcipher_show()
Dshash.c558 static void crypto_shash_show(struct seq_file *m, struct crypto_alg *alg)
560 static void crypto_shash_show(struct seq_file *m, struct crypto_alg *alg) in crypto_shash_show() argument
564 seq_printf(m, "type : shash\n"); in crypto_shash_show()
565 seq_printf(m, "blocksize : %u\n", alg->cra_blocksize); in crypto_shash_show()
566 seq_printf(m, "digestsize : %u\n", salg->digestsize); in crypto_shash_show()
Dccm.c129 unsigned int m; in format_input() local
131 m = crypto_aead_authsize(aead); in format_input()
138 *info |= (8 * ((m - 2) / 2)); in format_input()
Dtcrypt.c1228 static int do_test(int m) in do_test() argument
1233 switch (m) { in do_test()
DKconfig187 depends on m
1470 default m
/crypto/asymmetric_keys/
Drsa.c92 MPI m; in RSAVP1() local
105 m = mpi_alloc(0); in RSAVP1()
106 if (!m) in RSAVP1()
110 ret = mpi_powm(m, s, key->rsa.e, key->rsa.n); in RSAVP1()
112 mpi_free(m); in RSAVP1()
116 *_m = m; in RSAVP1()
219 MPI m = NULL; in RSA_verify_signature() local
246 ret = RSAVP1(key, sig->rsa.s, &m); in RSA_verify_signature()
256 ret = RSA_I2OSP(m, k, &EM); in RSA_verify_signature()
266 mpi_free(m); in RSA_verify_signature()
Dasymmetric_type.c230 static void asymmetric_key_describe(const struct key *key, struct seq_file *m) in asymmetric_key_describe() argument
238 seq_puts(m, key->description); in asymmetric_key_describe()
241 seq_puts(m, ": "); in asymmetric_key_describe()
242 subtype->describe(key, m); in asymmetric_key_describe()
246 seq_putc(m, ' '); in asymmetric_key_describe()
253 seq_printf(m, "%*phN", n, p); in asymmetric_key_describe()
256 seq_puts(m, " ["); in asymmetric_key_describe()
258 seq_putc(m, ']'); in asymmetric_key_describe()
Dpublic_key.c49 struct seq_file *m) in public_key_describe() argument
54 seq_printf(m, "%s.%s", in public_key_describe()