Home
last modified time | relevance | path

Searched full:md5 (Results 1 – 25 of 118) sorted by relevance

12345

/linux/include/crypto/
H A Dmd5.h31 /* State for the MD5 compression function */
37 * struct md5_ctx - Context for hashing a message with MD5
49 * md5_init() - Initialize an MD5 context for a new message
52 * If you don't need incremental computation, consider md5() instead.
59 * md5_update() - Update an MD5 context with message data
71 * md5_final() - Finish computing an MD5 message digest
73 * @out: (output) the resulting MD5 message digest
82 * md5() - Compute MD5 message digest in one shot
85 * @out: (output) the resulting MD5 message digest
89 void md5(const u8 *data, size_t len, u8 out[MD5_DIGEST_SIZE]);
[all …]
/linux/tools/testing/selftests/net/tcp_ao/
H A Dunsigned-md5.c139 try_accept("TCP-AO established: add TCP-MD5 key", (*port)++, NULL, 0, in server_add_fail_tests()
142 try_accept("TCP-MD5 established: add TCP-AO key", (*port)++, &addr_any, in server_add_fail_tests()
163 try_accept("[server] AO server (INADDR_ANY): MD5 client", port++, NULL, 0, in server_fn()
177 try_accept("[server] MD5 server (INADDR_ANY): AO client", port++, &addr_any, 0, in server_fn()
180 try_accept("[server] MD5 server (INADDR_ANY): MD5 client", port++, &addr_any, 0, in server_fn()
182 try_accept("[server] MD5 server (INADDR_ANY): no sign client", port++, &addr_any, in server_fn()
189 try_accept("[server] no sign server: MD5 client", port++, NULL, 0, in server_fn()
195 try_accept("[server] AO+MD5 server: AO client (matching)", port++, in server_fn()
198 try_accept("[server] AO+MD5 server: AO client (misconfig, matching MD5)", port++, in server_fn()
202 try_accept("[server] AO+MD5 server: AO client (misconfig, non-matching)", port++, in server_fn()
[all …]
/linux/crypto/
H A Dmd5.c3 * Crypto API support for MD5 and HMAC-MD5
8 #include <crypto/md5.h>
15 * library MD5 context, except the value in bytecount must be block-aligned and
91 md5(data, len, out); in crypto_md5_digest()
179 .base.cra_name = "md5",
180 .base.cra_driver_name = "md5-lib",
197 .base.cra_name = "hmac(md5)",
198 .base.cra_driver_name = "hmac-md5-lib",
231 MODULE_DESCRIPTION("Crypto API support for MD5 and HMAC-MD5");
233 MODULE_ALIAS_CRYPTO("md5");
[all …]
/linux/lib/crypto/tests/
H A Dmd5_kunit.c5 #include <crypto/md5.h>
6 #include "md5-testvecs.h"
8 #define HASH md5
31 .name = "md5",
38 MODULE_DESCRIPTION("KUnit tests and benchmark for MD5 and HMAC-MD5");
H A DKconfig23 tristate "KUnit tests for MD5" if !KUNIT_ALL_TESTS
29 KUnit tests for the MD5 cryptographic hash function and its
/linux/net/sctp/
H A DKconfig
/linux/tools/testing/selftests/net/packetdrill/
H A Dtcp_md5_md5-only-on-client-ack.pkt2 // Test what happens when client does not provide MD5 on SYN,
15 // Ooh, weird: client provides MD5 option on the ACK:
16 +.01 < . 1:1(0) ack 1 win 514 <md5 000102030405060708090a0b0c0d0e0f,nop,nop>
17 +.01 < . 1:1(0) ack 1 win 514 <md5 000102030405060708090a0b0c0d0e0f,nop,nop>
/linux/tools/testing/selftests/net/
H A Dfcnal-test.sh869 # MD5 tests without VRF
882 log_test $? 0 "MD5: Single address config"
884 # client sends MD5, server not configured
886 show_hint "Should timeout due to MD5 mismatch"
890 log_test $? 2 "MD5: Server no config, client uses password"
898 log_test $? 2 "MD5: Client uses wrong password"
902 show_hint "Should timeout due to MD5 mismatch"
906 log_test $? 2 "MD5: Client address does not match address configured with password"
909 # MD5 extension - prefix length
917 log_test $? 0 "MD5
[all...]
/linux/lib/crypto/
H A Dmd5.c3 * MD5 and HMAC-MD5 library functions
14 #include <crypto/md5.h>
132 #include "md5.h" /* $(SRCARCH)/md5.h */
203 void md5(const u8 *data, size_t len, u8 out[MD5_DIGEST_SIZE]) in md5() function
211 EXPORT_SYMBOL_GPL(md5);
223 md5(raw_key, raw_key_len, derived_key.b); in __hmac_md5_preparekey()
321 MODULE_DESCRIPTION("MD5 and HMAC-MD5 library functions");
H A DKconfig82 The MD5 and HMAC-MD5 library functions. Select this if your module
83 uses any of the functions from <crypto/md5.h>.
/linux/Documentation/networking/
H A Dtcp_ao.rst11 The intent of TCP-AO is to deprecate TCP-MD5 providing better security,
17 .. table:: Short and Limited Comparison of TCP-AO and TCP-MD5
20 | | TCP-MD5 | TCP-AO |
22 |Supported hashing |MD5 |Must support HMAC-SHA1 |
205 Q: Can TCP-MD5 connection migrate to TCP-AO (and vice-versa):
209 TCP MD5-protected connections cannot be migrated to TCP-AO because TCP MD5
245 to TCP-MD5. It means that a userspace application that wants to use TCP-AO
255 ``setsockopt()s`` for TCP-MD5 support.
364 In contrast with an established TCP-MD5 connection which has just one key,
387 This is a similar "do-nothing" approach to TCP-MD5 from the kernel side and
[all …]
/linux/drivers/crypto/caam/
H A Dkey_gen.h11 * @hash: Hashing algorithm selection, one of OP_ALG_ALGSEL_* - MD5, SHA1,
18 /* Sizes for MDHA pads (*not* keys): MD5, SHA1, 224, 256, 384, 512 */ in split_key_len()
29 * @hash: Hashing algorithm selection, one of OP_ALG_ALGSEL_* - MD5, SHA1,
/linux/lib/crypto/sparc/
H A Dmd5.h3 * MD5 accelerated using the sparc64 crypto opcodes
47 pr_info("Using sparc64 md5 opcode optimized MD5 implementation\n"); in md5_mod_init_arch()
H A Dmd5_asm.S26 MD5
62 MD5
/linux/arch/mips/include/asm/octeon/
H A Dcrypto.h8 * MD5/SHA1/SHA256/SHA512 instruction definitions added by
25 * Macros needed to implement MD5/SHA1/SHA256:
29 * The index can be 0-1 (MD5) or 0-2 (SHA1), 0-3 (SHA256).
40 * The index can be 0-1 (MD5) or 0-2 (SHA1), 0-3 (SHA256).
/linux/fs/smb/client/
H A Dcifsencrypt.c27 #include <crypto/md5.h>
33 if (ctx->md5) { in cifs_sig_update()
34 md5_update(ctx->md5, data, len); in cifs_sig_update()
46 if (ctx->md5) { in cifs_sig_final()
47 md5_final(ctx->md5, out); in cifs_sig_final()
148 "MD5 signature support is disabled due to FIPS\n"); in cifs_calc_signature()
157 &(struct cifs_calc_sig_ctx){ .md5 = &ctx }); in cifs_calc_signature()
493 /* The MD5 hash starts at challenge_key.key */ in CalcNTLMv2_response()
502 /* Note that the HMAC-MD5 value overwrites ntlmv2->challenge.key */ in CalcNTLMv2_response()
/linux/Documentation/devicetree/bindings/crypto/
H A Dsamsung-sss.yaml18 -- SHA-1/SHA-256/MD5/HMAC (SHA-1/SHA-256/MD5)/PRNG
/linux/lib/crypto/mips/
H A Dmd5.h4 * MD5 Message Digest Algorithm (RFC1321).
8 * Based on crypto/md5.c, which is:
/linux/drivers/crypto/ccree/
H A Dcc_hash.h87 * @mode: The Hash mode. Supported modes: MD5/SHA1/SHA224/SHA256/SHA384/SHA512
99 * @mode: The Hash mode. Supported modes: MD5/SHA1/SHA224/SHA256/SHA384/SHA512
/linux/kernel/
H A DMakefile176 …z: $(src)/gen_kheaders.sh $(obj)/kheaders-srclist $(obj)/kheaders-objlist $(obj)/kheaders.md5 FORCE
204 $(obj)/kheaders.md5: $(obj)/kheaders-srclist FORCE
207 clean-files := kheaders.md5 kheaders-srclist kheaders-objlist
H A D.gitignore3 /kheaders.md5
/linux/Documentation/admin-guide/
H A Dbcache.rst173 host:/sys/block/md5/bcache# echo 0226553a-37cf-41d5-b3ce-8b1e944543a8 > attach
174 [ 1933.455082] bcache: bch_cached_dev_attach() Couldn't find uuid for md5 in set
181 host:/sys/block/md5/bcache# echo /dev/sdh2 > /sys/fs/bcache/register
235 host:/sys/block/md5/bcache# echo 1 > running
239 host:/sys/block/md5/bcache# echo 5bc072a8-ab17-446d-9744-e247949913c1 > attach
240 …[ 865.276616] bcache: bch_cached_dev_attach() Caching md5 as bcache0 on set 5bc072a8-ab17-446d-97…
/linux/drivers/crypto/
H A Dsa2ul.h73 #define SA_ENG_ID_AM1 4 /* Auth. engine with SHA1/MD5/SHA2 core */
362 SA_AALG_ID_MD5, /* MD5 mode */
367 SA_AALG_ID_HMAC_MD5, /* HMAC with MD5 mode */
/linux/include/net/
H A Ddropreason-core.h213 * @SKB_DROP_REASON_TCP_AUTH_HDR: TCP-MD5 or TCP-AO hashes are met
218 * @SKB_DROP_REASON_TCP_MD5NOTFOUND: no MD5 hash and one expected,
223 * @SKB_DROP_REASON_TCP_MD5UNEXPECTED: MD5 hash and we're not expecting
228 * @SKB_DROP_REASON_TCP_MD5FAILURE: MD5 hash and its wrong, corresponding
/linux/lib/crypto/powerpc/
H A Dmd5.h3 * MD5 optimized for PowerPC

12345