Home
last modified time | relevance | path

Searched refs:digest_size (Results 1 – 11 of 11) sorted by relevance

/crypto/
Dfips140-selftests.c95 size_t digest_size; member
412 if (WARN_ON(vec->digest_size > HASH_MAX_DIGESTSIZE)) in fips_test_hash()
421 if (crypto_shash_digestsize(tfm) != vec->digest_size) { in fips_test_hash()
441 err = fips_check_result(digest, vec->digest, vec->digest_size, in fips_test_hash()
454 if (WARN_ON(vec->digest_size != SHA256_DIGEST_SIZE)) in fips_test_sha256_library()
458 return fips_check_result(digest, vec->digest, vec->digest_size, in fips_test_sha256_library()
620 .digest_size = sizeof(fips_aes_cmac_digest),
797 .digest_size = sizeof(fips_sha1_digest)
818 .digest_size = sizeof(fips_sha256_digest)
833 .digest_size = sizeof(fips_sha256_digest)
[all …]
Dsha3_generic.c164 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); in crypto_sha3_init() local
166 sctx->rsiz = 200 - 2 * digest_size; in crypto_sha3_init()
217 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); in crypto_sha3_final() local
229 for (i = 0; i < digest_size / 8; i++) in crypto_sha3_final()
232 if (digest_size & 4) in crypto_sha3_final()
Dblake2b_generic.c136 #define BLAKE2B_ALG(name, driver_name, digest_size) \ argument
145 .digestsize = digest_size, \
Drsa-pkcs1pad.c385 unsigned int ps_end, digest_size = 0; in pkcs1pad_sign() local
391 digest_size = digest_info->size; in pkcs1pad_sign()
393 if (req->src_len + digest_size > ctx->key_size - 11) in pkcs1pad_sign()
406 ps_end = ctx->key_size - digest_size - req->src_len - 2; in pkcs1pad_sign()
Dstreebog_generic.c911 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); in streebog_init() local
916 if (digest_size == STREEBOG256_DIGEST_SIZE) in streebog_init()
/crypto/asymmetric_keys/
Dverify_pefile.c327 size_t digest_size, desc_size; in pefile_digest_pe() local
341 digest_size = crypto_shash_digestsize(tfm); in pefile_digest_pe()
343 if (digest_size != ctx->digest_len) { in pefile_digest_pe()
345 digest_size, ctx->digest_len); in pefile_digest_pe()
349 pr_debug("Digest: desc=%zu size=%zu\n", desc_size, digest_size); in pefile_digest_pe()
352 desc = kzalloc(desc_size + digest_size, GFP_KERNEL); in pefile_digest_pe()
Dpkcs7_verify.c48 sig->digest_size = crypto_shash_digestsize(tfm); in pkcs7_digest()
51 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL); in pkcs7_digest()
81 if (sinfo->msgdigest_len != sig->digest_size) { in pkcs7_digest()
101 memset(sig->digest, 0, sig->digest_size); in pkcs7_digest()
142 *len = sinfo->sig->digest_size; in pkcs7_get_digest()
Dx509_public_key.c67 sig->digest_size = crypto_shash_digestsize(tfm); in x509_get_sig_params()
70 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL); in x509_get_sig_params()
84 ret = is_hash_blacklisted(sig->digest, sig->digest_size, "tbs"); in x509_get_sig_params()
87 sig->digest_size, sig->digest); in x509_get_sig_params()
Dpublic_key.c425 sig->s_size + sig->digest_size); in public_key_verify_signature()
451 memcpy(buf + sig->s_size, sig->digest, sig->digest_size); in public_key_verify_signature()
453 sg_init_one(&src_sg, buf, sig->s_size + sig->digest_size); in public_key_verify_signature()
455 sig->digest_size); in public_key_verify_signature()
Dasym_tpm.c775 sg_set_buf(&src_sg[1], sig->digest, sig->digest_size); in tpm_key_verify_signature()
777 sig->digest_size); in tpm_key_verify_signature()
Dasymmetric_type.c569 .digest_size = params->in_len, in asymmetric_key_verify_signature()