/linux-master/crypto/ |
H A D | rsa.c | 268 struct rsa_key raw_key = {0}; local 274 ret = rsa_parse_pub_key(&raw_key, key, keylen); 278 mpi_key->e = mpi_read_raw_data(raw_key.e, raw_key.e_sz); 282 mpi_key->n = mpi_read_raw_data(raw_key.n, raw_key.n_sz); 307 struct rsa_key raw_key = {0}; local 313 ret = rsa_parse_priv_key(&raw_key, key, keylen); 317 mpi_key->d = mpi_read_raw_data(raw_key.d, raw_key [all...] |
/linux-master/include/crypto/internal/ |
H A D | poly1305.h | 22 const u8 raw_key[POLY1305_BLOCK_SIZE]);
|
/linux-master/drivers/crypto/ccp/ |
H A D | ccp-crypto-rsa.c | 130 struct rsa_key raw_key; local 134 memset(&raw_key, 0, sizeof(raw_key)); 138 ret = rsa_parse_priv_key(&raw_key, key, keylen); 140 ret = rsa_parse_pub_key(&raw_key, key, keylen); 145 raw_key.n, raw_key.n_sz); 157 raw_key.e, raw_key.e_sz); 165 raw_key [all...] |
/linux-master/fs/crypto/ |
H A D | keysetup_v1.c | 181 const u8 *raw_key, 206 if (crypto_memneq(raw_key, dk->dk_raw, ci->ci_mode->keysize)) 208 /* using existing tfm with same (descriptor, mode, raw_key) */ 222 fscrypt_get_direct_key(const struct fscrypt_inode_info *ci, const u8 *raw_key) argument 228 dk = find_or_insert_direct_key(NULL, raw_key, ci); 239 err = fscrypt_prepare_key(&dk->dk_key, raw_key, ci); 244 memcpy(dk->dk_raw, raw_key, ci->ci_mode->keysize); 246 return find_or_insert_direct_key(dk, raw_key, ci); 180 find_or_insert_direct_key(struct fscrypt_direct_key *to_insert, const u8 *raw_key, const struct fscrypt_inode_info *ci) argument
|
H A D | fscrypt_private.h | 388 const u8 *raw_key, 430 const u8 *raw_key, 655 const u8 *raw_key, const struct fscrypt_inode_info *ci); 661 const u8 *raw_key); 429 fscrypt_prepare_inline_crypt_key(struct fscrypt_prepared_key *prep_key, const u8 *raw_key, const struct fscrypt_inode_info *ci) argument
|
H A D | keysetup.c | 100 fscrypt_allocate_skcipher(struct fscrypt_mode *mode, const u8 *raw_key, argument 133 err = crypto_skcipher_setkey(tfm, raw_key, mode->keysize); 151 const u8 *raw_key, const struct fscrypt_inode_info *ci) 156 return fscrypt_prepare_inline_crypt_key(prep_key, raw_key, ci); 158 tfm = fscrypt_allocate_skcipher(ci->ci_mode, raw_key, ci->ci_inode); 182 const u8 *raw_key) 185 return fscrypt_prepare_key(&ci->ci_enc_key, raw_key, ci); 150 fscrypt_prepare_key(struct fscrypt_prepared_key *prep_key, const u8 *raw_key, const struct fscrypt_inode_info *ci) argument 181 fscrypt_set_per_file_enc_key(struct fscrypt_inode_info *ci, const u8 *raw_key) argument
|
H A D | inline_crypt.c | 153 const u8 *raw_key, 169 err = blk_crypto_init_key(blk_key, raw_key, crypto_mode, 152 fscrypt_prepare_inline_crypt_key(struct fscrypt_prepared_key *prep_key, const u8 *raw_key, const struct fscrypt_inode_info *ci) argument
|
/linux-master/drivers/crypto/caam/ |
H A D | caampkc.c | 947 struct rsa_key raw_key = {NULL}; local 954 ret = rsa_parse_pub_key(&raw_key, key, keylen); 959 rsa_key->e = kmemdup(raw_key.e, raw_key.e_sz, GFP_KERNEL); 969 rsa_key->n = caam_read_raw_data(raw_key.n, &raw_key.n_sz); 973 if (caam_rsa_check_key_length(raw_key.n_sz << 3)) { 978 rsa_key->e_sz = raw_key.e_sz; 979 rsa_key->n_sz = raw_key.n_sz; 988 struct rsa_key *raw_key) 987 caam_rsa_set_priv_key_form(struct caam_rsa_ctx *ctx, struct rsa_key *raw_key) argument 1052 struct rsa_key raw_key = {NULL}; local [all...] |
/linux-master/lib/crypto/ |
H A D | poly1305-donna32.c | 14 const u8 raw_key[POLY1305_BLOCK_SIZE]) 17 key->key.r[0] = (get_unaligned_le32(&raw_key[0])) & 0x3ffffff; 18 key->key.r[1] = (get_unaligned_le32(&raw_key[3]) >> 2) & 0x3ffff03; 19 key->key.r[2] = (get_unaligned_le32(&raw_key[6]) >> 4) & 0x3ffc0ff; 20 key->key.r[3] = (get_unaligned_le32(&raw_key[9]) >> 6) & 0x3f03fff; 21 key->key.r[4] = (get_unaligned_le32(&raw_key[12]) >> 8) & 0x00fffff; 13 poly1305_core_setkey(struct poly1305_core_key *key, const u8 raw_key[POLY1305_BLOCK_SIZE]) argument
|
H A D | poly1305-donna64.c | 14 const u8 raw_key[POLY1305_BLOCK_SIZE]) 19 t0 = get_unaligned_le64(&raw_key[0]); 20 t1 = get_unaligned_le64(&raw_key[8]); 13 poly1305_core_setkey(struct poly1305_core_key *key, const u8 raw_key[POLY1305_BLOCK_SIZE]) argument
|
/linux-master/include/linux/ |
H A D | blk-crypto.h | 90 int blk_crypto_init_key(struct blk_crypto_key *blk_key, const u8 *raw_key,
|
/linux-master/drivers/crypto/starfive/ |
H A D | jh7110-rsa.c | 452 struct rsa_key raw_key = {NULL}; local 457 ret = rsa_parse_priv_key(&raw_key, key, keylen); 459 ret = rsa_parse_pub_key(&raw_key, key, keylen); 466 if (raw_key.n_sz > STARFIVE_RSA_MAX_KEYSZ + 1) 469 ret = starfive_rsa_set_n(rsa_key, raw_key.n, raw_key.n_sz); 473 ret = starfive_rsa_set_e(rsa_key, raw_key.e, raw_key.e_sz); 478 ret = starfive_rsa_set_d(rsa_key, raw_key.d, raw_key [all...] |
/linux-master/block/ |
H A D | blk-crypto.c | 318 * @raw_key: Pointer to the raw key. Must be the correct length for the chosen 326 * zeroizing both blk_key and raw_key when done with them. 328 int blk_crypto_init_key(struct blk_crypto_key *blk_key, const u8 *raw_key, argument 355 memcpy(blk_key->raw, raw_key, mode->keysize);
|