authdata 41 crypto/asymmetric_keys/asym_tpm.c unsigned char authdata[SHA1_DIGEST_SIZE]; authdata 64 crypto/asymmetric_keys/asym_tpm.c ret = TSS_authhmac(authdata, keyauth, SHA1_DIGEST_SIZE, enonce, authdata 80 crypto/asymmetric_keys/asym_tpm.c storebytes(tb, authdata, SHA1_DIGEST_SIZE); authdata 125 crypto/asymmetric_keys/asym_tpm.c unsigned char authdata[SHA1_DIGEST_SIZE]; authdata 150 crypto/asymmetric_keys/asym_tpm.c ret = TSS_authhmac(authdata, keyauth, SHA1_DIGEST_SIZE, enonce, authdata 168 crypto/asymmetric_keys/asym_tpm.c storebytes(tb, authdata, SHA1_DIGEST_SIZE); authdata 211 crypto/asymmetric_keys/asym_tpm.c unsigned char authdata[SHA1_DIGEST_SIZE]; authdata 236 crypto/asymmetric_keys/asym_tpm.c ret = TSS_authhmac(authdata, keyauth, SHA1_DIGEST_SIZE, enonce, authdata 254 crypto/asymmetric_keys/asym_tpm.c storebytes(tb, authdata, SHA1_DIGEST_SIZE); authdata 79 include/keys/rxrpc-type.h struct krb5_tagged_data *authdata; /* authorisation data */ authdata 201 net/rxrpc/key.c if (rxk5->authdata) { authdata 203 net/rxrpc/key.c rxrpc_free_krb5_tagged(&rxk5->authdata[loop]); authdata 204 net/rxrpc/key.c kfree(rxk5->authdata); authdata 518 net/rxrpc/key.c ret = rxrpc_krb5_decode_tagged_array(&rxk5->authdata, authdata 1107 net/rxrpc/key.c toksize += RND(token->k5->authdata[loop].data_len); authdata 1212 net/rxrpc/key.c ENCODE(token->k5->authdata[loop].tag); authdata 1213 net/rxrpc/key.c ENCODE_DATA(token->k5->authdata[loop].data_len, authdata 1214 net/rxrpc/key.c token->k5->authdata[loop].data); authdata 189 security/keys/trusted.c unsigned char *authdata; authdata 209 security/keys/trusted.c authdata = buffer + bufsize - SHA1_DIGEST_SIZE; authdata 210 security/keys/trusted.c continueflag = authdata - 1; authdata 251 security/keys/trusted.c if (memcmp(testhmac, authdata, SHA1_DIGEST_SIZE))