/crypto/asymmetric_keys/ |
D | mscode_parser.c | 44 char buffer[50]; in mscode_note_content_type() local 46 sprint_oid(value, vlen, buffer, sizeof(buffer)); in mscode_note_content_type() 47 pr_err("Unknown OID: %s\n", buffer); in mscode_note_content_type() 73 char buffer[50]; in mscode_note_digest_algo() local 101 sprint_oid(value, vlen, buffer, sizeof(buffer)); in mscode_note_digest_algo() 102 pr_err("Unknown OID: %s\n", buffer); in mscode_note_digest_algo()
|
D | x509_cert_parser.c | 163 char buffer[50]; in x509_note_OID() local 164 sprint_oid(value, vlen, buffer, sizeof(buffer)); in x509_note_OID() 166 (unsigned long)value - ctx->data, buffer); in x509_note_OID() 370 char *buffer; in x509_fabricate_name() local 377 buffer = kmalloc(1, GFP_KERNEL); in x509_fabricate_name() 378 if (!buffer) in x509_fabricate_name() 380 buffer[0] = 0; in x509_fabricate_name() 399 buffer = kmalloc(ctx->o_size + 2 + ctx->cn_size + 1, in x509_fabricate_name() 401 if (!buffer) in x509_fabricate_name() 404 memcpy(buffer, in x509_fabricate_name() [all …]
|
D | pkcs8_parser.c | 41 char buffer[50]; in pkcs8_note_OID() local 43 sprint_oid(value, vlen, buffer, sizeof(buffer)); in pkcs8_note_OID() 45 (unsigned long)value - ctx->data, buffer); in pkcs8_note_OID()
|
D | pkcs7_parser.c | 212 char buffer[50]; in pkcs7_note_OID() local 213 sprint_oid(value, vlen, buffer, sizeof(buffer)); in pkcs7_note_OID() 215 (unsigned long)value - ctx->data, buffer); in pkcs7_note_OID()
|
/crypto/ |
D | cipher.c | 26 u8 *buffer, *alignbuffer; in setkey_unaligned() local 30 buffer = kmalloc(absize, GFP_ATOMIC); in setkey_unaligned() 31 if (!buffer) in setkey_unaligned() 34 alignbuffer = (u8 *)ALIGN((unsigned long)buffer, alignmask + 1); in setkey_unaligned() 38 kfree(buffer); in setkey_unaligned() 69 u8 buffer[MAX_CIPHER_BLOCKSIZE + MAX_CIPHER_ALIGNMASK]; in cipher_crypt_one() local 70 u8 *tmp = (u8 *)ALIGN((unsigned long)buffer, alignmask + 1); in cipher_crypt_one()
|
D | wp512.c | 40 u8 buffer[WP512_BLOCK_SIZE]; member 788 const __be64 *buffer = (const __be64 *)wctx->buffer; in wp512_process_buffer() local 791 block[i] = be64_to_cpu(buffer[i]); in wp512_process_buffer() 995 wctx->buffer[0] = 0; in wp512_init() 1013 u8 *buffer = wctx->buffer; in wp512_update() local 1028 buffer[bufferPos++] |= (u8)(b >> bufferRem); in wp512_update() 1034 buffer[bufferPos] = b << (8 - bufferRem); in wp512_update() 1041 buffer[bufferPos] |= b >> bufferRem; in wp512_update() 1055 buffer[bufferPos] = b << (8 - bufferRem); in wp512_update() 1069 u8 *buffer = wctx->buffer; in wp512_final() local [all …]
|
D | skcipher.c | 40 u8 buffer[]; member 98 addr = (u8 *)ALIGN((unsigned long)walk->buffer, walk->alignmask + 1); in skcipher_done_slow() 164 if (!((unsigned long)walk->buffer | (unsigned long)walk->page)) in skcipher_walk_done() 172 if (walk->buffer != walk->page) in skcipher_walk_done() 173 kfree(walk->buffer); in skcipher_walk_done() 194 data = PTR_ALIGN(&p->buffer[0], walk->alignmask + 1); in skcipher_walk_complete() 211 if (walk->buffer != walk->page) in skcipher_walk_complete() 212 kfree(walk->buffer); in skcipher_walk_complete() 232 u8 *buffer; in skcipher_next_slow() local 236 if (!walk->buffer) in skcipher_next_slow() [all …]
|
D | ecdsa.c | 147 unsigned char *buffer; in ecdsa_verify() local 154 buffer = kmalloc(req->src_len + req->dst_len, GFP_KERNEL); in ecdsa_verify() 155 if (!buffer) in ecdsa_verify() 160 buffer, req->src_len + req->dst_len, 0); in ecdsa_verify() 163 buffer, req->src_len); in ecdsa_verify() 172 memcpy(&rawhash[diff], buffer + req->src_len, req->dst_len); in ecdsa_verify() 175 memcpy(&rawhash, buffer + req->src_len, keylen); in ecdsa_verify() 183 kfree(buffer); in ecdsa_verify()
|
D | polyval-generic.c | 63 u8 buffer[POLYVAL_BLOCK_SIZE]; member 163 pos = dctx->buffer + dctx->bytes - 1; in polyval_update() 177 crypto_xor(dctx->buffer, tmp, POLYVAL_BLOCK_SIZE); in polyval_update() 185 pos = dctx->buffer + POLYVAL_BLOCK_SIZE - 1; in polyval_update() 200 copy_and_reverse(dst, dctx->buffer); in polyval_final()
|
D | rmd160.c | 23 __le32 buffer[16]; member 268 memset(rctx->buffer, 0, sizeof(rctx->buffer)); in rmd160_init() 277 const u32 avail = sizeof(rctx->buffer) - (rctx->byte_count & 0x3f); in rmd160_update() 283 memcpy((char *)rctx->buffer + (sizeof(rctx->buffer) - avail), in rmd160_update() 288 memcpy((char *)rctx->buffer + (sizeof(rctx->buffer) - avail), in rmd160_update() 291 rmd160_transform(rctx->state, rctx->buffer); in rmd160_update() 295 while (len >= sizeof(rctx->buffer)) { in rmd160_update() 296 memcpy(rctx->buffer, data, sizeof(rctx->buffer)); in rmd160_update() 297 rmd160_transform(rctx->state, rctx->buffer); in rmd160_update() 298 data += sizeof(rctx->buffer); in rmd160_update() [all …]
|
D | crct10dif_common.c | 70 __u16 crc_t10dif_generic(__u16 crc, const unsigned char *buffer, size_t len) in crc_t10dif_generic() argument 75 crc = (crc << 8) ^ t10_dif_crc_table[((crc >> 8) ^ buffer[i]) & 0xff]; in crc_t10dif_generic()
|
D | sm2.c | 352 unsigned char *buffer; in sm2_verify() local 360 buffer = kmalloc(req->src_len + req->dst_len, GFP_KERNEL); in sm2_verify() 361 if (!buffer) in sm2_verify() 366 buffer, req->src_len + req->dst_len, 0); in sm2_verify() 371 buffer, req->src_len); in sm2_verify() 376 hash = mpi_read_raw_data(buffer + req->src_len, req->dst_len); in sm2_verify() 386 kfree(buffer); in sm2_verify()
|
D | nhpoly1305.c | 165 memcpy(&state->buffer[state->buflen], src, bytes); in crypto_nhpoly1305_update_helper() 169 nhpoly1305_units(state, key, state->buffer, NH_MESSAGE_UNIT, in crypto_nhpoly1305_update_helper() 184 memcpy(state->buffer, src, srclen); in crypto_nhpoly1305_update_helper() 204 memset(&state->buffer[state->buflen], 0, in crypto_nhpoly1305_final_helper() 206 nhpoly1305_units(state, key, state->buffer, NH_MESSAGE_UNIT, in crypto_nhpoly1305_final_helper()
|
D | streebog_generic.c | 927 memset(ctx->buffer + ctx->fillsize, 0, in streebog_pad() 928 sizeof(ctx->buffer) - ctx->fillsize); in streebog_pad() 930 ctx->buffer[ctx->fillsize] = 1; in streebog_pad() 1012 memcpy(&ctx->buffer[ctx->fillsize], data, chunksize); in streebog_update() 1018 streebog_stage2(ctx, ctx->buffer); in streebog_update() 1030 memcpy(&ctx->buffer, data, len); in streebog_update()
|
D | aead.c | 27 u8 *buffer, *alignbuffer; in setkey_unaligned() local 31 buffer = kmalloc(absize, GFP_ATOMIC); in setkey_unaligned() 32 if (!buffer) in setkey_unaligned() 35 alignbuffer = (u8 *)ALIGN((unsigned long)buffer, alignmask + 1); in setkey_unaligned() 39 kfree(buffer); in setkey_unaligned()
|
D | ghash-generic.c | 83 u8 *dst = dctx->buffer; in ghash_update() 117 u8 *dst = dctx->buffer; in ghash_flush() 135 u8 *buf = dctx->buffer; in ghash_final()
|
D | ahash.c | 142 u8 *buffer, *alignbuffer; in ahash_setkey_unaligned() local 146 buffer = kmalloc(absize, GFP_KERNEL); in ahash_setkey_unaligned() 147 if (!buffer) in ahash_setkey_unaligned() 150 alignbuffer = (u8 *)ALIGN((unsigned long)buffer, alignmask + 1); in ahash_setkey_unaligned() 153 kfree_sensitive(buffer); in ahash_setkey_unaligned()
|
D | shash.c | 48 u8 *buffer, *alignbuffer; in shash_setkey_unaligned() local 52 buffer = kmalloc(absize, GFP_ATOMIC); in shash_setkey_unaligned() 53 if (!buffer) in shash_setkey_unaligned() 56 alignbuffer = (u8 *)ALIGN((unsigned long)buffer, alignmask + 1); in shash_setkey_unaligned() 59 kfree_sensitive(buffer); in shash_setkey_unaligned()
|