/device/soc/rockchip/common/kernel/drivers/net/wireless/rockchip_wlan/rkwifi/bcmdhd_wifi6/ |
H A D | bcmbloom.c | 55 bcm_bloom_hash_t *hash; /* array of hash functions */ member 83 bp->hash = (*alloc_cb)(cb_ctx, sizeof(*bp->hash) * max_hash); in bcm_bloom_create() 84 memset(bp->hash, 0, sizeof(*bp->hash) * max_hash); in bcm_bloom_create() 86 if (!bp->hash) { in bcm_bloom_create() 124 if (bp->hash) in bcm_bloom_destroy() 125 (*free_cb)(bp->cb_ctx, bp->hash, in bcm_bloom_destroy() 126 sizeof(*bp->hash) * b in bcm_bloom_destroy() 134 bcm_bloom_add_hash(bcm_bloom_filter_t *bp, bcm_bloom_hash_t hash, uint *idx) bcm_bloom_add_hash() argument [all...] |
H A D | dhd_flowring.c | 368 /* Allocate per interface hash table (for fast lookup from interface to flow ring) */ in dhd_flow_rings_init() 377 /* Initialize per interface hash table */ in dhd_flow_rings_init() 519 /** Uses hash table to quickly map from ifindex to a flow ring 'role' (STA/AP) */ 549 /** Uses hash table to quickly map from ifindex+prio+da to a flow ring id */ 553 int hash; in dhd_flowid_find() local 572 hash = DHD_FLOWRING_HASHINDEX(da, prio); in dhd_flowid_find() 573 cur = if_flow_lkup[ifindex].fl_hash[hash]; in dhd_flowid_find() 595 hash = 0; in dhd_flowid_find() 597 hash = DHD_FLOWRING_HASHINDEX(da, prio); in dhd_flowid_find() 600 cur = if_flow_lkup[ifindex].fl_hash[hash]; in dhd_flowid_find() 624 int hash; dhd_flowid_alloc() local [all...] |
/device/soc/hisilicon/hi3516dv300/sdk_linux/drv/interdrv/common/cipher/src/drv/cipher_v1.0/drivers/crypto/ |
H A D | cryp_hash.c | 25 /* size of hash physical memory 1M */ 39 /* first byte of hash padding */ 50 /* SHA-1, the initial hash value, H(0) */ 57 /* SHA-224, the initial hash value, H(0) */ 67 /* SHA-256, the initial hash value, H(0) */ 77 /* SHA-384, the initial hash value, H(0) */ 87 /* SHA-512, the initial hash value, H(0) */ 97 /* SM3, the initial hash value, H(0) */ 107 /* hash function list */ 113 * \brief hash contex 123 hi_u32 hash[HASH_RESULT_MAX_SIZE_IN_WORD]; /* buffer to store the result */ global() member 592 cryp_hash_finish(hi_void *ctx, hi_void *hash, hi_u32 hash_buf_len, hi_u32 *hashlen) cryp_hash_finish() argument [all...] |
/device/soc/hisilicon/hi3861v100/sdk_liteos/platform/system/upg/ |
H A D | upg_check_boot_bin.c | 23 hi_u8 hash[SHA_256_LENGTH]; in upg_check_boot_root_pub_key() local 34 (hi_void) memset_s(hash, SHA_256_LENGTH, 0, SHA_256_LENGTH); in upg_check_boot_root_pub_key() 35 hi_u32 ret = hi_cipher_hash_sha256((uintptr_t)pubk, pubk_len, hash, sizeof(hash)); in upg_check_boot_root_pub_key() 46 if (memcmp(hash, efuse_hash, SHA_256_LENGTH) != EOK) { in upg_check_boot_root_pub_key() 131 hi_u8 hash[SHA_256_LENGTH] = { 0 }; in upg_check_boot_sub_key() local 141 ret = hi_cipher_hash_sha256((uintptr_t)sub_key, sizeof(sub_ecc_key) - ECC_64_BYTES, hash, sizeof(hash)); in upg_check_boot_sub_key() 143 upg_print("[upg check bootbin]hash ecc key hash er in upg_check_boot_sub_key() 243 hi_u8 hash[SHA_256_LENGTH] = { 0 }; upg_check_boot_from_mem() local 314 hi_u8 hash[SHA_256_LENGTH] = { 0 }; upg_check_unencrpt_boot_code() local [all...] |
H A D | upg_check_secure.c | 44 hi_u32 upg_hash_one_content(hi_u32 flash_addr, hi_u32 total_size, hi_u8 *hash, hi_u32 hash_size) in upg_hash_one_content() argument 55 upg_print("[upg hash one content]cipher start ret:0x%x \r\n", ret); in upg_hash_one_content() 64 upg_print("[upg hash one content]flash read ret:0x%x \r\n", ret); in upg_hash_one_content() 65 (hi_void) hi_cipher_hash_final(hash, hash_size); in upg_hash_one_content() 71 upg_print("[upg hash one content]hash update ret:0x%x \r\n", ret); in upg_hash_one_content() 76 return hi_cipher_hash_final(hash, hash_size); in upg_hash_one_content() 79 hi_u32 upg_hash_more_content(HI_CONST upg_verify_param *param, hi_u8 *hash, hi_u32 hash_size) in upg_hash_more_content() argument 90 upg_print("[upg hash more content]cipher start ret:0x%x \r\n", ret); in upg_hash_more_content() 105 upg_print("[upg hash mor in upg_hash_more_content() 139 hi_u8 hash[SHA_256_LEN] = { 0 }; upg_secure_verify() local [all...] |
/device/soc/hisilicon/hi3861v100/sdk_liteos/boot/flashboot/upg/ |
H A D | boot_upg_tool.c | 74 boot_msg4("code hash ret-size-offset-headsize", ret, size, offset, hash_size); in kernel_comprss_flash_hash() 85 /* Cal hash of common section head */ in kernel_comprss_flash_hash() 89 boot_msg4("head hash updata ret-size-offset-hashsize", ret, size, offset, hash_size); in kernel_comprss_flash_hash() 92 /* Cal hash of common section */ in kernel_comprss_flash_hash() 101 boot_msg4("code head hash ret-size-offset-hashsize", ret, size, offset, hash_size); in kernel_comprss_flash_hash() 125 hi_u32 boot_upg_hash_one_content(hi_u32 flash_addr, hi_u32 total_size, hi_u8 *hash, hi_u32 hash_size) in boot_upg_hash_one_content() argument 132 boot_msg1("[bootupg hash one content]start ret:", ret); in boot_upg_hash_one_content() 140 (hi_void) hi_cipher_hash_final(hash, hash_size); in boot_upg_hash_one_content() 146 boot_msg1("[bootupg hash one content]update ret:", ret); in boot_upg_hash_one_content() 151 return hi_cipher_hash_final(hash, hash_siz in boot_upg_hash_one_content() 154 boot_upg_hash_more_content(HI_CONST upg_verify_param *param, hi_u8 *hash, hi_u32 hash_size) boot_upg_hash_more_content() argument 191 boot_upg_lzma_secure_verify(const upg_verify_param *param, hi_u8 *hash, hi_u32 hash_size) boot_upg_lzma_secure_verify() argument 230 boot_upg_lzma_secure_verify_code(const hi_upg_file_head *upg_head, hi_u8 *hash, hi_u32 hash_size) boot_upg_lzma_secure_verify_code() argument 268 boot_upg_lzma_unsecure_verify_code(const hi_upg_file_head *upg_head, hi_u8 *hash, hi_u32 hash_size) boot_upg_lzma_unsecure_verify_code() argument 285 hi_u8 hash[SHA_256_LEN] = { 0 }; boot_upg_check_before_decompress() local [all...] |
H A D | boot_upg_tool.h | 25 hi_u32 boot_upg_hash_one_content(hi_u32 flash_addr, hi_u32 total_size, hi_u8 *hash, hi_u32 hash_size); 26 hi_u32 boot_upg_hash_more_content(HI_CONST upg_verify_param *param, hi_u8 *hash, hi_u32 hash_size);
|
H A D | boot_upg_check_secure.c | 158 hi_u8 hash[SHA_256_LEN] = { 0 }; in boot_upg_secure_verify() local 160 hi_u32 ret = boot_upg_hash_more_content(param, hash, sizeof(hash)); in boot_upg_secure_verify() 163 boot_msg1("hash more content, ret:", ret); in boot_upg_secure_verify() 168 if (memcmp(param->sign, hash, SHA_256_LEN) != EOK) { in boot_upg_secure_verify() 182 .hash = hash, in boot_upg_secure_verify() 197 .hash = hash, in boot_upg_secure_verify()
|
/device/qemu/riscv32_virt/liteos_m/board/driver/video/ |
H A D | key_cache.c | 72 PRINTK(" keyCache dump hash %d item %s %p %d\n", i,
in KeyCacheDump() 98 uint32_t hash;
in NameHash() local 99 hash = LOS_HashFNV32aBuf(name, len, FNV1_32A_INIT);
in NameHash() 100 return hash;
in NameHash() 105 int hash = NameHash(name, len) & PATH_CACHE_HASH_MASK;
in KeyCacheInsert() local 106 LOS_ListAdd(&g_keyCacheHashEntrys[hash], &cache->hashEntry);
in KeyCacheInsert() 152 int hash = NameHash(name, len) & PATH_CACHE_HASH_MASK;
in KeyCacheLookup() local 153 LIST_HEAD *dhead = &g_keyCacheHashEntrys[hash];
in KeyCacheLookup()
|
/device/soc/hisilicon/hi3861v100/sdk_liteos/third_party/mbedtls/include/mbedtls/ |
H A D | ecdsa.h | 130 * \note If the bitlength of the message hash is larger than the 131 * bitlength of the group order, then the hash is truncated 146 * \param buf The content to be signed. This is usually the hash of 172 * \note If the bitlength of the message hash is larger than the 173 * bitlength of the group order, then the hash is truncated as 206 * \param md_alg The hash algorithm used to hash the original data. 224 * \note If the bitlength of the message hash is larger than the 225 * bitlength of the group order, then the hash is truncated as 245 * \param md_alg The hash algorith [all...] |
H A D | rsa.h | 156 * \note The hash selected in \p hash_id is always used for OEAP 164 * \param hash_id The hash identifier of ::mbedtls_md_type_t type, if 408 * \param hash_id The #MBEDTLS_RSA_PKCS_V21 hash identifier. 896 * \param md_alg The message-digest algorithm used to hash the original data. 900 * \param hash The buffer holding the message digest or raw data. 904 * the size of the hash corresponding to \p md_alg. 919 const unsigned char *hash, 944 * \param md_alg The message-digest algorithm used to hash the original data. 948 * \param hash The buffer holding the message digest or raw data. 952 * the size of the hash correspondin [all...] |
H A D | pk_internal.h | 52 const unsigned char *hash, size_t hash_len, 57 const unsigned char *hash, size_t hash_len, 65 const unsigned char *hash, size_t hash_len, 71 const unsigned char *hash, size_t hash_len,
|
H A D | pkcs11.h | 126 * \param hash buffer holding the message digest 139 const unsigned char *hash, 156 const unsigned char *hash, unsigned char *sig ) in mbedtls_ssl_pkcs11_sign() 161 hashlen, hash, sig ); in mbedtls_ssl_pkcs11_sign() 153 mbedtls_ssl_pkcs11_sign( void *ctx, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng, int mode, mbedtls_md_type_t md_alg, unsigned int hashlen, const unsigned char *hash, unsigned char *sig ) mbedtls_ssl_pkcs11_sign() argument
|
H A D | pk.h | 186 const unsigned char *hash, unsigned char *sig ); 312 * \param hash Hash of the message to sign 332 const unsigned char *hash, size_t hash_len, 345 * \param hash Hash of the message to sign 357 const unsigned char *hash, size_t hash_len, 369 * \param hash Hash of the message to sign 392 const unsigned char *hash, size_t hash_len, 401 * \param hash Hash of the message to sign 425 const unsigned char *hash, size_t hash_len, 444 * \param hash Has [all...] |
/device/soc/hisilicon/hi3861v100/sdk_liteos/boot/loaderboot/common/ |
H A D | efuse_opt.c | 70 hi_u8 hash[SHA_256_LENGTH] = {0}; in efuse_cfg_verify() local 82 ret = hi_cipher_hash_sha256((uintptr_t)&(header->stru_ver), header->file_size - SHA_256_LENGTH, hash, in efuse_cfg_verify() 93 if (memcmp(header->hash, hash, SHA_256_LENGTH) != EOK) { in efuse_cfg_verify()
|
/device/soc/hisilicon/hi3861v100/sdk_liteos/include/ |
H A D | hi_cipher.h | 159 const hi_u8 *hash; /**< Hash data for ecc sign. */ member 160 hi_u32 hash_len; /**< The length of hash data, just 32 bytes is valid data. */ 174 const hi_u8 *hash; /**< Hash data for ecc verify. */ member 175 hi_u32 hash_len; /**< The length of hash data, just 32 bytes is valid data. */ 242 hi_cipher_hash_type sha_type; /**< sha_type, hash or hmac type. */ 434 * Performs hash calculation on a segment of data and outputs the hash result. 442 * @param hash [OUT] type #hi_u8 *,Output the hash result. The length is 32 bytes. 444 * @param hash_len [IN] type #hi_u32, BUF length of the hash resul [all...] |
H A D | hks_client.h | 318 * @param hash [IN] type #const struct hks_blob *,Data to be signed. CNcomment:待签名的数据。CNend 330 const struct hks_key_param *key_param, const struct hks_blob *hash, 345 * @param hash [IN] type #const struct hks_blob *,Signed data. CNcomment:签名的数据。CNend 356 const struct hks_key_param *key_param, const struct hks_blob *hash, 535 * @brief Calculate the hash value of the data based on SHA256 or SHA512. 539 * Calculate the hash value of the data based on SHA256 or SHA512. 547 * @param hash [OUT] type #struct hks_blob *,Generated message verification code , 548 hash and hash->data cannot be null constraint condition: 549 when alg is HKS_ALG_HASH_SHA_256, hash [all...] |
/device/soc/hisilicon/hi3861v100/hi3861_adapter/hals/communication/wifi_lite/wifiaware/source/ |
H A D | hal_wifiaware.c | 29 unsigned int HalCipherHashSha256(const char* input, unsigned int inputLen, unsigned char* hash, unsigned hashLen)
in HalCipherHashSha256() argument 31 if (hi_cipher_hash_sha256((uintptr_t)input, inputLen, hash, hashLen) != HISI_OK) {
in HalCipherHashSha256()
|
/device/soc/hisilicon/hi3861v100/sdk_liteos/boot/commonboot/ |
H A D | hi_cipher.h | 128 const hi_u8 *hash; /* Input hash data for ecc verify. */ member 129 hi_u32 hash_len; /* The length of hash data, just 32 bytes is valid data. */ 140 hi_u8 *hash; /* The input hash value will be changed after hi_cipher_rsa_verify_hash execution, member 371 * Performs hash calculation on a segment of data and outputs the hash result. 379 * @param hash [OUT] type #hi_u8 *,Output the hash result. The length is 32 bytes. 381 * @param hash_len [IN] type #hi_u32, BUF length of the hash resul [all...] |
/device/soc/hisilicon/hi3861v100/sdk_liteos/tools/efuse_tool/ |
H A D | efuse_cfg_gen.py | 71 hash = hashlib.sha256(data).digest()
variable 72 bin_data = hash + data
|
/device/soc/hisilicon/hi3516dv300/sdk_linux/drv/interdrv/common/cipher/src/drv/cipher_v1.0/drivers/ |
H A D | kapi_hash.c | 53 /* hash mutex */ 60 hi_log_error("error, hash lock failed\n"); \ 91 /* API Code for kapi hash. */ 152 /* allocate a hash channel */ in kapi_hash_create() 184 /* transform hash mode */ in kpai_hash_mode_transform() 225 hi_log_error("error, invalid hash type %d\n", type); in kpai_hash_mode_transform() 263 * If the length of K > B: hash K to obtain an L byte string, in kapi_hmac_start() 272 /* If the length of K > B: hash K to obtain an L byte string, in kapi_hmac_start() 320 static hi_s32 kapi_hmac_finish(kapi_hash_ctx *ctx, hi_u8 *hash, hi_u32 hash_buf_len, hi_u32 *hashlen) in kapi_hmac_finish() argument 354 ret = ctx->func->finish(ctx->cryp_ctx, hash, hash_buf_le in kapi_hmac_finish() 364 kapi_hash_finsh_calc(kapi_hash_ctx *ctx, hi_u8 *hash, hi_u32 hash_buf_len, hi_u32 *hashlen) kapi_hash_finsh_calc() argument 586 kapi_hash_finish(hi_u32 id, hi_u8 *hash, hi_u32 hash_buf_len, hi_u32 *hashlen) kapi_hash_finish() argument [all...] |
/device/soc/rockchip/common/sdk_linux/init/ |
H A D | initramfs.c | 51 /* link hash */ 55 static __initdata struct hash { struct 58 struct hash *next; 62 static inline int hash(int major, int minor, int ino) in hash() function 71 struct hash **p, *q; in find_link() 72 for (p = head + hash(major, minor, ino); *p; p = &(*p)->next) { in find_link() 87 q = kmalloc(sizeof(struct hash), GFP_KERNEL); in find_link() 89 panic("can't allocate link hash entry"); in find_link() 103 struct hash **p, *q; in free_hash()
|
/device/soc/hisilicon/hi3516dv300/sdk_linux/drv/interdrv/common/cipher/src/drv/cipher_v1.0/drivers/extend/ |
H A D | ext_hash.c | 41 hi_log_error("error, invalid hash mode %d\n", mode); in mbedtls_hash_create() 48 hi_log_error("malloc hash context buffer failed!"); in mbedtls_hash_create() 139 hi_s32 mbedtls_hash_finish(hi_void *ctx, hi_void *hash, hi_u32 hash_buf_len, hi_u32 *hashlen) in mbedtls_hash_finish() argument 148 mbedtls_md_finish(md, hash); in mbedtls_hash_finish()
|
H A D | ext_sm3.c | 53 /* SM3, the initial hash value, sm3_h(0). */ 252 hi_u32 hash[SM3_RESULT_SIZE_IN_WORD] = {0}; in sm3_final() local 290 hash[i] = crypto_cpu_to_be32(ctx->state[i]); in sm3_final() 293 if (memcpy_s(digest, digest_len, hash, SM3_RESULT_SIZE) != EOK) { in sm3_final() 311 hi_log_error("malloc hash context buffer failed!"); in ext_sm3_create() 376 hi_s32 ext_sm3_finish(hi_void *ctx, hi_void *hash, hi_u32 hash_buf_len, hi_u32 *hashlen) in ext_sm3_finish() argument 383 ret = sm3_final(ctx, hash, hash_buf_len); in ext_sm3_finish()
|
/device/soc/hisilicon/hi3516dv300/sdk_linux/drv/interdrv/common/cipher/src/drv/cipher_v1.0/drivers/extend/include/ |
H A D | ext_alg.h | 263 * brief Create hash mbedtls 267 * param ctx hash mode 278 * param ctx hash handle to be destroy 279 * param chunk hash message to update 280 * param length length of hash message 281 * param src source of hash message 289 * param hash HASH checksum result 292 hi_s32 mbedtls_hash_finish(hi_void *ctx, hi_void *hash, hi_u32 *hashlen); 295 * brief Clear hash context 306 hi_s32 ext_sm3_finish(hi_void *ctx, hi_void *hash, hi_u3 [all...] |