Home
last modified time | relevance | path

Searched full:digest (Results 1 – 25 of 347) sorted by relevance

12345678910>>...14

/linux-6.8/fs/verity/
Dmeasure.c3 * Ioctl to get a verity file's digest
15 * fsverity_ioctl_measure() - get a verity file's digest
16 * @filp: file to get digest of
19 * Retrieve the file digest that the kernel is enforcing for reads from a verity
40 * return the digest if it fits in the available space. We write back in fsverity_ioctl_measure()
56 if (copy_to_user(uarg->digest, vi->file_digest, hash_alg->digest_size)) in fsverity_ioctl_measure()
64 * fsverity_get_digest() - get a verity file's digest
65 * @inode: inode to get digest of
66 * @raw_digest: (out) the raw file digest
67 * @alg: (out) the digest's algorithm, as a FS_VERITY_HASH_ALG_* value
[all …]
/linux-6.8/include/crypto/
Dhash.h18 * DOC: Message Digest Algorithm Definitions
20 * These data structures define modular message digest algorithm
45 * struct hash_alg_common - define properties of message digest
86 * struct ahash_alg - asynchronous message digest definition
96 * final message digest as this only adds more data into the
113 * @digest: Combination of @init and @update and @final. This function
130 * @init, @update, @final, @finup, @digest is called. No data
163 int (*digest)(struct ahash_request *req); member
194 * struct shash_alg - synchronous message digest definition
199 * @digest: see struct ahash_alg
[all …]
Dkdf_sp800108.h17 * @kmd Keyed message digest whose key was set with crypto_kdf108_setkey or
18 * unkeyed message digest
38 * @kmd Keyed message digest allocated by the caller. The key should not have
40 * @key Seed key to be used to initialize the keyed message digest context.
46 * the message digest size of the used keyed message digest. This limitation
Dpoly1305.h88 void poly1305_final_arch(struct poly1305_desc_ctx *desc, u8 *digest);
89 void poly1305_final_generic(struct poly1305_desc_ctx *desc, u8 *digest);
91 static inline void poly1305_final(struct poly1305_desc_ctx *desc, u8 *digest) in poly1305_final() argument
94 poly1305_final_arch(desc, digest); in poly1305_final()
96 poly1305_final_generic(desc, digest); in poly1305_final()
/linux-6.8/lib/crypto/
Dsha1.c72 * @digest: 160 bit digest to update
77 * 160-bit internal state (@digest) with a single 512-bit data block (@data).
87 void sha1_transform(__u32 *digest, const char *data, __u32 *array) in sha1_transform() argument
92 A = digest[0]; in sha1_transform()
93 B = digest[1]; in sha1_transform()
94 C = digest[2]; in sha1_transform()
95 D = digest[3]; in sha1_transform()
96 E = digest[4]; in sha1_transform()
118 digest[0] += A; in sha1_transform()
119 digest[1] += B; in sha1_transform()
[all …]
/linux-6.8/security/integrity/ima/
Dima_template_lib.c289 static int ima_eventdigest_init_common(const u8 *digest, u32 digestsize, in ima_eventdigest_init_common() argument
294 * digest formats: in ima_eventdigest_init_common()
295 * - DATA_FMT_DIGEST: digest in ima_eventdigest_init_common()
296 * - DATA_FMT_DIGEST_WITH_ALGO: <hash algo> + ':' + '\0' + digest, in ima_eventdigest_init_common()
298 * <digest type> + ':' + <hash algo> + ':' + '\0' + digest, in ima_eventdigest_init_common()
300 * where 'DATA_FMT_DIGEST' is the original digest format ('d') in ima_eventdigest_init_common()
302 * where <digest type> is either "ima" or "verity", in ima_eventdigest_init_common()
321 if (digest) in ima_eventdigest_init_common()
322 memcpy(buffer + offset, digest, digestsize); in ima_eventdigest_init_common()
325 * If digest is NULL, the event being recorded is a violation. in ima_eventdigest_init_common()
[all …]
Dima_queue.c47 /* lookup up the digest value in the hash table, and return the entry */
58 rc = memcmp(qe->entry->digests[ima_hash_algo_idx].digest, in ima_lookup_digest_entry()
111 key = ima_hash_key(entry->digests[ima_hash_algo_idx].digest); in ima_add_digest_entry()
163 u8 *digest = entry->digests[ima_hash_algo_idx].digest; in ima_add_template_entry() local
172 if (ima_lookup_digest_entry(digest, entry->pcr)) { in ima_add_template_entry()
233 /* for unmapped TPM algorithms digest is still a padded SHA1 */ in ima_init_digests()
237 memset(digests[i].digest, 0xff, digest_size); in ima_init_digests()
Dima_modsig.c23 /* This digest will go in the 'd-modsig' field of the IMA template. */
24 const u8 *digest; member
115 rc = pkcs7_get_digest(modsig->pkcs7_msg, &modsig->digest, in ima_collect_modsig()
126 const u8 **digest, u32 *digest_size) in ima_get_modsig_digest() argument
129 *digest = modsig->digest; in ima_get_modsig_digest()
/linux-6.8/crypto/asymmetric_keys/
Dpkcs7_verify.c20 * Digest the relevant parts of the PKCS#7 data
33 /* The digest was calculated already. */ in pkcs7_digest()
34 if (sig->digest) in pkcs7_digest()
51 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL); in pkcs7_digest()
52 if (!sig->digest) in pkcs7_digest()
61 /* Digest the message [RFC2315 9.3] */ in pkcs7_digest()
63 sig->digest); in pkcs7_digest()
66 pr_devel("MsgDigest = [%*ph]\n", 8, sig->digest); in pkcs7_digest()
69 * message digest attribute amongst them which corresponds to the in pkcs7_digest()
70 * digest we just calculated. in pkcs7_digest()
[all …]
Dverify_pefile.c242 * Load the contents of the PE binary into the digest, leaving out the image
252 /* Digest the header and data directory, but leave out the image in pefile_digest_pe_contents()
319 * Digest the contents of the PE binary, leaving out the image checksum and the
328 void *digest; in pefile_digest_pe() local
344 pr_warn("Digest size mismatch (%zx != %x)\n", in pefile_digest_pe()
349 pr_debug("Digest: desc=%zu size=%zu\n", desc_size, digest_size); in pefile_digest_pe()
365 digest = (void *)desc + desc_size; in pefile_digest_pe()
366 ret = crypto_shash_final(desc, digest); in pefile_digest_pe()
370 pr_debug("Digest calc = [%*ph]\n", ctx->digest_len, digest); in pefile_digest_pe()
372 /* Check that the PE file digest matches that in the MSCODE part of the in pefile_digest_pe()
[all …]
Dverify_pefile.h23 const void *digest; /* Digest */ member
24 unsigned digest_len; /* Digest length */
25 const char *digest_algo; /* Digest algorithm */
/linux-6.8/Documentation/crypto/
Dapi-digest.rst1 Message Digest Algorithm Definitions
5 :doc: Message Digest Algorithm Definitions
10 Asynchronous Message Digest API
14 :doc: Asynchronous Message Digest API
28 Synchronous Message Digest API
32 :doc: Synchronous Message Digest API
/linux-6.8/arch/x86/crypto/
Dsha512-ssse3-asm.S57 digest = %rdi define
84 # MSG, DIGEST, K_t, W_t are arrays
90 # Output Digest (arg2)
91 #define DIGEST(i) 8*i(digest) macro
272 # Purpose: Updates the SHA512 digest stored at "state" with the message
299 mov DIGEST(0), a_64
300 mov DIGEST(1), b_64
301 mov DIGEST(2), c_64
302 mov DIGEST(3), d_64
303 mov DIGEST(4), e_64
[all …]
Dsha512-avx-asm.S57 digest = %rdi define
86 # MSG, DIGEST, K_t, W_t are arrays
92 # Output Digest (arg2)
93 #define DIGEST(i) 8*i(digest) macro
271 # Purpose: Updates the SHA512 digest stored at "state" with the message
297 mov DIGEST(0), a_64
298 mov DIGEST(1), b_64
299 mov DIGEST(2), c_64
300 mov DIGEST(3), d_64
301 mov DIGEST(4), e_64
[all …]
/linux-6.8/drivers/crypto/inside-secure/
Dsafexcel_hash.c52 u32 digest; member
56 u8 digest_sz; /* output digest size, only set once */
119 * Copy the input digest if needed, and setup the context in safexcel_context_control()
123 if (unlikely(req->digest == CONTEXT_CONTROL_DIGEST_XCM)) { in safexcel_context_control()
146 cdesc->control_data.control0 |= req->digest | in safexcel_context_control()
152 cdesc->control_data.control0 |= req->digest | in safexcel_context_control()
161 /* Hash continuation or HMAC, setup (inner) digest from state */ in safexcel_context_control()
165 /* Compute digest count for hash/HMAC finish operations */ in safexcel_context_control()
166 if ((req->digest == CONTEXT_CONTROL_DIGEST_PRECOMPUTED) || in safexcel_context_control()
182 if ((req->digest == CONTEXT_CONTROL_DIGEST_PRECOMPUTED) || in safexcel_context_control()
[all …]
/linux-6.8/Documentation/security/
DIMA-templates.rst65 - 'd': the digest of the event (i.e. the digest of a measured file),
68 - 'd-ng': the digest of the event, calculated with an arbitrary hash
69 algorithm (field format: <hash algo>:digest);
70 - 'd-ngv2': same as d-ng, but prefixed with the "ima" or "verity" digest type
71 (field format: <digest type>:<hash algo>:digest);
72 - 'd-modsig': the digest of the event without the appended modsig;
74 - 'sig': the file signature, based on either the file's/fsverity's digest[1],
/linux-6.8/tools/testing/selftests/bpf/progs/
Dtest_fsverity.c18 char digest[SIZEOF_STRUCT_FSVERITY_DIGEST + SHA256_DIGEST_SIZE]; variable
35 bpf_dynptr_from_mem(digest, sizeof(digest), 0, &digest_ptr); in BPF_PROG()
41 for (i = 0; i < (int)sizeof(digest); i++) { in BPF_PROG()
42 if (digest[i] != expected_digest[i]) in BPF_PROG()
Dtest_sig_in_xattr.c33 * sets, for example, fsverity_digest or only the digest[] part of it.
37 char digest[MAGIC_SIZE + SIZEOF_STRUCT_FSVERITY_DIGEST + SHA256_DIGEST_SIZE]; variable
57 bpf_dynptr_from_mem(digest + MAGIC_SIZE, sizeof(digest) - MAGIC_SIZE, 0, &digest_ptr); in BPF_PROG()
65 bpf_dynptr_from_mem(digest, sizeof(digest), 0, &digest_ptr); in BPF_PROG()
/linux-6.8/crypto/
Decrdsa.c40 const char *digest; /* digest name from oid */ member
76 unsigned char digest[STREEBOG512_DIGEST_SIZE]; in ecrdsa_verify() local
88 * Digest value, digest algorithm, and curve (modulus) should have the in ecrdsa_verify()
93 !ctx->digest || in ecrdsa_verify()
101 WARN_ON(req->dst_len > sizeof(digest))) in ecrdsa_verify()
109 digest, req->dst_len, req->src_len); in ecrdsa_verify()
123 vli_from_le64(e, digest, ndigits); in ecrdsa_verify()
162 /* Optional. If present should match expected digest algo OID. */
209 ctx->digest = "streebog256"; in ecrdsa_set_pub_key()
213 ctx->digest = "streebog512"; in ecrdsa_set_pub_key()
/linux-6.8/security/integrity/
Dintegrity.h94 u8 digest[SHA1_DIGEST_SIZE]; member
113 u8 digest[]; member
122 u8 digest[HASH_MAX_DIGESTSIZE]; member
138 uint8_t hash_algo; /* Digest algorithm [enum hash_algo] */
147 * containing either the fsverity_descriptor struct digest or, in the
154 __u8 hash_algorithm; /* Digest algorithm [enum hash_algo] */
161 struct mutex mutex; /* protects: version, flags, digest */
199 const char *digest, int digestlen);
210 const char *digest, int digestlen) in integrity_digsig_verify() argument
/linux-6.8/drivers/crypto/aspeed/
Daspeed-hace-hash.c145 rctx->digest_dma_addr = dma_map_single(hace_dev->dev, rctx->digest, in aspeed_ahash_dma_prepare()
149 dev_warn(hace_dev->dev, "dma_map() rctx digest error\n"); in aspeed_ahash_dma_prepare()
190 rctx->digest_dma_addr = dma_map_single(hace_dev->dev, rctx->digest, in aspeed_ahash_dma_prepare_sg()
194 dev_warn(hace_dev->dev, "dma_map() rctx digest error\n"); in aspeed_ahash_dma_prepare_sg()
286 * Copy digest to the corresponding request result.
303 memcpy(req->result, rctx->digest, rctx->digsize); in aspeed_ahash_transfer()
366 memcpy(rctx->buffer + rctx->block_size, rctx->digest, rctx->digsize); in aspeed_ahash_hmac_resume()
372 memcpy(rctx->digest, rctx->sha_iv, rctx->ivsize); in aspeed_ahash_hmac_resume()
374 rctx->digest_dma_addr = dma_map_single(hace_dev->dev, rctx->digest, in aspeed_ahash_hmac_resume()
378 dev_warn(hace_dev->dev, "dma_map() rctx digest error\n"); in aspeed_ahash_hmac_resume()
[all …]
/linux-6.8/arch/s390/purgatory/
Dpurgatory.c18 u8 digest[SHA256_DIGEST_SIZE]; in verify_sha256_digest() local
27 sha256_final(&sctx, digest); in verify_sha256_digest()
29 if (memcmp(digest, purgatory_sha256_digest, sizeof(digest))) in verify_sha256_digest()
/linux-6.8/drivers/target/iscsi/
Discsi_target_auth.h18 #define MD5_SIGNATURE_SIZE 16 /* 16 bytes in a MD5 message digest */
19 #define SHA1_SIGNATURE_SIZE 20 /* 20 bytes in a SHA1 message digest */
20 #define SHA256_SIGNATURE_SIZE 32 /* 32 bytes in a SHA256 message digest */
21 #define SHA3_256_SIGNATURE_SIZE 32 /* 32 bytes in a SHA3 256 message digest */
/linux-6.8/include/linux/
Dnvme-tcp.h84 * @digest: digest types enabled
91 __u8 digest; member
102 * @digest: digest types enabled
109 __u8 digest; member
/linux-6.8/arch/riscv/purgatory/
Dpurgatory.c24 u8 digest[SHA256_DIGEST_SIZE]; in verify_sha256_digest() local
30 sha256_final(&ss, digest); in verify_sha256_digest()
31 if (memcmp(digest, purgatory_sha256_digest, sizeof(digest)) != 0) in verify_sha256_digest()

12345678910>>...14