Searched refs:ealg (Results 1 - 12 of 12) sorted by relevance

/linux-master/net/key/
H A Daf_key.c810 if (x->ealg && x->ealg->alg_key_len) {
812 PFKEY_ALIGN8((x->ealg->alg_key_len+7) / 8);
859 BUG_ON(x->ealg && x->calg);
860 if (x->ealg) {
861 struct xfrm_algo_desc *a = xfrm_ealg_get_byname(x->ealg->alg_name, 0);
978 key->sadb_key_bits = x->ealg->alg_key_len;
980 memcpy(key + 1, x->ealg->alg_key,
981 (x->ealg->alg_key_len+7)/8);
1216 x->ealg
1671 struct xfrm_algo_desc *ealg = xfrm_ealg_get_byidx(i); local
2922 const struct xfrm_algo_desc *ealg = xfrm_ealg_get_byidx(i); local
2998 const struct xfrm_algo_desc *ealg = xfrm_ealg_get_byidx(i); local
[all...]
/linux-master/drivers/net/ethernet/netronome/nfp/crypto/
H A Dipsec.c443 if (!x->ealg) {
447 if (set_aes_keylen(cfg, x->props.ealgo, x->ealg->alg_key_len) < 0) {
487 if (x->ealg) {
488 key_len = DIV_ROUND_UP(x->ealg->alg_key_len, BITS_PER_BYTE);
491 NL_SET_ERR_MSG_MOD(extack, "ealg: Insufficient space for offloaded key");
495 cfg->ciph_key[i] = get_unaligned_be32(x->ealg->alg_key +
/linux-master/net/ipv6/
H A Desp6.c1110 x->ealg->alg_name,
1120 x->ealg->alg_name,
1137 (x->ealg->alg_key_len + 7) / 8 + RTA_SPACE(sizeof(*param));
1174 param->enckeylen = cpu_to_be32((x->ealg->alg_key_len + 7) / 8);
1175 memcpy(p, x->ealg->alg_key, (x->ealg->alg_key_len + 7) / 8);
1196 } else if (x->ealg) {
/linux-master/net/ipv4/
H A Desp4.c1067 x->ealg->alg_name,
1077 x->ealg->alg_name,
1094 (x->ealg->alg_key_len + 7) / 8 + RTA_SPACE(sizeof(*param));
1131 param->enckeylen = cpu_to_be32((x->ealg->alg_key_len + 7) / 8);
1132 memcpy(p, x->ealg->alg_key, (x->ealg->alg_key_len + 7) / 8);
1153 } else if (x->ealg) {
/linux-master/drivers/crypto/
H A Dgeode-aes.c396 goto ealg;
401 ealg:
H A Domap-sham.c2144 struct ahash_engine_alg *ealg; local
2147 ealg = &dd->pdata->algs_info[i].algs_list[j];
2148 alg = &ealg->base;
2153 err = crypto_engine_register_ahash(ealg);
/linux-master/net/xfrm/
H A Dxfrm_user.c418 x->ealg = p;
1029 static int copy_to_user_ealg(struct xfrm_algo *ealg, struct sk_buff *skb) argument
1034 xfrm_alg_len(ealg));
1039 strscpy_pad(ap->alg_name, ealg->alg_name, sizeof(ap->alg_name));
1040 ap->alg_key_len = ealg->alg_key_len;
1042 if (redact_secret && ealg->alg_key_len)
1043 memset(ap->alg_key, 0, (ealg->alg_key_len + 7) / 8);
1045 memcpy(ap->alg_key, ealg->alg_key,
1046 (ealg->alg_key_len + 7) / 8);
1134 if (x->ealg) {
[all...]
H A Dxfrm_state.c528 kfree(x->ealg);
1686 if (orig->ealg) {
1687 x->ealg = xfrm_algo_clone(orig->ealg);
1688 if (!x->ealg)
/linux-master/drivers/net/ethernet/intel/ixgbevf/
H A Dipsec.c310 rsa.decrypt = xs->ealg || xs->aead;
364 tsa.encrypt = xs->ealg || xs->aead;
/linux-master/drivers/net/netdevsim/
H A Dipsec.c170 sa.crypt = xs->ealg || xs->aead;
/linux-master/drivers/net/ethernet/intel/ixgbe/
H A Dixgbe_ipsec.c615 rsa.decrypt = xs->ealg || xs->aead;
725 tsa.encrypt = xs->ealg || xs->aead;
/linux-master/include/net/
H A Dxfrm.h218 struct xfrm_algo *ealg; member in struct:xfrm_state

Completed in 154 milliseconds