/linux-master/fs/verity/ |
H A D | measure.c | 30 const struct fsverity_hash_alg *hash_alg; local 36 hash_alg = vi->tree_params.hash_alg; 46 if (arg.digest_size < hash_alg->digest_size) 50 arg.digest_algorithm = hash_alg - fsverity_hash_algs; 51 arg.digest_size = hash_alg->digest_size; 56 if (copy_to_user(uarg->digest, vi->file_digest, hash_alg->digest_size)) 90 const struct fsverity_hash_alg *hash_alg; local 96 hash_alg = vi->tree_params.hash_alg; 126 const struct fsverity_hash_alg *hash_alg; local [all...] |
H A D | signature.c | 52 const struct fsverity_hash_alg *hash_alg = vi->tree_params.hash_alg; local 81 d = kzalloc(sizeof(*d) + hash_alg->digest_size, GFP_KERNEL); 85 d->digest_algorithm = cpu_to_le16(hash_alg - fsverity_hash_algs); 86 d->digest_size = cpu_to_le16(hash_alg->digest_size); 87 memcpy(d->digest, vi->file_digest, hash_alg->digest_size); 89 err = verify_pkcs7_signature(d, sizeof(*d) + hash_alg->digest_size,
|
H A D | open.c | 35 const struct fsverity_hash_alg *hash_alg; local 44 hash_alg = fsverity_get_hash_alg(inode, hash_algorithm); 45 if (IS_ERR(hash_alg)) 46 return PTR_ERR(hash_alg); 47 params->hash_alg = hash_alg; 48 params->digest_size = hash_alg->digest_size; 50 params->hashstate = fsverity_prepare_hash_state(hash_alg, salt, 93 params->block_size, hash_alg->name); 161 static int compute_file_digest(const struct fsverity_hash_alg *hash_alg, argument [all...] |
H A D | hash_algs.c | 179 SHASH_DESC_ON_STACK(desc, params->hash_alg->tfm); 182 desc->tfm = params->hash_alg->tfm;
|
H A D | fsverity_private.h | 36 const struct fsverity_hash_alg *hash_alg; /* the hash algorithm */ member in struct:merkle_tree_params 38 unsigned int digest_size; /* same as hash_alg->digest_size */
|
H A D | verify.c | 235 params->hash_alg->name, hsize, want_hash, 236 params->hash_alg->name, hsize, real_hash);
|
/linux-master/drivers/crypto/bcm/ |
H A D | spu.h | 56 enum hash_alg { enum 128 enum hash_alg alg; 229 u16 spum_hash_pad_len(enum hash_alg hash_alg, enum hash_mode hash_mode, 239 u32 spum_digest_size(u32 alg_digest_size, enum hash_alg alg, 260 enum hash_alg auth_alg,
|
H A D | cipher.h | 101 enum hash_alg alg; 364 u16 (*spu_hash_pad_len)(enum hash_alg hash_alg, 375 u32 (*spu_digest_size)(u32 digest_size, enum hash_alg alg, 391 u32 hash_pad_len, enum hash_alg auth_alg,
|
H A D | spu2.h | 180 u16 spu2_hash_pad_len(enum hash_alg hash_alg, enum hash_mode hash_mode, 190 u32 spu2_digest_size(u32 alg_digest_size, enum hash_alg alg, 205 enum hash_alg auth_alg, enum hash_mode auth_mode,
|
H A D | spu.c | 34 u32 hash_alg; local 81 hash_alg = (cflags & HASH_ALG) >> HASH_ALG_SHIFT; 85 hash_alg, hash_mode, hash_type); 106 if (hash_alg && hash_mode) { 109 switch (hash_alg) { 146 } else if ((hash_alg == HASH_ALG_AES) && 170 if (hash_alg && (hash_mode == HASH_MODE_NONE) && 174 switch (hash_alg) { 415 * @hash_alg: hash algorithm 424 u16 spum_hash_pad_len(enum hash_alg hash_al argument [all...] |
H A D | spu2.c | 224 * @hash_alg: [in] hash algorithm value from software enumeration 234 spu2_hash_xlate(enum hash_alg hash_alg, enum hash_mode hash_mode, argument 246 switch (hash_alg) { 303 hash_alg, hash_type); 835 * @hash_alg: hash algorithm 844 u16 spu2_hash_pad_len(enum hash_alg hash_alg, enum hash_mode hash_mode, argument 922 u32 spu2_digest_size(u32 alg_digest_size, enum hash_alg alg, 1246 enum hash_alg auth_al [all...] |
/linux-master/crypto/ |
H A D | essiv.c | 414 struct shash_alg *hash_alg, 426 if (hash_alg->digestsize < alg->cra_cipher.cia_min_keysize || 427 hash_alg->digestsize > alg->cra_cipher.cia_max_keysize) 433 if (crypto_shash_alg_needs_key(hash_alg)) 456 struct shash_alg *hash_alg; local 540 hash_alg = __crypto_shash_alg(_hash_alg); 543 if (!essiv_supported_algorithms(ictx->essiv_cipher_name, hash_alg, 546 block_base->cra_name, hash_alg->base.cra_name); 552 strscpy(ictx->shash_driver_name, hash_alg->base.cra_driver_name, 560 hash_alg 413 essiv_supported_algorithms(const char *essiv_cipher_name, struct shash_alg *hash_alg, int ivsize) argument [all...] |
H A D | adiantum.c | 504 struct shash_alg *hash_alg) 516 if (strcmp(hash_alg->base.cra_name, "nhpoly1305") != 0) 530 struct shash_alg *hash_alg; local 567 hash_alg = crypto_spawn_shash_alg(&ictx->hash_spawn); 571 hash_alg)) { 574 blockcipher_alg->cra_name, hash_alg->base.cra_name); 590 hash_alg->base.cra_driver_name) >= CRYPTO_MAX_ALG_NAME) 603 2 * hash_alg->base.cra_priority + 502 adiantum_supported_algorithms(struct skcipher_alg_common *streamcipher_alg, struct crypto_alg *blockcipher_alg, struct shash_alg *hash_alg) argument
|
/linux-master/drivers/char/tpm/ |
H A D | tpm2-cmd.c | 144 __be16 hash_alg; member in struct:tpm2_pcr_read_out 543 __be16 hash_alg; member in struct:tpm2_pcr_selection 558 u16 hash_alg; local 600 hash_alg = be16_to_cpu(pcr_selection.hash_alg); 605 chip->allocated_banks[nr_alloc_banks].alg_id = hash_alg; 614 sizeof_pcr_selection = sizeof(pcr_selection.hash_alg) +
|
/linux-master/security/keys/trusted-keys/ |
H A D | trusted_tpm1.c | 26 static const char hash_alg[] = "sha1"; variable 59 pr_info("can't alloc %s\n", hash_alg); 132 pr_info("can't alloc %s\n", hash_alg); 208 pr_info("can't alloc %s\n", hash_alg); 301 pr_info("can't alloc %s\n", hash_alg); 1000 hashalg = crypto_alloc_shash(hash_alg, 0, 0); 1003 hash_alg);
|
/linux-master/fs/nfs/ |
H A D | nfs4session.h | 67 u32 hash_alg; member in struct:nfs4_session
|
/linux-master/drivers/crypto/inside-secure/ |
H A D | safexcel_cipher.c | 63 u32 hash_alg; member in struct:safexcel_cipher_ctx 464 switch (ctx->hash_alg) { 522 ctx->hash_alg | 532 ctx->hash_alg | 540 ctx->hash_alg | 1670 ctx->hash_alg = CONTEXT_CONTROL_CRYPTO_ALG_SHA1; 1706 ctx->hash_alg = CONTEXT_CONTROL_CRYPTO_ALG_SHA256; 1742 ctx->hash_alg = CONTEXT_CONTROL_CRYPTO_ALG_SHA224; 1778 ctx->hash_alg = CONTEXT_CONTROL_CRYPTO_ALG_SHA512; 1814 ctx->hash_alg [all...] |
/linux-master/drivers/crypto/amcc/ |
H A D | crypto4xx_sa.h | 98 u32 hash_alg:4; member in struct:sa_command_0::__anon174
|
H A D | crypto4xx_alg.c | 41 sa->sa_command_0.bf.hash_alg = h;
|
H A D | crypto4xx_core.c | 494 if (sa->sa_command_0.bf.hash_alg == SA_HASH_ALG_SHA1) {
|
/linux-master/include/uapi/linux/ |
H A D | openvswitch.h | 773 * @hash_alg: Algorithm used to compute hash prior to recirculation. 777 __u32 hash_alg; /* One of ovs_hash_alg. */ member in struct:ovs_action_hash
|
/linux-master/security/keys/encrypted-keys/ |
H A D | encrypted.c | 40 static const char hash_alg[] = "sha256"; variable 1014 hash_tfm = crypto_alloc_shash(hash_alg, 0, 0); 1017 hash_alg, PTR_ERR(hash_tfm));
|
/linux-master/net/openvswitch/ |
H A D | actions.c | 1087 if (hash_act->hash_alg == OVS_HASH_ALG_L4) { 1090 } else if (hash_act->hash_alg == OVS_HASH_ALG_SYM_L4) {
|
H A D | flow_netlink.c | 3239 switch (act_hash->hash_alg) {
|