| /linux/security/keys/encrypted-keys/ |
| H A D | encrypted.c | 331 static int get_derived_key(u8 *derived_key, enum derived_key_type key_type, in get_derived_key() argument 352 sha256(derived_buf, derived_buf_len, derived_key); in get_derived_key() 427 const u8 *derived_key, in derived_key_encrypt() argument 440 req = init_skcipher_req(derived_key, derived_keylen); in derived_key_encrypt() 471 u8 derived_key[HASH_SIZE]; in datablob_hmac_append() local 475 ret = get_derived_key(derived_key, AUTH_KEY, master_key, master_keylen); in datablob_hmac_append() 480 hmac_sha256_usingrawkey(derived_key, sizeof(derived_key), in datablob_hmac_append() 485 memzero_explicit(derived_key, sizeof(derived_key)); in datablob_hmac_append() 494 u8 derived_key[HASH_SIZE]; in datablob_hmac_verify() local 500 ret = get_derived_key(derived_key, AUTH_KEY, master_key, master_keylen); in datablob_hmac_verify() [all …]
|
| /linux/fs/crypto/ |
| H A D | keysetup_v1.c | 49 u8 *derived_key, unsigned int derived_keysize) in derive_key_aes() argument 68 sg_init_one(&dst_sg, derived_key, derived_keysize); in derive_key_aes() 262 u8 *derived_key; in setup_v1_file_key_derived() local 269 derived_key = kmalloc(ci->ci_mode->keysize, GFP_KERNEL); in setup_v1_file_key_derived() 270 if (!derived_key) in setup_v1_file_key_derived() 274 derived_key, ci->ci_mode->keysize); in setup_v1_file_key_derived() 278 err = fscrypt_set_per_file_enc_key(ci, derived_key); in setup_v1_file_key_derived() 280 kfree_sensitive(derived_key); in setup_v1_file_key_derived()
|
| H A D | keysetup.c | 384 u8 derived_key[FSCRYPT_MAX_RAW_KEY_SIZE]; in fscrypt_setup_v2_file_key() local 389 derived_key, ci->ci_mode->keysize); in fscrypt_setup_v2_file_key() 390 err = fscrypt_set_per_file_enc_key(ci, derived_key); in fscrypt_setup_v2_file_key() 391 memzero_explicit(derived_key, ci->ci_mode->keysize); in fscrypt_setup_v2_file_key()
|
| /linux/lib/crypto/ |
| H A D | sha1.c | 217 } derived_key = { 0 }; in __hmac_sha1_preparekey() local 220 sha1(raw_key, raw_key_len, derived_key.b); in __hmac_sha1_preparekey() 222 memcpy(derived_key.b, raw_key, raw_key_len); in __hmac_sha1_preparekey() 224 for (size_t i = 0; i < ARRAY_SIZE(derived_key.w); i++) in __hmac_sha1_preparekey() 225 derived_key.w[i] ^= REPEAT_BYTE(HMAC_IPAD_VALUE); in __hmac_sha1_preparekey() 227 sha1_blocks(istate, derived_key.b, 1); in __hmac_sha1_preparekey() 229 for (size_t i = 0; i < ARRAY_SIZE(derived_key.w); i++) in __hmac_sha1_preparekey() 230 derived_key.w[i] ^= REPEAT_BYTE(HMAC_OPAD_VALUE ^ in __hmac_sha1_preparekey() 233 sha1_blocks(ostate, derived_key.b, 1); in __hmac_sha1_preparekey() 235 memzero_explicit(&derived_key, sizeof(derived_key)); in __hmac_sha1_preparekey()
|
| H A D | sha512.c | 261 } derived_key = { 0 }; in __hmac_sha512_preparekey() local 265 sha384(raw_key, raw_key_len, derived_key.b); in __hmac_sha512_preparekey() 267 sha512(raw_key, raw_key_len, derived_key.b); in __hmac_sha512_preparekey() 269 memcpy(derived_key.b, raw_key, raw_key_len); in __hmac_sha512_preparekey() 272 for (size_t i = 0; i < ARRAY_SIZE(derived_key.w); i++) in __hmac_sha512_preparekey() 273 derived_key.w[i] ^= REPEAT_BYTE(HMAC_IPAD_VALUE); in __hmac_sha512_preparekey() 275 sha512_blocks(istate, derived_key.b, 1); in __hmac_sha512_preparekey() 277 for (size_t i = 0; i < ARRAY_SIZE(derived_key.w); i++) in __hmac_sha512_preparekey() 278 derived_key.w[i] ^= REPEAT_BYTE(HMAC_OPAD_VALUE ^ in __hmac_sha512_preparekey() 281 sha512_blocks(ostate, derived_key.b, 1); in __hmac_sha512_preparekey() [all …]
|
| H A D | md5.c | 220 } derived_key = { 0 }; in __hmac_md5_preparekey() local 223 md5(raw_key, raw_key_len, derived_key.b); in __hmac_md5_preparekey() 225 memcpy(derived_key.b, raw_key, raw_key_len); in __hmac_md5_preparekey() 227 for (size_t i = 0; i < ARRAY_SIZE(derived_key.w); i++) in __hmac_md5_preparekey() 228 derived_key.w[i] ^= REPEAT_BYTE(HMAC_IPAD_VALUE); in __hmac_md5_preparekey() 230 md5_blocks(istate, derived_key.b, 1); in __hmac_md5_preparekey() 232 for (size_t i = 0; i < ARRAY_SIZE(derived_key.w); i++) in __hmac_md5_preparekey() 233 derived_key.w[i] ^= REPEAT_BYTE(HMAC_OPAD_VALUE ^ in __hmac_md5_preparekey() 236 md5_blocks(ostate, derived_key.b, 1); in __hmac_md5_preparekey() 238 memzero_explicit(&derived_key, sizeof(derived_key)); in __hmac_md5_preparekey()
|
| H A D | sha256.c | 336 } derived_key = { 0 }; in __hmac_sha256_preparekey() local 340 sha224(raw_key, raw_key_len, derived_key.b); in __hmac_sha256_preparekey() 342 sha256(raw_key, raw_key_len, derived_key.b); in __hmac_sha256_preparekey() 344 memcpy(derived_key.b, raw_key, raw_key_len); in __hmac_sha256_preparekey() 347 for (size_t i = 0; i < ARRAY_SIZE(derived_key.w); i++) in __hmac_sha256_preparekey() 348 derived_key.w[i] ^= REPEAT_BYTE(HMAC_IPAD_VALUE); in __hmac_sha256_preparekey() 350 sha256_blocks(istate, derived_key.b, 1); in __hmac_sha256_preparekey() 352 for (size_t i = 0; i < ARRAY_SIZE(derived_key.w); i++) in __hmac_sha256_preparekey() 353 derived_key.w[i] ^= REPEAT_BYTE(HMAC_OPAD_VALUE ^ in __hmac_sha256_preparekey() 356 sha256_blocks(ostate, derived_key.b, 1); in __hmac_sha256_preparekey() [all …]
|
| /linux/crypto/krb5/ |
| H A D | rfc3961_simplified.c | 392 struct krb5_buffer derived_key; in rfc3961_calc_PRF() local 402 derived_key.len = krb5->key_bytes; in rfc3961_calc_PRF() 403 buffer = kzalloc(round16(tmp1.len) + round16(derived_key.len), gfp); in rfc3961_calc_PRF() 408 derived_key.data = buffer + round16(tmp1.len); in rfc3961_calc_PRF() 417 ret = rfc3961_calc_DK(krb5, protocol_key, &prfconstant, &derived_key, gfp); in rfc3961_calc_PRF() 421 ret = rfc3961_calc_E(krb5, &derived_key, &tmp2, result, gfp); in rfc3961_calc_PRF()
|