/Linux-v5.15/crypto/ |
D | testmgr.h | 40 const char *digest; member 2881 .digest = "\x31\xd6\xcf\xe0\xd1\x6a\xe9\x31" 2886 .digest = "\xbd\xe5\x2c\xb3\x1d\xe3\x3e\x46" 2891 .digest = "\xa4\x48\x01\x7a\xaf\x21\xd8\x52" 2896 .digest = "\xd9\x13\x0a\x81\x64\x54\x9f\xe8" 2901 .digest = "\xd7\x9e\x1c\x30\x8a\xa5\xbb\xcd" 2906 .digest = "\x04\x3f\x85\x82\xf2\x41\xdb\x35" 2912 .digest = "\xe3\x3b\x4d\xdc\x9c\x38\xf2\x19" 2920 .digest = "\x6b\x4e\x03\x42\x36\x67\xdb\xb7" 2927 .digest = "\x9e\x86\xff\x69\x55\x7c\xa9\x5f" [all …]
|
D | ecrdsa.c | 40 const char *digest; /* digest name from oid */ member 76 unsigned char digest[STREEBOG512_DIGEST_SIZE]; in ecrdsa_verify() local 93 !ctx->digest || in ecrdsa_verify() 101 WARN_ON(req->dst_len > sizeof(digest))) in ecrdsa_verify() 109 digest, req->dst_len, req->src_len); in ecrdsa_verify() 123 vli_from_le64(e, digest, ndigits); in ecrdsa_verify() 209 ctx->digest = "streebog256"; in ecrdsa_set_pub_key() 213 ctx->digest = "streebog512"; in ecrdsa_set_pub_key()
|
D | adiantum.c | 248 struct scatterlist *sgl, le128 *digest) in adiantum_hash_message() argument 278 return crypto_shash_final(hash_desc, (u8 *)digest); in adiantum_hash_message() 288 le128 digest; in adiantum_finish() local 301 err = adiantum_hash_message(req, req->dst, &digest); in adiantum_finish() 304 le128_add(&digest, &digest, &rctx->header_hash); in adiantum_finish() 305 le128_sub(&rctx->rbuf.bignum, &rctx->rbuf.bignum, &digest); in adiantum_finish() 329 le128 digest; in adiantum_crypt() local 343 err = adiantum_hash_message(req, req->src, &digest); in adiantum_crypt() 346 le128_add(&digest, &digest, &rctx->header_hash); in adiantum_crypt() 349 le128_add(&rctx->rbuf.bignum, &rctx->rbuf.bignum, &digest); in adiantum_crypt()
|
/Linux-v5.15/arch/s390/purgatory/ |
D | purgatory.c | 18 u8 digest[SHA256_DIGEST_SIZE]; in verify_sha256_digest() local 27 sha256_final(&sctx, digest); in verify_sha256_digest() 29 if (memcmp(digest, purgatory_sha256_digest, sizeof(digest))) in verify_sha256_digest()
|
/Linux-v5.15/include/crypto/ |
D | poly1305.h | 88 void poly1305_final_arch(struct poly1305_desc_ctx *desc, u8 *digest); 89 void poly1305_final_generic(struct poly1305_desc_ctx *desc, u8 *digest); 91 static inline void poly1305_final(struct poly1305_desc_ctx *desc, u8 *digest) in poly1305_final() argument 94 poly1305_final_arch(desc, digest); in poly1305_final() 96 poly1305_final_generic(desc, digest); in poly1305_final()
|
/Linux-v5.15/arch/x86/purgatory/ |
D | purgatory.c | 26 u8 digest[SHA256_DIGEST_SIZE]; in verify_sha256_digest() local 35 sha256_final(&sctx, digest); in verify_sha256_digest() 37 if (memcmp(digest, purgatory_sha256_digest, sizeof(digest))) in verify_sha256_digest()
|
/Linux-v5.15/arch/arm64/crypto/ |
D | Kconfig | 13 tristate "SHA-224/SHA-256 digest algorithm for arm64" 17 tristate "SHA-384/SHA-512 digest algorithm for arm64" 21 tristate "SHA-1 digest algorithm (ARMv8 Crypto Extensions)" 27 tristate "SHA-224/SHA-256 digest algorithm (ARMv8 Crypto Extensions)" 33 tristate "SHA-384/SHA-512 digest algorithm (ARMv8 Crypto Extensions)" 39 tristate "SHA3 digest algorithm (ARMv8.2 Crypto Extensions)" 45 tristate "SM3 digest algorithm (ARMv8.2 Crypto Extensions)" 64 tristate "CRCT10DIF digest algorithm using PMULL instructions"
|
/Linux-v5.15/arch/arm/crypto/ |
D | Kconfig | 13 tristate "SHA1 digest algorithm (ARM-asm)" 21 tristate "SHA1 digest algorithm (ARM NEON)" 32 tristate "SHA1 digest algorithm (ARM v8 Crypto Extensions)" 41 tristate "SHA-224/256 digest algorithm (ARM v8 Crypto Extensions)" 50 tristate "SHA-224/256 digest algorithm (ARM-asm and NEON)" 58 tristate "SHA-384/512 digest algorithm (ARM-asm and NEON)" 66 tristate "BLAKE2s digest algorithm (ARM)" 69 BLAKE2s digest algorithm optimized with ARM scalar instructions. This 75 tristate "BLAKE2b digest algorithm (ARM NEON)" 79 BLAKE2b digest algorithm optimized with ARM NEON instructions. [all …]
|
/Linux-v5.15/security/integrity/evm/ |
D | evm_main.c | 182 struct evm_digest digest; in evm_verify_hmac() local 219 digest.hdr.algo = HASH_ALGO_SHA1; in evm_verify_hmac() 221 xattr_value_len, &digest); in evm_verify_hmac() 224 rc = crypto_memneq(xattr_data->data, digest.digest, in evm_verify_hmac() 240 digest.hdr.algo = hdr->hash_algo; in evm_verify_hmac() 242 xattr_value_len, xattr_data->type, &digest); in evm_verify_hmac() 247 digest.digest, digest.hdr.length); in evm_verify_hmac() 277 pr_debug("digest: (%d) [%*phN]\n", digest.hdr.length, digest.hdr.length, in evm_verify_hmac() 278 digest.digest); in evm_verify_hmac() 857 rc = evm_init_hmac(inode, lsm_xattr, xattr_data->digest); in evm_inode_init_security()
|
/Linux-v5.15/lib/ |
D | sha1.c | 84 void sha1_transform(__u32 *digest, const char *data, __u32 *array) in sha1_transform() argument 88 A = digest[0]; in sha1_transform() 89 B = digest[1]; in sha1_transform() 90 C = digest[2]; in sha1_transform() 91 D = digest[3]; in sha1_transform() 92 E = digest[4]; in sha1_transform() 184 digest[0] += A; in sha1_transform() 185 digest[1] += B; in sha1_transform() 186 digest[2] += C; in sha1_transform() 187 digest[3] += D; in sha1_transform() [all …]
|
/Linux-v5.15/security/integrity/ima/ |
D | ima_modsig.c | 24 const u8 *digest; member 112 rc = pkcs7_get_digest(modsig->pkcs7_msg, &modsig->digest, in ima_collect_modsig() 123 const u8 **digest, u32 *digest_size) in ima_get_modsig_digest() argument 126 *digest = modsig->digest; in ima_get_modsig_digest()
|
D | ima_queue.c | 58 rc = memcmp(qe->entry->digests[ima_hash_algo_idx].digest, in ima_lookup_digest_entry() 111 key = ima_hash_key(entry->digests[ima_hash_algo_idx].digest); in ima_add_digest_entry() 163 u8 *digest = entry->digests[ima_hash_algo_idx].digest; in ima_add_template_entry() local 172 if (ima_lookup_digest_entry(digest, entry->pcr)) { in ima_add_template_entry() 237 memset(digests[i].digest, 0xff, digest_size); in ima_init_digests()
|
D | ima_crypto.c | 431 ahash_request_set_crypt(req, NULL, hash->digest, 0); in ima_calc_file_hash_atfm() 502 rc = crypto_shash_final(shash, hash->digest); in ima_calc_file_hash_tfm() 621 rc = crypto_shash_final(shash, entry->digests[tfm_idx].digest); in ima_calc_field_array_hash_tfm() 649 memcpy(entry->digests[i].digest, in ima_calc_field_array_hash() 650 entry->digests[ima_sha1_idx].digest, in ima_calc_field_array_hash() 694 ahash_request_set_crypt(req, NULL, hash->digest, 0); in calc_buffer_ahash_atfm() 745 rc = crypto_shash_final(shash, hash->digest); in calc_buffer_shash_tfm() 799 static int ima_calc_boot_aggregate_tfm(char *digest, u16 alg_id, in ima_calc_boot_aggregate_tfm() argument 802 struct tpm_digest d = { .alg_id = alg_id, .digest = {0} }; in ima_calc_boot_aggregate_tfm() 820 rc = crypto_shash_update(shash, d.digest, in ima_calc_boot_aggregate_tfm() [all …]
|
D | ima_main.c | 549 memcpy(buf, iint->ima_hash->digest, copied_size); in __ima_inode_hash() 866 bool buf_hash, u8 *digest, size_t digest_len) in process_buffer_measurement() argument 879 char digest[IMA_MAX_DIGEST_SIZE]; in process_buffer_measurement() member 887 if (digest && digest_len < digest_hash_len) in process_buffer_measurement() 890 if (!ima_policy_flag && !digest) in process_buffer_measurement() 912 if (!(action & IMA_MEASURE) && !digest) in process_buffer_measurement() 930 memcpy(digest_hash, hash.hdr.digest, digest_hash_len); in process_buffer_measurement() 943 if (digest) in process_buffer_measurement() 944 memcpy(digest, iint.ima_hash->digest, digest_hash_len); in process_buffer_measurement() 1017 bool hash, u8 *digest, size_t digest_len) in ima_measure_critical_data() argument [all …]
|
D | ima.h | 153 void ima_print_digest(struct seq_file *m, u8 *digest, u32 size); 183 static inline unsigned int ima_hash_key(u8 *digest) in ima_hash_key() argument 186 return (digest[0] | digest[1] << 8) % IMA_MEASURE_HTABLE_SIZE; in ima_hash_key() 275 bool buf_hash, u8 *digest, size_t digest_len); 387 const u8 **digest, u32 *digest_size); 404 enum hash_algo *algo, const u8 **digest, in ima_get_modsig_digest() argument
|
D | ima_template_lib.c | 267 static int ima_eventdigest_init_common(const u8 *digest, u32 digestsize, in ima_eventdigest_init_common() argument 290 if (digest) in ima_eventdigest_init_common() 291 memcpy(buffer + offset, digest, digestsize); in ima_eventdigest_init_common() 312 char digest[IMA_MAX_DIGEST_SIZE]; in ima_eventdigest_init() member 325 cur_digest = event_data->iint->ima_hash->digest; in ima_eventdigest_init() 343 cur_digest = hash.hdr.digest; in ima_eventdigest_init() 361 cur_digest = hash.hdr.digest; in ima_eventdigest_init() 380 cur_digest = event_data->iint->ima_hash->digest; in ima_eventdigest_ng_init()
|
/Linux-v5.15/drivers/crypto/inside-secure/ |
D | safexcel_hash.c | 52 u32 digest; member 123 if (unlikely(req->digest == CONTEXT_CONTROL_DIGEST_XCM)) { in safexcel_context_control() 146 cdesc->control_data.control0 |= req->digest | in safexcel_context_control() 152 cdesc->control_data.control0 |= req->digest | in safexcel_context_control() 166 if ((req->digest == CONTEXT_CONTROL_DIGEST_PRECOMPUTED) || in safexcel_context_control() 182 if ((req->digest == CONTEXT_CONTROL_DIGEST_PRECOMPUTED) || in safexcel_context_control() 200 req->digest = CONTEXT_CONTROL_DIGEST_PRECOMPUTED; in safexcel_context_control() 271 (sreq->digest != CONTEXT_CONTROL_DIGEST_HMAC)) { in safexcel_handle_req_result() 292 if (unlikely(sreq->digest == CONTEXT_CONTROL_DIGEST_XCM && in safexcel_handle_req_result() 804 } else if (unlikely(req->digest == CONTEXT_CONTROL_DIGEST_XCM && in safexcel_ahash_final() [all …]
|
/Linux-v5.15/crypto/asymmetric_keys/ |
D | pkcs7_verify.c | 34 if (sig->digest) in pkcs7_digest() 51 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL); in pkcs7_digest() 52 if (!sig->digest) in pkcs7_digest() 63 sig->digest); in pkcs7_digest() 66 pr_devel("MsgDigest = [%*ph]\n", 8, sig->digest); in pkcs7_digest() 88 if (memcmp(sig->digest, sinfo->msgdigest, in pkcs7_digest() 101 memset(sig->digest, 0, sig->digest_size); in pkcs7_digest() 111 sinfo->authattrs_len, sig->digest); in pkcs7_digest() 114 pr_devel("AADigest = [%*ph]\n", 8, sig->digest); in pkcs7_digest() 141 *buf = sinfo->sig->digest; in pkcs7_get_digest()
|
D | verify_pefile.c | 324 void *digest; in pefile_digest_pe() local 361 digest = (void *)desc + desc_size; in pefile_digest_pe() 362 ret = crypto_shash_final(desc, digest); in pefile_digest_pe() 366 pr_debug("Digest calc = [%*ph]\n", ctx->digest_len, digest); in pefile_digest_pe() 371 if (memcmp(digest, ctx->digest, ctx->digest_len) != 0) { in pefile_digest_pe() 442 ctx.digest_len, ctx.digest_len, ctx.digest); in verify_pefile_signature() 450 kfree_sensitive(ctx.digest); in verify_pefile_signature()
|
D | x509_public_key.c | 70 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL); in x509_get_sig_params() 71 if (!sig->digest) in x509_get_sig_params() 80 ret = crypto_shash_digest(desc, cert->tbs, cert->tbs_size, sig->digest); in x509_get_sig_params() 84 ret = is_hash_blacklisted(sig->digest, sig->digest_size, "tbs"); in x509_get_sig_params() 87 sig->digest_size, sig->digest); in x509_get_sig_params()
|
/Linux-v5.15/security/keys/encrypted-keys/ |
D | encrypted.h | 40 static inline void dump_hmac(const char *str, const u8 *digest, in dump_hmac() argument 45 print_hex_dump(KERN_ERR, "hmac: ", DUMP_PREFIX_NONE, 32, 1, digest, in dump_hmac() 62 static inline void dump_hmac(const char *str, const u8 *digest, in dump_hmac() argument
|
/Linux-v5.15/drivers/char/tpm/ |
D | tpm2-cmd.c | 149 u8 digest[]; member 162 struct tpm_digest *digest, u16 *digest_size_ptr) in tpm2_pcr_read() argument 177 chip->allocated_banks[i].alg_id != digest->alg_id; i++) in tpm2_pcr_read() 193 tpm_buf_append_u16(&buf, digest->alg_id); in tpm2_pcr_read() 204 if (digest_size > sizeof(digest->digest) || in tpm2_pcr_read() 213 memcpy(digest->digest, out->digest, digest_size); in tpm2_pcr_read() 261 tpm_buf_append(&buf, (const unsigned char *)&digests[i].digest, in tpm2_pcr_extend() 510 struct tpm_digest digest = { .alg_id = bank->alg_id }; in tpm2_init_bank_info() local 530 return tpm2_pcr_read(chip, 0, &digest, &bank->digest_size); in tpm2_init_bank_info()
|
D | tpm-sysfs.c | 86 u8 digest[TPM_DIGEST_SIZE]; in pcrs_show() local 103 if (tpm1_pcr_read(chip, i, digest)) { in pcrs_show() 109 str += sprintf(str, "%02X ", digest[j]); in pcrs_show() 354 struct tpm_digest digest; in pcr_value_show() local 367 digest.alg_id = ha->alg_id; in pcr_value_show() 368 rc = tpm_pcr_read(chip, ha->pcr, &digest); in pcr_value_show() 372 str += sprintf(str, "%02X", digest.digest[i]); in pcr_value_show()
|
/Linux-v5.15/drivers/block/drbd/ |
D | drbd_worker.c | 287 void drbd_csum_ee(struct crypto_shash *tfm, struct drbd_peer_request *peer_req, void *digest) in drbd_csum_ee() argument 312 crypto_shash_final(desc, digest); in drbd_csum_ee() 316 void drbd_csum_bio(struct crypto_shash *tfm, struct bio *bio, void *digest) in drbd_csum_bio() argument 338 crypto_shash_final(desc, digest); in drbd_csum_bio() 349 void *digest; in w_e_send_csum() local 359 digest = kmalloc(digest_size, GFP_NOIO); in w_e_send_csum() 360 if (digest) { in w_e_send_csum() 363 drbd_csum_ee(peer_device->connection->csums_tfm, peer_req, digest); in w_e_send_csum() 373 digest, digest_size, in w_e_send_csum() 375 kfree(digest); in w_e_send_csum() [all …]
|
/Linux-v5.15/security/integrity/ |
D | integrity.h | 91 u8 digest[SHA1_DIGEST_SIZE]; member 110 u8 digest[]; member 163 const char *digest, int digestlen); 174 const char *digest, int digestlen) in integrity_digsig_verify() argument
|