/kernel/linux/linux-5.10/include/crypto/ |
H A D | akcipher.h | 291 struct crypto_alg *calg = tfm->base.__crt_alg; in crypto_akcipher_encrypt() local 295 crypto_stats_get(calg); in crypto_akcipher_encrypt() 297 crypto_stats_akcipher_encrypt(src_len, ret, calg); in crypto_akcipher_encrypt() 315 struct crypto_alg *calg = tfm->base.__crt_alg; in crypto_akcipher_decrypt() local 319 crypto_stats_get(calg); in crypto_akcipher_decrypt() 321 crypto_stats_akcipher_decrypt(src_len, ret, calg); in crypto_akcipher_decrypt() 339 struct crypto_alg *calg = tfm->base.__crt_alg; in crypto_akcipher_sign() local 342 crypto_stats_get(calg); in crypto_akcipher_sign() 344 crypto_stats_akcipher_sign(ret, calg); in crypto_akcipher_sign() 366 struct crypto_alg *calg in crypto_akcipher_verify() local [all...] |
H A D | kpp.h | 287 struct crypto_alg *calg = tfm->base.__crt_alg; in crypto_kpp_set_secret() local 290 crypto_stats_get(calg); in crypto_kpp_set_secret() 292 crypto_stats_kpp_set_secret(calg, ret); in crypto_kpp_set_secret() 313 struct crypto_alg *calg = tfm->base.__crt_alg; in crypto_kpp_generate_public_key() local 316 crypto_stats_get(calg); in crypto_kpp_generate_public_key() 318 crypto_stats_kpp_generate_public_key(calg, ret); in crypto_kpp_generate_public_key() 336 struct crypto_alg *calg = tfm->base.__crt_alg; in crypto_kpp_compute_shared_secret() local 339 crypto_stats_get(calg); in crypto_kpp_compute_shared_secret() 341 crypto_stats_kpp_compute_shared_secret(calg, ret); in crypto_kpp_compute_shared_secret()
|
/kernel/linux/linux-6.6/crypto/ |
H A D | acompress.c | 28 return container_of(alg, struct acomp_alg, calg.base); in __crypto_acomp_alg() 99 struct comp_alg_common *calg = __crypto_comp_alg_common(alg); in __crypto_acomp_report_stat() local 100 struct crypto_istat_compress *istat = comp_get_stat(calg); in __crypto_acomp_report_stat() 198 struct crypto_alg *base = &alg->calg.base; in crypto_register_acomp() 200 comp_prepare_alg(&alg->calg); in crypto_register_acomp()
|
H A D | scompress.c | 187 struct crypto_alg *calg = tfm->__crt_alg; in crypto_init_scomp_ops_async() local 192 if (!crypto_mod_get(calg)) in crypto_init_scomp_ops_async() 195 scomp = crypto_create_tfm(calg, &crypto_scomp_type); in crypto_init_scomp_ops_async() 197 crypto_mod_put(calg); in crypto_init_scomp_ops_async() 263 struct crypto_alg *base = &alg->calg.base; in crypto_register_scomp() 265 comp_prepare_alg(&alg->calg); in crypto_register_scomp()
|
H A D | akcipher.c | 292 struct crypto_alg *calg = tfm->__crt_alg; in crypto_init_akcipher_ops_sig() local 295 if (!crypto_mod_get(calg)) in crypto_init_akcipher_ops_sig() 298 akcipher = crypto_create_tfm(calg, &crypto_akcipher_type); in crypto_init_akcipher_ops_sig() 300 crypto_mod_put(calg); in crypto_init_akcipher_ops_sig()
|
H A D | shash.c | 411 struct crypto_alg *calg = tfm->__crt_alg; in crypto_init_shash_ops_async() local 412 struct shash_alg *alg = __crypto_shash_alg(calg); in crypto_init_shash_ops_async() 417 if (!crypto_mod_get(calg)) in crypto_init_shash_ops_async() 420 shash = crypto_create_tfm(calg, &crypto_shash_type); in crypto_init_shash_ops_async() 422 crypto_mod_put(calg); in crypto_init_shash_ops_async()
|
/kernel/linux/linux-5.10/crypto/ |
H A D | scompress.c | 194 struct crypto_alg *calg = tfm->__crt_alg; in crypto_init_scomp_ops_async() local 199 if (!crypto_mod_get(calg)) in crypto_init_scomp_ops_async() 202 scomp = crypto_create_tfm(calg, &crypto_scomp_type); in crypto_init_scomp_ops_async() 204 crypto_mod_put(calg); in crypto_init_scomp_ops_async()
|
H A D | shash.c | 379 struct crypto_alg *calg = tfm->__crt_alg; in crypto_init_shash_ops_async() local 380 struct shash_alg *alg = __crypto_shash_alg(calg); in crypto_init_shash_ops_async() 385 if (!crypto_mod_get(calg)) in crypto_init_shash_ops_async() 388 shash = crypto_create_tfm(calg, &crypto_shash_type); in crypto_init_shash_ops_async() 390 crypto_mod_put(calg); in crypto_init_shash_ops_async()
|
/kernel/linux/linux-5.10/net/xfrm/ |
H A D | xfrm_ipcomp.c | 345 if (!x->calg) in ipcomp_init_state() 360 ipcd->tfms = ipcomp_alloc_tfms(x->calg->alg_name); in ipcomp_init_state() 365 calg_desc = xfrm_calg_get_byname(x->calg->alg_name, 0); in ipcomp_init_state()
|
H A D | xfrm_user.c | 620 if ((err = attach_one_algo(&x->calg, &x->props.calgo, in xfrm_state_construct() 934 if (x->calg) { in copy_to_user_state_extra() 935 ret = nla_put(skb, XFRMA_ALG_COMP, sizeof(*(x->calg)), x->calg); in copy_to_user_state_extra() 3003 if (x->calg) in xfrm_sa_len() 3004 l += nla_total_size(sizeof(*x->calg)); in xfrm_sa_len()
|
H A D | xfrm_state.c | 486 kfree(x->calg); in ___xfrm_state_destroy() 1509 if (orig->calg) { in xfrm_state_clone() 1510 x->calg = xfrm_algo_clone(orig->calg); in xfrm_state_clone() 1511 if (!x->calg) in xfrm_state_clone()
|
/kernel/linux/linux-6.6/net/xfrm/ |
H A D | xfrm_ipcomp.c | 333 if (!x->calg) { in ipcomp_init_state() 352 ipcd->tfms = ipcomp_alloc_tfms(x->calg->alg_name); in ipcomp_init_state() 357 calg_desc = xfrm_calg_get_byname(x->calg->alg_name, 0); in ipcomp_init_state()
|
H A D | xfrm_user.c | 722 if ((err = attach_one_algo(&x->calg, &x->props.calgo, in xfrm_state_construct() 1051 static int copy_to_user_calg(struct xfrm_algo *calg, struct sk_buff *skb) in copy_to_user_calg() argument 1053 struct nlattr *nla = nla_reserve(skb, XFRMA_ALG_COMP, sizeof(*calg)); in copy_to_user_calg() 1060 strscpy_pad(ap->alg_name, calg->alg_name, sizeof(ap->alg_name)); in copy_to_user_calg() 1139 if (x->calg) { in copy_to_user_state_extra() 1140 ret = copy_to_user_calg(x->calg, skb); in copy_to_user_state_extra() 3292 if (x->calg) in xfrm_sa_len() 3293 l += nla_total_size(sizeof(*x->calg)); in xfrm_sa_len()
|
H A D | xfrm_state.c | 529 kfree(x->calg); in ___xfrm_state_destroy() 1693 if (orig->calg) { in xfrm_state_clone() 1694 x->calg = xfrm_algo_clone(orig->calg); in xfrm_state_clone() 1695 if (!x->calg) in xfrm_state_clone()
|
/kernel/linux/linux-6.6/include/crypto/internal/ |
H A D | acompress.h | 36 * @calg: Cmonn algorithm data structure shared with scomp 49 struct comp_alg_common calg; member
|
H A D | scompress.h | 32 * @calg: Cmonn algorithm data structure shared with acomp 46 struct comp_alg_common calg; member
|
/kernel/linux/linux-5.10/drivers/net/netdevsim/ |
H A D | ipsec.c | 147 if (xs->calg) { in nsim_ipsec_add_sa()
|
/kernel/linux/linux-6.6/drivers/net/netdevsim/ |
H A D | ipsec.c | 147 if (xs->calg) { in nsim_ipsec_add_sa()
|
/kernel/linux/linux-5.10/net/key/ |
H A D | af_key.c | 863 BUG_ON(x->ealg && x->calg); in __pfkey_xfrm_state2msg() 869 /* KAME compatible: sadb_sa_encrypt is overloaded with calg id */ in __pfkey_xfrm_state2msg() 870 if (x->calg) { in __pfkey_xfrm_state2msg() 871 struct xfrm_algo_desc *a = xfrm_calg_get_byname(x->calg->alg_name, 0); in __pfkey_xfrm_state2msg() 1203 x->calg = kmalloc(sizeof(*x->calg), GFP_KERNEL); in pfkey_msg2xfrm_state() 1204 if (!x->calg) { in pfkey_msg2xfrm_state() 1208 strcpy(x->calg->alg_name, a->name); in pfkey_msg2xfrm_state()
|
/kernel/linux/linux-6.6/net/key/ |
H A D | af_key.c | 859 BUG_ON(x->ealg && x->calg); in __pfkey_xfrm_state2msg() 865 /* KAME compatible: sadb_sa_encrypt is overloaded with calg id */ in __pfkey_xfrm_state2msg() 866 if (x->calg) { in __pfkey_xfrm_state2msg() 867 struct xfrm_algo_desc *a = xfrm_calg_get_byname(x->calg->alg_name, 0); in __pfkey_xfrm_state2msg() 1199 x->calg = kmalloc(sizeof(*x->calg), GFP_KERNEL); in pfkey_msg2xfrm_state() 1200 if (!x->calg) { in pfkey_msg2xfrm_state() 1204 strcpy(x->calg->alg_name, a->name); in pfkey_msg2xfrm_state()
|
/kernel/linux/linux-5.10/drivers/net/ethernet/intel/ixgbevf/ |
H A D | ipsec.c | 286 if (xs->calg) { in ixgbevf_ipsec_add_sa()
|
/kernel/linux/linux-6.6/drivers/net/ethernet/intel/ixgbevf/ |
H A D | ipsec.c | 292 if (xs->calg) { in ixgbevf_ipsec_add_sa()
|
/kernel/linux/linux-5.10/drivers/crypto/hisilicon/sec2/ |
H A D | sec_crypto.c | 921 #define GEN_SEC_AEAD_SETKEY_FUNC(name, aalg, calg, maclen, cmode) \ 925 return sec_aead_setkey(tfm, key, keylen, aalg, calg, maclen, cmode);\
|
/kernel/linux/linux-6.6/drivers/crypto/hisilicon/sec2/ |
H A D | sec_crypto.c | 1204 #define GEN_SEC_AEAD_SETKEY_FUNC(name, aalg, calg, maclen, cmode) \ 1208 return sec_aead_setkey(tfm, key, keylen, aalg, calg, maclen, cmode);\
|
/kernel/linux/linux-5.10/drivers/net/ethernet/intel/ixgbe/ |
H A D | ixgbe_ipsec.c | 591 if (xs->calg) { in ixgbe_ipsec_add_sa()
|