/openbmc/linux/crypto/ |
H A D | rsa.c | 90 return akcipher_tfm_ctx(tfm); in rsa_get_key() 95 struct crypto_akcipher *tfm = crypto_akcipher_reqtfm(req); in rsa_enc() local 96 const struct rsa_mpi_key *pkey = rsa_get_key(tfm); in rsa_enc() 134 struct crypto_akcipher *tfm = crypto_akcipher_reqtfm(req); in rsa_dec() local 135 const struct rsa_mpi_key *pkey = rsa_get_key(tfm); in rsa_dec() 239 struct rsa_mpi_key *mpi_key = akcipher_tfm_ctx(tfm); in rsa_set_pub_key() 278 struct rsa_mpi_key *mpi_key = akcipher_tfm_ctx(tfm); in rsa_set_priv_key() 338 static unsigned int rsa_max_size(struct crypto_akcipher *tfm) in rsa_max_size() argument 340 struct rsa_mpi_key *pkey = akcipher_tfm_ctx(tfm); in rsa_max_size() 345 static void rsa_exit_tfm(struct crypto_akcipher *tfm) in rsa_exit_tfm() argument [all …]
|
H A D | hctr2.c | 111 SHASH_DESC_ON_STACK(shash, tfm->polyval); in hctr2_hash_tweaklen() 115 shash->tfm = tctx->polyval; in hctr2_hash_tweaklen() 132 struct hctr2_tfm_ctx *tctx = crypto_skcipher_ctx(tfm); in hctr2_setkey() 138 crypto_skcipher_get_flags(tfm) & in hctr2_setkey() 146 crypto_skcipher_get_flags(tfm) & in hctr2_setkey() 179 hash_desc->tfm = tctx->polyval; in hctr2_hash_tweak() 240 hash_desc->tfm = tctx->polyval; in hctr2_finish() 334 static int hctr2_init_tfm(struct crypto_skcipher *tfm) in hctr2_init_tfm() argument 338 struct hctr2_tfm_ctx *tctx = crypto_skcipher_ctx(tfm); in hctr2_init_tfm() 385 static void hctr2_exit_tfm(struct crypto_skcipher *tfm) in hctr2_exit_tfm() argument [all …]
|
H A D | ecdsa.c | 139 struct crypto_akcipher *tfm = crypto_akcipher_reqtfm(req); in ecdsa_verify() local 140 struct ecc_ctx *ctx = akcipher_tfm_ctx(tfm); in ecdsa_verify() 224 struct ecc_ctx *ctx = akcipher_tfm_ctx(tfm); in ecdsa_set_pub_key() 254 static void ecdsa_exit_tfm(struct crypto_akcipher *tfm) in ecdsa_exit_tfm() argument 256 struct ecc_ctx *ctx = akcipher_tfm_ctx(tfm); in ecdsa_exit_tfm() 261 static unsigned int ecdsa_max_size(struct crypto_akcipher *tfm) in ecdsa_max_size() argument 263 struct ecc_ctx *ctx = akcipher_tfm_ctx(tfm); in ecdsa_max_size() 268 static int ecdsa_nist_p384_init_tfm(struct crypto_akcipher *tfm) in ecdsa_nist_p384_init_tfm() argument 270 struct ecc_ctx *ctx = akcipher_tfm_ctx(tfm); in ecdsa_nist_p384_init_tfm() 292 struct ecc_ctx *ctx = akcipher_tfm_ctx(tfm); in ecdsa_nist_p256_init_tfm() [all …]
|
H A D | arc4.c | 18 static int crypto_arc4_setkey(struct crypto_skcipher *tfm, const u8 *in_key, in crypto_arc4_setkey() argument 21 struct arc4_ctx *ctx = crypto_skcipher_ctx(tfm); in crypto_arc4_setkey() 28 struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req); in crypto_arc4_crypt() local 29 struct arc4_ctx *ctx = crypto_skcipher_ctx(tfm); in crypto_arc4_crypt() 44 static int crypto_arc4_init(struct crypto_skcipher *tfm) in crypto_arc4_init() argument
|
/openbmc/linux/drivers/crypto/intel/qat/qat_common/ |
H A D | qat_algs.c | 125 shash->tfm = ctx->hash_tfm; in qat_alg_do_precomputes() 599 return qat_alg_aead_init_sessions(tfm, key, keylen, in qat_alg_aead_rekey() 632 ret = qat_alg_aead_init_sessions(tfm, key, keylen, in qat_alg_aead_newkey() 661 return qat_alg_aead_rekey(tfm, key, keylen); in qat_alg_aead_setkey() 663 return qat_alg_aead_newkey(tfm, key, keylen); in qat_alg_aead_setkey() 955 return qat_alg_skcipher_setkey(tfm, key, keylen, in qat_alg_skcipher_cbc_setkey() 962 return qat_alg_skcipher_setkey(tfm, key, keylen, in qat_alg_skcipher_ctr_setkey() 972 ret = xts_verify_key(tfm, key, keylen); in qat_alg_skcipher_xts_setkey() 988 ret = qat_alg_skcipher_setkey(tfm, key, keylen, in qat_alg_skcipher_xts_setkey() 1231 crypto_skcipher_set_reqsize(tfm, reqsize); in qat_alg_skcipher_init_xts_tfm() [all …]
|
/openbmc/linux/security/keys/encrypted-keys/ |
H A D | encrypted.c | 88 struct crypto_skcipher *tfm; in aes_get_sizes() local 91 if (IS_ERR(tfm)) { in aes_get_sizes() 93 PTR_ERR(tfm)); in aes_get_sizes() 94 return PTR_ERR(tfm); in aes_get_sizes() 98 crypto_free_skcipher(tfm); in aes_get_sizes() 335 struct crypto_shash *tfm; in calc_hmac() local 339 if (IS_ERR(tfm)) { in calc_hmac() 342 return PTR_ERR(tfm); in calc_hmac() 348 crypto_free_shash(tfm); in calc_hmac() 391 if (IS_ERR(tfm)) { in init_skcipher_req() [all …]
|
/openbmc/linux/drivers/crypto/ |
H A D | padlock-aes.c | 97 static inline struct aes_ctx *aes_ctx(struct crypto_tfm *tfm) in aes_ctx() argument 99 return aes_ctx_common(crypto_tfm_ctx(tfm)); in aes_ctx() 104 return aes_ctx_common(crypto_skcipher_ctx(tfm)); in skcipher_aes_ctx() 110 struct aes_ctx *ctx = aes_ctx(tfm); in aes_set_key() 308 struct aes_ctx *ctx = aes_ctx(tfm); in padlock_aes_encrypt() 317 struct aes_ctx *ctx = aes_ctx(tfm); in padlock_aes_decrypt() 346 struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req); in ecb_aes_encrypt() local 347 struct aes_ctx *ctx = skcipher_aes_ctx(tfm); in ecb_aes_encrypt() 372 struct aes_ctx *ctx = skcipher_aes_ctx(tfm); in ecb_aes_decrypt() 412 struct aes_ctx *ctx = skcipher_aes_ctx(tfm); in cbc_aes_encrypt() [all …]
|
H A D | sa2ul.c | 447 shash->tfm = data->ctx->shash; in sa_prepare_iopads() 1357 struct crypto_ahash *tfm; in sa_sha_dma_in_callback() local 1366 tfm = crypto_ahash_reqtfm(req); in sa_sha_dma_in_callback() 1546 crypto_ahash_digestsize(tfm), rctx); in sa_sha_init() 1632 sa_sha_cra_init_alg(tfm, "sha1"); in sa_sha1_cra_init() 1648 sa_sha_cra_init_alg(tfm, "sha256"); in sa_sha256_cra_init() 1664 sa_sha_cra_init_alg(tfm, "sha512"); in sa_sha512_cra_init() 1695 struct crypto_aead *tfm; in sa_aead_dma_in_callback() local 1706 tfm = crypto_aead_reqtfm(req); in sa_aead_dma_in_callback() 1708 authsize = crypto_aead_authsize(tfm); in sa_aead_dma_in_callback() [all …]
|
/openbmc/linux/drivers/crypto/allwinner/sun8i-ss/ |
H A D | sun8i-ss-prng.c | 19 int sun8i_ss_prng_seed(struct crypto_rng *tfm, const u8 *seed, in sun8i_ss_prng_seed() argument 22 struct sun8i_ss_rng_tfm_ctx *ctx = crypto_rng_ctx(tfm); in sun8i_ss_prng_seed() 40 int sun8i_ss_prng_init(struct crypto_tfm *tfm) in sun8i_ss_prng_init() argument 42 struct sun8i_ss_rng_tfm_ctx *ctx = crypto_tfm_ctx(tfm); in sun8i_ss_prng_init() 48 void sun8i_ss_prng_exit(struct crypto_tfm *tfm) in sun8i_ss_prng_exit() argument 50 struct sun8i_ss_rng_tfm_ctx *ctx = crypto_tfm_ctx(tfm); in sun8i_ss_prng_exit() 57 int sun8i_ss_prng_generate(struct crypto_rng *tfm, const u8 *src, in sun8i_ss_prng_generate() argument 60 struct sun8i_ss_rng_tfm_ctx *ctx = crypto_rng_ctx(tfm); in sun8i_ss_prng_generate() 61 struct rng_alg *alg = crypto_rng_alg(tfm); in sun8i_ss_prng_generate()
|
/openbmc/linux/drivers/crypto/allwinner/sun8i-ce/ |
H A D | sun8i-ce-prng.c | 17 int sun8i_ce_prng_init(struct crypto_tfm *tfm) in sun8i_ce_prng_init() argument 19 struct sun8i_ce_rng_tfm_ctx *ctx = crypto_tfm_ctx(tfm); in sun8i_ce_prng_init() 25 void sun8i_ce_prng_exit(struct crypto_tfm *tfm) in sun8i_ce_prng_exit() argument 27 struct sun8i_ce_rng_tfm_ctx *ctx = crypto_tfm_ctx(tfm); in sun8i_ce_prng_exit() 34 int sun8i_ce_prng_seed(struct crypto_rng *tfm, const u8 *seed, in sun8i_ce_prng_seed() argument 37 struct sun8i_ce_rng_tfm_ctx *ctx = crypto_rng_ctx(tfm); in sun8i_ce_prng_seed() 55 int sun8i_ce_prng_generate(struct crypto_rng *tfm, const u8 *src, in sun8i_ce_prng_generate() argument 58 struct sun8i_ce_rng_tfm_ctx *ctx = crypto_rng_ctx(tfm); in sun8i_ce_prng_generate() 59 struct rng_alg *alg = crypto_rng_alg(tfm); in sun8i_ce_prng_generate()
|
/openbmc/linux/drivers/staging/rtl8192e/ |
H A D | rtllib_crypt_ccmp.c | 43 struct crypto_aead *tfm; member 60 if (IS_ERR(priv->tfm)) { in rtllib_ccmp_init() 62 priv->tfm = NULL; in rtllib_ccmp_init() 69 if (priv->tfm) in rtllib_ccmp_init() 70 crypto_free_aead(priv->tfm); in rtllib_ccmp_init() 81 if (_priv && _priv->tfm) in rtllib_ccmp_deinit() 82 crypto_free_aead(_priv->tfm); in rtllib_ccmp_deinit() 194 req = aead_request_alloc(key->tfm, GFP_ATOMIC); in rtllib_ccmp_encrypt() 277 req = aead_request_alloc(key->tfm, GFP_ATOMIC); in rtllib_ccmp_decrypt() 317 struct crypto_aead *tfm = data->tfm; in rtllib_ccmp_set_key() local [all …]
|
/openbmc/linux/net/bluetooth/ |
H A D | ecdh_helper.h | 26 int compute_ecdh_secret(struct crypto_kpp *tfm, const u8 pair_public_key[64], 28 int set_ecdh_privkey(struct crypto_kpp *tfm, const u8 private_key[32]); 29 int generate_ecdh_public_key(struct crypto_kpp *tfm, u8 public_key[64]); 30 int generate_ecdh_keys(struct crypto_kpp *tfm, u8 public_key[64]);
|
/openbmc/linux/drivers/crypto/intel/keembay/ |
H A D | keembay-ocs-aes-core.c | 197 tfm->base.crt_flags & in kmb_ocs_sk_set_key() 207 struct ocs_aes_tctx *tctx = crypto_aead_ctx(tfm); in kmb_ocs_aead_set_key() 256 int iv_size = crypto_skcipher_ivsize(tfm); in kmb_ocs_sk_validate_input() 403 int iv_size = crypto_skcipher_ivsize(tfm); in kmb_ocs_sk_prepare_inplace() 520 int iv_size = crypto_skcipher_ivsize(tfm); in kmb_ocs_sk_run() 598 struct crypto_aead *tfm = crypto_aead_reqtfm(req); in kmb_ocs_aead_validate_input() local 599 int tag_size = crypto_aead_authsize(tfm); in kmb_ocs_aead_validate_input() 600 int iv_size = crypto_aead_ivsize(tfm); in kmb_ocs_aead_validate_input() 1198 struct ocs_aes_tctx *tctx = crypto_aead_ctx(tfm); in ocs_aes_aead_cra_init() 1208 crypto_aead_set_reqsize(tfm, in ocs_aes_aead_cra_init() [all …]
|
/openbmc/linux/drivers/crypto/ccree/ |
H A D | cc_cipher.c | 66 struct cc_cipher_ctx *ctx_p = crypto_tfm_ctx(tfm); in cc_key_type() 154 static int cc_cipher_init(struct crypto_tfm *tfm) in cc_cipher_init() argument 156 struct cc_cipher_ctx *ctx_p = crypto_tfm_ctx(tfm); in cc_cipher_init() 165 crypto_tfm_alg_name(tfm)); in cc_cipher_init() 172 const char *name = crypto_tfm_alg_name(tfm); in cc_cipher_init() 232 static void cc_cipher_exit(struct crypto_tfm *tfm) in cc_cipher_exit() argument 234 struct crypto_alg *alg = tfm->__crt_alg; in cc_cipher_exit() 243 crypto_tfm_ctx(tfm), crypto_tfm_alg_name(tfm)); in cc_cipher_exit() 310 ctx_p, crypto_tfm_alg_name(tfm), keylen); in cc_cipher_sethkey() 413 ctx_p, crypto_tfm_alg_name(tfm), keylen); in cc_cipher_setkey() [all …]
|
/openbmc/linux/arch/arm/crypto/ |
H A D | aes-ce-glue.c | 140 struct crypto_aes_ctx *ctx = crypto_skcipher_ctx(tfm); in ce_aes_setkey() 156 ret = xts_verify_key(tfm, in_key, key_len); in xts_set_key() 170 struct crypto_aes_ctx *ctx = crypto_skcipher_ctx(tfm); in ecb_encrypt() 190 struct crypto_aes_ctx *ctx = crypto_skcipher_ctx(tfm); in ecb_decrypt() 211 struct crypto_aes_ctx *ctx = crypto_skcipher_ctx(tfm); in cbc_encrypt_walk() 241 struct crypto_aes_ctx *ctx = crypto_skcipher_ctx(tfm); in cbc_decrypt_walk() 270 struct crypto_aes_ctx *ctx = crypto_skcipher_ctx(tfm); in cts_cbc_encrypt() 278 skcipher_request_set_tfm(&subreq, tfm); in cts_cbc_encrypt() 336 skcipher_request_set_tfm(&subreq, tfm); in cts_cbc_decrypt() 466 skcipher_request_set_tfm(&subreq, tfm); in xts_encrypt() [all …]
|
/openbmc/linux/drivers/crypto/ccp/ |
H A D | ccp-crypto-sha.c | 30 struct crypto_ahash *tfm = crypto_ahash_reqtfm(req); in ccp_sha_complete() local 62 struct ccp_ctx *ctx = crypto_ahash_ctx_dma(tfm); in ccp_do_sha_update() 66 crypto_tfm_alg_blocksize(crypto_ahash_tfm(tfm)); in ccp_do_sha_update() 185 struct ccp_ctx *ctx = crypto_ahash_ctx_dma(tfm); in ccp_sha_init() 188 ccp_crypto_ahash_alg(crypto_ahash_tfm(tfm)); in ccp_sha_init() 190 crypto_tfm_alg_blocksize(crypto_ahash_tfm(tfm)); in ccp_sha_init() 275 struct ccp_ctx *ctx = crypto_ahash_ctx_dma(tfm); in ccp_sha_setkey() 333 struct ccp_ctx *ctx = crypto_tfm_ctx_dma(tfm); in ccp_hmac_sha_cra_init() 346 return ccp_sha_cra_init(tfm); in ccp_hmac_sha_cra_init() 351 struct ccp_ctx *ctx = crypto_tfm_ctx_dma(tfm); in ccp_hmac_sha_cra_exit() [all …]
|
/openbmc/linux/net/xfrm/ |
H A D | xfrm_ipcomp.c | 45 struct crypto_comp *tfm = *this_cpu_ptr(ipcd->tfms); in ipcomp_decompress() local 128 struct crypto_comp *tfm; in ipcomp_compress() local 134 tfm = *this_cpu_ptr(ipcd->tfms); in ipcomp_compress() 254 struct crypto_comp *tfm = *per_cpu_ptr(tfms, cpu); in ipcomp_free_tfms() local 255 crypto_free_comp(tfm); in ipcomp_free_tfms() 268 struct crypto_comp *tfm; in ipcomp_alloc_tfms() local 271 tfm = this_cpu_read(*pos->tfms); in ipcomp_alloc_tfms() 273 if (!strcmp(crypto_comp_name(tfm), alg_name)) { in ipcomp_alloc_tfms() 292 struct crypto_comp *tfm = crypto_alloc_comp(alg_name, 0, in ipcomp_alloc_tfms() local 294 if (IS_ERR(tfm)) in ipcomp_alloc_tfms() [all …]
|
/openbmc/linux/arch/x86/crypto/ |
H A D | aria_aesni_avx_glue.c | 66 struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req); in aria_avx_ecb_encrypt() local 67 struct aria_ctx *ctx = crypto_skcipher_ctx(tfm); in aria_avx_ecb_encrypt() 74 struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req); in aria_avx_ecb_decrypt() local 75 struct aria_ctx *ctx = crypto_skcipher_ctx(tfm); in aria_avx_ecb_decrypt() 80 static int aria_avx_set_key(struct crypto_skcipher *tfm, const u8 *key, in aria_avx_set_key() argument 83 return aria_set_key(&tfm->base, key, keylen); in aria_avx_set_key() 89 struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req); in aria_avx_ctr_encrypt() local 90 struct aria_ctx *ctx = crypto_skcipher_ctx(tfm); in aria_avx_ctr_encrypt() 146 static int aria_avx_init_tfm(struct crypto_skcipher *tfm) in aria_avx_init_tfm() argument 148 crypto_skcipher_set_reqsize(tfm, sizeof(struct aria_avx_request_ctx)); in aria_avx_init_tfm()
|
/openbmc/linux/drivers/nvme/common/ |
H A D | auth.c | 272 shash->tfm = key_tfm; in nvme_auth_transform_key() 308 struct crypto_shash *tfm; in nvme_auth_hash_skey() local 317 tfm = crypto_alloc_shash(digest_name, 0, 0); in nvme_auth_hash_skey() 318 if (IS_ERR(tfm)) in nvme_auth_hash_skey() 326 crypto_free_shash(tfm); in nvme_auth_hash_skey() 333 struct crypto_shash *tfm; in nvme_auth_augmented_challenge() local 356 tfm = crypto_alloc_shash(hmac_name, 0, 0); in nvme_auth_augmented_challenge() 357 if (IS_ERR(tfm)) { in nvme_auth_augmented_challenge() 358 ret = PTR_ERR(tfm); in nvme_auth_augmented_challenge() 368 desc->tfm = tfm; in nvme_auth_augmented_challenge() [all …]
|
/openbmc/linux/net/wireless/ |
H A D | lib80211_crypt_ccmp.c | 52 struct crypto_aead *tfm; member 69 if (IS_ERR(priv->tfm)) { in lib80211_ccmp_init() 70 priv->tfm = NULL; in lib80211_ccmp_init() 78 if (priv->tfm) in lib80211_ccmp_init() 79 crypto_free_aead(priv->tfm); in lib80211_ccmp_init() 89 if (_priv && _priv->tfm) in lib80211_ccmp_deinit() 90 crypto_free_aead(_priv->tfm); in lib80211_ccmp_deinit() 209 req = aead_request_alloc(key->tfm, GFP_ATOMIC); in lib80211_ccmp_encrypt() 313 req = aead_request_alloc(key->tfm, GFP_ATOMIC); in lib80211_ccmp_decrypt() 351 struct crypto_aead *tfm = data->tfm; in lib80211_ccmp_set_key() local [all …]
|
/openbmc/linux/include/crypto/internal/ |
H A D | akcipher.h | 59 static inline void *akcipher_tfm_ctx(struct crypto_akcipher *tfm) in akcipher_tfm_ctx() argument 61 return crypto_tfm_ctx(&tfm->base); in akcipher_tfm_ctx() 64 static inline void *akcipher_tfm_ctx_dma(struct crypto_akcipher *tfm) in akcipher_tfm_ctx_dma() argument 66 return crypto_tfm_ctx_dma(&tfm->base); in akcipher_tfm_ctx_dma() 75 static inline const char *akcipher_alg_name(struct crypto_akcipher *tfm) in akcipher_alg_name() argument 77 return crypto_akcipher_tfm(tfm)->__crt_alg->cra_name; in akcipher_alg_name()
|
H A D | kpp.h | 76 static inline void *kpp_tfm_ctx(struct crypto_kpp *tfm) in kpp_tfm_ctx() argument 78 return crypto_tfm_ctx(&tfm->base); in kpp_tfm_ctx() 81 static inline void *kpp_tfm_ctx_dma(struct crypto_kpp *tfm) in kpp_tfm_ctx_dma() argument 83 return crypto_tfm_ctx_dma(&tfm->base); in kpp_tfm_ctx_dma() 91 static inline const char *kpp_alg_name(struct crypto_kpp *tfm) in kpp_alg_name() argument 93 return crypto_kpp_tfm(tfm)->__crt_alg->cra_name; in kpp_alg_name()
|
/openbmc/openbmc/meta-arm/meta-arm/recipes-bsp/trusted-firmware-m/ |
H A D | trusted-firmware-m-2.0.0-src.inc | 16 SRC_URI = "${SRC_URI_TRUSTED_FIRMWARE_M};branch=${SRCBRANCH_tfm};name=tfm;destsuffix=git/tfm \ 17 …RUSTED_FIRMWARE_M_EXTRAS};branch=${SRCBRANCH_tfm-extras};name=tfm-extras;destsuffix=git/tfm-extras… 18 …${SRC_URI_TRUSTED_FIRMWARE_M_TESTS};branch=${SRCBRANCH_tfm-tests};name=tfm-tests;destsuffix=git/tf… 44 SRCREV_FORMAT = "tfm" 46 S = "${WORKDIR}/git/tfm"
|
/openbmc/linux/fs/crypto/ |
H A D | keysetup.c | 103 struct crypto_skcipher *tfm; in fscrypt_allocate_skcipher() local 107 if (IS_ERR(tfm)) { in fscrypt_allocate_skcipher() 108 if (PTR_ERR(tfm) == -ENOENT) { in fscrypt_allocate_skcipher() 116 return tfm; in fscrypt_allocate_skcipher() 137 return tfm; in fscrypt_allocate_skcipher() 140 crypto_free_skcipher(tfm); in fscrypt_allocate_skcipher() 153 struct crypto_skcipher *tfm; in fscrypt_prepare_key() local 159 if (IS_ERR(tfm)) in fscrypt_prepare_key() 160 return PTR_ERR(tfm); in fscrypt_prepare_key() 167 smp_store_release(&prep_key->tfm, tfm); in fscrypt_prepare_key() [all …]
|
/openbmc/linux/drivers/crypto/virtio/ |
H A D | virtio_crypto_akcipher_algs.c | 29 struct crypto_akcipher *tfm; member 372 struct virtio_crypto_akcipher_ctx *ctx = akcipher_tfm_ctx(tfm); in virtio_crypto_rsa_set_key() 433 return virtio_crypto_rsa_set_key(tfm, key, keylen, 1, in virtio_crypto_rsa_raw_set_priv_key() 443 return virtio_crypto_rsa_set_key(tfm, key, keylen, 1, in virtio_crypto_p1pad_rsa_sha1_set_priv_key() 452 return virtio_crypto_rsa_set_key(tfm, key, keylen, 0, in virtio_crypto_rsa_raw_set_pub_key() 461 return virtio_crypto_rsa_set_key(tfm, key, keylen, 0, in virtio_crypto_p1pad_rsa_sha1_set_pub_key() 468 struct virtio_crypto_akcipher_ctx *ctx = akcipher_tfm_ctx(tfm); in virtio_crypto_rsa_max_size() 476 struct virtio_crypto_akcipher_ctx *ctx = akcipher_tfm_ctx(tfm); in virtio_crypto_rsa_init_tfm() 478 ctx->tfm = tfm; in virtio_crypto_rsa_init_tfm() 480 akcipher_set_reqsize(tfm, in virtio_crypto_rsa_init_tfm() [all …]
|