Home
last modified time | relevance | path

Searched refs:hmac (Results 1 – 15 of 15) sorted by relevance

/drivers/crypto/
Datmel-sha.c1690 struct atmel_sha_hmac_ctx *hmac = crypto_ahash_ctx(tfm); in atmel_sha_hmac_setup() local
1695 hmac->resume = resume; in atmel_sha_hmac_setup()
1727 if (likely(!atmel_sha_hmac_key_get(&hmac->hkey, &key, &keylen))) in atmel_sha_hmac_setup()
1735 memcpy((u8 *)hmac->ipad, key, keylen); in atmel_sha_hmac_setup()
1736 memset((u8 *)hmac->ipad + keylen, 0, bs - keylen); in atmel_sha_hmac_setup()
1751 struct atmel_sha_hmac_ctx *hmac = crypto_ahash_ctx(tfm); in atmel_sha_hmac_prehash_key_done() local
1759 hmac->ipad[i] = atmel_sha_read(dd, SHA_REG_DIGEST(i)); in atmel_sha_hmac_prehash_key_done()
1760 memset((u8 *)hmac->ipad + ds, 0, bs - ds); in atmel_sha_hmac_prehash_key_done()
1768 struct atmel_sha_hmac_ctx *hmac = crypto_ahash_ctx(tfm); in atmel_sha_hmac_compute_ipad_hash() local
1773 memcpy(hmac->opad, hmac->ipad, bs); in atmel_sha_hmac_compute_ipad_hash()
[all …]
Dn2_core.c1305 struct n2_hmac_alg *hmac, *hmac_tmp; in __n2_unregister_algs() local
1312 list_for_each_entry_safe(hmac, hmac_tmp, &hmac_algs, derived.entry) { in __n2_unregister_algs()
1313 crypto_unregister_ahash(&hmac->derived.alg); in __n2_unregister_algs()
1314 list_del(&hmac->derived.entry); in __n2_unregister_algs()
1315 kfree(hmac); in __n2_unregister_algs()
DKconfig514 authenc(hmac(shaX),Y(cbc)) algorithms.
/drivers/crypto/ccree/
Dcc_aead.c52 struct cc_hmac_s hmac; member
95 struct cc_hmac_s *hmac = &ctx->auth_state.hmac; in cc_aead_exit() local
97 if (hmac->ipad_opad) { in cc_aead_exit()
99 hmac->ipad_opad, in cc_aead_exit()
100 hmac->ipad_opad_dma_addr); in cc_aead_exit()
102 &hmac->ipad_opad_dma_addr); in cc_aead_exit()
103 hmac->ipad_opad_dma_addr = 0; in cc_aead_exit()
104 hmac->ipad_opad = NULL; in cc_aead_exit()
106 if (hmac->padded_authkey) { in cc_aead_exit()
108 hmac->padded_authkey, in cc_aead_exit()
[all …]
/drivers/thunderbolt/
Ddomain.c712 u8 hmac[TB_SWITCH_KEY_SIZE]; in tb_domain_challenge_switch_key() local
748 memset(hmac, 0, sizeof(hmac)); in tb_domain_challenge_switch_key()
749 ret = crypto_shash_digest(shash, challenge, sizeof(hmac), hmac); in tb_domain_challenge_switch_key()
754 if (memcmp(response, hmac, sizeof(hmac))) { in tb_domain_challenge_switch_key()
/drivers/crypto/keembay/
DKconfig62 bool "Enable sha224 and hmac(sha224) support in Intel Keem Bay OCS HCU"
65 Enables support for sha224 and hmac(sha224) algorithms in the Intel
69 Provides OCS HCU hardware acceleration of sha224 and hmac(224).
/drivers/crypto/inside-secure/
Dsafexcel_hash.c42 bool hmac; member
270 if (sreq->hmac && in safexcel_handle_req_result()
281 sreq->hmac = 0; in safexcel_handle_req_result()
705 (req->finish && req->hmac && in safexcel_ahash_enqueue()
829 } else if (unlikely(req->hmac && in safexcel_ahash_final()
863 } else if (req->hmac) { in safexcel_ahash_final()
1030 req->hmac = true; in safexcel_hmac_sha1_init()
1128 req->hmac = true; in safexcel_hmac_init_iv()
1403 req->hmac = true; in safexcel_hmac_sha224_init()
1475 req->hmac = true; in safexcel_hmac_sha256_init()
[all …]
/drivers/net/wireguard/
Dnoise.c305 static void hmac(u8 *out, const u8 *in, const u8 *key, const size_t inlen, const size_t keylen) in hmac() function
360 hmac(secret, data, chaining_key, data_len, NOISE_HASH_LEN); in kdf()
367 hmac(output, output, secret, 1, BLAKE2S_HASH_SIZE); in kdf()
375 hmac(output, output, secret, BLAKE2S_HASH_SIZE + 1, BLAKE2S_HASH_SIZE); in kdf()
383 hmac(output, output, secret, BLAKE2S_HASH_SIZE + 1, BLAKE2S_HASH_SIZE); in kdf()
/drivers/net/ethernet/3com/
Dtyphoon.c1345 u32 hmac; in typhoon_download_firmware() local
1381 hmac = le32_to_cpu(fHdr->hmacDigest[0]); in typhoon_download_firmware()
1382 iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_0); in typhoon_download_firmware()
1383 hmac = le32_to_cpu(fHdr->hmacDigest[1]); in typhoon_download_firmware()
1384 iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_1); in typhoon_download_firmware()
1385 hmac = le32_to_cpu(fHdr->hmacDigest[2]); in typhoon_download_firmware()
1386 iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_2); in typhoon_download_firmware()
1387 hmac = le32_to_cpu(fHdr->hmacDigest[3]); in typhoon_download_firmware()
1388 iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_3); in typhoon_download_firmware()
1389 hmac = le32_to_cpu(fHdr->hmacDigest[4]); in typhoon_download_firmware()
[all …]
/drivers/crypto/cavium/cpt/
Dcptvf_algs.h95 struct fchmac_context hmac; member
/drivers/crypto/marvell/octeontx2/
Dotx2_cptvf_algs.h116 union otx2_cpt_fc_hmac_ctx hmac; member
Dotx2_cptvf_algs.c91 if (memcmp(rctx->fctx.hmac.s.hmac_calc, in validate_hmac_cipher_null()
92 rctx->fctx.hmac.s.hmac_recv, in validate_hmac_cipher_null()
1046 memcpy(fctx->hmac.e.ipad, ctx->ipad, ds); in create_aead_ctx_hdr()
1048 memcpy(fctx->hmac.e.opad, ctx->opad, ds); in create_aead_ctx_hdr()
1245 rctx->fctx.hmac.s.hmac_recv, mac_len, in create_aead_null_output_list()
1250 req_info->out[argcnt].vptr = rctx->fctx.hmac.s.hmac_calc; in create_aead_null_output_list()
/drivers/crypto/marvell/octeontx/
Dotx_cptvf_algs.h126 union otx_cpt_fchmac_ctx hmac; member
Dotx_cptvf_algs.c107 if (memcmp(rctx->fctx.hmac.s.hmac_calc, in validate_hmac_cipher_null()
108 rctx->fctx.hmac.s.hmac_recv, in validate_hmac_cipher_null()
991 memcpy(fctx->hmac.e.ipad, ctx->ipad, ds); in create_aead_ctx_hdr()
993 memcpy(fctx->hmac.e.opad, ctx->opad, ds); in create_aead_ctx_hdr()
1197 rctx->fctx.hmac.s.hmac_recv, mac_len, in create_aead_null_output_list()
1204 req_info->out[argcnt].vptr = rctx->fctx.hmac.s.hmac_calc; in create_aead_null_output_list()
/drivers/crypto/axis/
Dartpec6_crypto.c2258 artpec6_crypto_init_hash(struct ahash_request *req, u8 type, int hmac) in artpec6_crypto_init_hash() argument
2268 if (hmac) in artpec6_crypto_init_hash()
2273 oper = hmac ? regk_crypto_hmac_sha1 : regk_crypto_sha1; in artpec6_crypto_init_hash()
2276 oper = hmac ? regk_crypto_hmac_sha256 : regk_crypto_sha256; in artpec6_crypto_init_hash()