Searched refs:kmd (Results 1 - 4 of 4) sorted by relevance
/linux-master/include/crypto/internal/ |
H A D | kdf_selftest.h | 25 int (*crypto_kdf_setkey)(struct crypto_shash *kmd, 28 int (*crypto_kdf_generate)(struct crypto_shash *kmd, 33 struct crypto_shash *kmd; local 40 kmd = crypto_alloc_shash(name, 0, 0); 41 if (IS_ERR(kmd)) { 48 ret = crypto_kdf_setkey(kmd, test->key, test->keylen, 55 ret = crypto_kdf_generate(kmd, &test->info, 1, buf, test->expectedlen); 66 crypto_free_shash(kmd); 24 kdf_test(const struct kdf_testvec *test, const char *name, int (*crypto_kdf_setkey)(struct crypto_shash *kmd, const u8 *key, size_t keylen, const u8 *ikm, size_t ikmlen), int (*crypto_kdf_generate)(struct crypto_shash *kmd, const struct kvec *info, unsigned int info_nvec, u8 *dst, unsigned int dlen)) argument
|
/linux-master/include/crypto/ |
H A D | kdf_sp800108.h | 17 * @kmd Keyed message digest whose key was set with crypto_kdf108_setkey or 31 int crypto_kdf108_ctr_generate(struct crypto_shash *kmd, 38 * @kmd Keyed message digest allocated by the caller. The key should not have 57 int crypto_kdf108_setkey(struct crypto_shash *kmd,
|
/linux-master/crypto/ |
H A D | kdf_sp800108.c | 17 int crypto_kdf108_ctr_generate(struct crypto_shash *kmd, argument 21 SHASH_DESC_ON_STACK(desc, kmd); 23 const unsigned int h = crypto_shash_digestsize(kmd), dlen_orig = dlen; 28 desc->tfm = kmd; 77 int crypto_kdf108_setkey(struct crypto_shash *kmd, argument 81 unsigned int ds = crypto_shash_digestsize(kmd); 92 return crypto_shash_setkey(kmd, key, keylen);
|
/linux-master/kernel/ |
H A D | seccomp.c | 2201 struct seccomp_metadata kmd = {}; local 2208 size = min_t(unsigned long, size, sizeof(kmd)); 2210 if (size < sizeof(kmd.filter_off)) 2213 if (copy_from_user(&kmd.filter_off, data, sizeof(kmd.filter_off))) 2216 filter = get_nth_filter(task, kmd.filter_off); 2221 kmd.flags |= SECCOMP_FILTER_FLAG_LOG; 2224 if (copy_to_user(data, &kmd, size))
|
Completed in 130 milliseconds