| /Linux-v5.4/security/integrity/ima/ | 
| D | ima_modsig.c | 21 	enum hash_algo hash_algo;  member103 	hdr->hash_algo = HASH_ALGO__LAST;  in ima_read_modsig()
 133 			      &modsig->digest_size, &modsig->hash_algo);  in ima_collect_modsig()
 142 int ima_get_modsig_digest(const struct modsig *modsig, enum hash_algo *algo,  in ima_get_modsig_digest()
 145 	*algo = modsig->hash_algo;  in ima_get_modsig_digest()
 
 | 
| D | ima_template_lib.c | 229 				       u8 hash_algo,  in ima_eventdigest_init_common()  argument243 	if (hash_algo < HASH_ALGO__LAST) {  in ima_eventdigest_init_common()
 246 				   hash_algo_name[hash_algo]);  in ima_eventdigest_init_common()
 317 	u8 *cur_digest = NULL, hash_algo = HASH_ALGO_SHA1;  in ima_eventdigest_ng_init()  local
 326 	hash_algo = event_data->iint->ima_hash->algo;  in ima_eventdigest_ng_init()
 329 					   hash_algo, field_data);  in ima_eventdigest_ng_init()
 339 	enum hash_algo hash_algo;  in ima_eventdigest_modsig_init()  local
 348 		hash_algo = HASH_ALGO_SHA1;  in ima_eventdigest_modsig_init()
 354 		rc = ima_get_modsig_digest(event_data->modsig, &hash_algo,  in ima_eventdigest_modsig_init()
 358 		else if (hash_algo == HASH_ALGO__LAST || cur_digestsize == 0)  in ima_eventdigest_modsig_init()
 [all …]
 
 | 
| D | ima.h | 214 			    enum hash_algo algo, struct modsig *modsig);265 enum hash_algo ima_get_hash_algo(struct evm_ima_xattr_data *xattr_value,
 300 static inline enum hash_algo
 319 int ima_get_modsig_digest(const struct modsig *modsig, enum hash_algo *algo,
 342 					enum hash_algo *algo, const u8 **digest,  in ima_get_modsig_digest()
 
 | 
| D | ima_main.c | 208 	enum hash_algo hash_algo;  in process_measurement()  local324 	hash_algo = ima_get_hash_algo(xattr_value, xattr_len);  in process_measurement()
 326 	rc = ima_collect_measurement(iint, file, buf, size, hash_algo, modsig);  in process_measurement()
 
 | 
| D | ima_appraise.c | 150 enum hash_algo ima_get_hash_algo(struct evm_ima_xattr_data *xattr_value,  in ima_get_hash_algo()154 	enum hash_algo ret;  in ima_get_hash_algo()
 165 		return sig->hash_algo;  in ima_get_hash_algo()
 
 | 
| /Linux-v5.4/security/integrity/ | 
| D | digsig_asymmetric.c | 94 	if (hdr->hash_algo >= HASH_ALGO__LAST)  in asymmetric_verify()103 	pks.hash_algo = hash_algo_name[hdr->hash_algo];  in asymmetric_verify()
 104 	if (hdr->hash_algo == HASH_ALGO_STREEBOG_256 ||  in asymmetric_verify()
 105 	    hdr->hash_algo == HASH_ALGO_STREEBOG_512) {  in asymmetric_verify()
 
 | 
| D | integrity.h | 112 	uint8_t	hash_algo;	/* Digest algorithm [enum hash_algo] */  member
 | 
| /Linux-v5.4/crypto/asymmetric_keys/ | 
| D | pkcs7_verify.c | 31 	kenter(",%u,%s", sinfo->index, sinfo->sig->hash_algo);  in pkcs7_digest()37 	if (!sinfo->sig->hash_algo)  in pkcs7_digest()
 43 	tfm = crypto_alloc_shash(sinfo->sig->hash_algo, 0, 0);  in pkcs7_digest()
 126 		     enum hash_algo *hash_algo)  in pkcs7_get_digest()  argument
 145 		if (!strcmp(hash_algo_name[i], sinfo->sig->hash_algo)) {  in pkcs7_get_digest()
 146 			*hash_algo = i;  in pkcs7_get_digest()
 
 | 
| D | public_key.c | 64 				    const char *hash_algo,  in software_key_determine_akcipher()  argument75 		if (!hash_algo)  in software_key_determine_akcipher()
 82 				     pkey->pkey_algo, hash_algo);  in software_key_determine_akcipher()
 113 					      params->hash_algo,  in software_key_query()
 178 					      params->hash_algo,  in software_key_eds_op()
 268 					      sig->hash_algo,  in public_key_verify_signature()
 
 | 
| D | pkcs7_parser.c | 231 		ctx->sinfo->sig->hash_algo = "md4";  in pkcs7_sig_note_digest_algo()234 		ctx->sinfo->sig->hash_algo = "md5";  in pkcs7_sig_note_digest_algo()
 237 		ctx->sinfo->sig->hash_algo = "sha1";  in pkcs7_sig_note_digest_algo()
 240 		ctx->sinfo->sig->hash_algo = "sha256";  in pkcs7_sig_note_digest_algo()
 243 		ctx->sinfo->sig->hash_algo = "sha384";  in pkcs7_sig_note_digest_algo()
 246 		ctx->sinfo->sig->hash_algo = "sha512";  in pkcs7_sig_note_digest_algo()
 249 		ctx->sinfo->sig->hash_algo = "sha224";  in pkcs7_sig_note_digest_algo()
 
 | 
| D | x509_cert_parser.c | 207 		ctx->cert->sig->hash_algo = "md4";  in x509_note_pkey_algo()211 		ctx->cert->sig->hash_algo = "sha1";  in x509_note_pkey_algo()
 215 		ctx->cert->sig->hash_algo = "sha256";  in x509_note_pkey_algo()
 219 		ctx->cert->sig->hash_algo = "sha384";  in x509_note_pkey_algo()
 223 		ctx->cert->sig->hash_algo = "sha512";  in x509_note_pkey_algo()
 227 		ctx->cert->sig->hash_algo = "sha224";  in x509_note_pkey_algo()
 231 		ctx->cert->sig->hash_algo = "streebog256";  in x509_note_pkey_algo()
 235 		ctx->cert->sig->hash_algo = "streebog512";  in x509_note_pkey_algo()
 
 | 
| D | asym_tpm.c | 381 static int determine_akcipher(const char *encoding, const char *hash_algo,  in determine_akcipher()  argument385 		if (!hash_algo) {  in determine_akcipher()
 391 			     hash_algo) >= CRYPTO_MAX_ALG_NAME)  in determine_akcipher()
 420 	ret = determine_akcipher(params->encoding, params->hash_algo, alg_name);  in tpm_key_query()
 474 	ret = determine_akcipher(params->encoding, params->hash_algo, alg_name);  in tpm_key_encrypt()
 530 	if (params->hash_algo)  in tpm_key_decrypt()
 659 	if (params->hash_algo) {  in tpm_key_sign()
 661 						lookup_asn1(params->hash_algo);  in tpm_key_sign()
 769 	ret = determine_akcipher(sig->encoding, sig->hash_algo, alg_name);  in tpm_key_verify_signature()
 
 | 
| D | x509_public_key.c | 40 	if (!sig->hash_algo) {  in x509_get_sig_params()54 	tfm = crypto_alloc_shash(sig->hash_algo, 0, 0);  in x509_get_sig_params()
 187 			 cert->sig->pkey_algo, cert->sig->hash_algo);  in x509_key_preparse()
 
 | 
| /Linux-v5.4/include/crypto/ | 
| D | pkcs7.h | 45 			    u32 *len, enum hash_algo *hash_algo);
 | 
| D | public_key.h | 45 	const char *hash_algo;  member
 | 
| /Linux-v5.4/scripts/ | 
| D | sign-file.c | 212 	char *hash_algo = NULL;  in main()  local265 		hash_algo = argv[1];  in main()
 267 		hash_algo = argv[0];  in main()
 282 	if (strcmp(hash_algo, "sha1") != 0) {  in main()
 303 		digest_algo = EVP_get_digestbyname(hash_algo);  in main()
 
 | 
| /Linux-v5.4/security/integrity/evm/ | 
| D | evm_crypto.c | 74 static struct shash_desc *init_desc(char type, uint8_t hash_algo)  in init_desc()  argument89 		if (hash_algo >= HASH_ALGO__LAST)  in init_desc()
 92 		tfm = &evm_tfm[hash_algo];  in init_desc()
 93 		algo = hash_algo_name[hash_algo];  in init_desc()
 
 | 
| /Linux-v5.4/drivers/crypto/virtio/ | 
| D | virtio_crypto_core.c | 296 	u32 hash_algo = 0;  in virtcrypto_probe()  local344 		hash_algo, &hash_algo);  in virtcrypto_probe()
 375 	vcrypto->hash_algo = hash_algo;  in virtcrypto_probe()
 
 | 
| D | virtio_crypto_common.h | 55 	u32 hash_algo;  member
 | 
| D | virtio_crypto_mgr.c | 302 		algo_mask = vcrypto->hash_algo;  in virtcrypto_algo_is_supported()
 | 
| /Linux-v5.4/fs/ubifs/ | 
| D | sb.c | 182 		sup->hash_algo = cpu_to_le16(c->auth_hash_algo);  in create_default_filesystem()187 		sup->hash_algo = 0xffff;  in create_default_filesystem()
 545 	int hash_algo;  in authenticate_sb_node()  local
 567 	hash_algo = le16_to_cpu(sup->hash_algo);  in authenticate_sb_node()
 568 	if (hash_algo >= HASH_ALGO__LAST) {  in authenticate_sb_node()
 570 			  hash_algo);  in authenticate_sb_node()
 574 	if (strcmp(hash_algo_name[hash_algo], c->auth_hash_name)) {  in authenticate_sb_node()
 576 			     " but %s is specified", hash_algo_name[hash_algo],  in authenticate_sb_node()
 
 | 
| /Linux-v5.4/include/uapi/linux/ | 
| D | hash_info.h | 17 enum hash_algo {  enum
 | 
| /Linux-v5.4/include/linux/ | 
| D | keyctl.h | 32 	const char	*hash_algo;	/* Digest algorithm used (eg. "sha1") or NULL if N/A */  member
 | 
| D | ecryptfs.h | 69 	s32 hash_algo;  member
 | 
| /Linux-v5.4/security/keys/encrypted-keys/ | 
| D | ecryptfs_format.c | 73 	auth_tok->token.password.hash_algo = PGP_DIGEST_ALGO_SHA512;  in ecryptfs_fill_auth_tok()
 |