| /linux/fs/verity/ |
| A D | measure.c | 44 if (get_user(arg.digest_size, &uarg->digest_size)) in fsverity_ioctl_measure() 46 if (arg.digest_size < hash_alg->digest_size) in fsverity_ioctl_measure() 51 arg.digest_size = hash_alg->digest_size; in fsverity_ioctl_measure() 56 if (copy_to_user(uarg->digest, vi->file_digest, hash_alg->digest_size)) in fsverity_ioctl_measure() 97 memcpy(raw_digest, vi->file_digest, hash_alg->digest_size); in fsverity_get_digest() 102 return hash_alg->digest_size; in fsverity_get_digest() 147 arg->digest_size = hash_alg->digest_size; in bpf_get_fsverity_digest() 152 memcpy(arg->digest, vi->file_digest, min_t(int, hash_alg->digest_size, out_digest_sz)); in bpf_get_fsverity_digest() 155 if (out_digest_sz > hash_alg->digest_size) in bpf_get_fsverity_digest() 156 memset(arg->digest + arg->digest_size, 0, out_digest_sz - hash_alg->digest_size); in bpf_get_fsverity_digest()
|
| A D | signature.c | 86 d = kzalloc(sizeof(*d) + hash_alg->digest_size, GFP_KERNEL); in fsverity_verify_signature() 91 d->digest_size = cpu_to_le16(hash_alg->digest_size); in fsverity_verify_signature() 92 memcpy(d->digest, vi->file_digest, hash_alg->digest_size); in fsverity_verify_signature() 94 err = verify_pkcs7_signature(d, sizeof(*d) + hash_alg->digest_size, in fsverity_verify_signature()
|
| A D | hash_algs.c | 16 .digest_size = SHA256_DIGEST_SIZE, 22 .digest_size = SHA512_DIGEST_SIZE, 82 if (WARN_ON_ONCE(alg->digest_size != crypto_shash_digestsize(tfm))) in fsverity_get_hash_alg() 237 BUG_ON(alg->digest_size > FS_VERITY_MAX_DIGEST_SIZE); in fsverity_check_hash_algs() 244 BUG_ON(!is_power_of_2(alg->digest_size)); in fsverity_check_hash_algs() 249 BUG_ON(alg->digest_size != hash_digest_size[alg->algo_id]); in fsverity_check_hash_algs()
|
| A D | open.c | 48 params->digest_size = hash_alg->digest_size; in fsverity_init_merkle_tree_params() 86 if (WARN_ON_ONCE(!is_power_of_2(params->digest_size))) { in fsverity_init_merkle_tree_params() 90 if (params->block_size < 2 * params->digest_size) { in fsverity_init_merkle_tree_params() 97 params->log_digestsize = ilog2(params->digest_size); in fsverity_init_merkle_tree_params() 202 memcpy(vi->root_hash, desc->root_hash, vi->tree_params.digest_size); in fsverity_create_info()
|
| A D | fsverity_private.h | 25 unsigned int digest_size; /* digest size in bytes, e.g. 32 for SHA-256 */ member 38 unsigned int digest_size; /* same as hash_alg->digest_size */ member
|
| A D | enable.c | 44 next->filled += params->digest_size; in hash_one_block() 88 memset(root_hash, 0, params->digest_size); in build_merkle_tree() 133 if (buffers[level].filled + params->digest_size <= in build_merkle_tree() 172 if (WARN_ON_ONCE(buffers[num_levels].filled != params->digest_size)) { in build_merkle_tree()
|
| /linux/drivers/target/iscsi/ |
| A D | iscsi_target_auth.c | 162 chap->digest_size = MD5_SIGNATURE_SIZE; in chap_server_open() 165 chap->digest_size = SHA1_SIGNATURE_SIZE; in chap_server_open() 168 chap->digest_size = SHA256_SIGNATURE_SIZE; in chap_server_open() 171 chap->digest_size = SHA3_256_SIGNATURE_SIZE; in chap_server_open() 183 chap->challenge_len = chap->digest_size; in chap_server_open() 263 digest = kzalloc(chap->digest_size, GFP_KERNEL); in chap_server_compute_hash() 275 client_digest = kzalloc(chap->digest_size, GFP_KERNEL); in chap_server_compute_hash() 333 if (strlen(chap_r) != chap->digest_size * 2) { in chap_server_compute_hash() 344 chap->digest_size) { in chap_server_compute_hash() 397 bin2hex(response, server_digest, chap->digest_size); in chap_server_compute_hash() [all …]
|
| /linux/arch/arm64/crypto/ |
| A D | sha3-ce-glue.c | 38 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); in sha3_update() local 51 sha3_ce_transform(sctx->st, sctx->buf, 1, digest_size); in sha3_update() 67 digest_size); in sha3_update() 84 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); in sha3_final() local 96 sha3_ce_transform(sctx->st, sctx->buf, 1, digest_size); in sha3_final() 99 for (i = 0; i < digest_size / 8; i++) in sha3_final() 102 if (digest_size & 4) in sha3_final()
|
| /linux/drivers/md/ |
| A D | dm-verity-loadpin.c | 19 unsigned int digest_size; in is_trusted_verity_target() local 33 if (dm_verity_get_root_digest(ti, &root_digest, &digest_size)) in is_trusted_verity_target() 37 if ((trd->len == digest_size) && in is_trusted_verity_target() 38 !memcmp(trd->data, root_digest, digest_size)) { in is_trusted_verity_target()
|
| A D | dm-verity-target.c | 226 *offset = idx * v->digest_size; in verity_hash_at_level() 344 v->digest_size) == 0)) in verity_verify_level() 370 memcpy(want_digest, data, v->digest_size); in verity_verify_level() 400 memcpy(digest, v->root_digest, v->digest_size); in verity_hash_for_block() 825 for (x = 0; x < v->digest_size; x++) in verity_status() 900 for (x = 0; x < v->digest_size; x++) in verity_status() 1313 v->digest_size = crypto_shash_digestsize(shash); in verity_setup_hash_alg() 1320 v->digest_size = crypto_ahash_digestsize(ahash); in verity_setup_hash_alg() 1509 if (strlen(argv[8]) != v->digest_size * 2 || in verity_ctr() 1685 *digest_size = v->digest_size; in dm_verity_get_root_digest() [all …]
|
| A D | dm-verity.h | 64 unsigned int digest_size; /* digest size for the current hash algorithm */ member 138 unsigned int *digest_size);
|
| /linux/security/integrity/ima/ |
| A D | ima_modsig.c | 25 u32 digest_size; member 116 &modsig->digest_size, &modsig->hash_algo); in ima_collect_modsig() 126 const u8 **digest, u32 *digest_size) in ima_get_modsig_digest() argument 130 *digest_size = modsig->digest_size; in ima_get_modsig_digest()
|
| A D | ima_queue.c | 216 u16 digest_size; in ima_init_digests() local 230 digest_size = ima_tpm_chip->allocated_banks[i].digest_size; in ima_init_digests() 235 digest_size = SHA1_DIGEST_SIZE; in ima_init_digests() 237 memset(digests[i].digest, 0xff, digest_size); in ima_init_digests()
|
| /linux/include/crypto/ |
| A D | sha256_base.h | 115 unsigned int digest_size) in lib_sha256_base_finish() argument 120 for (i = 0; digest_size > 0; i++, digest_size -= sizeof(__be32)) in lib_sha256_base_finish() 129 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); in sha256_base_finish() local 132 return lib_sha256_base_finish(sctx, out, digest_size); in sha256_base_finish()
|
| A D | sha512_base.h | 122 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); in sha512_base_finish() local 127 for (i = 0; digest_size > 0; i++, digest_size -= sizeof(__be64)) in sha512_base_finish()
|
| /linux/drivers/char/tpm/ |
| A D | tpm2-cmd.c | 152 __be16 digest_size; member 173 u16 digest_size; in tpm2_pcr_read() local 187 expected_digest_size = chip->allocated_banks[i].digest_size; in tpm2_pcr_read() 207 digest_size = be16_to_cpu(out->digest_size); in tpm2_pcr_read() 208 if (digest_size > sizeof(digest->digest) || in tpm2_pcr_read() 209 (!digest_size_ptr && digest_size != expected_digest_size)) { in tpm2_pcr_read() 215 *digest_size_ptr = digest_size; in tpm2_pcr_read() 217 memcpy(digest->digest, out->digest, digest_size); in tpm2_pcr_read() 265 chip->allocated_banks[i].digest_size); in tpm2_pcr_extend() 560 bank->digest_size = hash_digest_size[crypto_algo]; in tpm2_init_bank_info() [all …]
|
| /linux/drivers/crypto/ccp/ |
| A D | ccp-crypto-sha.c | 32 unsigned int digest_size = crypto_ahash_digestsize(tfm); in ccp_sha_complete() local 50 memcpy(req->result, rctx->ctx, digest_size); in ccp_sha_complete() 278 unsigned int digest_size = crypto_shash_digestsize(shash); in ccp_sha_setkey() local 296 key_len = digest_size; in ccp_sha_setkey() 364 u32 digest_size; member 374 .digest_size = SHA1_DIGEST_SIZE, 382 .digest_size = SHA224_DIGEST_SIZE, 390 .digest_size = SHA256_DIGEST_SIZE, 398 .digest_size = SHA384_DIGEST_SIZE, 406 .digest_size = SHA512_DIGEST_SIZE, [all …]
|
| /linux/crypto/asymmetric_keys/ |
| A D | verify_pefile.c | 327 size_t digest_size, desc_size; in pefile_digest_pe() local 341 digest_size = crypto_shash_digestsize(tfm); in pefile_digest_pe() 343 if (digest_size != ctx->digest_len) { in pefile_digest_pe() 345 digest_size, ctx->digest_len); in pefile_digest_pe() 349 pr_debug("Digest: desc=%zu size=%zu\n", desc_size, digest_size); in pefile_digest_pe() 352 desc = kzalloc(desc_size + digest_size, GFP_KERNEL); in pefile_digest_pe()
|
| A D | x509_public_key.c | 53 sig->digest_size = crypto_shash_digestsize(tfm); in x509_get_sig_params() 56 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL); in x509_get_sig_params() 72 ret = is_hash_blacklisted(sig->digest, sig->digest_size, in x509_get_sig_params() 76 sig->digest_size, sig->digest); in x509_get_sig_params()
|
| A D | pkcs7_verify.c | 48 sig->digest_size = crypto_shash_digestsize(tfm); in pkcs7_digest() 51 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL); in pkcs7_digest() 81 if (sinfo->msgdigest_len != sig->digest_size) { in pkcs7_digest() 101 memset(sig->digest, 0, sig->digest_size); in pkcs7_digest() 142 *len = sinfo->sig->digest_size; in pkcs7_get_digest()
|
| /linux/crypto/ |
| A D | sha3_generic.c | 164 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); in crypto_sha3_init() local 166 sctx->rsiz = 200 - 2 * digest_size; in crypto_sha3_init() 217 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); in crypto_sha3_final() local 229 for (i = 0; i < digest_size / 8; i++) in crypto_sha3_final() 232 if (digest_size & 4) in crypto_sha3_final()
|
| A D | rsa-pkcs1pad.c | 463 const unsigned int digest_size = req->dst_len; in pkcs1pad_verify_complete() local 510 if (digest_size != dst_len - pos) { in pkcs1pad_verify_complete() 517 sg_nents_for_len(req->src, sig_size + digest_size), in pkcs1pad_verify_complete() 519 digest_size, sig_size); in pkcs1pad_verify_complete() 522 digest_size) != 0) in pkcs1pad_verify_complete() 557 const unsigned int digest_size = req->dst_len; in pkcs1pad_verify() local 560 if (WARN_ON(req->dst) || WARN_ON(!digest_size) || in pkcs1pad_verify() 564 req_ctx->out_buf = kmalloc(ctx->key_size + digest_size, GFP_KERNEL); in pkcs1pad_verify()
|
| /linux/include/uapi/linux/ |
| A D | fsverity.h | 33 __u16 digest_size; /* input/output */ member 82 __le16 digest_size; member
|
| /linux/arch/arm/crypto/ |
| A D | blake2b-neon-glue.c | 53 #define BLAKE2B_ALG(name, driver_name, digest_size) \ argument 62 .digestsize = digest_size, \
|
| /linux/drivers/block/drbd/ |
| A D | drbd_worker.c | 343 int digest_size; in w_e_send_csum() local 354 digest = kmalloc(digest_size, GFP_NOIO); in w_e_send_csum() 368 digest, digest_size, in w_e_send_csum() 1173 int digest_size; in w_e_end_csum_rs_req() local 1196 D_ASSERT(device, digest_size == di->digest_size); in w_e_end_csum_rs_req() 1238 int digest_size; in w_e_end_ov_req() local 1246 digest = kmalloc(digest_size, GFP_NOIO); in w_e_end_ov_req() 1255 memset(digest, 0, digest_size); in w_e_end_ov_req() 1298 int digest_size; in w_e_end_ov_reply() local 1319 digest = kmalloc(digest_size, GFP_NOIO); in w_e_end_ov_reply() [all …]
|