/Linux-v4.19/arch/arm64/crypto/ |
D | sha3-ce-glue.c | 33 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); in sha3_update() local 46 sha3_ce_transform(sctx->st, sctx->buf, 1, digest_size); in sha3_update() 59 sha3_ce_transform(sctx->st, data, blocks, digest_size); in sha3_update() 75 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); in sha3_final() local 87 sha3_ce_transform(sctx->st, sctx->buf, 1, digest_size); in sha3_final() 90 for (i = 0; i < digest_size / 8; i++) in sha3_final() 93 if (digest_size & 4) in sha3_final()
|
/Linux-v4.19/drivers/crypto/ccp/ |
D | ccp-crypto-sha.c | 33 unsigned int digest_size = crypto_ahash_digestsize(tfm); in ccp_sha_complete() local 51 memcpy(req->result, rctx->ctx, digest_size); in ccp_sha_complete() 282 unsigned int digest_size = crypto_shash_digestsize(shash); in ccp_sha_setkey() local 306 key_len = digest_size; in ccp_sha_setkey() 374 u32 digest_size; member 384 .digest_size = SHA1_DIGEST_SIZE, 392 .digest_size = SHA224_DIGEST_SIZE, 400 .digest_size = SHA256_DIGEST_SIZE, 408 .digest_size = SHA384_DIGEST_SIZE, 416 .digest_size = SHA512_DIGEST_SIZE, [all …]
|
D | ccp-ops.c | 1467 unsigned int digest_size; in ccp_run_sha_cmd() local 1562 digest_size = SHA1_DIGEST_SIZE; in ccp_run_sha_cmd() 1572 digest_size = SHA224_DIGEST_SIZE; in ccp_run_sha_cmd() 1583 digest_size = SHA256_DIGEST_SIZE; in ccp_run_sha_cmd() 1590 digest_size = SHA384_DIGEST_SIZE; in ccp_run_sha_cmd() 1598 digest_size = SHA512_DIGEST_SIZE; in ccp_run_sha_cmd() 1711 digest_size); in ccp_run_sha_cmd() 1743 hmac_buf = kmalloc(block_size + digest_size, GFP_KERNEL); in ccp_run_sha_cmd() 1748 sg_init_one(&sg, hmac_buf, block_size + digest_size); in ccp_run_sha_cmd() 1757 digest_size); in ccp_run_sha_cmd() [all …]
|
/Linux-v4.19/drivers/md/ |
D | dm-verity.h | 54 unsigned digest_size; /* digest size for the current hash algorithm */ member 109 return (u8 *)(io + 1) + v->ahash_reqsize + v->digest_size; in verity_io_want_digest() 115 return verity_io_want_digest(v, io) + v->digest_size; in verity_io_digest_end()
|
D | dm-verity-target.c | 204 *offset = idx * v->digest_size; in verity_hash_at_level() 303 v->digest_size) == 0)) in verity_verify_level() 318 memcpy(want_digest, data, v->digest_size); in verity_verify_level() 348 memcpy(digest, v->root_digest, v->digest_size); in verity_hash_for_block() 357 *is_zero = !memcmp(v->zero_digest, digest, v->digest_size); in verity_hash_for_block() 520 verity_io_want_digest(v, io), v->digest_size) == 0)) { in verity_verify_io() 701 for (x = 0; x < v->digest_size; x++) in verity_status() 833 v->zero_digest = kmalloc(v->digest_size, GFP_KERNEL); in verity_alloc_zero_digest() 1043 v->digest_size = crypto_ahash_digestsize(v->tfm); in verity_ctr() 1044 if ((1 << v->hash_dev_block_bits) < v->digest_size * 2) { in verity_ctr() [all …]
|
D | dm-verity-fec.c | 197 v->digest_size) != 0; in fec_is_erasure() 215 u8 want_digest[v->digest_size]; in fec_read_bufs() 396 v->digest_size)) { in fec_decode_rsb()
|
/Linux-v4.19/crypto/asymmetric_keys/ |
D | verify_pefile.c | 327 size_t digest_size, desc_size; in pefile_digest_pe() local 341 digest_size = crypto_shash_digestsize(tfm); in pefile_digest_pe() 343 if (digest_size != ctx->digest_len) { in pefile_digest_pe() 345 digest_size, ctx->digest_len); in pefile_digest_pe() 349 pr_debug("Digest: desc=%zu size=%zu\n", desc_size, digest_size); in pefile_digest_pe() 352 desc = kzalloc(desc_size + digest_size, GFP_KERNEL); in pefile_digest_pe()
|
D | x509_public_key.c | 68 sig->digest_size = crypto_shash_digestsize(tfm); in x509_get_sig_params() 71 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL); in x509_get_sig_params() 86 ret = is_hash_blacklisted(sig->digest, sig->digest_size, "tbs"); in x509_get_sig_params() 89 sig->digest_size, sig->digest); in x509_get_sig_params()
|
D | pkcs7_verify.c | 47 sig->digest_size = crypto_shash_digestsize(tfm); in pkcs7_digest() 50 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL); in pkcs7_digest() 81 if (sinfo->msgdigest_len != sig->digest_size) { in pkcs7_digest() 101 memset(sig->digest, 0, sig->digest_size); in pkcs7_digest()
|
D | public_key.c | 137 if (req->dst_len != sig->digest_size || in public_key_verify_signature() 138 memcmp(sig->digest, output, sig->digest_size) != 0) in public_key_verify_signature()
|
/Linux-v4.19/include/crypto/ |
D | sha256_base.h | 118 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); in sha256_base_finish() local 123 for (i = 0; digest_size > 0; i++, digest_size -= sizeof(__be32)) in sha256_base_finish()
|
D | sha512_base.h | 121 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); in sha512_base_finish() local 126 for (i = 0; digest_size > 0; i++, digest_size -= sizeof(__be64)) in sha512_base_finish()
|
D | public_key.h | 40 u8 digest_size; /* Number of bytes in digest */ member
|
/Linux-v4.19/crypto/ |
D | sha3_generic.c | 169 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); in crypto_sha3_init() local 171 sctx->rsiz = 200 - 2 * digest_size; in crypto_sha3_init() 222 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); in crypto_sha3_final() local 234 for (i = 0; i < digest_size / 8; i++) in crypto_sha3_final() 237 if (digest_size & 4) in crypto_sha3_final()
|
D | rsa-pkcs1pad.c | 399 unsigned int ps_end, digest_size = 0; in pkcs1pad_sign() local 404 digest_size = digest_info->size; in pkcs1pad_sign() 406 if (req->src_len + digest_size > ctx->key_size - 11) in pkcs1pad_sign() 419 ps_end = ctx->key_size - digest_size - req->src_len - 2; in pkcs1pad_sign()
|
/Linux-v4.19/drivers/block/drbd/ |
D | drbd_worker.c | 360 int digest_size; in w_e_send_csum() local 370 digest_size = crypto_ahash_digestsize(peer_device->connection->csums_tfm); in w_e_send_csum() 371 digest = kmalloc(digest_size, GFP_NOIO); in w_e_send_csum() 385 digest, digest_size, in w_e_send_csum() 1186 int digest_size; in w_e_end_csum_rs_req() local 1208 digest_size = crypto_ahash_digestsize(peer_device->connection->csums_tfm); in w_e_end_csum_rs_req() 1209 D_ASSERT(device, digest_size == di->digest_size); in w_e_end_csum_rs_req() 1210 digest = kmalloc(digest_size, GFP_NOIO); in w_e_end_csum_rs_req() 1214 eq = !memcmp(digest, di->digest, digest_size); in w_e_end_csum_rs_req() 1251 int digest_size; in w_e_end_ov_req() local [all …]
|
D | drbd_main.c | 1450 void *digest, int digest_size, enum drbd_packet cmd) in drbd_send_drequest_csum() argument 1464 return drbd_send_command(peer_device, sock, cmd, sizeof(*p), digest, digest_size); in drbd_send_drequest_csum() 1687 int digest_size; in drbd_send_dblock() local 1692 digest_size = peer_device->connection->integrity_tfm ? in drbd_send_dblock() 1733 if (digest_size) in drbd_send_dblock() 1738 sizeof(*wsame) + digest_size, NULL, in drbd_send_dblock() 1743 sizeof(*p) + digest_size, NULL, req->i.size); in drbd_send_dblock() 1756 if (!(req->rq_state & (RQ_EXP_RECEIVE_ACK | RQ_EXP_WRITE_ACK)) || digest_size) in drbd_send_dblock() 1762 if (digest_size > 0 && digest_size <= 64) { in drbd_send_dblock() 1767 if (memcmp(p + 1, digest, digest_size)) { in drbd_send_dblock() [all …]
|
/Linux-v4.19/drivers/crypto/ |
D | n2_core.c | 252 u8 digest_size; member 522 unsigned int auth_type, unsigned int digest_size, in n2_do_async_digest() argument 566 auth_type, digest_size, in n2_do_async_digest() 616 ds = n2alg->digest_size; in n2_hash_async_digest() 636 ds = n2alg->derived.digest_size; in n2_hmac_async_digest() 1288 u8 digest_size; member 1319 .digest_size = MD5_DIGEST_SIZE, 1327 .digest_size = SHA1_DIGEST_SIZE, 1335 .digest_size = SHA256_DIGEST_SIZE, 1343 .digest_size = SHA224_DIGEST_SIZE, [all …]
|
/Linux-v4.19/include/linux/ |
D | tpm_eventlog.h | 82 u16 digest_size; member
|
/Linux-v4.19/drivers/crypto/qat/qat_common/ |
D | qat_algs.c | 155 int digest_size = crypto_shash_digestsize(ctx->hash_tfm); in qat_alg_do_precomputes() local 173 memcpy(opad, ipad, digest_size); in qat_alg_do_precomputes() 199 for (i = 0; i < digest_size >> 2; i++, hash_state_out++) in qat_alg_do_precomputes() 205 for (i = 0; i < digest_size >> 2; i++, hash_state_out++) in qat_alg_do_precomputes() 211 for (i = 0; i < digest_size >> 3; i++, hash512_state_out++) in qat_alg_do_precomputes() 232 for (i = 0; i < digest_size >> 2; i++, hash_state_out++) in qat_alg_do_precomputes() 238 for (i = 0; i < digest_size >> 2; i++, hash_state_out++) in qat_alg_do_precomputes() 244 for (i = 0; i < digest_size >> 3; i++, hash512_state_out++) in qat_alg_do_precomputes()
|
/Linux-v4.19/security/integrity/ |
D | digsig_asymmetric.c | 110 pks.digest_size = datalen; in asymmetric_verify()
|
/Linux-v4.19/drivers/crypto/ccree/ |
D | cc_aead.c | 170 const unsigned int digest_size = 2 * MAX_HMAC_DIGEST_SIZE; in cc_aead_init() local 174 hmac->ipad_opad = dma_alloc_coherent(dev, digest_size, in cc_aead_init() 307 unsigned int digest_size = (ctx->auth_mode == DRV_HASH_SHA1) ? in hmac_setkey() local 322 digest_size); in hmac_setkey() 358 digest_size, NS_BIT, 0); in hmac_setkey() 364 digest_ofs += digest_size; in hmac_setkey() 986 unsigned int digest_size = (ctx->auth_mode == DRV_HASH_SHA1) ? in cc_set_hmac_desc() local 994 ctx->auth_state.hmac.ipad_opad_dma_addr, digest_size, in cc_set_hmac_desc() 1094 unsigned int digest_size = (ctx->auth_mode == DRV_HASH_SHA1) ? in cc_proc_scheme_desc() local 1110 digest_size); in cc_proc_scheme_desc() [all …]
|
/Linux-v4.19/drivers/crypto/bcm/ |
D | spu2.c | 675 u64 cipher_iv_len, u64 digest_size, in spu2_fmd_ctrl1_write() argument 680 if (is_inbound && digest_size) in spu2_fmd_ctrl1_write() 710 if (digest_size) in spu2_fmd_ctrl1_write() 711 ctrl1 |= ((digest_size << SPU2_HASH_TAG_LEN_SHIFT) & in spu2_fmd_ctrl1_write()
|
/Linux-v4.19/drivers/gpu/drm/amd/amdgpu/ |
D | amdgpu_ucode.h | 131 uint32_t digest_size; member
|
/Linux-v4.19/drivers/char/tpm/eventlog/ |
D | tpm2.c | 71 efispecid->digest_sizes[j].digest_size; in calc_tpm2_event_size()
|