Searched refs:hmac_tfm (Results 1 – 10 of 10) sorted by relevance
/linux-6.1.9/fs/crypto/ |
D | hkdf.c | 48 static int hkdf_extract(struct crypto_shash *hmac_tfm, const u8 *ikm, in hkdf_extract() argument 54 err = crypto_shash_setkey(hmac_tfm, default_salt, HKDF_HASHLEN); in hkdf_extract() 58 return crypto_shash_tfm_digest(hmac_tfm, ikm, ikmlen, prk); in hkdf_extract() 71 struct crypto_shash *hmac_tfm; in fscrypt_init_hkdf() local 75 hmac_tfm = crypto_alloc_shash(HKDF_HMAC_ALG, 0, 0); in fscrypt_init_hkdf() 76 if (IS_ERR(hmac_tfm)) { in fscrypt_init_hkdf() 78 PTR_ERR(hmac_tfm)); in fscrypt_init_hkdf() 79 return PTR_ERR(hmac_tfm); in fscrypt_init_hkdf() 82 if (WARN_ON(crypto_shash_digestsize(hmac_tfm) != sizeof(prk))) { in fscrypt_init_hkdf() 87 err = hkdf_extract(hmac_tfm, master_key, master_key_size, prk); in fscrypt_init_hkdf() [all …]
|
D | fscrypt_private.h | 306 struct crypto_shash *hmac_tfm; member
|
/linux-6.1.9/fs/ubifs/ |
D | auth.c | 49 return crypto_shash_tfm_digest(c->hmac_tfm, hash, c->hash_len, hmac); in ubifs_hash_calc_hmac() 318 c->hmac_tfm = crypto_alloc_shash(hmac_name, 0, 0); in ubifs_init_authentication() 319 if (IS_ERR(c->hmac_tfm)) { in ubifs_init_authentication() 320 err = PTR_ERR(c->hmac_tfm); in ubifs_init_authentication() 325 c->hmac_desc_len = crypto_shash_digestsize(c->hmac_tfm); in ubifs_init_authentication() 333 err = crypto_shash_setkey(c->hmac_tfm, ukp->data, ukp->datalen); in ubifs_init_authentication() 349 crypto_free_shash(c->hmac_tfm); in ubifs_init_authentication() 371 crypto_free_shash(c->hmac_tfm); in __ubifs_exit_authentication() 391 SHASH_DESC_ON_STACK(shash, c->hmac_tfm); in ubifs_node_calc_hmac() 398 shash->tfm = c->hmac_tfm; in ubifs_node_calc_hmac() [all …]
|
D | replay.c | 615 err = crypto_shash_tfm_digest(c->hmac_tfm, hash, in authenticate_sleb()
|
D | ubifs.h | 1500 struct crypto_shash *hmac_tfm; member
|
/linux-6.1.9/drivers/crypto/ccp/ |
D | ccp-crypto-sha.c | 276 struct crypto_shash *shash = ctx->u.sha.hmac_tfm; in ccp_sha_setkey() 335 struct crypto_shash *hmac_tfm; in ccp_hmac_sha_cra_init() local 337 hmac_tfm = crypto_alloc_shash(alg->child_alg, 0, 0); in ccp_hmac_sha_cra_init() 338 if (IS_ERR(hmac_tfm)) { in ccp_hmac_sha_cra_init() 341 return PTR_ERR(hmac_tfm); in ccp_hmac_sha_cra_init() 344 ctx->u.sha.hmac_tfm = hmac_tfm; in ccp_hmac_sha_cra_init() 353 if (ctx->u.sha.hmac_tfm) in ccp_hmac_sha_cra_exit() 354 crypto_free_shash(ctx->u.sha.hmac_tfm); in ccp_hmac_sha_cra_exit()
|
D | ccp-crypto.h | 196 struct crypto_shash *hmac_tfm; member
|
/linux-6.1.9/security/integrity/evm/ |
D | evm_crypto.c | 29 static struct crypto_shash *hmac_tfm; variable 86 tfm = &hmac_tfm; in init_desc()
|
/linux-6.1.9/net/ceph/ |
D | messenger_v2.c | 701 WARN_ON(con->v2.hmac_tfm || con->v2.gcm_tfm || con->v2.gcm_req); in setup_crypto() 716 con->v2.hmac_tfm = crypto_alloc_shash("hmac(sha256)", 0, 0); in setup_crypto() 718 if (IS_ERR(con->v2.hmac_tfm)) { in setup_crypto() 719 ret = PTR_ERR(con->v2.hmac_tfm); in setup_crypto() 720 con->v2.hmac_tfm = NULL; in setup_crypto() 726 crypto_shash_alignmask(con->v2.hmac_tfm)); in setup_crypto() 727 ret = crypto_shash_setkey(con->v2.hmac_tfm, session_key, in setup_crypto() 790 SHASH_DESC_ON_STACK(desc, con->v2.hmac_tfm); /* tfm arg is ignored */ in hmac_sha256() 795 con->v2.hmac_tfm, kvec_cnt); in hmac_sha256() 797 if (!con->v2.hmac_tfm) { in hmac_sha256() [all …]
|
/linux-6.1.9/include/linux/ceph/ |
D | messenger.h | 378 struct crypto_shash *hmac_tfm; /* post-auth signature */ member
|