/linux-4.1.27/crypto/asymmetric_keys/ |
D | pkcs7_verify.c | 30 size_t digest_size, desc_size; in pkcs7_digest() local 49 sinfo->sig.digest_size = digest_size = crypto_shash_digestsize(tfm); in pkcs7_digest() 52 digest = kzalloc(digest_size + desc_size, GFP_KERNEL); in pkcs7_digest() 56 desc = digest + digest_size; in pkcs7_digest() 76 if (sinfo->msgdigest_len != sinfo->sig.digest_size) { in pkcs7_digest() 95 memset(digest, 0, sinfo->sig.digest_size); in pkcs7_digest()
|
D | x509_public_key.c | 132 size_t digest_size, desc_size; in x509_get_sig_params() local 161 digest_size = crypto_shash_digestsize(tfm); in x509_get_sig_params() 167 digest = kzalloc(digest_size + desc_size, GFP_KERNEL); in x509_get_sig_params() 172 cert->sig.digest_size = digest_size; in x509_get_sig_params() 174 desc = digest + digest_size; in x509_get_sig_params()
|
D | verify_pefile.c | 327 size_t digest_size, desc_size; in pefile_digest_pe() local 341 digest_size = crypto_shash_digestsize(tfm); in pefile_digest_pe() 343 if (digest_size != ctx->digest_len) { in pefile_digest_pe() 345 digest_size, ctx->digest_len); in pefile_digest_pe() 349 pr_debug("Digest: desc=%zu size=%zu\n", desc_size, digest_size); in pefile_digest_pe() 352 desc = kzalloc(desc_size + digest_size, GFP_KERNEL); in pefile_digest_pe()
|
D | rsa.c | 260 ret = RSA_verify(H, EM - 1, k, sig->digest_size, in RSA_verify_signature()
|
/linux-4.1.27/kernel/ |
D | module_signing.c | 50 size_t digest_size, desc_size; in mod_make_digest() local 63 digest_size = crypto_shash_digestsize(tfm); in mod_make_digest() 69 pks = kzalloc(digest_size + sizeof(*pks) + desc_size, GFP_KERNEL); in mod_make_digest() 75 pks->digest_size = digest_size; in mod_make_digest()
|
/linux-4.1.27/drivers/md/ |
D | dm-verity.c | 73 unsigned digest_size; /* digest size for the current hash algorithm */ member 131 return (u8 *)(io + 1) + v->shash_descsize + v->digest_size; in io_want_digest() 193 *offset = idx * v->digest_size; in verity_hash_at_level() 325 if (unlikely(memcmp(result, io_want_digest(v, io), v->digest_size))) { in verity_verify_level() 337 memcpy(io_want_digest(v, io), data, v->digest_size); in verity_verify_level() 380 memcpy(io_want_digest(v, io), v->root_digest, v->digest_size); in verity_verify_io() 441 if (unlikely(memcmp(result, io_want_digest(v, io), v->digest_size))) { in verity_verify_io() 612 for (x = 0; x < v->digest_size; x++) in verity_status() 845 v->digest_size = crypto_shash_digestsize(v->tfm); in verity_ctr() 846 if ((1 << v->hash_dev_block_bits) < v->digest_size * 2) { in verity_ctr() [all …]
|
/linux-4.1.27/drivers/crypto/ccp/ |
D | ccp-crypto-sha.c | 31 unsigned int digest_size = crypto_ahash_digestsize(tfm); in ccp_sha_complete() local 49 memcpy(req->result, rctx->ctx, digest_size); in ccp_sha_complete() 246 unsigned int digest_size = crypto_shash_digestsize(shash); in ccp_sha_setkey() local 270 key_len = digest_size; in ccp_sha_setkey() 337 u32 digest_size; member 346 .digest_size = SHA1_DIGEST_SIZE, 353 .digest_size = SHA224_DIGEST_SIZE, 360 .digest_size = SHA256_DIGEST_SIZE, 437 halg->digestsize = def->digest_size; in ccp_register_sha_alg()
|
D | ccp-ops.c | 1500 u64 block_size, digest_size; in ccp_run_sha_cmd() local 1506 digest_size = SHA1_DIGEST_SIZE; in ccp_run_sha_cmd() 1510 digest_size = SHA224_DIGEST_SIZE; in ccp_run_sha_cmd() 1514 digest_size = SHA256_DIGEST_SIZE; in ccp_run_sha_cmd() 1526 hmac_buf = kmalloc(block_size + digest_size, GFP_KERNEL); in ccp_run_sha_cmd() 1531 sg_init_one(&sg, hmac_buf, block_size + digest_size); in ccp_run_sha_cmd() 1534 memcpy(hmac_buf + block_size, ctx.address, digest_size); in ccp_run_sha_cmd() 1542 hmac_cmd.u.sha.src_len = block_size + digest_size; in ccp_run_sha_cmd() 1547 hmac_cmd.u.sha.msg_bits = (block_size + digest_size) << 3; in ccp_run_sha_cmd()
|
D | ccp-crypto-aes-cmac.c | 32 unsigned int digest_size = crypto_ahash_digestsize(tfm); in ccp_aes_cmac_complete() local 50 memcpy(req->result, rctx->iv, digest_size); in ccp_aes_cmac_complete()
|
/linux-4.1.27/include/crypto/ |
D | sha256_base.h | 118 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); in sha256_base_finish() local 123 for (i = 0; digest_size > 0; i++, digest_size -= sizeof(__be32)) in sha256_base_finish()
|
D | sha512_base.h | 121 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); in sha512_base_finish() local 126 for (i = 0; digest_size > 0; i++, digest_size -= sizeof(__be64)) in sha512_base_finish()
|
D | public_key.h | 82 u8 digest_size; /* Number of bytes in digest */ member
|
/linux-4.1.27/drivers/block/drbd/ |
D | drbd_worker.c | 347 int digest_size; in w_e_send_csum() local 357 digest_size = crypto_hash_digestsize(peer_device->connection->csums_tfm); in w_e_send_csum() 358 digest = kmalloc(digest_size, GFP_NOIO); in w_e_send_csum() 372 digest, digest_size, in w_e_send_csum() 1111 int digest_size; in w_e_end_csum_rs_req() local 1133 digest_size = crypto_hash_digestsize(peer_device->connection->csums_tfm); in w_e_end_csum_rs_req() 1134 D_ASSERT(device, digest_size == di->digest_size); in w_e_end_csum_rs_req() 1135 digest = kmalloc(digest_size, GFP_NOIO); in w_e_end_csum_rs_req() 1139 eq = !memcmp(digest, di->digest, digest_size); in w_e_end_csum_rs_req() 1176 int digest_size; in w_e_end_ov_req() local [all …]
|
D | drbd_main.c | 1396 void *digest, int digest_size, enum drbd_packet cmd) in drbd_send_drequest_csum() argument 1410 return drbd_send_command(peer_device, sock, cmd, sizeof(*p), digest, digest_size); in drbd_send_drequest_csum() 1625 int digest_size; in drbd_send_dblock() local 1630 digest_size = peer_device->connection->integrity_tfm ? in drbd_send_dblock() 1662 if (digest_size) in drbd_send_dblock() 1664 …err = __send_command(peer_device->connection, device->vnr, sock, P_DATA, sizeof(*p) + digest_size,… in drbd_send_dblock() 1677 if (!(req->rq_state & (RQ_EXP_RECEIVE_ACK | RQ_EXP_WRITE_ACK)) || digest_size) in drbd_send_dblock() 1683 if (digest_size > 0 && digest_size <= 64) { in drbd_send_dblock() 1688 if (memcmp(p + 1, digest, digest_size)) { in drbd_send_dblock() 1714 int digest_size; in drbd_send_block() local [all …]
|
D | drbd_receiver.c | 1594 int digest_size, err; in read_in_block() local 1601 digest_size = 0; in read_in_block() 1603 digest_size = crypto_hash_digestsize(peer_device->connection->peer_integrity_tfm); in read_in_block() 1608 err = drbd_recv_all_warn(peer_device->connection, dig_in, digest_size); in read_in_block() 1611 data_size -= digest_size; in read_in_block() 1664 if (digest_size) { in read_in_block() 1666 if (memcmp(dig_in, dig_vv, digest_size)) { in read_in_block() 1711 int digest_size, err, expect; in recv_dless_read() local 1715 digest_size = 0; in recv_dless_read() 1717 digest_size = crypto_hash_digestsize(peer_device->connection->peer_integrity_tfm); in recv_dless_read() [all …]
|
D | drbd_int.h | 410 int digest_size; member 1108 int size, void *digest, int digest_size,
|
/linux-4.1.27/drivers/crypto/ |
D | n2_core.c | 247 u8 digest_size; member 507 unsigned int auth_type, unsigned int digest_size, in n2_do_async_digest() argument 551 auth_type, digest_size, in n2_do_async_digest() 601 ds = n2alg->digest_size; in n2_hash_async_digest() 621 ds = n2alg->derived.digest_size; in n2_hmac_async_digest() 1273 u8 digest_size; member 1325 .digest_size = MD5_DIGEST_SIZE, 1333 .digest_size = SHA1_DIGEST_SIZE, 1341 .digest_size = SHA256_DIGEST_SIZE, 1349 .digest_size = SHA224_DIGEST_SIZE, [all …]
|
D | sahara.c | 188 unsigned int digest_size; member 1094 memcpy(req->result, rctx->context, rctx->digest_size); in sahara_sha_process() 1179 rctx->digest_size = SHA1_DIGEST_SIZE; in sahara_sha_init() 1183 rctx->digest_size = SHA256_DIGEST_SIZE; in sahara_sha_init() 1189 rctx->context_size = rctx->digest_size + 4; in sahara_sha_init()
|
D | omap-sham.c | 189 int digest_size; member 286 for (i = 0; i < dd->pdata->digest_size / sizeof(u32); i++) { in omap_sham_copy_hash_omap2() 306 for (i = 0; i < dd->pdata->digest_size / sizeof(u32); i++) { in omap_sham_copy_hash_omap4() 1695 .digest_size = SHA1_DIGEST_SIZE, 1729 .digest_size = SHA256_DIGEST_SIZE, 1769 .digest_size = SHA512_DIGEST_SIZE,
|
/linux-4.1.27/security/integrity/ |
D | digsig_asymmetric.c | 94 pks.digest_size = datalen; in asymmetric_verify()
|
/linux-4.1.27/drivers/crypto/qat/qat_common/ |
D | qat_algs.c | 163 int digest_size = crypto_shash_digestsize(ctx->hash_tfm); in qat_alg_do_precomputes() local 181 memcpy(opad, ipad, digest_size); in qat_alg_do_precomputes() 207 for (i = 0; i < digest_size >> 2; i++, hash_state_out++) in qat_alg_do_precomputes() 213 for (i = 0; i < digest_size >> 2; i++, hash_state_out++) in qat_alg_do_precomputes() 219 for (i = 0; i < digest_size >> 3; i++, hash512_state_out++) in qat_alg_do_precomputes() 240 for (i = 0; i < digest_size >> 2; i++, hash_state_out++) in qat_alg_do_precomputes() 246 for (i = 0; i < digest_size >> 2; i++, hash_state_out++) in qat_alg_do_precomputes() 252 for (i = 0; i < digest_size >> 3; i++, hash512_state_out++) in qat_alg_do_precomputes()
|
/linux-4.1.27/Documentation/crypto/ |
D | asymmetric-keys.txt | 134 u8 digest_size; 149 sig->digest_size.
|
/linux-4.1.27/drivers/char/tpm/ |
D | tpm2-cmd.c | 42 __be16 digest_size; member
|
/linux-4.1.27/include/linux/mfd/ |
D | cros_ec_commands.h | 1146 uint8_t digest_size; /* Size of hash digest in bytes */ member
|