| /linux/lib/crypto/tests/ |
| H A D | blake2s-testvecs.h | 6 u8 digest[BLAKE2S_HASH_SIZE]; member 10 .digest = { 19 .digest = { 28 .digest = { 37 .digest = { 46 .digest = { 55 .digest = { 64 .digest = { 73 .digest = { 82 .digest = { [all …]
|
| H A D | md5-testvecs.h | 6 u8 digest[MD5_DIGEST_SIZE]; member 10 .digest = { 17 .digest = { 24 .digest = { 31 .digest = { 38 .digest = { 45 .digest = { 52 .digest = { 59 .digest = { 66 .digest = { [all …]
|
| H A D | sha1-testvecs.h | 6 u8 digest[SHA1_DIGEST_SIZE]; member 10 .digest = { 18 .digest = { 26 .digest = { 34 .digest = { 42 .digest = { 50 .digest = { 58 .digest = { 66 .digest = { 74 .digest = { [all …]
|
| H A D | sha384-testvecs.h | 6 u8 digest[SHA384_DIGEST_SIZE]; member 10 .digest = { 21 .digest = { 32 .digest = { 43 .digest = { 54 .digest = { 65 .digest = { 76 .digest = { 87 .digest = { 98 .digest = { [all …]
|
| H A D | sha512-testvecs.h | 6 u8 digest[SHA512_DIGEST_SIZE]; member 10 .digest = { 23 .digest = { 36 .digest = { 49 .digest = { 62 .digest = { 75 .digest = { 88 .digest = { 101 .digest = { 114 .digest = { [all …]
|
| H A D | sha224-testvecs.h | 6 u8 digest[SHA224_DIGEST_SIZE]; member 10 .digest = { 19 .digest = { 28 .digest = { 37 .digest = { 46 .digest = { 55 .digest = { 64 .digest = { 73 .digest = { 82 .digest = { [all …]
|
| H A D | poly1305-testvecs.h | 6 u8 digest[POLY1305_DIGEST_SIZE]; member 10 .digest = { 17 .digest = { 24 .digest = { 31 .digest = { 38 .digest = { 45 .digest = { 52 .digest = { 59 .digest = { 66 .digest = { [all …]
|
| H A D | sha256-testvecs.h | 6 u8 digest[SHA256_DIGEST_SIZE]; member 10 .digest = { 19 .digest = { 28 .digest = { 37 .digest = { 46 .digest = { 55 .digest = { 64 .digest = { 73 .digest = { 82 .digest = { [all …]
|
| /linux/security/ipe/ |
| H A D | digest.c | 27 u8 *digest = NULL; in ipe_digest_parse() local 51 digest = kzalloc(info->digest_len, GFP_KERNEL); in ipe_digest_parse() 52 if (!digest) { in ipe_digest_parse() 57 rc = hex2bin(digest, raw_digest, info->digest_len); in ipe_digest_parse() 64 info->digest = digest; in ipe_digest_parse() 69 kfree(digest); in ipe_digest_parse() 84 const struct digest_info *digest) in ipe_digest_eval() argument 86 return (expected->digest_len == digest->digest_len) && in ipe_digest_eval() 87 (!strcmp(expected->alg, digest->alg)) && in ipe_digest_eval() 88 (!memcmp(expected->digest, digest->digest, expected->digest_len)); in ipe_digest_eval() [all …]
|
| H A D | hooks.c | 241 const struct dm_verity_digest *digest = NULL; in ipe_bdev_setintegrity() local 260 digest = value; in ipe_bdev_setintegrity() 266 info->digest = kmemdup(digest->digest, digest->digest_len, GFP_KERNEL); in ipe_bdev_setintegrity() 267 if (!info->digest) in ipe_bdev_setintegrity() 270 info->alg = kstrdup(digest->alg, GFP_KERNEL); in ipe_bdev_setintegrity() 274 info->digest_len = digest->digest_len; in ipe_bdev_setintegrity()
|
| /linux/crypto/ |
| H A D | testmgr.h | 42 const char *digest; member 3994 .digest = "\x31\xd6\xcf\xe0\xd1\x6a\xe9\x31" 3999 .digest = "\xbd\xe5\x2c\xb3\x1d\xe3\x3e\x46" 4004 .digest = "\xa4\x48\x01\x7a\xaf\x21\xd8\x52" 4009 .digest = "\xd9\x13\x0a\x81\x64\x54\x9f\xe8" 4014 .digest = "\xd7\x9e\x1c\x30\x8a\xa5\xbb\xcd" 4019 .digest = "\x04\x3f\x85\x82\xf2\x41\xdb\x35" 4025 .digest = "\xe3\x3b\x4d\xdc\x9c\x38\xf2\x19" 4033 .digest = "\x6b\x4e\x03\x42\x36\x67\xdb\xb7" 4040 .digest = "\x9e\x86\xff\x69\x55\x7c\xa9\x5f" [all …]
|
| /linux/tools/testing/selftests/bpf/progs/ |
| H A D | test_fsverity.c | 18 char digest[SIZEOF_STRUCT_FSVERITY_DIGEST + SHA256_DIGEST_SIZE]; variable 35 bpf_dynptr_from_mem(digest, sizeof(digest), 0, &digest_ptr); in BPF_PROG() 41 for (i = 0; i < (int)sizeof(digest); i++) { in BPF_PROG() 42 if (digest[i] != expected_digest[i]) in BPF_PROG()
|
| H A D | test_sig_in_xattr.c | 38 char digest[MAGIC_SIZE + SIZEOF_STRUCT_FSVERITY_DIGEST + SHA256_DIGEST_SIZE]; variable 58 bpf_dynptr_from_mem(digest + MAGIC_SIZE, sizeof(digest) - MAGIC_SIZE, 0, &digest_ptr); in BPF_PROG() 66 bpf_dynptr_from_mem(digest, sizeof(digest), 0, &digest_ptr); in BPF_PROG()
|
| /linux/arch/s390/purgatory/ |
| H A D | purgatory.c | 18 u8 digest[SHA256_DIGEST_SIZE]; in verify_sha256_digest() local 27 sha256_final(&sctx, digest); in verify_sha256_digest() 29 if (memcmp(digest, purgatory_sha256_digest, sizeof(digest))) in verify_sha256_digest()
|
| /linux/arch/riscv/purgatory/ |
| H A D | purgatory.c | 24 u8 digest[SHA256_DIGEST_SIZE]; in verify_sha256_digest() local 30 sha256_final(&sctx, digest); in verify_sha256_digest() 31 if (memcmp(digest, purgatory_sha256_digest, sizeof(digest)) != 0) in verify_sha256_digest()
|
| /linux/arch/x86/purgatory/ |
| H A D | purgatory.c | 27 u8 digest[SHA256_DIGEST_SIZE]; in verify_sha256_digest() local 36 sha256_final(&sctx, digest); in verify_sha256_digest() 38 if (memcmp(digest, purgatory_sha256_digest, sizeof(digest))) in verify_sha256_digest()
|
| /linux/scripts/crypto/ |
| H A D | gen-hash-testvecs.py | 49 def digest(self): member in Poly1305 64 return ctx.digest() 121 mac = hmac.digest(key, data[:data_len], alg) 125 ctx.digest()) 136 hashes += h.digest() 148 data += ctx.digest() 151 Poly1305(key).update(data).digest())
|
| /linux/drivers/crypto/tegra/ |
| H A D | tegra-se-hash.c | 36 struct tegra_se_datbuf digest; member 326 cpuvaddr[i++] = rctx->digest.addr; in tegra_sha_prep_cmd() 327 cpuvaddr[i++] = (u32)(SE_ADDR_HI_MSB(upper_32_bits(rctx->digest.addr)) | in tegra_sha_prep_cmd() 328 SE_ADDR_HI_SZ(rctx->digest.size)); in tegra_sha_prep_cmd() 368 rctx->digest.size = crypto_ahash_digestsize(tfm); in tegra_sha_do_init() 370 rctx->digest.buf = dma_alloc_coherent(se->dev, rctx->digest.size, in tegra_sha_do_init() 371 &rctx->digest.addr, GFP_KERNEL); in tegra_sha_do_init() 372 if (!rctx->digest.buf) in tegra_sha_do_init() 392 dma_free_coherent(se->dev, rctx->digest.size, rctx->digest.buf, in tegra_sha_do_init() 393 rctx->digest.addr); in tegra_sha_do_init() [all …]
|
| /linux/crypto/asymmetric_keys/ |
| H A D | pkcs7_verify.c | 34 if (sig->digest) in pkcs7_digest() 51 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL); in pkcs7_digest() 52 if (!sig->digest) in pkcs7_digest() 63 sig->digest); in pkcs7_digest() 66 pr_devel("MsgDigest = [%*ph]\n", 8, sig->digest); in pkcs7_digest() 88 if (memcmp(sig->digest, sinfo->msgdigest, in pkcs7_digest() 101 memset(sig->digest, 0, sig->digest_size); in pkcs7_digest() 111 sinfo->authattrs_len, sig->digest); in pkcs7_digest() 114 pr_devel("AADigest = [%*ph]\n", 8, sig->digest); in pkcs7_digest() 141 *buf = sinfo->sig->digest; in pkcs7_get_digest()
|
| /linux/lib/crypto/ |
| H A D | sha1.c | 90 void sha1_transform(__u32 *digest, const char *data, __u32 *array) in sha1_transform() argument 95 A = digest[0]; in sha1_transform() 96 B = digest[1]; in sha1_transform() 97 C = digest[2]; in sha1_transform() 98 D = digest[3]; in sha1_transform() 99 E = digest[4]; in sha1_transform() 121 digest[0] += A; in sha1_transform() 122 digest[1] += B; in sha1_transform() 123 digest[2] += C; in sha1_transform() 124 digest[3] += D; in sha1_transform() [all …]
|
| /linux/security/integrity/ima/ |
| H A D | ima_modsig.c | 24 const u8 *digest; member 115 rc = pkcs7_get_digest(modsig->pkcs7_msg, &modsig->digest, in ima_collect_modsig() 126 const u8 **digest, u32 *digest_size) in ima_get_modsig_digest() argument 129 *digest = modsig->digest; in ima_get_modsig_digest()
|
| H A D | ima_queue.c | 65 rc = memcmp(qe->entry->digests[ima_hash_algo_idx].digest, in ima_lookup_digest_entry() 118 key = ima_hash_key(entry->digests[ima_hash_algo_idx].digest); in ima_add_digest_entry() 170 u8 *digest = entry->digests[ima_hash_algo_idx].digest; in ima_add_template_entry() local 191 if (ima_lookup_digest_entry(digest, entry->pcr)) { in ima_add_template_entry() 286 memset(digests[i].digest, 0xff, digest_size); in ima_init_digests()
|
| /linux/drivers/crypto/inside-secure/ |
| H A D | safexcel_hash.c | 52 u32 digest; member 123 if (unlikely(req->digest == CONTEXT_CONTROL_DIGEST_XCM)) { in safexcel_context_control() 146 cdesc->control_data.control0 |= req->digest | in safexcel_context_control() 152 cdesc->control_data.control0 |= req->digest | in safexcel_context_control() 166 if ((req->digest == CONTEXT_CONTROL_DIGEST_PRECOMPUTED) || in safexcel_context_control() 182 if ((req->digest == CONTEXT_CONTROL_DIGEST_PRECOMPUTED) || in safexcel_context_control() 200 req->digest = CONTEXT_CONTROL_DIGEST_PRECOMPUTED; in safexcel_context_control() 273 (sreq->digest != CONTEXT_CONTROL_DIGEST_HMAC)) { in safexcel_handle_req_result() 802 } else if (unlikely(req->digest == CONTEXT_CONTROL_DIGEST_XCM && in safexcel_ahash_final() 860 req->digest = CONTEXT_CONTROL_DIGEST_HMAC; in safexcel_ahash_final() [all …]
|
| /linux/security/integrity/ |
| H A D | integrity.h | 46 u8 digest[SHA1_DIGEST_SIZE]; member 68 u8 digest[]; member 70 static_assert(offsetof(struct ima_digest_data, digest) == sizeof(struct ima_digest_data_hdr), 79 u8 digest[HASH_MAX_DIGESTSIZE]; member 131 const char *digest, int digestlen); 142 const char *digest, int digestlen) in integrity_digsig_verify() argument
|
| /linux/lib/crypto/powerpc/ |
| H A D | poly1305.h | 15 asmlinkage void poly1305_emit_64(const struct poly1305_state *state, const u32 nonce[4], u8 digest[… 62 u8 digest[POLY1305_DIGEST_SIZE], const u32 nonce[4]) in poly1305_emit() 65 return poly1305_emit_generic(state, digest, nonce); in poly1305_emit() 66 poly1305_emit_64(state, nonce, digest); in poly1305_emit()
|