/linux-4.4.14/crypto/ |
D | testmgr.h | 42 char *digest; member 344 .digest = "\x31\xd6\xcf\xe0\xd1\x6a\xe9\x31" 349 .digest = "\xbd\xe5\x2c\xb3\x1d\xe3\x3e\x46" 354 .digest = "\xa4\x48\x01\x7a\xaf\x21\xd8\x52" 359 .digest = "\xd9\x13\x0a\x81\x64\x54\x9f\xe8" 364 .digest = "\xd7\x9e\x1c\x30\x8a\xa5\xbb\xcd" 371 .digest = "\x04\x3f\x85\x82\xf2\x41\xdb\x35" 377 .digest = "\xe3\x3b\x4d\xdc\x9c\x38\xf2\x19" 389 .digest = "\xd4\x1d\x8c\xd9\x8f\x00\xb2\x04" 394 .digest = "\x0c\xc1\x75\xb9\xc0\xf1\xb6\xa8" [all …]
|
D | Kconfig | 473 tristate "GHASH digest algorithm" 476 GHASH is message digest algorithm for GCM (Galois/Counter Mode). 500 tristate "MD4 digest algorithm" 503 MD4 message digest algorithm (RFC1320). 506 tristate "MD5 digest algorithm" 509 MD5 message digest algorithm (RFC1321). 512 tristate "MD5 digest algorithm (OCTEON)" 517 MD5 message digest algorithm (RFC1321) implemented 521 tristate "MD5 digest algorithm (PPC)" 525 MD5 message digest algorithm (RFC1321) implemented [all …]
|
D | shash.c | 185 return shash->digest(desc, data, len, out); in crypto_shash_digest() 356 crt->digest = shash_async_digest; in crypto_init_shash_ops_async() 487 crt->digest = shash_compat_digest; in crypto_init_shash_ops_compat() 598 if (!alg->digest) in shash_prepare_alg() 599 alg->digest = shash_digest_unaligned; in shash_prepare_alg()
|
D | crct10dif_generic.c | 97 .digest = chksum_digest,
|
D | crc32.c | 129 .digest = crc32_digest,
|
D | ahash.c | 376 return crypto_ahash_op(req, crypto_ahash_reqtfm(req)->digest); in crypto_ahash_digest() 466 hash->digest = alg->digest; in crypto_ahash_init_tfm()
|
D | crc32c_generic.c | 143 .digest = chksum_digest,
|
D | crypto_null.c | 103 .digest = null_digest,
|
D | wp512.c | 1073 __be64 *digest = (__be64 *)out; in wp512_final() local 1093 digest[i] = cpu_to_be64(wctx->hash[i]); in wp512_final()
|
D | mcryptd.c | 541 inst->alg.digest = mcryptd_hash_digest_enqueue; in mcryptd_create_hash()
|
D | cryptd.c | 652 inst->alg.digest = cryptd_hash_digest_enqueue; in cryptd_create_hash()
|
D | testmgr.c | 301 if (memcmp(result, template[i].digest, in __test_hash() 378 if (memcmp(result, template[i].digest, in __test_hash()
|
/linux-4.4.14/security/integrity/ima/ |
D | ima_queue.c | 56 rc = memcmp(qe->entry->digest, digest_value, TPM_DIGEST_SIZE); in ima_lookup_digest_entry() 87 key = ima_hash_key(entry->digest); in ima_add_digest_entry() 112 u8 digest[TPM_DIGEST_SIZE]; in ima_add_template_entry() local 120 memcpy(digest, entry->digest, sizeof(digest)); in ima_add_template_entry() 121 if (ima_lookup_digest_entry(digest)) { in ima_add_template_entry() 136 memset(digest, 0xff, sizeof(digest)); in ima_add_template_entry() 138 tpmresult = ima_pcr_extend(digest); in ima_add_template_entry()
|
D | ima_template_lib.c | 160 static int ima_eventdigest_init_common(u8 *digest, u32 digestsize, u8 hash_algo, in ima_eventdigest_init_common() argument 182 if (digest) in ima_eventdigest_init_common() 183 memcpy(buffer + offset, digest, digestsize); in ima_eventdigest_init_common() 204 char digest[IMA_MAX_DIGEST_SIZE]; in ima_eventdigest_init() member 217 cur_digest = event_data->iint->ima_hash->digest; in ima_eventdigest_init() 235 cur_digest = hash.hdr.digest; in ima_eventdigest_init() 254 cur_digest = event_data->iint->ima_hash->digest; in ima_eventdigest_ng_init()
|
D | ima.h | 89 u8 digest[TPM_DIGEST_SIZE]; /* sha1 or md5 measurement hash */ member 118 void ima_print_digest(struct seq_file *m, u8 *digest, u32 size); 134 static inline unsigned long ima_hash_key(u8 *digest) in ima_hash_key() argument 136 return hash_long(*digest, IMA_HASH_BITS); in ima_hash_key()
|
D | ima_api.c | 98 char digest[TPM_DIGEST_SIZE]; in ima_store_template() member 115 memcpy(entry->digest, hash.hdr.digest, hash.hdr.length); in ima_store_template() 201 char digest[IMA_MAX_DIGEST_SIZE]; in ima_collect_measurement() member 303 hex_byte_pack(hash + (i * 2), iint->ima_hash->digest[i]); in ima_audit_measurement()
|
D | ima_appraise.c | 149 hash->algo = xattr_value->digest[0]; in ima_get_hash_algo() 155 if (!memcmp(&xattr_value->digest[16], &zero, 4)) in ima_get_hash_algo() 237 rc = memcmp(&xattr_value->digest[hash_start], in ima_appraise_measurement() 238 iint->ima_hash->digest, in ima_appraise_measurement() 253 iint->ima_hash->digest, in ima_appraise_measurement()
|
D | ima_crypto.c | 329 ahash_request_set_crypt(req, NULL, hash->digest, 0); in ima_calc_file_hash_atfm() 406 rc = crypto_shash_final(shash, hash->digest); in ima_calc_file_hash_tfm() 498 rc = crypto_shash_final(shash, hash->digest); in ima_calc_field_array_hash_tfm() 534 static int __init ima_calc_boot_aggregate_tfm(char *digest, in ima_calc_boot_aggregate_tfm() argument 555 crypto_shash_final(shash, digest); in ima_calc_boot_aggregate_tfm() 569 rc = ima_calc_boot_aggregate_tfm(hash->digest, tfm); in ima_calc_boot_aggregate()
|
D | ima_fs.c | 143 ima_putc(m, e->digest, TPM_DIGEST_SIZE); in ima_measurements_show() 193 void ima_print_digest(struct seq_file *m, u8 *digest, u32 size) in ima_print_digest() argument 198 seq_printf(m, "%02x", *(digest + i)); in ima_print_digest() 222 ima_print_digest(m, e->digest, TPM_DIGEST_SIZE); in ima_ascii_measurements_show()
|
D | ima_init.c | 58 char digest[TPM_DIGEST_SIZE]; in ima_add_boot_aggregate() member
|
/linux-4.4.14/crypto/asymmetric_keys/ |
D | pkcs7_verify.c | 31 void *digest; in pkcs7_digest() local 52 digest = kzalloc(ALIGN(digest_size, __alignof__(*desc)) + desc_size, in pkcs7_digest() 54 if (!digest) in pkcs7_digest() 57 desc = PTR_ALIGN(digest + digest_size, __alignof__(*desc)); in pkcs7_digest() 65 ret = crypto_shash_finup(desc, pkcs7->data, pkcs7->data_len, digest); in pkcs7_digest() 68 pr_devel("MsgDigest = [%*ph]\n", 8, digest); in pkcs7_digest() 90 if (memcmp(digest, sinfo->msgdigest, sinfo->msgdigest_len) != 0) { in pkcs7_digest() 102 memset(digest, 0, sinfo->sig.digest_size); in pkcs7_digest() 112 sinfo->authattrs_len, digest); in pkcs7_digest() 115 pr_devel("AADigest = [%*ph]\n", 8, digest); in pkcs7_digest() [all …]
|
D | x509_public_key.c | 163 void *digest; in x509_get_sig_params() local 197 digest = kzalloc(ALIGN(digest_size, __alignof__(*desc)) + desc_size, in x509_get_sig_params() 199 if (!digest) in x509_get_sig_params() 202 cert->sig.digest = digest; in x509_get_sig_params() 205 desc = PTR_ALIGN(digest + digest_size, __alignof__(*desc)); in x509_get_sig_params() 213 ret = crypto_shash_finup(desc, cert->tbs, cert->tbs_size, digest); in x509_get_sig_params()
|
D | verify_pefile.c | 328 void *digest; in pefile_digest_pe() local 366 digest = (void *)desc + desc_size; in pefile_digest_pe() 367 ret = crypto_shash_final(desc, digest); in pefile_digest_pe() 371 pr_debug("Digest calc = [%*ph]\n", ctx->digest_len, digest); in pefile_digest_pe() 376 if (memcmp(digest, ctx->digest, ctx->digest_len) != 0) { in pefile_digest_pe() 459 ctx.digest_len, ctx.digest_len, ctx.digest); in verify_pefile_signature()
|
D | verify_pefile.h | 29 const void *digest; /* Digest */ member
|
D | mscode.asn1 | 19 digest OCTET STRING ({ mscode_note_digest })
|
D | mscode_parser.c | 132 ctx->digest = value; in mscode_note_digest()
|
D | public_key.c | 87 BUG_ON(!sig->digest); in public_key_verify_signature()
|
D | pkcs7.asn1 | 78 -- Explicit because easier to compute digest on
|
D | rsa.c | 217 const u8 *H = sig->digest; in RSA_verify_signature()
|
D | pkcs7_parser.c | 48 kfree(sinfo->sig.digest); in pkcs7_free_signed_info()
|
D | x509_cert_parser.c | 58 kfree(cert->sig.digest); in x509_free_certificate()
|
/linux-4.4.14/arch/x86/purgatory/ |
D | purgatory.c | 45 u8 digest[SHA256_DIGEST_SIZE]; in verify_sha256_digest() local 53 sha256_final(&sctx, digest); in verify_sha256_digest() 55 if (memcmp(digest, sha256_digest, sizeof(digest))) in verify_sha256_digest()
|
/linux-4.4.14/security/integrity/evm/ |
D | evm_crypto.c | 98 char *digest) in hmac_add_misc() argument 118 crypto_shash_final(desc, digest); in hmac_add_misc() 132 char type, char *digest) in evm_calc_hmac_or_hash() argument 170 hmac_add_misc(desc, inode, digest); in evm_calc_hmac_or_hash() 180 char *digest) in evm_calc_hmac() argument 183 req_xattr_value_len, EVM_XATTR_HMAC, digest); in evm_calc_hmac() 188 char *digest) in evm_calc_hash() argument 191 req_xattr_value_len, IMA_XATTR_DIGEST, digest); in evm_calc_hash() 207 xattr_value_len, xattr_data.digest); in evm_update_evmxattr()
|
D | evm_main.c | 149 xattr_value_len, calc.digest); in evm_verify_hmac() 152 rc = crypto_memneq(xattr_data->digest, calc.digest, in evm_verify_hmac() 153 sizeof(calc.digest)); in evm_verify_hmac() 159 xattr_value_len, calc.digest); in evm_verify_hmac() 164 calc.digest, sizeof(calc.digest)); in evm_verify_hmac() 462 rc = evm_init_hmac(inode, lsm_xattr, xattr_data->digest); in evm_inode_init_security()
|
D | evm.h | 45 size_t req_xattr_value_len, char *digest); 48 size_t req_xattr_value_len, char *digest);
|
/linux-4.4.14/lib/ |
D | sha1.c | 81 void sha_transform(__u32 *digest, const char *data, __u32 *array) in sha_transform() argument 85 A = digest[0]; in sha_transform() 86 B = digest[1]; in sha_transform() 87 C = digest[2]; in sha_transform() 88 D = digest[3]; in sha_transform() 89 E = digest[4]; in sha_transform() 181 digest[0] += A; in sha_transform() 182 digest[1] += B; in sha_transform() 183 digest[2] += C; in sha_transform() 184 digest[3] += D; in sha_transform() [all …]
|
/linux-4.4.14/arch/x86/crypto/ |
D | sha1_ssse3_glue.c | 34 typedef void (sha1_transform_fn)(u32 *digest, const char *data, 73 asmlinkage void sha1_transform_ssse3(u32 *digest, const char *data, 127 asmlinkage void sha1_transform_avx(u32 *digest, const char *data, 199 asmlinkage void sha1_transform_avx2(u32 *digest, const char *data, 212 static void sha1_apply_transform_avx2(u32 *digest, const char *data, in sha1_apply_transform_avx2() argument 217 sha1_transform_avx2(digest, data, rounds); in sha1_apply_transform_avx2() 219 sha1_transform_avx(digest, data, rounds); in sha1_apply_transform_avx2() 277 asmlinkage void sha1_ni_transform(u32 *digest, const char *data,
|
D | sha256_ssse3_glue.c | 43 asmlinkage void sha256_transform_ssse3(u32 *digest, const char *data, 45 typedef void (sha256_transform_fn)(u32 *digest, const char *data, u64 rounds); 149 asmlinkage void sha256_transform_avx(u32 *digest, const char *data, 233 asmlinkage void sha256_transform_rorx(u32 *digest, const char *data, 315 asmlinkage void sha256_ni_transform(u32 *digest, const char *data,
|
D | sha512_ssse3_glue.c | 42 asmlinkage void sha512_transform_ssse3(u64 *digest, const char *data, 45 typedef void (sha512_transform_fn)(u64 *digest, const char *data, u64 rounds); 149 asmlinkage void sha512_transform_avx(u64 *digest, const char *data, 232 asmlinkage void sha512_transform_rorx(u64 *digest, const char *data,
|
D | crc32c-intel_glue.c | 235 .digest = crc32c_intel_digest, 263 alg.digest = crc32c_pcl_intel_digest; in crc32c_intel_mod_init()
|
D | crct10dif-pclmul_glue.c | 113 .digest = chksum_digest,
|
D | crc32-pclmul_glue.c | 158 .digest = crc32_pclmul_digest,
|
D | sha512-ssse3-asm.S | 56 digest = %rdi define 94 #define DIGEST(i) 8*i(digest) 273 # Purpose: Updates the SHA512 digest stored at D with the message stored in M. 340 # Update digest
|
D | sha512-avx-asm.S | 57 digest = %rdi define 97 #define DIGEST(i) 8*i(digest) 275 # Purpose: Updates the SHA512 digest stored at D with the message stored in M. 341 # Update digest
|
D | sha256-ssse3-asm.S | 350 ## void sha256_transform_ssse3(void *input_data, UINT32 digest[8], UINT64 num_blks) 351 ## arg 1 : pointer to digest 374 ## load initial digest
|
D | sha256-avx-asm.S | 344 ## void sha256_transform_avx(void *input_data, UINT32 digest[8], UINT64 num_blks) 345 ## arg 1 : pointer to digest 368 ## load initial digest
|
D | ghash-clmulni-intel_glue.c | 290 .digest = ghash_async_digest,
|
D | sha256-avx2-asm.S | 525 ## void sha256_transform_rorx(void *input_data, UINT32 digest[8], UINT64 num_blks) 526 ## arg 1 : pointer to digest 554 ## load initial digest 696 ## load initial digest
|
D | sha512-avx2-asm.S | 566 # Purpose: Updates the SHA512 digest stored at D with the message stored in M. 591 ## load initial digest
|
/linux-4.4.14/arch/arm64/crypto/ |
D | ghash-ce-glue.c | 31 u64 digest[GHASH_DIGEST_SIZE/sizeof(u64)]; member 71 pmull_ghash_update(blocks, ctx->digest, src, key, in ghash_update() 93 pmull_ghash_update(1, ctx->digest, ctx->buf, key, NULL); in ghash_final() 96 put_unaligned_be64(ctx->digest[1], dst); in ghash_final() 97 put_unaligned_be64(ctx->digest[0], dst + 8); in ghash_final()
|
D | Kconfig | 12 tristate "SHA-1 digest algorithm (ARMv8 Crypto Extensions)" 17 tristate "SHA-224/SHA-256 digest algorithm (ARMv8 Crypto Extensions)"
|
D | crc32-arm64.c | 229 .digest = chksum_digest, 250 .digest = chksumc_digest,
|
/linux-4.4.14/security/keys/encrypted-keys/ |
D | encrypted.h | 39 static inline void dump_hmac(const char *str, const u8 *digest, in dump_hmac() argument 44 print_hex_dump(KERN_ERR, "hmac: ", DUMP_PREFIX_NONE, 32, 1, digest, in dump_hmac() 61 static inline void dump_hmac(const char *str, const u8 *digest, in dump_hmac() argument
|
D | encrypted.c | 338 static int calc_hmac(u8 *digest, const u8 *key, unsigned int keylen, in calc_hmac() argument 352 ret = crypto_shash_digest(&sdesc->shash, buf, buflen, digest); in calc_hmac() 357 static int calc_hash(u8 *digest, const u8 *buf, unsigned int buflen) in calc_hash() argument 368 ret = crypto_shash_digest(&sdesc->shash, buf, buflen, digest); in calc_hash() 508 u8 *digest; in datablob_hmac_append() local 515 digest = epayload->format + epayload->datablob_len; in datablob_hmac_append() 516 ret = calc_hmac(digest, derived_key, sizeof derived_key, in datablob_hmac_append() 519 dump_hmac(NULL, digest, HASH_SIZE); in datablob_hmac_append() 530 u8 digest[HASH_SIZE]; in datablob_hmac_verify() local 546 ret = calc_hmac(digest, derived_key, sizeof derived_key, p, len); in datablob_hmac_verify() [all …]
|
/linux-4.4.14/security/integrity/ |
D | integrity.h | 69 u8 digest[SHA1_DIGEST_SIZE]; member 88 u8 digest[0]; member 135 const char *digest, int digestlen); 143 const char *digest, int digestlen) in integrity_digsig_verify() argument
|
D | digsig.c | 37 const char *digest, int digestlen) in integrity_digsig_verify() argument 57 digest, digestlen); in integrity_digsig_verify() 60 digest, digestlen); in integrity_digsig_verify()
|
D | digsig_asymmetric.c | 93 pks.digest = (u8 *)data; in asymmetric_verify()
|
/linux-4.4.14/drivers/block/drbd/ |
D | drbd_worker.c | 272 void drbd_csum_ee(struct crypto_hash *tfm, struct drbd_peer_request *peer_req, void *digest) in drbd_csum_ee() argument 296 crypto_hash_final(&desc, digest); in drbd_csum_ee() 299 void drbd_csum_bio(struct crypto_hash *tfm, struct bio *bio, void *digest) in drbd_csum_bio() argument 316 crypto_hash_final(&desc, digest); in drbd_csum_bio() 326 void *digest; in w_e_send_csum() local 336 digest = kmalloc(digest_size, GFP_NOIO); in w_e_send_csum() 337 if (digest) { in w_e_send_csum() 340 drbd_csum_ee(peer_device->connection->csums_tfm, peer_req, digest); in w_e_send_csum() 350 digest, digest_size, in w_e_send_csum() 352 kfree(digest); in w_e_send_csum() [all …]
|
D | drbd_int.h | 412 void *digest; member 427 struct digest_info *digest; member 1109 int size, void *digest, int digest_size,
|
D | drbd_main.c | 1396 void *digest, int digest_size, enum drbd_packet cmd) in drbd_send_drequest_csum() argument 1410 return drbd_send_command(peer_device, sock, cmd, sizeof(*p), digest, digest_size); in drbd_send_drequest_csum() 1686 unsigned char digest[64]; in drbd_send_dblock() local 1687 drbd_csum_bio(peer_device->connection->integrity_tfm, req->master_bio, digest); in drbd_send_dblock() 1688 if (memcmp(p + 1, digest, digest_size)) { in drbd_send_dblock()
|
D | drbd_receiver.c | 392 kfree(peer_req->digest); in __drbd_free_peer_req() 2605 di->digest = (((char *)di)+sizeof(struct digest_info)); in receive_DataRequest() 2607 peer_req->digest = di; in receive_DataRequest() 2610 if (drbd_recv_all(peer_device->connection, di->digest, pi->size)) in receive_DataRequest()
|
/linux-4.4.14/arch/arm/crypto/ |
D | ghash-ce-glue.c | 34 u64 digest[GHASH_DIGEST_SIZE/sizeof(u64)]; member 78 pmull_ghash_update(blocks, ctx->digest, src, key, in ghash_update() 99 pmull_ghash_update(1, ctx->digest, ctx->buf, key, NULL); in ghash_final() 102 put_unaligned_be64(ctx->digest[1], dst); in ghash_final() 103 put_unaligned_be64(ctx->digest[0], dst + 8); in ghash_final() 276 .digest = ghash_async_digest,
|
D | Kconfig | 12 tristate "SHA1 digest algorithm (ARM-asm)" 20 tristate "SHA1 digest algorithm (ARM NEON)" 31 tristate "SHA1 digest algorithm (ARM v8 Crypto Extensions)" 40 tristate "SHA-224/256 digest algorithm (ARM v8 Crypto Extensions)" 49 tristate "SHA-224/256 digest algorithm (ARM-asm and NEON)" 57 tristate "SHA-384/512 digest algorithm (ARM-asm and NEON)"
|
D | sha1_glue.c | 30 asmlinkage void sha1_block_data_order(u32 *digest,
|
D | sha256_neon_glue.c | 29 asmlinkage void sha256_block_data_order_neon(u32 *digest, const void *data,
|
D | sha256_glue.c | 33 asmlinkage void sha256_block_data_order(u32 *digest, const void *data,
|
/linux-4.4.14/include/linux/ |
D | digsig.h | 52 const char *digest, int digestlen); 57 int siglen, const char *digest, int digestlen) in digsig_verify() argument
|
D | cryptohash.h | 11 void sha_transform(__u32 *digest, const char *data, __u32 *W);
|
D | crypto.h | 527 int (*digest)(struct hash_desc *desc, struct scatterlist *sg, member 1787 return crypto_hash_crt(desc->tfm)->digest(desc, sg, nbytes, out); in crypto_hash_digest()
|
/linux-4.4.14/arch/cris/include/uapi/arch-v32/arch/ |
D | cryptocop.h | 70 cryptocop_digest_type digest; /* MD5, SHA1, none */ member 109 unsigned char digest[CRYPTOCOP_MAX_DIGEST_LENGTH]; member
|
/linux-4.4.14/Documentation/security/ |
D | IMA-templates.txt | 61 - 'd': the digest of the event (i.e. the digest of a measured file), 64 - 'd-ng': the digest of the event, calculated with an arbitrary hash 65 algorithm (field format: [<hash algo>:]digest, where the digest
|
/linux-4.4.14/drivers/md/ |
D | dm-era-target.c | 655 struct digest { struct 662 int (*step)(struct era_metadata *, struct digest *); argument 666 struct digest *d); 669 struct digest *d) in metadata_digest_remove_writeset() 688 struct digest *d) in metadata_digest_transcribe_writeset() 722 struct digest *d) in metadata_digest_lookup_writeset() 757 static int metadata_digest_start(struct era_metadata *md, struct digest *d) in metadata_digest_start() 1160 struct digest digest; member 1213 if (!era->digest.step) in process_old_eras() 1216 r = era->digest.step(era->md, &era->digest); in process_old_eras() [all …]
|
/linux-4.4.14/drivers/crypto/ux500/hash/ |
D | hash_core.c | 875 u8 digest[SHA256_DIGEST_SIZE]; in hash_dma_final() local 956 hash_get_digest(device_data, digest, ctx->config.algorithm); in hash_dma_final() 957 memcpy(req->result, digest, ctx->digestsize); in hash_dma_final() 981 u8 digest[SHA256_DIGEST_SIZE]; in hash_hw_final() local 1057 hash_get_digest(device_data, digest, ctx->config.algorithm); in hash_hw_final() 1058 memcpy(req->result, digest, ctx->digestsize); in hash_hw_final() 1274 u8 *digest, int algorithm) in hash_get_digest() argument 1291 __func__, (u32) digest); in hash_get_digest() 1296 digest[count * 4] = (u8) ((temp_hx_val >> 24) & 0xFF); in hash_get_digest() 1297 digest[count * 4 + 1] = (u8) ((temp_hx_val >> 16) & 0xFF); in hash_get_digest() [all …]
|
D | hash_alg.h | 388 u8 *digest, int algorithm);
|
/linux-4.4.14/include/scsi/ |
D | libiscsi_tcp.h | 44 unsigned char digest[ISCSI_DIGEST_SIZE]; member 124 unsigned char digest[ISCSI_DIGEST_SIZE]);
|
/linux-4.4.14/Documentation/device-mapper/ |
D | verity.txt | 5 block devices using a cryptographic digest provided by the kernel crypto API. 13 <algorithm> <digest> <salt> 24 The salt is prepended when hashing and each digest is 40 Each block corresponds to one digest on the hash device. 58 <digest> 110 selected cryptographic digest algorithm. The hashes are linearly-ordered in
|
/linux-4.4.14/drivers/crypto/qce/ |
D | sha.c | 57 memcpy(rctx->digest, result->auth_iv, digestsize); in qce_ahash_done() 137 memcpy(rctx->digest, std_iv, sizeof(rctx->digest)); in qce_ahash_init() 156 rctx->digest, digestsize); in qce_ahash_export() 163 rctx->digest, digestsize); in qce_ahash_export() 200 qce_cpu_to_be32p_array((__be32 *)rctx->digest, (const u8 *)state, in qce_import_common() 513 alg->digest = qce_ahash_digest; in qce_ahash_register_one()
|
D | sha.h | 52 u8 digest[QCE_SHA_MAX_DIGESTSIZE]; member
|
D | common.c | 274 memcpy(auth, rctx->digest, digestsize); in qce_setup_regs_ahash() 276 qce_cpu_to_be32p_array(auth, rctx->digest, digestsize); in qce_setup_regs_ahash()
|
/linux-4.4.14/include/crypto/ |
D | sha1_base.h | 98 __be32 *digest = (__be32 *)out; in sha1_base_finish() local 102 put_unaligned_be32(sctx->state[i], digest++); in sha1_base_finish()
|
D | sha256_base.h | 120 __be32 *digest = (__be32 *)out; in sha256_base_finish() local 124 put_unaligned_be32(sctx->state[i], digest++); in sha256_base_finish()
|
D | sha512_base.h | 123 __be64 *digest = (__be64 *)out; in sha512_base_finish() local 127 put_unaligned_be64(sctx->state[i], digest++); in sha512_base_finish()
|
D | hash.h | 133 int (*digest)(struct ahash_request *req); member 178 int (*digest)(struct shash_desc *desc, const u8 *data, member 200 int (*digest)(struct ahash_request *req); member
|
D | public_key.h | 95 u8 *digest; member
|
/linux-4.4.14/drivers/target/iscsi/ |
D | iscsi_target_auth.c | 179 unsigned char digest[MD5_SIGNATURE_SIZE]; in chap_server_compute_md5() local 196 memset(digest, 0, MD5_SIGNATURE_SIZE); in chap_server_compute_md5() 420 ret = crypto_hash_final(&desc, digest); in chap_server_compute_md5() 436 chap_binaryhex_to_asciihex(response, digest, MD5_SIGNATURE_SIZE); in chap_server_compute_md5()
|
D | iscsi_target.c | 4092 u32 checksum = 0, digest = 0; in iscsi_target_rx_thread() local 4139 iov.iov_base = &digest; in iscsi_target_rx_thread() 4152 if (digest != checksum) { in iscsi_target_rx_thread() 4155 digest, checksum); in iscsi_target_rx_thread()
|
/linux-4.4.14/net/sctp/ |
D | endpointola.c | 67 ep->digest = kzalloc(SCTP_SIGNATURE_SIZE, gfp); in sctp_endpoint_init() 68 if (!ep->digest) in sctp_endpoint_init() 176 kfree(ep->digest); in sctp_endpoint_init() 252 kfree(ep->digest); in sctp_endpoint_destroy()
|
D | auth.c | 716 __u8 *digest; in sctp_auth_calculate_hmac() local 750 digest = auth->auth_hdr.hmac; in sctp_auth_calculate_hmac() 754 crypto_hash_digest(&desc, &sg, sg.length, digest); in sctp_auth_calculate_hmac()
|
D | sm_make_chunk.c | 1699 __u8 *digest = ep->digest; in sctp_unpack_cookie() local 1740 memset(digest, 0x00, SCTP_SIGNATURE_SIZE); in sctp_unpack_cookie() 1743 crypto_hash_digest(&desc, &sg, bodysize, digest)) { in sctp_unpack_cookie() 1748 if (memcmp(digest, cookie->signature, SCTP_SIGNATURE_SIZE)) { in sctp_unpack_cookie()
|
D | sm_statefuns.c | 3999 __u8 *digest; in sctp_sf_authenticate() local 4035 digest = auth_hdr->hmac; in sctp_sf_authenticate() 4038 save_digest = kmemdup(digest, sig_len, GFP_ATOMIC); in sctp_sf_authenticate() 4042 memset(digest, 0, sig_len); in sctp_sf_authenticate() 4049 if (memcmp(save_digest, digest, sig_len)) { in sctp_sf_authenticate()
|
/linux-4.4.14/drivers/crypto/ |
D | atmel-sha.c | 85 u8 digest[SHA512_DIGEST_SIZE] __aligned(sizeof(u32)); 715 u32 *hash = (u32 *)ctx->digest; in atmel_sha_copy_hash() 743 memcpy(req->result, ctx->digest, SHA1_DIGEST_SIZE); in atmel_sha_copy_ready_hash() 745 memcpy(req->result, ctx->digest, SHA224_DIGEST_SIZE); in atmel_sha_copy_ready_hash() 747 memcpy(req->result, ctx->digest, SHA256_DIGEST_SIZE); in atmel_sha_copy_ready_hash() 749 memcpy(req->result, ctx->digest, SHA384_DIGEST_SIZE); in atmel_sha_copy_ready_hash() 751 memcpy(req->result, ctx->digest, SHA512_DIGEST_SIZE); in atmel_sha_copy_ready_hash() 998 .digest = atmel_sha_digest, 1019 .digest = atmel_sha_digest, 1042 .digest = atmel_sha_digest, [all …]
|
D | omap-sham.c | 145 u8 digest[SHA512_DIGEST_SIZE] OMAP_ALIGNED; member 283 u32 *hash = (u32 *)ctx->digest; in omap_sham_copy_hash_omap2() 322 u32 *in = (u32 *)ctx->digest; in omap_sham_copy_ready_hash() 1328 .digest = omap_sham_digest, 1351 .digest = omap_sham_digest, 1374 .digest = omap_sham_digest, 1399 .digest = omap_sham_digest, 1428 .digest = omap_sham_digest, 1450 .digest = omap_sham_digest, 1472 .digest = omap_sham_digest, [all …]
|
D | img-hash.c | 86 u8 digest[SHA256_DIGEST_SIZE] __aligned(sizeof(u32)); 276 memcpy(req->result, ctx->digest, ctx->digsize); in img_hash_finish() 284 u32 *hash = (u32 *)ctx->digest; in img_hash_copy_hash() 714 .digest = img_hash_digest, 737 .digest = img_hash_digest, 760 .digest = img_hash_digest, 783 .digest = img_hash_digest,
|
D | Kconfig | 80 tristate "SHA1 digest algorithm" 90 tristate "SHA256 digest algorithm" 100 tristate "SHA384 and SHA512 digest algorithm" 153 tristate "GHASH digest algorithm" 158 GHASH message digest algorithm for GCM (Galois/Counter Mode).
|
D | mxs-dcp.c | 836 .digest = dcp_sha_digest, 860 .digest = dcp_sha_digest,
|
D | mv_cesa.c | 983 .digest = mv_hash_digest, 1007 .digest = mv_hash_digest,
|
D | bfin_crc.c | 489 .digest = bfin_crypto_crc_digest,
|
D | sahara.c | 1259 .digest = sahara_sha_digest, 1286 .digest = sahara_sha_digest,
|
D | n2_core.c | 1439 ahash->digest = n2_hmac_async_digest; in __n2_register_one_hmac() 1485 ahash->digest = n2_hash_async_digest; in __n2_register_one_ahash()
|
D | talitos.c | 2767 t_alg->algt.alg.hash.digest = ahash_digest; in talitos_alg_alloc()
|
/linux-4.4.14/Documentation/DocBook/ |
D | crypto-API.xml.db | 67 API-crypto-hash-digest 81 API-crypto-ahash-digest 95 API-crypto-shash-digest
|
/linux-4.4.14/drivers/scsi/ |
D | libiscsi_tcp.c | 165 iscsi_tcp_segment_splice_digest(struct iscsi_segment *segment, void *digest) in iscsi_tcp_segment_splice_digest() argument 167 segment->data = digest; in iscsi_tcp_segment_splice_digest() 263 crypto_hash_final(segment->hash, segment->digest); in iscsi_tcp_segment_done() 265 recv ? segment->recv_digest : segment->digest); in iscsi_tcp_segment_done() 314 unsigned char digest[ISCSI_DIGEST_SIZE]) in iscsi_tcp_dgst_header() 319 crypto_hash_digest(hash, &sg, hdrlen, digest); in iscsi_tcp_dgst_header() 330 if (memcmp(segment->recv_digest, segment->digest, in iscsi_tcp_dgst_verify() 846 segment->digest); in iscsi_tcp_hdr_recv_done()
|
/linux-4.4.14/Documentation/scsi/ |
D | cxgb3i.txt | 12 - iSCSI PDU digest generation and verification 15 Data digest into the PDUs. 17 Data digest of the PDUs.
|
/linux-4.4.14/drivers/char/tpm/ |
D | tpm-sysfs.c | 91 u8 digest[TPM_DIGEST_SIZE]; in pcrs_show() local 104 rc = tpm_pcr_read_dev(chip, i, digest); in pcrs_show() 109 str += sprintf(str, "%02X ", digest[j]); in pcrs_show()
|
D | tpm2-cmd.c | 48 u8 digest[TPM_DIGEST_SIZE]; member 64 u8 digest[TPM_DIGEST_SIZE]; member 270 buf = cmd.params.pcrread_out.digest; in tpm2_pcr_read() 313 memcpy(cmd.params.pcrextend_in.digest, hash, TPM_DIGEST_SIZE); in tpm2_pcr_extend()
|
/linux-4.4.14/arch/x86/crypto/sha-mb/ |
D | sha_mb_mgr.h | 82 uint32_t digest[5][8]; member
|
D | sha1_mb.c | 105 inline void sha1_init_digest(uint32_t *digest) in sha1_init_digest() argument 109 memcpy(digest, initial_digest, sizeof(initial_digest)); in sha1_init_digest() 798 .digest = sha1_mb_async_digest,
|
D | sha1_mb_mgr_submit_avx2.S | 133 # Load digest words from result_digest
|
D | sha1_x8_avx2.S | 288 # 8 streams x 5 32bit words per digest x 4 bytes per word 293 # void sha1_x8_avx2(void **input_data, UINT128 *digest, UINT32 size)
|
/linux-4.4.14/drivers/staging/skein/ |
D | Kconfig | 2 tristate "Skein digest algorithm"
|
/linux-4.4.14/kernel/ |
D | kexec_file.c | 555 char *digest; in kexec_calculate_store_digests() local 588 digest = kzalloc(SHA256_DIGEST_SIZE, GFP_KERNEL); in kexec_calculate_store_digests() 589 if (!digest) { in kexec_calculate_store_digests() 635 ret = crypto_shash_final(desc, digest); in kexec_calculate_store_digests() 644 digest, SHA256_DIGEST_SIZE, 0); in kexec_calculate_store_digests() 650 kfree(digest); in kexec_calculate_store_digests()
|
/linux-4.4.14/Documentation/devicetree/bindings/crypto/ |
D | fsl-sec2.txt | 23 bit 3 = set if SEC has the message digest EU (MDEU/MDEU-A) 29 bit 11 = set if SEC has the message digest EU extended alg set (MDEU-B)
|
/linux-4.4.14/net/core/ |
D | flow_dissector.c | 647 void make_flow_keys_digest(struct flow_keys_digest *digest, in make_flow_keys_digest() argument 651 (struct _flow_keys_digest_data *)digest; in make_flow_keys_digest() 653 BUILD_BUG_ON(sizeof(*data) > sizeof(*digest)); in make_flow_keys_digest() 655 memset(digest, 0, sizeof(*digest)); in make_flow_keys_digest()
|
/linux-4.4.14/certs/ |
D | Makefile | 36 $(error Could not determine digest type to use from kernel config)
|
/linux-4.4.14/include/net/ |
D | flow_dissector.h | 177 void make_flow_keys_digest(struct flow_keys_digest *digest,
|
/linux-4.4.14/drivers/staging/lustre/lustre/libcfs/linux/ |
D | linux-crypto-adler.c | 120 .digest = adler32_digest,
|
/linux-4.4.14/security/keys/ |
D | trusted.c | 60 unsigned char *digest) in TSS_sha1() argument 71 ret = crypto_shash_digest(&sdesc->shash, data, datalen, digest); in TSS_sha1() 76 static int TSS_rawhmac(unsigned char *digest, const unsigned char *key, in TSS_rawhmac() argument 114 ret = crypto_shash_final(&sdesc->shash, digest); in TSS_rawhmac() 123 static int TSS_authhmac(unsigned char *digest, const unsigned char *key, in TSS_authhmac() argument 163 ret = TSS_rawhmac(digest, key, keylen, SHA1_DIGEST_SIZE, in TSS_authhmac()
|
/linux-4.4.14/drivers/crypto/sunxi-ss/ |
D | sun4i-ss-core.c | 37 .digest = sun4i_hash_digest, 65 .digest = sun4i_hash_digest,
|
/linux-4.4.14/arch/sparc/crypto/ |
D | crc32c_glue.c | 129 .digest = crc32c_sparc64_digest,
|
D | sha1_glue.c | 26 asmlinkage void sha1_sparc64_transform(u32 *digest, const char *data,
|
D | md5_glue.c | 29 asmlinkage void md5_sparc64_transform(u32 *digest, const char *data,
|
D | sha512_glue.c | 25 asmlinkage void sha512_sparc64_transform(u64 *digest, const char *data,
|
D | sha256_glue.c | 26 asmlinkage void sha256_sparc64_transform(u32 *digest, const char *data,
|
/linux-4.4.14/drivers/crypto/marvell/ |
D | hash.c | 900 .digest = mv_cesa_md5_digest, 963 .digest = mv_cesa_sha1_digest, 1026 .digest = mv_cesa_sha256_digest, 1261 .digest = mv_cesa_ahmac_md5_digest, 1331 .digest = mv_cesa_ahmac_sha1_digest, 1401 .digest = mv_cesa_ahmac_sha256_digest,
|
/linux-4.4.14/Documentation/crypto/ |
D | asymmetric-keys.txt | 97 digest algorithms used by those: 133 u8 *digest; 148 hash must be pointed to by sig->digest and the size of the hash be placed in
|
/linux-4.4.14/drivers/crypto/caam/ |
D | caamhash.c | 1628 .digest = ahash_digest, 1650 .digest = ahash_digest, 1672 .digest = ahash_digest, 1694 .digest = ahash_digest, 1716 .digest = ahash_digest, 1738 .digest = ahash_digest,
|
/linux-4.4.14/Documentation/filesystems/pohmelfs/ |
D | design_notes.txt | 67 (hmac or digest). It is also possible to use both or neither (default). Crypto configuration
|
/linux-4.4.14/drivers/crypto/ccp/ |
D | ccp-crypto-aes-cmac.c | 390 alg->digest = ccp_aes_cmac_digest; in ccp_register_aes_cmac_algs()
|
D | ccp-crypto-sha.c | 445 alg->digest = ccp_sha_digest; in ccp_register_sha_alg()
|
/linux-4.4.14/arch/cris/arch-v32/drivers/ |
D | cryptocop.c | 2917 …err = copy_to_user((unsigned char*)crp_oper + offsetof(struct strcop_crypto_op, digest), digest_re… in cryptocop_ioctl_process() 2997 (int)sop.digest, in cryptocop_ioctl_create_session() 3048 if (sop.digest != cryptocop_digest_none){ in cryptocop_ioctl_create_session() 3050 switch (sop.digest){ in cryptocop_ioctl_create_session() 3058 DEBUG_API(printk("create session, bad digest algorithm %d\n", sop.digest)); in cryptocop_ioctl_create_session()
|
/linux-4.4.14/drivers/net/wireless/ |
D | airo.c | 1297 static void emmh32_final(emmh32_context *context, u8 digest[4]); 1456 u8 digest[4]; in decapsulate() local 1512 emmh32_final(&context->seed, digest); in decapsulate() 1514 if (memcmp(digest, &mic->mic, 4)) { //Make sure the mics match in decapsulate() 1711 static void emmh32_final(emmh32_context *context, u8 digest[4]) in emmh32_final() 1738 digest[0] = (val>>24) & 0xFF; in emmh32_final() 1739 digest[1] = (val>>16) & 0xFF; in emmh32_final() 1740 digest[2] = (val>>8) & 0xFF; in emmh32_final() 1741 digest[3] = val & 0xFF; in emmh32_final()
|
/linux-4.4.14/include/net/sctp/ |
D | structs.h | 1227 __u8 *digest; member
|
/linux-4.4.14/net/ipv6/ |
D | addrconf.c | 2980 static __u32 digest[SHA_DIGEST_WORDS]; in ipv6_generate_stable_address() local 3009 sha_init(digest); in ipv6_generate_stable_address() 3018 sha_transform(digest, data.__data, workspace); in ipv6_generate_stable_address() 3021 temp.s6_addr32[2] = (__force __be32)digest[0]; in ipv6_generate_stable_address() 3022 temp.s6_addr32[3] = (__force __be32)digest[1]; in ipv6_generate_stable_address()
|