Home
last modified time | relevance | path

Searched refs:digest (Results 1 – 25 of 315) sorted by relevance

12345678910>>...13

/openbmc/linux/crypto/
H A Dtestmgr.h41 const char *digest; member
4411 .digest = "\x31\xd6\xcf\xe0\xd1\x6a\xe9\x31"
4416 .digest = "\xbd\xe5\x2c\xb3\x1d\xe3\x3e\x46"
4421 .digest = "\xa4\x48\x01\x7a\xaf\x21\xd8\x52"
4426 .digest = "\xd9\x13\x0a\x81\x64\x54\x9f\xe8"
4431 .digest = "\xd7\x9e\x1c\x30\x8a\xa5\xbb\xcd"
4436 .digest = "\x04\x3f\x85\x82\xf2\x41\xdb\x35"
4442 .digest = "\xe3\x3b\x4d\xdc\x9c\x38\xf2\x19"
4450 .digest = "\x6b\x4e\x03\x42\x36\x67\xdb\xb7"
4457 .digest = "\x9e\x86\xff\x69\x55\x7c\xa9\x5f"
[all …]
H A Decrdsa.c40 const char *digest; /* digest name from oid */ member
76 unsigned char digest[STREEBOG512_DIGEST_SIZE]; in ecrdsa_verify() local
93 !ctx->digest || in ecrdsa_verify()
101 WARN_ON(req->dst_len > sizeof(digest))) in ecrdsa_verify()
109 digest, req->dst_len, req->src_len); in ecrdsa_verify()
123 vli_from_le64(e, digest, ndigits); in ecrdsa_verify()
209 ctx->digest = "streebog256"; in ecrdsa_set_pub_key()
213 ctx->digest = "streebog512"; in ecrdsa_set_pub_key()
/openbmc/qemu/tests/qtest/
H A Daspeed_hace-test.c167 uint8_t digest[16] = {0}; in test_md5() local
185 qtest_memread(s, digest_addr, digest, sizeof(digest)); in test_md5()
188 g_assert_cmpmem(digest, sizeof(digest), in test_md5()
189 test_result_md5, sizeof(digest)); in test_md5()
200 uint8_t digest[32] = {0}; in test_sha256() local
218 qtest_memread(s, digest_addr, digest, sizeof(digest)); in test_sha256()
221 g_assert_cmpmem(digest, sizeof(digest), in test_sha256()
222 test_result_sha256, sizeof(digest)); in test_sha256()
233 uint8_t digest[64] = {0}; in test_sha512() local
251 qtest_memread(s, digest_addr, digest, sizeof(digest)); in test_sha512()
[all …]
/openbmc/ipmitool/src/plugins/lan/
H A Dauth.c94 static md5_byte_t digest[16]; in ipmi_auth_md5()
97 memset(digest, 0, 16); in ipmi_auth_md5()
114 md5_finish(&state, digest); in ipmi_auth_md5()
117 printf(" MD5 AuthCode : %s\n", buf2str(digest, 16)); in ipmi_auth_md5()
118 return digest; in ipmi_auth_md5()
196 static md5_byte_t digest[16]; in ipmi_auth_special()
200 memset(digest, 0, 16); in ipmi_auth_special()
205 md5_finish(&state, digest); in ipmi_auth_special()
208 challenge[i] = s->challenge[i] ^ digest[i]; in ipmi_auth_special()
210 memset(digest, 0, 16); in ipmi_auth_special()
[all …]
/openbmc/linux/lib/crypto/
H A Dsha1.c87 void sha1_transform(__u32 *digest, const char *data, __u32 *array) in sha1_transform() argument
92 A = digest[0]; in sha1_transform()
93 B = digest[1]; in sha1_transform()
94 C = digest[2]; in sha1_transform()
95 D = digest[3]; in sha1_transform()
96 E = digest[4]; in sha1_transform()
118 digest[0] += A; in sha1_transform()
119 digest[1] += B; in sha1_transform()
120 digest[2] += C; in sha1_transform()
121 digest[3] += D; in sha1_transform()
[all …]
/openbmc/qemu/crypto/
H A Dhmac-nettle.c31 uint8_t *digest);
50 qcrypto_nettle_hmac_digest digest; member
56 .digest = (qcrypto_nettle_hmac_digest)hmac_md5_digest,
62 .digest = (qcrypto_nettle_hmac_digest)hmac_sha1_digest,
68 .digest = (qcrypto_nettle_hmac_digest)hmac_sha224_digest,
74 .digest = (qcrypto_nettle_hmac_digest)hmac_sha256_digest,
80 .digest = (qcrypto_nettle_hmac_digest)hmac_sha384_digest,
86 .digest = (qcrypto_nettle_hmac_digest)hmac_sha512_digest,
92 .digest = (qcrypto_nettle_hmac_digest)hmac_ripemd160_digest,
99 .digest = (qcrypto_nettle_hmac_digest)hmac_sm3_digest,
[all …]
H A Dhmac.c48 char **digest, in qcrypto_hmac_digestv() argument
59 *digest = g_new0(char, (resultlen * 2) + 1); in qcrypto_hmac_digestv()
62 (*digest)[(i * 2)] = hex[(result[i] >> 4) & 0xf]; in qcrypto_hmac_digestv()
63 (*digest)[(i * 2) + 1] = hex[result[i] & 0xf]; in qcrypto_hmac_digestv()
66 (*digest)[resultlen * 2] = '\0'; in qcrypto_hmac_digestv()
75 char **digest, in qcrypto_hmac_digest() argument
83 return qcrypto_hmac_digestv(hmac, &iov, 1, digest, errp); in qcrypto_hmac_digest()
H A Dhash.c151 char **digest, in qcrypto_hash_finalize_digest() argument
161 *digest = g_new0(char, (resultlen * 2) + 1); in qcrypto_hash_finalize_digest()
163 (*digest)[(i * 2)] = hex[(result[i] >> 4) & 0xf]; in qcrypto_hash_finalize_digest()
164 (*digest)[(i * 2) + 1] = hex[result[i] & 0xf]; in qcrypto_hash_finalize_digest()
166 (*digest)[resultlen * 2] = '\0'; in qcrypto_hash_finalize_digest()
191 char **digest, in qcrypto_hash_digestv() argument
201 qcrypto_hash_finalize_digest(ctx, digest, errp) < 0) { in qcrypto_hash_digestv()
211 char **digest, in qcrypto_hash_digest() argument
216 return qcrypto_hash_digestv(alg, &iov, 1, digest, errp); in qcrypto_hash_digest()
/openbmc/u-boot/board/gdsys/a38x/
H A Dhre.c146 uint8_t digest[20]; in find_key() local
169 sha1_csum(buf, buf_len, digest); in find_key()
170 if (!memcmp(digest, pubkey_digest, 20)) { in find_key()
206 sha1_finish(&ctx, fix_hregs[FIX_HREG_DEVICE_ID_HASH].digest); in read_common_data()
272 result->digest, 20); in access_hreg()
280 memcpy(result->digest, vendor, 20); in access_hreg()
335 uint8_t digest[20]; in compute_extend() local
341 sha1_finish(&ctx, digest); in compute_extend()
342 memcpy(_dst, digest, min(n, sizeof(digest))); in compute_extend()
356 if (find_key(tpm, src_reg->digest, dst_reg->digest, &parent_handle)) in hre_op_loadkey()
[all …]
/openbmc/u-boot/drivers/crypto/
H A Daspeed_hace.c63 u8 digest[64]; /* Must be 8 byte aligned */ member
144 writel((u32)ctx->digest, base + ASPEED_HACE_HASH_DIGEST_BUFF); in hash_trigger()
145 writel((u32)ctx->digest, base + ASPEED_HACE_HASH_KEY_BUFF); in hash_trigger()
169 memcpy(ctx->digest, sha1_iv, 32); in hw_sha_init()
173 memcpy(ctx->digest, sha256_iv, 32); in hw_sha_init()
177 memcpy(ctx->digest, sha384_iv, 64); in hw_sha_init()
181 memcpy(ctx->digest, sha512_iv, 64); in hw_sha_init()
265 memcpy(dest_buf, ctx->digest, ctx->digest_size); in hw_sha_finish()
273 static int sha_digest(const void *src, unsigned int length, void *digest, in sha_digest() argument
303 memcpy(ctx->digest, sha1_iv, 32); in sha_digest()
[all …]
/openbmc/linux/arch/s390/purgatory/
H A Dpurgatory.c18 u8 digest[SHA256_DIGEST_SIZE]; in verify_sha256_digest() local
27 sha256_final(&sctx, digest); in verify_sha256_digest()
29 if (memcmp(digest, purgatory_sha256_digest, sizeof(digest))) in verify_sha256_digest()
/openbmc/u-boot/board/gdsys/p1022/
H A Dcontrolcenterd-id.c81 uint8_t digest[20]; member
306 uint8_t digest[20]; in find_key() local
329 sha1_csum(buf, buf_len, digest); in find_key()
330 if (!memcmp(digest, pubkey_digest, 20)) { in find_key()
365 sha1_finish(&ctx, fix_hregs[FIX_HREG_DEVICE_ID_HASH].digest); in read_common_data()
384 CONFIG_SYS_MONITOR_LEN, dst->digest); in compute_self_hash()
437 sha1_csum(load_addr, code_len, dst->digest); in compute_second_stage_hash()
505 result->digest, 20); in access_hreg()
519 memcpy(result->digest, vendor, 20); in access_hreg()
574 uint8_t digest[20]; in compute_extend() local
[all …]
/openbmc/linux/include/crypto/
H A Dpoly1305.h88 void poly1305_final_arch(struct poly1305_desc_ctx *desc, u8 *digest);
89 void poly1305_final_generic(struct poly1305_desc_ctx *desc, u8 *digest);
91 static inline void poly1305_final(struct poly1305_desc_ctx *desc, u8 *digest) in poly1305_final() argument
94 poly1305_final_arch(desc, digest); in poly1305_final()
96 poly1305_final_generic(desc, digest); in poly1305_final()
/openbmc/linux/arch/riscv/purgatory/
H A Dpurgatory.c24 u8 digest[SHA256_DIGEST_SIZE]; in verify_sha256_digest() local
30 sha256_final(&ss, digest); in verify_sha256_digest()
31 if (memcmp(digest, purgatory_sha256_digest, sizeof(digest)) != 0) in verify_sha256_digest()
/openbmc/linux/arch/x86/purgatory/
H A Dpurgatory.c27 u8 digest[SHA256_DIGEST_SIZE]; in verify_sha256_digest() local
36 sha256_final(&sctx, digest); in verify_sha256_digest()
38 if (memcmp(digest, purgatory_sha256_digest, sizeof(digest))) in verify_sha256_digest()
/openbmc/linux/crypto/asymmetric_keys/
H A Dpkcs7_verify.c34 if (sig->digest) in pkcs7_digest()
51 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL); in pkcs7_digest()
52 if (!sig->digest) in pkcs7_digest()
63 sig->digest); in pkcs7_digest()
66 pr_devel("MsgDigest = [%*ph]\n", 8, sig->digest); in pkcs7_digest()
88 if (memcmp(sig->digest, sinfo->msgdigest, in pkcs7_digest()
101 memset(sig->digest, 0, sig->digest_size); in pkcs7_digest()
111 sinfo->authattrs_len, sig->digest); in pkcs7_digest()
114 pr_devel("AADigest = [%*ph]\n", 8, sig->digest); in pkcs7_digest()
141 *buf = sinfo->sig->digest; in pkcs7_get_digest()
H A Dx509_public_key.c57 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL); in x509_get_sig_params()
58 if (!sig->digest) in x509_get_sig_params()
71 cert->pub->keylen, sig->digest) ?: in x509_get_sig_params()
73 crypto_shash_update(desc, sig->digest, in x509_get_sig_params()
76 sig->digest); in x509_get_sig_params()
79 sig->digest); in x509_get_sig_params()
85 ret = is_hash_blacklisted(sig->digest, sig->digest_size, in x509_get_sig_params()
89 sig->digest_size, sig->digest); in x509_get_sig_params()
/openbmc/qemu/tests/unit/
H A Dtest-crypto-hash.c216 char *digest; in test_hash_digest() local
230 &digest, in test_hash_digest()
233 g_assert_cmpstr(digest, ==, expected_outputs[i]); in test_hash_digest()
234 g_free(digest); in test_hash_digest()
245 char *digest; in test_hash_base64() local
254 &digest, in test_hash_base64()
257 g_assert_cmpstr(digest, ==, expected_outputs_b64[i]); in test_hash_base64()
258 g_free(digest); in test_hash_base64()
/openbmc/linux/security/integrity/evm/
H A Devm_main.c177 struct evm_digest digest; in evm_verify_hmac() local
214 digest.hdr.algo = HASH_ALGO_SHA1; in evm_verify_hmac()
216 xattr_value_len, &digest); in evm_verify_hmac()
219 rc = crypto_memneq(xattr_data->data, digest.digest, in evm_verify_hmac()
235 digest.hdr.algo = hdr->hash_algo; in evm_verify_hmac()
237 xattr_value_len, xattr_data->type, &digest); in evm_verify_hmac()
242 digest.digest, digest.hdr.length); in evm_verify_hmac()
272 pr_debug("digest: (%d) [%*phN]\n", digest.hdr.length, digest.hdr.length, in evm_verify_hmac()
273 digest.digest); in evm_verify_hmac()
917 rc = evm_init_hmac(inode, xattrs, xattr_data->digest); in evm_inode_init_security()
/openbmc/linux/drivers/crypto/inside-secure/
H A Dsafexcel_hash.c52 u32 digest; member
123 if (unlikely(req->digest == CONTEXT_CONTROL_DIGEST_XCM)) { in safexcel_context_control()
146 cdesc->control_data.control0 |= req->digest | in safexcel_context_control()
152 cdesc->control_data.control0 |= req->digest | in safexcel_context_control()
166 if ((req->digest == CONTEXT_CONTROL_DIGEST_PRECOMPUTED) || in safexcel_context_control()
182 if ((req->digest == CONTEXT_CONTROL_DIGEST_PRECOMPUTED) || in safexcel_context_control()
200 req->digest = CONTEXT_CONTROL_DIGEST_PRECOMPUTED; in safexcel_context_control()
271 (sreq->digest != CONTEXT_CONTROL_DIGEST_HMAC)) { in safexcel_handle_req_result()
292 if (unlikely(sreq->digest == CONTEXT_CONTROL_DIGEST_XCM && in safexcel_handle_req_result()
804 } else if (unlikely(req->digest == CONTEXT_CONTROL_DIGEST_XCM && in safexcel_ahash_final()
[all …]
/openbmc/linux/security/integrity/ima/
H A Dima_modsig.c24 const u8 *digest; member
115 rc = pkcs7_get_digest(modsig->pkcs7_msg, &modsig->digest, in ima_collect_modsig()
126 const u8 **digest, u32 *digest_size) in ima_get_modsig_digest() argument
129 *digest = modsig->digest; in ima_get_modsig_digest()
H A Dima_queue.c58 rc = memcmp(qe->entry->digests[ima_hash_algo_idx].digest, in ima_lookup_digest_entry()
111 key = ima_hash_key(entry->digests[ima_hash_algo_idx].digest); in ima_add_digest_entry()
163 u8 *digest = entry->digests[ima_hash_algo_idx].digest; in ima_add_template_entry() local
172 if (ima_lookup_digest_entry(digest, entry->pcr)) { in ima_add_template_entry()
237 memset(digests[i].digest, 0xff, digest_size); in ima_init_digests()
/openbmc/openpower-pnor-code-mgmt/
H A Dversion.cpp39 std::array<unsigned char, EVP_MAX_MD_SIZE> digest{}; in getId() local
44 EVP_DigestFinal(ctx.get(), digest.data(), nullptr); in getId()
49 (unsigned int)digest[0], (unsigned int)digest[1], in getId()
50 (unsigned int)digest[2], (unsigned int)digest[3]); in getId()
/openbmc/openbmc/meta-security/meta-tpm/recipes-tpm2/tpm2-tss-engine/files/
H A D0001-Configure-Allow-disabling-of-digest-sign-operations.patch4 Subject: [PATCH 1/2] Configure: Allow disabling of digest-sign operations
6 Since the digest-sign operations perform the hash on the TPM and
9 restricted keys (via digest+sign) but to rely on ordinary keys
35 + [Disable support for digest and sign methods, helps with TPM unsuppo…
44 Have required functionality from OpenSSL to support digest and sign)])
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/pam/pam-ssh-agent-auth/
H A D0001-Adapt-to-OpenSSL-1.1.1.patch587 u_char digest[EVP_MAX_MD_SIZE], sigblob[SIGBLOB_LEN];
600 - EVP_DigestFinal(&md, digest, &dlen);
604 + EVP_DigestFinal(md, digest, &dlen);
606 sig = DSA_do_sign(digest, dlen, key->dsa);
607 memset(digest, 'd', sizeof(digest));
645 u_char digest[EVP_MAX_MD_SIZE], *sigblob;
688 - EVP_DigestFinal(&md, digest, &dlen);
692 + EVP_DigestFinal(md, digest, &dlen);
694 ret = DSA_do_verify(digest, dlen, sig, key->dsa);
695 memset(digest, 'd', sizeof(digest));
[all …]

12345678910>>...13