Searched refs:key_size (Results 1 – 10 of 10) sorted by relevance
/crypto/ |
D | rsa-pkcs1pad.c | 93 unsigned int key_size; member 113 ctx->key_size = 0; in pkcs1pad_set_pub_key() 124 ctx->key_size = err; in pkcs1pad_set_pub_key() 134 ctx->key_size = 0; in pkcs1pad_set_priv_key() 145 ctx->key_size = err; in pkcs1pad_set_priv_key() 159 return ctx->key_size; in pkcs1pad_get_max_size() 187 pad_len = ctx->key_size - len; in pkcs1pad_encrypt_sign_complete() 193 out_buf = kzalloc(ctx->key_size, GFP_KERNEL); in pkcs1pad_encrypt_sign_complete() 201 sg_nents_for_len(req->dst, ctx->key_size), in pkcs1pad_encrypt_sign_complete() 202 out_buf, ctx->key_size); in pkcs1pad_encrypt_sign_complete() [all …]
|
D | dh_helper.c | 31 return p->key_size + p->p_size + p->q_size + p->g_size; in dh_data_size() 53 ptr = dh_pack_data(ptr, end, ¶ms->key_size, in crypto_dh_encode_key() 54 sizeof(params->key_size)); in crypto_dh_encode_key() 58 ptr = dh_pack_data(ptr, end, params->key, params->key_size); in crypto_dh_encode_key() 80 ptr = dh_unpack_data(¶ms->key_size, ptr, sizeof(params->key_size)); in crypto_dh_decode_key() 91 if (params->key_size > params->p_size || in crypto_dh_decode_key() 99 params->p = (void *)(ptr + params->key_size); in crypto_dh_decode_key() 100 params->q = (void *)(ptr + params->key_size + params->p_size); in crypto_dh_decode_key() 101 params->g = (void *)(ptr + params->key_size + params->p_size + in crypto_dh_decode_key()
|
D | ecdh_helper.c | 29 return ECDH_KPP_SECRET_MIN_SIZE + params->key_size; in crypto_ecdh_key_len() 49 ptr = ecdh_pack_data(ptr, ¶ms->key_size, sizeof(params->key_size)); in crypto_ecdh_encode_key() 50 ecdh_pack_data(ptr, params->key, params->key_size); in crypto_ecdh_encode_key() 72 ptr = ecdh_unpack_data(¶ms->key_size, ptr, sizeof(params->key_size)); in crypto_ecdh_decode_key()
|
D | fips140-selftests.c | 66 size_t key_size; member 80 size_t key_size; member 91 size_t key_size; member 208 err = aes_expandkey(&ctx, vec->key, vec->key_size); in fips_test_aes_library() 264 err = crypto_skcipher_setkey(tfm, vec->key, vec->key_size); in fips_test_skcipher() 347 err = crypto_aead_setkey(tfm, vec->key, vec->key_size); in fips_test_aead() 428 err = crypto_shash_setkey(tfm, vec->key, vec->key_size); in fips_test_hash() 579 .key_size = sizeof(fips_aes_key), 616 .key_size = sizeof(fips_aes_key), 652 .key_size = sizeof(fips_aes_key), [all …]
|
D | ecdh.c | 33 params.key_size > sizeof(u64) * ctx->ndigits) in ecdh_set_secret() 36 if (!params.key || !params.key_size) in ecdh_set_secret() 40 memcpy(ctx->private_key, params.key, params.key_size); in ecdh_set_secret() 43 ctx->private_key, params.key_size) < 0) { in ecdh_set_secret() 44 memzero_explicit(ctx->private_key, params.key_size); in ecdh_set_secret()
|
D | dh.c | 90 ctx->xa = mpi_read_raw_data(params.key, params.key_size); in dh_set_secret()
|
/crypto/asymmetric_keys/ |
D | pkcs8_parser.c | 25 u32 key_size; member 90 ctx->key_size = vlen; in pkcs8_note_key() 119 pub->key = kmemdup(ctx.key, ctx.key_size, GFP_KERNEL); in pkcs8_parse() 123 pub->keylen = ctx.key_size; in pkcs8_parse()
|
D | x509_cert_parser.c | 24 size_t key_size; /* Size of key data */ member 105 cert->pub->key = kmemdup(ctx->key, ctx->key_size, GFP_KERNEL); in x509_cert_parse() 109 cert->pub->keylen = ctx->key_size; in x509_cert_parse() 528 ctx->key_size = vlen - 1; in x509_extract_key_data()
|
D | public_key.c | 188 info->key_size = len * 8; in software_key_query()
|
D | asym_tpm.c | 421 info->key_size = tk->key_len; in tpm_key_query()
|