| /crypto/ |
| A D | jitterentropy-testing.c | 43 spin_lock_irqsave(&data->lock, flags); in jent_testing_reset() 44 data->rb_reader = 0; in jent_testing_reset() 45 atomic_set(&data->rb_writer, 0); in jent_testing_reset() 59 jent_testing_reset(data); in jent_testing_data_init() 71 jent_testing_reset(data); in jent_testing_fini() 102 data->jent_testing_rb[((u32)atomic_read(&data->rb_writer)) & in jent_testing_store() 104 atomic_inc(&data->rb_writer); in jent_testing_store() 127 jent_testing_data_init(data, *boot); in jent_testing_reader() 164 memcpy(outbuf, &data->jent_testing_rb[data->rb_reader], in jent_testing_reader() 166 data->rb_reader++; in jent_testing_reader() [all …]
|
| A D | akcipher.c | 180 mlen = max(data->slen, data->dlen); in crypto_akcipher_sync_prep() 190 data->req = req; in crypto_akcipher_sync_prep() 194 data->buf = buf; in crypto_akcipher_sync_prep() 195 memcpy(buf, data->src, data->slen); in crypto_akcipher_sync_prep() 197 sg = &data->sg; in crypto_akcipher_sync_prep() 199 akcipher_request_set_crypt(req, sg, sg, data->slen, data->dlen); in crypto_akcipher_sync_prep() 201 crypto_init_wait(&data->cwait); in crypto_akcipher_sync_prep() 212 memcpy(data->dst, data->buf, data->dlen); in crypto_akcipher_sync_post() 213 data->dlen = data->req->dst_len; in crypto_akcipher_sync_post() 214 kfree_sensitive(data->req); in crypto_akcipher_sync_post() [all …]
|
| A D | streebog_generic.c | 906 streebog_xlps(Ki, data, data); in streebog_round() 948 streebog_xlps(h, N, &data); in streebog_g() 951 Ki = data; in streebog_g() 952 streebog_xlps(&Ki, m, &data); in streebog_g() 955 streebog_round(i, &Ki, &data); in streebog_g() 958 streebog_xor(&Ki, &data, &data); in streebog_g() 961 streebog_xor(&data, h, &data); in streebog_g() 962 streebog_xor(&data, m, h); in streebog_g() 969 memcpy(&m, data, sizeof(m)); in streebog_stage2() 1005 streebog_stage2(ctx, data); in streebog_update() [all …]
|
| A D | michael_mic.c | 59 static int michael_update(struct shash_desc *desc, const u8 *data, in michael_update() argument 68 memcpy((u8 *)&mctx->pending + mctx->pending_len, data, flen); in michael_update() 70 data += flen; in michael_update() 82 mctx->l ^= get_unaligned_le32(data); in michael_update() 84 data += 4; in michael_update() 90 memcpy(&mctx->pending, data, len); in michael_update() 100 u8 *data = (u8 *)&mctx->pending; in michael_final() local 108 mctx->l ^= data[0] | 0x5a00; in michael_final() 111 mctx->l ^= data[0] | (data[1] << 8) | 0x5a0000; in michael_final() 114 mctx->l ^= data[0] | (data[1] << 8) | (data[2] << 16) | in michael_final()
|
| A D | blowfish_common.c | 351 u32 data[2], temp; in blowfish_setkey() local 373 data[0] = 0x00000000; in blowfish_setkey() 374 data[1] = 0x00000000; in blowfish_setkey() 377 encrypt_block((struct bf_ctx *)ctx, data, data); in blowfish_setkey() 379 P[i] = data[0]; in blowfish_setkey() 380 P[i + 1] = data[1]; in blowfish_setkey() 385 encrypt_block((struct bf_ctx *)ctx, data, data); in blowfish_setkey() 387 S[count] = data[0]; in blowfish_setkey() 388 S[count + 1] = data[1]; in blowfish_setkey()
|
| A D | crc32.c | 57 static int crc32_update(struct shash_desc *desc, const u8 *data, in crc32_update() argument 62 *crcp = crc32_le(*crcp, data, len); in crc32_update() 67 static int __crc32_finup(u32 *crcp, const u8 *data, unsigned int len, u8 *out) in __crc32_finup() argument 69 put_unaligned_le32(crc32_le(*crcp, data, len), out); in __crc32_finup() 73 static int crc32_finup(struct shash_desc *desc, const u8 *data, in crc32_finup() argument 76 return __crc32_finup(shash_desc_ctx(desc), data, len, out); in crc32_finup() 87 static int crc32_digest(struct shash_desc *desc, const u8 *data, in crc32_digest() argument 90 return __crc32_finup(crypto_shash_ctx(desc->tfm), data, len, out); in crc32_digest()
|
| A D | algboss.c | 28 struct crypto_attr_type data; member 33 struct crypto_attr_alg data; member 50 static int cryptomgr_probe(void *data) in cryptomgr_probe() argument 52 struct cryptomgr_param *param = data; in cryptomgr_probe() 128 memcpy(param->attrs[i].data.name, name, len); in cryptomgr_schedule_probe() 148 param->type.data.mask = larval->mask & ~CRYPTO_ALG_TESTED; in cryptomgr_schedule_probe() 173 static int cryptomgr_test(void *data) in cryptomgr_test() argument 175 struct crypto_test_param *param = data; in cryptomgr_test() 221 void *data) in cryptomgr_notify() argument 225 return cryptomgr_schedule_probe(data); in cryptomgr_notify() [all …]
|
| A D | sha512.c | 74 const u8 *data, unsigned int len) in crypto_sha384_update() argument 76 sha384_update(SHA384_CTX(desc), data, len); in crypto_sha384_update() 87 const u8 *data, unsigned int len, u8 *out) in crypto_sha384_digest() argument 89 sha384(data, len, out); in crypto_sha384_digest() 126 const u8 *data, unsigned int len) in crypto_sha512_update() argument 128 sha512_update(SHA512_CTX(desc), data, len); in crypto_sha512_update() 141 sha512(data, len, out); in crypto_sha512_digest() 174 const u8 *data, unsigned int len) in crypto_hmac_sha384_update() argument 187 const u8 *data, unsigned int len, in crypto_hmac_sha384_digest() argument 226 const u8 *data, unsigned int len) in crypto_hmac_sha512_update() argument [all …]
|
| A D | sha256.c | 72 const u8 *data, unsigned int len) in crypto_sha224_update() argument 74 sha224_update(SHA224_CTX(desc), data, len); in crypto_sha224_update() 85 const u8 *data, unsigned int len, u8 *out) in crypto_sha224_digest() argument 87 sha224(data, len, out); in crypto_sha224_digest() 120 const u8 *data, unsigned int len) in crypto_sha256_update() argument 122 sha256_update(SHA256_CTX(desc), data, len); in crypto_sha256_update() 135 sha256(data, len, out); in crypto_sha256_digest() 168 const u8 *data, unsigned int len) in crypto_hmac_sha224_update() argument 181 const u8 *data, unsigned int len, in crypto_hmac_sha224_digest() argument 220 const u8 *data, unsigned int len) in crypto_hmac_sha256_update() argument [all …]
|
| A D | seqiv.c | 39 static void seqiv_aead_encrypt_complete(void *data, int err) in seqiv_aead_encrypt_complete() argument 41 struct aead_request *req = data; in seqiv_aead_encrypt_complete() 53 void *data; in seqiv_aead_encrypt() local 64 data = req->base.data; in seqiv_aead_encrypt() 80 data = req; in seqiv_aead_encrypt() 83 aead_request_set_callback(subreq, req->base.flags, compl, data); in seqiv_aead_encrypt() 103 void *data; in seqiv_aead_decrypt() local 112 data = req->base.data; in seqiv_aead_decrypt() 114 aead_request_set_callback(subreq, req->base.flags, compl, data); in seqiv_aead_decrypt()
|
| A D | crc32c.c | 83 static int chksum_update(struct shash_desc *desc, const u8 *data, in chksum_update() argument 88 ctx->crc = crc32c(ctx->crc, data, length); in chksum_update() 100 static int __chksum_finup(u32 *crcp, const u8 *data, unsigned int len, u8 *out) in __chksum_finup() argument 102 put_unaligned_le32(~crc32c(*crcp, data, len), out); in __chksum_finup() 106 static int chksum_finup(struct shash_desc *desc, const u8 *data, in chksum_finup() argument 111 return __chksum_finup(&ctx->crc, data, len, out); in chksum_finup() 114 static int chksum_digest(struct shash_desc *desc, const u8 *data, in chksum_digest() argument 119 return __chksum_finup(&mctx->key, data, length, out); in chksum_digest()
|
| A D | adiantum.c | 127 } *data; in adiantum_setkey() local 141 data = kzalloc(sizeof(*data) + in adiantum_setkey() 143 if (!data) in adiantum_setkey() 145 data->iv[0] = 1; in adiantum_setkey() 146 sg_init_one(&data->sg, data->derived_keys, sizeof(data->derived_keys)); in adiantum_setkey() 152 skcipher_request_set_crypt(&data->req, &data->sg, &data->sg, in adiantum_setkey() 153 sizeof(data->derived_keys), data->iv); in adiantum_setkey() 154 err = crypto_wait_req(crypto_skcipher_encrypt(&data->req), &data->wait); in adiantum_setkey() 157 keyp = data->derived_keys; in adiantum_setkey() 179 WARN_ON(keyp != &data->derived_keys[ARRAY_SIZE(data->derived_keys)]); in adiantum_setkey() [all …]
|
| A D | cryptd.c | 86 void *data; member 255 req->base.data = subreq->base.data; in cryptd_skcipher_prepare() 287 subreq->base.data = req->base.data; in cryptd_skcipher_complete() 328 subreq->base.data = req->base.data; in cryptd_skcipher_enqueue() 330 req->base.data = req; in cryptd_skcipher_enqueue() 498 rctx->data = req->base.data; in cryptd_hash_enqueue() 500 req->base.data = req; in cryptd_hash_enqueue() 511 req->base.data = rctx->data; in cryptd_hash_prepare() 757 req->base.data = subreq->base.data; in cryptd_aead_crypt() 783 subreq->base.data = req->base.data; in cryptd_aead_crypt() [all …]
|
| A D | gcm.c | 102 } *data; in crypto_gcm_setkey() local 112 data = kzalloc(sizeof(*data) + crypto_skcipher_reqsize(ctr), in crypto_gcm_setkey() 114 if (!data) in crypto_gcm_setkey() 117 crypto_init_wait(&data->wait); in crypto_gcm_setkey() 118 sg_init_one(data->sg, &data->hash, sizeof(data->hash)); in crypto_gcm_setkey() 123 &data->wait); in crypto_gcm_setkey() 124 skcipher_request_set_crypt(&data->req, data->sg, data->sg, in crypto_gcm_setkey() 125 sizeof(data->hash), data->iv); in crypto_gcm_setkey() 128 &data->wait); in crypto_gcm_setkey() 138 kfree_sensitive(data); in crypto_gcm_setkey() [all …]
|
| A D | ahash.c | 59 data = areq->saved_data; in ahash_op_done() 70 compl(data, err); in ahash_op_done() 80 walk->data += offset; in hash_walk_next() 114 walk->data = req->svirt; in crypto_hash_walk_first() 130 walk->data -= walk->offset; in crypto_hash_walk_done() 132 kunmap_local(walk->data); in crypto_hash_walk_done() 211 const u8 *data; in shash_ahash_digest() local 214 data = req->svirt; in shash_ahash_digest() 236 data = kmap_local_page(page); in shash_ahash_digest() 239 kunmap_local(data); in shash_ahash_digest() [all …]
|
| /crypto/krb5/ |
| A D | rfc6803_camellia.c | 31 struct krb5_buffer K, data; in rfc6803_calc_KDF_FEEDBACK_CMAC() local 53 crypto_roundup(data.len); in rfc6803_calc_KDF_FEEDBACK_CMAC() 61 K.data = buffer + in rfc6803_calc_KDF_FEEDBACK_CMAC() 64 data.data = buffer + in rfc6803_calc_KDF_FEEDBACK_CMAC() 69 p = data.data + K.len + 4; in rfc6803_calc_KDF_FEEDBACK_CMAC() 78 if (WARN_ON(p - (u8 *)data.data != data.len)) in rfc6803_calc_KDF_FEEDBACK_CMAC() 84 p = data.data; in rfc6803_calc_KDF_FEEDBACK_CMAC() 85 memcpy(p, K.data, K.len); in rfc6803_calc_KDF_FEEDBACK_CMAC() 92 ret = crypto_shash_finup(desc, data.data, data.len, K.data); in rfc6803_calc_KDF_FEEDBACK_CMAC() 97 memcpy(result->data + offset, K.data, seg); in rfc6803_calc_KDF_FEEDBACK_CMAC() [all …]
|
| A D | rfc3961_simplified.c | 123 memcpy(out->data, in->data, out->len); in rfc3961_do_encrypt() 168 ret = crypto_shash_finup(desc, data->data, data->len, digest->data); in rfc3961_calc_H() 299 outblock.data = inblock.data + blocksize; in rfc3961_calc_DK() 301 rawkey.data = outblock.data + blocksize; in rfc3961_calc_DK() 307 memcpy(inblock.data, in_constant->data, inblock.len); in rfc3961_calc_DK() 317 memcpy(rawkey.data + n, outblock.data, keybytes - n); in rfc3961_calc_DK() 321 memcpy(rawkey.data + n, outblock.data, outblock.len); in rfc3961_calc_DK() 322 memcpy(inblock.data, outblock.data, outblock.len); in rfc3961_calc_DK() 329 memcpy(result->data, rawkey.data, rawkey.len); in rfc3961_calc_DK() 415 tmp2.data = tmp1.data; in rfc3961_calc_PRF() [all …]
|
| A D | krb5_kdf.c | 51 T_series.data = buffer; in crypto_krb5_calc_PRFplus() 52 n_S.data = buffer + round16(L + Tn.len); in crypto_krb5_calc_PRFplus() 53 memcpy(n_S.data + 4, S->data, S->len); in crypto_krb5_calc_PRFplus() 56 *(__be32 *)(n_S.data) = htonl(n); in crypto_krb5_calc_PRFplus() 57 Tn.data = T_series.data + Tn.len * (n - 1); in crypto_krb5_calc_PRFplus() 66 memcpy(result->data, T_series.data, L); in crypto_krb5_calc_PRFplus() 90 struct krb5_buffer usage_constant = { .len = 5, .data = buf }; in krb5_derive_Kc() 114 struct krb5_buffer usage_constant = { .len = 5, .data = buf }; in krb5_derive_Ke() 138 struct krb5_buffer usage_constant = { .len = 5, .data = buf }; in krb5_derive_Ki()
|
| A D | rfc8009_aes2.c | 37 struct krb5_buffer K1, data; in rfc8009_calc_KDF_HMAC_SHA2() local 51 ret = crypto_shash_setkey(shash, key->data, key->len); in rfc8009_calc_KDF_HMAC_SHA2() 60 data.len = 4 + label->len + 1 + context->len + 4; in rfc8009_calc_KDF_HMAC_SHA2() 63 crypto_roundup(data.len); in rfc8009_calc_KDF_HMAC_SHA2() 74 p = data.data = buffer + in rfc8009_calc_KDF_HMAC_SHA2() 79 memcpy(p, label->data, label->len); in rfc8009_calc_KDF_HMAC_SHA2() 82 memcpy(p, context->data, context->len); in rfc8009_calc_KDF_HMAC_SHA2() 89 if (WARN_ON(p - (u8 *)data.data != data.len)) in rfc8009_calc_KDF_HMAC_SHA2() 93 K1.data = buffer + in rfc8009_calc_KDF_HMAC_SHA2() 96 ret = crypto_shash_finup(desc, data.data, data.len, K1.data); in rfc8009_calc_KDF_HMAC_SHA2() [all …]
|
| A D | selftest.c | 66 buf->data = kmalloc(buf->len, GFP_KERNEL); in prep_buf() 67 if (!buf->data) in prep_buf() 87 memcpy(buf->data, from + 1, len - 1); in load_buf() 96 ret = hex2bin(buf->data, from, buf->len); in load_buf() 109 kfree(buf->data); in clear_buf() 111 buf->data = NULL; in clear_buf() 145 if (memcmp(result.data, prf.data, result.len) != 0) { in krb5_test_one_prf() 197 if (memcmp(result.data, key.data, result.len) != 0) { in krb5_test_key() 288 memcpy(buf, conf.data, conf.len); in krb5_test_one_enc() 319 if (memcmp(buf, ct.data, ct.len) != 0) { in krb5_test_one_enc() [all …]
|
| /crypto/async_tx/ |
| A D | raid6test.c | 23 static struct page *data[NDISKS+3]; variable 41 dataptrs[i] = data[i]; in makedata() 146 dataptrs[i] = data[i]; in test_disks() 147 dataptrs[j] = data[j]; in test_disks() 160 recovi = data[disks]; in test() 161 recovj = data[disks+1]; in test() 162 spare = data[disks+2]; in test() 199 data[i] = alloc_page(GFP_KERNEL); in raid6_test() 200 if (!data[i]) { in raid6_test() 202 put_page(data[i]); in raid6_test() [all …]
|
| /crypto/asymmetric_keys/ |
| A D | pkcs8_parser.c | 22 unsigned long data; /* Start of data */ member 45 (unsigned long)value - ctx->data, buffer); in pkcs8_note_OID() 97 static struct public_key *pkcs8_parse(const void *data, size_t datalen) in pkcs8_parse() argument 110 ctx.data = (unsigned long)data; in pkcs8_parse() 113 ret = asn1_ber_decoder(&pkcs8_decoder, &ctx, data, datalen); in pkcs8_parse() 140 pub = pkcs8_parse(prep->data, prep->datalen); in pkcs8_key_preparse() 149 prep->payload.data[asym_subtype] = &public_key_subtype; in pkcs8_key_preparse() 150 prep->payload.data[asym_key_ids] = NULL; in pkcs8_key_preparse() 151 prep->payload.data[asym_crypto] = pub; in pkcs8_key_preparse() 152 prep->payload.data[asym_auth] = NULL; in pkcs8_key_preparse()
|
| A D | asymmetric_type.c | 54 lookup = id_0->data; in find_asymmetric_key() 57 lookup = id_1->data; in find_asymmetric_key() 60 lookup = id_2->data; in find_asymmetric_key() 150 memcpy(kid->data, val_1, len_1); in asymmetric_key_generate_id() 168 return memcmp(kid1->data, kid2->data, kid1->len) == 0; in asymmetric_key_id_same() 186 kid2->data, kid2->len) == 0; in asymmetric_key_id_partial() 371 p = kid->data; in asymmetric_key_describe() 447 prep->payload.data[asym_auth]); in asymmetric_key_free_preparse() 461 void *data = key->payload.data[asym_crypto]; in asymmetric_key_destroy() local 470 subtype->destroy(data, auth); in asymmetric_key_destroy() [all …]
|
| A D | pkcs7_key_type.c | 28 static int pkcs7_view_content(void *ctx, const void *data, size_t len, in pkcs7_view_content() argument 36 saved_prep_data = prep->data; in pkcs7_view_content() 38 prep->data = data; in pkcs7_view_content() 43 prep->data = saved_prep_data; in pkcs7_view_content() 61 prep->data, prep->datalen, in pkcs7_preparse()
|
| A D | x509_cert_parser.c | 21 unsigned long data; /* Start of data */ member 82 ctx->data = (unsigned long)data; in x509_cert_parse() 152 (unsigned long)value - ctx->data, buffer); in x509_note_OID() 366 const void *name, *data = (const void *)ctx->data; in x509_fabricate_name() local 386 name = data + ctx->cn_offset; in x509_fabricate_name() 388 memcmp(data + ctx->cn_offset, data + ctx->o_offset, in x509_fabricate_name() 393 memcmp(data + ctx->cn_offset, data + ctx->o_offset, 7) == 0) in x509_fabricate_name() 402 data + ctx->o_offset, ctx->o_size); in x509_fabricate_name() 412 name = data + ctx->cn_offset; in x509_fabricate_name() 415 name = data + ctx->o_offset; in x509_fabricate_name() [all …]
|