| /kernel/linux/linux-5.10/fs/ubifs/ |
| D | auth.c | 40 * ubifs_hash_calc_hmac - calculate a HMAC from a hash 42 * @hash: the node to calculate a HMAC for 43 * @hmac: the returned HMAC 48 u8 *hmac) in ubifs_hash_calc_hmac() argument 50 return crypto_shash_tfm_digest(c->hmac_tfm, hash, c->hash_len, hmac); in ubifs_hash_calc_hmac() 60 * It creates a HMAC from the given input hash and writes it to the node. 82 err = ubifs_hash_calc_hmac(c, hash, auth->hmac); in ubifs_prepare_auth_node() 277 snprintf(hmac_name, CRYPTO_MAX_ALG_NAME, "hmac(%s)", in ubifs_init_authentication() 328 ubifs_err(c, "hmac %s is bigger than maximum allowed hmac size (%d > %d)", in ubifs_init_authentication() 378 * ubifs_node_calc_hmac - calculate the HMAC of a UBIFS node [all …]
|
| /kernel/linux/linux-5.10/net/sctp/ |
| D | Kconfig | 52 prompt "Default SCTP cookie HMAC encoding" 55 This option sets the default sctp cookie hmac algorithm 59 bool "Enable optional MD5 hmac cookie generation" 61 Enable optional MD5 hmac based SCTP cookie generation 65 bool "Enable optional SHA1 hmac cookie generation" 67 Enable optional SHA1 hmac based SCTP cookie generation 71 bool "Use no hmac alg in SCTP cookie generation" 73 Use no hmac algorithm in SCTP cookie generation 78 bool "Enable optional MD5 hmac cookie generation" 80 Enable optional MD5 hmac based SCTP cookie generation [all …]
|
| /kernel/linux/linux-4.19/net/sctp/ |
| D | Kconfig | 51 prompt "Default SCTP cookie HMAC encoding" 54 This option sets the default sctp cookie hmac algorithm 58 bool "Enable optional MD5 hmac cookie generation" 60 Enable optional MD5 hmac based SCTP cookie generation 64 bool "Enable optional SHA1 hmac cookie generation" 66 Enable optional SHA1 hmac based SCTP cookie generation 70 bool "Use no hmac alg in SCTP cookie generation" 72 Use no hmac algorithm in SCTP cookie generation 77 bool "Enable optional MD5 hmac cookie generation" 79 Enable optional MD5 hmac based SCTP cookie generation [all …]
|
| /kernel/linux/linux-5.10/Documentation/ABI/testing/ |
| D | evm | 7 HMAC-sha1 value across the extended attributes, storing the 11 an HMAC-sha1 generated locally with a 23 0 Enable HMAC validation and creation 26 runtime. Not supported if HMAC validation and 35 will enable HMAC validation and creation 41 will enable HMAC and digital signature validation and 42 HMAC creation and disable all further modification of policy. 65 Note that once an HMAC key has been loaded, it will no longer 67 HMAC key has been loaded will clear the corresponding flag. 74 Loading an HMAC key is the only way to disable metadata
|
| /kernel/linux/linux-4.19/Documentation/networking/ |
| D | seg6-sysctl.txt | 12 Define HMAC policy for ingress SR-enabled packets on this interface. 14 -1 - Ignore HMAC field 15 0 - Accept SR packets without HMAC, validate SR packets with HMAC 16 1 - Drop SR packets without HMAC, validate SR packets with HMAC
|
| /kernel/linux/linux-5.10/Documentation/networking/ |
| D | seg6-sysctl.rst | 20 Define HMAC policy for ingress SR-enabled packets on this interface. 22 * -1 - Ignore HMAC field 23 * 0 - Accept SR packets without HMAC, validate SR packets with HMAC 24 * 1 - Drop SR packets without HMAC, validate SR packets with HMAC
|
| /kernel/linux/linux-4.19/drivers/crypto/caam/ |
| D | caamalg.c | 2025 .cra_name = "authenc(hmac(md5)," 2027 .cra_driver_name = "authenc-hmac-md5-" 2046 .cra_name = "authenc(hmac(sha1)," 2048 .cra_driver_name = "authenc-hmac-sha1-" 2067 .cra_name = "authenc(hmac(sha224)," 2069 .cra_driver_name = "authenc-hmac-sha224-" 2088 .cra_name = "authenc(hmac(sha256)," 2090 .cra_driver_name = "authenc-hmac-sha256-" 2109 .cra_name = "authenc(hmac(sha384)," 2111 .cra_driver_name = "authenc-hmac-sha384-" [all …]
|
| D | caamalg_qi.c | 1723 .cra_name = "authenc(hmac(md5),cbc(aes))", 1724 .cra_driver_name = "authenc-hmac-md5-" 1744 .cra_name = "echainiv(authenc(hmac(md5)," 1746 .cra_driver_name = "echainiv-authenc-hmac-md5-" 1767 .cra_name = "authenc(hmac(sha1),cbc(aes))", 1768 .cra_driver_name = "authenc-hmac-sha1-" 1788 .cra_name = "echainiv(authenc(hmac(sha1)," 1791 "hmac-sha1-cbc-aes-caam-qi", 1811 .cra_name = "authenc(hmac(sha224),cbc(aes))", 1812 .cra_driver_name = "authenc-hmac-sha224-" [all …]
|
| /kernel/linux/linux-4.19/Documentation/ABI/testing/ |
| D | evm | 7 HMAC-sha1 value across the extended attributes, storing the 11 an HMAC-sha1 generated locally with a 21 0 Enable HMAC validation and creation 24 runtime. Not supported if HMAC validation and 32 will enable HMAC validation and creation 36 will enable HMAC and digital signature validation and 37 HMAC creation and disable all further modification of policy.
|
| /kernel/linux/linux-5.10/drivers/crypto/caam/ |
| D | caamalg.c | 2077 .cra_name = "authenc(hmac(md5)," 2079 .cra_driver_name = "authenc-hmac-md5-" 2098 .cra_name = "authenc(hmac(sha1)," 2100 .cra_driver_name = "authenc-hmac-sha1-" 2119 .cra_name = "authenc(hmac(sha224)," 2121 .cra_driver_name = "authenc-hmac-sha224-" 2140 .cra_name = "authenc(hmac(sha256)," 2142 .cra_driver_name = "authenc-hmac-sha256-" 2161 .cra_name = "authenc(hmac(sha384)," 2163 .cra_driver_name = "authenc-hmac-sha384-" [all …]
|
| D | caamalg_qi.c | 1637 .cra_name = "authenc(hmac(md5),cbc(aes))", 1638 .cra_driver_name = "authenc-hmac-md5-" 1658 .cra_name = "echainiv(authenc(hmac(md5)," 1660 .cra_driver_name = "echainiv-authenc-hmac-md5-" 1681 .cra_name = "authenc(hmac(sha1),cbc(aes))", 1682 .cra_driver_name = "authenc-hmac-sha1-" 1702 .cra_name = "echainiv(authenc(hmac(sha1)," 1705 "hmac-sha1-cbc-aes-caam-qi", 1725 .cra_name = "authenc(hmac(sha224),cbc(aes))", 1726 .cra_driver_name = "authenc-hmac-sha224-" [all …]
|
| D | caamalg_qi2.c | 1854 .cra_name = "authenc(hmac(md5),cbc(aes))", 1855 .cra_driver_name = "authenc-hmac-md5-" 1875 .cra_name = "echainiv(authenc(hmac(md5)," 1877 .cra_driver_name = "echainiv-authenc-hmac-md5-" 1898 .cra_name = "authenc(hmac(sha1),cbc(aes))", 1899 .cra_driver_name = "authenc-hmac-sha1-" 1919 .cra_name = "echainiv(authenc(hmac(sha1)," 1922 "hmac-sha1-cbc-aes-caam-qi2", 1942 .cra_name = "authenc(hmac(sha224),cbc(aes))", 1943 .cra_driver_name = "authenc-hmac-sha224-" [all …]
|
| /kernel/linux/linux-5.10/security/integrity/evm/ |
| D | Kconfig | 21 Include filesystem UUID for HMAC calculation. 26 WARNING: changing the HMAC calculation method or adding 35 Include additional SMACK xattrs for HMAC calculation. 39 in the HMAC calculation, enabling this option includes newly defined 43 WARNING: changing the HMAC calculation method or adding 52 Allow userland to provide additional xattrs for HMAC calculation.
|
| D | evm_main.c | 85 pr_info("HMAC attrs: 0x%x\n", evm_hmac_attrs); in evm_init_config() 117 * evm_verify_hmac - calculate and compare the HMAC with the EVM xattr 119 * Compute the HMAC on the dentry's protected set of extended attributes 124 * HMAC.) 264 * Calculate the HMAC for the given dentry and verify it against the stored 266 * previously retrieved to calculate the HMAC. 374 * access to the EVM encrypted key needed to calculate the HMAC, prevent 375 * userspace from writing HMAC value. Writing 'security.evm' requires 384 * there's no HMAC key loaded in evm_inode_setxattr() 411 * there's no HMAC key loaded in evm_inode_removexattr() [all …]
|
| D | evm_crypto.c | 10 * Using root's kernel master key (kmk), calculate the HMAC 36 static const char evm_hmac[] = "hmac(sha1)"; 39 * evm_set_key() - set EVM HMAC key from the kernel 43 * This function allows setting the EVM HMAC key from the kernel 81 pr_err_once("HMAC key is not set\n"); in init_desc() 162 /* The hmac uid and gid must be encoded in the initial user in hmac_add_misc() 181 * Calculate the HMAC value across the set of protected security xattrs. 184 * the hmac using the requested xattr value. Don't alloc/free memory for 299 * Calculate the hmac and update security.evm xattr 352 * Get the key from the TPM for the SHA1-HMAC
|
| /kernel/linux/linux-4.19/security/integrity/evm/ |
| D | Kconfig | 20 Include filesystem UUID for HMAC calculation. 25 WARNING: changing the HMAC calculation method or adding 34 Include additional SMACK xattrs for HMAC calculation. 38 in the HMAC calculation, enabling this option includes newly defined 42 WARNING: changing the HMAC calculation method or adding 51 Allow userland to provide additional xattrs for HMAC calculation.
|
| D | evm_crypto.c | 13 * Using root's kernel master key (kmk), calculate the HMAC 41 static char * const evm_hmac = "hmac(sha1)"; 44 * evm_set_key() - set EVM HMAC key from the kernel 48 * This function allows setting the EVM HMAC key from the kernel 86 pr_err_once("HMAC key is not set\n"); in init_desc() 166 /* The hmac uid and gid must be encoded in the initial user in hmac_add_misc() 186 * Calculate the HMAC value across the set of protected security xattrs. 189 * the hmac using the requested xattr value. Don't alloc/free memory for 304 * Calculate the hmac and update security.evm xattr 357 * Get the key from the TPM for the SHA1-HMAC
|
| D | evm_main.c | 87 pr_info("HMAC attrs: 0x%x\n", evm_hmac_attrs); in evm_init_config() 119 * evm_verify_hmac - calculate and compare the HMAC with the EVM xattr 121 * Compute the HMAC on the dentry's protected set of extended attributes 126 * HMAC.) 266 * Calculate the HMAC for the given dentry and verify it against the stored 268 * previously retrieved to calculate the HMAC. 376 * access to the EVM encrypted key needed to calculate the HMAC, prevent 377 * userspace from writing HMAC value. Writing 'security.evm' requires 386 * there's no HMAC key loaded in evm_inode_setxattr() 413 * there's no HMAC key loaded in evm_inode_removexattr() [all …]
|
| /kernel/linux/linux-4.19/net/sunrpc/auth_gss/ |
| D | gss_krb5_crypto.c | 735 struct xdr_netobj hmac; in gss_krb5_aes_encrypt() local 780 /* Do the HMAC */ in gss_krb5_aes_encrypt() 781 hmac.len = GSS_KRB5_MAX_CKSUM_LEN; in gss_krb5_aes_encrypt() 782 hmac.data = buf->tail[0].iov_base + buf->tail[0].iov_len; in gss_krb5_aes_encrypt() 789 * the hmac. in gss_krb5_aes_encrypt() 796 cksumkey, usage, &hmac); in gss_krb5_aes_encrypt() 841 /* Now update buf to account for HMAC */ in gss_krb5_aes_encrypt() 917 /* Calculate our hmac over the plaintext data */ in gss_krb5_aes_decrypt() 926 /* Get the packet's hmac value */ in gss_krb5_aes_decrypt() 952 struct crypto_shash *hmac; in krb5_rc4_setup_seq_key() local [all …]
|
| /kernel/linux/linux-5.10/drivers/crypto/inside-secure/ |
| D | safexcel_hash.c | 9 #include <crypto/hmac.h> 40 bool hmac; member 159 /* Hash continuation or HMAC, setup (inner) digest from state */ in safexcel_context_control() 163 /* Compute digest count for hash/HMAC finish operations */ in safexcel_context_control() 181 /* Special case: zero length HMAC */ in safexcel_context_control() 183 /* PE HW < 4.4 cannot do HMAC continue, fake using hash */ in safexcel_context_control() 190 /* For zero-len HMAC, don't finalize, already padded! */ in safexcel_context_control() 200 /* Clear zero-length HMAC flag for next operation! */ in safexcel_context_control() 202 } else { /* HMAC */ in safexcel_context_control() 203 /* Need outer digest for HMAC finalization */ in safexcel_context_control() [all …]
|
| /kernel/linux/linux-5.10/drivers/crypto/ |
| D | atmel-sha.c | 1193 /* copy ready hash (+ finalize hmac) */ in atmel_sha_final() 1608 /* hmac functions */ 1690 struct atmel_sha_hmac_ctx *hmac = crypto_ahash_ctx(tfm); in atmel_sha_hmac_setup() local 1695 hmac->resume = resume; in atmel_sha_hmac_setup() 1727 if (likely(!atmel_sha_hmac_key_get(&hmac->hkey, &key, &keylen))) in atmel_sha_hmac_setup() 1735 memcpy((u8 *)hmac->ipad, key, keylen); in atmel_sha_hmac_setup() 1736 memset((u8 *)hmac->ipad + keylen, 0, bs - keylen); in atmel_sha_hmac_setup() 1751 struct atmel_sha_hmac_ctx *hmac = crypto_ahash_ctx(tfm); in atmel_sha_hmac_prehash_key_done() local 1759 hmac->ipad[i] = atmel_sha_read(dd, SHA_REG_DIGEST(i)); in atmel_sha_hmac_prehash_key_done() 1760 memset((u8 *)hmac->ipad + ds, 0, bs - ds); in atmel_sha_hmac_prehash_key_done() [all …]
|
| /kernel/linux/linux-5.10/security/keys/trusted-keys/ |
| D | trusted_tpm2.c | 31 * @hmac: the session HMAC or password, may be NULL if not used 32 * @hmac_len: the session HMAC or password length, maybe 0 if not used 37 const u8 *hmac, u16 hmac_len) in tpm2_buf_append_auth() argument 49 if (hmac && hmac_len) in tpm2_buf_append_auth() 50 tpm_buf_append(buf, hmac, hmac_len); in tpm2_buf_append_auth() 96 options->keyauth /* hmac */, in tpm2_seal_trusted() 213 options->keyauth /* hmac */, in tpm2_load_cmd() 269 options->blobauth /* hmac */, in tpm2_unseal_cmd()
|
| /kernel/linux/linux-4.19/drivers/crypto/ |
| D | atmel-sha.c | 1193 /* copy ready hash (+ finalize hmac) */ in atmel_sha_final() 1677 /* hmac functions */ 1759 struct atmel_sha_hmac_ctx *hmac = crypto_ahash_ctx(tfm); in atmel_sha_hmac_setup() local 1764 hmac->resume = resume; in atmel_sha_hmac_setup() 1796 if (likely(!atmel_sha_hmac_key_get(&hmac->hkey, &key, &keylen))) in atmel_sha_hmac_setup() 1804 memcpy((u8 *)hmac->ipad, key, keylen); in atmel_sha_hmac_setup() 1805 memset((u8 *)hmac->ipad + keylen, 0, bs - keylen); in atmel_sha_hmac_setup() 1820 struct atmel_sha_hmac_ctx *hmac = crypto_ahash_ctx(tfm); in atmel_sha_hmac_prehash_key_done() local 1828 hmac->ipad[i] = atmel_sha_read(dd, SHA_REG_DIGEST(i)); in atmel_sha_hmac_prehash_key_done() 1829 memset((u8 *)hmac->ipad + ds, 0, bs - ds); in atmel_sha_hmac_prehash_key_done() [all …]
|
| /kernel/linux/linux-4.19/net/ipv6/ |
| D | seg6_hmac.c | 2 * SR-IPv6 implementation -- HMAC functions 83 .name = "hmac(sha1)", 87 .name = "hmac(sha256)", 186 /* Let's build the HMAC text on the ring buffer. The text is composed in seg6_hmac_compute() 192 * 4. HMAC Key ID (32 bits) in seg6_hmac_compute() 210 /* HMAC Key ID */ in seg6_hmac_compute() 238 /* checks if an incoming SR-enabled packet's HMAC status matches 279 if (memcmp(hmac_output, tlv->hmac, SEG6_HMAC_FIELD_LEN) != 0) in seg6_hmac_validate_skb() 349 memset(tlv->hmac, 0, SEG6_HMAC_FIELD_LEN); in seg6_push_hmac() 350 err = seg6_hmac_compute(hinfo, srh, saddr, tlv->hmac); in seg6_push_hmac()
|
| /kernel/linux/linux-5.10/net/ipv6/ |
| D | seg6_hmac.c | 3 * SR-IPv6 implementation -- HMAC functions 77 .name = "hmac(sha1)", 81 .name = "hmac(sha256)", 180 /* Let's build the HMAC text on the ring buffer. The text is composed in seg6_hmac_compute() 186 * 4. HMAC Key ID (32 bits) in seg6_hmac_compute() 204 /* HMAC Key ID */ in seg6_hmac_compute() 232 /* checks if an incoming SR-enabled packet's HMAC status matches 273 if (memcmp(hmac_output, tlv->hmac, SEG6_HMAC_FIELD_LEN) != 0) in seg6_hmac_validate_skb() 343 memset(tlv->hmac, 0, SEG6_HMAC_FIELD_LEN); in seg6_push_hmac() 344 err = seg6_hmac_compute(hinfo, srh, saddr, tlv->hmac); in seg6_push_hmac()
|