/crypto/ |
D | simd.c | 54 struct crypto_skcipher *child = &ctx->cryptd_tfm->base; in simd_skcipher_setkey() local 57 crypto_skcipher_clear_flags(child, CRYPTO_TFM_REQ_MASK); in simd_skcipher_setkey() 58 crypto_skcipher_set_flags(child, crypto_skcipher_get_flags(tfm) & in simd_skcipher_setkey() 60 err = crypto_skcipher_setkey(child, key, key_len); in simd_skcipher_setkey() 61 crypto_skcipher_set_flags(tfm, crypto_skcipher_get_flags(child) & in simd_skcipher_setkey() 71 struct crypto_skcipher *child; in simd_skcipher_encrypt() local 78 child = &ctx->cryptd_tfm->base; in simd_skcipher_encrypt() 80 child = cryptd_skcipher_child(ctx->cryptd_tfm); in simd_skcipher_encrypt() 82 skcipher_request_set_tfm(subreq, child); in simd_skcipher_encrypt() 92 struct crypto_skcipher *child; in simd_skcipher_decrypt() local [all …]
|
D | cryptd.c | 67 struct crypto_sync_skcipher *child; member 76 struct crypto_shash *child; member 86 struct crypto_aead *child; member 254 struct crypto_sync_skcipher *child = ctx->child; in cryptd_skcipher_setkey() local 257 crypto_sync_skcipher_clear_flags(child, CRYPTO_TFM_REQ_MASK); in cryptd_skcipher_setkey() 258 crypto_sync_skcipher_set_flags(child, in cryptd_skcipher_setkey() 261 err = crypto_sync_skcipher_setkey(child, key, keylen); in cryptd_skcipher_setkey() 263 crypto_sync_skcipher_get_flags(child) & in cryptd_skcipher_setkey() 290 struct crypto_sync_skcipher *child = ctx->child; in cryptd_skcipher_encrypt() local 291 SYNC_SKCIPHER_REQUEST_ON_STACK(subreq, child); in cryptd_skcipher_encrypt() [all …]
|
D | xts.c | 24 struct crypto_skcipher *child; member 44 struct crypto_skcipher *child; in setkey() local 70 child = ctx->child; in setkey() 71 crypto_skcipher_clear_flags(child, CRYPTO_TFM_REQ_MASK); in setkey() 72 crypto_skcipher_set_flags(child, crypto_skcipher_get_flags(parent) & in setkey() 74 err = crypto_skcipher_setkey(child, key, keylen); in setkey() 75 crypto_skcipher_set_flags(parent, crypto_skcipher_get_flags(child) & in setkey() 185 skcipher_request_set_tfm(subreq, ctx->child); in cts_final() 250 skcipher_request_set_tfm(subreq, ctx->child); in init_crypt() 300 struct crypto_skcipher *child; in init_tfm() local [all …]
|
D | xcbc.c | 28 struct crypto_cipher *child; member 60 if ((err = crypto_cipher_setkey(ctx->child, inkey, keylen))) in crypto_xcbc_digest_setkey() 63 crypto_cipher_encrypt_one(ctx->child, consts, (u8 *)ks + bs); in crypto_xcbc_digest_setkey() 64 crypto_cipher_encrypt_one(ctx->child, consts + bs, (u8 *)ks + bs * 2); in crypto_xcbc_digest_setkey() 65 crypto_cipher_encrypt_one(ctx->child, key1, (u8 *)ks); in crypto_xcbc_digest_setkey() 67 return crypto_cipher_setkey(ctx->child, key1, bs); in crypto_xcbc_digest_setkey() 91 struct crypto_cipher *tfm = tctx->child; in crypto_xcbc_digest_update() 137 struct crypto_cipher *tfm = tctx->child; in crypto_xcbc_digest_final() 177 ctx->child = cipher; in xcbc_init_tfm() 185 crypto_free_cipher(ctx->child); in xcbc_exit_tfm()
|
D | cts.c | 56 struct crypto_skcipher *child; member 70 struct crypto_skcipher *child = ctx->child; in crypto_cts_reqctx_space() local 72 return PTR_ALIGN((u8 *)(rctx + 1) + crypto_skcipher_reqsize(child), in crypto_cts_reqctx_space() 80 struct crypto_skcipher *child = ctx->child; in crypto_cts_setkey() local 83 crypto_skcipher_clear_flags(child, CRYPTO_TFM_REQ_MASK); in crypto_cts_setkey() 84 crypto_skcipher_set_flags(child, crypto_skcipher_get_flags(parent) & in crypto_cts_setkey() 86 err = crypto_skcipher_setkey(child, key, keylen); in crypto_cts_setkey() 87 crypto_skcipher_set_flags(parent, crypto_skcipher_get_flags(child) & in crypto_cts_setkey() 157 skcipher_request_set_tfm(subreq, ctx->child); in crypto_cts_encrypt() 252 skcipher_request_set_tfm(subreq, ctx->child); in crypto_cts_decrypt() [all …]
|
D | ctr.c | 18 struct crypto_skcipher *child; member 173 struct crypto_skcipher *child = ctx->child; in crypto_rfc3686_setkey() local 185 crypto_skcipher_clear_flags(child, CRYPTO_TFM_REQ_MASK); in crypto_rfc3686_setkey() 186 crypto_skcipher_set_flags(child, crypto_skcipher_get_flags(parent) & in crypto_rfc3686_setkey() 188 err = crypto_skcipher_setkey(child, key, keylen); in crypto_rfc3686_setkey() 189 crypto_skcipher_set_flags(parent, crypto_skcipher_get_flags(child) & in crypto_rfc3686_setkey() 199 struct crypto_skcipher *child = ctx->child; in crypto_rfc3686_crypt() local 214 skcipher_request_set_tfm(subreq, child); in crypto_rfc3686_crypt() 236 ctx->child = cipher; in crypto_rfc3686_init_tfm() 251 crypto_free_skcipher(ctx->child); in crypto_rfc3686_exit_tfm()
|
D | lrw.c | 31 struct crypto_skcipher *child; member 72 struct crypto_skcipher *child = ctx->child; in setkey() local 78 crypto_skcipher_clear_flags(child, CRYPTO_TFM_REQ_MASK); in setkey() 79 crypto_skcipher_set_flags(child, crypto_skcipher_get_flags(parent) & in setkey() 81 err = crypto_skcipher_setkey(child, key, keylen - bsize); in setkey() 82 crypto_skcipher_set_flags(parent, crypto_skcipher_get_flags(child) & in setkey() 229 skcipher_request_set_tfm(subreq, ctx->child); in init_crypt() 275 ctx->child = cipher; in init_tfm() 289 crypto_free_skcipher(ctx->child); in exit_tfm()
|
D | gcm.c | 34 struct crypto_aead *child; member 49 struct crypto_aead *child; member 729 struct crypto_aead *child = ctx->child; in crypto_rfc4106_setkey() local 738 crypto_aead_clear_flags(child, CRYPTO_TFM_REQ_MASK); in crypto_rfc4106_setkey() 739 crypto_aead_set_flags(child, crypto_aead_get_flags(parent) & in crypto_rfc4106_setkey() 741 err = crypto_aead_setkey(child, key, keylen); in crypto_rfc4106_setkey() 742 crypto_aead_set_flags(parent, crypto_aead_get_flags(child) & in crypto_rfc4106_setkey() 758 return crypto_aead_setauthsize(ctx->child, authsize); in crypto_rfc4106_setauthsize() 767 struct crypto_aead *child = ctx->child; in crypto_rfc4106_crypt() local 769 u8 *iv = PTR_ALIGN((u8 *)(subreq + 1) + crypto_aead_reqsize(child), in crypto_rfc4106_crypt() [all …]
|
D | ccm.c | 31 struct crypto_aead *child; member 55 struct crypto_cipher *child; member 606 struct crypto_aead *child = ctx->child; in crypto_rfc4309_setkey() local 615 crypto_aead_clear_flags(child, CRYPTO_TFM_REQ_MASK); in crypto_rfc4309_setkey() 616 crypto_aead_set_flags(child, crypto_aead_get_flags(parent) & in crypto_rfc4309_setkey() 618 err = crypto_aead_setkey(child, key, keylen); in crypto_rfc4309_setkey() 619 crypto_aead_set_flags(parent, crypto_aead_get_flags(child) & in crypto_rfc4309_setkey() 639 return crypto_aead_setauthsize(ctx->child, authsize); in crypto_rfc4309_setauthsize() 648 struct crypto_aead *child = ctx->child; in crypto_rfc4309_crypt() local 650 u8 *iv = PTR_ALIGN((u8 *)(subreq + 1) + crypto_aead_reqsize(child), in crypto_rfc4309_crypt() [all …]
|
D | aead.c | 220 return crypto_aead_setkey(ctx->child, key, keylen); in aead_geniv_setkey() 228 return crypto_aead_setauthsize(ctx->child, authsize); in aead_geniv_setauthsize() 322 struct crypto_aead *child; in aead_init_geniv() local 342 child = crypto_spawn_aead(aead_instance_ctx(inst)); in aead_init_geniv() 343 err = PTR_ERR(child); in aead_init_geniv() 344 if (IS_ERR(child)) in aead_init_geniv() 347 ctx->child = child; in aead_init_geniv() 348 crypto_aead_set_reqsize(aead, crypto_aead_reqsize(child) + in aead_init_geniv() 366 crypto_free_aead(ctx->child); in aead_exit_geniv()
|
D | cmac.c | 29 struct crypto_cipher *child; member 61 err = crypto_cipher_setkey(ctx->child, inkey, keylen); in crypto_cmac_digest_setkey() 67 crypto_cipher_encrypt_one(ctx->child, (u8 *)consts, (u8 *)consts); in crypto_cmac_digest_setkey() 124 struct crypto_cipher *tfm = tctx->child; in crypto_cmac_digest_update() 170 struct crypto_cipher *tfm = tctx->child; in crypto_cmac_digest_final() 211 ctx->child = cipher; in cmac_init_tfm() 219 crypto_free_cipher(ctx->child); in cmac_exit_tfm()
|
D | pcrypt.c | 31 struct crypto_aead *child; member 40 return crypto_aead_setkey(ctx->child, key, keylen); in pcrypt_aead_setkey() 48 return crypto_aead_setauthsize(ctx->child, authsize); in pcrypt_aead_setauthsize() 99 aead_request_set_tfm(creq, ctx->child); in pcrypt_aead_encrypt() 141 aead_request_set_tfm(creq, ctx->child); in pcrypt_aead_decrypt() 175 ctx->child = cipher; in pcrypt_aead_init_tfm() 187 crypto_free_aead(ctx->child); in pcrypt_aead_exit_tfm()
|
D | rsa-pkcs1pad.c | 91 struct crypto_akcipher *child; member 114 err = crypto_akcipher_set_pub_key(ctx->child, key, keylen); in pkcs1pad_set_pub_key() 119 err = crypto_akcipher_maxsize(ctx->child); in pkcs1pad_set_pub_key() 135 err = crypto_akcipher_set_priv_key(ctx->child, key, keylen); in pkcs1pad_set_priv_key() 140 err = crypto_akcipher_maxsize(ctx->child); in pkcs1pad_set_priv_key() 261 akcipher_request_set_tfm(&req_ctx->child_req, ctx->child); in pkcs1pad_encrypt() 362 akcipher_request_set_tfm(&req_ctx->child_req, ctx->child); in pkcs1pad_decrypt() 420 akcipher_request_set_tfm(&req_ctx->child_req, ctx->child); in pkcs1pad_sign() 550 akcipher_request_set_tfm(&req_ctx->child_req, ctx->child); in pkcs1pad_verify() 577 ctx->child = child_tfm; in pkcs1pad_init_tfm() [all …]
|
D | echainiv.c | 40 aead_request_set_tfm(subreq, ctx->child); in echainiv_encrypt() 97 aead_request_set_tfm(subreq, ctx->child); in echainiv_decrypt()
|
D | fips.c | 48 .child = crypto_sysctl_table
|
D | seqiv.c | 64 aead_request_set_tfm(subreq, ctx->child); in seqiv_aead_encrypt() 123 aead_request_set_tfm(subreq, ctx->child); in seqiv_aead_decrypt()
|