Searched refs:key_tfm (Results 1 - 5 of 5) sorted by relevance
/kernel/linux/linux-6.6/drivers/nvme/common/ |
H A D | auth.c | 235 struct crypto_shash *key_tfm; in nvme_auth_transform_key() local 254 key_tfm = crypto_alloc_shash(hmac_name, 0, 0); in nvme_auth_transform_key() 255 if (IS_ERR(key_tfm)) in nvme_auth_transform_key() 256 return (u8 *)key_tfm; in nvme_auth_transform_key() 259 crypto_shash_descsize(key_tfm), in nvme_auth_transform_key() 266 transformed_key = kzalloc(crypto_shash_digestsize(key_tfm), GFP_KERNEL); in nvme_auth_transform_key() 272 shash->tfm = key_tfm; in nvme_auth_transform_key() 273 ret = crypto_shash_setkey(key_tfm, key->key, key->len); in nvme_auth_transform_key() 290 crypto_free_shash(key_tfm); in nvme_auth_transform_key() 299 crypto_free_shash(key_tfm); in nvme_auth_transform_key() [all...] |
/kernel/linux/linux-5.10/fs/ecryptfs/ |
H A D | crypto.c | 1538 * @key_tfm: Crypto context for key material, set by this function 1547 ecryptfs_process_key_cipher(struct crypto_skcipher **key_tfm, in ecryptfs_process_key_cipher() argument 1554 *key_tfm = NULL; in ecryptfs_process_key_cipher() 1565 *key_tfm = crypto_alloc_skcipher(full_alg_name, 0, CRYPTO_ALG_ASYNC); in ecryptfs_process_key_cipher() 1566 if (IS_ERR(*key_tfm)) { in ecryptfs_process_key_cipher() 1567 rc = PTR_ERR(*key_tfm); in ecryptfs_process_key_cipher() 1572 crypto_skcipher_set_flags(*key_tfm, CRYPTO_TFM_REQ_FORBID_WEAK_KEYS); in ecryptfs_process_key_cipher() 1574 *key_size = crypto_skcipher_max_keysize(*key_tfm); in ecryptfs_process_key_cipher() 1576 rc = crypto_skcipher_setkey(*key_tfm, dummy_key, *key_size); in ecryptfs_process_key_cipher() 1607 struct ecryptfs_key_tfm *key_tfm, *key_tfm_tm in ecryptfs_destroy_crypto() local 1621 ecryptfs_add_new_key_tfm(struct ecryptfs_key_tfm **key_tfm, char *cipher_name, size_t key_size) ecryptfs_add_new_key_tfm() argument 1668 ecryptfs_tfm_exists(char *cipher_name, struct ecryptfs_key_tfm **key_tfm) ecryptfs_tfm_exists() argument 1701 struct ecryptfs_key_tfm *key_tfm; ecryptfs_get_tfm_and_mutex_for_cipher_name() local [all...] |
H A D | ecryptfs_kernel.h | 301 * @key_tfm: crypto API handle to the key 314 struct crypto_skcipher *key_tfm; member 657 ecryptfs_add_new_key_tfm(struct ecryptfs_key_tfm **key_tfm, char *cipher_name, 661 int ecryptfs_tfm_exists(char *cipher_name, struct ecryptfs_key_tfm **key_tfm);
|
/kernel/linux/linux-6.6/fs/ecryptfs/ |
H A D | crypto.c | 1511 * @key_tfm: Crypto context for key material, set by this function 1520 ecryptfs_process_key_cipher(struct crypto_skcipher **key_tfm, in ecryptfs_process_key_cipher() argument 1527 *key_tfm = NULL; in ecryptfs_process_key_cipher() 1538 *key_tfm = crypto_alloc_skcipher(full_alg_name, 0, CRYPTO_ALG_ASYNC); in ecryptfs_process_key_cipher() 1539 if (IS_ERR(*key_tfm)) { in ecryptfs_process_key_cipher() 1540 rc = PTR_ERR(*key_tfm); in ecryptfs_process_key_cipher() 1545 crypto_skcipher_set_flags(*key_tfm, CRYPTO_TFM_REQ_FORBID_WEAK_KEYS); in ecryptfs_process_key_cipher() 1547 *key_size = crypto_skcipher_max_keysize(*key_tfm); in ecryptfs_process_key_cipher() 1549 rc = crypto_skcipher_setkey(*key_tfm, dummy_key, *key_size); in ecryptfs_process_key_cipher() 1579 struct ecryptfs_key_tfm *key_tfm, *key_tfm_tm in ecryptfs_destroy_crypto() local 1593 ecryptfs_add_new_key_tfm(struct ecryptfs_key_tfm **key_tfm, char *cipher_name, size_t key_size) ecryptfs_add_new_key_tfm() argument 1640 ecryptfs_tfm_exists(char *cipher_name, struct ecryptfs_key_tfm **key_tfm) ecryptfs_tfm_exists() argument 1673 struct ecryptfs_key_tfm *key_tfm; ecryptfs_get_tfm_and_mutex_for_cipher_name() local [all...] |
H A D | ecryptfs_kernel.h | 298 * @key_tfm: crypto API handle to the key 311 struct crypto_skcipher *key_tfm; member 642 ecryptfs_add_new_key_tfm(struct ecryptfs_key_tfm **key_tfm, char *cipher_name, 646 int ecryptfs_tfm_exists(char *cipher_name, struct ecryptfs_key_tfm **key_tfm);
|
Completed in 9 milliseconds