| /crypto/ |
| A D | proc.c | 37 static int c_show(struct seq_file *m, void *p) in c_show() argument 46 seq_printf(m, "selftest : %s\n", in c_show() 49 seq_printf(m, "internal : %s\n", in c_show() 52 seq_printf(m, "fips : %s\n", in c_show() 56 seq_printf(m, "type : larval\n"); in c_show() 62 alg->cra_type->show(m, alg); in c_show() 68 seq_printf(m, "type : cipher\n"); in c_show() 70 seq_printf(m, "min keysize : %u\n", in c_show() 72 seq_printf(m, "max keysize : %u\n", in c_show() 76 seq_printf(m, "type : unknown\n"); in c_show() [all …]
|
| A D | rsa.c | 58 if (rsa_check_payload(m, key->n)) in _rsa_enc() 62 return mpi_powm(c, m, key->e, key->n); in _rsa_enc() 124 MPI m, c = mpi_alloc(0); in rsa_enc() local 137 m = mpi_read_raw_from_sgl(req->src, req->src_len); in rsa_enc() 138 if (!m) in rsa_enc() 141 ret = _rsa_enc(pkey, c, m); in rsa_enc() 153 mpi_free(m); in rsa_enc() 163 MPI c, m = mpi_alloc(0); in rsa_dec() local 167 if (!m) in rsa_dec() 180 ret = _rsa_dec_crt(pkey, m, c); in rsa_dec() [all …]
|
| A D | aegis128-neon-inner.c | 108 uint8x16_t m) in aegis128_update_neon() argument 110 m ^= aegis_aes_round(st.v[4]); in aegis128_update_neon() 115 st.v[0] ^= m; in aegis128_update_neon() 249 uint8x16_t m; in crypto_aegis128_encrypt_chunk_neon() local 254 m = vqtbl1q_u8(vld1q_u8(in + size - AEGIS_BLOCK_SIZE), in crypto_aegis128_encrypt_chunk_neon() 257 st = aegis128_update_neon(st, m); in crypto_aegis128_encrypt_chunk_neon() 260 vqtbl1q_u8(m ^ s, vld1q_u8(permute + size))); in crypto_aegis128_encrypt_chunk_neon() 295 uint8x16_t m; in crypto_aegis128_decrypt_chunk_neon() local 300 m = s ^ vqtbx1q_u8(s, vld1q_u8(in + size - AEGIS_BLOCK_SIZE), in crypto_aegis128_decrypt_chunk_neon() 303 st = aegis128_update_neon(st, m); in crypto_aegis128_decrypt_chunk_neon() [all …]
|
| A D | streebog_generic.c | 943 const struct streebog_uint512 *m) in streebog_g() argument 952 streebog_xlps(&Ki, m, &data); in streebog_g() 962 streebog_xor(&data, m, h); in streebog_g() 967 struct streebog_uint512 m; in streebog_stage2() local 969 memcpy(&m, data, sizeof(m)); in streebog_stage2() 971 streebog_g(&ctx->h, &ctx->N, &m); in streebog_stage2() 974 streebog_add512(&ctx->Sigma, &m, &ctx->Sigma); in streebog_stage2() 983 struct streebog_uint512 m; in streebog_stage3() member 990 streebog_g(&ctx->h, &ctx->N, &u.m); in streebog_stage3() 992 streebog_add512(&ctx->Sigma, &u.m, &ctx->Sigma); in streebog_stage3()
|
| A D | aead.c | 153 static void crypto_aead_show(struct seq_file *m, struct crypto_alg *alg) 155 static void crypto_aead_show(struct seq_file *m, struct crypto_alg *alg) in crypto_aead_show() argument 159 seq_printf(m, "type : aead\n"); in crypto_aead_show() 160 seq_printf(m, "async : %s\n", in crypto_aead_show() 162 seq_printf(m, "blocksize : %u\n", alg->cra_blocksize); in crypto_aead_show() 163 seq_printf(m, "ivsize : %u\n", aead->ivsize); in crypto_aead_show() 164 seq_printf(m, "maxauthsize : %u\n", aead->maxauthsize); in crypto_aead_show() 165 seq_printf(m, "geniv : <none>\n"); in crypto_aead_show()
|
| A D | blake2b_generic.c | 48 a = a + b + m[blake2b_sigma[r][2*i+0]]; \ 52 a = a + b + m[blake2b_sigma[r][2*i+1]]; \ 73 u64 m[16]; in blake2b_compress_one_generic() local 78 m[i] = get_unaligned_le64(block + i * sizeof(m[i])); in blake2b_compress_one_generic()
|
| A D | twofish_common.c | 535 #define CALC_K(a, j, k, l, m, n) \ argument 537 y = CALC_K_2 (m, n, m, n, 4); \ 548 #define CALC_K192(a, j, k, l, m, n) \ argument 550 y = CALC_K192_2 (n, n, m, m, 4); \ 561 #define CALC_K256(a, j, k, l, m, n) \ argument 563 y = CALC_K256_2 (m, n, 4); \
|
| A D | skcipher.c | 322 static void crypto_skcipher_show(struct seq_file *m, struct crypto_alg *alg) 324 static void crypto_skcipher_show(struct seq_file *m, struct crypto_alg *alg) in crypto_skcipher_show() argument 328 seq_printf(m, "type : skcipher\n"); in crypto_skcipher_show() 329 seq_printf(m, "async : %s\n", in crypto_skcipher_show() 331 seq_printf(m, "blocksize : %u\n", alg->cra_blocksize); in crypto_skcipher_show() 332 seq_printf(m, "min keysize : %u\n", skcipher->min_keysize); in crypto_skcipher_show() 333 seq_printf(m, "max keysize : %u\n", skcipher->max_keysize); in crypto_skcipher_show() 334 seq_printf(m, "ivsize : %u\n", skcipher->ivsize); in crypto_skcipher_show() 335 seq_printf(m, "chunksize : %u\n", skcipher->chunksize); in crypto_skcipher_show() 336 seq_printf(m, "walksize : %u\n", skcipher->walksize); in crypto_skcipher_show() [all …]
|
| A D | twofish_generic.c | 85 #define INPACK(n, x, m) \ argument 86 x = get_unaligned_le32(in + (n) * 4) ^ ctx->w[m] 88 #define OUTUNPACK(n, x, m) \ argument 89 x ^= ctx->w[m]; \
|
| A D | rng.c | 80 static void crypto_rng_show(struct seq_file *m, struct crypto_alg *alg) 82 static void crypto_rng_show(struct seq_file *m, struct crypto_alg *alg) in crypto_rng_show() argument 84 seq_printf(m, "type : rng\n"); in crypto_rng_show() 85 seq_printf(m, "seedsize : %u\n", seedsize(alg)); in crypto_rng_show()
|
| A D | kpp.c | 32 static void crypto_kpp_show(struct seq_file *m, struct crypto_alg *alg) 35 static void crypto_kpp_show(struct seq_file *m, struct crypto_alg *alg) in crypto_kpp_show() argument 37 seq_puts(m, "type : kpp\n"); in crypto_kpp_show()
|
| A D | cast6_generic.c | 27 #define F1(D, r, m) ((I = ((m) + (D))), (I = rol32(I, (r))), \ argument 29 #define F2(D, r, m) ((I = ((m) ^ (D))), (I = rol32(I, (r))), \ argument 31 #define F3(D, r, m) ((I = ((m) - (D))), (I = rol32(I, (r))), \ argument
|
| A D | lskcipher.c | 250 struct seq_file *m, struct crypto_alg *alg) in crypto_lskcipher_show() argument 254 seq_printf(m, "type : lskcipher\n"); in crypto_lskcipher_show() 255 seq_printf(m, "blocksize : %u\n", alg->cra_blocksize); in crypto_lskcipher_show() 256 seq_printf(m, "min keysize : %u\n", skcipher->co.min_keysize); in crypto_lskcipher_show() 257 seq_printf(m, "max keysize : %u\n", skcipher->co.max_keysize); in crypto_lskcipher_show() 258 seq_printf(m, "ivsize : %u\n", skcipher->co.ivsize); in crypto_lskcipher_show() 259 seq_printf(m, "chunksize : %u\n", skcipher->co.chunksize); in crypto_lskcipher_show() 260 seq_printf(m, "statesize : %u\n", skcipher->co.statesize); in crypto_lskcipher_show()
|
| A D | testmgr.h | 676 .m = 708 .m = 740 .m = 772 .m = 805 .m = 844 .m = 877 .m = 910 .m = 943 .m = 977 .m = [all …]
|
| A D | akcipher.c | 49 static void crypto_akcipher_show(struct seq_file *m, struct crypto_alg *alg) 52 static void crypto_akcipher_show(struct seq_file *m, struct crypto_alg *alg) in crypto_akcipher_show() argument 54 seq_puts(m, "type : akcipher\n"); in crypto_akcipher_show()
|
| A D | cast5_generic.c | 295 #define F1(D, m, r) ((I = ((m) + (D))), (I = rol32(I, (r))), \ argument 297 #define F2(D, m, r) ((I = ((m) ^ (D))), (I = rol32(I, (r))), \ argument 299 #define F3(D, m, r) ((I = ((m) - (D))), (I = rol32(I, (r))), \ argument
|
| A D | sig.c | 47 static void __maybe_unused crypto_sig_show(struct seq_file *m, in crypto_sig_show() argument 50 seq_puts(m, "type : sig\n"); in crypto_sig_show()
|
| A D | shash.c | 349 static void crypto_shash_show(struct seq_file *m, struct crypto_alg *alg) 351 static void crypto_shash_show(struct seq_file *m, struct crypto_alg *alg) in crypto_shash_show() argument 355 seq_printf(m, "type : shash\n"); in crypto_shash_show() 356 seq_printf(m, "blocksize : %u\n", alg->cra_blocksize); in crypto_shash_show() 357 seq_printf(m, "digestsize : %u\n", salg->digestsize); in crypto_shash_show()
|
| A D | scompress.c | 61 static void crypto_scomp_show(struct seq_file *m, struct crypto_alg *alg) 64 static void crypto_scomp_show(struct seq_file *m, struct crypto_alg *alg) in crypto_scomp_show() argument 66 seq_puts(m, "type : scomp\n"); in crypto_scomp_show()
|
| A D | ahash.c | 790 static void crypto_ahash_show(struct seq_file *m, struct crypto_alg *alg) 792 static void crypto_ahash_show(struct seq_file *m, struct crypto_alg *alg) in crypto_ahash_show() argument 794 seq_printf(m, "type : ahash\n"); in crypto_ahash_show() 795 seq_printf(m, "async : %s\n", in crypto_ahash_show() 797 seq_printf(m, "blocksize : %u\n", alg->cra_blocksize); in crypto_ahash_show() 798 seq_printf(m, "digestsize : %u\n", in crypto_ahash_show()
|
| A D | ecc.c | 378 unsigned __int128 m = (unsigned __int128)left * right; in mul_64_64() local 380 result.m_low = m; in mul_64_64() 381 result.m_high = m >> 64; in mul_64_64() 594 u64 m[ECC_MAX_DIGITS * 2]; /* expanded mod */ in vli_mmod_special2() local 598 vli_set(m, mod, ndigits); in vli_mmod_special2() 599 vli_clear(m + ndigits, ndigits); in vli_mmod_special2() 625 vli_add(r, r, m, ndigits * 2); in vli_mmod_special2() 626 while (vli_cmp(r, m, ndigits * 2) >= 0) in vli_mmod_special2() 627 vli_sub(r, r, m, ndigits * 2); in vli_mmod_special2()
|
| A D | acompress.c | 63 static void crypto_acomp_show(struct seq_file *m, struct crypto_alg *alg) 66 static void crypto_acomp_show(struct seq_file *m, struct crypto_alg *alg) in crypto_acomp_show() argument 68 seq_puts(m, "type : acomp\n"); in crypto_acomp_show()
|
| A D | internal.h | 40 void (*show)(struct seq_file *m, struct crypto_alg *alg);
|
| /crypto/asymmetric_keys/ |
| A D | asymmetric_type.c | 353 static void asymmetric_key_describe(const struct key *key, struct seq_file *m) in asymmetric_key_describe() argument 361 seq_puts(m, key->description); in asymmetric_key_describe() 364 seq_puts(m, ": "); in asymmetric_key_describe() 365 subtype->describe(key, m); in asymmetric_key_describe() 369 seq_putc(m, ' '); in asymmetric_key_describe() 376 seq_printf(m, "%*phN", n, p); in asymmetric_key_describe() 379 seq_puts(m, " ["); in asymmetric_key_describe() 381 seq_putc(m, ']'); in asymmetric_key_describe()
|
| A D | public_key.c | 31 struct seq_file *m) in public_key_describe() argument 36 seq_printf(m, "%s.%s", key->id_type, key->pkey_algo); in public_key_describe()
|