Home
last modified time | relevance | path

Searched full:hmac (Results 1 – 25 of 139) sorted by relevance

123456

/Linux-v5.10/fs/ubifs/
Dauth.c40 * ubifs_hash_calc_hmac - calculate a HMAC from a hash
42 * @hash: the node to calculate a HMAC for
43 * @hmac: the returned HMAC
48 u8 *hmac) in ubifs_hash_calc_hmac() argument
50 return crypto_shash_tfm_digest(c->hmac_tfm, hash, c->hash_len, hmac); in ubifs_hash_calc_hmac()
60 * It creates a HMAC from the given input hash and writes it to the node.
82 err = ubifs_hash_calc_hmac(c, hash, auth->hmac); in ubifs_prepare_auth_node()
277 snprintf(hmac_name, CRYPTO_MAX_ALG_NAME, "hmac(%s)", in ubifs_init_authentication()
328 ubifs_err(c, "hmac %s is bigger than maximum allowed hmac size (%d > %d)", in ubifs_init_authentication()
376 * ubifs_node_calc_hmac - calculate the HMAC of a UBIFS node
[all …]
Dubifs-media.h297 /* The maxmimum size of a hmac, enough for hmac(sha512) */
645 * @hmac: HMAC to authenticate the superblock node
646 * @hmac_wkm: HMAC of a well known message (the string "UBIFS") as a convenience
650 * master node does not contain a hmac
678 __u8 hmac[UBIFS_MAX_HMAC_LEN]; member
719 * @hmac: HMAC to authenticate the master node
754 __u8 hmac[UBIFS_MAX_HMAC_LEN]; member
777 * @hmac: The HMAC
781 __u8 hmac[]; member
/Linux-v5.10/net/sctp/
DKconfig52 prompt "Default SCTP cookie HMAC encoding"
55 This option sets the default sctp cookie hmac algorithm
59 bool "Enable optional MD5 hmac cookie generation"
61 Enable optional MD5 hmac based SCTP cookie generation
65 bool "Enable optional SHA1 hmac cookie generation"
67 Enable optional SHA1 hmac based SCTP cookie generation
71 bool "Use no hmac alg in SCTP cookie generation"
73 Use no hmac algorithm in SCTP cookie generation
78 bool "Enable optional MD5 hmac cookie generation"
80 Enable optional MD5 hmac based SCTP cookie generation
[all …]
Dauth.c29 .hmac_name = "hmac(sha1)",
39 .hmac_name = "hmac(sha256)",
175 * The RANDOM parameter, the CHUNKS parameter and the HMAC-ALGO
301 * The RANDOM parameter, the CHUNKS parameter and the HMAC-ALGO in sctp_auth_asoc_create_secret()
501 /* Destroy the hmac tfm array */
521 /* Get an hmac description information that we can use to build
601 /* Cache the default HMAC id. This to follow this text from SCTP-AUTH:
603 * The receiver of a HMAC-ALGO parameter SHOULD use the first listed
703 * the AUTH-chunk is given by the AUTH chunk with its HMAC field set to
719 * - hmac id in sctp_auth_calculate_hmac()
[all …]
/Linux-v5.10/Documentation/networking/
Dseg6-sysctl.rst20 Define HMAC policy for ingress SR-enabled packets on this interface.
22 * -1 - Ignore HMAC field
23 * 0 - Accept SR packets without HMAC, validate SR packets with HMAC
24 * 1 - Drop SR packets without HMAC, validate SR packets with HMAC
/Linux-v5.10/drivers/crypto/caam/
Dcaamalg.c2077 .cra_name = "authenc(hmac(md5),"
2079 .cra_driver_name = "authenc-hmac-md5-"
2098 .cra_name = "authenc(hmac(sha1),"
2100 .cra_driver_name = "authenc-hmac-sha1-"
2119 .cra_name = "authenc(hmac(sha224),"
2121 .cra_driver_name = "authenc-hmac-sha224-"
2140 .cra_name = "authenc(hmac(sha256),"
2142 .cra_driver_name = "authenc-hmac-sha256-"
2161 .cra_name = "authenc(hmac(sha384),"
2163 .cra_driver_name = "authenc-hmac-sha384-"
[all …]
Dcaamalg_qi.c1637 .cra_name = "authenc(hmac(md5),cbc(aes))",
1638 .cra_driver_name = "authenc-hmac-md5-"
1658 .cra_name = "echainiv(authenc(hmac(md5),"
1660 .cra_driver_name = "echainiv-authenc-hmac-md5-"
1681 .cra_name = "authenc(hmac(sha1),cbc(aes))",
1682 .cra_driver_name = "authenc-hmac-sha1-"
1702 .cra_name = "echainiv(authenc(hmac(sha1),"
1705 "hmac-sha1-cbc-aes-caam-qi",
1725 .cra_name = "authenc(hmac(sha224),cbc(aes))",
1726 .cra_driver_name = "authenc-hmac-sha224-"
[all …]
Dcaamalg_qi2.c1853 .cra_name = "authenc(hmac(md5),cbc(aes))",
1854 .cra_driver_name = "authenc-hmac-md5-"
1874 .cra_name = "echainiv(authenc(hmac(md5),"
1876 .cra_driver_name = "echainiv-authenc-hmac-md5-"
1897 .cra_name = "authenc(hmac(sha1),cbc(aes))",
1898 .cra_driver_name = "authenc-hmac-sha1-"
1918 .cra_name = "echainiv(authenc(hmac(sha1),"
1921 "hmac-sha1-cbc-aes-caam-qi2",
1941 .cra_name = "authenc(hmac(sha224),cbc(aes))",
1942 .cra_driver_name = "authenc-hmac-sha224-"
[all …]
/Linux-v5.10/security/integrity/evm/
DKconfig21 Include filesystem UUID for HMAC calculation.
26 WARNING: changing the HMAC calculation method or adding
35 Include additional SMACK xattrs for HMAC calculation.
39 in the HMAC calculation, enabling this option includes newly defined
43 WARNING: changing the HMAC calculation method or adding
52 Allow userland to provide additional xattrs for HMAC calculation.
Devm_main.c85 pr_info("HMAC attrs: 0x%x\n", evm_hmac_attrs); in evm_init_config()
117 * evm_verify_hmac - calculate and compare the HMAC with the EVM xattr
119 * Compute the HMAC on the dentry's protected set of extended attributes
124 * HMAC.)
264 * Calculate the HMAC for the given dentry and verify it against the stored
266 * previously retrieved to calculate the HMAC.
374 * access to the EVM encrypted key needed to calculate the HMAC, prevent
375 * userspace from writing HMAC value. Writing 'security.evm' requires
384 * there's no HMAC key loaded in evm_inode_setxattr()
411 * there's no HMAC key loaded in evm_inode_removexattr()
[all …]
Devm_crypto.c10 * Using root's kernel master key (kmk), calculate the HMAC
36 static const char evm_hmac[] = "hmac(sha1)";
39 * evm_set_key() - set EVM HMAC key from the kernel
43 * This function allows setting the EVM HMAC key from the kernel
81 pr_err_once("HMAC key is not set\n"); in init_desc()
159 /* The hmac uid and gid must be encoded in the initial user in hmac_add_misc()
178 * Calculate the HMAC value across the set of protected security xattrs.
181 * the hmac using the requested xattr value. Don't alloc/free memory for
296 * Calculate the hmac and update security.evm xattr
349 * Get the key from the TPM for the SHA1-HMAC
/Linux-v5.10/Documentation/ABI/testing/
Devm7 HMAC-sha1 value across the extended attributes, storing the
11 an HMAC-sha1 generated locally with a
23 0 Enable HMAC validation and creation
26 runtime. Not supported if HMAC validation and
35 will enable HMAC validation and creation
41 will enable HMAC and digital signature validation and
42 HMAC creation and disable all further modification of policy.
/Linux-v5.10/drivers/crypto/inside-secure/
Dsafexcel_hash.c9 #include <crypto/hmac.h>
40 bool hmac; member
159 /* Hash continuation or HMAC, setup (inner) digest from state */ in safexcel_context_control()
163 /* Compute digest count for hash/HMAC finish operations */ in safexcel_context_control()
181 /* Special case: zero length HMAC */ in safexcel_context_control()
183 /* PE HW < 4.4 cannot do HMAC continue, fake using hash */ in safexcel_context_control()
190 /* For zero-len HMAC, don't finalize, already padded! */ in safexcel_context_control()
200 /* Clear zero-length HMAC flag for next operation! */ in safexcel_context_control()
202 } else { /* HMAC */ in safexcel_context_control()
203 /* Need outer digest for HMAC finalization */ in safexcel_context_control()
[all …]
Dsafexcel_cipher.c1741 .cra_name = "authenc(hmac(sha1),cbc(aes))",
1742 .cra_driver_name = "safexcel-authenc-hmac-sha1-cbc-aes",
1777 .cra_name = "authenc(hmac(sha256),cbc(aes))",
1778 .cra_driver_name = "safexcel-authenc-hmac-sha256-cbc-aes",
1813 .cra_name = "authenc(hmac(sha224),cbc(aes))",
1814 .cra_driver_name = "safexcel-authenc-hmac-sha224-cbc-aes",
1849 .cra_name = "authenc(hmac(sha512),cbc(aes))",
1850 .cra_driver_name = "safexcel-authenc-hmac-sha512-cbc-aes",
1885 .cra_name = "authenc(hmac(sha384),cbc(aes))",
1886 .cra_driver_name = "safexcel-authenc-hmac-sha384-cbc-aes",
[all …]
/Linux-v5.10/drivers/crypto/
Datmel-sha.c1193 /* copy ready hash (+ finalize hmac) */ in atmel_sha_final()
1608 /* hmac functions */
1690 struct atmel_sha_hmac_ctx *hmac = crypto_ahash_ctx(tfm); in atmel_sha_hmac_setup() local
1695 hmac->resume = resume; in atmel_sha_hmac_setup()
1727 if (likely(!atmel_sha_hmac_key_get(&hmac->hkey, &key, &keylen))) in atmel_sha_hmac_setup()
1735 memcpy((u8 *)hmac->ipad, key, keylen); in atmel_sha_hmac_setup()
1736 memset((u8 *)hmac->ipad + keylen, 0, bs - keylen); in atmel_sha_hmac_setup()
1751 struct atmel_sha_hmac_ctx *hmac = crypto_ahash_ctx(tfm); in atmel_sha_hmac_prehash_key_done() local
1759 hmac->ipad[i] = atmel_sha_read(dd, SHA_REG_DIGEST(i)); in atmel_sha_hmac_prehash_key_done()
1760 memset((u8 *)hmac->ipad + ds, 0, bs - ds); in atmel_sha_hmac_prehash_key_done()
[all …]
Dtalitos.c1214 /* hmac key */ in ipsec_esp()
1226 /* hmac data */ in ipsec_esp()
1245 * extent is bytes of HMAC postpended to ciphertext, in ipsec_esp()
1811 /* HMAC key */ in common_nonsnoop_hash()
1841 /* hash/HMAC out -or- hash context out */ in common_nonsnoop_hash()
2079 /* When the tfm context has a keylen, it's an HMAC. in ahash_process_req()
2080 * A first or last (ie. not middle) descriptor must request HMAC. in ahash_process_req()
2263 .cra_name = "authenc(hmac(sha1),cbc(aes))",
2264 .cra_driver_name = "authenc-hmac-sha1-"
2285 .cra_name = "authenc(hmac(sha1),cbc(aes))",
[all …]
/Linux-v5.10/security/keys/trusted-keys/
Dtrusted_tpm2.c31 * @hmac: the session HMAC or password, may be NULL if not used
32 * @hmac_len: the session HMAC or password length, maybe 0 if not used
37 const u8 *hmac, u16 hmac_len) in tpm2_buf_append_auth() argument
49 if (hmac && hmac_len) in tpm2_buf_append_auth()
50 tpm_buf_append(buf, hmac, hmac_len); in tpm2_buf_append_auth()
90 options->keyauth /* hmac */, in tpm2_seal_trusted()
204 options->keyauth /* hmac */, in tpm2_load_cmd()
260 options->blobauth /* hmac */, in tpm2_unseal_cmd()
/Linux-v5.10/net/ipv6/
Dseg6_hmac.c3 * SR-IPv6 implementation -- HMAC functions
77 .name = "hmac(sha1)",
81 .name = "hmac(sha256)",
180 /* Let's build the HMAC text on the ring buffer. The text is composed in seg6_hmac_compute()
186 * 4. HMAC Key ID (32 bits) in seg6_hmac_compute()
204 /* HMAC Key ID */ in seg6_hmac_compute()
232 /* checks if an incoming SR-enabled packet's HMAC status matches
273 if (memcmp(hmac_output, tlv->hmac, SEG6_HMAC_FIELD_LEN) != 0) in seg6_hmac_validate_skb()
343 memset(tlv->hmac, 0, SEG6_HMAC_FIELD_LEN); in seg6_push_hmac()
344 err = seg6_hmac_compute(hinfo, srh, saddr, tlv->hmac); in seg6_push_hmac()
/Linux-v5.10/net/mptcp/
Dcrypto_test.c35 char hmac[32], hmac_hex[65]; in mptcp_crypto_test_basic() local
42 /* mptcp hmap will convert to be before computing the hmac */ in mptcp_crypto_test_basic()
51 mptcp_crypto_hmac_sha(key1, key2, msg, 8, hmac); in mptcp_crypto_test_basic()
53 sprintf(&hmac_hex[j << 1], "%02x", hmac[j] & 0xff); in mptcp_crypto_test_basic()
Dsubflow.c47 void *hmac) in subflow_generate_hmac() argument
54 mptcp_crypto_hmac_sha(key1, key2, msg, 8, hmac); in subflow_generate_hmac()
63 /* validate received token and create truncated hmac and nonce for SYN-ACK */
68 u8 hmac[SHA256_DIGEST_SIZE]; in subflow_token_join_request() local
89 subflow_req->remote_nonce, hmac); in subflow_token_join_request()
91 subflow_req->thmac = get_unaligned_be64(hmac); in subflow_token_join_request()
255 /* validate received truncated hmac and create hmac for third ACK */
258 u8 hmac[SHA256_DIGEST_SIZE]; in subflow_thmac_valid() local
263 hmac); in subflow_thmac_valid()
265 thmac = get_unaligned_be64(hmac); in subflow_thmac_valid()
[all …]
/Linux-v5.10/drivers/crypto/ccree/
Dcc_aead.c52 struct cc_hmac_s hmac; member
94 } else if (ctx->auth_mode != DRV_HASH_NULL) { /* HMAC auth. */ in cc_aead_exit()
95 struct cc_hmac_s *hmac = &ctx->auth_state.hmac; in cc_aead_exit() local
97 if (hmac->ipad_opad) { in cc_aead_exit()
99 hmac->ipad_opad, in cc_aead_exit()
100 hmac->ipad_opad_dma_addr); in cc_aead_exit()
102 &hmac->ipad_opad_dma_addr); in cc_aead_exit()
103 hmac->ipad_opad_dma_addr = 0; in cc_aead_exit()
104 hmac->ipad_opad = NULL; in cc_aead_exit()
106 if (hmac->padded_authkey) { in cc_aead_exit()
[all …]
/Linux-v5.10/Documentation/crypto/
Darchitecture.rst27 chaining mode, the HMAC mechanism, etc.
50 - hmac(sha1)
52 - authenc(hmac(sha1),cbc(aes))
377 For example, HMAC(SHA256) is implemented with hmac.c and
389 | (hmac) | ---+
400 The following call sequence is applicable when a caller triggers an HMAC
403 1. The AHASH API functions are invoked by the caller. The HMAC
406 During initialization of the HMAC cipher, the SHASH cipher type of
410 At one time, the HMAC implementation requires a SHA256 operation
413 2. The HMAC instance now invokes the SHASH API with the SHA256 cipher
/Linux-v5.10/crypto/
Dhmac.c5 * HMAC: Keyed-Hashing for Message Authentication (RFC2104).
10 * The HMAC implementation is derived from USAGI.
14 #include <crypto/hmac.h>
239 .name = "hmac",
258 MODULE_DESCRIPTION("HMAC hash algorithm");
259 MODULE_ALIAS_CRYPTO("hmac");
/Linux-v5.10/drivers/crypto/qce/
Dsha.c171 const u32 *state, const u8 *buffer, bool hmac) in qce_import_common() argument
188 * For HMAC, there is a hardware padding done when first block in qce_import_common()
192 if (hmac) in qce_import_common()
209 bool hmac; in qce_ahash_import() local
218 hmac = IS_SHA_HMAC(flags); in qce_ahash_import()
224 state->buffer, hmac); in qce_ahash_import()
229 state->buf, hmac); in qce_ahash_import()
467 .name = "hmac(sha1)",
468 .drv_name = "hmac-sha1-qce",
476 .name = "hmac(sha256)",
[all …]
/Linux-v5.10/include/linux/
Dsctp.h335 /* AUTH Section 3.3 HMAC Algorithm */
513 * chunk is received with an unsupported HMAC identifier.
518 * 0x0105 Unsupported HMAC Identifier
672 * This chunk is used to hold the result of the HMAC calculation.
679 * | Shared Key Identifier | HMAC Identifier |
682 * \ HMAC /
693 * This value holds the length of the HMAC in bytes plus 8.
698 * HMAC Identifier: 2 bytes (unsigned integer)
702 * The following Table 2 shows the currently defined values for HMAC
706 * | HMAC Identifier | Message Digest Algorithm |
[all …]

123456