/crypto/ |
D | proc.c | 64 static void *c_start(struct seq_file *m, loff_t *pos) in c_start() argument 70 static void *c_next(struct seq_file *m, void *p, loff_t *pos) in c_next() argument 75 static void c_stop(struct seq_file *m, void *p) in c_stop() argument 80 static int c_show(struct seq_file *m, void *p) in c_show() argument 84 seq_printf(m, "name : %s\n", alg->cra_name); in c_show() 85 seq_printf(m, "driver : %s\n", alg->cra_driver_name); in c_show() 86 seq_printf(m, "module : %s\n", module_name(alg->cra_module)); in c_show() 87 seq_printf(m, "priority : %d\n", alg->cra_priority); in c_show() 88 seq_printf(m, "refcnt : %d\n", atomic_read(&alg->cra_refcnt)); in c_show() 89 seq_printf(m, "selftest : %s\n", in c_show() [all …]
|
D | ablkcipher.c | 411 static void crypto_ablkcipher_show(struct seq_file *m, struct crypto_alg *alg) 413 static void crypto_ablkcipher_show(struct seq_file *m, struct crypto_alg *alg) in crypto_ablkcipher_show() argument 417 seq_printf(m, "type : ablkcipher\n"); in crypto_ablkcipher_show() 418 seq_printf(m, "async : %s\n", alg->cra_flags & CRYPTO_ALG_ASYNC ? in crypto_ablkcipher_show() 420 seq_printf(m, "blocksize : %u\n", alg->cra_blocksize); in crypto_ablkcipher_show() 421 seq_printf(m, "min keysize : %u\n", ablkcipher->min_keysize); in crypto_ablkcipher_show() 422 seq_printf(m, "max keysize : %u\n", ablkcipher->max_keysize); in crypto_ablkcipher_show() 423 seq_printf(m, "ivsize : %u\n", ablkcipher->ivsize); in crypto_ablkcipher_show() 424 seq_printf(m, "geniv : %s\n", ablkcipher->geniv ?: "<default>"); in crypto_ablkcipher_show() 492 static void crypto_givcipher_show(struct seq_file *m, struct crypto_alg *alg) [all …]
|
D | aead.c | 142 static void crypto_aead_show(struct seq_file *m, struct crypto_alg *alg) 144 static void crypto_aead_show(struct seq_file *m, struct crypto_alg *alg) in crypto_aead_show() argument 148 seq_printf(m, "type : aead\n"); in crypto_aead_show() 149 seq_printf(m, "async : %s\n", alg->cra_flags & CRYPTO_ALG_ASYNC ? in crypto_aead_show() 151 seq_printf(m, "blocksize : %u\n", alg->cra_blocksize); in crypto_aead_show() 152 seq_printf(m, "ivsize : %u\n", aead->ivsize); in crypto_aead_show() 153 seq_printf(m, "maxauthsize : %u\n", aead->maxauthsize); in crypto_aead_show() 154 seq_printf(m, "geniv : %s\n", aead->geniv ?: "<built-in>"); in crypto_aead_show() 228 static void crypto_nivaead_show(struct seq_file *m, struct crypto_alg *alg) 230 static void crypto_nivaead_show(struct seq_file *m, struct crypto_alg *alg) in crypto_nivaead_show() argument [all …]
|
D | rng.c | 87 static void crypto_rng_show(struct seq_file *m, struct crypto_alg *alg) 89 static void crypto_rng_show(struct seq_file *m, struct crypto_alg *alg) in crypto_rng_show() argument 91 seq_printf(m, "type : rng\n"); in crypto_rng_show() 92 seq_printf(m, "seedsize : %u\n", alg->cra_rng.seedsize); in crypto_rng_show()
|
D | twofish_common.c | 549 #define CALC_K(a, j, k, l, m, n) \ argument 551 y = CALC_K_2 (m, n, m, n, 4); \ 562 #define CALC_K192(a, j, k, l, m, n) \ argument 564 y = CALC_K192_2 (n, n, m, m, 4); \ 575 #define CALC_K256(a, j, k, l, m, n) \ argument 577 y = CALC_K256_2 (m, n, 4); \
|
D | pcompress.c | 72 static void crypto_pcomp_show(struct seq_file *m, struct crypto_alg *alg) 74 static void crypto_pcomp_show(struct seq_file *m, struct crypto_alg *alg) in crypto_pcomp_show() argument 76 seq_printf(m, "type : pcomp\n"); in crypto_pcomp_show()
|
D | twofish_generic.c | 99 #define INPACK(n, x, m) \ argument 100 x = le32_to_cpu(src[n]) ^ ctx->w[m] 102 #define OUTUNPACK(n, x, m) \ argument 103 x ^= ctx->w[m]; \
|
D | cast6_generic.c | 35 #define F1(D, r, m) ((I = ((m) + (D))), (I = rol32(I, (r))), \ argument 37 #define F2(D, r, m) ((I = ((m) ^ (D))), (I = rol32(I, (r))), \ argument 39 #define F3(D, r, m) ((I = ((m) - (D))), (I = rol32(I, (r))), \ argument
|
D | vmac.c | 80 u64 m = MUL32(_i1, _i2>>32) + MUL32(_i1>>32, _i2); \ 83 ADD128(rh, rl, (m >> 32), (m << 32)); \ 367 static void vhash_update(const unsigned char *m, in vhash_update() argument 383 mptr = (u64 *)m; in vhash_update() 409 static u64 vhash(unsigned char m[], unsigned int mbytes, in vhash() argument 419 mptr = (u64 *)m; in vhash() 461 static u64 vmac(unsigned char m[], unsigned int mbytes, in vmac() argument 483 h = vhash(m, mbytes, (u64 *)0, &ctx->__vmac_ctx); in vmac()
|
D | cast5_generic.c | 303 #define F1(D, m, r) ((I = ((m) + (D))), (I = rol32(I, (r))), \ argument 305 #define F2(D, m, r) ((I = ((m) ^ (D))), (I = rol32(I, (r))), \ argument 307 #define F3(D, m, r) ((I = ((m) - (D))), (I = rol32(I, (r))), \ argument
|
D | ahash.c | 533 static void crypto_ahash_show(struct seq_file *m, struct crypto_alg *alg) 535 static void crypto_ahash_show(struct seq_file *m, struct crypto_alg *alg) in crypto_ahash_show() argument 537 seq_printf(m, "type : ahash\n"); in crypto_ahash_show() 538 seq_printf(m, "async : %s\n", alg->cra_flags & CRYPTO_ALG_ASYNC ? in crypto_ahash_show() 540 seq_printf(m, "blocksize : %u\n", alg->cra_blocksize); in crypto_ahash_show() 541 seq_printf(m, "digestsize : %u\n", in crypto_ahash_show()
|
D | blkcipher.c | 540 static void crypto_blkcipher_show(struct seq_file *m, struct crypto_alg *alg) 542 static void crypto_blkcipher_show(struct seq_file *m, struct crypto_alg *alg) in crypto_blkcipher_show() argument 544 seq_printf(m, "type : blkcipher\n"); in crypto_blkcipher_show() 545 seq_printf(m, "blocksize : %u\n", alg->cra_blocksize); in crypto_blkcipher_show() 546 seq_printf(m, "min keysize : %u\n", alg->cra_blkcipher.min_keysize); in crypto_blkcipher_show() 547 seq_printf(m, "max keysize : %u\n", alg->cra_blkcipher.max_keysize); in crypto_blkcipher_show() 548 seq_printf(m, "ivsize : %u\n", alg->cra_blkcipher.ivsize); in crypto_blkcipher_show() 549 seq_printf(m, "geniv : %s\n", alg->cra_blkcipher.geniv ?: in crypto_blkcipher_show()
|
D | shash.c | 558 static void crypto_shash_show(struct seq_file *m, struct crypto_alg *alg) 560 static void crypto_shash_show(struct seq_file *m, struct crypto_alg *alg) in crypto_shash_show() argument 564 seq_printf(m, "type : shash\n"); in crypto_shash_show() 565 seq_printf(m, "blocksize : %u\n", alg->cra_blocksize); in crypto_shash_show() 566 seq_printf(m, "digestsize : %u\n", salg->digestsize); in crypto_shash_show()
|
D | ccm.c | 129 unsigned int m; in format_input() local 131 m = crypto_aead_authsize(aead); in format_input() 138 *info |= (8 * ((m - 2) / 2)); in format_input()
|
D | tcrypt.c | 1228 static int do_test(int m) in do_test() argument 1233 switch (m) { in do_test()
|
D | Kconfig | 187 depends on m 1470 default m
|
/crypto/asymmetric_keys/ |
D | rsa.c | 92 MPI m; in RSAVP1() local 105 m = mpi_alloc(0); in RSAVP1() 106 if (!m) in RSAVP1() 110 ret = mpi_powm(m, s, key->rsa.e, key->rsa.n); in RSAVP1() 112 mpi_free(m); in RSAVP1() 116 *_m = m; in RSAVP1() 219 MPI m = NULL; in RSA_verify_signature() local 246 ret = RSAVP1(key, sig->rsa.s, &m); in RSA_verify_signature() 256 ret = RSA_I2OSP(m, k, &EM); in RSA_verify_signature() 266 mpi_free(m); in RSA_verify_signature()
|
D | asymmetric_type.c | 230 static void asymmetric_key_describe(const struct key *key, struct seq_file *m) in asymmetric_key_describe() argument 238 seq_puts(m, key->description); in asymmetric_key_describe() 241 seq_puts(m, ": "); in asymmetric_key_describe() 242 subtype->describe(key, m); in asymmetric_key_describe() 246 seq_putc(m, ' '); in asymmetric_key_describe() 253 seq_printf(m, "%*phN", n, p); in asymmetric_key_describe() 256 seq_puts(m, " ["); in asymmetric_key_describe() 258 seq_putc(m, ']'); in asymmetric_key_describe()
|
D | public_key.c | 49 struct seq_file *m) in public_key_describe() argument 54 seq_printf(m, "%s.%s", in public_key_describe()
|