/Linux-v5.4/crypto/ |
D | testmgr.h | 40 const char *digest; member 1171 .digest = "\x31\xd6\xcf\xe0\xd1\x6a\xe9\x31" 1176 .digest = "\xbd\xe5\x2c\xb3\x1d\xe3\x3e\x46" 1181 .digest = "\xa4\x48\x01\x7a\xaf\x21\xd8\x52" 1186 .digest = "\xd9\x13\x0a\x81\x64\x54\x9f\xe8" 1191 .digest = "\xd7\x9e\x1c\x30\x8a\xa5\xbb\xcd" 1196 .digest = "\x04\x3f\x85\x82\xf2\x41\xdb\x35" 1202 .digest = "\xe3\x3b\x4d\xdc\x9c\x38\xf2\x19" 1210 .digest = "\x6b\x4e\x03\x42\x36\x67\xdb\xb7" 1217 .digest = "\x9e\x86\xff\x69\x55\x7c\xa9\x5f" [all …]
|
D | ecrdsa.c | 39 const char *digest; /* digest name from oid */ member 75 unsigned char digest[STREEBOG512_DIGEST_SIZE]; in ecrdsa_verify() local 92 !ctx->digest || in ecrdsa_verify() 100 WARN_ON(req->dst_len > sizeof(digest))) in ecrdsa_verify() 108 digest, req->dst_len, req->src_len); in ecrdsa_verify() 122 vli_from_le64(e, digest, ndigits); in ecrdsa_verify() 208 ctx->digest = "streebog256"; in ecrdsa_set_pub_key() 212 ctx->digest = "streebog512"; in ecrdsa_set_pub_key()
|
D | adiantum.c | 256 struct scatterlist *sgl, le128 *digest) in adiantum_hash_message() argument 286 return crypto_shash_final(hash_desc, (u8 *)digest); in adiantum_hash_message() 296 le128 digest; in adiantum_finish() local 309 err = adiantum_hash_message(req, req->dst, &digest); in adiantum_finish() 312 le128_add(&digest, &digest, &rctx->header_hash); in adiantum_finish() 313 le128_sub(&rctx->rbuf.bignum, &rctx->rbuf.bignum, &digest); in adiantum_finish() 337 le128 digest; in adiantum_crypt() local 351 err = adiantum_hash_message(req, req->src, &digest); in adiantum_crypt() 354 le128_add(&digest, &digest, &rctx->header_hash); in adiantum_crypt() 357 le128_add(&rctx->rbuf.bignum, &rctx->rbuf.bignum, &digest); in adiantum_crypt()
|
/Linux-v5.4/security/integrity/ima/ |
D | ima_queue.c | 60 rc = memcmp(qe->entry->digest, digest_value, TPM_DIGEST_SIZE); in ima_lookup_digest_entry() 80 size += sizeof(entry->digest); in get_binary_runtime_size() 112 key = ima_hash_key(entry->digest); in ima_add_digest_entry() 148 memcpy(digests[i].digest, hash, TPM_DIGEST_SIZE); in ima_pcr_extend() 168 u8 digest[TPM_DIGEST_SIZE]; in ima_add_template_entry() local 176 memcpy(digest, entry->digest, sizeof(digest)); in ima_add_template_entry() 177 if (ima_lookup_digest_entry(digest, entry->pcr)) { in ima_add_template_entry() 192 memset(digest, 0xff, sizeof(digest)); in ima_add_template_entry() 194 tpmresult = ima_pcr_extend(digest, entry->pcr); in ima_add_template_entry()
|
D | ima_modsig.c | 24 const u8 *digest; member 132 rc = pkcs7_get_digest(modsig->pkcs7_msg, &modsig->digest, in ima_collect_modsig() 143 const u8 **digest, u32 *digest_size) in ima_get_modsig_digest() argument 146 *digest = modsig->digest; in ima_get_modsig_digest()
|
D | ima_api.c | 101 char digest[TPM_DIGEST_SIZE]; in ima_store_template() member 118 memcpy(entry->digest, hash.hdr.digest, hash.hdr.length); in ima_store_template() 219 char digest[IMA_MAX_DIGEST_SIZE]; in ima_collect_measurement() member 242 memset(&hash.digest, 0, sizeof(hash.digest)); in ima_collect_measurement() 353 hex_byte_pack(hash + (i * 2), iint->ima_hash->digest[i]); in ima_audit_measurement()
|
D | ima_crypto.c | 307 ahash_request_set_crypt(req, NULL, hash->digest, 0); in ima_calc_file_hash_atfm() 376 rc = crypto_shash_final(shash, hash->digest); in ima_calc_file_hash_tfm() 507 rc = crypto_shash_final(shash, hash->digest); in ima_calc_field_array_hash_tfm() 563 ahash_request_set_crypt(req, NULL, hash->digest, 0); in calc_buffer_ahash_atfm() 614 rc = crypto_shash_final(shash, hash->digest); in calc_buffer_shash_tfm() 660 static int __init ima_calc_boot_aggregate_tfm(char *digest, in ima_calc_boot_aggregate_tfm() argument 663 struct tpm_digest d = { .alg_id = TPM_ALG_SHA1, .digest = {0} }; in ima_calc_boot_aggregate_tfm() 678 rc = crypto_shash_update(shash, d.digest, TPM_DIGEST_SIZE); in ima_calc_boot_aggregate_tfm() 681 crypto_shash_final(shash, digest); in ima_calc_boot_aggregate_tfm() 695 rc = ima_calc_boot_aggregate_tfm(hash->digest, tfm); in ima_calc_boot_aggregate()
|
D | ima_template_lib.c | 228 static int ima_eventdigest_init_common(const u8 *digest, u32 digestsize, in ima_eventdigest_init_common() argument 251 if (digest) in ima_eventdigest_init_common() 252 memcpy(buffer + offset, digest, digestsize); in ima_eventdigest_init_common() 273 char digest[IMA_MAX_DIGEST_SIZE]; in ima_eventdigest_init() member 286 cur_digest = event_data->iint->ima_hash->digest; in ima_eventdigest_init() 304 cur_digest = hash.hdr.digest; in ima_eventdigest_init() 323 cur_digest = event_data->iint->ima_hash->digest; in ima_eventdigest_ng_init()
|
D | ima.h | 95 u8 digest[TPM_DIGEST_SIZE]; /* sha1 or md5 measurement hash */ member 149 void ima_print_digest(struct seq_file *m, u8 *digest, u32 size); 178 static inline unsigned long ima_hash_key(u8 *digest) in ima_hash_key() argument 180 return hash_long(*digest, IMA_HASH_BITS); in ima_hash_key() 320 const u8 **digest, u32 *digest_size); 342 enum hash_algo *algo, const u8 **digest, in ima_get_modsig_digest() argument
|
/Linux-v5.4/arch/s390/purgatory/ |
D | purgatory.c | 18 u8 digest[SHA256_DIGEST_SIZE]; in verify_sha256_digest() local 27 sha256_final(&sctx, digest); in verify_sha256_digest() 29 if (memcmp(digest, purgatory_sha256_digest, sizeof(digest))) in verify_sha256_digest()
|
/Linux-v5.4/arch/arm64/crypto/ |
D | Kconfig | 13 tristate "SHA-224/SHA-256 digest algorithm for arm64" 17 tristate "SHA-384/SHA-512 digest algorithm for arm64" 21 tristate "SHA-1 digest algorithm (ARMv8 Crypto Extensions)" 27 tristate "SHA-224/SHA-256 digest algorithm (ARMv8 Crypto Extensions)" 33 tristate "SHA-384/SHA-512 digest algorithm (ARMv8 Crypto Extensions)" 39 tristate "SHA3 digest algorithm (ARMv8.2 Crypto Extensions)" 45 tristate "SM3 digest algorithm (ARMv8.2 Crypto Extensions)" 64 tristate "CRCT10DIF digest algorithm using PMULL instructions"
|
/Linux-v5.4/arch/x86/purgatory/ |
D | purgatory.c | 42 u8 digest[SHA256_DIGEST_SIZE]; in verify_sha256_digest() local 51 sha256_final(&sctx, digest); in verify_sha256_digest() 53 if (memcmp(digest, purgatory_sha256_digest, sizeof(digest))) in verify_sha256_digest()
|
/Linux-v5.4/security/integrity/evm/ |
D | evm_main.c | 137 struct evm_digest digest; in evm_verify_hmac() local 174 digest.hdr.algo = HASH_ALGO_SHA1; in evm_verify_hmac() 176 xattr_value_len, &digest); in evm_verify_hmac() 179 rc = crypto_memneq(xattr_data->data, digest.digest, in evm_verify_hmac() 187 digest.hdr.algo = hdr->hash_algo; in evm_verify_hmac() 189 xattr_value_len, xattr_data->type, &digest); in evm_verify_hmac() 194 digest.digest, digest.hdr.length); in evm_verify_hmac() 534 rc = evm_init_hmac(inode, lsm_xattr, xattr_data->digest); in evm_inode_init_security()
|
/Linux-v5.4/lib/ |
D | sha1.c | 82 void sha_transform(__u32 *digest, const char *data, __u32 *array) in sha_transform() argument 86 A = digest[0]; in sha_transform() 87 B = digest[1]; in sha_transform() 88 C = digest[2]; in sha_transform() 89 D = digest[3]; in sha_transform() 90 E = digest[4]; in sha_transform() 182 digest[0] += A; in sha_transform() 183 digest[1] += B; in sha_transform() 184 digest[2] += C; in sha_transform() 185 digest[3] += D; in sha_transform() [all …]
|
/Linux-v5.4/crypto/asymmetric_keys/ |
D | pkcs7_verify.c | 34 if (sig->digest) in pkcs7_digest() 51 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL); in pkcs7_digest() 52 if (!sig->digest) in pkcs7_digest() 63 sig->digest); in pkcs7_digest() 66 pr_devel("MsgDigest = [%*ph]\n", 8, sig->digest); in pkcs7_digest() 88 if (memcmp(sig->digest, sinfo->msgdigest, in pkcs7_digest() 101 memset(sig->digest, 0, sig->digest_size); in pkcs7_digest() 111 sinfo->authattrs_len, sig->digest); in pkcs7_digest() 114 pr_devel("AADigest = [%*ph]\n", 8, sig->digest); in pkcs7_digest() 141 *buf = sinfo->sig->digest; in pkcs7_get_digest()
|
D | verify_pefile.c | 324 void *digest; in pefile_digest_pe() local 361 digest = (void *)desc + desc_size; in pefile_digest_pe() 362 ret = crypto_shash_final(desc, digest); in pefile_digest_pe() 366 pr_debug("Digest calc = [%*ph]\n", ctx->digest_len, digest); in pefile_digest_pe() 371 if (memcmp(digest, ctx->digest, ctx->digest_len) != 0) { in pefile_digest_pe() 442 ctx.digest_len, ctx.digest_len, ctx.digest); in verify_pefile_signature() 450 kzfree(ctx.digest); in verify_pefile_signature()
|
D | x509_public_key.c | 67 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL); in x509_get_sig_params() 68 if (!sig->digest) in x509_get_sig_params() 77 ret = crypto_shash_digest(desc, cert->tbs, cert->tbs_size, sig->digest); in x509_get_sig_params() 81 ret = is_hash_blacklisted(sig->digest, sig->digest_size, "tbs"); in x509_get_sig_params() 84 sig->digest_size, sig->digest); in x509_get_sig_params()
|
/Linux-v5.4/arch/x86/crypto/ |
D | sha1_ssse3_glue.c | 30 typedef void (sha1_transform_fn)(u32 *digest, const char *data, 69 asmlinkage void sha1_transform_ssse3(u32 *digest, const char *data, 122 asmlinkage void sha1_transform_avx(u32 *digest, const char *data, 193 asmlinkage void sha1_transform_avx2(u32 *digest, const char *data, 206 static void sha1_apply_transform_avx2(u32 *digest, const char *data, in sha1_apply_transform_avx2() argument 211 sha1_transform_avx2(digest, data, rounds); in sha1_apply_transform_avx2() 213 sha1_transform_avx(digest, data, rounds); in sha1_apply_transform_avx2() 270 asmlinkage void sha1_ni_transform(u32 *digest, const char *data,
|
/Linux-v5.4/drivers/crypto/inside-secure/ |
D | safexcel_hash.c | 38 u32 digest; member 116 if ((req->digest == CONTEXT_CONTROL_DIGEST_PRECOMPUTED) || in safexcel_context_control() 132 if ((req->digest == CONTEXT_CONTROL_DIGEST_PRECOMPUTED) || in safexcel_context_control() 150 req->digest = CONTEXT_CONTROL_DIGEST_PRECOMPUTED; in safexcel_context_control() 221 (sreq->digest != CONTEXT_CONTROL_DIGEST_HMAC)) { in safexcel_handle_req_result() 596 (req->digest == CONTEXT_CONTROL_DIGEST_PRECOMPUTED)) || in safexcel_ahash_enqueue() 729 req->digest = CONTEXT_CONTROL_DIGEST_HMAC; in safexcel_ahash_final() 732 req->digest = CONTEXT_CONTROL_DIGEST_HMAC; in safexcel_ahash_final() 756 export->digest = req->digest; in safexcel_ahash_export() 777 req->digest = export->digest; in safexcel_ahash_import() [all …]
|
/Linux-v5.4/arch/arm/crypto/ |
D | Kconfig | 13 tristate "SHA1 digest algorithm (ARM-asm)" 21 tristate "SHA1 digest algorithm (ARM NEON)" 32 tristate "SHA1 digest algorithm (ARM v8 Crypto Extensions)" 41 tristate "SHA-224/256 digest algorithm (ARM v8 Crypto Extensions)" 50 tristate "SHA-224/256 digest algorithm (ARM-asm and NEON)" 58 tristate "SHA-384/512 digest algorithm (ARM-asm and NEON)" 120 tristate "CRCT10DIF digest algorithm using PMULL instructions" 125 tristate "CRC32(C) digest algorithm using CRC and/or PMULL instructions"
|
/Linux-v5.4/security/keys/encrypted-keys/ |
D | encrypted.h | 40 static inline void dump_hmac(const char *str, const u8 *digest, in dump_hmac() argument 45 print_hex_dump(KERN_ERR, "hmac: ", DUMP_PREFIX_NONE, 32, 1, digest, in dump_hmac() 62 static inline void dump_hmac(const char *str, const u8 *digest, in dump_hmac() argument
|
D | encrypted.c | 326 static int calc_hash(struct crypto_shash *tfm, u8 *digest, in calc_hash() argument 334 err = crypto_shash_digest(desc, buf, buflen, digest); in calc_hash() 339 static int calc_hmac(u8 *digest, const u8 *key, unsigned int keylen, in calc_hmac() argument 354 err = calc_hash(tfm, digest, buf, buflen); in calc_hmac() 504 u8 *digest; in datablob_hmac_append() local 511 digest = epayload->format + epayload->datablob_len; in datablob_hmac_append() 512 ret = calc_hmac(digest, derived_key, sizeof derived_key, in datablob_hmac_append() 515 dump_hmac(NULL, digest, HASH_SIZE); in datablob_hmac_append() 527 u8 digest[HASH_SIZE]; in datablob_hmac_verify() local 543 ret = calc_hmac(digest, derived_key, sizeof derived_key, p, len); in datablob_hmac_verify() [all …]
|
/Linux-v5.4/drivers/block/drbd/ |
D | drbd_worker.c | 286 void drbd_csum_ee(struct crypto_shash *tfm, struct drbd_peer_request *peer_req, void *digest) in drbd_csum_ee() argument 311 crypto_shash_final(desc, digest); in drbd_csum_ee() 315 void drbd_csum_bio(struct crypto_shash *tfm, struct bio *bio, void *digest) in drbd_csum_bio() argument 337 crypto_shash_final(desc, digest); in drbd_csum_bio() 348 void *digest; in w_e_send_csum() local 358 digest = kmalloc(digest_size, GFP_NOIO); in w_e_send_csum() 359 if (digest) { in w_e_send_csum() 362 drbd_csum_ee(peer_device->connection->csums_tfm, peer_req, digest); in w_e_send_csum() 372 digest, digest_size, in w_e_send_csum() 374 kfree(digest); in w_e_send_csum() [all …]
|
/Linux-v5.4/security/integrity/ |
D | integrity.h | 84 u8 digest[SHA1_DIGEST_SIZE]; member 103 u8 digest[0]; member 156 const char *digest, int digestlen); 167 const char *digest, int digestlen) in integrity_digsig_verify() argument
|
/Linux-v5.4/drivers/char/tpm/ |
D | tpm2-cmd.c | 163 u8 digest[]; member 176 struct tpm_digest *digest, u16 *digest_size_ptr) in tpm2_pcr_read() argument 191 chip->allocated_banks[i].alg_id != digest->alg_id; i++) in tpm2_pcr_read() 207 tpm_buf_append_u16(&buf, digest->alg_id); in tpm2_pcr_read() 218 if (digest_size > sizeof(digest->digest) || in tpm2_pcr_read() 227 memcpy(digest->digest, out->digest, digest_size); in tpm2_pcr_read() 275 tpm_buf_append(&buf, (const unsigned char *)&digests[i].digest, in tpm2_pcr_extend() 816 struct tpm_digest digest = { .alg_id = bank->alg_id }; in tpm2_init_bank_info() local 834 return tpm2_pcr_read(chip, 0, &digest, &bank->digest_size); in tpm2_init_bank_info()
|