Searched refs:hmac_tfm (Results 1 – 10 of 10) sorted by relevance
/linux-6.12.1/fs/crypto/ |
D | hkdf.c | 48 static int hkdf_extract(struct crypto_shash *hmac_tfm, const u8 *ikm, in hkdf_extract() argument 54 err = crypto_shash_setkey(hmac_tfm, default_salt, HKDF_HASHLEN); in hkdf_extract() 58 return crypto_shash_tfm_digest(hmac_tfm, ikm, ikmlen, prk); in hkdf_extract() 71 struct crypto_shash *hmac_tfm; in fscrypt_init_hkdf() local 75 hmac_tfm = crypto_alloc_shash(HKDF_HMAC_ALG, 0, 0); in fscrypt_init_hkdf() 76 if (IS_ERR(hmac_tfm)) { in fscrypt_init_hkdf() 78 PTR_ERR(hmac_tfm)); in fscrypt_init_hkdf() 79 return PTR_ERR(hmac_tfm); in fscrypt_init_hkdf() 82 if (WARN_ON_ONCE(crypto_shash_digestsize(hmac_tfm) != sizeof(prk))) { in fscrypt_init_hkdf() 87 err = hkdf_extract(hmac_tfm, master_key, master_key_size, prk); in fscrypt_init_hkdf() [all …]
|
D | fscrypt_private.h | 350 struct crypto_shash *hmac_tfm; member
|
/linux-6.12.1/fs/ubifs/ |
D | auth.c | 48 return crypto_shash_tfm_digest(c->hmac_tfm, hash, c->hash_len, hmac); in ubifs_hash_calc_hmac() 317 c->hmac_tfm = crypto_alloc_shash(hmac_name, 0, 0); in ubifs_init_authentication() 318 if (IS_ERR(c->hmac_tfm)) { in ubifs_init_authentication() 319 err = PTR_ERR(c->hmac_tfm); in ubifs_init_authentication() 324 c->hmac_desc_len = crypto_shash_digestsize(c->hmac_tfm); in ubifs_init_authentication() 332 err = crypto_shash_setkey(c->hmac_tfm, ukp->data, ukp->datalen); in ubifs_init_authentication() 348 crypto_free_shash(c->hmac_tfm); in ubifs_init_authentication() 370 crypto_free_shash(c->hmac_tfm); in __ubifs_exit_authentication() 390 SHASH_DESC_ON_STACK(shash, c->hmac_tfm); in ubifs_node_calc_hmac() 397 shash->tfm = c->hmac_tfm; in ubifs_node_calc_hmac() [all …]
|
D | replay.c | 617 err = crypto_shash_tfm_digest(c->hmac_tfm, hash, in authenticate_sleb()
|
D | ubifs.h | 1494 struct crypto_shash *hmac_tfm; member
|
/linux-6.12.1/drivers/crypto/ccp/ |
D | ccp-crypto-sha.c | 276 struct crypto_shash *shash = ctx->u.sha.hmac_tfm; in ccp_sha_setkey() 335 struct crypto_shash *hmac_tfm; in ccp_hmac_sha_cra_init() local 337 hmac_tfm = crypto_alloc_shash(alg->child_alg, 0, 0); in ccp_hmac_sha_cra_init() 338 if (IS_ERR(hmac_tfm)) { in ccp_hmac_sha_cra_init() 341 return PTR_ERR(hmac_tfm); in ccp_hmac_sha_cra_init() 344 ctx->u.sha.hmac_tfm = hmac_tfm; in ccp_hmac_sha_cra_init() 353 if (ctx->u.sha.hmac_tfm) in ccp_hmac_sha_cra_exit() 354 crypto_free_shash(ctx->u.sha.hmac_tfm); in ccp_hmac_sha_cra_exit()
|
D | ccp-crypto.h | 196 struct crypto_shash *hmac_tfm; member
|
/linux-6.12.1/security/integrity/evm/ |
D | evm_crypto.c | 29 static struct crypto_shash *hmac_tfm; variable 86 tfm = &hmac_tfm; in init_desc()
|
/linux-6.12.1/net/ceph/ |
D | messenger_v2.c | 712 WARN_ON(con->v2.hmac_tfm || con->v2.gcm_tfm || con->v2.gcm_req); in setup_crypto() 727 con->v2.hmac_tfm = crypto_alloc_shash("hmac(sha256)", 0, 0); in setup_crypto() 729 if (IS_ERR(con->v2.hmac_tfm)) { in setup_crypto() 730 ret = PTR_ERR(con->v2.hmac_tfm); in setup_crypto() 731 con->v2.hmac_tfm = NULL; in setup_crypto() 736 ret = crypto_shash_setkey(con->v2.hmac_tfm, session_key, in setup_crypto() 799 SHASH_DESC_ON_STACK(desc, con->v2.hmac_tfm); /* tfm arg is ignored */ in hmac_sha256() 804 con->v2.hmac_tfm, kvec_cnt); in hmac_sha256() 806 if (!con->v2.hmac_tfm) { in hmac_sha256() 811 desc->tfm = con->v2.hmac_tfm; in hmac_sha256() [all …]
|
/linux-6.12.1/include/linux/ceph/ |
D | messenger.h | 415 struct crypto_shash *hmac_tfm; /* post-auth signature */ member
|