/linux-4.1.27/crypto/ |
D | testmgr.h | 42 char *digest; member 120 .digest = "\x31\xd6\xcf\xe0\xd1\x6a\xe9\x31" 125 .digest = "\xbd\xe5\x2c\xb3\x1d\xe3\x3e\x46" 130 .digest = "\xa4\x48\x01\x7a\xaf\x21\xd8\x52" 135 .digest = "\xd9\x13\x0a\x81\x64\x54\x9f\xe8" 140 .digest = "\xd7\x9e\x1c\x30\x8a\xa5\xbb\xcd" 147 .digest = "\x04\x3f\x85\x82\xf2\x41\xdb\x35" 153 .digest = "\xe3\x3b\x4d\xdc\x9c\x38\xf2\x19" 165 .digest = "\xd4\x1d\x8c\xd9\x8f\x00\xb2\x04" 170 .digest = "\x0c\xc1\x75\xb9\xc0\xf1\xb6\xa8" [all …]
|
D | Kconfig | 413 tristate "GHASH digest algorithm" 416 GHASH is message digest algorithm for GCM (Galois/Counter Mode). 419 tristate "MD4 digest algorithm" 422 MD4 message digest algorithm (RFC1320). 425 tristate "MD5 digest algorithm" 428 MD5 message digest algorithm (RFC1321). 431 tristate "MD5 digest algorithm (OCTEON)" 436 MD5 message digest algorithm (RFC1321) implemented 440 tristate "MD5 digest algorithm (PPC)" 444 MD5 message digest algorithm (RFC1321) implemented [all …]
|
D | shash.c | 185 return shash->digest(desc, data, len, out); in crypto_shash_digest() 356 crt->digest = shash_async_digest; in crypto_init_shash_ops_async() 487 crt->digest = shash_compat_digest; in crypto_init_shash_ops_compat() 603 if (!alg->digest) in shash_prepare_alg() 604 alg->digest = shash_digest_unaligned; in shash_prepare_alg()
|
D | crct10dif_generic.c | 97 .digest = chksum_digest,
|
D | crc32.c | 129 .digest = crc32_digest,
|
D | ahash.c | 376 return crypto_ahash_op(req, crypto_ahash_reqtfm(req)->digest); in crypto_ahash_digest() 466 hash->digest = alg->digest; in crypto_ahash_init_tfm()
|
D | crc32c_generic.c | 143 .digest = chksum_digest,
|
D | crypto_null.c | 99 .digest = null_digest,
|
D | wp512.c | 1073 __be64 *digest = (__be64 *)out; in wp512_final() local 1093 digest[i] = cpu_to_be64(wctx->hash[i]); in wp512_final()
|
D | mcryptd.c | 541 inst->alg.digest = mcryptd_hash_digest_enqueue; in mcryptd_create_hash()
|
D | cryptd.c | 643 inst->alg.digest = cryptd_hash_digest_enqueue; in cryptd_create_hash()
|
D | testmgr.c | 291 if (memcmp(result, template[i].digest, in __test_hash() 368 if (memcmp(result, template[i].digest, in __test_hash()
|
/linux-4.1.27/security/integrity/ima/ |
D | ima_queue.c | 56 rc = memcmp(qe->entry->digest, digest_value, TPM_DIGEST_SIZE); in ima_lookup_digest_entry() 87 key = ima_hash_key(entry->digest); in ima_add_digest_entry() 112 u8 digest[TPM_DIGEST_SIZE]; in ima_add_template_entry() local 120 memcpy(digest, entry->digest, sizeof(digest)); in ima_add_template_entry() 121 if (ima_lookup_digest_entry(digest)) { in ima_add_template_entry() 136 memset(digest, 0xff, sizeof(digest)); in ima_add_template_entry() 138 tpmresult = ima_pcr_extend(digest); in ima_add_template_entry()
|
D | ima_template_lib.c | 160 static int ima_eventdigest_init_common(u8 *digest, u32 digestsize, u8 hash_algo, in ima_eventdigest_init_common() argument 182 if (digest) in ima_eventdigest_init_common() 183 memcpy(buffer + offset, digest, digestsize); in ima_eventdigest_init_common() 206 char digest[IMA_MAX_DIGEST_SIZE]; in ima_eventdigest_init() member 219 cur_digest = iint->ima_hash->digest; in ima_eventdigest_init() 237 cur_digest = hash.hdr.digest; in ima_eventdigest_init() 259 cur_digest = iint->ima_hash->digest; in ima_eventdigest_ng_init()
|
D | ima.h | 81 u8 digest[TPM_DIGEST_SIZE]; /* sha1 or md5 measurement hash */ member 109 void ima_print_digest(struct seq_file *m, u8 *digest, u32 size); 125 static inline unsigned long ima_hash_key(u8 *digest) in ima_hash_key() argument 127 return hash_long(*digest, IMA_HASH_BITS); in ima_hash_key()
|
D | ima_api.c | 101 char digest[TPM_DIGEST_SIZE]; in ima_store_template() member 118 memcpy(entry->digest, hash.hdr.digest, hash.hdr.length); in ima_store_template() 202 char digest[IMA_MAX_DIGEST_SIZE]; in ima_collect_measurement() member 303 hex_byte_pack(hash + (i * 2), iint->ima_hash->digest[i]); in ima_audit_measurement()
|
D | ima_appraise.c | 149 hash->algo = xattr_value->digest[0]; in ima_get_hash_algo() 155 if (!memcmp(&xattr_value->digest[16], &zero, 4)) in ima_get_hash_algo() 237 rc = memcmp(&xattr_value->digest[hash_start], in ima_appraise_measurement() 238 iint->ima_hash->digest, in ima_appraise_measurement() 253 iint->ima_hash->digest, in ima_appraise_measurement()
|
D | ima_crypto.c | 329 ahash_request_set_crypt(req, NULL, hash->digest, 0); in ima_calc_file_hash_atfm() 406 rc = crypto_shash_final(shash, hash->digest); in ima_calc_file_hash_tfm() 498 rc = crypto_shash_final(shash, hash->digest); in ima_calc_field_array_hash_tfm() 534 static int __init ima_calc_boot_aggregate_tfm(char *digest, in ima_calc_boot_aggregate_tfm() argument 555 crypto_shash_final(shash, digest); in ima_calc_boot_aggregate_tfm() 569 rc = ima_calc_boot_aggregate_tfm(hash->digest, tfm); in ima_calc_boot_aggregate()
|
D | ima_fs.c | 143 ima_putc(m, e->digest, TPM_DIGEST_SIZE); in ima_measurements_show() 193 void ima_print_digest(struct seq_file *m, u8 *digest, u32 size) in ima_print_digest() argument 198 seq_printf(m, "%02x", *(digest + i)); in ima_print_digest() 222 ima_print_digest(m, e->digest, TPM_DIGEST_SIZE); in ima_ascii_measurements_show()
|
D | ima_init.c | 62 char digest[TPM_DIGEST_SIZE]; in ima_add_boot_aggregate() member
|
/linux-4.1.27/crypto/asymmetric_keys/ |
D | pkcs7_verify.c | 31 void *digest; in pkcs7_digest() local 52 digest = kzalloc(digest_size + desc_size, GFP_KERNEL); in pkcs7_digest() 53 if (!digest) in pkcs7_digest() 56 desc = digest + digest_size; in pkcs7_digest() 64 ret = crypto_shash_finup(desc, pkcs7->data, pkcs7->data_len, digest); in pkcs7_digest() 67 pr_devel("MsgDigest = [%*ph]\n", 8, digest); in pkcs7_digest() 83 if (memcmp(digest, sinfo->msgdigest, sinfo->msgdigest_len) != 0) { in pkcs7_digest() 95 memset(digest, 0, sinfo->sig.digest_size); in pkcs7_digest() 105 sinfo->authattrs_len, digest); in pkcs7_digest() 108 pr_devel("AADigest = [%*ph]\n", 8, digest); in pkcs7_digest() [all …]
|
D | x509_public_key.c | 133 void *digest; in x509_get_sig_params() local 167 digest = kzalloc(digest_size + desc_size, GFP_KERNEL); in x509_get_sig_params() 168 if (!digest) in x509_get_sig_params() 171 cert->sig.digest = digest; in x509_get_sig_params() 174 desc = digest + digest_size; in x509_get_sig_params() 182 ret = crypto_shash_finup(desc, cert->tbs, cert->tbs_size, digest); in x509_get_sig_params()
|
D | verify_pefile.c | 328 void *digest; in pefile_digest_pe() local 366 digest = (void *)desc + desc_size; in pefile_digest_pe() 367 ret = crypto_shash_final(desc, digest); in pefile_digest_pe() 371 pr_debug("Digest calc = [%*ph]\n", ctx->digest_len, digest); in pefile_digest_pe() 376 if (memcmp(digest, ctx->digest, ctx->digest_len) != 0) { in pefile_digest_pe() 456 ctx.digest_len, ctx.digest_len, ctx.digest); in verify_pefile_signature()
|
D | verify_pefile.h | 29 const void *digest; /* Digest */ member
|
D | mscode.asn1 | 19 digest OCTET STRING ({ mscode_note_digest })
|
D | mscode_parser.c | 123 ctx->digest = value; in mscode_note_digest()
|
D | public_key.c | 86 BUG_ON(!sig->digest); in public_key_verify_signature()
|
D | pkcs7.asn1 | 78 -- Explicit because easier to compute digest on
|
D | rsa.c | 217 const u8 *H = sig->digest; in RSA_verify_signature()
|
D | pkcs7_parser.c | 45 kfree(sinfo->sig.digest); in pkcs7_free_signed_info()
|
D | x509_cert_parser.c | 58 kfree(cert->sig.digest); in x509_free_certificate()
|
/linux-4.1.27/arch/x86/purgatory/ |
D | purgatory.c | 45 u8 digest[SHA256_DIGEST_SIZE]; in verify_sha256_digest() local 53 sha256_final(&sctx, digest); in verify_sha256_digest() 55 if (memcmp(digest, sha256_digest, sizeof(digest))) in verify_sha256_digest()
|
/linux-4.1.27/arch/x86/crypto/ |
D | sha1_ssse3_glue.c | 37 asmlinkage void sha1_transform_ssse3(u32 *digest, const char *data, 40 asmlinkage void sha1_transform_avx(u32 *digest, const char *data, 46 asmlinkage void sha1_transform_avx2(u32 *digest, const char *data, 95 static void sha1_apply_transform_avx2(u32 *digest, const char *data, in sha1_apply_transform_avx2() argument 100 sha1_transform_avx2(digest, data, rounds); in sha1_apply_transform_avx2() 102 sha1_transform_avx(digest, data, rounds); in sha1_apply_transform_avx2()
|
D | sha256_ssse3_glue.c | 45 asmlinkage void sha256_transform_ssse3(u32 *digest, const char *data, 48 asmlinkage void sha256_transform_avx(u32 *digest, const char *data, 52 asmlinkage void sha256_transform_rorx(u32 *digest, const char *data,
|
D | sha512_ssse3_glue.c | 44 asmlinkage void sha512_transform_ssse3(u64 *digest, const char *data, 47 asmlinkage void sha512_transform_avx(u64 *digest, const char *data, 51 asmlinkage void sha512_transform_rorx(u64 *digest, const char *data,
|
D | crc32c-intel_glue.c | 236 .digest = crc32c_intel_digest, 264 alg.digest = crc32c_pcl_intel_digest; in crc32c_intel_mod_init()
|
D | crct10dif-pclmul_glue.c | 113 .digest = chksum_digest,
|
D | crc32-pclmul_glue.c | 158 .digest = crc32_pclmul_digest,
|
D | sha512-avx-asm.S | 57 digest = %rdi define 97 #define DIGEST(i) 8*i(digest) 275 # Purpose: Updates the SHA512 digest stored at D with the message stored in M. 341 # Update digest
|
D | sha512-ssse3-asm.S | 56 digest = %rdi define 94 #define DIGEST(i) 8*i(digest) 273 # Purpose: Updates the SHA512 digest stored at D with the message stored in M. 340 # Update digest
|
D | sha256-avx-asm.S | 344 ## void sha256_transform_avx(void *input_data, UINT32 digest[8], UINT64 num_blks) 345 ## arg 1 : pointer to digest 368 ## load initial digest
|
D | sha256-ssse3-asm.S | 350 ## void sha256_transform_ssse3(void *input_data, UINT32 digest[8], UINT64 num_blks) 351 ## arg 1 : pointer to digest 374 ## load initial digest
|
D | ghash-clmulni-intel_glue.c | 290 .digest = ghash_async_digest,
|
D | sha256-avx2-asm.S | 525 ## void sha256_transform_rorx(void *input_data, UINT32 digest[8], UINT64 num_blks) 526 ## arg 1 : pointer to digest 554 ## load initial digest 696 ## load initial digest
|
D | sha512-avx2-asm.S | 566 # Purpose: Updates the SHA512 digest stored at D with the message stored in M. 591 ## load initial digest
|
/linux-4.1.27/security/integrity/evm/ |
D | evm_crypto.c | 98 char *digest) in hmac_add_misc() argument 118 crypto_shash_final(desc, digest); in hmac_add_misc() 132 char type, char *digest) in evm_calc_hmac_or_hash() argument 170 hmac_add_misc(desc, inode, digest); in evm_calc_hmac_or_hash() 180 char *digest) in evm_calc_hmac() argument 183 req_xattr_value_len, EVM_XATTR_HMAC, digest); in evm_calc_hmac() 188 char *digest) in evm_calc_hash() argument 191 req_xattr_value_len, IMA_XATTR_DIGEST, digest); in evm_calc_hash() 207 xattr_value_len, xattr_data.digest); in evm_update_evmxattr()
|
D | evm_main.c | 149 xattr_value_len, calc.digest); in evm_verify_hmac() 152 rc = crypto_memneq(xattr_data->digest, calc.digest, in evm_verify_hmac() 153 sizeof(calc.digest)); in evm_verify_hmac() 159 xattr_value_len, calc.digest); in evm_verify_hmac() 164 calc.digest, sizeof(calc.digest)); in evm_verify_hmac() 463 rc = evm_init_hmac(inode, lsm_xattr, xattr_data->digest); in evm_inode_init_security()
|
D | evm.h | 45 size_t req_xattr_value_len, char *digest); 48 size_t req_xattr_value_len, char *digest);
|
/linux-4.1.27/lib/ |
D | sha1.c | 81 void sha_transform(__u32 *digest, const char *data, __u32 *array) in sha_transform() argument 85 A = digest[0]; in sha_transform() 86 B = digest[1]; in sha_transform() 87 C = digest[2]; in sha_transform() 88 D = digest[3]; in sha_transform() 89 E = digest[4]; in sha_transform() 181 digest[0] += A; in sha_transform() 182 digest[1] += B; in sha_transform() 183 digest[2] += C; in sha_transform() 184 digest[3] += D; in sha_transform() [all …]
|
/linux-4.1.27/arch/arm64/crypto/ |
D | ghash-ce-glue.c | 31 u64 digest[GHASH_DIGEST_SIZE/sizeof(u64)]; member 71 pmull_ghash_update(blocks, ctx->digest, src, key, in ghash_update() 93 pmull_ghash_update(1, ctx->digest, ctx->buf, key, NULL); in ghash_final() 96 put_unaligned_be64(ctx->digest[1], dst); in ghash_final() 97 put_unaligned_be64(ctx->digest[0], dst + 8); in ghash_final()
|
D | Kconfig | 12 tristate "SHA-1 digest algorithm (ARMv8 Crypto Extensions)" 17 tristate "SHA-224/SHA-256 digest algorithm (ARMv8 Crypto Extensions)"
|
D | crc32-arm64.c | 229 .digest = chksum_digest, 250 .digest = chksumc_digest,
|
/linux-4.1.27/security/keys/encrypted-keys/ |
D | encrypted.h | 39 static inline void dump_hmac(const char *str, const u8 *digest, in dump_hmac() argument 44 print_hex_dump(KERN_ERR, "hmac: ", DUMP_PREFIX_NONE, 32, 1, digest, in dump_hmac() 61 static inline void dump_hmac(const char *str, const u8 *digest, in dump_hmac() argument
|
D | encrypted.c | 338 static int calc_hmac(u8 *digest, const u8 *key, unsigned int keylen, in calc_hmac() argument 352 ret = crypto_shash_digest(&sdesc->shash, buf, buflen, digest); in calc_hmac() 357 static int calc_hash(u8 *digest, const u8 *buf, unsigned int buflen) in calc_hash() argument 368 ret = crypto_shash_digest(&sdesc->shash, buf, buflen, digest); in calc_hash() 508 u8 *digest; in datablob_hmac_append() local 515 digest = epayload->format + epayload->datablob_len; in datablob_hmac_append() 516 ret = calc_hmac(digest, derived_key, sizeof derived_key, in datablob_hmac_append() 519 dump_hmac(NULL, digest, HASH_SIZE); in datablob_hmac_append() 530 u8 digest[HASH_SIZE]; in datablob_hmac_verify() local 546 ret = calc_hmac(digest, derived_key, sizeof derived_key, p, len); in datablob_hmac_verify() [all …]
|
/linux-4.1.27/security/integrity/ |
D | integrity.h | 69 u8 digest[SHA1_DIGEST_SIZE]; member 88 u8 digest[0]; member 135 const char *digest, int digestlen); 143 const char *digest, int digestlen) in integrity_digsig_verify() argument
|
D | digsig.c | 37 const char *digest, int digestlen) in integrity_digsig_verify() argument 57 digest, digestlen); in integrity_digsig_verify() 60 digest, digestlen); in integrity_digsig_verify()
|
D | digsig_asymmetric.c | 93 pks.digest = (u8 *)data; in asymmetric_verify()
|
/linux-4.1.27/drivers/block/drbd/ |
D | drbd_worker.c | 294 void drbd_csum_ee(struct crypto_hash *tfm, struct drbd_peer_request *peer_req, void *digest) in drbd_csum_ee() argument 318 crypto_hash_final(&desc, digest); in drbd_csum_ee() 321 void drbd_csum_bio(struct crypto_hash *tfm, struct bio *bio, void *digest) in drbd_csum_bio() argument 338 crypto_hash_final(&desc, digest); in drbd_csum_bio() 348 void *digest; in w_e_send_csum() local 358 digest = kmalloc(digest_size, GFP_NOIO); in w_e_send_csum() 359 if (digest) { in w_e_send_csum() 362 drbd_csum_ee(peer_device->connection->csums_tfm, peer_req, digest); in w_e_send_csum() 372 digest, digest_size, in w_e_send_csum() 374 kfree(digest); in w_e_send_csum() [all …]
|
D | drbd_int.h | 411 void *digest; member 426 struct digest_info *digest; member 1108 int size, void *digest, int digest_size,
|
D | drbd_main.c | 1396 void *digest, int digest_size, enum drbd_packet cmd) in drbd_send_drequest_csum() argument 1410 return drbd_send_command(peer_device, sock, cmd, sizeof(*p), digest, digest_size); in drbd_send_drequest_csum() 1686 unsigned char digest[64]; in drbd_send_dblock() local 1687 drbd_csum_bio(peer_device->connection->integrity_tfm, req->master_bio, digest); in drbd_send_dblock() 1688 if (memcmp(p + 1, digest, digest_size)) { in drbd_send_dblock()
|
D | drbd_receiver.c | 391 kfree(peer_req->digest); in __drbd_free_peer_req() 2604 di->digest = (((char *)di)+sizeof(struct digest_info)); in receive_DataRequest() 2606 peer_req->digest = di; in receive_DataRequest() 2609 if (drbd_recv_all(peer_device->connection, di->digest, pi->size)) in receive_DataRequest()
|
/linux-4.1.27/arch/arm/crypto/ |
D | ghash-ce-glue.c | 34 u64 digest[GHASH_DIGEST_SIZE/sizeof(u64)]; member 78 pmull_ghash_update(blocks, ctx->digest, src, key, in ghash_update() 99 pmull_ghash_update(1, ctx->digest, ctx->buf, key, NULL); in ghash_final() 102 put_unaligned_be64(ctx->digest[1], dst); in ghash_final() 103 put_unaligned_be64(ctx->digest[0], dst + 8); in ghash_final() 276 .digest = ghash_async_digest,
|
D | Kconfig | 12 tristate "SHA1 digest algorithm (ARM-asm)" 20 tristate "SHA1 digest algorithm (ARM NEON)" 31 tristate "SHA1 digest algorithm (ARM v8 Crypto Extensions)" 40 tristate "SHA-224/256 digest algorithm (ARM v8 Crypto Extensions)" 49 tristate "SHA-224/256 digest algorithm (ARM-asm and NEON)" 57 tristate "SHA384 and SHA512 digest algorithm (ARM NEON)"
|
D | sha1_glue.c | 30 asmlinkage void sha1_block_data_order(u32 *digest,
|
D | sha256_neon_glue.c | 29 asmlinkage void sha256_block_data_order_neon(u32 *digest, const void *data,
|
D | sha256_glue.c | 33 asmlinkage void sha256_block_data_order(u32 *digest, const void *data,
|
D | sha512_neon_glue.c | 75 asmlinkage void sha512_transform_neon(u64 *digest, const void *data,
|
/linux-4.1.27/include/linux/ |
D | digsig.h | 52 const char *digest, int digestlen); 57 int siglen, const char *digest, int digestlen) in digsig_verify() argument
|
D | cryptohash.h | 11 void sha_transform(__u32 *digest, const char *data, __u32 *W);
|
D | crypto.h | 642 int (*digest)(struct hash_desc *desc, struct scatterlist *sg, member 2314 return crypto_hash_crt(desc->tfm)->digest(desc, sg, nbytes, out); in crypto_hash_digest()
|
/linux-4.1.27/arch/cris/include/uapi/arch-v32/arch/ |
D | cryptocop.h | 70 cryptocop_digest_type digest; /* MD5, SHA1, none */ member 109 unsigned char digest[CRYPTOCOP_MAX_DIGEST_LENGTH]; member
|
/linux-4.1.27/Documentation/security/ |
D | IMA-templates.txt | 61 - 'd': the digest of the event (i.e. the digest of a measured file), 64 - 'd-ng': the digest of the event, calculated with an arbitrary hash 65 algorithm (field format: [<hash algo>:]digest, where the digest
|
/linux-4.1.27/drivers/md/ |
D | dm-era-target.c | 651 struct digest { struct 658 int (*step)(struct era_metadata *, struct digest *); argument 662 struct digest *d); 665 struct digest *d) in metadata_digest_remove_writeset() 684 struct digest *d) in metadata_digest_transcribe_writeset() 718 struct digest *d) in metadata_digest_lookup_writeset() 753 static int metadata_digest_start(struct era_metadata *md, struct digest *d) in metadata_digest_start() 1161 struct digest digest; member 1214 if (!era->digest.step) in process_old_eras() 1217 r = era->digest.step(era->md, &era->digest); in process_old_eras() [all …]
|
/linux-4.1.27/drivers/crypto/ux500/hash/ |
D | hash_core.c | 875 u8 digest[SHA256_DIGEST_SIZE]; in hash_dma_final() local 956 hash_get_digest(device_data, digest, ctx->config.algorithm); in hash_dma_final() 957 memcpy(req->result, digest, ctx->digestsize); in hash_dma_final() 981 u8 digest[SHA256_DIGEST_SIZE]; in hash_hw_final() local 1057 hash_get_digest(device_data, digest, ctx->config.algorithm); in hash_hw_final() 1058 memcpy(req->result, digest, ctx->digestsize); in hash_hw_final() 1274 u8 *digest, int algorithm) in hash_get_digest() argument 1291 __func__, (u32) digest); in hash_get_digest() 1296 digest[count * 4] = (u8) ((temp_hx_val >> 24) & 0xFF); in hash_get_digest() 1297 digest[count * 4 + 1] = (u8) ((temp_hx_val >> 16) & 0xFF); in hash_get_digest() [all …]
|
D | hash_alg.h | 388 u8 *digest, int algorithm);
|
/linux-4.1.27/include/scsi/ |
D | libiscsi_tcp.h | 44 unsigned char digest[ISCSI_DIGEST_SIZE]; member 124 unsigned char digest[ISCSI_DIGEST_SIZE]);
|
/linux-4.1.27/Documentation/device-mapper/ |
D | verity.txt | 5 block devices using a cryptographic digest provided by the kernel crypto API. 13 <algorithm> <digest> <salt> 24 The salt is prepended when hashing and each digest is 40 Each block corresponds to one digest on the hash device. 58 <digest> 110 selected cryptographic digest algorithm. The hashes are linearly-ordered in
|
/linux-4.1.27/drivers/crypto/qce/ |
D | sha.c | 58 memcpy(rctx->digest, result->auth_iv, digestsize); in qce_ahash_done() 141 memcpy(rctx->digest, std_iv, sizeof(rctx->digest)); in qce_ahash_init() 160 rctx->digest, digestsize); in qce_ahash_export() 167 rctx->digest, digestsize); in qce_ahash_export() 204 qce_cpu_to_be32p_array((__be32 *)rctx->digest, (const u8 *)state, in qce_import_common() 517 alg->digest = qce_ahash_digest; in qce_ahash_register_one()
|
D | sha.h | 53 u8 digest[QCE_SHA_MAX_DIGESTSIZE]; member
|
D | common.c | 274 memcpy(auth, rctx->digest, digestsize); in qce_setup_regs_ahash() 276 qce_cpu_to_be32p_array(auth, rctx->digest, digestsize); in qce_setup_regs_ahash()
|
/linux-4.1.27/include/crypto/ |
D | sha1_base.h | 98 __be32 *digest = (__be32 *)out; in sha1_base_finish() local 102 put_unaligned_be32(sctx->state[i], digest++); in sha1_base_finish()
|
D | sha256_base.h | 120 __be32 *digest = (__be32 *)out; in sha256_base_finish() local 124 put_unaligned_be32(sctx->state[i], digest++); in sha256_base_finish()
|
D | sha512_base.h | 123 __be64 *digest = (__be64 *)out; in sha512_base_finish() local 127 put_unaligned_be64(sctx->state[i], digest++); in sha512_base_finish()
|
D | hash.h | 128 int (*digest)(struct ahash_request *req); member 173 int (*digest)(struct shash_desc *desc, const u8 *data, member 195 int (*digest)(struct ahash_request *req); member
|
D | public_key.h | 81 u8 *digest; member
|
/linux-4.1.27/drivers/staging/rtl8192e/rtl8192e/ |
D | rtl_crypto.h | 100 #define cra_digest cra_u.digest 112 struct digest_alg digest; member 183 #define crt_digest crt_u.digest 192 struct digest_tfm digest; member
|
/linux-4.1.27/net/sctp/ |
D | endpointola.c | 67 ep->digest = kzalloc(SCTP_SIGNATURE_SIZE, gfp); in sctp_endpoint_init() 68 if (!ep->digest) in sctp_endpoint_init() 176 kfree(ep->digest); in sctp_endpoint_init() 252 kfree(ep->digest); in sctp_endpoint_destroy()
|
D | auth.c | 716 __u8 *digest; in sctp_auth_calculate_hmac() local 750 digest = auth->auth_hdr.hmac; in sctp_auth_calculate_hmac() 754 crypto_hash_digest(&desc, &sg, sg.length, digest); in sctp_auth_calculate_hmac()
|
D | sm_make_chunk.c | 1699 __u8 *digest = ep->digest; in sctp_unpack_cookie() local 1740 memset(digest, 0x00, SCTP_SIGNATURE_SIZE); in sctp_unpack_cookie() 1743 crypto_hash_digest(&desc, &sg, bodysize, digest)) { in sctp_unpack_cookie() 1748 if (memcmp(digest, cookie->signature, SCTP_SIGNATURE_SIZE)) { in sctp_unpack_cookie()
|
D | sm_statefuns.c | 3999 __u8 *digest; in sctp_sf_authenticate() local 4035 digest = auth_hdr->hmac; in sctp_sf_authenticate() 4038 save_digest = kmemdup(digest, sig_len, GFP_ATOMIC); in sctp_sf_authenticate() 4042 memset(digest, 0, sig_len); in sctp_sf_authenticate() 4049 if (memcmp(save_digest, digest, sig_len)) { in sctp_sf_authenticate()
|
/linux-4.1.27/drivers/target/iscsi/ |
D | iscsi_target_auth.c | 179 unsigned char digest[MD5_SIGNATURE_SIZE]; in chap_server_compute_md5() local 196 memset(digest, 0, MD5_SIGNATURE_SIZE); in chap_server_compute_md5() 420 ret = crypto_hash_final(&desc, digest); in chap_server_compute_md5() 436 chap_binaryhex_to_asciihex(response, digest, MD5_SIGNATURE_SIZE); in chap_server_compute_md5()
|
D | iscsi_target.c | 4113 u32 checksum = 0, digest = 0; in iscsi_target_rx_thread() local 4160 iov.iov_base = &digest; in iscsi_target_rx_thread() 4173 if (digest != checksum) { in iscsi_target_rx_thread() 4176 digest, checksum); in iscsi_target_rx_thread()
|
/linux-4.1.27/drivers/crypto/ |
D | atmel-sha.c | 85 u8 digest[SHA512_DIGEST_SIZE] __aligned(sizeof(u32)); 715 u32 *hash = (u32 *)ctx->digest; in atmel_sha_copy_hash() 743 memcpy(req->result, ctx->digest, SHA1_DIGEST_SIZE); in atmel_sha_copy_ready_hash() 745 memcpy(req->result, ctx->digest, SHA224_DIGEST_SIZE); in atmel_sha_copy_ready_hash() 747 memcpy(req->result, ctx->digest, SHA256_DIGEST_SIZE); in atmel_sha_copy_ready_hash() 749 memcpy(req->result, ctx->digest, SHA384_DIGEST_SIZE); in atmel_sha_copy_ready_hash() 751 memcpy(req->result, ctx->digest, SHA512_DIGEST_SIZE); in atmel_sha_copy_ready_hash() 998 .digest = atmel_sha_digest, 1019 .digest = atmel_sha_digest, 1042 .digest = atmel_sha_digest, [all …]
|
D | omap-sham.c | 145 u8 digest[SHA512_DIGEST_SIZE] OMAP_ALIGNED; member 283 u32 *hash = (u32 *)ctx->digest; in omap_sham_copy_hash_omap2() 322 u32 *in = (u32 *)ctx->digest; in omap_sham_copy_ready_hash() 1322 .digest = omap_sham_digest, 1345 .digest = omap_sham_digest, 1368 .digest = omap_sham_digest, 1393 .digest = omap_sham_digest, 1422 .digest = omap_sham_digest, 1444 .digest = omap_sham_digest, 1466 .digest = omap_sham_digest, [all …]
|
D | img-hash.c | 86 u8 digest[SHA256_DIGEST_SIZE] __aligned(sizeof(u32)); 276 memcpy(req->result, ctx->digest, ctx->digsize); in img_hash_finish() 284 u32 *hash = (u32 *)ctx->digest; in img_hash_copy_hash() 714 .digest = img_hash_digest, 737 .digest = img_hash_digest, 760 .digest = img_hash_digest, 783 .digest = img_hash_digest,
|
D | Kconfig | 80 tristate "SHA1 digest algorithm" 90 tristate "SHA256 digest algorithm" 100 tristate "SHA384 and SHA512 digest algorithm" 153 tristate "GHASH digest algorithm" 158 GHASH message digest algorithm for GCM (Galois/Counter Mode).
|
D | mxs-dcp.c | 836 .digest = dcp_sha_digest, 860 .digest = dcp_sha_digest,
|
D | mv_cesa.c | 978 .digest = mv_hash_digest, 1002 .digest = mv_hash_digest,
|
D | bfin_crc.c | 509 .digest = bfin_crypto_crc_digest,
|
D | sahara.c | 1323 .digest = sahara_sha_digest, 1350 .digest = sahara_sha_digest,
|
D | n2_core.c | 1439 ahash->digest = n2_hmac_async_digest; in __n2_register_one_hmac() 1485 ahash->digest = n2_hash_async_digest; in __n2_register_one_ahash()
|
D | talitos.c | 2545 t_alg->algt.alg.hash.digest = ahash_digest; in talitos_alg_alloc()
|
/linux-4.1.27/scripts/ |
D | sign-file | 360 my $digest; 361 $digest = readpipe("openssl dgst -$dgst -binary $module") || die "openssl dgst"; 372 print write_to $prologue . $digest || die "pipe to openssl rsautl";
|
/linux-4.1.27/drivers/scsi/ |
D | libiscsi_tcp.c | 165 iscsi_tcp_segment_splice_digest(struct iscsi_segment *segment, void *digest) in iscsi_tcp_segment_splice_digest() argument 167 segment->data = digest; in iscsi_tcp_segment_splice_digest() 263 crypto_hash_final(segment->hash, segment->digest); in iscsi_tcp_segment_done() 265 recv ? segment->recv_digest : segment->digest); in iscsi_tcp_segment_done() 314 unsigned char digest[ISCSI_DIGEST_SIZE]) in iscsi_tcp_dgst_header() 319 crypto_hash_digest(hash, &sg, hdrlen, digest); in iscsi_tcp_dgst_header() 330 if (memcmp(segment->recv_digest, segment->digest, in iscsi_tcp_dgst_verify() 846 segment->digest); in iscsi_tcp_hdr_recv_done()
|
/linux-4.1.27/Documentation/scsi/ |
D | cxgb3i.txt | 12 - iSCSI PDU digest generation and verification 15 Data digest into the PDUs. 17 Data digest of the PDUs.
|
/linux-4.1.27/drivers/char/tpm/ |
D | tpm-sysfs.c | 91 u8 digest[TPM_DIGEST_SIZE]; in pcrs_show() local 104 rc = tpm_pcr_read_dev(chip, i, digest); in pcrs_show() 109 str += sprintf(str, "%02X ", digest[j]); in pcrs_show()
|
D | tpm2-cmd.c | 43 u8 digest[TPM_DIGEST_SIZE]; member 59 u8 digest[TPM_DIGEST_SIZE]; member 265 buf = cmd.params.pcrread_out.digest; in tpm2_pcr_read() 308 memcpy(cmd.params.pcrextend_in.digest, hash, TPM_DIGEST_SIZE); in tpm2_pcr_extend()
|
/linux-4.1.27/arch/x86/crypto/sha-mb/ |
D | sha_mb_mgr.h | 82 uint32_t digest[5][8]; member
|
D | sha1_mb.c | 108 inline void sha1_init_digest(uint32_t *digest) in sha1_init_digest() argument 112 memcpy(digest, initial_digest, sizeof(initial_digest)); in sha1_init_digest() 801 .digest = sha1_mb_async_digest,
|
D | sha1_mb_mgr_submit_avx2.S | 133 # Load digest words from result_digest
|
D | sha1_x8_avx2.S | 288 # 8 streams x 5 32bit words per digest x 4 bytes per word 293 # void sha1_x8_avx2(void **input_data, UINT128 *digest, UINT32 size)
|
/linux-4.1.27/drivers/staging/skein/ |
D | Kconfig | 2 tristate "Skein digest algorithm"
|
/linux-4.1.27/kernel/ |
D | module_signing.c | 74 pks->digest = (u8 *)pks + sizeof(*pks) + desc_size; in mod_make_digest() 85 ret = crypto_shash_finup(desc, mod, modlen, pks->digest); in mod_make_digest()
|
D | kexec.c | 2187 char *digest; in kexec_calculate_store_digests() local 2220 digest = kzalloc(SHA256_DIGEST_SIZE, GFP_KERNEL); in kexec_calculate_store_digests() 2221 if (!digest) { in kexec_calculate_store_digests() 2267 ret = crypto_shash_final(desc, digest); in kexec_calculate_store_digests() 2276 digest, SHA256_DIGEST_SIZE, 0); in kexec_calculate_store_digests() 2282 kfree(digest); in kexec_calculate_store_digests()
|
D | Makefile | 170 $(error Could not determine digest type to use from kernel config)
|
/linux-4.1.27/Documentation/devicetree/bindings/crypto/ |
D | fsl-sec2.txt | 21 bit 3 = set if SEC has the message digest EU (MDEU/MDEU-A) 27 bit 11 = set if SEC has the message digest EU extended alg set (MDEU-B)
|
/linux-4.1.27/security/keys/ |
D | trusted.c | 60 unsigned char *digest) in TSS_sha1() argument 71 ret = crypto_shash_digest(&sdesc->shash, data, datalen, digest); in TSS_sha1() 76 static int TSS_rawhmac(unsigned char *digest, const unsigned char *key, in TSS_rawhmac() argument 114 ret = crypto_shash_final(&sdesc->shash, digest); in TSS_rawhmac() 123 static int TSS_authhmac(unsigned char *digest, const unsigned char *key, in TSS_authhmac() argument 163 ret = TSS_rawhmac(digest, key, keylen, SHA1_DIGEST_SIZE, in TSS_authhmac()
|
/linux-4.1.27/drivers/staging/lustre/lustre/libcfs/linux/ |
D | linux-crypto-adler.c | 118 .digest = adler32_digest,
|
/linux-4.1.27/arch/sparc/crypto/ |
D | crc32c_glue.c | 129 .digest = crc32c_sparc64_digest,
|
D | md5_glue.c | 29 asmlinkage void md5_sparc64_transform(u32 *digest, const char *data,
|
D | sha1_glue.c | 26 asmlinkage void sha1_sparc64_transform(u32 *digest, const char *data,
|
D | sha256_glue.c | 26 asmlinkage void sha256_sparc64_transform(u32 *digest, const char *data,
|
D | sha512_glue.c | 25 asmlinkage void sha512_sparc64_transform(u64 *digest, const char *data,
|
/linux-4.1.27/Documentation/crypto/ |
D | asymmetric-keys.txt | 97 digest algorithms used by those: 133 u8 *digest; 148 hash must be pointed to by sig->digest and the size of the hash be placed in
|
/linux-4.1.27/drivers/crypto/caam/ |
D | caamhash.c | 1623 .digest = ahash_digest, 1644 .digest = ahash_digest, 1665 .digest = ahash_digest, 1686 .digest = ahash_digest, 1707 .digest = ahash_digest, 1728 .digest = ahash_digest,
|
/linux-4.1.27/Documentation/filesystems/pohmelfs/ |
D | design_notes.txt | 67 (hmac or digest). It is also possible to use both or neither (default). Crypto configuration
|
/linux-4.1.27/drivers/crypto/ccp/ |
D | ccp-crypto-aes-cmac.c | 372 alg->digest = ccp_aes_cmac_digest; in ccp_register_aes_cmac_algs()
|
D | ccp-crypto-sha.c | 432 alg->digest = ccp_sha_digest; in ccp_register_sha_alg()
|
/linux-4.1.27/arch/cris/arch-v32/drivers/ |
D | cryptocop.c | 2917 …err = copy_to_user((unsigned char*)crp_oper + offsetof(struct strcop_crypto_op, digest), digest_re… in cryptocop_ioctl_process() 2997 (int)sop.digest, in cryptocop_ioctl_create_session() 3048 if (sop.digest != cryptocop_digest_none){ in cryptocop_ioctl_create_session() 3050 switch (sop.digest){ in cryptocop_ioctl_create_session() 3058 DEBUG_API(printk("create session, bad digest algorithm %d\n", sop.digest)); in cryptocop_ioctl_create_session()
|
/linux-4.1.27/drivers/net/wireless/ |
D | airo.c | 1296 static void emmh32_final(emmh32_context *context, u8 digest[4]); 1455 u8 digest[4]; in decapsulate() local 1511 emmh32_final(&context->seed, digest); in decapsulate() 1513 if (memcmp(digest, &mic->mic, 4)) { //Make sure the mics match in decapsulate() 1710 static void emmh32_final(emmh32_context *context, u8 digest[4]) in emmh32_final() 1737 digest[0] = (val>>24) & 0xFF; in emmh32_final() 1738 digest[1] = (val>>16) & 0xFF; in emmh32_final() 1739 digest[2] = (val>>8) & 0xFF; in emmh32_final() 1740 digest[3] = val & 0xFF; in emmh32_final()
|
/linux-4.1.27/include/net/sctp/ |
D | structs.h | 1227 __u8 *digest; member
|
/linux-4.1.27/net/ipv6/ |
D | addrconf.c | 2911 static __u32 digest[SHA_DIGEST_WORDS]; in ipv6_generate_stable_address() local 2940 sha_init(digest); in ipv6_generate_stable_address() 2949 sha_transform(digest, data.__data, workspace); in ipv6_generate_stable_address() 2952 temp.s6_addr32[2] = (__force __be32)digest[0]; in ipv6_generate_stable_address() 2953 temp.s6_addr32[3] = (__force __be32)digest[1]; in ipv6_generate_stable_address()
|