| /dpdk/drivers/crypto/openssl/ |
| H A D | compat.h | 74 set_dsa_sign(DSA_SIG *sign, BIGNUM *r, BIGNUM *s) in set_dsa_sign() argument 76 sign->r = r; in set_dsa_sign() 77 sign->s = s; in set_dsa_sign() 81 get_dsa_sign(DSA_SIG *sign, const BIGNUM **r, const BIGNUM **s) in get_dsa_sign() argument 83 *r = sign->r; in get_dsa_sign() 84 *s = sign->s; in get_dsa_sign() 166 set_dsa_sign(DSA_SIG *sign, BIGNUM *r, BIGNUM *s) in set_dsa_sign() argument 168 DSA_SIG_set0(sign, r, s); in set_dsa_sign() 172 get_dsa_sign(DSA_SIG *sign, const BIGNUM **r, const BIGNUM **s) in get_dsa_sign() argument 174 DSA_SIG_get0(sign, r, s); in get_dsa_sign()
|
| H A D | rte_openssl_pmd.c | 1613 DSA_SIG *sign = NULL; in process_openssl_dsa_sign_op() local 1619 if (sign == NULL) { in process_openssl_dsa_sign_op() 1624 get_dsa_sign(sign, &r, &s); in process_openssl_dsa_sign_op() 1631 DSA_SIG_free(sign); in process_openssl_dsa_sign_op() 1648 if (sign == NULL) { in process_openssl_dsa_verify_op() 1671 set_dsa_sign(sign, r, s); in process_openssl_dsa_verify_op() 1676 sign, in process_openssl_dsa_verify_op() 1684 DSA_SIG_free(sign); in process_openssl_dsa_verify_op() 1946 op->rsa.sign.data, in process_openssl_rsa_op() 1950 op->rsa.sign.length = ret; in process_openssl_rsa_op() [all …]
|
| /dpdk/drivers/crypto/cnxk/ |
| H A D | cnxk_ae.h | 381 cnxk_ae_rsa_prep(op, meta_buf, &sess->rsa_ctx, &rsa->sign, in cnxk_ae_enqueue_rsa_op() 692 rsa->sign.length = rsa_ctx->n.length; in cnxk_ae_dequeue_rsa_op() 693 memcpy(rsa->sign.data, rptr, rsa->sign.length); in cnxk_ae_dequeue_rsa_op() 697 rsa->sign.length = rsa_ctx->n.length; in cnxk_ae_dequeue_rsa_op() 698 memcpy(rsa->sign.data, rptr, rsa->sign.length); in cnxk_ae_dequeue_rsa_op() 701 rsa->sign.length = in cnxk_ae_dequeue_rsa_op() 707 memcpy(rsa->sign.data, rptr + 2, rsa->sign.length); in cnxk_ae_dequeue_rsa_op() 709 if (memcmp(rsa->sign.data, rsa->message.data, in cnxk_ae_dequeue_rsa_op()
|
| /dpdk/drivers/crypto/octeontx/ |
| H A D | otx_cryptodev_ops.c | 770 rsa->sign.length = rsa_ctx->n.length; in otx_cpt_asym_rsa_op() 771 memcpy(rsa->sign.data, req->rptr, rsa->sign.length); in otx_cpt_asym_rsa_op() 775 rsa->sign.length = rsa_ctx->n.length; in otx_cpt_asym_rsa_op() 778 rsa->sign.length = rte_cpu_to_be_16 in otx_cpt_asym_rsa_op() 784 memcpy(rsa->sign.data, req->rptr, rsa->sign.length); in otx_cpt_asym_rsa_op() 786 if (memcmp(rsa->sign.data, rsa->message.data, in otx_cpt_asym_rsa_op()
|
| /dpdk/drivers/net/i40e/base/ |
| H A D | meson.build | 14 error_cflags = ['-Wno-sign-compare', '-Wno-unused-value',
|
| /dpdk/app/test/ |
| H A D | test_cryptodev_asym.c | 95 asym_op->rsa.sign.length = 0; in queue_ops_rsa_sign_verify() 96 asym_op->rsa.sign.data = output_buf; in queue_ops_rsa_sign_verify() 123 debug_hexdump(stdout, "signed message", asym_op->rsa.sign.data, in queue_ops_rsa_sign_verify() 124 asym_op->rsa.sign.length); in queue_ops_rsa_sign_verify() 281 data_expected = data_tc->rsa_data.sign.data; in test_cryptodev_asym_ver() 282 data_received = result_op->asym->rsa.sign.data; in test_cryptodev_asym_ver() 430 asym_op->rsa.sign.data = result; in test_cryptodev_asym_op() 431 asym_op->rsa.sign.length = data_tc->rsa_data.n.len; in test_cryptodev_asym_op() 437 asym_op->rsa.sign.data = data_tc->rsa_data.sign.data; in test_cryptodev_asym_op() 438 asym_op->rsa.sign.length = data_tc->rsa_data.sign.len; in test_cryptodev_asym_op()
|
| H A D | test_cryptodev_rsa_test_vectors.h | 29 } sign; member
|
| /dpdk/drivers/net/qede/base/ |
| H A D | meson.build | 24 '-Wno-sign-compare',
|
| /dpdk/drivers/common/sfc_efx/base/ |
| H A D | meson.build | 69 '-Wno-sign-compare',
|
| /dpdk/lib/cryptodev/ |
| H A D | rte_crypto_asym.h | 354 rte_crypto_param sign; member
|
| /dpdk/drivers/common/cnxk/ |
| H A D | roc_npa.h | 99 roc_npa_aura_op_cnt_set(uint64_t aura_handle, const int sign, uint64_t count) in roc_npa_aura_op_cnt_set() argument 103 if (sign) in roc_npa_aura_op_cnt_set()
|
| /dpdk/doc/guides/tools/ |
| H A D | cryptoperf.rst | 352 Each line beginning with sign '#' contain comment and it is ignored by parser:: 360 Data line contain information token then sign '=' and
|
| /dpdk/drivers/crypto/qat/ |
| H A D | qat_asym.c | 363 SET_PKE_LN(cookie->input_array, asym_op->rsa.sign, in rsa_set_pub_input() 564 uint8_t *rsa_result = asym_op->rsa.sign.data; in rsa_collect()
|
| /dpdk/doc/guides/rel_notes/ |
| H A D | release_18_08.rst | 177 The libraries prepended with a plus sign were incremented in this version.
|
| H A D | release_16_11.rst | 215 The libraries prepended with a plus sign were incremented in this version.
|
| H A D | release_17_08.rst | 294 The libraries prepended with a plus sign were incremented in this version.
|
| H A D | release_16_07.rst | 308 The libraries prepended with a plus sign were incremented in this version.
|
| H A D | release_19_02.rst | 213 The libraries prepended with a plus sign were incremented in this version.
|
| H A D | release_18_02.rst | 226 The libraries prepended with a plus sign were incremented in this version.
|
| H A D | release_19_05.rst | 260 The libraries prepended with a plus sign were incremented in this version.
|
| H A D | release_17_02.rst | 271 The libraries prepended with a plus sign were incremented in this version.
|
| H A D | release_19_08.rst | 288 The libraries prepended with a plus sign were incremented in this version.
|
| H A D | release_2_2.rst | 594 The libraries prepended with a plus sign were incremented in this version.
|
| /dpdk/doc/guides/contributing/ |
| H A D | vulnerability.rst | 45 It is additionally encouraged to GPG-sign one-on-one conversations
|
| /dpdk/drivers/common/cpt/ |
| H A D | cpt_ucode_asym.h | 466 cpt_rsa_prep(params, &sess->rsa_ctx, &rsa->sign); in cpt_enqueue_rsa_op()
|