/Linux-v5.4/arch/powerpc/crypto/ |
D | Makefile | 10 obj-$(CONFIG_CRYPTO_SHA1_PPC) += sha1-powerpc.o 11 obj-$(CONFIG_CRYPTO_SHA1_PPC_SPE) += sha1-ppc-spe.o 19 sha1-powerpc-y := sha1-powerpc-asm.o sha1.o 20 sha1-ppc-spe-y := sha1-spe-asm.o sha1-spe-glue.o
|
/Linux-v5.4/arch/arm/crypto/ |
D | Makefile | 8 obj-$(CONFIG_CRYPTO_SHA1_ARM) += sha1-arm.o 9 obj-$(CONFIG_CRYPTO_SHA1_ARM_NEON) += sha1-arm-neon.o 16 ce-obj-$(CONFIG_CRYPTO_SHA1_ARM_CE) += sha1-arm-ce.o 44 sha1-arm-y := sha1-armv4-large.o sha1_glue.o 45 sha1-arm-neon-y := sha1-armv7-neon.o sha1_neon_glue.o 50 sha1-arm-ce-y := sha1-ce-core.o sha1-ce-glue.o
|
D | sha1-ce-core.S | 41 sha1\op\().32 dg0, dg1a\ev, ta\ev 43 sha1\op\().32 dg0, \dg1, ta\ev
|
/Linux-v5.4/drivers/net/ppp/ |
D | ppp_mppe.c | 93 struct shash_desc *sha1; member 133 crypto_shash_init(state->sha1); in get_new_key_from_sha() 134 crypto_shash_update(state->sha1, state->master_key, in get_new_key_from_sha() 136 crypto_shash_update(state->sha1, sha_pad->sha_pad1, in get_new_key_from_sha() 138 crypto_shash_update(state->sha1, state->session_key, in get_new_key_from_sha() 140 crypto_shash_update(state->sha1, sha_pad->sha_pad2, in get_new_key_from_sha() 142 crypto_shash_final(state->sha1, state->sha1_digest); in get_new_key_from_sha() 191 state->sha1 = kmalloc(sizeof(*state->sha1) + in mppe_alloc() 194 if (!state->sha1) { in mppe_alloc() 198 state->sha1->tfm = shash; in mppe_alloc() [all …]
|
/Linux-v5.4/arch/arm64/crypto/ |
D | Makefile | 8 obj-$(CONFIG_CRYPTO_SHA1_ARM64_CE) += sha1-ce.o 9 sha1-ce-y := sha1-ce-glue.o sha1-ce-core.o
|
D | sha1-ce-core.S | 39 sha1\op dg0q, \dg1, t0.4s 41 sha1\op dg0q, dg1s, t0.4s 48 sha1\op dg0q, dg2s, t1.4s
|
/Linux-v5.4/arch/sparc/crypto/ |
D | Makefile | 6 obj-$(CONFIG_CRYPTO_SHA1_SPARC64) += sha1-sparc64.o 17 sha1-sparc64-y := sha1_asm.o sha1_glue.o
|
/Linux-v5.4/security/apparmor/ |
D | Kconfig | 19 bool "Enable introspection of sha1 hashes for loaded profiles" 33 This option selects whether sha1 hashing of loaded policy 34 is enabled by default. The generation of sha1 hashes for
|
/Linux-v5.4/arch/x86/crypto/ |
D | Makefile | 31 obj-$(CONFIG_CRYPTO_SHA1_SSSE3) += sha1-ssse3.o 100 sha1-ssse3-y := sha1_ssse3_asm.o sha1_ssse3_glue.o 103 sha1-ssse3-y += sha1_avx2_x86_64_asm.o 107 sha1-ssse3-y += sha1_ni_asm.o
|
/Linux-v5.4/drivers/crypto/ |
D | padlock-sha.c | 508 struct shash_alg *sha1; in padlock_init() local 517 sha1 = &sha1_alg; in padlock_init() 520 sha1 = &sha1_alg_nano; in padlock_init() 524 rc = crypto_register_shash(sha1); in padlock_init() 537 crypto_unregister_shash(sha1); in padlock_init()
|
/Linux-v5.4/arch/mips/cavium-octeon/crypto/ |
D | Makefile | 9 obj-$(CONFIG_CRYPTO_SHA1_OCTEON) += octeon-sha1.o
|
/Linux-v5.4/Documentation/ABI/testing/ |
D | evm | 7 HMAC-sha1 value across the extended attributes, storing the 11 an HMAC-sha1 generated locally with a
|
/Linux-v5.4/tools/testing/ktest/ |
D | ktest.pl | 2025 my $sha1 = `git rev-list --max-count=1 $commit`; 2028 logit $sha1; 2037 chomp $sha1; 2039 return $sha1; 3417 foreach my $sha1 (split /\s+/, $ignore_warnings) { 3418 $ignored_warnings{$sha1} = 1; 3424 my $sha1 = $item; 3425 $sha1 =~ s/^([[:xdigit:]]+).*/$1/; 3429 run_command "git checkout $sha1" or 3430 dodie "Failed to checkout $sha1"; [all …]
|
/Linux-v5.4/security/integrity/ |
D | integrity.h | 96 } sha1; member
|
/Linux-v5.4/tools/testing/selftests/netfilter/ |
D | nft_flowtable.sh | 342 …ate add src $remote dst $me proto esp spi $spi_in enc aes $KEY_AES auth sha1 $KEY_SHA mode tunne… 343 …ate add src $me dst $remote proto esp spi $spi_out enc aes $KEY_AES auth sha1 $KEY_SHA mode tunne…
|
/Linux-v5.4/Documentation/sphinx/ |
D | kfigure.py | 51 from hashlib import sha1 439 fname = path.join('%s-%s' % (srclang, sha1(hashobj).hexdigest()))
|
/Linux-v5.4/Documentation/crypto/ |
D | architecture.rst | 48 - sha1 50 - hmac(sha1) 52 - authenc(hmac(sha1),cbc(aes)) 54 In these examples, "aes" and "sha1" are the ciphers and all others are
|
D | api-samples.rst | 139 char *hash_alg_name = "sha1-padlock-nano";
|
/Linux-v5.4/drivers/crypto/qat/qat_common/ |
D | qat_algs.c | 117 struct sha1_state sha1; member 197 if (crypto_shash_export(shash, &ctx->sha1)) in qat_alg_do_precomputes() 200 *hash_state_out = cpu_to_be32(ctx->sha1.state[i]); in qat_alg_do_precomputes() 233 if (crypto_shash_export(shash, &ctx->sha1)) in qat_alg_do_precomputes() 236 *hash_state_out = cpu_to_be32(ctx->sha1.state[i]); in qat_alg_do_precomputes()
|
/Linux-v5.4/tools/testing/selftests/net/ |
D | xfrm_policy.sh | 53 …ate add src $remote dst $me proto esp spi $spi_in enc aes $KEY_AES auth sha1 $KEY_SHA mode tunn… 54 …ate add src $me dst $remote proto esp spi $spi_out enc aes $KEY_AES auth sha1 $KEY_SHA mode tunne…
|
/Linux-v5.4/Documentation/security/keys/ |
D | trusted-encrypted.rst | 68 allowed value is sha1. For TPM 2.x the allowed values 69 are sha1, sha256, sha384, sha512 and sm3-256.
|
/Linux-v5.4/security/integrity/evm/ |
D | evm_crypto.c | 323 data.hdr.xattr.sha1.type = EVM_XATTR_HMAC; in evm_update_evmxattr()
|
/Linux-v5.4/security/integrity/ima/ |
D | ima_appraise.c | 68 iint->ima_hash->xattr.sha1.type = IMA_XATTR_DIGEST; in ima_fix_xattr()
|
/Linux-v5.4/Documentation/security/ |
D | IMA-templates.rst | 10 and pathname. The filedata hash is limited to 20 bytes (md5/sha1).
|
/Linux-v5.4/lib/ |
D | Makefile | 30 sha1.o chacha.o irq_regs.o argv_split.o \
|