| /arch/s390/purgatory/ |
| A D | purgatory.c | 18 u8 digest[SHA256_DIGEST_SIZE]; in verify_sha256_digest() local 27 sha256_final(&sctx, digest); in verify_sha256_digest() 29 if (memcmp(digest, purgatory_sha256_digest, sizeof(digest))) in verify_sha256_digest()
|
| /arch/riscv/purgatory/ |
| A D | purgatory.c | 24 u8 digest[SHA256_DIGEST_SIZE]; in verify_sha256_digest() local 30 sha256_final(&sctx, digest); in verify_sha256_digest() 31 if (memcmp(digest, purgatory_sha256_digest, sizeof(digest)) != 0) in verify_sha256_digest()
|
| /arch/x86/purgatory/ |
| A D | purgatory.c | 27 u8 digest[SHA256_DIGEST_SIZE]; in verify_sha256_digest() local 36 sha256_final(&sctx, digest); in verify_sha256_digest() 38 if (memcmp(digest, purgatory_sha256_digest, sizeof(digest))) in verify_sha256_digest()
|
| /arch/arm64/crypto/ |
| A D | sm4-ce-glue.c | 47 asmlinkage void sm4_ce_mac_update(const u32 *rkey_enc, u8 *digest, 66 u8 digest[SM4_BLOCK_SIZE]; member 591 memset(ctx->digest, 0, SM4_BLOCK_SIZE); in sm4_mac_init() 604 sm4_ce_mac_update(tctx->key.rkey_enc, ctx->digest, p, in sm4_mac_update() 617 crypto_xor(ctx->digest, src, len); in sm4_cmac_finup() 619 ctx->digest[len] ^= 0x80; in sm4_cmac_finup() 626 memcpy(out, ctx->digest, SM4_BLOCK_SIZE); in sm4_cmac_finup() 637 crypto_xor(ctx->digest, src, len); in sm4_cbcmac_finup() 639 sm4_ce_crypt_block(tctx->key.rkey_enc, ctx->digest, in sm4_cbcmac_finup() 640 ctx->digest); in sm4_cbcmac_finup() [all …]
|
| A D | sha3-ce-glue.c | 63 __le64 *digest = (__le64 *)out; in sha3_finup() local 82 put_unaligned_le64(sctx->st[i], digest++); in sha3_finup() 85 put_unaligned_le32(sctx->st[i], (__le32 *)digest); in sha3_finup()
|
| A D | ghash-ce-glue.c | 38 u64 digest[GHASH_DIGEST_SIZE/sizeof(u64)]; member 98 ghash_do_simd_update(chunk, ctx->digest, src, key, NULL, in ghash_update() 111 put_unaligned_be64(ctx->digest[1], dst); in ghash_export() 112 put_unaligned_be64(ctx->digest[0], dst + 8); in ghash_export() 121 ctx->digest[1] = get_unaligned_be64(src); in ghash_import() 122 ctx->digest[0] = get_unaligned_be64(src + 8); in ghash_import() 136 ghash_do_simd_update(1, ctx->digest, src, key, NULL, in ghash_finup()
|
| A D | nhpoly1305-neon-glue.c | 55 .digest = nhpoly1305_neon_digest,
|
| A D | aes-glue.c | 167 u8 digest[SHA256_DIGEST_SIZE]; in essiv_cbc_set_key() local 174 crypto_shash_tfm_digest(ctx->hash, in_key, key_len, digest); in essiv_cbc_set_key() 176 return aes_expandkey(&ctx->key2, digest, sizeof(digest)); in essiv_cbc_set_key()
|
| /arch/arm/crypto/ |
| A D | ghash-ce-glue.c | 50 u64 digest[GHASH_DIGEST_SIZE/sizeof(u64)]; member 88 ghash_do_update(blocks, ctx->digest, src, key, NULL); in ghash_update() 97 put_unaligned_be64(ctx->digest[1], dst); in ghash_export() 98 put_unaligned_be64(ctx->digest[0], dst + 8); in ghash_export() 107 ctx->digest[1] = get_unaligned_be64(src); in ghash_import() 108 ctx->digest[0] = get_unaligned_be64(src + 8); in ghash_import() 122 ghash_do_update(1, ctx->digest, buf, key, NULL); in ghash_finup()
|
| A D | nhpoly1305-neon-glue.c | 55 .digest = nhpoly1305_neon_digest,
|
| A D | Kconfig | 59 BLAKE2b digest algorithm optimized with ARM NEON instructions.
|
| /arch/s390/crypto/ |
| A D | hmac_s390.c | 102 u8 *digest, unsigned int digestsize, bool final) in hash_data() argument 156 memcpy(digest, ¶m, digestsize); in hash_data() 162 u8 *digest, unsigned int digestsize) in hash_key() argument 164 return hash_data(in, inlen, digest, digestsize, true); in hash_key() 342 .digest = s390_hmac_sha2_digest, \
|
| A D | phmac_s390.c | 193 u8 *digest, unsigned int digestsize) in hash_key() argument 243 memcpy(digest, ¶m, digestsize); in hash_key() 920 .digest = phmac_digest, \
|
| /arch/mips/crypto/ |
| A D | Kconfig | 11 MD5 message digest algorithm (RFC1321)
|
| /arch/x86/crypto/ |
| A D | nhpoly1305-avx2-glue.c | 55 .digest = nhpoly1305_avx2_digest,
|
| A D | nhpoly1305-sse2-glue.c | 55 .digest = nhpoly1305_sse2_digest,
|
| /arch/x86/kernel/cpu/microcode/ |
| A D | amd.c | 219 u8 digest[SHA256_DIGEST_SIZE]; in verify_sha256_digest() local 237 sha256(data, len, digest); in verify_sha256_digest() 239 if (memcmp(digest, pd->sha256, sizeof(digest))) { in verify_sha256_digest() 243 pr_cont("0x%x ", digest[i]); in verify_sha256_digest()
|
| /arch/sparc/crypto/ |
| A D | Kconfig | 25 MD5 message digest algorithm (RFC1321)
|
| A D | md5_glue.c | 33 asmlinkage void md5_sparc64_transform(__le32 *digest, const char *data,
|
| /arch/powerpc/crypto/ |
| A D | Kconfig | 22 MD5 message digest algorithm (RFC1321)
|
| A D | aes-gcm-p10.S | 168 # H: returning digest 171 # S1 should xor with the previous digest
|