/Linux-v4.19/crypto/ |
D | testmgr.h | 39 const char *digest; member 998 .digest = "\x31\xd6\xcf\xe0\xd1\x6a\xe9\x31" 1003 .digest = "\xbd\xe5\x2c\xb3\x1d\xe3\x3e\x46" 1008 .digest = "\xa4\x48\x01\x7a\xaf\x21\xd8\x52" 1013 .digest = "\xd9\x13\x0a\x81\x64\x54\x9f\xe8" 1018 .digest = "\xd7\x9e\x1c\x30\x8a\xa5\xbb\xcd" 1025 .digest = "\x04\x3f\x85\x82\xf2\x41\xdb\x35" 1031 .digest = "\xe3\x3b\x4d\xdc\x9c\x38\xf2\x19" 1039 .digest = "\x6b\x4e\x03\x42\x36\x67\xdb\xb7" 1046 .digest = "\x9e\x86\xff\x69\x55\x7c\xa9\x5f" [all …]
|
/Linux-v4.19/security/integrity/ima/ |
D | ima_queue.c | 62 rc = memcmp(qe->entry->digest, digest_value, TPM_DIGEST_SIZE); in ima_lookup_digest_entry() 82 size += sizeof(entry->digest); in get_binary_runtime_size() 114 key = ima_hash_key(entry->digest); in ima_add_digest_entry() 166 u8 digest[TPM_DIGEST_SIZE]; in ima_add_template_entry() local 174 memcpy(digest, entry->digest, sizeof(digest)); in ima_add_template_entry() 175 if (ima_lookup_digest_entry(digest, entry->pcr)) { in ima_add_template_entry() 190 memset(digest, 0xff, sizeof(digest)); in ima_add_template_entry() 192 tpmresult = ima_pcr_extend(digest, entry->pcr); in ima_add_template_entry()
|
D | ima_api.c | 99 char digest[TPM_DIGEST_SIZE]; in ima_store_template() member 116 memcpy(entry->digest, hash.hdr.digest, hash.hdr.length); in ima_store_template() 211 char digest[IMA_MAX_DIGEST_SIZE]; in ima_collect_measurement() member 226 memset(&hash.digest, 0, sizeof(hash.digest)); in ima_collect_measurement() 326 hex_byte_pack(hash + (i * 2), iint->ima_hash->digest[i]); in ima_audit_measurement()
|
D | ima_template_lib.c | 225 static int ima_eventdigest_init_common(u8 *digest, u32 digestsize, u8 hash_algo, in ima_eventdigest_init_common() argument 247 if (digest) in ima_eventdigest_init_common() 248 memcpy(buffer + offset, digest, digestsize); in ima_eventdigest_init_common() 269 char digest[IMA_MAX_DIGEST_SIZE]; in ima_eventdigest_init() member 282 cur_digest = event_data->iint->ima_hash->digest; in ima_eventdigest_init() 300 cur_digest = hash.hdr.digest; in ima_eventdigest_init() 319 cur_digest = event_data->iint->ima_hash->digest; in ima_eventdigest_ng_init()
|
D | ima_crypto.c | 309 ahash_request_set_crypt(req, NULL, hash->digest, 0); in ima_calc_file_hash_atfm() 386 rc = crypto_shash_final(shash, hash->digest); in ima_calc_file_hash_tfm() 490 rc = crypto_shash_final(shash, hash->digest); in ima_calc_field_array_hash_tfm() 546 ahash_request_set_crypt(req, NULL, hash->digest, 0); in calc_buffer_ahash_atfm() 598 rc = crypto_shash_final(shash, hash->digest); in calc_buffer_shash_tfm() 644 static int __init ima_calc_boot_aggregate_tfm(char *digest, in ima_calc_boot_aggregate_tfm() argument 665 crypto_shash_final(shash, digest); in ima_calc_boot_aggregate_tfm() 679 rc = ima_calc_boot_aggregate_tfm(hash->digest, tfm); in ima_calc_boot_aggregate()
|
D | ima.h | 96 u8 digest[TPM_DIGEST_SIZE]; /* sha1 or md5 measurement hash */ member 148 void ima_print_digest(struct seq_file *m, u8 *digest, u32 size); 169 static inline unsigned long ima_hash_key(u8 *digest) in ima_hash_key() argument 171 return hash_long(*digest, IMA_HASH_BITS); in ima_hash_key()
|
/Linux-v4.19/arch/s390/purgatory/ |
D | purgatory.c | 18 u8 digest[SHA256_DIGEST_SIZE]; in verify_sha256_digest() local 27 sha256_final(&sctx, digest); in verify_sha256_digest() 29 if (memcmp(digest, purgatory_sha256_digest, sizeof(digest))) in verify_sha256_digest()
|
/Linux-v4.19/arch/arm64/crypto/ |
D | Kconfig | 13 tristate "SHA-224/SHA-256 digest algorithm for arm64" 17 tristate "SHA-384/SHA-512 digest algorithm for arm64" 21 tristate "SHA-1 digest algorithm (ARMv8 Crypto Extensions)" 27 tristate "SHA-224/SHA-256 digest algorithm (ARMv8 Crypto Extensions)" 33 tristate "SHA-384/SHA-512 digest algorithm (ARMv8 Crypto Extensions)" 39 tristate "SHA3 digest algorithm (ARMv8.2 Crypto Extensions)" 45 tristate "SM3 digest algorithm (ARMv8.2 Crypto Extensions)" 65 tristate "CRCT10DIF digest algorithm using PMULL instructions" 70 tristate "CRC32 and CRC32C digest algorithms using ARMv8 extensions"
|
/Linux-v4.19/security/integrity/evm/ |
D | evm_main.c | 140 struct evm_digest digest; in evm_verify_hmac() local 177 digest.hdr.algo = HASH_ALGO_SHA1; in evm_verify_hmac() 179 xattr_value_len, &digest); in evm_verify_hmac() 182 rc = crypto_memneq(xattr_data->digest, digest.digest, in evm_verify_hmac() 190 digest.hdr.algo = hdr->hash_algo; in evm_verify_hmac() 192 xattr_value_len, xattr_data->type, &digest); in evm_verify_hmac() 197 digest.digest, digest.hdr.length); in evm_verify_hmac() 537 rc = evm_init_hmac(inode, lsm_xattr, xattr_data->digest); in evm_inode_init_security()
|
/Linux-v4.19/arch/x86/purgatory/ |
D | purgatory.c | 44 u8 digest[SHA256_DIGEST_SIZE]; in verify_sha256_digest() local 53 sha256_final(&sctx, digest); in verify_sha256_digest() 55 if (memcmp(digest, purgatory_sha256_digest, sizeof(digest))) in verify_sha256_digest()
|
/Linux-v4.19/lib/ |
D | sha1.c | 82 void sha_transform(__u32 *digest, const char *data, __u32 *array) in sha_transform() argument 86 A = digest[0]; in sha_transform() 87 B = digest[1]; in sha_transform() 88 C = digest[2]; in sha_transform() 89 D = digest[3]; in sha_transform() 90 E = digest[4]; in sha_transform() 182 digest[0] += A; in sha_transform() 183 digest[1] += B; in sha_transform() 184 digest[2] += C; in sha_transform() 185 digest[3] += D; in sha_transform() [all …]
|
/Linux-v4.19/arch/x86/crypto/ |
D | sha1_ssse3_glue.c | 34 typedef void (sha1_transform_fn)(u32 *digest, const char *data, 73 asmlinkage void sha1_transform_ssse3(u32 *digest, const char *data, 126 asmlinkage void sha1_transform_avx(u32 *digest, const char *data, 197 asmlinkage void sha1_transform_avx2(u32 *digest, const char *data, 210 static void sha1_apply_transform_avx2(u32 *digest, const char *data, in sha1_apply_transform_avx2() argument 215 sha1_transform_avx2(digest, data, rounds); in sha1_apply_transform_avx2() 217 sha1_transform_avx(digest, data, rounds); in sha1_apply_transform_avx2() 274 asmlinkage void sha1_ni_transform(u32 *digest, const char *data,
|
D | sha256_ssse3_glue.c | 43 asmlinkage void sha256_transform_ssse3(u32 *digest, const char *data, 45 typedef void (sha256_transform_fn)(u32 *digest, const char *data, u64 rounds); 147 asmlinkage void sha256_transform_avx(u32 *digest, const char *data, 229 asmlinkage void sha256_transform_rorx(u32 *digest, const char *data, 309 asmlinkage void sha256_ni_transform(u32 *digest, const char *data,
|
/Linux-v4.19/arch/arm/crypto/ |
D | Kconfig | 13 tristate "SHA1 digest algorithm (ARM-asm)" 21 tristate "SHA1 digest algorithm (ARM NEON)" 32 tristate "SHA1 digest algorithm (ARM v8 Crypto Extensions)" 41 tristate "SHA-224/256 digest algorithm (ARM v8 Crypto Extensions)" 50 tristate "SHA-224/256 digest algorithm (ARM-asm and NEON)" 58 tristate "SHA-384/512 digest algorithm (ARM-asm and NEON)" 109 tristate "CRCT10DIF digest algorithm using PMULL instructions" 114 tristate "CRC32(C) digest algorithm using CRC and/or PMULL instructions"
|
D | ghash-ce-glue.c | 36 u64 digest[GHASH_DIGEST_SIZE/sizeof(u64)]; member 89 pmull_ghash_update(blocks, ctx->digest, src, key, in ghash_update() 110 pmull_ghash_update(1, ctx->digest, ctx->buf, key, NULL); in ghash_final() 113 put_unaligned_be64(ctx->digest[1], dst); in ghash_final() 114 put_unaligned_be64(ctx->digest[0], dst + 8); in ghash_final() 302 .digest = ghash_async_digest,
|
/Linux-v4.19/drivers/crypto/inside-secure/ |
D | safexcel_hash.c | 36 u32 digest; member 88 cdesc->control_data.control0 |= req->digest; in safexcel_context_control() 90 if (req->digest == CONTEXT_CONTROL_DIGEST_PRECOMPUTED) { in safexcel_context_control() 139 } else if (req->digest == CONTEXT_CONTROL_DIGEST_HMAC) { in safexcel_context_control() 565 req->digest == CONTEXT_CONTROL_DIGEST_PRECOMPUTED) in safexcel_ahash_enqueue() 617 if (req->digest == CONTEXT_CONTROL_DIGEST_HMAC) in safexcel_ahash_update() 687 export->digest = req->digest; in safexcel_ahash_export() 711 req->digest = export->digest; in safexcel_ahash_import() 749 req->digest = CONTEXT_CONTROL_DIGEST_PRECOMPUTED; in safexcel_sha1_init() 793 .digest = safexcel_sha1_digest, [all …]
|
/Linux-v4.19/crypto/asymmetric_keys/ |
D | pkcs7_verify.c | 50 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL); in pkcs7_digest() 51 if (!sig->digest) in pkcs7_digest() 63 sig->digest); in pkcs7_digest() 66 pr_devel("MsgDigest = [%*ph]\n", 8, sig->digest); in pkcs7_digest() 88 if (memcmp(sig->digest, sinfo->msgdigest, in pkcs7_digest() 101 memset(sig->digest, 0, sig->digest_size); in pkcs7_digest() 111 sinfo->authattrs_len, sig->digest); in pkcs7_digest() 114 pr_devel("AADigest = [%*ph]\n", 8, sig->digest); in pkcs7_digest()
|
D | verify_pefile.c | 328 void *digest; in pefile_digest_pe() local 366 digest = (void *)desc + desc_size; in pefile_digest_pe() 367 ret = crypto_shash_final(desc, digest); in pefile_digest_pe() 371 pr_debug("Digest calc = [%*ph]\n", ctx->digest_len, digest); in pefile_digest_pe() 376 if (memcmp(digest, ctx->digest, ctx->digest_len) != 0) { in pefile_digest_pe() 445 ctx.digest_len, ctx.digest_len, ctx.digest); in verify_pefile_signature() 453 kzfree(ctx.digest); in verify_pefile_signature()
|
D | x509_public_key.c | 71 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL); in x509_get_sig_params() 72 if (!sig->digest) in x509_get_sig_params() 82 ret = crypto_shash_digest(desc, cert->tbs, cert->tbs_size, sig->digest); in x509_get_sig_params() 86 ret = is_hash_blacklisted(sig->digest, sig->digest_size, "tbs"); in x509_get_sig_params() 89 sig->digest_size, sig->digest); in x509_get_sig_params()
|
/Linux-v4.19/security/keys/encrypted-keys/ |
D | encrypted.h | 40 static inline void dump_hmac(const char *str, const u8 *digest, in dump_hmac() argument 45 print_hex_dump(KERN_ERR, "hmac: ", DUMP_PREFIX_NONE, 32, 1, digest, in dump_hmac() 62 static inline void dump_hmac(const char *str, const u8 *digest, in dump_hmac() argument
|
D | encrypted.c | 325 static int calc_hash(struct crypto_shash *tfm, u8 *digest, in calc_hash() argument 334 err = crypto_shash_digest(desc, buf, buflen, digest); in calc_hash() 339 static int calc_hmac(u8 *digest, const u8 *key, unsigned int keylen, in calc_hmac() argument 354 err = calc_hash(tfm, digest, buf, buflen); in calc_hmac() 504 u8 *digest; in datablob_hmac_append() local 511 digest = epayload->format + epayload->datablob_len; in datablob_hmac_append() 512 ret = calc_hmac(digest, derived_key, sizeof derived_key, in datablob_hmac_append() 515 dump_hmac(NULL, digest, HASH_SIZE); in datablob_hmac_append() 527 u8 digest[HASH_SIZE]; in datablob_hmac_verify() local 543 ret = calc_hmac(digest, derived_key, sizeof derived_key, p, len); in datablob_hmac_verify() [all …]
|
/Linux-v4.19/drivers/block/drbd/ |
D | drbd_worker.c | 298 void drbd_csum_ee(struct crypto_ahash *tfm, struct drbd_peer_request *peer_req, void *digest) in drbd_csum_ee() argument 322 ahash_request_set_crypt(req, &sg, digest, sg.length); in drbd_csum_ee() 327 void drbd_csum_bio(struct crypto_ahash *tfm, struct bio *bio, void *digest) in drbd_csum_bio() argument 349 ahash_request_set_crypt(req, NULL, digest, 0); in drbd_csum_bio() 361 void *digest; in w_e_send_csum() local 371 digest = kmalloc(digest_size, GFP_NOIO); in w_e_send_csum() 372 if (digest) { in w_e_send_csum() 375 drbd_csum_ee(peer_device->connection->csums_tfm, peer_req, digest); in w_e_send_csum() 385 digest, digest_size, in w_e_send_csum() 387 kfree(digest); in w_e_send_csum() [all …]
|
/Linux-v4.19/security/integrity/ |
D | integrity.h | 82 u8 digest[SHA1_DIGEST_SIZE]; member 101 u8 digest[0]; member 152 const char *digest, int digestlen); 160 const char *digest, int digestlen) in integrity_digsig_verify() argument
|
D | digsig.c | 53 const char *digest, int digestlen) in integrity_digsig_verify() argument 73 digest, digestlen); in integrity_digsig_verify() 76 digest, digestlen); in integrity_digsig_verify()
|
/Linux-v4.19/include/linux/ |
D | digsig.h | 52 const char *digest, int digestlen); 57 int siglen, const char *digest, int digestlen) in digsig_verify() argument
|