/openbmc/linux/arch/arm64/crypto/ |
H A D | aes-ce-ccm-glue.c | 44 static int ccm_setkey(struct crypto_aead *tfm, const u8 *in_key, in ccm_setkey() argument 47 struct crypto_aes_ctx *ctx = crypto_aead_ctx(tfm); in ccm_setkey() 52 static int ccm_setauthsize(struct crypto_aead *tfm, unsigned int authsize) in ccm_setauthsize() argument
|
H A D | sm4-ce-ccm-glue.c | 30 static int ccm_setkey(struct crypto_aead *tfm, const u8 *key, in ccm_setkey() argument 33 struct sm4_ctx *ctx = crypto_aead_ctx(tfm); in ccm_setkey() 46 static int ccm_setauthsize(struct crypto_aead *tfm, unsigned int authsize) in ccm_setauthsize() argument
|
/openbmc/linux/fs/crypto/ |
H A D | fscrypt_private.h | 185 struct crypto_skcipher *tfm; member 368 return smp_load_acquire(&prep_key->tfm) != NULL; in fscrypt_is_key_prepared() 403 return smp_load_acquire(&prep_key->tfm) != NULL; in fscrypt_is_key_prepared()
|
/openbmc/linux/net/ceph/ |
H A D | crypto.h | 19 struct crypto_sync_skcipher *tfm; member
|
/openbmc/linux/drivers/crypto/qce/ |
H A D | common.c | 150 struct crypto_ahash *ahash = __crypto_ahash_cast(async_req->tfm); in qce_setup_regs_ahash() 152 struct qce_alg_template *tmpl = to_ahash_tmpl(async_req->tfm); in qce_setup_regs_ahash() 155 unsigned int blocksize = crypto_tfm_alg_blocksize(async_req->tfm); in qce_setup_regs_ahash() 318 struct qce_cipher_ctx *ctx = crypto_tfm_ctx(async_req->tfm); in qce_setup_regs_skcipher() 424 struct qce_aead_ctx *ctx = crypto_tfm_ctx(async_req->tfm); in qce_setup_regs_aead()
|
/openbmc/linux/crypto/ |
H A D | hash.h | 34 int crypto_init_shash_ops_async(struct crypto_tfm *tfm);
|
H A D | fcrypt.c | 233 static void fcrypt_encrypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src) in fcrypt_encrypt() argument 235 const struct fcrypt_ctx *ctx = crypto_tfm_ctx(tfm); in fcrypt_encrypt() 265 static void fcrypt_decrypt(struct crypto_tfm *tfm, u8 *dst, const u8 *src) in fcrypt_decrypt() argument 267 const struct fcrypt_ctx *ctx = crypto_tfm_ctx(tfm); in fcrypt_decrypt() 300 static int fcrypt_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) in fcrypt_setkey() argument 302 struct fcrypt_ctx *ctx = crypto_tfm_ctx(tfm); in fcrypt_setkey()
|
H A D | sha256_generic.c | 46 if (crypto_shash_digestsize(desc->tfm) == SHA224_DIGEST_SIZE) in crypto_sha256_final()
|
H A D | camellia_generic.c | 960 camellia_set_key(struct crypto_tfm *tfm, const u8 *in_key, in camellia_set_key() argument 963 struct camellia_ctx *cctx = crypto_tfm_ctx(tfm); in camellia_set_key() 986 static void camellia_encrypt(struct crypto_tfm *tfm, u8 *out, const u8 *in) in camellia_encrypt() argument 988 const struct camellia_ctx *cctx = crypto_tfm_ctx(tfm); in camellia_encrypt() 1012 static void camellia_decrypt(struct crypto_tfm *tfm, u8 *out, const u8 *in) in camellia_decrypt() argument 1014 const struct camellia_ctx *cctx = crypto_tfm_ctx(tfm); in camellia_decrypt()
|
/openbmc/linux/drivers/block/zram/ |
H A D | zcomp.h | 15 struct crypto_comp *tfm; member
|
/openbmc/linux/fs/smb/server/ |
H A D | auth.c | 1117 struct crypto_aead *tfm; in ksmbd_crypt_message() local 1142 tfm = CRYPTO_GCM(ctx); in ksmbd_crypt_message() 1144 tfm = CRYPTO_CCM(ctx); in ksmbd_crypt_message() 1148 rc = crypto_aead_setkey(tfm, key, SMB3_GCM256_CRYPTKEY_SIZE); in ksmbd_crypt_message() 1150 rc = crypto_aead_setkey(tfm, key, SMB3_GCM128_CRYPTKEY_SIZE); in ksmbd_crypt_message() 1156 rc = crypto_aead_setauthsize(tfm, SMB2_SIGNATURE_SIZE); in ksmbd_crypt_message() 1162 req = aead_request_alloc(tfm, GFP_KERNEL); in ksmbd_crypt_message() 1180 iv_len = crypto_aead_ivsize(tfm); in ksmbd_crypt_message()
|
/openbmc/linux/drivers/crypto/ |
H A D | omap-aes.c | 570 static int omap_aes_setkey(struct crypto_skcipher *tfm, const u8 *key, in omap_aes_setkey() argument 573 struct omap_aes_ctx *ctx = crypto_skcipher_ctx(tfm); in omap_aes_setkey() 586 crypto_skcipher_set_flags(ctx->fallback, tfm->base.crt_flags & in omap_aes_setkey() 626 static int omap_aes_init_tfm(struct crypto_skcipher *tfm) in omap_aes_init_tfm() argument 628 const char *name = crypto_tfm_alg_name(&tfm->base); in omap_aes_init_tfm() 629 struct omap_aes_ctx *ctx = crypto_skcipher_ctx(tfm); in omap_aes_init_tfm() 638 crypto_skcipher_set_reqsize(tfm, sizeof(struct omap_aes_reqctx) + in omap_aes_init_tfm() 644 static void omap_aes_exit_tfm(struct crypto_skcipher *tfm) in omap_aes_exit_tfm() argument 646 struct omap_aes_ctx *ctx = crypto_skcipher_ctx(tfm); in omap_aes_exit_tfm()
|
H A D | atmel-tdes.c | 784 static int atmel_des_setkey(struct crypto_skcipher *tfm, const u8 *key, in atmel_des_setkey() argument 787 struct atmel_tdes_ctx *ctx = crypto_skcipher_ctx(tfm); in atmel_des_setkey() 790 err = verify_skcipher_des_key(tfm, key); in atmel_des_setkey() 800 static int atmel_tdes_setkey(struct crypto_skcipher *tfm, const u8 *key, in atmel_tdes_setkey() argument 803 struct atmel_tdes_ctx *ctx = crypto_skcipher_ctx(tfm); in atmel_tdes_setkey() 806 err = verify_skcipher_des3_key(tfm, key); in atmel_tdes_setkey() 885 static int atmel_tdes_init_tfm(struct crypto_skcipher *tfm) in atmel_tdes_init_tfm() argument 887 struct atmel_tdes_ctx *ctx = crypto_skcipher_ctx(tfm); in atmel_tdes_init_tfm() 893 crypto_skcipher_set_reqsize(tfm, sizeof(struct atmel_tdes_reqctx)); in atmel_tdes_init_tfm()
|
H A D | omap-des.c | 371 static int omap_des_crypt_dma(struct crypto_tfm *tfm, in omap_des_crypt_dma() argument 375 struct omap_des_ctx *ctx = crypto_tfm_ctx(tfm); in omap_des_crypt_dma() 454 struct crypto_tfm *tfm = crypto_skcipher_tfm( in omap_des_crypt_dma_start() local 476 err = omap_des_crypt_dma(tfm, dd->in_sg, dd->out_sg, dd->in_sg_len, in omap_des_crypt_dma_start() 703 static int omap_des_init_tfm(struct crypto_skcipher *tfm) in omap_des_init_tfm() argument 707 crypto_skcipher_set_reqsize(tfm, sizeof(struct omap_des_reqctx)); in omap_des_init_tfm()
|
/openbmc/linux/net/rxrpc/ |
H A D | rxkad.c | 235 struct crypto_skcipher *tfm = &call->conn->rxkad.cipher->base; in rxkad_get_call_crypto() local 237 return skcipher_request_alloc(tfm, GFP_NOFS); in rxkad_get_call_crypto() 1215 struct crypto_sync_skcipher *tfm; in rxkad_init() local 1220 tfm = crypto_alloc_sync_skcipher("pcbc(fcrypt)", 0, 0); in rxkad_init() 1221 if (IS_ERR(tfm)) in rxkad_init() 1222 return PTR_ERR(tfm); in rxkad_init() 1224 req = skcipher_request_alloc(&tfm->base, GFP_KERNEL); in rxkad_init() 1229 rxkad_ci = tfm; in rxkad_init() 1233 crypto_free_sync_skcipher(tfm); in rxkad_init()
|
/openbmc/linux/drivers/md/ |
H A D | dm-verity-target.c | 142 ahash_request_set_tfm(req, v->tfm); in verity_hash_init() 1012 if (v->tfm) in verity_dtr() 1013 crypto_free_ahash(v->tfm); in verity_dtr() 1333 v->tfm = crypto_alloc_ahash(v->alg_name, 0, in verity_ctr() 1335 if (IS_ERR(v->tfm)) { in verity_ctr() 1337 r = PTR_ERR(v->tfm); in verity_ctr() 1338 v->tfm = NULL; in verity_ctr() 1348 crypto_hash_alg_common(v->tfm)->base.cra_driver_name); in verity_ctr() 1350 v->digest_size = crypto_ahash_digestsize(v->tfm); in verity_ctr() 1357 crypto_ahash_reqsize(v->tfm); in verity_ctr()
|
/openbmc/linux/include/crypto/ |
H A D | aes.h | 51 int crypto_aes_set_key(struct crypto_tfm *tfm, const u8 *in_key,
|
H A D | nhpoly1305.h | 61 int crypto_nhpoly1305_setkey(struct crypto_shash *tfm,
|
/openbmc/linux/fs/ecryptfs/ |
H A D | keystore.c | 760 s->hash_desc->tfm = s->hash_tfm; in ecryptfs_write_tag_70_packet() 1654 struct crypto_skcipher *tfm; in decrypt_passphrase_encrypted_session_key() local 1697 req = skcipher_request_alloc(tfm, GFP_KERNEL); in decrypt_passphrase_encrypted_session_key() 1702 crypto_skcipher_driver_name(tfm)); in decrypt_passphrase_encrypted_session_key() 1710 tfm, auth_tok->token.password.session_key_encryption_key, in decrypt_passphrase_encrypted_session_key() 2192 struct crypto_skcipher *tfm; in write_tag_3_packet() local 2210 crypto_skcipher_max_keysize(tfm)); in write_tag_3_packet() 2212 crypto_skcipher_max_keysize(tfm); in write_tag_3_packet() 2282 rc = crypto_skcipher_setkey(tfm, session_key_encryption_key, in write_tag_3_packet() 2291 req = skcipher_request_alloc(tfm, GFP_KERNEL); in write_tag_3_packet() [all …]
|
/openbmc/linux/drivers/crypto/marvell/cesa/ |
H A D | cesa.c | 71 ctx = crypto_tfm_ctx(req->tfm); in mv_cesa_rearm_engine() 82 ctx = crypto_tfm_ctx(req->tfm); in mv_cesa_std_process() 147 ctx = crypto_tfm_ctx(req->tfm); in mv_cesa_int() 161 ctx = crypto_tfm_ctx(req->tfm); in mv_cesa_int()
|
/openbmc/linux/net/mac802154/ |
H A D | llsec.h | 23 struct crypto_aead *tfm[3]; member
|
/openbmc/linux/drivers/net/ppp/ |
H A D | ppp_mppe.c | 198 state->sha1->tfm = shash; in mppe_alloc() 224 crypto_free_shash(state->sha1->tfm); in mppe_alloc() 240 crypto_free_shash(state->sha1->tfm); in mppe_free()
|
/openbmc/linux/drivers/net/wireless/intersil/orinoco/ |
H A D | mic.c | 67 desc->tfm = tfm_michael; in orinoco_mic()
|
/openbmc/linux/drivers/infiniband/sw/rxe/ |
H A D | rxe.c | 34 if (rxe->tfm) in rxe_dealloc() 35 crypto_free_shash(rxe->tfm); in rxe_dealloc()
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/trusted-firmware-m/files/corstone1000/ |
H A D | 0006-Platform-Corstone1000-skip-the-first-nv-counter.patch | 7 update since the tfm bl1 does not sync metadata and nv counters in OTP during
|