/linux-4.1.27/arch/powerpc/crypto/ |
H A D | Makefile | 8 obj-$(CONFIG_CRYPTO_MD5_PPC) += md5-ppc.o 14 md5-ppc-y := md5-asm.o md5-glue.o
|
H A D | md5-glue.c | 21 #include <crypto/md5.h> 139 .cra_name = "md5", 140 .cra_driver_name= "md5-ppc", 164 MODULE_ALIAS_CRYPTO("md5"); 165 MODULE_ALIAS_CRYPTO("md5-ppc");
|
/linux-4.1.27/arch/sparc/crypto/ |
H A D | Makefile | 8 obj-$(CONFIG_CRYPTO_MD5_SPARC64) += md5-sparc64.o 19 md5-sparc64-y := md5_asm.o md5_glue.o
|
H A D | md5_glue.c | 4 * and crypto/md5.c which are: 22 #include <crypto/md5.h> 144 .cra_name = "md5", 145 .cra_driver_name= "md5-sparc64", 170 pr_info("Using sparc64 md5 opcode optimized MD5 implementation\n"); md5_sparc64_mod_init() 173 pr_info("sparc64 md5 opcode not available.\n"); md5_sparc64_mod_init() 186 MODULE_DESCRIPTION("MD5 Message Digest Algorithm, sparc64 md5 opcode accelerated"); 188 MODULE_ALIAS_CRYPTO("md5");
|
/linux-4.1.27/drivers/crypto/caam/ |
H A D | compat.h | 34 #include <crypto/md5.h>
|
H A D | caamalg.c | 3396 .name = "authenc(hmac(md5),ecb(cipher_null))", 3397 .driver_name = "authenc-hmac-md5-ecb-cipher_null-caam", 3514 .name = "authenc(hmac(md5),cbc(aes))", 3515 .driver_name = "authenc-hmac-md5-cbc-aes-caam", 3633 .name = "authenc(hmac(md5),cbc(des3_ede))", 3634 .driver_name = "authenc-hmac-md5-cbc-des3_ede-caam", 3751 .name = "authenc(hmac(md5),cbc(des))", 3752 .driver_name = "authenc-hmac-md5-cbc-des-caam", 3869 .name = "authenc(hmac(md5),rfc3686(ctr(aes)))", 3870 .driver_name = "authenc-hmac-md5-rfc3686-ctr-aes-caam",
|
H A D | caamhash.c | 1718 .name = "md5", 1719 .driver_name = "md5-caam", 1720 .hmac_name = "hmac(md5)", 1721 .hmac_driver_name = "hmac-md5-caam",
|
/linux-4.1.27/crypto/ |
H A D | md5.c | 19 #include <crypto/md5.h> 149 .cra_name = "md5", 171 MODULE_ALIAS_CRYPTO("md5");
|
H A D | hash_info.c | 18 [HASH_ALGO_MD5] = "md5",
|
H A D | Makefile | 41 obj-$(CONFIG_CRYPTO_MD5) += md5.o
|
H A D | tcrypt.c | 67 "des", "md5", "des3_ede", "rot13", "sha1", "sha224", "sha256", 1250 ret += tcrypt_test("md5"); do_test() 1468 ret += tcrypt_test("hmac(md5)"); do_test() 1536 ret += tcrypt_test("authenc(hmac(md5),ecb(cipher_null))"); do_test() 1777 test_hash_speed("md5", sec, generic_hash_speed_template); do_test() 1868 test_ahash_speed("md5", sec, generic_hash_speed_template); do_test()
|
H A D | testmgr.c | 1914 .alg = "authenc(hmac(md5),ecb(cipher_null))", 3021 .alg = "hmac(md5)", 3230 .alg = "md5",
|
/linux-4.1.27/arch/mips/cavium-octeon/crypto/ |
H A D | octeon-md5.c | 8 * Based on crypto/md5.c, which is: 22 #include <crypto/md5.h> 182 .cra_name = "md5", 183 .cra_driver_name= "octeon-md5",
|
/linux-4.1.27/include/crypto/ |
H A D | hash_info.h | 17 #include <crypto/md5.h>
|
/linux-4.1.27/fs/cifs/ |
H A D | cifsencrypt.c | 46 server->secmech.md5 = crypto_alloc_shash("md5", 0, 0); cifs_crypto_shash_md5_allocate() 47 if (IS_ERR(server->secmech.md5)) { cifs_crypto_shash_md5_allocate() 48 cifs_dbg(VFS, "could not allocate crypto md5\n"); cifs_crypto_shash_md5_allocate() 49 rc = PTR_ERR(server->secmech.md5); cifs_crypto_shash_md5_allocate() 50 server->secmech.md5 = NULL; cifs_crypto_shash_md5_allocate() 55 crypto_shash_descsize(server->secmech.md5); cifs_crypto_shash_md5_allocate() 58 crypto_free_shash(server->secmech.md5); cifs_crypto_shash_md5_allocate() 59 server->secmech.md5 = NULL; cifs_crypto_shash_md5_allocate() 62 server->secmech.sdescmd5->shash.tfm = server->secmech.md5; cifs_crypto_shash_md5_allocate() 89 cifs_dbg(VFS, "%s: Can't alloc md5 crypto\n", __func__); cifs_calc_signature() 96 cifs_dbg(VFS, "%s: Could not init md5\n", __func__); cifs_calc_signature() 146 cifs_dbg(VFS, "%s: Could not generate md5 hash\n", __func__); cifs_calc_signature() 588 cifs_dbg(VFS, "%s: Could not generate md5 hash\n", __func__); calc_ntlmv2_hash() 641 cifs_dbg(VFS, "%s: Could not generate md5 hash\n", __func__); CalcNTLMv2_response() 655 server->secmech.hmacmd5 = crypto_alloc_shash("hmac(md5)", 0, 0); crypto_hmacmd5_alloc() 780 cifs_dbg(VFS, "%s: Could not generate md5 hash\n", __func__); setup_ntlmv2_rsp() 849 if (server->secmech.md5) { cifs_crypto_shash_release() 850 crypto_free_shash(server->secmech.md5); cifs_crypto_shash_release() 851 server->secmech.md5 = NULL; cifs_crypto_shash_release()
|
H A D | link.c | 61 struct crypto_shash *md5; symlink_hash() local 64 md5 = crypto_alloc_shash("md5", 0, 0); symlink_hash() 65 if (IS_ERR(md5)) { symlink_hash() 66 rc = PTR_ERR(md5); symlink_hash() 67 cifs_dbg(VFS, "%s: Crypto md5 allocation error %d\n", symlink_hash() 71 size = sizeof(struct shash_desc) + crypto_shash_descsize(md5); symlink_hash() 77 sdescmd5->shash.tfm = md5; symlink_hash() 82 cifs_dbg(VFS, "%s: Could not init md5 shash\n", __func__); symlink_hash() 92 cifs_dbg(VFS, "%s: Could not generate md5 hash\n", __func__); symlink_hash() 95 crypto_free_shash(md5); symlink_hash()
|
H A D | cifsglob.h | 117 struct crypto_shash *hmacmd5; /* hmac-md5 hash function */ 118 struct crypto_shash *md5; /* md5 hash function */ member in struct:cifs_secmech
|
H A D | cifspdu.h | 2706 4) md5 must match that of the path data */ 2715 /* md5 of valid subset of path ie path[0] through path[length-1] */ 2716 __u8 md5[32]; member in struct:xsymlink
|
/linux-4.1.27/net/sunrpc/auth_gss/ |
H A D | gss_krb5_crypto.c | 160 struct crypto_hash *md5; make_checksum_hmac_md5() local 177 md5 = crypto_alloc_hash("md5", 0, CRYPTO_ALG_ASYNC); make_checksum_hmac_md5() 178 if (IS_ERR(md5)) make_checksum_hmac_md5() 184 crypto_free_hash(md5); make_checksum_hmac_md5() 188 desc.tfm = md5; make_checksum_hmac_md5() 221 sg_init_one(sg, checksumdata, crypto_hash_digestsize(md5)); make_checksum_hmac_md5() 222 err = crypto_hash_digest(&desc, sg, crypto_hash_digestsize(md5), make_checksum_hmac_md5() 230 crypto_free_hash(md5); make_checksum_hmac_md5()
|
H A D | gss_krb5_mech.c | 63 .cksum_name = "md5", 84 .cksum_name = "hmac(md5)",
|
/linux-4.1.27/lib/ |
H A D | Makefile | 13 sha1.o md5.o irq_regs.o argv_split.o \
|
/linux-4.1.27/drivers/target/iscsi/ |
H A D | iscsi_target_auth.c | 248 tfm = crypto_alloc_hash("md5", 0, CRYPTO_ALG_ASYNC); chap_server_compute_md5() 375 tfm = crypto_alloc_hash("md5", 0, CRYPTO_ALG_ASYNC); chap_server_compute_md5()
|
/linux-4.1.27/net/sctp/ |
H A D | sysctl.c | 339 if (!strncmp(tmp, "md5", 3)) { proc_sctp_do_hmac_alg() 340 net->sctp.sctp_hmac_alg = "md5"; proc_sctp_do_hmac_alg()
|
H A D | protocol.c | 1196 /* Default sctp sockets to use md5 as their hmac alg */ sctp_defaults_init() 1198 net->sctp.sctp_hmac_alg = "md5"; sctp_defaults_init()
|
/linux-4.1.27/net/xfrm/ |
H A D | xfrm_algo.c | 178 .name = "hmac(md5)", 179 .compat = "md5",
|
/linux-4.1.27/net/ipv4/ |
H A D | tcp_output.c | 549 struct tcp_md5sig_key **md5) tcp_syn_options() 556 *md5 = tp->af_specific->md5_lookup(sk, sk); tcp_syn_options() 557 if (*md5) { tcp_syn_options() 562 *md5 = NULL; tcp_syn_options() 577 if (likely(sysctl_tcp_timestamps && !*md5)) { tcp_syn_options() 617 const struct tcp_md5sig_key *md5, tcp_synack_options() 624 if (md5) { tcp_synack_options() 678 struct tcp_md5sig_key **md5) tcp_established_options() 687 *md5 = tp->af_specific->md5_lookup(sk, sk); tcp_established_options() 688 if (unlikely(*md5)) { tcp_established_options() 693 *md5 = NULL; tcp_established_options() 915 struct tcp_md5sig_key *md5; tcp_transmit_skb() local 938 tcp_options_size = tcp_syn_options(sk, skb, &opts, &md5); tcp_transmit_skb() 941 &md5); tcp_transmit_skb() 1002 if (md5) { tcp_transmit_skb() 1005 md5, sk, skb); tcp_transmit_skb() 1429 struct tcp_md5sig_key *md5; tcp_current_mss() local 1439 header_len = tcp_established_options(sk, NULL, &opts, &md5) + tcp_current_mss() 2957 struct tcp_md5sig_key *md5 = NULL; tcp_make_synack() local 2985 md5 = tcp_rsk(req)->af_specific->req_md5_lookup(sk, req_to_sk(req)); tcp_make_synack() 2987 tcp_header_size = tcp_synack_options(sk, req, mss, skb, &opts, md5, tcp_make_synack() 3017 /* Okay, we have all we need - do the md5 hash if needed */ tcp_make_synack() 3018 if (md5) tcp_make_synack() 3020 md5, req_to_sk(req), skb); tcp_make_synack() 547 tcp_syn_options(struct sock *sk, struct sk_buff *skb, struct tcp_out_options *opts, struct tcp_md5sig_key **md5) tcp_syn_options() argument 613 tcp_synack_options(struct sock *sk, struct request_sock *req, unsigned int mss, struct sk_buff *skb, struct tcp_out_options *opts, const struct tcp_md5sig_key *md5, struct tcp_fastopen_cookie *foc) tcp_synack_options() argument 676 tcp_established_options(struct sock *sk, struct sk_buff *skb, struct tcp_out_options *opts, struct tcp_md5sig_key **md5) tcp_established_options() argument
|
H A D | tcp_ipv4.c | 633 * source port, and then find md5 key through listening socket. tcp_v4_send_reset() 635 * Incoming packet is checked with md5 hash with finding key, tcp_v4_send_reset() 636 * no RST generated if md5 hash doesn't match. tcp_v4_send_reset()
|
H A D | tcp_minisocks.c | 312 * md5 key being used (if indeed we are using one) tcp_time_wait()
|
H A D | tcp.c | 2879 hash = crypto_alloc_hash("md5", 0, CRYPTO_ALG_ASYNC); for_each_possible_cpu()
|
/linux-4.1.27/drivers/crypto/ |
H A D | img-hash.c | 23 #include <crypto/md5.h> 718 .cra_name = "md5", 719 .cra_driver_name = "img-md5",
|
H A D | omap-sham.c | 14 * Some ideas are from old omap-sha1-md5.c driver. 1290 return omap_sham_cra_init_alg(tfm, "md5"); omap_sham_cra_md5_init() 1348 .cra_name = "md5", 1349 .cra_driver_name = "omap-md5", 1397 .cra_name = "hmac(md5)", 1398 .cra_driver_name = "omap-hmac-md5",
|
H A D | picoxcell_crypto.c | 23 #include <crypto/md5.h> 1525 .cra_name = "authenc(hmac(md5),cbc(aes))", 1526 .cra_driver_name = "authenc-hmac-md5-cbc-aes-picoxcell", 1613 .cra_name = "authenc(hmac(md5),cbc(des3_ede))", 1614 .cra_driver_name = "authenc-hmac-md5-cbc-3des-picoxcell",
|
H A D | talitos.c | 48 #include <crypto/md5.h> 2117 .cra_name = "authenc(hmac(md5),cbc(aes))", 2118 .cra_driver_name = "authenc-hmac-md5-cbc-aes-talitos", 2136 .cra_name = "authenc(hmac(md5),cbc(des3_ede))", 2137 .cra_driver_name = "authenc-hmac-md5-cbc-3des-talitos", 2195 .cra_name = "md5", 2196 .cra_driver_name = "md5-talitos", 2285 .cra_name = "hmac(md5)", 2286 .cra_driver_name = "hmac-md5-talitos",
|
H A D | ixp4xx_crypto.c | 1323 .cra_name = "authenc(hmac(md5),cbc(des))", 1336 .cra_name = "authenc(hmac(md5),cbc(des3_ede))", 1375 .cra_name = "authenc(hmac(md5),cbc(aes))",
|
H A D | n2_core.c | 16 #include <crypto/md5.h> 295 struct md5_state md5; member in union:n2_hash_req_ctx::__anon3811 1319 { .name = "md5",
|
/linux-4.1.27/drivers/net/wireless/p54/ |
H A D | p54.h | 84 u8 md5[16]; member in struct:bootrec_end
|
/linux-4.1.27/drivers/staging/lustre/include/linux/libcfs/ |
H A D | libcfs_crypto.h | 57 [CFS_HASH_ALG_MD5] = { "md5", 0, 16 },
|
/linux-4.1.27/drivers/net/ethernet/brocade/bna/ |
H A D | bfa_defs.h | 229 u8 md5_chksum[BFA_MFG_CHKSUM_SIZE]; /* md5 checksum */
|
/linux-4.1.27/security/integrity/ima/ |
H A D | ima.h | 81 u8 digest[TPM_DIGEST_SIZE]; /* sha1 or md5 measurement hash */
|
H A D | ima_appraise.c | 234 /* xattr length may be longer. md5 hash in previous ima_appraise_measurement()
|
H A D | ima_main.c | 53 else if (strncmp(str, "md5", 3) == 0) hash_setup()
|
H A D | ima_crypto.c | 13 * Calculates md5/sha1 file hash, template hash, boot-aggreate hash
|
/linux-4.1.27/include/linux/sunrpc/ |
H A D | gss_krb5.h | 167 #define CKSUMTYPE_HMAC_MD5_ARCFOUR -138 /* Microsoft md5 hmac cksumtype */
|
/linux-4.1.27/fs/nfsd/ |
H A D | nfs4recover.c | 90 md5_to_hex(char *out, char *md5) md5_to_hex() argument 95 unsigned char c = md5[i]; md5_to_hex() 114 desc.tfm = crypto_alloc_hash("md5", 0, CRYPTO_ALG_ASYNC); nfs4_make_rec_clidname()
|
H A D | state.h | 264 #define HEXDIR_LEN 33 /* hex version of 16 byte md5 of cl_name plus '\0' */
|
/linux-4.1.27/net/ipv6/ |
H A D | tcp_ipv6.c | 860 * source port, and then find md5 key through listening socket. tcp_v6_send_reset() 862 * Incoming packet is checked with md5 hash with finding key, tcp_v6_send_reset() 863 * no RST generated if md5 hash doesn't match. tcp_v6_send_reset()
|
/linux-4.1.27/arch/sparc/kernel/ |
H A D | setup_64.c | 387 "aes", "des", "kasumi", "camellia", "md5", "sha1", "sha256",
|
/linux-4.1.27/fs/ecryptfs/ |
H A D | ecryptfs_kernel.h | 138 #define ECRYPTFS_DEFAULT_HASH "md5"
|
H A D | crypto.c | 78 * ecryptfs_calculate_md5 - calculates the md5 of @src 81 * @src: Data to be md5'd
|
/linux-4.1.27/drivers/md/ |
H A D | dm-crypt.c | 29 #include <crypto/md5.h> 484 lmk->hash_tfm = crypto_alloc_shash("md5", 0, 0); crypt_iv_lmk_ctr()
|
/linux-4.1.27/include/net/ |
H A D | tcp.h | 1623 const struct tcp_md5sig_key *md5, 1638 const struct tcp_md5sig_key *md5,
|
/linux-4.1.27/drivers/scsi/bfa/ |
H A D | bfa_defs.h | 622 u8 md5_chksum[BFA_MFG_CHKSUM_SIZE]; /*!< md5 checksum */
|