Lines Matching refs:base

194 						 aead.base);
745 skcipher.base);
1203 aead.base);
1313 gfp_t flags = (req->base.flags & CRYPTO_TFM_REQ_MAY_SLEEP) ?
1398 /* allocate space for base edesc and hw desc commands, link tables */
1458 if (req->base.flags & CRYPTO_TFM_REQ_MAY_BACKLOG)
1619 gfp_t flags = (req->base.flags & CRYPTO_TFM_REQ_MAY_SLEEP) ?
1699 * allocate space for base edesc and hw desc commands, link tables, IV
1835 req->base.flags,
1836 req->base.complete,
1837 req->base.data);
1863 if (req->base.flags & CRYPTO_TFM_REQ_MAY_BACKLOG)
1889 .skcipher.base = {
1890 .base = {
1908 .skcipher.base = {
1909 .base = {
1927 .skcipher.base = {
1928 .base = {
1946 .skcipher.base = {
1947 .base = {
1967 .skcipher.base = {
1968 .base = {
1993 .skcipher.base = {
1994 .base = {
2013 .skcipher.base = {
2014 .base = {
2031 .skcipher.base = {
2032 .base = {
2049 .skcipher.base = {
2050 .base = {
2070 .aead.base = {
2071 .base = {
2092 .aead.base = {
2093 .base = {
2115 .aead.base = {
2116 .base = {
2138 .aead.base = {
2139 .base = {
2162 .aead.base = {
2163 .base = {
2186 .aead.base = {
2187 .base = {
2210 .aead.base = {
2211 .base = {
2234 .aead.base = {
2235 .base = {
2258 .aead.base = {
2259 .base = {
2282 .aead.base = {
2283 .base = {
2306 .aead.base = {
2307 .base = {
2332 .aead.base = {
2333 .base = {
2356 .aead.base = {
2357 .base = {
2382 .aead.base = {
2383 .base = {
2406 .aead.base = {
2407 .base = {
2432 .aead.base = {
2433 .base = {
2456 .aead.base = {
2457 .base = {
2482 .aead.base = {
2483 .base = {
2506 .aead.base = {
2507 .base = {
2532 .aead.base = {
2533 .base = {
2556 .aead.base = {
2557 .base = {
2582 .aead.base = {
2583 .base = {
2606 .aead.base = {
2607 .base = {
2632 .aead.base = {
2633 .base = {
2657 .aead.base = {
2658 .base = {
2684 .aead.base = {
2685 .base = {
2709 .aead.base = {
2710 .base = {
2736 .aead.base = {
2737 .base = {
2761 .aead.base = {
2762 .base = {
2788 .aead.base = {
2789 .base = {
2813 .aead.base = {
2814 .base = {
2840 .aead.base = {
2841 .base = {
2865 .aead.base = {
2866 .base = {
2892 .aead.base = {
2893 .base = {
2916 .aead.base = {
2917 .base = {
2942 .aead.base = {
2943 .base = {
2966 .aead.base = {
2967 .base = {
2992 .aead.base = {
2993 .base = {
3016 .aead.base = {
3017 .base = {
3042 .aead.base = {
3043 .base = {
3066 .aead.base = {
3067 .base = {
3092 .aead.base = {
3093 .base = {
3116 .aead.base = {
3117 .base = {
3142 .aead.base = {
3143 .base = {
3166 .aead.base = {
3167 .base = {
3192 .aead.base = {
3193 .base = {
3219 .aead.base = {
3220 .base = {
3247 .aead.base = {
3248 .base = {
3274 .aead.base = {
3275 .base = {
3302 .aead.base = {
3303 .base = {
3329 .aead.base = {
3330 .base = {
3357 .aead.base = {
3358 .base = {
3384 .aead.base = {
3385 .base = {
3412 .aead.base = {
3413 .base = {
3439 .aead.base = {
3440 .base = {
3467 .aead.base = {
3468 .base = {
3494 .aead.base = {
3495 .base = {
3522 .aead.base = {
3523 .base = {
3548 .aead.base = {
3549 .base = {
3624 container_of(alg, typeof(*caam_alg), skcipher.base);
3630 const char *tfm_name = crypto_tfm_alg_name(&tfm->base);
3659 container_of(alg, struct caam_aead_alg, aead.base);
3711 struct skcipher_alg *alg = &t_alg->skcipher.base;
3713 alg->base.cra_module = THIS_MODULE;
3714 alg->base.cra_priority = CAAM_CRA_PRIORITY;
3715 alg->base.cra_ctxsize = sizeof(struct caam_ctx) + crypto_dma_padding();
3716 alg->base.cra_flags |= (CRYPTO_ALG_ASYNC | CRYPTO_ALG_ALLOCATES_MEMORY |
3725 struct aead_alg *alg = &t_alg->aead.base;
3727 alg->base.cra_module = THIS_MODULE;
3728 alg->base.cra_priority = CAAM_CRA_PRIORITY;
3729 alg->base.cra_ctxsize = sizeof(struct caam_ctx) + crypto_dma_padding();
3730 alg->base.cra_flags = CRYPTO_ALG_ASYNC | CRYPTO_ALG_ALLOCATES_MEMORY |
3818 t_alg->skcipher.base.base.cra_driver_name);
3862 (!md_inst || t_alg->aead.base.maxauthsize > md_limit))
3870 t_alg->aead.base.base.cra_driver_name);