| /OK3568_Linux_fs/kernel/crypto/ |
| H A D | testmgr.h | 40 const char *digest; member 2402 .digest = "\x31\xd6\xcf\xe0\xd1\x6a\xe9\x31" 2407 .digest = "\xbd\xe5\x2c\xb3\x1d\xe3\x3e\x46" 2412 .digest = "\xa4\x48\x01\x7a\xaf\x21\xd8\x52" 2417 .digest = "\xd9\x13\x0a\x81\x64\x54\x9f\xe8" 2422 .digest = "\xd7\x9e\x1c\x30\x8a\xa5\xbb\xcd" 2427 .digest = "\x04\x3f\x85\x82\xf2\x41\xdb\x35" 2433 .digest = "\xe3\x3b\x4d\xdc\x9c\x38\xf2\x19" 2441 .digest = "\x6b\x4e\x03\x42\x36\x67\xdb\xb7" 2448 .digest = "\x9e\x86\xff\x69\x55\x7c\xa9\x5f" [all …]
|
| H A D | fips140-selftests.c | 94 const u8 *digest; member 409 u8 digest[HASH_MAX_DIGESTSIZE]; in fips_test_hash() local 436 digest); in fips_test_hash() 441 err = fips_check_result(digest, vec->digest, vec->digest_size, in fips_test_hash() 452 u8 digest[SHA256_DIGEST_SIZE]; in fips_test_sha256_library() local 457 sha256(vec->message, vec->message_size, digest); in fips_test_sha256_library() 458 return fips_check_result(digest, vec->digest, vec->digest_size, in fips_test_sha256_library() 619 .digest = fips_aes_cmac_digest, 796 .digest = fips_sha1_digest, 817 .digest = fips_sha256_digest, [all …]
|
| /OK3568_Linux_fs/external/security/librkcrypto/test/c_mode/ |
| H A D | hash_sm3.c | 54 uint32_t digest[8]; member 67 void rkgm_sm3_final(rkgm_sm3_ctx_t *ctx, unsigned char digest[SM3_DIGEST_LENGTH]); 68 void rkgm_sm3_compress(uint32_t digest[8], const unsigned char block[SM3_BLOCK_SIZE]); 70 static void sm3_compress_blocks(uint32_t digest[8], 77 ctx->digest[0] = 0x7380166F; in rkgm_sm3_init() 78 ctx->digest[1] = 0x4914B2B9; in rkgm_sm3_init() 79 ctx->digest[2] = 0x172442D7; in rkgm_sm3_init() 80 ctx->digest[3] = 0xDA8A0600; in rkgm_sm3_init() 81 ctx->digest[4] = 0xA96F30BC; in rkgm_sm3_init() 82 ctx->digest[5] = 0x163138AA; in rkgm_sm3_init() [all …]
|
| H A D | hmac.c | 86 unsigned char *digest, unsigned int *digest_len, hash_f hash) in rk_hmac_64() argument 111 res = (*hash)(key, key_length, digest, &tmp_len); in rk_hmac_64() 118 k0[i]=digest[i]; in rk_hmac_64() 160 res = (*hash)(step5data, data_length+b, digest, &tmp_len); in rk_hmac_64() 179 step8data[i+64] = digest[i]; in rk_hmac_64() 183 res = (*hash)(step8data, b+tmp_len, digest, &tmp_len); in rk_hmac_64() 196 unsigned char *digest, unsigned int *digest_len, hash_f hash) in rk_hmac_128() argument 221 res = (*hash)(key, key_length, digest, &tmp_len); in rk_hmac_128() 228 k0[i]=digest[i]; in rk_hmac_128() 270 res = (*hash)(step5data, data_length+b, digest, &tmp_len); in rk_hmac_128() [all …]
|
| /OK3568_Linux_fs/kernel/drivers/net/wireless/rockchip_wlan/mvl88w8977/mlan/esa/common/ |
| H A D | pass_phrase.c | 54 static unsigned char digest[36], digest1[A_SHA_DIGEST_LEN]; in Mrvl_F() local 58 unsigned char *pTemp = digest; in Mrvl_F() 61 memcpy(util_fns, digest, ssid, ssidlength); in Mrvl_F() 62 digest[ssidlength] = (unsigned char)((count >> 24) & 0xff); in Mrvl_F() 63 digest[ssidlength + 1] = (unsigned char)((count >> 16) & 0xff); in Mrvl_F() 64 digest[ssidlength + 2] = (unsigned char)((count >> 8) & 0xff); in Mrvl_F() 65 digest[ssidlength + 3] = (unsigned char)(count & 0xff); in Mrvl_F() 84 len, digest, A_SHA_DIGEST_LEN); in Mrvl_F() 86 memcpy(util_fns, digest1, digest, A_SHA_DIGEST_LEN); in Mrvl_F() 90 output[j] ^= digest[j]; in Mrvl_F()
|
| H A D | hmac_sha1.c | 52 unsigned char *digest; in Mrvl_hmac_sha1() local 56 digest = k_pad + 64; in Mrvl_hmac_sha1() 96 Mrvl_SHA1Final((void *)priv, context, digest); /* finish up 1st pass */ in Mrvl_hmac_sha1() 110 Mrvl_SHA1Update(context, digest, 20); /* then results of 1st hash */ in Mrvl_hmac_sha1() 111 Mrvl_SHA1Final((void *)priv, context, digest); /* finish up 2nd pass */ in Mrvl_hmac_sha1() 112 memcpy(util_fns, output, digest, outputLen); in Mrvl_hmac_sha1()
|
| /OK3568_Linux_fs/u-boot/board/gdsys/a38x/ |
| H A D | hre.c | 145 uint8_t digest[20]; in find_key() local 166 sha1_csum(buf, buf_len, digest); in find_key() 167 if (!memcmp(digest, pubkey_digest, 20)) { in find_key() 202 sha1_finish(&ctx, fix_hregs[FIX_HREG_DEVICE_ID_HASH].digest); in read_common_data() 266 result->digest, 20); in access_hreg() 274 memcpy(result->digest, vendor, 20); in access_hreg() 329 uint8_t digest[20]; in compute_extend() local 335 sha1_finish(&ctx, digest); in compute_extend() 336 memcpy(_dst, digest, min(n, sizeof(digest))); in compute_extend() 349 if (find_key(src_reg->digest, dst_reg->digest, &parent_handle)) in hre_op_loadkey() [all …]
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/ta/crypt/ |
| H A D | sha2_impl.c | 314 unsigned int len, unsigned char *digest) in sha256() argument 320 sha256_final(&ctx, digest); in sha256() 383 void sha256_final(struct sha256_ctx *ctx, unsigned char *digest) in sha256_final() argument 410 UNPACK32(ctx->h[i], &digest[i << 2]); in sha256_final() 412 UNPACK32(ctx->h[0], &digest[0]); in sha256_final() 413 UNPACK32(ctx->h[1], &digest[4]); in sha256_final() 414 UNPACK32(ctx->h[2], &digest[8]); in sha256_final() 415 UNPACK32(ctx->h[3], &digest[12]); in sha256_final() 416 UNPACK32(ctx->h[4], &digest[16]); in sha256_final() 417 UNPACK32(ctx->h[5], &digest[20]); in sha256_final() [all …]
|
| /OK3568_Linux_fs/kernel/lib/ |
| H A D | sha1.c | 86 void sha1_transform(__u32 *digest, const char *data, __u32 *array) in sha1_transform() argument 91 A = digest[0]; in sha1_transform() 92 B = digest[1]; in sha1_transform() 93 C = digest[2]; in sha1_transform() 94 D = digest[3]; in sha1_transform() 95 E = digest[4]; in sha1_transform() 117 digest[0] += A; in sha1_transform() 118 digest[1] += B; in sha1_transform() 119 digest[2] += C; in sha1_transform() 120 digest[3] += D; in sha1_transform() [all …]
|
| /OK3568_Linux_fs/u-boot/board/gdsys/p1022/ |
| H A D | controlcenterd-id.c | 81 uint8_t digest[20]; member 293 uint8_t digest[20]; in find_key() local 314 sha1_csum(buf, buf_len, digest); in find_key() 315 if (!memcmp(digest, pubkey_digest, 20)) { in find_key() 350 sha1_finish(&ctx, fix_hregs[FIX_HREG_DEVICE_ID_HASH].digest); in read_common_data() 369 CONFIG_SYS_MONITOR_LEN, dst->digest); in compute_self_hash() 422 sha1_csum(load_addr, code_len, dst->digest); in compute_second_stage_hash() 489 result->digest, 20); in access_hreg() 503 memcpy(result->digest, vendor, 20); in access_hreg() 558 uint8_t digest[20]; in compute_extend() local [all …]
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v1/export-user_ta/include/openssl/ |
| H A D | ecdsa.h | 76 OPENSSL_EXPORT int ECDSA_sign(int type, const uint8_t *digest, 84 OPENSSL_EXPORT int ECDSA_verify(int type, const uint8_t *digest, 111 OPENSSL_EXPORT ECDSA_SIG *ECDSA_do_sign(const uint8_t *digest, 117 OPENSSL_EXPORT int ECDSA_do_verify(const uint8_t *digest, size_t digest_len, 136 OPENSSL_EXPORT ECDSA_SIG *ECDSA_do_sign_ex(const uint8_t *digest, 143 OPENSSL_EXPORT int ECDSA_sign_ex(int type, const uint8_t *digest,
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v1/export-user_ta/host_include/openssl/ |
| H A D | ecdsa.h | 76 OPENSSL_EXPORT int ECDSA_sign(int type, const uint8_t *digest, 84 OPENSSL_EXPORT int ECDSA_verify(int type, const uint8_t *digest, 111 OPENSSL_EXPORT ECDSA_SIG *ECDSA_do_sign(const uint8_t *digest, 117 OPENSSL_EXPORT int ECDSA_do_verify(const uint8_t *digest, size_t digest_len, 136 OPENSSL_EXPORT ECDSA_SIG *ECDSA_do_sign_ex(const uint8_t *digest, 143 OPENSSL_EXPORT int ECDSA_sign_ex(int type, const uint8_t *digest,
|
| /OK3568_Linux_fs/kernel/arch/arm/crypto/ |
| H A D | Kconfig | 13 tristate "SHA1 digest algorithm (ARM-asm)" 21 tristate "SHA1 digest algorithm (ARM NEON)" 32 tristate "SHA1 digest algorithm (ARM v8 Crypto Extensions)" 41 tristate "SHA-224/256 digest algorithm (ARM v8 Crypto Extensions)" 50 tristate "SHA-224/256 digest algorithm (ARM-asm and NEON)" 58 tristate "SHA-384/512 digest algorithm (ARM-asm and NEON)" 66 tristate "BLAKE2s digest algorithm (ARM)" 69 BLAKE2s digest algorithm optimized with ARM scalar instructions. This 75 tristate "BLAKE2b digest algorithm (ARM NEON)" 79 BLAKE2b digest algorithm optimized with ARM NEON instructions. [all …]
|
| /OK3568_Linux_fs/kernel/arch/arm64/crypto/ |
| H A D | Kconfig | 13 tristate "SHA-224/SHA-256 digest algorithm for arm64" 17 tristate "SHA-384/SHA-512 digest algorithm for arm64" 21 tristate "SHA-1 digest algorithm (ARMv8 Crypto Extensions)" 27 tristate "SHA-224/SHA-256 digest algorithm (ARMv8 Crypto Extensions)" 33 tristate "SHA-384/SHA-512 digest algorithm (ARMv8 Crypto Extensions)" 39 tristate "SHA3 digest algorithm (ARMv8.2 Crypto Extensions)" 45 tristate "SM3 digest algorithm (ARMv8.2 Crypto Extensions)" 65 tristate "CRCT10DIF digest algorithm using PMULL instructions"
|
| /OK3568_Linux_fs/kernel/security/integrity/evm/ |
| H A D | evm_main.c | 139 struct evm_digest digest; in evm_verify_hmac() local 176 digest.hdr.algo = HASH_ALGO_SHA1; in evm_verify_hmac() 178 xattr_value_len, &digest); in evm_verify_hmac() 181 rc = crypto_memneq(xattr_data->data, digest.digest, in evm_verify_hmac() 195 digest.hdr.algo = hdr->hash_algo; in evm_verify_hmac() 197 xattr_value_len, xattr_data->type, &digest); in evm_verify_hmac() 202 digest.digest, digest.hdr.length); in evm_verify_hmac() 543 rc = evm_init_hmac(inode, lsm_xattr, xattr_data->digest); in evm_inode_init_security()
|
| /OK3568_Linux_fs/kernel/include/crypto/ |
| H A D | poly1305.h | 88 void poly1305_final_arch(struct poly1305_desc_ctx *desc, u8 *digest); 89 void poly1305_final_generic(struct poly1305_desc_ctx *desc, u8 *digest); 91 static inline void poly1305_final(struct poly1305_desc_ctx *desc, u8 *digest) in poly1305_final() argument 94 poly1305_final_arch(desc, digest); in poly1305_final() 96 poly1305_final_generic(desc, digest); in poly1305_final()
|
| /OK3568_Linux_fs/kernel/drivers/crypto/inside-secure/ |
| H A D | safexcel_hash.c | 51 u32 digest; member 122 if (unlikely(req->digest == CONTEXT_CONTROL_DIGEST_XCM)) { in safexcel_context_control() 145 cdesc->control_data.control0 |= req->digest | in safexcel_context_control() 151 cdesc->control_data.control0 |= req->digest | in safexcel_context_control() 165 if ((req->digest == CONTEXT_CONTROL_DIGEST_PRECOMPUTED) || in safexcel_context_control() 181 if ((req->digest == CONTEXT_CONTROL_DIGEST_PRECOMPUTED) || in safexcel_context_control() 199 req->digest = CONTEXT_CONTROL_DIGEST_PRECOMPUTED; in safexcel_context_control() 270 (sreq->digest != CONTEXT_CONTROL_DIGEST_HMAC)) { in safexcel_handle_req_result() 291 if (unlikely(sreq->digest == CONTEXT_CONTROL_DIGEST_XCM && in safexcel_handle_req_result() 803 } else if (unlikely(req->digest == CONTEXT_CONTROL_DIGEST_XCM && in safexcel_ahash_final() [all …]
|
| /OK3568_Linux_fs/kernel/arch/s390/purgatory/ |
| H A D | purgatory.c | 18 u8 digest[SHA256_DIGEST_SIZE]; in verify_sha256_digest() local 27 sha256_final(&sctx, digest); in verify_sha256_digest() 29 if (memcmp(digest, purgatory_sha256_digest, sizeof(digest))) in verify_sha256_digest()
|
| /OK3568_Linux_fs/kernel/arch/x86/purgatory/ |
| H A D | purgatory.c | 24 u8 digest[SHA256_DIGEST_SIZE]; in verify_sha256_digest() local 33 sha256_final(&sctx, digest); in verify_sha256_digest() 35 if (memcmp(digest, purgatory_sha256_digest, sizeof(digest))) in verify_sha256_digest()
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/ta/crypt/include/ |
| H A D | sha2_impl.h | 67 void sha224_final(struct sha224_ctx *ctx, unsigned char *digest); 69 unsigned char *digest); 74 void sha256_final(struct sha256_ctx *ctx, unsigned char *digest); 76 unsigned char *digest);
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-extended/pam/pam-ssh-agent-auth/ |
| H A D | 0001-Adapt-to-OpenSSL-1.1.1.patch | 587 u_char digest[EVP_MAX_MD_SIZE], sigblob[SIGBLOB_LEN]; 600 - EVP_DigestFinal(&md, digest, &dlen); 604 + EVP_DigestFinal(md, digest, &dlen); 606 sig = DSA_do_sign(digest, dlen, key->dsa); 607 memset(digest, 'd', sizeof(digest)); 645 u_char digest[EVP_MAX_MD_SIZE], *sigblob; 688 - EVP_DigestFinal(&md, digest, &dlen); 692 + EVP_DigestFinal(md, digest, &dlen); 694 ret = DSA_do_verify(digest, dlen, sig, key->dsa); 695 memset(digest, 'd', sizeof(digest)); [all …]
|
| /OK3568_Linux_fs/kernel/crypto/asymmetric_keys/ |
| H A D | pkcs7_verify.c | 34 if (sig->digest) in pkcs7_digest() 51 sig->digest = kmalloc(sig->digest_size, GFP_KERNEL); in pkcs7_digest() 52 if (!sig->digest) in pkcs7_digest() 63 sig->digest); in pkcs7_digest() 66 pr_devel("MsgDigest = [%*ph]\n", 8, sig->digest); in pkcs7_digest() 88 if (memcmp(sig->digest, sinfo->msgdigest, in pkcs7_digest() 101 memset(sig->digest, 0, sig->digest_size); in pkcs7_digest() 111 sinfo->authattrs_len, sig->digest); in pkcs7_digest() 114 pr_devel("AADigest = [%*ph]\n", 8, sig->digest); in pkcs7_digest() 141 *buf = sinfo->sig->digest; in pkcs7_get_digest()
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/include/openssl/ |
| H A D | ecdsa.h | 79 OPENSSL_EXPORT int ECDSA_sign(int type, const uint8_t *digest, 91 OPENSSL_EXPORT int ECDSA_verify(int type, const uint8_t *digest, 137 OPENSSL_EXPORT ECDSA_SIG *ECDSA_do_sign(const uint8_t *digest, 147 OPENSSL_EXPORT int ECDSA_do_verify(const uint8_t *digest, size_t digest_len, 191 ECDSA_sign_with_nonce_and_leak_private_key_for_testing(const uint8_t *digest,
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/include/openssl/ |
| H A D | ecdsa.h | 79 OPENSSL_EXPORT int ECDSA_sign(int type, const uint8_t *digest, 91 OPENSSL_EXPORT int ECDSA_verify(int type, const uint8_t *digest, 137 OPENSSL_EXPORT ECDSA_SIG *ECDSA_do_sign(const uint8_t *digest, 147 OPENSSL_EXPORT int ECDSA_do_verify(const uint8_t *digest, size_t digest_len, 191 ECDSA_sign_with_nonce_and_leak_private_key_for_testing(const uint8_t *digest,
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/host_include/openssl/ |
| H A D | ecdsa.h | 79 OPENSSL_EXPORT int ECDSA_sign(int type, const uint8_t *digest, 91 OPENSSL_EXPORT int ECDSA_verify(int type, const uint8_t *digest, 137 OPENSSL_EXPORT ECDSA_SIG *ECDSA_do_sign(const uint8_t *digest, 147 OPENSSL_EXPORT int ECDSA_do_verify(const uint8_t *digest, size_t digest_len, 191 ECDSA_sign_with_nonce_and_leak_private_key_for_testing(const uint8_t *digest,
|