/dports/www/firefox-esr/firefox-91.8.0/security/nss/gtests/pk11_gtest/ |
H A D | pk11_pbkdf2_unittest.cc | 23 void Derive(std::vector<uint8_t>& derived, SECOidTag hash_alg) { in Pkcs11ModuleTest() 30 EXPECT_TRUE(DeriveBytes(pass, salt, derived, hash_alg, kIterations)); in Pkcs11ModuleTest() 41 SECOidTag next_hash_alg = static_cast<SECOidTag>(hash_alg + 1); in Pkcs11ModuleTest() 48 void KeySizes(SECOidTag hash_alg) { 89 std::vector<uint8_t>& derived, SECOidTag hash_alg, 98 PK11_CreatePBEV2AlgorithmID(SEC_OID_PKCS5_PBKDF2, hash_alg, hash_alg, 114 SECOidTag hash_alg, unsigned int kIterations) { 117 PK11_CreatePBEV2AlgorithmID(SEC_OID_PKCS5_PBKDF2, hash_alg, hash_alg, 130 SECOidTag hash_alg, unsigned int kIterations) { 140 SECOidTag hash_alg, unsigned int kIterations) { [all …]
|
/dports/security/ca_root_nss/nss-3.71/nss/gtests/pk11_gtest/ |
H A D | pk11_pbkdf2_unittest.cc | 23 void Derive(std::vector<uint8_t>& derived, SECOidTag hash_alg) { in Derive() argument 30 EXPECT_TRUE(DeriveBytes(pass, salt, derived, hash_alg, kIterations)); in Derive() 41 SECOidTag next_hash_alg = static_cast<SECOidTag>(hash_alg + 1); in Derive() 48 void KeySizes(SECOidTag hash_alg) { in KeySizes() argument 89 std::vector<uint8_t>& derived, SECOidTag hash_alg, in DeriveBytes() argument 98 PK11_CreatePBEV2AlgorithmID(SEC_OID_PKCS5_PBKDF2, hash_alg, hash_alg, in DeriveBytes() 114 SECOidTag hash_alg, unsigned int kIterations) { in GenerateKey() argument 117 PK11_CreatePBEV2AlgorithmID(SEC_OID_PKCS5_PBKDF2, hash_alg, hash_alg, in GenerateKey() 130 SECOidTag hash_alg, unsigned int kIterations) { in KeySizeParam() argument 140 SECOidTag hash_alg, unsigned int kIterations) { in MalformedSalt() argument [all …]
|
/dports/www/firefox/firefox-99.0/security/nss/gtests/pk11_gtest/ |
H A D | pk11_pbkdf2_unittest.cc | 23 void Derive(std::vector<uint8_t>& derived, SECOidTag hash_alg) { in Derive() argument 30 EXPECT_TRUE(DeriveBytes(pass, salt, derived, hash_alg, kIterations)); in Derive() 41 SECOidTag next_hash_alg = static_cast<SECOidTag>(hash_alg + 1); in Derive() 48 void KeySizes(SECOidTag hash_alg) { in KeySizes() argument 89 std::vector<uint8_t>& derived, SECOidTag hash_alg, in DeriveBytes() argument 98 PK11_CreatePBEV2AlgorithmID(SEC_OID_PKCS5_PBKDF2, hash_alg, hash_alg, in DeriveBytes() 114 SECOidTag hash_alg, unsigned int kIterations) { in GenerateKey() argument 117 PK11_CreatePBEV2AlgorithmID(SEC_OID_PKCS5_PBKDF2, hash_alg, hash_alg, in GenerateKey() 130 SECOidTag hash_alg, unsigned int kIterations) { in KeySizeParam() argument 140 SECOidTag hash_alg, unsigned int kIterations) { in MalformedSalt() argument [all …]
|
/dports/security/nss/nss-3.76.1/nss/gtests/pk11_gtest/ |
H A D | pk11_pbkdf2_unittest.cc | 23 void Derive(std::vector<uint8_t>& derived, SECOidTag hash_alg) { in Derive() argument 30 EXPECT_TRUE(DeriveBytes(pass, salt, derived, hash_alg, kIterations)); in Derive() 41 SECOidTag next_hash_alg = static_cast<SECOidTag>(hash_alg + 1); in Derive() 48 void KeySizes(SECOidTag hash_alg) { in KeySizes() argument 89 std::vector<uint8_t>& derived, SECOidTag hash_alg, in DeriveBytes() argument 98 PK11_CreatePBEV2AlgorithmID(SEC_OID_PKCS5_PBKDF2, hash_alg, hash_alg, in DeriveBytes() 114 SECOidTag hash_alg, unsigned int kIterations) { in GenerateKey() argument 117 PK11_CreatePBEV2AlgorithmID(SEC_OID_PKCS5_PBKDF2, hash_alg, hash_alg, in GenerateKey() 130 SECOidTag hash_alg, unsigned int kIterations) { in KeySizeParam() argument 140 SECOidTag hash_alg, unsigned int kIterations) { in MalformedSalt() argument [all …]
|
/dports/mail/thunderbird/thunderbird-91.8.0/security/nss/gtests/pk11_gtest/ |
H A D | pk11_pbkdf2_unittest.cc | 23 void Derive(std::vector<uint8_t>& derived, SECOidTag hash_alg) { in Derive() argument 30 EXPECT_TRUE(DeriveBytes(pass, salt, derived, hash_alg, kIterations)); in Derive() 41 SECOidTag next_hash_alg = static_cast<SECOidTag>(hash_alg + 1); in Derive() 48 void KeySizes(SECOidTag hash_alg) { in KeySizes() argument 89 std::vector<uint8_t>& derived, SECOidTag hash_alg, in DeriveBytes() argument 98 PK11_CreatePBEV2AlgorithmID(SEC_OID_PKCS5_PBKDF2, hash_alg, hash_alg, in DeriveBytes() 114 SECOidTag hash_alg, unsigned int kIterations) { in GenerateKey() argument 117 PK11_CreatePBEV2AlgorithmID(SEC_OID_PKCS5_PBKDF2, hash_alg, hash_alg, in GenerateKey() 130 SECOidTag hash_alg, unsigned int kIterations) { in KeySizeParam() argument 140 SECOidTag hash_alg, unsigned int kIterations) { in MalformedSalt() argument [all …]
|
/dports/security/p5-Crypt-OpenPGP/Crypt-OpenPGP-1.12/lib/Crypt/OpenPGP/ |
H A D | S2k.pm | 50 my($hash_alg) = @_; 51 $s2k->{hash} = ref($hash_alg) ? $hash_alg : 64 $s2k->{hash_alg} = $buf->get_int8; 67 $s2k->{hash_alg} = DEFAULT_DIGEST; 69 if ($s2k->{hash_alg}) { 81 $buf->put_int8($s2k->{hash_alg}); 94 $s2k->{hash_alg} = $buf->get_int8; 101 if ($s2k->{hash_alg}) { 113 $buf->put_int8($s2k->{hash_alg}); 136 if ($s2k->{hash_alg}) { [all …]
|
/dports/lang/spidermonkey78/firefox-78.9.0/security/nss/gtests/pk11_gtest/ |
H A D | pk11_pbkdf2_unittest.cc | 23 void Derive(std::vector<uint8_t>& derived, SECOidTag hash_alg) { in Derive() argument 30 EXPECT_TRUE(DeriveBytes(pass, salt, derived, hash_alg, kIterations)); in Derive() 41 SECOidTag next_hash_alg = static_cast<SECOidTag>(hash_alg + 1); in Derive() 45 EXPECT_FALSE(DeriveBytes(pass, salt, derived, hash_alg, kIterations + 1)); in Derive() 48 void KeySizes(SECOidTag hash_alg) { in KeySizes() argument 68 KeySizeParam(pass, salt, minus_key_size, hash_alg, kIterations)); in KeySizes() 73 KeySizeParam(pass, salt, negative_key_size, hash_alg, kIterations)); in KeySizes() 78 std::vector<uint8_t>& derived, SECOidTag hash_alg, in DeriveBytes() argument 87 PK11_CreatePBEV2AlgorithmID(SEC_OID_PKCS5_PBKDF2, hash_alg, hash_alg, in DeriveBytes() 103 SECOidTag hash_alg, unsigned int kIterations) { in KeySizeParam() argument [all …]
|
/dports/security/s2n/s2n-tls-1.1.2/tests/unit/kats/ |
H A D | generate_pq_hybrid_tls13_handshake_kats.py | 183 def hkdf_extract(key: bytes, info: bytes, hash_alg: str): 184 return hmac.new(key, info, hash_alg).digest() 186 def hkdf_expand_label(key: bytes, label: str, context: bytes, hash_alg: str): 187 label_arr = [0, hashlib.new(hash_alg).digest_size, len("tls13 ") + len(label)] 199 return hkdf_extract(key, bytearray(label_arr) + bytes([1]), hash_alg) 203 hash_alg = input_vector["cipher_suite"].split("_")[-1].lower() 204 zeros = bytearray([0] * hashlib.new(hash_alg).digest_size) 207 h = hashlib.new(hash_alg) 211 secrets = {"early_secret": hkdf_extract(zeros, zeros, hash_alg)} 212 …ets["derived_secret"] = hkdf_expand_label(secrets["early_secret"], "derived", empty_hash, hash_alg) [all …]
|
/dports/security/s2n/s2n-tls-1.1.2/tls/ |
H A D | s2n_signature_scheme.c | 28 .hash_alg = S2N_HASH_MD5_SHA1, 37 .hash_alg = S2N_HASH_SHA1, 46 .hash_alg = S2N_HASH_SHA224, 55 .hash_alg = S2N_HASH_SHA256, 64 .hash_alg = S2N_HASH_SHA384, 73 .hash_alg = S2N_HASH_SHA512, 83 .hash_alg = S2N_HASH_SHA1, 92 .hash_alg = S2N_HASH_SHA224, 101 .hash_alg = S2N_HASH_SHA256, 110 .hash_alg = S2N_HASH_SHA384, [all …]
|
/dports/security/py-asyncssh/asyncssh-2.8.1/asyncssh/crypto/ |
H A D | rsa.py | 118 def decrypt(self, data, hash_alg): argument 122 hash_alg = hashes[hash_alg]() 124 return priv_key.decrypt(data, OAEP(MGF1(hash_alg), hash_alg, None)) 128 def sign(self, data, hash_alg): argument 132 return priv_key.sign(data, PKCS1v15(), hashes[hash_alg]()) 147 def encrypt(self, data, hash_alg): argument 151 hash_alg = hashes[hash_alg]() 153 return pub_key.encrypt(data, OAEP(MGF1(hash_alg), hash_alg, None)) 157 def verify(self, data, sig, hash_alg): argument 162 pub_key.verify(sig, data, PKCS1v15(), hashes[hash_alg]())
|
/dports/security/pam_ssh/pam_ssh-8.0/openssh/ |
H A D | ssh-rsa.c | 43 rsa_hash_alg_ident(int hash_alg) in rsa_hash_alg_ident() argument 45 switch (hash_alg) { in rsa_hash_alg_ident() 171 int nid, hash_alg, ret = SSH_ERR_INTERNAL_ERROR; in ssh_rsa_sign() local 180 hash_alg = SSH_DIGEST_SHA1; in ssh_rsa_sign() 182 hash_alg = rsa_hash_id_from_keyname(alg_ident); in ssh_rsa_sign() 194 nid = rsa_hash_alg_nid(hash_alg); in ssh_rsa_sign() 195 if ((dlen = ssh_digest_bytes(hash_alg)) == 0) in ssh_rsa_sign() 283 if (hash_alg != want_alg) { in ssh_rsa_verify() 313 if ((dlen = ssh_digest_bytes(hash_alg)) == 0) { in ssh_rsa_verify() 383 switch (hash_alg) { in rsa_hash_alg_oid() [all …]
|
/dports/security/openssh-portable/openssh-8.8p1/ |
H A D | ssh-rsa.c | 43 rsa_hash_alg_ident(int hash_alg) in rsa_hash_alg_ident() argument 45 switch (hash_alg) { in rsa_hash_alg_ident() 171 int nid, hash_alg, ret = SSH_ERR_INTERNAL_ERROR; in ssh_rsa_sign() local 180 hash_alg = SSH_DIGEST_SHA1; in ssh_rsa_sign() 182 hash_alg = rsa_hash_id_from_keyname(alg_ident); in ssh_rsa_sign() 194 nid = rsa_hash_alg_nid(hash_alg); in ssh_rsa_sign() 195 if ((dlen = ssh_digest_bytes(hash_alg)) == 0) in ssh_rsa_sign() 283 if (hash_alg != want_alg) { in ssh_rsa_verify() 313 if ((dlen = ssh_digest_bytes(hash_alg)) == 0) { in ssh_rsa_verify() 383 switch (hash_alg) { in rsa_hash_alg_oid() [all …]
|
/dports/security/py-authlib/Authlib-0.15.5/authlib/jose/rfc7518/_cryptography_backends/ |
H A D | _jws.py | 37 self.hash_alg = getattr(self, 'SHA{}'.format(sha_type)) 45 return op_key.sign(msg, self.padding, self.hash_alg()) 70 self.hash_alg = getattr(self, 'SHA{}'.format(sha_type)) 77 der_sig = op_key.sign(msg, ECDSA(self.hash_alg())) 95 op_key.verify(der_sig, msg, ECDSA(self.hash_alg())) 126 mgf=padding.MGF1(self.hash_alg()), 127 salt_length=self.hash_alg.digest_size 129 self.hash_alg() 139 mgf=padding.MGF1(self.hash_alg()), 140 salt_length=self.hash_alg.digest_size [all …]
|
/dports/www/py-pyjwt1/PyJWT-1.7.1/jwt/ |
H A D | algorithms.py | 136 def __init__(self, hash_alg): argument 137 self.hash_alg = hash_alg 173 return hmac.new(key, msg, self.hash_alg).digest() 190 def __init__(self, hash_alg): argument 191 self.hash_alg = hash_alg 331 def __init__(self, hash_alg): argument 332 self.hash_alg = hash_alg 384 mgf=padding.MGF1(self.hash_alg()), 385 salt_length=self.hash_alg.digest_size 387 self.hash_alg() [all …]
|
/dports/devel/py-oci/oci-2.53.1/src/oci/_vendor/jwt/ |
H A D | algorithms.py | 141 def __init__(self, hash_alg): argument 142 self.hash_alg = hash_alg 178 return hmac.new(key, msg, self.hash_alg).digest() 195 def __init__(self, hash_alg): argument 196 self.hash_alg = hash_alg 336 def __init__(self, hash_alg): argument 337 self.hash_alg = hash_alg 389 mgf=padding.MGF1(self.hash_alg()), 390 salt_length=self.hash_alg.digest_size 392 self.hash_alg() [all …]
|
/dports/security/intel-ipsec-mb/intel-ipsec-mb-55179f0/test/ |
H A D | ipsec_xvalid.c | 619 .hash_alg = IMB_AUTH_NULL, 764 job_params->hash_alg == params->hash_alg && in print_algo_info() 782 if (job_params->hash_alg == params->hash_alg) { in print_algo_info() 863 job->hash_alg = params->hash_alg; in fill_job() 864 switch (params->hash_alg) { in fill_job() 1085 switch (params->hash_alg) { in prepare_keys() 1186 switch (params->hash_alg) { in prepare_keys() 2012 params->hash_alg = custom_job_params.hash_alg; in run_test() 2018 JOB_HASH_ALG hash_alg; in run_test() local 2036 hash_alg++) { in run_test() [all …]
|
/dports/multimedia/librist/librist-5c1f4a06ab46e16e6bba42fe7381d8353020a1fd/contrib/mbedtls/library/ |
H A D | ssl_tls13_keys.c | 134 mbedtls_md_type_t hash_alg, in mbedtls_ssl_tls1_3_hkdf_expand_label() argument 164 md = mbedtls_md_info_from_type( hash_alg ); in mbedtls_ssl_tls1_3_hkdf_expand_label() 197 mbedtls_md_type_t hash_alg, in mbedtls_ssl_tls1_3_make_traffic_keys() argument 205 ret = mbedtls_ssl_tls1_3_hkdf_expand_label( hash_alg, in mbedtls_ssl_tls1_3_make_traffic_keys() 213 ret = mbedtls_ssl_tls1_3_hkdf_expand_label( hash_alg, in mbedtls_ssl_tls1_3_make_traffic_keys() 221 ret = mbedtls_ssl_tls1_3_hkdf_expand_label( hash_alg, in mbedtls_ssl_tls1_3_make_traffic_keys() 244 mbedtls_md_type_t hash_alg, in mbedtls_ssl_tls1_3_derive_secret() argument 255 md = mbedtls_md_info_from_type( hash_alg ); in mbedtls_ssl_tls1_3_derive_secret() 288 mbedtls_md_type_t hash_alg, in mbedtls_ssl_tls1_3_evolve_secret() argument 299 md = mbedtls_md_info_from_type( hash_alg ); in mbedtls_ssl_tls1_3_evolve_secret() [all …]
|
/dports/devel/premake5/premake-5.0.0-alpha16-src/contrib/mbedtls/library/ |
H A D | ssl_tls13_keys.c | 134 mbedtls_md_type_t hash_alg, in mbedtls_ssl_tls1_3_hkdf_expand_label() argument 164 md = mbedtls_md_info_from_type( hash_alg ); in mbedtls_ssl_tls1_3_hkdf_expand_label() 197 mbedtls_md_type_t hash_alg, in mbedtls_ssl_tls1_3_make_traffic_keys() argument 205 ret = mbedtls_ssl_tls1_3_hkdf_expand_label( hash_alg, in mbedtls_ssl_tls1_3_make_traffic_keys() 213 ret = mbedtls_ssl_tls1_3_hkdf_expand_label( hash_alg, in mbedtls_ssl_tls1_3_make_traffic_keys() 221 ret = mbedtls_ssl_tls1_3_hkdf_expand_label( hash_alg, in mbedtls_ssl_tls1_3_make_traffic_keys() 244 mbedtls_md_type_t hash_alg, in mbedtls_ssl_tls1_3_derive_secret() argument 255 md = mbedtls_md_info_from_type( hash_alg ); in mbedtls_ssl_tls1_3_derive_secret() 288 mbedtls_md_type_t hash_alg, in mbedtls_ssl_tls1_3_evolve_secret() argument 299 md = mbedtls_md_info_from_type( hash_alg ); in mbedtls_ssl_tls1_3_evolve_secret() [all …]
|
/dports/www/hiawatha/hiawatha-10.12/mbedtls/library/ |
H A D | ssl_tls13_keys.c | 134 mbedtls_md_type_t hash_alg, in mbedtls_ssl_tls1_3_hkdf_expand_label() argument 164 md = mbedtls_md_info_from_type( hash_alg ); in mbedtls_ssl_tls1_3_hkdf_expand_label() 197 mbedtls_md_type_t hash_alg, in mbedtls_ssl_tls1_3_make_traffic_keys() argument 205 ret = mbedtls_ssl_tls1_3_hkdf_expand_label( hash_alg, in mbedtls_ssl_tls1_3_make_traffic_keys() 213 ret = mbedtls_ssl_tls1_3_hkdf_expand_label( hash_alg, in mbedtls_ssl_tls1_3_make_traffic_keys() 221 ret = mbedtls_ssl_tls1_3_hkdf_expand_label( hash_alg, in mbedtls_ssl_tls1_3_make_traffic_keys() 244 mbedtls_md_type_t hash_alg, in mbedtls_ssl_tls1_3_derive_secret() argument 255 md = mbedtls_md_info_from_type( hash_alg ); in mbedtls_ssl_tls1_3_derive_secret() 288 mbedtls_md_type_t hash_alg, in mbedtls_ssl_tls1_3_evolve_secret() argument 299 md = mbedtls_md_info_from_type( hash_alg ); in mbedtls_ssl_tls1_3_evolve_secret() [all …]
|
/dports/sysutils/fluent-bit/fluent-bit-1.8.11/lib/mbedtls-2.27.0/library/ |
H A D | ssl_tls13_keys.c | 134 mbedtls_md_type_t hash_alg, in mbedtls_ssl_tls1_3_hkdf_expand_label() argument 164 md = mbedtls_md_info_from_type( hash_alg ); in mbedtls_ssl_tls1_3_hkdf_expand_label() 197 mbedtls_md_type_t hash_alg, in mbedtls_ssl_tls1_3_make_traffic_keys() argument 205 ret = mbedtls_ssl_tls1_3_hkdf_expand_label( hash_alg, in mbedtls_ssl_tls1_3_make_traffic_keys() 213 ret = mbedtls_ssl_tls1_3_hkdf_expand_label( hash_alg, in mbedtls_ssl_tls1_3_make_traffic_keys() 221 ret = mbedtls_ssl_tls1_3_hkdf_expand_label( hash_alg, in mbedtls_ssl_tls1_3_make_traffic_keys() 244 mbedtls_md_type_t hash_alg, in mbedtls_ssl_tls1_3_derive_secret() argument 255 md = mbedtls_md_info_from_type( hash_alg ); in mbedtls_ssl_tls1_3_derive_secret() 288 mbedtls_md_type_t hash_alg, in mbedtls_ssl_tls1_3_evolve_secret() argument 299 md = mbedtls_md_info_from_type( hash_alg ); in mbedtls_ssl_tls1_3_evolve_secret() [all …]
|
/dports/biology/sra-tools/sra-tools-2.11.0/ncbi-vdb/libs/ext/mbedtls/ |
H A D | ssl_tls13_keys.c | 134 mbedtls_md_type_t hash_alg, in mbedtls_ssl_tls1_3_hkdf_expand_label() argument 164 md = vdb_mbedtls_md_info_from_type( hash_alg ); in mbedtls_ssl_tls1_3_hkdf_expand_label() 197 mbedtls_md_type_t hash_alg, in mbedtls_ssl_tls1_3_make_traffic_keys() argument 205 ret = mbedtls_ssl_tls1_3_hkdf_expand_label( hash_alg, in mbedtls_ssl_tls1_3_make_traffic_keys() 213 ret = mbedtls_ssl_tls1_3_hkdf_expand_label( hash_alg, in mbedtls_ssl_tls1_3_make_traffic_keys() 221 ret = mbedtls_ssl_tls1_3_hkdf_expand_label( hash_alg, in mbedtls_ssl_tls1_3_make_traffic_keys() 244 mbedtls_md_type_t hash_alg, in mbedtls_ssl_tls1_3_derive_secret() argument 255 md = vdb_mbedtls_md_info_from_type( hash_alg ); in mbedtls_ssl_tls1_3_derive_secret() 288 mbedtls_md_type_t hash_alg, in mbedtls_ssl_tls1_3_evolve_secret() argument 299 md = vdb_mbedtls_md_info_from_type( hash_alg ); in mbedtls_ssl_tls1_3_evolve_secret() [all …]
|
/dports/biology/ncbi-vdb/ncbi-vdb-2.11.0/libs/ext/mbedtls/ |
H A D | ssl_tls13_keys.c | 134 mbedtls_md_type_t hash_alg, in mbedtls_ssl_tls1_3_hkdf_expand_label() argument 164 md = vdb_mbedtls_md_info_from_type( hash_alg ); in mbedtls_ssl_tls1_3_hkdf_expand_label() 197 mbedtls_md_type_t hash_alg, in mbedtls_ssl_tls1_3_make_traffic_keys() argument 205 ret = mbedtls_ssl_tls1_3_hkdf_expand_label( hash_alg, in mbedtls_ssl_tls1_3_make_traffic_keys() 213 ret = mbedtls_ssl_tls1_3_hkdf_expand_label( hash_alg, in mbedtls_ssl_tls1_3_make_traffic_keys() 221 ret = mbedtls_ssl_tls1_3_hkdf_expand_label( hash_alg, in mbedtls_ssl_tls1_3_make_traffic_keys() 244 mbedtls_md_type_t hash_alg, in mbedtls_ssl_tls1_3_derive_secret() argument 255 md = vdb_mbedtls_md_info_from_type( hash_alg ); in mbedtls_ssl_tls1_3_derive_secret() 288 mbedtls_md_type_t hash_alg, in mbedtls_ssl_tls1_3_evolve_secret() argument 299 md = vdb_mbedtls_md_info_from_type( hash_alg ); in mbedtls_ssl_tls1_3_evolve_secret() [all …]
|
/dports/net-im/libstrophe/libstrophe-0.11.0/src/ |
H A D | scram.h | 26 struct hash_alg { struct 36 extern const struct hash_alg scram_sha1; argument 37 extern const struct hash_alg scram_sha256; 38 extern const struct hash_alg scram_sha512; 40 void SCRAM_ClientKey(const struct hash_alg *alg, 48 void SCRAM_ClientSignature(const struct hash_alg *alg, 54 void SCRAM_ClientProof(const struct hash_alg *alg,
|
/dports/multimedia/v4l_compat/linux-5.13-rc2/fs/verity/ |
H A D | signature.c | 44 const struct fsverity_hash_alg *hash_alg = vi->tree_params.hash_alg; in fsverity_verify_signature() local 57 d = kzalloc(sizeof(*d) + hash_alg->digest_size, GFP_KERNEL); in fsverity_verify_signature() 61 d->digest_algorithm = cpu_to_le16(hash_alg - fsverity_hash_algs); in fsverity_verify_signature() 62 d->digest_size = cpu_to_le16(hash_alg->digest_size); in fsverity_verify_signature() 63 memcpy(d->digest, vi->file_digest, hash_alg->digest_size); in fsverity_verify_signature() 65 err = verify_pkcs7_signature(d, sizeof(*d) + hash_alg->digest_size, in fsverity_verify_signature() 86 hash_alg->name, hash_alg->digest_size, vi->file_digest); in fsverity_verify_signature()
|
/dports/multimedia/libv4l/linux-5.13-rc2/fs/verity/ |
H A D | signature.c | 44 const struct fsverity_hash_alg *hash_alg = vi->tree_params.hash_alg; in fsverity_verify_signature() local 57 d = kzalloc(sizeof(*d) + hash_alg->digest_size, GFP_KERNEL); in fsverity_verify_signature() 61 d->digest_algorithm = cpu_to_le16(hash_alg - fsverity_hash_algs); in fsverity_verify_signature() 62 d->digest_size = cpu_to_le16(hash_alg->digest_size); in fsverity_verify_signature() 63 memcpy(d->digest, vi->file_digest, hash_alg->digest_size); in fsverity_verify_signature() 65 err = verify_pkcs7_signature(d, sizeof(*d) + hash_alg->digest_size, in fsverity_verify_signature() 86 hash_alg->name, hash_alg->digest_size, vi->file_digest); in fsverity_verify_signature()
|