Lines Matching refs:SHA256_DIGEST_SIZE
105 u8 our_nonce[SHA256_DIGEST_SIZE];
106 u8 tpm_nonce[SHA256_DIGEST_SIZE];
126 u8 session_key[SHA256_DIGEST_SIZE];
127 u8 passphrase[SHA256_DIGEST_SIZE];
151 [TPM_ALG_SHA256] = SHA256_DIGEST_SIZE,
324 u8 nonce[SHA256_DIGEST_SIZE];
361 len += 9 + 2 * SHA256_DIGEST_SIZE;
364 tpm_buf_append_u32(buf, 9 + 2 * SHA256_DIGEST_SIZE);
372 tpm_buf_append_u16(buf, SHA256_DIGEST_SIZE);
373 tpm_buf_append(buf, nonce, SHA256_DIGEST_SIZE);
376 tpm_buf_append_u16(buf, SHA256_DIGEST_SIZE);
377 tpm_buf_append(buf, nonce, SHA256_DIGEST_SIZE);
428 sha256_update(sctx, out, SHA256_DIGEST_SIZE);
433 * assume hash sha256 and nonces u, v of size SHA256_DIGEST_SIZE but
449 sha256_update(&sctx, u, SHA256_DIGEST_SIZE);
450 sha256_update(&sctx, v, SHA256_DIGEST_SIZE);
454 bytes -= SHA256_DIGEST_SIZE;
456 out += SHA256_DIGEST_SIZE;
594 u8 cphash[SHA256_DIGEST_SIZE];
669 tpm2_KDFa(auth->session_key, SHA256_DIGEST_SIZE
751 u8 rphash[SHA256_DIGEST_SIZE];
799 if (len != SHA256_DIGEST_SIZE)
807 if (len != SHA256_DIGEST_SIZE)
832 if (memcmp(rphash, &buf->data[offset_s], SHA256_DIGEST_SIZE) == 0) {
842 tpm2_KDFa(auth->session_key, SHA256_DIGEST_SIZE
925 u8 name[SHA256_DIGEST_SIZE + 2];
1184 if (len != SHA256_DIGEST_SIZE || offset_r > param_len)
1211 if (len != SHA256_DIGEST_SIZE + 2)
1215 SHA256_DIGEST_SIZE + 2) != 0) {