Home
last modified time | relevance | path

Searched refs:value (Results 1 – 13 of 13) sorted by relevance

/crypto/
Drsa_helper.c17 const void *value, size_t vlen) in rsa_get_n() argument
20 const u8 *ptr = value; in rsa_get_n()
24 if (!value || !vlen) in rsa_get_n()
40 key->n = value; in rsa_get_n()
47 const void *value, size_t vlen) in rsa_get_e() argument
52 if (!value || !key->n_sz || !vlen || vlen > key->n_sz) in rsa_get_e()
55 key->e = value; in rsa_get_e()
62 const void *value, size_t vlen) in rsa_get_d() argument
67 if (!value || !key->n_sz || !vlen || vlen > key->n_sz) in rsa_get_d()
70 key->d = value; in rsa_get_d()
[all …]
Dsm2.c139 static int sm2_ecc_os2ec(MPI_POINT result, MPI value) in sm2_ecc_os2ec() argument
146 n = MPI_NBYTES(value); in sm2_ecc_os2ec()
151 rc = mpi_print(GCRYMPI_FMT_USG, buf, n, &n, value); in sm2_ecc_os2ec()
193 const void *value, size_t vlen) in sm2_get_signature_r() argument
197 if (!value || !vlen) in sm2_get_signature_r()
200 sig->sig_r = mpi_read_raw_data(value, vlen); in sm2_get_signature_r()
208 const void *value, size_t vlen) in sm2_get_signature_s() argument
212 if (!value || !vlen) in sm2_get_signature_s()
215 sig->sig_s = mpi_read_raw_data(value, vlen); in sm2_get_signature_s()
Decdsa.c36 const void *value, size_t vlen, unsigned int ndigits) in ecdsa_get_signature_rs() argument
40 const char *d = value; in ecdsa_get_signature_rs()
43 if (!value || !vlen) in ecdsa_get_signature_rs()
77 const void *value, size_t vlen) in ecdsa_get_signature_r() argument
81 return ecdsa_get_signature_rs(sig->r, hdrlen, tag, value, vlen, in ecdsa_get_signature_r()
86 const void *value, size_t vlen) in ecdsa_get_signature_s() argument
90 return ecdsa_get_signature_rs(sig->s, hdrlen, tag, value, vlen, in ecdsa_get_signature_s()
Decrdsa.c151 const void *value, size_t vlen) in ecrdsa_param_curve() argument
155 ctx->curve_oid = look_up_OID(value, vlen); in ecrdsa_param_curve()
164 const void *value, size_t vlen) in ecrdsa_param_digest() argument
167 int digest_oid = look_up_OID(value, vlen); in ecrdsa_param_digest()
175 const void *value, size_t vlen) in ecrdsa_parse_pub_key() argument
179 ctx->key = value; in ecrdsa_parse_pub_key()
Djitterentropy.h22 int jent_raw_hires_entropy_store(__u32 value);
26 static inline int jent_raw_hires_entropy_store(__u32 value) { return 0; } in jent_raw_hires_entropy_store() argument
Djitterentropy-testing.c75 static bool jent_testing_store(struct jent_testing *data, u32 value, in jent_testing_store() argument
103 JENT_TEST_RINGBUFFER_MASK] = value; in jent_testing_store()
254 int jent_raw_hires_entropy_store(__u32 value) in jent_raw_hires_entropy_store() argument
256 return jent_testing_store(&jent_raw_hires, value, &boot_raw_hires_test); in jent_raw_hires_entropy_store()
Dwp512.c1018 u64 value = bits_len; in wp512_update() local
1019 for (i = 31, carry = 0; i >= 0 && (carry != 0 || value != 0ULL); i--) { in wp512_update()
1020 carry += bitLength[i] + ((u32)value & 0xff); in wp512_update()
1023 value >>= 8; in wp512_update()
DKconfig55 By default the KERNELRELEASE value is used.
/crypto/asymmetric_keys/
Dx509_cert_parser.c155 const void *value, size_t vlen) in x509_note_OID() argument
159 ctx->last_oid = look_up_OID(value, vlen); in x509_note_OID()
162 sprint_oid(value, vlen, buffer, sizeof(buffer)); in x509_note_OID()
164 (unsigned long)value - ctx->data, buffer); in x509_note_OID()
175 const void *value, size_t vlen) in x509_note_tbs_certificate() argument
180 hdrlen, tag, (unsigned long)value - ctx->data, vlen); in x509_note_tbs_certificate()
182 ctx->cert->tbs = value - hdrlen; in x509_note_tbs_certificate()
191 const void *value, size_t vlen) in x509_note_sig_algo() argument
287 const void *value, size_t vlen) in x509_note_signature() argument
309 if (vlen < 1 || *(const u8 *)value != 0) in x509_note_signature()
[all …]
Dpkcs7_parser.c206 const void *value, size_t vlen) in pkcs7_note_OID() argument
210 ctx->last_oid = look_up_OID(value, vlen); in pkcs7_note_OID()
213 sprint_oid(value, vlen, buffer, sizeof(buffer)); in pkcs7_note_OID()
215 (unsigned long)value - ctx->data, buffer); in pkcs7_note_OID()
225 const void *value, size_t vlen) in pkcs7_sig_note_digest_algo() argument
272 const void *value, size_t vlen) in pkcs7_sig_note_pkey_algo() argument
310 const void *value, size_t vlen) in pkcs7_check_content_type() argument
327 const void *value, size_t vlen) in pkcs7_note_signeddata_version() argument
335 ctx->msg->version = version = *(const u8 *)value; in pkcs7_note_signeddata_version()
361 const void *value, size_t vlen) in pkcs7_note_signerinfo_version() argument
[all …]
Dmscode_parser.c38 const void *value, size_t vlen) in mscode_note_content_type() argument
42 oid = look_up_OID(value, vlen); in mscode_note_content_type()
46 sprint_oid(value, vlen, buffer, sizeof(buffer)); in mscode_note_content_type()
70 const void *value, size_t vlen) in mscode_note_digest_algo() argument
76 oid = look_up_OID(value, vlen); in mscode_note_digest_algo()
101 sprint_oid(value, vlen, buffer, sizeof(buffer)); in mscode_note_digest_algo()
118 const void *value, size_t vlen) in mscode_note_digest() argument
122 ctx->digest = kmemdup(value, vlen, GFP_KERNEL); in mscode_note_digest()
Dpkcs8_parser.c35 const void *value, size_t vlen) in pkcs8_note_OID() argument
39 ctx->last_oid = look_up_OID(value, vlen); in pkcs8_note_OID()
43 sprint_oid(value, vlen, buffer, sizeof(buffer)); in pkcs8_note_OID()
45 (unsigned long)value - ctx->data, buffer); in pkcs8_note_OID()
55 const void *value, size_t vlen) in pkcs8_note_version() argument
57 if (vlen != 1 || ((const u8 *)value)[0] != 0) { in pkcs8_note_version()
69 const void *value, size_t vlen) in pkcs8_note_algo() argument
85 const void *value, size_t vlen) in pkcs8_note_key() argument
89 ctx->key = value; in pkcs8_note_key()
Dx509_parser.h50 const unsigned char *value, size_t vlen);