Home
last modified time | relevance | path

Searched full:rsa (Results 1 – 25 of 110) sorted by relevance

12345

/linux-6.14.4/drivers/crypto/ccp/
Dccp-crypto-rsa.c3 * AMD Cryptographic Coprocessor (CCP) RSA crypto API support
15 #include <crypto/internal/rsa.h>
52 req->dst_len = rctx->cmd.u.rsa.key_size >> 3; in ccp_rsa_complete()
61 return ctx->u.rsa.n_len; in ccp_rsa_maxsize()
75 rctx->cmd.u.rsa.key_size = ctx->u.rsa.key_len; /* in bits */ in ccp_rsa_crypt()
77 rctx->cmd.u.rsa.exp = &ctx->u.rsa.e_sg; in ccp_rsa_crypt()
78 rctx->cmd.u.rsa.exp_len = ctx->u.rsa.e_len; in ccp_rsa_crypt()
80 rctx->cmd.u.rsa.exp = &ctx->u.rsa.d_sg; in ccp_rsa_crypt()
81 rctx->cmd.u.rsa.exp_len = ctx->u.rsa.d_len; in ccp_rsa_crypt()
83 rctx->cmd.u.rsa.mod = &ctx->u.rsa.n_sg; in ccp_rsa_crypt()
[all …]
Dccp-crypto.h26 #include <crypto/internal/rsa.h>
239 /***** RSA related defines *****/
267 struct ccp_rsa_ctx rsa; member
Dccp-ops.c1837 struct ccp_rsa_engine *rsa = &cmd->u.rsa; in ccp_run_rsa_cmd() local
1844 if (rsa->key_size > cmd_q->ccp->vdata->rsamax) in ccp_run_rsa_cmd()
1847 if (!rsa->exp || !rsa->mod || !rsa->src || !rsa->dst) in ccp_run_rsa_cmd()
1854 /* The RSA modulus must precede the message being acted upon, so in ccp_run_rsa_cmd()
1862 o_len = 32 * ((rsa->key_size + 255) / 256); in ccp_run_rsa_cmd()
1883 /* The RSA exponent must be in little endian format. Reverse its in ccp_run_rsa_cmd()
1890 ret = ccp_reverse_set_dm_area(&exp, 0, rsa->exp, 0, rsa->exp_len); in ccp_run_rsa_cmd()
1919 ret = ccp_reverse_set_dm_area(&src, 0, rsa->mod, 0, rsa->mod_len); in ccp_run_rsa_cmd()
1922 ret = ccp_reverse_set_dm_area(&src, o_len, rsa->src, 0, rsa->src_len); in ccp_run_rsa_cmd()
1939 op.u.rsa.mod_size = rsa->key_size; in ccp_run_rsa_cmd()
[all …]
/linux-6.14.4/drivers/crypto/caam/
Dcaampkc.h17 * caam_priv_key_form - CAAM RSA private key representation
18 * CAAM RSA private key may have either of three forms.
22 * n the RSA modulus
23 * d the RSA private exponent
27 * p the first prime factor of the RSA modulus n
28 * q the second prime factor of the RSA modulus n
29 * d the RSA private exponent
33 * p the first prime factor of the RSA modulus n
34 * q the second prime factor of the RSA modulus n
49 * caam_rsa_key - CAAM RSA key structure. Keys are allocated in DMA zone.
[all …]
Dpdb.h481 /* RSA Protocol Data Block */
500 * RSA Encrypt Protocol Data Block
504 * @n_dma: dma address of RSA modulus
505 * @e_dma: dma address of RSA public exponent
520 * RSA Decrypt PDB - Private Key Form #1
524 * @n_dma: dma address of RSA modulus
525 * @d_dma: dma address of RSA private exponent
538 * RSA Decrypt PDB - Private Key Form #2
542 * @d_dma : dma address of RSA private exponent
543 * @p_dma : dma address of RSA prime factor p of RSA modulus n
[all …]
Dcaampkc.c122 /* RSA Job Completion handler */
417 dev_err(dev, "Unable to map RSA modulus memory\n"); in set_rsa_pub_pdb()
423 dev_err(dev, "Unable to map RSA public exponent memory\n"); in set_rsa_pub_pdb()
468 dev_err(dev, "Unable to map RSA private exponent memory\n"); in set_rsa_priv_f1_pdb()
511 dev_err(dev, "Unable to map RSA private exponent memory\n"); in set_rsa_priv_f2_pdb()
517 dev_err(dev, "Unable to map RSA prime factor p memory\n"); in set_rsa_priv_f2_pdb()
523 dev_err(dev, "Unable to map RSA prime factor q memory\n"); in set_rsa_priv_f2_pdb()
529 dev_err(dev, "Unable to map RSA tmp1 memory\n"); in set_rsa_priv_f2_pdb()
535 dev_err(dev, "Unable to map RSA tmp2 memory\n"); in set_rsa_priv_f2_pdb()
588 dev_err(dev, "Unable to map RSA prime factor p memory\n"); in set_rsa_priv_f3_pdb()
[all …]
Dpkc_desc.c13 /* Descriptor for RSA Public operation */
26 /* Descriptor for RSA Private operation - Private Key Form #1 */
39 /* Descriptor for RSA Private operation - Private Key Form #2 */
56 /* Descriptor for RSA Private operation - Private Key Form #3 */
/linux-6.14.4/include/crypto/internal/
Drsa.h3 * RSA internal helpers
14 * rsa_key - RSA key structure
15 * @n : RSA modulus raw byte stream
16 * @e : RSA public exponent raw byte stream
17 * @d : RSA private exponent raw byte stream
18 * @p : RSA prime factor p of n raw byte stream
19 * @q : RSA prime factor q of n raw byte stream
20 * @dp : RSA exponent d mod (p - 1) raw byte stream
21 * @dq : RSA exponent d mod (q - 1) raw byte stream
22 * @qinv : RSA CRT coefficient q^(-1) mod p raw byte stream
[all …]
/linux-6.14.4/drivers/crypto/intel/qat/qat_common/
Dqat_asym_algs.c4 #include <crypto/internal/rsa.h>
119 struct qat_rsa_input_params rsa; member
123 struct qat_rsa_output_params rsa; member
132 struct qat_rsa_ctx *rsa; member
136 struct akcipher_request *rsa; member
569 struct akcipher_request *areq = req->areq.rsa; in qat_rsa_cb()
570 struct device *dev = &GET_DEV(req->ctx.rsa->inst->accel_dev); in qat_rsa_cb()
576 dma_unmap_single(dev, req->in.rsa.enc.m, req->ctx.rsa->key_sz, in qat_rsa_cb()
581 areq->dst_len = req->ctx.rsa->key_sz; in qat_rsa_cb()
582 dma_unmap_single(dev, req->out.rsa.enc.c, req->ctx.rsa->key_sz, in qat_rsa_cb()
[all …]
/linux-6.14.4/drivers/net/ethernet/intel/ixgbe/
Dixgbe_ipsec.c396 struct rx_sa *rsa; in ixgbe_ipsec_find_rx_state() local
400 hash_for_each_possible_rcu(ipsec->rx_sa_list, rsa, hlist, in ixgbe_ipsec_find_rx_state()
402 if (rsa->mode & IXGBE_RXTXMOD_VF) in ixgbe_ipsec_find_rx_state()
404 if (spi == rsa->xs->id.spi && in ixgbe_ipsec_find_rx_state()
405 ((ip4 && *daddr == rsa->xs->id.daddr.a4) || in ixgbe_ipsec_find_rx_state()
406 (!ip4 && !memcmp(daddr, &rsa->xs->id.daddr.a6, in ixgbe_ipsec_find_rx_state()
407 sizeof(rsa->xs->id.daddr.a6)))) && in ixgbe_ipsec_find_rx_state()
408 proto == rsa->xs->id.proto) { in ixgbe_ipsec_find_rx_state()
409 ret = rsa->xs; in ixgbe_ipsec_find_rx_state()
595 struct rx_sa rsa; in ixgbe_ipsec_add_sa() local
[all …]
/linux-6.14.4/drivers/net/ethernet/intel/ixgbevf/
Dipsec.c183 struct rx_sa *rsa; in ixgbevf_ipsec_find_rx_state() local
186 hash_for_each_possible_rcu(ipsec->rx_sa_list, rsa, hlist, in ixgbevf_ipsec_find_rx_state()
188 if (spi == rsa->xs->id.spi && in ixgbevf_ipsec_find_rx_state()
189 ((ip4 && *daddr == rsa->xs->id.daddr.a4) || in ixgbevf_ipsec_find_rx_state()
190 (!ip4 && !memcmp(daddr, &rsa->xs->id.daddr.a6, in ixgbevf_ipsec_find_rx_state()
191 sizeof(rsa->xs->id.daddr.a6)))) && in ixgbevf_ipsec_find_rx_state()
192 proto == rsa->xs->id.proto) { in ixgbevf_ipsec_find_rx_state()
193 ret = rsa->xs; in ixgbevf_ipsec_find_rx_state()
290 struct rx_sa rsa; in ixgbevf_ipsec_add_sa() local
305 memset(&rsa, 0, sizeof(rsa)); in ixgbevf_ipsec_add_sa()
[all …]
/linux-6.14.4/drivers/crypto/hisilicon/hpre/
Dhpre_crypto.c11 #include <crypto/internal/rsa.h>
127 struct hpre_rsa_ctx rsa; member
142 struct akcipher_request *rsa; member
470 areq = req->areq.rsa; in hpre_rsa_cb()
535 h_req->areq.rsa = akreq; in hpre_msg_request_set()
810 akcipher_request_set_tfm(req, ctx->rsa.soft_tfm); in hpre_rsa_enc()
816 if (unlikely(!ctx->rsa.pubkey)) in hpre_rsa_enc()
824 msg->key = cpu_to_le64(ctx->rsa.dma_pubkey); in hpre_rsa_enc()
858 akcipher_request_set_tfm(req, ctx->rsa.soft_tfm); in hpre_rsa_dec()
864 if (unlikely(!ctx->rsa.prikey)) in hpre_rsa_dec()
[all …]
/linux-6.14.4/Documentation/devicetree/bindings/crypto/
Daspeed,ast2600-acry.yaml7 title: ASPEED ACRY ECDSA/RSA Hardware Accelerator Engines
13 The ACRY ECDSA/RSA engines is designed to accelerate the throughput
14 of ECDSA/RSA signature and verification. Basically, ACRY can be
15 divided into two independent engines - ECC Engine and RSA Engine.
/linux-6.14.4/crypto/
Drsa.c2 /* RSA asymmetric public-key algorithm [RFC3447]
11 #include <crypto/internal/rsa.h>
385 static struct akcipher_alg rsa = { variable
393 .cra_name = "rsa",
394 .cra_driver_name = "rsa-generic",
405 err = crypto_register_akcipher(&rsa); in rsa_init()
422 crypto_unregister_akcipher(&rsa); in rsa_init()
430 crypto_unregister_akcipher(&rsa); in rsa_exit()
435 MODULE_ALIAS_CRYPTO("rsa");
437 MODULE_DESCRIPTION("RSA generic algorithm");
Drsassa-pkcs1.c3 * RSA Signature Scheme with Appendix - PKCS #1 v1.5 (RFC 8017 sec 8.2)
17 #include <crypto/internal/rsa.h>
23 * RSA keys are usually much larger than the hash of the message to be signed.
197 /* RFC 8017 sec 8.2.1 step 2 - RSA signature */ in rsassa_pkcs1_sign()
239 /* RFC 8017 sec 8.2.2 step 2 - RSA verification */ in rsassa_pkcs1_verify()
381 if (strcmp(rsa_alg->base.cra_name, "rsa") != 0) { in rsassa_pkcs1_create()
Drsa_helper.c3 * RSA key extract helper
12 #include <crypto/internal/rsa.h>
35 pr_err("RSA: key size not allowed in FIPS mode\n"); in rsa_get_n()
/linux-6.14.4/drivers/crypto/aspeed/
DKconfig49 bool "Enable Aspeed ACRY RSA Engine"
54 Select here to enable Aspeed ECC/RSA Engine (ACRY)
55 RSA driver.
56 Supports 256 bits to 4096 bits RSA encryption/decryption
Daspeed-acry.c7 #include <crypto/internal/rsa.h>
40 #define ASPEED_ACRY_RSA_KEY_LEN 0x058 /* ACRY RSA Exp/Mod Key Length (Bits) */
44 /* rsa trigger */
48 /* rsa dma cmd */
53 /* rsa key len */
62 #define ASPEED_ACRY_RSA_MAX_KEY_LEN 512 /* ACRY RSA maximum key length (Bytes) */
339 dev_err(acry_dev->dev, "RSA engine error!\n"); in aspeed_acry_rsa_transfer()
406 /* Trigger RSA engines */ in aspeed_acry_rsa_trigger()
498 dev_err(acry_dev->dev, "rsa parse key failed, ret:0x%x\n", in aspeed_acry_rsa_setkey()
526 dev_err(acry_dev->dev, "rsa set key failed\n"); in aspeed_acry_rsa_setkey()
[all …]
/linux-6.14.4/drivers/gpu/drm/i915/gt/uc/
Dintel_guc_fw.c54 u32 rsa[UOS_RSA_SCRATCH_COUNT]; in guc_xfer_rsa_mmio() local
58 copied = intel_uc_fw_copy_rsa(guc_fw, rsa, sizeof(rsa)); in guc_xfer_rsa_mmio()
59 if (copied < sizeof(rsa)) in guc_xfer_rsa_mmio()
63 intel_uncore_write(uncore, UOS_RSA_SCRATCH(i), rsa[i]); in guc_xfer_rsa_mmio()
79 /* Copy RSA signature from the fw image to HW for verification */
296 * by the DMA engine in one operation, whereas the RSA signature is in intel_guc_fw_upload()
299 * size > 256). The RSA size and therefore the way we provide it to the in intel_guc_fw_upload()
Dintel_uc_fw_abi.h20 * | CSS header | uCode | RSA key | modulus | exponent |
29 * uCode and RSA signature are must-have components that will be used by driver.
36 * 1. Header, uCode and RSA are must-have components.
52 * header_size includes all non-uCode bits, including css_header, rsa
/linux-6.14.4/drivers/crypto/virtio/
Dvirtio_crypto_akcipher_algs.c12 #include <crypto/internal/rsa.h>
393 /* set RSA para */ in virtio_crypto_rsa_set_key()
397 para.u.rsa.padding_algo = cpu_to_le32(padding_algo); in virtio_crypto_rsa_set_key()
398 para.u.rsa.hash_algo = cpu_to_le32(hash_algo); in virtio_crypto_rsa_set_key()
484 .cra_name = "rsa",
485 .cra_driver_name = "virtio-crypto-rsa",
512 .cra_name = "pkcs1pad(rsa)",
513 .cra_driver_name = "virtio-pkcs1-rsa",
/linux-6.14.4/tools/testing/selftests/sgx/
Dsign_key.pem1 -----BEGIN RSA PRIVATE KEY-----
39 -----END RSA PRIVATE KEY-----
/linux-6.14.4/drivers/crypto/hisilicon/
DKconfig75 Support for HiSilicon HPRE(High Performance RSA Engine)
76 accelerator, which can accelerate RSA and DH algorithms.
/linux-6.14.4/include/linux/
Dccp.h357 /***** RSA engine *****/
359 * struct ccp_rsa_engine - CCP RSA operation
360 * @key_size: length in bits of RSA key
361 * @exp: RSA exponent
363 * @mod: RSA modulus
598 * @CCP_ENGINE_RSA: RSA operation
656 struct ccp_rsa_engine rsa; member
/linux-6.14.4/Documentation/admin-guide/
Dmodule-signing.rst31 type. The built-in facility currently only supports the RSA & NIST P-384 ECDSA
149 One can select between RSA (``MODULE_SIG_KEY_TYPE_RSA``) and ECDSA
150 (``MODULE_SIG_KEY_TYPE_ECDSA``) to generate either RSA 4k or NIST
163 The generated RSA key size can also be set with::
193 …asymmetri Fedora kernel signing key: d69a84e6bce3d216b979e9505b3e3ef9a7118079: X509.RSA a7118079 []

12345