| /linux/tools/crypto/tcrypt/ |
| H A D | tcrypt_speed_compare.py | 61 alg = match.group(1) 63 return alg, op 94 alg, op = "", "" 101 alg, op = _alg, _op 102 if alg not in result: 103 result[alg] = {} 104 if op not in result[alg]: 105 result[alg][op] = [] 109 result[alg][op].append(parsed_result) 115 for alg in base.keys(): [all …]
|
| /linux/crypto/ |
| H A D | simd.c | 43 struct skcipher_alg alg; member 116 struct skcipher_alg *alg; in simd_skcipher_init() local 119 alg = crypto_skcipher_alg(tfm); in simd_skcipher_init() 120 salg = container_of(alg, struct simd_skcipher_alg, alg); in simd_skcipher_init() 145 struct skcipher_alg *alg; in simd_skcipher_create_compat() local 155 alg = &salg->alg; in simd_skcipher_create_compat() 158 if (snprintf(alg->base.cra_name, CRYPTO_MAX_ALG_NAME, "%s", algname) >= in simd_skcipher_create_compat() 162 if (snprintf(alg in simd_skcipher_create_compat() 261 struct aead_alg alg; global() member 342 struct aead_alg *alg; simd_aead_init() local 370 struct aead_alg *alg; simd_aead_create_compat() local [all...] |
| H A D | skcipher.c | 48 struct crypto_alg *alg) in __crypto_skcipher_alg() argument 50 return container_of(alg, struct skcipher_alg, base); in __crypto_skcipher_alg() 287 struct skcipher_alg *alg; in skcipher_walk_virt() local 291 alg = crypto_skcipher_alg(tfm); in skcipher_walk_virt() 312 if (alg->co.base.cra_type != &crypto_skcipher_type) in skcipher_walk_virt() 313 walk->stride = alg->co.chunksize; in skcipher_walk_virt() 315 walk->stride = alg->walksize; in skcipher_walk_virt() 438 struct skcipher_alg *alg = crypto_skcipher_alg(tfm); in crypto_skcipher_encrypt() local 442 if (alg->co.base.cra_type != &crypto_skcipher_type) in crypto_skcipher_encrypt() 444 return alg in crypto_skcipher_encrypt() 451 struct skcipher_alg *alg = crypto_skcipher_alg(tfm); crypto_skcipher_decrypt() local 500 struct skcipher_alg *alg = crypto_skcipher_alg(tfm); crypto_skcipher_export() local 511 struct skcipher_alg *alg = crypto_skcipher_alg(tfm); crypto_skcipher_import() local 522 struct skcipher_alg *alg = crypto_skcipher_alg(skcipher); crypto_skcipher_exit_tfm() local 530 struct skcipher_alg *alg = crypto_skcipher_alg(skcipher); crypto_skcipher_init_tfm() local 557 crypto_skcipher_extsize(struct crypto_alg * alg) crypto_skcipher_extsize() argument 575 crypto_skcipher_show(struct seq_file * m,struct crypto_alg * alg) crypto_skcipher_show() argument 592 crypto_skcipher_report(struct sk_buff * skb,struct crypto_alg * alg) crypto_skcipher_report() argument 675 skcipher_prepare_alg_common(struct skcipher_alg_common * alg) skcipher_prepare_alg_common() argument 692 skcipher_prepare_alg(struct skcipher_alg * alg) skcipher_prepare_alg() argument 719 crypto_register_skcipher(struct skcipher_alg * alg) crypto_register_skcipher() argument 732 crypto_unregister_skcipher(struct skcipher_alg * alg) crypto_unregister_skcipher() argument [all...] |
| H A D | aead.c | 112 struct aead_alg *alg = crypto_aead_alg(aead); in crypto_aead_exit_tfm() local 114 alg->exit(aead); in crypto_aead_exit_tfm() 120 struct aead_alg *alg = crypto_aead_alg(aead); in crypto_aead_init_tfm() local 125 aead->authsize = alg->maxauthsize; in crypto_aead_init_tfm() 127 if (alg->exit) in crypto_aead_init_tfm() 130 if (alg->init) in crypto_aead_init_tfm() 131 return alg->init(aead); in crypto_aead_init_tfm() 137 struct sk_buff *skb, struct crypto_alg *alg) in crypto_aead_report() argument 140 struct aead_alg *aead = container_of(alg, struct aead_alg, base); in crypto_aead_report() 147 raead.blocksize = alg in crypto_aead_report() 156 crypto_aead_show(struct seq_file * m,struct crypto_alg * alg) crypto_aead_show() argument 233 aead_prepare_alg(struct aead_alg * alg) aead_prepare_alg() argument 251 crypto_register_aead(struct aead_alg * alg) crypto_register_aead() argument 264 crypto_unregister_aead(struct aead_alg * alg) crypto_unregister_aead() argument [all...] |
| H A D | testmgr.c | 64 int alg_test(const char *driver, const char *alg, u32 type, u32 mask) in alg_test() argument 141 const char *alg; member 145 int fips_allowed; /* set if alg is allowed in fips mode */ 1236 pr_err("alg: generic driver name for \"%s\" would be too long\n", in build_generic_driver_name() 1265 pr_err("alg: %s: %s test failed (wrong result) on test vector %s, cfg=\"%s\"\n", in check_hash_result() 1270 pr_err("alg: %s: %s overran result buffer on test vector %s, cfg=\"%s\"\n", in check_hash_result() 1282 pr_err("alg: shash: %s %s() failed with err %d on test vector %s, cfg=\"%s\"\n", in check_shash_op() 1311 pr_err("alg: shash: %s setkey failed on test vector %s; expected_error=%d, actual_error=%d, flags=%#x\n", in test_shash_vec_cfg() 1317 pr_err("alg: shash: %s setkey unexpectedly succeeded on test vector %s; expected_error=%d\n", in test_shash_vec_cfg() 1326 pr_err("alg in test_shash_vec_cfg() 3581 do_test_kpp(struct crypto_kpp * tfm,const struct kpp_testvec * vec,const char * alg) do_test_kpp() argument 3722 test_kpp(struct crypto_kpp * tfm,const char * alg,const struct kpp_testvec * vecs,unsigned int tcount) test_kpp() argument 3901 test_akcipher(struct crypto_akcipher * tfm,const char * alg,const struct akcipher_testvec * vecs,unsigned int tcount) test_akcipher() argument 4014 test_sig(struct crypto_sig * tfm,const char * alg,const struct sig_testvec * vecs,unsigned int tcount) test_sig() argument 5644 alg_find_test(const char * alg) alg_find_test() argument 5669 alg_fips_disabled(const char * driver,const char * alg) alg_fips_disabled() argument 5676 alg_test(const char * driver,const char * alg,u32 type,u32 mask) alg_test() argument [all...] |
| H A D | ahash.c | 283 static void ahash_set_needkey(struct crypto_ahash *tfm, struct ahash_alg *alg) in ahash_set_needkey() argument 285 if (alg->setkey != ahash_nosetkey && in ahash_set_needkey() 286 !(alg->halg.base.cra_flags & CRYPTO_ALG_OPTIONAL_KEY)) in ahash_set_needkey() 305 struct ahash_alg *alg = crypto_ahash_alg(tfm); in crypto_ahash_setkey() local 308 err = alg->setkey(tfm, key, keylen); in crypto_ahash_setkey() 313 ahash_set_needkey(tfm, alg); in crypto_ahash_setkey() 703 struct ahash_alg *alg = crypto_ahash_alg(hash); in crypto_ahash_exit_tfm() local 705 if (alg->exit_tfm) in crypto_ahash_exit_tfm() 706 alg->exit_tfm(hash); in crypto_ahash_exit_tfm() 717 struct ahash_alg *alg in crypto_ahash_init_tfm() local 774 crypto_ahash_extsize(struct crypto_alg * alg) crypto_ahash_extsize() argument 790 crypto_ahash_report(struct sk_buff * skb,struct crypto_alg * alg) crypto_ahash_report() argument 806 crypto_ahash_show(struct seq_file * m,struct crypto_alg * alg) crypto_ahash_show() argument 857 struct crypto_alg *alg = &halg->base; crypto_hash_alg_has_setkey() local 872 struct ahash_alg *alg; crypto_clone_ahash() local 946 ahash_prepare_alg(struct ahash_alg * alg) ahash_prepare_alg() argument 998 crypto_register_ahash(struct ahash_alg * alg) crypto_register_ahash() argument 1011 crypto_unregister_ahash(struct ahash_alg * alg) crypto_unregister_ahash() argument [all...] |
| H A D | essiv.c | 414 struct crypto_alg *alg; in essiv_supported_algorithms() local 417 alg = crypto_alg_mod_lookup(essiv_cipher_name, in essiv_supported_algorithms() 420 if (IS_ERR(alg)) in essiv_supported_algorithms() 423 if (hash_alg->digestsize < alg->cra_cipher.cia_min_keysize || in essiv_supported_algorithms() 424 hash_alg->digestsize > alg->cra_cipher.cia_max_keysize) in essiv_supported_algorithms() 427 if (ivsize != alg->cra_blocksize) in essiv_supported_algorithms() 436 crypto_mod_put(alg); in essiv_supported_algorithms() 481 base = &skcipher_inst->alg.base; in essiv_create() 501 base = &aead_inst->alg.base; in essiv_create() 575 skcipher_inst->alg.setkey = essiv_skcipher_setkey; in essiv_create() [all …]
|
| H A D | scompress.c | 49 struct sk_buff *skb, struct crypto_alg *alg) in crypto_scomp_report() argument 62 struct crypto_alg *alg) 124 struct scomp_alg *alg = crypto_scomp_alg(__crypto_scomp_tfm(tfm)); in crypto_scomp_init_tfm() local 128 ret = crypto_acomp_alloc_streams(&alg->streams); in crypto_scomp_init_tfm() 326 static void crypto_scomp_destroy(struct crypto_alg *alg) in crypto_init_scomp_ops_async() 328 struct scomp_alg *scomp = __crypto_scomp_alg(alg); in crypto_scomp_destroy() argument 350 static void scomp_prepare_alg(struct scomp_alg *alg) 352 struct crypto_alg *base = &alg->calg.base; in scomp_prepare_alg() argument 354 comp_prepare_alg(&alg->calg); in scomp_prepare_alg() 359 int crypto_register_scomp(struct scomp_alg *alg) in scomp_prepare_alg() 64 crypto_scomp_show(struct seq_file * m,struct crypto_alg * alg) crypto_scomp_show() argument 361 crypto_register_scomp(struct scomp_alg * alg) crypto_register_scomp() argument 374 crypto_unregister_scomp(struct scomp_alg * alg) crypto_unregister_scomp() argument [all...] |
| /linux/scripts/crypto/ |
| H A D | gen-hash-testvecs.py | 82 def hash_init(alg): argument 83 if alg == 'poly1305': 87 if alg == 'polyval': 89 return hashlib.new(alg) 97 def compute_hash(alg, data): argument 98 ctx = hash_init(alg) 118 def alg_digest_size_const(alg): argument 119 if alg.startswith('blake2'): 120 return f'{alg.upper()}_HASH_SIZE' 121 return f"{alg 123 gen_unkeyed_testvecs(alg) global() argument 157 gen_hmac_testvecs(alg) global() argument 170 gen_additional_blake2_testvecs(alg) global() argument 214 alg = sys.argv[1] global() variable [all...] |
| /linux/fs/verity/ |
| H A D | hash_algs.c | 55 fsverity_prepare_hash_state(const struct fsverity_hash_alg *alg, in fsverity_prepare_hash_state() argument 70 padded_salt_size = round_up(salt_size, alg->block_size); in fsverity_prepare_hash_state() 76 switch (alg->algo_id) { in fsverity_prepare_hash_state() 137 void fsverity_hash_buffer(const struct fsverity_hash_alg *alg, in fsverity_hash_buffer() argument 140 switch (alg->algo_id) { in fsverity_hash_buffer() 161 const struct fsverity_hash_alg *alg = &fsverity_hash_algs[i]; in fsverity_check_hash_algs() local 163 if (!alg->name) in fsverity_check_hash_algs() 174 BUG_ON(alg->digest_size > FS_VERITY_MAX_DIGEST_SIZE); in fsverity_check_hash_algs() 181 BUG_ON(!is_power_of_2(alg->digest_size)); in fsverity_check_hash_algs() 182 BUG_ON(!is_power_of_2(alg->block_size)); in fsverity_check_hash_algs() [all …]
|
| /linux/net/ipv4/ |
| H A D | tcp_sigpool.c | 24 const char *alg; member 120 static int __cpool_alloc_ahash(struct sigpool_entry *e, const char *alg) in __cpool_alloc_ahash() argument 125 e->alg = kstrdup(alg, GFP_KERNEL); in __cpool_alloc_ahash() 126 if (!e->alg) in __cpool_alloc_ahash() 129 cpu0_hash = crypto_alloc_ahash(alg, 0, CRYPTO_ALG_ASYNC); in __cpool_alloc_ahash() 147 kfree(e->alg); in __cpool_alloc_ahash() 148 e->alg = NULL; in __cpool_alloc_ahash() 154 * @alg: name of async hash algorithm 157 int tcp_sigpool_alloc_ahash(const char *alg, size_ argument [all...] |
| /linux/drivers/crypto/ccp/ |
| H A D | ccp-crypto-aes-xts.c | 231 struct skcipher_alg *alg; in ccp_register_aes_xts_alg() local 240 alg = &ccp_alg->alg; in ccp_register_aes_xts_alg() 242 snprintf(alg->base.cra_name, CRYPTO_MAX_ALG_NAME, "%s", def->name); in ccp_register_aes_xts_alg() 243 snprintf(alg->base.cra_driver_name, CRYPTO_MAX_ALG_NAME, "%s", in ccp_register_aes_xts_alg() 245 alg->base.cra_flags = CRYPTO_ALG_ASYNC | in ccp_register_aes_xts_alg() 249 alg->base.cra_blocksize = AES_BLOCK_SIZE; in ccp_register_aes_xts_alg() 250 alg->base.cra_ctxsize = sizeof(struct ccp_ctx) + in ccp_register_aes_xts_alg() 252 alg->base.cra_priority = CCP_CRA_PRIORITY; in ccp_register_aes_xts_alg() 253 alg->base.cra_module = THIS_MODULE; in ccp_register_aes_xts_alg() 255 alg->setkey = ccp_aes_xts_setkey; in ccp_register_aes_xts_alg() [all …]
|
| H A D | ccp-crypto-sha.c | 187 struct ccp_crypto_ahash_alg *alg = in ccp_sha_init() local 194 rctx->type = alg->type; in ccp_sha_init() 334 struct ccp_crypto_ahash_alg *alg = ccp_crypto_ahash_alg(tfm); in ccp_hmac_sha_cra_init() local 337 hmac_tfm = crypto_alloc_shash(alg->child_alg, 0, 0); in ccp_hmac_sha_cra_init() 340 alg->child_alg); in ccp_hmac_sha_cra_init() 416 struct ahash_alg *alg; in ccp_register_hmac_alg() local 431 alg = &ccp_alg->alg; in ccp_register_hmac_alg() 432 alg->setkey = ccp_sha_setkey; in ccp_register_hmac_alg() 434 halg = &alg->halg; in ccp_register_hmac_alg() 443 ret = crypto_register_ahash(alg); in ccp_register_hmac_alg() [all …]
|
| H A D | ccp-crypto.h | 41 struct skcipher_alg alg; member 49 struct aead_alg alg; member 62 struct ahash_alg alg; member 68 struct akcipher_alg alg; member 74 struct skcipher_alg *alg = crypto_skcipher_alg(tfm); in ccp_crypto_skcipher_alg() local 76 return container_of(alg, struct ccp_crypto_skcipher_alg, alg); in ccp_crypto_skcipher_alg() 82 struct crypto_alg *alg = tfm->__crt_alg; in ccp_crypto_ahash_alg() local 85 ahash_alg = container_of(alg, struct ahash_alg, halg.base); in ccp_crypto_ahash_alg() 87 return container_of(ahash_alg, struct ccp_crypto_ahash_alg, alg); in ccp_crypto_ahash_alg()
|
| /linux/security/ipe/ |
| H A D | digest.c | 29 char *alg = NULL; in ipe_digest_parse() 42 alg = kstrndup(valstr, sep - valstr, GFP_KERNEL); in ipe_digest_parse() 43 if (!alg) { in ipe_digest_parse() 64 info->alg = alg; in ipe_digest_parse() 69 kfree(alg); in ipe_digest_parse() 88 (!strcmp(expected->alg, digest->alg)) && in ipe_digest_eval() 101 kfree(info->alg); in ipe_digest_free() 116 audit_log_untrustedstring(ab, info->alg); in ipe_digest_audit() 28 char *alg = NULL; ipe_digest_parse() local [all...] |
| /linux/drivers/net/wireless/intel/ipw2x00/ |
| H A D | libipw_crypto.c | 160 struct libipw_crypto_alg *alg; in libipw_register_crypto_ops() local 162 alg = kzalloc(sizeof(*alg), GFP_KERNEL); in libipw_register_crypto_ops() 163 if (alg == NULL) in libipw_register_crypto_ops() 166 alg->ops = ops; in libipw_register_crypto_ops() 169 list_add(&alg->list, &libipw_crypto_algs); in libipw_register_crypto_ops() 181 struct libipw_crypto_alg *alg; in libipw_unregister_crypto_ops() local 185 list_for_each_entry(alg, &libipw_crypto_algs, list) { in libipw_unregister_crypto_ops() 186 if (alg->ops == ops) in libipw_unregister_crypto_ops() 195 list_del(&alg->list); in libipw_unregister_crypto_ops() 197 kfree(alg); in libipw_unregister_crypto_ops() [all …]
|
| /linux/lib/crypto/tests/ |
| H A D | sha3_kunit.c | 250 static void shake(int alg, const u8 *in, size_t in_len, u8 *out, size_t out_len) in shake() argument 252 if (alg == 0) in shake() 258 static void shake_init(struct shake_ctx *ctx, int alg) in shake_init() argument 260 if (alg == 0) in shake_init() 283 for (int alg = 0; alg < 2; alg++) { in test_shake_all_lens_up_to_4096() local 288 shake(alg, in, in_len, out, out_len); in test_shake_all_lens_up_to_4096() 292 if (alg == 0) in test_shake_all_lens_up_to_4096() 320 const int alg = rand32() % 2; in test_shake_multiple_squeezes() local 334 shake(alg, in, in_len, ref_out, out_len); in test_shake_multiple_squeezes() 337 shake_init(&ctx, alg); in test_shake_multiple_squeezes() [all …]
|
| /linux/include/crypto/internal/ |
| H A D | aead.h | 25 struct aead_alg alg; member 50 return container_of(&inst->alg.base, struct crypto_instance, alg); in aead_crypto_instance() 55 return container_of(&inst->alg, struct aead_instance, alg.base); in aead_instance() 111 return container_of(spawn->base.alg, struct aead_alg, base); in crypto_spawn_aead_alg() 139 static inline unsigned int crypto_aead_alg_chunksize(struct aead_alg *alg) in crypto_aead_alg_chunksize() argument 141 return alg->chunksize; in crypto_aead_alg_chunksize() 160 int crypto_register_aead(struct aead_alg *alg); 161 void crypto_unregister_aead(struct aead_alg *alg);
|
| H A D | skcipher.h | 34 struct skcipher_alg alg; member 45 struct lskcipher_alg alg; member 114 struct skcipher_instance, alg); in skcipher_alg_instance() 121 struct lskcipher_instance, alg); in lskcipher_alg_instance() 160 return container_of(spawn->base.alg, struct lskcipher_alg, co.base); in crypto_lskcipher_spawn_alg() 166 return container_of(spawn->base.alg, struct skcipher_alg_common, base); in crypto_spawn_skcipher_alg_common() 200 int crypto_register_skcipher(struct skcipher_alg *alg); 201 void crypto_unregister_skcipher(struct skcipher_alg *alg); 207 int crypto_register_lskcipher(struct lskcipher_alg *alg); 208 void crypto_unregister_lskcipher(struct lskcipher_alg *alg); [all...] |
| /linux/drivers/crypto/bcm/ |
| H A D | util.c | 296 char *spu_alg_name(enum spu_cipher_alg alg, enum spu_cipher_mode mode) in spu_alg_name() argument 298 switch (alg) { in spu_alg_name() 359 u32 alg; in spu_debugfs_read() local 386 for (alg = 0; alg < CIPHER_ALG_LAST; alg++) { in spu_debugfs_read() 388 op_cnt = atomic_read(&ipriv->cipher_cnt[alg][mode]); in spu_debugfs_read() 393 spu_alg_name(alg, mode), op_cnt); in spu_debugfs_read() 400 for (alg = 0; alg < HASH_ALG_LAST; alg++) { in spu_debugfs_read() 401 op_cnt = atomic_read(&ipriv->hash_cnt[alg]); in spu_debugfs_read() 406 hash_alg_name[alg], op_cnt); in spu_debugfs_read() 415 for (alg = 0; alg < HASH_ALG_LAST; alg++) { in spu_debugfs_read() [all …]
|
| /linux/include/crypto/ |
| H A D | algapi.h | 60 struct crypto_alg alg; member 89 struct crypto_alg *alg; member 134 int crypto_register_alg(struct crypto_alg *alg); 135 void crypto_unregister_alg(struct crypto_alg *alg); 139 void crypto_mod_put(struct crypto_alg *alg); 162 const char *driver, struct crypto_alg *alg); 167 #define crypto_inst_setname_1(inst, name, alg) \ argument 168 __crypto_inst_setname(inst, name, name, alg) 169 #define crypto_inst_setname_2(inst, name, driver, alg) \ argument 170 __crypto_inst_setname(inst, name, driver, alg) [all …]
|
| /linux/drivers/firmware/cirrus/test/ |
| H A D | cs_dsp_mock_mem_maps.c | 404 } alg; in cs_dsp_mock_xm_header_get_alg_base_in_words() local 412 for (;; alg_hdr_addr += sizeof(alg.adsp2) / 2) { in cs_dsp_mock_xm_header_get_alg_base_in_words() 417 &alg.adsp2, sizeof(alg.adsp2)); in cs_dsp_mock_xm_header_get_alg_base_in_words() 419 if (be32_to_cpu(alg.adsp2.alg.id) == alg_id) { in cs_dsp_mock_xm_header_get_alg_base_in_words() 420 xm_base = be32_to_cpu(alg.adsp2.xm); in cs_dsp_mock_xm_header_get_alg_base_in_words() 421 ym_base = be32_to_cpu(alg.adsp2.ym); in cs_dsp_mock_xm_header_get_alg_base_in_words() 422 zm_base = be32_to_cpu(alg.adsp2.zm); in cs_dsp_mock_xm_header_get_alg_base_in_words() 429 for (;; alg_hdr_addr += sizeof(alg in cs_dsp_mock_xm_header_get_alg_base_in_words() [all...] |
| /linux/drivers/crypto/rockchip/ |
| H A D | rk3288_crypto_skcipher.c | 26 struct skcipher_alg *alg = crypto_skcipher_alg(tfm); in rk_cipher_need_fallback() local 27 struct rk_crypto_tmp *algt = container_of(alg, struct rk_crypto_tmp, alg.skcipher.base); in rk_cipher_need_fallback() 73 struct skcipher_alg *alg = crypto_skcipher_alg(tfm); in rk_cipher_fallback() local 74 struct rk_crypto_tmp *algt = container_of(alg, struct rk_crypto_tmp, alg.skcipher.base); in rk_cipher_fallback() 313 struct skcipher_alg *alg = crypto_skcipher_alg(tfm); in rk_cipher_run() local 314 struct rk_crypto_tmp *algt = container_of(alg, struct rk_crypto_tmp, alg.skcipher.base); in rk_cipher_run() 437 struct skcipher_alg *alg = crypto_skcipher_alg(tfm); in rk_cipher_tfm_init() local 438 struct rk_crypto_tmp *algt = container_of(alg, struct rk_crypto_tmp, alg.skcipher.base); in rk_cipher_tfm_init() 463 .alg.skcipher.base = { 481 .alg.skcipher.op = { [all …]
|
| /linux/drivers/crypto/allwinner/sun4i-ss/ |
| H A D | sun4i-ss-prng.c | 8 struct rng_alg *alg = crypto_rng_alg(tfm); in sun4i_ss_prng_seed() local 10 algt = container_of(alg, struct sun4i_ss_alg_template, alg.rng); in sun4i_ss_prng_seed() 20 struct rng_alg *alg = crypto_rng_alg(tfm); in sun4i_ss_prng_generate() local 29 algt = container_of(alg, struct sun4i_ss_alg_template, alg.rng); in sun4i_ss_prng_generate()
|
| /linux/drivers/crypto/tegra/ |
| H A D | tegra-se-aes.c | 27 u32 alg; member 48 u32 alg; member 72 unsigned int alg; member 121 if (ctx->alg == SE_ALG_CBC) { in tegra_aes_update_iv() 123 } else if (ctx->alg == SE_ALG_CTR) { in tegra_aes_update_iv() 132 static int tegra234_aes_crypto_cfg(u32 alg, bool encrypt) in tegra234_aes_crypto_cfg() argument 134 switch (alg) { in tegra234_aes_crypto_cfg() 168 static int tegra234_aes_cfg(u32 alg, bool encrypt) in tegra234_aes_cfg() argument 170 switch (alg) { in tegra234_aes_cfg() 272 rctx->iv = (ctx->alg == SE_ALG_ECB) ? NULL : (u32 *)req->iv; in tegra_aes_do_one_req() [all …]
|