| /linux/fs/ubifs/ |
| H A D | auth.c | 46 u8 *hmac) in ubifs_hash_calc_hmac() argument 48 return crypto_shash_tfm_digest(c->hmac_tfm, hash, c->hash_len, hmac); in ubifs_hash_calc_hmac() 80 err = ubifs_hash_calc_hmac(c, hash, auth->hmac); in ubifs_prepare_auth_node() 388 int len, int ofs_hmac, void *hmac) in ubifs_node_calc_hmac() argument 416 return crypto_shash_final(shash, hmac); in ubifs_node_calc_hmac() 451 u8 *hmac; in __ubifs_node_verify_hmac() local 454 hmac = kmalloc(hmac_len, GFP_NOFS); in __ubifs_node_verify_hmac() 455 if (!hmac) in __ubifs_node_verify_hmac() 458 err = ubifs_node_calc_hmac(c, node, len, ofs_hmac, hmac); in __ubifs_node_verify_hmac() 460 kfree(hmac); in __ubifs_node_verify_hmac() [all …]
|
| H A D | master.c | 28 int hmac_offs = offsetof(struct ubifs_mst_node, hmac); in ubifs_compare_master_node() 138 if (ubifs_hmac_zero(c, c->mst_node->hmac)) { in scan_for_master() 146 offsetof(struct ubifs_mst_node, hmac)); in scan_for_master() 461 offsetof(struct ubifs_mst_node, hmac)); in ubifs_write_master() 473 offsetof(struct ubifs_mst_node, hmac)); in ubifs_write_master()
|
| H A D | ubifs-media.h | 678 __u8 hmac[UBIFS_MAX_HMAC_LEN]; member 754 __u8 hmac[UBIFS_MAX_HMAC_LEN]; member 781 __u8 hmac[]; member
|
| H A D | sb.c | 323 offsetof(struct ubifs_sb_node, hmac)); in create_default_filesystem() 343 offsetof(struct ubifs_mst_node, hmac)); in create_default_filesystem() 348 0, offsetof(struct ubifs_mst_node, hmac)); in create_default_filesystem() 587 if (ubifs_hmac_zero(c, sup->hmac)) { in authenticate_sb_node() 599 hmac)); in authenticate_sb_node() 621 offsetof(struct ubifs_sb_node, hmac), 1); in ubifs_write_sb_node()
|
| /linux/net/mptcp/ |
| H A D | crypto_test.c | 35 char hmac[32], hmac_hex[65]; in mptcp_crypto_test_basic() local 51 mptcp_crypto_hmac_sha(key1, key2, msg, 8, hmac); in mptcp_crypto_test_basic() 53 sprintf(&hmac_hex[j << 1], "%02x", hmac[j] & 0xff); in mptcp_crypto_test_basic()
|
| H A D | subflow.c | 51 void *hmac) in subflow_generate_hmac() argument 58 mptcp_crypto_hmac_sha(key1, key2, msg, 8, hmac); in subflow_generate_hmac() 73 u8 hmac[SHA256_DIGEST_SIZE]; in subflow_req_create_thmac() local 80 subflow_req->remote_nonce, hmac); in subflow_req_create_thmac() 82 subflow_req->thmac = get_unaligned_be64(hmac); in subflow_req_create_thmac() 416 u8 hmac[SHA256_DIGEST_SIZE]; in subflow_thmac_valid() local 421 hmac); in subflow_thmac_valid() 423 thmac = get_unaligned_be64(hmac); in subflow_thmac_valid() 570 u8 hmac[SHA256_DIGEST_SIZE]; in subflow_finish_connect() local 597 hmac); in subflow_finish_connect() [all …]
|
| H A D | options.c | 150 memcpy(mp_opt->hmac, ptr, MPTCPOPT_HMAC_LEN); in mptcp_parse_option() 516 memcpy(opts->hmac, subflow->hmac, MPTCPOPT_HMAC_LEN); in mptcp_established_options_mp() 631 u8 hmac[SHA256_DIGEST_SIZE]; in add_addr_generate_hmac() local 649 mptcp_crypto_hmac_sha(key1, key2, msg, i, hmac); in add_addr_generate_hmac() 651 return get_unaligned_be64(&hmac[SHA256_DIGEST_SIZE - sizeof(u64)]); in add_addr_generate_hmac() 1144 u64 hmac = 0; in add_addr_hmac_valid() local 1149 hmac = add_addr_generate_hmac(READ_ONCE(msk->remote_key), in add_addr_hmac_valid() 1154 msk, hmac, mp_opt->ahmac); in add_addr_hmac_valid() 1156 return hmac == mp_opt->ahmac; in add_addr_hmac_valid() 1580 memcpy(ptr, opts->hmac, MPTCPOPT_HMAC_LEN); in mptcp_write_options()
|
| /linux/scripts/crypto/ |
| H A D | gen-fips-testvecs.py | 9 import hmac 31 ctx = hmac.new(fips_test_key, digestmod=alg)
|
| H A D | gen-hash-testvecs.py | 9 import hmac 158 ctx = hmac.new(rand_bytes(32), digestmod=alg) 164 mac = hmac.digest(key, data[:data_len], alg)
|
| /linux/tools/testing/selftests/tpm2/ |
| H A D | tpm2.py | 252 session_attributes=0, hmac=bytes()): argument 256 self.hmac = hmac 259 fmt = '>I H%us B H%us' % (len(self.nonce), len(self.hmac)) 261 self.nonce, self.session_attributes, len(self.hmac), 262 self.hmac) 265 fmt = '>I H%us B H%us' % (len(self.nonce), len(self.hmac)) 651 auth_cmd = AuthCommand(session_handle=policy_handle, hmac=auth_value) 653 auth_cmd = AuthCommand(hmac=auth_value)
|
| /linux/drivers/nvme/common/ |
| H A D | auth.c | 94 const char hmac[15]; member 99 .hmac = "hmac(sha256)", 104 .hmac = "hmac(sha384)", 109 .hmac = "hmac(sha512)", 118 return hash_map[hmac_id].hmac; in nvme_auth_hmac_name() 138 if (!strlen(hash_map[i].hmac)) in nvme_auth_hmac_id() 140 if (!strncmp(hash_map[i].hmac, hmac_name, in nvme_auth_hmac_id() 141 strlen(hash_map[i].hmac))) in nvme_auth_hmac_id()
|
| H A D | keyring.c | 93 u8 hmac, u8 psk_ver, bool generated) in nvme_tls_psk_lookup() argument 105 psk_ver, generated ? 'G' : 'R', hmac, hostnqn, subnqn); in nvme_tls_psk_lookup()
|
| /linux/net/sunrpc/auth_gss/ |
| H A D | gss_krb5_crypto.c | 586 struct xdr_netobj hmac; in gss_krb5_aes_encrypt() local 625 hmac.len = kctx->gk5e->cksumlength; in gss_krb5_aes_encrypt() 626 hmac.data = buf->tail[0].iov_base + buf->tail[0].iov_len; in gss_krb5_aes_encrypt() 639 offset + GSS_KRB5_TOK_HDR_LEN, &hmac); in gss_krb5_aes_encrypt() 818 struct xdr_netobj hmac; in krb5_etm_encrypt() local 859 hmac.data = buf->tail[0].iov_base + buf->tail[0].iov_len; in krb5_etm_encrypt() 860 hmac.len = kctx->gk5e->cksumlength; in krb5_etm_encrypt() 862 buf, offset + GSS_KRB5_TOK_HDR_LEN, &hmac); in krb5_etm_encrypt()
|
| /linux/drivers/crypto/allwinner/sun8i-ss/ |
| H A D | sun8i-ss-hash.c | 501 int hmac = 0; in sun8i_ss_hash_run() local 575 if (tfmctx->keylen && hmac == 0) { in sun8i_ss_hash_run() 576 hmac = 1; in sun8i_ss_hash_run() 597 if (tfmctx->keylen && hmac == 2) { in sun8i_ss_hash_run() 685 if (hmac > 0) in sun8i_ss_hash_run() 690 if (hmac < 2) in sun8i_ss_hash_run() 693 if (hmac == 1 && !err) { in sun8i_ss_hash_run() 694 hmac = 2; in sun8i_ss_hash_run()
|
| /linux/net/sunrpc/ |
| H A D | Kconfig | 47 SHA-1 digests. These include aes128-cts-hmac-sha1-96 and 48 aes256-cts-hmac-sha1-96. 72 SHA-2 digests. These include aes128-cts-hmac-sha256-128 and 73 aes256-cts-hmac-sha384-192.
|
| /linux/Documentation/translations/zh_CN/filesystems/ |
| H A D | ubifs-authentication.rst | 272 ,. | , . |hmac . |hmac 279 , | , |hmac
|
| /linux/drivers/crypto/intel/keembay/ |
| H A D | Kconfig | 81 bool "Enable sha224 and hmac(sha224) support in Intel Keem Bay OCS HCU" 84 Enables support for sha224 and hmac(sha224) algorithms in the Intel 88 Provides OCS HCU hardware acceleration of sha224 and hmac(224).
|
| /linux/include/uapi/linux/ |
| H A D | seg6_hmac.h | 15 __u8 hmac[SEG6_HMAC_FIELD_LEN]; member
|
| /linux/drivers/thunderbolt/ |
| H A D | domain.c | 716 u8 hmac[TB_SWITCH_KEY_SIZE]; in tb_domain_challenge_switch_key() local 733 static_assert(sizeof(hmac) == SHA256_DIGEST_SIZE); in tb_domain_challenge_switch_key() 735 challenge, sizeof(challenge), hmac); in tb_domain_challenge_switch_key() 738 if (crypto_memneq(response, hmac, sizeof(hmac))) in tb_domain_challenge_switch_key()
|
| /linux/fs/smb/client/ |
| H A D | cifsencrypt.c | 37 if (ctx->hmac) { in cifs_sig_update() 38 hmac_sha256_update(ctx->hmac, data, len); in cifs_sig_update() 50 if (ctx->hmac) { in cifs_sig_final() 51 hmac_sha256_final(ctx->hmac, out); in cifs_sig_final()
|
| /linux/drivers/net/wireguard/ |
| H A D | noise.c | 305 static void hmac(u8 *out, const u8 *in, const u8 *key, const size_t inlen, const size_t keylen) in hmac() function 360 hmac(secret, data, chaining_key, data_len, NOISE_HASH_LEN); in kdf() 367 hmac(output, output, secret, 1, BLAKE2S_HASH_SIZE); in kdf() 375 hmac(output, output, secret, BLAKE2S_HASH_SIZE + 1, BLAKE2S_HASH_SIZE); in kdf() 383 hmac(output, output, secret, BLAKE2S_HASH_SIZE + 1, BLAKE2S_HASH_SIZE); in kdf()
|
| /linux/security/keys/trusted-keys/ |
| H A D | trusted_tpm2.c | 207 const u8 *hmac, u16 hmac_len) in tpm2_buf_append_auth() argument 219 if (hmac && hmac_len) in tpm2_buf_append_auth() 220 tpm_buf_append(buf, hmac, hmac_len); in tpm2_buf_append_auth()
|
| /linux/drivers/crypto/cavium/cpt/ |
| H A D | cptvf_algs.h | 95 struct fchmac_context hmac; member
|
| /linux/drivers/net/ethernet/3com/ |
| H A D | typhoon.c | 1342 u32 hmac; in typhoon_download_firmware() local 1378 hmac = le32_to_cpu(fHdr->hmacDigest[0]); in typhoon_download_firmware() 1379 iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_0); in typhoon_download_firmware() 1380 hmac = le32_to_cpu(fHdr->hmacDigest[1]); in typhoon_download_firmware() 1381 iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_1); in typhoon_download_firmware() 1382 hmac = le32_to_cpu(fHdr->hmacDigest[2]); in typhoon_download_firmware() 1383 iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_2); in typhoon_download_firmware() 1384 hmac = le32_to_cpu(fHdr->hmacDigest[3]); in typhoon_download_firmware() 1385 iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_3); in typhoon_download_firmware() 1386 hmac = le32_to_cpu(fHdr->hmacDigest[4]); in typhoon_download_firmware() [all …]
|
| /linux/drivers/nvme/target/ |
| H A D | auth.c | 50 const char *hmac = nvme_auth_hmac_name(key_hash); in nvmet_auth_set_key() local 52 if (!crypto_has_shash(hmac, 0, 0)) { in nvmet_auth_set_key() 53 pr_err("DH-HMAC-CHAP hash %s unsupported\n", hmac); in nvmet_auth_set_key()
|