/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
H A D | tlsv1_record.h | 45 enum crypto_hash_alg hash_alg; member
|
H A D | tlsv1_common.c | 338 int tlsv12_key_x_server_params_hash(u16 tls_version, u8 hash_alg, in tlsv12_key_x_server_params_hash() argument 348 switch (hash_alg) { in tlsv12_key_x_server_params_hash()
|
/kernel/linux/linux-5.10/security/keys/trusted-keys/ |
H A D | trusted_tpm1.c | 33 static const char hash_alg[] = "sha1"; variable 66 pr_info("trusted_key: can't alloc %s\n", hash_alg); in TSS_sha1() 139 pr_info("trusted_key: can't alloc %s\n", hash_alg); in TSS_authhmac() 215 pr_info("trusted_key: can't alloc %s\n", hash_alg); in TSS_checkhmac1() 308 pr_info("trusted_key: can't alloc %s\n", hash_alg); in TSS_checkhmac2() 1226 hashalg = crypto_alloc_shash(hash_alg, 0, 0); in trusted_shash_alloc() 1229 hash_alg); in trusted_shash_alloc()
|
/kernel/linux/linux-5.10/drivers/crypto/inside-secure/ |
H A D | safexcel_cipher.c | 62 u32 hash_alg; member 464 switch (ctx->hash_alg) { in safexcel_aead_setkey() 522 ctx->hash_alg | in safexcel_context_control() 532 ctx->hash_alg | in safexcel_context_control() 540 ctx->hash_alg | in safexcel_context_control() 1726 ctx->hash_alg = CONTEXT_CONTROL_CRYPTO_ALG_SHA1; in safexcel_aead_sha1_cra_init() 1762 ctx->hash_alg = CONTEXT_CONTROL_CRYPTO_ALG_SHA256; in safexcel_aead_sha256_cra_init() 1798 ctx->hash_alg = CONTEXT_CONTROL_CRYPTO_ALG_SHA224; in safexcel_aead_sha224_cra_init() 1834 ctx->hash_alg = CONTEXT_CONTROL_CRYPTO_ALG_SHA512; in safexcel_aead_sha512_cra_init() 1870 ctx->hash_alg in safexcel_aead_sha384_cra_init() [all...] |
/kernel/linux/linux-6.6/drivers/crypto/inside-secure/ |
H A D | safexcel_cipher.c | 63 u32 hash_alg; member 464 switch (ctx->hash_alg) { in safexcel_aead_setkey() 522 ctx->hash_alg | in safexcel_context_control() 532 ctx->hash_alg | in safexcel_context_control() 540 ctx->hash_alg | in safexcel_context_control() 1746 ctx->hash_alg = CONTEXT_CONTROL_CRYPTO_ALG_SHA1; in safexcel_aead_sha1_cra_init() 1782 ctx->hash_alg = CONTEXT_CONTROL_CRYPTO_ALG_SHA256; in safexcel_aead_sha256_cra_init() 1818 ctx->hash_alg = CONTEXT_CONTROL_CRYPTO_ALG_SHA224; in safexcel_aead_sha224_cra_init() 1854 ctx->hash_alg = CONTEXT_CONTROL_CRYPTO_ALG_SHA512; in safexcel_aead_sha512_cra_init() 1890 ctx->hash_alg in safexcel_aead_sha384_cra_init() [all...] |
/kernel/linux/linux-5.10/fs/verity/ |
H A D | enable.c | 197 req = fsverity_alloc_hash_request(params->hash_alg, GFP_KERNEL); in build_merkle_tree() 222 fsverity_free_hash_request(params->hash_alg, req); in build_merkle_tree() 337 params.hash_alg->name, params.digest_size, desc->root_hash); in fsverity_enable_with_descriptor()
|
H A D | fsverity_private.h | 47 struct fsverity_hash_alg *hash_alg; /* the hash algorithm */ member 49 unsigned int digest_size; /* same as hash_alg->digest_size */
|
/third_party/node/deps/openssl/openssl/crypto/ct/ |
H A D | ct_oct.c | 48 sct->hash_alg = *p++; in o2i_SCT_signature() 188 *p++ = sct->hash_alg; in i2o_SCT_signature()
|
H A D | ct_prn.c | 24 BIO_printf(out, "%02X%02X", sct->hash_alg, sct->sig_alg); in SCT_signature_algorithms_print()
|
H A D | ct_local.h | 73 unsigned char hash_alg; member
|
/third_party/openssl/crypto/ct/ |
H A D | ct_oct.c | 48 sct->hash_alg = *p++; in o2i_SCT_signature() 188 *p++ = sct->hash_alg; in i2o_SCT_signature()
|
H A D | ct_prn.c | 24 BIO_printf(out, "%02X%02X", sct->hash_alg, sct->sig_alg); in SCT_signature_algorithms_print()
|
H A D | ct_local.h | 73 unsigned char hash_alg; member
|
/third_party/mbedtls/library/ |
H A D | psa_crypto.c | 284 int psa_can_do_hash(psa_algorithm_t hash_alg) in psa_can_do_hash() argument 286 (void) hash_alg; in psa_can_do_hash() 3847 psa_algorithm_t hash_alg = PSA_ALG_SIGN_GET_HASH(alg); in mbedtls_psa_sign_hash_start() local 3848 operation->md_alg = mbedtls_md_type_from_psa_alg(hash_alg); in mbedtls_psa_sign_hash_start() 5439 psa_algorithm_t hash_alg, in psa_key_derivation_start_hmac() 5450 operation->mac_size = PSA_HASH_LENGTH(hash_alg); in psa_key_derivation_start_hmac() 5455 PSA_ALG_HMAC(hash_alg)); in psa_key_derivation_start_hmac() 5579 psa_algorithm_t hash_alg = PSA_ALG_HKDF_GET_HASH(kdf_alg); in psa_key_derivation_hkdf_read() local 5580 uint8_t hash_length = PSA_HASH_LENGTH(hash_alg); in psa_key_derivation_hkdf_read() 5626 hash_alg, in psa_key_derivation_hkdf_read() 5437 psa_key_derivation_start_hmac( psa_mac_operation_t *operation, psa_algorithm_t hash_alg, const uint8_t *hmac_key, size_t hmac_key_length) psa_key_derivation_start_hmac() argument 5671 psa_algorithm_t hash_alg = PSA_ALG_HKDF_GET_HASH(alg); psa_key_derivation_tls12_prf_generate_next_block() local 5793 psa_algorithm_t hash_alg = PSA_ALG_TLS12_PRF_GET_HASH(alg); psa_key_derivation_tls12_prf_read() local 6571 psa_algorithm_t hash_alg = PSA_ALG_GET_HASH(kdf_alg); psa_key_derivation_set_maximum_capacity() local 6726 psa_algorithm_t hash_alg = PSA_ALG_HKDF_GET_HASH(kdf_alg); psa_hkdf_input() local 7142 psa_pbkdf2_hmac_set_password(psa_algorithm_t hash_alg, const uint8_t *input, size_t input_len, uint8_t *output, size_t *output_len) psa_pbkdf2_hmac_set_password() argument 7204 psa_algorithm_t hash_alg = PSA_ALG_PBKDF2_HMAC_GET_HASH(kdf_alg); psa_pbkdf2_set_password() local [all...] |
H A D | ssl_tls13_generic.c | 225 psa_algorithm_t hash_alg = PSA_ALG_NONE; in ssl_tls13_parse_certificate_verify() local 273 hash_alg = mbedtls_md_psa_alg_from_type(md_alg); in ssl_tls13_parse_certificate_verify() 274 if (hash_alg == 0) { in ssl_tls13_parse_certificate_verify() 294 status = psa_hash_compute(hash_alg, in ssl_tls13_parse_certificate_verify() 310 rsassa_pss_options.expected_salt_len = PSA_HASH_LENGTH(hash_alg); in ssl_tls13_parse_certificate_verify()
|
H A D | psa_crypto_ecp.c | 397 psa_algorithm_t hash_alg = PSA_ALG_SIGN_GET_HASH(alg); in mbedtls_psa_ecdsa_sign_hash() local 398 mbedtls_md_type_t md_alg = mbedtls_md_type_from_psa_alg(hash_alg); in mbedtls_psa_ecdsa_sign_hash()
|
H A D | psa_crypto_core.h | 33 * \param hash_alg The hash algorithm (ignored for now). 37 int psa_can_do_hash(psa_algorithm_t hash_alg);
|
/kernel/linux/linux-5.10/fs/nfs/ |
H A D | nfs4session.h | 66 u32 hash_alg; member
|
/kernel/linux/linux-6.6/fs/verity/ |
H A D | fsverity_private.h | 38 const struct fsverity_hash_alg *hash_alg; /* the hash algorithm */ member 40 unsigned int digest_size; /* same as hash_alg->digest_size */
|
/kernel/linux/linux-6.6/fs/nfs/ |
H A D | nfs4session.h | 67 u32 hash_alg; member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
H A D | tlsv1_common.c | 338 int tlsv12_key_x_server_params_hash(u16 tls_version, u8 hash_alg, in tlsv12_key_x_server_params_hash() argument 348 switch (hash_alg) { in tlsv12_key_x_server_params_hash()
|
/kernel/linux/linux-5.10/security/keys/encrypted-keys/ |
H A D | encrypted.c | 40 static const char hash_alg[] = "sha256"; variable 981 hash_tfm = crypto_alloc_shash(hash_alg, 0, 0); in init_encrypted() 984 hash_alg, PTR_ERR(hash_tfm)); in init_encrypted()
|
/kernel/linux/linux-6.6/security/keys/encrypted-keys/ |
H A D | encrypted.c | 40 static const char hash_alg[] = "sha256"; variable 1014 hash_tfm = crypto_alloc_shash(hash_alg, 0, 0); in init_encrypted() 1017 hash_alg, PTR_ERR(hash_tfm)); in init_encrypted()
|
/kernel/linux/linux-5.10/drivers/crypto/amcc/ |
H A D | crypto4xx_sa.h | 98 u32 hash_alg:4; member
|
/kernel/linux/linux-6.6/drivers/crypto/amcc/ |
H A D | crypto4xx_sa.h | 98 u32 hash_alg:4; member
|