Searched refs:authdata (Results 1 – 4 of 4) sorted by relevance
| /Linux-v5.4/crypto/asymmetric_keys/ |
| D | asym_tpm.c | 41 unsigned char authdata[SHA1_DIGEST_SIZE]; in tpm_loadkey2() local 64 ret = TSS_authhmac(authdata, keyauth, SHA1_DIGEST_SIZE, enonce, in tpm_loadkey2() 80 storebytes(tb, authdata, SHA1_DIGEST_SIZE); in tpm_loadkey2() 125 unsigned char authdata[SHA1_DIGEST_SIZE]; in tpm_unbind() local 150 ret = TSS_authhmac(authdata, keyauth, SHA1_DIGEST_SIZE, enonce, in tpm_unbind() 168 storebytes(tb, authdata, SHA1_DIGEST_SIZE); in tpm_unbind() 211 unsigned char authdata[SHA1_DIGEST_SIZE]; in tpm_sign() local 236 ret = TSS_authhmac(authdata, keyauth, SHA1_DIGEST_SIZE, enonce, in tpm_sign() 254 storebytes(tb, authdata, SHA1_DIGEST_SIZE); in tpm_sign()
|
| /Linux-v5.4/net/rxrpc/ |
| D | key.c | 201 if (rxk5->authdata) { in rxrpc_rxk5_free() 203 rxrpc_free_krb5_tagged(&rxk5->authdata[loop]); in rxrpc_rxk5_free() 204 kfree(rxk5->authdata); in rxrpc_rxk5_free() 518 ret = rxrpc_krb5_decode_tagged_array(&rxk5->authdata, in rxrpc_preparse_xdr_rxk5() 1107 toksize += RND(token->k5->authdata[loop].data_len); in rxrpc_read() 1217 ENCODE(token->k5->authdata[loop].tag); in rxrpc_read() 1218 ENCODE_DATA(token->k5->authdata[loop].data_len, in rxrpc_read() 1219 token->k5->authdata[loop].data); in rxrpc_read()
|
| /Linux-v5.4/include/keys/ |
| D | rxrpc-type.h | 79 struct krb5_tagged_data *authdata; /* authorisation data */ member
|
| /Linux-v5.4/security/keys/ |
| D | trusted.c | 189 unsigned char *authdata; in TSS_checkhmac1() local 209 authdata = buffer + bufsize - SHA1_DIGEST_SIZE; in TSS_checkhmac1() 210 continueflag = authdata - 1; in TSS_checkhmac1() 251 if (memcmp(testhmac, authdata, SHA1_DIGEST_SIZE)) in TSS_checkhmac1()
|