/linux-4.1.27/include/crypto/ |
H A D | sha256_base.h | 118 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); sha256_base_finish() local 123 for (i = 0; digest_size > 0; i++, digest_size -= sizeof(__be32)) sha256_base_finish()
|
H A D | sha512_base.h | 121 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); sha512_base_finish() local 126 for (i = 0; digest_size > 0; i++, digest_size -= sizeof(__be64)) sha512_base_finish()
|
H A D | public_key.h | 82 u8 digest_size; /* Number of bytes in digest */ member in struct:public_key_signature
|
/linux-4.1.27/drivers/crypto/ccp/ |
H A D | ccp-crypto-sha.c | 31 unsigned int digest_size = crypto_ahash_digestsize(tfm); ccp_sha_complete() local 49 memcpy(req->result, rctx->ctx, digest_size); ccp_sha_complete() 246 unsigned int digest_size = crypto_shash_digestsize(shash); ccp_sha_setkey() local 270 key_len = digest_size; ccp_sha_setkey() 337 u32 digest_size; member in struct:ccp_sha_def 346 .digest_size = SHA1_DIGEST_SIZE, 353 .digest_size = SHA224_DIGEST_SIZE, 360 .digest_size = SHA256_DIGEST_SIZE, 437 halg->digestsize = def->digest_size; ccp_register_sha_alg()
|
H A D | ccp-crypto-aes-cmac.c | 32 unsigned int digest_size = crypto_ahash_digestsize(tfm); ccp_aes_cmac_complete() local 50 memcpy(req->result, rctx->iv, digest_size); ccp_aes_cmac_complete()
|
H A D | ccp-ops.c | 1500 u64 block_size, digest_size; ccp_run_sha_cmd() local 1506 digest_size = SHA1_DIGEST_SIZE; ccp_run_sha_cmd() 1510 digest_size = SHA224_DIGEST_SIZE; ccp_run_sha_cmd() 1514 digest_size = SHA256_DIGEST_SIZE; ccp_run_sha_cmd() 1526 hmac_buf = kmalloc(block_size + digest_size, GFP_KERNEL); ccp_run_sha_cmd() 1531 sg_init_one(&sg, hmac_buf, block_size + digest_size); ccp_run_sha_cmd() 1534 memcpy(hmac_buf + block_size, ctx.address, digest_size); ccp_run_sha_cmd() 1542 hmac_cmd.u.sha.src_len = block_size + digest_size; ccp_run_sha_cmd() 1547 hmac_cmd.u.sha.msg_bits = (block_size + digest_size) << 3; ccp_run_sha_cmd()
|
/linux-4.1.27/drivers/md/ |
H A D | dm-verity.c | 73 unsigned digest_size; /* digest size for the current hash algorithm */ member in struct:dm_verity 105 * u8 real_digest[v->digest_size]; 106 * u8 want_digest[v->digest_size]; 131 return (u8 *)(io + 1) + v->shash_descsize + v->digest_size; io_want_digest() 193 *offset = idx * v->digest_size; verity_hash_at_level() 325 if (unlikely(memcmp(result, io_want_digest(v, io), v->digest_size))) { verity_verify_level() 337 memcpy(io_want_digest(v, io), data, v->digest_size); verity_verify_level() 380 memcpy(io_want_digest(v, io), v->root_digest, v->digest_size); verity_verify_io() 441 if (unlikely(memcmp(result, io_want_digest(v, io), v->digest_size))) { verity_verify_io() 612 for (x = 0; x < v->digest_size; x++) verity_status() 845 v->digest_size = crypto_shash_digestsize(v->tfm); verity_ctr() 846 if ((1 << v->hash_dev_block_bits) < v->digest_size * 2) { verity_ctr() 854 v->root_digest = kmalloc(v->digest_size, GFP_KERNEL); verity_ctr() 860 if (strlen(argv[8]) != v->digest_size * 2 || verity_ctr() 861 hex2bin(v->root_digest, argv[8], v->digest_size)) { verity_ctr() 917 __fls((1 << v->hash_dev_block_bits) / v->digest_size); verity_ctr() 963 ti->per_bio_data_size = roundup(sizeof(struct dm_verity_io) + v->shash_descsize + v->digest_size * 2, __alignof__(struct dm_verity_io)); verity_ctr()
|
/linux-4.1.27/crypto/asymmetric_keys/ |
H A D | x509_public_key.c | 132 size_t digest_size, desc_size; x509_get_sig_params() local 161 digest_size = crypto_shash_digestsize(tfm); x509_get_sig_params() 167 digest = kzalloc(digest_size + desc_size, GFP_KERNEL); x509_get_sig_params() 172 cert->sig.digest_size = digest_size; x509_get_sig_params() 174 desc = digest + digest_size; x509_get_sig_params()
|
H A D | pkcs7_verify.c | 30 size_t digest_size, desc_size; pkcs7_digest() local 49 sinfo->sig.digest_size = digest_size = crypto_shash_digestsize(tfm); pkcs7_digest() 52 digest = kzalloc(digest_size + desc_size, GFP_KERNEL); pkcs7_digest() 56 desc = digest + digest_size; pkcs7_digest() 76 if (sinfo->msgdigest_len != sinfo->sig.digest_size) { pkcs7_digest() 95 memset(digest, 0, sinfo->sig.digest_size); pkcs7_digest()
|
H A D | verify_pefile.c | 327 size_t digest_size, desc_size; pefile_digest_pe() local 341 digest_size = crypto_shash_digestsize(tfm); pefile_digest_pe() 343 if (digest_size != ctx->digest_len) { pefile_digest_pe() 345 digest_size, ctx->digest_len); pefile_digest_pe() 349 pr_debug("Digest: desc=%zu size=%zu\n", desc_size, digest_size); pefile_digest_pe() 352 desc = kzalloc(desc_size + digest_size, GFP_KERNEL); pefile_digest_pe()
|
H A D | rsa.c | 260 ret = RSA_verify(H, EM - 1, k, sig->digest_size, RSA_verify_signature()
|
/linux-4.1.27/kernel/ |
H A D | module_signing.c | 50 size_t digest_size, desc_size; mod_make_digest() local 63 digest_size = crypto_shash_digestsize(tfm); mod_make_digest() 69 pks = kzalloc(digest_size + sizeof(*pks) + desc_size, GFP_KERNEL); mod_make_digest() 75 pks->digest_size = digest_size; mod_make_digest()
|
/linux-4.1.27/security/integrity/ |
H A D | digsig_asymmetric.c | 94 pks.digest_size = datalen; asymmetric_verify()
|
/linux-4.1.27/drivers/block/drbd/ |
H A D | drbd_worker.c | 347 int digest_size; w_e_send_csum() local 357 digest_size = crypto_hash_digestsize(peer_device->connection->csums_tfm); w_e_send_csum() 358 digest = kmalloc(digest_size, GFP_NOIO); w_e_send_csum() 372 digest, digest_size, w_e_send_csum() 1111 int digest_size; w_e_end_csum_rs_req() local 1133 digest_size = crypto_hash_digestsize(peer_device->connection->csums_tfm); w_e_end_csum_rs_req() 1134 D_ASSERT(device, digest_size == di->digest_size); w_e_end_csum_rs_req() 1135 digest = kmalloc(digest_size, GFP_NOIO); w_e_end_csum_rs_req() 1139 eq = !memcmp(digest, di->digest, digest_size); w_e_end_csum_rs_req() 1176 int digest_size; w_e_end_ov_req() local 1183 digest_size = crypto_hash_digestsize(peer_device->connection->verify_tfm); w_e_end_ov_req() 1184 digest = kmalloc(digest_size, GFP_NOIO); w_e_end_ov_req() 1193 memset(digest, 0, digest_size); w_e_end_ov_req() 1203 err = drbd_send_drequest_csum(peer_device, sector, size, digest, digest_size, P_OV_REPLY); w_e_end_ov_req() 1235 int digest_size; w_e_end_ov_reply() local 1255 digest_size = crypto_hash_digestsize(peer_device->connection->verify_tfm); w_e_end_ov_reply() 1256 digest = kmalloc(digest_size, GFP_NOIO); w_e_end_ov_reply() 1260 D_ASSERT(device, digest_size == di->digest_size); w_e_end_ov_reply() 1261 eq = !memcmp(digest, di->digest, digest_size); w_e_end_ov_reply()
|
H A D | drbd_main.c | 1396 void *digest, int digest_size, enum drbd_packet cmd) drbd_send_drequest_csum() 1410 return drbd_send_command(peer_device, sock, cmd, sizeof(*p), digest, digest_size); drbd_send_drequest_csum() 1625 int digest_size; drbd_send_dblock() local 1630 digest_size = peer_device->connection->integrity_tfm ? drbd_send_dblock() 1662 if (digest_size) drbd_send_dblock() 1664 err = __send_command(peer_device->connection, device->vnr, sock, P_DATA, sizeof(*p) + digest_size, NULL, req->i.size); drbd_send_dblock() 1677 if (!(req->rq_state & (RQ_EXP_RECEIVE_ACK | RQ_EXP_WRITE_ACK)) || digest_size) drbd_send_dblock() 1683 if (digest_size > 0 && digest_size <= 64) { drbd_send_dblock() 1688 if (memcmp(p + 1, digest, digest_size)) { drbd_send_dblock() 1693 } /* else if (digest_size > 64) { drbd_send_dblock() 1714 int digest_size; drbd_send_block() local 1719 digest_size = peer_device->connection->integrity_tfm ? drbd_send_block() 1728 if (digest_size) drbd_send_block() 1730 err = __send_command(peer_device->connection, device->vnr, sock, cmd, sizeof(*p) + digest_size, NULL, peer_req->i.size); drbd_send_block() 1395 drbd_send_drequest_csum(struct drbd_peer_device *peer_device, sector_t sector, int size, void *digest, int digest_size, enum drbd_packet cmd) drbd_send_drequest_csum() argument
|
H A D | drbd_receiver.c | 1594 int digest_size, err; __must_hold() local 1601 digest_size = 0; __must_hold() 1603 digest_size = crypto_hash_digestsize(peer_device->connection->peer_integrity_tfm); __must_hold() 1608 err = drbd_recv_all_warn(peer_device->connection, dig_in, digest_size); __must_hold() 1611 data_size -= digest_size; __must_hold() 1664 if (digest_size) { 1666 if (memcmp(dig_in, dig_vv, digest_size)) { 1711 int digest_size, err, expect; recv_dless_read() local 1715 digest_size = 0; recv_dless_read() 1717 digest_size = crypto_hash_digestsize(peer_device->connection->peer_integrity_tfm); recv_dless_read() 1718 err = drbd_recv_all_warn(peer_device->connection, dig_in, digest_size); recv_dless_read() 1721 data_size -= digest_size; recv_dless_read() 1741 if (digest_size) { 1743 if (memcmp(dig_in, dig_vv, digest_size)) { 2603 di->digest_size = pi->size; receive_DataRequest()
|
H A D | drbd_int.h | 410 int digest_size; member in struct:digest_info 1108 int size, void *digest, int digest_size,
|
/linux-4.1.27/drivers/crypto/ |
H A D | n2_core.c | 247 u8 digest_size; member in struct:n2_ahash_alg 507 unsigned int auth_type, unsigned int digest_size, n2_do_async_digest() 551 auth_type, digest_size, n2_do_async_digest() 601 ds = n2alg->digest_size; n2_hash_async_digest() 621 ds = n2alg->derived.digest_size; n2_hmac_async_digest() 1273 u8 digest_size; member in struct:n2_hash_tmpl 1325 .digest_size = MD5_DIGEST_SIZE, 1333 .digest_size = SHA1_DIGEST_SIZE, 1341 .digest_size = SHA256_DIGEST_SIZE, 1349 .digest_size = SHA224_DIGEST_SIZE, 1478 p->digest_size = tmpl->digest_size; __n2_register_one_ahash() 1488 halg->digestsize = tmpl->digest_size; __n2_register_one_ahash() 506 n2_do_async_digest(struct ahash_request *req, unsigned int auth_type, unsigned int digest_size, unsigned int result_size, void *hash_loc, unsigned long auth_key, unsigned int auth_key_len) n2_do_async_digest() argument
|
H A D | sahara.c | 169 * @digest_size: length of digest for this request 171 * Always digest_size + 4 188 unsigned int digest_size; member in struct:sahara_sha_reqctx 1094 memcpy(req->result, rctx->context, rctx->digest_size); sahara_sha_process() 1179 rctx->digest_size = SHA1_DIGEST_SIZE; sahara_sha_init() 1183 rctx->digest_size = SHA256_DIGEST_SIZE; sahara_sha_init() 1189 rctx->context_size = rctx->digest_size + 4; sahara_sha_init()
|
H A D | omap-sham.c | 189 int digest_size; member in struct:omap_sham_pdata 286 for (i = 0; i < dd->pdata->digest_size / sizeof(u32); i++) { omap_sham_copy_hash_omap2() 306 for (i = 0; i < dd->pdata->digest_size / sizeof(u32); i++) { omap_sham_copy_hash_omap4() 1695 .digest_size = SHA1_DIGEST_SIZE, 1729 .digest_size = SHA256_DIGEST_SIZE, 1769 .digest_size = SHA512_DIGEST_SIZE,
|
/linux-4.1.27/drivers/crypto/qat/qat_common/ |
H A D | qat_algs.c | 163 int digest_size = crypto_shash_digestsize(ctx->hash_tfm); qat_alg_do_precomputes() local 181 memcpy(opad, ipad, digest_size); qat_alg_do_precomputes() 207 for (i = 0; i < digest_size >> 2; i++, hash_state_out++) qat_alg_do_precomputes() 213 for (i = 0; i < digest_size >> 2; i++, hash_state_out++) qat_alg_do_precomputes() 219 for (i = 0; i < digest_size >> 3; i++, hash512_state_out++) qat_alg_do_precomputes() 240 for (i = 0; i < digest_size >> 2; i++, hash_state_out++) qat_alg_do_precomputes() 246 for (i = 0; i < digest_size >> 2; i++, hash_state_out++) qat_alg_do_precomputes() 252 for (i = 0; i < digest_size >> 3; i++, hash512_state_out++) qat_alg_do_precomputes()
|
/linux-4.1.27/drivers/char/tpm/ |
H A D | tpm2-cmd.c | 42 __be16 digest_size; member in struct:tpm2_pcr_read_out
|
/linux-4.1.27/include/linux/mfd/ |
H A D | cros_ec_commands.h | 1146 uint8_t digest_size; /* Size of hash digest in bytes */ member in struct:ec_response_vboot_hash
|