Home
last modified time | relevance | path

Searched refs:hmac (Results 1 – 13 of 13) sorted by relevance

/net/sctp/
DKconfig56 This option sets the default sctp cookie hmac algorithm
60 bool "Enable optional MD5 hmac cookie generation"
62 Enable optional MD5 hmac based SCTP cookie generation
66 bool "Enable optional SHA1 hmac cookie generation"
68 Enable optional SHA1 hmac based SCTP cookie generation
72 bool "Use no hmac alg in SCTP cookie generation"
74 Use no hmac algorithm in SCTP cookie generation
79 bool "Enable optional MD5 hmac cookie generation"
81 Enable optional MD5 hmac based SCTP cookie generation
86 bool "Enable optional SHA1 hmac cookie generation"
[all …]
Dsm_make_chunk.c1717 if (sctp_sk(ep->base.sk)->hmac) { in sctp_pack_cookie()
1718 struct crypto_shash *tfm = sctp_sk(ep->base.sk)->hmac; in sctp_pack_cookie()
1781 if (!sctp_sk(ep->base.sk)->hmac) in sctp_unpack_cookie()
1786 struct crypto_shash *tfm = sctp_sk(ep->base.sk)->hmac; in sctp_unpack_cookie()
Dsm_statefuns.c4353 struct sctp_hmac *hmac; in sctp_sf_authenticate() local
4383 hmac = sctp_auth_get_hmac(ntohs(auth_hdr->hmac_id)); in sctp_sf_authenticate()
4384 if (sig_len != hmac->hmac_len) in sctp_sf_authenticate()
Dsocket.c5075 sp->hmac = NULL; in sctp_init_sock()
5119 crypto_free_shash(sp->hmac); in sctp_destruct_common()
8530 if (!sp->hmac && sp->sctp_hmac_alg) { in sctp_listen_start()
8538 sctp_sk(sk)->hmac = tfm; in sctp_listen_start()
9540 newsp->hmac = NULL; in sctp_sock_migrate()
/net/mptcp/
Dcrypto_test.c35 char hmac[32], hmac_hex[65]; in mptcp_crypto_test_basic() local
51 mptcp_crypto_hmac_sha(key1, key2, msg, 8, hmac); in mptcp_crypto_test_basic()
53 sprintf(&hmac_hex[j << 1], "%02x", hmac[j] & 0xff); in mptcp_crypto_test_basic()
Dcrypto.c44 void mptcp_crypto_hmac_sha(u64 key1, u64 key2, u8 *msg, int len, void *hmac) in mptcp_crypto_hmac_sha() argument
78 sha256(input, SHA256_BLOCK_SIZE + SHA256_DIGEST_SIZE, hmac); in mptcp_crypto_hmac_sha()
Dsubflow.c52 void *hmac) in subflow_generate_hmac() argument
59 mptcp_crypto_hmac_sha(key1, key2, msg, 8, hmac); in subflow_generate_hmac()
74 u8 hmac[SHA256_DIGEST_SIZE]; in subflow_req_create_thmac() local
80 subflow_req->remote_nonce, hmac); in subflow_req_create_thmac()
82 subflow_req->thmac = get_unaligned_be64(hmac); in subflow_req_create_thmac()
385 u8 hmac[SHA256_DIGEST_SIZE]; in subflow_thmac_valid() local
390 hmac); in subflow_thmac_valid()
392 thmac = get_unaligned_be64(hmac); in subflow_thmac_valid()
532 u8 hmac[SHA256_DIGEST_SIZE]; in subflow_finish_connect() local
559 hmac); in subflow_finish_connect()
[all …]
Doptions.c151 memcpy(mp_opt->hmac, ptr, MPTCPOPT_HMAC_LEN); in mptcp_parse_option()
510 memcpy(opts->hmac, subflow->hmac, MPTCPOPT_HMAC_LEN); in mptcp_established_options_mp()
626 u8 hmac[SHA256_DIGEST_SIZE]; in add_addr_generate_hmac() local
644 mptcp_crypto_hmac_sha(key1, key2, msg, i, hmac); in add_addr_generate_hmac()
646 return get_unaligned_be64(&hmac[SHA256_DIGEST_SIZE - sizeof(u64)]); in add_addr_generate_hmac()
1099 u64 hmac = 0; in add_addr_hmac_valid() local
1104 hmac = add_addr_generate_hmac(msk->remote_key, in add_addr_hmac_valid()
1109 msk, hmac, mp_opt->ahmac); in add_addr_hmac_valid()
1111 return hmac == mp_opt->ahmac; in add_addr_hmac_valid()
1510 memcpy(ptr, opts->hmac, MPTCPOPT_HMAC_LEN); in mptcp_write_options()
Dprotocol.h169 u8 hmac[MPTCPOPT_HMAC_LEN]; member
511 u8 hmac[MPTCPOPT_HMAC_LEN]; /* MPJ subflow only */
881 void mptcp_crypto_hmac_sha(u64 key1, u64 key2, u8 *msg, int len, void *hmac);
/net/sunrpc/
DKconfig47 SHA-1 digests. These include aes128-cts-hmac-sha1-96 and
48 aes256-cts-hmac-sha1-96.
72 SHA-2 digests. These include aes128-cts-hmac-sha256-128 and
73 aes256-cts-hmac-sha384-192.
/net/sunrpc/auth_gss/
Dgss_krb5_crypto.c785 struct xdr_netobj hmac; in gss_krb5_aes_encrypt() local
824 hmac.len = kctx->gk5e->cksumlength; in gss_krb5_aes_encrypt()
825 hmac.data = buf->tail[0].iov_base + buf->tail[0].iov_len; in gss_krb5_aes_encrypt()
838 offset + GSS_KRB5_TOK_HDR_LEN, &hmac); in gss_krb5_aes_encrypt()
1017 struct xdr_netobj hmac; in krb5_etm_encrypt() local
1058 hmac.data = buf->tail[0].iov_base + buf->tail[0].iov_len; in krb5_etm_encrypt()
1059 hmac.len = kctx->gk5e->cksumlength; in krb5_etm_encrypt()
1061 buf, offset + GSS_KRB5_TOK_HDR_LEN, &hmac); in krb5_etm_encrypt()
/net/ipv6/
Dseg6_hmac.c272 if (memcmp(hmac_output, tlv->hmac, SEG6_HMAC_FIELD_LEN) != 0) in seg6_hmac_validate_skb()
342 memset(tlv->hmac, 0, SEG6_HMAC_FIELD_LEN); in seg6_push_hmac()
343 err = seg6_hmac_compute(hinfo, srh, saddr, tlv->hmac); in seg6_push_hmac()
/net/ceph/
Dmessenger_v2.c799 int kvec_cnt, u8 *hmac) in hmac_sha256() argument
809 memset(hmac, 0, SHA256_DIGEST_SIZE); in hmac_sha256()
827 ret = crypto_shash_final(desc, hmac); in hmac_sha256()
2456 u8 hmac[SHA256_DIGEST_SIZE]; in process_auth_signature() local
2465 con->v2.out_sign_kvec_cnt, hmac); in process_auth_signature()
2470 if (crypto_memneq(p, hmac, SHA256_DIGEST_SIZE)) { in process_auth_signature()