Home
last modified time | relevance | path

Searched refs:hmac (Results 1 – 25 of 53) sorted by relevance

123

/linux/fs/ubifs/
H A Dauth.c46 u8 *hmac) in ubifs_hash_calc_hmac() argument
48 return crypto_shash_tfm_digest(c->hmac_tfm, hash, c->hash_len, hmac); in ubifs_hash_calc_hmac()
80 err = ubifs_hash_calc_hmac(c, hash, auth->hmac); in ubifs_prepare_auth_node()
388 int len, int ofs_hmac, void *hmac) in ubifs_node_calc_hmac() argument
416 return crypto_shash_final(shash, hmac); in ubifs_node_calc_hmac()
451 u8 *hmac; in __ubifs_node_verify_hmac() local
454 hmac = kmalloc(hmac_len, GFP_NOFS); in __ubifs_node_verify_hmac()
455 if (!hmac) in __ubifs_node_verify_hmac()
458 err = ubifs_node_calc_hmac(c, node, len, ofs_hmac, hmac); in __ubifs_node_verify_hmac()
460 kfree(hmac); in __ubifs_node_verify_hmac()
[all …]
H A Dmaster.c28 int hmac_offs = offsetof(struct ubifs_mst_node, hmac); in ubifs_compare_master_node()
138 if (ubifs_hmac_zero(c, c->mst_node->hmac)) { in scan_for_master()
146 offsetof(struct ubifs_mst_node, hmac)); in scan_for_master()
461 offsetof(struct ubifs_mst_node, hmac)); in ubifs_write_master()
473 offsetof(struct ubifs_mst_node, hmac)); in ubifs_write_master()
H A Dubifs-media.h678 __u8 hmac[UBIFS_MAX_HMAC_LEN]; member
754 __u8 hmac[UBIFS_MAX_HMAC_LEN]; member
781 __u8 hmac[]; member
H A Dsb.c323 offsetof(struct ubifs_sb_node, hmac)); in create_default_filesystem()
343 offsetof(struct ubifs_mst_node, hmac)); in create_default_filesystem()
348 0, offsetof(struct ubifs_mst_node, hmac)); in create_default_filesystem()
587 if (ubifs_hmac_zero(c, sup->hmac)) { in authenticate_sb_node()
599 hmac)); in authenticate_sb_node()
621 offsetof(struct ubifs_sb_node, hmac), 1); in ubifs_write_sb_node()
/linux/net/sctp/
H A DKconfig56 This option sets the default sctp cookie hmac algorithm
60 bool "Enable optional MD5 hmac cookie generation"
62 Enable optional MD5 hmac based SCTP cookie generation
66 bool "Enable optional SHA1 hmac cookie generation"
68 Enable optional SHA1 hmac based SCTP cookie generation
72 bool "Use no hmac alg in SCTP cookie generation"
74 Use no hmac algorithm in SCTP cookie generation
79 bool "Enable optional MD5 hmac cookie generation"
81 Enable optional MD5 hmac based SCTP cookie generation
86 bool "Enable optional SHA1 hmac cookie generation"
[all …]
/linux/arch/s390/crypto/
H A Dhmac_s390.c309 struct s390_hmac_alg *hmac; in _s390_hmac_algs_unregister() local
313 hmac = &s390_hmac_algs[i]; in _s390_hmac_algs_unregister()
314 if (!hmac->registered) in _s390_hmac_algs_unregister()
316 crypto_unregister_shash(&hmac->alg); in _s390_hmac_algs_unregister()
322 struct s390_hmac_alg *hmac; in hmac_s390_init() local
331 hmac = &s390_hmac_algs[i]; in hmac_s390_init()
332 if (!cpacf_query_func(CPACF_KMAC, hmac->fc)) in hmac_s390_init()
335 rc = crypto_register_shash(&hmac->alg); in hmac_s390_init()
338 hmac->alg.halg.base.cra_name); in hmac_s390_init()
341 hmac->registered = true; in hmac_s390_init()
[all …]
/linux/drivers/nvme/common/
H A Dauth.c91 const char hmac[15]; member
96 .hmac = "hmac(sha256)",
101 .hmac = "hmac(sha384)",
106 .hmac = "hmac(sha512)",
115 return hash_map[hmac_id].hmac; in nvme_auth_hmac_name()
135 if (!strlen(hash_map[i].hmac)) in nvme_auth_hmac_id()
137 if (!strncmp(hash_map[i].hmac, hmac_name, in nvme_auth_hmac_id()
138 strlen(hash_map[i].hmac))) in nvme_auth_hmac_id()
H A Dkeyring.c94 u8 hmac, u8 psk_ver, bool generated) in nvme_tls_psk_lookup() argument
106 psk_ver, generated ? 'G' : 'R', hmac, hostnqn, subnqn); in nvme_tls_psk_lookup()
/linux/net/mptcp/
H A Dcrypto_test.c35 char hmac[32], hmac_hex[65]; in mptcp_crypto_test_basic() local
51 mptcp_crypto_hmac_sha(key1, key2, msg, 8, hmac); in mptcp_crypto_test_basic()
53 sprintf(&hmac_hex[j << 1], "%02x", hmac[j] & 0xff); in mptcp_crypto_test_basic()
H A Dcrypto.c44 void mptcp_crypto_hmac_sha(u64 key1, u64 key2, u8 *msg, int len, void *hmac) in mptcp_crypto_hmac_sha() argument
78 sha256(input, SHA256_BLOCK_SIZE + SHA256_DIGEST_SIZE, hmac); in mptcp_crypto_hmac_sha()
H A Dsubflow.c51 void *hmac) in subflow_generate_hmac() argument
58 mptcp_crypto_hmac_sha(key1, key2, msg, 8, hmac); in subflow_generate_hmac()
73 u8 hmac[SHA256_DIGEST_SIZE]; in subflow_req_create_thmac() local
80 subflow_req->remote_nonce, hmac); in subflow_req_create_thmac()
82 subflow_req->thmac = get_unaligned_be64(hmac); in subflow_req_create_thmac()
415 u8 hmac[SHA256_DIGEST_SIZE]; in subflow_thmac_valid() local
420 hmac); in subflow_thmac_valid()
422 thmac = get_unaligned_be64(hmac); in subflow_thmac_valid()
563 u8 hmac[SHA256_DIGEST_SIZE]; in subflow_finish_connect() local
590 hmac); in subflow_finish_connect()
[all …]
H A Doptions.c151 memcpy(mp_opt->hmac, ptr, MPTCPOPT_HMAC_LEN); in mptcp_parse_option()
510 memcpy(opts->hmac, subflow->hmac, MPTCPOPT_HMAC_LEN); in mptcp_established_options_mp()
626 u8 hmac[SHA256_DIGEST_SIZE]; in add_addr_generate_hmac() local
644 mptcp_crypto_hmac_sha(key1, key2, msg, i, hmac); in add_addr_generate_hmac()
646 return get_unaligned_be64(&hmac[SHA256_DIGEST_SIZE - sizeof(u64)]); in add_addr_generate_hmac()
1107 u64 hmac = 0; in add_addr_hmac_valid() local
1112 hmac = add_addr_generate_hmac(READ_ONCE(msk->remote_key), in add_addr_hmac_valid()
1117 msk, hmac, mp_opt->ahmac); in add_addr_hmac_valid()
1119 return hmac == mp_opt->ahmac; in add_addr_hmac_valid()
1518 memcpy(ptr, opts->hmac, MPTCPOPT_HMAC_LEN); in mptcp_write_options()
/linux/drivers/crypto/
H A Datmel-sha.c1688 struct atmel_sha_hmac_ctx *hmac = crypto_ahash_ctx(tfm); in atmel_sha_hmac_setup() local
1693 hmac->resume = resume; in atmel_sha_hmac_setup()
1725 if (likely(!atmel_sha_hmac_key_get(&hmac->hkey, &key, &keylen))) in atmel_sha_hmac_setup()
1733 memcpy((u8 *)hmac->ipad, key, keylen); in atmel_sha_hmac_setup()
1734 memset((u8 *)hmac->ipad + keylen, 0, bs - keylen); in atmel_sha_hmac_setup()
1749 struct atmel_sha_hmac_ctx *hmac = crypto_ahash_ctx(tfm); in atmel_sha_hmac_prehash_key_done() local
1757 hmac->ipad[i] = atmel_sha_read(dd, SHA_REG_DIGEST(i)); in atmel_sha_hmac_prehash_key_done()
1758 memset((u8 *)hmac->ipad + ds, 0, bs - ds); in atmel_sha_hmac_prehash_key_done()
1766 struct atmel_sha_hmac_ctx *hmac = crypto_ahash_ctx(tfm); in atmel_sha_hmac_compute_ipad_hash() local
1771 unsafe_memcpy(hmac->opad, hmac->ipad, bs, in atmel_sha_hmac_compute_ipad_hash()
[all …]
/linux/tools/testing/selftests/tpm2/
H A Dtpm2.py252 session_attributes=0, hmac=bytes()): argument
256 self.hmac = hmac
259 fmt = '>I H%us B H%us' % (len(self.nonce), len(self.hmac))
261 self.nonce, self.session_attributes, len(self.hmac),
262 self.hmac)
265 fmt = '>I H%us B H%us' % (len(self.nonce), len(self.hmac))
651 auth_cmd = AuthCommand(session_handle=policy_handle, hmac=auth_value)
653 auth_cmd = AuthCommand(hmac=auth_value)
/linux/net/sunrpc/
H A DKconfig47 SHA-1 digests. These include aes128-cts-hmac-sha1-96 and
48 aes256-cts-hmac-sha1-96.
72 SHA-2 digests. These include aes128-cts-hmac-sha256-128 and
73 aes256-cts-hmac-sha384-192.
/linux/drivers/crypto/allwinner/sun8i-ss/
H A Dsun8i-ss-hash.c496 int hmac = 0; in sun8i_ss_hash_run() local
570 if (tfmctx->keylen && hmac == 0) { in sun8i_ss_hash_run()
571 hmac = 1; in sun8i_ss_hash_run()
592 if (tfmctx->keylen && hmac == 2) { in sun8i_ss_hash_run()
680 if (hmac > 0) in sun8i_ss_hash_run()
685 if (hmac < 2) in sun8i_ss_hash_run()
688 if (hmac == 1 && !err) { in sun8i_ss_hash_run()
689 hmac = 2; in sun8i_ss_hash_run()
/linux/drivers/thunderbolt/
H A Ddomain.c709 u8 hmac[TB_SWITCH_KEY_SIZE]; in tb_domain_challenge_switch_key() local
745 memset(hmac, 0, sizeof(hmac)); in tb_domain_challenge_switch_key()
746 ret = crypto_shash_digest(shash, challenge, sizeof(hmac), hmac); in tb_domain_challenge_switch_key()
751 if (memcmp(response, hmac, sizeof(hmac))) { in tb_domain_challenge_switch_key()
/linux/drivers/crypto/intel/keembay/
H A DKconfig81 bool "Enable sha224 and hmac(sha224) support in Intel Keem Bay OCS HCU"
84 Enables support for sha224 and hmac(sha224) algorithms in the Intel
88 Provides OCS HCU hardware acceleration of sha224 and hmac(224).
/linux/net/sunrpc/auth_gss/
H A Dgss_krb5_crypto.c785 struct xdr_netobj hmac; in gss_krb5_aes_encrypt() local
824 hmac.len = kctx->gk5e->cksumlength; in gss_krb5_aes_encrypt()
825 hmac.data = buf->tail[0].iov_base + buf->tail[0].iov_len; in gss_krb5_aes_encrypt()
838 offset + GSS_KRB5_TOK_HDR_LEN, &hmac); in gss_krb5_aes_encrypt()
1017 struct xdr_netobj hmac; in krb5_etm_encrypt() local
1058 hmac.data = buf->tail[0].iov_base + buf->tail[0].iov_len; in krb5_etm_encrypt()
1059 hmac.len = kctx->gk5e->cksumlength; in krb5_etm_encrypt()
1061 buf, offset + GSS_KRB5_TOK_HDR_LEN, &hmac); in krb5_etm_encrypt()
/linux/net/ipv6/
H A Dseg6_hmac.c76 .name = "hmac(sha1)",
80 .name = "hmac(sha256)",
274 if (memcmp(hmac_output, tlv->hmac, SEG6_HMAC_FIELD_LEN) != 0) in seg6_hmac_validate_skb()
344 memset(tlv->hmac, 0, SEG6_HMAC_FIELD_LEN); in seg6_push_hmac()
345 err = seg6_hmac_compute(hinfo, srh, saddr, tlv->hmac); in seg6_push_hmac()
/linux/include/uapi/linux/
H A Dseg6_hmac.h15 __u8 hmac[SEG6_HMAC_FIELD_LEN]; member
/linux/drivers/gpu/drm/nouveau/include/nvrm/535.113.01/nvidia/arch/nvalloc/common/inc/gsp/
H A Dgsp_fw_sr_meta.h60 NvU8 hmac[32]; member
/linux/drivers/net/wireguard/
H A Dnoise.c305 static void hmac(u8 *out, const u8 *in, const u8 *key, const size_t inlen, const size_t keylen) in hmac() function
360 hmac(secret, data, chaining_key, data_len, NOISE_HASH_LEN); in kdf()
367 hmac(output, output, secret, 1, BLAKE2S_HASH_SIZE); in kdf()
375 hmac(output, output, secret, BLAKE2S_HASH_SIZE + 1, BLAKE2S_HASH_SIZE); in kdf()
383 hmac(output, output, secret, BLAKE2S_HASH_SIZE + 1, BLAKE2S_HASH_SIZE); in kdf()
/linux/security/keys/trusted-keys/
H A Dtrusted_tpm2.c215 const u8 *hmac, u16 hmac_len) in tpm2_buf_append_auth() argument
227 if (hmac && hmac_len) in tpm2_buf_append_auth()
228 tpm_buf_append(buf, hmac, hmac_len); in tpm2_buf_append_auth()
/linux/drivers/crypto/cavium/cpt/
H A Dcptvf_algs.h95 struct fchmac_context hmac; member

123