Lines Matching refs:SEC_CTX_DEV

45 #define SEC_CTX_DEV(ctx)	(&(ctx)->sec->qm.pdev->dev)  macro
98 dev_err(SEC_CTX_DEV(req->ctx), "alloc req id fail!\n"); in sec_alloc_req_id()
113 dev_err(SEC_CTX_DEV(req->ctx), "free request id invalid!\n"); in sec_free_req_id()
139 dev_err(SEC_CTX_DEV(req->ctx), "aead verify failure!\n"); in sec_aead_verify()
178 dev_err(SEC_CTX_DEV(ctx), in sec_req_cb()
326 struct device *dev = SEC_CTX_DEV(ctx); in sec_alg_resource_alloc()
360 struct device *dev = SEC_CTX_DEV(ctx); in sec_alg_resource_free()
373 struct device *dev = SEC_CTX_DEV(ctx); in sec_create_qp_ctx()
429 struct device *dev = SEC_CTX_DEV(ctx); in sec_release_qp_ctx()
500 c_ctx->c_key = dma_alloc_coherent(SEC_CTX_DEV(ctx), SEC_MAX_KEY_SIZE, in sec_cipher_init()
513 dma_free_coherent(SEC_CTX_DEV(ctx), SEC_MAX_KEY_SIZE, in sec_cipher_uninit()
521 a_ctx->a_key = dma_alloc_coherent(SEC_CTX_DEV(ctx), SEC_MAX_KEY_SIZE, in sec_auth_init()
534 dma_free_coherent(SEC_CTX_DEV(ctx), SEC_MAX_KEY_SIZE, in sec_auth_uninit()
547 dev_err(SEC_CTX_DEV(ctx), "get error skcipher iv size!\n"); in sec_skcipher_init()
639 dev_err(SEC_CTX_DEV(ctx), "xts mode key err!\n"); in sec_skcipher_setkey()
660 dev_err(SEC_CTX_DEV(ctx), "set sec key err!\n"); in sec_skcipher_setkey()
692 struct device *dev = SEC_CTX_DEV(ctx); in GEN_SEC_SETKEY_FUNC()
728 struct device *dev = SEC_CTX_DEV(ctx); in sec_cipher_pbuf_unmap()
753 struct device *dev = SEC_CTX_DEV(ctx); in sec_cipher_map()
808 struct device *dev = SEC_CTX_DEV(ctx); in sec_cipher_unmap()
905 dev_err(SEC_CTX_DEV(ctx), "set sec cipher key err!\n"); in sec_aead_setkey()
911 dev_err(SEC_CTX_DEV(ctx), "set sec auth key err!\n"); in sec_aead_setkey()
1064 dev_err(SEC_CTX_DEV(req->ctx), "copy output iv error!\n"); in sec_update_iv()
1163 dev_err(SEC_CTX_DEV(ctx), "skcipher bd fill is error!\n"); in sec_aead_bd_fill()
1197 dev_err(SEC_CTX_DEV(req->ctx), "copy out mac err!\n"); in sec_aead_callback()
1262 dev_err_ratelimited(SEC_CTX_DEV(ctx), "send sec request failed!\n"); in sec_process()
1329 dev_err(SEC_CTX_DEV(ctx), "get error aead iv size!\n"); in sec_aead_init()
1379 dev_err(SEC_CTX_DEV(ctx), "aead alloc shash error!\n"); in sec_aead_ctx_init()
1413 struct device *dev = SEC_CTX_DEV(ctx); in sec_skcipher_param_check()
1543 dev_err(SEC_CTX_DEV(ctx), "aead input param error!\n"); in sec_aead_param_check()
1555 dev_err(SEC_CTX_DEV(ctx), "aead crypto alg error!\n"); in sec_aead_param_check()
1565 dev_err(SEC_CTX_DEV(ctx), "aead crypto length error!\n"); in sec_aead_param_check()