| /linux/fs/verity/ |
| H A D | signature.c | 57 const struct fsverity_hash_alg *hash_alg = vi->tree_params.hash_alg; in fsverity_verify_signature() local 86 d = kzalloc(sizeof(*d) + hash_alg->digest_size, GFP_KERNEL); in fsverity_verify_signature() 90 d->digest_algorithm = cpu_to_le16(hash_alg - fsverity_hash_algs); in fsverity_verify_signature() 91 d->digest_size = cpu_to_le16(hash_alg->digest_size); in fsverity_verify_signature() 92 memcpy(d->digest, vi->file_digest, hash_alg->digest_size); in fsverity_verify_signature() 94 err = verify_pkcs7_signature(d, sizeof(*d) + hash_alg->digest_size, in fsverity_verify_signature()
|
| H A D | open.c | 44 const struct fsverity_hash_alg *hash_alg; in fsverity_init_merkle_tree_params() local 53 hash_alg = fsverity_get_hash_alg(inode, hash_algorithm); in fsverity_init_merkle_tree_params() 54 if (!hash_alg) in fsverity_init_merkle_tree_params() 56 params->hash_alg = hash_alg; in fsverity_init_merkle_tree_params() 57 params->digest_size = hash_alg->digest_size; in fsverity_init_merkle_tree_params() 61 fsverity_prepare_hash_state(hash_alg, salt, salt_size); in fsverity_init_merkle_tree_params() 102 params->block_size, hash_alg->name); in fsverity_init_merkle_tree_params() 170 static void compute_file_digest(const struct fsverity_hash_alg *hash_alg, in compute_file_digest() argument 177 fsverity_hash_buffer(hash_alg, desc, sizeof(*desc), file_digest); in compute_file_digest() 210 compute_file_digest(vi->tree_params.hash_alg, desc, vi->file_digest); in fsverity_create_info()
|
| H A D | hash_algs.c | 109 fsverity_hash_buffer(params->hash_alg, data, params->block_size, in fsverity_hash_block() 114 switch (params->hash_alg->algo_id) { in fsverity_hash_block()
|
| H A D | verify.c | 312 data_pos, level - 1, params->hash_alg->name, hsize, want_hash, in verify_data_block() 313 params->hash_alg->name, hsize, in verify_data_block() 329 if (vi->tree_params.hash_alg->algo_id == HASH_ALGO_SHA256 && in fsverity_init_verification_context()
|
| H A D | fsverity_private.h | 41 const struct fsverity_hash_alg *hash_alg; /* the hash algorithm */ member
|
| /linux/drivers/crypto/bcm/ |
| H A D | spu.h | 56 enum hash_alg { enum 128 enum hash_alg alg; 229 u16 spum_hash_pad_len(enum hash_alg hash_alg, enum hash_mode hash_mode, 239 u32 spum_digest_size(u32 alg_digest_size, enum hash_alg alg, 260 enum hash_alg auth_alg,
|
| H A D | spu.c | 34 u32 hash_alg; in spum_dump_msg_hdr() local 81 hash_alg = (cflags & HASH_ALG) >> HASH_ALG_SHIFT; in spum_dump_msg_hdr() 85 hash_alg, hash_mode, hash_type); in spum_dump_msg_hdr() 106 if (hash_alg && hash_mode) { in spum_dump_msg_hdr() 109 switch (hash_alg) { in spum_dump_msg_hdr() 146 } else if ((hash_alg == HASH_ALG_AES) && in spum_dump_msg_hdr() 170 if (hash_alg && (hash_mode == HASH_MODE_NONE) && in spum_dump_msg_hdr() 174 switch (hash_alg) { in spum_dump_msg_hdr() 424 u16 spum_hash_pad_len(enum hash_alg hash_alg, enum hash_mode hash_mode, in spum_hash_pad_len() argument 432 if ((hash_alg == HASH_ALG_AES) && (hash_mode == HASH_MODE_XCBC)) { in spum_hash_pad_len() [all …]
|
| H A D | spu2.h | 180 u16 spu2_hash_pad_len(enum hash_alg hash_alg, enum hash_mode hash_mode, 190 u32 spu2_digest_size(u32 alg_digest_size, enum hash_alg alg, 205 enum hash_alg auth_alg, enum hash_mode auth_mode,
|
| H A D | cipher.h | 101 enum hash_alg alg; 364 u16 (*spu_hash_pad_len)(enum hash_alg hash_alg, 375 u32 (*spu_digest_size)(u32 digest_size, enum hash_alg alg, 391 u32 hash_pad_len, enum hash_alg auth_alg,
|
| H A D | spu2.c | 235 spu2_hash_xlate(enum hash_alg hash_alg, enum hash_mode hash_mode, in spu2_hash_xlate() argument 247 switch (hash_alg) { in spu2_hash_xlate() 304 hash_alg, hash_type); in spu2_hash_xlate() 845 u16 spu2_hash_pad_len(enum hash_alg hash_alg, enum hash_mode hash_mode, in spu2_hash_pad_len() argument 923 u32 spu2_digest_size(u32 alg_digest_size, enum hash_alg alg, in spu2_digest_size() 1247 enum hash_alg auth_alg, enum hash_mode auth_mode, in spu2_request_pad()
|
| /linux/crypto/ |
| H A D | essiv.c | 411 struct shash_alg *hash_alg, in essiv_supported_algorithms() argument 423 if (hash_alg->digestsize < alg->cra_cipher.cia_min_keysize || in essiv_supported_algorithms() 424 hash_alg->digestsize > alg->cra_cipher.cia_max_keysize) in essiv_supported_algorithms() 430 if (crypto_shash_alg_needs_key(hash_alg)) in essiv_supported_algorithms() 453 struct shash_alg *hash_alg; in essiv_create() local 537 hash_alg = __crypto_shash_alg(_hash_alg); in essiv_create() 540 if (!essiv_supported_algorithms(ictx->essiv_cipher_name, hash_alg, in essiv_create() 543 block_base->cra_name, hash_alg->base.cra_name); in essiv_create() 549 strscpy(ictx->shash_driver_name, hash_alg->base.cra_driver_name); in essiv_create() 556 hash_alg->base.cra_name) >= CRYPTO_MAX_ALG_NAME) in essiv_create() [all …]
|
| /linux/drivers/char/tpm/ |
| H A D | tpm2-cmd.c | 100 __be16 hash_alg; member 545 __be16 hash_alg; member 560 u16 hash_alg; in tpm2_get_pcr_allocation() local 600 hash_alg = be16_to_cpu(pcr_selection.hash_alg); in tpm2_get_pcr_allocation() 605 chip->allocated_banks[nr_alloc_banks].alg_id = hash_alg; in tpm2_get_pcr_allocation() 614 sizeof_pcr_selection = sizeof(pcr_selection.hash_alg) + in tpm2_get_pcr_allocation()
|
| H A D | tpm2-sessions.c | 149 u16 hash_alg = get_unaligned_be16(name); in name_size() local 151 switch (hash_alg) { in name_size() 161 pr_warn("tpm: unsupported name algorithm: 0x%04x\n", hash_alg); in name_size()
|
| /linux/drivers/crypto/inside-secure/ |
| H A D | safexcel_cipher.c | 63 u32 hash_alg; member 464 switch (ctx->hash_alg) { in safexcel_aead_setkey() 522 ctx->hash_alg | in safexcel_context_control() 532 ctx->hash_alg | in safexcel_context_control() 540 ctx->hash_alg | in safexcel_context_control() 1670 ctx->hash_alg = CONTEXT_CONTROL_CRYPTO_ALG_SHA1; in safexcel_aead_sha1_cra_init() 1706 ctx->hash_alg = CONTEXT_CONTROL_CRYPTO_ALG_SHA256; in safexcel_aead_sha256_cra_init() 1742 ctx->hash_alg = CONTEXT_CONTROL_CRYPTO_ALG_SHA224; in safexcel_aead_sha224_cra_init() 1778 ctx->hash_alg = CONTEXT_CONTROL_CRYPTO_ALG_SHA512; in safexcel_aead_sha512_cra_init() 1814 ctx->hash_alg = CONTEXT_CONTROL_CRYPTO_ALG_SHA384; in safexcel_aead_sha384_cra_init() [all …]
|
| /linux/fs/nfs/ |
| H A D | nfs4session.h | 67 u32 hash_alg; member
|
| /linux/drivers/net/ethernet/google/gve/ |
| H A D | gve_adminq.h | 566 u8 hash_alg; member 579 u8 hash_alg; member
|
| H A D | gve_adminq.c | 1376 u8 hash_alg = 0; in gve_adminq_configure_rss() local 1385 hash_alg = ETH_RSS_HASH_TOP; in gve_adminq_configure_rss() 1444 .hash_alg = hash_alg, in gve_adminq_configure_rss() 1563 rxfh->hfunc = descriptor->hash_alg; in gve_adminq_process_rss_query()
|
| /linux/drivers/crypto/amcc/ |
| H A D | crypto4xx_sa.h | 98 u32 hash_alg:4; member
|
| H A D | crypto4xx_alg.c | 38 sa->sa_command_0.bf.hash_alg = h; in set_dynamic_sa_command_0()
|
| /linux/include/uapi/linux/ |
| H A D | openvswitch.h | 784 __u32 hash_alg; /* One of ovs_hash_alg. */ member
|
| /linux/drivers/crypto/intel/qat/qat_common/ |
| H A D | qat_algs.c | 1077 enum icp_qat_hw_auth_algo hash_alg, in qat_alg_aead_init() argument 1083 ctx->qat_hash_alg = hash_alg; in qat_alg_aead_init()
|
| /linux/net/openvswitch/ |
| H A D | actions.c | 1005 if (hash_act->hash_alg == OVS_HASH_ALG_L4) { in execute_hash() 1008 } else if (hash_act->hash_alg == OVS_HASH_ALG_SYM_L4) { in execute_hash()
|
| H A D | flow_netlink.c | 3226 switch (act_hash->hash_alg) { in __ovs_nla_copy_actions()
|