/linux-master/arch/s390/purgatory/ |
H A D | purgatory.c | 18 u8 digest[SHA256_DIGEST_SIZE]; local 27 sha256_final(&sctx, digest); 29 if (memcmp(digest, purgatory_sha256_digest, sizeof(digest)))
|
/linux-master/arch/riscv/purgatory/ |
H A D | purgatory.c | 24 u8 digest[SHA256_DIGEST_SIZE]; local 30 sha256_final(&ss, digest); 31 if (memcmp(digest, purgatory_sha256_digest, sizeof(digest)) != 0)
|
/linux-master/tools/testing/selftests/bpf/progs/ |
H A D | test_fsverity.c | 18 char digest[SIZEOF_STRUCT_FSVERITY_DIGEST + SHA256_DIGEST_SIZE]; variable 35 bpf_dynptr_from_mem(digest, sizeof(digest), 0, &digest_ptr); 41 for (i = 0; i < (int)sizeof(digest); i++) { 42 if (digest[i] != expected_digest[i])
|
H A D | test_sig_in_xattr.c | 33 * sets, for example, fsverity_digest or only the digest[] part of it. 37 char digest[MAGIC_SIZE + SIZEOF_STRUCT_FSVERITY_DIGEST + SHA256_DIGEST_SIZE]; variable 57 bpf_dynptr_from_mem(digest + MAGIC_SIZE, sizeof(digest) - MAGIC_SIZE, 0, &digest_ptr); 65 bpf_dynptr_from_mem(digest, sizeof(digest), 0, &digest_ptr);
|
/linux-master/arch/x86/purgatory/ |
H A D | purgatory.c | 27 u8 digest[SHA256_DIGEST_SIZE]; local 36 sha256_final(&sctx, digest); 38 if (memcmp(digest, purgatory_sha256_digest, sizeof(digest)))
|
/linux-master/include/crypto/ |
H A D | poly1305.h | 88 void poly1305_final_arch(struct poly1305_desc_ctx *desc, u8 *digest); 89 void poly1305_final_generic(struct poly1305_desc_ctx *desc, u8 *digest); 91 static inline void poly1305_final(struct poly1305_desc_ctx *desc, u8 *digest) argument 94 poly1305_final_arch(desc, digest); 96 poly1305_final_generic(desc, digest);
|
H A D | sha1.h | 44 void sha1_transform(__u32 *digest, const char *data, __u32 *W);
|
H A D | sig.h | 100 * @digest: digest 101 * @dlen: digest length 107 const void *digest, unsigned int dlen);
|
/linux-master/include/linux/ |
H A D | digsig.h | 48 const char *digest, int digestlen); 53 int siglen, const char *digest, int digestlen) 52 digsig_verify(struct key *keyring, const char *sig, int siglen, const char *digest, int digestlen) argument
|
H A D | ima.h | 25 bool hash, u8 *digest, size_t digest_len); 58 bool hash, u8 *digest, 55 ima_measure_critical_data(const char *event_label, const char *event_name, const void *buf, size_t buf_len, bool hash, u8 *digest, size_t digest_len) argument
|
/linux-master/lib/crypto/ |
H A D | sha1.c | 72 * @digest: 160 bit digest to update 77 * 160-bit internal state (@digest) with a single 512-bit data block (@data). 87 void sha1_transform(__u32 *digest, const char *data, __u32 *array) argument 92 A = digest[0]; 93 B = digest[1]; 94 C = digest[2]; 95 D = digest[3]; 96 E = digest[4]; 118 digest[ [all...] |
/linux-master/crypto/asymmetric_keys/ |
H A D | verify_pefile.h | 23 const void *digest; /* Digest */ member in struct:pefile_context
|
H A D | x509_public_key.c | 57 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL); 58 if (!sig->digest) 71 cert->pub->keylen, sig->digest) ?: 73 crypto_shash_update(desc, sig->digest, 76 sig->digest); 79 sig->digest); 85 ret = is_hash_blacklisted(sig->digest, sig->digest_size, 89 sig->digest_size, sig->digest);
|
H A D | pkcs7_verify.c | 33 /* The digest was calculated already. */ 34 if (sig->digest) 51 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL); 52 if (!sig->digest) 63 sig->digest); 66 pr_devel("MsgDigest = [%*ph]\n", 8, sig->digest); 69 * message digest attribute amongst them which corresponds to the 70 * digest we just calculated. 82 pr_warn("Sig %u: Invalid digest size (%u)\n", 88 if (memcmp(sig->digest, sinf [all...] |
/linux-master/security/keys/encrypted-keys/ |
H A D | encrypted.h | 40 static inline void dump_hmac(const char *str, const u8 *digest, argument 45 print_hex_dump(KERN_ERR, "hmac: ", DUMP_PREFIX_NONE, 32, 1, digest, 62 static inline void dump_hmac(const char *str, const u8 *digest, argument
|
/linux-master/security/integrity/ima/ |
H A D | ima_modsig.c | 23 /* This digest will go in the 'd-modsig' field of the IMA template. */ 24 const u8 *digest; member in struct:modsig 115 rc = pkcs7_get_digest(modsig->pkcs7_msg, &modsig->digest, 126 const u8 **digest, u32 *digest_size) 129 *digest = modsig->digest; 125 ima_get_modsig_digest(const struct modsig *modsig, enum hash_algo *algo, const u8 **digest, u32 *digest_size) argument
|
H A D | ima_queue.c | 47 /* lookup up the digest value in the hash table, and return the entry */ 58 rc = memcmp(qe->entry->digests[ima_hash_algo_idx].digest, 111 key = ima_hash_key(entry->digests[ima_hash_algo_idx].digest); 163 u8 *digest = entry->digests[ima_hash_algo_idx].digest; local 172 if (ima_lookup_digest_entry(digest, entry->pcr)) { 233 /* for unmapped TPM algorithms digest is still a padded SHA1 */ 237 memset(digests[i].digest, 0xff, digest_size);
|
/linux-master/crypto/ |
H A D | testmgr.h | 28 * hash_testvec: structure to describe a hash (message digest) test 31 * @digest: Pointer to expected digest 35 * @digest_error: Expected error from digest() 41 const char *digest; member in struct:hash_testvec 4411 .digest = "\x31\xd6\xcf\xe0\xd1\x6a\xe9\x31" 4416 .digest = "\xbd\xe5\x2c\xb3\x1d\xe3\x3e\x46" 4421 .digest = "\xa4\x48\x01\x7a\xaf\x21\xd8\x52" 4424 .plaintext = "message digest", 4426 .digest [all...] |
/linux-master/include/uapi/linux/ |
H A D | fsverity.h | 34 __u8 digest[]; member in struct:fsverity_digest 38 * Struct containing a file's Merkle tree properties. The fs-verity file digest 43 * Note: when computing the file digest, 'sig_size' and 'signature' must be left 83 __u8 digest[]; member in struct:fsverity_formatted_digest
|
/linux-master/tools/certs/ |
H A D | print-cert-tbs-hash.sh | 80 done < <(openssl list -digest-commands | tr ' ' '\n' | sort -ur) 83 echo "ERROR: Unknown digest algorithm: ${DIGEST}" >&2
|
/linux-master/security/integrity/ |
H A D | integrity.h | 41 u8 digest[SHA1_DIGEST_SIZE]; member in struct:evm_xattr 60 u8 digest[]; member in struct:ima_digest_data 69 u8 digest[HASH_MAX_DIGESTSIZE]; member in struct:ima_max_digest_data 94 * containing either the fsverity_descriptor struct digest or, in the 121 const char *digest, int digestlen); 132 const char *digest, int digestlen) 130 integrity_digsig_verify(const unsigned int id, const char *sig, int siglen, const char *digest, int digestlen) argument
|
/linux-master/fs/verity/ |
H A D | measure.c | 3 * Ioctl to get a verity file's digest 15 * fsverity_ioctl_measure() - get a verity file's digest 16 * @filp: file to get digest of 19 * Retrieve the file digest that the kernel is enforcing for reads from a verity 40 * return the digest if it fits in the available space. We write back 56 if (copy_to_user(uarg->digest, vi->file_digest, hash_alg->digest_size)) 64 * fsverity_get_digest() - get a verity file's digest 65 * @inode: inode to get digest of 66 * @raw_digest: (out) the raw file digest 67 * @alg: (out) the digest' [all...] |
/linux-master/drivers/crypto/qce/ |
H A D | sha.h | 27 * @digest: calculated digest buffer 45 u8 digest[QCE_SHA_MAX_DIGESTSIZE]; member in struct:qce_sha_reqctx
|
/linux-master/drivers/crypto/ |
H A D | atmel-authenc.h | 46 u32 *digest, unsigned int digestlen,
|
/linux-master/include/scsi/ |
H A D | libiscsi_tcp.h | 33 unsigned char digest[ISCSI_DIGEST_SIZE]; member in struct:iscsi_segment 111 /* digest helpers */ 114 unsigned char digest[ISCSI_DIGEST_SIZE]);
|