/crypto/asymmetric_keys/ |
D | mscode_parser.c | 44 char buffer[50]; in mscode_note_content_type() local 46 sprint_oid(value, vlen, buffer, sizeof(buffer)); in mscode_note_content_type() 47 pr_err("Unknown OID: %s\n", buffer); in mscode_note_content_type() 73 char buffer[50]; in mscode_note_digest_algo() local 101 sprint_oid(value, vlen, buffer, sizeof(buffer)); in mscode_note_digest_algo() 102 pr_err("Unknown OID: %s\n", buffer); in mscode_note_digest_algo()
|
D | x509_cert_parser.c | 161 char buffer[50]; in x509_note_OID() local 162 sprint_oid(value, vlen, buffer, sizeof(buffer)); in x509_note_OID() 164 (unsigned long)value - ctx->data, buffer); in x509_note_OID() 372 char *buffer; in x509_fabricate_name() local 379 buffer = kmalloc(1, GFP_KERNEL); in x509_fabricate_name() 380 if (!buffer) in x509_fabricate_name() 382 buffer[0] = 0; in x509_fabricate_name() 401 buffer = kmalloc(ctx->o_size + 2 + ctx->cn_size + 1, in x509_fabricate_name() 403 if (!buffer) in x509_fabricate_name() 406 memcpy(buffer, in x509_fabricate_name() [all …]
|
D | pkcs8_parser.c | 41 char buffer[50]; in pkcs8_note_OID() local 43 sprint_oid(value, vlen, buffer, sizeof(buffer)); in pkcs8_note_OID() 45 (unsigned long)value - ctx->data, buffer); in pkcs8_note_OID()
|
D | pkcs7_parser.c | 212 char buffer[50]; in pkcs7_note_OID() local 213 sprint_oid(value, vlen, buffer, sizeof(buffer)); in pkcs7_note_OID() 215 (unsigned long)value - ctx->data, buffer); in pkcs7_note_OID()
|
/crypto/ |
D | wp512.c | 40 u8 buffer[WP512_BLOCK_SIZE]; member 788 const __be64 *buffer = (const __be64 *)wctx->buffer; in wp512_process_buffer() local 791 block[i] = be64_to_cpu(buffer[i]); in wp512_process_buffer() 995 wctx->buffer[0] = 0; in wp512_init() 1013 u8 *buffer = wctx->buffer; in wp512_update() local 1028 buffer[bufferPos++] |= (u8)(b >> bufferRem); in wp512_update() 1034 buffer[bufferPos] = b << (8 - bufferRem); in wp512_update() 1041 buffer[bufferPos] |= b >> bufferRem; in wp512_update() 1055 buffer[bufferPos] = b << (8 - bufferRem); in wp512_update() 1069 u8 *buffer = wctx->buffer; in wp512_final() local [all …]
|
D | cipher.c | 26 u8 *buffer, *alignbuffer; in setkey_unaligned() local 30 buffer = kmalloc(absize, GFP_ATOMIC); in setkey_unaligned() 31 if (!buffer) in setkey_unaligned() 34 alignbuffer = (u8 *)ALIGN((unsigned long)buffer, alignmask + 1); in setkey_unaligned() 37 kfree_sensitive(buffer); in setkey_unaligned() 68 u8 buffer[MAX_CIPHER_BLOCKSIZE + MAX_CIPHER_ALIGNMASK]; in cipher_crypt_one() local 69 u8 *tmp = (u8 *)ALIGN((unsigned long)buffer, alignmask + 1); in cipher_crypt_one()
|
D | skcipher.c | 43 u8 buffer[]; member 116 addr = (u8 *)ALIGN((unsigned long)walk->buffer, walk->alignmask + 1); in skcipher_done_slow() 182 if (!((unsigned long)walk->buffer | (unsigned long)walk->page)) in skcipher_walk_done() 190 if (walk->buffer != walk->page) in skcipher_walk_done() 191 kfree(walk->buffer); in skcipher_walk_done() 212 data = PTR_ALIGN(&p->buffer[0], walk->alignmask + 1); in skcipher_walk_complete() 229 if (walk->buffer != walk->page) in skcipher_walk_complete() 230 kfree(walk->buffer); in skcipher_walk_complete() 250 u8 *buffer; in skcipher_next_slow() local 254 if (!walk->buffer) in skcipher_next_slow() [all …]
|
D | polyval-generic.c | 63 u8 buffer[POLYVAL_BLOCK_SIZE]; member 163 pos = dctx->buffer + dctx->bytes - 1; in polyval_update() 177 crypto_xor(dctx->buffer, tmp, POLYVAL_BLOCK_SIZE); in polyval_update() 185 pos = dctx->buffer + POLYVAL_BLOCK_SIZE - 1; in polyval_update() 200 copy_and_reverse(dst, dctx->buffer); in polyval_final()
|
D | ecdsa.c | 147 unsigned char *buffer; in ecdsa_verify() local 154 buffer = kmalloc(req->src_len + req->dst_len, GFP_KERNEL); in ecdsa_verify() 155 if (!buffer) in ecdsa_verify() 160 buffer, req->src_len + req->dst_len, 0); in ecdsa_verify() 163 buffer, req->src_len); in ecdsa_verify() 172 memcpy(&rawhash[diff], buffer + req->src_len, req->dst_len); in ecdsa_verify() 175 memcpy(&rawhash, buffer + req->src_len, keylen); in ecdsa_verify() 183 kfree(buffer); in ecdsa_verify()
|
D | crct10dif_common.c | 70 __u16 crc_t10dif_generic(__u16 crc, const unsigned char *buffer, size_t len) in crc_t10dif_generic() argument 75 crc = (crc << 8) ^ t10_dif_crc_table[((crc >> 8) ^ buffer[i]) & 0xff]; in crc_t10dif_generic()
|
D | rmd160.c | 23 __le32 buffer[16]; member 268 memset(rctx->buffer, 0, sizeof(rctx->buffer)); in rmd160_init() 277 const u32 avail = sizeof(rctx->buffer) - (rctx->byte_count & 0x3f); in rmd160_update() 283 memcpy((char *)rctx->buffer + (sizeof(rctx->buffer) - avail), in rmd160_update() 288 memcpy((char *)rctx->buffer + (sizeof(rctx->buffer) - avail), in rmd160_update() 291 rmd160_transform(rctx->state, rctx->buffer); in rmd160_update() 295 while (len >= sizeof(rctx->buffer)) { in rmd160_update() 296 memcpy(rctx->buffer, data, sizeof(rctx->buffer)); in rmd160_update() 297 rmd160_transform(rctx->state, rctx->buffer); in rmd160_update() 298 data += sizeof(rctx->buffer); in rmd160_update() [all …]
|
D | nhpoly1305.c | 165 memcpy(&state->buffer[state->buflen], src, bytes); in crypto_nhpoly1305_update_helper() 169 nhpoly1305_units(state, key, state->buffer, NH_MESSAGE_UNIT, in crypto_nhpoly1305_update_helper() 184 memcpy(state->buffer, src, srclen); in crypto_nhpoly1305_update_helper() 204 memset(&state->buffer[state->buflen], 0, in crypto_nhpoly1305_final_helper() 206 nhpoly1305_units(state, key, state->buffer, NH_MESSAGE_UNIT, in crypto_nhpoly1305_final_helper()
|
D | sm2.c | 382 unsigned char *buffer; in sm2_verify() local 390 buffer = kmalloc(req->src_len + req->dst_len, GFP_KERNEL); in sm2_verify() 391 if (!buffer) in sm2_verify() 396 buffer, req->src_len + req->dst_len, 0); in sm2_verify() 401 buffer, req->src_len); in sm2_verify() 406 hash = mpi_read_raw_data(buffer + req->src_len, req->dst_len); in sm2_verify() 416 kfree(buffer); in sm2_verify()
|
D | streebog_generic.c | 927 memset(ctx->buffer + ctx->fillsize, 0, in streebog_pad() 928 sizeof(ctx->buffer) - ctx->fillsize); in streebog_pad() 930 ctx->buffer[ctx->fillsize] = 1; in streebog_pad() 1012 memcpy(&ctx->buffer[ctx->fillsize], data, chunksize); in streebog_update() 1018 streebog_stage2(ctx, ctx->buffer); in streebog_update() 1030 memcpy(&ctx->buffer, data, len); in streebog_update()
|
D | ghash-generic.c | 83 u8 *dst = dctx->buffer; in ghash_update() 117 u8 *dst = dctx->buffer; in ghash_flush() 135 u8 *buf = dctx->buffer; in ghash_final()
|
D | sm3.c | 191 memcpy(sctx->buffer + partial, data, p); in sm3_update() 195 sm3_block(sctx, sctx->buffer, 1, W); in sm3_update() 211 memcpy(sctx->buffer + partial, data, len); in sm3_update() 218 __be64 *bits = (__be64 *)(sctx->buffer + bit_offset); in sm3_final() 224 sctx->buffer[partial++] = 0x80; in sm3_final() 226 memset(sctx->buffer + partial, 0, SM3_BLOCK_SIZE - partial); in sm3_final() 229 sm3_block(sctx, sctx->buffer, 1, W); in sm3_final() 232 memset(sctx->buffer + partial, 0, bit_offset - partial); in sm3_final() 234 sm3_block(sctx, sctx->buffer, 1, W); in sm3_final()
|
D | aead.c | 37 u8 *buffer, *alignbuffer; in setkey_unaligned() local 41 buffer = kmalloc(absize, GFP_ATOMIC); in setkey_unaligned() 42 if (!buffer) in setkey_unaligned() 45 alignbuffer = (u8 *)ALIGN((unsigned long)buffer, alignmask + 1); in setkey_unaligned() 48 kfree_sensitive(buffer); in setkey_unaligned()
|
D | ahash.c | 135 u8 *buffer, *alignbuffer; in ahash_setkey_unaligned() local 139 buffer = kmalloc(absize, GFP_KERNEL); in ahash_setkey_unaligned() 140 if (!buffer) in ahash_setkey_unaligned() 143 alignbuffer = (u8 *)ALIGN((unsigned long)buffer, alignmask + 1); in ahash_setkey_unaligned() 146 kfree_sensitive(buffer); in ahash_setkey_unaligned()
|
D | shash.c | 47 u8 *buffer, *alignbuffer; in shash_setkey_unaligned() local 51 buffer = kmalloc(absize, GFP_ATOMIC); in shash_setkey_unaligned() 52 if (!buffer) in shash_setkey_unaligned() 55 alignbuffer = (u8 *)ALIGN((unsigned long)buffer, alignmask + 1); in shash_setkey_unaligned() 58 kfree_sensitive(buffer); in shash_setkey_unaligned()
|
D | dh.c | 456 static int dh_safe_prime_set_secret(struct crypto_kpp *tfm, const void *buffer, in dh_safe_prime_set_secret() argument 467 if (buffer) { in dh_safe_prime_set_secret() 468 err = __crypto_dh_decode_key(buffer, len, ¶ms); in dh_safe_prime_set_secret()
|