Home
last modified time | relevance | path

Searched refs:hmac (Results 1 – 25 of 50) sorted by relevance

12

/kernel/linux/linux-5.10/net/sctp/
DKconfig55 This option sets the default sctp cookie hmac algorithm
59 bool "Enable optional MD5 hmac cookie generation"
61 Enable optional MD5 hmac based SCTP cookie generation
65 bool "Enable optional SHA1 hmac cookie generation"
67 Enable optional SHA1 hmac based SCTP cookie generation
71 bool "Use no hmac alg in SCTP cookie generation"
73 Use no hmac algorithm in SCTP cookie generation
78 bool "Enable optional MD5 hmac cookie generation"
80 Enable optional MD5 hmac based SCTP cookie generation
85 bool "Enable optional SHA1 hmac cookie generation"
[all …]
/kernel/linux/linux-5.10/fs/ubifs/
Dauth.c48 u8 *hmac) in ubifs_hash_calc_hmac() argument
50 return crypto_shash_tfm_digest(c->hmac_tfm, hash, c->hash_len, hmac); in ubifs_hash_calc_hmac()
82 err = ubifs_hash_calc_hmac(c, hash, auth->hmac); in ubifs_prepare_auth_node()
390 int len, int ofs_hmac, void *hmac) in ubifs_node_calc_hmac() argument
418 return crypto_shash_final(shash, hmac); in ubifs_node_calc_hmac()
453 u8 *hmac; in __ubifs_node_verify_hmac() local
456 hmac = kmalloc(hmac_len, GFP_NOFS); in __ubifs_node_verify_hmac()
457 if (!hmac) in __ubifs_node_verify_hmac()
460 err = ubifs_node_calc_hmac(c, node, len, ofs_hmac, hmac); in __ubifs_node_verify_hmac()
462 kfree(hmac); in __ubifs_node_verify_hmac()
[all …]
Dmaster.c28 int hmac_offs = offsetof(struct ubifs_mst_node, hmac); in ubifs_compare_master_node()
135 if (ubifs_hmac_zero(c, c->mst_node->hmac)) { in scan_for_master()
143 offsetof(struct ubifs_mst_node, hmac)); in scan_for_master()
458 offsetof(struct ubifs_mst_node, hmac)); in ubifs_write_master()
470 offsetof(struct ubifs_mst_node, hmac)); in ubifs_write_master()
Dubifs-media.h678 __u8 hmac[UBIFS_MAX_HMAC_LEN]; member
754 __u8 hmac[UBIFS_MAX_HMAC_LEN]; member
781 __u8 hmac[]; member
Dsb.c320 offsetof(struct ubifs_sb_node, hmac)); in create_default_filesystem()
340 offsetof(struct ubifs_mst_node, hmac)); in create_default_filesystem()
345 0, offsetof(struct ubifs_mst_node, hmac)); in create_default_filesystem()
584 if (ubifs_hmac_zero(c, sup->hmac)) { in authenticate_sb_node()
596 hmac)); in authenticate_sb_node()
618 offsetof(struct ubifs_sb_node, hmac), 1); in ubifs_write_sb_node()
/kernel/linux/linux-5.10/net/mptcp/
Dcrypto_test.c35 char hmac[32], hmac_hex[65]; in mptcp_crypto_test_basic() local
51 mptcp_crypto_hmac_sha(key1, key2, msg, 8, hmac); in mptcp_crypto_test_basic()
53 sprintf(&hmac_hex[j << 1], "%02x", hmac[j] & 0xff); in mptcp_crypto_test_basic()
Doptions.c127 memcpy(mp_opt->hmac, ptr, MPTCPOPT_HMAC_LEN); in mptcp_parse_option()
445 memcpy(opts->hmac, subflow->hmac, MPTCPOPT_HMAC_LEN); in mptcp_established_options_mp()
547 u8 hmac[SHA256_DIGEST_SIZE]; in add_addr_generate_hmac() local
555 mptcp_crypto_hmac_sha(key1, key2, msg, 7, hmac); in add_addr_generate_hmac()
557 return get_unaligned_be64(&hmac[SHA256_DIGEST_SIZE - sizeof(u64)]); in add_addr_generate_hmac()
564 u8 hmac[SHA256_DIGEST_SIZE]; in add_addr6_generate_hmac() local
572 mptcp_crypto_hmac_sha(key1, key2, msg, 19, hmac); in add_addr6_generate_hmac()
574 return get_unaligned_be64(&hmac[SHA256_DIGEST_SIZE - sizeof(u64)]); in add_addr6_generate_hmac()
861 u64 hmac = 0; in add_addr_hmac_valid() local
867 hmac = add_addr_generate_hmac(msk->remote_key, in add_addr_hmac_valid()
[all …]
Dsubflow.c46 void *hmac) in subflow_generate_hmac() argument
53 mptcp_crypto_hmac_sha(key1, key2, msg, 8, hmac); in subflow_generate_hmac()
67 u8 hmac[SHA256_DIGEST_SIZE]; in subflow_token_join_request() local
88 subflow_req->remote_nonce, hmac); in subflow_token_join_request()
90 subflow_req->thmac = get_unaligned_be64(hmac); in subflow_token_join_request()
257 u8 hmac[SHA256_DIGEST_SIZE]; in subflow_thmac_valid() local
262 hmac); in subflow_thmac_valid()
264 thmac = get_unaligned_be64(hmac); in subflow_thmac_valid()
325 u8 hmac[SHA256_DIGEST_SIZE]; in subflow_finish_connect() local
346 hmac); in subflow_finish_connect()
[all …]
Dcrypto.c44 void mptcp_crypto_hmac_sha(u64 key1, u64 key2, u8 *msg, int len, void *hmac) in mptcp_crypto_hmac_sha() argument
78 sha256(input, SHA256_BLOCK_SIZE + SHA256_DIGEST_SIZE, hmac); in mptcp_crypto_hmac_sha()
Dprotocol.h113 u8 hmac[20]; member
321 u8 hmac[MPTCPOPT_HMAC_LEN]; member
434 void mptcp_crypto_hmac_sha(u64 key1, u64 key2, u8 *msg, int len, void *hmac);
/kernel/linux/linux-5.10/drivers/crypto/
Datmel-sha.c1690 struct atmel_sha_hmac_ctx *hmac = crypto_ahash_ctx(tfm); in atmel_sha_hmac_setup() local
1695 hmac->resume = resume; in atmel_sha_hmac_setup()
1727 if (likely(!atmel_sha_hmac_key_get(&hmac->hkey, &key, &keylen))) in atmel_sha_hmac_setup()
1735 memcpy((u8 *)hmac->ipad, key, keylen); in atmel_sha_hmac_setup()
1736 memset((u8 *)hmac->ipad + keylen, 0, bs - keylen); in atmel_sha_hmac_setup()
1751 struct atmel_sha_hmac_ctx *hmac = crypto_ahash_ctx(tfm); in atmel_sha_hmac_prehash_key_done() local
1759 hmac->ipad[i] = atmel_sha_read(dd, SHA_REG_DIGEST(i)); in atmel_sha_hmac_prehash_key_done()
1760 memset((u8 *)hmac->ipad + ds, 0, bs - ds); in atmel_sha_hmac_prehash_key_done()
1768 struct atmel_sha_hmac_ctx *hmac = crypto_ahash_ctx(tfm); in atmel_sha_hmac_compute_ipad_hash() local
1773 memcpy(hmac->opad, hmac->ipad, bs); in atmel_sha_hmac_compute_ipad_hash()
[all …]
/kernel/linux/linux-5.10/tools/testing/selftests/tpm2/
Dtpm2.py251 session_attributes=0, hmac=bytes()): argument
255 self.hmac = hmac
258 fmt = '>I H%us B H%us' % (len(self.nonce), len(self.hmac))
260 self.nonce, self.session_attributes, len(self.hmac),
261 self.hmac)
264 fmt = '>I H%us B H%us' % (len(self.nonce), len(self.hmac))
650 auth_cmd = AuthCommand(session_handle=policy_handle, hmac=auth_value)
652 auth_cmd = AuthCommand(hmac=auth_value)
/kernel/linux/linux-5.10/drivers/crypto/ccree/
Dcc_aead.c52 struct cc_hmac_s hmac; member
95 struct cc_hmac_s *hmac = &ctx->auth_state.hmac; in cc_aead_exit() local
97 if (hmac->ipad_opad) { in cc_aead_exit()
99 hmac->ipad_opad, in cc_aead_exit()
100 hmac->ipad_opad_dma_addr); in cc_aead_exit()
102 &hmac->ipad_opad_dma_addr); in cc_aead_exit()
103 hmac->ipad_opad_dma_addr = 0; in cc_aead_exit()
104 hmac->ipad_opad = NULL; in cc_aead_exit()
106 if (hmac->padded_authkey) { in cc_aead_exit()
108 hmac->padded_authkey, in cc_aead_exit()
[all …]
/kernel/linux/linux-5.10/drivers/thunderbolt/
Ddomain.c675 u8 hmac[TB_SWITCH_KEY_SIZE]; in tb_domain_challenge_switch_key() local
711 memset(hmac, 0, sizeof(hmac)); in tb_domain_challenge_switch_key()
712 ret = crypto_shash_digest(shash, challenge, sizeof(hmac), hmac); in tb_domain_challenge_switch_key()
717 if (memcmp(response, hmac, sizeof(hmac))) { in tb_domain_challenge_switch_key()
/kernel/linux/linux-5.10/drivers/crypto/qce/
Dsha.c171 const u32 *state, const u8 *buffer, bool hmac) in qce_import_common() argument
192 if (hmac) in qce_import_common()
209 bool hmac; in qce_ahash_import() local
218 hmac = IS_SHA_HMAC(flags); in qce_ahash_import()
224 state->buffer, hmac); in qce_ahash_import()
229 state->buf, hmac); in qce_ahash_import()
/kernel/linux/linux-5.10/security/keys/trusted-keys/
Dtrusted_tpm2.c37 const u8 *hmac, u16 hmac_len) in tpm2_buf_append_auth() argument
49 if (hmac && hmac_len) in tpm2_buf_append_auth()
50 tpm_buf_append(buf, hmac, hmac_len); in tpm2_buf_append_auth()
/kernel/linux/linux-5.10/include/uapi/linux/
Dseg6_hmac.h15 __u8 hmac[SEG6_HMAC_FIELD_LEN]; member
/kernel/linux/patches/linux-4.19/prebuilts/usr/include/linux/
Dseg6_hmac.h16 __u8 hmac[SEG6_HMAC_FIELD_LEN]; member
/kernel/linux/patches/linux-5.10/prebuilts/usr/include/linux/
Dseg6_hmac.h29 __u8 hmac[SEG6_HMAC_FIELD_LEN]; member
/kernel/linux/linux-5.10/net/ipv6/
Dseg6_hmac.c273 if (memcmp(hmac_output, tlv->hmac, SEG6_HMAC_FIELD_LEN) != 0) in seg6_hmac_validate_skb()
343 memset(tlv->hmac, 0, SEG6_HMAC_FIELD_LEN); in seg6_push_hmac()
344 err = seg6_hmac_compute(hinfo, srh, saddr, tlv->hmac); in seg6_push_hmac()
/kernel/linux/linux-5.10/drivers/crypto/inside-secure/
Dsafexcel_hash.c40 bool hmac; member
268 if (sreq->hmac && in safexcel_handle_req_result()
279 sreq->hmac = 0; in safexcel_handle_req_result()
703 (req->finish && req->hmac && in safexcel_ahash_enqueue()
827 } else if (unlikely(req->hmac && in safexcel_ahash_final()
861 } else if (req->hmac) { in safexcel_ahash_final()
1028 req->hmac = true; in safexcel_hmac_sha1_init()
1126 req->hmac = true; in safexcel_hmac_init_iv()
1401 req->hmac = true; in safexcel_hmac_sha224_init()
1473 req->hmac = true; in safexcel_hmac_sha256_init()
[all …]
/kernel/linux/linux-5.10/drivers/crypto/cavium/cpt/
Dcptvf_algs.h95 struct fchmac_context hmac; member
/kernel/linux/linux-5.10/drivers/net/wireguard/
Dnoise.c305 static void hmac(u8 *out, const u8 *in, const u8 *key, const size_t inlen, const size_t keylen) in hmac() function
360 hmac(secret, data, chaining_key, data_len, NOISE_HASH_LEN); in kdf()
367 hmac(output, output, secret, 1, BLAKE2S_HASH_SIZE); in kdf()
375 hmac(output, output, secret, BLAKE2S_HASH_SIZE + 1, BLAKE2S_HASH_SIZE); in kdf()
383 hmac(output, output, secret, BLAKE2S_HASH_SIZE + 1, BLAKE2S_HASH_SIZE); in kdf()
/kernel/linux/linux-5.10/drivers/net/ethernet/3com/
Dtyphoon.c1345 u32 hmac; in typhoon_download_firmware() local
1381 hmac = le32_to_cpu(fHdr->hmacDigest[0]); in typhoon_download_firmware()
1382 iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_0); in typhoon_download_firmware()
1383 hmac = le32_to_cpu(fHdr->hmacDigest[1]); in typhoon_download_firmware()
1384 iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_1); in typhoon_download_firmware()
1385 hmac = le32_to_cpu(fHdr->hmacDigest[2]); in typhoon_download_firmware()
1386 iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_2); in typhoon_download_firmware()
1387 hmac = le32_to_cpu(fHdr->hmacDigest[3]); in typhoon_download_firmware()
1388 iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_3); in typhoon_download_firmware()
1389 hmac = le32_to_cpu(fHdr->hmacDigest[4]); in typhoon_download_firmware()
[all …]
/kernel/linux/linux-5.10/net/sunrpc/auth_gss/
Dgss_krb5_crypto.c603 struct xdr_netobj hmac; in gss_krb5_aes_encrypt() local
649 hmac.len = GSS_KRB5_MAX_CKSUM_LEN; in gss_krb5_aes_encrypt()
650 hmac.data = buf->tail[0].iov_base + buf->tail[0].iov_len; in gss_krb5_aes_encrypt()
664 cksumkey, usage, &hmac); in gss_krb5_aes_encrypt()

12