Lines Matching +full:pre +full:- +full:filled

1 /* SPDX-License-Identifier: GPL-2.0-or-later */
5 * Copyright (c) 2007-2015 Herbert Xu <herbert@gondor.apana.org.au>
21 * struct skcipher_request - Symmetric key cipher request
53 * struct crypto_istat_cipher - statistics for cipher algorithm
69 * struct skcipher_alg - symmetric key cipher definition
72 * This must be set to one of the pre-defined values as this is
77 * This must be set to one of the pre-defined values as this is
98 * re-programmed into the hardware in this function. This function
124 * All fields except @ivsize are mandatory and must be filled.
149 * This performs a type-check against the "tfm" argument to make sure
150 * all users have the correct skcipher tfm for doing on-stack requests.
169 * load-balanced on the different CPUs via the process scheduler. To allow
197 * crypto_alloc_skcipher() - allocate symmetric key cipher handle
219 return &tfm->base; in crypto_skcipher_tfm()
223 * crypto_free_skcipher() - zeroize and free cipher handle
235 crypto_free_skcipher(&tfm->base); in crypto_free_sync_skcipher()
239 * crypto_has_skcipher() - Search for the availability of an skcipher.
259 return container_of(crypto_skcipher_tfm(tfm)->__crt_alg, in crypto_skcipher_alg()
265 return alg->ivsize; in crypto_skcipher_alg_ivsize()
269 * crypto_skcipher_ivsize() - obtain IV size
279 return crypto_skcipher_alg(tfm)->ivsize; in crypto_skcipher_ivsize()
285 return crypto_skcipher_ivsize(&tfm->base); in crypto_sync_skcipher_ivsize()
289 * crypto_skcipher_blocksize() - obtain block size of cipher
307 return alg->chunksize; in crypto_skcipher_alg_chunksize()
311 * crypto_skcipher_chunksize() - obtain chunk size
316 * the underlying block size as the IV does not have sub-block
330 return crypto_skcipher_blocksize(&tfm->base); in crypto_sync_skcipher_blocksize()
359 return crypto_skcipher_get_flags(&tfm->base); in crypto_sync_skcipher_get_flags()
365 crypto_skcipher_set_flags(&tfm->base, flags); in crypto_sync_skcipher_set_flags()
371 crypto_skcipher_clear_flags(&tfm->base, flags); in crypto_sync_skcipher_clear_flags()
375 * crypto_skcipher_setkey() - set key for cipher
384 * different cipher modes depending on the key size, such as AES-128 vs AES-192
385 * vs. AES-256. When providing a 16 byte key for an AES cipher handle, AES-128
396 return crypto_skcipher_setkey(&tfm->base, key, keylen); in crypto_sync_skcipher_setkey()
402 return crypto_skcipher_alg(tfm)->min_keysize; in crypto_skcipher_min_keysize()
408 return crypto_skcipher_alg(tfm)->max_keysize; in crypto_skcipher_max_keysize()
412 * crypto_skcipher_reqtfm() - obtain cipher handle from request
423 return __crypto_skcipher_cast(req->base.tfm); in crypto_skcipher_reqtfm()
435 * crypto_skcipher_encrypt() - encrypt plaintext
440 * structure and how it is filled with data is discussed with the
448 * crypto_skcipher_decrypt() - decrypt ciphertext
453 * structure and how it is filled with data is discussed with the
472 * crypto_skcipher_reqsize() - obtain size of the request data structure
479 return tfm->reqsize; in crypto_skcipher_reqsize()
483 * skcipher_request_set_tfm() - update cipher handle reference in request
493 req->base.tfm = crypto_skcipher_tfm(tfm); in skcipher_request_set_tfm()
499 skcipher_request_set_tfm(req, &tfm->base); in skcipher_request_set_sync_tfm()
509 * skcipher_request_alloc() - allocate request data structure
534 * skcipher_request_free() - zeroize and free request data structure
550 * skcipher_request_set_callback() - set asynchronous callback function
579 req->base.complete = compl; in skcipher_request_set_callback()
580 req->base.data = data; in skcipher_request_set_callback()
581 req->base.flags = flags; in skcipher_request_set_callback()
585 * skcipher_request_set_crypt() - set data buffers
598 * reversed - the source is the ciphertext and the destination is the plaintext.
605 req->src = src; in skcipher_request_set_crypt()
606 req->dst = dst; in skcipher_request_set_crypt()
607 req->cryptlen = cryptlen; in skcipher_request_set_crypt()
608 req->iv = iv; in skcipher_request_set_crypt()