| /openbmc/qemu/tests/qtest/ |
| H A D | aspeed-hace-utils.c | 174 uint8_t digest[16] = {0}; in aspeed_test_md5() local 193 qtest_memread(s, digest_addr, digest, sizeof(digest)); in aspeed_test_md5() 196 g_assert_cmpmem(digest, sizeof(digest), in aspeed_test_md5() 197 test_result_md5, sizeof(digest)); in aspeed_test_md5() 208 uint8_t digest[32] = {0}; in aspeed_test_sha256() local 227 qtest_memread(s, digest_addr, digest, sizeof(digest)); in aspeed_test_sha256() 230 g_assert_cmpmem(digest, sizeof(digest), in aspeed_test_sha256() 231 test_result_sha256, sizeof(digest)); in aspeed_test_sha256() 242 uint8_t digest[48] = {0}; in aspeed_test_sha384() local 261 qtest_memread(s, digest_addr, digest, sizeof(digest)); in aspeed_test_sha384() [all …]
|
| /openbmc/ipmitool/src/plugins/lan/ |
| H A D | auth.c | 94 static md5_byte_t digest[16]; in ipmi_auth_md5() 97 memset(digest, 0, 16); in ipmi_auth_md5() 114 md5_finish(&state, digest); in ipmi_auth_md5() 117 printf(" MD5 AuthCode : %s\n", buf2str(digest, 16)); in ipmi_auth_md5() 118 return digest; in ipmi_auth_md5() 196 static md5_byte_t digest[16]; in ipmi_auth_special() 200 memset(digest, 0, 16); in ipmi_auth_special() 205 md5_finish(&state, digest); in ipmi_auth_special() 208 challenge[i] = s->challenge[i] ^ digest[i]; in ipmi_auth_special() 210 memset(digest, 0, 16); in ipmi_auth_special() [all …]
|
| /openbmc/u-boot/board/gdsys/a38x/ |
| H A D | hre.c | 146 uint8_t digest[20]; in find_key() local 169 sha1_csum(buf, buf_len, digest); in find_key() 170 if (!memcmp(digest, pubkey_digest, 20)) { in find_key() 206 sha1_finish(&ctx, fix_hregs[FIX_HREG_DEVICE_ID_HASH].digest); in read_common_data() 272 result->digest, 20); in access_hreg() 280 memcpy(result->digest, vendor, 20); in access_hreg() 335 uint8_t digest[20]; in compute_extend() local 341 sha1_finish(&ctx, digest); in compute_extend() 342 memcpy(_dst, digest, min(n, sizeof(digest))); in compute_extend() 356 if (find_key(tpm, src_reg->digest, dst_reg->digest, &parent_handle)) in hre_op_loadkey() [all …]
|
| /openbmc/u-boot/drivers/crypto/ |
| H A D | aspeed_hace.c | 63 u8 digest[64]; /* Must be 8 byte aligned */ member 144 writel((u32)ctx->digest, base + ASPEED_HACE_HASH_DIGEST_BUFF); in hash_trigger() 145 writel((u32)ctx->digest, base + ASPEED_HACE_HASH_KEY_BUFF); in hash_trigger() 169 memcpy(ctx->digest, sha1_iv, 32); in hw_sha_init() 173 memcpy(ctx->digest, sha256_iv, 32); in hw_sha_init() 177 memcpy(ctx->digest, sha384_iv, 64); in hw_sha_init() 181 memcpy(ctx->digest, sha512_iv, 64); in hw_sha_init() 265 memcpy(dest_buf, ctx->digest, ctx->digest_size); in hw_sha_finish() 273 static int sha_digest(const void *src, unsigned int length, void *digest, in sha_digest() argument 303 memcpy(ctx->digest, sha1_iv, 32); in sha_digest() [all …]
|
| H A D | aspeed_hace_v1.c | 75 static int digest_object(const void *src, unsigned int length, void *digest, in digest_object() argument 83 if ((u32)digest & 0x7) { in digest_object() 84 debug("HACE dest alignment incorrect: %p\n", digest); in digest_object() 98 writel((u32)digest, base + ASPEED_HACE_HASH_DIGEST_BUFF); in digest_object()
|
| /openbmc/u-boot/board/gdsys/p1022/ |
| H A D | controlcenterd-id.c | 81 uint8_t digest[20]; member 306 uint8_t digest[20]; in find_key() local 329 sha1_csum(buf, buf_len, digest); in find_key() 330 if (!memcmp(digest, pubkey_digest, 20)) { in find_key() 365 sha1_finish(&ctx, fix_hregs[FIX_HREG_DEVICE_ID_HASH].digest); in read_common_data() 384 CONFIG_SYS_MONITOR_LEN, dst->digest); in compute_self_hash() 437 sha1_csum(load_addr, code_len, dst->digest); in compute_second_stage_hash() 505 result->digest, 20); in access_hreg() 519 memcpy(result->digest, vendor, 20); in access_hreg() 574 uint8_t digest[20]; in compute_extend() local [all …]
|
| /openbmc/openbmc/meta-security/meta-tpm/recipes-tpm2/tpm2-tss-engine/files/ |
| H A D | 0001-Configure-Allow-disabling-of-digest-sign-operations.patch | 4 Subject: [PATCH 1/2] Configure: Allow disabling of digest-sign operations 6 Since the digest-sign operations perform the hash on the TPM and 9 restricted keys (via digest+sign) but to rely on ordinary keys 35 + [Disable support for digest and sign methods, helps with TPM unsuppo… 44 Have required functionality from OpenSSL to support digest and sign)])
|
| /openbmc/qemu/tests/unit/ |
| H A D | test-crypto-hash.c | 216 char *digest; in test_hash_digest() local 230 &digest, in test_hash_digest() 233 g_assert_cmpstr(digest, ==, expected_outputs[i]); in test_hash_digest() 234 g_free(digest); in test_hash_digest() 245 char *digest; in test_hash_base64() local 254 &digest, in test_hash_base64() 257 g_assert_cmpstr(digest, ==, expected_outputs_b64[i]); in test_hash_base64() 258 g_free(digest); in test_hash_base64()
|
| /openbmc/qemu/hw/uefi/ |
| H A D | var-service-json.c | 76 if (var->digest && var->digest_size) { in uefi_vars_to_qapi() 77 v->digest = generate_hexstr(var->digest, var->digest_size); in uefi_vars_to_qapi() 141 if (v->digest) { in uefi_vars_from_qapi() 142 len = strlen(v->digest); in uefi_vars_from_qapi() 144 var->digest = g_malloc(var->digest_size); in uefi_vars_from_qapi() 145 parse_hexstr(var->digest, v->digest, len); in uefi_vars_from_qapi()
|
| /openbmc/openpower-pnor-code-mgmt/ |
| H A D | version.cpp | 39 std::array<unsigned char, EVP_MAX_MD_SIZE> digest{}; in getId() local 44 EVP_DigestFinal(ctx.get(), digest.data(), nullptr); in getId() 49 (unsigned int)digest[0], (unsigned int)digest[1], in getId() 50 (unsigned int)digest[2], (unsigned int)digest[3]); in getId()
|
| /openbmc/openpower-pnor-code-mgmt/test/ |
| H A D | test_version.cpp | 16 unsigned char digest[EVP_MAX_MD_SIZE]; in TEST() local 23 EVP_DigestFinal(ctx.get(), digest, &digest_count); in TEST() 28 snprintf(&mdString[i * 2], 3, "%02x", (unsigned int)digest[i]); in TEST()
|
| /openbmc/phosphor-bmc-code-mgmt/bmc/ |
| H A D | version.cpp | 113 std::array<unsigned char, EVP_MAX_MD_SIZE> digest{}; in getId() local 118 EVP_DigestFinal(ctx.get(), digest.data(), nullptr); in getId() 123 (unsigned int)digest[0], (unsigned int)digest[1], in getId() 124 (unsigned int)digest[2], (unsigned int)digest[3]); in getId()
|
| /openbmc/openbmc/meta-security/recipes-ids/samhain/files/ |
| H A D | 0005-Fix-sha256-for-big-endian-machines.patch | 6 After computing the digest, big-endian machines would 7 memset() the digest to the first byte of state instead 21 @@ -468,7 +468,7 @@ void SHA256_Final(sha2_byte digest[SHA256_DIGEST_LENGTH], SHA256_CTX* context)
|
| /openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/pam/pam-ssh-agent-auth/ |
| H A D | 0001-Adapt-to-OpenSSL-1.1.1.patch | 587 u_char digest[EVP_MAX_MD_SIZE], sigblob[SIGBLOB_LEN]; 600 - EVP_DigestFinal(&md, digest, &dlen); 604 + EVP_DigestFinal(md, digest, &dlen); 606 sig = DSA_do_sign(digest, dlen, key->dsa); 607 memset(digest, 'd', sizeof(digest)); 645 u_char digest[EVP_MAX_MD_SIZE], *sigblob; 688 - EVP_DigestFinal(&md, digest, &dlen); 692 + EVP_DigestFinal(md, digest, &dlen); 694 ret = DSA_do_verify(digest, dlen, sig, key->dsa); 695 memset(digest, 'd', sizeof(digest)); [all …]
|
| /openbmc/qemu/qapi/ |
| H A D | uefi.json | 37 # @digest: variable certificate digest. Used to verify the signature 41 # For other authenticated variables the firmware stores a digest 53 '*digest' : 'str'}}
|
| /openbmc/pam-ipmi/src/pam_ipmisave/ |
| H A D | pam_ipmisave.c | 153 const EVP_MD *digest; in encrypt_decrypt_data() local 166 digest = EVP_sha256(); in encrypt_decrypt_data() 171 if (NULL == HMAC(digest, key, keylen, inbytes, inbyteslen, in encrypt_decrypt_data() 221 if (NULL == HMAC(digest, key, keylen, outbytes, *outbyteslen, in encrypt_decrypt_data() 284 const EVP_MD *digest = EVP_sha256(); in update_pass_special_file() local 302 unsigned char hash[EVP_MD_block_size(digest)]; in update_pass_special_file() 406 HMAC(digest, keybuff, keybuffsize, in update_pass_special_file() 498 if (RAND_bytes(hash, EVP_MD_block_size(digest)) != 1) { in update_pass_special_file() 508 HMAC(digest, keybuff, keybuffsize, hash, EVP_MD_block_size(digest), key, in update_pass_special_file() 544 pwmp.hashsize = EVP_MD_block_size(digest); in update_pass_special_file()
|
| /openbmc/phosphor-psu-code-mgmt/src/ |
| H A D | utils.cpp | 163 std::array<unsigned char, EVP_MAX_MD_SIZE> digest{}; in getVersionId() local 168 EVP_DigestFinal(ctx.get(), digest.data(), nullptr); in getVersionId() 173 (unsigned int)digest[0], (unsigned int)digest[1], in getVersionId() 174 (unsigned int)digest[2], (unsigned int)digest[3]); in getVersionId()
|
| /openbmc/qemu/crypto/ |
| H A D | hash-gcrypt.c | 110 unsigned char *digest; in qcrypto_gcrypt_hash_finalize() local 130 digest = gcry_md_read(*ctx, 0); in qcrypto_gcrypt_hash_finalize() 131 memcpy(*result, digest, *result_len); in qcrypto_gcrypt_hash_finalize()
|
| /openbmc/u-boot/include/u-boot/ |
| H A D | sha512.h | 23 void sha512_finish(sha512_context * ctx, uint8_t digest[SHA512_SUM_LEN]); 32 void sha384_finish(sha512_context * ctx, uint8_t digest[SHA384_SUM_LEN]);
|
| /openbmc/u-boot/arch/arm/include/asm/arch-aspeed/ |
| H A D | crypto.h | 44 …ed_sg_digest(struct aspeed_sg_list *src_list, u32 list_length, u32 length, u8 *digest, u32 method); 45 extern int digest_object(u8 *src, u32 length, u8 *digest, u32 method);
|
| /openbmc/qemu/tests/functional/qemu_test/ |
| H A D | linuxkernel.py | 109 digest = hl.hexdigest() 110 self.log.info(f'sha256sum of download is {digest}.') 111 self.assertEqual(digest, hashsum)
|
| /openbmc/u-boot/lib/ |
| H A D | sha256.c | 230 void sha256_finish(sha256_context * ctx, uint8_t digest[32]) in sha256_finish() 249 PUT_UINT32_BE(ctx->state[0], digest, 0); in sha256_finish() 250 PUT_UINT32_BE(ctx->state[1], digest, 4); in sha256_finish() 251 PUT_UINT32_BE(ctx->state[2], digest, 8); in sha256_finish() 252 PUT_UINT32_BE(ctx->state[3], digest, 12); in sha256_finish() 253 PUT_UINT32_BE(ctx->state[4], digest, 16); in sha256_finish() 254 PUT_UINT32_BE(ctx->state[5], digest, 20); in sha256_finish() 255 PUT_UINT32_BE(ctx->state[6], digest, 24); in sha256_finish() 256 PUT_UINT32_BE(ctx->state[7], digest, 28); in sha256_finish()
|
| H A D | tpm-v2.c | 62 len += l + offsetof(struct tpmt_ha, digest); in tcg2_event_get_size() 126 memcpy(&digest_list->digests[digest_list->count].digest, final, in tcg2_create_digest() 161 pos += offsetof(struct tpmt_ha, digest); in tcg2_log_append() 162 memcpy(log + pos, (u8 *)&digest_list->digests[i].digest, len); in tcg2_log_append() 243 memset(&log->digest, 0, sizeof(log->digest)); in tcg2_log_init() 320 pos += offsetof(struct tpmt_ha, digest); in tcg2_replay_eventlog() 337 memcpy(digest_list->digests[i].digest.sha512, in tcg2_replay_eventlog() 391 for (i = 0; i < sizeof(log->digest); i++) { in tcg2_log_parse() 392 if (log->digest[i]) in tcg2_log_parse() 463 if (digest_list.digests[i].digest.sha512[j]) in tcg2_log_parse() [all …]
|
| /openbmc/openbmc/poky/meta/recipes-support/curl/ |
| H A D | curl_8.12.1.bb | 31 COMMON_PACKAGECONFIG = "basic-auth bearer-auth digest-auth ipfs negotiate-auth openssl proxy thread… 46 PACKAGECONFIG[digest-auth] = "--enable-digest-auth,--disable-digest-auth" 140 perl-module-digest \ 141 perl-module-digest-md5 \ 142 perl-module-digest-sha \
|
| /openbmc/u-boot/tools/ |
| H A D | mxsimage.c | 179 uint8_t digest[32]; member 429 EVP_DigestFinal(ictx->md_ctx, ictx->digest, NULL); in sb_encrypt_image() 431 sb_aes_crypt(ictx, ictx->digest, ictx->digest, sizeof(ictx->digest)); in sb_encrypt_image() 1400 sizeof(hdr->digest)); in sb_postfill_image_header() 1401 EVP_DigestFinal(md_ctx, hdr->digest, NULL); in sb_postfill_image_header() 1657 unsigned char digest[20]; in sb_verify_image_header() local 1678 sizeof(hdr->digest)); in sb_verify_image_header() 1679 EVP_DigestFinal(md_ctx, digest, NULL); in sb_verify_image_header() 1685 if (memcmp(digest, hdr->digest, 20)) in sb_verify_image_header() 2025 uint8_t digest[32]; in sb_verify_image_end() local [all …]
|