| /crypto/asymmetric_keys/ |
| A D | pkcs7_verify.c | 203 for (p = pkcs7->certs; p; p = p->next) in pkcs7_verify_sig_chain() 204 p->seen = false; in pkcs7_verify_sig_chain() 217 for (p = sinfo->signer; p != x509; p = p->signer) in pkcs7_verify_sig_chain() 251 for (p = pkcs7->certs; p; p = p->next) { in pkcs7_verify_sig_chain() 253 p->index, p->id->len, p->id->data); in pkcs7_verify_sig_chain() 260 for (p = pkcs7->certs; p; p = p->next) { in pkcs7_verify_sig_chain() 261 if (!p->skid) in pkcs7_verify_sig_chain() 264 p->index, p->skid->len, p->skid->data); in pkcs7_verify_sig_chain() 286 if (p->seen) { in pkcs7_verify_sig_chain() 295 if (x509 == p) { in pkcs7_verify_sig_chain() [all …]
|
| A D | x509_loader.c | 12 const u8 *p, *end; in x509_load_certificate_list() local 15 p = cert_list; in x509_load_certificate_list() 16 end = p + list_size; in x509_load_certificate_list() 17 while (p < end) { in x509_load_certificate_list() 21 if (end - p < 4) in x509_load_certificate_list() 23 if (p[0] != 0x30 && in x509_load_certificate_list() 24 p[1] != 0x82) in x509_load_certificate_list() 26 plen = (p[2] << 8) | p[3]; in x509_load_certificate_list() 28 if (plen > end - p) in x509_load_certificate_list() 34 p, in x509_load_certificate_list() [all …]
|
| A D | pkcs7_trust.c | 27 struct x509_certificate *x509, *last = NULL, *p; in pkcs7_validate_trust_one() local 127 for (p = sinfo->signer; p != x509; p = p->signer) in pkcs7_validate_trust_one() 128 p->verified = true; in pkcs7_validate_trust_one() 162 struct x509_certificate *p; in pkcs7_validate_trust() local 166 for (p = pkcs7->certs; p; p = p->next) in pkcs7_validate_trust() 167 p->seen = false; in pkcs7_validate_trust()
|
| A D | asymmetric_type.c | 50 char *req, *p; in find_asymmetric_key() local 73 *p++ = 'd'; in find_asymmetric_key() 74 *p++ = 'n'; in find_asymmetric_key() 76 *p++ = 'i'; in find_asymmetric_key() 77 *p++ = 'd'; in find_asymmetric_key() 79 *p++ = 'e'; in find_asymmetric_key() 80 *p++ = 'x'; in find_asymmetric_key() 82 *p++ = ':'; in find_asymmetric_key() 83 p = bin2hex(p, lookup, len); in find_asymmetric_key() 84 *p = 0; in find_asymmetric_key() [all …]
|
| A D | x509_public_key.c | 153 char *p, *desc __free(kfree) = NULL; in x509_key_preparse() local 193 p = memcpy(desc, cert->subject, sulen); in x509_key_preparse() 194 p += sulen; in x509_key_preparse() 195 *p++ = ':'; in x509_key_preparse() 196 *p++ = ' '; in x509_key_preparse() 197 p = bin2hex(p, q, srlen); in x509_key_preparse() 198 *p = 0; in x509_key_preparse()
|
| A D | x509_cert_parser.c | 658 const unsigned char *p = value; in x509_decode_time() local 668 year = DD2bin(p); in x509_decode_time() 677 year = DD2bin(p) * 100 + DD2bin(p); in x509_decode_time() 684 mon = DD2bin(p); in x509_decode_time() 685 day = DD2bin(p); in x509_decode_time() 686 hour = DD2bin(p); in x509_decode_time() 687 min = DD2bin(p); in x509_decode_time() 688 sec = DD2bin(p); in x509_decode_time() 690 if (*p != 'Z') in x509_decode_time()
|
| /crypto/ |
| A D | algboss.c | 80 const char *p; in cryptomgr_schedule_probe() local 91 for (p = name; isalnum(*p) || *p == '-' || *p == '_'; p++) in cryptomgr_schedule_probe() 94 len = p - name; in cryptomgr_schedule_probe() 102 name = ++p; in cryptomgr_schedule_probe() 104 for (; isalnum(*p) || *p == '-' || *p == '_'; p++) in cryptomgr_schedule_probe() 107 if (*p == '(') { in cryptomgr_schedule_probe() 111 if (!*++p) in cryptomgr_schedule_probe() 119 p++; in cryptomgr_schedule_probe() 122 len = p - name; in cryptomgr_schedule_probe() 136 if (*p == ')') in cryptomgr_schedule_probe() [all …]
|
| A D | crypto_user.c | 47 if ((q->cra_flags ^ p->cru_type) & p->cru_mask) in crypto_alg_match() 50 if (strlen(p->cru_driver_name)) in crypto_alg_match() 52 p->cru_driver_name); in crypto_alg_match() 177 if (!null_terminated(p->cru_name) || !null_terminated(p->cru_driver_name)) in crypto_report() 180 alg = crypto_alg_match(p, 0); in crypto_report() 254 if (!null_terminated(p->cru_name) || !null_terminated(p->cru_driver_name)) in crypto_update_alg() 289 if (!null_terminated(p->cru_name) || !null_terminated(p->cru_driver_name)) in crypto_del_alg() 329 if (!null_terminated(p->cru_name) || !null_terminated(p->cru_driver_name)) in crypto_add_alg() 345 name = p->cru_driver_name; in crypto_add_alg() 347 name = p->cru_name; in crypto_add_alg() [all …]
|
| A D | dh_helper.c | 29 static inline unsigned int dh_data_size(const struct dh *p) in dh_data_size() argument 31 return p->key_size + p->p_size + p->g_size; in dh_data_size() 34 unsigned int crypto_dh_key_len(const struct dh *p) in crypto_dh_key_len() argument 36 return DH_KPP_SECRET_MIN_SIZE + dh_data_size(p); in crypto_dh_key_len() 58 ptr = dh_pack_data(ptr, end, params->p, params->p_size); in crypto_dh_encode_key() 88 params->p = (void *)(ptr + params->key_size); in __crypto_dh_decode_key() 115 if (memchr_inv(params->p, 0, params->p_size) == NULL) in crypto_dh_decode_key()
|
| A D | dh.c | 24 mpi_free(ctx->p); in dh_clear_ctx() 60 ctx->p = mpi_read_raw_data(params->p, params->p_size); in dh_set_params() 61 if (!ctx->p) in dh_set_params() 115 if (unlikely(!ctx->p)) in dh_is_pubkey_valid() 284 const char *p; member 476 params.p = inst_ctx->safe_prime->p; in dh_safe_prime_set_secret() 622 .p = 644 .p = 674 .p = 712 .p = [all …]
|
| A D | sha1.c | 32 u8 *p = out; in __crypto_sha1_export() local 36 memcpy(p, &ctx, sizeof(ctx)); in __crypto_sha1_export() 37 p += sizeof(ctx); in __crypto_sha1_export() 38 *p = partial; in __crypto_sha1_export() 44 const u8 *p = in; in __crypto_sha1_import() local 46 memcpy(ctx, p, sizeof(*ctx)); in __crypto_sha1_import() 47 p += sizeof(*ctx); in __crypto_sha1_import() 48 ctx->bytecount += *p; in __crypto_sha1_import()
|
| A D | ecc_curve_defs.h | 26 .p = nist_p192_p, 53 .p = nist_p256_p, 86 .p = nist_p384_p, 131 .p = nist_p521_p, 151 .p = curve25519_p,
|
| A D | proc.c | 27 static void *c_next(struct seq_file *m, void *p, loff_t *pos) in c_next() argument 29 return seq_list_next(p, &crypto_alg_list, pos); in c_next() 32 static void c_stop(struct seq_file *m, void *p) in c_stop() argument 37 static int c_show(struct seq_file *m, void *p) in c_show() argument 39 struct crypto_alg *alg = list_entry(p, struct crypto_alg, cra_list); in c_show()
|
| A D | ecrdsa_defs.h | 56 .p = cp256a_p, 90 .p = cp256b_p, 128 .p = cp256c_p, 178 .p = tc512a_p, 224 .p = tc512b_p,
|
| A D | rsassa-pkcs1.c | 117 const struct hash_prefix *p; in rsassa_pkcs1_find_hash_prefix() local 119 for (p = hash_prefixes; p->name; p++) in rsassa_pkcs1_find_hash_prefix() 120 if (strcmp(name, p->name) == 0) in rsassa_pkcs1_find_hash_prefix() 121 return p; in rsassa_pkcs1_find_hash_prefix() 126 const struct hash_prefix *p) in rsassa_pkcs1_invalid_hash_len() argument 133 if (p->data == hash_prefix_none) in rsassa_pkcs1_invalid_hash_len() 145 return len != p->data[p->size - 1]; in rsassa_pkcs1_invalid_hash_len()
|
| A D | ecc.c | 110 struct ecc_point *p = kmalloc(sizeof(*p), GFP_KERNEL); in ecc_alloc_point() local 112 if (!p) in ecc_alloc_point() 116 if (!p->x) in ecc_alloc_point() 120 if (!p->y) in ecc_alloc_point() 123 p->ndigits = ndigits; in ecc_alloc_point() 125 return p; in ecc_alloc_point() 130 kfree(p); in ecc_alloc_point() 137 if (!p) in ecc_free_point() 142 kfree_sensitive(p); in ecc_free_point() 1403 vli_mod_sub(z, result->x, p->x, curve->p, ndigits); in ecc_point_add() [all …]
|
| A D | sha512.c | 33 u8 *p = out; in __crypto_sha512_export() local 37 memcpy(p, &ctx, sizeof(ctx)); in __crypto_sha512_export() 38 p += sizeof(ctx); in __crypto_sha512_export() 39 *p = partial; in __crypto_sha512_export() 45 const u8 *p = in; in __crypto_sha512_import() local 47 memcpy(ctx, p, sizeof(*ctx)); in __crypto_sha512_import() 48 p += sizeof(*ctx); in __crypto_sha512_import() 49 ctx->bytecount_lo += *p; in __crypto_sha512_import()
|
| A D | sha256.c | 33 u8 *p = out; in __crypto_sha256_export() local 37 memcpy(p, &ctx, sizeof(ctx)); in __crypto_sha256_export() 38 p += sizeof(ctx); in __crypto_sha256_export() 39 *p = partial; in __crypto_sha256_export() 45 const u8 *p = in; in __crypto_sha256_import() local 47 memcpy(ctx, p, sizeof(*ctx)); in __crypto_sha256_import() 48 p += sizeof(*ctx); in __crypto_sha256_import() 49 ctx->bytecount += *p; in __crypto_sha256_import()
|
| A D | rsa.c | 20 MPI p; member 91 ret = mpi_powm(m_or_m1_or_h, c, key->dp, key->p); in _rsa_dec_crt() 102 mpi_mulm(m_or_m1_or_h, m12_or_qh, key->qinv, key->p); in _rsa_dec_crt() 202 mpi_free(key->p); in rsa_free_mpi_key() 210 key->p = NULL; in rsa_free_mpi_key() 334 mpi_key->p = mpi_read_raw_data(raw_key.p, raw_key.p_sz); in rsa_set_priv_key() 335 if (!mpi_key->p) in rsa_set_priv_key()
|
| A D | md5.c | 165 char *p; in md5_finup() local 170 p = (char *)block + offset; in md5_finup() 173 *p++ = 0x80; in md5_finup() 175 memset(p, 0x00, padding + sizeof (u64)); in md5_finup() 177 p = (char *)block; in md5_finup() 181 memset(p, 0, padding); in md5_finup()
|
| A D | testmgr.c | 1109 p += scnprintf(p, end - p, "random:"); in generate_random_testvec_config() 1128 p += scnprintf(p, end - p, " may_sleep"); in generate_random_testvec_config() 1134 p += scnprintf(p, end - p, " use_final"); in generate_random_testvec_config() 1138 p += scnprintf(p, end - p, " use_finup"); in generate_random_testvec_config() 1142 p += scnprintf(p, end - p, " use_digest"); in generate_random_testvec_config() 1149 p += scnprintf(p, end - p, " nosimd"); in generate_random_testvec_config() 1153 p += scnprintf(p, end - p, " nosimd_setkey"); in generate_random_testvec_config() 1157 p += scnprintf(p, end - p, " src_divs=["); in generate_random_testvec_config() 1163 p += scnprintf(p, end - p, "]"); in generate_random_testvec_config() 1166 p += scnprintf(p, end - p, " dst_divs=["); in generate_random_testvec_config() [all …]
|
| A D | lskcipher.c | 80 u8 *p; in crypto_lskcipher_crypt_unaligned() local 91 p = kmalloc(PAGE_SIZE, GFP_ATOMIC); in crypto_lskcipher_crypt_unaligned() 93 if (!p) in crypto_lskcipher_crypt_unaligned() 103 memcpy(p, src, chunk); in crypto_lskcipher_crypt_unaligned() 104 err = crypt(tfm, p, p, chunk, tiv, CRYPTO_LSKCIPHER_FLAG_FINAL); in crypto_lskcipher_crypt_unaligned() 108 memcpy(dst, p, chunk); in crypto_lskcipher_crypt_unaligned() 118 kfree_sensitive(p); in crypto_lskcipher_crypt_unaligned()
|
| /crypto/krb5/ |
| A D | rfc6803_camellia.c | 37 u8 *p; in rfc6803_calc_KDF_FEEDBACK_CMAC() local 69 p = data.data + K.len + 4; in rfc6803_calc_KDF_FEEDBACK_CMAC() 70 memcpy(p, constant->data, constant->len); in rfc6803_calc_KDF_FEEDBACK_CMAC() 71 p += constant->len; in rfc6803_calc_KDF_FEEDBACK_CMAC() 72 *p++ = 0x00; in rfc6803_calc_KDF_FEEDBACK_CMAC() 74 memcpy(p, &tmp, 4); in rfc6803_calc_KDF_FEEDBACK_CMAC() 75 p += 4; in rfc6803_calc_KDF_FEEDBACK_CMAC() 84 p = data.data; in rfc6803_calc_KDF_FEEDBACK_CMAC() 85 memcpy(p, K.data, K.len); in rfc6803_calc_KDF_FEEDBACK_CMAC() 86 p += K.len; in rfc6803_calc_KDF_FEEDBACK_CMAC() [all …]
|
| A D | rfc8009_aes2.c | 42 u8 *p; in rfc8009_calc_KDF_HMAC_SHA2() local 74 p = data.data = buffer + in rfc8009_calc_KDF_HMAC_SHA2() 77 *(__be32 *)p = htonl(0x00000001); in rfc8009_calc_KDF_HMAC_SHA2() 78 p += 4; in rfc8009_calc_KDF_HMAC_SHA2() 79 memcpy(p, label->data, label->len); in rfc8009_calc_KDF_HMAC_SHA2() 80 p += label->len; in rfc8009_calc_KDF_HMAC_SHA2() 81 *p++ = 0; in rfc8009_calc_KDF_HMAC_SHA2() 82 memcpy(p, context->data, context->len); in rfc8009_calc_KDF_HMAC_SHA2() 83 p += context->len; in rfc8009_calc_KDF_HMAC_SHA2() 85 memcpy(p, &tmp, 4); in rfc8009_calc_KDF_HMAC_SHA2() [all …]
|
| /crypto/async_tx/ |
| A D | async_raid6_recov.c | 168 p = blocks[disks-2]; in __2data_recov_4() 180 srcs[0] = p; in __2data_recov_4() 190 srcs[0] = p; in __2data_recov_4() 231 p = blocks[disks-2]; in __2data_recov_5() 256 srcs[1] = p; in __2data_recov_5() 309 p = blocks[disks-2]; in __2data_recov_n() 337 blocks[disks-2] = p; in __2data_recov_n() 345 srcs[1] = p; in __2data_recov_n() 476 struct page *p, *q, *dq; in async_raid6_datap_recov() local 525 p = blocks[disks-2]; in async_raid6_datap_recov() [all …]
|