Searched refs:key_tfm (Results 1 – 3 of 3) sorted by relevance
/linux-6.1.9/drivers/nvme/common/ |
D | auth.c | 235 struct crypto_shash *key_tfm; in nvme_auth_transform_key() local 254 key_tfm = crypto_alloc_shash(hmac_name, 0, 0); in nvme_auth_transform_key() 255 if (IS_ERR(key_tfm)) in nvme_auth_transform_key() 256 return (u8 *)key_tfm; in nvme_auth_transform_key() 259 crypto_shash_descsize(key_tfm), in nvme_auth_transform_key() 266 transformed_key = kzalloc(crypto_shash_digestsize(key_tfm), GFP_KERNEL); in nvme_auth_transform_key() 272 shash->tfm = key_tfm; in nvme_auth_transform_key() 273 ret = crypto_shash_setkey(key_tfm, key->key, key->len); in nvme_auth_transform_key() 290 crypto_free_shash(key_tfm); in nvme_auth_transform_key() 299 crypto_free_shash(key_tfm); in nvme_auth_transform_key()
|
/linux-6.1.9/fs/ecryptfs/ |
D | crypto.c | 1544 ecryptfs_process_key_cipher(struct crypto_skcipher **key_tfm, in ecryptfs_process_key_cipher() argument 1551 *key_tfm = NULL; in ecryptfs_process_key_cipher() 1562 *key_tfm = crypto_alloc_skcipher(full_alg_name, 0, CRYPTO_ALG_ASYNC); in ecryptfs_process_key_cipher() 1563 if (IS_ERR(*key_tfm)) { in ecryptfs_process_key_cipher() 1564 rc = PTR_ERR(*key_tfm); in ecryptfs_process_key_cipher() 1569 crypto_skcipher_set_flags(*key_tfm, CRYPTO_TFM_REQ_FORBID_WEAK_KEYS); in ecryptfs_process_key_cipher() 1571 *key_size = crypto_skcipher_max_keysize(*key_tfm); in ecryptfs_process_key_cipher() 1573 rc = crypto_skcipher_setkey(*key_tfm, dummy_key, *key_size); in ecryptfs_process_key_cipher() 1603 struct ecryptfs_key_tfm *key_tfm, *key_tfm_tmp; in ecryptfs_destroy_crypto() local 1606 list_for_each_entry_safe(key_tfm, key_tfm_tmp, &key_tfm_list, in ecryptfs_destroy_crypto() [all …]
|
D | ecryptfs_kernel.h | 311 struct crypto_skcipher *key_tfm; member 642 ecryptfs_add_new_key_tfm(struct ecryptfs_key_tfm **key_tfm, char *cipher_name, 646 int ecryptfs_tfm_exists(char *cipher_name, struct ecryptfs_key_tfm **key_tfm);
|