hash_name
tfm = crypto_alloc_shash(krb5->hash_name, 0, 0);
.hash_name = "sha1",
.hash_name = "sha1",
.hash_name = NULL,
.hash_name = NULL,
.hash_name = "sha256",
.hash_name = "sha384",
const char *hash_name;
hash_name = crypto_attr_alg_name(tb[2]);
if (IS_ERR(hash_name)) {
err = PTR_ERR(hash_name);
ctx->hash_prefix = rsassa_pkcs1_find_hash_prefix(hash_name);
hash_name) >= CRYPTO_MAX_ALG_NAME)
hash_name) >= CRYPTO_MAX_ALG_NAME)
struct st_key *this = hash_name(name);
struct st_key *this = hash_name(name);
char *hash_name;
hash_name = spu2_hash_type_name(hash_type);
packet_log(" Hash type: %s\n", hash_name);
static int sec_aead_ctx_init(struct crypto_aead *tfm, const char *hash_name)
a_ctx->hash_tfm = crypto_alloc_shash(hash_name, 0, 0);
const char *hash_name;
hash_name = nvme_auth_hmac_name(ctrl->shash_id);
if (!hash_name) {
shash_tfm = crypto_alloc_shash(hash_name, 0, 0);
pr_err("failed to allocate shash %s\n", hash_name);
const char *hash_name;
hash_name = nvme_auth_hmac_name(ctrl->shash_id);
if (!hash_name) {
shash_tfm = crypto_alloc_shash(hash_name, 0, 0);
pr_err("failed to allocate shash %s\n", hash_name);
const char *hash_name = nvme_auth_hmac_name(host->dhchap_hash_id);
return sprintf(page, "%s\n", hash_name ? hash_name : "none");
name = hash_name(nd, name, &lastword);
const char *hash_name; /* Crypto hash name */
static void hash_eval(struct hashtab *h, const char *hash_name,
hash_name, hash_details ? "@" : "", hash_details ?: "", h->nel,
static inline void hash_eval(struct hashtab *h, const char *hash_name,