/kernel/linux/linux-5.10/fs/crypto/ |
H A D | hkdf.c | 48 static int hkdf_extract(struct crypto_shash *hmac_tfm, const u8 *ikm, in hkdf_extract() argument 54 err = crypto_shash_setkey(hmac_tfm, default_salt, HKDF_HASHLEN); in hkdf_extract() 58 return crypto_shash_tfm_digest(hmac_tfm, ikm, ikmlen, prk); in hkdf_extract() 71 struct crypto_shash *hmac_tfm; in fscrypt_init_hkdf() local 75 hmac_tfm = crypto_alloc_shash(HKDF_HMAC_ALG, 0, 0); in fscrypt_init_hkdf() 76 if (IS_ERR(hmac_tfm)) { in fscrypt_init_hkdf() 78 PTR_ERR(hmac_tfm)); in fscrypt_init_hkdf() 79 return PTR_ERR(hmac_tfm); in fscrypt_init_hkdf() 82 if (WARN_ON(crypto_shash_digestsize(hmac_tfm) != sizeof(prk))) { in fscrypt_init_hkdf() 87 err = hkdf_extract(hmac_tfm, master_ke in fscrypt_init_hkdf() [all...] |
H A D | fscrypt_private.h | 305 struct crypto_shash *hmac_tfm; member 413 * For v1 policy keys: not set (hkdf.hmac_tfm == NULL).
|
/kernel/linux/linux-6.6/fs/crypto/ |
H A D | hkdf.c | 48 static int hkdf_extract(struct crypto_shash *hmac_tfm, const u8 *ikm, in hkdf_extract() argument 54 err = crypto_shash_setkey(hmac_tfm, default_salt, HKDF_HASHLEN); in hkdf_extract() 58 return crypto_shash_tfm_digest(hmac_tfm, ikm, ikmlen, prk); in hkdf_extract() 71 struct crypto_shash *hmac_tfm; in fscrypt_init_hkdf() local 75 hmac_tfm = crypto_alloc_shash(HKDF_HMAC_ALG, 0, 0); in fscrypt_init_hkdf() 76 if (IS_ERR(hmac_tfm)) { in fscrypt_init_hkdf() 78 PTR_ERR(hmac_tfm)); in fscrypt_init_hkdf() 79 return PTR_ERR(hmac_tfm); in fscrypt_init_hkdf() 82 if (WARN_ON_ONCE(crypto_shash_digestsize(hmac_tfm) != sizeof(prk))) { in fscrypt_init_hkdf() 87 err = hkdf_extract(hmac_tfm, master_ke in fscrypt_init_hkdf() [all...] |
H A D | fscrypt_private.h | 306 struct crypto_shash *hmac_tfm; member 416 * For v1 policy keys: not set (hkdf.hmac_tfm == NULL).
|
/kernel/linux/linux-5.10/fs/ubifs/ |
H A D | auth.c | 50 return crypto_shash_tfm_digest(c->hmac_tfm, hash, c->hash_len, hmac); in ubifs_hash_calc_hmac() 319 c->hmac_tfm = crypto_alloc_shash(hmac_name, 0, 0); in ubifs_init_authentication() 320 if (IS_ERR(c->hmac_tfm)) { in ubifs_init_authentication() 321 err = PTR_ERR(c->hmac_tfm); in ubifs_init_authentication() 326 c->hmac_desc_len = crypto_shash_digestsize(c->hmac_tfm); in ubifs_init_authentication() 334 err = crypto_shash_setkey(c->hmac_tfm, ukp->data, ukp->datalen); in ubifs_init_authentication() 350 crypto_free_shash(c->hmac_tfm); in ubifs_init_authentication() 372 crypto_free_shash(c->hmac_tfm); in __ubifs_exit_authentication() 392 SHASH_DESC_ON_STACK(shash, c->hmac_tfm); in ubifs_node_calc_hmac() 399 shash->tfm = c->hmac_tfm; in ubifs_node_calc_hmac() [all...] |
H A D | replay.c | 615 err = crypto_shash_tfm_digest(c->hmac_tfm, hash, in authenticate_sleb()
|
H A D | ubifs.h | 1229 * @hmac_tfm: the HMAC transformation for this filesystem 1472 struct crypto_shash *hmac_tfm; member
|
/kernel/linux/linux-6.6/fs/ubifs/ |
H A D | auth.c | 49 return crypto_shash_tfm_digest(c->hmac_tfm, hash, c->hash_len, hmac); in ubifs_hash_calc_hmac() 318 c->hmac_tfm = crypto_alloc_shash(hmac_name, 0, 0); in ubifs_init_authentication() 319 if (IS_ERR(c->hmac_tfm)) { in ubifs_init_authentication() 320 err = PTR_ERR(c->hmac_tfm); in ubifs_init_authentication() 325 c->hmac_desc_len = crypto_shash_digestsize(c->hmac_tfm); in ubifs_init_authentication() 333 err = crypto_shash_setkey(c->hmac_tfm, ukp->data, ukp->datalen); in ubifs_init_authentication() 349 crypto_free_shash(c->hmac_tfm); in ubifs_init_authentication() 371 crypto_free_shash(c->hmac_tfm); in __ubifs_exit_authentication() 391 SHASH_DESC_ON_STACK(shash, c->hmac_tfm); in ubifs_node_calc_hmac() 398 shash->tfm = c->hmac_tfm; in ubifs_node_calc_hmac() [all...] |
H A D | replay.c | 615 err = crypto_shash_tfm_digest(c->hmac_tfm, hash, in authenticate_sleb()
|
H A D | ubifs.h | 1250 * @hmac_tfm: the HMAC transformation for this filesystem 1500 struct crypto_shash *hmac_tfm; member
|
/kernel/linux/linux-5.10/drivers/crypto/ccp/ |
H A D | ccp-crypto-sha.c | 275 struct crypto_shash *shash = ctx->u.sha.hmac_tfm; in ccp_sha_setkey() 334 struct crypto_shash *hmac_tfm; in ccp_hmac_sha_cra_init() local 336 hmac_tfm = crypto_alloc_shash(alg->child_alg, 0, 0); in ccp_hmac_sha_cra_init() 337 if (IS_ERR(hmac_tfm)) { in ccp_hmac_sha_cra_init() 340 return PTR_ERR(hmac_tfm); in ccp_hmac_sha_cra_init() 343 ctx->u.sha.hmac_tfm = hmac_tfm; in ccp_hmac_sha_cra_init() 352 if (ctx->u.sha.hmac_tfm) in ccp_hmac_sha_cra_exit() 353 crypto_free_shash(ctx->u.sha.hmac_tfm); in ccp_hmac_sha_cra_exit()
|
H A D | ccp-crypto.h | 195 struct crypto_shash *hmac_tfm; member
|
/kernel/linux/linux-6.6/drivers/crypto/ccp/ |
H A D | ccp-crypto-sha.c | 276 struct crypto_shash *shash = ctx->u.sha.hmac_tfm; in ccp_sha_setkey() 335 struct crypto_shash *hmac_tfm; in ccp_hmac_sha_cra_init() local 337 hmac_tfm = crypto_alloc_shash(alg->child_alg, 0, 0); in ccp_hmac_sha_cra_init() 338 if (IS_ERR(hmac_tfm)) { in ccp_hmac_sha_cra_init() 341 return PTR_ERR(hmac_tfm); in ccp_hmac_sha_cra_init() 344 ctx->u.sha.hmac_tfm = hmac_tfm; in ccp_hmac_sha_cra_init() 353 if (ctx->u.sha.hmac_tfm) in ccp_hmac_sha_cra_exit() 354 crypto_free_shash(ctx->u.sha.hmac_tfm); in ccp_hmac_sha_cra_exit()
|
H A D | ccp-crypto.h | 196 struct crypto_shash *hmac_tfm; member
|
/kernel/linux/linux-5.10/security/integrity/evm/ |
H A D | evm.h | 40 extern struct crypto_shash *hmac_tfm;
|
H A D | evm_crypto.c | 27 struct crypto_shash *hmac_tfm; variable 84 tfm = &hmac_tfm; in init_desc()
|
/kernel/linux/linux-6.6/security/integrity/evm/ |
H A D | evm_crypto.c | 29 static struct crypto_shash *hmac_tfm; variable 86 tfm = &hmac_tfm; in init_desc()
|
/kernel/linux/linux-6.6/net/ceph/ |
H A D | messenger_v2.c | 712 WARN_ON(con->v2.hmac_tfm || con->v2.gcm_tfm || con->v2.gcm_req); in setup_crypto() 727 con->v2.hmac_tfm = crypto_alloc_shash("hmac(sha256)", 0, 0); in setup_crypto() 729 if (IS_ERR(con->v2.hmac_tfm)) { in setup_crypto() 730 ret = PTR_ERR(con->v2.hmac_tfm); in setup_crypto() 731 con->v2.hmac_tfm = NULL; in setup_crypto() 737 crypto_shash_alignmask(con->v2.hmac_tfm)); in setup_crypto() 738 ret = crypto_shash_setkey(con->v2.hmac_tfm, session_key, in setup_crypto() 801 SHASH_DESC_ON_STACK(desc, con->v2.hmac_tfm); /* tfm arg is ignored */ in hmac_sha256() 805 dout("%s con %p hmac_tfm %p kvec_cnt %d\n", __func__, con, in hmac_sha256() 806 con->v2.hmac_tfm, kvec_cn in hmac_sha256() [all...] |
/kernel/linux/linux-6.6/include/linux/ceph/ |
H A D | messenger.h | 415 struct crypto_shash *hmac_tfm; /* post-auth signature */ member
|