| /net/mac80211/ |
| A D | aes_cmac.c | 28 SHASH_DESC_ON_STACK(desc, tfm); in ieee80211_aes_cmac() 32 desc->tfm = tfm; in ieee80211_aes_cmac() 52 SHASH_DESC_ON_STACK(desc, tfm); in ieee80211_aes_cmac_256() 55 desc->tfm = tfm; in ieee80211_aes_cmac_256() 74 struct crypto_shash *tfm; in ieee80211_aes_cmac_key_setup() local 76 tfm = crypto_alloc_shash("cmac(aes)", 0, 0); in ieee80211_aes_cmac_key_setup() 77 if (!IS_ERR(tfm)) { in ieee80211_aes_cmac_key_setup() 78 int err = crypto_shash_setkey(tfm, key, key_len); in ieee80211_aes_cmac_key_setup() 81 crypto_free_shash(tfm); in ieee80211_aes_cmac_key_setup() 86 return tfm; in ieee80211_aes_cmac_key_setup() [all …]
|
| A D | aead_api.c | 21 size_t mic_len = crypto_aead_authsize(tfm); in aead_encrypt() 40 aead_request_set_tfm(aead_req, tfm); in aead_encrypt() 53 size_t mic_len = crypto_aead_authsize(tfm); in aead_decrypt() 75 aead_request_set_tfm(aead_req, tfm); in aead_decrypt() 89 struct crypto_aead *tfm; in aead_key_setup_encrypt() local 93 if (IS_ERR(tfm)) in aead_key_setup_encrypt() 94 return tfm; in aead_key_setup_encrypt() 103 return tfm; in aead_key_setup_encrypt() 106 crypto_free_aead(tfm); in aead_key_setup_encrypt() 110 void aead_key_free(struct crypto_aead *tfm) in aead_key_free() argument [all …]
|
| A D | aes_gmac.c | 23 int reqsize = sizeof(*aead_req) + crypto_aead_reqsize(tfm); in ieee80211_aes_gmac() 59 aead_request_set_tfm(aead_req, tfm); in ieee80211_aes_gmac() 72 struct crypto_aead *tfm; in ieee80211_aes_gmac_key_setup() local 76 if (IS_ERR(tfm)) in ieee80211_aes_gmac_key_setup() 77 return tfm; in ieee80211_aes_gmac_key_setup() 79 err = crypto_aead_setkey(tfm, key, key_len); in ieee80211_aes_gmac_key_setup() 81 err = crypto_aead_setauthsize(tfm, GMAC_MIC_LEN); in ieee80211_aes_gmac_key_setup() 83 return tfm; in ieee80211_aes_gmac_key_setup() 85 crypto_free_aead(tfm); in ieee80211_aes_gmac_key_setup() 89 void ieee80211_aes_gmac_key_free(struct crypto_aead *tfm) in ieee80211_aes_gmac_key_free() argument [all …]
|
| A D | fils_aead.c | 25 static int aes_s2v(struct crypto_shash *tfm, in aes_s2v() argument 29 SHASH_DESC_ON_STACK(desc, tfm); in aes_s2v() 32 desc->tfm = tfm; in aes_s2v() 72 struct crypto_shash *tfm; in aes_siv_encrypt() local 88 if (IS_ERR(tfm)) in aes_siv_encrypt() 89 return PTR_ERR(tfm); in aes_siv_encrypt() 94 crypto_free_shash(tfm); in aes_siv_encrypt() 149 struct crypto_shash *tfm; in aes_siv_decrypt() local 203 if (IS_ERR(tfm)) in aes_siv_decrypt() 204 return PTR_ERR(tfm); in aes_siv_decrypt() [all …]
|
| A D | aes_gcm.h | 13 static inline int ieee80211_aes_gcm_encrypt(struct crypto_aead *tfm, in ieee80211_aes_gcm_encrypt() argument 17 return aead_encrypt(tfm, j_0, aad + 2, in ieee80211_aes_gcm_encrypt() 22 static inline int ieee80211_aes_gcm_decrypt(struct crypto_aead *tfm, in ieee80211_aes_gcm_decrypt() argument 26 return aead_decrypt(tfm, j_0, aad + 2, in ieee80211_aes_gcm_decrypt() 38 static inline void ieee80211_aes_gcm_key_free(struct crypto_aead *tfm) in ieee80211_aes_gcm_key_free() argument 40 return aead_key_free(tfm); in ieee80211_aes_gcm_key_free()
|
| A D | aes_ccm.h | 21 ieee80211_aes_ccm_encrypt(struct crypto_aead *tfm, in ieee80211_aes_ccm_encrypt() argument 25 return aead_encrypt(tfm, b_0, aad + 2, in ieee80211_aes_ccm_encrypt() 31 ieee80211_aes_ccm_decrypt(struct crypto_aead *tfm, in ieee80211_aes_ccm_decrypt() argument 35 return aead_decrypt(tfm, b_0, aad + 2, in ieee80211_aes_ccm_decrypt() 40 static inline void ieee80211_aes_key_free(struct crypto_aead *tfm) in ieee80211_aes_key_free() argument 42 return aead_key_free(tfm); in ieee80211_aes_key_free()
|
| A D | aes_cmac.h | 14 void ieee80211_aes_cmac(struct crypto_shash *tfm, const u8 *aad, 16 void ieee80211_aes_cmac_256(struct crypto_shash *tfm, const u8 *aad, 18 void ieee80211_aes_cmac_key_free(struct crypto_shash *tfm);
|
| A D | key.h | 91 struct crypto_aead *tfm; member 96 struct crypto_shash *tfm; member 102 struct crypto_aead *tfm; member 113 struct crypto_aead *tfm; member
|
| A D | aead_api.h | 13 int aead_encrypt(struct crypto_aead *tfm, u8 *b_0, u8 *aad, 17 int aead_decrypt(struct crypto_aead *tfm, u8 *b_0, u8 *aad, 21 void aead_key_free(struct crypto_aead *tfm);
|
| A D | key.c | 649 if (IS_ERR(key->u.ccmp.tfm)) { in ieee80211_key_alloc() 650 err = PTR_ERR(key->u.ccmp.tfm); in ieee80211_key_alloc() 667 if (IS_ERR(key->u.ccmp.tfm)) { in ieee80211_key_alloc() 668 err = PTR_ERR(key->u.ccmp.tfm); in ieee80211_key_alloc() 688 key->u.aes_cmac.tfm = in ieee80211_key_alloc() 690 if (IS_ERR(key->u.aes_cmac.tfm)) { in ieee80211_key_alloc() 691 err = PTR_ERR(key->u.aes_cmac.tfm); in ieee80211_key_alloc() 707 key->u.aes_gmac.tfm = in ieee80211_key_alloc() 709 if (IS_ERR(key->u.aes_gmac.tfm)) { in ieee80211_key_alloc() 728 if (IS_ERR(key->u.gcmp.tfm)) { in ieee80211_key_alloc() [all …]
|
| A D | aes_gmac.h | 17 int ieee80211_aes_gmac(struct crypto_aead *tfm, const u8 *aad, u8 *nonce, 19 void ieee80211_aes_gmac_key_free(struct crypto_aead *tfm);
|
| /net/sunrpc/auth_gss/ |
| A D | gss_krb5_keys.c | 309 SHASH_DESC_ON_STACK(desc, tfm); in krb5_cmac_Ki() 314 desc->tfm = tfm; in krb5_cmac_Ki() 377 struct crypto_shash *tfm; in krb5_kdf_feedback_cmac() local 387 if (IS_ERR(tfm)) { in krb5_kdf_feedback_cmac() 388 ret = PTR_ERR(tfm); in krb5_kdf_feedback_cmac() 425 crypto_free_shash(tfm); in krb5_kdf_feedback_cmac() 453 desc->tfm = tfm; in krb5_hmac_K1() 506 struct crypto_shash *tfm; in krb5_kdf_hmac_sha2() local 519 if (IS_ERR(tfm)) { in krb5_kdf_hmac_sha2() 520 ret = PTR_ERR(tfm); in krb5_kdf_hmac_sha2() [all …]
|
| A D | gss_krb5_crypto.c | 104 struct crypto_sync_skcipher *tfm, in krb5_encrypt() argument 113 SYNC_SKCIPHER_REQUEST_ON_STACK(req, tfm); in krb5_encrypt() 115 if (length % crypto_sync_skcipher_blocksize(tfm) != 0) in krb5_encrypt() 120 crypto_sync_skcipher_ivsize(tfm)); in krb5_encrypt() 125 memcpy(local_iv, iv, crypto_sync_skcipher_ivsize(tfm)); in krb5_encrypt() 130 skcipher_request_set_sync_tfm(req, tfm); in krb5_encrypt() 182 req = ahash_request_alloc(tfm, GFP_KERNEL); in gss_krb5_checksum() 241 struct crypto_sync_skcipher *tfm = in encryptor() local 314 struct crypto_sync_skcipher *tfm = in decryptor() local 731 struct crypto_ahash *tfm, const struct xdr_buf *body, in krb5_etm_checksum() argument [all …]
|
| A D | gss_krb5_mech.c | 269 struct crypto_sync_skcipher *tfm; in gss_krb5_alloc_cipher_v2() local 271 tfm = crypto_alloc_sync_skcipher(cname, 0, 0); in gss_krb5_alloc_cipher_v2() 272 if (IS_ERR(tfm)) in gss_krb5_alloc_cipher_v2() 274 if (crypto_sync_skcipher_setkey(tfm, key->data, key->len)) { in gss_krb5_alloc_cipher_v2() 275 crypto_free_sync_skcipher(tfm); in gss_krb5_alloc_cipher_v2() 278 return tfm; in gss_krb5_alloc_cipher_v2() 284 struct crypto_ahash *tfm; in gss_krb5_alloc_hash_v2() local 287 if (IS_ERR(tfm)) in gss_krb5_alloc_hash_v2() 289 if (crypto_ahash_setkey(tfm, key->data, key->len)) { in gss_krb5_alloc_hash_v2() 290 crypto_free_ahash(tfm); in gss_krb5_alloc_hash_v2() [all …]
|
| A D | gss_krb5_unseal.c | 74 struct crypto_ahash *tfm = ctx->initiate ? in gss_krb5_verify_mic_v2() local 107 if (gss_krb5_checksum(tfm, ptr, GSS_KRB5_TOK_HDR_LEN, in gss_krb5_verify_mic_v2()
|
| A D | gss_krb5_seal.c | 108 struct crypto_ahash *tfm = ctx->initiate ? in gss_krb5_get_mic_v2() local 127 if (gss_krb5_checksum(tfm, krb5_hdr, GSS_KRB5_TOK_HDR_LEN, in gss_krb5_get_mic_v2()
|
| /net/bluetooth/ |
| A D | selftest.c | 155 ret = set_ecdh_privkey(tfm, priv_a); in test_ecdh_sample() 159 ret = compute_ecdh_secret(tfm, pub_b, dhkey_a); in test_ecdh_sample() 168 ret = set_ecdh_privkey(tfm, priv_b); in test_ecdh_sample() 172 ret = compute_ecdh_secret(tfm, pub_a, dhkey_b); in test_ecdh_sample() 201 struct crypto_kpp *tfm; in test_ecdh() local 208 tfm = crypto_alloc_kpp("ecdh-nist-p256", 0, 0); in test_ecdh() 209 if (IS_ERR(tfm)) { in test_ecdh() 211 err = PTR_ERR(tfm); in test_ecdh() 215 err = test_ecdh_sample(tfm, priv_a_1, priv_b_1, pub_a_1, pub_b_1, in test_ecdh() 222 err = test_ecdh_sample(tfm, priv_a_2, priv_b_2, pub_a_2, pub_b_2, in test_ecdh() [all …]
|
| A D | ecdh_helper.c | 44 int compute_ecdh_secret(struct crypto_kpp *tfm, const u8 public_key[64], in compute_ecdh_secret() argument 57 req = kpp_request_alloc(tfm, GFP_KERNEL); in compute_ecdh_secret() 101 int set_ecdh_privkey(struct crypto_kpp *tfm, const u8 private_key[32]) in set_ecdh_privkey() argument 128 err = crypto_kpp_set_secret(tfm, buf, buf_len); in set_ecdh_privkey() 145 int generate_ecdh_public_key(struct crypto_kpp *tfm, u8 public_key[64]) in generate_ecdh_public_key() argument 157 req = kpp_request_alloc(tfm, GFP_KERNEL); in generate_ecdh_public_key() 194 int generate_ecdh_keys(struct crypto_kpp *tfm, u8 public_key[64]) in generate_ecdh_keys() argument 198 err = set_ecdh_privkey(tfm, NULL); in generate_ecdh_keys() 202 return generate_ecdh_public_key(tfm, public_key); in generate_ecdh_keys()
|
| A D | ecdh_helper.h | 26 int compute_ecdh_secret(struct crypto_kpp *tfm, const u8 pair_public_key[64], 28 int set_ecdh_privkey(struct crypto_kpp *tfm, const u8 private_key[32]); 29 int generate_ecdh_public_key(struct crypto_kpp *tfm, u8 public_key[64]); 30 int generate_ecdh_keys(struct crypto_kpp *tfm, u8 public_key[64]);
|
| /net/ipv6/ |
| A D | seg6_hmac.c | 129 struct crypto_shash *tfm; in __do_hmac() local 137 tfm = *this_cpu_ptr(algo->tfms); in __do_hmac() 139 dgsize = crypto_shash_digestsize(tfm); in __do_hmac() 153 shash->tfm = tfm; in __do_hmac() 365 struct crypto_shash *tfm; in seg6_hmac_init_algo() local 383 if (IS_ERR(tfm)) { in seg6_hmac_init_algo() 384 ret = PTR_ERR(tfm); in seg6_hmac_init_algo() 388 *p_tfm = tfm; in seg6_hmac_init_algo() 392 tfm = *p_tfm; in seg6_hmac_init_algo() 431 struct crypto_shash *tfm; in seg6_hmac_exit() local [all …]
|
| /net/ceph/ |
| A D | crypto.c | 29 key->tfm = NULL; in set_secret() 51 key->tfm = crypto_alloc_sync_skcipher("cbc(aes)", 0, 0); in set_secret() 53 if (IS_ERR(key->tfm)) { in set_secret() 54 ret = PTR_ERR(key->tfm); in set_secret() 55 key->tfm = NULL; in set_secret() 59 ret = crypto_sync_skcipher_setkey(key->tfm, key->key, key->len); in set_secret() 128 if (key->tfm) { in ceph_crypto_key_destroy() 129 crypto_free_sync_skcipher(key->tfm); in ceph_crypto_key_destroy() 130 key->tfm = NULL; in ceph_crypto_key_destroy() 210 SYNC_SKCIPHER_REQUEST_ON_STACK(req, key->tfm); in ceph_aes_crypt() [all …]
|
| /net/xfrm/ |
| A D | xfrm_ipcomp.c | 31 struct crypto_acomp *tfm; member 123 struct crypto_acomp *tfm; in ipcomp_setup_req() local 160 tfm = ipcd->tfm; in ipcomp_setup_req() 162 tfm, sizeof(*extra) + sizeof(*sg) * (nfrags + dnfrags), in ipcomp_setup_req() 308 crypto_free_acomp(ipcd->tfm); in ipcomp_free_data() 343 ipcd->tfm = crypto_alloc_acomp(x->calg->alg_name, 0, 0); in ipcomp_init_state() 344 if (IS_ERR(ipcd->tfm)) in ipcomp_init_state()
|
| /net/tipc/ |
| A D | crypto.c | 130 struct crypto_aead *tfm; member 491 struct crypto_aead *tfm; in tipc_aead_tfm_next() local 495 tfm = (*tfm_entry)->tfm; in tipc_aead_tfm_next() 498 return tfm; in tipc_aead_tfm_next() 518 struct crypto_aead *tfm; in tipc_aead_init() local 544 if (IS_ERR(tfm)) { in tipc_aead_init() 545 err = PTR_ERR(tfm); in tipc_aead_init() 551 crypto_free_aead(tfm); in tipc_aead_init() 559 crypto_free_aead(tfm); in tipc_aead_init() 565 crypto_free_aead(tfm); in tipc_aead_init() [all …]
|
| /net/mac802154/ |
| A D | llsec.c | 129 for (i = 0; i < ARRAY_SIZE(key->tfm); i++) { in llsec_key_alloc() 130 key->tfm[i] = crypto_alloc_aead("ccm(aes)", 0, in llsec_key_alloc() 132 if (IS_ERR(key->tfm[i])) in llsec_key_alloc() 134 if (crypto_aead_setkey(key->tfm[i], template->key, in llsec_key_alloc() 154 for (i = 0; i < ARRAY_SIZE(key->tfm); i++) in llsec_key_alloc() 155 if (!IS_ERR_OR_NULL(key->tfm[i])) in llsec_key_alloc() 156 crypto_free_aead(key->tfm[i]); in llsec_key_alloc() 169 for (i = 0; i < ARRAY_SIZE(key->tfm); i++) in llsec_key_release() 170 crypto_free_aead(key->tfm[i]); in llsec_key_release() 648 for (i = 0; i < ARRAY_SIZE(key->tfm); i++) in llsec_tfm_by_len() [all …]
|
| /net/sctp/ |
| A D | auth.c | 456 struct crypto_shash *tfm = NULL; in sctp_auth_init_hmacs() local 485 tfm = crypto_alloc_shash(sctp_hmac_list[id].hmac_name, 0, 0); in sctp_auth_init_hmacs() 486 if (IS_ERR(tfm)) in sctp_auth_init_hmacs() 489 ep->auth_hmacs[id] = tfm; in sctp_auth_init_hmacs() 712 struct crypto_shash *tfm; in sctp_auth_calculate_hmac() local 739 tfm = asoc->ep->auth_hmacs[hmac_id]; in sctp_auth_calculate_hmac() 742 if (crypto_shash_setkey(tfm, &asoc_key->data[0], asoc_key->len)) in sctp_auth_calculate_hmac() 745 crypto_shash_tfm_digest(tfm, (u8 *)auth, end - (unsigned char *)auth, in sctp_auth_calculate_hmac()
|