/crypto/ |
D | proc.c | 20 static void *c_start(struct seq_file *m, loff_t *pos) in c_start() argument 26 static void *c_next(struct seq_file *m, void *p, loff_t *pos) in c_next() argument 31 static void c_stop(struct seq_file *m, void *p) in c_stop() argument 36 static int c_show(struct seq_file *m, void *p) in c_show() argument 40 seq_printf(m, "name : %s\n", alg->cra_name); in c_show() 41 seq_printf(m, "driver : %s\n", alg->cra_driver_name); in c_show() 42 seq_printf(m, "module : %s\n", module_name(alg->cra_module)); in c_show() 43 seq_printf(m, "priority : %d\n", alg->cra_priority); in c_show() 44 seq_printf(m, "refcnt : %u\n", refcount_read(&alg->cra_refcnt)); in c_show() 45 seq_printf(m, "selftest : %s\n", in c_show() [all …]
|
D | sm3_generic.c | 72 static void sm3_compress(u32 *w, u32 *wt, u32 *m) in sm3_compress() argument 81 a = m[0]; in sm3_compress() 82 b = m[1]; in sm3_compress() 83 c = m[2]; in sm3_compress() 84 d = m[3]; in sm3_compress() 85 e = m[4]; in sm3_compress() 86 f = m[5]; in sm3_compress() 87 g = m[6]; in sm3_compress() 88 h = m[7]; in sm3_compress() 112 m[0] = a ^ m[0]; in sm3_compress() [all …]
|
D | rsa.c | 25 static int _rsa_enc(const struct rsa_mpi_key *key, MPI c, MPI m) in _rsa_enc() argument 28 if (mpi_cmp_ui(m, 0) < 0 || mpi_cmp(m, key->n) >= 0) in _rsa_enc() 32 return mpi_powm(c, m, key->e, key->n); in _rsa_enc() 39 static int _rsa_dec(const struct rsa_mpi_key *key, MPI m, MPI c) in _rsa_dec() argument 46 return mpi_powm(m, c, key->d, key->n); in _rsa_dec() 58 MPI m, c = mpi_alloc(0); in rsa_enc() local 71 m = mpi_read_raw_from_sgl(req->src, req->src_len); in rsa_enc() 72 if (!m) in rsa_enc() 75 ret = _rsa_enc(pkey, c, m); in rsa_enc() 87 mpi_free(m); in rsa_enc() [all …]
|
D | streebog_generic.c | 953 const struct streebog_uint512 *m) in streebog_g() argument 962 streebog_xlps(&Ki, m, &data); in streebog_g() 972 streebog_xor(&data, m, h); in streebog_g() 977 struct streebog_uint512 m; in streebog_stage2() local 979 memcpy(&m, data, sizeof(m)); in streebog_stage2() 981 streebog_g(&ctx->h, &ctx->N, &m); in streebog_stage2() 984 streebog_add512(&ctx->Sigma, &m, &ctx->Sigma); in streebog_stage2() 994 streebog_g(&ctx->h, &ctx->N, &ctx->m); in streebog_stage3() 996 streebog_add512(&ctx->Sigma, &ctx->m, &ctx->Sigma); in streebog_stage3()
|
D | aead.c | 169 static void crypto_aead_show(struct seq_file *m, struct crypto_alg *alg) 171 static void crypto_aead_show(struct seq_file *m, struct crypto_alg *alg) in crypto_aead_show() argument 175 seq_printf(m, "type : aead\n"); in crypto_aead_show() 176 seq_printf(m, "async : %s\n", alg->cra_flags & CRYPTO_ALG_ASYNC ? in crypto_aead_show() 178 seq_printf(m, "blocksize : %u\n", alg->cra_blocksize); in crypto_aead_show() 179 seq_printf(m, "ivsize : %u\n", aead->ivsize); in crypto_aead_show() 180 seq_printf(m, "maxauthsize : %u\n", aead->maxauthsize); in crypto_aead_show() 181 seq_printf(m, "geniv : <none>\n"); in crypto_aead_show()
|
D | blake2b_generic.c | 48 a = a + b + m[blake2b_sigma[r][2*i+0]]; \ 52 a = a + b + m[blake2b_sigma[r][2*i+1]]; \ 73 u64 m[16]; in blake2b_compress_one_generic() local 78 m[i] = get_unaligned_le64(block + i * sizeof(m[i])); in blake2b_compress_one_generic()
|
D | twofish_common.c | 535 #define CALC_K(a, j, k, l, m, n) \ argument 537 y = CALC_K_2 (m, n, m, n, 4); \ 548 #define CALC_K192(a, j, k, l, m, n) \ argument 550 y = CALC_K192_2 (n, n, m, m, 4); \ 561 #define CALC_K256(a, j, k, l, m, n) \ argument 563 y = CALC_K256_2 (m, n, 4); \
|
D | kpp.c | 41 static void crypto_kpp_show(struct seq_file *m, struct crypto_alg *alg) 44 static void crypto_kpp_show(struct seq_file *m, struct crypto_alg *alg) in crypto_kpp_show() argument 46 seq_puts(m, "type : kpp\n"); in crypto_kpp_show()
|
D | twofish_generic.c | 85 #define INPACK(n, x, m) \ argument 86 x = le32_to_cpu(src[n]) ^ ctx->w[m] 88 #define OUTUNPACK(n, x, m) \ argument 89 x ^= ctx->w[m]; \
|
D | rng.c | 89 static void crypto_rng_show(struct seq_file *m, struct crypto_alg *alg) 91 static void crypto_rng_show(struct seq_file *m, struct crypto_alg *alg) in crypto_rng_show() argument 93 seq_printf(m, "type : rng\n"); in crypto_rng_show() 94 seq_printf(m, "seedsize : %u\n", seedsize(alg)); in crypto_rng_show()
|
D | cast6_generic.c | 27 #define F1(D, r, m) ((I = ((m) + (D))), (I = rol32(I, (r))), \ argument 29 #define F2(D, r, m) ((I = ((m) ^ (D))), (I = rol32(I, (r))), \ argument 31 #define F3(D, r, m) ((I = ((m) - (D))), (I = rol32(I, (r))), \ argument
|
D | akcipher.c | 42 static void crypto_akcipher_show(struct seq_file *m, struct crypto_alg *alg) 45 static void crypto_akcipher_show(struct seq_file *m, struct crypto_alg *alg) in crypto_akcipher_show() argument 47 seq_puts(m, "type : akcipher\n"); in crypto_akcipher_show()
|
D | acompress.c | 44 static void crypto_acomp_show(struct seq_file *m, struct crypto_alg *alg) 47 static void crypto_acomp_show(struct seq_file *m, struct crypto_alg *alg) in crypto_acomp_show() argument 49 seq_puts(m, "type : acomp\n"); in crypto_acomp_show()
|
D | skcipher.c | 691 static void crypto_skcipher_show(struct seq_file *m, struct crypto_alg *alg) 693 static void crypto_skcipher_show(struct seq_file *m, struct crypto_alg *alg) in crypto_skcipher_show() argument 698 seq_printf(m, "type : skcipher\n"); in crypto_skcipher_show() 699 seq_printf(m, "async : %s\n", in crypto_skcipher_show() 701 seq_printf(m, "blocksize : %u\n", alg->cra_blocksize); in crypto_skcipher_show() 702 seq_printf(m, "min keysize : %u\n", skcipher->min_keysize); in crypto_skcipher_show() 703 seq_printf(m, "max keysize : %u\n", skcipher->max_keysize); in crypto_skcipher_show() 704 seq_printf(m, "ivsize : %u\n", skcipher->ivsize); in crypto_skcipher_show() 705 seq_printf(m, "chunksize : %u\n", skcipher->chunksize); in crypto_skcipher_show() 706 seq_printf(m, "walksize : %u\n", skcipher->walksize); in crypto_skcipher_show()
|
D | cast5_generic.c | 295 #define F1(D, m, r) ((I = ((m) + (D))), (I = rol32(I, (r))), \ argument 297 #define F2(D, m, r) ((I = ((m) ^ (D))), (I = rol32(I, (r))), \ argument 299 #define F3(D, m, r) ((I = ((m) - (D))), (I = rol32(I, (r))), \ argument
|
D | ahash.c | 520 static void crypto_ahash_show(struct seq_file *m, struct crypto_alg *alg) 522 static void crypto_ahash_show(struct seq_file *m, struct crypto_alg *alg) in crypto_ahash_show() argument 524 seq_printf(m, "type : ahash\n"); in crypto_ahash_show() 525 seq_printf(m, "async : %s\n", alg->cra_flags & CRYPTO_ALG_ASYNC ? in crypto_ahash_show() 527 seq_printf(m, "blocksize : %u\n", alg->cra_blocksize); in crypto_ahash_show() 528 seq_printf(m, "digestsize : %u\n", in crypto_ahash_show()
|
D | scompress.c | 60 static void crypto_scomp_show(struct seq_file *m, struct crypto_alg *alg) 63 static void crypto_scomp_show(struct seq_file *m, struct crypto_alg *alg) in crypto_scomp_show() argument 65 seq_puts(m, "type : scomp\n"); in crypto_scomp_show()
|
D | aegis128-neon-inner.c | 108 uint8x16_t m) in aegis128_update_neon() argument 110 m ^= aegis_aes_round(st.v[4]); in aegis128_update_neon() 115 st.v[0] ^= m; in aegis128_update_neon()
|
D | sm2.c | 21 #define MPI_NBYTES(m) ((mpi_get_nbits(m) + 7) / 8) argument 217 MPI m, unsigned int pbytes) in sm2_z_digest_update() argument 223 in = mpi_get_buffer(m, &inlen, NULL); in sm2_z_digest_update()
|
D | shash.c | 483 static void crypto_shash_show(struct seq_file *m, struct crypto_alg *alg) 485 static void crypto_shash_show(struct seq_file *m, struct crypto_alg *alg) in crypto_shash_show() argument 489 seq_printf(m, "type : shash\n"); in crypto_shash_show() 490 seq_printf(m, "blocksize : %u\n", alg->cra_blocksize); in crypto_shash_show() 491 seq_printf(m, "digestsize : %u\n", salg->digestsize); in crypto_shash_show()
|
D | ecc.c | 340 unsigned __int128 m = (unsigned __int128)left * right; in mul_64_64() local 342 result.m_low = m; in mul_64_64() 343 result.m_high = m >> 64; in mul_64_64() 556 u64 m[ECC_MAX_DIGITS * 2]; /* expanded mod */ in vli_mmod_special2() local 560 vli_set(m, mod, ndigits); in vli_mmod_special2() 561 vli_clear(m + ndigits, ndigits); in vli_mmod_special2() 587 vli_add(r, r, m, ndigits * 2); in vli_mmod_special2() 588 while (vli_cmp(r, m, ndigits * 2) >= 0) in vli_mmod_special2() 589 vli_sub(r, r, m, ndigits * 2); in vli_mmod_special2()
|
D | testmgr.h | 152 const unsigned char *m; member 205 .m = "\x54\x85\x9b\x34\x2c\x49\xea\x2a", 245 .m = "\x54\x85\x9b\x34\x2c\x49\xea\x2a", 303 .m = "\x54\x85\x9b\x34\x2c\x49\xea\x2a", 345 .m = "\x54\x85\x9b\x34\x2c\x49\xea\x2a", 528 .m = "\x54\x85\x9b\x34\x2c\x49\xea\x2a", 592 .m = 618 .m = 644 .m = 677 .m = [all …]
|
D | vmac.c | 118 u64 m = MUL32(_i1, _i2>>32) + MUL32(_i1>>32, _i2); \ 121 ADD128(rh, rl, (m >> 32), (m << 32)); \
|
/crypto/asymmetric_keys/ |
D | asymmetric_type.c | 330 static void asymmetric_key_describe(const struct key *key, struct seq_file *m) in asymmetric_key_describe() argument 338 seq_puts(m, key->description); in asymmetric_key_describe() 341 seq_puts(m, ": "); in asymmetric_key_describe() 342 subtype->describe(key, m); in asymmetric_key_describe() 346 seq_putc(m, ' '); in asymmetric_key_describe() 353 seq_printf(m, "%*phN", n, p); in asymmetric_key_describe() 356 seq_puts(m, " ["); in asymmetric_key_describe() 358 seq_putc(m, ']'); in asymmetric_key_describe()
|
D | public_key.c | 31 struct seq_file *m) in public_key_describe() argument 36 seq_printf(m, "%s.%s", key->id_type, key->pkey_algo); in public_key_describe()
|