| /linux/fs/verity/ |
| H A D | measure.c | 45 if (get_user(arg.digest_size, &uarg->digest_size)) in fsverity_ioctl_measure() 47 if (arg.digest_size < hash_alg->digest_size) in fsverity_ioctl_measure() 52 arg.digest_size = hash_alg->digest_size; in fsverity_ioctl_measure() 57 if (copy_to_user(uarg->digest, vi->file_digest, hash_alg->digest_size)) in fsverity_ioctl_measure() 98 memcpy(raw_digest, vi->file_digest, hash_alg->digest_size); in fsverity_get_digest() 103 return hash_alg->digest_size; in fsverity_get_digest() 148 arg->digest_size = hash_alg->digest_size; in bpf_get_fsverity_digest() 153 memcpy(arg->digest, vi->file_digest, min_t(int, hash_alg->digest_size, out_digest_sz)); in bpf_get_fsverity_digest() 156 if (out_digest_sz > hash_alg->digest_size) in bpf_get_fsverity_digest() 157 memset(arg->digest + arg->digest_size, 0, out_digest_sz - hash_alg->digest_size); in bpf_get_fsverity_digest()
|
| H A D | signature.c | 86 d = kzalloc(sizeof(*d) + hash_alg->digest_size, GFP_KERNEL); in fsverity_verify_signature() 91 d->digest_size = cpu_to_le16(hash_alg->digest_size); in fsverity_verify_signature() 92 memcpy(d->digest, vi->file_digest, hash_alg->digest_size); in fsverity_verify_signature() 94 err = verify_pkcs7_signature(d, sizeof(*d) + hash_alg->digest_size, in fsverity_verify_signature()
|
| H A D | hash_algs.c | 14 .digest_size = SHA256_DIGEST_SIZE, 20 .digest_size = SHA512_DIGEST_SIZE, 174 BUG_ON(alg->digest_size > FS_VERITY_MAX_DIGEST_SIZE); in fsverity_check_hash_algs() 181 BUG_ON(!is_power_of_2(alg->digest_size)); in fsverity_check_hash_algs() 186 BUG_ON(alg->digest_size != hash_digest_size[alg->algo_id]); in fsverity_check_hash_algs()
|
| H A D | open.c | 49 params->digest_size = hash_alg->digest_size; in fsverity_init_merkle_tree_params() 87 if (WARN_ON_ONCE(!is_power_of_2(params->digest_size))) { in fsverity_init_merkle_tree_params() 91 if (params->block_size < 2 * params->digest_size) { in fsverity_init_merkle_tree_params() 98 params->log_digestsize = ilog2(params->digest_size); in fsverity_init_merkle_tree_params() 200 memcpy(vi->root_hash, desc->root_hash, vi->tree_params.digest_size); in fsverity_create_info()
|
| H A D | enable.c | 39 next->filled += params->digest_size; in hash_one_block() 83 memset(root_hash, 0, params->digest_size); in build_merkle_tree() 128 if (buffers[level].filled + params->digest_size <= in build_merkle_tree() 167 if (WARN_ON_ONCE(buffers[num_levels].filled != params->digest_size)) { in build_merkle_tree()
|
| H A D | fsverity_private.h | 24 unsigned int digest_size; /* digest size in bytes, e.g. 32 for SHA-256 */ member 43 unsigned int digest_size; /* same as hash_alg->digest_size */ member
|
| /linux/drivers/target/iscsi/ |
| H A D | iscsi_target_auth.c | 162 chap->digest_size = MD5_SIGNATURE_SIZE; in chap_server_open() 165 chap->digest_size = SHA1_SIGNATURE_SIZE; in chap_server_open() 168 chap->digest_size = SHA256_SIGNATURE_SIZE; in chap_server_open() 171 chap->digest_size = SHA3_256_SIGNATURE_SIZE; in chap_server_open() 183 chap->challenge_len = chap->digest_size; in chap_server_open() 263 digest = kzalloc(chap->digest_size, GFP_KERNEL); in chap_server_compute_hash() 269 response = kzalloc(chap->digest_size * 2 + 2, GFP_KERNEL); in chap_server_compute_hash() 275 client_digest = kzalloc(chap->digest_size, GFP_KERNEL); in chap_server_compute_hash() 281 server_digest = kzalloc(chap->digest_size, GFP_KERNEL); in chap_server_compute_hash() 333 if (strlen(chap_r) != chap->digest_size * 2) { in chap_server_compute_hash() [all …]
|
| H A D | iscsi_target_auth.h | 40 unsigned int digest_size; member
|
| /linux/drivers/md/ |
| H A D | dm-verity-loadpin.c | 19 unsigned int digest_size; in is_trusted_verity_target() local 33 if (dm_verity_get_root_digest(ti, &root_digest, &digest_size)) in is_trusted_verity_target() 37 if ((trd->len == digest_size) && in is_trusted_verity_target() 38 !memcmp(trd->data, root_digest, digest_size)) { in is_trusted_verity_target()
|
| H A D | dm-verity-target.c | 167 *offset = idx * v->digest_size; in verity_hash_at_level() 301 v->digest_size) == 0)) in verity_verify_level() 328 memcpy(want_digest, data, v->digest_size); in verity_verify_level() 358 memcpy(digest, v->root_digest, v->digest_size); in verity_hash_for_block() 367 *is_zero = !memcmp(v->zero_digest, digest, v->digest_size); in verity_hash_for_block() 404 if (memcmp(io->tmp_digest, want_digest, v->digest_size)) { in verity_recheck() 493 v->digest_size) == 0)) { in verity_verify_pending_blocks() 867 for (x = 0; x < v->digest_size; x++) in verity_status() 942 for (x = 0; x < v->digest_size; x++) in verity_status() 1144 v->zero_digest = kmalloc(v->digest_size, GFP_KERNEL); in verity_alloc_zero_digest() [all …]
|
| H A D | dm-verity.h | 68 unsigned int digest_size; /* digest size for the current hash algorithm */ member 143 unsigned int *digest_size);
|
| /linux/security/integrity/ima/ |
| H A D | ima_modsig.c | 25 u32 digest_size; member 116 &modsig->digest_size, &modsig->hash_algo); in ima_collect_modsig() 126 const u8 **digest, u32 *digest_size) in ima_get_modsig_digest() argument 130 *digest_size = modsig->digest_size; in ima_get_modsig_digest()
|
| /linux/include/crypto/ |
| H A D | sha3.h | 61 u8 digest_size; /* Digests only: the digest size in bytes */ member 119 .ctx.digest_size = SHA3_224_DIGEST_SIZE, in sha3_224_init() 135 .ctx.digest_size = SHA3_256_DIGEST_SIZE, in sha3_256_init() 151 .ctx.digest_size = SHA3_384_DIGEST_SIZE, in sha3_384_init() 167 .ctx.digest_size = SHA3_512_DIGEST_SIZE, in sha3_512_init()
|
| /linux/drivers/char/tpm/ |
| H A D | tpm2-cmd.c | 104 __be16 digest_size; member 125 u16 digest_size; in tpm2_pcr_read() local 139 expected_digest_size = chip->allocated_banks[i].digest_size; in tpm2_pcr_read() 159 digest_size = be16_to_cpu(out->digest_size); in tpm2_pcr_read() 160 if (digest_size > sizeof(digest->digest) || in tpm2_pcr_read() 161 (!digest_size_ptr && digest_size != expected_digest_size)) { in tpm2_pcr_read() 167 *digest_size_ptr = digest_size; in tpm2_pcr_read() 169 memcpy(digest->digest, out->digest, digest_size); in tpm2_pcr_read() 221 chip->allocated_banks[i].digest_size); in tpm2_pcr_extend() 534 bank->digest_size = hash_digest_size[crypto_algo]; in tpm2_init_bank_info() [all …]
|
| H A D | tpm-sysfs.c | 374 int digest_size = 0; in pcr_value_show() local 380 digest_size = chip->allocated_banks[i].digest_size; in pcr_value_show() 382 if (!digest_size) in pcr_value_show() 389 for (i = 0; i < digest_size; i++) in pcr_value_show()
|
| /linux/drivers/crypto/ccp/ |
| H A D | ccp-crypto-sha.c | 32 unsigned int digest_size = crypto_ahash_digestsize(tfm); in ccp_sha_complete() local 50 memcpy(req->result, rctx->ctx, digest_size); in ccp_sha_complete() 278 unsigned int digest_size = crypto_shash_digestsize(shash); in ccp_sha_setkey() local 296 key_len = digest_size; in ccp_sha_setkey() 364 u32 digest_size; member 374 .digest_size = SHA1_DIGEST_SIZE, 382 .digest_size = SHA224_DIGEST_SIZE, 390 .digest_size = SHA256_DIGEST_SIZE, 398 .digest_size = SHA384_DIGEST_SIZE, 406 .digest_size = SHA512_DIGEST_SIZE, [all …]
|
| /linux/lib/crypto/ |
| H A D | sha512.c | 198 u8 *out, size_t digest_size) in __sha512_final() argument 215 for (size_t i = 0; i < digest_size; i += 8) in __sha512_final() 331 u8 *out, size_t digest_size) in __hmac_sha512_final() argument 334 __sha512_final(&ctx->sha_ctx, ctx->sha_ctx.buf, digest_size); in __hmac_sha512_final() 335 memset(&ctx->sha_ctx.buf[digest_size], 0, in __hmac_sha512_final() 336 SHA512_BLOCK_SIZE - digest_size); in __hmac_sha512_final() 337 ctx->sha_ctx.buf[digest_size] = 0x80; in __hmac_sha512_final() 339 cpu_to_be32(8 * (SHA512_BLOCK_SIZE + digest_size)); in __hmac_sha512_final() 343 for (size_t i = 0; i < digest_size; i += 8) in __hmac_sha512_final()
|
| H A D | sha256.c | 219 u8 *out, size_t digest_size) in __sha256_final() argument 234 for (size_t i = 0; i < digest_size; i += 4) in __sha256_final() 404 u8 *out, size_t digest_size) in __hmac_sha256_final() argument 407 __sha256_final(&ctx->sha_ctx, ctx->sha_ctx.buf, digest_size); in __hmac_sha256_final() 408 memset(&ctx->sha_ctx.buf[digest_size], 0, in __hmac_sha256_final() 409 SHA256_BLOCK_SIZE - digest_size); in __hmac_sha256_final() 410 ctx->sha_ctx.buf[digest_size] = 0x80; in __hmac_sha256_final() 412 cpu_to_be32(8 * (SHA256_BLOCK_SIZE + digest_size)); in __hmac_sha256_final() 416 for (size_t i = 0; i < digest_size; i += 4) in __hmac_sha256_final()
|
| /linux/crypto/asymmetric_keys/ |
| H A D | verify_pefile.c | 327 size_t digest_size, desc_size; in pefile_digest_pe() local 341 digest_size = crypto_shash_digestsize(tfm); in pefile_digest_pe() 343 if (digest_size != ctx->digest_len) { in pefile_digest_pe() 345 digest_size, ctx->digest_len); in pefile_digest_pe() 349 pr_debug("Digest: desc=%zu size=%zu\n", desc_size, digest_size); in pefile_digest_pe() 352 desc = kzalloc(desc_size + digest_size, GFP_KERNEL); in pefile_digest_pe()
|
| H A D | x509_public_key.c | 53 sig->digest_size = crypto_shash_digestsize(tfm); in x509_get_sig_params() 56 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL); in x509_get_sig_params() 72 ret = is_hash_blacklisted(sig->digest, sig->digest_size, in x509_get_sig_params() 76 sig->digest_size, sig->digest); in x509_get_sig_params()
|
| /linux/drivers/block/drbd/ |
| H A D | drbd_worker.c | 343 int digest_size; in w_e_send_csum() local 353 digest_size = crypto_shash_digestsize(peer_device->connection->csums_tfm); in w_e_send_csum() 354 digest = kmalloc(digest_size, GFP_NOIO); in w_e_send_csum() 368 digest, digest_size, in w_e_send_csum() 1155 int digest_size; in w_e_end_csum_rs_req() local 1176 digest_size = crypto_shash_digestsize(peer_device->connection->csums_tfm); in w_e_end_csum_rs_req() 1177 D_ASSERT(device, digest_size == di->digest_size); in w_e_end_csum_rs_req() 1178 digest = kmalloc(digest_size, GFP_NOIO); in w_e_end_csum_rs_req() 1182 eq = !memcmp(digest, di->digest, digest_size); in w_e_end_csum_rs_req() 1219 int digest_size; in w_e_end_ov_req() local [all …]
|
| /linux/include/uapi/linux/ |
| H A D | fsverity.h | 33 __u16 digest_size; /* input/output */ member 82 __le16 digest_size; member
|
| /linux/fs/fuse/ |
| H A D | ioctl.c | 126 __u16 digest_size; in fuse_setup_measure_verity() local 129 if (copy_from_user(&digest_size, &uarg->digest_size, sizeof(digest_size))) in fuse_setup_measure_verity() 132 if (digest_size > SIZE_MAX - sizeof(struct fsverity_digest)) in fuse_setup_measure_verity() 135 iov->iov_len = sizeof(struct fsverity_digest) + digest_size; in fuse_setup_measure_verity()
|
| /linux/crypto/ |
| H A D | blake2b.c | 64 #define BLAKE2B_ALG(name, digest_size) \ argument 73 .digestsize = digest_size, \
|
| /linux/drivers/crypto/qce/ |
| H A D | common.h | 96 const u32 digest_size; member
|