Home
last modified time | relevance | path

Searched refs:sha1 (Results 1 – 25 of 40) sorted by relevance

12

/Linux-v5.4/arch/powerpc/crypto/
DMakefile10 obj-$(CONFIG_CRYPTO_SHA1_PPC) += sha1-powerpc.o
11 obj-$(CONFIG_CRYPTO_SHA1_PPC_SPE) += sha1-ppc-spe.o
19 sha1-powerpc-y := sha1-powerpc-asm.o sha1.o
20 sha1-ppc-spe-y := sha1-spe-asm.o sha1-spe-glue.o
/Linux-v5.4/arch/arm/crypto/
DMakefile8 obj-$(CONFIG_CRYPTO_SHA1_ARM) += sha1-arm.o
9 obj-$(CONFIG_CRYPTO_SHA1_ARM_NEON) += sha1-arm-neon.o
16 ce-obj-$(CONFIG_CRYPTO_SHA1_ARM_CE) += sha1-arm-ce.o
44 sha1-arm-y := sha1-armv4-large.o sha1_glue.o
45 sha1-arm-neon-y := sha1-armv7-neon.o sha1_neon_glue.o
50 sha1-arm-ce-y := sha1-ce-core.o sha1-ce-glue.o
Dsha1-ce-core.S41 sha1\op\().32 dg0, dg1a\ev, ta\ev
43 sha1\op\().32 dg0, \dg1, ta\ev
/Linux-v5.4/drivers/net/ppp/
Dppp_mppe.c93 struct shash_desc *sha1; member
133 crypto_shash_init(state->sha1); in get_new_key_from_sha()
134 crypto_shash_update(state->sha1, state->master_key, in get_new_key_from_sha()
136 crypto_shash_update(state->sha1, sha_pad->sha_pad1, in get_new_key_from_sha()
138 crypto_shash_update(state->sha1, state->session_key, in get_new_key_from_sha()
140 crypto_shash_update(state->sha1, sha_pad->sha_pad2, in get_new_key_from_sha()
142 crypto_shash_final(state->sha1, state->sha1_digest); in get_new_key_from_sha()
191 state->sha1 = kmalloc(sizeof(*state->sha1) + in mppe_alloc()
194 if (!state->sha1) { in mppe_alloc()
198 state->sha1->tfm = shash; in mppe_alloc()
[all …]
/Linux-v5.4/arch/arm64/crypto/
DMakefile8 obj-$(CONFIG_CRYPTO_SHA1_ARM64_CE) += sha1-ce.o
9 sha1-ce-y := sha1-ce-glue.o sha1-ce-core.o
Dsha1-ce-core.S39 sha1\op dg0q, \dg1, t0.4s
41 sha1\op dg0q, dg1s, t0.4s
48 sha1\op dg0q, dg2s, t1.4s
/Linux-v5.4/arch/sparc/crypto/
DMakefile6 obj-$(CONFIG_CRYPTO_SHA1_SPARC64) += sha1-sparc64.o
17 sha1-sparc64-y := sha1_asm.o sha1_glue.o
/Linux-v5.4/security/apparmor/
DKconfig19 bool "Enable introspection of sha1 hashes for loaded profiles"
33 This option selects whether sha1 hashing of loaded policy
34 is enabled by default. The generation of sha1 hashes for
/Linux-v5.4/arch/x86/crypto/
DMakefile31 obj-$(CONFIG_CRYPTO_SHA1_SSSE3) += sha1-ssse3.o
100 sha1-ssse3-y := sha1_ssse3_asm.o sha1_ssse3_glue.o
103 sha1-ssse3-y += sha1_avx2_x86_64_asm.o
107 sha1-ssse3-y += sha1_ni_asm.o
/Linux-v5.4/drivers/crypto/
Dpadlock-sha.c508 struct shash_alg *sha1; in padlock_init() local
517 sha1 = &sha1_alg; in padlock_init()
520 sha1 = &sha1_alg_nano; in padlock_init()
524 rc = crypto_register_shash(sha1); in padlock_init()
537 crypto_unregister_shash(sha1); in padlock_init()
/Linux-v5.4/arch/mips/cavium-octeon/crypto/
DMakefile9 obj-$(CONFIG_CRYPTO_SHA1_OCTEON) += octeon-sha1.o
/Linux-v5.4/Documentation/ABI/testing/
Devm7 HMAC-sha1 value across the extended attributes, storing the
11 an HMAC-sha1 generated locally with a
/Linux-v5.4/tools/testing/ktest/
Dktest.pl2025 my $sha1 = `git rev-list --max-count=1 $commit`;
2028 logit $sha1;
2037 chomp $sha1;
2039 return $sha1;
3417 foreach my $sha1 (split /\s+/, $ignore_warnings) {
3418 $ignored_warnings{$sha1} = 1;
3424 my $sha1 = $item;
3425 $sha1 =~ s/^([[:xdigit:]]+).*/$1/;
3429 run_command "git checkout $sha1" or
3430 dodie "Failed to checkout $sha1";
[all …]
/Linux-v5.4/security/integrity/
Dintegrity.h96 } sha1; member
/Linux-v5.4/tools/testing/selftests/netfilter/
Dnft_flowtable.sh342 …ate add src $remote dst $me proto esp spi $spi_in enc aes $KEY_AES auth sha1 $KEY_SHA mode tunne…
343 …ate add src $me dst $remote proto esp spi $spi_out enc aes $KEY_AES auth sha1 $KEY_SHA mode tunne…
/Linux-v5.4/Documentation/sphinx/
Dkfigure.py51 from hashlib import sha1
439 fname = path.join('%s-%s' % (srclang, sha1(hashobj).hexdigest()))
/Linux-v5.4/Documentation/crypto/
Darchitecture.rst48 - sha1
50 - hmac(sha1)
52 - authenc(hmac(sha1),cbc(aes))
54 In these examples, "aes" and "sha1" are the ciphers and all others are
Dapi-samples.rst139 char *hash_alg_name = "sha1-padlock-nano";
/Linux-v5.4/drivers/crypto/qat/qat_common/
Dqat_algs.c117 struct sha1_state sha1; member
197 if (crypto_shash_export(shash, &ctx->sha1)) in qat_alg_do_precomputes()
200 *hash_state_out = cpu_to_be32(ctx->sha1.state[i]); in qat_alg_do_precomputes()
233 if (crypto_shash_export(shash, &ctx->sha1)) in qat_alg_do_precomputes()
236 *hash_state_out = cpu_to_be32(ctx->sha1.state[i]); in qat_alg_do_precomputes()
/Linux-v5.4/tools/testing/selftests/net/
Dxfrm_policy.sh53 …ate add src $remote dst $me proto esp spi $spi_in enc aes $KEY_AES auth sha1 $KEY_SHA mode tunn…
54 …ate add src $me dst $remote proto esp spi $spi_out enc aes $KEY_AES auth sha1 $KEY_SHA mode tunne…
/Linux-v5.4/Documentation/security/keys/
Dtrusted-encrypted.rst68 allowed value is sha1. For TPM 2.x the allowed values
69 are sha1, sha256, sha384, sha512 and sm3-256.
/Linux-v5.4/security/integrity/evm/
Devm_crypto.c323 data.hdr.xattr.sha1.type = EVM_XATTR_HMAC; in evm_update_evmxattr()
/Linux-v5.4/security/integrity/ima/
Dima_appraise.c68 iint->ima_hash->xattr.sha1.type = IMA_XATTR_DIGEST; in ima_fix_xattr()
/Linux-v5.4/Documentation/security/
DIMA-templates.rst10 and pathname. The filedata hash is limited to 20 bytes (md5/sha1).
/Linux-v5.4/lib/
DMakefile30 sha1.o chacha.o irq_regs.o argv_split.o \

12