| /linux/include/crypto/ |
| H A D | md5.h | 31 /* State for the MD5 compression function */ 37 * struct md5_ctx - Context for hashing a message with MD5 49 * md5_init() - Initialize an MD5 context for a new message 52 * If you don't need incremental computation, consider md5() instead. 59 * md5_update() - Update an MD5 context with message data 71 * md5_final() - Finish computing an MD5 message digest 73 * @out: (output) the resulting MD5 message digest 82 * md5() - Compute MD5 message digest in one shot 85 * @out: (output) the resulting MD5 message digest 89 void md5(const u8 *data, size_t len, u8 out[at_least MD5_DIGEST_SIZE]); [all …]
|
| H A D | hash_info.h | 14 #include <crypto/md5.h>
|
| /linux/tools/testing/selftests/net/tcp_ao/ |
| H A D | unsigned-md5.c | 139 try_accept("TCP-AO established: add TCP-MD5 key", (*port)++, NULL, 0, in server_add_fail_tests() 142 try_accept("TCP-MD5 established: add TCP-AO key", (*port)++, &addr_any, in server_add_fail_tests() 163 try_accept("[server] AO server (INADDR_ANY): MD5 client", port++, NULL, 0, in server_fn() 177 try_accept("[server] MD5 server (INADDR_ANY): AO client", port++, &addr_any, 0, in server_fn() 180 try_accept("[server] MD5 server (INADDR_ANY): MD5 client", port++, &addr_any, 0, in server_fn() 182 try_accept("[server] MD5 server (INADDR_ANY): no sign client", port++, &addr_any, in server_fn() 189 try_accept("[server] no sign server: MD5 client", port++, NULL, 0, in server_fn() 195 try_accept("[server] AO+MD5 server: AO client (matching)", port++, in server_fn() 198 try_accept("[server] AO+MD5 server: AO client (misconfig, matching MD5)", port++, in server_fn() 202 try_accept("[server] AO+MD5 server: AO client (misconfig, non-matching)", port++, in server_fn() [all …]
|
| /linux/crypto/ |
| H A D | md5.c | 3 * Crypto API support for MD5 and HMAC-MD5 8 #include <crypto/md5.h> 15 * library MD5 context, except the value in bytecount must be block-aligned and 91 md5(data, len, out); in crypto_md5_digest() 179 .base.cra_name = "md5", 180 .base.cra_driver_name = "md5-lib", 197 .base.cra_name = "hmac(md5)", 198 .base.cra_driver_name = "hmac-md5-lib", 231 MODULE_DESCRIPTION("Crypto API support for MD5 and HMAC-MD5"); 233 MODULE_ALIAS_CRYPTO("md5"); [all …]
|
| /linux/lib/crypto/tests/ |
| H A D | md5_kunit.c | 5 #include <crypto/md5.h> 6 #include "md5-testvecs.h" 8 #define HASH md5 31 .name = "md5", 38 MODULE_DESCRIPTION("KUnit tests and benchmark for MD5 and HMAC-MD5");
|
| H A D | Kconfig | 56 tristate "KUnit tests for MD5" if !KUNIT_ALL_TESTS 61 KUnit tests for the MD5 cryptographic hash function and its
|
| /linux/tools/testing/selftests/net/packetdrill/ |
| H A D | tcp_md5_md5-only-on-client-ack.pkt | 2 // Test what happens when client does not provide MD5 on SYN, 15 // Ooh, weird: client provides MD5 option on the ACK: 16 +.01 < . 1:1(0) ack 1 win 514 <md5 000102030405060708090a0b0c0d0e0f,nop,nop> 17 +.01 < . 1:1(0) ack 1 win 514 <md5 000102030405060708090a0b0c0d0e0f,nop,nop>
|
| /linux/tools/testing/selftests/net/ |
| H A D | fcnal-test.sh | 869 # MD5 tests without VRF 882 log_test $? 0 "MD5: Single address config" 884 # client sends MD5, server not configured 886 show_hint "Should timeout due to MD5 mismatch" 890 log_test $? 2 "MD5: Server no config, client uses password" 898 log_test $? 2 "MD5: Client uses wrong password" 902 show_hint "Should timeout due to MD5 mismatch" 906 log_test $? 2 "MD5: Client address does not match address configured with password" 909 # MD5 extension - prefix length 917 log_test $? 0 "MD5: Prefix config" [all …]
|
| /linux/Documentation/networking/ |
| H A D | tcp_ao.rst | 11 The intent of TCP-AO is to deprecate TCP-MD5 providing better security, 17 .. table:: Short and Limited Comparison of TCP-AO and TCP-MD5 20 | | TCP-MD5 | TCP-AO | 22 |Supported hashing |MD5 |Must support HMAC-SHA1 | 205 Q: Can TCP-MD5 connection migrate to TCP-AO (and vice-versa): 209 TCP MD5-protected connections cannot be migrated to TCP-AO because TCP MD5 245 to TCP-MD5. It means that a userspace application that wants to use TCP-AO 255 ``setsockopt()s`` for TCP-MD5 support. 364 In contrast with an established TCP-MD5 connection which has just one key, 387 This is a similar "do-nothing" approach to TCP-MD5 from the kernel side and [all …]
|
| /linux/drivers/crypto/caam/ |
| H A D | key_gen.h | 11 * @hash: Hashing algorithm selection, one of OP_ALG_ALGSEL_* - MD5, SHA1, 18 /* Sizes for MDHA pads (*not* keys): MD5, SHA1, 224, 256, 384, 512 */ in split_key_len() 29 * @hash: Hashing algorithm selection, one of OP_ALG_ALGSEL_* - MD5, SHA1,
|
| H A D | caamalg.c | 2246 .cra_name = "authenc(hmac(md5)," 2248 .cra_driver_name = "authenc-hmac-md5-" 2390 .cra_name = "authenc(hmac(md5),cbc(aes))", 2391 .cra_driver_name = "authenc-hmac-md5-" 2414 .cra_name = "echainiv(authenc(hmac(md5)," 2416 .cra_driver_name = "echainiv-authenc-hmac-md5-" 2690 .cra_name = "authenc(hmac(md5),cbc(des3_ede))", 2691 .cra_driver_name = "authenc-hmac-md5-" 2714 .cra_name = "echainiv(authenc(hmac(md5)," 2716 .cra_driver_name = "echainiv-authenc-hmac-md5-" [all …]
|
| H A D | caamalg_qi.c | 1653 .cra_name = "authenc(hmac(md5),cbc(aes))", 1654 .cra_driver_name = "authenc-hmac-md5-" 1674 .cra_name = "echainiv(authenc(hmac(md5)," 1676 .cra_driver_name = "echainiv-authenc-hmac-md5-" 1920 .cra_name = "authenc(hmac(md5),cbc(des3_ede))", 1921 .cra_driver_name = "authenc-hmac-md5-" 1941 .cra_name = "echainiv(authenc(hmac(md5)," 1943 .cra_driver_name = "echainiv-authenc-hmac-md5-" 2194 .cra_name = "authenc(hmac(md5),cbc(des))", 2195 .cra_driver_name = "authenc-hmac-md5-" [all …]
|
| /linux/arch/mips/include/asm/octeon/ |
| H A D | crypto.h | 8 * MD5/SHA1/SHA256/SHA512 instruction definitions added by 25 * Macros needed to implement MD5/SHA1/SHA256: 29 * The index can be 0-1 (MD5) or 0-2 (SHA1), 0-3 (SHA256). 40 * The index can be 0-1 (MD5) or 0-2 (SHA1), 0-3 (SHA256).
|
| /linux/fs/smb/client/ |
| H A D | smb1encrypt.c | 13 #include <crypto/md5.h> 35 "MD5 signature support is disabled due to FIPS\n"); in cifs_calc_signature() 44 &(struct cifs_calc_sig_ctx){ .md5 = &ctx }); in cifs_calc_signature()
|
| /linux/Documentation/devicetree/bindings/crypto/ |
| H A D | samsung-sss.yaml | 18 -- SHA-1/SHA-256/MD5/HMAC (SHA-1/SHA-256/MD5)/PRNG
|
| /linux/drivers/crypto/ccree/ |
| H A D | cc_hash.h | 87 * @mode: The Hash mode. Supported modes: MD5/SHA1/SHA224/SHA256/SHA384/SHA512 99 * @mode: The Hash mode. Supported modes: MD5/SHA1/SHA224/SHA256/SHA384/SHA512
|
| /linux/drivers/crypto/ |
| H A D | sa2ul.h | 73 #define SA_ENG_ID_AM1 4 /* Auth. engine with SHA1/MD5/SHA2 core */ 362 SA_AALG_ID_MD5, /* MD5 mode */ 367 SA_AALG_ID_HMAC_MD5, /* HMAC with MD5 mode */
|
| /linux/kernel/ |
| H A D | .gitignore | 3 /kheaders.md5
|
| /linux/include/net/ |
| H A D | dropreason-core.h | 212 * @SKB_DROP_REASON_TCP_AUTH_HDR: TCP-MD5 or TCP-AO hashes are met 217 * @SKB_DROP_REASON_TCP_MD5NOTFOUND: no MD5 hash and one expected, 222 * @SKB_DROP_REASON_TCP_MD5UNEXPECTED: MD5 hash and we're not expecting 227 * @SKB_DROP_REASON_TCP_MD5FAILURE: MD5 hash and its wrong, corresponding
|
| /linux/Documentation/security/ |
| H A D | IMA-templates.rst | 10 and pathname. The filedata hash is limited to 20 bytes (md5/sha1). 66 calculated with the SHA1 or MD5 hash algorithm;
|
| /linux/lib/crypto/powerpc/ |
| H A D | md5.h | 3 * MD5 optimized for PowerPC
|
| /linux/Documentation/crypto/ |
| H A D | api-intro.rst | 63 tfm = crypto_alloc_ahash("md5", 0, CRYPTO_ALG_ASYNC); 192 - Colin Plumb (MD5)
|
| /linux/drivers/target/iscsi/ |
| H A D | iscsi_target_auth.h | 18 #define MD5_SIGNATURE_SIZE 16 /* 16 bytes in a MD5 message digest */
|
| /linux/drivers/crypto/allwinner/sun4i-ss/ |
| H A D | sun4i-ss.h | 8 * Support MD5 and SHA1 hash algorithms. 26 #include <crypto/md5.h>
|
| /linux/drivers/crypto/allwinner/sun8i-ss/ |
| H A D | sun8i-ss-hash.c | 8 * This file add support for MD5 and SHA1/SHA224/SHA256. 15 #include <crypto/md5.h> 373 * since SS support only MD5,sha1,sha224 and sha256, blocksize in sun8i_ss_hash_need_fallback() 447 /* MD5 */ in hash_pad()
|