/net/sctp/ |
D | Kconfig | 56 This option sets the default sctp cookie hmac algorithm 60 bool "Enable optional MD5 hmac cookie generation" 62 Enable optional MD5 hmac based SCTP cookie generation 66 bool "Enable optional SHA1 hmac cookie generation" 68 Enable optional SHA1 hmac based SCTP cookie generation 72 bool "Use no hmac alg in SCTP cookie generation" 74 Use no hmac algorithm in SCTP cookie generation 79 bool "Enable optional MD5 hmac cookie generation" 81 Enable optional MD5 hmac based SCTP cookie generation 86 bool "Enable optional SHA1 hmac cookie generation" [all …]
|
D | sm_make_chunk.c | 1717 if (sctp_sk(ep->base.sk)->hmac) { in sctp_pack_cookie() 1718 struct crypto_shash *tfm = sctp_sk(ep->base.sk)->hmac; in sctp_pack_cookie() 1781 if (!sctp_sk(ep->base.sk)->hmac) in sctp_unpack_cookie() 1786 struct crypto_shash *tfm = sctp_sk(ep->base.sk)->hmac; in sctp_unpack_cookie()
|
D | sm_statefuns.c | 4353 struct sctp_hmac *hmac; in sctp_sf_authenticate() local 4383 hmac = sctp_auth_get_hmac(ntohs(auth_hdr->hmac_id)); in sctp_sf_authenticate() 4384 if (sig_len != hmac->hmac_len) in sctp_sf_authenticate()
|
D | socket.c | 5075 sp->hmac = NULL; in sctp_init_sock() 5119 crypto_free_shash(sp->hmac); in sctp_destruct_common() 8530 if (!sp->hmac && sp->sctp_hmac_alg) { in sctp_listen_start() 8538 sctp_sk(sk)->hmac = tfm; in sctp_listen_start() 9540 newsp->hmac = NULL; in sctp_sock_migrate()
|
/net/mptcp/ |
D | crypto_test.c | 35 char hmac[32], hmac_hex[65]; in mptcp_crypto_test_basic() local 51 mptcp_crypto_hmac_sha(key1, key2, msg, 8, hmac); in mptcp_crypto_test_basic() 53 sprintf(&hmac_hex[j << 1], "%02x", hmac[j] & 0xff); in mptcp_crypto_test_basic()
|
D | crypto.c | 44 void mptcp_crypto_hmac_sha(u64 key1, u64 key2, u8 *msg, int len, void *hmac) in mptcp_crypto_hmac_sha() argument 78 sha256(input, SHA256_BLOCK_SIZE + SHA256_DIGEST_SIZE, hmac); in mptcp_crypto_hmac_sha()
|
D | subflow.c | 52 void *hmac) in subflow_generate_hmac() argument 59 mptcp_crypto_hmac_sha(key1, key2, msg, 8, hmac); in subflow_generate_hmac() 74 u8 hmac[SHA256_DIGEST_SIZE]; in subflow_req_create_thmac() local 80 subflow_req->remote_nonce, hmac); in subflow_req_create_thmac() 82 subflow_req->thmac = get_unaligned_be64(hmac); in subflow_req_create_thmac() 385 u8 hmac[SHA256_DIGEST_SIZE]; in subflow_thmac_valid() local 390 hmac); in subflow_thmac_valid() 392 thmac = get_unaligned_be64(hmac); in subflow_thmac_valid() 532 u8 hmac[SHA256_DIGEST_SIZE]; in subflow_finish_connect() local 559 hmac); in subflow_finish_connect() [all …]
|
D | options.c | 151 memcpy(mp_opt->hmac, ptr, MPTCPOPT_HMAC_LEN); in mptcp_parse_option() 510 memcpy(opts->hmac, subflow->hmac, MPTCPOPT_HMAC_LEN); in mptcp_established_options_mp() 626 u8 hmac[SHA256_DIGEST_SIZE]; in add_addr_generate_hmac() local 644 mptcp_crypto_hmac_sha(key1, key2, msg, i, hmac); in add_addr_generate_hmac() 646 return get_unaligned_be64(&hmac[SHA256_DIGEST_SIZE - sizeof(u64)]); in add_addr_generate_hmac() 1099 u64 hmac = 0; in add_addr_hmac_valid() local 1104 hmac = add_addr_generate_hmac(msk->remote_key, in add_addr_hmac_valid() 1109 msk, hmac, mp_opt->ahmac); in add_addr_hmac_valid() 1111 return hmac == mp_opt->ahmac; in add_addr_hmac_valid() 1510 memcpy(ptr, opts->hmac, MPTCPOPT_HMAC_LEN); in mptcp_write_options()
|
D | protocol.h | 169 u8 hmac[MPTCPOPT_HMAC_LEN]; member 511 u8 hmac[MPTCPOPT_HMAC_LEN]; /* MPJ subflow only */ 881 void mptcp_crypto_hmac_sha(u64 key1, u64 key2, u8 *msg, int len, void *hmac);
|
/net/sunrpc/ |
D | Kconfig | 47 SHA-1 digests. These include aes128-cts-hmac-sha1-96 and 48 aes256-cts-hmac-sha1-96. 72 SHA-2 digests. These include aes128-cts-hmac-sha256-128 and 73 aes256-cts-hmac-sha384-192.
|
/net/sunrpc/auth_gss/ |
D | gss_krb5_crypto.c | 785 struct xdr_netobj hmac; in gss_krb5_aes_encrypt() local 824 hmac.len = kctx->gk5e->cksumlength; in gss_krb5_aes_encrypt() 825 hmac.data = buf->tail[0].iov_base + buf->tail[0].iov_len; in gss_krb5_aes_encrypt() 838 offset + GSS_KRB5_TOK_HDR_LEN, &hmac); in gss_krb5_aes_encrypt() 1017 struct xdr_netobj hmac; in krb5_etm_encrypt() local 1058 hmac.data = buf->tail[0].iov_base + buf->tail[0].iov_len; in krb5_etm_encrypt() 1059 hmac.len = kctx->gk5e->cksumlength; in krb5_etm_encrypt() 1061 buf, offset + GSS_KRB5_TOK_HDR_LEN, &hmac); in krb5_etm_encrypt()
|
/net/ipv6/ |
D | seg6_hmac.c | 272 if (memcmp(hmac_output, tlv->hmac, SEG6_HMAC_FIELD_LEN) != 0) in seg6_hmac_validate_skb() 342 memset(tlv->hmac, 0, SEG6_HMAC_FIELD_LEN); in seg6_push_hmac() 343 err = seg6_hmac_compute(hinfo, srh, saddr, tlv->hmac); in seg6_push_hmac()
|
/net/ceph/ |
D | messenger_v2.c | 799 int kvec_cnt, u8 *hmac) in hmac_sha256() argument 809 memset(hmac, 0, SHA256_DIGEST_SIZE); in hmac_sha256() 827 ret = crypto_shash_final(desc, hmac); in hmac_sha256() 2456 u8 hmac[SHA256_DIGEST_SIZE]; in process_auth_signature() local 2465 con->v2.out_sign_kvec_cnt, hmac); in process_auth_signature() 2470 if (crypto_memneq(p, hmac, SHA256_DIGEST_SIZE)) { in process_auth_signature()
|