Home
last modified time | relevance | path

Searched refs:hash (Results 1 - 25 of 53) sorted by relevance

123

/device/soc/rockchip/common/kernel/drivers/net/wireless/rockchip_wlan/rkwifi/bcmdhd_wifi6/
H A Dbcmbloom.c55 bcm_bloom_hash_t *hash; /* array of hash functions */ member
83 bp->hash = (*alloc_cb)(cb_ctx, sizeof(*bp->hash) * max_hash); in bcm_bloom_create()
84 memset(bp->hash, 0, sizeof(*bp->hash) * max_hash); in bcm_bloom_create()
86 if (!bp->hash) { in bcm_bloom_create()
124 if (bp->hash) in bcm_bloom_destroy()
125 (*free_cb)(bp->cb_ctx, bp->hash, in bcm_bloom_destroy()
126 sizeof(*bp->hash) * b in bcm_bloom_destroy()
134 bcm_bloom_add_hash(bcm_bloom_filter_t *bp, bcm_bloom_hash_t hash, uint *idx) bcm_bloom_add_hash() argument
[all...]
H A Ddhd_flowring.c368 /* Allocate per interface hash table (for fast lookup from interface to flow ring) */ in dhd_flow_rings_init()
377 /* Initialize per interface hash table */ in dhd_flow_rings_init()
519 /** Uses hash table to quickly map from ifindex to a flow ring 'role' (STA/AP) */
549 /** Uses hash table to quickly map from ifindex+prio+da to a flow ring id */
553 int hash; in dhd_flowid_find() local
572 hash = DHD_FLOWRING_HASHINDEX(da, prio); in dhd_flowid_find()
573 cur = if_flow_lkup[ifindex].fl_hash[hash]; in dhd_flowid_find()
595 hash = 0; in dhd_flowid_find()
597 hash = DHD_FLOWRING_HASHINDEX(da, prio); in dhd_flowid_find()
600 cur = if_flow_lkup[ifindex].fl_hash[hash]; in dhd_flowid_find()
624 int hash; dhd_flowid_alloc() local
[all...]
/device/soc/hisilicon/hi3516dv300/sdk_linux/drv/interdrv/common/cipher/src/drv/cipher_v1.0/drivers/crypto/
H A Dcryp_hash.c25 /* size of hash physical memory 1M */
39 /* first byte of hash padding */
50 /* SHA-1, the initial hash value, H(0) */
57 /* SHA-224, the initial hash value, H(0) */
67 /* SHA-256, the initial hash value, H(0) */
77 /* SHA-384, the initial hash value, H(0) */
87 /* SHA-512, the initial hash value, H(0) */
97 /* SM3, the initial hash value, H(0) */
107 /* hash function list */
113 * \brief hash contex
123 hi_u32 hash[HASH_RESULT_MAX_SIZE_IN_WORD]; /* buffer to store the result */ global() member
592 cryp_hash_finish(hi_void *ctx, hi_void *hash, hi_u32 hash_buf_len, hi_u32 *hashlen) cryp_hash_finish() argument
[all...]
/device/soc/hisilicon/hi3861v100/sdk_liteos/platform/system/upg/
H A Dupg_check_boot_bin.c23 hi_u8 hash[SHA_256_LENGTH]; in upg_check_boot_root_pub_key() local
34 (hi_void) memset_s(hash, SHA_256_LENGTH, 0, SHA_256_LENGTH); in upg_check_boot_root_pub_key()
35 hi_u32 ret = hi_cipher_hash_sha256((uintptr_t)pubk, pubk_len, hash, sizeof(hash)); in upg_check_boot_root_pub_key()
46 if (memcmp(hash, efuse_hash, SHA_256_LENGTH) != EOK) { in upg_check_boot_root_pub_key()
131 hi_u8 hash[SHA_256_LENGTH] = { 0 }; in upg_check_boot_sub_key() local
141 ret = hi_cipher_hash_sha256((uintptr_t)sub_key, sizeof(sub_ecc_key) - ECC_64_BYTES, hash, sizeof(hash)); in upg_check_boot_sub_key()
143 upg_print("[upg check bootbin]hash ecc key hash er in upg_check_boot_sub_key()
243 hi_u8 hash[SHA_256_LENGTH] = { 0 }; upg_check_boot_from_mem() local
314 hi_u8 hash[SHA_256_LENGTH] = { 0 }; upg_check_unencrpt_boot_code() local
[all...]
H A Dupg_check_secure.c44 hi_u32 upg_hash_one_content(hi_u32 flash_addr, hi_u32 total_size, hi_u8 *hash, hi_u32 hash_size) in upg_hash_one_content() argument
55 upg_print("[upg hash one content]cipher start ret:0x%x \r\n", ret); in upg_hash_one_content()
64 upg_print("[upg hash one content]flash read ret:0x%x \r\n", ret); in upg_hash_one_content()
65 (hi_void) hi_cipher_hash_final(hash, hash_size); in upg_hash_one_content()
71 upg_print("[upg hash one content]hash update ret:0x%x \r\n", ret); in upg_hash_one_content()
76 return hi_cipher_hash_final(hash, hash_size); in upg_hash_one_content()
79 hi_u32 upg_hash_more_content(HI_CONST upg_verify_param *param, hi_u8 *hash, hi_u32 hash_size) in upg_hash_more_content() argument
90 upg_print("[upg hash more content]cipher start ret:0x%x \r\n", ret); in upg_hash_more_content()
105 upg_print("[upg hash mor in upg_hash_more_content()
139 hi_u8 hash[SHA_256_LEN] = { 0 }; upg_secure_verify() local
[all...]
/device/soc/hisilicon/hi3861v100/sdk_liteos/boot/flashboot/upg/
H A Dboot_upg_tool.c74 boot_msg4("code hash ret-size-offset-headsize", ret, size, offset, hash_size); in kernel_comprss_flash_hash()
85 /* Cal hash of common section head */ in kernel_comprss_flash_hash()
89 boot_msg4("head hash updata ret-size-offset-hashsize", ret, size, offset, hash_size); in kernel_comprss_flash_hash()
92 /* Cal hash of common section */ in kernel_comprss_flash_hash()
101 boot_msg4("code head hash ret-size-offset-hashsize", ret, size, offset, hash_size); in kernel_comprss_flash_hash()
125 hi_u32 boot_upg_hash_one_content(hi_u32 flash_addr, hi_u32 total_size, hi_u8 *hash, hi_u32 hash_size) in boot_upg_hash_one_content() argument
132 boot_msg1("[bootupg hash one content]start ret:", ret); in boot_upg_hash_one_content()
140 (hi_void) hi_cipher_hash_final(hash, hash_size); in boot_upg_hash_one_content()
146 boot_msg1("[bootupg hash one content]update ret:", ret); in boot_upg_hash_one_content()
151 return hi_cipher_hash_final(hash, hash_siz in boot_upg_hash_one_content()
154 boot_upg_hash_more_content(HI_CONST upg_verify_param *param, hi_u8 *hash, hi_u32 hash_size) boot_upg_hash_more_content() argument
191 boot_upg_lzma_secure_verify(const upg_verify_param *param, hi_u8 *hash, hi_u32 hash_size) boot_upg_lzma_secure_verify() argument
230 boot_upg_lzma_secure_verify_code(const hi_upg_file_head *upg_head, hi_u8 *hash, hi_u32 hash_size) boot_upg_lzma_secure_verify_code() argument
268 boot_upg_lzma_unsecure_verify_code(const hi_upg_file_head *upg_head, hi_u8 *hash, hi_u32 hash_size) boot_upg_lzma_unsecure_verify_code() argument
285 hi_u8 hash[SHA_256_LEN] = { 0 }; boot_upg_check_before_decompress() local
[all...]
H A Dboot_upg_tool.h25 hi_u32 boot_upg_hash_one_content(hi_u32 flash_addr, hi_u32 total_size, hi_u8 *hash, hi_u32 hash_size);
26 hi_u32 boot_upg_hash_more_content(HI_CONST upg_verify_param *param, hi_u8 *hash, hi_u32 hash_size);
H A Dboot_upg_check_secure.c158 hi_u8 hash[SHA_256_LEN] = { 0 }; in boot_upg_secure_verify() local
160 hi_u32 ret = boot_upg_hash_more_content(param, hash, sizeof(hash)); in boot_upg_secure_verify()
163 boot_msg1("hash more content, ret:", ret); in boot_upg_secure_verify()
168 if (memcmp(param->sign, hash, SHA_256_LEN) != EOK) { in boot_upg_secure_verify()
182 .hash = hash, in boot_upg_secure_verify()
197 .hash = hash, in boot_upg_secure_verify()
/device/qemu/riscv32_virt/liteos_m/board/driver/video/
H A Dkey_cache.c72 PRINTK(" keyCache dump hash %d item %s %p %d\n", i, in KeyCacheDump()
98 uint32_t hash; in NameHash() local
99 hash = LOS_HashFNV32aBuf(name, len, FNV1_32A_INIT); in NameHash()
100 return hash; in NameHash()
105 int hash = NameHash(name, len) & PATH_CACHE_HASH_MASK; in KeyCacheInsert() local
106 LOS_ListAdd(&g_keyCacheHashEntrys[hash], &cache->hashEntry); in KeyCacheInsert()
152 int hash = NameHash(name, len) & PATH_CACHE_HASH_MASK; in KeyCacheLookup() local
153 LIST_HEAD *dhead = &g_keyCacheHashEntrys[hash]; in KeyCacheLookup()
/device/soc/hisilicon/hi3861v100/sdk_liteos/third_party/mbedtls/include/mbedtls/
H A Decdsa.h130 * \note If the bitlength of the message hash is larger than the
131 * bitlength of the group order, then the hash is truncated
146 * \param buf The content to be signed. This is usually the hash of
172 * \note If the bitlength of the message hash is larger than the
173 * bitlength of the group order, then the hash is truncated as
206 * \param md_alg The hash algorithm used to hash the original data.
224 * \note If the bitlength of the message hash is larger than the
225 * bitlength of the group order, then the hash is truncated as
245 * \param md_alg The hash algorith
[all...]
H A Drsa.h156 * \note The hash selected in \p hash_id is always used for OEAP
164 * \param hash_id The hash identifier of ::mbedtls_md_type_t type, if
408 * \param hash_id The #MBEDTLS_RSA_PKCS_V21 hash identifier.
896 * \param md_alg The message-digest algorithm used to hash the original data.
900 * \param hash The buffer holding the message digest or raw data.
904 * the size of the hash corresponding to \p md_alg.
919 const unsigned char *hash,
944 * \param md_alg The message-digest algorithm used to hash the original data.
948 * \param hash The buffer holding the message digest or raw data.
952 * the size of the hash correspondin
[all...]
H A Dpk_internal.h52 const unsigned char *hash, size_t hash_len,
57 const unsigned char *hash, size_t hash_len,
65 const unsigned char *hash, size_t hash_len,
71 const unsigned char *hash, size_t hash_len,
H A Dpkcs11.h126 * \param hash buffer holding the message digest
139 const unsigned char *hash,
156 const unsigned char *hash, unsigned char *sig ) in mbedtls_ssl_pkcs11_sign()
161 hashlen, hash, sig ); in mbedtls_ssl_pkcs11_sign()
153 mbedtls_ssl_pkcs11_sign( void *ctx, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng, int mode, mbedtls_md_type_t md_alg, unsigned int hashlen, const unsigned char *hash, unsigned char *sig ) mbedtls_ssl_pkcs11_sign() argument
H A Dpk.h186 const unsigned char *hash, unsigned char *sig );
312 * \param hash Hash of the message to sign
332 const unsigned char *hash, size_t hash_len,
345 * \param hash Hash of the message to sign
357 const unsigned char *hash, size_t hash_len,
369 * \param hash Hash of the message to sign
392 const unsigned char *hash, size_t hash_len,
401 * \param hash Hash of the message to sign
425 const unsigned char *hash, size_t hash_len,
444 * \param hash Has
[all...]
/device/soc/hisilicon/hi3861v100/sdk_liteos/boot/loaderboot/common/
H A Defuse_opt.c70 hi_u8 hash[SHA_256_LENGTH] = {0}; in efuse_cfg_verify() local
82 ret = hi_cipher_hash_sha256((uintptr_t)&(header->stru_ver), header->file_size - SHA_256_LENGTH, hash, in efuse_cfg_verify()
93 if (memcmp(header->hash, hash, SHA_256_LENGTH) != EOK) { in efuse_cfg_verify()
/device/soc/hisilicon/hi3861v100/sdk_liteos/include/
H A Dhi_cipher.h159 const hi_u8 *hash; /**< Hash data for ecc sign. */ member
160 hi_u32 hash_len; /**< The length of hash data, just 32 bytes is valid data. */
174 const hi_u8 *hash; /**< Hash data for ecc verify. */ member
175 hi_u32 hash_len; /**< The length of hash data, just 32 bytes is valid data. */
242 hi_cipher_hash_type sha_type; /**< sha_type, hash or hmac type. */
434 * Performs hash calculation on a segment of data and outputs the hash result.
442 * @param hash [OUT] type #hi_u8 *,Output the hash result. The length is 32 bytes.
444 * @param hash_len [IN] type #hi_u32, BUF length of the hash resul
[all...]
H A Dhks_client.h318 * @param hash [IN] type #const struct hks_blob *,Data to be signed. CNcomment:待签名的数据。CNend
330 const struct hks_key_param *key_param, const struct hks_blob *hash,
345 * @param hash [IN] type #const struct hks_blob *,Signed data. CNcomment:签名的数据。CNend
356 const struct hks_key_param *key_param, const struct hks_blob *hash,
535 * @brief Calculate the hash value of the data based on SHA256 or SHA512.
539 * Calculate the hash value of the data based on SHA256 or SHA512.
547 * @param hash [OUT] type #struct hks_blob *,Generated message verification code ,
548 hash and hash->data cannot be null constraint condition:
549 when alg is HKS_ALG_HASH_SHA_256, hash
[all...]
/device/soc/hisilicon/hi3861v100/hi3861_adapter/hals/communication/wifi_lite/wifiaware/source/
H A Dhal_wifiaware.c29 unsigned int HalCipherHashSha256(const char* input, unsigned int inputLen, unsigned char* hash, unsigned hashLen) in HalCipherHashSha256() argument
31 if (hi_cipher_hash_sha256((uintptr_t)input, inputLen, hash, hashLen) != HISI_OK) { in HalCipherHashSha256()
/device/soc/hisilicon/hi3861v100/sdk_liteos/boot/commonboot/
H A Dhi_cipher.h128 const hi_u8 *hash; /* Input hash data for ecc verify. */ member
129 hi_u32 hash_len; /* The length of hash data, just 32 bytes is valid data. */
140 hi_u8 *hash; /* The input hash value will be changed after hi_cipher_rsa_verify_hash execution, member
371 * Performs hash calculation on a segment of data and outputs the hash result.
379 * @param hash [OUT] type #hi_u8 *,Output the hash result. The length is 32 bytes.
381 * @param hash_len [IN] type #hi_u32, BUF length of the hash resul
[all...]
/device/soc/hisilicon/hi3861v100/sdk_liteos/tools/efuse_tool/
H A Defuse_cfg_gen.py71 hash = hashlib.sha256(data).digest() variable
72 bin_data = hash + data
/device/soc/hisilicon/hi3516dv300/sdk_linux/drv/interdrv/common/cipher/src/drv/cipher_v1.0/drivers/
H A Dkapi_hash.c53 /* hash mutex */
60 hi_log_error("error, hash lock failed\n"); \
91 /* API Code for kapi hash. */
152 /* allocate a hash channel */ in kapi_hash_create()
184 /* transform hash mode */ in kpai_hash_mode_transform()
225 hi_log_error("error, invalid hash type %d\n", type); in kpai_hash_mode_transform()
263 * If the length of K > B: hash K to obtain an L byte string, in kapi_hmac_start()
272 /* If the length of K > B: hash K to obtain an L byte string, in kapi_hmac_start()
320 static hi_s32 kapi_hmac_finish(kapi_hash_ctx *ctx, hi_u8 *hash, hi_u32 hash_buf_len, hi_u32 *hashlen) in kapi_hmac_finish() argument
354 ret = ctx->func->finish(ctx->cryp_ctx, hash, hash_buf_le in kapi_hmac_finish()
364 kapi_hash_finsh_calc(kapi_hash_ctx *ctx, hi_u8 *hash, hi_u32 hash_buf_len, hi_u32 *hashlen) kapi_hash_finsh_calc() argument
586 kapi_hash_finish(hi_u32 id, hi_u8 *hash, hi_u32 hash_buf_len, hi_u32 *hashlen) kapi_hash_finish() argument
[all...]
/device/soc/rockchip/common/sdk_linux/init/
H A Dinitramfs.c51 /* link hash */
55 static __initdata struct hash { struct
58 struct hash *next;
62 static inline int hash(int major, int minor, int ino) in hash() function
71 struct hash **p, *q; in find_link()
72 for (p = head + hash(major, minor, ino); *p; p = &(*p)->next) { in find_link()
87 q = kmalloc(sizeof(struct hash), GFP_KERNEL); in find_link()
89 panic("can't allocate link hash entry"); in find_link()
103 struct hash **p, *q; in free_hash()
/device/soc/hisilicon/hi3516dv300/sdk_linux/drv/interdrv/common/cipher/src/drv/cipher_v1.0/drivers/extend/
H A Dext_hash.c41 hi_log_error("error, invalid hash mode %d\n", mode); in mbedtls_hash_create()
48 hi_log_error("malloc hash context buffer failed!"); in mbedtls_hash_create()
139 hi_s32 mbedtls_hash_finish(hi_void *ctx, hi_void *hash, hi_u32 hash_buf_len, hi_u32 *hashlen) in mbedtls_hash_finish() argument
148 mbedtls_md_finish(md, hash); in mbedtls_hash_finish()
H A Dext_sm3.c53 /* SM3, the initial hash value, sm3_h(0). */
252 hi_u32 hash[SM3_RESULT_SIZE_IN_WORD] = {0}; in sm3_final() local
290 hash[i] = crypto_cpu_to_be32(ctx->state[i]); in sm3_final()
293 if (memcpy_s(digest, digest_len, hash, SM3_RESULT_SIZE) != EOK) { in sm3_final()
311 hi_log_error("malloc hash context buffer failed!"); in ext_sm3_create()
376 hi_s32 ext_sm3_finish(hi_void *ctx, hi_void *hash, hi_u32 hash_buf_len, hi_u32 *hashlen) in ext_sm3_finish() argument
383 ret = sm3_final(ctx, hash, hash_buf_len); in ext_sm3_finish()
/device/soc/hisilicon/hi3516dv300/sdk_linux/drv/interdrv/common/cipher/src/drv/cipher_v1.0/drivers/extend/include/
H A Dext_alg.h263 * brief Create hash mbedtls
267 * param ctx hash mode
278 * param ctx hash handle to be destroy
279 * param chunk hash message to update
280 * param length length of hash message
281 * param src source of hash message
289 * param hash HASH checksum result
292 hi_s32 mbedtls_hash_finish(hi_void *ctx, hi_void *hash, hi_u32 *hashlen);
295 * brief Clear hash context
306 hi_s32 ext_sm3_finish(hi_void *ctx, hi_void *hash, hi_u3
[all...]

Completed in 15 milliseconds

123