Home
last modified time | relevance | path

Searched refs:digest_size (Results 1 – 25 of 52) sorted by relevance

123

/Linux-v5.4/fs/verity/
Dmeasure.c40 if (get_user(arg.digest_size, &uarg->digest_size)) in fsverity_ioctl_measure()
42 if (arg.digest_size < hash_alg->digest_size) in fsverity_ioctl_measure()
47 arg.digest_size = hash_alg->digest_size; in fsverity_ioctl_measure()
52 if (copy_to_user(uarg->digest, vi->measurement, hash_alg->digest_size)) in fsverity_ioctl_measure()
Dsignature.c61 d = kzalloc(sizeof(*d) + hash_alg->digest_size, GFP_KERNEL); in fsverity_verify_signature()
66 d->digest_size = cpu_to_le16(hash_alg->digest_size); in fsverity_verify_signature()
67 memcpy(d->digest, vi->measurement, hash_alg->digest_size); in fsverity_verify_signature()
69 err = verify_pkcs7_signature(d, sizeof(*d) + hash_alg->digest_size, in fsverity_verify_signature()
91 hash_alg->name, hash_alg->digest_size, vi->measurement); in fsverity_verify_signature()
Dopen.c46 params->digest_size = hash_alg->digest_size; in fsverity_init_merkle_tree_params()
66 if (WARN_ON(!is_power_of_2(params->digest_size))) { in fsverity_init_merkle_tree_params()
70 if (params->block_size < 2 * params->digest_size) { in fsverity_init_merkle_tree_params()
77 params->log_arity = params->log_blocksize - ilog2(params->digest_size); in fsverity_init_merkle_tree_params()
199 memcpy(vi->root_hash, desc->root_hash, vi->tree_params.digest_size); in fsverity_create_info()
209 vi->tree_params.digest_size, vi->measurement); in fsverity_create_info()
Dhash_algs.c17 .digest_size = SHA256_DIGEST_SIZE,
22 .digest_size = SHA512_DIGEST_SIZE,
76 if (WARN_ON(alg->digest_size != crypto_ahash_digestsize(tfm))) in fsverity_get_hash_alg()
270 BUG_ON(alg->digest_size > FS_VERITY_MAX_DIGEST_SIZE); in fsverity_check_hash_algs()
277 BUG_ON(!is_power_of_2(alg->digest_size)); in fsverity_check_hash_algs()
Dfsverity_private.h38 unsigned int digest_size; /* digest size in bytes, e.g. 32 for SHA-256 */ member
46 unsigned int digest_size; /* same as hash_alg->digest_size */ member
109 __le16 digest_size; member
Denable.c74 pending_size += params->digest_size; in build_merkle_tree_level()
79 if (pending_size + params->digest_size > params->block_size || in build_merkle_tree_level()
125 memset(root_hash, 0, params->digest_size); in build_merkle_tree()
149 memcpy(root_hash, pending_hashes, params->digest_size); in build_merkle_tree()
236 params.hash_alg->name, params.digest_size, desc->root_hash); in enable_verity()
Dverify.c56 const unsigned int hsize = vi->tree_params.digest_size; in cmp_hashes()
90 const unsigned int hsize = params->digest_size; in verify_page()
/Linux-v5.4/arch/arm64/crypto/
Dsha3-ce-glue.c34 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); in sha3_update() local
47 sha3_ce_transform(sctx->st, sctx->buf, 1, digest_size); in sha3_update()
60 sha3_ce_transform(sctx->st, data, blocks, digest_size); in sha3_update()
76 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); in sha3_final() local
88 sha3_ce_transform(sctx->st, sctx->buf, 1, digest_size); in sha3_final()
91 for (i = 0; i < digest_size / 8; i++) in sha3_final()
94 if (digest_size & 4) in sha3_final()
/Linux-v5.4/security/integrity/ima/
Dima_modsig.c25 u32 digest_size; member
133 &modsig->digest_size, &modsig->hash_algo); in ima_collect_modsig()
143 const u8 **digest, u32 *digest_size) in ima_get_modsig_digest() argument
147 *digest_size = modsig->digest_size; in ima_get_modsig_digest()
/Linux-v5.4/drivers/crypto/ccp/
Dccp-crypto-sha.c30 unsigned int digest_size = crypto_ahash_digestsize(tfm); in ccp_sha_complete() local
48 memcpy(req->result, rctx->ctx, digest_size); in ccp_sha_complete()
279 unsigned int digest_size = crypto_shash_digestsize(shash); in ccp_sha_setkey() local
301 key_len = digest_size; in ccp_sha_setkey()
369 u32 digest_size; member
379 .digest_size = SHA1_DIGEST_SIZE,
387 .digest_size = SHA224_DIGEST_SIZE,
395 .digest_size = SHA256_DIGEST_SIZE,
403 .digest_size = SHA384_DIGEST_SIZE,
411 .digest_size = SHA512_DIGEST_SIZE,
[all …]
/Linux-v5.4/drivers/md/
Ddm-verity.h53 unsigned digest_size; /* digest size for the current hash algorithm */ member
110 return (u8 *)(io + 1) + v->ahash_reqsize + v->digest_size; in verity_io_want_digest()
116 return verity_io_want_digest(v, io) + v->digest_size; in verity_io_digest_end()
Ddm-verity-target.c204 *offset = idx * v->digest_size; in verity_hash_at_level()
303 v->digest_size) == 0)) in verity_verify_level()
318 memcpy(want_digest, data, v->digest_size); in verity_verify_level()
348 memcpy(digest, v->root_digest, v->digest_size); in verity_hash_for_block()
357 *is_zero = !memcmp(v->zero_digest, digest, v->digest_size); in verity_hash_for_block()
520 verity_io_want_digest(v, io), v->digest_size) == 0)) { in verity_verify_io()
701 for (x = 0; x < v->digest_size; x++) in verity_status()
840 v->zero_digest = kmalloc(v->digest_size, GFP_KERNEL); in verity_alloc_zero_digest()
1070 v->digest_size = crypto_ahash_digestsize(v->tfm); in verity_ctr()
1071 if ((1 << v->hash_dev_block_bits) < v->digest_size * 2) { in verity_ctr()
[all …]
/Linux-v5.4/drivers/char/tpm/
Dtpm2-cmd.c162 __be16 digest_size; member
183 u16 digest_size; in tpm2_pcr_read() local
197 expected_digest_size = chip->allocated_banks[i].digest_size; in tpm2_pcr_read()
217 digest_size = be16_to_cpu(out->digest_size); in tpm2_pcr_read()
218 if (digest_size > sizeof(digest->digest) || in tpm2_pcr_read()
219 (!digest_size_ptr && digest_size != expected_digest_size)) { in tpm2_pcr_read()
225 *digest_size_ptr = digest_size; in tpm2_pcr_read()
227 memcpy(digest->digest, out->digest, digest_size); in tpm2_pcr_read()
276 chip->allocated_banks[i].digest_size); in tpm2_pcr_extend()
829 bank->digest_size = hash_digest_size[crypto_algo]; in tpm2_init_bank_info()
[all …]
/Linux-v5.4/include/crypto/
Dsha256_base.h98 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); in sha256_base_finish() local
103 for (i = 0; digest_size > 0; i++, digest_size -= sizeof(__be32)) in sha256_base_finish()
Dsha512_base.h121 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); in sha512_base_finish() local
126 for (i = 0; digest_size > 0; i++, digest_size -= sizeof(__be64)) in sha512_base_finish()
Dpublic_key.h43 u8 digest_size; /* Number of bytes in digest */ member
/Linux-v5.4/crypto/asymmetric_keys/
Dverify_pefile.c323 size_t digest_size, desc_size; in pefile_digest_pe() local
337 digest_size = crypto_shash_digestsize(tfm); in pefile_digest_pe()
339 if (digest_size != ctx->digest_len) { in pefile_digest_pe()
341 digest_size, ctx->digest_len); in pefile_digest_pe()
345 pr_debug("Digest: desc=%zu size=%zu\n", desc_size, digest_size); in pefile_digest_pe()
348 desc = kzalloc(desc_size + digest_size, GFP_KERNEL); in pefile_digest_pe()
Dx509_public_key.c64 sig->digest_size = crypto_shash_digestsize(tfm); in x509_get_sig_params()
67 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL); in x509_get_sig_params()
81 ret = is_hash_blacklisted(sig->digest, sig->digest_size, "tbs"); in x509_get_sig_params()
84 sig->digest_size, sig->digest); in x509_get_sig_params()
Dpkcs7_verify.c48 sig->digest_size = crypto_shash_digestsize(tfm); in pkcs7_digest()
51 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL); in pkcs7_digest()
81 if (sinfo->msgdigest_len != sig->digest_size) { in pkcs7_digest()
101 memset(sig->digest, 0, sig->digest_size); in pkcs7_digest()
142 *len = sinfo->sig->digest_size; in pkcs7_get_digest()
/Linux-v5.4/crypto/
Dsha3_generic.c164 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); in crypto_sha3_init() local
166 sctx->rsiz = 200 - 2 * digest_size; in crypto_sha3_init()
217 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); in crypto_sha3_final() local
229 for (i = 0; i < digest_size / 8; i++) in crypto_sha3_final()
232 if (digest_size & 4) in crypto_sha3_final()
Drsa-pkcs1pad.c387 unsigned int ps_end, digest_size = 0; in pkcs1pad_sign() local
393 digest_size = digest_info->size; in pkcs1pad_sign()
395 if (req->src_len + digest_size > ctx->key_size - 11) in pkcs1pad_sign()
408 ps_end = ctx->key_size - digest_size - req->src_len - 2; in pkcs1pad_sign()
/Linux-v5.4/drivers/block/drbd/
Ddrbd_worker.c347 int digest_size; in w_e_send_csum() local
357 digest_size = crypto_shash_digestsize(peer_device->connection->csums_tfm); in w_e_send_csum()
358 digest = kmalloc(digest_size, GFP_NOIO); in w_e_send_csum()
372 digest, digest_size, in w_e_send_csum()
1173 int digest_size; in w_e_end_csum_rs_req() local
1195 digest_size = crypto_shash_digestsize(peer_device->connection->csums_tfm); in w_e_end_csum_rs_req()
1196 D_ASSERT(device, digest_size == di->digest_size); in w_e_end_csum_rs_req()
1197 digest = kmalloc(digest_size, GFP_NOIO); in w_e_end_csum_rs_req()
1201 eq = !memcmp(digest, di->digest, digest_size); in w_e_end_csum_rs_req()
1238 int digest_size; in w_e_end_ov_req() local
[all …]
/Linux-v5.4/include/uapi/linux/
Dfsverity.h33 __u16 digest_size; /* input/output */ member
/Linux-v5.4/include/linux/
Dtpm_eventlog.h81 u16 digest_size; member
232 efispecid->digest_sizes[j].digest_size; in __calc_tpm2_event_size()
/Linux-v5.4/drivers/crypto/
Dn2_core.c253 u8 digest_size; member
521 unsigned int auth_type, unsigned int digest_size, in n2_do_async_digest() argument
565 auth_type, digest_size, in n2_do_async_digest()
615 ds = n2alg->digest_size; in n2_hash_async_digest()
635 ds = n2alg->derived.digest_size; in n2_hmac_async_digest()
1280 u8 digest_size; member
1311 .digest_size = MD5_DIGEST_SIZE,
1319 .digest_size = SHA1_DIGEST_SIZE,
1327 .digest_size = SHA256_DIGEST_SIZE,
1335 .digest_size = SHA224_DIGEST_SIZE,
[all …]

123