/linux/include/crypto/ |
H A D | md5.h | 31 /* State for the MD5 compression function */ 37 * struct md5_ctx - Context for hashing a message with MD5 49 * md5_init() - Initialize an MD5 context for a new message 52 * If you don't need incremental computation, consider md5() instead. 59 * md5_update() - Update an MD5 context with message data 71 * md5_final() - Finish computing an MD5 message digest 73 * @out: (output) the resulting MD5 message digest 82 * md5() - Compute MD5 message digest in one shot 85 * @out: (output) the resulting MD5 message digest 89 void md5(const u8 *data, size_t len, u8 out[MD5_DIGEST_SIZE]); [all …]
|
/linux/tools/testing/selftests/net/tcp_ao/ |
H A D | unsigned-md5.c | 139 try_accept("TCP-AO established: add TCP-MD5 key", (*port)++, NULL, 0, in server_add_fail_tests() 142 try_accept("TCP-MD5 established: add TCP-AO key", (*port)++, &addr_any, in server_add_fail_tests() 163 try_accept("[server] AO server (INADDR_ANY): MD5 client", port++, NULL, 0, in server_fn() 177 try_accept("[server] MD5 server (INADDR_ANY): AO client", port++, &addr_any, 0, in server_fn() 180 try_accept("[server] MD5 server (INADDR_ANY): MD5 client", port++, &addr_any, 0, in server_fn() 182 try_accept("[server] MD5 server (INADDR_ANY): no sign client", port++, &addr_any, in server_fn() 189 try_accept("[server] no sign server: MD5 client", port++, NULL, 0, in server_fn() 195 try_accept("[server] AO+MD5 server: AO client (matching)", port++, in server_fn() 198 try_accept("[server] AO+MD5 server: AO client (misconfig, matching MD5)", port++, in server_fn() 202 try_accept("[server] AO+MD5 server: AO client (misconfig, non-matching)", port++, in server_fn() [all …]
|
/linux/crypto/ |
H A D | md5.c | 3 * Crypto API support for MD5 and HMAC-MD5 8 #include <crypto/md5.h> 15 * library MD5 context, except the value in bytecount must be block-aligned and 91 md5(data, len, out); in crypto_md5_digest() 179 .base.cra_name = "md5", 180 .base.cra_driver_name = "md5-lib", 197 .base.cra_name = "hmac(md5)", 198 .base.cra_driver_name = "hmac-md5-lib", 231 MODULE_DESCRIPTION("Crypto API support for MD5 and HMAC-MD5"); 233 MODULE_ALIAS_CRYPTO("md5"); [all …]
|
/linux/lib/crypto/tests/ |
H A D | md5_kunit.c | 5 #include <crypto/md5.h> 6 #include "md5-testvecs.h" 8 #define HASH md5 31 .name = "md5", 38 MODULE_DESCRIPTION("KUnit tests and benchmark for MD5 and HMAC-MD5");
|
H A D | Kconfig | 23 tristate "KUnit tests for MD5" if !KUNIT_ALL_TESTS 29 KUnit tests for the MD5 cryptographic hash function and its
|
/linux/net/sctp/ |
H A D | Kconfig |
|
/linux/tools/testing/selftests/net/packetdrill/ |
H A D | tcp_md5_md5-only-on-client-ack.pkt | 2 // Test what happens when client does not provide MD5 on SYN, 15 // Ooh, weird: client provides MD5 option on the ACK: 16 +.01 < . 1:1(0) ack 1 win 514 <md5 000102030405060708090a0b0c0d0e0f,nop,nop> 17 +.01 < . 1:1(0) ack 1 win 514 <md5 000102030405060708090a0b0c0d0e0f,nop,nop>
|
/linux/tools/testing/selftests/net/ |
H A D | fcnal-test.sh | 869 # MD5 tests without VRF 882 log_test $? 0 "MD5: Single address config" 884 # client sends MD5, server not configured 886 show_hint "Should timeout due to MD5 mismatch" 890 log_test $? 2 "MD5: Server no config, client uses password" 898 log_test $? 2 "MD5: Client uses wrong password" 902 show_hint "Should timeout due to MD5 mismatch" 906 log_test $? 2 "MD5: Client address does not match address configured with password" 909 # MD5 extension - prefix length 917 log_test $? 0 "MD5 [all...] |
/linux/lib/crypto/ |
H A D | md5.c | 3 * MD5 and HMAC-MD5 library functions 14 #include <crypto/md5.h> 132 #include "md5.h" /* $(SRCARCH)/md5.h */ 203 void md5(const u8 *data, size_t len, u8 out[MD5_DIGEST_SIZE]) in md5() function 211 EXPORT_SYMBOL_GPL(md5); 223 md5(raw_key, raw_key_len, derived_key.b); in __hmac_md5_preparekey() 321 MODULE_DESCRIPTION("MD5 and HMAC-MD5 library functions");
|
H A D | Kconfig | 82 The MD5 and HMAC-MD5 library functions. Select this if your module 83 uses any of the functions from <crypto/md5.h>.
|
/linux/Documentation/networking/ |
H A D | tcp_ao.rst | 11 The intent of TCP-AO is to deprecate TCP-MD5 providing better security, 17 .. table:: Short and Limited Comparison of TCP-AO and TCP-MD5 20 | | TCP-MD5 | TCP-AO | 22 |Supported hashing |MD5 |Must support HMAC-SHA1 | 205 Q: Can TCP-MD5 connection migrate to TCP-AO (and vice-versa): 209 TCP MD5-protected connections cannot be migrated to TCP-AO because TCP MD5 245 to TCP-MD5. It means that a userspace application that wants to use TCP-AO 255 ``setsockopt()s`` for TCP-MD5 support. 364 In contrast with an established TCP-MD5 connection which has just one key, 387 This is a similar "do-nothing" approach to TCP-MD5 from the kernel side and [all …]
|
/linux/drivers/crypto/caam/ |
H A D | key_gen.h | 11 * @hash: Hashing algorithm selection, one of OP_ALG_ALGSEL_* - MD5, SHA1, 18 /* Sizes for MDHA pads (*not* keys): MD5, SHA1, 224, 256, 384, 512 */ in split_key_len() 29 * @hash: Hashing algorithm selection, one of OP_ALG_ALGSEL_* - MD5, SHA1,
|
/linux/lib/crypto/sparc/ |
H A D | md5.h | 3 * MD5 accelerated using the sparc64 crypto opcodes 47 pr_info("Using sparc64 md5 opcode optimized MD5 implementation\n"); in md5_mod_init_arch()
|
H A D | md5_asm.S | 26 MD5 62 MD5
|
/linux/arch/mips/include/asm/octeon/ |
H A D | crypto.h | 8 * MD5/SHA1/SHA256/SHA512 instruction definitions added by 25 * Macros needed to implement MD5/SHA1/SHA256: 29 * The index can be 0-1 (MD5) or 0-2 (SHA1), 0-3 (SHA256). 40 * The index can be 0-1 (MD5) or 0-2 (SHA1), 0-3 (SHA256).
|
/linux/fs/smb/client/ |
H A D | cifsencrypt.c | 27 #include <crypto/md5.h> 33 if (ctx->md5) { in cifs_sig_update() 34 md5_update(ctx->md5, data, len); in cifs_sig_update() 46 if (ctx->md5) { in cifs_sig_final() 47 md5_final(ctx->md5, out); in cifs_sig_final() 148 "MD5 signature support is disabled due to FIPS\n"); in cifs_calc_signature() 157 &(struct cifs_calc_sig_ctx){ .md5 = &ctx }); in cifs_calc_signature() 493 /* The MD5 hash starts at challenge_key.key */ in CalcNTLMv2_response() 502 /* Note that the HMAC-MD5 value overwrites ntlmv2->challenge.key */ in CalcNTLMv2_response()
|
/linux/Documentation/devicetree/bindings/crypto/ |
H A D | samsung-sss.yaml | 18 -- SHA-1/SHA-256/MD5/HMAC (SHA-1/SHA-256/MD5)/PRNG
|
/linux/lib/crypto/mips/ |
H A D | md5.h | 4 * MD5 Message Digest Algorithm (RFC1321). 8 * Based on crypto/md5.c, which is:
|
/linux/drivers/crypto/ccree/ |
H A D | cc_hash.h | 87 * @mode: The Hash mode. Supported modes: MD5/SHA1/SHA224/SHA256/SHA384/SHA512 99 * @mode: The Hash mode. Supported modes: MD5/SHA1/SHA224/SHA256/SHA384/SHA512
|
/linux/kernel/ |
H A D | Makefile | 176 …z: $(src)/gen_kheaders.sh $(obj)/kheaders-srclist $(obj)/kheaders-objlist $(obj)/kheaders.md5 FORCE 204 $(obj)/kheaders.md5: $(obj)/kheaders-srclist FORCE 207 clean-files := kheaders.md5 kheaders-srclist kheaders-objlist
|
H A D | .gitignore | 3 /kheaders.md5
|
/linux/Documentation/admin-guide/ |
H A D | bcache.rst | 173 host:/sys/block/md5/bcache# echo 0226553a-37cf-41d5-b3ce-8b1e944543a8 > attach 174 [ 1933.455082] bcache: bch_cached_dev_attach() Couldn't find uuid for md5 in set 181 host:/sys/block/md5/bcache# echo /dev/sdh2 > /sys/fs/bcache/register 235 host:/sys/block/md5/bcache# echo 1 > running 239 host:/sys/block/md5/bcache# echo 5bc072a8-ab17-446d-9744-e247949913c1 > attach 240 …[ 865.276616] bcache: bch_cached_dev_attach() Caching md5 as bcache0 on set 5bc072a8-ab17-446d-97…
|
/linux/drivers/crypto/ |
H A D | sa2ul.h | 73 #define SA_ENG_ID_AM1 4 /* Auth. engine with SHA1/MD5/SHA2 core */ 362 SA_AALG_ID_MD5, /* MD5 mode */ 367 SA_AALG_ID_HMAC_MD5, /* HMAC with MD5 mode */
|
/linux/include/net/ |
H A D | dropreason-core.h | 213 * @SKB_DROP_REASON_TCP_AUTH_HDR: TCP-MD5 or TCP-AO hashes are met 218 * @SKB_DROP_REASON_TCP_MD5NOTFOUND: no MD5 hash and one expected, 223 * @SKB_DROP_REASON_TCP_MD5UNEXPECTED: MD5 hash and we're not expecting 228 * @SKB_DROP_REASON_TCP_MD5FAILURE: MD5 hash and its wrong, corresponding
|
/linux/lib/crypto/powerpc/ |
H A D | md5.h | 3 * MD5 optimized for PowerPC
|