/openbmc/u-boot/lib/libavb/ |
H A D | avb_hash_descriptor.c | 27 dest->digest_len = avb_be32toh(dest->digest_len); in avb_hash_descriptor_validate_and_byteswap() 34 !avb_safe_add_to(&expected_size, dest->digest_len)) { in avb_hash_descriptor_validate_and_byteswap()
|
H A D | avb_slot_verify.c | 175 size_t digest_len; in load_and_verify_hash_partition() local 219 } else if (hash_desc.digest_len == 0 && avb_strlen(ab_suffix) != 0) { in load_and_verify_hash_partition() 283 digest_len = AVB_SHA256_DIGEST_SIZE; in load_and_verify_hash_partition() 290 digest_len = AVB_SHA512_DIGEST_SIZE; in load_and_verify_hash_partition() 297 if (hash_desc.digest_len == 0) { in load_and_verify_hash_partition() 300 expected_digest_len = digest_len; in load_and_verify_hash_partition() 304 read_persistent_digest(ops, part_name, digest_len, expected_digest_buf); in load_and_verify_hash_partition() 310 expected_digest_len = hash_desc.digest_len; in load_and_verify_hash_partition() 314 if (digest_len != expected_digest_len) { in load_and_verify_hash_partition() 321 if (avb_safe_memcmp(digest, expected_digest, digest_len) != 0) { in load_and_verify_hash_partition() [all …]
|
H A D | avb_hash_descriptor.h | 51 uint32_t digest_len; member
|
/openbmc/linux/tools/build/feature/ |
H A D | test-libcrypto.c | 11 unsigned int digest_len; in main() local 19 EVP_DigestFinal_ex(mdctx, &md[0], &digest_len); in main()
|
/openbmc/linux/crypto/asymmetric_keys/ |
H A D | verify_pefile.c | 343 if (digest_size != ctx->digest_len) { in pefile_digest_pe() 345 digest_size, ctx->digest_len); in pefile_digest_pe() 370 pr_debug("Digest calc = [%*ph]\n", ctx->digest_len, digest); in pefile_digest_pe() 375 if (memcmp(digest, ctx->digest, ctx->digest_len) != 0) { in pefile_digest_pe() 446 ctx.digest_len, ctx.digest_len, ctx.digest); in verify_pefile_signature()
|
H A D | verify_pefile.h | 24 unsigned digest_len; /* Digest length */ member
|
H A D | mscode_parser.c | 126 ctx->digest_len = vlen; in mscode_note_digest()
|
/openbmc/linux/crypto/ |
H A D | ecrdsa.c | 39 unsigned int digest_len; /* parameter (bytes) */ member 96 req->dst_len != ctx->digest_len || in ecrdsa_verify() 211 ctx->digest_len = 256 / 8; in ecrdsa_set_pub_key() 215 ctx->digest_len = 512 / 8; in ecrdsa_set_pub_key() 229 ctx->curve->g.ndigits * sizeof(u64) != ctx->digest_len) in ecrdsa_set_pub_key()
|
/openbmc/linux/security/integrity/ima/ |
H A D | ima_api.c | 208 int digest_len; in ima_get_verity_digest() local 214 digest_len = fsverity_get_digest(iint->inode, hash->digest, NULL, &alg); in ima_get_verity_digest() 215 if (digest_len == 0) in ima_get_verity_digest() 226 hash->hdr.length = digest_len; in ima_get_verity_digest()
|
H A D | ima_main.c | 923 * @digest_len: buffer length 935 bool buf_hash, u8 *digest, size_t digest_len) in process_buffer_measurement() 953 if (digest && digest_len < digest_hash_len) in process_buffer_measurement() 1069 * @digest_len: buffer length 1083 bool hash, u8 *digest, size_t digest_len) in ima_measure_critical_data() 1091 digest_len); 932 process_buffer_measurement(struct mnt_idmap * idmap,struct inode * inode,const void * buf,int size,const char * eventname,enum ima_hooks func,int pcr,const char * func_data,bool buf_hash,u8 * digest,size_t digest_len) process_buffer_measurement() argument 1080 ima_measure_critical_data(const char * event_label,const char * event_name,const void * buf,size_t buf_len,bool hash,u8 * digest,size_t digest_len) ima_measure_critical_data() argument
|
H A D | ima.h | 276 bool buf_hash, u8 *digest, size_t digest_len);
|
/openbmc/qemu/hw/misc/ |
H A D | aspeed_hace.c | 162 size_t digest_len = 0; in do_hash_operation() local 260 &digest_len, &local_err)) { in do_hash_operation() 275 &digest_len, &local_err) < 0) { in do_hash_operation() 284 digest_buf, digest_len)) { in do_hash_operation()
|
/openbmc/linux/include/linux/ |
H A D | ima.h | 42 bool hash, u8 *digest, size_t digest_len); 138 size_t digest_len) in ima_measure_critical_data() argument
|
/openbmc/linux/tools/testing/selftests/net/ |
H A D | tcp_mmap.c | 96 unsigned int digest_len; variable 282 EVP_DigestFinal_ex(ctx, digest, &digest_len); in child_thread() 606 EVP_DigestFinal_ex(ctx, digest, &digest_len); in main()
|
/openbmc/u-boot/lib/ |
H A D | tpm-v2.c | 854 const u8 *digest, u32 digest_len) in tpm2_pcr_extend() argument 860 tpm_u32(offset + digest_len), /* Length */ in tpm2_pcr_extend() 889 offset, digest, digest_len); in tpm2_pcr_extend() 981 u16 algorithm, void *data, u32 digest_len, in tpm2_pcr_read() argument 1011 if (digest_len > response_len) in tpm2_pcr_read() 1016 response_len - digest_len, data, in tpm2_pcr_read() 1017 digest_len)) in tpm2_pcr_read()
|
/openbmc/linux/security/keys/trusted-keys/ |
H A D | trusted_tpm1.c | 742 unsigned int digest_len; in getoptions() local 844 digest_len = hash_digest_size[opt->hash]; in getoptions() 845 if (!tpm2 || strlen(args[0].from) != (2 * digest_len)) in getoptions() 848 digest_len); in getoptions() 851 opt->policydigest_len = digest_len; in getoptions()
|
/openbmc/linux/include/scsi/ |
H A D | libiscsi_tcp.h | 34 unsigned int digest_len; member
|
/openbmc/linux/drivers/crypto/intel/ixp4xx/ |
H A D | ixp4xx_crypto.c | 740 const u8 *key, int key_len, unsigned int digest_len) in setup_auth() argument 763 memcpy(cinfo, algo->icv, digest_len); in setup_auth() 764 cinfo += digest_len; in setup_auth() 768 otarget = itarget + digest_len; in setup_auth() 1209 unsigned int digest_len = crypto_aead_maxauthsize(tfm); in aead_setup() local 1227 ctx->authkey_len, digest_len); in aead_setup() 1231 ctx->authkey_len, digest_len); in aead_setup()
|
/openbmc/u-boot/cmd/ |
H A D | otp.c | 188 int digest_len; member 1902 int digest_len; in otp_verify_image() local 1907 digest_len = 32; in otp_verify_image() 1911 digest_len = 48; in otp_verify_image() 1917 if (!memcmp(digest_buf, digest_ret, digest_len)) in otp_verify_image() 2480 si->digest_len = 28; in parse_config() 2484 si->digest_len = 32; in parse_config() 2488 si->digest_len = 48; in parse_config() 2492 si->digest_len = 64; in parse_config() 2599 ret = memcmp(digest, sign_ret, si->digest_len); in mode2_verify() [all …]
|
/openbmc/u-boot/include/ |
H A D | tpm-v2.h | 732 const u8 *digest, u32 digest_len); 771 u16 algorithm, void *data, u32 digest_len,
|
/openbmc/linux/drivers/scsi/ |
H A D | libiscsi_tcp.c | 166 segment->digest_len = ISCSI_DIGEST_SIZE; in iscsi_tcp_segment_splice_digest() 329 if (!segment->digest_len) in iscsi_tcp_dgst_verify() 333 segment->digest_len)) { in iscsi_tcp_dgst_verify() 870 if (segment->digest_len == 0) { in iscsi_tcp_hdr_recv_done()
|
/openbmc/linux/drivers/crypto/amcc/ |
H A D | crypto4xx_sa.h | 93 u32 digest_len:4; member
|
H A D | crypto4xx_alg.c | 458 sa->sa_command_0.bf.digest_len = crypto_aead_authsize(aead) >> 2; in crypto4xx_crypt_aes_ccm() 675 sa->sa_command_0.bf.digest_len = ds >> 2; in crypto4xx_hash_init()
|
/openbmc/qemu/hw/core/ |
H A D | eif.c | 396 size_t digest_len = QCRYPTO_HASH_DIGEST_LEN_SHA384; in get_SHA384_digest() local 408 &digest, &digest_len, errp) < 0) { in get_SHA384_digest()
|
/openbmc/linux/drivers/crypto/ccp/ |
H A D | ccp-ops.c | 1545 unsigned int digest_len; in ccp_run_sha_cmd() local 1567 digest_len = SHA1_DIGEST_SIZE; in ccp_run_sha_cmd() 1571 digest_len = SHA224_DIGEST_SIZE; in ccp_run_sha_cmd() 1575 digest_len = SHA256_DIGEST_SIZE; in ccp_run_sha_cmd() 1582 digest_len, 1); in ccp_run_sha_cmd()
|