| /crypto/asymmetric_keys/ |
| A D | x509_cert_parser.c | 92 ctx->raw_akid_size, ctx->raw_akid_size, ctx->raw_akid); in x509_cert_parse() 265 ctx->sig_algo = ctx->last_oid; in x509_note_sig_algo() 270 ctx->sig_algo = ctx->last_oid; in x509_note_sig_algo() 275 ctx->sig_algo = ctx->last_oid; in x509_note_sig_algo() 295 if (ctx->last_oid != ctx->sig_algo) { in x509_note_signature() 297 ctx->last_oid, ctx->sig_algo); in x509_note_signature() 374 if (!ctx->cn_size && !ctx->o_size && !ctx->email_size) { in x509_fabricate_name() 381 if (ctx->cn_size && ctx->o_size) { in x509_fabricate_name() 387 if (ctx->cn_size >= ctx->o_size && in x509_fabricate_name() 480 if (!ctx->cert->raw_subject || ctx->key) in x509_note_params() [all …]
|
| A D | pkcs7_parser.c | 122 if (!ctx) in pkcs7_parse_message() 125 if (!ctx->msg) in pkcs7_parse_message() 136 ctx->ppcerts = &ctx->certs; in pkcs7_parse_message() 137 ctx->ppsinfo = &ctx->msg->signed_infos; in pkcs7_parse_message() 152 msg = ctx->msg; in pkcs7_parse_message() 166 kfree(ctx); in pkcs7_parse_message() 413 tag, (unsigned long)ctx - ctx->data); in pkcs7_extract_cert() 452 *ctx->ppcerts = ctx->msg->certs; in pkcs7_note_certificate_list() 453 ctx->msg->certs = ctx->certs; in pkcs7_note_certificate_list() 455 ctx->ppcerts = &ctx->certs; in pkcs7_note_certificate_list() [all …]
|
| A D | verify_pefile.c | 84 if (cursor >= ctx->header_size || ctx->header_size >= datalen) in pefile_parse_binary() 87 if (ctx->n_data_dirents > (ctx->header_size - cursor) / sizeof(*dde)) in pefile_parse_binary() 107 ctx->sig_len, ctx->sig_offset, in pefile_parse_binary() 108 ctx->sig_len, pebuf + ctx->sig_offset); in pefile_parse_binary() 111 if (ctx->n_sections > (ctx->header_size - cursor) / sizeof(*sec)) in pefile_parse_binary() 166 if (ctx->sig_len < 4) { in pefile_strip_sig_wrapper() 197 ctx->sig_len = len; in pefile_strip_sig_wrapper() 375 if (memcmp(digest, ctx->digest, ctx->digest_len) != 0) { in pefile_digest_pe() 429 memset(&ctx, 0, sizeof(ctx)); in verify_pefile_signature() 439 pebuf + ctx.sig_offset, ctx.sig_len, in verify_pefile_signature() [all …]
|
| A D | pkcs8_parser.c | 40 if (ctx->last_oid == OID__NR) { in pkcs8_note_OID() 76 ctx->pub->pkey_algo = "rsa"; in pkcs8_note_algo() 89 ctx->key = value; in pkcs8_note_key() 90 ctx->key_size = vlen; in pkcs8_note_key() 99 struct pkcs8_parse_context ctx; in pkcs8_parse() local 103 memset(&ctx, 0, sizeof(ctx)); in pkcs8_parse() 107 if (!ctx.pub) in pkcs8_parse() 118 pub = ctx.pub; in pkcs8_parse() 119 pub->key = kmemdup(ctx.key, ctx.key_size, GFP_KERNEL); in pkcs8_parse() 123 pub->keylen = ctx.key_size; in pkcs8_parse() [all …]
|
| A D | mscode_parser.c | 23 struct pefile_context *ctx = _ctx; in mscode_parse() local 72 struct pefile_context *ctx = context; in mscode_note_digest_algo() local 79 ctx->digest_algo = "sha1"; in mscode_note_digest_algo() 82 ctx->digest_algo = "sha256"; in mscode_note_digest_algo() 85 ctx->digest_algo = "sha384"; in mscode_note_digest_algo() 88 ctx->digest_algo = "sha512"; in mscode_note_digest_algo() 91 ctx->digest_algo = "sha3-256"; in mscode_note_digest_algo() 94 ctx->digest_algo = "sha3-384"; in mscode_note_digest_algo() 97 ctx->digest_algo = "sha3-512"; in mscode_note_digest_algo() 123 if (!ctx->digest) in mscode_note_digest() [all …]
|
| /crypto/ |
| A D | ansi_cprng.c | 89 ctx); in _get_more_prng_bytes() 117 xor_vectors(ctx->I, ctx->V, tmp, DEFAULT_BLK_SZ); in _get_more_prng_bytes() 126 if (!memcmp(ctx->rand_data, ctx->last_rand_data, in _get_more_prng_bytes() 130 ctx); in _get_more_prng_bytes() 135 ctx); in _get_more_prng_bytes() 140 memcpy(ctx->last_rand_data, ctx->rand_data, in _get_more_prng_bytes() 147 xor_vectors(ctx->rand_data, ctx->I, tmp, in _get_more_prng_bytes() 164 ctx->DT[i] += 1; in _get_more_prng_bytes() 231 *ptr = ctx->rand_data[ctx->rand_data_valid]; in get_prng_bytes() 267 err, ctx); in get_prng_bytes() [all …]
|
| A D | ecrdsa.c | 90 if (!ctx->curve || in ecrdsa_verify() 97 ctx->pub_key.ndigits != ctx->curve->g.ndigits || in ecrdsa_verify() 130 ecc_point_mult_shamir(&cc, z1, &ctx->curve->g, z2, &ctx->pub_key, in ecrdsa_verify() 150 ctx->curve = get_curve_by_oid(ctx->curve_oid); in ecrdsa_param_curve() 171 ctx->key = value; in ecrdsa_parse_pub_key() 221 ctx->curve->g.ndigits * sizeof(u64) != ctx->digest_len) in ecrdsa_set_pub_key() 229 ctx->key_len != ctx->curve->g.ndigits * sizeof(u64) * 2) in ecrdsa_set_pub_key() 233 ctx->pub_key = ECC_POINT_INIT(ctx->_pubp[0], ctx->_pubp[1], ndigits); in ecrdsa_set_pub_key() 234 vli_from_le64(ctx->pub_key.x, ctx->key, ndigits); in ecrdsa_set_pub_key() 235 vli_from_le64(ctx->pub_key.y, ctx->key + ndigits * sizeof(u64), in ecrdsa_set_pub_key() [all …]
|
| A D | algif_hash.c | 36 if (ctx->result) in hash_alloc_result() 42 if (!ctx->result) in hash_alloc_result() 54 if (!ctx->result) in hash_free_result() 106 ctx->sgl.sgt.sgl = ctx->sgl.sgl; in hash_sendmsg() 124 sg_mark_end(ctx->sgl.sgt.sgl + ctx->sgl.sgt.nents - 1); in hash_sendmsg() 132 ahash_request_set_crypt(&ctx->req, ctx->sgl.sgt.sgl, in hash_sendmsg() 142 &ctx->wait); in hash_sendmsg() 200 ahash_request_set_crypt(&ctx->req, NULL, ctx->result, 0); in hash_recvmsg() 404 sock_kfree_s(sk, ctx, ctx->len); in hash_sock_destruct() 416 if (!ctx) in hash_accept_parent_nokey() [all …]
|
| A D | aria_generic.c | 155 ctx->dec_key[0][i] = ctx->enc_key[ctx->rounds][i]; in aria_set_decrypt_key() 156 ctx->dec_key[ctx->rounds][i] = ctx->enc_key[0][i]; in aria_set_decrypt_key() 160 ctx->dec_key[i][0] = aria_m(ctx->enc_key[ctx->rounds - i][0]); in aria_set_decrypt_key() 161 ctx->dec_key[i][1] = aria_m(ctx->enc_key[ctx->rounds - i][1]); in aria_set_decrypt_key() 162 ctx->dec_key[i][2] = aria_m(ctx->enc_key[ctx->rounds - i][2]); in aria_set_decrypt_key() 163 ctx->dec_key[i][3] = aria_m(ctx->enc_key[ctx->rounds - i][3]); in aria_set_decrypt_key() 166 &ctx->dec_key[i][2], &ctx->dec_key[i][3]); in aria_set_decrypt_key() 252 __aria_crypt(ctx, out, in, ctx->enc_key); in aria_encrypt() 260 __aria_crypt(ctx, out, in, ctx->dec_key); in aria_decrypt() 268 __aria_crypt(ctx, out, in, ctx->enc_key); in __aria_encrypt() [all …]
|
| A D | zstd.c | 47 ctx = kvmalloc(sizeof(*ctx) + wksp_size, GFP_KERNEL); in zstd_alloc_stream() 48 if (!ctx) in zstd_alloc_stream() 54 return ctx; in zstd_alloc_stream() 59 kvfree(ctx); in zstd_free_stream() 88 ctx->cctx = zstd_init_cctx(ctx->wksp, ctx->wksp_size); in zstd_compress_one() 89 if (!ctx->cctx) in zstd_compress_one() 117 ctx = s->ctx; in zstd_compress() 123 ctx->cctx = zstd_init_cstream(&ctx->params, 0, ctx->wksp, ctx->wksp_size); in zstd_compress() 200 ctx->dctx = zstd_init_dctx(ctx->wksp, ctx->wksp_size); in zstd_decompress_one() 226 ctx = s->ctx; in zstd_decompress() [all …]
|
| A D | ecdsa.c | 75 if (unlikely(!ctx->pub_key_set)) in ecdsa_verify() 91 ctx->curve_id = curve_id; in ecdsa_ecc_ctx_init() 93 if (!ctx->curve) in ecdsa_ecc_ctx_init() 102 ctx->pub_key_set = false; in ecdsa_ecc_ctx_deinit() 110 ecdsa_ecc_ctx_deinit(ctx); in ecdsa_ecc_ctx_reset() 113 ctx->pub_key = ECC_POINT_INIT(ctx->x, ctx->y, in ecdsa_ecc_ctx_reset() 130 ret = ecdsa_ecc_ctx_reset(ctx); in ecdsa_set_pub_key() 152 ret = ecc_is_pubkey_valid_full(ctx->curve, &ctx->pub_key); in ecdsa_set_pub_key() 154 ctx->pub_key_set = ret == 0; in ecdsa_set_pub_key() 163 ecdsa_ecc_ctx_deinit(ctx); in ecdsa_exit_tfm() [all …]
|
| A D | ecdh.c | 37 memset(ctx->private_key, 0, sizeof(ctx->private_key)); in ecdh_set_secret() 40 return ecc_gen_privkey(ctx->curve_id, ctx->ndigits, in ecdh_set_secret() 41 ctx->private_key); in ecdh_set_secret() 44 ctx->private_key, ctx->ndigits); in ecdh_set_secret() 46 if (ecc_is_key_valid(ctx->curve_id, ctx->ndigits, in ecdh_set_secret() 92 ret = crypto_ecdh_shared_secret(ctx->curve_id, ctx->ndigits, in ecdh_compute_value() 93 ctx->private_key, public_key, in ecdh_compute_value() 98 ret = ecc_make_pub_key(ctx->curve_id, ctx->ndigits, in ecdh_compute_value() 135 ctx->curve_id = ECC_CURVE_NIST_P192; in ecdh_nist_p192_init_tfm() 160 ctx->curve_id = ECC_CURVE_NIST_P256; in ecdh_nist_p256_init_tfm() [all …]
|
| A D | rsa-pkcs1pad.c | 39 return rsa_set_key(ctx->child, &ctx->key_size, RSA_PUB, key, keylen); in pkcs1pad_set_pub_key() 47 return rsa_set_key(ctx->child, &ctx->key_size, RSA_PRIV, key, keylen); in pkcs1pad_set_priv_key() 60 return ctx->key_size; in pkcs1pad_get_max_size() 88 pad_len = ctx->key_size - len; in pkcs1pad_encrypt_complete() 103 out_buf, ctx->key_size); in pkcs1pad_encrypt_complete() 107 req->dst_len = ctx->key_size; in pkcs1pad_encrypt_complete() 135 if (!ctx->key_size) in pkcs1pad_encrypt() 249 if (!ctx->key_size || req->src_len != ctx->key_size) in pkcs1pad_decrypt() 257 ctx->key_size, NULL); in pkcs1pad_decrypt() 266 ctx->key_size); in pkcs1pad_decrypt() [all …]
|
| A D | algif_skcipher.c | 63 ctx = ask->private; in algif_skcipher_export() 70 if (!ctx->state) in algif_skcipher_export() 111 if (!ctx->init || (ctx->more && ctx->used < bs)) { in _skcipher_recvmsg() 132 if (ctx->more || len < ctx->used) { in _skcipher_recvmsg() 159 if (ctx->state) { in _skcipher_recvmsg() 181 err = ctx->enc ? in _skcipher_recvmsg() 368 if (ctx->state) in skcipher_sock_destruct() 370 sock_kfree_s(sk, ctx, ctx->len); in skcipher_sock_destruct() 382 if (!ctx) in skcipher_accept_parent_nokey() 388 if (!ctx->iv) { in skcipher_accept_parent_nokey() [all …]
|
| A D | rsassa-pkcs1.c | 172 if (!ctx->key_size) in rsassa_pkcs1_sign() 175 if (dlen < ctx->key_size) in rsassa_pkcs1_sign() 200 ctx->key_size); in rsassa_pkcs1_sign() 205 pad_len = ctx->key_size - len; in rsassa_pkcs1_sign() 213 return ctx->key_size; in rsassa_pkcs1_sign() 234 if (!ctx->key_size || in rsassa_pkcs1_verify() 235 slen != ctx->key_size || in rsassa_pkcs1_verify() 312 return rsa_set_key(ctx->child, &ctx->key_size, RSA_PUB, key, keylen); in rsassa_pkcs1_set_pub_key() 320 return rsa_set_key(ctx->child, &ctx->key_size, RSA_PRIV, key, keylen); in rsassa_pkcs1_set_priv_key() 334 ctx->child = child_tfm; in rsassa_pkcs1_init_tfm() [all …]
|
| A D | algif_rng.c | 69 ctx->addtl = NULL; in rng_reset_addtl() 70 ctx->addtl_len = 0; in rng_reset_addtl() 126 ret = _rng_recvmsg(ctx->drng, msg, len, ctx->addtl, ctx->addtl_len); in rng_test_recvmsg() 147 if (!ctx->addtl) { in rng_test_sendmsg() 236 sock_kfree_s(sk, ctx, ctx->len); in rng_sock_destruct() 242 struct rng_ctx *ctx; in rng_accept_parent() local 248 if (!ctx) in rng_accept_parent() 251 ctx->len = len; in rng_accept_parent() 252 ctx->addtl = NULL; in rng_accept_parent() 253 ctx->addtl_len = 0; in rng_accept_parent() [all …]
|
| A D | tea.c | 45 struct tea_ctx *ctx = crypto_tfm_ctx(tfm); in tea_setkey() local 60 struct tea_ctx *ctx = crypto_tfm_ctx(tfm); in tea_encrypt() local 65 k0 = ctx->KEY[0]; in tea_encrypt() 66 k1 = ctx->KEY[1]; in tea_encrypt() 67 k2 = ctx->KEY[2]; in tea_encrypt() 68 k3 = ctx->KEY[3]; in tea_encrypt() 86 struct tea_ctx *ctx = crypto_tfm_ctx(tfm); in tea_decrypt() local 91 k0 = ctx->KEY[0]; in tea_decrypt() 92 k1 = ctx->KEY[1]; in tea_decrypt() 93 k2 = ctx->KEY[2]; in tea_decrypt() [all …]
|
| A D | cryptd.c | 261 child = ctx->child; in cryptd_skcipher_prepare() 357 ctx->child = cipher; in cryptd_skcipher_init_tfm() 398 ctx->queue = queue; in cryptd_create_skcipher() 448 ctx->child = hash; in cryptd_hash_init_tfm() 682 ctx->queue = queue; in cryptd_create_hash() 797 child = ctx->child; in cryptd_aead_encrypt() 809 child = ctx->child; in cryptd_aead_decrypt() 891 ctx->queue = queue; in cryptd_create_aead() 986 return ctx->child; in cryptd_skcipher_child() 1036 return ctx->child; in cryptd_ahash_child() [all …]
|
| A D | dh.c | 24 mpi_free(ctx->p); in dh_clear_ctx() 25 mpi_free(ctx->g); in dh_clear_ctx() 26 mpi_free(ctx->xa); in dh_clear_ctx() 27 memset(ctx, 0, sizeof(*ctx)); in dh_clear_ctx() 39 return mpi_powm(val, base, ctx->xa, ctx->p); in _compute_val() 61 if (!ctx->p) in dh_set_params() 65 if (!ctx->g) in dh_set_params() 78 dh_clear_ctx(ctx); in dh_set_secret() 87 if (!ctx->xa) in dh_set_secret() 93 dh_clear_ctx(ctx); in dh_set_secret() [all …]
|
| A D | algif_aead.c | 51 return ctx->used >= ctx->aead_assoclen + (ctx->enc ? 0 : as); in aead_sufficient_data() 85 if (!ctx->init || ctx->more) { in _aead_recvmsg() 95 used = ctx->used; in _aead_recvmsg() 117 if (ctx->enc) in _aead_recvmsg() 191 if (ctx->enc) { in _aead_recvmsg() 284 &ctx->wait); in _aead_recvmsg() 455 sock_kfree_s(sk, ctx, ctx->len); in aead_sock_destruct() 468 if (!ctx) in aead_accept_parent_nokey() 473 if (!ctx->iv) { in aead_accept_parent_nokey() 480 ctx->len = len; in aead_accept_parent_nokey() [all …]
|
| A D | lz4.c | 17 void *ctx; in lz4_alloc_ctx() local 19 ctx = vmalloc(LZ4_MEM_COMPRESS); in lz4_alloc_ctx() 20 if (!ctx) in lz4_alloc_ctx() 23 return ctx; in lz4_alloc_ctx() 26 static void lz4_free_ctx(void *ctx) in lz4_free_ctx() argument 28 vfree(ctx); in lz4_free_ctx() 32 u8 *dst, unsigned int *dlen, void *ctx) in __lz4_compress_crypto() argument 35 slen, *dlen, ctx); in __lz4_compress_crypto() 46 void *ctx) in lz4_scompress() argument 52 u8 *dst, unsigned int *dlen, void *ctx) in __lz4_decompress_crypto() argument [all …]
|
| A D | lz4hc.c | 15 void *ctx; in lz4hc_alloc_ctx() local 17 ctx = vmalloc(LZ4HC_MEM_COMPRESS); in lz4hc_alloc_ctx() 18 if (!ctx) in lz4hc_alloc_ctx() 21 return ctx; in lz4hc_alloc_ctx() 24 static void lz4hc_free_ctx(void *ctx) in lz4hc_free_ctx() argument 26 vfree(ctx); in lz4hc_free_ctx() 30 u8 *dst, unsigned int *dlen, void *ctx) in __lz4hc_compress_crypto() argument 33 *dlen, LZ4HC_DEFAULT_CLEVEL, ctx); in __lz4hc_compress_crypto() 44 void *ctx) in lz4hc_scompress() argument 50 u8 *dst, unsigned int *dlen, void *ctx) in __lz4hc_decompress_crypto() argument [all …]
|
| A D | sha512.c | 31 struct __sha512_ctx ctx = *ctx0; in __crypto_sha512_export() local 36 ctx.bytecount_lo -= partial; in __crypto_sha512_export() 37 memcpy(p, &ctx, sizeof(ctx)); in __crypto_sha512_export() 38 p += sizeof(ctx); in __crypto_sha512_export() 47 memcpy(ctx, p, sizeof(*ctx)); in __crypto_sha512_import() 48 p += sizeof(*ctx); in __crypto_sha512_import() 49 ctx->bytecount_lo += *p; in __crypto_sha512_import() 203 ctx->ctx.ostate = HMAC_SHA384_KEY(desc->tfm)->key.ostate; in crypto_hmac_sha384_import() 204 return __crypto_sha512_import(&ctx->ctx.sha_ctx, in); in crypto_hmac_sha384_import() 255 ctx->ctx.ostate = HMAC_SHA512_KEY(desc->tfm)->key.ostate; in crypto_hmac_sha512_import() [all …]
|
| A D | sha256.c | 31 struct __sha256_ctx ctx = *ctx0; in __crypto_sha256_export() local 36 ctx.bytecount -= partial; in __crypto_sha256_export() 37 memcpy(p, &ctx, sizeof(ctx)); in __crypto_sha256_export() 38 p += sizeof(ctx); in __crypto_sha256_export() 47 memcpy(ctx, p, sizeof(*ctx)); in __crypto_sha256_import() 48 p += sizeof(*ctx); in __crypto_sha256_import() 49 ctx->bytecount += *p; in __crypto_sha256_import() 197 ctx->ctx.ostate = HMAC_SHA224_KEY(desc->tfm)->key.ostate; in crypto_hmac_sha224_import() 198 return __crypto_sha256_import(&ctx->ctx.sha_ctx, in); in crypto_hmac_sha224_import() 249 ctx->ctx.ostate = HMAC_SHA256_KEY(desc->tfm)->key.ostate; in crypto_hmac_sha256_import() [all …]
|
| A D | streebog_generic.c | 971 streebog_g(&ctx->h, &ctx->N, &m); in streebog_stage2() 973 streebog_add512(&ctx->N, &buffer512, &ctx->N); in streebog_stage2() 974 streebog_add512(&ctx->Sigma, &m, &ctx->Sigma); in streebog_stage2() 990 streebog_g(&ctx->h, &ctx->N, &u.m); in streebog_stage3() 991 streebog_add512(&ctx->N, &buf, &ctx->N); in streebog_stage3() 992 streebog_add512(&ctx->Sigma, &u.m, &ctx->Sigma); in streebog_stage3() 994 streebog_g(&ctx->h, &buffer0, &ctx->N); in streebog_stage3() 995 streebog_g(&ctx->h, &buffer0, &ctx->Sigma); in streebog_stage3() 996 memcpy(&ctx->hash, &ctx->h, sizeof(struct streebog_uint512)); in streebog_stage3() 1005 streebog_stage2(ctx, data); in streebog_update() [all …]
|