Home
last modified time | relevance | path

Searched refs:tfm (Results 1 – 25 of 37) sorted by relevance

12

/net/mac80211/
A Daes_cmac.c28 SHASH_DESC_ON_STACK(desc, tfm); in ieee80211_aes_cmac()
32 desc->tfm = tfm; in ieee80211_aes_cmac()
52 SHASH_DESC_ON_STACK(desc, tfm); in ieee80211_aes_cmac_256()
55 desc->tfm = tfm; in ieee80211_aes_cmac_256()
74 struct crypto_shash *tfm; in ieee80211_aes_cmac_key_setup() local
76 tfm = crypto_alloc_shash("cmac(aes)", 0, 0); in ieee80211_aes_cmac_key_setup()
77 if (!IS_ERR(tfm)) { in ieee80211_aes_cmac_key_setup()
78 int err = crypto_shash_setkey(tfm, key, key_len); in ieee80211_aes_cmac_key_setup()
81 crypto_free_shash(tfm); in ieee80211_aes_cmac_key_setup()
86 return tfm; in ieee80211_aes_cmac_key_setup()
[all …]
A Daead_api.c21 size_t mic_len = crypto_aead_authsize(tfm); in aead_encrypt()
40 aead_request_set_tfm(aead_req, tfm); in aead_encrypt()
53 size_t mic_len = crypto_aead_authsize(tfm); in aead_decrypt()
75 aead_request_set_tfm(aead_req, tfm); in aead_decrypt()
89 struct crypto_aead *tfm; in aead_key_setup_encrypt() local
93 if (IS_ERR(tfm)) in aead_key_setup_encrypt()
94 return tfm; in aead_key_setup_encrypt()
103 return tfm; in aead_key_setup_encrypt()
106 crypto_free_aead(tfm); in aead_key_setup_encrypt()
110 void aead_key_free(struct crypto_aead *tfm) in aead_key_free() argument
[all …]
A Daes_gmac.c23 int reqsize = sizeof(*aead_req) + crypto_aead_reqsize(tfm); in ieee80211_aes_gmac()
59 aead_request_set_tfm(aead_req, tfm); in ieee80211_aes_gmac()
72 struct crypto_aead *tfm; in ieee80211_aes_gmac_key_setup() local
76 if (IS_ERR(tfm)) in ieee80211_aes_gmac_key_setup()
77 return tfm; in ieee80211_aes_gmac_key_setup()
79 err = crypto_aead_setkey(tfm, key, key_len); in ieee80211_aes_gmac_key_setup()
81 err = crypto_aead_setauthsize(tfm, GMAC_MIC_LEN); in ieee80211_aes_gmac_key_setup()
83 return tfm; in ieee80211_aes_gmac_key_setup()
85 crypto_free_aead(tfm); in ieee80211_aes_gmac_key_setup()
89 void ieee80211_aes_gmac_key_free(struct crypto_aead *tfm) in ieee80211_aes_gmac_key_free() argument
[all …]
A Dfils_aead.c25 static int aes_s2v(struct crypto_shash *tfm, in aes_s2v() argument
29 SHASH_DESC_ON_STACK(desc, tfm); in aes_s2v()
32 desc->tfm = tfm; in aes_s2v()
72 struct crypto_shash *tfm; in aes_siv_encrypt() local
88 if (IS_ERR(tfm)) in aes_siv_encrypt()
89 return PTR_ERR(tfm); in aes_siv_encrypt()
94 crypto_free_shash(tfm); in aes_siv_encrypt()
149 struct crypto_shash *tfm; in aes_siv_decrypt() local
203 if (IS_ERR(tfm)) in aes_siv_decrypt()
204 return PTR_ERR(tfm); in aes_siv_decrypt()
[all …]
A Daes_gcm.h13 static inline int ieee80211_aes_gcm_encrypt(struct crypto_aead *tfm, in ieee80211_aes_gcm_encrypt() argument
17 return aead_encrypt(tfm, j_0, aad + 2, in ieee80211_aes_gcm_encrypt()
22 static inline int ieee80211_aes_gcm_decrypt(struct crypto_aead *tfm, in ieee80211_aes_gcm_decrypt() argument
26 return aead_decrypt(tfm, j_0, aad + 2, in ieee80211_aes_gcm_decrypt()
38 static inline void ieee80211_aes_gcm_key_free(struct crypto_aead *tfm) in ieee80211_aes_gcm_key_free() argument
40 return aead_key_free(tfm); in ieee80211_aes_gcm_key_free()
A Daes_ccm.h21 ieee80211_aes_ccm_encrypt(struct crypto_aead *tfm, in ieee80211_aes_ccm_encrypt() argument
25 return aead_encrypt(tfm, b_0, aad + 2, in ieee80211_aes_ccm_encrypt()
31 ieee80211_aes_ccm_decrypt(struct crypto_aead *tfm, in ieee80211_aes_ccm_decrypt() argument
35 return aead_decrypt(tfm, b_0, aad + 2, in ieee80211_aes_ccm_decrypt()
40 static inline void ieee80211_aes_key_free(struct crypto_aead *tfm) in ieee80211_aes_key_free() argument
42 return aead_key_free(tfm); in ieee80211_aes_key_free()
A Daes_cmac.h14 void ieee80211_aes_cmac(struct crypto_shash *tfm, const u8 *aad,
16 void ieee80211_aes_cmac_256(struct crypto_shash *tfm, const u8 *aad,
18 void ieee80211_aes_cmac_key_free(struct crypto_shash *tfm);
A Dkey.h91 struct crypto_aead *tfm; member
96 struct crypto_shash *tfm; member
102 struct crypto_aead *tfm; member
113 struct crypto_aead *tfm; member
A Daead_api.h13 int aead_encrypt(struct crypto_aead *tfm, u8 *b_0, u8 *aad,
17 int aead_decrypt(struct crypto_aead *tfm, u8 *b_0, u8 *aad,
21 void aead_key_free(struct crypto_aead *tfm);
A Dkey.c649 if (IS_ERR(key->u.ccmp.tfm)) { in ieee80211_key_alloc()
650 err = PTR_ERR(key->u.ccmp.tfm); in ieee80211_key_alloc()
667 if (IS_ERR(key->u.ccmp.tfm)) { in ieee80211_key_alloc()
668 err = PTR_ERR(key->u.ccmp.tfm); in ieee80211_key_alloc()
688 key->u.aes_cmac.tfm = in ieee80211_key_alloc()
690 if (IS_ERR(key->u.aes_cmac.tfm)) { in ieee80211_key_alloc()
691 err = PTR_ERR(key->u.aes_cmac.tfm); in ieee80211_key_alloc()
707 key->u.aes_gmac.tfm = in ieee80211_key_alloc()
709 if (IS_ERR(key->u.aes_gmac.tfm)) { in ieee80211_key_alloc()
728 if (IS_ERR(key->u.gcmp.tfm)) { in ieee80211_key_alloc()
[all …]
A Daes_gmac.h17 int ieee80211_aes_gmac(struct crypto_aead *tfm, const u8 *aad, u8 *nonce,
19 void ieee80211_aes_gmac_key_free(struct crypto_aead *tfm);
/net/sunrpc/auth_gss/
A Dgss_krb5_keys.c309 SHASH_DESC_ON_STACK(desc, tfm); in krb5_cmac_Ki()
314 desc->tfm = tfm; in krb5_cmac_Ki()
377 struct crypto_shash *tfm; in krb5_kdf_feedback_cmac() local
387 if (IS_ERR(tfm)) { in krb5_kdf_feedback_cmac()
388 ret = PTR_ERR(tfm); in krb5_kdf_feedback_cmac()
425 crypto_free_shash(tfm); in krb5_kdf_feedback_cmac()
453 desc->tfm = tfm; in krb5_hmac_K1()
506 struct crypto_shash *tfm; in krb5_kdf_hmac_sha2() local
519 if (IS_ERR(tfm)) { in krb5_kdf_hmac_sha2()
520 ret = PTR_ERR(tfm); in krb5_kdf_hmac_sha2()
[all …]
A Dgss_krb5_crypto.c104 struct crypto_sync_skcipher *tfm, in krb5_encrypt() argument
113 SYNC_SKCIPHER_REQUEST_ON_STACK(req, tfm); in krb5_encrypt()
115 if (length % crypto_sync_skcipher_blocksize(tfm) != 0) in krb5_encrypt()
120 crypto_sync_skcipher_ivsize(tfm)); in krb5_encrypt()
125 memcpy(local_iv, iv, crypto_sync_skcipher_ivsize(tfm)); in krb5_encrypt()
130 skcipher_request_set_sync_tfm(req, tfm); in krb5_encrypt()
182 req = ahash_request_alloc(tfm, GFP_KERNEL); in gss_krb5_checksum()
241 struct crypto_sync_skcipher *tfm = in encryptor() local
314 struct crypto_sync_skcipher *tfm = in decryptor() local
731 struct crypto_ahash *tfm, const struct xdr_buf *body, in krb5_etm_checksum() argument
[all …]
A Dgss_krb5_mech.c269 struct crypto_sync_skcipher *tfm; in gss_krb5_alloc_cipher_v2() local
271 tfm = crypto_alloc_sync_skcipher(cname, 0, 0); in gss_krb5_alloc_cipher_v2()
272 if (IS_ERR(tfm)) in gss_krb5_alloc_cipher_v2()
274 if (crypto_sync_skcipher_setkey(tfm, key->data, key->len)) { in gss_krb5_alloc_cipher_v2()
275 crypto_free_sync_skcipher(tfm); in gss_krb5_alloc_cipher_v2()
278 return tfm; in gss_krb5_alloc_cipher_v2()
284 struct crypto_ahash *tfm; in gss_krb5_alloc_hash_v2() local
287 if (IS_ERR(tfm)) in gss_krb5_alloc_hash_v2()
289 if (crypto_ahash_setkey(tfm, key->data, key->len)) { in gss_krb5_alloc_hash_v2()
290 crypto_free_ahash(tfm); in gss_krb5_alloc_hash_v2()
[all …]
A Dgss_krb5_unseal.c74 struct crypto_ahash *tfm = ctx->initiate ? in gss_krb5_verify_mic_v2() local
107 if (gss_krb5_checksum(tfm, ptr, GSS_KRB5_TOK_HDR_LEN, in gss_krb5_verify_mic_v2()
A Dgss_krb5_seal.c108 struct crypto_ahash *tfm = ctx->initiate ? in gss_krb5_get_mic_v2() local
127 if (gss_krb5_checksum(tfm, krb5_hdr, GSS_KRB5_TOK_HDR_LEN, in gss_krb5_get_mic_v2()
/net/bluetooth/
A Dselftest.c155 ret = set_ecdh_privkey(tfm, priv_a); in test_ecdh_sample()
159 ret = compute_ecdh_secret(tfm, pub_b, dhkey_a); in test_ecdh_sample()
168 ret = set_ecdh_privkey(tfm, priv_b); in test_ecdh_sample()
172 ret = compute_ecdh_secret(tfm, pub_a, dhkey_b); in test_ecdh_sample()
201 struct crypto_kpp *tfm; in test_ecdh() local
208 tfm = crypto_alloc_kpp("ecdh-nist-p256", 0, 0); in test_ecdh()
209 if (IS_ERR(tfm)) { in test_ecdh()
211 err = PTR_ERR(tfm); in test_ecdh()
215 err = test_ecdh_sample(tfm, priv_a_1, priv_b_1, pub_a_1, pub_b_1, in test_ecdh()
222 err = test_ecdh_sample(tfm, priv_a_2, priv_b_2, pub_a_2, pub_b_2, in test_ecdh()
[all …]
A Decdh_helper.c44 int compute_ecdh_secret(struct crypto_kpp *tfm, const u8 public_key[64], in compute_ecdh_secret() argument
57 req = kpp_request_alloc(tfm, GFP_KERNEL); in compute_ecdh_secret()
101 int set_ecdh_privkey(struct crypto_kpp *tfm, const u8 private_key[32]) in set_ecdh_privkey() argument
128 err = crypto_kpp_set_secret(tfm, buf, buf_len); in set_ecdh_privkey()
145 int generate_ecdh_public_key(struct crypto_kpp *tfm, u8 public_key[64]) in generate_ecdh_public_key() argument
157 req = kpp_request_alloc(tfm, GFP_KERNEL); in generate_ecdh_public_key()
194 int generate_ecdh_keys(struct crypto_kpp *tfm, u8 public_key[64]) in generate_ecdh_keys() argument
198 err = set_ecdh_privkey(tfm, NULL); in generate_ecdh_keys()
202 return generate_ecdh_public_key(tfm, public_key); in generate_ecdh_keys()
A Decdh_helper.h26 int compute_ecdh_secret(struct crypto_kpp *tfm, const u8 pair_public_key[64],
28 int set_ecdh_privkey(struct crypto_kpp *tfm, const u8 private_key[32]);
29 int generate_ecdh_public_key(struct crypto_kpp *tfm, u8 public_key[64]);
30 int generate_ecdh_keys(struct crypto_kpp *tfm, u8 public_key[64]);
/net/ipv6/
A Dseg6_hmac.c129 struct crypto_shash *tfm; in __do_hmac() local
137 tfm = *this_cpu_ptr(algo->tfms); in __do_hmac()
139 dgsize = crypto_shash_digestsize(tfm); in __do_hmac()
153 shash->tfm = tfm; in __do_hmac()
365 struct crypto_shash *tfm; in seg6_hmac_init_algo() local
383 if (IS_ERR(tfm)) { in seg6_hmac_init_algo()
384 ret = PTR_ERR(tfm); in seg6_hmac_init_algo()
388 *p_tfm = tfm; in seg6_hmac_init_algo()
392 tfm = *p_tfm; in seg6_hmac_init_algo()
431 struct crypto_shash *tfm; in seg6_hmac_exit() local
[all …]
/net/ceph/
A Dcrypto.c29 key->tfm = NULL; in set_secret()
51 key->tfm = crypto_alloc_sync_skcipher("cbc(aes)", 0, 0); in set_secret()
53 if (IS_ERR(key->tfm)) { in set_secret()
54 ret = PTR_ERR(key->tfm); in set_secret()
55 key->tfm = NULL; in set_secret()
59 ret = crypto_sync_skcipher_setkey(key->tfm, key->key, key->len); in set_secret()
128 if (key->tfm) { in ceph_crypto_key_destroy()
129 crypto_free_sync_skcipher(key->tfm); in ceph_crypto_key_destroy()
130 key->tfm = NULL; in ceph_crypto_key_destroy()
210 SYNC_SKCIPHER_REQUEST_ON_STACK(req, key->tfm); in ceph_aes_crypt()
[all …]
/net/xfrm/
A Dxfrm_ipcomp.c31 struct crypto_acomp *tfm; member
123 struct crypto_acomp *tfm; in ipcomp_setup_req() local
160 tfm = ipcd->tfm; in ipcomp_setup_req()
162 tfm, sizeof(*extra) + sizeof(*sg) * (nfrags + dnfrags), in ipcomp_setup_req()
308 crypto_free_acomp(ipcd->tfm); in ipcomp_free_data()
343 ipcd->tfm = crypto_alloc_acomp(x->calg->alg_name, 0, 0); in ipcomp_init_state()
344 if (IS_ERR(ipcd->tfm)) in ipcomp_init_state()
/net/tipc/
A Dcrypto.c130 struct crypto_aead *tfm; member
491 struct crypto_aead *tfm; in tipc_aead_tfm_next() local
495 tfm = (*tfm_entry)->tfm; in tipc_aead_tfm_next()
498 return tfm; in tipc_aead_tfm_next()
518 struct crypto_aead *tfm; in tipc_aead_init() local
544 if (IS_ERR(tfm)) { in tipc_aead_init()
545 err = PTR_ERR(tfm); in tipc_aead_init()
551 crypto_free_aead(tfm); in tipc_aead_init()
559 crypto_free_aead(tfm); in tipc_aead_init()
565 crypto_free_aead(tfm); in tipc_aead_init()
[all …]
/net/mac802154/
A Dllsec.c129 for (i = 0; i < ARRAY_SIZE(key->tfm); i++) { in llsec_key_alloc()
130 key->tfm[i] = crypto_alloc_aead("ccm(aes)", 0, in llsec_key_alloc()
132 if (IS_ERR(key->tfm[i])) in llsec_key_alloc()
134 if (crypto_aead_setkey(key->tfm[i], template->key, in llsec_key_alloc()
154 for (i = 0; i < ARRAY_SIZE(key->tfm); i++) in llsec_key_alloc()
155 if (!IS_ERR_OR_NULL(key->tfm[i])) in llsec_key_alloc()
156 crypto_free_aead(key->tfm[i]); in llsec_key_alloc()
169 for (i = 0; i < ARRAY_SIZE(key->tfm); i++) in llsec_key_release()
170 crypto_free_aead(key->tfm[i]); in llsec_key_release()
648 for (i = 0; i < ARRAY_SIZE(key->tfm); i++) in llsec_tfm_by_len()
[all …]
/net/sctp/
A Dauth.c456 struct crypto_shash *tfm = NULL; in sctp_auth_init_hmacs() local
485 tfm = crypto_alloc_shash(sctp_hmac_list[id].hmac_name, 0, 0); in sctp_auth_init_hmacs()
486 if (IS_ERR(tfm)) in sctp_auth_init_hmacs()
489 ep->auth_hmacs[id] = tfm; in sctp_auth_init_hmacs()
712 struct crypto_shash *tfm; in sctp_auth_calculate_hmac() local
739 tfm = asoc->ep->auth_hmacs[hmac_id]; in sctp_auth_calculate_hmac()
742 if (crypto_shash_setkey(tfm, &asoc_key->data[0], asoc_key->len)) in sctp_auth_calculate_hmac()
745 crypto_shash_tfm_digest(tfm, (u8 *)auth, end - (unsigned char *)auth, in sctp_auth_calculate_hmac()

Completed in 46 milliseconds

12