Home
last modified time | relevance | path

Searched refs:m (Results 1 – 25 of 30) sorted by relevance

12

/crypto/
Dproc.c20 static void *c_start(struct seq_file *m, loff_t *pos) in c_start() argument
26 static void *c_next(struct seq_file *m, void *p, loff_t *pos) in c_next() argument
31 static void c_stop(struct seq_file *m, void *p) in c_stop() argument
36 static int c_show(struct seq_file *m, void *p) in c_show() argument
40 seq_printf(m, "name : %s\n", alg->cra_name); in c_show()
41 seq_printf(m, "driver : %s\n", alg->cra_driver_name); in c_show()
42 seq_printf(m, "module : %s\n", module_name(alg->cra_module)); in c_show()
43 seq_printf(m, "priority : %d\n", alg->cra_priority); in c_show()
44 seq_printf(m, "refcnt : %u\n", refcount_read(&alg->cra_refcnt)); in c_show()
45 seq_printf(m, "selftest : %s\n", in c_show()
[all …]
Dsm3_generic.c72 static void sm3_compress(u32 *w, u32 *wt, u32 *m) in sm3_compress() argument
81 a = m[0]; in sm3_compress()
82 b = m[1]; in sm3_compress()
83 c = m[2]; in sm3_compress()
84 d = m[3]; in sm3_compress()
85 e = m[4]; in sm3_compress()
86 f = m[5]; in sm3_compress()
87 g = m[6]; in sm3_compress()
88 h = m[7]; in sm3_compress()
112 m[0] = a ^ m[0]; in sm3_compress()
[all …]
Drsa.c25 static int _rsa_enc(const struct rsa_mpi_key *key, MPI c, MPI m) in _rsa_enc() argument
28 if (mpi_cmp_ui(m, 0) < 0 || mpi_cmp(m, key->n) >= 0) in _rsa_enc()
32 return mpi_powm(c, m, key->e, key->n); in _rsa_enc()
39 static int _rsa_dec(const struct rsa_mpi_key *key, MPI m, MPI c) in _rsa_dec() argument
46 return mpi_powm(m, c, key->d, key->n); in _rsa_dec()
58 MPI m, c = mpi_alloc(0); in rsa_enc() local
71 m = mpi_read_raw_from_sgl(req->src, req->src_len); in rsa_enc()
72 if (!m) in rsa_enc()
75 ret = _rsa_enc(pkey, c, m); in rsa_enc()
87 mpi_free(m); in rsa_enc()
[all …]
Dstreebog_generic.c953 const struct streebog_uint512 *m) in streebog_g() argument
962 streebog_xlps(&Ki, m, &data); in streebog_g()
972 streebog_xor(&data, m, h); in streebog_g()
977 struct streebog_uint512 m; in streebog_stage2() local
979 memcpy(&m, data, sizeof(m)); in streebog_stage2()
981 streebog_g(&ctx->h, &ctx->N, &m); in streebog_stage2()
984 streebog_add512(&ctx->Sigma, &m, &ctx->Sigma); in streebog_stage2()
994 streebog_g(&ctx->h, &ctx->N, &ctx->m); in streebog_stage3()
996 streebog_add512(&ctx->Sigma, &ctx->m, &ctx->Sigma); in streebog_stage3()
Daead.c169 static void crypto_aead_show(struct seq_file *m, struct crypto_alg *alg)
171 static void crypto_aead_show(struct seq_file *m, struct crypto_alg *alg) in crypto_aead_show() argument
175 seq_printf(m, "type : aead\n"); in crypto_aead_show()
176 seq_printf(m, "async : %s\n", alg->cra_flags & CRYPTO_ALG_ASYNC ? in crypto_aead_show()
178 seq_printf(m, "blocksize : %u\n", alg->cra_blocksize); in crypto_aead_show()
179 seq_printf(m, "ivsize : %u\n", aead->ivsize); in crypto_aead_show()
180 seq_printf(m, "maxauthsize : %u\n", aead->maxauthsize); in crypto_aead_show()
181 seq_printf(m, "geniv : <none>\n"); in crypto_aead_show()
Dblake2b_generic.c48 a = a + b + m[blake2b_sigma[r][2*i+0]]; \
52 a = a + b + m[blake2b_sigma[r][2*i+1]]; \
73 u64 m[16]; in blake2b_compress_one_generic() local
78 m[i] = get_unaligned_le64(block + i * sizeof(m[i])); in blake2b_compress_one_generic()
Dtwofish_common.c535 #define CALC_K(a, j, k, l, m, n) \ argument
537 y = CALC_K_2 (m, n, m, n, 4); \
548 #define CALC_K192(a, j, k, l, m, n) \ argument
550 y = CALC_K192_2 (n, n, m, m, 4); \
561 #define CALC_K256(a, j, k, l, m, n) \ argument
563 y = CALC_K256_2 (m, n, 4); \
Dkpp.c41 static void crypto_kpp_show(struct seq_file *m, struct crypto_alg *alg)
44 static void crypto_kpp_show(struct seq_file *m, struct crypto_alg *alg) in crypto_kpp_show() argument
46 seq_puts(m, "type : kpp\n"); in crypto_kpp_show()
Dtwofish_generic.c85 #define INPACK(n, x, m) \ argument
86 x = le32_to_cpu(src[n]) ^ ctx->w[m]
88 #define OUTUNPACK(n, x, m) \ argument
89 x ^= ctx->w[m]; \
Drng.c89 static void crypto_rng_show(struct seq_file *m, struct crypto_alg *alg)
91 static void crypto_rng_show(struct seq_file *m, struct crypto_alg *alg) in crypto_rng_show() argument
93 seq_printf(m, "type : rng\n"); in crypto_rng_show()
94 seq_printf(m, "seedsize : %u\n", seedsize(alg)); in crypto_rng_show()
Dcast6_generic.c27 #define F1(D, r, m) ((I = ((m) + (D))), (I = rol32(I, (r))), \ argument
29 #define F2(D, r, m) ((I = ((m) ^ (D))), (I = rol32(I, (r))), \ argument
31 #define F3(D, r, m) ((I = ((m) - (D))), (I = rol32(I, (r))), \ argument
Dakcipher.c42 static void crypto_akcipher_show(struct seq_file *m, struct crypto_alg *alg)
45 static void crypto_akcipher_show(struct seq_file *m, struct crypto_alg *alg) in crypto_akcipher_show() argument
47 seq_puts(m, "type : akcipher\n"); in crypto_akcipher_show()
Dacompress.c44 static void crypto_acomp_show(struct seq_file *m, struct crypto_alg *alg)
47 static void crypto_acomp_show(struct seq_file *m, struct crypto_alg *alg) in crypto_acomp_show() argument
49 seq_puts(m, "type : acomp\n"); in crypto_acomp_show()
Dskcipher.c691 static void crypto_skcipher_show(struct seq_file *m, struct crypto_alg *alg)
693 static void crypto_skcipher_show(struct seq_file *m, struct crypto_alg *alg) in crypto_skcipher_show() argument
698 seq_printf(m, "type : skcipher\n"); in crypto_skcipher_show()
699 seq_printf(m, "async : %s\n", in crypto_skcipher_show()
701 seq_printf(m, "blocksize : %u\n", alg->cra_blocksize); in crypto_skcipher_show()
702 seq_printf(m, "min keysize : %u\n", skcipher->min_keysize); in crypto_skcipher_show()
703 seq_printf(m, "max keysize : %u\n", skcipher->max_keysize); in crypto_skcipher_show()
704 seq_printf(m, "ivsize : %u\n", skcipher->ivsize); in crypto_skcipher_show()
705 seq_printf(m, "chunksize : %u\n", skcipher->chunksize); in crypto_skcipher_show()
706 seq_printf(m, "walksize : %u\n", skcipher->walksize); in crypto_skcipher_show()
Dcast5_generic.c295 #define F1(D, m, r) ((I = ((m) + (D))), (I = rol32(I, (r))), \ argument
297 #define F2(D, m, r) ((I = ((m) ^ (D))), (I = rol32(I, (r))), \ argument
299 #define F3(D, m, r) ((I = ((m) - (D))), (I = rol32(I, (r))), \ argument
Dahash.c520 static void crypto_ahash_show(struct seq_file *m, struct crypto_alg *alg)
522 static void crypto_ahash_show(struct seq_file *m, struct crypto_alg *alg) in crypto_ahash_show() argument
524 seq_printf(m, "type : ahash\n"); in crypto_ahash_show()
525 seq_printf(m, "async : %s\n", alg->cra_flags & CRYPTO_ALG_ASYNC ? in crypto_ahash_show()
527 seq_printf(m, "blocksize : %u\n", alg->cra_blocksize); in crypto_ahash_show()
528 seq_printf(m, "digestsize : %u\n", in crypto_ahash_show()
Dscompress.c60 static void crypto_scomp_show(struct seq_file *m, struct crypto_alg *alg)
63 static void crypto_scomp_show(struct seq_file *m, struct crypto_alg *alg) in crypto_scomp_show() argument
65 seq_puts(m, "type : scomp\n"); in crypto_scomp_show()
Daegis128-neon-inner.c108 uint8x16_t m) in aegis128_update_neon() argument
110 m ^= aegis_aes_round(st.v[4]); in aegis128_update_neon()
115 st.v[0] ^= m; in aegis128_update_neon()
Dsm2.c21 #define MPI_NBYTES(m) ((mpi_get_nbits(m) + 7) / 8) argument
217 MPI m, unsigned int pbytes) in sm2_z_digest_update() argument
223 in = mpi_get_buffer(m, &inlen, NULL); in sm2_z_digest_update()
Dshash.c483 static void crypto_shash_show(struct seq_file *m, struct crypto_alg *alg)
485 static void crypto_shash_show(struct seq_file *m, struct crypto_alg *alg) in crypto_shash_show() argument
489 seq_printf(m, "type : shash\n"); in crypto_shash_show()
490 seq_printf(m, "blocksize : %u\n", alg->cra_blocksize); in crypto_shash_show()
491 seq_printf(m, "digestsize : %u\n", salg->digestsize); in crypto_shash_show()
Decc.c340 unsigned __int128 m = (unsigned __int128)left * right; in mul_64_64() local
342 result.m_low = m; in mul_64_64()
343 result.m_high = m >> 64; in mul_64_64()
556 u64 m[ECC_MAX_DIGITS * 2]; /* expanded mod */ in vli_mmod_special2() local
560 vli_set(m, mod, ndigits); in vli_mmod_special2()
561 vli_clear(m + ndigits, ndigits); in vli_mmod_special2()
587 vli_add(r, r, m, ndigits * 2); in vli_mmod_special2()
588 while (vli_cmp(r, m, ndigits * 2) >= 0) in vli_mmod_special2()
589 vli_sub(r, r, m, ndigits * 2); in vli_mmod_special2()
Dtestmgr.h152 const unsigned char *m; member
205 .m = "\x54\x85\x9b\x34\x2c\x49\xea\x2a",
245 .m = "\x54\x85\x9b\x34\x2c\x49\xea\x2a",
303 .m = "\x54\x85\x9b\x34\x2c\x49\xea\x2a",
345 .m = "\x54\x85\x9b\x34\x2c\x49\xea\x2a",
528 .m = "\x54\x85\x9b\x34\x2c\x49\xea\x2a",
592 .m =
618 .m =
644 .m =
677 .m =
[all …]
Dvmac.c118 u64 m = MUL32(_i1, _i2>>32) + MUL32(_i1>>32, _i2); \
121 ADD128(rh, rl, (m >> 32), (m << 32)); \
/crypto/asymmetric_keys/
Dasymmetric_type.c330 static void asymmetric_key_describe(const struct key *key, struct seq_file *m) in asymmetric_key_describe() argument
338 seq_puts(m, key->description); in asymmetric_key_describe()
341 seq_puts(m, ": "); in asymmetric_key_describe()
342 subtype->describe(key, m); in asymmetric_key_describe()
346 seq_putc(m, ' '); in asymmetric_key_describe()
353 seq_printf(m, "%*phN", n, p); in asymmetric_key_describe()
356 seq_puts(m, " ["); in asymmetric_key_describe()
358 seq_putc(m, ']'); in asymmetric_key_describe()
Dpublic_key.c31 struct seq_file *m) in public_key_describe() argument
36 seq_printf(m, "%s.%s", key->id_type, key->pkey_algo); in public_key_describe()

12