Home
last modified time | relevance | path

Searched refs:sm2 (Results 1 - 10 of 10) sorted by relevance

/kernel/linux/linux-5.10/crypto/
H A Dsm2.c5 * described at https://tools.ietf.org/html/draft-shen-sm2-ecdsa-02
18 #include <crypto/sm2.h>
429 static struct akcipher_alg sm2 = { variable
436 .cra_name = "sm2",
437 .cra_driver_name = "sm2-generic",
446 return crypto_register_akcipher(&sm2); in sm2_init()
451 crypto_unregister_akcipher(&sm2); in sm2_exit()
460 MODULE_ALIAS_CRYPTO("sm2-generic");
H A DMakefile46 $(obj)/sm2.o: $(obj)/sm2signature.asn1.h
49 sm2_generic-y += sm2.o
/kernel/linux/linux-6.6/crypto/
H A Dsm2.c5 * described at https://tools.ietf.org/html/draft-shen-sm2-ecdsa-02
17 #include <crypto/sm2.h>
467 static struct akcipher_alg sm2 = { variable
474 .cra_name = "sm2",
475 .cra_driver_name = "sm2-generic",
484 return crypto_register_akcipher(&sm2); in sm2_init()
489 crypto_unregister_akcipher(&sm2); in sm2_exit()
498 MODULE_ALIAS_CRYPTO("sm2-generic");
H A DMakefile47 $(obj)/sm2.o: $(obj)/sm2signature.asn1.h
50 sm2_generic-y += sm2.o
/kernel/linux/linux-5.10/net/sched/
H A Dsch_hfsc.c89 u64 sm2; /* scaled slope of the 2nd segment */ member
101 u64 sm2; /* scaled slope of the 2nd segment */ member
480 isc->sm2 = m2sm(sc->m2); in sc2isc()
497 rtsc->sm2 = isc->sm2; in rtsc_init()
539 + seg_x2y(x - rtsc->x - rtsc->dx, rtsc->sm2); in rtsc_x2y()
553 if (isc->sm1 <= isc->sm2) { in rtsc_min()
590 * seg_x2y(dx, sm1) == seg_x2y(dx, sm2) + (y1 - y) in rtsc_min()
593 dsm = isc->sm1 - isc->sm2; in rtsc_min()
623 if (cl->cl_rsc.sm1 <= cl->cl_rsc.sm2) { in init_ed()
[all...]
/kernel/linux/linux-6.6/net/sched/
H A Dsch_hfsc.c89 u64 sm2; /* scaled slope of the 2nd segment */ member
101 u64 sm2; /* scaled slope of the 2nd segment */ member
479 isc->sm2 = m2sm(sc->m2); in sc2isc()
496 rtsc->sm2 = isc->sm2; in rtsc_init()
538 + seg_x2y(x - rtsc->x - rtsc->dx, rtsc->sm2); in rtsc_x2y()
552 if (isc->sm1 <= isc->sm2) { in rtsc_min()
589 * seg_x2y(dx, sm1) == seg_x2y(dx, sm2) + (y1 - y) in rtsc_min()
592 dsm = isc->sm1 - isc->sm2; in rtsc_min()
622 if (cl->cl_rsc.sm1 <= cl->cl_rsc.sm2) { in init_ed()
[all...]
/kernel/linux/linux-5.10/crypto/asymmetric_keys/
H A Dx509_cert_parser.c260 goto sm2; in x509_note_pkey_algo()
273 sm2: in x509_note_pkey_algo()
274 ctx->cert->sig->pkey_algo = "sm2"; in x509_note_pkey_algo()
304 strcmp(ctx->cert->sig->pkey_algo, "sm2") == 0 || in x509_note_signature()
505 ctx->cert->pub->pkey_algo = "sm2"; in x509_extract_key_data()
H A Dpublic_key.c21 #include <crypto/sm2.h>
118 } else if (strcmp(pkey->pkey_algo, "sm2") == 0) { in software_key_determine_akcipher()
424 if (strcmp(pkey->pkey_algo, "sm2") == 0 && sig->data_size) { in public_key_verify_signature()
/kernel/linux/linux-6.6/crypto/asymmetric_keys/
H A Dx509_cert_parser.c257 goto sm2; in x509_note_sig_algo()
270 sm2: in x509_note_sig_algo()
271 ctx->cert->sig->pkey_algo = "sm2"; in x509_note_sig_algo()
306 strcmp(ctx->cert->sig->pkey_algo, "sm2") == 0 || in x509_note_signature()
512 ctx->cert->pub->pkey_algo = "sm2"; in x509_extract_key_data()
520 ctx->cert->pub->pkey_algo = "sm2"; in x509_extract_key_data()
H A Dx509_public_key.c10 #include <crypto/sm2.h>
67 if (strcmp(cert->pub->pkey_algo, "sm2") == 0) { in x509_get_sig_params()

Completed in 9 milliseconds