Home
last modified time | relevance | path

Searched refs:hmac (Results 1 – 18 of 18) sorted by relevance

/linux-4.1.27/net/sctp/
DKconfig66 This option sets the default sctp cookie hmac algorithm
70 bool "Enable optional MD5 hmac cookie generation"
72 Enable optional MD5 hmac based SCTP cookie generation
76 bool "Enable optional SHA1 hmac cookie generation"
78 Enable optional SHA1 hmac based SCTP cookie generation
82 bool "Use no hmac alg in SCTP cookie generation"
84 Use no hmac algorithm in SCTP cookie generation
89 bool "Enable optional MD5 hmac cookie generation"
91 Enable optional MD5 hmac based SCTP cookie generation
96 bool "Enable optional SHA1 hmac cookie generation"
[all …]
Dsm_make_chunk.c1266 __u8 *hmac; in sctp_make_auth() local
1284 hmac = skb_put(retval->skb, hmac_desc->hmac_len); in sctp_make_auth()
1285 memset(hmac, 0, hmac_desc->hmac_len); in sctp_make_auth()
1665 if (sctp_sk(ep->base.sk)->hmac) { in sctp_pack_cookie()
1670 desc.tfm = sctp_sk(ep->base.sk)->hmac; in sctp_pack_cookie()
1732 if (!sctp_sk(ep->base.sk)->hmac) in sctp_unpack_cookie()
1737 desc.tfm = sctp_sk(ep->base.sk)->hmac; in sctp_unpack_cookie()
Dauth.c750 digest = auth->auth_hdr.hmac; in sctp_auth_calculate_hmac()
Dsm_statefuns.c3995 struct sctp_hmac *hmac; in sctp_sf_authenticate() local
4024 hmac = sctp_auth_get_hmac(ntohs(auth_hdr->hmac_id)); in sctp_sf_authenticate()
4025 if (sig_len != hmac->hmac_len) in sctp_sf_authenticate()
4035 digest = auth_hdr->hmac; in sctp_sf_authenticate()
Dsocket.c4118 sp->hmac = NULL; in sctp_init_sock()
4180 crypto_free_hash(sp->hmac); in sctp_destruct_sock()
6328 if (!sp->hmac && sp->sctp_hmac_alg) { in sctp_listen_start()
6336 sctp_sk(sk)->hmac = tfm; in sctp_listen_start()
7262 newsp->hmac = NULL; in sctp_sock_migrate()
/linux-4.1.27/net/sunrpc/auth_gss/
Dgss_krb5_crypto.c647 struct xdr_netobj hmac; in gss_krb5_aes_encrypt() local
693 hmac.len = GSS_KRB5_MAX_CKSUM_LEN; in gss_krb5_aes_encrypt()
694 hmac.data = buf->tail[0].iov_base + buf->tail[0].iov_len; in gss_krb5_aes_encrypt()
708 cksumkey, usage, &hmac); in gss_krb5_aes_encrypt()
856 struct crypto_hash *hmac; in krb5_rc4_setup_seq_key() local
865 hmac = crypto_alloc_hash(kctx->gk5e->cksum_name, 0, CRYPTO_ALG_ASYNC); in krb5_rc4_setup_seq_key()
866 if (IS_ERR(hmac)) { in krb5_rc4_setup_seq_key()
868 __func__, PTR_ERR(hmac), kctx->gk5e->cksum_name); in krb5_rc4_setup_seq_key()
869 return PTR_ERR(hmac); in krb5_rc4_setup_seq_key()
872 desc.tfm = hmac; in krb5_rc4_setup_seq_key()
[all …]
Dgss_krb5_mech.c430 struct crypto_hash *hmac; in context_derive_keys_rc4() local
441 hmac = crypto_alloc_hash(ctx->gk5e->cksum_name, 0, CRYPTO_ALG_ASYNC); in context_derive_keys_rc4()
442 if (IS_ERR(hmac)) { in context_derive_keys_rc4()
444 __func__, PTR_ERR(hmac), ctx->gk5e->cksum_name); in context_derive_keys_rc4()
445 err = PTR_ERR(hmac); in context_derive_keys_rc4()
449 err = crypto_hash_setkey(hmac, ctx->Ksess, ctx->gk5e->keylength); in context_derive_keys_rc4()
456 desc.tfm = hmac; in context_derive_keys_rc4()
489 crypto_free_hash(hmac); in context_derive_keys_rc4()
/linux-4.1.27/drivers/crypto/qce/
Dsha.c177 const u32 *state, const u8 *buffer, bool hmac) in qce_import_common() argument
198 if (hmac) in qce_import_common()
215 bool hmac = IS_SHA_HMAC(flags); in qce_ahash_import() local
222 state->buffer, hmac); in qce_ahash_import()
227 state->buf, hmac); in qce_ahash_import()
/linux-4.1.27/drivers/net/ethernet/3com/
Dtyphoon.c1342 u32 hmac; in typhoon_download_firmware() local
1378 hmac = le32_to_cpu(fHdr->hmacDigest[0]); in typhoon_download_firmware()
1379 iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_0); in typhoon_download_firmware()
1380 hmac = le32_to_cpu(fHdr->hmacDigest[1]); in typhoon_download_firmware()
1381 iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_1); in typhoon_download_firmware()
1382 hmac = le32_to_cpu(fHdr->hmacDigest[2]); in typhoon_download_firmware()
1383 iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_2); in typhoon_download_firmware()
1384 hmac = le32_to_cpu(fHdr->hmacDigest[3]); in typhoon_download_firmware()
1385 iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_3); in typhoon_download_firmware()
1386 hmac = le32_to_cpu(fHdr->hmacDigest[4]); in typhoon_download_firmware()
[all …]
/linux-4.1.27/drivers/staging/lustre/lustre/obdclass/
Dcapa.c259 int capa_hmac(__u8 *hmac, struct lustre_capa *capa, __u8 *key) in capa_hmac() argument
285 ll_crypto_hmac(tfm, key, &keylen, &sl, sl.length, hmac); in capa_hmac()
/linux-4.1.27/drivers/staging/lustre/lustre/include/
Dlustre_capa.h190 int capa_hmac(__u8 *hmac, struct lustre_capa *capa, __u8 *key);
/linux-4.1.27/security/keys/encrypted-keys/
Dencrypted.c657 u8 *hmac; in encrypted_key_decrypt() local
678 hmac = epayload->format + epayload->datablob_len; in encrypted_key_decrypt()
679 ret = hex2bin(hmac, hex_encoded_data + (encrypted_datalen * 2), in encrypted_key_decrypt()
/linux-4.1.27/crypto/
DMakefile36 obj-$(CONFIG_CRYPTO_HMAC) += hmac.o
/linux-4.1.27/include/linux/
Dsctp.h700 __u8 hmac[0]; member
/linux-4.1.27/drivers/crypto/
Dn2_core.c1363 struct n2_hmac_alg *hmac, *hmac_tmp; in __n2_unregister_algs() local
1370 list_for_each_entry_safe(hmac, hmac_tmp, &hmac_algs, derived.entry) { in __n2_unregister_algs()
1371 crypto_unregister_ahash(&hmac->derived.alg); in __n2_unregister_algs()
1372 list_del(&hmac->derived.entry); in __n2_unregister_algs()
1373 kfree(hmac); in __n2_unregister_algs()
/linux-4.1.27/Documentation/filesystems/pohmelfs/
Ddesign_notes.txt67 (hmac or digest). It is also possible to use both or neither (default). Crypto configuration
/linux-4.1.27/include/net/sctp/
Dstructs.h170 struct crypto_hash *hmac; member
/linux-4.1.27/Documentation/networking/
Dip-sysctl.txt1768 Select the hmac algorithm used when generating the cookie value sent by