Home
last modified time | relevance | path

Searched refs:hmac (Results 1 – 17 of 17) sorted by relevance

/linux-4.4.14/net/sctp/
DKconfig66 This option sets the default sctp cookie hmac algorithm
70 bool "Enable optional MD5 hmac cookie generation"
72 Enable optional MD5 hmac based SCTP cookie generation
76 bool "Enable optional SHA1 hmac cookie generation"
78 Enable optional SHA1 hmac based SCTP cookie generation
82 bool "Use no hmac alg in SCTP cookie generation"
84 Use no hmac algorithm in SCTP cookie generation
89 bool "Enable optional MD5 hmac cookie generation"
91 Enable optional MD5 hmac based SCTP cookie generation
96 bool "Enable optional SHA1 hmac cookie generation"
[all …]
Dsm_make_chunk.c1266 __u8 *hmac; in sctp_make_auth() local
1284 hmac = skb_put(retval->skb, hmac_desc->hmac_len); in sctp_make_auth()
1285 memset(hmac, 0, hmac_desc->hmac_len); in sctp_make_auth()
1665 if (sctp_sk(ep->base.sk)->hmac) { in sctp_pack_cookie()
1670 desc.tfm = sctp_sk(ep->base.sk)->hmac; in sctp_pack_cookie()
1732 if (!sctp_sk(ep->base.sk)->hmac) in sctp_unpack_cookie()
1737 desc.tfm = sctp_sk(ep->base.sk)->hmac; in sctp_unpack_cookie()
Dauth.c750 digest = auth->auth_hdr.hmac; in sctp_auth_calculate_hmac()
Dsm_statefuns.c3995 struct sctp_hmac *hmac; in sctp_sf_authenticate() local
4024 hmac = sctp_auth_get_hmac(ntohs(auth_hdr->hmac_id)); in sctp_sf_authenticate()
4025 if (sig_len != hmac->hmac_len) in sctp_sf_authenticate()
4035 digest = auth_hdr->hmac; in sctp_sf_authenticate()
Dsocket.c4105 sp->hmac = NULL; in sctp_init_sock()
4167 crypto_free_hash(sp->hmac); in sctp_destruct_sock()
6315 if (!sp->hmac && sp->sctp_hmac_alg) { in sctp_listen_start()
6323 sctp_sk(sk)->hmac = tfm; in sctp_listen_start()
7255 newsp->hmac = NULL; in sctp_sock_migrate()
/linux-4.4.14/net/sunrpc/auth_gss/
Dgss_krb5_crypto.c647 struct xdr_netobj hmac; in gss_krb5_aes_encrypt() local
693 hmac.len = GSS_KRB5_MAX_CKSUM_LEN; in gss_krb5_aes_encrypt()
694 hmac.data = buf->tail[0].iov_base + buf->tail[0].iov_len; in gss_krb5_aes_encrypt()
708 cksumkey, usage, &hmac); in gss_krb5_aes_encrypt()
856 struct crypto_hash *hmac; in krb5_rc4_setup_seq_key() local
865 hmac = crypto_alloc_hash(kctx->gk5e->cksum_name, 0, CRYPTO_ALG_ASYNC); in krb5_rc4_setup_seq_key()
866 if (IS_ERR(hmac)) { in krb5_rc4_setup_seq_key()
868 __func__, PTR_ERR(hmac), kctx->gk5e->cksum_name); in krb5_rc4_setup_seq_key()
869 return PTR_ERR(hmac); in krb5_rc4_setup_seq_key()
872 desc.tfm = hmac; in krb5_rc4_setup_seq_key()
[all …]
Dgss_krb5_mech.c430 struct crypto_hash *hmac; in context_derive_keys_rc4() local
441 hmac = crypto_alloc_hash(ctx->gk5e->cksum_name, 0, CRYPTO_ALG_ASYNC); in context_derive_keys_rc4()
442 if (IS_ERR(hmac)) { in context_derive_keys_rc4()
444 __func__, PTR_ERR(hmac), ctx->gk5e->cksum_name); in context_derive_keys_rc4()
445 err = PTR_ERR(hmac); in context_derive_keys_rc4()
449 err = crypto_hash_setkey(hmac, ctx->Ksess, ctx->gk5e->keylength); in context_derive_keys_rc4()
456 desc.tfm = hmac; in context_derive_keys_rc4()
489 crypto_free_hash(hmac); in context_derive_keys_rc4()
/linux-4.4.14/drivers/crypto/qce/
Dsha.c173 const u32 *state, const u8 *buffer, bool hmac) in qce_import_common() argument
194 if (hmac) in qce_import_common()
211 bool hmac = IS_SHA_HMAC(flags); in qce_ahash_import() local
218 state->buffer, hmac); in qce_ahash_import()
223 state->buf, hmac); in qce_ahash_import()
/linux-4.4.14/drivers/net/ethernet/3com/
Dtyphoon.c1342 u32 hmac; in typhoon_download_firmware() local
1378 hmac = le32_to_cpu(fHdr->hmacDigest[0]); in typhoon_download_firmware()
1379 iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_0); in typhoon_download_firmware()
1380 hmac = le32_to_cpu(fHdr->hmacDigest[1]); in typhoon_download_firmware()
1381 iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_1); in typhoon_download_firmware()
1382 hmac = le32_to_cpu(fHdr->hmacDigest[2]); in typhoon_download_firmware()
1383 iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_2); in typhoon_download_firmware()
1384 hmac = le32_to_cpu(fHdr->hmacDigest[3]); in typhoon_download_firmware()
1385 iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_3); in typhoon_download_firmware()
1386 hmac = le32_to_cpu(fHdr->hmacDigest[4]); in typhoon_download_firmware()
[all …]
/linux-4.4.14/drivers/char/tpm/
Dtpm2-cmd.c402 const u8 *hmac, u16 hmac_len) in tpm2_buf_append_auth() argument
414 if (hmac && hmac_len) in tpm2_buf_append_auth()
415 tpm_buf_append(buf, hmac, hmac_len); in tpm2_buf_append_auth()
/linux-4.4.14/security/keys/encrypted-keys/
Dencrypted.c657 u8 *hmac; in encrypted_key_decrypt() local
678 hmac = epayload->format + epayload->datablob_len; in encrypted_key_decrypt()
679 ret = hex2bin(hmac, hex_encoded_data + (encrypted_datalen * 2), in encrypted_key_decrypt()
/linux-4.4.14/include/linux/
Dsctp.h700 __u8 hmac[0]; member
/linux-4.4.14/crypto/
DMakefile50 obj-$(CONFIG_CRYPTO_HMAC) += hmac.o
/linux-4.4.14/drivers/crypto/
Dn2_core.c1363 struct n2_hmac_alg *hmac, *hmac_tmp; in __n2_unregister_algs() local
1370 list_for_each_entry_safe(hmac, hmac_tmp, &hmac_algs, derived.entry) { in __n2_unregister_algs()
1371 crypto_unregister_ahash(&hmac->derived.alg); in __n2_unregister_algs()
1372 list_del(&hmac->derived.entry); in __n2_unregister_algs()
1373 kfree(hmac); in __n2_unregister_algs()
/linux-4.4.14/Documentation/filesystems/pohmelfs/
Ddesign_notes.txt67 (hmac or digest). It is also possible to use both or neither (default). Crypto configuration
/linux-4.4.14/include/net/sctp/
Dstructs.h170 struct crypto_hash *hmac; member
/linux-4.4.14/Documentation/networking/
Dip-sysctl.txt1854 Select the hmac algorithm used when generating the cookie value sent by