/linux-master/arch/s390/crypto/ |
H A D | paes_s390.c | 113 struct pkey_protkey pk; member in struct:s390_paes_ctx 120 struct pkey_protkey pk[2]; member in struct:s390_pxts_ctx 126 struct pkey_protkey *pk) 137 pk->protkey, &pk->len, &pk->type); 154 memcpy(&ctx->pk, &pkey, sizeof(pkey)); 187 fc = (ctx->pk.type == PKEY_KEYTYPE_AES_128) ? CPACF_KM_PAES_128 : 188 (ctx->pk.type == PKEY_KEYTYPE_AES_192) ? CPACF_KM_PAES_192 : 189 (ctx->pk 125 __paes_keyblob2pkey(struct key_blob *kb, struct pkey_protkey *pk) argument [all...] |
/linux-master/crypto/asymmetric_keys/ |
H A D | public_key.c | 459 const struct public_key *pk = key->payload.data[asym_crypto]; local 460 return public_key_verify_signature(pk, sig);
|
/linux-master/crypto/ |
H A D | ecc.c | 1514 struct ecc_point *pk; local 1525 pk = ecc_alloc_point(ndigits); 1526 if (!pk) { 1531 ecc_point_mult(pk, &curve->g, priv, NULL, curve, ndigits); 1534 if (ecc_is_pubkey_valid_full(curve, pk)) { 1539 ecc_swap_digits(pk->x, public_key, ndigits); 1540 ecc_swap_digits(pk->y, &public_key[ndigits], ndigits); 1543 ecc_free_point(pk); 1551 struct ecc_point *pk) 1555 if (WARN_ON(pk 1550 ecc_is_pubkey_valid_partial(const struct ecc_curve *curve, struct ecc_point *pk) argument 1583 ecc_is_pubkey_valid_full(const struct ecc_curve *curve, struct ecc_point *pk) argument 1614 struct ecc_point *product, *pk; local [all...] |
/linux-master/drivers/crypto/intel/keembay/ |
H A D | keembay-ocs-ecc.c | 351 struct ecc_point *pk) 358 if (WARN_ON(pk->ndigits != curve->g.ndigits)) 362 if (ecc_point_is_zero(pk)) 366 if (vli_cmp(curve->p, pk->x, pk->ndigits) != 1) 369 if (vli_cmp(curve->p, pk->y, pk->ndigits) != 1) 376 rc = kmb_ecc_do_scalar_op(ecc_dev, yy, pk->y, pk->y, curve, pk 349 kmb_ocs_ecc_is_pubkey_valid_partial(struct ocs_ecc_dev *ecc_dev, const struct ecc_curve *curve, struct ecc_point *pk) argument 424 kmb_ocs_ecc_is_pubkey_valid_full(struct ocs_ecc_dev *ecc_dev, const struct ecc_curve *curve, struct ecc_point *pk) argument 583 struct ecc_point *pk, *result; local 663 struct ecc_point *pk; local [all...] |
/linux-master/fs/btrfs/ |
H A D | file-item.c | 927 struct btrfs_key pk; local 929 btrfs_item_key_to_cpu(leaf, &pk, slot); 930 if (pk.offset < bytenr || 931 pk.type != BTRFS_EXTENT_CSUM_KEY || 932 pk.objectid != 937 key.offset = pk.offset;
|
/linux-master/include/crypto/internal/ |
H A D | ecc.h | 123 * @pk: public key as a point 134 struct ecc_point *pk); 140 * @pk: public key as a point 148 struct ecc_point *pk);
|
/linux-master/net/bluetooth/ |
H A D | smp.c | 3482 u8 pk[64]; local 3489 err = generate_ecdh_public_key(tfm_ecdh, pk); 3493 if (crypto_memneq(pk, debug_pk, 64))
|
/linux-master/security/integrity/ |
H A D | digsig_asymmetric.c | 87 const struct public_key *pk; local 110 pk = asymmetric_key_public_key(key); 111 pks.pkey_algo = pk->pkey_algo; 112 if (!strcmp(pk->pkey_algo, "rsa")) { 114 } else if (!strncmp(pk->pkey_algo, "ecdsa-", 6)) { 117 } else if (!strcmp(pk->pkey_algo, "ecrdsa") || 118 !strcmp(pk->pkey_algo, "sm2")) {
|