Home
last modified time | relevance | path

Searched refs:digest (Results 1 – 25 of 29) sorted by relevance

12

/crypto/
Dtestmgr.h40 const char *digest; member
1171 .digest = "\x31\xd6\xcf\xe0\xd1\x6a\xe9\x31"
1176 .digest = "\xbd\xe5\x2c\xb3\x1d\xe3\x3e\x46"
1181 .digest = "\xa4\x48\x01\x7a\xaf\x21\xd8\x52"
1186 .digest = "\xd9\x13\x0a\x81\x64\x54\x9f\xe8"
1191 .digest = "\xd7\x9e\x1c\x30\x8a\xa5\xbb\xcd"
1196 .digest = "\x04\x3f\x85\x82\xf2\x41\xdb\x35"
1202 .digest = "\xe3\x3b\x4d\xdc\x9c\x38\xf2\x19"
1210 .digest = "\x6b\x4e\x03\x42\x36\x67\xdb\xb7"
1217 .digest = "\x9e\x86\xff\x69\x55\x7c\xa9\x5f"
[all …]
Decrdsa.c39 const char *digest; /* digest name from oid */ member
75 unsigned char digest[STREEBOG512_DIGEST_SIZE]; in ecrdsa_verify() local
92 !ctx->digest || in ecrdsa_verify()
100 WARN_ON(req->dst_len > sizeof(digest))) in ecrdsa_verify()
108 digest, req->dst_len, req->src_len); in ecrdsa_verify()
122 vli_from_le64(e, digest, ndigits); in ecrdsa_verify()
208 ctx->digest = "streebog256"; in ecrdsa_set_pub_key()
212 ctx->digest = "streebog512"; in ecrdsa_set_pub_key()
Dadiantum.c256 struct scatterlist *sgl, le128 *digest) in adiantum_hash_message() argument
286 return crypto_shash_final(hash_desc, (u8 *)digest); in adiantum_hash_message()
296 le128 digest; in adiantum_finish() local
309 err = adiantum_hash_message(req, req->dst, &digest); in adiantum_finish()
312 le128_add(&digest, &digest, &rctx->header_hash); in adiantum_finish()
313 le128_sub(&rctx->rbuf.bignum, &rctx->rbuf.bignum, &digest); in adiantum_finish()
337 le128 digest; in adiantum_crypt() local
351 err = adiantum_hash_message(req, req->src, &digest); in adiantum_crypt()
354 le128_add(&digest, &digest, &rctx->header_hash); in adiantum_crypt()
357 le128_add(&rctx->rbuf.bignum, &rctx->rbuf.bignum, &digest); in adiantum_crypt()
Dpoly1305_generic.c267 __le32 digest[4]; in crypto_poly1305_final() local
280 poly1305_core_emit(&dctx->h, digest); in crypto_poly1305_final()
283 f = (f >> 32) + le32_to_cpu(digest[0]) + dctx->s[0]; in crypto_poly1305_final()
285 f = (f >> 32) + le32_to_cpu(digest[1]) + dctx->s[1]; in crypto_poly1305_final()
287 f = (f >> 32) + le32_to_cpu(digest[2]) + dctx->s[2]; in crypto_poly1305_final()
289 f = (f >> 32) + le32_to_cpu(digest[3]) + dctx->s[3]; in crypto_poly1305_final()
DKconfig709 tristate "MD4 digest algorithm"
712 MD4 message digest algorithm (RFC1320).
715 tristate "MD5 digest algorithm"
718 MD5 message digest algorithm (RFC1321).
721 tristate "MD5 digest algorithm (OCTEON)"
726 MD5 message digest algorithm (RFC1321) implemented
730 tristate "MD5 digest algorithm (PPC)"
734 MD5 message digest algorithm (RFC1321) implemented
738 tristate "MD5 digest algorithm (SPARC64)"
743 MD5 message digest algorithm (RFC1321) implemented
[all …]
Decrdsa_params.asn13 digest OBJECT IDENTIFIER OPTIONAL ({ ecrdsa_param_digest })
Dsha3_generic.c218 __le64 *digest = (__le64 *)out; in crypto_sha3_final() local
230 put_unaligned_le64(sctx->st[i], digest++); in crypto_sha3_final()
233 put_unaligned_le32(sctx->st[i], (__le32 *)digest); in crypto_sha3_final()
Dstreebog_generic.c1036 static int streebog_final(struct shash_desc *desc, u8 *digest) in streebog_final() argument
1043 memcpy(digest, &ctx->hash.qword[4], STREEBOG256_DIGEST_SIZE); in streebog_final()
1045 memcpy(digest, &ctx->hash.qword[0], STREEBOG512_DIGEST_SIZE); in streebog_final()
Dshash.c206 return shash->digest(desc, data, len, out); in crypto_shash_digest()
374 crt->digest = shash_async_digest; in crypto_init_shash_ops_async()
472 if (!alg->digest) in shash_prepare_alg()
473 alg->digest = shash_digest_unaligned; in shash_prepare_alg()
Dcrct10dif_generic.c94 .digest = chksum_digest,
Dxxhash_generic.c78 .digest = xxhash64_digest,
Dcrc32_generic.c124 .digest = crc32_digest,
Dcrc32c_generic.c139 .digest = chksum_digest,
Dahash.c410 ret = crypto_ahash_op(req, tfm->digest); in crypto_ahash_digest()
492 hash->digest = alg->digest; in crypto_ahash_init_tfm()
Dwp512.c1073 __be64 *digest = (__be64 *)out; in wp512_final() local
1093 digest[i] = cpu_to_be64(wctx->hash[i]); in wp512_final()
Dcrypto_null.c99 .digest = null_digest,
/crypto/asymmetric_keys/
Dpkcs7_verify.c34 if (sig->digest) in pkcs7_digest()
51 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL); in pkcs7_digest()
52 if (!sig->digest) in pkcs7_digest()
63 sig->digest); in pkcs7_digest()
66 pr_devel("MsgDigest = [%*ph]\n", 8, sig->digest); in pkcs7_digest()
88 if (memcmp(sig->digest, sinfo->msgdigest, in pkcs7_digest()
101 memset(sig->digest, 0, sig->digest_size); in pkcs7_digest()
111 sinfo->authattrs_len, sig->digest); in pkcs7_digest()
114 pr_devel("AADigest = [%*ph]\n", 8, sig->digest); in pkcs7_digest()
141 *buf = sinfo->sig->digest; in pkcs7_get_digest()
Dverify_pefile.c324 void *digest; in pefile_digest_pe() local
361 digest = (void *)desc + desc_size; in pefile_digest_pe()
362 ret = crypto_shash_final(desc, digest); in pefile_digest_pe()
366 pr_debug("Digest calc = [%*ph]\n", ctx->digest_len, digest); in pefile_digest_pe()
371 if (memcmp(digest, ctx->digest, ctx->digest_len) != 0) { in pefile_digest_pe()
442 ctx.digest_len, ctx.digest_len, ctx.digest); in verify_pefile_signature()
450 kzfree(ctx.digest); in verify_pefile_signature()
Dx509_public_key.c67 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL); in x509_get_sig_params()
68 if (!sig->digest) in x509_get_sig_params()
77 ret = crypto_shash_digest(desc, cert->tbs, cert->tbs_size, sig->digest); in x509_get_sig_params()
81 ret = is_hash_blacklisted(sig->digest, sig->digest_size, "tbs"); in x509_get_sig_params()
84 sig->digest_size, sig->digest); in x509_get_sig_params()
Dmscode_parser.c122 ctx->digest = kmemdup(value, vlen, GFP_KERNEL); in mscode_note_digest()
123 if (!ctx->digest) in mscode_note_digest()
Dverify_pefile.h23 const void *digest; /* Digest */ member
Dmscode.asn119 digest OCTET STRING ({ mscode_note_digest })
Dsignature.c31 kfree(sig->digest); in public_key_signature_free()
Dpkcs7.asn178 -- Explicit because easier to compute digest on
Dpublic_key.c303 sg_set_buf(&src_sg[1], sig->digest, sig->digest_size); in public_key_verify_signature()

12