/linux-4.1.27/drivers/target/iscsi/ |
H A D | iscsi_target_auth.h | 10 #define MAX_RESPONSE_LENGTH 64 /* sufficient for MD5 */ 13 #define MD5_SIGNATURE_SIZE 16 /* 16 bytes in a MD5 message digest */
|
H A D | iscsi_target_auth.c | 99 pr_debug("Selected MD5 Algorithm\n"); chap_check_algorithm() 136 * Send back CHAP_A set to MD5. chap_server_open() 296 pr_debug("[server] MD5 Server Digest: %s\n", response); chap_server_compute_md5() 299 pr_debug("[server] MD5 Digests do not match!\n\n"); chap_server_compute_md5() 302 pr_debug("[server] MD5 Digests match, CHAP connetication" chap_server_compute_md5()
|
/linux-4.1.27/arch/mips/cavium-octeon/crypto/ |
H A D | octeon-crypto.h | 8 * MD5/SHA1/SHA256/SHA512 instruction definitions added by 25 * Macros needed to implement MD5/SHA1/SHA256: 29 * The index can be 0-1 (MD5) or 0-2 (SHA1), 0-3 (SHA256). 40 * The index can be 0-1 (MD5) or 0-2 (SHA1), 0-3 (SHA256).
|
H A D | octeon-md5.c | 4 * MD5 Message Digest Algorithm (RFC1321). 207 MODULE_DESCRIPTION("MD5 Message Digest Algorithm (OCTEON)");
|
/linux-4.1.27/arch/cris/include/uapi/arch-v32/arch/ |
H A D | cryptocop.h | 70 cryptocop_digest_type digest; /* MD5, SHA1, none */ 79 #define CRYPTOCOP_MAX_DIGEST_LENGTH (20) /* SHA-1 20, MD5 16 */
|
/linux-4.1.27/arch/sparc/crypto/ |
H A D | md5_glue.c | 1 /* Glue code for MD5 hashing optimized for sparc64 crypto opcodes. 170 pr_info("Using sparc64 md5 opcode optimized MD5 implementation\n"); md5_sparc64_mod_init() 186 MODULE_DESCRIPTION("MD5 Message Digest Algorithm, sparc64 md5 opcode accelerated");
|
H A D | opcodes.h | 20 #define MD5 \ macro
|
/linux-4.1.27/crypto/ |
H A D | md5.c | 4 * MD5 Message Digest Algorithm (RFC1321). 170 MODULE_DESCRIPTION("MD5 Message Digest Algorithm");
|
H A D | testmgr.h | 159 * MD5 test vectors from RFC1321 1882 * HMAC-MD5 test vectors from RFC2202
|
/linux-4.1.27/arch/powerpc/crypto/ |
H A D | md5-glue.c | 2 * Glue code for MD5 implementation for PPC assembler 162 MODULE_DESCRIPTION("MD5 Secure Hash Algorithm, PPC assembler");
|
H A D | md5-asm.S | 2 * Fast MD5 implementation for PPC
|
/linux-4.1.27/Documentation/networking/ |
H A D | cxacru-cf.py | 21 # Warning: cxacru-cf.bin with MD5 hash cdbac2689969d5ed5d4850f117702110
|
/linux-4.1.27/arch/sparc/include/uapi/asm/ |
H A D | pstate.h | 96 #define CFR_MD5 _AC(0x0000000000000010,UL) /* Supports MD5 opcodes */
|
/linux-4.1.27/include/uapi/linux/ |
H A D | tcp.h | 104 #define TCP_MD5SIG 14 /* TCP MD5 Signature (RFC2385) */
|
/linux-4.1.27/arch/sh/include/cpu-sh4/cpu/ |
H A D | sh7722.h | 10 * MD5: BSC - Endian Mode (L: Big, H: Little) [CMNCR.3]
|
H A D | sh7723.h | 10 * MD5: BSC - Endian Mode (L: Big, H: Little) [CMNCR.3]
|
H A D | sh7724.h | 10 * MD5: BSC - Endian Mode (L: Big, H: Little) [CMNCR.3]
|
/linux-4.1.27/net/ipv4/ |
H A D | tcp_ipv4.c | 865 * RFC2385 MD5 checksumming requires a mapping of 866 * IP address->MD5 Key. 1127 * o No MD5 hash and one expected. tcp_v4_inbound_md5_hash() 1128 * o MD5 hash and we're not expecting one. tcp_v4_inbound_md5_hash() 1129 * o MD5 hash and its wrong. tcp_v4_inbound_md5_hash() 1164 net_info_ratelimited("MD5 Hash failed for (%pI4, %d)->(%pI4, %d)%s\n", tcp_v4_inbound_md5_hash() 1309 /* Copy over the MD5 key from the original socket */ tcp_v4_syn_recv_sock() 1617 * o We're expecting an MD5'd packet and this is no MD5 tcp option tcp_v4_rcv() 1618 * o There is an MD5 option and we're not expecting one tcp_v4_rcv() 1789 /* Clean up the MD5 key list, if any */ tcp_v4_destroy_sock()
|
H A D | tcp_output.c | 628 /* We can't fit any SACK blocks in a packet with MD5 + TS tcp_synack_options() 1001 /* Calculate the MD5 hash, as we have all we need now */ tcp_transmit_skb()
|
H A D | tcp_input.c | 3728 * The MD5 Hash has already been tcp_parse_options() 3805 * Parse MD5 Signature option
|
/linux-4.1.27/include/linux/ |
H A D | tcp.h | 318 /* TCP AF-Specific parts; only used by MD5 Signature support so far */ 321 /* TCP MD5 Signature Option information */
|
/linux-4.1.27/crypto/asymmetric_keys/ |
H A D | rsa.c | 77 [HASH_ALGO_MD5] = _(MD5),
|
/linux-4.1.27/security/integrity/ima/ |
H A D | ima.h | 33 /* digest size for IMA, fits SHA1 or MD5 */
|
H A D | ima_template_lib.c | 168 * SHA1 or MD5 ima_eventdigest_init_common()
|
/linux-4.1.27/drivers/crypto/ |
H A D | img-hash.c | 974 dev_dbg(dev, "Img MD5/SHA1/SHA224/SHA256 Hardware accelerator initialized\n"); img_hash_probe() 1027 MODULE_DESCRIPTION("Imgtec SHA1/224/256 & MD5 hw accelerator driver");
|
H A D | omap-sham.c | 4 * Support for OMAP SHA1/MD5 HW acceleration. 2041 MODULE_DESCRIPTION("OMAP SHA1/MD5 hw acceleration support.");
|
/linux-4.1.27/fs/cifs/ |
H A D | link.c | 124 cifs_dbg(FYI, "%s: MD5 hash failure: %d\n", __func__, rc); parse_mf_symlink() 163 cifs_dbg(FYI, "%s: MD5 hash failure: %d\n", __func__, rc); format_mf_symlink()
|
H A D | cifsencrypt.c | 601 /* The MD5 hash starts at challenge_key.key */ CalcNTLMv2_response() 637 /* Note that the MD5 digest over writes anon.challenge_key.key */ CalcNTLMv2_response()
|
/linux-4.1.27/include/linux/sunrpc/ |
H A D | gss_krb5.h | 191 #define ENCTYPE_DES_CBC_MD5 0x0003 /* DES cbc mode with RSA-MD5 */
|
/linux-4.1.27/arch/sh/boards/mach-ap325rxa/ |
H A D | setup.c | 687 * MD5=1: Little Endian ap325rxa_mode_pins()
|
/linux-4.1.27/arch/sh/boards/mach-kfr2r09/ |
H A D | setup.c | 649 * MD5=1: Little Endian kfr2r09_mode_pins()
|
/linux-4.1.27/arch/sh/boards/mach-migor/ |
H A D | setup.c | 663 * MD5=1: Little Endian migor_mode_pins()
|
/linux-4.1.27/fs/ecryptfs/ |
H A D | crypto.c | 85 * generate the MD5 sum of the contents of src. 197 "MD5 while generating IV for a page\n"); ecryptfs_derive_iv() 701 "MD5 while generating root IV\n"); ecryptfs_compute_root_iv()
|
H A D | keystore.c | 1481 /* Choose MD5 */ parse_tag_3_packet() 1502 (*new_auth_tok)->token.password.hash_algo = 0x01; /* MD5 */ parse_tag_3_packet() 2356 dest[(*packet_size)++] = 0x01; /* MD5 (TODO: parameterize) */ write_tag_3_packet()
|
/linux-4.1.27/net/ipv6/ |
H A D | tcp_ipv6.c | 663 net_info_ratelimited("MD5 Hash %s for [%pI6c]:%u->[%pI6c]:%u\n", tcp_v6_inbound_md5_hash() 1161 /* Copy over the MD5 key from the original socket */ tcp_v6_syn_recv_sock()
|
/linux-4.1.27/drivers/crypto/caam/ |
H A D | caamhash.c | 515 /* Sizes for MDHA pads (*not* keys): MD5, SHA1, 224, 256, 384, 512 */ ahash_setkey() 1759 /* Sizes for MDHA running digests: MD5, SHA1, 224, 256, 384, 512 */ caam_hash_cra_init()
|
H A D | caamalg.c | 1656 /* Sizes for MDHA pads (*not* keys): MD5, SHA1, 224, 256, 384, 512 */ aead_setkey()
|
/linux-4.1.27/include/net/ |
H A D | tcp.h | 181 #define TCPOPT_MD5SIG 19 /* MD5 Signature (RFC2385) */ 1246 /* MD5 Signature */
|
/linux-4.1.27/arch/arm/mach-omap2/ |
H A D | omap_hwmod_3xxx_data.c | 3524 /* l4_core -> SHAM2 (SHA1/MD5) (similar to omap24xx) */ 3762 * Apparently the SHA/MD5 and AES accelerator IP blocks are
|
/linux-4.1.27/drivers/media/dvb-frontends/ |
H A D | ds3000.c | 42 /* DS3000 FW v1.78 MD5: a32d17910c4f370073f9346e71d34b80 */
|
/linux-4.1.27/arch/blackfin/include/asm/ |
H A D | bfin_can.h | 227 #define MD5 0x0020 /* Enable Mailbox 5 For Receive */ macro
|
/linux-4.1.27/drivers/md/ |
H A D | dm-crypt.c | 566 /* No MD5 padding here */ crypt_iv_lmk_one()
|
/linux-4.1.27/drivers/net/ethernet/brocade/bna/ |
H A D | bfa_ioc.c | 1344 * If patch version are same, check for MD5 Checksum to be same.
|
/linux-4.1.27/arch/cris/arch-v32/drivers/ |
H A D | cryptocop.c | 1042 /* We do not allow using accumulating style units (SHA-1, MD5, checksum) as sources to other units. cryptocop_setup_dma_list()
|
/linux-4.1.27/drivers/scsi/bfa/ |
H A D | bfa_ioc.c | 1545 * If patch versions are same, check for MD5 Checksum to be same.
|