/drivers/crypto/ |
D | atmel-sha.c | 1690 struct atmel_sha_hmac_ctx *hmac = crypto_ahash_ctx(tfm); in atmel_sha_hmac_setup() local 1695 hmac->resume = resume; in atmel_sha_hmac_setup() 1727 if (likely(!atmel_sha_hmac_key_get(&hmac->hkey, &key, &keylen))) in atmel_sha_hmac_setup() 1735 memcpy((u8 *)hmac->ipad, key, keylen); in atmel_sha_hmac_setup() 1736 memset((u8 *)hmac->ipad + keylen, 0, bs - keylen); in atmel_sha_hmac_setup() 1751 struct atmel_sha_hmac_ctx *hmac = crypto_ahash_ctx(tfm); in atmel_sha_hmac_prehash_key_done() local 1759 hmac->ipad[i] = atmel_sha_read(dd, SHA_REG_DIGEST(i)); in atmel_sha_hmac_prehash_key_done() 1760 memset((u8 *)hmac->ipad + ds, 0, bs - ds); in atmel_sha_hmac_prehash_key_done() 1768 struct atmel_sha_hmac_ctx *hmac = crypto_ahash_ctx(tfm); in atmel_sha_hmac_compute_ipad_hash() local 1773 memcpy(hmac->opad, hmac->ipad, bs); in atmel_sha_hmac_compute_ipad_hash() [all …]
|
D | n2_core.c | 1305 struct n2_hmac_alg *hmac, *hmac_tmp; in __n2_unregister_algs() local 1312 list_for_each_entry_safe(hmac, hmac_tmp, &hmac_algs, derived.entry) { in __n2_unregister_algs() 1313 crypto_unregister_ahash(&hmac->derived.alg); in __n2_unregister_algs() 1314 list_del(&hmac->derived.entry); in __n2_unregister_algs() 1315 kfree(hmac); in __n2_unregister_algs()
|
D | Kconfig | 514 authenc(hmac(shaX),Y(cbc)) algorithms.
|
/drivers/crypto/ccree/ |
D | cc_aead.c | 52 struct cc_hmac_s hmac; member 95 struct cc_hmac_s *hmac = &ctx->auth_state.hmac; in cc_aead_exit() local 97 if (hmac->ipad_opad) { in cc_aead_exit() 99 hmac->ipad_opad, in cc_aead_exit() 100 hmac->ipad_opad_dma_addr); in cc_aead_exit() 102 &hmac->ipad_opad_dma_addr); in cc_aead_exit() 103 hmac->ipad_opad_dma_addr = 0; in cc_aead_exit() 104 hmac->ipad_opad = NULL; in cc_aead_exit() 106 if (hmac->padded_authkey) { in cc_aead_exit() 108 hmac->padded_authkey, in cc_aead_exit() [all …]
|
/drivers/thunderbolt/ |
D | domain.c | 712 u8 hmac[TB_SWITCH_KEY_SIZE]; in tb_domain_challenge_switch_key() local 748 memset(hmac, 0, sizeof(hmac)); in tb_domain_challenge_switch_key() 749 ret = crypto_shash_digest(shash, challenge, sizeof(hmac), hmac); in tb_domain_challenge_switch_key() 754 if (memcmp(response, hmac, sizeof(hmac))) { in tb_domain_challenge_switch_key()
|
/drivers/crypto/keembay/ |
D | Kconfig | 62 bool "Enable sha224 and hmac(sha224) support in Intel Keem Bay OCS HCU" 65 Enables support for sha224 and hmac(sha224) algorithms in the Intel 69 Provides OCS HCU hardware acceleration of sha224 and hmac(224).
|
/drivers/crypto/inside-secure/ |
D | safexcel_hash.c | 42 bool hmac; member 270 if (sreq->hmac && in safexcel_handle_req_result() 281 sreq->hmac = 0; in safexcel_handle_req_result() 705 (req->finish && req->hmac && in safexcel_ahash_enqueue() 829 } else if (unlikely(req->hmac && in safexcel_ahash_final() 863 } else if (req->hmac) { in safexcel_ahash_final() 1030 req->hmac = true; in safexcel_hmac_sha1_init() 1128 req->hmac = true; in safexcel_hmac_init_iv() 1403 req->hmac = true; in safexcel_hmac_sha224_init() 1475 req->hmac = true; in safexcel_hmac_sha256_init() [all …]
|
/drivers/net/wireguard/ |
D | noise.c | 305 static void hmac(u8 *out, const u8 *in, const u8 *key, const size_t inlen, const size_t keylen) in hmac() function 360 hmac(secret, data, chaining_key, data_len, NOISE_HASH_LEN); in kdf() 367 hmac(output, output, secret, 1, BLAKE2S_HASH_SIZE); in kdf() 375 hmac(output, output, secret, BLAKE2S_HASH_SIZE + 1, BLAKE2S_HASH_SIZE); in kdf() 383 hmac(output, output, secret, BLAKE2S_HASH_SIZE + 1, BLAKE2S_HASH_SIZE); in kdf()
|
/drivers/net/ethernet/3com/ |
D | typhoon.c | 1345 u32 hmac; in typhoon_download_firmware() local 1381 hmac = le32_to_cpu(fHdr->hmacDigest[0]); in typhoon_download_firmware() 1382 iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_0); in typhoon_download_firmware() 1383 hmac = le32_to_cpu(fHdr->hmacDigest[1]); in typhoon_download_firmware() 1384 iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_1); in typhoon_download_firmware() 1385 hmac = le32_to_cpu(fHdr->hmacDigest[2]); in typhoon_download_firmware() 1386 iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_2); in typhoon_download_firmware() 1387 hmac = le32_to_cpu(fHdr->hmacDigest[3]); in typhoon_download_firmware() 1388 iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_3); in typhoon_download_firmware() 1389 hmac = le32_to_cpu(fHdr->hmacDigest[4]); in typhoon_download_firmware() [all …]
|
/drivers/crypto/cavium/cpt/ |
D | cptvf_algs.h | 95 struct fchmac_context hmac; member
|
/drivers/crypto/marvell/octeontx2/ |
D | otx2_cptvf_algs.h | 116 union otx2_cpt_fc_hmac_ctx hmac; member
|
D | otx2_cptvf_algs.c | 91 if (memcmp(rctx->fctx.hmac.s.hmac_calc, in validate_hmac_cipher_null() 92 rctx->fctx.hmac.s.hmac_recv, in validate_hmac_cipher_null() 1046 memcpy(fctx->hmac.e.ipad, ctx->ipad, ds); in create_aead_ctx_hdr() 1048 memcpy(fctx->hmac.e.opad, ctx->opad, ds); in create_aead_ctx_hdr() 1245 rctx->fctx.hmac.s.hmac_recv, mac_len, in create_aead_null_output_list() 1250 req_info->out[argcnt].vptr = rctx->fctx.hmac.s.hmac_calc; in create_aead_null_output_list()
|
/drivers/crypto/marvell/octeontx/ |
D | otx_cptvf_algs.h | 126 union otx_cpt_fchmac_ctx hmac; member
|
D | otx_cptvf_algs.c | 107 if (memcmp(rctx->fctx.hmac.s.hmac_calc, in validate_hmac_cipher_null() 108 rctx->fctx.hmac.s.hmac_recv, in validate_hmac_cipher_null() 991 memcpy(fctx->hmac.e.ipad, ctx->ipad, ds); in create_aead_ctx_hdr() 993 memcpy(fctx->hmac.e.opad, ctx->opad, ds); in create_aead_ctx_hdr() 1197 rctx->fctx.hmac.s.hmac_recv, mac_len, in create_aead_null_output_list() 1204 req_info->out[argcnt].vptr = rctx->fctx.hmac.s.hmac_calc; in create_aead_null_output_list()
|
/drivers/crypto/axis/ |
D | artpec6_crypto.c | 2258 artpec6_crypto_init_hash(struct ahash_request *req, u8 type, int hmac) in artpec6_crypto_init_hash() argument 2268 if (hmac) in artpec6_crypto_init_hash() 2273 oper = hmac ? regk_crypto_hmac_sha1 : regk_crypto_sha1; in artpec6_crypto_init_hash() 2276 oper = hmac ? regk_crypto_hmac_sha256 : regk_crypto_sha256; in artpec6_crypto_init_hash()
|