Searched refs:hmac (Results 1 – 8 of 8) sorted by relevance
/net/sctp/ |
D | Kconfig | 73 This option sets the default sctp cookie hmac algorithm 77 bool "Enable optional MD5 hmac cookie generation" 79 Enable optional MD5 hmac based SCTP cookie generation 83 bool "Enable optional SHA1 hmac cookie generation" 85 Enable optional SHA1 hmac based SCTP cookie generation 89 bool "Use no hmac alg in SCTP cookie generation" 91 Use no hmac algorithm in SCTP cookie generation 96 bool "Enable optional MD5 hmac cookie generation" 98 Enable optional MD5 hmac based SCTP cookie generation 103 bool "Enable optional SHA1 hmac cookie generation" [all …]
|
D | sm_make_chunk.c | 1244 __u8 *hmac; in sctp_make_auth() local 1262 hmac = skb_put(retval->skb, hmac_desc->hmac_len); in sctp_make_auth() 1263 memset(hmac, 0, hmac_desc->hmac_len); in sctp_make_auth() 1646 if (sctp_sk(ep->base.sk)->hmac) { in sctp_pack_cookie() 1651 desc.tfm = sctp_sk(ep->base.sk)->hmac; in sctp_pack_cookie() 1713 if (!sctp_sk(ep->base.sk)->hmac) in sctp_unpack_cookie() 1718 desc.tfm = sctp_sk(ep->base.sk)->hmac; in sctp_unpack_cookie()
|
D | endpointola.c | 252 crypto_free_hash(sctp_sk(ep->base.sk)->hmac); in sctp_endpoint_destroy()
|
D | auth.c | 758 digest = auth->auth_hdr.hmac; in sctp_auth_calculate_hmac()
|
D | sm_statefuns.c | 3994 struct sctp_hmac *hmac; in sctp_sf_authenticate() local 4023 hmac = sctp_auth_get_hmac(ntohs(auth_hdr->hmac_id)); in sctp_sf_authenticate() 4024 if (sig_len != hmac->hmac_len) in sctp_sf_authenticate() 4034 digest = auth_hdr->hmac; in sctp_sf_authenticate()
|
D | socket.c | 3979 sp->hmac = NULL; in sctp_init_sock() 6065 if (!sp->hmac && sp->sctp_hmac_alg) { in sctp_listen_start() 6073 sctp_sk(sk)->hmac = tfm; in sctp_listen_start() 6929 newsp->hmac = NULL; in sctp_sock_migrate()
|
/net/sunrpc/auth_gss/ |
D | gss_krb5_crypto.c | 647 struct xdr_netobj hmac; in gss_krb5_aes_encrypt() local 698 hmac.len = GSS_KRB5_MAX_CKSUM_LEN; in gss_krb5_aes_encrypt() 699 hmac.data = buf->tail[0].iov_base + buf->tail[0].iov_len; in gss_krb5_aes_encrypt() 713 cksumkey, usage, &hmac); in gss_krb5_aes_encrypt() 861 struct crypto_hash *hmac; in krb5_rc4_setup_seq_key() local 870 hmac = crypto_alloc_hash(kctx->gk5e->cksum_name, 0, CRYPTO_ALG_ASYNC); in krb5_rc4_setup_seq_key() 871 if (IS_ERR(hmac)) { in krb5_rc4_setup_seq_key() 873 __func__, PTR_ERR(hmac), kctx->gk5e->cksum_name); in krb5_rc4_setup_seq_key() 874 return PTR_ERR(hmac); in krb5_rc4_setup_seq_key() 877 desc.tfm = hmac; in krb5_rc4_setup_seq_key() [all …]
|
D | gss_krb5_mech.c | 430 struct crypto_hash *hmac; in context_derive_keys_rc4() local 441 hmac = crypto_alloc_hash(ctx->gk5e->cksum_name, 0, CRYPTO_ALG_ASYNC); in context_derive_keys_rc4() 442 if (IS_ERR(hmac)) { in context_derive_keys_rc4() 444 __func__, PTR_ERR(hmac), ctx->gk5e->cksum_name); in context_derive_keys_rc4() 445 err = PTR_ERR(hmac); in context_derive_keys_rc4() 449 err = crypto_hash_setkey(hmac, ctx->Ksess, ctx->gk5e->keylength); in context_derive_keys_rc4() 456 desc.tfm = hmac; in context_derive_keys_rc4() 489 crypto_free_hash(hmac); in context_derive_keys_rc4()
|