| /crypto/krb5/ |
| A D | rfc8009_aes2.c | 41 void *buffer; in rfc8009_calc_KDF_HMAC_SHA2() local 65 if (!buffer) in rfc8009_calc_KDF_HMAC_SHA2() 68 desc = buffer; in rfc8009_calc_KDF_HMAC_SHA2() 74 p = data.data = buffer + in rfc8009_calc_KDF_HMAC_SHA2() 93 K1.data = buffer + in rfc8009_calc_KDF_HMAC_SHA2() 182 void *buffer; in rfc8009_encrypt() local 199 if (!buffer) in rfc8009_encrypt() 202 req = buffer; in rfc8009_encrypt() 259 void *buffer; in rfc8009_decrypt() local 272 if (!buffer) in rfc8009_decrypt() [all …]
|
| A D | rfc3961_simplified.c | 395 void *buffer; in rfc3961_calc_PRF() local 404 if (!buffer) in rfc3961_calc_PRF() 549 void *buffer; in krb5_aead_encrypt() local 566 if (!buffer) in krb5_aead_encrypt() 587 req = buffer; in krb5_aead_encrypt() 615 void *buffer; in krb5_aead_decrypt() local 628 if (!buffer) in krb5_aead_decrypt() 632 req = buffer; in krb5_aead_decrypt() 673 if (!buffer) in rfc3961_get_mic() 677 desc = buffer; in rfc3961_get_mic() [all …]
|
| A D | rfc6803_camellia.c | 35 void *buffer; in rfc6803_calc_KDF_FEEDBACK_CMAC() local 55 if (!buffer) in rfc6803_calc_KDF_FEEDBACK_CMAC() 58 desc = buffer; in rfc6803_calc_KDF_FEEDBACK_CMAC() 61 K.data = buffer + in rfc6803_calc_KDF_FEEDBACK_CMAC() 64 data.data = buffer + in rfc6803_calc_KDF_FEEDBACK_CMAC() 102 kfree_sensitive(buffer); in rfc6803_calc_KDF_FEEDBACK_CMAC() 126 void *buffer; in rfc6803_calc_PRF() local 144 if (!buffer) in rfc6803_calc_PRF() 147 Kp.data = buffer + in rfc6803_calc_PRF() 160 desc = buffer; in rfc6803_calc_PRF() [all …]
|
| A D | krb5_kdf.c | 40 void *buffer; in crypto_krb5_calc_PRFplus() local 47 buffer = kzalloc(round16(L + Tn.len) + round16(n_S.len), gfp); in crypto_krb5_calc_PRFplus() 48 if (!buffer) in crypto_krb5_calc_PRFplus() 51 T_series.data = buffer; in crypto_krb5_calc_PRFplus() 52 n_S.data = buffer + round16(L + Tn.len); in crypto_krb5_calc_PRFplus() 70 kfree_sensitive(buffer); in crypto_krb5_calc_PRFplus()
|
| /crypto/ |
| A D | scatterwalk.c | 154 void *buffer; in skcipher_next_slow() local 156 if (!walk->buffer) in skcipher_next_slow() 158 buffer = walk->buffer; in skcipher_next_slow() 159 if (!buffer) { in skcipher_next_slow() 164 if (!buffer) in skcipher_next_slow() 166 walk->buffer = buffer; in skcipher_next_slow() 169 buffer = PTR_ALIGN(buffer, alignmask + 1); in skcipher_next_slow() 171 walk->out.__addr = buffer; in skcipher_next_slow() 264 if (!walk->buffer) in skcipher_copy_iv() 280 walk->buffer = NULL; in skcipher_walk_first() [all …]
|
| A D | cipher.c | 26 u8 *buffer, *alignbuffer; in setkey_unaligned() local 30 buffer = kmalloc(absize, GFP_ATOMIC); in setkey_unaligned() 31 if (!buffer) in setkey_unaligned() 34 alignbuffer = (u8 *)ALIGN((unsigned long)buffer, alignmask + 1); in setkey_unaligned() 37 kfree_sensitive(buffer); in setkey_unaligned() 68 u8 buffer[MAX_CIPHER_BLOCKSIZE + MAX_CIPHER_ALIGNMASK]; in cipher_crypt_one() local 69 u8 *tmp = (u8 *)ALIGN((unsigned long)buffer, alignmask + 1); in cipher_crypt_one()
|
| A D | wp512.c | 780 const u8 *buffer) { in wp512_process_buffer() argument 788 block[i] = get_unaligned_be64(buffer + i * 8); in wp512_process_buffer() 1036 u8 buffer[WP512_BLOCK_SIZE]; in wp512_finup() local 1039 memcpy(buffer, src, bufferPos); in wp512_finup() 1040 buffer[bufferPos] = 0x80U; in wp512_finup() 1044 memset(&buffer[bufferPos], 0, WP512_BLOCK_SIZE - bufferPos); in wp512_finup() 1045 wp512_process_buffer(wctx, buffer); in wp512_finup() 1049 memset(&buffer[bufferPos], 0, in wp512_finup() 1052 memcpy(&buffer[WP512_BLOCK_SIZE - WP512_LENGTHBYTES], in wp512_finup() 1054 wp512_process_buffer(wctx, buffer); in wp512_finup() [all …]
|
| A D | polyval-generic.c | 63 u8 buffer[POLYVAL_BLOCK_SIZE]; member 120 crypto_xor(dctx->buffer, tmp, POLYVAL_BLOCK_SIZE); in polyval_update() 140 copy_and_reverse(dst, dctx->buffer); in polyval_finup() 148 copy_and_reverse(out, dctx->buffer); in polyval_export() 156 copy_and_reverse(dctx->buffer, in); in polyval_import()
|
| A D | nhpoly1305.c | 165 memcpy(&state->buffer[state->buflen], src, bytes); in crypto_nhpoly1305_update_helper() 169 nhpoly1305_units(state, key, state->buffer, NH_MESSAGE_UNIT, in crypto_nhpoly1305_update_helper() 184 memcpy(state->buffer, src, srclen); in crypto_nhpoly1305_update_helper() 204 memset(&state->buffer[state->buflen], 0, in crypto_nhpoly1305_final_helper() 206 nhpoly1305_units(state, key, state->buffer, NH_MESSAGE_UNIT, in crypto_nhpoly1305_final_helper()
|
| A D | ghash-generic.c | 83 u8 *dst = dctx->buffer; in ghash_update() 100 u8 *dst = dctx->buffer; in ghash_flush() 112 u8 *buf = dctx->buffer; in ghash_finup()
|
| A D | aead.c | 29 u8 *buffer, *alignbuffer; in setkey_unaligned() local 33 buffer = kmalloc(absize, GFP_ATOMIC); in setkey_unaligned() 34 if (!buffer) in setkey_unaligned() 37 alignbuffer = (u8 *)ALIGN((unsigned long)buffer, alignmask + 1); in setkey_unaligned() 40 kfree_sensitive(buffer); in setkey_unaligned()
|
| A D | rmd160.c | 272 __le32 buffer[RMD160_BLOCK_SIZE / 4]; in rmd160_update() local 277 memcpy(buffer, data, sizeof(buffer)); in rmd160_update() 278 rmd160_transform(rctx->state, buffer); in rmd160_update() 279 data += sizeof(buffer); in rmd160_update() 280 len -= sizeof(buffer); in rmd160_update() 281 } while (len >= sizeof(buffer)); in rmd160_update() 283 memzero_explicit(buffer, sizeof(buffer)); in rmd160_update()
|
| A D | lskcipher.c | 37 u8 *buffer, *alignbuffer; in lskcipher_setkey_unaligned() local 42 buffer = kmalloc(absize, GFP_ATOMIC); in lskcipher_setkey_unaligned() 43 if (!buffer) in lskcipher_setkey_unaligned() 46 alignbuffer = (u8 *)ALIGN((unsigned long)buffer, alignmask + 1); in lskcipher_setkey_unaligned() 49 kfree_sensitive(buffer); in lskcipher_setkey_unaligned()
|
| A D | skcipher.c | 133 u8 *buffer, *alignbuffer; in skcipher_setkey_unaligned() local 138 buffer = kmalloc(absize, GFP_ATOMIC); in skcipher_setkey_unaligned() 139 if (!buffer) in skcipher_setkey_unaligned() 142 alignbuffer = (u8 *)ALIGN((unsigned long)buffer, alignmask + 1); in skcipher_setkey_unaligned() 145 kfree_sensitive(buffer); in skcipher_setkey_unaligned()
|
| A D | streebog_generic.c | 982 u8 buffer[STREEBOG_BLOCK_SIZE]; in streebog_stage3() member 987 memcpy(u.buffer, src, len); in streebog_stage3() 988 u.buffer[len] = 1; in streebog_stage3()
|
| A D | dh.c | 457 static int dh_safe_prime_set_secret(struct crypto_kpp *tfm, const void *buffer, in dh_safe_prime_set_secret() argument 468 if (buffer) { in dh_safe_prime_set_secret() 469 err = __crypto_dh_decode_key(buffer, len, ¶ms); in dh_safe_prime_set_secret()
|
| A D | sha1.c | 26 static_assert(offsetof(struct sha1_ctx, buf) == offsetof(struct sha1_state, buffer));
|
| /crypto/asymmetric_keys/ |
| A D | mscode_parser.c | 44 char buffer[50]; in mscode_note_content_type() local 46 sprint_oid(value, vlen, buffer, sizeof(buffer)); in mscode_note_content_type() 47 pr_err("Unknown OID: %s\n", buffer); in mscode_note_content_type() 73 char buffer[50]; in mscode_note_digest_algo() local 101 sprint_oid(value, vlen, buffer, sizeof(buffer)); in mscode_note_digest_algo() 102 pr_err("Unknown OID: %s\n", buffer); in mscode_note_digest_algo()
|
| A D | x509_cert_parser.c | 149 char buffer[50]; in x509_note_OID() local 150 sprint_oid(value, vlen, buffer, sizeof(buffer)); in x509_note_OID() 368 char *buffer; in x509_fabricate_name() local 376 if (!buffer) in x509_fabricate_name() 398 if (!buffer) in x509_fabricate_name() 401 memcpy(buffer, in x509_fabricate_name() 403 buffer[ctx->o_size + 0] = ':'; in x509_fabricate_name() 404 buffer[ctx->o_size + 1] = ' '; in x509_fabricate_name() 423 if (!buffer) in x509_fabricate_name() 426 buffer[namesize] = 0; in x509_fabricate_name() [all …]
|
| A D | pkcs8_parser.c | 41 char buffer[50]; in pkcs8_note_OID() local 43 sprint_oid(value, vlen, buffer, sizeof(buffer)); in pkcs8_note_OID() 45 (unsigned long)value - ctx->data, buffer); in pkcs8_note_OID()
|
| A D | pkcs7_parser.c | 212 char buffer[50]; in pkcs7_note_OID() local 213 sprint_oid(value, vlen, buffer, sizeof(buffer)); in pkcs7_note_OID() 215 (unsigned long)value - ctx->data, buffer); in pkcs7_note_OID()
|