Home
last modified time | relevance | path

Searched refs:info (Results 1 – 13 of 13) sorted by relevance

/crypto/
Dcrypto_user_base.c155 struct crypto_dump_info *info) in crypto_report_alg() argument
157 struct sk_buff *in_skb = info->in_skb; in crypto_report_alg()
158 struct sk_buff *skb = info->out_skb; in crypto_report_alg()
163 nlh = nlmsg_put(skb, NETLINK_CB(in_skb).portid, info->nlmsg_seq, in crypto_report_alg()
164 CRYPTO_MSG_GETALG, sizeof(*ualg), info->nlmsg_flags); in crypto_report_alg()
191 struct crypto_dump_info info; in crypto_report() local
206 info.in_skb = in_skb; in crypto_report()
207 info.out_skb = skb; in crypto_report()
208 info.nlmsg_seq = in_nlh->nlmsg_seq; in crypto_report()
209 info.nlmsg_flags = 0; in crypto_report()
[all …]
Dseqiv.c57 u8 *info; in seqiv_aead_encrypt() local
68 info = req->iv; in seqiv_aead_encrypt()
85 if (unlikely(!IS_ALIGNED((unsigned long)info, in seqiv_aead_encrypt()
87 info = kmemdup(req->iv, ivsize, req->base.flags & in seqiv_aead_encrypt()
90 if (!info) in seqiv_aead_encrypt()
99 req->cryptlen - ivsize, info); in seqiv_aead_encrypt()
102 crypto_xor(info, ctx->salt, ivsize); in seqiv_aead_encrypt()
103 scatterwalk_map_and_copy(info, req->dst, req->assoclen, ivsize, 1); in seqiv_aead_encrypt()
106 if (unlikely(info != req->iv)) in seqiv_aead_encrypt()
Dechainiv.c33 u8 *info; in echainiv_encrypt() local
42 info = req->iv; in echainiv_encrypt()
62 req->cryptlen, info); in echainiv_encrypt()
65 memcpy(&nseqno, info + ivsize - 8, 8); in echainiv_encrypt()
67 memset(info, 0, ivsize); in echainiv_encrypt()
69 scatterwalk_map_and_copy(info, req->dst, req->assoclen, ivsize, 1); in echainiv_encrypt()
79 memcpy(info + ivsize - 8, &a, 8); in echainiv_encrypt()
Dcrypto_user_stat.c270 struct crypto_dump_info *info) in crypto_reportstat_alg() argument
272 struct sk_buff *in_skb = info->in_skb; in crypto_reportstat_alg()
273 struct sk_buff *skb = info->out_skb; in crypto_reportstat_alg()
278 nlh = nlmsg_put(skb, NETLINK_CB(in_skb).portid, info->nlmsg_seq, in crypto_reportstat_alg()
279 CRYPTO_MSG_GETSTAT, sizeof(*ualg), info->nlmsg_flags); in crypto_reportstat_alg()
306 struct crypto_dump_info info; in crypto_reportstat() local
321 info.in_skb = in_skb; in crypto_reportstat()
322 info.out_skb = skb; in crypto_reportstat()
323 info.nlmsg_seq = in_nlh->nlmsg_seq; in crypto_reportstat()
324 info.nlmsg_flags = 0; in crypto_reportstat()
[all …]
Dpcrypt.c56 aead_request_complete(req->base.data, padata->info); in pcrypt_aead_serial()
65 padata->info = err; in pcrypt_aead_done()
76 padata->info = crypto_aead_encrypt(req); in pcrypt_aead_enc()
78 if (padata->info == -EINPROGRESS) in pcrypt_aead_enc()
118 padata->info = crypto_aead_decrypt(req); in pcrypt_aead_dec()
120 if (padata->info == -EINPROGRESS) in pcrypt_aead_dec()
Dblkcipher.c129 if (walk->iv != desc->info) in blkcipher_walk_done()
130 memcpy(desc->info, walk->iv, walk->ivsize); in blkcipher_walk_done()
322 walk->iv = desc->info; in blkcipher_walk_first()
418 .info = req->info, in async_encrypt()
432 .info = req->info, in async_decrypt()
Dablkcipher.c130 if (walk->iv != req->info) in ablkcipher_walk_done()
131 memcpy(req->info, walk->iv, tfm->crt_ablkcipher.ivsize); in ablkcipher_walk_done()
268 walk->iv = req->info; in ablkcipher_walk_first()
Dccm.c135 static int format_input(u8 *info, struct aead_request *req, in format_input() argument
145 memcpy(info, req->iv, 16); in format_input()
150 *info |= (8 * ((m - 2) / 2)); in format_input()
152 *info |= 64; in format_input()
154 return set_msg_len(info + 16 - l, cryptlen, l); in format_input()
DKconfig1219 <https://info.isl.ntt.co.jp/crypt/eng/camellia/index_s.html>
1236 <https://info.isl.ntt.co.jp/crypt/eng/camellia/index_s.html>
1256 <https://info.isl.ntt.co.jp/crypt/eng/camellia/index_s.html>
1272 <https://info.isl.ntt.co.jp/crypt/eng/camellia/index_s.html>
1288 <https://info.isl.ntt.co.jp/crypt/eng/camellia/index_s.html>
Dskcipher.c630 .info = req->iv, in skcipher_crypt_blkcipher()
/crypto/asymmetric_keys/
Dpublic_key.c104 struct kernel_pkey_query *info) in software_key_query() argument
140 info->key_size = len * 8; in software_key_query()
141 info->max_data_size = len; in software_key_query()
142 info->max_sig_size = len; in software_key_query()
143 info->max_enc_size = len; in software_key_query()
144 info->max_dec_size = len; in software_key_query()
145 info->supported_ops = (KEYCTL_SUPPORTS_ENCRYPT | in software_key_query()
148 info->supported_ops |= (KEYCTL_SUPPORTS_DECRYPT | in software_key_query()
Dsignature.c43 struct kernel_pkey_query *info) in query_asymmetric_key() argument
60 ret = subtype->query(params, info); in query_asymmetric_key()
Dasym_tpm.c409 struct kernel_pkey_query *info) in tpm_key_query() argument
437 info->key_size = tk->key_len; in tpm_key_query()
438 info->max_data_size = tk->key_len / 8; in tpm_key_query()
439 info->max_sig_size = len; in tpm_key_query()
440 info->max_enc_size = len; in tpm_key_query()
441 info->max_dec_size = tk->key_len / 8; in tpm_key_query()
443 info->supported_ops = KEYCTL_SUPPORTS_ENCRYPT | in tpm_key_query()