context,
context_len,
/* seed= */ NULL,
- /* seed_len= */ 0,
+ /* seed_size= */ 0,
len,
&buf);
if (r < 0)
seed->size,
"INTEGRITY",
/* context= */ NULL,
- /* n_context= */ 0,
+ /* context_len= */ 0,
bits,
&integrity_key,
&integrity_key_size);
parent->publicArea.parameters.asymDetail.symmetric.keyBits.sym,
sym_mode,
storage_key, storage_key_size,
- /* iv= */ NULL, /* n_iv= */ 0,
+ /* iv= */ NULL, /* iv_size= */ 0,
marshalled_sensitive, marshalled_sensitive_size,
&encrypted_sensitive, &encrypted_sensitive_size);
if (r < 0)
_cleanup_free_ void *x = NULL, *y = NULL;
size_t x_size, y_size;
- r = ecc_pkey_to_curve_x_y(pkey, /* curve_id= */ NULL, &x, &x_size, &y, &y_size);
+ r = ecc_pkey_to_curve_x_y(pkey, /* ret_curve_id= */ NULL, &x, &x_size, &y, &y_size);
if (r < 0)
return log_debug_errno(r, "Could not get ECC get x/y: %m");
discovered_path,
/* flags = */ 0,
&v,
- /* ret_line= */ NULL,
+ /* reterr_line= */ NULL,
/* ret_column= */ NULL);
if (r < 0)
return log_error_errno(r, "Failed to parse existing pcrlock policy file '%s': %m", discovered_path);
r = sd_json_parse(decoded.iov_base,
/* flags= */ 0,
&v,
- /* ret_line= */ NULL,
+ /* reterr_line= */ NULL,
/* ret_column= */ NULL);
if (r < 0)
return log_error_errno(r, "Failed to parse pcrlock policy: %m");
}
uint32_t new_mask;
- r = tpm2_pcr_values_to_mask(pcr_values, n_pcr_values, /* algorithm= */ 0, &new_mask);
+ r = tpm2_pcr_values_to_mask(pcr_values, n_pcr_values, /* hash= */ 0, &new_mask);
if (r < 0)
return log_error_errno(r, "Could not get pcr values mask: %m");