Searched refs:sm2 (Results 1 - 10 of 10) sorted by relevance
/kernel/linux/linux-5.10/crypto/ |
H A D | sm2.c | 5 * described at https://tools.ietf.org/html/draft-shen-sm2-ecdsa-02 18 #include <crypto/sm2.h> 429 static struct akcipher_alg sm2 = { variable 436 .cra_name = "sm2", 437 .cra_driver_name = "sm2-generic", 446 return crypto_register_akcipher(&sm2); in sm2_init() 451 crypto_unregister_akcipher(&sm2); in sm2_exit() 460 MODULE_ALIAS_CRYPTO("sm2-generic");
|
H A D | Makefile | 46 $(obj)/sm2.o: $(obj)/sm2signature.asn1.h 49 sm2_generic-y += sm2.o
|
/kernel/linux/linux-6.6/crypto/ |
H A D | sm2.c | 5 * described at https://tools.ietf.org/html/draft-shen-sm2-ecdsa-02 17 #include <crypto/sm2.h> 467 static struct akcipher_alg sm2 = { variable 474 .cra_name = "sm2", 475 .cra_driver_name = "sm2-generic", 484 return crypto_register_akcipher(&sm2); in sm2_init() 489 crypto_unregister_akcipher(&sm2); in sm2_exit() 498 MODULE_ALIAS_CRYPTO("sm2-generic");
|
H A D | Makefile | 47 $(obj)/sm2.o: $(obj)/sm2signature.asn1.h 50 sm2_generic-y += sm2.o
|
/kernel/linux/linux-5.10/net/sched/ |
H A D | sch_hfsc.c | 89 u64 sm2; /* scaled slope of the 2nd segment */ member 101 u64 sm2; /* scaled slope of the 2nd segment */ member 480 isc->sm2 = m2sm(sc->m2); in sc2isc() 497 rtsc->sm2 = isc->sm2; in rtsc_init() 539 + seg_x2y(x - rtsc->x - rtsc->dx, rtsc->sm2); in rtsc_x2y() 553 if (isc->sm1 <= isc->sm2) { in rtsc_min() 590 * seg_x2y(dx, sm1) == seg_x2y(dx, sm2) + (y1 - y) in rtsc_min() 593 dsm = isc->sm1 - isc->sm2; in rtsc_min() 623 if (cl->cl_rsc.sm1 <= cl->cl_rsc.sm2) { in init_ed() [all...] |
/kernel/linux/linux-6.6/net/sched/ |
H A D | sch_hfsc.c | 89 u64 sm2; /* scaled slope of the 2nd segment */ member 101 u64 sm2; /* scaled slope of the 2nd segment */ member 479 isc->sm2 = m2sm(sc->m2); in sc2isc() 496 rtsc->sm2 = isc->sm2; in rtsc_init() 538 + seg_x2y(x - rtsc->x - rtsc->dx, rtsc->sm2); in rtsc_x2y() 552 if (isc->sm1 <= isc->sm2) { in rtsc_min() 589 * seg_x2y(dx, sm1) == seg_x2y(dx, sm2) + (y1 - y) in rtsc_min() 592 dsm = isc->sm1 - isc->sm2; in rtsc_min() 622 if (cl->cl_rsc.sm1 <= cl->cl_rsc.sm2) { in init_ed() [all...] |
/kernel/linux/linux-5.10/crypto/asymmetric_keys/ |
H A D | x509_cert_parser.c | 260 goto sm2; in x509_note_pkey_algo() 273 sm2: in x509_note_pkey_algo() 274 ctx->cert->sig->pkey_algo = "sm2"; in x509_note_pkey_algo() 304 strcmp(ctx->cert->sig->pkey_algo, "sm2") == 0 || in x509_note_signature() 505 ctx->cert->pub->pkey_algo = "sm2"; in x509_extract_key_data()
|
H A D | public_key.c | 21 #include <crypto/sm2.h> 118 } else if (strcmp(pkey->pkey_algo, "sm2") == 0) { in software_key_determine_akcipher() 424 if (strcmp(pkey->pkey_algo, "sm2") == 0 && sig->data_size) { in public_key_verify_signature()
|
/kernel/linux/linux-6.6/crypto/asymmetric_keys/ |
H A D | x509_cert_parser.c | 257 goto sm2; in x509_note_sig_algo() 270 sm2: in x509_note_sig_algo() 271 ctx->cert->sig->pkey_algo = "sm2"; in x509_note_sig_algo() 306 strcmp(ctx->cert->sig->pkey_algo, "sm2") == 0 || in x509_note_signature() 512 ctx->cert->pub->pkey_algo = "sm2"; in x509_extract_key_data() 520 ctx->cert->pub->pkey_algo = "sm2"; in x509_extract_key_data()
|
H A D | x509_public_key.c | 10 #include <crypto/sm2.h> 67 if (strcmp(cert->pub->pkey_algo, "sm2") == 0) { in x509_get_sig_params()
|
Completed in 9 milliseconds