Searched refs:hmac_tfm (Results 1 – 10 of 10) sorted by relevance
/openbmc/linux/fs/crypto/ |
H A D | hkdf.c | 48 static int hkdf_extract(struct crypto_shash *hmac_tfm, const u8 *ikm, in hkdf_extract() argument 54 err = crypto_shash_setkey(hmac_tfm, default_salt, HKDF_HASHLEN); in hkdf_extract() 58 return crypto_shash_tfm_digest(hmac_tfm, ikm, ikmlen, prk); in hkdf_extract() 71 struct crypto_shash *hmac_tfm; in fscrypt_init_hkdf() local 75 hmac_tfm = crypto_alloc_shash(HKDF_HMAC_ALG, 0, 0); in fscrypt_init_hkdf() 76 if (IS_ERR(hmac_tfm)) { in fscrypt_init_hkdf() 78 PTR_ERR(hmac_tfm)); in fscrypt_init_hkdf() 79 return PTR_ERR(hmac_tfm); in fscrypt_init_hkdf() 82 if (WARN_ON_ONCE(crypto_shash_digestsize(hmac_tfm) != sizeof(prk))) { in fscrypt_init_hkdf() 87 err = hkdf_extract(hmac_tfm, master_key, master_key_size, prk); in fscrypt_init_hkdf() [all …]
|
H A D | fscrypt_private.h | 306 struct crypto_shash *hmac_tfm; member
|
/openbmc/linux/fs/ubifs/ |
H A D | auth.c | 49 return crypto_shash_tfm_digest(c->hmac_tfm, hash, c->hash_len, hmac); in ubifs_hash_calc_hmac() 318 c->hmac_tfm = crypto_alloc_shash(hmac_name, 0, 0); in ubifs_init_authentication() 319 if (IS_ERR(c->hmac_tfm)) { in ubifs_init_authentication() 320 err = PTR_ERR(c->hmac_tfm); in ubifs_init_authentication() 325 c->hmac_desc_len = crypto_shash_digestsize(c->hmac_tfm); in ubifs_init_authentication() 333 err = crypto_shash_setkey(c->hmac_tfm, ukp->data, ukp->datalen); in ubifs_init_authentication() 349 crypto_free_shash(c->hmac_tfm); in ubifs_init_authentication() 371 crypto_free_shash(c->hmac_tfm); in __ubifs_exit_authentication() 391 SHASH_DESC_ON_STACK(shash, c->hmac_tfm); in ubifs_node_calc_hmac() 398 shash->tfm = c->hmac_tfm; in ubifs_node_calc_hmac() [all …]
|
H A D | replay.c | 615 err = crypto_shash_tfm_digest(c->hmac_tfm, hash, in authenticate_sleb()
|
H A D | ubifs.h | 1500 struct crypto_shash *hmac_tfm; member
|
/openbmc/linux/drivers/crypto/ccp/ |
H A D | ccp-crypto-sha.c | 276 struct crypto_shash *shash = ctx->u.sha.hmac_tfm; in ccp_sha_setkey() 335 struct crypto_shash *hmac_tfm; in ccp_hmac_sha_cra_init() local 337 hmac_tfm = crypto_alloc_shash(alg->child_alg, 0, 0); in ccp_hmac_sha_cra_init() 338 if (IS_ERR(hmac_tfm)) { in ccp_hmac_sha_cra_init() 341 return PTR_ERR(hmac_tfm); in ccp_hmac_sha_cra_init() 344 ctx->u.sha.hmac_tfm = hmac_tfm; in ccp_hmac_sha_cra_init() 353 if (ctx->u.sha.hmac_tfm) in ccp_hmac_sha_cra_exit() 354 crypto_free_shash(ctx->u.sha.hmac_tfm); in ccp_hmac_sha_cra_exit()
|
H A D | ccp-crypto.h | 196 struct crypto_shash *hmac_tfm; member
|
/openbmc/linux/security/integrity/evm/ |
H A D | evm_crypto.c | 29 static struct crypto_shash *hmac_tfm; variable 86 tfm = &hmac_tfm; in init_desc()
|
/openbmc/linux/net/ceph/ |
H A D | messenger_v2.c | 712 WARN_ON(con->v2.hmac_tfm || con->v2.gcm_tfm || con->v2.gcm_req); in setup_crypto() 727 con->v2.hmac_tfm = crypto_alloc_shash("hmac(sha256)", 0, 0); in setup_crypto() 729 if (IS_ERR(con->v2.hmac_tfm)) { in setup_crypto() 730 ret = PTR_ERR(con->v2.hmac_tfm); in setup_crypto() 731 con->v2.hmac_tfm = NULL; in setup_crypto() 737 crypto_shash_alignmask(con->v2.hmac_tfm)); in setup_crypto() 738 ret = crypto_shash_setkey(con->v2.hmac_tfm, session_key, in setup_crypto() 801 SHASH_DESC_ON_STACK(desc, con->v2.hmac_tfm); /* tfm arg is ignored */ in hmac_sha256() 806 con->v2.hmac_tfm, kvec_cnt); in hmac_sha256() 808 if (!con->v2.hmac_tfm) { in hmac_sha256() [all …]
|
/openbmc/linux/include/linux/ceph/ |
H A D | messenger.h | 415 struct crypto_shash *hmac_tfm; /* post-auth signature */ member
|