Lines Matching defs:base
22 struct safexcel_context base;
110 struct safexcel_crypto_priv *priv = ctx->base.priv;
123 memcpy(ctx->base.ctxr->data, &ctx->base.ipad, ctx->key_sz);
125 memcpy(ctx->base.ctxr->data, req->state, req->state_sz);
160 memcpy(ctx->base.ctxr->data, req->state, req->state_sz);
196 ctx->base.ctxr->data[req->state_sz >> 2] =
204 memcpy(ctx->base.ctxr->data + (req->state_sz >> 2),
205 &ctx->base.opad, req->state_sz);
274 memcpy(sreq->state, &ctx->base.opad, sreq->digest_sz);
282 ctx->base.needs_inv = true;
315 struct safexcel_crypto_priv *priv = ctx->base.priv;
380 u32 *ipad = ctx->base.ipad.word;
407 len, ctx->base.ctxr_dma,
447 len, ctx->base.ctxr_dma, &dmmy);
485 safexcel_rdr_req_set(priv, ring, rdesc, &areq->base);
539 if (ctx->base.exit_inv) {
540 dma_pool_free(priv->context_pool, ctx->base.ctxr,
541 ctx->base.ctxr_dma);
548 ctx->base.ring = ring;
594 ret = safexcel_invalidate_cache(async, ctx->base.priv,
595 ctx->base.ctxr_dma, ring);
623 struct safexcel_crypto_priv *priv = ctx->base.priv;
627 int ring = ctx->base.ring;
637 ctx = crypto_tfm_ctx(req->base.tfm);
638 ctx->base.exit_inv = true;
642 crypto_enqueue_request(&priv->ring[ring].queue, &req->base);
691 struct safexcel_crypto_priv *priv = ctx->base.priv;
696 if (ctx->base.ctxr) {
697 if (priv->flags & EIP197_TRC_CACHE && !ctx->base.needs_inv &&
701 memcmp(ctx->base.ctxr->data, req->state, req->state_sz) ||
704 memcmp(ctx->base.ctxr->data + (req->state_sz>>2),
705 &ctx->base.opad, req->state_sz))))
712 ctx->base.needs_inv = true;
714 if (ctx->base.needs_inv) {
715 ctx->base.needs_inv = false;
719 ctx->base.ring = safexcel_select_ring(priv);
720 ctx->base.ctxr = dma_pool_zalloc(priv->context_pool,
721 EIP197_GFP_FLAGS(areq->base),
722 &ctx->base.ctxr_dma);
723 if (!ctx->base.ctxr)
728 ring = ctx->base.ring;
731 ret = crypto_enqueue_request(&priv->ring[ring].queue, &areq->base);
806 memcpy(areq->result, &ctx->base.ipad, sizeof(u32));
822 result[i] = swab32(ctx->base.ipad.word[i + 4]);
923 ctx->base.priv = tmpl->priv;
924 ctx->base.send = safexcel_ahash_send;
925 ctx->base.handle_result = safexcel_handle_result;
962 struct safexcel_crypto_priv *priv = ctx->base.priv;
966 if (!ctx->base.ctxr)
974 dma_pool_free(priv->context_pool, ctx->base.ctxr,
975 ctx->base.ctxr_dma);
993 .base = {
1018 memcpy(req->state, &ctx->base.ipad, SHA1_DIGEST_SIZE);
1191 int safexcel_hmac_setkey(struct safexcel_context *base, const u8 *key,
1195 struct safexcel_crypto_priv *priv = base->priv;
1203 if (priv->flags & EIP197_TRC_CACHE && base->ctxr &&
1204 (memcmp(&base->ipad, istate.state, state_sz) ||
1205 memcmp(&base->opad, ostate.state, state_sz)))
1206 base->needs_inv = true;
1208 memcpy(&base->ipad, &istate.state, state_sz);
1209 memcpy(&base->opad, &ostate.state, state_sz);
1220 return safexcel_hmac_setkey(&ctx->base, key, keylen, alg, state_sz);
1245 .base = {
1302 .base = {
1359 .base = {
1391 memcpy(req->state, &ctx->base.ipad, SHA256_DIGEST_SIZE);
1431 .base = {
1463 memcpy(req->state, &ctx->base.ipad, SHA256_DIGEST_SIZE);
1503 .base = {
1560 .base = {
1617 .base = {
1649 memcpy(req->state, &ctx->base.ipad, SHA512_DIGEST_SIZE);
1689 .base = {
1721 memcpy(req->state, &ctx->base.ipad, SHA512_DIGEST_SIZE);
1761 .base = {
1818 .base = {
1843 memcpy(req->state, &ctx->base.ipad, MD5_DIGEST_SIZE);
1891 .base = {
1914 memset(&ctx->base.ipad, 0, sizeof(u32));
1926 req->state[0] = cpu_to_le32(~ctx->base.ipad.word[0]);
1948 memcpy(&ctx->base.ipad, key, sizeof(u32));
1972 .base = {
1998 memcpy(req->state, &ctx->base.ipad, ctx->key_sz);
2023 memset(&ctx->base.ipad, 0, 2 * AES_BLOCK_SIZE);
2025 ctx->base.ipad.be[i + 8] = cpu_to_be32(aes.key_enc[i]);
2063 .base = {
2107 ctx->base.ipad.word[i] = swab32(key_tmp[i]);
2158 .base = {
2190 ctx->base.ipad.word[i + 8] = swab32(aes.key_enc[i]);
2221 ctx->base.ipad.be[i] = cpu_to_be32(((u32 *)consts)[i]);
2254 .base = {
2311 .base = {
2343 memcpy(req->state, &ctx->base.ipad, SM3_DIGEST_SIZE);
2383 .base = {
2427 ahash_request_set_callback(subreq, req->base.flags,
2428 req->base.complete, req->base.data);
2436 memcpy(key, &ctx->base.ipad,
2440 &ctx->base.opad,
2576 .base = {
2634 .base = {
2692 .base = {
2750 .base = {
2813 ctx->base.ipad.byte);
2822 memmove(&ctx->base.opad,
2823 ctx->base.ipad.byte +
2833 memcpy(&ctx->base.ipad, key, keylen);
2835 memcpy(&ctx->base.ipad, key,
2837 memcpy(&ctx->base.opad,
2845 memset(ctx->base.ipad.byte + keylen, 0,
2847 memset(&ctx->base.opad, 0, crypto_ahash_blocksize(tfm) / 2);
2849 memset(ctx->base.opad.byte + keylen -
2868 memcpy(req->state, &ctx->base.ipad, SHA3_224_BLOCK_SIZE / 2);
2913 .base = {
2939 memcpy(req->state, &ctx->base.ipad, SHA3_256_BLOCK_SIZE / 2);
2984 .base = {
3010 memcpy(req->state, &ctx->base.ipad, SHA3_384_BLOCK_SIZE / 2);
3055 .base = {
3081 memcpy(req->state, &ctx->base.ipad, SHA3_512_BLOCK_SIZE / 2);
3125 .base = {