| /net/sctp/ |
| A D | Kconfig | 56 This option sets the default sctp cookie hmac algorithm 60 bool "Enable optional MD5 hmac cookie generation" 62 Enable optional MD5 hmac based SCTP cookie generation 66 bool "Enable optional SHA1 hmac cookie generation" 68 Enable optional SHA1 hmac based SCTP cookie generation 72 bool "Use no hmac alg in SCTP cookie generation" 74 Use no hmac algorithm in SCTP cookie generation 79 bool "Enable optional MD5 hmac cookie generation" 81 Enable optional MD5 hmac based SCTP cookie generation 86 bool "Enable optional SHA1 hmac cookie generation" [all …]
|
| A D | sm_make_chunk.c | 1709 if (sctp_sk(ep->base.sk)->hmac) { in sctp_pack_cookie() 1710 struct crypto_shash *tfm = sctp_sk(ep->base.sk)->hmac; in sctp_pack_cookie() 1773 if (!sctp_sk(ep->base.sk)->hmac) in sctp_unpack_cookie() 1778 struct crypto_shash *tfm = sctp_sk(ep->base.sk)->hmac; in sctp_unpack_cookie()
|
| A D | sm_statefuns.c | 4364 struct sctp_hmac *hmac; in sctp_sf_authenticate() local 4394 hmac = sctp_auth_get_hmac(ntohs(auth_hdr->hmac_id)); in sctp_sf_authenticate() 4395 if (sig_len != hmac->hmac_len) in sctp_sf_authenticate()
|
| A D | socket.c | 5082 sp->hmac = NULL; in sctp_init_sock() 5126 crypto_free_shash(sp->hmac); in sctp_destruct_common() 8538 if (!sp->hmac && sp->sctp_hmac_alg) { in sctp_listen_start() 8546 sctp_sk(sk)->hmac = tfm; in sctp_listen_start() 9564 newsp->hmac = NULL; in sctp_sock_migrate()
|
| /net/mptcp/ |
| A D | crypto_test.c | 35 char hmac[32], hmac_hex[65]; in mptcp_crypto_test_basic() local 51 mptcp_crypto_hmac_sha(key1, key2, msg, 8, hmac); in mptcp_crypto_test_basic() 53 sprintf(&hmac_hex[j << 1], "%02x", hmac[j] & 0xff); in mptcp_crypto_test_basic()
|
| A D | crypto.c | 44 void mptcp_crypto_hmac_sha(u64 key1, u64 key2, u8 *msg, int len, void *hmac) in mptcp_crypto_hmac_sha() argument 78 sha256(input, SHA256_BLOCK_SIZE + SHA256_DIGEST_SIZE, hmac); in mptcp_crypto_hmac_sha()
|
| A D | subflow.c | 51 void *hmac) in subflow_generate_hmac() argument 73 u8 hmac[SHA256_DIGEST_SIZE]; in subflow_req_create_thmac() local 80 subflow_req->remote_nonce, hmac); in subflow_req_create_thmac() 416 u8 hmac[SHA256_DIGEST_SIZE]; in subflow_thmac_valid() local 421 hmac); in subflow_thmac_valid() 423 thmac = get_unaligned_be64(hmac); in subflow_thmac_valid() 567 u8 hmac[SHA256_DIGEST_SIZE]; in subflow_finish_connect() local 594 hmac); in subflow_finish_connect() 595 memcpy(subflow->hmac, hmac, MPTCPOPT_HMAC_LEN); in subflow_finish_connect() 756 u8 hmac[SHA256_DIGEST_SIZE]; in subflow_hmac_valid() local [all …]
|
| A D | options.c | 150 memcpy(mp_opt->hmac, ptr, MPTCPOPT_HMAC_LEN); in mptcp_parse_option() 506 memcpy(opts->hmac, subflow->hmac, MPTCPOPT_HMAC_LEN); in mptcp_established_options_mp() 621 u8 hmac[SHA256_DIGEST_SIZE]; in add_addr_generate_hmac() local 639 mptcp_crypto_hmac_sha(key1, key2, msg, i, hmac); in add_addr_generate_hmac() 641 return get_unaligned_be64(&hmac[SHA256_DIGEST_SIZE - sizeof(u64)]); in add_addr_generate_hmac() 1106 u64 hmac = 0; in add_addr_hmac_valid() local 1111 hmac = add_addr_generate_hmac(READ_ONCE(msk->remote_key), in add_addr_hmac_valid() 1116 msk, hmac, mp_opt->ahmac); in add_addr_hmac_valid() 1118 return hmac == mp_opt->ahmac; in add_addr_hmac_valid() 1520 memcpy(ptr, opts->hmac, MPTCPOPT_HMAC_LEN); in mptcp_write_options()
|
| A D | protocol.h | 173 u8 hmac[MPTCPOPT_HMAC_LEN]; member 553 u8 hmac[MPTCPOPT_HMAC_LEN]; /* MPJ subflow only */ 1004 void mptcp_crypto_hmac_sha(u64 key1, u64 key2, u8 *msg, int len, void *hmac);
|
| /net/sunrpc/ |
| A D | Kconfig | 47 SHA-1 digests. These include aes128-cts-hmac-sha1-96 and 48 aes256-cts-hmac-sha1-96. 72 SHA-2 digests. These include aes128-cts-hmac-sha256-128 and 73 aes256-cts-hmac-sha384-192.
|
| /net/sunrpc/auth_gss/ |
| A D | gss_krb5_crypto.c | 586 struct xdr_netobj hmac; in gss_krb5_aes_encrypt() local 625 hmac.len = kctx->gk5e->cksumlength; in gss_krb5_aes_encrypt() 626 hmac.data = buf->tail[0].iov_base + buf->tail[0].iov_len; in gss_krb5_aes_encrypt() 639 offset + GSS_KRB5_TOK_HDR_LEN, &hmac); in gss_krb5_aes_encrypt() 818 struct xdr_netobj hmac; in krb5_etm_encrypt() local 859 hmac.data = buf->tail[0].iov_base + buf->tail[0].iov_len; in krb5_etm_encrypt() 860 hmac.len = kctx->gk5e->cksumlength; in krb5_etm_encrypt() 862 buf, offset + GSS_KRB5_TOK_HDR_LEN, &hmac); in krb5_etm_encrypt()
|
| /net/ipv6/ |
| A D | seg6_hmac.c | 283 if (memcmp(hmac_output, tlv->hmac, SEG6_HMAC_FIELD_LEN) != 0) in seg6_hmac_validate_skb() 353 memset(tlv->hmac, 0, SEG6_HMAC_FIELD_LEN); in seg6_push_hmac() 354 err = seg6_hmac_compute(hinfo, srh, saddr, tlv->hmac); in seg6_push_hmac()
|
| /net/ceph/ |
| A D | messenger_v2.c | 797 const struct kvec *kvecs, int kvec_cnt, u8 *hmac) in ceph_hmac_sha256() argument 807 memset(hmac, 0, SHA256_DIGEST_SIZE); in ceph_hmac_sha256() 823 ret = crypto_shash_final(desc, hmac); in ceph_hmac_sha256() 2455 u8 hmac[SHA256_DIGEST_SIZE]; in process_auth_signature() local 2464 con->v2.out_sign_kvec_cnt, hmac); in process_auth_signature() 2469 if (crypto_memneq(p, hmac, SHA256_DIGEST_SIZE)) { in process_auth_signature()
|