/crypto/ |
D | jitterentropy-testing.c | 39 static void jent_testing_reset(struct jent_testing *data) in jent_testing_reset() argument 43 spin_lock_irqsave(&data->lock, flags); in jent_testing_reset() 44 data->rb_reader = 0; in jent_testing_reset() 45 atomic_set(&data->rb_writer, 0); in jent_testing_reset() 46 spin_unlock_irqrestore(&data->lock, flags); in jent_testing_reset() 49 static void jent_testing_data_init(struct jent_testing *data, u32 boot) in jent_testing_data_init() argument 59 jent_testing_reset(data); in jent_testing_data_init() 60 atomic_set(&data->jent_testing_enabled, 1); in jent_testing_data_init() 64 static void jent_testing_fini(struct jent_testing *data, u32 boot) in jent_testing_fini() argument 70 atomic_set(&data->jent_testing_enabled, 0); in jent_testing_fini() [all …]
|
D | akcipher.c | 192 int crypto_akcipher_sync_prep(struct crypto_akcipher_sync_data *data) in crypto_akcipher_sync_prep() argument 194 unsigned int reqsize = crypto_akcipher_reqsize(data->tfm); in crypto_akcipher_sync_prep() 201 if (data->dst) in crypto_akcipher_sync_prep() 202 mlen = max(data->slen, data->dlen); in crypto_akcipher_sync_prep() 204 mlen = data->slen + data->dlen; in crypto_akcipher_sync_prep() 214 data->req = req; in crypto_akcipher_sync_prep() 215 akcipher_request_set_tfm(req, data->tfm); in crypto_akcipher_sync_prep() 218 data->buf = buf; in crypto_akcipher_sync_prep() 219 memcpy(buf, data->src, data->slen); in crypto_akcipher_sync_prep() 221 sg = &data->sg; in crypto_akcipher_sync_prep() [all …]
|
D | streebog_generic.c | 867 struct streebog_uint512 *data) in streebog_xlps() argument 882 data->qword[i] = cpu_to_le64(Ax[0][r0 & 0xFF]); in streebog_xlps() 883 data->qword[i] ^= cpu_to_le64(Ax[1][r1 & 0xFF]); in streebog_xlps() 884 data->qword[i] ^= cpu_to_le64(Ax[2][r2 & 0xFF]); in streebog_xlps() 885 data->qword[i] ^= cpu_to_le64(Ax[3][r3 & 0xFF]); in streebog_xlps() 886 data->qword[i] ^= cpu_to_le64(Ax[4][r4 & 0xFF]); in streebog_xlps() 887 data->qword[i] ^= cpu_to_le64(Ax[5][r5 & 0xFF]); in streebog_xlps() 888 data->qword[i] ^= cpu_to_le64(Ax[6][r6 & 0xFF]); in streebog_xlps() 889 data->qword[i] ^= cpu_to_le64(Ax[7][r7 & 0xFF]); in streebog_xlps() 902 struct streebog_uint512 *data) in streebog_round() argument [all …]
|
D | michael_mic.c | 59 static int michael_update(struct shash_desc *desc, const u8 *data, in michael_update() argument 68 memcpy((u8 *)&mctx->pending + mctx->pending_len, data, flen); in michael_update() 70 data += flen; in michael_update() 82 mctx->l ^= get_unaligned_le32(data); in michael_update() 84 data += 4; in michael_update() 90 memcpy(&mctx->pending, data, len); in michael_update() 100 u8 *data = (u8 *)&mctx->pending; in michael_final() local 108 mctx->l ^= data[0] | 0x5a00; in michael_final() 111 mctx->l ^= data[0] | (data[1] << 8) | 0x5a0000; in michael_final() 114 mctx->l ^= data[0] | (data[1] << 8) | (data[2] << 16) | in michael_final()
|
D | blowfish_common.c | 351 u32 data[2], temp; in blowfish_setkey() local 373 data[0] = 0x00000000; in blowfish_setkey() 374 data[1] = 0x00000000; in blowfish_setkey() 377 encrypt_block((struct bf_ctx *)ctx, data, data); in blowfish_setkey() 379 P[i] = data[0]; in blowfish_setkey() 380 P[i + 1] = data[1]; in blowfish_setkey() 385 encrypt_block((struct bf_ctx *)ctx, data, data); in blowfish_setkey() 387 S[count] = data[0]; in blowfish_setkey() 388 S[count + 1] = data[1]; in blowfish_setkey()
|
D | crc64_rocksoft_generic.c | 17 static int chksum_update(struct shash_desc *desc, const u8 *data, in chksum_update() argument 22 *crc = crc64_rocksoft_generic(*crc, data, length); in chksum_update() 35 static int __chksum_finup(u64 crc, const u8 *data, unsigned int len, u8 *out) in __chksum_finup() argument 37 crc = crc64_rocksoft_generic(crc, data, len); in __chksum_finup() 42 static int chksum_finup(struct shash_desc *desc, const u8 *data, in chksum_finup() argument 47 return __chksum_finup(*crc, data, len, out); in chksum_finup() 50 static int chksum_digest(struct shash_desc *desc, const u8 *data, in chksum_digest() argument 53 return __chksum_finup(0, data, length, out); in chksum_digest()
|
D | crct10dif_generic.c | 51 static int chksum_update(struct shash_desc *desc, const u8 *data, in chksum_update() argument 56 ctx->crc = crc_t10dif_generic(ctx->crc, data, length); in chksum_update() 68 static int __chksum_finup(__u16 crc, const u8 *data, unsigned int len, u8 *out) in __chksum_finup() argument 70 *(__u16 *)out = crc_t10dif_generic(crc, data, len); in __chksum_finup() 74 static int chksum_finup(struct shash_desc *desc, const u8 *data, in chksum_finup() argument 79 return __chksum_finup(ctx->crc, data, len, out); in chksum_finup() 82 static int chksum_digest(struct shash_desc *desc, const u8 *data, in chksum_digest() argument 85 return __chksum_finup(0, data, length, out); in chksum_digest()
|
D | shash.c | 90 static int shash_update_unaligned(struct shash_desc *desc, const u8 *data, in shash_update_unaligned() argument 97 ((unsigned long)data & alignmask); in shash_update_unaligned() 112 memcpy(buf, data, unaligned_len); in shash_update_unaligned() 117 shash->update(desc, data + unaligned_len, len - unaligned_len); in shash_update_unaligned() 120 int crypto_shash_update(struct shash_desc *desc, const u8 *data, in crypto_shash_update() argument 131 if ((unsigned long)data & alignmask) in crypto_shash_update() 132 err = shash_update_unaligned(desc, data, len); in crypto_shash_update() 134 err = shash->update(desc, data, len); in crypto_shash_update() 187 static int shash_finup_unaligned(struct shash_desc *desc, const u8 *data, in shash_finup_unaligned() argument 190 return shash_update_unaligned(desc, data, len) ?: in shash_finup_unaligned() [all …]
|
D | crc32_generic.c | 57 static int crc32_update(struct shash_desc *desc, const u8 *data, in crc32_update() argument 62 *crcp = crc32_le(*crcp, data, len); in crc32_update() 67 static int __crc32_finup(u32 *crcp, const u8 *data, unsigned int len, in __crc32_finup() argument 70 put_unaligned_le32(crc32_le(*crcp, data, len), out); in __crc32_finup() 74 static int crc32_finup(struct shash_desc *desc, const u8 *data, in crc32_finup() argument 77 return __crc32_finup(shash_desc_ctx(desc), data, len, out); in crc32_finup() 88 static int crc32_digest(struct shash_desc *desc, const u8 *data, in crc32_digest() argument 91 return __crc32_finup(crypto_shash_ctx(desc->tfm), data, len, in crc32_digest()
|
D | sig.c | 95 struct crypto_akcipher_sync_data data = { in crypto_sig_sign() local 103 return crypto_akcipher_sync_prep(&data) ?: in crypto_sig_sign() 104 crypto_akcipher_sync_post(&data, in crypto_sig_sign() 105 crypto_akcipher_sign(data.req)); in crypto_sig_sign() 114 struct crypto_akcipher_sync_data data = { in crypto_sig_verify() local 122 err = crypto_akcipher_sync_prep(&data); in crypto_sig_verify() 126 memcpy(data.buf + slen, digest, dlen); in crypto_sig_verify() 128 return crypto_akcipher_sync_post(&data, in crypto_sig_verify() 129 crypto_akcipher_verify(data.req)); in crypto_sig_verify()
|
D | algboss.c | 28 struct crypto_attr_type data; member 33 struct crypto_attr_alg data; member 50 static int cryptomgr_probe(void *data) in cryptomgr_probe() argument 52 struct cryptomgr_param *param = data; in cryptomgr_probe() 126 memcpy(param->attrs[i].data.name, name, len); in cryptomgr_schedule_probe() 148 param->type.data.type = larval->alg.cra_flags & ~CRYPTO_ALG_TESTED; in cryptomgr_schedule_probe() 149 param->type.data.mask = larval->mask & ~CRYPTO_ALG_TESTED; in cryptomgr_schedule_probe() 174 static int cryptomgr_test(void *data) in cryptomgr_test() argument 176 struct crypto_test_param *param = data; in cryptomgr_test() 222 void *data) in cryptomgr_notify() argument [all …]
|
D | crc32c_generic.c | 83 static int chksum_update(struct shash_desc *desc, const u8 *data, in chksum_update() argument 88 ctx->crc = __crc32c_le(ctx->crc, data, length); in chksum_update() 100 static int __chksum_finup(u32 *crcp, const u8 *data, unsigned int len, u8 *out) in __chksum_finup() argument 102 put_unaligned_le32(~__crc32c_le(*crcp, data, len), out); in __chksum_finup() 106 static int chksum_finup(struct shash_desc *desc, const u8 *data, in chksum_finup() argument 111 return __chksum_finup(&ctx->crc, data, len, out); in chksum_finup() 114 static int chksum_digest(struct shash_desc *desc, const u8 *data, in chksum_digest() argument 119 return __chksum_finup(&mctx->key, data, length, out); in chksum_digest()
|
D | seqiv.c | 39 static void seqiv_aead_encrypt_complete(void *data, int err) in seqiv_aead_encrypt_complete() argument 41 struct aead_request *req = data; in seqiv_aead_encrypt_complete() 53 void *data; in seqiv_aead_encrypt() local 64 data = req->base.data; in seqiv_aead_encrypt() 91 data = req; in seqiv_aead_encrypt() 94 aead_request_set_callback(subreq, req->base.flags, compl, data); in seqiv_aead_encrypt() 114 void *data; in seqiv_aead_decrypt() local 123 data = req->base.data; in seqiv_aead_decrypt() 125 aead_request_set_callback(subreq, req->base.flags, compl, data); in seqiv_aead_decrypt()
|
D | adiantum.c | 127 } *data; in adiantum_setkey() local 141 data = kzalloc(sizeof(*data) + in adiantum_setkey() 143 if (!data) in adiantum_setkey() 145 data->iv[0] = 1; in adiantum_setkey() 146 sg_init_one(&data->sg, data->derived_keys, sizeof(data->derived_keys)); in adiantum_setkey() 147 crypto_init_wait(&data->wait); in adiantum_setkey() 148 skcipher_request_set_tfm(&data->req, tctx->streamcipher); in adiantum_setkey() 149 skcipher_request_set_callback(&data->req, CRYPTO_TFM_REQ_MAY_SLEEP | in adiantum_setkey() 151 crypto_req_done, &data->wait); in adiantum_setkey() 152 skcipher_request_set_crypt(&data->req, &data->sg, &data->sg, in adiantum_setkey() [all …]
|
D | cryptd.c | 85 void *data; member 249 req->base.data = subreq->base.data; in cryptd_skcipher_prepare() 281 subreq->base.data = req->base.data; in cryptd_skcipher_complete() 283 req->base.data = req; in cryptd_skcipher_complete() 288 static void cryptd_skcipher_encrypt(void *data, int err) in cryptd_skcipher_encrypt() argument 290 struct skcipher_request *req = data; in cryptd_skcipher_encrypt() 300 static void cryptd_skcipher_decrypt(void *data, int err) in cryptd_skcipher_decrypt() argument 302 struct skcipher_request *req = data; in cryptd_skcipher_decrypt() 322 subreq->base.data = req->base.data; in cryptd_skcipher_enqueue() 324 req->base.data = req; in cryptd_skcipher_enqueue() [all …]
|
D | gcm.c | 106 } *data; in crypto_gcm_setkey() local 116 data = kzalloc(sizeof(*data) + crypto_skcipher_reqsize(ctr), in crypto_gcm_setkey() 118 if (!data) in crypto_gcm_setkey() 121 crypto_init_wait(&data->wait); in crypto_gcm_setkey() 122 sg_init_one(data->sg, &data->hash, sizeof(data->hash)); in crypto_gcm_setkey() 123 skcipher_request_set_tfm(&data->req, ctr); in crypto_gcm_setkey() 124 skcipher_request_set_callback(&data->req, CRYPTO_TFM_REQ_MAY_SLEEP | in crypto_gcm_setkey() 127 &data->wait); in crypto_gcm_setkey() 128 skcipher_request_set_crypt(&data->req, data->sg, data->sg, in crypto_gcm_setkey() 129 sizeof(data->hash), data->iv); in crypto_gcm_setkey() [all …]
|
D | sm3_generic.c | 30 static int crypto_sm3_update(struct shash_desc *desc, const u8 *data, in crypto_sm3_update() argument 33 sm3_update(shash_desc_ctx(desc), data, len); in crypto_sm3_update() 43 static int crypto_sm3_finup(struct shash_desc *desc, const u8 *data, in crypto_sm3_finup() argument 49 sm3_update(sctx, data, len); in crypto_sm3_finup()
|
/crypto/async_tx/ |
D | raid6test.c | 23 static struct page *data[NDISKS+3]; variable 40 get_random_bytes(page_address(data[i]), PAGE_SIZE); in makedata() 41 dataptrs[i] = data[i]; in makedata() 139 erra = memcmp(page_address(data[i]), page_address(recovi), PAGE_SIZE); in test_disks() 140 errb = memcmp(page_address(data[j]), page_address(recovj), PAGE_SIZE); in test_disks() 146 dataptrs[i] = data[i]; in test_disks() 147 dataptrs[j] = data[j]; in test_disks() 160 recovi = data[disks]; in test() 161 recovj = data[disks+1]; in test() 162 spare = data[disks+2]; in test() [all …]
|
/crypto/asymmetric_keys/ |
D | pkcs8_parser.c | 22 unsigned long data; /* Start of data */ member 45 (unsigned long)value - ctx->data, buffer); in pkcs8_note_OID() 97 static struct public_key *pkcs8_parse(const void *data, size_t datalen) in pkcs8_parse() argument 110 ctx.data = (unsigned long)data; in pkcs8_parse() 113 ret = asn1_ber_decoder(&pkcs8_decoder, &ctx, data, datalen); in pkcs8_parse() 140 pub = pkcs8_parse(prep->data, prep->datalen); in pkcs8_key_preparse() 149 prep->payload.data[asym_subtype] = &public_key_subtype; in pkcs8_key_preparse() 150 prep->payload.data[asym_key_ids] = NULL; in pkcs8_key_preparse() 151 prep->payload.data[asym_crypto] = pub; in pkcs8_key_preparse() 152 prep->payload.data[asym_auth] = NULL; in pkcs8_key_preparse()
|
D | asymmetric_type.c | 66 lookup = id_0->data; in find_asymmetric_key() 69 lookup = id_1->data; in find_asymmetric_key() 72 lookup = id_2->data; in find_asymmetric_key() 159 memcpy(kid->data, val_1, len_1); in asymmetric_key_generate_id() 160 memcpy(kid->data + len_1, val_2, len_2); in asymmetric_key_generate_id() 177 return memcmp(kid1->data, kid2->data, kid1->len) == 0; in asymmetric_key_id_same() 194 return memcmp(kid1->data + (kid1->len - kid2->len), in asymmetric_key_id_partial() 195 kid2->data, kid2->len) == 0; in asymmetric_key_id_partial() 227 return hex2bin(match_id->data, id, hexlen); in __asymmetric_key_hex_to_key_id() 380 p = kid->data; in asymmetric_key_describe() [all …]
|
D | signature.c | 55 !key->payload.data[0]) in query_asymmetric_key() 81 const void *data, void *enc) in encrypt_blob() argument 84 return asymmetric_key_eds_op(params, data, enc); in encrypt_blob() 102 const void *enc, void *data) in decrypt_blob() argument 105 return asymmetric_key_eds_op(params, enc, data); in decrypt_blob() 123 const void *data, void *enc) in create_signature() argument 126 return asymmetric_key_eds_op(params, data, enc); in create_signature() 149 !key->payload.data[0]) in verify_signature()
|
D | pkcs7_key_type.c | 28 static int pkcs7_view_content(void *ctx, const void *data, size_t len, in pkcs7_view_content() argument 36 saved_prep_data = prep->data; in pkcs7_view_content() 38 prep->data = data; in pkcs7_view_content() 43 prep->data = saved_prep_data; in pkcs7_view_content() 61 prep->data, prep->datalen, in pkcs7_preparse()
|
D | x509_cert_parser.c | 21 unsigned long data; /* Start of data */ member 61 struct x509_certificate *x509_cert_parse(const void *data, size_t datalen) in x509_cert_parse() argument 83 ctx->data = (unsigned long)data; in x509_cert_parse() 86 ret = asn1_ber_decoder(&x509_decoder, ctx, data, datalen); in x509_cert_parse() 164 (unsigned long)value - ctx->data, buffer); in x509_note_OID() 180 hdrlen, tag, (unsigned long)value - ctx->data, vlen); in x509_note_tbs_certificate() 346 ctx->cn_offset = (unsigned long)value - ctx->data; in x509_extract_name_segment() 350 ctx->o_offset = (unsigned long)value - ctx->data; in x509_extract_name_segment() 354 ctx->email_offset = (unsigned long)value - ctx->data; in x509_extract_name_segment() 370 const void *name, *data = (const void *)ctx->data; in x509_fabricate_name() local [all …]
|
D | pkcs7_verify.c | 62 ret = crypto_shash_digest(desc, pkcs7->data, pkcs7->data_len, in pkcs7_digest() 186 sinfo->sig->auth_ids[0]->len, sinfo->sig->auth_ids[0]->data); in pkcs7_find_key() 227 sig->auth_ids[0]->len, sig->auth_ids[0]->data); in pkcs7_verify_sig_chain() 230 sig->auth_ids[1]->len, sig->auth_ids[1]->data); in pkcs7_verify_sig_chain() 250 pr_debug("- want %*phN\n", auth->len, auth->data); in pkcs7_verify_sig_chain() 253 p->index, p->id->len, p->id->data); in pkcs7_verify_sig_chain() 259 pr_debug("- want %*phN\n", auth->len, auth->data); in pkcs7_verify_sig_chain() 264 p->index, p->skid->len, p->skid->data); in pkcs7_verify_sig_chain() 478 const void *data, size_t datalen) in pkcs7_supply_detached_data() argument 480 if (pkcs7->data) { in pkcs7_supply_detached_data() [all …]
|
D | selftest.c | 15 const u8 *data; member 174 #define TEST(data, pkcs7) { data, sizeof(data) - 1, pkcs7, sizeof(pkcs7) - 1 } argument 210 pkcs7_supply_detached_data(pkcs7, test->data, test->data_len); in fips_signature_selftest()
|