Home
last modified time | relevance | path

Searched refs:hmac (Results 1 – 8 of 8) sorted by relevance

/net/sctp/
DKconfig73 This option sets the default sctp cookie hmac algorithm
77 bool "Enable optional MD5 hmac cookie generation"
79 Enable optional MD5 hmac based SCTP cookie generation
83 bool "Enable optional SHA1 hmac cookie generation"
85 Enable optional SHA1 hmac based SCTP cookie generation
89 bool "Use no hmac alg in SCTP cookie generation"
91 Use no hmac algorithm in SCTP cookie generation
96 bool "Enable optional MD5 hmac cookie generation"
98 Enable optional MD5 hmac based SCTP cookie generation
103 bool "Enable optional SHA1 hmac cookie generation"
[all …]
Dsm_make_chunk.c1244 __u8 *hmac; in sctp_make_auth() local
1262 hmac = skb_put(retval->skb, hmac_desc->hmac_len); in sctp_make_auth()
1263 memset(hmac, 0, hmac_desc->hmac_len); in sctp_make_auth()
1646 if (sctp_sk(ep->base.sk)->hmac) { in sctp_pack_cookie()
1651 desc.tfm = sctp_sk(ep->base.sk)->hmac; in sctp_pack_cookie()
1713 if (!sctp_sk(ep->base.sk)->hmac) in sctp_unpack_cookie()
1718 desc.tfm = sctp_sk(ep->base.sk)->hmac; in sctp_unpack_cookie()
Dendpointola.c252 crypto_free_hash(sctp_sk(ep->base.sk)->hmac); in sctp_endpoint_destroy()
Dauth.c758 digest = auth->auth_hdr.hmac; in sctp_auth_calculate_hmac()
Dsm_statefuns.c3994 struct sctp_hmac *hmac; in sctp_sf_authenticate() local
4023 hmac = sctp_auth_get_hmac(ntohs(auth_hdr->hmac_id)); in sctp_sf_authenticate()
4024 if (sig_len != hmac->hmac_len) in sctp_sf_authenticate()
4034 digest = auth_hdr->hmac; in sctp_sf_authenticate()
Dsocket.c3979 sp->hmac = NULL; in sctp_init_sock()
6065 if (!sp->hmac && sp->sctp_hmac_alg) { in sctp_listen_start()
6073 sctp_sk(sk)->hmac = tfm; in sctp_listen_start()
6929 newsp->hmac = NULL; in sctp_sock_migrate()
/net/sunrpc/auth_gss/
Dgss_krb5_crypto.c647 struct xdr_netobj hmac; in gss_krb5_aes_encrypt() local
698 hmac.len = GSS_KRB5_MAX_CKSUM_LEN; in gss_krb5_aes_encrypt()
699 hmac.data = buf->tail[0].iov_base + buf->tail[0].iov_len; in gss_krb5_aes_encrypt()
713 cksumkey, usage, &hmac); in gss_krb5_aes_encrypt()
861 struct crypto_hash *hmac; in krb5_rc4_setup_seq_key() local
870 hmac = crypto_alloc_hash(kctx->gk5e->cksum_name, 0, CRYPTO_ALG_ASYNC); in krb5_rc4_setup_seq_key()
871 if (IS_ERR(hmac)) { in krb5_rc4_setup_seq_key()
873 __func__, PTR_ERR(hmac), kctx->gk5e->cksum_name); in krb5_rc4_setup_seq_key()
874 return PTR_ERR(hmac); in krb5_rc4_setup_seq_key()
877 desc.tfm = hmac; in krb5_rc4_setup_seq_key()
[all …]
Dgss_krb5_mech.c430 struct crypto_hash *hmac; in context_derive_keys_rc4() local
441 hmac = crypto_alloc_hash(ctx->gk5e->cksum_name, 0, CRYPTO_ALG_ASYNC); in context_derive_keys_rc4()
442 if (IS_ERR(hmac)) { in context_derive_keys_rc4()
444 __func__, PTR_ERR(hmac), ctx->gk5e->cksum_name); in context_derive_keys_rc4()
445 err = PTR_ERR(hmac); in context_derive_keys_rc4()
449 err = crypto_hash_setkey(hmac, ctx->Ksess, ctx->gk5e->keylength); in context_derive_keys_rc4()
456 desc.tfm = hmac; in context_derive_keys_rc4()
489 crypto_free_hash(hmac); in context_derive_keys_rc4()