Lines Matching defs:crypto

14 #include <linux/crypto.h>
22 #include <crypto/algapi.h>
23 #include <crypto/aead.h>
24 #include <crypto/internal/aead.h>
25 #include <crypto/aes.h>
26 #include <crypto/internal/des.h>
27 #include <crypto/hmac.h>
28 #include <crypto/md5.h>
29 #include <crypto/authenc.h>
30 #include <crypto/skcipher.h>
31 #include <crypto/hash.h>
32 #include <crypto/sha1.h>
33 #include <crypto/sha2.h>
34 #include <crypto/sha3.h>
62 * algo type when this driver registers algos with the kernel crypto API.
100 * select_channel() - Select a SPU channel to handle a crypto request. Selects
117 * @rctx: crypto request context
182 * @rctx: crypto request context
218 /* if XTS tweak in payload, copy from IV (where crypto API puts it) */
287 * This may be called on the crypto API thread, or, when a request is so large
509 * @rctx: crypto request context
560 * @rctx: crypto request context
627 * handle_ahash_req() - Process an asynchronous hash request from the crypto
633 * constructed as a scatterlist, including entries from the crypto API's
635 * called either on the thread from the crypto API, or, in the case that the
636 * crypto API request is too large to fit in a single SPU request message,
889 * @req: The HMAC request from the crypto API
989 * Checks if the entire crypto API request has been processed, and if so,
1022 * @rctx: crypto request context
1025 * @assoc_len: Length of associated data included in the crypto request
1028 * dst buffer from crypto API
1139 * @rctx: crypto request context
1143 * @assoc: crypto API associated data scatterlist
1254 * Return: -EINPROGRESS: crypto request has been accepted and result will be
1338 * Count number of sg entries from the crypto API request that are to
1552 * buffer. In decrypt case, SPU gives us back the digest, but crypto
1680 * we saved data in hash carry, but tell crypto
1850 /* SPU needs XTS keys in the reverse order the crypto API presents */
1950 * we saved data in hash carry, but tell crypto API
4371 struct skcipher_alg *crypto = &driver_alg->alg.skcipher;
4374 crypto->base.cra_module = THIS_MODULE;
4375 crypto->base.cra_priority = cipher_pri;
4376 crypto->base.cra_alignmask = 0;
4377 crypto->base.cra_ctxsize = sizeof(struct iproc_ctx_s);
4378 crypto->base.cra_flags = CRYPTO_ALG_ASYNC |
4382 crypto->init = skcipher_init_tfm;
4383 crypto->exit = skcipher_exit_tfm;
4384 crypto->setkey = skcipher_setkey;
4385 crypto->encrypt = skcipher_encrypt;
4386 crypto->decrypt = skcipher_decrypt;
4388 err = crypto_register_skcipher(crypto);
4392 pr_debug(" registered skcipher %s\n", crypto->base.cra_driver_name);
4480 /* register crypto algorithms the device supports */
4499 "iproc-crypto: unknown alg type: %d",
4556 .compatible = "brcm,spum-crypto",
4560 .compatible = "brcm,spum-nsp-crypto",
4564 .compatible = "brcm,spu2-crypto",
4568 .compatible = "brcm,spu2-v2-crypto",
4703 .name = "brcm-spu-crypto",
4712 MODULE_DESCRIPTION("Broadcom symmetric crypto offload driver");