/kernel/linux/linux-5.10/crypto/asymmetric_keys/ |
D | public_key.c | 69 const char *encoding, const char *hash_algo, in software_key_determine_akcipher() argument 82 if (!hash_algo) in software_key_determine_akcipher() 89 pkey->pkey_algo, hash_algo); in software_key_determine_akcipher() 98 if (hash_algo) in software_key_determine_akcipher() 110 if (!hash_algo) in software_key_determine_akcipher() 112 if (strcmp(hash_algo, "sha1") != 0 && in software_key_determine_akcipher() 113 strcmp(hash_algo, "sha224") != 0 && in software_key_determine_akcipher() 114 strcmp(hash_algo, "sha256") != 0 && in software_key_determine_akcipher() 115 strcmp(hash_algo, "sha384") != 0 && in software_key_determine_akcipher() 116 strcmp(hash_algo, "sha512") != 0) in software_key_determine_akcipher() [all …]
|
D | x509_cert_parser.c | 207 ctx->cert->sig->hash_algo = "md4"; in x509_note_pkey_algo() 211 ctx->cert->sig->hash_algo = "sha1"; in x509_note_pkey_algo() 215 ctx->cert->sig->hash_algo = "sha256"; in x509_note_pkey_algo() 219 ctx->cert->sig->hash_algo = "sha384"; in x509_note_pkey_algo() 223 ctx->cert->sig->hash_algo = "sha512"; in x509_note_pkey_algo() 227 ctx->cert->sig->hash_algo = "sha224"; in x509_note_pkey_algo() 231 ctx->cert->sig->hash_algo = "sha1"; in x509_note_pkey_algo() 235 ctx->cert->sig->hash_algo = "sha224"; in x509_note_pkey_algo() 239 ctx->cert->sig->hash_algo = "sha256"; in x509_note_pkey_algo() 243 ctx->cert->sig->hash_algo = "sha384"; in x509_note_pkey_algo() [all …]
|
D | pkcs7_verify.c | 31 kenter(",%u,%s", sinfo->index, sinfo->sig->hash_algo); in pkcs7_digest() 37 if (!sinfo->sig->hash_algo) in pkcs7_digest() 43 tfm = crypto_alloc_shash(sinfo->sig->hash_algo, 0, 0); in pkcs7_digest() 126 enum hash_algo *hash_algo) in pkcs7_get_digest() argument 145 if (!strcmp(hash_algo_name[i], sinfo->sig->hash_algo)) { in pkcs7_get_digest() 146 *hash_algo = i; in pkcs7_get_digest()
|
D | pkcs7_parser.c | 231 ctx->sinfo->sig->hash_algo = "md4"; in pkcs7_sig_note_digest_algo() 234 ctx->sinfo->sig->hash_algo = "md5"; in pkcs7_sig_note_digest_algo() 237 ctx->sinfo->sig->hash_algo = "sha1"; in pkcs7_sig_note_digest_algo() 240 ctx->sinfo->sig->hash_algo = "sha256"; in pkcs7_sig_note_digest_algo() 243 ctx->sinfo->sig->hash_algo = "sha384"; in pkcs7_sig_note_digest_algo() 246 ctx->sinfo->sig->hash_algo = "sha512"; in pkcs7_sig_note_digest_algo() 249 ctx->sinfo->sig->hash_algo = "sha224"; in pkcs7_sig_note_digest_algo()
|
D | asym_tpm.c | 365 static int determine_akcipher(const char *encoding, const char *hash_algo, in determine_akcipher() argument 369 if (!hash_algo) { in determine_akcipher() 375 hash_algo) >= CRYPTO_MAX_ALG_NAME) in determine_akcipher() 404 ret = determine_akcipher(params->encoding, params->hash_algo, alg_name); in tpm_key_query() 458 ret = determine_akcipher(params->encoding, params->hash_algo, alg_name); in tpm_key_encrypt() 515 if (params->hash_algo) in tpm_key_decrypt() 644 if (params->hash_algo) { in tpm_key_sign() 646 lookup_asn1(params->hash_algo); in tpm_key_sign() 753 ret = determine_akcipher(sig->encoding, sig->hash_algo, alg_name); in tpm_key_verify_signature()
|
D | x509_public_key.c | 43 if (!sig->hash_algo) { in x509_get_sig_params() 57 tfm = crypto_alloc_shash(sig->hash_algo, 0, 0); in x509_get_sig_params() 186 cert->sig->pkey_algo, cert->sig->hash_algo); in x509_key_preparse()
|
/kernel/linux/linux-5.10/security/integrity/ima/ |
D | ima_modsig.c | 21 enum hash_algo hash_algo; member 83 hdr->hash_algo = HASH_ALGO__LAST; in ima_read_modsig() 113 &modsig->digest_size, &modsig->hash_algo); in ima_collect_modsig() 122 int ima_get_modsig_digest(const struct modsig *modsig, enum hash_algo *algo, in ima_get_modsig_digest() 125 *algo = modsig->hash_algo; in ima_get_modsig_digest()
|
D | ima_template_lib.c | 227 u8 hash_algo, in ima_eventdigest_init_common() argument 241 if (hash_algo < HASH_ALGO__LAST) { in ima_eventdigest_init_common() 244 hash_algo_name[hash_algo]); in ima_eventdigest_init_common() 333 u8 *cur_digest = NULL, hash_algo = HASH_ALGO_SHA1; in ima_eventdigest_ng_init() local 342 hash_algo = event_data->iint->ima_hash->algo; in ima_eventdigest_ng_init() 345 hash_algo, field_data); in ima_eventdigest_ng_init() 355 enum hash_algo hash_algo; in ima_eventdigest_modsig_init() local 364 hash_algo = HASH_ALGO_SHA1; in ima_eventdigest_modsig_init() 370 rc = ima_get_modsig_digest(event_data->modsig, &hash_algo, in ima_eventdigest_modsig_init() 374 else if (hash_algo == HASH_ALGO__LAST || cur_digestsize == 0) in ima_eventdigest_modsig_init() [all …]
|
D | ima_appraise.c | 168 enum hash_algo ima_get_hash_algo(struct evm_ima_xattr_data *xattr_value, in ima_get_hash_algo() 172 enum hash_algo ret; in ima_get_hash_algo() 183 return sig->hash_algo; in ima_get_hash_algo() 335 enum hash_algo hash_algo; in ima_check_blacklist() local 344 ima_get_modsig_digest(modsig, &hash_algo, &digest, &digestsize); in ima_check_blacklist()
|
D | ima.h | 262 enum hash_algo algo, struct modsig *modsig); 319 enum hash_algo ima_get_hash_algo(struct evm_ima_xattr_data *xattr_value, 360 static inline enum hash_algo 378 int ima_get_modsig_digest(const struct modsig *modsig, enum hash_algo *algo, 396 enum hash_algo *algo, const u8 **digest, in ima_get_modsig_digest()
|
D | ima_main.c | 212 enum hash_algo hash_algo; in process_measurement() local 328 hash_algo = ima_get_hash_algo(xattr_value, xattr_len); in process_measurement() 330 rc = ima_collect_measurement(iint, file, buf, size, hash_algo, modsig); in process_measurement() 526 int hash_algo; in ima_file_hash() local 556 hash_algo = iint->ima_hash->algo; in ima_file_hash() 559 return hash_algo; in ima_file_hash()
|
D | ima_crypto.c | 62 enum hash_algo algo; 91 static struct crypto_shash *ima_alloc_tfm(enum hash_algo algo) in ima_alloc_tfm() 117 enum hash_algo algo; in ima_init_crypto() 290 static struct crypto_ahash *ima_alloc_atfm(enum hash_algo algo) in ima_alloc_atfm()
|
/kernel/linux/linux-5.10/security/integrity/ |
D | digsig_asymmetric.c | 98 if (hdr->hash_algo >= HASH_ALGO__LAST) in asymmetric_verify() 107 pks.hash_algo = hash_algo_name[hdr->hash_algo]; in asymmetric_verify() 108 switch (hdr->hash_algo) { in asymmetric_verify()
|
/kernel/linux/linux-5.10/include/crypto/ |
D | pkcs7.h | 45 u32 *len, enum hash_algo *hash_algo);
|
D | public_key.h | 46 const char *hash_algo; member
|
/kernel/linux/linux-5.10/scripts/ |
D | sign-file.c | 219 char *hash_algo = NULL; in main() local 272 hash_algo = argv[1]; in main() 274 hash_algo = argv[0]; in main() 289 if (strcmp(hash_algo, "sha1") != 0) { in main() 310 digest_algo = EVP_get_digestbyname(hash_algo); in main()
|
/kernel/linux/linux-5.10/security/integrity/evm/ |
D | evm_crypto.c | 72 static struct shash_desc *init_desc(char type, uint8_t hash_algo) in init_desc() argument 87 if (hash_algo >= HASH_ALGO__LAST) in init_desc() 90 tfm = &evm_tfm[hash_algo]; in init_desc() 91 algo = hash_algo_name[hash_algo]; in init_desc()
|
/kernel/linux/linux-5.10/drivers/crypto/virtio/ |
D | virtio_crypto_core.c | 296 u32 hash_algo = 0; in virtcrypto_probe() local 344 hash_algo, &hash_algo); in virtcrypto_probe() 375 vcrypto->hash_algo = hash_algo; in virtcrypto_probe()
|
/kernel/linux/linux-5.10/fs/ubifs/ |
D | sb.c | 182 sup->hash_algo = cpu_to_le16(c->auth_hash_algo); in create_default_filesystem() 187 sup->hash_algo = cpu_to_le16(0xffff); in create_default_filesystem() 543 int hash_algo; in authenticate_sb_node() local 565 hash_algo = le16_to_cpu(sup->hash_algo); in authenticate_sb_node() 566 if (hash_algo >= HASH_ALGO__LAST) { in authenticate_sb_node() 568 hash_algo); in authenticate_sb_node() 572 if (strcmp(hash_algo_name[hash_algo], c->auth_hash_name)) { in authenticate_sb_node() 574 " but %s is specified", hash_algo_name[hash_algo], in authenticate_sb_node()
|
/kernel/linux/patches/linux-4.19/prebuilts/usr/include/linux/ |
D | hash_info.h | 8 enum hash_algo { enum
|
/kernel/linux/linux-5.10/include/uapi/linux/ |
D | hash_info.h | 17 enum hash_algo { enum
|
/kernel/linux/patches/linux-5.10/prebuilts/usr/include/linux/ |
D | hash_info.h | 21 enum hash_algo { enum
|
/kernel/linux/linux-5.10/include/linux/ |
D | keyctl.h | 32 const char *hash_algo; /* Digest algorithm used (eg. "sha1") or NULL if N/A */ member
|
D | ecryptfs.h | 69 s32 hash_algo; member
|
/kernel/linux/linux-5.10/security/keys/encrypted-keys/ |
D | ecryptfs_format.c | 73 auth_tok->token.password.hash_algo = PGP_DIGEST_ALGO_SHA512; in ecryptfs_fill_auth_tok()
|