/kernel/linux/linux-5.10/tools/build/feature/ |
H A D | test-libcrypto.c | 11 unsigned int digest_len; in main() local 19 EVP_DigestFinal_ex(mdctx, &md[0], &digest_len); in main()
|
/kernel/linux/linux-6.6/tools/build/feature/ |
H A D | test-libcrypto.c | 11 unsigned int digest_len; in main() local 19 EVP_DigestFinal_ex(mdctx, &md[0], &digest_len); in main()
|
/kernel/linux/linux-5.10/crypto/ |
H A D | ecrdsa.c | 39 unsigned int digest_len; /* parameter (bytes) */ member 96 req->dst_len != ctx->digest_len || in ecrdsa_verify() 211 ctx->digest_len = 256 / 8; in ecrdsa_set_pub_key() 215 ctx->digest_len = 512 / 8; in ecrdsa_set_pub_key() 225 * Sizes of algo (set in digest_len) and curve should match in ecrdsa_set_pub_key() 229 ctx->curve->g.ndigits * sizeof(u64) != ctx->digest_len) in ecrdsa_set_pub_key()
|
/kernel/linux/linux-6.6/crypto/ |
H A D | ecrdsa.c | 39 unsigned int digest_len; /* parameter (bytes) */ member 96 req->dst_len != ctx->digest_len || in ecrdsa_verify() 211 ctx->digest_len = 256 / 8; in ecrdsa_set_pub_key() 215 ctx->digest_len = 512 / 8; in ecrdsa_set_pub_key() 225 * Sizes of algo (set in digest_len) and curve should match in ecrdsa_set_pub_key() 229 ctx->curve->g.ndigits * sizeof(u64) != ctx->digest_len) in ecrdsa_set_pub_key()
|
/kernel/linux/linux-5.10/crypto/asymmetric_keys/ |
H A D | verify_pefile.c | 343 if (digest_size != ctx->digest_len) { in pefile_digest_pe() 345 digest_size, ctx->digest_len); in pefile_digest_pe() 370 pr_debug("Digest calc = [%*ph]\n", ctx->digest_len, digest); in pefile_digest_pe() 375 if (memcmp(digest, ctx->digest, ctx->digest_len) != 0) { in pefile_digest_pe() 446 ctx.digest_len, ctx.digest_len, ctx.digest); in verify_pefile_signature()
|
H A D | verify_pefile.h | 24 unsigned digest_len; /* Digest length */ member
|
H A D | mscode_parser.c | 126 ctx->digest_len = vlen; in mscode_note_digest()
|
/kernel/linux/linux-6.6/crypto/asymmetric_keys/ |
H A D | verify_pefile.c | 343 if (digest_size != ctx->digest_len) { in pefile_digest_pe() 345 digest_size, ctx->digest_len); in pefile_digest_pe() 370 pr_debug("Digest calc = [%*ph]\n", ctx->digest_len, digest); in pefile_digest_pe() 375 if (memcmp(digest, ctx->digest, ctx->digest_len) != 0) { in pefile_digest_pe() 446 ctx.digest_len, ctx.digest_len, ctx.digest); in verify_pefile_signature()
|
H A D | verify_pefile.h | 24 unsigned digest_len; /* Digest length */ member
|
H A D | mscode_parser.c | 126 ctx->digest_len = vlen; in mscode_note_digest()
|
/kernel/linux/linux-6.6/security/integrity/ima/ |
H A D | ima_api.c | 208 int digest_len; in ima_get_verity_digest() local 214 digest_len = fsverity_get_digest(iint->inode, hash->digest, NULL, &alg); in ima_get_verity_digest() 215 if (digest_len == 0) in ima_get_verity_digest() 226 hash->hdr.length = digest_len; in ima_get_verity_digest()
|
H A D | ima_main.c | 920 * @digest_len: buffer length 932 bool buf_hash, u8 *digest, size_t digest_len) in process_buffer_measurement() 950 if (digest && digest_len < digest_hash_len) in process_buffer_measurement() 1066 * @digest_len: buffer length 1080 bool hash, u8 *digest, size_t digest_len) in ima_measure_critical_data() 1088 digest_len); in ima_measure_critical_data() 928 process_buffer_measurement(struct mnt_idmap *idmap, struct inode *inode, const void *buf, int size, const char *eventname, enum ima_hooks func, int pcr, const char *func_data, bool buf_hash, u8 *digest, size_t digest_len) process_buffer_measurement() argument 1077 ima_measure_critical_data(const char *event_label, const char *event_name, const void *buf, size_t buf_len, bool hash, u8 *digest, size_t digest_len) ima_measure_critical_data() argument
|
/kernel/linux/common_modules/tzdriver/auth/ |
H A D | client_hash_auth.c | 414 unsigned char *out_digest, uint8_t digest_len) in do_sha256() 419 if (digest_len != SHA256_DIGEST_LENGTH) { in do_sha256() 420 tloge("error digest_len\n"); in do_sha256() 453 uint8_t digest_len = sizeof(digest); in set_login_information_hash() local 480 ret = do_sha256((unsigned char *)indata, indata_len, digest, digest_len); in set_login_information_hash() 486 ret = memcpy_s(hash_dev_file->pkg_name, MAX_PACKAGE_NAME_LEN, digest, digest_len); in set_login_information_hash() 413 do_sha256(const unsigned char *data, uint32_t datalen, unsigned char *out_digest, uint8_t digest_len) do_sha256() argument
|
/kernel/linux/linux-6.6/include/linux/ |
H A D | ima.h | 42 bool hash, u8 *digest, size_t digest_len); 138 size_t digest_len) in ima_measure_critical_data() 134 ima_measure_critical_data(const char *event_label, const char *event_name, const void *buf, size_t buf_len, bool hash, u8 *digest, size_t digest_len) ima_measure_critical_data() argument
|
/kernel/linux/linux-6.6/security/keys/trusted-keys/ |
H A D | trusted_tpm1.c | 742 unsigned int digest_len; in getoptions() local 844 digest_len = hash_digest_size[opt->hash]; in getoptions() 845 if (!tpm2 || strlen(args[0].from) != (2 * digest_len)) in getoptions() 848 digest_len); in getoptions() 851 opt->policydigest_len = digest_len; in getoptions()
|
/kernel/linux/linux-5.10/include/scsi/ |
H A D | libiscsi_tcp.h | 34 unsigned int digest_len; member
|
/kernel/linux/linux-6.6/include/scsi/ |
H A D | libiscsi_tcp.h | 34 unsigned int digest_len; member
|
/kernel/linux/linux-6.6/tools/testing/selftests/net/ |
H A D | tcp_mmap.c | 96 unsigned int digest_len; variable 282 EVP_DigestFinal_ex(ctx, digest, &digest_len); in child_thread() 606 EVP_DigestFinal_ex(ctx, digest, &digest_len); in main()
|
/kernel/linux/linux-5.10/drivers/scsi/ |
H A D | libiscsi_tcp.c | 166 segment->digest_len = ISCSI_DIGEST_SIZE; in iscsi_tcp_segment_splice_digest() 329 if (!segment->digest_len) in iscsi_tcp_dgst_verify() 333 segment->digest_len)) { in iscsi_tcp_dgst_verify() 866 if (segment->digest_len == 0) { in iscsi_tcp_hdr_recv_done()
|
/kernel/linux/linux-6.6/drivers/scsi/ |
H A D | libiscsi_tcp.c | 166 segment->digest_len = ISCSI_DIGEST_SIZE; in iscsi_tcp_segment_splice_digest() 329 if (!segment->digest_len) in iscsi_tcp_dgst_verify() 333 segment->digest_len)) { in iscsi_tcp_dgst_verify() 870 if (segment->digest_len == 0) { in iscsi_tcp_hdr_recv_done()
|
/kernel/linux/linux-5.10/security/keys/trusted-keys/ |
H A D | trusted_tpm1.c | 753 unsigned int digest_len; in getoptions() local 852 digest_len = hash_digest_size[opt->hash]; in getoptions() 853 if (!tpm2 || strlen(args[0].from) != (2 * digest_len)) in getoptions() 856 digest_len); in getoptions() 859 opt->policydigest_len = digest_len; in getoptions()
|
/kernel/linux/linux-5.10/drivers/crypto/ |
H A D | ixp4xx_crypto.c | 677 const u8 *key, int key_len, unsigned digest_len) in setup_auth() 700 memcpy(cinfo, algo->icv, digest_len); in setup_auth() 701 cinfo += digest_len; in setup_auth() 705 otarget = itarget + digest_len; in setup_auth() 1111 unsigned digest_len = crypto_aead_maxauthsize(tfm); in aead_setup() local 1129 ctx->authkey_len, digest_len); in aead_setup() 1133 ctx->authkey_len, digest_len); in aead_setup() 676 setup_auth(struct crypto_tfm *tfm, int encrypt, unsigned authsize, const u8 *key, int key_len, unsigned digest_len) setup_auth() argument
|
/kernel/linux/linux-6.6/drivers/crypto/intel/ixp4xx/ |
H A D | ixp4xx_crypto.c | 737 const u8 *key, int key_len, unsigned int digest_len) in setup_auth() 760 memcpy(cinfo, algo->icv, digest_len); in setup_auth() 761 cinfo += digest_len; in setup_auth() 765 otarget = itarget + digest_len; in setup_auth() 1206 unsigned int digest_len = crypto_aead_maxauthsize(tfm); in aead_setup() local 1224 ctx->authkey_len, digest_len); in aead_setup() 1228 ctx->authkey_len, digest_len); in aead_setup() 736 setup_auth(struct crypto_tfm *tfm, int encrypt, unsigned int authsize, const u8 *key, int key_len, unsigned int digest_len) setup_auth() argument
|
/kernel/linux/linux-5.10/drivers/crypto/amcc/ |
H A D | crypto4xx_sa.h | 93 u32 digest_len:4; member
|
/kernel/linux/linux-6.6/drivers/crypto/amcc/ |
H A D | crypto4xx_sa.h | 93 u32 digest_len:4; member
|