/linux/fs/ubifs/ |
A D | auth.c | 47 u8 *hmac) in ubifs_hash_calc_hmac() argument 81 err = ubifs_hash_calc_hmac(c, hash, auth->hmac); in ubifs_prepare_auth_node() 389 int len, int ofs_hmac, void *hmac) in ubifs_node_calc_hmac() argument 417 return crypto_shash_final(shash, hmac); in ubifs_node_calc_hmac() 452 u8 *hmac; in __ubifs_node_verify_hmac() local 455 hmac = kmalloc(hmac_len, GFP_NOFS); in __ubifs_node_verify_hmac() 456 if (!hmac) in __ubifs_node_verify_hmac() 461 kfree(hmac); in __ubifs_node_verify_hmac() 467 kfree(hmac); in __ubifs_node_verify_hmac() 529 err = crypto_shash_final(shash, hmac); in ubifs_hmac_wkm() [all …]
|
A D | master.c | 28 int hmac_offs = offsetof(struct ubifs_mst_node, hmac); in ubifs_compare_master_node() 135 if (ubifs_hmac_zero(c, c->mst_node->hmac)) { in scan_for_master() 143 offsetof(struct ubifs_mst_node, hmac)); in scan_for_master() 458 offsetof(struct ubifs_mst_node, hmac)); in ubifs_write_master() 470 offsetof(struct ubifs_mst_node, hmac)); in ubifs_write_master()
|
A D | ubifs-media.h | 678 __u8 hmac[UBIFS_MAX_HMAC_LEN]; member 754 __u8 hmac[UBIFS_MAX_HMAC_LEN]; member 781 __u8 hmac[]; member
|
A D | sb.c | 323 offsetof(struct ubifs_sb_node, hmac)); in create_default_filesystem() 343 offsetof(struct ubifs_mst_node, hmac)); in create_default_filesystem() 348 0, offsetof(struct ubifs_mst_node, hmac)); in create_default_filesystem() 587 if (ubifs_hmac_zero(c, sup->hmac)) { in authenticate_sb_node() 599 hmac)); in authenticate_sb_node() 621 offsetof(struct ubifs_sb_node, hmac), 1); in ubifs_write_sb_node()
|
/linux/net/sctp/ |
A D | Kconfig | 56 This option sets the default sctp cookie hmac algorithm 60 bool "Enable optional MD5 hmac cookie generation" 62 Enable optional MD5 hmac based SCTP cookie generation 66 bool "Enable optional SHA1 hmac cookie generation" 68 Enable optional SHA1 hmac based SCTP cookie generation 72 bool "Use no hmac alg in SCTP cookie generation" 74 Use no hmac algorithm in SCTP cookie generation 79 bool "Enable optional MD5 hmac cookie generation" 81 Enable optional MD5 hmac based SCTP cookie generation 86 bool "Enable optional SHA1 hmac cookie generation" [all …]
|
/linux/drivers/crypto/ |
A D | atmel-sha.c | 1695 hmac->resume = resume; in atmel_sha_hmac_setup() 1735 memcpy((u8 *)hmac->ipad, key, keylen); in atmel_sha_hmac_setup() 1773 memcpy(hmac->opad, hmac->ipad, bs); in atmel_sha_hmac_compute_ipad_hash() 1775 hmac->ipad[i] ^= 0x36363636; in atmel_sha_hmac_compute_ipad_hash() 1776 hmac->opad[i] ^= 0x5c5c5c5c; in atmel_sha_hmac_compute_ipad_hash() 1810 atmel_sha_hmac_key_release(&hmac->hkey); in atmel_sha_hmac_setup_done() 1811 return hmac->resume(dd); in atmel_sha_hmac_setup_done() 1882 memcpy(ctx->digest, hmac->ipad, hs); in atmel_sha_hmac_init_done() 2003 hmac->base.start = atmel_sha_hmac_start; in atmel_sha_hmac_cra_init() 2004 atmel_sha_hmac_key_init(&hmac->hkey); in atmel_sha_hmac_cra_init() [all …]
|
/linux/net/mptcp/ |
A D | crypto_test.c | 35 char hmac[32], hmac_hex[65]; in mptcp_crypto_test_basic() local 51 mptcp_crypto_hmac_sha(key1, key2, msg, 8, hmac); in mptcp_crypto_test_basic() 53 sprintf(&hmac_hex[j << 1], "%02x", hmac[j] & 0xff); in mptcp_crypto_test_basic()
|
A D | subflow.c | 52 void *hmac) in subflow_generate_hmac() argument 72 u8 hmac[SHA256_DIGEST_SIZE]; in subflow_req_create_thmac() local 78 subflow_req->remote_nonce, hmac); in subflow_req_create_thmac() 338 u8 hmac[SHA256_DIGEST_SIZE]; in subflow_thmac_valid() local 343 hmac); in subflow_thmac_valid() 345 thmac = get_unaligned_be64(hmac); in subflow_thmac_valid() 436 u8 hmac[SHA256_DIGEST_SIZE]; in subflow_finish_connect() local 462 hmac); in subflow_finish_connect() 463 memcpy(subflow->hmac, hmac, MPTCPOPT_HMAC_LEN); in subflow_finish_connect() 545 u8 hmac[SHA256_DIGEST_SIZE]; in subflow_hmac_valid() local [all …]
|
A D | crypto.c | 44 void mptcp_crypto_hmac_sha(u64 key1, u64 key2, u8 *msg, int len, void *hmac) in mptcp_crypto_hmac_sha() argument 78 sha256(input, SHA256_BLOCK_SIZE + SHA256_DIGEST_SIZE, hmac); in mptcp_crypto_hmac_sha()
|
A D | options.c | 143 memcpy(mp_opt->hmac, ptr, MPTCPOPT_HMAC_LEN); in mptcp_parse_option() 503 memcpy(opts->hmac, subflow->hmac, MPTCPOPT_HMAC_LEN); in mptcp_established_options_mp() 621 u8 hmac[SHA256_DIGEST_SIZE]; in add_addr_generate_hmac() local 639 mptcp_crypto_hmac_sha(key1, key2, msg, i, hmac); in add_addr_generate_hmac() 641 return get_unaligned_be64(&hmac[SHA256_DIGEST_SIZE - sizeof(u64)]); in add_addr_generate_hmac() 1050 u64 hmac = 0; in add_addr_hmac_valid() local 1055 hmac = add_addr_generate_hmac(msk->remote_key, in add_addr_hmac_valid() 1060 msk, (unsigned long long)hmac, in add_addr_hmac_valid() 1063 return hmac == mp_opt->ahmac; in add_addr_hmac_valid() 1392 memcpy(ptr, opts->hmac, MPTCPOPT_HMAC_LEN); in mptcp_write_options()
|
/linux/tools/testing/selftests/tpm2/ |
A D | tpm2.py | 251 session_attributes=0, hmac=bytes()): argument 255 self.hmac = hmac 258 fmt = '>I H%us B H%us' % (len(self.nonce), len(self.hmac)) 260 self.nonce, self.session_attributes, len(self.hmac), 261 self.hmac) 264 fmt = '>I H%us B H%us' % (len(self.nonce), len(self.hmac)) 646 auth_cmd = AuthCommand(session_handle=policy_handle, hmac=auth_value) 648 auth_cmd = AuthCommand(hmac=auth_value)
|
/linux/drivers/crypto/ccree/ |
A D | cc_aead.c | 52 struct cc_hmac_s hmac; member 95 struct cc_hmac_s *hmac = &ctx->auth_state.hmac; in cc_aead_exit() local 97 if (hmac->ipad_opad) { in cc_aead_exit() 99 hmac->ipad_opad, in cc_aead_exit() 104 hmac->ipad_opad = NULL; in cc_aead_exit() 106 if (hmac->padded_authkey) { in cc_aead_exit() 108 hmac->padded_authkey, in cc_aead_exit() 169 struct cc_hmac_s *hmac = &ctx->auth_state.hmac; in cc_aead_init() local 178 if (!hmac->ipad_opad) { in cc_aead_init() 184 hmac->ipad_opad); in cc_aead_init() [all …]
|
/linux/drivers/thunderbolt/ |
A D | domain.c | 712 u8 hmac[TB_SWITCH_KEY_SIZE]; in tb_domain_challenge_switch_key() local 748 memset(hmac, 0, sizeof(hmac)); in tb_domain_challenge_switch_key() 749 ret = crypto_shash_digest(shash, challenge, sizeof(hmac), hmac); in tb_domain_challenge_switch_key() 754 if (memcmp(response, hmac, sizeof(hmac))) { in tb_domain_challenge_switch_key()
|
/linux/drivers/crypto/keembay/ |
A D | Kconfig | 81 bool "Enable sha224 and hmac(sha224) support in Intel Keem Bay OCS HCU" 84 Enables support for sha224 and hmac(sha224) algorithms in the Intel 88 Provides OCS HCU hardware acceleration of sha224 and hmac(224).
|
/linux/net/ipv6/ |
A D | seg6_hmac.c | 272 if (memcmp(hmac_output, tlv->hmac, SEG6_HMAC_FIELD_LEN) != 0) in seg6_hmac_validate_skb() 342 memset(tlv->hmac, 0, SEG6_HMAC_FIELD_LEN); in seg6_push_hmac() 343 err = seg6_hmac_compute(hinfo, srh, saddr, tlv->hmac); in seg6_push_hmac()
|
/linux/drivers/crypto/inside-secure/ |
A D | safexcel_hash.c | 42 bool hmac; member 270 if (sreq->hmac && in safexcel_handle_req_result() 281 sreq->hmac = 0; in safexcel_handle_req_result() 1030 req->hmac = true; in safexcel_hmac_sha1_init() 1128 req->hmac = true; in safexcel_hmac_init_iv() 1403 req->hmac = true; in safexcel_hmac_sha224_init() 1475 req->hmac = true; in safexcel_hmac_sha256_init() 1661 req->hmac = true; in safexcel_hmac_sha512_init() 1733 req->hmac = true; in safexcel_hmac_sha384_init() 1856 req->hmac = true; in safexcel_hmac_md5_init() [all …]
|
/linux/include/uapi/linux/ |
A D | seg6_hmac.h | 15 __u8 hmac[SEG6_HMAC_FIELD_LEN]; member
|
/linux/security/keys/trusted-keys/ |
A D | trusted_tpm2.c | 202 const u8 *hmac, u16 hmac_len) in tpm2_buf_append_auth() argument 214 if (hmac && hmac_len) in tpm2_buf_append_auth() 215 tpm_buf_append(buf, hmac, hmac_len); in tpm2_buf_append_auth()
|
/linux/drivers/net/ethernet/3com/ |
A D | typhoon.c | 1345 u32 hmac; in typhoon_download_firmware() local 1381 hmac = le32_to_cpu(fHdr->hmacDigest[0]); in typhoon_download_firmware() 1382 iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_0); in typhoon_download_firmware() 1383 hmac = le32_to_cpu(fHdr->hmacDigest[1]); in typhoon_download_firmware() 1384 iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_1); in typhoon_download_firmware() 1385 hmac = le32_to_cpu(fHdr->hmacDigest[2]); in typhoon_download_firmware() 1386 iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_2); in typhoon_download_firmware() 1387 hmac = le32_to_cpu(fHdr->hmacDigest[3]); in typhoon_download_firmware() 1388 iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_3); in typhoon_download_firmware() 1389 hmac = le32_to_cpu(fHdr->hmacDigest[4]); in typhoon_download_firmware() [all …]
|
/linux/crypto/ |
A D | .hmac.o.cmd | 1 …hmac.o := /usr/bin/ccache /home/test/workspace/code/optee_3.16/build/../toolchains/aarch64/bin/aar… 3 source_crypto/hmac.o := crypto/hmac.c 5 deps_crypto/hmac.o := \ 22 include/crypto/hmac.h \ 1099 crypto/hmac.o: $(deps_crypto/hmac.o) 1101 $(deps_crypto/hmac.o):
|
A D | built-in.a | 27 hmac.o/
|
A D | .built-in.a.cmd | 1 …o/acompress.o crypto/scompress.o crypto/algboss.o crypto/testmgr.o crypto/hmac.o crypto/crypto_nul…
|
/linux/net/sunrpc/auth_gss/ |
A D | gss_krb5_crypto.c | 603 struct xdr_netobj hmac; in gss_krb5_aes_encrypt() local 649 hmac.len = GSS_KRB5_MAX_CKSUM_LEN; in gss_krb5_aes_encrypt() 650 hmac.data = buf->tail[0].iov_base + buf->tail[0].iov_len; in gss_krb5_aes_encrypt() 664 cksumkey, usage, &hmac); in gss_krb5_aes_encrypt()
|
/linux/drivers/crypto/cavium/cpt/ |
A D | cptvf_algs.h | 95 struct fchmac_context hmac; member
|
/linux/Documentation/admin-guide/device-mapper/ |
A D | dm-integrity.rst | 131 You can also use a hmac algorithm (for example 132 "hmac(sha256):0123456789abcdef"), in this mode it will provide 159 hmac algorithm with a key. 196 that the attacker can't detect that two disks have the same hmac 263 64-byte value. It is used to store hmac of sector
|