Home
last modified time | relevance | path

Searched refs:hmac (Results 1 – 13 of 13) sorted by relevance

/net/sctp/
A DKconfig56 This option sets the default sctp cookie hmac algorithm
60 bool "Enable optional MD5 hmac cookie generation"
62 Enable optional MD5 hmac based SCTP cookie generation
66 bool "Enable optional SHA1 hmac cookie generation"
68 Enable optional SHA1 hmac based SCTP cookie generation
72 bool "Use no hmac alg in SCTP cookie generation"
74 Use no hmac algorithm in SCTP cookie generation
79 bool "Enable optional MD5 hmac cookie generation"
81 Enable optional MD5 hmac based SCTP cookie generation
86 bool "Enable optional SHA1 hmac cookie generation"
[all …]
A Dsm_make_chunk.c1709 if (sctp_sk(ep->base.sk)->hmac) { in sctp_pack_cookie()
1710 struct crypto_shash *tfm = sctp_sk(ep->base.sk)->hmac; in sctp_pack_cookie()
1773 if (!sctp_sk(ep->base.sk)->hmac) in sctp_unpack_cookie()
1778 struct crypto_shash *tfm = sctp_sk(ep->base.sk)->hmac; in sctp_unpack_cookie()
A Dsm_statefuns.c4364 struct sctp_hmac *hmac; in sctp_sf_authenticate() local
4394 hmac = sctp_auth_get_hmac(ntohs(auth_hdr->hmac_id)); in sctp_sf_authenticate()
4395 if (sig_len != hmac->hmac_len) in sctp_sf_authenticate()
A Dsocket.c5082 sp->hmac = NULL; in sctp_init_sock()
5126 crypto_free_shash(sp->hmac); in sctp_destruct_common()
8538 if (!sp->hmac && sp->sctp_hmac_alg) { in sctp_listen_start()
8546 sctp_sk(sk)->hmac = tfm; in sctp_listen_start()
9564 newsp->hmac = NULL; in sctp_sock_migrate()
/net/mptcp/
A Dcrypto_test.c35 char hmac[32], hmac_hex[65]; in mptcp_crypto_test_basic() local
51 mptcp_crypto_hmac_sha(key1, key2, msg, 8, hmac); in mptcp_crypto_test_basic()
53 sprintf(&hmac_hex[j << 1], "%02x", hmac[j] & 0xff); in mptcp_crypto_test_basic()
A Dcrypto.c44 void mptcp_crypto_hmac_sha(u64 key1, u64 key2, u8 *msg, int len, void *hmac) in mptcp_crypto_hmac_sha() argument
78 sha256(input, SHA256_BLOCK_SIZE + SHA256_DIGEST_SIZE, hmac); in mptcp_crypto_hmac_sha()
A Dsubflow.c51 void *hmac) in subflow_generate_hmac() argument
73 u8 hmac[SHA256_DIGEST_SIZE]; in subflow_req_create_thmac() local
80 subflow_req->remote_nonce, hmac); in subflow_req_create_thmac()
416 u8 hmac[SHA256_DIGEST_SIZE]; in subflow_thmac_valid() local
421 hmac); in subflow_thmac_valid()
423 thmac = get_unaligned_be64(hmac); in subflow_thmac_valid()
567 u8 hmac[SHA256_DIGEST_SIZE]; in subflow_finish_connect() local
594 hmac); in subflow_finish_connect()
595 memcpy(subflow->hmac, hmac, MPTCPOPT_HMAC_LEN); in subflow_finish_connect()
756 u8 hmac[SHA256_DIGEST_SIZE]; in subflow_hmac_valid() local
[all …]
A Doptions.c150 memcpy(mp_opt->hmac, ptr, MPTCPOPT_HMAC_LEN); in mptcp_parse_option()
506 memcpy(opts->hmac, subflow->hmac, MPTCPOPT_HMAC_LEN); in mptcp_established_options_mp()
621 u8 hmac[SHA256_DIGEST_SIZE]; in add_addr_generate_hmac() local
639 mptcp_crypto_hmac_sha(key1, key2, msg, i, hmac); in add_addr_generate_hmac()
641 return get_unaligned_be64(&hmac[SHA256_DIGEST_SIZE - sizeof(u64)]); in add_addr_generate_hmac()
1106 u64 hmac = 0; in add_addr_hmac_valid() local
1111 hmac = add_addr_generate_hmac(READ_ONCE(msk->remote_key), in add_addr_hmac_valid()
1116 msk, hmac, mp_opt->ahmac); in add_addr_hmac_valid()
1118 return hmac == mp_opt->ahmac; in add_addr_hmac_valid()
1520 memcpy(ptr, opts->hmac, MPTCPOPT_HMAC_LEN); in mptcp_write_options()
A Dprotocol.h173 u8 hmac[MPTCPOPT_HMAC_LEN]; member
553 u8 hmac[MPTCPOPT_HMAC_LEN]; /* MPJ subflow only */
1004 void mptcp_crypto_hmac_sha(u64 key1, u64 key2, u8 *msg, int len, void *hmac);
/net/sunrpc/
A DKconfig47 SHA-1 digests. These include aes128-cts-hmac-sha1-96 and
48 aes256-cts-hmac-sha1-96.
72 SHA-2 digests. These include aes128-cts-hmac-sha256-128 and
73 aes256-cts-hmac-sha384-192.
/net/sunrpc/auth_gss/
A Dgss_krb5_crypto.c586 struct xdr_netobj hmac; in gss_krb5_aes_encrypt() local
625 hmac.len = kctx->gk5e->cksumlength; in gss_krb5_aes_encrypt()
626 hmac.data = buf->tail[0].iov_base + buf->tail[0].iov_len; in gss_krb5_aes_encrypt()
639 offset + GSS_KRB5_TOK_HDR_LEN, &hmac); in gss_krb5_aes_encrypt()
818 struct xdr_netobj hmac; in krb5_etm_encrypt() local
859 hmac.data = buf->tail[0].iov_base + buf->tail[0].iov_len; in krb5_etm_encrypt()
860 hmac.len = kctx->gk5e->cksumlength; in krb5_etm_encrypt()
862 buf, offset + GSS_KRB5_TOK_HDR_LEN, &hmac); in krb5_etm_encrypt()
/net/ipv6/
A Dseg6_hmac.c283 if (memcmp(hmac_output, tlv->hmac, SEG6_HMAC_FIELD_LEN) != 0) in seg6_hmac_validate_skb()
353 memset(tlv->hmac, 0, SEG6_HMAC_FIELD_LEN); in seg6_push_hmac()
354 err = seg6_hmac_compute(hinfo, srh, saddr, tlv->hmac); in seg6_push_hmac()
/net/ceph/
A Dmessenger_v2.c797 const struct kvec *kvecs, int kvec_cnt, u8 *hmac) in ceph_hmac_sha256() argument
807 memset(hmac, 0, SHA256_DIGEST_SIZE); in ceph_hmac_sha256()
823 ret = crypto_shash_final(desc, hmac); in ceph_hmac_sha256()
2455 u8 hmac[SHA256_DIGEST_SIZE]; in process_auth_signature() local
2464 con->v2.out_sign_kvec_cnt, hmac); in process_auth_signature()
2469 if (crypto_memneq(p, hmac, SHA256_DIGEST_SIZE)) { in process_auth_signature()

Completed in 57 milliseconds