/crypto/ |
D | testmgr.h | 40 const char *digest; member 1171 .digest = "\x31\xd6\xcf\xe0\xd1\x6a\xe9\x31" 1176 .digest = "\xbd\xe5\x2c\xb3\x1d\xe3\x3e\x46" 1181 .digest = "\xa4\x48\x01\x7a\xaf\x21\xd8\x52" 1186 .digest = "\xd9\x13\x0a\x81\x64\x54\x9f\xe8" 1191 .digest = "\xd7\x9e\x1c\x30\x8a\xa5\xbb\xcd" 1196 .digest = "\x04\x3f\x85\x82\xf2\x41\xdb\x35" 1202 .digest = "\xe3\x3b\x4d\xdc\x9c\x38\xf2\x19" 1210 .digest = "\x6b\x4e\x03\x42\x36\x67\xdb\xb7" 1217 .digest = "\x9e\x86\xff\x69\x55\x7c\xa9\x5f" [all …]
|
D | ecrdsa.c | 39 const char *digest; /* digest name from oid */ member 75 unsigned char digest[STREEBOG512_DIGEST_SIZE]; in ecrdsa_verify() local 92 !ctx->digest || in ecrdsa_verify() 100 WARN_ON(req->dst_len > sizeof(digest))) in ecrdsa_verify() 108 digest, req->dst_len, req->src_len); in ecrdsa_verify() 122 vli_from_le64(e, digest, ndigits); in ecrdsa_verify() 208 ctx->digest = "streebog256"; in ecrdsa_set_pub_key() 212 ctx->digest = "streebog512"; in ecrdsa_set_pub_key()
|
D | adiantum.c | 256 struct scatterlist *sgl, le128 *digest) in adiantum_hash_message() argument 286 return crypto_shash_final(hash_desc, (u8 *)digest); in adiantum_hash_message() 296 le128 digest; in adiantum_finish() local 309 err = adiantum_hash_message(req, req->dst, &digest); in adiantum_finish() 312 le128_add(&digest, &digest, &rctx->header_hash); in adiantum_finish() 313 le128_sub(&rctx->rbuf.bignum, &rctx->rbuf.bignum, &digest); in adiantum_finish() 337 le128 digest; in adiantum_crypt() local 351 err = adiantum_hash_message(req, req->src, &digest); in adiantum_crypt() 354 le128_add(&digest, &digest, &rctx->header_hash); in adiantum_crypt() 357 le128_add(&rctx->rbuf.bignum, &rctx->rbuf.bignum, &digest); in adiantum_crypt()
|
D | poly1305_generic.c | 267 __le32 digest[4]; in crypto_poly1305_final() local 280 poly1305_core_emit(&dctx->h, digest); in crypto_poly1305_final() 283 f = (f >> 32) + le32_to_cpu(digest[0]) + dctx->s[0]; in crypto_poly1305_final() 285 f = (f >> 32) + le32_to_cpu(digest[1]) + dctx->s[1]; in crypto_poly1305_final() 287 f = (f >> 32) + le32_to_cpu(digest[2]) + dctx->s[2]; in crypto_poly1305_final() 289 f = (f >> 32) + le32_to_cpu(digest[3]) + dctx->s[3]; in crypto_poly1305_final()
|
D | Kconfig | 709 tristate "MD4 digest algorithm" 712 MD4 message digest algorithm (RFC1320). 715 tristate "MD5 digest algorithm" 718 MD5 message digest algorithm (RFC1321). 721 tristate "MD5 digest algorithm (OCTEON)" 726 MD5 message digest algorithm (RFC1321) implemented 730 tristate "MD5 digest algorithm (PPC)" 734 MD5 message digest algorithm (RFC1321) implemented 738 tristate "MD5 digest algorithm (SPARC64)" 743 MD5 message digest algorithm (RFC1321) implemented [all …]
|
D | ecrdsa_params.asn1 | 3 digest OBJECT IDENTIFIER OPTIONAL ({ ecrdsa_param_digest })
|
D | sha3_generic.c | 218 __le64 *digest = (__le64 *)out; in crypto_sha3_final() local 230 put_unaligned_le64(sctx->st[i], digest++); in crypto_sha3_final() 233 put_unaligned_le32(sctx->st[i], (__le32 *)digest); in crypto_sha3_final()
|
D | streebog_generic.c | 1036 static int streebog_final(struct shash_desc *desc, u8 *digest) in streebog_final() argument 1043 memcpy(digest, &ctx->hash.qword[4], STREEBOG256_DIGEST_SIZE); in streebog_final() 1045 memcpy(digest, &ctx->hash.qword[0], STREEBOG512_DIGEST_SIZE); in streebog_final()
|
D | shash.c | 206 return shash->digest(desc, data, len, out); in crypto_shash_digest() 374 crt->digest = shash_async_digest; in crypto_init_shash_ops_async() 472 if (!alg->digest) in shash_prepare_alg() 473 alg->digest = shash_digest_unaligned; in shash_prepare_alg()
|
D | crct10dif_generic.c | 94 .digest = chksum_digest,
|
D | xxhash_generic.c | 78 .digest = xxhash64_digest,
|
D | crc32_generic.c | 124 .digest = crc32_digest,
|
D | crc32c_generic.c | 139 .digest = chksum_digest,
|
D | ahash.c | 410 ret = crypto_ahash_op(req, tfm->digest); in crypto_ahash_digest() 492 hash->digest = alg->digest; in crypto_ahash_init_tfm()
|
D | wp512.c | 1073 __be64 *digest = (__be64 *)out; in wp512_final() local 1093 digest[i] = cpu_to_be64(wctx->hash[i]); in wp512_final()
|
D | crypto_null.c | 99 .digest = null_digest,
|
/crypto/asymmetric_keys/ |
D | pkcs7_verify.c | 34 if (sig->digest) in pkcs7_digest() 51 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL); in pkcs7_digest() 52 if (!sig->digest) in pkcs7_digest() 63 sig->digest); in pkcs7_digest() 66 pr_devel("MsgDigest = [%*ph]\n", 8, sig->digest); in pkcs7_digest() 88 if (memcmp(sig->digest, sinfo->msgdigest, in pkcs7_digest() 101 memset(sig->digest, 0, sig->digest_size); in pkcs7_digest() 111 sinfo->authattrs_len, sig->digest); in pkcs7_digest() 114 pr_devel("AADigest = [%*ph]\n", 8, sig->digest); in pkcs7_digest() 141 *buf = sinfo->sig->digest; in pkcs7_get_digest()
|
D | verify_pefile.c | 324 void *digest; in pefile_digest_pe() local 361 digest = (void *)desc + desc_size; in pefile_digest_pe() 362 ret = crypto_shash_final(desc, digest); in pefile_digest_pe() 366 pr_debug("Digest calc = [%*ph]\n", ctx->digest_len, digest); in pefile_digest_pe() 371 if (memcmp(digest, ctx->digest, ctx->digest_len) != 0) { in pefile_digest_pe() 442 ctx.digest_len, ctx.digest_len, ctx.digest); in verify_pefile_signature() 450 kzfree(ctx.digest); in verify_pefile_signature()
|
D | x509_public_key.c | 67 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL); in x509_get_sig_params() 68 if (!sig->digest) in x509_get_sig_params() 77 ret = crypto_shash_digest(desc, cert->tbs, cert->tbs_size, sig->digest); in x509_get_sig_params() 81 ret = is_hash_blacklisted(sig->digest, sig->digest_size, "tbs"); in x509_get_sig_params() 84 sig->digest_size, sig->digest); in x509_get_sig_params()
|
D | mscode_parser.c | 122 ctx->digest = kmemdup(value, vlen, GFP_KERNEL); in mscode_note_digest() 123 if (!ctx->digest) in mscode_note_digest()
|
D | verify_pefile.h | 23 const void *digest; /* Digest */ member
|
D | mscode.asn1 | 19 digest OCTET STRING ({ mscode_note_digest })
|
D | signature.c | 31 kfree(sig->digest); in public_key_signature_free()
|
D | pkcs7.asn1 | 78 -- Explicit because easier to compute digest on
|
D | public_key.c | 303 sg_set_buf(&src_sg[1], sig->digest, sig->digest_size); in public_key_verify_signature()
|