/linux-4.4.14/net/sctp/ |
D | Kconfig | 66 This option sets the default sctp cookie hmac algorithm 70 bool "Enable optional MD5 hmac cookie generation" 72 Enable optional MD5 hmac based SCTP cookie generation 76 bool "Enable optional SHA1 hmac cookie generation" 78 Enable optional SHA1 hmac based SCTP cookie generation 82 bool "Use no hmac alg in SCTP cookie generation" 84 Use no hmac algorithm in SCTP cookie generation 89 bool "Enable optional MD5 hmac cookie generation" 91 Enable optional MD5 hmac based SCTP cookie generation 96 bool "Enable optional SHA1 hmac cookie generation" [all …]
|
D | sm_make_chunk.c | 1266 __u8 *hmac; in sctp_make_auth() local 1284 hmac = skb_put(retval->skb, hmac_desc->hmac_len); in sctp_make_auth() 1285 memset(hmac, 0, hmac_desc->hmac_len); in sctp_make_auth() 1665 if (sctp_sk(ep->base.sk)->hmac) { in sctp_pack_cookie() 1670 desc.tfm = sctp_sk(ep->base.sk)->hmac; in sctp_pack_cookie() 1732 if (!sctp_sk(ep->base.sk)->hmac) in sctp_unpack_cookie() 1737 desc.tfm = sctp_sk(ep->base.sk)->hmac; in sctp_unpack_cookie()
|
D | auth.c | 750 digest = auth->auth_hdr.hmac; in sctp_auth_calculate_hmac()
|
D | sm_statefuns.c | 3995 struct sctp_hmac *hmac; in sctp_sf_authenticate() local 4024 hmac = sctp_auth_get_hmac(ntohs(auth_hdr->hmac_id)); in sctp_sf_authenticate() 4025 if (sig_len != hmac->hmac_len) in sctp_sf_authenticate() 4035 digest = auth_hdr->hmac; in sctp_sf_authenticate()
|
D | socket.c | 4105 sp->hmac = NULL; in sctp_init_sock() 4167 crypto_free_hash(sp->hmac); in sctp_destruct_sock() 6315 if (!sp->hmac && sp->sctp_hmac_alg) { in sctp_listen_start() 6323 sctp_sk(sk)->hmac = tfm; in sctp_listen_start() 7255 newsp->hmac = NULL; in sctp_sock_migrate()
|
/linux-4.4.14/net/sunrpc/auth_gss/ |
D | gss_krb5_crypto.c | 647 struct xdr_netobj hmac; in gss_krb5_aes_encrypt() local 693 hmac.len = GSS_KRB5_MAX_CKSUM_LEN; in gss_krb5_aes_encrypt() 694 hmac.data = buf->tail[0].iov_base + buf->tail[0].iov_len; in gss_krb5_aes_encrypt() 708 cksumkey, usage, &hmac); in gss_krb5_aes_encrypt() 856 struct crypto_hash *hmac; in krb5_rc4_setup_seq_key() local 865 hmac = crypto_alloc_hash(kctx->gk5e->cksum_name, 0, CRYPTO_ALG_ASYNC); in krb5_rc4_setup_seq_key() 866 if (IS_ERR(hmac)) { in krb5_rc4_setup_seq_key() 868 __func__, PTR_ERR(hmac), kctx->gk5e->cksum_name); in krb5_rc4_setup_seq_key() 869 return PTR_ERR(hmac); in krb5_rc4_setup_seq_key() 872 desc.tfm = hmac; in krb5_rc4_setup_seq_key() [all …]
|
D | gss_krb5_mech.c | 430 struct crypto_hash *hmac; in context_derive_keys_rc4() local 441 hmac = crypto_alloc_hash(ctx->gk5e->cksum_name, 0, CRYPTO_ALG_ASYNC); in context_derive_keys_rc4() 442 if (IS_ERR(hmac)) { in context_derive_keys_rc4() 444 __func__, PTR_ERR(hmac), ctx->gk5e->cksum_name); in context_derive_keys_rc4() 445 err = PTR_ERR(hmac); in context_derive_keys_rc4() 449 err = crypto_hash_setkey(hmac, ctx->Ksess, ctx->gk5e->keylength); in context_derive_keys_rc4() 456 desc.tfm = hmac; in context_derive_keys_rc4() 489 crypto_free_hash(hmac); in context_derive_keys_rc4()
|
/linux-4.4.14/drivers/crypto/qce/ |
D | sha.c | 173 const u32 *state, const u8 *buffer, bool hmac) in qce_import_common() argument 194 if (hmac) in qce_import_common() 211 bool hmac = IS_SHA_HMAC(flags); in qce_ahash_import() local 218 state->buffer, hmac); in qce_ahash_import() 223 state->buf, hmac); in qce_ahash_import()
|
/linux-4.4.14/drivers/net/ethernet/3com/ |
D | typhoon.c | 1342 u32 hmac; in typhoon_download_firmware() local 1378 hmac = le32_to_cpu(fHdr->hmacDigest[0]); in typhoon_download_firmware() 1379 iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_0); in typhoon_download_firmware() 1380 hmac = le32_to_cpu(fHdr->hmacDigest[1]); in typhoon_download_firmware() 1381 iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_1); in typhoon_download_firmware() 1382 hmac = le32_to_cpu(fHdr->hmacDigest[2]); in typhoon_download_firmware() 1383 iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_2); in typhoon_download_firmware() 1384 hmac = le32_to_cpu(fHdr->hmacDigest[3]); in typhoon_download_firmware() 1385 iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_3); in typhoon_download_firmware() 1386 hmac = le32_to_cpu(fHdr->hmacDigest[4]); in typhoon_download_firmware() [all …]
|
/linux-4.4.14/drivers/char/tpm/ |
D | tpm2-cmd.c | 402 const u8 *hmac, u16 hmac_len) in tpm2_buf_append_auth() argument 414 if (hmac && hmac_len) in tpm2_buf_append_auth() 415 tpm_buf_append(buf, hmac, hmac_len); in tpm2_buf_append_auth()
|
/linux-4.4.14/security/keys/encrypted-keys/ |
D | encrypted.c | 657 u8 *hmac; in encrypted_key_decrypt() local 678 hmac = epayload->format + epayload->datablob_len; in encrypted_key_decrypt() 679 ret = hex2bin(hmac, hex_encoded_data + (encrypted_datalen * 2), in encrypted_key_decrypt()
|
/linux-4.4.14/include/linux/ |
D | sctp.h | 700 __u8 hmac[0]; member
|
/linux-4.4.14/crypto/ |
D | Makefile | 50 obj-$(CONFIG_CRYPTO_HMAC) += hmac.o
|
/linux-4.4.14/drivers/crypto/ |
D | n2_core.c | 1363 struct n2_hmac_alg *hmac, *hmac_tmp; in __n2_unregister_algs() local 1370 list_for_each_entry_safe(hmac, hmac_tmp, &hmac_algs, derived.entry) { in __n2_unregister_algs() 1371 crypto_unregister_ahash(&hmac->derived.alg); in __n2_unregister_algs() 1372 list_del(&hmac->derived.entry); in __n2_unregister_algs() 1373 kfree(hmac); in __n2_unregister_algs()
|
/linux-4.4.14/Documentation/filesystems/pohmelfs/ |
D | design_notes.txt | 67 (hmac or digest). It is also possible to use both or neither (default). Crypto configuration
|
/linux-4.4.14/include/net/sctp/ |
D | structs.h | 170 struct crypto_hash *hmac; member
|
/linux-4.4.14/Documentation/networking/ |
D | ip-sysctl.txt | 1854 Select the hmac algorithm used when generating the cookie value sent by
|