/kernel/linux/linux-6.6/fs/verity/ |
H A D | measure.c | 37 * The user specifies the digest_size their buffer has space for; we can in fsverity_ioctl_measure() 42 if (get_user(arg.digest_size, &uarg->digest_size)) in fsverity_ioctl_measure() 44 if (arg.digest_size < hash_alg->digest_size) in fsverity_ioctl_measure() 49 arg.digest_size = hash_alg->digest_size; in fsverity_ioctl_measure() 54 if (copy_to_user(uarg->digest, vi->file_digest, hash_alg->digest_size)) in fsverity_ioctl_measure() 95 memcpy(raw_digest, vi->file_digest, hash_alg->digest_size); in fsverity_get_digest() 100 return hash_alg->digest_size; in fsverity_get_digest() [all...] |
H A D | hash_algs.c | 16 .digest_size = SHA256_DIGEST_SIZE, 22 .digest_size = SHA512_DIGEST_SIZE, 84 if (WARN_ON_ONCE(alg->digest_size != crypto_shash_digestsize(tfm))) in fsverity_get_hash_alg() 171 * @out: output digest, size 'params->digest_size' bytes 207 * @out: output digest, size 'alg->digest_size' bytes 239 BUG_ON(alg->digest_size > FS_VERITY_MAX_DIGEST_SIZE); in fsverity_check_hash_algs() 246 BUG_ON(!is_power_of_2(alg->digest_size)); in fsverity_check_hash_algs() 251 BUG_ON(alg->digest_size != hash_digest_size[alg->algo_id]); in fsverity_check_hash_algs()
|
H A D | signature.c | 119 d = kzalloc(sizeof(*d) + hash_alg->digest_size, GFP_KERNEL); in fsverity_verify_signature() 124 d->digest_size = cpu_to_le16(hash_alg->digest_size); in fsverity_verify_signature() 125 memcpy(d->digest, vi->file_digest, hash_alg->digest_size); in fsverity_verify_signature() 134 err = verify_pkcs7_signature(d, sizeof(*d) + hash_alg->digest_size, in fsverity_verify_signature()
|
H A D | open.c | 50 params->digest_size = hash_alg->digest_size; in fsverity_init_merkle_tree_params() 88 if (WARN_ON_ONCE(!is_power_of_2(params->digest_size))) { in fsverity_init_merkle_tree_params() 92 if (params->block_size < 2 * params->digest_size) { in fsverity_init_merkle_tree_params() 99 params->log_digestsize = ilog2(params->digest_size); in fsverity_init_merkle_tree_params() 215 memcpy(vi->root_hash, desc->root_hash, vi->tree_params.digest_size); in fsverity_create_info()
|
/kernel/linux/linux-5.10/fs/verity/ |
H A D | measure.c | 37 * The user specifies the digest_size their buffer has space for; we can in fsverity_ioctl_measure() 42 if (get_user(arg.digest_size, &uarg->digest_size)) in fsverity_ioctl_measure() 44 if (arg.digest_size < hash_alg->digest_size) in fsverity_ioctl_measure() 49 arg.digest_size = hash_alg->digest_size; in fsverity_ioctl_measure() 54 if (copy_to_user(uarg->digest, vi->measurement, hash_alg->digest_size)) in fsverity_ioctl_measure()
|
H A D | signature.c | 118 d = kzalloc(sizeof(*d) + hash_alg->digest_size, GFP_KERNEL); in fsverity_verify_signature() 123 d->digest_size = cpu_to_le16(hash_alg->digest_size); in fsverity_verify_signature() 124 memcpy(d->digest, vi->measurement, hash_alg->digest_size); in fsverity_verify_signature() 133 err = verify_pkcs7_signature(d, sizeof(*d) + hash_alg->digest_size, in fsverity_verify_signature() 155 hash_alg->name, hash_alg->digest_size, vi->measurement); in fsverity_verify_signature()
|
H A D | open.c | 48 params->digest_size = hash_alg->digest_size; in fsverity_init_merkle_tree_params() 68 if (WARN_ON(!is_power_of_2(params->digest_size))) { in fsverity_init_merkle_tree_params() 72 if (params->block_size < 2 * params->digest_size) { in fsverity_init_merkle_tree_params() 79 params->log_arity = params->log_blocksize - ilog2(params->digest_size); in fsverity_init_merkle_tree_params() 217 memcpy(vi->root_hash, desc->root_hash, vi->tree_params.digest_size); in fsverity_create_info() 227 vi->tree_params.digest_size, vi->measurement); in fsverity_create_info()
|
H A D | hash_algs.c | 17 .digest_size = SHA256_DIGEST_SIZE, 22 .digest_size = SHA512_DIGEST_SIZE, 87 if (WARN_ON(alg->digest_size != crypto_ahash_digestsize(tfm))) in fsverity_get_hash_alg() 228 * @out: output digest, size 'params->digest_size' bytes 276 * @out: output digest, size 'alg->digest_size' bytes 320 BUG_ON(alg->digest_size > FS_VERITY_MAX_DIGEST_SIZE); in fsverity_check_hash_algs() 327 BUG_ON(!is_power_of_2(alg->digest_size)); in fsverity_check_hash_algs()
|
H A D | fsverity_private.h | 40 unsigned int digest_size; /* digest size in bytes, e.g. 32 for SHA-256 */ member 49 unsigned int digest_size; /* same as hash_alg->digest_size */ member 118 __le16 digest_size; member
|
/kernel/linux/linux-5.10/arch/arm64/crypto/ |
H A D | sha3-ce-glue.c | 38 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); in sha3_update() local 51 sha3_ce_transform(sctx->st, sctx->buf, 1, digest_size); in sha3_update() 67 digest_size); in sha3_update() 84 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); in sha3_final() local 96 sha3_ce_transform(sctx->st, sctx->buf, 1, digest_size); in sha3_final() 99 for (i = 0; i < digest_size / 8; i++) in sha3_final() 102 if (digest_size & 4) in sha3_final()
|
/kernel/linux/linux-6.6/arch/arm64/crypto/ |
H A D | sha3-ce-glue.c | 38 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); in sha3_update() local 51 sha3_ce_transform(sctx->st, sctx->buf, 1, digest_size); in sha3_update() 67 digest_size); in sha3_update() 84 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); in sha3_final() local 96 sha3_ce_transform(sctx->st, sctx->buf, 1, digest_size); in sha3_final() 99 for (i = 0; i < digest_size / 8; i++) in sha3_final() 102 if (digest_size & 4) in sha3_final()
|
/kernel/linux/linux-6.6/drivers/target/iscsi/ |
H A D | iscsi_target_auth.c | 162 chap->digest_size = MD5_SIGNATURE_SIZE; in chap_server_open() 165 chap->digest_size = SHA1_SIGNATURE_SIZE; in chap_server_open() 168 chap->digest_size = SHA256_SIGNATURE_SIZE; in chap_server_open() 171 chap->digest_size = SHA3_256_SIGNATURE_SIZE; in chap_server_open() 183 chap->challenge_len = chap->digest_size; in chap_server_open() 263 digest = kzalloc(chap->digest_size, GFP_KERNEL); in chap_server_compute_hash() 269 response = kzalloc(chap->digest_size * 2 + 2, GFP_KERNEL); in chap_server_compute_hash() 275 client_digest = kzalloc(chap->digest_size, GFP_KERNEL); in chap_server_compute_hash() 281 server_digest = kzalloc(chap->digest_size, GFP_KERNEL); in chap_server_compute_hash() 333 if (strlen(chap_r) != chap->digest_size * in chap_server_compute_hash() [all...] |
/kernel/linux/linux-5.10/drivers/target/iscsi/ |
H A D | iscsi_target_auth.c | 162 chap->digest_size = MD5_SIGNATURE_SIZE; in chap_server_open() 165 chap->digest_size = SHA1_SIGNATURE_SIZE; in chap_server_open() 168 chap->digest_size = SHA256_SIGNATURE_SIZE; in chap_server_open() 171 chap->digest_size = SHA3_256_SIGNATURE_SIZE; in chap_server_open() 183 chap->challenge_len = chap->digest_size; in chap_server_open() 231 digest = kzalloc(chap->digest_size, GFP_KERNEL); in chap_server_compute_hash() 237 response = kzalloc(chap->digest_size * 2 + 2, GFP_KERNEL); in chap_server_compute_hash() 243 client_digest = kzalloc(chap->digest_size, GFP_KERNEL); in chap_server_compute_hash() 249 server_digest = kzalloc(chap->digest_size, GFP_KERNEL); in chap_server_compute_hash() 302 if (strlen(chap_r) != chap->digest_size * in chap_server_compute_hash() [all...] |
/kernel/linux/linux-6.6/drivers/md/ |
H A D | dm-verity-loadpin.c | 19 unsigned int digest_size; in is_trusted_verity_target() local 33 if (dm_verity_get_root_digest(ti, &root_digest, &digest_size)) in is_trusted_verity_target() 37 if ((trd->len == digest_size) && in is_trusted_verity_target() 38 !memcmp(trd->data, root_digest, digest_size)) { in is_trusted_verity_target()
|
H A D | dm-verity-target.c | 215 *offset = idx * v->digest_size; in verity_hash_at_level() 331 v->digest_size) == 0)) in verity_verify_level() 358 memcpy(want_digest, data, v->digest_size); in verity_verify_level() 388 memcpy(digest, v->root_digest, v->digest_size); in verity_hash_for_block() 397 *is_zero = !memcmp(v->zero_digest, digest, v->digest_size); in verity_hash_for_block() 525 verity_io_want_digest(v, io), v->digest_size)) { in verity_recheck() 630 verity_io_want_digest(v, io), v->digest_size) == 0)) { in verity_verify_io() 865 for (x = 0; x < v->digest_size; x++) in verity_status() 925 for (x = 0; x < v->digest_size; x++) in verity_status() 1062 v->zero_digest = kmalloc(v->digest_size, GFP_KERNE in verity_alloc_zero_digest() 1544 dm_verity_get_root_digest(struct dm_target *ti, u8 **root_digest, unsigned int *digest_size) dm_verity_get_root_digest() argument [all...] |
/kernel/linux/linux-5.10/security/integrity/ima/ |
H A D | ima_modsig.c | 25 u32 digest_size; member 116 &modsig->digest_size, &modsig->hash_algo); in ima_collect_modsig() 126 const u8 **digest, u32 *digest_size) in ima_get_modsig_digest() 130 *digest_size = modsig->digest_size; in ima_get_modsig_digest() 125 ima_get_modsig_digest(const struct modsig *modsig, enum hash_algo *algo, const u8 **digest, u32 *digest_size) ima_get_modsig_digest() argument
|
H A D | ima_queue.c | 215 u16 digest_size; in ima_init_digests() local 229 digest_size = ima_tpm_chip->allocated_banks[i].digest_size; in ima_init_digests() 234 digest_size = SHA1_DIGEST_SIZE; in ima_init_digests() 236 memset(digests[i].digest, 0xff, digest_size); in ima_init_digests()
|
/kernel/linux/linux-6.6/include/crypto/ |
H A D | sha256_base.h | 115 unsigned int digest_size) in lib_sha256_base_finish() 120 for (i = 0; digest_size > 0; i++, digest_size -= sizeof(__be32)) in lib_sha256_base_finish() 129 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); in sha256_base_finish() local 132 return lib_sha256_base_finish(sctx, out, digest_size); in sha256_base_finish() 114 lib_sha256_base_finish(struct sha256_state *sctx, u8 *out, unsigned int digest_size) lib_sha256_base_finish() argument
|
/kernel/linux/linux-6.6/security/integrity/ima/ |
H A D | ima_modsig.c | 25 u32 digest_size; member 116 &modsig->digest_size, &modsig->hash_algo); in ima_collect_modsig() 126 const u8 **digest, u32 *digest_size) in ima_get_modsig_digest() 130 *digest_size = modsig->digest_size; in ima_get_modsig_digest() 125 ima_get_modsig_digest(const struct modsig *modsig, enum hash_algo *algo, const u8 **digest, u32 *digest_size) ima_get_modsig_digest() argument
|
H A D | ima_queue.c | 216 u16 digest_size; in ima_init_digests() local 230 digest_size = ima_tpm_chip->allocated_banks[i].digest_size; in ima_init_digests() 235 digest_size = SHA1_DIGEST_SIZE; in ima_init_digests() 237 memset(digests[i].digest, 0xff, digest_size); in ima_init_digests()
|
/kernel/linux/linux-5.10/drivers/char/tpm/ |
H A D | tpm2-cmd.c | 148 __be16 digest_size; member 169 u16 digest_size; in tpm2_pcr_read() local 183 expected_digest_size = chip->allocated_banks[i].digest_size; in tpm2_pcr_read() 203 digest_size = be16_to_cpu(out->digest_size); in tpm2_pcr_read() 204 if (digest_size > sizeof(digest->digest) || in tpm2_pcr_read() 205 (!digest_size_ptr && digest_size != expected_digest_size)) { in tpm2_pcr_read() 211 *digest_size_ptr = digest_size; in tpm2_pcr_read() 213 memcpy(digest->digest, out->digest, digest_size); in tpm2_pcr_read() 262 chip->allocated_banks[i].digest_size); in tpm2_pcr_extend() [all...] |
/kernel/linux/linux-6.6/drivers/char/tpm/ |
H A D | tpm2-cmd.c | 148 __be16 digest_size; member 169 u16 digest_size; in tpm2_pcr_read() local 183 expected_digest_size = chip->allocated_banks[i].digest_size; in tpm2_pcr_read() 203 digest_size = be16_to_cpu(out->digest_size); in tpm2_pcr_read() 204 if (digest_size > sizeof(digest->digest) || in tpm2_pcr_read() 205 (!digest_size_ptr && digest_size != expected_digest_size)) { in tpm2_pcr_read() 211 *digest_size_ptr = digest_size; in tpm2_pcr_read() 213 memcpy(digest->digest, out->digest, digest_size); in tpm2_pcr_read() 262 chip->allocated_banks[i].digest_size); in tpm2_pcr_extend() [all...] |
/kernel/linux/linux-5.10/drivers/crypto/ccp/ |
H A D | ccp-crypto-sha.c | 31 unsigned int digest_size = crypto_ahash_digestsize(tfm); in ccp_sha_complete() local 49 memcpy(req->result, rctx->ctx, digest_size); in ccp_sha_complete() 277 unsigned int digest_size = crypto_shash_digestsize(shash); in ccp_sha_setkey() local 295 key_len = digest_size; in ccp_sha_setkey() 363 u32 digest_size; member 373 .digest_size = SHA1_DIGEST_SIZE, 381 .digest_size = SHA224_DIGEST_SIZE, 389 .digest_size = SHA256_DIGEST_SIZE, 397 .digest_size = SHA384_DIGEST_SIZE, 405 .digest_size [all...] |
/kernel/linux/linux-6.6/drivers/crypto/ccp/ |
H A D | ccp-crypto-sha.c | 32 unsigned int digest_size = crypto_ahash_digestsize(tfm); in ccp_sha_complete() local 50 memcpy(req->result, rctx->ctx, digest_size); in ccp_sha_complete() 278 unsigned int digest_size = crypto_shash_digestsize(shash); in ccp_sha_setkey() local 296 key_len = digest_size; in ccp_sha_setkey() 364 u32 digest_size; member 374 .digest_size = SHA1_DIGEST_SIZE, 382 .digest_size = SHA224_DIGEST_SIZE, 390 .digest_size = SHA256_DIGEST_SIZE, 398 .digest_size = SHA384_DIGEST_SIZE, 406 .digest_size [all...] |
/kernel/linux/linux-5.10/include/crypto/ |
H A D | sha512_base.h | 121 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); in sha512_base_finish() local 126 for (i = 0; digest_size > 0; i++, digest_size -= sizeof(__be64)) in sha512_base_finish()
|