/kernel/linux/linux-5.10/crypto/ |
D | testmgr.h | 40 const char *digest; member 2826 .digest = "\x31\xd6\xcf\xe0\xd1\x6a\xe9\x31" 2831 .digest = "\xbd\xe5\x2c\xb3\x1d\xe3\x3e\x46" 2836 .digest = "\xa4\x48\x01\x7a\xaf\x21\xd8\x52" 2841 .digest = "\xd9\x13\x0a\x81\x64\x54\x9f\xe8" 2846 .digest = "\xd7\x9e\x1c\x30\x8a\xa5\xbb\xcd" 2851 .digest = "\x04\x3f\x85\x82\xf2\x41\xdb\x35" 2857 .digest = "\xe3\x3b\x4d\xdc\x9c\x38\xf2\x19" 2865 .digest = "\x6b\x4e\x03\x42\x36\x67\xdb\xb7" 2872 .digest = "\x9e\x86\xff\x69\x55\x7c\xa9\x5f" [all …]
|
D | ecrdsa.c | 40 const char *digest; /* digest name from oid */ member 76 unsigned char digest[STREEBOG512_DIGEST_SIZE]; in ecrdsa_verify() local 93 !ctx->digest || in ecrdsa_verify() 101 WARN_ON(req->dst_len > sizeof(digest))) in ecrdsa_verify() 109 digest, req->dst_len, req->src_len); in ecrdsa_verify() 123 vli_from_le64(e, digest, ndigits); in ecrdsa_verify() 209 ctx->digest = "streebog256"; in ecrdsa_set_pub_key() 213 ctx->digest = "streebog512"; in ecrdsa_set_pub_key()
|
D | adiantum.c | 247 struct scatterlist *sgl, le128 *digest) in adiantum_hash_message() argument 277 return crypto_shash_final(hash_desc, (u8 *)digest); in adiantum_hash_message() 287 le128 digest; in adiantum_finish() local 300 err = adiantum_hash_message(req, req->dst, &digest); in adiantum_finish() 303 le128_add(&digest, &digest, &rctx->header_hash); in adiantum_finish() 304 le128_sub(&rctx->rbuf.bignum, &rctx->rbuf.bignum, &digest); in adiantum_finish() 328 le128 digest; in adiantum_crypt() local 342 err = adiantum_hash_message(req, req->src, &digest); in adiantum_crypt() 345 le128_add(&digest, &digest, &rctx->header_hash); in adiantum_crypt() 348 le128_add(&rctx->rbuf.bignum, &rctx->rbuf.bignum, &digest); in adiantum_crypt()
|
/kernel/linux/linux-5.10/lib/ |
D | sha1.c | 86 void sha1_transform(__u32 *digest, const char *data, __u32 *array) in sha1_transform() argument 91 A = digest[0]; in sha1_transform() 92 B = digest[1]; in sha1_transform() 93 C = digest[2]; in sha1_transform() 94 D = digest[3]; in sha1_transform() 95 E = digest[4]; in sha1_transform() 117 digest[0] += A; in sha1_transform() 118 digest[1] += B; in sha1_transform() 119 digest[2] += C; in sha1_transform() 120 digest[3] += D; in sha1_transform() [all …]
|
/kernel/linux/linux-5.10/arch/s390/purgatory/ |
D | purgatory.c | 18 u8 digest[SHA256_DIGEST_SIZE]; in verify_sha256_digest() local 27 sha256_final(&sctx, digest); in verify_sha256_digest() 29 if (memcmp(digest, purgatory_sha256_digest, sizeof(digest))) in verify_sha256_digest()
|
/kernel/linux/linux-5.10/include/crypto/ |
D | poly1305.h | 88 void poly1305_final_arch(struct poly1305_desc_ctx *desc, u8 *digest); 89 void poly1305_final_generic(struct poly1305_desc_ctx *desc, u8 *digest); 91 static inline void poly1305_final(struct poly1305_desc_ctx *desc, u8 *digest) in poly1305_final() argument 94 poly1305_final_arch(desc, digest); in poly1305_final() 96 poly1305_final_generic(desc, digest); in poly1305_final()
|
/kernel/linux/linux-5.10/arch/x86/purgatory/ |
D | purgatory.c | 24 u8 digest[SHA256_DIGEST_SIZE]; in verify_sha256_digest() local 33 sha256_final(&sctx, digest); in verify_sha256_digest() 35 if (memcmp(digest, purgatory_sha256_digest, sizeof(digest))) in verify_sha256_digest()
|
/kernel/linux/linux-5.10/arch/arm64/crypto/ |
D | Kconfig | 13 tristate "SHA-224/SHA-256 digest algorithm for arm64" 17 tristate "SHA-384/SHA-512 digest algorithm for arm64" 21 tristate "SHA-1 digest algorithm (ARMv8 Crypto Extensions)" 27 tristate "SHA-224/SHA-256 digest algorithm (ARMv8 Crypto Extensions)" 33 tristate "SHA-384/SHA-512 digest algorithm (ARMv8 Crypto Extensions)" 39 tristate "SHA3 digest algorithm (ARMv8.2 Crypto Extensions)" 45 tristate "SM3 digest algorithm (ARMv8.2 Crypto Extensions)" 65 tristate "CRCT10DIF digest algorithm using PMULL instructions"
|
/kernel/linux/linux-5.10/security/integrity/evm/ |
D | evm_main.c | 138 struct evm_digest digest; in evm_verify_hmac() local 175 digest.hdr.algo = HASH_ALGO_SHA1; in evm_verify_hmac() 177 xattr_value_len, &digest); in evm_verify_hmac() 180 rc = crypto_memneq(xattr_data->data, digest.digest, in evm_verify_hmac() 194 digest.hdr.algo = hdr->hash_algo; in evm_verify_hmac() 196 xattr_value_len, xattr_data->type, &digest); in evm_verify_hmac() 201 digest.digest, digest.hdr.length); in evm_verify_hmac() 542 rc = evm_init_hmac(inode, lsm_xattr, xattr_data->digest); in evm_inode_init_security()
|
/kernel/linux/linux-5.10/crypto/asymmetric_keys/ |
D | pkcs7_verify.c | 34 if (sig->digest) in pkcs7_digest() 51 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL); in pkcs7_digest() 52 if (!sig->digest) in pkcs7_digest() 63 sig->digest); in pkcs7_digest() 66 pr_devel("MsgDigest = [%*ph]\n", 8, sig->digest); in pkcs7_digest() 88 if (memcmp(sig->digest, sinfo->msgdigest, in pkcs7_digest() 101 memset(sig->digest, 0, sig->digest_size); in pkcs7_digest() 111 sinfo->authattrs_len, sig->digest); in pkcs7_digest() 114 pr_devel("AADigest = [%*ph]\n", 8, sig->digest); in pkcs7_digest() 141 *buf = sinfo->sig->digest; in pkcs7_get_digest()
|
D | verify_pefile.c | 324 void *digest; in pefile_digest_pe() local 361 digest = (void *)desc + desc_size; in pefile_digest_pe() 362 ret = crypto_shash_final(desc, digest); in pefile_digest_pe() 366 pr_debug("Digest calc = [%*ph]\n", ctx->digest_len, digest); in pefile_digest_pe() 371 if (memcmp(digest, ctx->digest, ctx->digest_len) != 0) { in pefile_digest_pe() 442 ctx.digest_len, ctx.digest_len, ctx.digest); in verify_pefile_signature() 450 kfree_sensitive(ctx.digest); in verify_pefile_signature()
|
D | x509_public_key.c | 70 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL); in x509_get_sig_params() 71 if (!sig->digest) in x509_get_sig_params() 80 ret = crypto_shash_digest(desc, cert->tbs, cert->tbs_size, sig->digest); in x509_get_sig_params() 84 ret = is_hash_blacklisted(sig->digest, sig->digest_size, "tbs"); in x509_get_sig_params() 87 sig->digest_size, sig->digest); in x509_get_sig_params()
|
/kernel/linux/linux-5.10/security/integrity/ima/ |
D | ima_modsig.c | 24 const u8 *digest; member 112 rc = pkcs7_get_digest(modsig->pkcs7_msg, &modsig->digest, in ima_collect_modsig() 123 const u8 **digest, u32 *digest_size) in ima_get_modsig_digest() argument 126 *digest = modsig->digest; in ima_get_modsig_digest()
|
D | ima_queue.c | 58 rc = memcmp(qe->entry->digests[ima_hash_algo_idx].digest, in ima_lookup_digest_entry() 111 key = ima_hash_key(entry->digests[ima_hash_algo_idx].digest); in ima_add_digest_entry() 163 u8 *digest = entry->digests[ima_hash_algo_idx].digest; in ima_add_template_entry() local 172 if (ima_lookup_digest_entry(digest, entry->pcr)) { in ima_add_template_entry() 236 memset(digests[i].digest, 0xff, digest_size); in ima_init_digests()
|
D | ima_template_lib.c | 226 static int ima_eventdigest_init_common(const u8 *digest, u32 digestsize, in ima_eventdigest_init_common() argument 249 if (digest) in ima_eventdigest_init_common() 250 memcpy(buffer + offset, digest, digestsize); in ima_eventdigest_init_common() 271 char digest[IMA_MAX_DIGEST_SIZE]; in ima_eventdigest_init() member 284 cur_digest = event_data->iint->ima_hash->digest; in ima_eventdigest_init() 302 cur_digest = hash.hdr.digest; in ima_eventdigest_init() 320 cur_digest = hash.hdr.digest; in ima_eventdigest_init() 339 cur_digest = event_data->iint->ima_hash->digest; in ima_eventdigest_ng_init()
|
D | ima_crypto.c | 432 ahash_request_set_crypt(req, NULL, hash->digest, 0); in ima_calc_file_hash_atfm() 503 rc = crypto_shash_final(shash, hash->digest); in ima_calc_file_hash_tfm() 622 rc = crypto_shash_final(shash, entry->digests[tfm_idx].digest); in ima_calc_field_array_hash_tfm() 650 memcpy(entry->digests[i].digest, in ima_calc_field_array_hash() 651 entry->digests[ima_sha1_idx].digest, in ima_calc_field_array_hash() 695 ahash_request_set_crypt(req, NULL, hash->digest, 0); in calc_buffer_ahash_atfm() 746 rc = crypto_shash_final(shash, hash->digest); in calc_buffer_shash_tfm() 800 static int ima_calc_boot_aggregate_tfm(char *digest, u16 alg_id, in ima_calc_boot_aggregate_tfm() argument 803 struct tpm_digest d = { .alg_id = alg_id, .digest = {0} }; in ima_calc_boot_aggregate_tfm() 821 rc = crypto_shash_update(shash, d.digest, in ima_calc_boot_aggregate_tfm() [all …]
|
D | ima_appraise.c | 252 iint->ima_hash->digest, in xattr_verify() 268 iint->ima_hash->digest, in xattr_verify() 279 iint->ima_hash->digest, in xattr_verify() 336 const u8 *digest = NULL; in ima_check_blacklist() local 344 ima_get_modsig_digest(modsig, &hash_algo, &digest, &digestsize); in ima_check_blacklist() 346 rc = is_binary_blacklisted(digest, digestsize); in ima_check_blacklist() 348 process_buffer_measurement(NULL, digest, digestsize, in ima_check_blacklist()
|
/kernel/linux/linux-5.10/drivers/crypto/inside-secure/ |
D | safexcel_hash.c | 50 u32 digest; member 121 if (unlikely(req->digest == CONTEXT_CONTROL_DIGEST_XCM)) { in safexcel_context_control() 144 cdesc->control_data.control0 |= req->digest | in safexcel_context_control() 150 cdesc->control_data.control0 |= req->digest | in safexcel_context_control() 164 if ((req->digest == CONTEXT_CONTROL_DIGEST_PRECOMPUTED) || in safexcel_context_control() 180 if ((req->digest == CONTEXT_CONTROL_DIGEST_PRECOMPUTED) || in safexcel_context_control() 198 req->digest = CONTEXT_CONTROL_DIGEST_PRECOMPUTED; in safexcel_context_control() 269 (sreq->digest != CONTEXT_CONTROL_DIGEST_HMAC)) { in safexcel_handle_req_result() 290 if (unlikely(sreq->digest == CONTEXT_CONTROL_DIGEST_XCM && in safexcel_handle_req_result() 802 } else if (unlikely(req->digest == CONTEXT_CONTROL_DIGEST_XCM && in safexcel_ahash_final() [all …]
|
/kernel/linux/linux-5.10/arch/arm/crypto/ |
D | Kconfig | 13 tristate "SHA1 digest algorithm (ARM-asm)" 21 tristate "SHA1 digest algorithm (ARM NEON)" 32 tristate "SHA1 digest algorithm (ARM v8 Crypto Extensions)" 41 tristate "SHA-224/256 digest algorithm (ARM v8 Crypto Extensions)" 50 tristate "SHA-224/256 digest algorithm (ARM-asm and NEON)" 58 tristate "SHA-384/512 digest algorithm (ARM-asm and NEON)" 122 tristate "CRCT10DIF digest algorithm using PMULL instructions" 128 tristate "CRC32(C) digest algorithm using CRC and/or PMULL instructions"
|
/kernel/linux/linux-5.10/security/keys/encrypted-keys/ |
D | encrypted.h | 40 static inline void dump_hmac(const char *str, const u8 *digest, in dump_hmac() argument 45 print_hex_dump(KERN_ERR, "hmac: ", DUMP_PREFIX_NONE, 32, 1, digest, in dump_hmac() 62 static inline void dump_hmac(const char *str, const u8 *digest, in dump_hmac() argument
|
/kernel/linux/linux-5.10/drivers/char/tpm/ |
D | tpm2-cmd.c | 149 u8 digest[]; member 162 struct tpm_digest *digest, u16 *digest_size_ptr) in tpm2_pcr_read() argument 177 chip->allocated_banks[i].alg_id != digest->alg_id; i++) in tpm2_pcr_read() 193 tpm_buf_append_u16(&buf, digest->alg_id); in tpm2_pcr_read() 204 if (digest_size > sizeof(digest->digest) || in tpm2_pcr_read() 213 memcpy(digest->digest, out->digest, digest_size); in tpm2_pcr_read() 261 tpm_buf_append(&buf, (const unsigned char *)&digests[i].digest, in tpm2_pcr_extend() 519 struct tpm_digest digest = { .alg_id = bank->alg_id }; in tpm2_init_bank_info() local 539 return tpm2_pcr_read(chip, 0, &digest, &bank->digest_size); in tpm2_init_bank_info()
|
/kernel/linux/linux-5.10/drivers/block/drbd/ |
D | drbd_worker.c | 287 void drbd_csum_ee(struct crypto_shash *tfm, struct drbd_peer_request *peer_req, void *digest) in drbd_csum_ee() argument 312 crypto_shash_final(desc, digest); in drbd_csum_ee() 316 void drbd_csum_bio(struct crypto_shash *tfm, struct bio *bio, void *digest) in drbd_csum_bio() argument 338 crypto_shash_final(desc, digest); in drbd_csum_bio() 349 void *digest; in w_e_send_csum() local 359 digest = kmalloc(digest_size, GFP_NOIO); in w_e_send_csum() 360 if (digest) { in w_e_send_csum() 363 drbd_csum_ee(peer_device->connection->csums_tfm, peer_req, digest); in w_e_send_csum() 373 digest, digest_size, in w_e_send_csum() 375 kfree(digest); in w_e_send_csum() [all …]
|
/kernel/linux/linux-5.10/security/integrity/ |
D | integrity.h | 91 u8 digest[SHA1_DIGEST_SIZE]; member 110 u8 digest[]; member 163 const char *digest, int digestlen); 174 const char *digest, int digestlen) in integrity_digsig_verify() argument
|
/kernel/linux/linux-5.10/include/linux/ |
D | digsig.h | 48 const char *digest, int digestlen); 53 int siglen, const char *digest, int digestlen) in digsig_verify() argument
|
/kernel/linux/linux-5.10/drivers/target/iscsi/ |
D | iscsi_target_auth.c | 220 unsigned char *digest = NULL; in chap_server_compute_hash() local 231 digest = kzalloc(chap->digest_size, GFP_KERNEL); in chap_server_compute_hash() 232 if (!digest) { in chap_server_compute_hash() 465 digest); in chap_server_compute_hash() 480 bin2hex(response, digest, chap->digest_size); in chap_server_compute_hash() 492 kfree(digest); in chap_server_compute_hash()
|