/crypto/ |
D | testmgr.h | 40 const char *digest; member 2881 .digest = "\x31\xd6\xcf\xe0\xd1\x6a\xe9\x31" 2886 .digest = "\xbd\xe5\x2c\xb3\x1d\xe3\x3e\x46" 2891 .digest = "\xa4\x48\x01\x7a\xaf\x21\xd8\x52" 2896 .digest = "\xd9\x13\x0a\x81\x64\x54\x9f\xe8" 2901 .digest = "\xd7\x9e\x1c\x30\x8a\xa5\xbb\xcd" 2906 .digest = "\x04\x3f\x85\x82\xf2\x41\xdb\x35" 2912 .digest = "\xe3\x3b\x4d\xdc\x9c\x38\xf2\x19" 2920 .digest = "\x6b\x4e\x03\x42\x36\x67\xdb\xb7" 2927 .digest = "\x9e\x86\xff\x69\x55\x7c\xa9\x5f" [all …]
|
D | fips140-selftests.c | 94 const u8 *digest; member 409 u8 digest[HASH_MAX_DIGESTSIZE]; in fips_test_hash() local 436 digest); in fips_test_hash() 441 err = fips_check_result(digest, vec->digest, vec->digest_size, in fips_test_hash() 452 u8 digest[SHA256_DIGEST_SIZE]; in fips_test_sha256_library() local 457 sha256(vec->message, vec->message_size, digest); in fips_test_sha256_library() 458 return fips_check_result(digest, vec->digest, vec->digest_size, in fips_test_sha256_library() 619 .digest = fips_aes_cmac_digest, 796 .digest = fips_sha1_digest, 817 .digest = fips_sha256_digest, [all …]
|
D | ecrdsa.c | 40 const char *digest; /* digest name from oid */ member 76 unsigned char digest[STREEBOG512_DIGEST_SIZE]; in ecrdsa_verify() local 93 !ctx->digest || in ecrdsa_verify() 101 WARN_ON(req->dst_len > sizeof(digest))) in ecrdsa_verify() 109 digest, req->dst_len, req->src_len); in ecrdsa_verify() 123 vli_from_le64(e, digest, ndigits); in ecrdsa_verify() 209 ctx->digest = "streebog256"; in ecrdsa_set_pub_key() 213 ctx->digest = "streebog512"; in ecrdsa_set_pub_key()
|
D | hctr2.c | 194 u8 digest[POLYVAL_DIGEST_SIZE]) in hctr2_hash_message() 226 return crypto_shash_final(hash_desc, digest); in hctr2_hash_message() 234 u8 digest[POLYVAL_DIGEST_SIZE]; in hctr2_finish() local 244 err = hctr2_hash_message(req, rctx->bulk_part_dst, digest); in hctr2_finish() 247 crypto_xor(rctx->first_block, digest, BLOCKCIPHER_BLOCK_SIZE); in hctr2_finish() 271 u8 digest[POLYVAL_DIGEST_SIZE]; in hctr2_crypt() local 294 err = hctr2_hash_message(req, rctx->bulk_part_src, digest); in hctr2_crypt() 297 crypto_xor(digest, rctx->first_block, BLOCKCIPHER_BLOCK_SIZE); in hctr2_crypt() 303 digest); in hctr2_crypt() 306 digest); in hctr2_crypt() [all …]
|
D | fips140-module.c | 458 u8 digest[SHA256_DIGEST_SIZE]; in check_fips140_module_hmac() local 512 crypto_shash_finup(desc, rodatacopy, rodatasize, digest); in check_fips140_module_hmac() 522 if (memcmp(digest, fips140_integ_hmac_digest, sizeof(digest))) { in check_fips140_module_hmac() 523 pr_err("provided_digest : %*phN\n", (int)sizeof(digest), in check_fips140_module_hmac() 526 pr_err("calculated digest: %*phN\n", (int)sizeof(digest), in check_fips140_module_hmac() 527 digest); in check_fips140_module_hmac() 539 memzero_explicit(digest, sizeof(digest)); in check_fips140_module_hmac()
|
D | adiantum.c | 248 struct scatterlist *sgl, le128 *digest) in adiantum_hash_message() argument 278 return crypto_shash_final(hash_desc, (u8 *)digest); in adiantum_hash_message() 288 le128 digest; in adiantum_finish() local 301 err = adiantum_hash_message(req, req->dst, &digest); in adiantum_finish() 304 le128_add(&digest, &digest, &rctx->header_hash); in adiantum_finish() 305 le128_sub(&rctx->rbuf.bignum, &rctx->rbuf.bignum, &digest); in adiantum_finish() 329 le128 digest; in adiantum_crypt() local 343 err = adiantum_hash_message(req, req->src, &digest); in adiantum_crypt() 346 le128_add(&digest, &digest, &rctx->header_hash); in adiantum_crypt() 349 le128_add(&rctx->rbuf.bignum, &rctx->rbuf.bignum, &digest); in adiantum_crypt()
|
D | ecrdsa_params.asn1 | 3 digest OBJECT IDENTIFIER OPTIONAL ({ ecrdsa_param_digest })
|
D | Kconfig | 743 tristate "BLAKE2b digest algorithm" 760 bool "BLAKE2s digest algorithm (x86 accelerated version)" 856 tristate "MD4 digest algorithm" 859 MD4 message digest algorithm (RFC1320). 862 tristate "MD5 digest algorithm" 865 MD5 message digest algorithm (RFC1321). 868 tristate "MD5 digest algorithm (OCTEON)" 873 MD5 message digest algorithm (RFC1321) implemented 877 tristate "MD5 digest algorithm (PPC)" 881 MD5 message digest algorithm (RFC1321) implemented [all …]
|
D | sha3_generic.c | 218 __le64 *digest = (__le64 *)out; in crypto_sha3_final() local 230 put_unaligned_le64(sctx->st[i], digest++); in crypto_sha3_final() 233 put_unaligned_le32(sctx->st[i], (__le32 *)digest); in crypto_sha3_final()
|
D | streebog_generic.c | 1036 static int streebog_final(struct shash_desc *desc, u8 *digest) in streebog_final() argument 1043 memcpy(digest, &ctx->hash.qword[4], STREEBOG256_DIGEST_SIZE); in streebog_final() 1045 memcpy(digest, &ctx->hash.qword[0], STREEBOG512_DIGEST_SIZE); in streebog_final()
|
D | shash.c | 217 return shash->digest(desc, data, len, out); in crypto_shash_digest() 401 crt->digest = shash_async_digest; in crypto_init_shash_ops_async() 542 if (!alg->digest) in shash_prepare_alg() 543 alg->digest = shash_digest_unaligned; in shash_prepare_alg()
|
D | crct10dif_generic.c | 94 .digest = chksum_digest,
|
D | xxhash_generic.c | 76 .digest = xxhash64_digest,
|
D | crc32_generic.c | 100 .digest = crc32_digest,
|
D | crc32c_generic.c | 137 .digest = chksum_digest,
|
D | ahash.c | 379 ret = crypto_ahash_op(req, tfm->digest); in crypto_ahash_digest() 469 hash->digest = alg->digest; in crypto_ahash_init_tfm()
|
D | wp512.c | 1073 __be64 *digest = (__be64 *)out; in wp512_final() local 1091 digest[i] = cpu_to_be64(wctx->hash[i]); in wp512_final()
|
/crypto/asymmetric_keys/ |
D | pkcs7_verify.c | 34 if (sig->digest) in pkcs7_digest() 51 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL); in pkcs7_digest() 52 if (!sig->digest) in pkcs7_digest() 63 sig->digest); in pkcs7_digest() 66 pr_devel("MsgDigest = [%*ph]\n", 8, sig->digest); in pkcs7_digest() 88 if (memcmp(sig->digest, sinfo->msgdigest, in pkcs7_digest() 101 memset(sig->digest, 0, sig->digest_size); in pkcs7_digest() 111 sinfo->authattrs_len, sig->digest); in pkcs7_digest() 114 pr_devel("AADigest = [%*ph]\n", 8, sig->digest); in pkcs7_digest() 141 *buf = sinfo->sig->digest; in pkcs7_get_digest()
|
D | verify_pefile.c | 328 void *digest; in pefile_digest_pe() local 365 digest = (void *)desc + desc_size; in pefile_digest_pe() 366 ret = crypto_shash_final(desc, digest); in pefile_digest_pe() 370 pr_debug("Digest calc = [%*ph]\n", ctx->digest_len, digest); in pefile_digest_pe() 375 if (memcmp(digest, ctx->digest, ctx->digest_len) != 0) { in pefile_digest_pe() 446 ctx.digest_len, ctx.digest_len, ctx.digest); in verify_pefile_signature() 454 kfree_sensitive(ctx.digest); in verify_pefile_signature()
|
D | x509_public_key.c | 70 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL); in x509_get_sig_params() 71 if (!sig->digest) in x509_get_sig_params() 80 ret = crypto_shash_digest(desc, cert->tbs, cert->tbs_size, sig->digest); in x509_get_sig_params() 84 ret = is_hash_blacklisted(sig->digest, sig->digest_size, "tbs"); in x509_get_sig_params() 87 sig->digest_size, sig->digest); in x509_get_sig_params()
|
D | mscode_parser.c | 122 ctx->digest = kmemdup(value, vlen, GFP_KERNEL); in mscode_note_digest() 123 if (!ctx->digest) in mscode_note_digest()
|
D | verify_pefile.h | 23 const void *digest; /* Digest */ member
|
D | mscode.asn1 | 19 digest OCTET STRING ({ mscode_note_digest })
|
D | signature.c | 31 kfree(sig->digest); in public_key_signature_free()
|
D | public_key.c | 357 ret = crypto_shash_finup(desc, sig->data, sig->data_size, sig->digest); in cert_sig_digest_update() 451 memcpy(buf + sig->s_size, sig->digest, sig->digest_size); in public_key_verify_signature()
|