/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/images/ |
H A D | corstone1000-flash-firmware-image.bb | 38 TFM_SIGN_PRIVATE_KEY = "${libdir}/tfm-scripts/root-RSA-3072_1.pem"
|
/openbmc/linux/drivers/md/ |
H A D | dm-verity.h | 42 struct crypto_ahash *tfm; member
|
H A D | dm-crypt.c | 132 struct crypto_skcipher *tfm; member 493 desc->tfm = lmk->hash_tfm; in crypt_iv_lmk_one() 655 desc->tfm = tcw->crc32_tfm; in crypt_iv_tcw_whitening() 750 struct crypto_skcipher *tfm = any_tfm(cc); in crypt_iv_eboiv_gen() local 765 skcipher_request_set_tfm(req, tfm); in crypt_iv_eboiv_gen() 785 crypto_free_skcipher(elephant->tfm); in crypt_iv_elephant_dtr() 786 elephant->tfm = NULL; in crypt_iv_elephant_dtr() 795 elephant->tfm = crypto_alloc_skcipher("ecb(aes)", 0, in crypt_iv_elephant_ctr() 797 if (IS_ERR(elephant->tfm)) { in crypt_iv_elephant_ctr() 798 r = PTR_ERR(elephant->tfm); in crypt_iv_elephant_ctr() [all …]
|
/openbmc/linux/crypto/ |
H A D | kdf_sp800108.c | 28 desc->tfm = kmd; in crypto_kdf108_ctr_generate()
|
H A D | sha3_generic.c | 164 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); in crypto_sha3_init() 217 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); in crypto_sha3_final()
|
H A D | streebog_generic.c | 911 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); in streebog_init() 1042 if (crypto_shash_digestsize(desc->tfm) == STREEBOG256_DIGEST_SIZE) in streebog_final()
|
H A D | twofish_common.c | 686 int twofish_setkey(struct crypto_tfm *tfm, const u8 *key, unsigned int key_len) in twofish_setkey() argument 688 return __twofish_setkey(crypto_tfm_ctx(tfm), key, key_len); in twofish_setkey()
|
H A D | crypto_engine.c | 151 if (async_req->tfm->__crt_alg->cra_flags & CRYPTO_ALG_ENGINE) { in crypto_pump_requests() 152 alg = container_of(async_req->tfm->__crt_alg, in crypto_pump_requests()
|
/openbmc/linux/fs/verity/ |
H A D | fsverity_private.h | 23 struct crypto_shash *tfm; /* hash tfm, allocated on demand */ member
|
/openbmc/linux/drivers/net/ |
H A D | macsec.c | 190 crypto_free_aead(sa->key.tfm); in free_rxsa() 218 crypto_free_aead(sa->key.tfm); in free_txsa() 573 aead_request_set_tfm(req, tfm); in macsec_alloc_req() 1356 struct crypto_aead *tfm; in macsec_alloc_tfm() local 1361 if (IS_ERR(tfm)) in macsec_alloc_tfm() 1362 return tfm; in macsec_alloc_tfm() 1372 return tfm; in macsec_alloc_tfm() 1374 crypto_free_aead(tfm); in macsec_alloc_tfm() 1386 if (IS_ERR(rx_sa->key.tfm)) { in init_rx_sa() 1388 return PTR_ERR(rx_sa->key.tfm); in init_rx_sa() [all …]
|
/openbmc/linux/drivers/crypto/caam/ |
H A D | caamalg_qi.c | 2505 static int caam_cra_init(struct crypto_skcipher *tfm) in caam_cra_init() argument 2507 struct skcipher_alg *alg = crypto_skcipher_alg(tfm); in caam_cra_init() 2510 struct caam_ctx *ctx = crypto_skcipher_ctx_dma(tfm); in caam_cra_init() 2515 const char *tfm_name = crypto_tfm_alg_name(&tfm->base); in caam_cra_init() 2538 static int caam_aead_init(struct crypto_aead *tfm) in caam_aead_init() argument 2540 struct aead_alg *alg = crypto_aead_alg(tfm); in caam_aead_init() 2543 struct caam_ctx *ctx = crypto_aead_ctx_dma(tfm); in caam_aead_init() 2559 static void caam_cra_exit(struct crypto_skcipher *tfm) in caam_cra_exit() argument 2561 struct caam_ctx *ctx = crypto_skcipher_ctx_dma(tfm); in caam_cra_exit() 2568 static void caam_aead_exit(struct crypto_aead *tfm) in caam_aead_exit() argument [all …]
|
H A D | caamalg.c | 3620 static int caam_cra_init(struct crypto_skcipher *tfm) in caam_cra_init() argument 3622 struct skcipher_alg *alg = crypto_skcipher_alg(tfm); in caam_cra_init() 3625 struct caam_ctx *ctx = crypto_skcipher_ctx_dma(tfm); in caam_cra_init() 3630 const char *tfm_name = crypto_tfm_alg_name(&tfm->base); in caam_cra_init() 3655 static int caam_aead_init(struct crypto_aead *tfm) in caam_aead_init() argument 3657 struct aead_alg *alg = crypto_aead_alg(tfm); in caam_aead_init() 3660 struct caam_ctx *ctx = crypto_aead_ctx_dma(tfm); in caam_aead_init() 3676 static void caam_cra_exit(struct crypto_skcipher *tfm) in caam_cra_exit() argument 3678 struct caam_ctx *ctx = crypto_skcipher_ctx_dma(tfm); in caam_cra_exit() 3685 static void caam_aead_exit(struct crypto_aead *tfm) in caam_aead_exit() argument [all …]
|
H A D | caamalg_qi2.c | 137 switch (crypto_tfm_alg_type(areq->tfm)) { in to_caam_req() 1606 struct skcipher_alg *alg = crypto_skcipher_alg(tfm); in caam_cra_init_skcipher() 1609 struct caam_ctx *ctx = crypto_skcipher_ctx_dma(tfm); in caam_cra_init_skcipher() 1628 tfm, sizeof(struct caam_request) + in caam_cra_init_skcipher() 1631 crypto_skcipher_set_reqsize_dma(tfm, in caam_cra_init_skcipher() 1642 static int caam_cra_init_aead(struct crypto_aead *tfm) in caam_cra_init_aead() argument 1644 struct aead_alg *alg = crypto_aead_alg(tfm); in caam_cra_init_aead() 1660 static void caam_cra_exit(struct crypto_skcipher *tfm) in caam_cra_exit() argument 1662 struct caam_ctx *ctx = crypto_skcipher_ctx_dma(tfm); in caam_cra_exit() 1671 caam_exit_common(crypto_aead_ctx_dma(tfm)); in caam_cra_exit_aead() [all …]
|
/openbmc/linux/net/sunrpc/auth_gss/ |
H A D | gss_krb5_test.c | 81 struct crypto_ahash *tfm; in checksum_case() local 96 tfm = crypto_alloc_ahash(gk5e->cksum_name, 0, CRYPTO_ALG_ASYNC); in checksum_case() 97 KUNIT_ASSERT_NOT_ERR_OR_NULL(test, tfm); in checksum_case() 98 err = crypto_ahash_setkey(tfm, Kc.data, Kc.len); in checksum_case() 110 err = gss_krb5_checksum(tfm, NULL, 0, &buf, 0, &checksum); in checksum_case() 119 crypto_free_ahash(tfm); in checksum_case()
|
/openbmc/linux/drivers/nvme/target/ |
H A D | tcp.c | 832 struct crypto_ahash *tfm = crypto_ahash_reqtfm(queue->rcv_hash); in nvmet_tcp_free_crypto() local 836 crypto_free_ahash(tfm); in nvmet_tcp_free_crypto() 841 struct crypto_ahash *tfm; in nvmet_tcp_alloc_crypto() local 843 tfm = crypto_alloc_ahash("crc32c", 0, CRYPTO_ALG_ASYNC); in nvmet_tcp_alloc_crypto() 844 if (IS_ERR(tfm)) in nvmet_tcp_alloc_crypto() 845 return PTR_ERR(tfm); in nvmet_tcp_alloc_crypto() 847 queue->snd_hash = ahash_request_alloc(tfm, GFP_KERNEL); in nvmet_tcp_alloc_crypto() 852 queue->rcv_hash = ahash_request_alloc(tfm, GFP_KERNEL); in nvmet_tcp_alloc_crypto() 861 crypto_free_ahash(tfm); in nvmet_tcp_alloc_crypto()
|
/openbmc/linux/include/crypto/ |
H A D | sha256_base.h | 129 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); in sha256_base_finish()
|
H A D | sha512_base.h | 122 unsigned int digest_size = crypto_shash_digestsize(desc->tfm); in sha512_base_finish()
|
/openbmc/linux/fs/crypto/ |
H A D | hkdf.c | 131 desc->tfm = hkdf->hmac_tfm; in fscrypt_hkdf_expand()
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/trusted-firmware-m/files/corstone1000/ |
H A D | 0005-platform-corstone1000-fix-synchronization-issue-on-o.patch | 8 when tfm sends the notication ack in openamp, and then reset the access
|
/openbmc/linux/drivers/staging/rtl8192u/ieee80211/ |
H A D | ieee80211_crypt_tkip.c | 452 desc->tfm = tfm_michael; in michael_mic() 608 struct crypto_shash *tfm = tkey->tx_tfm_michael; in ieee80211_tkip_set_key() local 614 tkey->tx_tfm_michael = tfm; in ieee80211_tkip_set_key()
|
/openbmc/linux/net/wireless/ |
H A D | lib80211_crypt_tkip.c | 485 desc->tfm = tfm_michael; in michael_mic() 624 struct crypto_shash *tfm = tkey->tx_tfm_michael; in lib80211_tkip_set_key() local 632 tkey->tx_tfm_michael = tfm; in lib80211_tkip_set_key()
|
/openbmc/linux/drivers/staging/rtl8192e/ |
H A D | rtllib_crypt_tkip.c | 445 desc->tfm = tfm_michael; in michael_mic() 600 struct crypto_shash *tfm = tkey->tx_tfm_michael; in rtllib_tkip_set_key() local 606 tkey->tx_tfm_michael = tfm; in rtllib_tkip_set_key()
|
/openbmc/linux/drivers/block/drbd/ |
H A D | drbd_worker.c | 287 void drbd_csum_ee(struct crypto_shash *tfm, struct drbd_peer_request *peer_req, void *digest) in drbd_csum_ee() argument 289 SHASH_DESC_ON_STACK(desc, tfm); in drbd_csum_ee() 295 desc->tfm = tfm; in drbd_csum_ee() 316 void drbd_csum_bio(struct crypto_shash *tfm, struct bio *bio, void *digest) in drbd_csum_bio() argument 318 SHASH_DESC_ON_STACK(desc, tfm); in drbd_csum_bio() 322 desc->tfm = tfm; in drbd_csum_bio()
|
/openbmc/linux/drivers/staging/ks7010/ |
H A D | ks_hostif.c | 195 struct crypto_shash *tfm = NULL; in michael_mic() local 199 tfm = crypto_alloc_shash("michael_mic", 0, 0); in michael_mic() 200 if (IS_ERR(tfm)) { in michael_mic() 201 ret = PTR_ERR(tfm); in michael_mic() 205 ret = crypto_shash_setkey(tfm, key, MICHAEL_MIC_KEY_LEN); in michael_mic() 209 desc = kmalloc(sizeof(*desc) + crypto_shash_descsize(tfm), GFP_KERNEL); in michael_mic() 215 desc->tfm = tfm; in michael_mic() 246 crypto_free_shash(tfm); in michael_mic()
|
/openbmc/linux/fs/smb/client/ |
H A D | cifsencrypt.c | 550 rc = crypto_shash_setkey(ses->server->secmech.hmacmd5->tfm, nt_hash, in calc_ntlmv2_hash() 653 rc = crypto_shash_setkey(ses->server->secmech.hmacmd5->tfm, in CalcNTLMv2_response() 777 rc = crypto_shash_setkey(ses->server->secmech.hmacmd5->tfm, in setup_ntlmv2_rsp()
|