/linux-4.4.14/crypto/asymmetric_keys/ |
D | pkcs7_verify.c | 30 size_t digest_size, desc_size; in pkcs7_digest() local 49 sinfo->sig.digest_size = digest_size = crypto_shash_digestsize(tfm); in pkcs7_digest() 52 digest = kzalloc(ALIGN(digest_size, __alignof__(*desc)) + desc_size, in pkcs7_digest() 57 desc = PTR_ALIGN(digest + digest_size, __alignof__(*desc)); in pkcs7_digest() 83 if (sinfo->msgdigest_len != sinfo->sig.digest_size) { in pkcs7_digest() 102 memset(digest, 0, sinfo->sig.digest_size); in pkcs7_digest()
|
D | x509_public_key.c | 162 size_t digest_size, desc_size; in x509_get_sig_params() local 191 digest_size = crypto_shash_digestsize(tfm); in x509_get_sig_params() 197 digest = kzalloc(ALIGN(digest_size, __alignof__(*desc)) + desc_size, in x509_get_sig_params() 203 cert->sig.digest_size = digest_size; in x509_get_sig_params() 205 desc = PTR_ALIGN(digest + digest_size, __alignof__(*desc)); in x509_get_sig_params()
|
D | verify_pefile.c | 327 size_t digest_size, desc_size; in pefile_digest_pe() local 341 digest_size = crypto_shash_digestsize(tfm); in pefile_digest_pe() 343 if (digest_size != ctx->digest_len) { in pefile_digest_pe() 345 digest_size, ctx->digest_len); in pefile_digest_pe() 349 pr_debug("Digest: desc=%zu size=%zu\n", desc_size, digest_size); in pefile_digest_pe() 352 desc = kzalloc(desc_size + digest_size, GFP_KERNEL); in pefile_digest_pe()
|
D | rsa.c | 260 ret = RSA_verify(H, EM - 1, k, sig->digest_size, in RSA_verify_signature()
|
/linux-4.4.14/drivers/md/ |
D | dm-verity.c | 71 unsigned digest_size; /* digest size for the current hash algorithm */ member 127 return (u8 *)(io + 1) + v->shash_descsize + v->digest_size; in io_want_digest() 189 *offset = idx * v->digest_size; in verity_hash_at_level() 321 if (unlikely(memcmp(result, io_want_digest(v, io), v->digest_size))) { in verity_verify_level() 333 memcpy(io_want_digest(v, io), data, v->digest_size); in verity_verify_level() 376 memcpy(io_want_digest(v, io), v->root_digest, v->digest_size); in verity_verify_io() 437 if (unlikely(memcmp(result, io_want_digest(v, io), v->digest_size))) { in verity_verify_io() 609 for (x = 0; x < v->digest_size; x++) in verity_status() 823 v->digest_size = crypto_shash_digestsize(v->tfm); in verity_ctr() 824 if ((1 << v->hash_dev_block_bits) < v->digest_size * 2) { in verity_ctr() [all …]
|
/linux-4.4.14/drivers/crypto/ccp/ |
D | ccp-crypto-sha.c | 31 unsigned int digest_size = crypto_ahash_digestsize(tfm); in ccp_sha_complete() local 49 memcpy(req->result, rctx->ctx, digest_size); in ccp_sha_complete() 259 unsigned int digest_size = crypto_shash_digestsize(shash); in ccp_sha_setkey() local 283 key_len = digest_size; in ccp_sha_setkey() 350 u32 digest_size; member 359 .digest_size = SHA1_DIGEST_SIZE, 366 .digest_size = SHA224_DIGEST_SIZE, 373 .digest_size = SHA256_DIGEST_SIZE, 450 halg->digestsize = def->digest_size; in ccp_register_sha_alg()
|
D | ccp-ops.c | 1504 u64 block_size, digest_size; in ccp_run_sha_cmd() local 1510 digest_size = SHA1_DIGEST_SIZE; in ccp_run_sha_cmd() 1514 digest_size = SHA224_DIGEST_SIZE; in ccp_run_sha_cmd() 1518 digest_size = SHA256_DIGEST_SIZE; in ccp_run_sha_cmd() 1530 hmac_buf = kmalloc(block_size + digest_size, GFP_KERNEL); in ccp_run_sha_cmd() 1535 sg_init_one(&sg, hmac_buf, block_size + digest_size); in ccp_run_sha_cmd() 1538 memcpy(hmac_buf + block_size, ctx.address, digest_size); in ccp_run_sha_cmd() 1546 hmac_cmd.u.sha.src_len = block_size + digest_size; in ccp_run_sha_cmd() 1551 hmac_cmd.u.sha.msg_bits = (block_size + digest_size) << 3; in ccp_run_sha_cmd()
|
D | ccp-crypto-aes-cmac.c | 32 unsigned int digest_size = crypto_ahash_digestsize(tfm); in ccp_aes_cmac_complete() local 50 memcpy(req->result, rctx->iv, digest_size); in ccp_aes_cmac_complete()
|
/linux-4.4.14/include/crypto/ |
D | sha256_base.h | 118 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); in sha256_base_finish() local 123 for (i = 0; digest_size > 0; i++, digest_size -= sizeof(__be32)) in sha256_base_finish()
|
D | sha512_base.h | 121 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); in sha512_base_finish() local 126 for (i = 0; digest_size > 0; i++, digest_size -= sizeof(__be64)) in sha512_base_finish()
|
D | public_key.h | 96 u8 digest_size; /* Number of bytes in digest */ member
|
/linux-4.4.14/drivers/block/drbd/ |
D | drbd_worker.c | 325 int digest_size; in w_e_send_csum() local 335 digest_size = crypto_hash_digestsize(peer_device->connection->csums_tfm); in w_e_send_csum() 336 digest = kmalloc(digest_size, GFP_NOIO); in w_e_send_csum() 350 digest, digest_size, in w_e_send_csum() 1089 int digest_size; in w_e_end_csum_rs_req() local 1111 digest_size = crypto_hash_digestsize(peer_device->connection->csums_tfm); in w_e_end_csum_rs_req() 1112 D_ASSERT(device, digest_size == di->digest_size); in w_e_end_csum_rs_req() 1113 digest = kmalloc(digest_size, GFP_NOIO); in w_e_end_csum_rs_req() 1117 eq = !memcmp(digest, di->digest, digest_size); in w_e_end_csum_rs_req() 1154 int digest_size; in w_e_end_ov_req() local [all …]
|
D | drbd_main.c | 1396 void *digest, int digest_size, enum drbd_packet cmd) in drbd_send_drequest_csum() argument 1410 return drbd_send_command(peer_device, sock, cmd, sizeof(*p), digest, digest_size); in drbd_send_drequest_csum() 1625 int digest_size; in drbd_send_dblock() local 1630 digest_size = peer_device->connection->integrity_tfm ? in drbd_send_dblock() 1662 if (digest_size) in drbd_send_dblock() 1664 …err = __send_command(peer_device->connection, device->vnr, sock, P_DATA, sizeof(*p) + digest_size,… in drbd_send_dblock() 1677 if (!(req->rq_state & (RQ_EXP_RECEIVE_ACK | RQ_EXP_WRITE_ACK)) || digest_size) in drbd_send_dblock() 1683 if (digest_size > 0 && digest_size <= 64) { in drbd_send_dblock() 1688 if (memcmp(p + 1, digest, digest_size)) { in drbd_send_dblock() 1714 int digest_size; in drbd_send_block() local [all …]
|
D | drbd_receiver.c | 1595 int digest_size, err; in read_in_block() local 1602 digest_size = 0; in read_in_block() 1604 digest_size = crypto_hash_digestsize(peer_device->connection->peer_integrity_tfm); in read_in_block() 1609 err = drbd_recv_all_warn(peer_device->connection, dig_in, digest_size); in read_in_block() 1612 data_size -= digest_size; in read_in_block() 1665 if (digest_size) { in read_in_block() 1667 if (memcmp(dig_in, dig_vv, digest_size)) { in read_in_block() 1712 int digest_size, err, expect; in recv_dless_read() local 1716 digest_size = 0; in recv_dless_read() 1718 digest_size = crypto_hash_digestsize(peer_device->connection->peer_integrity_tfm); in recv_dless_read() [all …]
|
D | drbd_int.h | 411 int digest_size; member 1109 int size, void *digest, int digest_size,
|
/linux-4.4.14/drivers/crypto/ |
D | n2_core.c | 247 u8 digest_size; member 507 unsigned int auth_type, unsigned int digest_size, in n2_do_async_digest() argument 551 auth_type, digest_size, in n2_do_async_digest() 601 ds = n2alg->digest_size; in n2_hash_async_digest() 621 ds = n2alg->derived.digest_size; in n2_hmac_async_digest() 1273 u8 digest_size; member 1325 .digest_size = MD5_DIGEST_SIZE, 1333 .digest_size = SHA1_DIGEST_SIZE, 1341 .digest_size = SHA256_DIGEST_SIZE, 1349 .digest_size = SHA224_DIGEST_SIZE, [all …]
|
D | sahara.c | 187 unsigned int digest_size; member 1030 memcpy(req->result, rctx->context, rctx->digest_size); in sahara_sha_process() 1115 rctx->digest_size = SHA1_DIGEST_SIZE; in sahara_sha_init() 1119 rctx->digest_size = SHA256_DIGEST_SIZE; in sahara_sha_init() 1125 rctx->context_size = rctx->digest_size + 4; in sahara_sha_init()
|
D | omap-sham.c | 189 int digest_size; member 286 for (i = 0; i < dd->pdata->digest_size / sizeof(u32); i++) { in omap_sham_copy_hash_omap2() 306 for (i = 0; i < dd->pdata->digest_size / sizeof(u32); i++) { in omap_sham_copy_hash_omap4() 1701 .digest_size = SHA1_DIGEST_SIZE, 1735 .digest_size = SHA256_DIGEST_SIZE, 1775 .digest_size = SHA512_DIGEST_SIZE,
|
/linux-4.4.14/security/integrity/ |
D | digsig_asymmetric.c | 94 pks.digest_size = datalen; in asymmetric_verify()
|
/linux-4.4.14/drivers/crypto/qat/qat_common/ |
D | qat_algs.c | 154 int digest_size = crypto_shash_digestsize(ctx->hash_tfm); in qat_alg_do_precomputes() local 172 memcpy(opad, ipad, digest_size); in qat_alg_do_precomputes() 198 for (i = 0; i < digest_size >> 2; i++, hash_state_out++) in qat_alg_do_precomputes() 204 for (i = 0; i < digest_size >> 2; i++, hash_state_out++) in qat_alg_do_precomputes() 210 for (i = 0; i < digest_size >> 3; i++, hash512_state_out++) in qat_alg_do_precomputes() 231 for (i = 0; i < digest_size >> 2; i++, hash_state_out++) in qat_alg_do_precomputes() 237 for (i = 0; i < digest_size >> 2; i++, hash_state_out++) in qat_alg_do_precomputes() 243 for (i = 0; i < digest_size >> 3; i++, hash512_state_out++) in qat_alg_do_precomputes()
|
/linux-4.4.14/drivers/gpu/drm/amd/amdgpu/ |
D | amdgpu_ucode.h | 105 uint32_t digest_size; member
|
D | amdgpu_ucode.c | 192 DRM_DEBUG("digest_size: %u\n", le32_to_cpu(sdma_v1_1_hdr->digest_size)); in amdgpu_ucode_print_sdma_hdr()
|
/linux-4.4.14/Documentation/crypto/ |
D | asymmetric-keys.txt | 134 u8 digest_size; 149 sig->digest_size.
|
/linux-4.4.14/drivers/char/tpm/ |
D | tpm2-cmd.c | 47 __be16 digest_size; member
|
/linux-4.4.14/include/linux/mfd/ |
D | cros_ec_commands.h | 1206 uint8_t digest_size; /* Size of hash digest in bytes */ member
|