Home
last modified time | relevance | path

Searched full:md5 (Results 1 – 25 of 100) sorted by relevance

1234

/linux/include/crypto/
H A Dmd5.h31 /* State for the MD5 compression function */
37 * struct md5_ctx - Context for hashing a message with MD5
49 * md5_init() - Initialize an MD5 context for a new message
52 * If you don't need incremental computation, consider md5() instead.
59 * md5_update() - Update an MD5 context with message data
71 * md5_final() - Finish computing an MD5 message digest
73 * @out: (output) the resulting MD5 message digest
82 * md5() - Compute MD5 message digest in one shot
85 * @out: (output) the resulting MD5 message digest
89 void md5(const u8 *data, size_t len, u8 out[at_least MD5_DIGEST_SIZE]);
[all …]
H A Dhash_info.h14 #include <crypto/md5.h>
/linux/tools/testing/selftests/net/tcp_ao/
H A Dunsigned-md5.c139 try_accept("TCP-AO established: add TCP-MD5 key", (*port)++, NULL, 0, in server_add_fail_tests()
142 try_accept("TCP-MD5 established: add TCP-AO key", (*port)++, &addr_any, in server_add_fail_tests()
163 try_accept("[server] AO server (INADDR_ANY): MD5 client", port++, NULL, 0, in server_fn()
177 try_accept("[server] MD5 server (INADDR_ANY): AO client", port++, &addr_any, 0, in server_fn()
180 try_accept("[server] MD5 server (INADDR_ANY): MD5 client", port++, &addr_any, 0, in server_fn()
182 try_accept("[server] MD5 server (INADDR_ANY): no sign client", port++, &addr_any, in server_fn()
189 try_accept("[server] no sign server: MD5 client", port++, NULL, 0, in server_fn()
195 try_accept("[server] AO+MD5 server: AO client (matching)", port++, in server_fn()
198 try_accept("[server] AO+MD5 server: AO client (misconfig, matching MD5)", port++, in server_fn()
202 try_accept("[server] AO+MD5 server: AO client (misconfig, non-matching)", port++, in server_fn()
[all …]
/linux/crypto/
H A Dmd5.c3 * Crypto API support for MD5 and HMAC-MD5
8 #include <crypto/md5.h>
15 * library MD5 context, except the value in bytecount must be block-aligned and
91 md5(data, len, out); in crypto_md5_digest()
179 .base.cra_name = "md5",
180 .base.cra_driver_name = "md5-lib",
197 .base.cra_name = "hmac(md5)",
198 .base.cra_driver_name = "hmac-md5-lib",
231 MODULE_DESCRIPTION("Crypto API support for MD5 and HMAC-MD5");
233 MODULE_ALIAS_CRYPTO("md5");
[all …]
/linux/lib/crypto/tests/
H A Dmd5_kunit.c5 #include <crypto/md5.h>
6 #include "md5-testvecs.h"
8 #define HASH md5
31 .name = "md5",
38 MODULE_DESCRIPTION("KUnit tests and benchmark for MD5 and HMAC-MD5");
H A DKconfig56 tristate "KUnit tests for MD5" if !KUNIT_ALL_TESTS
61 KUnit tests for the MD5 cryptographic hash function and its
/linux/tools/testing/selftests/net/packetdrill/
H A Dtcp_md5_md5-only-on-client-ack.pkt2 // Test what happens when client does not provide MD5 on SYN,
15 // Ooh, weird: client provides MD5 option on the ACK:
16 +.01 < . 1:1(0) ack 1 win 514 <md5 000102030405060708090a0b0c0d0e0f,nop,nop>
17 +.01 < . 1:1(0) ack 1 win 514 <md5 000102030405060708090a0b0c0d0e0f,nop,nop>
/linux/tools/testing/selftests/net/
H A Dfcnal-test.sh869 # MD5 tests without VRF
882 log_test $? 0 "MD5: Single address config"
884 # client sends MD5, server not configured
886 show_hint "Should timeout due to MD5 mismatch"
890 log_test $? 2 "MD5: Server no config, client uses password"
898 log_test $? 2 "MD5: Client uses wrong password"
902 show_hint "Should timeout due to MD5 mismatch"
906 log_test $? 2 "MD5: Client address does not match address configured with password"
909 # MD5 extension - prefix length
917 log_test $? 0 "MD5: Prefix config"
[all …]
/linux/Documentation/networking/
H A Dtcp_ao.rst11 The intent of TCP-AO is to deprecate TCP-MD5 providing better security,
17 .. table:: Short and Limited Comparison of TCP-AO and TCP-MD5
20 | | TCP-MD5 | TCP-AO |
22 |Supported hashing |MD5 |Must support HMAC-SHA1 |
205 Q: Can TCP-MD5 connection migrate to TCP-AO (and vice-versa):
209 TCP MD5-protected connections cannot be migrated to TCP-AO because TCP MD5
245 to TCP-MD5. It means that a userspace application that wants to use TCP-AO
255 ``setsockopt()s`` for TCP-MD5 support.
364 In contrast with an established TCP-MD5 connection which has just one key,
387 This is a similar "do-nothing" approach to TCP-MD5 from the kernel side and
[all …]
/linux/drivers/crypto/caam/
H A Dkey_gen.h11 * @hash: Hashing algorithm selection, one of OP_ALG_ALGSEL_* - MD5, SHA1,
18 /* Sizes for MDHA pads (*not* keys): MD5, SHA1, 224, 256, 384, 512 */ in split_key_len()
29 * @hash: Hashing algorithm selection, one of OP_ALG_ALGSEL_* - MD5, SHA1,
H A Dcaamalg.c2246 .cra_name = "authenc(hmac(md5),"
2248 .cra_driver_name = "authenc-hmac-md5-"
2390 .cra_name = "authenc(hmac(md5),cbc(aes))",
2391 .cra_driver_name = "authenc-hmac-md5-"
2414 .cra_name = "echainiv(authenc(hmac(md5),"
2416 .cra_driver_name = "echainiv-authenc-hmac-md5-"
2690 .cra_name = "authenc(hmac(md5),cbc(des3_ede))",
2691 .cra_driver_name = "authenc-hmac-md5-"
2714 .cra_name = "echainiv(authenc(hmac(md5),"
2716 .cra_driver_name = "echainiv-authenc-hmac-md5-"
[all …]
H A Dcaamalg_qi.c1653 .cra_name = "authenc(hmac(md5),cbc(aes))",
1654 .cra_driver_name = "authenc-hmac-md5-"
1674 .cra_name = "echainiv(authenc(hmac(md5),"
1676 .cra_driver_name = "echainiv-authenc-hmac-md5-"
1920 .cra_name = "authenc(hmac(md5),cbc(des3_ede))",
1921 .cra_driver_name = "authenc-hmac-md5-"
1941 .cra_name = "echainiv(authenc(hmac(md5),"
1943 .cra_driver_name = "echainiv-authenc-hmac-md5-"
2194 .cra_name = "authenc(hmac(md5),cbc(des))",
2195 .cra_driver_name = "authenc-hmac-md5-"
[all …]
/linux/arch/mips/include/asm/octeon/
H A Dcrypto.h8 * MD5/SHA1/SHA256/SHA512 instruction definitions added by
25 * Macros needed to implement MD5/SHA1/SHA256:
29 * The index can be 0-1 (MD5) or 0-2 (SHA1), 0-3 (SHA256).
40 * The index can be 0-1 (MD5) or 0-2 (SHA1), 0-3 (SHA256).
/linux/fs/smb/client/
H A Dsmb1encrypt.c13 #include <crypto/md5.h>
35 "MD5 signature support is disabled due to FIPS\n"); in cifs_calc_signature()
44 &(struct cifs_calc_sig_ctx){ .md5 = &ctx }); in cifs_calc_signature()
/linux/Documentation/devicetree/bindings/crypto/
H A Dsamsung-sss.yaml18 -- SHA-1/SHA-256/MD5/HMAC (SHA-1/SHA-256/MD5)/PRNG
/linux/drivers/crypto/ccree/
H A Dcc_hash.h87 * @mode: The Hash mode. Supported modes: MD5/SHA1/SHA224/SHA256/SHA384/SHA512
99 * @mode: The Hash mode. Supported modes: MD5/SHA1/SHA224/SHA256/SHA384/SHA512
/linux/drivers/crypto/
H A Dsa2ul.h73 #define SA_ENG_ID_AM1 4 /* Auth. engine with SHA1/MD5/SHA2 core */
362 SA_AALG_ID_MD5, /* MD5 mode */
367 SA_AALG_ID_HMAC_MD5, /* HMAC with MD5 mode */
/linux/kernel/
H A D.gitignore3 /kheaders.md5
/linux/include/net/
H A Ddropreason-core.h212 * @SKB_DROP_REASON_TCP_AUTH_HDR: TCP-MD5 or TCP-AO hashes are met
217 * @SKB_DROP_REASON_TCP_MD5NOTFOUND: no MD5 hash and one expected,
222 * @SKB_DROP_REASON_TCP_MD5UNEXPECTED: MD5 hash and we're not expecting
227 * @SKB_DROP_REASON_TCP_MD5FAILURE: MD5 hash and its wrong, corresponding
/linux/Documentation/security/
H A DIMA-templates.rst10 and pathname. The filedata hash is limited to 20 bytes (md5/sha1).
66 calculated with the SHA1 or MD5 hash algorithm;
/linux/lib/crypto/powerpc/
H A Dmd5.h3 * MD5 optimized for PowerPC
/linux/Documentation/crypto/
H A Dapi-intro.rst63 tfm = crypto_alloc_ahash("md5", 0, CRYPTO_ALG_ASYNC);
192 - Colin Plumb (MD5)
/linux/drivers/target/iscsi/
H A Discsi_target_auth.h18 #define MD5_SIGNATURE_SIZE 16 /* 16 bytes in a MD5 message digest */
/linux/drivers/crypto/allwinner/sun4i-ss/
H A Dsun4i-ss.h8 * Support MD5 and SHA1 hash algorithms.
26 #include <crypto/md5.h>
/linux/drivers/crypto/allwinner/sun8i-ss/
H A Dsun8i-ss-hash.c8 * This file add support for MD5 and SHA1/SHA224/SHA256.
15 #include <crypto/md5.h>
373 * since SS support only MD5,sha1,sha224 and sha256, blocksize in sun8i_ss_hash_need_fallback()
447 /* MD5 */ in hash_pad()

1234