Searched refs:digest_size (Results 1 – 11 of 11) sorted by relevance
/crypto/ |
D | fips140-selftests.c | 95 size_t digest_size; member 412 if (WARN_ON(vec->digest_size > HASH_MAX_DIGESTSIZE)) in fips_test_hash() 421 if (crypto_shash_digestsize(tfm) != vec->digest_size) { in fips_test_hash() 441 err = fips_check_result(digest, vec->digest, vec->digest_size, in fips_test_hash() 454 if (WARN_ON(vec->digest_size != SHA256_DIGEST_SIZE)) in fips_test_sha256_library() 458 return fips_check_result(digest, vec->digest, vec->digest_size, in fips_test_sha256_library() 620 .digest_size = sizeof(fips_aes_cmac_digest), 797 .digest_size = sizeof(fips_sha1_digest) 818 .digest_size = sizeof(fips_sha256_digest) 833 .digest_size = sizeof(fips_sha256_digest) [all …]
|
D | sha3_generic.c | 164 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); in crypto_sha3_init() local 166 sctx->rsiz = 200 - 2 * digest_size; in crypto_sha3_init() 217 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); in crypto_sha3_final() local 229 for (i = 0; i < digest_size / 8; i++) in crypto_sha3_final() 232 if (digest_size & 4) in crypto_sha3_final()
|
D | blake2b_generic.c | 136 #define BLAKE2B_ALG(name, driver_name, digest_size) \ argument 145 .digestsize = digest_size, \
|
D | rsa-pkcs1pad.c | 385 unsigned int ps_end, digest_size = 0; in pkcs1pad_sign() local 391 digest_size = digest_info->size; in pkcs1pad_sign() 393 if (req->src_len + digest_size > ctx->key_size - 11) in pkcs1pad_sign() 406 ps_end = ctx->key_size - digest_size - req->src_len - 2; in pkcs1pad_sign()
|
D | streebog_generic.c | 911 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); in streebog_init() local 916 if (digest_size == STREEBOG256_DIGEST_SIZE) in streebog_init()
|
/crypto/asymmetric_keys/ |
D | verify_pefile.c | 327 size_t digest_size, desc_size; in pefile_digest_pe() local 341 digest_size = crypto_shash_digestsize(tfm); in pefile_digest_pe() 343 if (digest_size != ctx->digest_len) { in pefile_digest_pe() 345 digest_size, ctx->digest_len); in pefile_digest_pe() 349 pr_debug("Digest: desc=%zu size=%zu\n", desc_size, digest_size); in pefile_digest_pe() 352 desc = kzalloc(desc_size + digest_size, GFP_KERNEL); in pefile_digest_pe()
|
D | pkcs7_verify.c | 48 sig->digest_size = crypto_shash_digestsize(tfm); in pkcs7_digest() 51 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL); in pkcs7_digest() 81 if (sinfo->msgdigest_len != sig->digest_size) { in pkcs7_digest() 101 memset(sig->digest, 0, sig->digest_size); in pkcs7_digest() 142 *len = sinfo->sig->digest_size; in pkcs7_get_digest()
|
D | x509_public_key.c | 67 sig->digest_size = crypto_shash_digestsize(tfm); in x509_get_sig_params() 70 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL); in x509_get_sig_params() 84 ret = is_hash_blacklisted(sig->digest, sig->digest_size, "tbs"); in x509_get_sig_params() 87 sig->digest_size, sig->digest); in x509_get_sig_params()
|
D | public_key.c | 425 sig->s_size + sig->digest_size); in public_key_verify_signature() 451 memcpy(buf + sig->s_size, sig->digest, sig->digest_size); in public_key_verify_signature() 453 sg_init_one(&src_sg, buf, sig->s_size + sig->digest_size); in public_key_verify_signature() 455 sig->digest_size); in public_key_verify_signature()
|
D | asym_tpm.c | 775 sg_set_buf(&src_sg[1], sig->digest, sig->digest_size); in tpm_key_verify_signature() 777 sig->digest_size); in tpm_key_verify_signature()
|
D | asymmetric_type.c | 569 .digest_size = params->in_len, in asymmetric_key_verify_signature()
|