/linux-6.1.9/tools/build/feature/ ! |
D | test-libcrypto.c | 11 unsigned int digest_len; in main() local 19 EVP_DigestFinal_ex(mdctx, &md[0], &digest_len); in main()
|
/linux-6.1.9/crypto/asymmetric_keys/ ! |
D | verify_pefile.c | 339 if (digest_size != ctx->digest_len) { in pefile_digest_pe() 341 digest_size, ctx->digest_len); in pefile_digest_pe() 366 pr_debug("Digest calc = [%*ph]\n", ctx->digest_len, digest); in pefile_digest_pe() 371 if (memcmp(digest, ctx->digest, ctx->digest_len) != 0) { in pefile_digest_pe() 442 ctx.digest_len, ctx.digest_len, ctx.digest); in verify_pefile_signature()
|
D | verify_pefile.h | 24 unsigned digest_len; /* Digest length */ member
|
D | mscode_parser.c | 126 ctx->digest_len = vlen; in mscode_note_digest()
|
/linux-6.1.9/crypto/ ! |
D | ecrdsa.c | 39 unsigned int digest_len; /* parameter (bytes) */ member 96 req->dst_len != ctx->digest_len || in ecrdsa_verify() 211 ctx->digest_len = 256 / 8; in ecrdsa_set_pub_key() 215 ctx->digest_len = 512 / 8; in ecrdsa_set_pub_key() 229 ctx->curve->g.ndigits * sizeof(u64) != ctx->digest_len) in ecrdsa_set_pub_key()
|
/linux-6.1.9/include/linux/ ! |
D | ima.h | 41 bool hash, u8 *digest, size_t digest_len); 136 size_t digest_len) in ima_measure_critical_data() argument
|
/linux-6.1.9/security/integrity/ima/ ! |
D | ima_main.c | 892 bool buf_hash, u8 *digest, size_t digest_len) in process_buffer_measurement() argument 910 if (digest && digest_len < digest_hash_len) in process_buffer_measurement() 1040 bool hash, u8 *digest, size_t digest_len) in ima_measure_critical_data() argument 1048 digest_len); in ima_measure_critical_data()
|
D | ima.h | 275 bool buf_hash, u8 *digest, size_t digest_len);
|
/linux-6.1.9/include/scsi/ ! |
D | libiscsi_tcp.h | 34 unsigned int digest_len; member
|
/linux-6.1.9/security/keys/trusted-keys/ ! |
D | trusted_tpm1.c | 742 unsigned int digest_len; in getoptions() local 844 digest_len = hash_digest_size[opt->hash]; in getoptions() 845 if (!tpm2 || strlen(args[0].from) != (2 * digest_len)) in getoptions() 848 digest_len); in getoptions() 851 opt->policydigest_len = digest_len; in getoptions()
|
/linux-6.1.9/drivers/crypto/ ! |
D | ixp4xx_crypto.c | 735 const u8 *key, int key_len, unsigned int digest_len) in setup_auth() argument 758 memcpy(cinfo, algo->icv, digest_len); in setup_auth() 759 cinfo += digest_len; in setup_auth() 763 otarget = itarget + digest_len; in setup_auth() 1203 unsigned int digest_len = crypto_aead_maxauthsize(tfm); in aead_setup() local 1221 ctx->authkey_len, digest_len); in aead_setup() 1225 ctx->authkey_len, digest_len); in aead_setup()
|
/linux-6.1.9/drivers/scsi/ ! |
D | libiscsi_tcp.c | 166 segment->digest_len = ISCSI_DIGEST_SIZE; in iscsi_tcp_segment_splice_digest() 329 if (!segment->digest_len) in iscsi_tcp_dgst_verify() 333 segment->digest_len)) { in iscsi_tcp_dgst_verify() 870 if (segment->digest_len == 0) { in iscsi_tcp_hdr_recv_done()
|
/linux-6.1.9/drivers/crypto/amcc/ ! |
D | crypto4xx_sa.h | 93 u32 digest_len:4; member
|
D | crypto4xx_alg.c | 458 sa->sa_command_0.bf.digest_len = crypto_aead_authsize(aead) >> 2; in crypto4xx_crypt_aes_ccm() 675 sa->sa_command_0.bf.digest_len = ds >> 2; in crypto4xx_hash_init()
|
/linux-6.1.9/drivers/crypto/ccp/ ! |
D | ccp-ops.c | 1542 unsigned int digest_len; in ccp_run_sha_cmd() local 1564 digest_len = SHA1_DIGEST_SIZE; in ccp_run_sha_cmd() 1568 digest_len = SHA224_DIGEST_SIZE; in ccp_run_sha_cmd() 1572 digest_len = SHA256_DIGEST_SIZE; in ccp_run_sha_cmd() 1579 digest_len, 1); in ccp_run_sha_cmd()
|
/linux-6.1.9/drivers/nvme/target/ ! |
D | tcp.c | 285 u8 digest_len = nvmet_tcp_hdgst_len(queue); in nvmet_tcp_check_ddgst() local 289 (hdr->flags & NVME_TCP_F_HDGST ? digest_len : 0); in nvmet_tcp_check_ddgst()
|
/linux-6.1.9/drivers/nvme/host/ ! |
D | tcp.c | 436 u8 digest_len = nvme_tcp_hdgst_len(queue); in nvme_tcp_check_ddgst() local 440 ((hdr->flags & NVME_TCP_F_HDGST) ? digest_len : 0); in nvme_tcp_check_ddgst()
|