/crypto/ |
H A D | deflate.c | 47 int ret = 0; local 53 ret = -ENOMEM; 56 ret = zlib_deflateInit2(stream, DEFLATE_DEF_LEVEL, Z_DEFLATED, 59 if (ret != Z_OK) { 60 ret = -EINVAL; 64 return ret; 72 int ret = 0; local 77 ret = -ENOMEM; 80 ret = zlib_inflateInit2(stream, -DEFLATE_DEF_WINBITS); 81 if (ret ! 107 int ret; local 130 int ret = 0; local 160 int ret = 0; local [all...] |
H A D | zlib.c | 89 int ret; local 91 ret = nla_parse(tb, ZLIB_COMP_MAX, params, len, NULL); 92 if (ret) 93 return ret; 109 ret = zlib_deflateInit2(stream, 121 if (ret != Z_OK) { 132 int ret; local 136 ret = zlib_deflateReset(stream); 137 if (ret != Z_OK) 146 int ret; local 184 int ret; local 218 int ret = 0; local 246 int ret; local 260 int ret; local 299 int ret; local [all...] |
H A D | tcrypt.c | 75 int ret; local 80 ret = crypto_blkcipher_encrypt(desc, sg, sg, blen); 82 ret = crypto_blkcipher_decrypt(desc, sg, sg, blen); 84 if (ret) 85 return ret; 97 int ret = 0; local 105 ret = crypto_blkcipher_encrypt(desc, sg, sg, blen); 107 ret = crypto_blkcipher_decrypt(desc, sg, sg, blen); 109 if (ret) 119 ret 146 unsigned int ret, i, j, iv_len; local 247 int ret; local 267 int ret; local 299 int ret; local 342 int ret; local 418 int ret; local 488 do_one_ahash_op(struct ahash_request *req, int ret) argument 506 int ret; local 526 int ret; local 557 int ret, i; local 595 int i, pcount, ret; local 656 int i, ret; local 716 do_one_acipher_op(struct ablkcipher_request *req, int ret) argument 735 int ret; local 759 int ret = 0; local 806 unsigned int ret, i, j, k, iv_len; local 943 int ret; local 955 int ret = 0; local [all...] |
H A D | testmgr.c | 176 int ret) 178 if (ret == -EINPROGRESS || ret == -EBUSY) { 179 ret = wait_for_completion_interruptible(&tr->completion); 180 if (!ret) 181 ret = tr->err; 184 return ret; 198 int ret = -ENOMEM; local 229 ret = crypto_ahash_setkey(tfm, template[i].key, 231 if (ret) { 174 do_one_async_hash_op(struct ahash_request *req, struct tcrypt_result *tr, int ret) argument 367 int ret = -ENOMEM; local 735 int ret; local 755 int ret = -ENOMEM; local 838 int ret = -ENOMEM; local 1078 int ret; local 1095 int ret; local [all...] |
H A D | crypto_null.c | 158 int ret = 0; local 160 ret = crypto_register_algs(null_algs, ARRAY_SIZE(null_algs)); 161 if (ret < 0) 164 ret = crypto_register_shash(&digest_null); 165 if (ret < 0) 173 return ret;
|
H A D | cipher.c | 28 int ret; local 39 ret = cia->cia_setkey(tfm, alignbuffer, keylen); 42 return ret;
|
H A D | pcrypt.c | 440 int ret; local 443 ret = kobject_add(&pinst->kobj, NULL, name); 444 if (!ret) 447 return ret; 453 int ret = -ENOMEM; local 479 ret = padata_register_cpumask_notifier(pcrypt->pinst, &pcrypt->nblock); 480 if (ret) 483 ret = pcrypt_sysfs_add(pcrypt->pinst, name); 484 if (ret) 489 return ret; [all...] |
H A D | algapi.c | 167 int ret = -EAGAIN; local 177 ret = -EEXIST; 203 ret = -ENOENT; 222 larval = ERR_PTR(ret); 372 int ret; local 376 ret = crypto_remove_alg(alg, &list); 379 if (ret) 380 return ret; 393 int i, ret; local 396 ret 413 int i, ret; local [all...] |
H A D | ansi_cprng.c | 283 int ret; local 309 ret = crypto_cipher_setkey(ctx->tfm, prng_key, klen); 310 if (ret) { 316 ret = 0; 320 return ret;
|
H A D | shash.c | 635 int i, ret; local 638 ret = crypto_register_shash(&algs[i]); 639 if (ret) 649 return ret; 655 int i, ret; local 658 ret = crypto_unregister_shash(&algs[i]); 659 if (ret) 662 algs[i].base.cra_name, ret);
|
H A D | api.c | 587 int ret = 0; local 592 ret = 1; 595 return ret;
|
H A D | aead.c | 34 int ret; local 45 ret = aead->setkey(tfm, alignbuffer, keylen); 48 return ret;
|
H A D | ahash.c | 153 int ret; local 164 ret = tfm->setkey(tfm, alignbuffer, keylen); 166 return ret;
|
H A D | ablkcipher.c | 314 int ret; local 325 ret = cipher->setkey(tfm, alignbuffer, keylen); 328 return ret;
|
H A D | blkcipher.c | 379 int ret; local 390 ret = cipher->setkey(tfm, alignbuffer, keylen); 393 return ret;
|
H A D | anubis.c | 691 int ret = 0; local 693 ret = crypto_register_alg(&anubis_alg); 694 return ret;
|
H A D | khazad.c | 866 int ret = 0; local 868 ret = crypto_register_alg(&khazad_alg); 869 return ret;
|
H A D | aes_generic.c | 1287 int ret; local 1289 ret = crypto_aes_expand_key(ctx, in_key, key_len); 1290 if (!ret)
|
H A D | des_generic.c | 787 int ret; local 790 ret = des_ekey(tmp, key); 792 if (unlikely(ret == 0) && (*flags & CRYPTO_TFM_REQ_WEAK_KEY)) {
|
/crypto/asymmetric_keys/ |
H A D | signature.c | 31 int ret; local 44 ret = subtype->verify_signature(key, sig); 46 pr_devel("<==%s() = %d\n", __func__, ret); 47 return ret;
|
H A D | x509_public_key.c | 45 int ret; local 62 ret = -ENOMEM; 75 ret = crypto_shash_init(desc); 76 if (ret < 0) 79 ret = -ENOMEM; 84 ret = crypto_shash_finup(desc, cert->tbs, cert->tbs_size, sig->digest); 85 if (ret < 0) 88 ret = pub->algo->verify_signature(pub, sig); 90 pr_debug("Cert Verification: %d\n", ret); 99 pr_devel("<==%s() = %d\n", __func__, ret); 112 int ret; local [all...] |
H A D | asymmetric_type.c | 123 int ret; local 132 ret = -EBADMSG; 136 ret = parser->parse(prep); 137 if (ret != -EBADMSG) { 138 pr_debug("Parser recognised the format (ret %d)\n", 139 ret); 145 pr_devel("<==%s() = %d\n", __func__, ret); 146 return ret; 172 int ret; local 176 ret 222 int ret; local [all...] |
H A D | rsa.c | 92 int ret; local 109 ret = mpi_powm(m, s, key->rsa.e, key->rsa.n); 110 if (ret < 0) { 112 return ret; 213 int ret; local 237 ret = -EBADMSG; 245 ret = RSAVP1(key, sig->rsa.s, &m); 246 if (ret < 0) 255 ret = RSA_I2OSP(m, k, &EM); 256 if (ret < [all...] |
H A D | x509_cert_parser.c | 61 long ret; local 63 ret = -ENOMEM; 78 ret = asn1_ber_decoder(&x509_decoder, ctx, data, datalen); 79 if (ret < 0) 83 ret = asn1_ber_decoder(&x509_rsakey_decoder, ctx, 85 if (ret < 0) 96 return ERR_PTR(ret);
|