| /OK3568_Linux_fs/kernel/fs/crypto/ |
| H A D | hkdf.c | 54 err = crypto_shash_setkey(hmac_tfm, default_salt, HKDF_HASHLEN); in hkdf_extract() 91 err = crypto_shash_setkey(hmac_tfm, prk, sizeof(prk)); in fscrypt_init_hkdf()
|
| /OK3568_Linux_fs/kernel/net/mac80211/ |
| H A D | fils_aead.c | 91 res = crypto_shash_setkey(tfm, key, key_len); in aes_siv_encrypt() 206 res = crypto_shash_setkey(tfm, key, key_len); in aes_siv_decrypt()
|
| H A D | aes_cmac.c | 77 crypto_shash_setkey(tfm, key, key_len); in ieee80211_aes_cmac_key_setup()
|
| /OK3568_Linux_fs/kernel/Documentation/crypto/ |
| H A D | api-digest.rst | 35 …ypto_shash_blocksize crypto_shash_digestsize crypto_shash_descsize crypto_shash_setkey crypto_shas…
|
| /OK3568_Linux_fs/kernel/drivers/net/wireless/intersil/orinoco/ |
| H A D | mic.c | 69 err = crypto_shash_setkey(tfm_michael, key, MIC_KEYLEN); in orinoco_mic()
|
| /OK3568_Linux_fs/kernel/crypto/ |
| H A D | shash.c | 69 int crypto_shash_setkey(struct crypto_shash *tfm, const u8 *key, in crypto_shash_setkey() function 89 EXPORT_SYMBOL_GPL(crypto_shash_setkey); 254 return crypto_shash_setkey(*ctx, key, keylen); in shash_async_setkey()
|
| H A D | fips140-module.c | 404 err = crypto_shash_setkey(tfm, fips140_integ_hmac_key, in check_fips140_module_hmac()
|
| H A D | adiantum.c | 177 err = crypto_shash_setkey(tctx->hash, keyp, NHPOLY1305_KEY_SIZE); in adiantum_setkey()
|
| H A D | fips140-selftests.c | 428 err = crypto_shash_setkey(tfm, vec->key, vec->key_size); in fips_test_hash()
|
| /OK3568_Linux_fs/kernel/android/ |
| H A D | abi_gki_aarch64_fips140 | 65 crypto_shash_setkey
|
| H A D | abi_gki_aarch64_virtual_device | 765 crypto_shash_setkey
|
| /OK3568_Linux_fs/kernel/fs/cifs/ |
| H A D | smb2transport.c | 250 rc = crypto_shash_setkey(hash, ses->auth_key.response, in smb2_calc_signature() 317 rc = crypto_shash_setkey(server->secmech.hmacsha256, in generate_key() 565 rc = crypto_shash_setkey(hash, key, SMB2_CMACAES_SIZE); in smb3_calc_signature()
|
| H A D | cifsencrypt.c | 514 rc = crypto_shash_setkey(ses->server->secmech.hmacmd5, nt_hash, in calc_ntlmv2_hash() 617 rc = crypto_shash_setkey(ses->server->secmech.hmacmd5, in CalcNTLMv2_response() 738 rc = crypto_shash_setkey(ses->server->secmech.hmacmd5, in setup_ntlmv2_rsp()
|
| /OK3568_Linux_fs/kernel/security/integrity/evm/ |
| H A D | evm_crypto.c | 108 rc = crypto_shash_setkey(tmp_tfm, evmkey, evmkey_len); in init_desc()
|
| /OK3568_Linux_fs/kernel/net/ipv6/ |
| H A D | seg6_hmac.c | 140 ret = crypto_shash_setkey(tfm, hinfo->secret, hinfo->slen); in __do_hmac()
|
| /OK3568_Linux_fs/kernel/fs/ubifs/ |
| H A D | auth.c | 334 err = crypto_shash_setkey(c->hmac_tfm, ukp->data, ukp->datalen); in ubifs_init_authentication()
|
| /OK3568_Linux_fs/kernel/include/crypto/ |
| H A D | hash.h | 849 int crypto_shash_setkey(struct crypto_shash *tfm, const u8 *key,
|
| /OK3568_Linux_fs/kernel/drivers/crypto/bcm/ |
| H A D | util.c | 236 rc = crypto_shash_setkey(hash, key, key_len); in do_shash()
|
| /OK3568_Linux_fs/kernel/drivers/thunderbolt/ |
| H A D | domain.c | 698 ret = crypto_shash_setkey(tfm, sw->key, TB_SWITCH_KEY_SIZE); in tb_domain_challenge_switch_key()
|
| /OK3568_Linux_fs/kernel/net/bluetooth/ |
| H A D | amp.c | 143 ret = crypto_shash_setkey(tfm, key, ksize); in hmac_sha256()
|
| /OK3568_Linux_fs/kernel/net/wireless/ |
| H A D | lib80211_crypt_tkip.c | 487 if (crypto_shash_setkey(tfm_michael, key, 8)) in michael_mic()
|
| /OK3568_Linux_fs/kernel/drivers/staging/rtl8192e/ |
| H A D | rtllib_crypt_tkip.c | 465 if (crypto_shash_setkey(tfm_michael, key, 8)) in michael_mic()
|
| /OK3568_Linux_fs/kernel/drivers/staging/rtl8192u/ieee80211/ |
| H A D | ieee80211_crypt_tkip.c | 454 if (crypto_shash_setkey(tfm_michael, key, 8)) in michael_mic()
|
| /OK3568_Linux_fs/kernel/net/sctp/ |
| H A D | auth.c | 742 if (crypto_shash_setkey(tfm, &asoc_key->data[0], asoc_key->len)) in sctp_auth_calculate_hmac()
|
| /OK3568_Linux_fs/kernel/security/keys/encrypted-keys/ |
| H A D | encrypted.c | 339 err = crypto_shash_setkey(tfm, key, keylen); in calc_hmac()
|