Searched refs:digest (Results 1 - 25 of 192) sorted by relevance

12345678

/linux-master/arch/s390/purgatory/
H A Dpurgatory.c18 u8 digest[SHA256_DIGEST_SIZE]; local
27 sha256_final(&sctx, digest);
29 if (memcmp(digest, purgatory_sha256_digest, sizeof(digest)))
/linux-master/arch/riscv/purgatory/
H A Dpurgatory.c24 u8 digest[SHA256_DIGEST_SIZE]; local
30 sha256_final(&ss, digest);
31 if (memcmp(digest, purgatory_sha256_digest, sizeof(digest)) != 0)
/linux-master/tools/testing/selftests/bpf/progs/
H A Dtest_fsverity.c18 char digest[SIZEOF_STRUCT_FSVERITY_DIGEST + SHA256_DIGEST_SIZE]; variable
35 bpf_dynptr_from_mem(digest, sizeof(digest), 0, &digest_ptr);
41 for (i = 0; i < (int)sizeof(digest); i++) {
42 if (digest[i] != expected_digest[i])
H A Dtest_sig_in_xattr.c33 * sets, for example, fsverity_digest or only the digest[] part of it.
37 char digest[MAGIC_SIZE + SIZEOF_STRUCT_FSVERITY_DIGEST + SHA256_DIGEST_SIZE]; variable
57 bpf_dynptr_from_mem(digest + MAGIC_SIZE, sizeof(digest) - MAGIC_SIZE, 0, &digest_ptr);
65 bpf_dynptr_from_mem(digest, sizeof(digest), 0, &digest_ptr);
/linux-master/arch/x86/purgatory/
H A Dpurgatory.c27 u8 digest[SHA256_DIGEST_SIZE]; local
36 sha256_final(&sctx, digest);
38 if (memcmp(digest, purgatory_sha256_digest, sizeof(digest)))
/linux-master/include/crypto/
H A Dpoly1305.h88 void poly1305_final_arch(struct poly1305_desc_ctx *desc, u8 *digest);
89 void poly1305_final_generic(struct poly1305_desc_ctx *desc, u8 *digest);
91 static inline void poly1305_final(struct poly1305_desc_ctx *desc, u8 *digest) argument
94 poly1305_final_arch(desc, digest);
96 poly1305_final_generic(desc, digest);
H A Dsha1.h44 void sha1_transform(__u32 *digest, const char *data, __u32 *W);
H A Dsig.h100 * @digest: digest
101 * @dlen: digest length
107 const void *digest, unsigned int dlen);
/linux-master/include/linux/
H A Ddigsig.h48 const char *digest, int digestlen);
53 int siglen, const char *digest, int digestlen)
52 digsig_verify(struct key *keyring, const char *sig, int siglen, const char *digest, int digestlen) argument
H A Dima.h25 bool hash, u8 *digest, size_t digest_len);
58 bool hash, u8 *digest,
55 ima_measure_critical_data(const char *event_label, const char *event_name, const void *buf, size_t buf_len, bool hash, u8 *digest, size_t digest_len) argument
/linux-master/lib/crypto/
H A Dsha1.c72 * @digest: 160 bit digest to update
77 * 160-bit internal state (@digest) with a single 512-bit data block (@data).
87 void sha1_transform(__u32 *digest, const char *data, __u32 *array) argument
92 A = digest[0];
93 B = digest[1];
94 C = digest[2];
95 D = digest[3];
96 E = digest[4];
118 digest[
[all...]
/linux-master/crypto/asymmetric_keys/
H A Dverify_pefile.h23 const void *digest; /* Digest */ member in struct:pefile_context
H A Dx509_public_key.c57 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL);
58 if (!sig->digest)
71 cert->pub->keylen, sig->digest) ?:
73 crypto_shash_update(desc, sig->digest,
76 sig->digest);
79 sig->digest);
85 ret = is_hash_blacklisted(sig->digest, sig->digest_size,
89 sig->digest_size, sig->digest);
H A Dpkcs7_verify.c33 /* The digest was calculated already. */
34 if (sig->digest)
51 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL);
52 if (!sig->digest)
63 sig->digest);
66 pr_devel("MsgDigest = [%*ph]\n", 8, sig->digest);
69 * message digest attribute amongst them which corresponds to the
70 * digest we just calculated.
82 pr_warn("Sig %u: Invalid digest size (%u)\n",
88 if (memcmp(sig->digest, sinf
[all...]
/linux-master/security/keys/encrypted-keys/
H A Dencrypted.h40 static inline void dump_hmac(const char *str, const u8 *digest, argument
45 print_hex_dump(KERN_ERR, "hmac: ", DUMP_PREFIX_NONE, 32, 1, digest,
62 static inline void dump_hmac(const char *str, const u8 *digest, argument
/linux-master/security/integrity/ima/
H A Dima_modsig.c23 /* This digest will go in the 'd-modsig' field of the IMA template. */
24 const u8 *digest; member in struct:modsig
115 rc = pkcs7_get_digest(modsig->pkcs7_msg, &modsig->digest,
126 const u8 **digest, u32 *digest_size)
129 *digest = modsig->digest;
125 ima_get_modsig_digest(const struct modsig *modsig, enum hash_algo *algo, const u8 **digest, u32 *digest_size) argument
H A Dima_queue.c47 /* lookup up the digest value in the hash table, and return the entry */
58 rc = memcmp(qe->entry->digests[ima_hash_algo_idx].digest,
111 key = ima_hash_key(entry->digests[ima_hash_algo_idx].digest);
163 u8 *digest = entry->digests[ima_hash_algo_idx].digest; local
172 if (ima_lookup_digest_entry(digest, entry->pcr)) {
233 /* for unmapped TPM algorithms digest is still a padded SHA1 */
237 memset(digests[i].digest, 0xff, digest_size);
/linux-master/crypto/
H A Dtestmgr.h28 * hash_testvec: structure to describe a hash (message digest) test
31 * @digest: Pointer to expected digest
35 * @digest_error: Expected error from digest()
41 const char *digest; member in struct:hash_testvec
4411 .digest = "\x31\xd6\xcf\xe0\xd1\x6a\xe9\x31"
4416 .digest = "\xbd\xe5\x2c\xb3\x1d\xe3\x3e\x46"
4421 .digest = "\xa4\x48\x01\x7a\xaf\x21\xd8\x52"
4424 .plaintext = "message digest",
4426 .digest
[all...]
/linux-master/include/uapi/linux/
H A Dfsverity.h34 __u8 digest[]; member in struct:fsverity_digest
38 * Struct containing a file's Merkle tree properties. The fs-verity file digest
43 * Note: when computing the file digest, 'sig_size' and 'signature' must be left
83 __u8 digest[]; member in struct:fsverity_formatted_digest
/linux-master/tools/certs/
H A Dprint-cert-tbs-hash.sh80 done < <(openssl list -digest-commands | tr ' ' '\n' | sort -ur)
83 echo "ERROR: Unknown digest algorithm: ${DIGEST}" >&2
/linux-master/security/integrity/
H A Dintegrity.h41 u8 digest[SHA1_DIGEST_SIZE]; member in struct:evm_xattr
60 u8 digest[]; member in struct:ima_digest_data
69 u8 digest[HASH_MAX_DIGESTSIZE]; member in struct:ima_max_digest_data
94 * containing either the fsverity_descriptor struct digest or, in the
121 const char *digest, int digestlen);
132 const char *digest, int digestlen)
130 integrity_digsig_verify(const unsigned int id, const char *sig, int siglen, const char *digest, int digestlen) argument
/linux-master/fs/verity/
H A Dmeasure.c3 * Ioctl to get a verity file's digest
15 * fsverity_ioctl_measure() - get a verity file's digest
16 * @filp: file to get digest of
19 * Retrieve the file digest that the kernel is enforcing for reads from a verity
40 * return the digest if it fits in the available space. We write back
56 if (copy_to_user(uarg->digest, vi->file_digest, hash_alg->digest_size))
64 * fsverity_get_digest() - get a verity file's digest
65 * @inode: inode to get digest of
66 * @raw_digest: (out) the raw file digest
67 * @alg: (out) the digest'
[all...]
/linux-master/drivers/crypto/qce/
H A Dsha.h27 * @digest: calculated digest buffer
45 u8 digest[QCE_SHA_MAX_DIGESTSIZE]; member in struct:qce_sha_reqctx
/linux-master/drivers/crypto/
H A Datmel-authenc.h46 u32 *digest, unsigned int digestlen,
/linux-master/include/scsi/
H A Dlibiscsi_tcp.h33 unsigned char digest[ISCSI_DIGEST_SIZE]; member in struct:iscsi_segment
111 /* digest helpers */
114 unsigned char digest[ISCSI_DIGEST_SIZE]);

Completed in 245 milliseconds

12345678