| /linux/drivers/target/iscsi/ |
| H A D | iscsi_target_auth.c | 163 chap->digest_size = MD5_SIGNATURE_SIZE; in chap_server_open() 166 chap->digest_size = SHA1_SIGNATURE_SIZE; in chap_server_open() 169 chap->digest_size = SHA256_SIGNATURE_SIZE; in chap_server_open() 172 chap->digest_size = SHA3_256_SIGNATURE_SIZE; in chap_server_open() 184 chap->challenge_len = chap->digest_size; in chap_server_open() 264 digest = kzalloc(chap->digest_size, GFP_KERNEL); in chap_server_compute_hash() 270 response = kzalloc(chap->digest_size * 2 + 2, GFP_KERNEL); in chap_server_compute_hash() 276 client_digest = kzalloc(chap->digest_size, GFP_KERNEL); in chap_server_compute_hash() 282 server_digest = kzalloc(chap->digest_size, GFP_KERNEL); in chap_server_compute_hash() 334 if (strlen(chap_r) != chap->digest_size * 2) { in chap_server_compute_hash() [all …]
|
| H A D | iscsi_target_auth.h | 40 unsigned int digest_size; member
|
| /linux/fs/verity/ |
| H A D | signature.c | 86 d = kzalloc(sizeof(*d) + hash_alg->digest_size, GFP_KERNEL); in fsverity_verify_signature() 91 d->digest_size = cpu_to_le16(hash_alg->digest_size); in fsverity_verify_signature() 92 memcpy(d->digest, vi->file_digest, hash_alg->digest_size); in fsverity_verify_signature() 94 err = verify_pkcs7_signature(d, sizeof(*d) + hash_alg->digest_size, in fsverity_verify_signature()
|
| H A D | hash_algs.c | 14 .digest_size = SHA256_DIGEST_SIZE, 20 .digest_size = SHA512_DIGEST_SIZE, 174 BUG_ON(alg->digest_size > FS_VERITY_MAX_DIGEST_SIZE); in fsverity_check_hash_algs() 181 BUG_ON(!is_power_of_2(alg->digest_size)); in fsverity_check_hash_algs() 186 BUG_ON(alg->digest_size != hash_digest_size[alg->algo_id]); in fsverity_check_hash_algs()
|
| /linux/drivers/md/ |
| H A D | dm-verity-loadpin.c | 19 unsigned int digest_size; in is_trusted_verity_target() local 33 if (dm_verity_get_root_digest(ti, &root_digest, &digest_size)) in is_trusted_verity_target() 37 if ((trd->len == digest_size) && in is_trusted_verity_target() 38 !memcmp(trd->data, root_digest, digest_size)) { in is_trusted_verity_target()
|
| H A D | dm-verity-target.c | 168 *offset = idx * v->digest_size; in verity_hash_at_level() 302 v->digest_size) == 0)) in verity_verify_level() 329 memcpy(want_digest, data, v->digest_size); in verity_verify_level() 359 memcpy(digest, v->root_digest, v->digest_size); in verity_hash_for_block() 368 *is_zero = !memcmp(v->zero_digest, digest, v->digest_size); in verity_hash_for_block() 405 if (memcmp(io->tmp_digest, want_digest, v->digest_size)) { in verity_recheck() 492 v->digest_size) == 0)) { in verity_verify_pending_blocks() 865 for (x = 0; x < v->digest_size; x++) in verity_status() 940 for (x = 0; x < v->digest_size; x++) in verity_status() 1142 v->zero_digest = kmalloc(v->digest_size, GFP_KERNEL); in verity_alloc_zero_digest() [all …]
|
| /linux/security/integrity/ima/ |
| H A D | ima_modsig.c | 25 u32 digest_size; member 116 &modsig->digest_size, &modsig->hash_algo); in ima_collect_modsig() 126 const u8 **digest, u32 *digest_size) in ima_get_modsig_digest() argument 130 *digest_size = modsig->digest_size; in ima_get_modsig_digest()
|
| H A D | ima_queue.c | 265 u16 digest_size; in ima_init_digests() local 279 digest_size = ima_tpm_chip->allocated_banks[i].digest_size; in ima_init_digests() 284 digest_size = SHA1_DIGEST_SIZE; in ima_init_digests() 286 memset(digests[i].digest, 0xff, digest_size); in ima_init_digests()
|
| /linux/include/crypto/ |
| H A D | sha3.h | 61 u8 digest_size; /* Digests only: the digest size in bytes */ member 119 .ctx.digest_size = SHA3_224_DIGEST_SIZE, in sha3_224_init() 135 .ctx.digest_size = SHA3_256_DIGEST_SIZE, in sha3_256_init() 151 .ctx.digest_size = SHA3_384_DIGEST_SIZE, in sha3_384_init() 167 .ctx.digest_size = SHA3_512_DIGEST_SIZE, in sha3_512_init()
|
| /linux/drivers/char/tpm/ |
| H A D | tpm2-cmd.c | 104 __be16 digest_size; member 125 u16 digest_size; in tpm2_pcr_read() local 139 expected_digest_size = chip->allocated_banks[i].digest_size; in tpm2_pcr_read() 159 digest_size = be16_to_cpu(out->digest_size); in tpm2_pcr_read() 160 if (digest_size > sizeof(digest->digest) || in tpm2_pcr_read() 161 (!digest_size_ptr && digest_size != expected_digest_size)) { in tpm2_pcr_read() 167 *digest_size_ptr = digest_size; in tpm2_pcr_read() 169 memcpy(digest->digest, out->digest, digest_size); in tpm2_pcr_read() 221 chip->allocated_banks[i].digest_size); in tpm2_pcr_extend() 534 bank->digest_size = hash_digest_size[crypto_algo]; in tpm2_init_bank_info() [all …]
|
| H A D | tpm-sysfs.c | 374 int digest_size = 0; in pcr_value_show() local 380 digest_size = chip->allocated_banks[i].digest_size; in pcr_value_show() 382 if (!digest_size) in pcr_value_show() 389 for (i = 0; i < digest_size; i++) in pcr_value_show()
|
| /linux/drivers/crypto/ccp/ |
| H A D | ccp-crypto-sha.c | 32 unsigned int digest_size = crypto_ahash_digestsize(tfm); in ccp_sha_complete() local 50 memcpy(req->result, rctx->ctx, digest_size); in ccp_sha_complete() 278 unsigned int digest_size = crypto_shash_digestsize(shash); in ccp_sha_setkey() local 296 key_len = digest_size; in ccp_sha_setkey() 364 u32 digest_size; member 374 .digest_size = SHA1_DIGEST_SIZE, 382 .digest_size = SHA224_DIGEST_SIZE, 390 .digest_size = SHA256_DIGEST_SIZE, 398 .digest_size = SHA384_DIGEST_SIZE, 406 .digest_size = SHA512_DIGEST_SIZE, [all …]
|
| H A D | ccp-ops.c | 1506 unsigned int digest_size; in ccp_run_sha_cmd() local 1601 digest_size = SHA1_DIGEST_SIZE; in ccp_run_sha_cmd() 1611 digest_size = SHA224_DIGEST_SIZE; in ccp_run_sha_cmd() 1622 digest_size = SHA256_DIGEST_SIZE; in ccp_run_sha_cmd() 1629 digest_size = SHA384_DIGEST_SIZE; in ccp_run_sha_cmd() 1637 digest_size = SHA512_DIGEST_SIZE; in ccp_run_sha_cmd() 1750 digest_size); in ccp_run_sha_cmd() 1782 hmac_buf = kmalloc(block_size + digest_size, GFP_KERNEL); in ccp_run_sha_cmd() 1787 sg_init_one(&sg, hmac_buf, block_size + digest_size); in ccp_run_sha_cmd() 1796 digest_size); in ccp_run_sha_cmd() [all …]
|
| /linux/lib/crypto/ |
| H A D | sha512.c | 198 u8 *out, size_t digest_size) in __sha512_final() argument 215 for (size_t i = 0; i < digest_size; i += 8) in __sha512_final() 331 u8 *out, size_t digest_size) in __hmac_sha512_final() argument 334 __sha512_final(&ctx->sha_ctx, ctx->sha_ctx.buf, digest_size); in __hmac_sha512_final() 335 memset(&ctx->sha_ctx.buf[digest_size], 0, in __hmac_sha512_final() 336 SHA512_BLOCK_SIZE - digest_size); in __hmac_sha512_final() 337 ctx->sha_ctx.buf[digest_size] = 0x80; in __hmac_sha512_final() 339 cpu_to_be32(8 * (SHA512_BLOCK_SIZE + digest_size)); in __hmac_sha512_final() 343 for (size_t i = 0; i < digest_size; i += 8) in __hmac_sha512_final()
|
| H A D | sha256.c | 219 u8 *out, size_t digest_size) in __sha256_final() argument 234 for (size_t i = 0; i < digest_size; i += 4) in __sha256_final() 404 u8 *out, size_t digest_size) in __hmac_sha256_final() argument 407 __sha256_final(&ctx->sha_ctx, ctx->sha_ctx.buf, digest_size); in __hmac_sha256_final() 408 memset(&ctx->sha_ctx.buf[digest_size], 0, in __hmac_sha256_final() 409 SHA256_BLOCK_SIZE - digest_size); in __hmac_sha256_final() 410 ctx->sha_ctx.buf[digest_size] = 0x80; in __hmac_sha256_final() 412 cpu_to_be32(8 * (SHA256_BLOCK_SIZE + digest_size)); in __hmac_sha256_final() 416 for (size_t i = 0; i < digest_size; i += 4) in __hmac_sha256_final()
|
| /linux/crypto/asymmetric_keys/ |
| H A D | verify_pefile.c | 327 size_t digest_size, desc_size; in pefile_digest_pe() local 341 digest_size = crypto_shash_digestsize(tfm); in pefile_digest_pe() 343 if (digest_size != ctx->digest_len) { in pefile_digest_pe() 345 digest_size, ctx->digest_len); in pefile_digest_pe() 349 pr_debug("Digest: desc=%zu size=%zu\n", desc_size, digest_size); in pefile_digest_pe() 352 desc = kzalloc(desc_size + digest_size, GFP_KERNEL); in pefile_digest_pe()
|
| /linux/drivers/block/drbd/ |
| H A D | drbd_worker.c | 343 int digest_size; in w_e_send_csum() local 353 digest_size = crypto_shash_digestsize(peer_device->connection->csums_tfm); in w_e_send_csum() 354 digest = kmalloc(digest_size, GFP_NOIO); in w_e_send_csum() 368 digest, digest_size, in w_e_send_csum() 1155 int digest_size; in w_e_end_csum_rs_req() local 1176 digest_size = crypto_shash_digestsize(peer_device->connection->csums_tfm); in w_e_end_csum_rs_req() 1177 D_ASSERT(device, digest_size == di->digest_size); in w_e_end_csum_rs_req() 1178 digest = kmalloc(digest_size, GFP_NOIO); in w_e_end_csum_rs_req() 1182 eq = !memcmp(digest, di->digest, digest_size); in w_e_end_csum_rs_req() 1219 int digest_size; in w_e_end_ov_req() local [all …]
|
| H A D | drbd_main.c | 1411 void *digest, int digest_size, enum drbd_packet cmd) in drbd_send_drequest_csum() argument 1425 return drbd_send_command(peer_device, sock, cmd, sizeof(*p), digest, digest_size); in drbd_send_drequest_csum() 1654 int digest_size; in drbd_send_dblock() local 1659 digest_size = peer_device->connection->integrity_tfm ? in drbd_send_dblock() 1693 if (digest_size) in drbd_send_dblock() 1696 sizeof(*p) + digest_size, NULL, req->i.size); in drbd_send_dblock() 1709 if (!(req->rq_state & (RQ_EXP_RECEIVE_ACK | RQ_EXP_WRITE_ACK)) || digest_size) in drbd_send_dblock() 1715 if (digest_size > 0 && digest_size <= 64) { in drbd_send_dblock() 1720 if (memcmp(p + 1, digest, digest_size)) { in drbd_send_dblock() 1746 int digest_size; in drbd_send_block() local [all …]
|
| /linux/include/uapi/linux/ |
| H A D | fsverity.h | 33 __u16 digest_size; /* input/output */ member 82 __le16 digest_size; member
|
| /linux/fs/fuse/ |
| H A D | ioctl.c | 126 __u16 digest_size; in fuse_setup_measure_verity() local 129 if (copy_from_user(&digest_size, &uarg->digest_size, sizeof(digest_size))) in fuse_setup_measure_verity() 132 if (digest_size > SIZE_MAX - sizeof(struct fsverity_digest)) in fuse_setup_measure_verity() 135 iov->iov_len = sizeof(struct fsverity_digest) + digest_size; in fuse_setup_measure_verity()
|
| /linux/crypto/ |
| H A D | blake2b.c | 64 #define BLAKE2B_ALG(name, digest_size) \ argument 73 .digestsize = digest_size, \
|
| /linux/fs/overlayfs/ |
| H A D | util.c | 1399 int xattr_digest_size, digest_size; in ovl_validate_verity() local 1430 digest_size = fsverity_get_digest(d_inode(datapath->dentry), actual_digest, in ovl_validate_verity() 1432 if (digest_size == 0) { in ovl_validate_verity() 1437 if (xattr_digest_size != digest_size || in ovl_validate_verity() 1451 int err, digest_size; in ovl_get_verity_digest() local 1463 digest_size = fsverity_get_digest(d_inode(src->dentry), in ovl_get_verity_digest() 1465 if (digest_size == 0 || in ovl_get_verity_digest() 1466 WARN_ON_ONCE(digest_size > FS_VERITY_MAX_DIGEST_SIZE)) { in ovl_get_verity_digest() 1475 metacopy->len += digest_size; in ovl_get_verity_digest()
|
| /linux/drivers/crypto/qce/ |
| H A D | common.h | 96 const u32 digest_size; member
|
| /linux/security/integrity/ |
| H A D | digsig_asymmetric.c | |
| /linux/tools/testing/selftests/bpf/prog_tests/ |
| H A D | fs_kfuncs.c | 247 d->digest_size = SHA256_DIGEST_SIZE;
|