Home
last modified time | relevance | path

Searched refs:hmac (Results 1 – 23 of 23) sorted by relevance

/drivers/crypto/
A Datmel-sha.c1694 hmac->resume = resume; in atmel_sha_hmac_setup()
1734 memcpy((u8 *)hmac->ipad, key, keylen); in atmel_sha_hmac_setup()
1772 unsafe_memcpy(hmac->opad, hmac->ipad, bs, in atmel_sha_hmac_compute_ipad_hash()
1775 hmac->ipad[i] ^= 0x36363636; in atmel_sha_hmac_compute_ipad_hash()
1776 hmac->opad[i] ^= 0x5c5c5c5c; in atmel_sha_hmac_compute_ipad_hash()
1810 atmel_sha_hmac_key_release(&hmac->hkey); in atmel_sha_hmac_setup_done()
1811 return hmac->resume(dd); in atmel_sha_hmac_setup_done()
1882 memcpy(ctx->digest, hmac->ipad, hs); in atmel_sha_hmac_init_done()
2029 hmac->base.start = atmel_sha_hmac_start; in atmel_sha_hmac_cra_init()
2030 atmel_sha_hmac_key_init(&hmac->hkey); in atmel_sha_hmac_cra_init()
[all …]
A DKconfig438 authenc(hmac(shaX),Y(cbc)) algorithms.
/drivers/crypto/ccree/
A Dcc_aead.c52 struct cc_hmac_s hmac; member
95 struct cc_hmac_s *hmac = &ctx->auth_state.hmac; in cc_aead_exit() local
97 if (hmac->ipad_opad) { in cc_aead_exit()
99 hmac->ipad_opad, in cc_aead_exit()
104 hmac->ipad_opad = NULL; in cc_aead_exit()
106 if (hmac->padded_authkey) { in cc_aead_exit()
108 hmac->padded_authkey, in cc_aead_exit()
169 struct cc_hmac_s *hmac = &ctx->auth_state.hmac; in cc_aead_init() local
178 if (!hmac->ipad_opad) { in cc_aead_init()
184 hmac->ipad_opad); in cc_aead_init()
[all …]
/drivers/nvme/common/
A Dauth.c94 const char hmac[15]; member
99 .hmac = "hmac(sha256)",
104 .hmac = "hmac(sha384)",
109 .hmac = "hmac(sha512)",
118 return hash_map[hmac_id].hmac; in nvme_auth_hmac_name()
138 if (!strlen(hash_map[i].hmac)) in nvme_auth_hmac_id()
140 if (!strncmp(hash_map[i].hmac, hmac_name, in nvme_auth_hmac_id()
141 strlen(hash_map[i].hmac))) in nvme_auth_hmac_id()
A Dkeyring.c93 u8 hmac, u8 psk_ver, bool generated) in nvme_tls_psk_lookup() argument
105 psk_ver, generated ? 'G' : 'R', hmac, hostnqn, subnqn); in nvme_tls_psk_lookup()
/drivers/crypto/allwinner/sun8i-ss/
A Dsun8i-ss-hash.c501 int hmac = 0; in sun8i_ss_hash_run() local
575 if (tfmctx->keylen && hmac == 0) { in sun8i_ss_hash_run()
576 hmac = 1; in sun8i_ss_hash_run()
597 if (tfmctx->keylen && hmac == 2) { in sun8i_ss_hash_run()
685 if (hmac > 0) in sun8i_ss_hash_run()
690 if (hmac < 2) in sun8i_ss_hash_run()
693 if (hmac == 1 && !err) { in sun8i_ss_hash_run()
694 hmac = 2; in sun8i_ss_hash_run()
/drivers/thunderbolt/
A Ddomain.c709 u8 hmac[TB_SWITCH_KEY_SIZE]; in tb_domain_challenge_switch_key() local
745 memset(hmac, 0, sizeof(hmac)); in tb_domain_challenge_switch_key()
746 ret = crypto_shash_digest(shash, challenge, sizeof(hmac), hmac); in tb_domain_challenge_switch_key()
751 if (memcmp(response, hmac, sizeof(hmac))) { in tb_domain_challenge_switch_key()
/drivers/crypto/intel/keembay/
A DKconfig81 bool "Enable sha224 and hmac(sha224) support in Intel Keem Bay OCS HCU"
84 Enables support for sha224 and hmac(sha224) algorithms in the Intel
88 Provides OCS HCU hardware acceleration of sha224 and hmac(224).
/drivers/crypto/inside-secure/
A Dsafexcel_hash.c42 bool hmac; member
272 if (sreq->hmac && in safexcel_handle_req_result()
283 sreq->hmac = 0; in safexcel_handle_req_result()
1028 req->hmac = true; in safexcel_hmac_sha1_init()
1105 req->hmac = true; in safexcel_hmac_init_iv()
1375 req->hmac = true; in safexcel_hmac_sha224_init()
1447 req->hmac = true; in safexcel_hmac_sha256_init()
1633 req->hmac = true; in safexcel_hmac_sha512_init()
1705 req->hmac = true; in safexcel_hmac_sha384_init()
1828 req->hmac = true; in safexcel_hmac_md5_init()
[all …]
/drivers/net/wireguard/
A Dnoise.c305 static void hmac(u8 *out, const u8 *in, const u8 *key, const size_t inlen, const size_t keylen) in hmac() function
360 hmac(secret, data, chaining_key, data_len, NOISE_HASH_LEN); in kdf()
367 hmac(output, output, secret, 1, BLAKE2S_HASH_SIZE); in kdf()
375 hmac(output, output, secret, BLAKE2S_HASH_SIZE + 1, BLAKE2S_HASH_SIZE); in kdf()
383 hmac(output, output, secret, BLAKE2S_HASH_SIZE + 1, BLAKE2S_HASH_SIZE); in kdf()
/drivers/crypto/inside-secure/eip93/
A DKconfig20 Also provide AEAD authenc(hmac(x), cipher(y)) for supported algo.
/drivers/net/ethernet/3com/
A Dtyphoon.c1342 u32 hmac; in typhoon_download_firmware() local
1378 hmac = le32_to_cpu(fHdr->hmacDigest[0]); in typhoon_download_firmware()
1379 iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_0); in typhoon_download_firmware()
1380 hmac = le32_to_cpu(fHdr->hmacDigest[1]); in typhoon_download_firmware()
1381 iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_1); in typhoon_download_firmware()
1382 hmac = le32_to_cpu(fHdr->hmacDigest[2]); in typhoon_download_firmware()
1383 iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_2); in typhoon_download_firmware()
1384 hmac = le32_to_cpu(fHdr->hmacDigest[3]); in typhoon_download_firmware()
1385 iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_3); in typhoon_download_firmware()
1386 hmac = le32_to_cpu(fHdr->hmacDigest[4]); in typhoon_download_firmware()
[all …]
/drivers/crypto/cavium/cpt/
A Dcptvf_algs.h95 struct fchmac_context hmac; member
/drivers/nvme/target/
A Dauth.c50 const char *hmac = nvme_auth_hmac_name(key_hash); in nvmet_auth_set_key() local
52 if (!crypto_has_shash(hmac, 0, 0)) { in nvmet_auth_set_key()
53 pr_err("DH-HMAC-CHAP hash %s unsupported\n", hmac); in nvmet_auth_set_key()
/drivers/crypto/marvell/octeontx/
A Dotx_cptvf_algs.h126 union otx_cpt_fchmac_ctx hmac; member
A Dotx_cptvf_algs.c108 if (memcmp(rctx->fctx.hmac.s.hmac_calc, in validate_hmac_cipher_null()
109 rctx->fctx.hmac.s.hmac_recv, in validate_hmac_cipher_null()
911 memcpy(fctx->hmac.e.ipad, ctx->ipad, ds); in create_aead_ctx_hdr()
913 memcpy(fctx->hmac.e.opad, ctx->opad, ds); in create_aead_ctx_hdr()
1117 rctx->fctx.hmac.s.hmac_recv, mac_len, in create_aead_null_output_list()
1124 req_info->out[argcnt].vptr = rctx->fctx.hmac.s.hmac_calc; in create_aead_null_output_list()
/drivers/crypto/marvell/octeontx2/
A Dotx2_cptvf_algs.h117 union otx2_cpt_fc_hmac_ctx hmac; member
A Dotx2_cptvf_algs.c93 if (memcmp(rctx->fctx.hmac.s.hmac_calc, in validate_hmac_cipher_null()
94 rctx->fctx.hmac.s.hmac_recv, in validate_hmac_cipher_null()
997 memcpy(fctx->hmac.e.ipad, ctx->ipad, ds); in create_aead_ctx_hdr()
999 memcpy(fctx->hmac.e.opad, ctx->opad, ds); in create_aead_ctx_hdr()
1196 rctx->fctx.hmac.s.hmac_recv, mac_len, in create_aead_null_output_list()
1201 req_info->out[argcnt].vptr = rctx->fctx.hmac.s.hmac_calc; in create_aead_null_output_list()
/drivers/char/tpm/
A Dtpm2-sessions.c592 u8 *hmac = NULL; in tpm_buf_fill_hmac_session() local
645 hmac = &buf->data[offset_s]; in tpm_buf_fill_hmac_session()
659 if (!hmac) { in tpm_buf_fill_hmac_session()
714 + auth->passphrase_len, hmac); in tpm_buf_fill_hmac_session()
/drivers/crypto/starfive/
A Djh7110-cryp.h90 u32 hmac :1; member
A Djh7110-hash.c74 rctx->csr.hash.hmac = 1; in starfive_hash_hmac_key()
/drivers/crypto/axis/
A Dartpec6_crypto.c2262 artpec6_crypto_init_hash(struct ahash_request *req, u8 type, int hmac) in artpec6_crypto_init_hash() argument
2272 if (hmac) in artpec6_crypto_init_hash()
2277 oper = hmac ? regk_crypto_hmac_sha1 : regk_crypto_sha1; in artpec6_crypto_init_hash()
2280 oper = hmac ? regk_crypto_hmac_sha256 : regk_crypto_sha256; in artpec6_crypto_init_hash()
/drivers/gpu/drm/nouveau/nvkm/subdev/gsp/rm/r535/nvrm/
A Dgsp.h661 NvU8 hmac[32]; member

Completed in 90 milliseconds