Home
last modified time | relevance | path

Searched refs:digest (Results 1 – 25 of 181) sorted by relevance

12345678

/Linux-v5.4/crypto/
Dtestmgr.h40 const char *digest; member
1171 .digest = "\x31\xd6\xcf\xe0\xd1\x6a\xe9\x31"
1176 .digest = "\xbd\xe5\x2c\xb3\x1d\xe3\x3e\x46"
1181 .digest = "\xa4\x48\x01\x7a\xaf\x21\xd8\x52"
1186 .digest = "\xd9\x13\x0a\x81\x64\x54\x9f\xe8"
1191 .digest = "\xd7\x9e\x1c\x30\x8a\xa5\xbb\xcd"
1196 .digest = "\x04\x3f\x85\x82\xf2\x41\xdb\x35"
1202 .digest = "\xe3\x3b\x4d\xdc\x9c\x38\xf2\x19"
1210 .digest = "\x6b\x4e\x03\x42\x36\x67\xdb\xb7"
1217 .digest = "\x9e\x86\xff\x69\x55\x7c\xa9\x5f"
[all …]
Decrdsa.c39 const char *digest; /* digest name from oid */ member
75 unsigned char digest[STREEBOG512_DIGEST_SIZE]; in ecrdsa_verify() local
92 !ctx->digest || in ecrdsa_verify()
100 WARN_ON(req->dst_len > sizeof(digest))) in ecrdsa_verify()
108 digest, req->dst_len, req->src_len); in ecrdsa_verify()
122 vli_from_le64(e, digest, ndigits); in ecrdsa_verify()
208 ctx->digest = "streebog256"; in ecrdsa_set_pub_key()
212 ctx->digest = "streebog512"; in ecrdsa_set_pub_key()
Dadiantum.c256 struct scatterlist *sgl, le128 *digest) in adiantum_hash_message() argument
286 return crypto_shash_final(hash_desc, (u8 *)digest); in adiantum_hash_message()
296 le128 digest; in adiantum_finish() local
309 err = adiantum_hash_message(req, req->dst, &digest); in adiantum_finish()
312 le128_add(&digest, &digest, &rctx->header_hash); in adiantum_finish()
313 le128_sub(&rctx->rbuf.bignum, &rctx->rbuf.bignum, &digest); in adiantum_finish()
337 le128 digest; in adiantum_crypt() local
351 err = adiantum_hash_message(req, req->src, &digest); in adiantum_crypt()
354 le128_add(&digest, &digest, &rctx->header_hash); in adiantum_crypt()
357 le128_add(&rctx->rbuf.bignum, &rctx->rbuf.bignum, &digest); in adiantum_crypt()
/Linux-v5.4/security/integrity/ima/
Dima_queue.c60 rc = memcmp(qe->entry->digest, digest_value, TPM_DIGEST_SIZE); in ima_lookup_digest_entry()
80 size += sizeof(entry->digest); in get_binary_runtime_size()
112 key = ima_hash_key(entry->digest); in ima_add_digest_entry()
148 memcpy(digests[i].digest, hash, TPM_DIGEST_SIZE); in ima_pcr_extend()
168 u8 digest[TPM_DIGEST_SIZE]; in ima_add_template_entry() local
176 memcpy(digest, entry->digest, sizeof(digest)); in ima_add_template_entry()
177 if (ima_lookup_digest_entry(digest, entry->pcr)) { in ima_add_template_entry()
192 memset(digest, 0xff, sizeof(digest)); in ima_add_template_entry()
194 tpmresult = ima_pcr_extend(digest, entry->pcr); in ima_add_template_entry()
Dima_modsig.c24 const u8 *digest; member
132 rc = pkcs7_get_digest(modsig->pkcs7_msg, &modsig->digest, in ima_collect_modsig()
143 const u8 **digest, u32 *digest_size) in ima_get_modsig_digest() argument
146 *digest = modsig->digest; in ima_get_modsig_digest()
Dima_api.c101 char digest[TPM_DIGEST_SIZE]; in ima_store_template() member
118 memcpy(entry->digest, hash.hdr.digest, hash.hdr.length); in ima_store_template()
219 char digest[IMA_MAX_DIGEST_SIZE]; in ima_collect_measurement() member
242 memset(&hash.digest, 0, sizeof(hash.digest)); in ima_collect_measurement()
353 hex_byte_pack(hash + (i * 2), iint->ima_hash->digest[i]); in ima_audit_measurement()
Dima_crypto.c307 ahash_request_set_crypt(req, NULL, hash->digest, 0); in ima_calc_file_hash_atfm()
376 rc = crypto_shash_final(shash, hash->digest); in ima_calc_file_hash_tfm()
507 rc = crypto_shash_final(shash, hash->digest); in ima_calc_field_array_hash_tfm()
563 ahash_request_set_crypt(req, NULL, hash->digest, 0); in calc_buffer_ahash_atfm()
614 rc = crypto_shash_final(shash, hash->digest); in calc_buffer_shash_tfm()
660 static int __init ima_calc_boot_aggregate_tfm(char *digest, in ima_calc_boot_aggregate_tfm() argument
663 struct tpm_digest d = { .alg_id = TPM_ALG_SHA1, .digest = {0} }; in ima_calc_boot_aggregate_tfm()
678 rc = crypto_shash_update(shash, d.digest, TPM_DIGEST_SIZE); in ima_calc_boot_aggregate_tfm()
681 crypto_shash_final(shash, digest); in ima_calc_boot_aggregate_tfm()
695 rc = ima_calc_boot_aggregate_tfm(hash->digest, tfm); in ima_calc_boot_aggregate()
Dima_template_lib.c228 static int ima_eventdigest_init_common(const u8 *digest, u32 digestsize, in ima_eventdigest_init_common() argument
251 if (digest) in ima_eventdigest_init_common()
252 memcpy(buffer + offset, digest, digestsize); in ima_eventdigest_init_common()
273 char digest[IMA_MAX_DIGEST_SIZE]; in ima_eventdigest_init() member
286 cur_digest = event_data->iint->ima_hash->digest; in ima_eventdigest_init()
304 cur_digest = hash.hdr.digest; in ima_eventdigest_init()
323 cur_digest = event_data->iint->ima_hash->digest; in ima_eventdigest_ng_init()
Dima.h95 u8 digest[TPM_DIGEST_SIZE]; /* sha1 or md5 measurement hash */ member
149 void ima_print_digest(struct seq_file *m, u8 *digest, u32 size);
178 static inline unsigned long ima_hash_key(u8 *digest) in ima_hash_key() argument
180 return hash_long(*digest, IMA_HASH_BITS); in ima_hash_key()
320 const u8 **digest, u32 *digest_size);
342 enum hash_algo *algo, const u8 **digest, in ima_get_modsig_digest() argument
/Linux-v5.4/arch/s390/purgatory/
Dpurgatory.c18 u8 digest[SHA256_DIGEST_SIZE]; in verify_sha256_digest() local
27 sha256_final(&sctx, digest); in verify_sha256_digest()
29 if (memcmp(digest, purgatory_sha256_digest, sizeof(digest))) in verify_sha256_digest()
/Linux-v5.4/arch/arm64/crypto/
DKconfig13 tristate "SHA-224/SHA-256 digest algorithm for arm64"
17 tristate "SHA-384/SHA-512 digest algorithm for arm64"
21 tristate "SHA-1 digest algorithm (ARMv8 Crypto Extensions)"
27 tristate "SHA-224/SHA-256 digest algorithm (ARMv8 Crypto Extensions)"
33 tristate "SHA-384/SHA-512 digest algorithm (ARMv8 Crypto Extensions)"
39 tristate "SHA3 digest algorithm (ARMv8.2 Crypto Extensions)"
45 tristate "SM3 digest algorithm (ARMv8.2 Crypto Extensions)"
64 tristate "CRCT10DIF digest algorithm using PMULL instructions"
/Linux-v5.4/arch/x86/purgatory/
Dpurgatory.c42 u8 digest[SHA256_DIGEST_SIZE]; in verify_sha256_digest() local
51 sha256_final(&sctx, digest); in verify_sha256_digest()
53 if (memcmp(digest, purgatory_sha256_digest, sizeof(digest))) in verify_sha256_digest()
/Linux-v5.4/security/integrity/evm/
Devm_main.c137 struct evm_digest digest; in evm_verify_hmac() local
174 digest.hdr.algo = HASH_ALGO_SHA1; in evm_verify_hmac()
176 xattr_value_len, &digest); in evm_verify_hmac()
179 rc = crypto_memneq(xattr_data->data, digest.digest, in evm_verify_hmac()
187 digest.hdr.algo = hdr->hash_algo; in evm_verify_hmac()
189 xattr_value_len, xattr_data->type, &digest); in evm_verify_hmac()
194 digest.digest, digest.hdr.length); in evm_verify_hmac()
534 rc = evm_init_hmac(inode, lsm_xattr, xattr_data->digest); in evm_inode_init_security()
/Linux-v5.4/lib/
Dsha1.c82 void sha_transform(__u32 *digest, const char *data, __u32 *array) in sha_transform() argument
86 A = digest[0]; in sha_transform()
87 B = digest[1]; in sha_transform()
88 C = digest[2]; in sha_transform()
89 D = digest[3]; in sha_transform()
90 E = digest[4]; in sha_transform()
182 digest[0] += A; in sha_transform()
183 digest[1] += B; in sha_transform()
184 digest[2] += C; in sha_transform()
185 digest[3] += D; in sha_transform()
[all …]
/Linux-v5.4/crypto/asymmetric_keys/
Dpkcs7_verify.c34 if (sig->digest) in pkcs7_digest()
51 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL); in pkcs7_digest()
52 if (!sig->digest) in pkcs7_digest()
63 sig->digest); in pkcs7_digest()
66 pr_devel("MsgDigest = [%*ph]\n", 8, sig->digest); in pkcs7_digest()
88 if (memcmp(sig->digest, sinfo->msgdigest, in pkcs7_digest()
101 memset(sig->digest, 0, sig->digest_size); in pkcs7_digest()
111 sinfo->authattrs_len, sig->digest); in pkcs7_digest()
114 pr_devel("AADigest = [%*ph]\n", 8, sig->digest); in pkcs7_digest()
141 *buf = sinfo->sig->digest; in pkcs7_get_digest()
Dverify_pefile.c324 void *digest; in pefile_digest_pe() local
361 digest = (void *)desc + desc_size; in pefile_digest_pe()
362 ret = crypto_shash_final(desc, digest); in pefile_digest_pe()
366 pr_debug("Digest calc = [%*ph]\n", ctx->digest_len, digest); in pefile_digest_pe()
371 if (memcmp(digest, ctx->digest, ctx->digest_len) != 0) { in pefile_digest_pe()
442 ctx.digest_len, ctx.digest_len, ctx.digest); in verify_pefile_signature()
450 kzfree(ctx.digest); in verify_pefile_signature()
Dx509_public_key.c67 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL); in x509_get_sig_params()
68 if (!sig->digest) in x509_get_sig_params()
77 ret = crypto_shash_digest(desc, cert->tbs, cert->tbs_size, sig->digest); in x509_get_sig_params()
81 ret = is_hash_blacklisted(sig->digest, sig->digest_size, "tbs"); in x509_get_sig_params()
84 sig->digest_size, sig->digest); in x509_get_sig_params()
/Linux-v5.4/arch/x86/crypto/
Dsha1_ssse3_glue.c30 typedef void (sha1_transform_fn)(u32 *digest, const char *data,
69 asmlinkage void sha1_transform_ssse3(u32 *digest, const char *data,
122 asmlinkage void sha1_transform_avx(u32 *digest, const char *data,
193 asmlinkage void sha1_transform_avx2(u32 *digest, const char *data,
206 static void sha1_apply_transform_avx2(u32 *digest, const char *data, in sha1_apply_transform_avx2() argument
211 sha1_transform_avx2(digest, data, rounds); in sha1_apply_transform_avx2()
213 sha1_transform_avx(digest, data, rounds); in sha1_apply_transform_avx2()
270 asmlinkage void sha1_ni_transform(u32 *digest, const char *data,
/Linux-v5.4/drivers/crypto/inside-secure/
Dsafexcel_hash.c38 u32 digest; member
116 if ((req->digest == CONTEXT_CONTROL_DIGEST_PRECOMPUTED) || in safexcel_context_control()
132 if ((req->digest == CONTEXT_CONTROL_DIGEST_PRECOMPUTED) || in safexcel_context_control()
150 req->digest = CONTEXT_CONTROL_DIGEST_PRECOMPUTED; in safexcel_context_control()
221 (sreq->digest != CONTEXT_CONTROL_DIGEST_HMAC)) { in safexcel_handle_req_result()
596 (req->digest == CONTEXT_CONTROL_DIGEST_PRECOMPUTED)) || in safexcel_ahash_enqueue()
729 req->digest = CONTEXT_CONTROL_DIGEST_HMAC; in safexcel_ahash_final()
732 req->digest = CONTEXT_CONTROL_DIGEST_HMAC; in safexcel_ahash_final()
756 export->digest = req->digest; in safexcel_ahash_export()
777 req->digest = export->digest; in safexcel_ahash_import()
[all …]
/Linux-v5.4/arch/arm/crypto/
DKconfig13 tristate "SHA1 digest algorithm (ARM-asm)"
21 tristate "SHA1 digest algorithm (ARM NEON)"
32 tristate "SHA1 digest algorithm (ARM v8 Crypto Extensions)"
41 tristate "SHA-224/256 digest algorithm (ARM v8 Crypto Extensions)"
50 tristate "SHA-224/256 digest algorithm (ARM-asm and NEON)"
58 tristate "SHA-384/512 digest algorithm (ARM-asm and NEON)"
120 tristate "CRCT10DIF digest algorithm using PMULL instructions"
125 tristate "CRC32(C) digest algorithm using CRC and/or PMULL instructions"
/Linux-v5.4/security/keys/encrypted-keys/
Dencrypted.h40 static inline void dump_hmac(const char *str, const u8 *digest, in dump_hmac() argument
45 print_hex_dump(KERN_ERR, "hmac: ", DUMP_PREFIX_NONE, 32, 1, digest, in dump_hmac()
62 static inline void dump_hmac(const char *str, const u8 *digest, in dump_hmac() argument
Dencrypted.c326 static int calc_hash(struct crypto_shash *tfm, u8 *digest, in calc_hash() argument
334 err = crypto_shash_digest(desc, buf, buflen, digest); in calc_hash()
339 static int calc_hmac(u8 *digest, const u8 *key, unsigned int keylen, in calc_hmac() argument
354 err = calc_hash(tfm, digest, buf, buflen); in calc_hmac()
504 u8 *digest; in datablob_hmac_append() local
511 digest = epayload->format + epayload->datablob_len; in datablob_hmac_append()
512 ret = calc_hmac(digest, derived_key, sizeof derived_key, in datablob_hmac_append()
515 dump_hmac(NULL, digest, HASH_SIZE); in datablob_hmac_append()
527 u8 digest[HASH_SIZE]; in datablob_hmac_verify() local
543 ret = calc_hmac(digest, derived_key, sizeof derived_key, p, len); in datablob_hmac_verify()
[all …]
/Linux-v5.4/drivers/block/drbd/
Ddrbd_worker.c286 void drbd_csum_ee(struct crypto_shash *tfm, struct drbd_peer_request *peer_req, void *digest) in drbd_csum_ee() argument
311 crypto_shash_final(desc, digest); in drbd_csum_ee()
315 void drbd_csum_bio(struct crypto_shash *tfm, struct bio *bio, void *digest) in drbd_csum_bio() argument
337 crypto_shash_final(desc, digest); in drbd_csum_bio()
348 void *digest; in w_e_send_csum() local
358 digest = kmalloc(digest_size, GFP_NOIO); in w_e_send_csum()
359 if (digest) { in w_e_send_csum()
362 drbd_csum_ee(peer_device->connection->csums_tfm, peer_req, digest); in w_e_send_csum()
372 digest, digest_size, in w_e_send_csum()
374 kfree(digest); in w_e_send_csum()
[all …]
/Linux-v5.4/security/integrity/
Dintegrity.h84 u8 digest[SHA1_DIGEST_SIZE]; member
103 u8 digest[0]; member
156 const char *digest, int digestlen);
167 const char *digest, int digestlen) in integrity_digsig_verify() argument
/Linux-v5.4/drivers/char/tpm/
Dtpm2-cmd.c163 u8 digest[]; member
176 struct tpm_digest *digest, u16 *digest_size_ptr) in tpm2_pcr_read() argument
191 chip->allocated_banks[i].alg_id != digest->alg_id; i++) in tpm2_pcr_read()
207 tpm_buf_append_u16(&buf, digest->alg_id); in tpm2_pcr_read()
218 if (digest_size > sizeof(digest->digest) || in tpm2_pcr_read()
227 memcpy(digest->digest, out->digest, digest_size); in tpm2_pcr_read()
275 tpm_buf_append(&buf, (const unsigned char *)&digests[i].digest, in tpm2_pcr_extend()
816 struct tpm_digest digest = { .alg_id = bank->alg_id }; in tpm2_init_bank_info() local
834 return tpm2_pcr_read(chip, 0, &digest, &bank->digest_size); in tpm2_init_bank_info()

12345678