Home
last modified time | relevance | path

Searched refs:key_size (Results 1 – 10 of 10) sorted by relevance

/crypto/
Drsa-pkcs1pad.c93 unsigned int key_size; member
113 ctx->key_size = 0; in pkcs1pad_set_pub_key()
124 ctx->key_size = err; in pkcs1pad_set_pub_key()
134 ctx->key_size = 0; in pkcs1pad_set_priv_key()
145 ctx->key_size = err; in pkcs1pad_set_priv_key()
159 return ctx->key_size; in pkcs1pad_get_max_size()
187 pad_len = ctx->key_size - len; in pkcs1pad_encrypt_sign_complete()
193 out_buf = kzalloc(ctx->key_size, GFP_KERNEL); in pkcs1pad_encrypt_sign_complete()
201 sg_nents_for_len(req->dst, ctx->key_size), in pkcs1pad_encrypt_sign_complete()
202 out_buf, ctx->key_size); in pkcs1pad_encrypt_sign_complete()
[all …]
Ddh_helper.c31 return p->key_size + p->p_size + p->q_size + p->g_size; in dh_data_size()
53 ptr = dh_pack_data(ptr, end, &params->key_size, in crypto_dh_encode_key()
54 sizeof(params->key_size)); in crypto_dh_encode_key()
58 ptr = dh_pack_data(ptr, end, params->key, params->key_size); in crypto_dh_encode_key()
80 ptr = dh_unpack_data(&params->key_size, ptr, sizeof(params->key_size)); in crypto_dh_decode_key()
91 if (params->key_size > params->p_size || in crypto_dh_decode_key()
99 params->p = (void *)(ptr + params->key_size); in crypto_dh_decode_key()
100 params->q = (void *)(ptr + params->key_size + params->p_size); in crypto_dh_decode_key()
101 params->g = (void *)(ptr + params->key_size + params->p_size + in crypto_dh_decode_key()
Decdh_helper.c29 return ECDH_KPP_SECRET_MIN_SIZE + params->key_size; in crypto_ecdh_key_len()
49 ptr = ecdh_pack_data(ptr, &params->key_size, sizeof(params->key_size)); in crypto_ecdh_encode_key()
50 ecdh_pack_data(ptr, params->key, params->key_size); in crypto_ecdh_encode_key()
72 ptr = ecdh_unpack_data(&params->key_size, ptr, sizeof(params->key_size)); in crypto_ecdh_decode_key()
Dfips140-selftests.c66 size_t key_size; member
80 size_t key_size; member
91 size_t key_size; member
208 err = aes_expandkey(&ctx, vec->key, vec->key_size); in fips_test_aes_library()
264 err = crypto_skcipher_setkey(tfm, vec->key, vec->key_size); in fips_test_skcipher()
347 err = crypto_aead_setkey(tfm, vec->key, vec->key_size); in fips_test_aead()
428 err = crypto_shash_setkey(tfm, vec->key, vec->key_size); in fips_test_hash()
579 .key_size = sizeof(fips_aes_key),
616 .key_size = sizeof(fips_aes_key),
652 .key_size = sizeof(fips_aes_key),
[all …]
Decdh.c33 params.key_size > sizeof(u64) * ctx->ndigits) in ecdh_set_secret()
36 if (!params.key || !params.key_size) in ecdh_set_secret()
40 memcpy(ctx->private_key, params.key, params.key_size); in ecdh_set_secret()
43 ctx->private_key, params.key_size) < 0) { in ecdh_set_secret()
44 memzero_explicit(ctx->private_key, params.key_size); in ecdh_set_secret()
Ddh.c90 ctx->xa = mpi_read_raw_data(params.key, params.key_size); in dh_set_secret()
/crypto/asymmetric_keys/
Dpkcs8_parser.c25 u32 key_size; member
90 ctx->key_size = vlen; in pkcs8_note_key()
119 pub->key = kmemdup(ctx.key, ctx.key_size, GFP_KERNEL); in pkcs8_parse()
123 pub->keylen = ctx.key_size; in pkcs8_parse()
Dx509_cert_parser.c24 size_t key_size; /* Size of key data */ member
105 cert->pub->key = kmemdup(ctx->key, ctx->key_size, GFP_KERNEL); in x509_cert_parse()
109 cert->pub->keylen = ctx->key_size; in x509_cert_parse()
528 ctx->key_size = vlen - 1; in x509_extract_key_data()
Dpublic_key.c188 info->key_size = len * 8; in software_key_query()
Dasym_tpm.c421 info->key_size = tk->key_len; in tpm_key_query()