| /drivers/crypto/ |
| A D | atmel-sha.c | 1694 hmac->resume = resume; in atmel_sha_hmac_setup() 1734 memcpy((u8 *)hmac->ipad, key, keylen); in atmel_sha_hmac_setup() 1772 unsafe_memcpy(hmac->opad, hmac->ipad, bs, in atmel_sha_hmac_compute_ipad_hash() 1775 hmac->ipad[i] ^= 0x36363636; in atmel_sha_hmac_compute_ipad_hash() 1776 hmac->opad[i] ^= 0x5c5c5c5c; in atmel_sha_hmac_compute_ipad_hash() 1810 atmel_sha_hmac_key_release(&hmac->hkey); in atmel_sha_hmac_setup_done() 1811 return hmac->resume(dd); in atmel_sha_hmac_setup_done() 1882 memcpy(ctx->digest, hmac->ipad, hs); in atmel_sha_hmac_init_done() 2029 hmac->base.start = atmel_sha_hmac_start; in atmel_sha_hmac_cra_init() 2030 atmel_sha_hmac_key_init(&hmac->hkey); in atmel_sha_hmac_cra_init() [all …]
|
| A D | Kconfig | 438 authenc(hmac(shaX),Y(cbc)) algorithms.
|
| /drivers/crypto/ccree/ |
| A D | cc_aead.c | 52 struct cc_hmac_s hmac; member 95 struct cc_hmac_s *hmac = &ctx->auth_state.hmac; in cc_aead_exit() local 97 if (hmac->ipad_opad) { in cc_aead_exit() 99 hmac->ipad_opad, in cc_aead_exit() 104 hmac->ipad_opad = NULL; in cc_aead_exit() 106 if (hmac->padded_authkey) { in cc_aead_exit() 108 hmac->padded_authkey, in cc_aead_exit() 169 struct cc_hmac_s *hmac = &ctx->auth_state.hmac; in cc_aead_init() local 178 if (!hmac->ipad_opad) { in cc_aead_init() 184 hmac->ipad_opad); in cc_aead_init() [all …]
|
| /drivers/nvme/common/ |
| A D | auth.c | 94 const char hmac[15]; member 99 .hmac = "hmac(sha256)", 104 .hmac = "hmac(sha384)", 109 .hmac = "hmac(sha512)", 118 return hash_map[hmac_id].hmac; in nvme_auth_hmac_name() 138 if (!strlen(hash_map[i].hmac)) in nvme_auth_hmac_id() 140 if (!strncmp(hash_map[i].hmac, hmac_name, in nvme_auth_hmac_id() 141 strlen(hash_map[i].hmac))) in nvme_auth_hmac_id()
|
| A D | keyring.c | 93 u8 hmac, u8 psk_ver, bool generated) in nvme_tls_psk_lookup() argument 105 psk_ver, generated ? 'G' : 'R', hmac, hostnqn, subnqn); in nvme_tls_psk_lookup()
|
| /drivers/crypto/allwinner/sun8i-ss/ |
| A D | sun8i-ss-hash.c | 501 int hmac = 0; in sun8i_ss_hash_run() local 575 if (tfmctx->keylen && hmac == 0) { in sun8i_ss_hash_run() 576 hmac = 1; in sun8i_ss_hash_run() 597 if (tfmctx->keylen && hmac == 2) { in sun8i_ss_hash_run() 685 if (hmac > 0) in sun8i_ss_hash_run() 690 if (hmac < 2) in sun8i_ss_hash_run() 693 if (hmac == 1 && !err) { in sun8i_ss_hash_run() 694 hmac = 2; in sun8i_ss_hash_run()
|
| /drivers/thunderbolt/ |
| A D | domain.c | 709 u8 hmac[TB_SWITCH_KEY_SIZE]; in tb_domain_challenge_switch_key() local 745 memset(hmac, 0, sizeof(hmac)); in tb_domain_challenge_switch_key() 746 ret = crypto_shash_digest(shash, challenge, sizeof(hmac), hmac); in tb_domain_challenge_switch_key() 751 if (memcmp(response, hmac, sizeof(hmac))) { in tb_domain_challenge_switch_key()
|
| /drivers/crypto/intel/keembay/ |
| A D | Kconfig | 81 bool "Enable sha224 and hmac(sha224) support in Intel Keem Bay OCS HCU" 84 Enables support for sha224 and hmac(sha224) algorithms in the Intel 88 Provides OCS HCU hardware acceleration of sha224 and hmac(224).
|
| /drivers/crypto/inside-secure/ |
| A D | safexcel_hash.c | 42 bool hmac; member 272 if (sreq->hmac && in safexcel_handle_req_result() 283 sreq->hmac = 0; in safexcel_handle_req_result() 1028 req->hmac = true; in safexcel_hmac_sha1_init() 1105 req->hmac = true; in safexcel_hmac_init_iv() 1375 req->hmac = true; in safexcel_hmac_sha224_init() 1447 req->hmac = true; in safexcel_hmac_sha256_init() 1633 req->hmac = true; in safexcel_hmac_sha512_init() 1705 req->hmac = true; in safexcel_hmac_sha384_init() 1828 req->hmac = true; in safexcel_hmac_md5_init() [all …]
|
| /drivers/net/wireguard/ |
| A D | noise.c | 305 static void hmac(u8 *out, const u8 *in, const u8 *key, const size_t inlen, const size_t keylen) in hmac() function 360 hmac(secret, data, chaining_key, data_len, NOISE_HASH_LEN); in kdf() 367 hmac(output, output, secret, 1, BLAKE2S_HASH_SIZE); in kdf() 375 hmac(output, output, secret, BLAKE2S_HASH_SIZE + 1, BLAKE2S_HASH_SIZE); in kdf() 383 hmac(output, output, secret, BLAKE2S_HASH_SIZE + 1, BLAKE2S_HASH_SIZE); in kdf()
|
| /drivers/crypto/inside-secure/eip93/ |
| A D | Kconfig | 20 Also provide AEAD authenc(hmac(x), cipher(y)) for supported algo.
|
| /drivers/net/ethernet/3com/ |
| A D | typhoon.c | 1342 u32 hmac; in typhoon_download_firmware() local 1378 hmac = le32_to_cpu(fHdr->hmacDigest[0]); in typhoon_download_firmware() 1379 iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_0); in typhoon_download_firmware() 1380 hmac = le32_to_cpu(fHdr->hmacDigest[1]); in typhoon_download_firmware() 1381 iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_1); in typhoon_download_firmware() 1382 hmac = le32_to_cpu(fHdr->hmacDigest[2]); in typhoon_download_firmware() 1383 iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_2); in typhoon_download_firmware() 1384 hmac = le32_to_cpu(fHdr->hmacDigest[3]); in typhoon_download_firmware() 1385 iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_3); in typhoon_download_firmware() 1386 hmac = le32_to_cpu(fHdr->hmacDigest[4]); in typhoon_download_firmware() [all …]
|
| /drivers/crypto/cavium/cpt/ |
| A D | cptvf_algs.h | 95 struct fchmac_context hmac; member
|
| /drivers/nvme/target/ |
| A D | auth.c | 50 const char *hmac = nvme_auth_hmac_name(key_hash); in nvmet_auth_set_key() local 52 if (!crypto_has_shash(hmac, 0, 0)) { in nvmet_auth_set_key() 53 pr_err("DH-HMAC-CHAP hash %s unsupported\n", hmac); in nvmet_auth_set_key()
|
| /drivers/crypto/marvell/octeontx/ |
| A D | otx_cptvf_algs.h | 126 union otx_cpt_fchmac_ctx hmac; member
|
| A D | otx_cptvf_algs.c | 108 if (memcmp(rctx->fctx.hmac.s.hmac_calc, in validate_hmac_cipher_null() 109 rctx->fctx.hmac.s.hmac_recv, in validate_hmac_cipher_null() 911 memcpy(fctx->hmac.e.ipad, ctx->ipad, ds); in create_aead_ctx_hdr() 913 memcpy(fctx->hmac.e.opad, ctx->opad, ds); in create_aead_ctx_hdr() 1117 rctx->fctx.hmac.s.hmac_recv, mac_len, in create_aead_null_output_list() 1124 req_info->out[argcnt].vptr = rctx->fctx.hmac.s.hmac_calc; in create_aead_null_output_list()
|
| /drivers/crypto/marvell/octeontx2/ |
| A D | otx2_cptvf_algs.h | 117 union otx2_cpt_fc_hmac_ctx hmac; member
|
| A D | otx2_cptvf_algs.c | 93 if (memcmp(rctx->fctx.hmac.s.hmac_calc, in validate_hmac_cipher_null() 94 rctx->fctx.hmac.s.hmac_recv, in validate_hmac_cipher_null() 997 memcpy(fctx->hmac.e.ipad, ctx->ipad, ds); in create_aead_ctx_hdr() 999 memcpy(fctx->hmac.e.opad, ctx->opad, ds); in create_aead_ctx_hdr() 1196 rctx->fctx.hmac.s.hmac_recv, mac_len, in create_aead_null_output_list() 1201 req_info->out[argcnt].vptr = rctx->fctx.hmac.s.hmac_calc; in create_aead_null_output_list()
|
| /drivers/char/tpm/ |
| A D | tpm2-sessions.c | 592 u8 *hmac = NULL; in tpm_buf_fill_hmac_session() local 645 hmac = &buf->data[offset_s]; in tpm_buf_fill_hmac_session() 659 if (!hmac) { in tpm_buf_fill_hmac_session() 714 + auth->passphrase_len, hmac); in tpm_buf_fill_hmac_session()
|
| /drivers/crypto/starfive/ |
| A D | jh7110-cryp.h | 90 u32 hmac :1; member
|
| A D | jh7110-hash.c | 74 rctx->csr.hash.hmac = 1; in starfive_hash_hmac_key()
|
| /drivers/crypto/axis/ |
| A D | artpec6_crypto.c | 2262 artpec6_crypto_init_hash(struct ahash_request *req, u8 type, int hmac) in artpec6_crypto_init_hash() argument 2272 if (hmac) in artpec6_crypto_init_hash() 2277 oper = hmac ? regk_crypto_hmac_sha1 : regk_crypto_sha1; in artpec6_crypto_init_hash() 2280 oper = hmac ? regk_crypto_hmac_sha256 : regk_crypto_sha256; in artpec6_crypto_init_hash()
|
| /drivers/gpu/drm/nouveau/nvkm/subdev/gsp/rm/r535/nvrm/ |
| A D | gsp.h | 661 NvU8 hmac[32]; member
|