/crypto/ |
D | crypto_user_base.c | 155 struct crypto_dump_info *info) in crypto_report_alg() argument 157 struct sk_buff *in_skb = info->in_skb; in crypto_report_alg() 158 struct sk_buff *skb = info->out_skb; in crypto_report_alg() 163 nlh = nlmsg_put(skb, NETLINK_CB(in_skb).portid, info->nlmsg_seq, in crypto_report_alg() 164 CRYPTO_MSG_GETALG, sizeof(*ualg), info->nlmsg_flags); in crypto_report_alg() 191 struct crypto_dump_info info; in crypto_report() local 206 info.in_skb = in_skb; in crypto_report() 207 info.out_skb = skb; in crypto_report() 208 info.nlmsg_seq = in_nlh->nlmsg_seq; in crypto_report() 209 info.nlmsg_flags = 0; in crypto_report() [all …]
|
D | seqiv.c | 57 u8 *info; in seqiv_aead_encrypt() local 68 info = req->iv; in seqiv_aead_encrypt() 85 if (unlikely(!IS_ALIGNED((unsigned long)info, in seqiv_aead_encrypt() 87 info = kmemdup(req->iv, ivsize, req->base.flags & in seqiv_aead_encrypt() 90 if (!info) in seqiv_aead_encrypt() 99 req->cryptlen - ivsize, info); in seqiv_aead_encrypt() 102 crypto_xor(info, ctx->salt, ivsize); in seqiv_aead_encrypt() 103 scatterwalk_map_and_copy(info, req->dst, req->assoclen, ivsize, 1); in seqiv_aead_encrypt() 106 if (unlikely(info != req->iv)) in seqiv_aead_encrypt()
|
D | echainiv.c | 33 u8 *info; in echainiv_encrypt() local 42 info = req->iv; in echainiv_encrypt() 62 req->cryptlen, info); in echainiv_encrypt() 65 memcpy(&nseqno, info + ivsize - 8, 8); in echainiv_encrypt() 67 memset(info, 0, ivsize); in echainiv_encrypt() 69 scatterwalk_map_and_copy(info, req->dst, req->assoclen, ivsize, 1); in echainiv_encrypt() 79 memcpy(info + ivsize - 8, &a, 8); in echainiv_encrypt()
|
D | crypto_user_stat.c | 270 struct crypto_dump_info *info) in crypto_reportstat_alg() argument 272 struct sk_buff *in_skb = info->in_skb; in crypto_reportstat_alg() 273 struct sk_buff *skb = info->out_skb; in crypto_reportstat_alg() 278 nlh = nlmsg_put(skb, NETLINK_CB(in_skb).portid, info->nlmsg_seq, in crypto_reportstat_alg() 279 CRYPTO_MSG_GETSTAT, sizeof(*ualg), info->nlmsg_flags); in crypto_reportstat_alg() 306 struct crypto_dump_info info; in crypto_reportstat() local 321 info.in_skb = in_skb; in crypto_reportstat() 322 info.out_skb = skb; in crypto_reportstat() 323 info.nlmsg_seq = in_nlh->nlmsg_seq; in crypto_reportstat() 324 info.nlmsg_flags = 0; in crypto_reportstat() [all …]
|
D | pcrypt.c | 56 aead_request_complete(req->base.data, padata->info); in pcrypt_aead_serial() 65 padata->info = err; in pcrypt_aead_done() 76 padata->info = crypto_aead_encrypt(req); in pcrypt_aead_enc() 78 if (padata->info == -EINPROGRESS) in pcrypt_aead_enc() 118 padata->info = crypto_aead_decrypt(req); in pcrypt_aead_dec() 120 if (padata->info == -EINPROGRESS) in pcrypt_aead_dec()
|
D | blkcipher.c | 129 if (walk->iv != desc->info) in blkcipher_walk_done() 130 memcpy(desc->info, walk->iv, walk->ivsize); in blkcipher_walk_done() 322 walk->iv = desc->info; in blkcipher_walk_first() 418 .info = req->info, in async_encrypt() 432 .info = req->info, in async_decrypt()
|
D | ablkcipher.c | 130 if (walk->iv != req->info) in ablkcipher_walk_done() 131 memcpy(req->info, walk->iv, tfm->crt_ablkcipher.ivsize); in ablkcipher_walk_done() 268 walk->iv = req->info; in ablkcipher_walk_first()
|
D | ccm.c | 135 static int format_input(u8 *info, struct aead_request *req, in format_input() argument 145 memcpy(info, req->iv, 16); in format_input() 150 *info |= (8 * ((m - 2) / 2)); in format_input() 152 *info |= 64; in format_input() 154 return set_msg_len(info + 16 - l, cryptlen, l); in format_input()
|
D | Kconfig | 1219 <https://info.isl.ntt.co.jp/crypt/eng/camellia/index_s.html> 1236 <https://info.isl.ntt.co.jp/crypt/eng/camellia/index_s.html> 1256 <https://info.isl.ntt.co.jp/crypt/eng/camellia/index_s.html> 1272 <https://info.isl.ntt.co.jp/crypt/eng/camellia/index_s.html> 1288 <https://info.isl.ntt.co.jp/crypt/eng/camellia/index_s.html>
|
D | skcipher.c | 630 .info = req->iv, in skcipher_crypt_blkcipher()
|
/crypto/asymmetric_keys/ |
D | public_key.c | 104 struct kernel_pkey_query *info) in software_key_query() argument 140 info->key_size = len * 8; in software_key_query() 141 info->max_data_size = len; in software_key_query() 142 info->max_sig_size = len; in software_key_query() 143 info->max_enc_size = len; in software_key_query() 144 info->max_dec_size = len; in software_key_query() 145 info->supported_ops = (KEYCTL_SUPPORTS_ENCRYPT | in software_key_query() 148 info->supported_ops |= (KEYCTL_SUPPORTS_DECRYPT | in software_key_query()
|
D | signature.c | 43 struct kernel_pkey_query *info) in query_asymmetric_key() argument 60 ret = subtype->query(params, info); in query_asymmetric_key()
|
D | asym_tpm.c | 409 struct kernel_pkey_query *info) in tpm_key_query() argument 437 info->key_size = tk->key_len; in tpm_key_query() 438 info->max_data_size = tk->key_len / 8; in tpm_key_query() 439 info->max_sig_size = len; in tpm_key_query() 440 info->max_enc_size = len; in tpm_key_query() 441 info->max_dec_size = tk->key_len / 8; in tpm_key_query() 443 info->supported_ops = KEYCTL_SUPPORTS_ENCRYPT | in tpm_key_query()
|