/kernel/linux/linux-6.6/security/keys/trusted-keys/ |
H A D | trusted_tpm1.c | 119 unsigned char paramdigest[SHA1_DIGEST_SIZE]; in TSS_authhmac() 158 ret = TSS_rawhmac(digest, key, keylen, SHA1_DIGEST_SIZE, in TSS_authhmac() 183 unsigned char testhmac[SHA1_DIGEST_SIZE]; in TSS_checkhmac1() 184 unsigned char paramdigest[SHA1_DIGEST_SIZE]; in TSS_checkhmac1() 202 authdata = buffer + bufsize - SHA1_DIGEST_SIZE; in TSS_checkhmac1() 238 ret = TSS_rawhmac(testhmac, key, keylen, SHA1_DIGEST_SIZE, paramdigest, in TSS_checkhmac1() 244 if (memcmp(testhmac, authdata, SHA1_DIGEST_SIZE)) in TSS_checkhmac1() 273 unsigned char testhmac1[SHA1_DIGEST_SIZE]; in TSS_checkhmac2() 274 unsigned char testhmac2[SHA1_DIGEST_SIZE]; in TSS_checkhmac2() 275 unsigned char paramdigest[SHA1_DIGEST_SIZE]; in TSS_checkhmac2() [all...] |
/kernel/linux/linux-5.10/security/keys/trusted-keys/ |
H A D | trusted_tpm1.c | 126 unsigned char paramdigest[SHA1_DIGEST_SIZE]; in TSS_authhmac() 165 ret = TSS_rawhmac(digest, key, keylen, SHA1_DIGEST_SIZE, in TSS_authhmac() 190 unsigned char testhmac[SHA1_DIGEST_SIZE]; in TSS_checkhmac1() 191 unsigned char paramdigest[SHA1_DIGEST_SIZE]; in TSS_checkhmac1() 209 authdata = buffer + bufsize - SHA1_DIGEST_SIZE; in TSS_checkhmac1() 245 ret = TSS_rawhmac(testhmac, key, keylen, SHA1_DIGEST_SIZE, paramdigest, in TSS_checkhmac1() 251 if (memcmp(testhmac, authdata, SHA1_DIGEST_SIZE)) in TSS_checkhmac1() 280 unsigned char testhmac1[SHA1_DIGEST_SIZE]; in TSS_checkhmac2() 281 unsigned char testhmac2[SHA1_DIGEST_SIZE]; in TSS_checkhmac2() 282 unsigned char paramdigest[SHA1_DIGEST_SIZE]; in TSS_checkhmac2() [all...] |
/kernel/linux/linux-6.6/include/crypto/ |
H A D | sha1.h | 11 #define SHA1_DIGEST_SIZE 20 macro 20 extern const u8 sha1_zero_message_hash[SHA1_DIGEST_SIZE]; 23 u32 state[SHA1_DIGEST_SIZE / 4]; 41 #define SHA1_DIGEST_WORDS (SHA1_DIGEST_SIZE / 4)
|
/kernel/linux/linux-5.10/crypto/asymmetric_keys/ |
H A D | asym_tpm.c | 37 unsigned char authdata[SHA1_DIGEST_SIZE]; in tpm_loadkey2() 60 ret = TSS_authhmac(authdata, keyauth, SHA1_DIGEST_SIZE, enonce, in tpm_loadkey2() 73 tpm_buf_append(tb, authdata, SHA1_DIGEST_SIZE); in tpm_loadkey2() 82 SHA1_DIGEST_SIZE, 0, 0); in tpm_loadkey2() 115 unsigned char authdata[SHA1_DIGEST_SIZE]; in tpm_unbind() 140 ret = TSS_authhmac(authdata, keyauth, SHA1_DIGEST_SIZE, enonce, in tpm_unbind() 155 tpm_buf_append(tb, authdata, SHA1_DIGEST_SIZE); in tpm_unbind() 166 keyauth, SHA1_DIGEST_SIZE, in tpm_unbind() 198 unsigned char authdata[SHA1_DIGEST_SIZE]; in tpm_sign() 223 ret = TSS_authhmac(authdata, keyauth, SHA1_DIGEST_SIZE, enonc in tpm_sign() [all...] |
/kernel/linux/linux-6.6/include/keys/ |
H A D | trusted_tpm.h | 23 unsigned char secret[SHA1_DIGEST_SIZE]; 71 16, 1, &s->secret, SHA1_DIGEST_SIZE, 0); in dump_sess() 74 16, 1, &s->enonce, SHA1_DIGEST_SIZE, 0); in dump_sess()
|
/kernel/linux/linux-5.10/include/crypto/ |
H A D | sha.h | 11 #define SHA1_DIGEST_SIZE 20 macro 68 extern const u8 sha1_zero_message_hash[SHA1_DIGEST_SIZE]; 79 u32 state[SHA1_DIGEST_SIZE / 4]; 121 #define SHA1_DIGEST_WORDS (SHA1_DIGEST_SIZE / 4)
|
/kernel/linux/linux-5.10/include/keys/ |
H A D | trusted_tpm.h | 21 unsigned char secret[SHA1_DIGEST_SIZE]; 80 16, 1, &s->secret, SHA1_DIGEST_SIZE, 0); in dump_sess() 83 16, 1, &s->enonce, SHA1_DIGEST_SIZE, 0); in dump_sess()
|
/kernel/linux/linux-5.10/arch/x86/crypto/ |
H A D | sha1_ssse3_glue.c | 88 .digestsize = SHA1_DIGEST_SIZE, 137 .digestsize = SHA1_DIGEST_SIZE, 219 .digestsize = SHA1_DIGEST_SIZE, 269 .digestsize = SHA1_DIGEST_SIZE,
|
/kernel/linux/linux-5.10/crypto/ |
H A D | sha1_generic.c | 23 const u8 sha1_zero_message_hash[SHA1_DIGEST_SIZE] = { 64 .digestsize = SHA1_DIGEST_SIZE,
|
H A D | hash_info.c | 38 [HASH_ALGO_SHA1] = SHA1_DIGEST_SIZE,
|
/kernel/linux/linux-6.6/crypto/ |
H A D | sha1_generic.c | 23 const u8 sha1_zero_message_hash[SHA1_DIGEST_SIZE] = { 64 .digestsize = SHA1_DIGEST_SIZE,
|
H A D | hash_info.c | 38 [HASH_ALGO_SHA1] = SHA1_DIGEST_SIZE,
|
/kernel/linux/linux-6.6/arch/x86/crypto/ |
H A D | sha1_ssse3_glue.c | 97 .digestsize = SHA1_DIGEST_SIZE, 146 .digestsize = SHA1_DIGEST_SIZE, 228 .digestsize = SHA1_DIGEST_SIZE, 278 .digestsize = SHA1_DIGEST_SIZE,
|
/kernel/linux/linux-5.10/drivers/crypto/ |
H A D | padlock-sha.c | 111 memcpy(result, &state.state, SHA1_DIGEST_SIZE); in padlock_sha1_finup() 221 .digestsize = SHA1_DIGEST_SIZE, 294 memcpy(dst, (u8 *)(sctx->state), SHA1_DIGEST_SIZE); in padlock_sha1_update_nano() 322 memcpy((u8 *)(sctx->state), dst, SHA1_DIGEST_SIZE); in padlock_sha1_update_nano() 457 .digestsize = SHA1_DIGEST_SIZE,
|
/kernel/linux/linux-6.6/drivers/crypto/ |
H A D | padlock-sha.c | 112 memcpy(result, &state.state, SHA1_DIGEST_SIZE); in padlock_sha1_finup() 222 .digestsize = SHA1_DIGEST_SIZE, 295 memcpy(dst, (u8 *)(sctx->state), SHA1_DIGEST_SIZE); in padlock_sha1_update_nano() 323 memcpy((u8 *)(sctx->state), dst, SHA1_DIGEST_SIZE); in padlock_sha1_update_nano() 458 .digestsize = SHA1_DIGEST_SIZE,
|
/kernel/linux/linux-5.10/drivers/crypto/chelsio/ |
H A D | chcr_algo.h | 214 _bs == SHA1_DIGEST_SIZE ? 12 : 0; }) 303 static const u32 chcr_sha1_init[SHA1_DIGEST_SIZE / 4] = { 336 case SHA1_DIGEST_SIZE: in copy_hash_init_values()
|
/kernel/linux/linux-6.6/drivers/crypto/chelsio/ |
H A D | chcr_algo.h | 214 _bs == SHA1_DIGEST_SIZE ? 12 : 0; }) 303 static const u32 chcr_sha1_init[SHA1_DIGEST_SIZE / 4] = { 336 case SHA1_DIGEST_SIZE: in copy_hash_init_values()
|
/kernel/linux/linux-6.6/arch/arm/crypto/ |
H A D | sha1_glue.c | 52 .digestsize = SHA1_DIGEST_SIZE,
|
H A D | sha1_neon_glue.c | 69 .digestsize = SHA1_DIGEST_SIZE,
|
H A D | sha1-ce-glue.c | 71 .digestsize = SHA1_DIGEST_SIZE,
|
/kernel/linux/linux-5.10/arch/arm/crypto/ |
H A D | sha1_neon_glue.c | 71 .digestsize = SHA1_DIGEST_SIZE,
|
H A D | sha1_glue.c | 54 .digestsize = SHA1_DIGEST_SIZE,
|
H A D | sha1-ce-glue.c | 71 .digestsize = SHA1_DIGEST_SIZE,
|
/kernel/linux/linux-5.10/arch/s390/crypto/ |
H A D | sha1_s390.c | 69 .digestsize = SHA1_DIGEST_SIZE,
|
/kernel/linux/linux-6.6/arch/s390/crypto/ |
H A D | sha1_s390.c | 69 .digestsize = SHA1_DIGEST_SIZE,
|