Searched refs:ealg (Results 1 - 12 of 12) sorted by relevance
/linux-master/net/key/ |
H A D | af_key.c | 810 if (x->ealg && x->ealg->alg_key_len) { 812 PFKEY_ALIGN8((x->ealg->alg_key_len+7) / 8); 859 BUG_ON(x->ealg && x->calg); 860 if (x->ealg) { 861 struct xfrm_algo_desc *a = xfrm_ealg_get_byname(x->ealg->alg_name, 0); 978 key->sadb_key_bits = x->ealg->alg_key_len; 980 memcpy(key + 1, x->ealg->alg_key, 981 (x->ealg->alg_key_len+7)/8); 1216 x->ealg 1671 struct xfrm_algo_desc *ealg = xfrm_ealg_get_byidx(i); local 2922 const struct xfrm_algo_desc *ealg = xfrm_ealg_get_byidx(i); local 2998 const struct xfrm_algo_desc *ealg = xfrm_ealg_get_byidx(i); local [all...] |
/linux-master/drivers/net/ethernet/netronome/nfp/crypto/ |
H A D | ipsec.c | 443 if (!x->ealg) { 447 if (set_aes_keylen(cfg, x->props.ealgo, x->ealg->alg_key_len) < 0) { 487 if (x->ealg) { 488 key_len = DIV_ROUND_UP(x->ealg->alg_key_len, BITS_PER_BYTE); 491 NL_SET_ERR_MSG_MOD(extack, "ealg: Insufficient space for offloaded key"); 495 cfg->ciph_key[i] = get_unaligned_be32(x->ealg->alg_key +
|
/linux-master/net/ipv6/ |
H A D | esp6.c | 1110 x->ealg->alg_name, 1120 x->ealg->alg_name, 1137 (x->ealg->alg_key_len + 7) / 8 + RTA_SPACE(sizeof(*param)); 1174 param->enckeylen = cpu_to_be32((x->ealg->alg_key_len + 7) / 8); 1175 memcpy(p, x->ealg->alg_key, (x->ealg->alg_key_len + 7) / 8); 1196 } else if (x->ealg) {
|
/linux-master/net/ipv4/ |
H A D | esp4.c | 1067 x->ealg->alg_name, 1077 x->ealg->alg_name, 1094 (x->ealg->alg_key_len + 7) / 8 + RTA_SPACE(sizeof(*param)); 1131 param->enckeylen = cpu_to_be32((x->ealg->alg_key_len + 7) / 8); 1132 memcpy(p, x->ealg->alg_key, (x->ealg->alg_key_len + 7) / 8); 1153 } else if (x->ealg) {
|
/linux-master/drivers/crypto/ |
H A D | geode-aes.c | 396 goto ealg; 401 ealg:
|
H A D | omap-sham.c | 2144 struct ahash_engine_alg *ealg; local 2147 ealg = &dd->pdata->algs_info[i].algs_list[j]; 2148 alg = &ealg->base; 2153 err = crypto_engine_register_ahash(ealg);
|
/linux-master/net/xfrm/ |
H A D | xfrm_user.c | 418 x->ealg = p; 1029 static int copy_to_user_ealg(struct xfrm_algo *ealg, struct sk_buff *skb) argument 1034 xfrm_alg_len(ealg)); 1039 strscpy_pad(ap->alg_name, ealg->alg_name, sizeof(ap->alg_name)); 1040 ap->alg_key_len = ealg->alg_key_len; 1042 if (redact_secret && ealg->alg_key_len) 1043 memset(ap->alg_key, 0, (ealg->alg_key_len + 7) / 8); 1045 memcpy(ap->alg_key, ealg->alg_key, 1046 (ealg->alg_key_len + 7) / 8); 1134 if (x->ealg) { [all...] |
H A D | xfrm_state.c | 528 kfree(x->ealg); 1686 if (orig->ealg) { 1687 x->ealg = xfrm_algo_clone(orig->ealg); 1688 if (!x->ealg)
|
/linux-master/drivers/net/ethernet/intel/ixgbevf/ |
H A D | ipsec.c | 310 rsa.decrypt = xs->ealg || xs->aead; 364 tsa.encrypt = xs->ealg || xs->aead;
|
/linux-master/drivers/net/netdevsim/ |
H A D | ipsec.c | 170 sa.crypt = xs->ealg || xs->aead;
|
/linux-master/drivers/net/ethernet/intel/ixgbe/ |
H A D | ixgbe_ipsec.c | 615 rsa.decrypt = xs->ealg || xs->aead; 725 tsa.encrypt = xs->ealg || xs->aead;
|
/linux-master/include/net/ |
H A D | xfrm.h | 218 struct xfrm_algo *ealg; member in struct:xfrm_state
|
Completed in 154 milliseconds