/linux-6.12.1/security/ipe/ |
D | digest.c | 50 info->digest_len = (raw_digest_len + 1) / 2; in ipe_digest_parse() 51 digest = kzalloc(info->digest_len, GFP_KERNEL); in ipe_digest_parse() 57 rc = hex2bin(digest, raw_digest, info->digest_len); in ipe_digest_parse() 86 return (expected->digest_len == digest->digest_len) && in ipe_digest_eval() 88 (!memcmp(expected->digest, digest->digest, expected->digest_len)); in ipe_digest_eval() 117 audit_log_n_hex(ab, info->digest, info->digest_len); in ipe_digest_audit()
|
D | hooks.c | 266 info->digest = kmemdup(digest->digest, digest->digest_len, GFP_KERNEL); in ipe_bdev_setintegrity() 274 info->digest_len = digest->digest_len; in ipe_bdev_setintegrity()
|
D | digest.h | 17 size_t digest_len; member
|
D | eval.c | 215 info.digest_len = hash_digest_size[alg]; in evaluate_fsv_digest()
|
/linux-6.12.1/tools/testing/selftests/arm64/fp/ |
D | kernel-test.c | 26 static int digest_len; variable 127 digest_len = 0; in create_socket() 152 sscanf(c, "%d", &digest_len); in create_socket() 191 ref = malloc(digest_len); in create_socket() 193 printf("Failed to allocated %d byte reference\n", digest_len); in create_socket() 197 digest = malloc(digest_len); in create_socket() 199 printf("Failed to allocated %d byte digest\n", digest_len); in create_socket() 234 ret = recv(sock, buf, digest_len, 0); in compute_digest() 239 if (ret != digest_len) { in compute_digest() 315 if (memcmp(ref, digest, digest_len) != 0) { in main()
|
/linux-6.12.1/tools/build/feature/ |
D | test-libcrypto.c | 11 unsigned int digest_len; in main() local 19 EVP_DigestFinal_ex(mdctx, &md[0], &digest_len); in main()
|
/linux-6.12.1/crypto/asymmetric_keys/ |
D | verify_pefile.c | 343 if (digest_size != ctx->digest_len) { in pefile_digest_pe() 345 digest_size, ctx->digest_len); in pefile_digest_pe() 370 pr_debug("Digest calc = [%*ph]\n", ctx->digest_len, digest); in pefile_digest_pe() 375 if (memcmp(digest, ctx->digest, ctx->digest_len) != 0) { in pefile_digest_pe() 446 ctx.digest_len, ctx.digest_len, ctx.digest); in verify_pefile_signature()
|
D | verify_pefile.h | 24 unsigned digest_len; /* Digest length */ member
|
D | mscode_parser.c | 126 ctx->digest_len = vlen; in mscode_note_digest()
|
/linux-6.12.1/crypto/ |
D | ecrdsa.c | 39 unsigned int digest_len; /* parameter (bytes) */ member 96 req->dst_len != ctx->digest_len || in ecrdsa_verify() 211 ctx->digest_len = 256 / 8; in ecrdsa_set_pub_key() 215 ctx->digest_len = 512 / 8; in ecrdsa_set_pub_key() 229 ctx->curve->g.ndigits * sizeof(u64) != ctx->digest_len) in ecrdsa_set_pub_key()
|
/linux-6.12.1/include/linux/ |
D | ima.h | 25 bool hash, u8 *digest, size_t digest_len); 59 size_t digest_len) in ima_measure_critical_data() argument
|
/linux-6.12.1/security/integrity/ima/ |
D | ima_api.c | 209 int digest_len; in ima_get_verity_digest() local 215 digest_len = fsverity_get_digest(inode, hash->digest, NULL, &alg); in ima_get_verity_digest() 216 if (digest_len == 0) in ima_get_verity_digest() 227 hash->hdr.length = digest_len; in ima_get_verity_digest()
|
D | ima_main.c | 952 bool buf_hash, u8 *digest, size_t digest_len) in process_buffer_measurement() argument 972 if (digest && digest_len < digest_hash_len) in process_buffer_measurement() 1102 bool hash, u8 *digest, size_t digest_len) in ima_measure_critical_data() argument 1110 digest_len); in ima_measure_critical_data()
|
D | ima.h | 389 bool buf_hash, u8 *digest, size_t digest_len);
|
/linux-6.12.1/tools/testing/selftests/net/ |
D | tcp_mmap.c | 96 unsigned int digest_len; variable 282 EVP_DigestFinal_ex(ctx, digest, &digest_len); in child_thread() 606 EVP_DigestFinal_ex(ctx, digest, &digest_len); in main()
|
/linux-6.12.1/security/keys/trusted-keys/ |
D | trusted_tpm1.c | 753 unsigned int digest_len; in getoptions() local 855 digest_len = hash_digest_size[opt->hash]; in getoptions() 856 if (!tpm2 || strlen(args[0].from) != (2 * digest_len)) in getoptions() 859 digest_len); in getoptions() 862 opt->policydigest_len = digest_len; in getoptions()
|
/linux-6.12.1/include/scsi/ |
D | libiscsi_tcp.h | 34 unsigned int digest_len; member
|
/linux-6.12.1/drivers/crypto/intel/ixp4xx/ |
D | ixp4xx_crypto.c | 737 const u8 *key, int key_len, unsigned int digest_len) in setup_auth() argument 760 memcpy(cinfo, algo->icv, digest_len); in setup_auth() 761 cinfo += digest_len; in setup_auth() 765 otarget = itarget + digest_len; in setup_auth() 1206 unsigned int digest_len = crypto_aead_maxauthsize(tfm); in aead_setup() local 1224 ctx->authkey_len, digest_len); in aead_setup() 1228 ctx->authkey_len, digest_len); in aead_setup()
|
/linux-6.12.1/drivers/scsi/ |
D | libiscsi_tcp.c | 166 segment->digest_len = ISCSI_DIGEST_SIZE; in iscsi_tcp_segment_splice_digest() 329 if (!segment->digest_len) in iscsi_tcp_dgst_verify() 333 segment->digest_len)) { in iscsi_tcp_dgst_verify() 870 if (segment->digest_len == 0) { in iscsi_tcp_hdr_recv_done()
|
/linux-6.12.1/drivers/crypto/amcc/ |
D | crypto4xx_sa.h | 93 u32 digest_len:4; member
|
D | crypto4xx_alg.c | 444 sa->sa_command_0.bf.digest_len = crypto_aead_authsize(aead) >> 2; in crypto4xx_crypt_aes_ccm() 661 sa->sa_command_0.bf.digest_len = ds >> 2; in crypto4xx_hash_init()
|
/linux-6.12.1/drivers/crypto/ccp/ |
D | ccp-ops.c | 1545 unsigned int digest_len; in ccp_run_sha_cmd() local 1567 digest_len = SHA1_DIGEST_SIZE; in ccp_run_sha_cmd() 1571 digest_len = SHA224_DIGEST_SIZE; in ccp_run_sha_cmd() 1575 digest_len = SHA256_DIGEST_SIZE; in ccp_run_sha_cmd() 1582 digest_len, 1); in ccp_run_sha_cmd()
|
/linux-6.12.1/drivers/nvme/target/ |
D | tcp.c | 337 u8 digest_len = nvmet_tcp_hdgst_len(queue); in nvmet_tcp_check_ddgst() local 341 (hdr->flags & NVME_TCP_F_HDGST ? digest_len : 0); in nvmet_tcp_check_ddgst()
|
/linux-6.12.1/drivers/nvme/host/ |
D | tcp.c | 502 u8 digest_len = nvme_tcp_hdgst_len(queue); in nvme_tcp_check_ddgst() local 506 ((hdr->flags & NVME_TCP_F_HDGST) ? digest_len : 0); in nvme_tcp_check_ddgst()
|
/linux-6.12.1/drivers/md/ |
D | dm-verity-target.c | 1734 root_digest.digest_len = v->digest_size; in verity_preresume()
|