/openbmc/linux/crypto/ |
H A D | testmgr.h | 41 const char *digest; member 5522 .digest = 5540 .digest = 5552 .digest = 5574 .digest = 5600 .digest = 5619 .digest = 5700 .digest = (u8 *)(u8 []) { 5708 .digest = (u8 *)(u8 []) { 5717 .digest = (u8 *)(u8 []) { [all …]
|
H A D | ecrdsa.c | 40 const char *digest; /* digest name from oid */ member 76 unsigned char digest[STREEBOG512_DIGEST_SIZE]; in ecrdsa_verify() local 93 !ctx->digest || in ecrdsa_verify() 101 WARN_ON(req->dst_len > sizeof(digest))) in ecrdsa_verify() 109 digest, req->dst_len, req->src_len); in ecrdsa_verify() 123 vli_from_le64(e, digest, ndigits); in ecrdsa_verify() 209 ctx->digest = "streebog256"; in ecrdsa_set_pub_key() 213 ctx->digest = "streebog512"; in ecrdsa_set_pub_key()
|
/openbmc/qemu/tests/qtest/ |
H A D | aspeed_hace-test.c | 185 qtest_memread(s, digest_addr, digest, sizeof(digest)); in test_md5() 188 g_assert_cmpmem(digest, sizeof(digest), in test_md5() 218 qtest_memread(s, digest_addr, digest, sizeof(digest)); in test_sha256() 221 g_assert_cmpmem(digest, sizeof(digest), in test_sha256() 251 qtest_memread(s, digest_addr, digest, sizeof(digest)); in test_sha512() 254 g_assert_cmpmem(digest, sizeof(digest), in test_sha512() 302 qtest_memread(s, digest_addr, digest, sizeof(digest)); in test_sha256_sg() 305 g_assert_cmpmem(digest, sizeof(digest), in test_sha256_sg() 356 g_assert_cmpmem(digest, sizeof(digest), in test_sha512_sg() 397 g_assert_cmpmem(digest, sizeof(digest), in test_sha256_accum() [all …]
|
/openbmc/ipmitool/src/plugins/lan/ |
H A D | auth.c | 94 static md5_byte_t digest[16]; in ipmi_auth_md5() 97 memset(digest, 0, 16); in ipmi_auth_md5() 114 md5_finish(&state, digest); in ipmi_auth_md5() 118 return digest; in ipmi_auth_md5() 196 static md5_byte_t digest[16]; in ipmi_auth_special() 200 memset(digest, 0, 16); in ipmi_auth_special() 205 md5_finish(&state, digest); in ipmi_auth_special() 208 challenge[i] = s->challenge[i] ^ digest[i]; in ipmi_auth_special() 210 memset(digest, 0, 16); in ipmi_auth_special() 215 md5_finish(&state, digest); in ipmi_auth_special() [all …]
|
/openbmc/linux/lib/crypto/ |
H A D | sha1.c | 87 void sha1_transform(__u32 *digest, const char *data, __u32 *array) in sha1_transform() argument 92 A = digest[0]; in sha1_transform() 93 B = digest[1]; in sha1_transform() 94 C = digest[2]; in sha1_transform() 95 D = digest[3]; in sha1_transform() 96 E = digest[4]; in sha1_transform() 118 digest[0] += A; in sha1_transform() 119 digest[1] += B; in sha1_transform() 120 digest[2] += C; in sha1_transform() 121 digest[3] += D; in sha1_transform() [all …]
|
/openbmc/qemu/crypto/ |
H A D | hmac-nettle.c | 31 uint8_t *digest); 47 qcrypto_nettle_hmac_digest digest; member 53 .digest = (qcrypto_nettle_hmac_digest)hmac_md5_digest, 59 .digest = (qcrypto_nettle_hmac_digest)hmac_sha1_digest, 65 .digest = (qcrypto_nettle_hmac_digest)hmac_sha224_digest, 71 .digest = (qcrypto_nettle_hmac_digest)hmac_sha256_digest, 77 .digest = (qcrypto_nettle_hmac_digest)hmac_sha384_digest, 83 .digest = (qcrypto_nettle_hmac_digest)hmac_sha512_digest, 89 .digest = (qcrypto_nettle_hmac_digest)hmac_ripemd160_digest, 166 qcrypto_hmac_alg_map[hmac->alg].digest(&ctx->u, *resultlen, *result); in qcrypto_nettle_hmac_bytesv()
|
H A D | hmac.c | 48 char **digest, in qcrypto_hmac_digestv() argument 59 *digest = g_new0(char, (resultlen * 2) + 1); in qcrypto_hmac_digestv() 62 (*digest)[(i * 2)] = hex[(result[i] >> 4) & 0xf]; in qcrypto_hmac_digestv() 63 (*digest)[(i * 2) + 1] = hex[result[i] & 0xf]; in qcrypto_hmac_digestv() 66 (*digest)[resultlen * 2] = '\0'; in qcrypto_hmac_digestv() 75 char **digest, in qcrypto_hmac_digest() argument 83 return qcrypto_hmac_digestv(hmac, &iov, 1, digest, errp); in qcrypto_hmac_digest()
|
H A D | hash.c | 85 char **digest, in qcrypto_hash_digestv() argument 96 *digest = g_new0(char, (resultlen * 2) + 1); in qcrypto_hash_digestv() 98 (*digest)[(i * 2)] = hex[(result[i] >> 4) & 0xf]; in qcrypto_hash_digestv() 99 (*digest)[(i * 2) + 1] = hex[result[i] & 0xf]; in qcrypto_hash_digestv() 101 (*digest)[resultlen * 2] = '\0'; in qcrypto_hash_digestv() 109 char **digest, in qcrypto_hash_digest() argument 114 return qcrypto_hash_digestv(alg, &iov, 1, digest, errp); in qcrypto_hash_digest()
|
H A D | hash-gcrypt.c | 58 unsigned char *digest; in qcrypto_gcrypt_hash_bytesv() local 97 digest = gcry_md_read(md, 0); in qcrypto_gcrypt_hash_bytesv() 98 if (!digest) { in qcrypto_gcrypt_hash_bytesv() 103 memcpy(*result, digest, *resultlen); in qcrypto_gcrypt_hash_bytesv()
|
/openbmc/u-boot/board/gdsys/a38x/ |
H A D | hre.c | 146 uint8_t digest[20]; in find_key() local 169 sha1_csum(buf, buf_len, digest); in find_key() 272 result->digest, 20); in access_hreg() 335 uint8_t digest[20]; in compute_extend() local 341 sha1_finish(&ctx, digest); in compute_extend() 342 memcpy(_dst, digest, min(n, sizeof(digest))); in compute_extend() 356 if (find_key(tpm, src_reg->digest, dst_reg->digest, &parent_handle)) in hre_op_loadkey() 359 src_reg->digest, &key_handle); in hre_op_loadkey() 421 if (src_reg->digest[i]) in hre_execute_op() 444 src_buf = src_reg->digest; in hre_execute_op() [all …]
|
/openbmc/linux/arch/s390/purgatory/ |
H A D | purgatory.c | 18 u8 digest[SHA256_DIGEST_SIZE]; in verify_sha256_digest() local 27 sha256_final(&sctx, digest); in verify_sha256_digest() 29 if (memcmp(digest, purgatory_sha256_digest, sizeof(digest))) in verify_sha256_digest()
|
/openbmc/u-boot/drivers/crypto/ |
H A D | aspeed_hace.c | 63 u8 digest[64]; /* Must be 8 byte aligned */ member 169 memcpy(ctx->digest, sha1_iv, 32); in hw_sha_init() 173 memcpy(ctx->digest, sha256_iv, 32); in hw_sha_init() 177 memcpy(ctx->digest, sha384_iv, 64); in hw_sha_init() 181 memcpy(ctx->digest, sha512_iv, 64); in hw_sha_init() 265 memcpy(dest_buf, ctx->digest, ctx->digest_size); in hw_sha_finish() 303 memcpy(ctx->digest, sha1_iv, 32); in sha_digest() 309 memcpy(ctx->digest, sha256_iv, 32); in sha_digest() 315 memcpy(ctx->digest, sha384_iv, 64); in sha_digest() 321 memcpy(ctx->digest, sha512_iv, 64); in sha_digest() [all …]
|
/openbmc/linux/arch/riscv/purgatory/ |
H A D | purgatory.c | 24 u8 digest[SHA256_DIGEST_SIZE]; in verify_sha256_digest() local 30 sha256_final(&ss, digest); in verify_sha256_digest() 31 if (memcmp(digest, purgatory_sha256_digest, sizeof(digest)) != 0) in verify_sha256_digest()
|
/openbmc/linux/arch/x86/purgatory/ |
H A D | purgatory.c | 27 u8 digest[SHA256_DIGEST_SIZE]; in verify_sha256_digest() local 36 sha256_final(&sctx, digest); in verify_sha256_digest() 38 if (memcmp(digest, purgatory_sha256_digest, sizeof(digest))) in verify_sha256_digest()
|
/openbmc/linux/include/crypto/ |
H A D | poly1305.h | 88 void poly1305_final_arch(struct poly1305_desc_ctx *desc, u8 *digest); 89 void poly1305_final_generic(struct poly1305_desc_ctx *desc, u8 *digest); 91 static inline void poly1305_final(struct poly1305_desc_ctx *desc, u8 *digest) in poly1305_final() argument 94 poly1305_final_arch(desc, digest); in poly1305_final() 96 poly1305_final_generic(desc, digest); in poly1305_final()
|
/openbmc/qemu/tests/unit/ |
H A D | test-crypto-hash.c | 198 char *digest; in test_hash_digest() local 212 &digest, in test_hash_digest() 215 g_assert_cmpstr(digest, ==, expected_outputs[i]); in test_hash_digest() 216 g_free(digest); in test_hash_digest() 227 char *digest; in test_hash_base64() local 236 &digest, in test_hash_base64() 239 g_assert_cmpstr(digest, ==, expected_outputs_b64[i]); in test_hash_base64() 240 g_free(digest); in test_hash_base64()
|
/openbmc/u-boot/board/gdsys/p1022/ |
H A D | controlcenterd-id.c | 81 uint8_t digest[20]; member 306 uint8_t digest[20]; in find_key() local 329 sha1_csum(buf, buf_len, digest); in find_key() 505 result->digest, 20); in access_hreg() 574 uint8_t digest[20]; in compute_extend() local 580 sha1_finish(&ctx, digest); in compute_extend() 581 memcpy(_dst, digest, min(n, sizeof(digest))); in compute_extend() 595 if (find_key(tpm, src_reg->digest, dst_reg->digest, &parent_handle)) in hre_op_loadkey() 660 if (src_reg->digest[i]) in hre_execute_op() 683 src_buf = src_reg->digest; in hre_execute_op() [all …]
|
/openbmc/linux/crypto/asymmetric_keys/ |
H A D | pkcs7_verify.c | 34 if (sig->digest) in pkcs7_digest() 51 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL); in pkcs7_digest() 52 if (!sig->digest) in pkcs7_digest() 63 sig->digest); in pkcs7_digest() 66 pr_devel("MsgDigest = [%*ph]\n", 8, sig->digest); in pkcs7_digest() 88 if (memcmp(sig->digest, sinfo->msgdigest, in pkcs7_digest() 101 memset(sig->digest, 0, sig->digest_size); in pkcs7_digest() 111 sinfo->authattrs_len, sig->digest); in pkcs7_digest() 114 pr_devel("AADigest = [%*ph]\n", 8, sig->digest); in pkcs7_digest() 141 *buf = sinfo->sig->digest; in pkcs7_get_digest()
|
H A D | x509_public_key.c | 57 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL); in x509_get_sig_params() 58 if (!sig->digest) in x509_get_sig_params() 71 cert->pub->keylen, sig->digest) ?: in x509_get_sig_params() 73 crypto_shash_update(desc, sig->digest, in x509_get_sig_params() 76 sig->digest); in x509_get_sig_params() 79 sig->digest); in x509_get_sig_params() 85 ret = is_hash_blacklisted(sig->digest, sig->digest_size, in x509_get_sig_params() 89 sig->digest_size, sig->digest); in x509_get_sig_params()
|
/openbmc/linux/security/integrity/ima/ |
H A D | ima_modsig.c | 24 const u8 *digest; member 115 rc = pkcs7_get_digest(modsig->pkcs7_msg, &modsig->digest, in ima_collect_modsig() 126 const u8 **digest, u32 *digest_size) in ima_get_modsig_digest() argument 129 *digest = modsig->digest; in ima_get_modsig_digest()
|
H A D | ima_queue.c | 58 rc = memcmp(qe->entry->digests[ima_hash_algo_idx].digest, in ima_lookup_digest_entry() 111 key = ima_hash_key(entry->digests[ima_hash_algo_idx].digest); in ima_add_digest_entry() 163 u8 *digest = entry->digests[ima_hash_algo_idx].digest; in ima_add_template_entry() local 172 if (ima_lookup_digest_entry(digest, entry->pcr)) { in ima_add_template_entry() 237 memset(digests[i].digest, 0xff, digest_size); in ima_init_digests()
|
/openbmc/linux/security/integrity/evm/ |
H A D | evm_main.c | 177 struct evm_digest digest; in evm_verify_hmac() local 214 digest.hdr.algo = HASH_ALGO_SHA1; in evm_verify_hmac() 216 xattr_value_len, &digest); in evm_verify_hmac() 219 rc = crypto_memneq(xattr_data->data, digest.digest, in evm_verify_hmac() 235 digest.hdr.algo = hdr->hash_algo; in evm_verify_hmac() 237 xattr_value_len, xattr_data->type, &digest); in evm_verify_hmac() 242 digest.digest, digest.hdr.length); in evm_verify_hmac() 272 pr_debug("digest: (%d) [%*phN]\n", digest.hdr.length, digest.hdr.length, in evm_verify_hmac() 273 digest.digest); in evm_verify_hmac() 917 rc = evm_init_hmac(inode, xattrs, xattr_data->digest); in evm_inode_init_security()
|
/openbmc/openpower-pnor-code-mgmt/ |
H A D | version.cpp | 39 std::array<unsigned char, EVP_MAX_MD_SIZE> digest{}; in getId() local 44 EVP_DigestFinal(ctx.get(), digest.data(), nullptr); in getId() 49 (unsigned int)digest[0], (unsigned int)digest[1], in getId() 50 (unsigned int)digest[2], (unsigned int)digest[3]); in getId()
|
/openbmc/linux/drivers/crypto/inside-secure/ |
H A D | safexcel_hash.c | 52 u32 digest; member 889 export->digest = req->digest; in safexcel_ahash_export() 910 req->digest = export->digest; in safexcel_ahash_import() 989 .digest = safexcel_sha1_digest, 1272 .digest = safexcel_sha256_digest, 1329 .digest = safexcel_sha224_digest, 1530 .digest = safexcel_sha512_digest, 1587 .digest = safexcel_sha384_digest, 1788 .digest = safexcel_md5_digest, 1941 .digest = safexcel_crc32_digest, [all …]
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/pam/pam-ssh-agent-auth/ |
H A D | 0001-Adapt-to-OpenSSL-1.1.1.patch | 600 - EVP_DigestFinal(&md, digest, &dlen); 604 + EVP_DigestFinal(md, digest, &dlen); 607 memset(digest, 'd', sizeof(digest)); 692 + EVP_DigestFinal(md, digest, &dlen); 695 memset(digest, 'd', sizeof(digest)); 710 u_char digest[EVP_MAX_MD_SIZE]; 731 memset(digest, 'd', sizeof(digest)); 795 memset(digest, 'd', sizeof(digest)); 830 memset(digest, 'd', sizeof(digest)); 872 + EVP_DigestFinal(md, digest, &dlen); [all …]
|