/linux-4.4.14/security/integrity/ |
H A D | digsig_asymmetric.c | 96 pks.rsa.s = mpi_read_raw_data(hdr->sig, siglen); asymmetric_verify() 98 if (pks.rsa.s) asymmetric_verify() 101 mpi_free(pks.rsa.s); asymmetric_verify()
|
/linux-4.4.14/crypto/ |
H A D | rsa_helper.c | 17 #include <crypto/internal/rsa.h> 87 * rsa_free_key() - frees rsa key allocated by rsa_parse_key() 98 * rsa_parse_pub_key() - extracts an rsa public key from BER encoded buffer 125 * rsa_parse_pub_key() - extracts an rsa private key from BER encoded buffer
|
H A D | rsa.c | 13 #include <crypto/internal/rsa.h> 322 static struct akcipher_alg rsa = { variable in typeref:struct:akcipher_alg 332 .cra_name = "rsa", 333 .cra_driver_name = "rsa-generic", 342 return crypto_register_akcipher(&rsa); rsa_init() 347 crypto_unregister_akcipher(&rsa); rsa_exit() 352 MODULE_ALIAS_CRYPTO("rsa");
|
H A D | Makefile | 41 rsa_generic-y += rsa.o
|
H A D | testmgr.c | 1901 pr_err("alg: rsa: encrypt test failed. err %d\n", err); do_test_rsa() 1905 pr_err("alg: rsa: encrypt test failed. Invalid output len\n"); do_test_rsa() 1911 pr_err("alg: rsa: encrypt test failed. Invalid output\n"); do_test_rsa() 1939 pr_err("alg: rsa: decrypt test failed. err %d\n", err); do_test_rsa() 1944 pr_err("alg: rsa: decrypt test failed. Invalid output len\n"); do_test_rsa() 1950 pr_err("alg: rsa: decrypt test failed. Invalid output\n"); do_test_rsa() 1971 pr_err("alg: rsa: test failed on vector %d, err=%d\n", test_rsa() 1982 if (strncmp(alg, "rsa", 3) == 0) test_akcipher() 3642 .alg = "rsa",
|
/linux-4.4.14/crypto/asymmetric_keys/ |
H A D | rsa.c | 100 if (mpi_cmp(s, key->rsa.n) >= 0) { RSAVP1() 110 ret = mpi_powm(m, s, key->rsa.e, key->rsa.n); RSAVP1() 228 k = mpi_get_nbits(key->rsa.n); RSA_verify_signature() 229 tsize = mpi_get_nbits(sig->rsa.s); RSA_verify_signature() 246 ret = RSAVP1(key, sig->rsa.s, &m); RSA_verify_signature()
|
H A D | Makefile | 10 obj-$(CONFIG_PUBLIC_KEY_ALGO_RSA) += rsa.o
|
H A D | x509_public_key.c | 170 if (cert->sig.rsa.s) x509_get_sig_params() 173 cert->sig.rsa.s = mpi_read_raw_data(cert->raw_sig, cert->raw_sig_size); x509_get_sig_params() 174 if (!cert->sig.rsa.s) x509_get_sig_params()
|
H A D | x509_cert_parser.c | 59 mpi_free(cert->sig.rsa.s); x509_free_certificate()
|
/linux-4.4.14/include/crypto/ |
H A D | public_key.h | 85 } rsa; member in union:public_key::__anon12062 104 } rsa; member in union:public_key_signature::__anon12065
|
H A D | akcipher.h | 119 * public key algorithm e.g. "rsa"
|
/linux-4.4.14/drivers/crypto/ccp/ |
H A D | ccp-ops.c | 128 struct ccp_rsa_op rsa; member in union:ccp_op::__anon3843 352 | (op->u.rsa.mod_size << REQ1_RSA_MOD_SIZE_SHIFT) ccp_perform_rsa() 355 cr[1] = op->u.rsa.input_len - 1; ccp_perform_rsa() 1571 struct ccp_rsa_engine *rsa = &cmd->u.rsa; ccp_run_rsa_cmd() local 1578 if (rsa->key_size > CCP_RSA_MAX_WIDTH) ccp_run_rsa_cmd() 1581 if (!rsa->exp || !rsa->mod || !rsa->src || !rsa->dst) ccp_run_rsa_cmd() 1590 o_len = ((rsa->key_size + 255) / 256) * 32; ccp_run_rsa_cmd() 1612 ret = ccp_reverse_set_dm_area(&exp, rsa->exp, rsa->exp_len, ccp_run_rsa_cmd() 1631 ret = ccp_reverse_set_dm_area(&src, rsa->mod, rsa->mod_len, ccp_run_rsa_cmd() 1636 ret = ccp_reverse_set_dm_area(&src, rsa->src, rsa->src_len, ccp_run_rsa_cmd() 1643 ret = ccp_init_data(&dst, cmd_q, rsa->dst, rsa->mod_len, ccp_run_rsa_cmd() 1656 op.u.rsa.mod_size = rsa->key_size; ccp_run_rsa_cmd() 1657 op.u.rsa.input_len = i_len; ccp_run_rsa_cmd() 1665 ccp_reverse_get_dm_area(&dst.dm_wa, rsa->dst, rsa->mod_len); ccp_run_rsa_cmd()
|
/linux-4.4.14/arch/powerpc/platforms/pseries/ |
H A D | hvconsole.c | 7 * Ryan S. Arnold <rsa@us.ibm.com>
|
H A D | hvcserver.c | 34 MODULE_AUTHOR("Ryan S. Arnold <rsa@us.ibm.com>");
|
/linux-4.4.14/drivers/crypto/qat/qat_common/ |
H A D | qat_asym_algs.c | 49 #include <crypto/internal/rsa.h> 716 static struct akcipher_alg rsa = { variable in typeref:struct:akcipher_alg 728 .cra_name = "rsa", 729 .cra_driver_name = "qat-rsa", 742 rsa.base.cra_flags = 0; qat_asym_algs_register() 743 ret = crypto_register_akcipher(&rsa); qat_asym_algs_register() 753 crypto_unregister_akcipher(&rsa); qat_asym_algs_unregister()
|
/linux-4.4.14/drivers/tty/hvc/ |
H A D | hvc_rtas.c | 8 * : Ryan S. Arnold <rsa@us.ibm.com>
|
H A D | hvc_console.h | 6 * Ryan S. Arnold <rsa@us.ibm.com>
|
H A D | hvc_vio.c | 15 * Ryan S. Arnold <rsa@us.ibm.com>
|
H A D | hvcs.c | 4 * Ryan S. Arnold (rsa@us.ibm.com) 20 * Author(s) : Ryan S. Arnold <rsa@us.ibm.com> 130 MODULE_AUTHOR("Ryan S. Arnold <rsa@us.ibm.com>");
|
H A D | hvc_console.c | 8 * Ryan S. Arnold <rsa@us.ibm.com>
|
/linux-4.4.14/drivers/gpu/drm/i915/ |
H A D | intel_guc_loader.c | 241 u32 status, ucode_size, rsa[UOS_RSA_SIG_SIZE / sizeof(u32)]; guc_ucode_xfer_dma() local 249 sg_pcopy_to_buffer(sg->sgl, sg->nents, rsa, UOS_RSA_SIG_SIZE, offset); guc_ucode_xfer_dma() 251 I915_WRITE(UOS_RSA_SCRATCH(i), rsa[i]); guc_ucode_xfer_dma() local
|
/linux-4.4.14/include/linux/ |
H A D | ccp.h | 546 struct ccp_rsa_engine rsa; member in union:ccp_cmd::__anon12129
|
/linux-4.4.14/drivers/tty/serial/8250/ |
H A D | 8250_core.c | 374 if (request_region(start, size, "serial-rsa")) serial8250_request_rsa_resource()
|
/linux-4.4.14/drivers/net/wireless/iwlwifi/pcie/ |
H A D | trans.c | 729 * If the HW isn't locked and the rsa semaphore isn't accessible, iwl_pcie_rsa_race_bug_wa()
|