Home
last modified time | relevance | path

Searched refs:key_tfm (Results 1 - 5 of 5) sorted by relevance

/kernel/linux/linux-6.6/drivers/nvme/common/
H A Dauth.c235 struct crypto_shash *key_tfm; in nvme_auth_transform_key() local
254 key_tfm = crypto_alloc_shash(hmac_name, 0, 0); in nvme_auth_transform_key()
255 if (IS_ERR(key_tfm)) in nvme_auth_transform_key()
256 return (u8 *)key_tfm; in nvme_auth_transform_key()
259 crypto_shash_descsize(key_tfm), in nvme_auth_transform_key()
266 transformed_key = kzalloc(crypto_shash_digestsize(key_tfm), GFP_KERNEL); in nvme_auth_transform_key()
272 shash->tfm = key_tfm; in nvme_auth_transform_key()
273 ret = crypto_shash_setkey(key_tfm, key->key, key->len); in nvme_auth_transform_key()
290 crypto_free_shash(key_tfm); in nvme_auth_transform_key()
299 crypto_free_shash(key_tfm); in nvme_auth_transform_key()
[all...]
/kernel/linux/linux-5.10/fs/ecryptfs/
H A Dcrypto.c1538 * @key_tfm: Crypto context for key material, set by this function
1547 ecryptfs_process_key_cipher(struct crypto_skcipher **key_tfm, in ecryptfs_process_key_cipher() argument
1554 *key_tfm = NULL; in ecryptfs_process_key_cipher()
1565 *key_tfm = crypto_alloc_skcipher(full_alg_name, 0, CRYPTO_ALG_ASYNC); in ecryptfs_process_key_cipher()
1566 if (IS_ERR(*key_tfm)) { in ecryptfs_process_key_cipher()
1567 rc = PTR_ERR(*key_tfm); in ecryptfs_process_key_cipher()
1572 crypto_skcipher_set_flags(*key_tfm, CRYPTO_TFM_REQ_FORBID_WEAK_KEYS); in ecryptfs_process_key_cipher()
1574 *key_size = crypto_skcipher_max_keysize(*key_tfm); in ecryptfs_process_key_cipher()
1576 rc = crypto_skcipher_setkey(*key_tfm, dummy_key, *key_size); in ecryptfs_process_key_cipher()
1607 struct ecryptfs_key_tfm *key_tfm, *key_tfm_tm in ecryptfs_destroy_crypto() local
1621 ecryptfs_add_new_key_tfm(struct ecryptfs_key_tfm **key_tfm, char *cipher_name, size_t key_size) ecryptfs_add_new_key_tfm() argument
1668 ecryptfs_tfm_exists(char *cipher_name, struct ecryptfs_key_tfm **key_tfm) ecryptfs_tfm_exists() argument
1701 struct ecryptfs_key_tfm *key_tfm; ecryptfs_get_tfm_and_mutex_for_cipher_name() local
[all...]
H A Decryptfs_kernel.h301 * @key_tfm: crypto API handle to the key
314 struct crypto_skcipher *key_tfm; member
657 ecryptfs_add_new_key_tfm(struct ecryptfs_key_tfm **key_tfm, char *cipher_name,
661 int ecryptfs_tfm_exists(char *cipher_name, struct ecryptfs_key_tfm **key_tfm);
/kernel/linux/linux-6.6/fs/ecryptfs/
H A Dcrypto.c1511 * @key_tfm: Crypto context for key material, set by this function
1520 ecryptfs_process_key_cipher(struct crypto_skcipher **key_tfm, in ecryptfs_process_key_cipher() argument
1527 *key_tfm = NULL; in ecryptfs_process_key_cipher()
1538 *key_tfm = crypto_alloc_skcipher(full_alg_name, 0, CRYPTO_ALG_ASYNC); in ecryptfs_process_key_cipher()
1539 if (IS_ERR(*key_tfm)) { in ecryptfs_process_key_cipher()
1540 rc = PTR_ERR(*key_tfm); in ecryptfs_process_key_cipher()
1545 crypto_skcipher_set_flags(*key_tfm, CRYPTO_TFM_REQ_FORBID_WEAK_KEYS); in ecryptfs_process_key_cipher()
1547 *key_size = crypto_skcipher_max_keysize(*key_tfm); in ecryptfs_process_key_cipher()
1549 rc = crypto_skcipher_setkey(*key_tfm, dummy_key, *key_size); in ecryptfs_process_key_cipher()
1579 struct ecryptfs_key_tfm *key_tfm, *key_tfm_tm in ecryptfs_destroy_crypto() local
1593 ecryptfs_add_new_key_tfm(struct ecryptfs_key_tfm **key_tfm, char *cipher_name, size_t key_size) ecryptfs_add_new_key_tfm() argument
1640 ecryptfs_tfm_exists(char *cipher_name, struct ecryptfs_key_tfm **key_tfm) ecryptfs_tfm_exists() argument
1673 struct ecryptfs_key_tfm *key_tfm; ecryptfs_get_tfm_and_mutex_for_cipher_name() local
[all...]
H A Decryptfs_kernel.h298 * @key_tfm: crypto API handle to the key
311 struct crypto_skcipher *key_tfm; member
642 ecryptfs_add_new_key_tfm(struct ecryptfs_key_tfm **key_tfm, char *cipher_name,
646 int ecryptfs_tfm_exists(char *cipher_name, struct ecryptfs_key_tfm **key_tfm);

Completed in 9 milliseconds