Home
last modified time | relevance | path

Searched refs:hash_alg (Results 1 – 25 of 1130) sorted by relevance

12345678910>>...46

/dports/www/firefox-esr/firefox-91.8.0/security/nss/gtests/pk11_gtest/
H A Dpk11_pbkdf2_unittest.cc23 void Derive(std::vector<uint8_t>& derived, SECOidTag hash_alg) { in Pkcs11ModuleTest()
30 EXPECT_TRUE(DeriveBytes(pass, salt, derived, hash_alg, kIterations)); in Pkcs11ModuleTest()
41 SECOidTag next_hash_alg = static_cast<SECOidTag>(hash_alg + 1); in Pkcs11ModuleTest()
48 void KeySizes(SECOidTag hash_alg) {
89 std::vector<uint8_t>& derived, SECOidTag hash_alg,
98 PK11_CreatePBEV2AlgorithmID(SEC_OID_PKCS5_PBKDF2, hash_alg, hash_alg,
114 SECOidTag hash_alg, unsigned int kIterations) {
117 PK11_CreatePBEV2AlgorithmID(SEC_OID_PKCS5_PBKDF2, hash_alg, hash_alg,
130 SECOidTag hash_alg, unsigned int kIterations) {
140 SECOidTag hash_alg, unsigned int kIterations) {
[all …]
/dports/security/ca_root_nss/nss-3.71/nss/gtests/pk11_gtest/
H A Dpk11_pbkdf2_unittest.cc23 void Derive(std::vector<uint8_t>& derived, SECOidTag hash_alg) { in Derive() argument
30 EXPECT_TRUE(DeriveBytes(pass, salt, derived, hash_alg, kIterations)); in Derive()
41 SECOidTag next_hash_alg = static_cast<SECOidTag>(hash_alg + 1); in Derive()
48 void KeySizes(SECOidTag hash_alg) { in KeySizes() argument
89 std::vector<uint8_t>& derived, SECOidTag hash_alg, in DeriveBytes() argument
98 PK11_CreatePBEV2AlgorithmID(SEC_OID_PKCS5_PBKDF2, hash_alg, hash_alg, in DeriveBytes()
114 SECOidTag hash_alg, unsigned int kIterations) { in GenerateKey() argument
117 PK11_CreatePBEV2AlgorithmID(SEC_OID_PKCS5_PBKDF2, hash_alg, hash_alg, in GenerateKey()
130 SECOidTag hash_alg, unsigned int kIterations) { in KeySizeParam() argument
140 SECOidTag hash_alg, unsigned int kIterations) { in MalformedSalt() argument
[all …]
/dports/www/firefox/firefox-99.0/security/nss/gtests/pk11_gtest/
H A Dpk11_pbkdf2_unittest.cc23 void Derive(std::vector<uint8_t>& derived, SECOidTag hash_alg) { in Derive() argument
30 EXPECT_TRUE(DeriveBytes(pass, salt, derived, hash_alg, kIterations)); in Derive()
41 SECOidTag next_hash_alg = static_cast<SECOidTag>(hash_alg + 1); in Derive()
48 void KeySizes(SECOidTag hash_alg) { in KeySizes() argument
89 std::vector<uint8_t>& derived, SECOidTag hash_alg, in DeriveBytes() argument
98 PK11_CreatePBEV2AlgorithmID(SEC_OID_PKCS5_PBKDF2, hash_alg, hash_alg, in DeriveBytes()
114 SECOidTag hash_alg, unsigned int kIterations) { in GenerateKey() argument
117 PK11_CreatePBEV2AlgorithmID(SEC_OID_PKCS5_PBKDF2, hash_alg, hash_alg, in GenerateKey()
130 SECOidTag hash_alg, unsigned int kIterations) { in KeySizeParam() argument
140 SECOidTag hash_alg, unsigned int kIterations) { in MalformedSalt() argument
[all …]
/dports/security/nss/nss-3.76.1/nss/gtests/pk11_gtest/
H A Dpk11_pbkdf2_unittest.cc23 void Derive(std::vector<uint8_t>& derived, SECOidTag hash_alg) { in Derive() argument
30 EXPECT_TRUE(DeriveBytes(pass, salt, derived, hash_alg, kIterations)); in Derive()
41 SECOidTag next_hash_alg = static_cast<SECOidTag>(hash_alg + 1); in Derive()
48 void KeySizes(SECOidTag hash_alg) { in KeySizes() argument
89 std::vector<uint8_t>& derived, SECOidTag hash_alg, in DeriveBytes() argument
98 PK11_CreatePBEV2AlgorithmID(SEC_OID_PKCS5_PBKDF2, hash_alg, hash_alg, in DeriveBytes()
114 SECOidTag hash_alg, unsigned int kIterations) { in GenerateKey() argument
117 PK11_CreatePBEV2AlgorithmID(SEC_OID_PKCS5_PBKDF2, hash_alg, hash_alg, in GenerateKey()
130 SECOidTag hash_alg, unsigned int kIterations) { in KeySizeParam() argument
140 SECOidTag hash_alg, unsigned int kIterations) { in MalformedSalt() argument
[all …]
/dports/mail/thunderbird/thunderbird-91.8.0/security/nss/gtests/pk11_gtest/
H A Dpk11_pbkdf2_unittest.cc23 void Derive(std::vector<uint8_t>& derived, SECOidTag hash_alg) { in Derive() argument
30 EXPECT_TRUE(DeriveBytes(pass, salt, derived, hash_alg, kIterations)); in Derive()
41 SECOidTag next_hash_alg = static_cast<SECOidTag>(hash_alg + 1); in Derive()
48 void KeySizes(SECOidTag hash_alg) { in KeySizes() argument
89 std::vector<uint8_t>& derived, SECOidTag hash_alg, in DeriveBytes() argument
98 PK11_CreatePBEV2AlgorithmID(SEC_OID_PKCS5_PBKDF2, hash_alg, hash_alg, in DeriveBytes()
114 SECOidTag hash_alg, unsigned int kIterations) { in GenerateKey() argument
117 PK11_CreatePBEV2AlgorithmID(SEC_OID_PKCS5_PBKDF2, hash_alg, hash_alg, in GenerateKey()
130 SECOidTag hash_alg, unsigned int kIterations) { in KeySizeParam() argument
140 SECOidTag hash_alg, unsigned int kIterations) { in MalformedSalt() argument
[all …]
/dports/security/p5-Crypt-OpenPGP/Crypt-OpenPGP-1.12/lib/Crypt/OpenPGP/
H A DS2k.pm50 my($hash_alg) = @_;
51 $s2k->{hash} = ref($hash_alg) ? $hash_alg :
64 $s2k->{hash_alg} = $buf->get_int8;
67 $s2k->{hash_alg} = DEFAULT_DIGEST;
69 if ($s2k->{hash_alg}) {
81 $buf->put_int8($s2k->{hash_alg});
94 $s2k->{hash_alg} = $buf->get_int8;
101 if ($s2k->{hash_alg}) {
113 $buf->put_int8($s2k->{hash_alg});
136 if ($s2k->{hash_alg}) {
[all …]
/dports/lang/spidermonkey78/firefox-78.9.0/security/nss/gtests/pk11_gtest/
H A Dpk11_pbkdf2_unittest.cc23 void Derive(std::vector<uint8_t>& derived, SECOidTag hash_alg) { in Derive() argument
30 EXPECT_TRUE(DeriveBytes(pass, salt, derived, hash_alg, kIterations)); in Derive()
41 SECOidTag next_hash_alg = static_cast<SECOidTag>(hash_alg + 1); in Derive()
45 EXPECT_FALSE(DeriveBytes(pass, salt, derived, hash_alg, kIterations + 1)); in Derive()
48 void KeySizes(SECOidTag hash_alg) { in KeySizes() argument
68 KeySizeParam(pass, salt, minus_key_size, hash_alg, kIterations)); in KeySizes()
73 KeySizeParam(pass, salt, negative_key_size, hash_alg, kIterations)); in KeySizes()
78 std::vector<uint8_t>& derived, SECOidTag hash_alg, in DeriveBytes() argument
87 PK11_CreatePBEV2AlgorithmID(SEC_OID_PKCS5_PBKDF2, hash_alg, hash_alg, in DeriveBytes()
103 SECOidTag hash_alg, unsigned int kIterations) { in KeySizeParam() argument
[all …]
/dports/security/s2n/s2n-tls-1.1.2/tests/unit/kats/
H A Dgenerate_pq_hybrid_tls13_handshake_kats.py183 def hkdf_extract(key: bytes, info: bytes, hash_alg: str):
184 return hmac.new(key, info, hash_alg).digest()
186 def hkdf_expand_label(key: bytes, label: str, context: bytes, hash_alg: str):
187 label_arr = [0, hashlib.new(hash_alg).digest_size, len("tls13 ") + len(label)]
199 return hkdf_extract(key, bytearray(label_arr) + bytes([1]), hash_alg)
203 hash_alg = input_vector["cipher_suite"].split("_")[-1].lower()
204 zeros = bytearray([0] * hashlib.new(hash_alg).digest_size)
207 h = hashlib.new(hash_alg)
211 secrets = {"early_secret": hkdf_extract(zeros, zeros, hash_alg)}
212 …ets["derived_secret"] = hkdf_expand_label(secrets["early_secret"], "derived", empty_hash, hash_alg)
[all …]
/dports/security/s2n/s2n-tls-1.1.2/tls/
H A Ds2n_signature_scheme.c28 .hash_alg = S2N_HASH_MD5_SHA1,
37 .hash_alg = S2N_HASH_SHA1,
46 .hash_alg = S2N_HASH_SHA224,
55 .hash_alg = S2N_HASH_SHA256,
64 .hash_alg = S2N_HASH_SHA384,
73 .hash_alg = S2N_HASH_SHA512,
83 .hash_alg = S2N_HASH_SHA1,
92 .hash_alg = S2N_HASH_SHA224,
101 .hash_alg = S2N_HASH_SHA256,
110 .hash_alg = S2N_HASH_SHA384,
[all …]
/dports/security/py-asyncssh/asyncssh-2.8.1/asyncssh/crypto/
H A Drsa.py118 def decrypt(self, data, hash_alg): argument
122 hash_alg = hashes[hash_alg]()
124 return priv_key.decrypt(data, OAEP(MGF1(hash_alg), hash_alg, None))
128 def sign(self, data, hash_alg): argument
132 return priv_key.sign(data, PKCS1v15(), hashes[hash_alg]())
147 def encrypt(self, data, hash_alg): argument
151 hash_alg = hashes[hash_alg]()
153 return pub_key.encrypt(data, OAEP(MGF1(hash_alg), hash_alg, None))
157 def verify(self, data, sig, hash_alg): argument
162 pub_key.verify(sig, data, PKCS1v15(), hashes[hash_alg]())
/dports/security/pam_ssh/pam_ssh-8.0/openssh/
H A Dssh-rsa.c43 rsa_hash_alg_ident(int hash_alg) in rsa_hash_alg_ident() argument
45 switch (hash_alg) { in rsa_hash_alg_ident()
171 int nid, hash_alg, ret = SSH_ERR_INTERNAL_ERROR; in ssh_rsa_sign() local
180 hash_alg = SSH_DIGEST_SHA1; in ssh_rsa_sign()
182 hash_alg = rsa_hash_id_from_keyname(alg_ident); in ssh_rsa_sign()
194 nid = rsa_hash_alg_nid(hash_alg); in ssh_rsa_sign()
195 if ((dlen = ssh_digest_bytes(hash_alg)) == 0) in ssh_rsa_sign()
283 if (hash_alg != want_alg) { in ssh_rsa_verify()
313 if ((dlen = ssh_digest_bytes(hash_alg)) == 0) { in ssh_rsa_verify()
383 switch (hash_alg) { in rsa_hash_alg_oid()
[all …]
/dports/security/openssh-portable/openssh-8.8p1/
H A Dssh-rsa.c43 rsa_hash_alg_ident(int hash_alg) in rsa_hash_alg_ident() argument
45 switch (hash_alg) { in rsa_hash_alg_ident()
171 int nid, hash_alg, ret = SSH_ERR_INTERNAL_ERROR; in ssh_rsa_sign() local
180 hash_alg = SSH_DIGEST_SHA1; in ssh_rsa_sign()
182 hash_alg = rsa_hash_id_from_keyname(alg_ident); in ssh_rsa_sign()
194 nid = rsa_hash_alg_nid(hash_alg); in ssh_rsa_sign()
195 if ((dlen = ssh_digest_bytes(hash_alg)) == 0) in ssh_rsa_sign()
283 if (hash_alg != want_alg) { in ssh_rsa_verify()
313 if ((dlen = ssh_digest_bytes(hash_alg)) == 0) { in ssh_rsa_verify()
383 switch (hash_alg) { in rsa_hash_alg_oid()
[all …]
/dports/security/py-authlib/Authlib-0.15.5/authlib/jose/rfc7518/_cryptography_backends/
H A D_jws.py37 self.hash_alg = getattr(self, 'SHA{}'.format(sha_type))
45 return op_key.sign(msg, self.padding, self.hash_alg())
70 self.hash_alg = getattr(self, 'SHA{}'.format(sha_type))
77 der_sig = op_key.sign(msg, ECDSA(self.hash_alg()))
95 op_key.verify(der_sig, msg, ECDSA(self.hash_alg()))
126 mgf=padding.MGF1(self.hash_alg()),
127 salt_length=self.hash_alg.digest_size
129 self.hash_alg()
139 mgf=padding.MGF1(self.hash_alg()),
140 salt_length=self.hash_alg.digest_size
[all …]
/dports/www/py-pyjwt1/PyJWT-1.7.1/jwt/
H A Dalgorithms.py136 def __init__(self, hash_alg): argument
137 self.hash_alg = hash_alg
173 return hmac.new(key, msg, self.hash_alg).digest()
190 def __init__(self, hash_alg): argument
191 self.hash_alg = hash_alg
331 def __init__(self, hash_alg): argument
332 self.hash_alg = hash_alg
384 mgf=padding.MGF1(self.hash_alg()),
385 salt_length=self.hash_alg.digest_size
387 self.hash_alg()
[all …]
/dports/devel/py-oci/oci-2.53.1/src/oci/_vendor/jwt/
H A Dalgorithms.py141 def __init__(self, hash_alg): argument
142 self.hash_alg = hash_alg
178 return hmac.new(key, msg, self.hash_alg).digest()
195 def __init__(self, hash_alg): argument
196 self.hash_alg = hash_alg
336 def __init__(self, hash_alg): argument
337 self.hash_alg = hash_alg
389 mgf=padding.MGF1(self.hash_alg()),
390 salt_length=self.hash_alg.digest_size
392 self.hash_alg()
[all …]
/dports/security/intel-ipsec-mb/intel-ipsec-mb-55179f0/test/
H A Dipsec_xvalid.c619 .hash_alg = IMB_AUTH_NULL,
764 job_params->hash_alg == params->hash_alg && in print_algo_info()
782 if (job_params->hash_alg == params->hash_alg) { in print_algo_info()
863 job->hash_alg = params->hash_alg; in fill_job()
864 switch (params->hash_alg) { in fill_job()
1085 switch (params->hash_alg) { in prepare_keys()
1186 switch (params->hash_alg) { in prepare_keys()
2012 params->hash_alg = custom_job_params.hash_alg; in run_test()
2018 JOB_HASH_ALG hash_alg; in run_test() local
2036 hash_alg++) { in run_test()
[all …]
/dports/multimedia/librist/librist-5c1f4a06ab46e16e6bba42fe7381d8353020a1fd/contrib/mbedtls/library/
H A Dssl_tls13_keys.c134 mbedtls_md_type_t hash_alg, in mbedtls_ssl_tls1_3_hkdf_expand_label() argument
164 md = mbedtls_md_info_from_type( hash_alg ); in mbedtls_ssl_tls1_3_hkdf_expand_label()
197 mbedtls_md_type_t hash_alg, in mbedtls_ssl_tls1_3_make_traffic_keys() argument
205 ret = mbedtls_ssl_tls1_3_hkdf_expand_label( hash_alg, in mbedtls_ssl_tls1_3_make_traffic_keys()
213 ret = mbedtls_ssl_tls1_3_hkdf_expand_label( hash_alg, in mbedtls_ssl_tls1_3_make_traffic_keys()
221 ret = mbedtls_ssl_tls1_3_hkdf_expand_label( hash_alg, in mbedtls_ssl_tls1_3_make_traffic_keys()
244 mbedtls_md_type_t hash_alg, in mbedtls_ssl_tls1_3_derive_secret() argument
255 md = mbedtls_md_info_from_type( hash_alg ); in mbedtls_ssl_tls1_3_derive_secret()
288 mbedtls_md_type_t hash_alg, in mbedtls_ssl_tls1_3_evolve_secret() argument
299 md = mbedtls_md_info_from_type( hash_alg ); in mbedtls_ssl_tls1_3_evolve_secret()
[all …]
/dports/devel/premake5/premake-5.0.0-alpha16-src/contrib/mbedtls/library/
H A Dssl_tls13_keys.c134 mbedtls_md_type_t hash_alg, in mbedtls_ssl_tls1_3_hkdf_expand_label() argument
164 md = mbedtls_md_info_from_type( hash_alg ); in mbedtls_ssl_tls1_3_hkdf_expand_label()
197 mbedtls_md_type_t hash_alg, in mbedtls_ssl_tls1_3_make_traffic_keys() argument
205 ret = mbedtls_ssl_tls1_3_hkdf_expand_label( hash_alg, in mbedtls_ssl_tls1_3_make_traffic_keys()
213 ret = mbedtls_ssl_tls1_3_hkdf_expand_label( hash_alg, in mbedtls_ssl_tls1_3_make_traffic_keys()
221 ret = mbedtls_ssl_tls1_3_hkdf_expand_label( hash_alg, in mbedtls_ssl_tls1_3_make_traffic_keys()
244 mbedtls_md_type_t hash_alg, in mbedtls_ssl_tls1_3_derive_secret() argument
255 md = mbedtls_md_info_from_type( hash_alg ); in mbedtls_ssl_tls1_3_derive_secret()
288 mbedtls_md_type_t hash_alg, in mbedtls_ssl_tls1_3_evolve_secret() argument
299 md = mbedtls_md_info_from_type( hash_alg ); in mbedtls_ssl_tls1_3_evolve_secret()
[all …]
/dports/www/hiawatha/hiawatha-10.12/mbedtls/library/
H A Dssl_tls13_keys.c134 mbedtls_md_type_t hash_alg, in mbedtls_ssl_tls1_3_hkdf_expand_label() argument
164 md = mbedtls_md_info_from_type( hash_alg ); in mbedtls_ssl_tls1_3_hkdf_expand_label()
197 mbedtls_md_type_t hash_alg, in mbedtls_ssl_tls1_3_make_traffic_keys() argument
205 ret = mbedtls_ssl_tls1_3_hkdf_expand_label( hash_alg, in mbedtls_ssl_tls1_3_make_traffic_keys()
213 ret = mbedtls_ssl_tls1_3_hkdf_expand_label( hash_alg, in mbedtls_ssl_tls1_3_make_traffic_keys()
221 ret = mbedtls_ssl_tls1_3_hkdf_expand_label( hash_alg, in mbedtls_ssl_tls1_3_make_traffic_keys()
244 mbedtls_md_type_t hash_alg, in mbedtls_ssl_tls1_3_derive_secret() argument
255 md = mbedtls_md_info_from_type( hash_alg ); in mbedtls_ssl_tls1_3_derive_secret()
288 mbedtls_md_type_t hash_alg, in mbedtls_ssl_tls1_3_evolve_secret() argument
299 md = mbedtls_md_info_from_type( hash_alg ); in mbedtls_ssl_tls1_3_evolve_secret()
[all …]
/dports/sysutils/fluent-bit/fluent-bit-1.8.11/lib/mbedtls-2.27.0/library/
H A Dssl_tls13_keys.c134 mbedtls_md_type_t hash_alg, in mbedtls_ssl_tls1_3_hkdf_expand_label() argument
164 md = mbedtls_md_info_from_type( hash_alg ); in mbedtls_ssl_tls1_3_hkdf_expand_label()
197 mbedtls_md_type_t hash_alg, in mbedtls_ssl_tls1_3_make_traffic_keys() argument
205 ret = mbedtls_ssl_tls1_3_hkdf_expand_label( hash_alg, in mbedtls_ssl_tls1_3_make_traffic_keys()
213 ret = mbedtls_ssl_tls1_3_hkdf_expand_label( hash_alg, in mbedtls_ssl_tls1_3_make_traffic_keys()
221 ret = mbedtls_ssl_tls1_3_hkdf_expand_label( hash_alg, in mbedtls_ssl_tls1_3_make_traffic_keys()
244 mbedtls_md_type_t hash_alg, in mbedtls_ssl_tls1_3_derive_secret() argument
255 md = mbedtls_md_info_from_type( hash_alg ); in mbedtls_ssl_tls1_3_derive_secret()
288 mbedtls_md_type_t hash_alg, in mbedtls_ssl_tls1_3_evolve_secret() argument
299 md = mbedtls_md_info_from_type( hash_alg ); in mbedtls_ssl_tls1_3_evolve_secret()
[all …]
/dports/biology/sra-tools/sra-tools-2.11.0/ncbi-vdb/libs/ext/mbedtls/
H A Dssl_tls13_keys.c134 mbedtls_md_type_t hash_alg, in mbedtls_ssl_tls1_3_hkdf_expand_label() argument
164 md = vdb_mbedtls_md_info_from_type( hash_alg ); in mbedtls_ssl_tls1_3_hkdf_expand_label()
197 mbedtls_md_type_t hash_alg, in mbedtls_ssl_tls1_3_make_traffic_keys() argument
205 ret = mbedtls_ssl_tls1_3_hkdf_expand_label( hash_alg, in mbedtls_ssl_tls1_3_make_traffic_keys()
213 ret = mbedtls_ssl_tls1_3_hkdf_expand_label( hash_alg, in mbedtls_ssl_tls1_3_make_traffic_keys()
221 ret = mbedtls_ssl_tls1_3_hkdf_expand_label( hash_alg, in mbedtls_ssl_tls1_3_make_traffic_keys()
244 mbedtls_md_type_t hash_alg, in mbedtls_ssl_tls1_3_derive_secret() argument
255 md = vdb_mbedtls_md_info_from_type( hash_alg ); in mbedtls_ssl_tls1_3_derive_secret()
288 mbedtls_md_type_t hash_alg, in mbedtls_ssl_tls1_3_evolve_secret() argument
299 md = vdb_mbedtls_md_info_from_type( hash_alg ); in mbedtls_ssl_tls1_3_evolve_secret()
[all …]
/dports/biology/ncbi-vdb/ncbi-vdb-2.11.0/libs/ext/mbedtls/
H A Dssl_tls13_keys.c134 mbedtls_md_type_t hash_alg, in mbedtls_ssl_tls1_3_hkdf_expand_label() argument
164 md = vdb_mbedtls_md_info_from_type( hash_alg ); in mbedtls_ssl_tls1_3_hkdf_expand_label()
197 mbedtls_md_type_t hash_alg, in mbedtls_ssl_tls1_3_make_traffic_keys() argument
205 ret = mbedtls_ssl_tls1_3_hkdf_expand_label( hash_alg, in mbedtls_ssl_tls1_3_make_traffic_keys()
213 ret = mbedtls_ssl_tls1_3_hkdf_expand_label( hash_alg, in mbedtls_ssl_tls1_3_make_traffic_keys()
221 ret = mbedtls_ssl_tls1_3_hkdf_expand_label( hash_alg, in mbedtls_ssl_tls1_3_make_traffic_keys()
244 mbedtls_md_type_t hash_alg, in mbedtls_ssl_tls1_3_derive_secret() argument
255 md = vdb_mbedtls_md_info_from_type( hash_alg ); in mbedtls_ssl_tls1_3_derive_secret()
288 mbedtls_md_type_t hash_alg, in mbedtls_ssl_tls1_3_evolve_secret() argument
299 md = vdb_mbedtls_md_info_from_type( hash_alg ); in mbedtls_ssl_tls1_3_evolve_secret()
[all …]
/dports/net-im/libstrophe/libstrophe-0.11.0/src/
H A Dscram.h26 struct hash_alg { struct
36 extern const struct hash_alg scram_sha1; argument
37 extern const struct hash_alg scram_sha256;
38 extern const struct hash_alg scram_sha512;
40 void SCRAM_ClientKey(const struct hash_alg *alg,
48 void SCRAM_ClientSignature(const struct hash_alg *alg,
54 void SCRAM_ClientProof(const struct hash_alg *alg,
/dports/multimedia/v4l_compat/linux-5.13-rc2/fs/verity/
H A Dsignature.c44 const struct fsverity_hash_alg *hash_alg = vi->tree_params.hash_alg; in fsverity_verify_signature() local
57 d = kzalloc(sizeof(*d) + hash_alg->digest_size, GFP_KERNEL); in fsverity_verify_signature()
61 d->digest_algorithm = cpu_to_le16(hash_alg - fsverity_hash_algs); in fsverity_verify_signature()
62 d->digest_size = cpu_to_le16(hash_alg->digest_size); in fsverity_verify_signature()
63 memcpy(d->digest, vi->file_digest, hash_alg->digest_size); in fsverity_verify_signature()
65 err = verify_pkcs7_signature(d, sizeof(*d) + hash_alg->digest_size, in fsverity_verify_signature()
86 hash_alg->name, hash_alg->digest_size, vi->file_digest); in fsverity_verify_signature()
/dports/multimedia/libv4l/linux-5.13-rc2/fs/verity/
H A Dsignature.c44 const struct fsverity_hash_alg *hash_alg = vi->tree_params.hash_alg; in fsverity_verify_signature() local
57 d = kzalloc(sizeof(*d) + hash_alg->digest_size, GFP_KERNEL); in fsverity_verify_signature()
61 d->digest_algorithm = cpu_to_le16(hash_alg - fsverity_hash_algs); in fsverity_verify_signature()
62 d->digest_size = cpu_to_le16(hash_alg->digest_size); in fsverity_verify_signature()
63 memcpy(d->digest, vi->file_digest, hash_alg->digest_size); in fsverity_verify_signature()
65 err = verify_pkcs7_signature(d, sizeof(*d) + hash_alg->digest_size, in fsverity_verify_signature()
86 hash_alg->name, hash_alg->digest_size, vi->file_digest); in fsverity_verify_signature()

12345678910>>...46