Home
last modified time | relevance | path

Searched refs:digest_size (Results 1 – 25 of 25) sorted by relevance

/linux-4.4.14/crypto/asymmetric_keys/
Dpkcs7_verify.c30 size_t digest_size, desc_size; in pkcs7_digest() local
49 sinfo->sig.digest_size = digest_size = crypto_shash_digestsize(tfm); in pkcs7_digest()
52 digest = kzalloc(ALIGN(digest_size, __alignof__(*desc)) + desc_size, in pkcs7_digest()
57 desc = PTR_ALIGN(digest + digest_size, __alignof__(*desc)); in pkcs7_digest()
83 if (sinfo->msgdigest_len != sinfo->sig.digest_size) { in pkcs7_digest()
102 memset(digest, 0, sinfo->sig.digest_size); in pkcs7_digest()
Dx509_public_key.c162 size_t digest_size, desc_size; in x509_get_sig_params() local
191 digest_size = crypto_shash_digestsize(tfm); in x509_get_sig_params()
197 digest = kzalloc(ALIGN(digest_size, __alignof__(*desc)) + desc_size, in x509_get_sig_params()
203 cert->sig.digest_size = digest_size; in x509_get_sig_params()
205 desc = PTR_ALIGN(digest + digest_size, __alignof__(*desc)); in x509_get_sig_params()
Dverify_pefile.c327 size_t digest_size, desc_size; in pefile_digest_pe() local
341 digest_size = crypto_shash_digestsize(tfm); in pefile_digest_pe()
343 if (digest_size != ctx->digest_len) { in pefile_digest_pe()
345 digest_size, ctx->digest_len); in pefile_digest_pe()
349 pr_debug("Digest: desc=%zu size=%zu\n", desc_size, digest_size); in pefile_digest_pe()
352 desc = kzalloc(desc_size + digest_size, GFP_KERNEL); in pefile_digest_pe()
Drsa.c260 ret = RSA_verify(H, EM - 1, k, sig->digest_size, in RSA_verify_signature()
/linux-4.4.14/drivers/md/
Ddm-verity.c71 unsigned digest_size; /* digest size for the current hash algorithm */ member
127 return (u8 *)(io + 1) + v->shash_descsize + v->digest_size; in io_want_digest()
189 *offset = idx * v->digest_size; in verity_hash_at_level()
321 if (unlikely(memcmp(result, io_want_digest(v, io), v->digest_size))) { in verity_verify_level()
333 memcpy(io_want_digest(v, io), data, v->digest_size); in verity_verify_level()
376 memcpy(io_want_digest(v, io), v->root_digest, v->digest_size); in verity_verify_io()
437 if (unlikely(memcmp(result, io_want_digest(v, io), v->digest_size))) { in verity_verify_io()
609 for (x = 0; x < v->digest_size; x++) in verity_status()
823 v->digest_size = crypto_shash_digestsize(v->tfm); in verity_ctr()
824 if ((1 << v->hash_dev_block_bits) < v->digest_size * 2) { in verity_ctr()
[all …]
/linux-4.4.14/drivers/crypto/ccp/
Dccp-crypto-sha.c31 unsigned int digest_size = crypto_ahash_digestsize(tfm); in ccp_sha_complete() local
49 memcpy(req->result, rctx->ctx, digest_size); in ccp_sha_complete()
259 unsigned int digest_size = crypto_shash_digestsize(shash); in ccp_sha_setkey() local
283 key_len = digest_size; in ccp_sha_setkey()
350 u32 digest_size; member
359 .digest_size = SHA1_DIGEST_SIZE,
366 .digest_size = SHA224_DIGEST_SIZE,
373 .digest_size = SHA256_DIGEST_SIZE,
450 halg->digestsize = def->digest_size; in ccp_register_sha_alg()
Dccp-ops.c1504 u64 block_size, digest_size; in ccp_run_sha_cmd() local
1510 digest_size = SHA1_DIGEST_SIZE; in ccp_run_sha_cmd()
1514 digest_size = SHA224_DIGEST_SIZE; in ccp_run_sha_cmd()
1518 digest_size = SHA256_DIGEST_SIZE; in ccp_run_sha_cmd()
1530 hmac_buf = kmalloc(block_size + digest_size, GFP_KERNEL); in ccp_run_sha_cmd()
1535 sg_init_one(&sg, hmac_buf, block_size + digest_size); in ccp_run_sha_cmd()
1538 memcpy(hmac_buf + block_size, ctx.address, digest_size); in ccp_run_sha_cmd()
1546 hmac_cmd.u.sha.src_len = block_size + digest_size; in ccp_run_sha_cmd()
1551 hmac_cmd.u.sha.msg_bits = (block_size + digest_size) << 3; in ccp_run_sha_cmd()
Dccp-crypto-aes-cmac.c32 unsigned int digest_size = crypto_ahash_digestsize(tfm); in ccp_aes_cmac_complete() local
50 memcpy(req->result, rctx->iv, digest_size); in ccp_aes_cmac_complete()
/linux-4.4.14/include/crypto/
Dsha256_base.h118 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); in sha256_base_finish() local
123 for (i = 0; digest_size > 0; i++, digest_size -= sizeof(__be32)) in sha256_base_finish()
Dsha512_base.h121 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); in sha512_base_finish() local
126 for (i = 0; digest_size > 0; i++, digest_size -= sizeof(__be64)) in sha512_base_finish()
Dpublic_key.h96 u8 digest_size; /* Number of bytes in digest */ member
/linux-4.4.14/drivers/block/drbd/
Ddrbd_worker.c325 int digest_size; in w_e_send_csum() local
335 digest_size = crypto_hash_digestsize(peer_device->connection->csums_tfm); in w_e_send_csum()
336 digest = kmalloc(digest_size, GFP_NOIO); in w_e_send_csum()
350 digest, digest_size, in w_e_send_csum()
1089 int digest_size; in w_e_end_csum_rs_req() local
1111 digest_size = crypto_hash_digestsize(peer_device->connection->csums_tfm); in w_e_end_csum_rs_req()
1112 D_ASSERT(device, digest_size == di->digest_size); in w_e_end_csum_rs_req()
1113 digest = kmalloc(digest_size, GFP_NOIO); in w_e_end_csum_rs_req()
1117 eq = !memcmp(digest, di->digest, digest_size); in w_e_end_csum_rs_req()
1154 int digest_size; in w_e_end_ov_req() local
[all …]
Ddrbd_main.c1396 void *digest, int digest_size, enum drbd_packet cmd) in drbd_send_drequest_csum() argument
1410 return drbd_send_command(peer_device, sock, cmd, sizeof(*p), digest, digest_size); in drbd_send_drequest_csum()
1625 int digest_size; in drbd_send_dblock() local
1630 digest_size = peer_device->connection->integrity_tfm ? in drbd_send_dblock()
1662 if (digest_size) in drbd_send_dblock()
1664 …err = __send_command(peer_device->connection, device->vnr, sock, P_DATA, sizeof(*p) + digest_size,… in drbd_send_dblock()
1677 if (!(req->rq_state & (RQ_EXP_RECEIVE_ACK | RQ_EXP_WRITE_ACK)) || digest_size) in drbd_send_dblock()
1683 if (digest_size > 0 && digest_size <= 64) { in drbd_send_dblock()
1688 if (memcmp(p + 1, digest, digest_size)) { in drbd_send_dblock()
1714 int digest_size; in drbd_send_block() local
[all …]
Ddrbd_receiver.c1595 int digest_size, err; in read_in_block() local
1602 digest_size = 0; in read_in_block()
1604 digest_size = crypto_hash_digestsize(peer_device->connection->peer_integrity_tfm); in read_in_block()
1609 err = drbd_recv_all_warn(peer_device->connection, dig_in, digest_size); in read_in_block()
1612 data_size -= digest_size; in read_in_block()
1665 if (digest_size) { in read_in_block()
1667 if (memcmp(dig_in, dig_vv, digest_size)) { in read_in_block()
1712 int digest_size, err, expect; in recv_dless_read() local
1716 digest_size = 0; in recv_dless_read()
1718 digest_size = crypto_hash_digestsize(peer_device->connection->peer_integrity_tfm); in recv_dless_read()
[all …]
Ddrbd_int.h411 int digest_size; member
1109 int size, void *digest, int digest_size,
/linux-4.4.14/drivers/crypto/
Dn2_core.c247 u8 digest_size; member
507 unsigned int auth_type, unsigned int digest_size, in n2_do_async_digest() argument
551 auth_type, digest_size, in n2_do_async_digest()
601 ds = n2alg->digest_size; in n2_hash_async_digest()
621 ds = n2alg->derived.digest_size; in n2_hmac_async_digest()
1273 u8 digest_size; member
1325 .digest_size = MD5_DIGEST_SIZE,
1333 .digest_size = SHA1_DIGEST_SIZE,
1341 .digest_size = SHA256_DIGEST_SIZE,
1349 .digest_size = SHA224_DIGEST_SIZE,
[all …]
Dsahara.c187 unsigned int digest_size; member
1030 memcpy(req->result, rctx->context, rctx->digest_size); in sahara_sha_process()
1115 rctx->digest_size = SHA1_DIGEST_SIZE; in sahara_sha_init()
1119 rctx->digest_size = SHA256_DIGEST_SIZE; in sahara_sha_init()
1125 rctx->context_size = rctx->digest_size + 4; in sahara_sha_init()
Domap-sham.c189 int digest_size; member
286 for (i = 0; i < dd->pdata->digest_size / sizeof(u32); i++) { in omap_sham_copy_hash_omap2()
306 for (i = 0; i < dd->pdata->digest_size / sizeof(u32); i++) { in omap_sham_copy_hash_omap4()
1701 .digest_size = SHA1_DIGEST_SIZE,
1735 .digest_size = SHA256_DIGEST_SIZE,
1775 .digest_size = SHA512_DIGEST_SIZE,
/linux-4.4.14/security/integrity/
Ddigsig_asymmetric.c94 pks.digest_size = datalen; in asymmetric_verify()
/linux-4.4.14/drivers/crypto/qat/qat_common/
Dqat_algs.c154 int digest_size = crypto_shash_digestsize(ctx->hash_tfm); in qat_alg_do_precomputes() local
172 memcpy(opad, ipad, digest_size); in qat_alg_do_precomputes()
198 for (i = 0; i < digest_size >> 2; i++, hash_state_out++) in qat_alg_do_precomputes()
204 for (i = 0; i < digest_size >> 2; i++, hash_state_out++) in qat_alg_do_precomputes()
210 for (i = 0; i < digest_size >> 3; i++, hash512_state_out++) in qat_alg_do_precomputes()
231 for (i = 0; i < digest_size >> 2; i++, hash_state_out++) in qat_alg_do_precomputes()
237 for (i = 0; i < digest_size >> 2; i++, hash_state_out++) in qat_alg_do_precomputes()
243 for (i = 0; i < digest_size >> 3; i++, hash512_state_out++) in qat_alg_do_precomputes()
/linux-4.4.14/drivers/gpu/drm/amd/amdgpu/
Damdgpu_ucode.h105 uint32_t digest_size; member
Damdgpu_ucode.c192 DRM_DEBUG("digest_size: %u\n", le32_to_cpu(sdma_v1_1_hdr->digest_size)); in amdgpu_ucode_print_sdma_hdr()
/linux-4.4.14/Documentation/crypto/
Dasymmetric-keys.txt134 u8 digest_size;
149 sig->digest_size.
/linux-4.4.14/drivers/char/tpm/
Dtpm2-cmd.c47 __be16 digest_size; member
/linux-4.4.14/include/linux/mfd/
Dcros_ec_commands.h1206 uint8_t digest_size; /* Size of hash digest in bytes */ member