Home
last modified time | relevance | path

Searched refs:ctx (Results 1 – 25 of 84) sorted by relevance

1234

/crypto/asymmetric_keys/
A Dx509_cert_parser.c92 ctx->raw_akid_size, ctx->raw_akid_size, ctx->raw_akid); in x509_cert_parse()
265 ctx->sig_algo = ctx->last_oid; in x509_note_sig_algo()
270 ctx->sig_algo = ctx->last_oid; in x509_note_sig_algo()
275 ctx->sig_algo = ctx->last_oid; in x509_note_sig_algo()
295 if (ctx->last_oid != ctx->sig_algo) { in x509_note_signature()
297 ctx->last_oid, ctx->sig_algo); in x509_note_signature()
374 if (!ctx->cn_size && !ctx->o_size && !ctx->email_size) { in x509_fabricate_name()
381 if (ctx->cn_size && ctx->o_size) { in x509_fabricate_name()
387 if (ctx->cn_size >= ctx->o_size && in x509_fabricate_name()
480 if (!ctx->cert->raw_subject || ctx->key) in x509_note_params()
[all …]
A Dpkcs7_parser.c122 if (!ctx) in pkcs7_parse_message()
125 if (!ctx->msg) in pkcs7_parse_message()
136 ctx->ppcerts = &ctx->certs; in pkcs7_parse_message()
137 ctx->ppsinfo = &ctx->msg->signed_infos; in pkcs7_parse_message()
152 msg = ctx->msg; in pkcs7_parse_message()
166 kfree(ctx); in pkcs7_parse_message()
413 tag, (unsigned long)ctx - ctx->data); in pkcs7_extract_cert()
452 *ctx->ppcerts = ctx->msg->certs; in pkcs7_note_certificate_list()
453 ctx->msg->certs = ctx->certs; in pkcs7_note_certificate_list()
455 ctx->ppcerts = &ctx->certs; in pkcs7_note_certificate_list()
[all …]
A Dverify_pefile.c84 if (cursor >= ctx->header_size || ctx->header_size >= datalen) in pefile_parse_binary()
87 if (ctx->n_data_dirents > (ctx->header_size - cursor) / sizeof(*dde)) in pefile_parse_binary()
107 ctx->sig_len, ctx->sig_offset, in pefile_parse_binary()
108 ctx->sig_len, pebuf + ctx->sig_offset); in pefile_parse_binary()
111 if (ctx->n_sections > (ctx->header_size - cursor) / sizeof(*sec)) in pefile_parse_binary()
166 if (ctx->sig_len < 4) { in pefile_strip_sig_wrapper()
197 ctx->sig_len = len; in pefile_strip_sig_wrapper()
375 if (memcmp(digest, ctx->digest, ctx->digest_len) != 0) { in pefile_digest_pe()
429 memset(&ctx, 0, sizeof(ctx)); in verify_pefile_signature()
439 pebuf + ctx.sig_offset, ctx.sig_len, in verify_pefile_signature()
[all …]
A Dpkcs8_parser.c40 if (ctx->last_oid == OID__NR) { in pkcs8_note_OID()
76 ctx->pub->pkey_algo = "rsa"; in pkcs8_note_algo()
89 ctx->key = value; in pkcs8_note_key()
90 ctx->key_size = vlen; in pkcs8_note_key()
99 struct pkcs8_parse_context ctx; in pkcs8_parse() local
103 memset(&ctx, 0, sizeof(ctx)); in pkcs8_parse()
107 if (!ctx.pub) in pkcs8_parse()
118 pub = ctx.pub; in pkcs8_parse()
119 pub->key = kmemdup(ctx.key, ctx.key_size, GFP_KERNEL); in pkcs8_parse()
123 pub->keylen = ctx.key_size; in pkcs8_parse()
[all …]
A Dmscode_parser.c23 struct pefile_context *ctx = _ctx; in mscode_parse() local
72 struct pefile_context *ctx = context; in mscode_note_digest_algo() local
79 ctx->digest_algo = "sha1"; in mscode_note_digest_algo()
82 ctx->digest_algo = "sha256"; in mscode_note_digest_algo()
85 ctx->digest_algo = "sha384"; in mscode_note_digest_algo()
88 ctx->digest_algo = "sha512"; in mscode_note_digest_algo()
91 ctx->digest_algo = "sha3-256"; in mscode_note_digest_algo()
94 ctx->digest_algo = "sha3-384"; in mscode_note_digest_algo()
97 ctx->digest_algo = "sha3-512"; in mscode_note_digest_algo()
123 if (!ctx->digest) in mscode_note_digest()
[all …]
/crypto/
A Dansi_cprng.c89 ctx); in _get_more_prng_bytes()
117 xor_vectors(ctx->I, ctx->V, tmp, DEFAULT_BLK_SZ); in _get_more_prng_bytes()
126 if (!memcmp(ctx->rand_data, ctx->last_rand_data, in _get_more_prng_bytes()
130 ctx); in _get_more_prng_bytes()
135 ctx); in _get_more_prng_bytes()
140 memcpy(ctx->last_rand_data, ctx->rand_data, in _get_more_prng_bytes()
147 xor_vectors(ctx->rand_data, ctx->I, tmp, in _get_more_prng_bytes()
164 ctx->DT[i] += 1; in _get_more_prng_bytes()
231 *ptr = ctx->rand_data[ctx->rand_data_valid]; in get_prng_bytes()
267 err, ctx); in get_prng_bytes()
[all …]
A Decrdsa.c90 if (!ctx->curve || in ecrdsa_verify()
97 ctx->pub_key.ndigits != ctx->curve->g.ndigits || in ecrdsa_verify()
130 ecc_point_mult_shamir(&cc, z1, &ctx->curve->g, z2, &ctx->pub_key, in ecrdsa_verify()
150 ctx->curve = get_curve_by_oid(ctx->curve_oid); in ecrdsa_param_curve()
171 ctx->key = value; in ecrdsa_parse_pub_key()
221 ctx->curve->g.ndigits * sizeof(u64) != ctx->digest_len) in ecrdsa_set_pub_key()
229 ctx->key_len != ctx->curve->g.ndigits * sizeof(u64) * 2) in ecrdsa_set_pub_key()
233 ctx->pub_key = ECC_POINT_INIT(ctx->_pubp[0], ctx->_pubp[1], ndigits); in ecrdsa_set_pub_key()
234 vli_from_le64(ctx->pub_key.x, ctx->key, ndigits); in ecrdsa_set_pub_key()
235 vli_from_le64(ctx->pub_key.y, ctx->key + ndigits * sizeof(u64), in ecrdsa_set_pub_key()
[all …]
A Dalgif_hash.c36 if (ctx->result) in hash_alloc_result()
42 if (!ctx->result) in hash_alloc_result()
54 if (!ctx->result) in hash_free_result()
106 ctx->sgl.sgt.sgl = ctx->sgl.sgl; in hash_sendmsg()
124 sg_mark_end(ctx->sgl.sgt.sgl + ctx->sgl.sgt.nents - 1); in hash_sendmsg()
132 ahash_request_set_crypt(&ctx->req, ctx->sgl.sgt.sgl, in hash_sendmsg()
142 &ctx->wait); in hash_sendmsg()
200 ahash_request_set_crypt(&ctx->req, NULL, ctx->result, 0); in hash_recvmsg()
404 sock_kfree_s(sk, ctx, ctx->len); in hash_sock_destruct()
416 if (!ctx) in hash_accept_parent_nokey()
[all …]
A Daria_generic.c155 ctx->dec_key[0][i] = ctx->enc_key[ctx->rounds][i]; in aria_set_decrypt_key()
156 ctx->dec_key[ctx->rounds][i] = ctx->enc_key[0][i]; in aria_set_decrypt_key()
160 ctx->dec_key[i][0] = aria_m(ctx->enc_key[ctx->rounds - i][0]); in aria_set_decrypt_key()
161 ctx->dec_key[i][1] = aria_m(ctx->enc_key[ctx->rounds - i][1]); in aria_set_decrypt_key()
162 ctx->dec_key[i][2] = aria_m(ctx->enc_key[ctx->rounds - i][2]); in aria_set_decrypt_key()
163 ctx->dec_key[i][3] = aria_m(ctx->enc_key[ctx->rounds - i][3]); in aria_set_decrypt_key()
166 &ctx->dec_key[i][2], &ctx->dec_key[i][3]); in aria_set_decrypt_key()
252 __aria_crypt(ctx, out, in, ctx->enc_key); in aria_encrypt()
260 __aria_crypt(ctx, out, in, ctx->dec_key); in aria_decrypt()
268 __aria_crypt(ctx, out, in, ctx->enc_key); in __aria_encrypt()
[all …]
A Dzstd.c47 ctx = kvmalloc(sizeof(*ctx) + wksp_size, GFP_KERNEL); in zstd_alloc_stream()
48 if (!ctx) in zstd_alloc_stream()
54 return ctx; in zstd_alloc_stream()
59 kvfree(ctx); in zstd_free_stream()
88 ctx->cctx = zstd_init_cctx(ctx->wksp, ctx->wksp_size); in zstd_compress_one()
89 if (!ctx->cctx) in zstd_compress_one()
117 ctx = s->ctx; in zstd_compress()
123 ctx->cctx = zstd_init_cstream(&ctx->params, 0, ctx->wksp, ctx->wksp_size); in zstd_compress()
200 ctx->dctx = zstd_init_dctx(ctx->wksp, ctx->wksp_size); in zstd_decompress_one()
226 ctx = s->ctx; in zstd_decompress()
[all …]
A Decdsa.c75 if (unlikely(!ctx->pub_key_set)) in ecdsa_verify()
91 ctx->curve_id = curve_id; in ecdsa_ecc_ctx_init()
93 if (!ctx->curve) in ecdsa_ecc_ctx_init()
102 ctx->pub_key_set = false; in ecdsa_ecc_ctx_deinit()
110 ecdsa_ecc_ctx_deinit(ctx); in ecdsa_ecc_ctx_reset()
113 ctx->pub_key = ECC_POINT_INIT(ctx->x, ctx->y, in ecdsa_ecc_ctx_reset()
130 ret = ecdsa_ecc_ctx_reset(ctx); in ecdsa_set_pub_key()
152 ret = ecc_is_pubkey_valid_full(ctx->curve, &ctx->pub_key); in ecdsa_set_pub_key()
154 ctx->pub_key_set = ret == 0; in ecdsa_set_pub_key()
163 ecdsa_ecc_ctx_deinit(ctx); in ecdsa_exit_tfm()
[all …]
A Decdh.c37 memset(ctx->private_key, 0, sizeof(ctx->private_key)); in ecdh_set_secret()
40 return ecc_gen_privkey(ctx->curve_id, ctx->ndigits, in ecdh_set_secret()
41 ctx->private_key); in ecdh_set_secret()
44 ctx->private_key, ctx->ndigits); in ecdh_set_secret()
46 if (ecc_is_key_valid(ctx->curve_id, ctx->ndigits, in ecdh_set_secret()
92 ret = crypto_ecdh_shared_secret(ctx->curve_id, ctx->ndigits, in ecdh_compute_value()
93 ctx->private_key, public_key, in ecdh_compute_value()
98 ret = ecc_make_pub_key(ctx->curve_id, ctx->ndigits, in ecdh_compute_value()
135 ctx->curve_id = ECC_CURVE_NIST_P192; in ecdh_nist_p192_init_tfm()
160 ctx->curve_id = ECC_CURVE_NIST_P256; in ecdh_nist_p256_init_tfm()
[all …]
A Drsa-pkcs1pad.c39 return rsa_set_key(ctx->child, &ctx->key_size, RSA_PUB, key, keylen); in pkcs1pad_set_pub_key()
47 return rsa_set_key(ctx->child, &ctx->key_size, RSA_PRIV, key, keylen); in pkcs1pad_set_priv_key()
60 return ctx->key_size; in pkcs1pad_get_max_size()
88 pad_len = ctx->key_size - len; in pkcs1pad_encrypt_complete()
103 out_buf, ctx->key_size); in pkcs1pad_encrypt_complete()
107 req->dst_len = ctx->key_size; in pkcs1pad_encrypt_complete()
135 if (!ctx->key_size) in pkcs1pad_encrypt()
249 if (!ctx->key_size || req->src_len != ctx->key_size) in pkcs1pad_decrypt()
257 ctx->key_size, NULL); in pkcs1pad_decrypt()
266 ctx->key_size); in pkcs1pad_decrypt()
[all …]
A Dalgif_skcipher.c63 ctx = ask->private; in algif_skcipher_export()
70 if (!ctx->state) in algif_skcipher_export()
111 if (!ctx->init || (ctx->more && ctx->used < bs)) { in _skcipher_recvmsg()
132 if (ctx->more || len < ctx->used) { in _skcipher_recvmsg()
159 if (ctx->state) { in _skcipher_recvmsg()
181 err = ctx->enc ? in _skcipher_recvmsg()
368 if (ctx->state) in skcipher_sock_destruct()
370 sock_kfree_s(sk, ctx, ctx->len); in skcipher_sock_destruct()
382 if (!ctx) in skcipher_accept_parent_nokey()
388 if (!ctx->iv) { in skcipher_accept_parent_nokey()
[all …]
A Drsassa-pkcs1.c172 if (!ctx->key_size) in rsassa_pkcs1_sign()
175 if (dlen < ctx->key_size) in rsassa_pkcs1_sign()
200 ctx->key_size); in rsassa_pkcs1_sign()
205 pad_len = ctx->key_size - len; in rsassa_pkcs1_sign()
213 return ctx->key_size; in rsassa_pkcs1_sign()
234 if (!ctx->key_size || in rsassa_pkcs1_verify()
235 slen != ctx->key_size || in rsassa_pkcs1_verify()
312 return rsa_set_key(ctx->child, &ctx->key_size, RSA_PUB, key, keylen); in rsassa_pkcs1_set_pub_key()
320 return rsa_set_key(ctx->child, &ctx->key_size, RSA_PRIV, key, keylen); in rsassa_pkcs1_set_priv_key()
334 ctx->child = child_tfm; in rsassa_pkcs1_init_tfm()
[all …]
A Dalgif_rng.c69 ctx->addtl = NULL; in rng_reset_addtl()
70 ctx->addtl_len = 0; in rng_reset_addtl()
126 ret = _rng_recvmsg(ctx->drng, msg, len, ctx->addtl, ctx->addtl_len); in rng_test_recvmsg()
147 if (!ctx->addtl) { in rng_test_sendmsg()
236 sock_kfree_s(sk, ctx, ctx->len); in rng_sock_destruct()
242 struct rng_ctx *ctx; in rng_accept_parent() local
248 if (!ctx) in rng_accept_parent()
251 ctx->len = len; in rng_accept_parent()
252 ctx->addtl = NULL; in rng_accept_parent()
253 ctx->addtl_len = 0; in rng_accept_parent()
[all …]
A Dtea.c45 struct tea_ctx *ctx = crypto_tfm_ctx(tfm); in tea_setkey() local
60 struct tea_ctx *ctx = crypto_tfm_ctx(tfm); in tea_encrypt() local
65 k0 = ctx->KEY[0]; in tea_encrypt()
66 k1 = ctx->KEY[1]; in tea_encrypt()
67 k2 = ctx->KEY[2]; in tea_encrypt()
68 k3 = ctx->KEY[3]; in tea_encrypt()
86 struct tea_ctx *ctx = crypto_tfm_ctx(tfm); in tea_decrypt() local
91 k0 = ctx->KEY[0]; in tea_decrypt()
92 k1 = ctx->KEY[1]; in tea_decrypt()
93 k2 = ctx->KEY[2]; in tea_decrypt()
[all …]
A Dcryptd.c261 child = ctx->child; in cryptd_skcipher_prepare()
357 ctx->child = cipher; in cryptd_skcipher_init_tfm()
398 ctx->queue = queue; in cryptd_create_skcipher()
448 ctx->child = hash; in cryptd_hash_init_tfm()
682 ctx->queue = queue; in cryptd_create_hash()
797 child = ctx->child; in cryptd_aead_encrypt()
809 child = ctx->child; in cryptd_aead_decrypt()
891 ctx->queue = queue; in cryptd_create_aead()
986 return ctx->child; in cryptd_skcipher_child()
1036 return ctx->child; in cryptd_ahash_child()
[all …]
A Ddh.c24 mpi_free(ctx->p); in dh_clear_ctx()
25 mpi_free(ctx->g); in dh_clear_ctx()
26 mpi_free(ctx->xa); in dh_clear_ctx()
27 memset(ctx, 0, sizeof(*ctx)); in dh_clear_ctx()
39 return mpi_powm(val, base, ctx->xa, ctx->p); in _compute_val()
61 if (!ctx->p) in dh_set_params()
65 if (!ctx->g) in dh_set_params()
78 dh_clear_ctx(ctx); in dh_set_secret()
87 if (!ctx->xa) in dh_set_secret()
93 dh_clear_ctx(ctx); in dh_set_secret()
[all …]
A Dalgif_aead.c51 return ctx->used >= ctx->aead_assoclen + (ctx->enc ? 0 : as); in aead_sufficient_data()
85 if (!ctx->init || ctx->more) { in _aead_recvmsg()
95 used = ctx->used; in _aead_recvmsg()
117 if (ctx->enc) in _aead_recvmsg()
191 if (ctx->enc) { in _aead_recvmsg()
284 &ctx->wait); in _aead_recvmsg()
455 sock_kfree_s(sk, ctx, ctx->len); in aead_sock_destruct()
468 if (!ctx) in aead_accept_parent_nokey()
473 if (!ctx->iv) { in aead_accept_parent_nokey()
480 ctx->len = len; in aead_accept_parent_nokey()
[all …]
A Dlz4.c17 void *ctx; in lz4_alloc_ctx() local
19 ctx = vmalloc(LZ4_MEM_COMPRESS); in lz4_alloc_ctx()
20 if (!ctx) in lz4_alloc_ctx()
23 return ctx; in lz4_alloc_ctx()
26 static void lz4_free_ctx(void *ctx) in lz4_free_ctx() argument
28 vfree(ctx); in lz4_free_ctx()
32 u8 *dst, unsigned int *dlen, void *ctx) in __lz4_compress_crypto() argument
35 slen, *dlen, ctx); in __lz4_compress_crypto()
46 void *ctx) in lz4_scompress() argument
52 u8 *dst, unsigned int *dlen, void *ctx) in __lz4_decompress_crypto() argument
[all …]
A Dlz4hc.c15 void *ctx; in lz4hc_alloc_ctx() local
17 ctx = vmalloc(LZ4HC_MEM_COMPRESS); in lz4hc_alloc_ctx()
18 if (!ctx) in lz4hc_alloc_ctx()
21 return ctx; in lz4hc_alloc_ctx()
24 static void lz4hc_free_ctx(void *ctx) in lz4hc_free_ctx() argument
26 vfree(ctx); in lz4hc_free_ctx()
30 u8 *dst, unsigned int *dlen, void *ctx) in __lz4hc_compress_crypto() argument
33 *dlen, LZ4HC_DEFAULT_CLEVEL, ctx); in __lz4hc_compress_crypto()
44 void *ctx) in lz4hc_scompress() argument
50 u8 *dst, unsigned int *dlen, void *ctx) in __lz4hc_decompress_crypto() argument
[all …]
A Dsha512.c31 struct __sha512_ctx ctx = *ctx0; in __crypto_sha512_export() local
36 ctx.bytecount_lo -= partial; in __crypto_sha512_export()
37 memcpy(p, &ctx, sizeof(ctx)); in __crypto_sha512_export()
38 p += sizeof(ctx); in __crypto_sha512_export()
47 memcpy(ctx, p, sizeof(*ctx)); in __crypto_sha512_import()
48 p += sizeof(*ctx); in __crypto_sha512_import()
49 ctx->bytecount_lo += *p; in __crypto_sha512_import()
203 ctx->ctx.ostate = HMAC_SHA384_KEY(desc->tfm)->key.ostate; in crypto_hmac_sha384_import()
204 return __crypto_sha512_import(&ctx->ctx.sha_ctx, in); in crypto_hmac_sha384_import()
255 ctx->ctx.ostate = HMAC_SHA512_KEY(desc->tfm)->key.ostate; in crypto_hmac_sha512_import()
[all …]
A Dsha256.c31 struct __sha256_ctx ctx = *ctx0; in __crypto_sha256_export() local
36 ctx.bytecount -= partial; in __crypto_sha256_export()
37 memcpy(p, &ctx, sizeof(ctx)); in __crypto_sha256_export()
38 p += sizeof(ctx); in __crypto_sha256_export()
47 memcpy(ctx, p, sizeof(*ctx)); in __crypto_sha256_import()
48 p += sizeof(*ctx); in __crypto_sha256_import()
49 ctx->bytecount += *p; in __crypto_sha256_import()
197 ctx->ctx.ostate = HMAC_SHA224_KEY(desc->tfm)->key.ostate; in crypto_hmac_sha224_import()
198 return __crypto_sha256_import(&ctx->ctx.sha_ctx, in); in crypto_hmac_sha224_import()
249 ctx->ctx.ostate = HMAC_SHA256_KEY(desc->tfm)->key.ostate; in crypto_hmac_sha256_import()
[all …]
A Dstreebog_generic.c971 streebog_g(&ctx->h, &ctx->N, &m); in streebog_stage2()
973 streebog_add512(&ctx->N, &buffer512, &ctx->N); in streebog_stage2()
974 streebog_add512(&ctx->Sigma, &m, &ctx->Sigma); in streebog_stage2()
990 streebog_g(&ctx->h, &ctx->N, &u.m); in streebog_stage3()
991 streebog_add512(&ctx->N, &buf, &ctx->N); in streebog_stage3()
992 streebog_add512(&ctx->Sigma, &u.m, &ctx->Sigma); in streebog_stage3()
994 streebog_g(&ctx->h, &buffer0, &ctx->N); in streebog_stage3()
995 streebog_g(&ctx->h, &buffer0, &ctx->Sigma); in streebog_stage3()
996 memcpy(&ctx->hash, &ctx->h, sizeof(struct streebog_uint512)); in streebog_stage3()
1005 streebog_stage2(ctx, data); in streebog_update()
[all …]

Completed in 52 milliseconds

1234