/kernel/linux/linux-5.10/drivers/crypto/hisilicon/sec/ |
H A D | sec_algs.c | 23 unsigned c_alg : 3; member 31 .c_alg = SEC_C_ALG_DES, 36 .c_alg = SEC_C_ALG_DES, 41 .c_alg = SEC_C_ALG_3DES, 46 .c_alg = SEC_C_ALG_3DES, 51 .c_alg = SEC_C_ALG_3DES, 56 .c_alg = SEC_C_ALG_3DES, 61 .c_alg = SEC_C_ALG_AES, 66 .c_alg = SEC_C_ALG_AES, 71 .c_alg [all...] |
/kernel/linux/linux-6.6/drivers/crypto/hisilicon/sec/ |
H A D | sec_algs.c | 23 unsigned c_alg : 3; member 31 .c_alg = SEC_C_ALG_DES, 36 .c_alg = SEC_C_ALG_DES, 41 .c_alg = SEC_C_ALG_3DES, 46 .c_alg = SEC_C_ALG_3DES, 51 .c_alg = SEC_C_ALG_3DES, 56 .c_alg = SEC_C_ALG_3DES, 61 .c_alg = SEC_C_ALG_AES, 66 .c_alg = SEC_C_ALG_AES, 71 .c_alg [all...] |
/kernel/linux/linux-5.10/drivers/crypto/hisilicon/sec2/ |
H A D | sec_crypto.c | 627 const u32 keylen, const enum sec_calg c_alg, in sec_skcipher_setkey() 643 c_ctx->c_alg = c_alg; in sec_skcipher_setkey() 646 switch (c_alg) { in sec_skcipher_setkey() 668 #define GEN_SEC_SETKEY_FUNC(name, c_alg, c_mode) \ 672 return sec_skcipher_setkey(tfm, key, keylen, c_alg, c_mode); \ 883 const enum sec_calg c_alg, in sec_aead_setkey() 894 ctx->c_ctx.c_alg = c_alg; in sec_aead_setkey() 1002 sec_sqe->type2.c_alg in sec_skcipher_bd_fill() 626 sec_skcipher_setkey(struct crypto_skcipher *tfm, const u8 *key, const u32 keylen, const enum sec_calg c_alg, const enum sec_cmode c_mode) sec_skcipher_setkey() argument 881 sec_aead_setkey(struct crypto_aead *tfm, const u8 *key, const u32 keylen, const enum sec_hash_alg a_alg, const enum sec_calg c_alg, const enum sec_mac_len mac_len, const enum sec_cmode c_mode) sec_aead_setkey() argument 1412 u8 c_alg = ctx->c_ctx.c_alg; sec_skcipher_param_check() local 1538 u8 c_alg = ctx->c_ctx.c_alg; sec_aead_param_check() local [all...] |
H A D | sec.h | 95 u8 c_alg; member
|
H A D | sec_crypto.h | 83 /* c_alg: 0~3 bits */ 84 __u8 c_alg; member
|
/kernel/linux/linux-6.6/drivers/crypto/hisilicon/sec2/ |
H A D | sec_crypto.c | 796 if (c_ctx->c_alg == SEC_CALG_SM4 && in sec_skcipher_aes_sm4_setkey() 822 const u32 keylen, const enum sec_calg c_alg, in sec_skcipher_setkey() 838 c_ctx->c_alg = c_alg; in sec_skcipher_setkey() 841 switch (c_alg) { in sec_skcipher_setkey() 869 #define GEN_SEC_SETKEY_FUNC(name, c_alg, c_mode) \ 873 return sec_skcipher_setkey(tfm, key, keylen, c_alg, c_mode); \ 1142 const enum sec_calg c_alg, in sec_aead_setkey() 1154 ctx->c_ctx.c_alg = c_alg; in sec_aead_setkey() 821 sec_skcipher_setkey(struct crypto_skcipher *tfm, const u8 *key, const u32 keylen, const enum sec_calg c_alg, const enum sec_cmode c_mode) sec_skcipher_setkey() argument 1140 sec_aead_setkey(struct crypto_aead *tfm, const u8 *key, const u32 keylen, const enum sec_hash_alg a_alg, const enum sec_calg c_alg, const enum sec_mac_len mac_len, const enum sec_cmode c_mode) sec_aead_setkey() argument 2050 u8 c_alg = ctx->c_ctx.c_alg; sec_skcipher_param_check() local 2312 u8 c_alg = ctx->c_ctx.c_alg; sec_aead_param_check() local [all...] |
H A D | sec_crypto.h | 113 /* c_alg: 0~3 bits */ 114 __u8 c_alg; member 328 * c_alg : 4~7 bits
|
H A D | sec.h | 108 u8 c_alg; member
|