/Linux-v6.1/fs/ubifs/ |
D | auth.c | 47 u8 *hmac) in ubifs_hash_calc_hmac() argument 49 return crypto_shash_tfm_digest(c->hmac_tfm, hash, c->hash_len, hmac); in ubifs_hash_calc_hmac() 81 err = ubifs_hash_calc_hmac(c, hash, auth->hmac); in ubifs_prepare_auth_node() 389 int len, int ofs_hmac, void *hmac) in ubifs_node_calc_hmac() argument 417 return crypto_shash_final(shash, hmac); in ubifs_node_calc_hmac() 452 u8 *hmac; in __ubifs_node_verify_hmac() local 455 hmac = kmalloc(hmac_len, GFP_NOFS); in __ubifs_node_verify_hmac() 456 if (!hmac) in __ubifs_node_verify_hmac() 459 err = ubifs_node_calc_hmac(c, node, len, ofs_hmac, hmac); in __ubifs_node_verify_hmac() 461 kfree(hmac); in __ubifs_node_verify_hmac() [all …]
|
D | master.c | 28 int hmac_offs = offsetof(struct ubifs_mst_node, hmac); in ubifs_compare_master_node() 135 if (ubifs_hmac_zero(c, c->mst_node->hmac)) { in scan_for_master() 143 offsetof(struct ubifs_mst_node, hmac)); in scan_for_master() 458 offsetof(struct ubifs_mst_node, hmac)); in ubifs_write_master() 470 offsetof(struct ubifs_mst_node, hmac)); in ubifs_write_master()
|
D | ubifs-media.h | 678 __u8 hmac[UBIFS_MAX_HMAC_LEN]; member 754 __u8 hmac[UBIFS_MAX_HMAC_LEN]; member 781 __u8 hmac[]; member
|
D | sb.c | 323 offsetof(struct ubifs_sb_node, hmac)); in create_default_filesystem() 343 offsetof(struct ubifs_mst_node, hmac)); in create_default_filesystem() 348 0, offsetof(struct ubifs_mst_node, hmac)); in create_default_filesystem() 587 if (ubifs_hmac_zero(c, sup->hmac)) { in authenticate_sb_node() 599 hmac)); in authenticate_sb_node() 621 offsetof(struct ubifs_sb_node, hmac), 1); in ubifs_write_sb_node()
|
/Linux-v6.1/net/sctp/ |
D | Kconfig | 56 This option sets the default sctp cookie hmac algorithm 60 bool "Enable optional MD5 hmac cookie generation" 62 Enable optional MD5 hmac based SCTP cookie generation 66 bool "Enable optional SHA1 hmac cookie generation" 68 Enable optional SHA1 hmac based SCTP cookie generation 72 bool "Use no hmac alg in SCTP cookie generation" 74 Use no hmac algorithm in SCTP cookie generation 79 bool "Enable optional MD5 hmac cookie generation" 81 Enable optional MD5 hmac based SCTP cookie generation 86 bool "Enable optional SHA1 hmac cookie generation" [all …]
|
/Linux-v6.1/net/mptcp/ |
D | crypto_test.c | 35 char hmac[32], hmac_hex[65]; in mptcp_crypto_test_basic() local 51 mptcp_crypto_hmac_sha(key1, key2, msg, 8, hmac); in mptcp_crypto_test_basic() 53 sprintf(&hmac_hex[j << 1], "%02x", hmac[j] & 0xff); in mptcp_crypto_test_basic()
|
D | crypto.c | 44 void mptcp_crypto_hmac_sha(u64 key1, u64 key2, u8 *msg, int len, void *hmac) in mptcp_crypto_hmac_sha() argument 78 sha256(input, SHA256_BLOCK_SIZE + SHA256_DIGEST_SIZE, hmac); in mptcp_crypto_hmac_sha()
|
D | subflow.c | 52 void *hmac) in subflow_generate_hmac() argument 59 mptcp_crypto_hmac_sha(key1, key2, msg, 8, hmac); in subflow_generate_hmac() 74 u8 hmac[SHA256_DIGEST_SIZE]; in subflow_req_create_thmac() local 80 subflow_req->remote_nonce, hmac); in subflow_req_create_thmac() 82 subflow_req->thmac = get_unaligned_be64(hmac); in subflow_req_create_thmac() 340 u8 hmac[SHA256_DIGEST_SIZE]; in subflow_thmac_valid() local 345 hmac); in subflow_thmac_valid() 347 thmac = get_unaligned_be64(hmac); in subflow_thmac_valid() 436 u8 hmac[SHA256_DIGEST_SIZE]; in subflow_finish_connect() local 463 hmac); in subflow_finish_connect() [all …]
|
D | options.c | 143 memcpy(mp_opt->hmac, ptr, MPTCPOPT_HMAC_LEN); in mptcp_parse_option() 505 memcpy(opts->hmac, subflow->hmac, MPTCPOPT_HMAC_LEN); in mptcp_established_options_mp() 623 u8 hmac[SHA256_DIGEST_SIZE]; in add_addr_generate_hmac() local 641 mptcp_crypto_hmac_sha(key1, key2, msg, i, hmac); in add_addr_generate_hmac() 643 return get_unaligned_be64(&hmac[SHA256_DIGEST_SIZE - sizeof(u64)]); in add_addr_generate_hmac() 1081 u64 hmac = 0; in add_addr_hmac_valid() local 1086 hmac = add_addr_generate_hmac(msk->remote_key, in add_addr_hmac_valid() 1091 msk, hmac, mp_opt->ahmac); in add_addr_hmac_valid() 1093 return hmac == mp_opt->ahmac; in add_addr_hmac_valid() 1486 memcpy(ptr, opts->hmac, MPTCPOPT_HMAC_LEN); in mptcp_write_options()
|
/Linux-v6.1/drivers/nvme/common/ |
D | auth.c | 91 const char hmac[15]; member 96 .hmac = "hmac(sha256)", 101 .hmac = "hmac(sha384)", 106 .hmac = "hmac(sha512)", 115 return hash_map[hmac_id].hmac; in nvme_auth_hmac_name() 135 if (!strlen(hash_map[i].hmac)) in nvme_auth_hmac_id() 137 if (!strncmp(hash_map[i].hmac, hmac_name, in nvme_auth_hmac_id() 138 strlen(hash_map[i].hmac))) in nvme_auth_hmac_id()
|
/Linux-v6.1/drivers/crypto/ |
D | atmel-sha.c | 1690 struct atmel_sha_hmac_ctx *hmac = crypto_ahash_ctx(tfm); in atmel_sha_hmac_setup() local 1695 hmac->resume = resume; in atmel_sha_hmac_setup() 1727 if (likely(!atmel_sha_hmac_key_get(&hmac->hkey, &key, &keylen))) in atmel_sha_hmac_setup() 1735 memcpy((u8 *)hmac->ipad, key, keylen); in atmel_sha_hmac_setup() 1736 memset((u8 *)hmac->ipad + keylen, 0, bs - keylen); in atmel_sha_hmac_setup() 1751 struct atmel_sha_hmac_ctx *hmac = crypto_ahash_ctx(tfm); in atmel_sha_hmac_prehash_key_done() local 1759 hmac->ipad[i] = atmel_sha_read(dd, SHA_REG_DIGEST(i)); in atmel_sha_hmac_prehash_key_done() 1760 memset((u8 *)hmac->ipad + ds, 0, bs - ds); in atmel_sha_hmac_prehash_key_done() 1768 struct atmel_sha_hmac_ctx *hmac = crypto_ahash_ctx(tfm); in atmel_sha_hmac_compute_ipad_hash() local 1773 memcpy(hmac->opad, hmac->ipad, bs); in atmel_sha_hmac_compute_ipad_hash() [all …]
|
/Linux-v6.1/drivers/crypto/ccree/ |
D | cc_aead.c | 52 struct cc_hmac_s hmac; member 95 struct cc_hmac_s *hmac = &ctx->auth_state.hmac; in cc_aead_exit() local 97 if (hmac->ipad_opad) { in cc_aead_exit() 99 hmac->ipad_opad, in cc_aead_exit() 100 hmac->ipad_opad_dma_addr); in cc_aead_exit() 102 &hmac->ipad_opad_dma_addr); in cc_aead_exit() 103 hmac->ipad_opad_dma_addr = 0; in cc_aead_exit() 104 hmac->ipad_opad = NULL; in cc_aead_exit() 106 if (hmac->padded_authkey) { in cc_aead_exit() 108 hmac->padded_authkey, in cc_aead_exit() [all …]
|
/Linux-v6.1/tools/testing/selftests/tpm2/ |
D | tpm2.py | 252 session_attributes=0, hmac=bytes()): argument 256 self.hmac = hmac 259 fmt = '>I H%us B H%us' % (len(self.nonce), len(self.hmac)) 261 self.nonce, self.session_attributes, len(self.hmac), 262 self.hmac) 265 fmt = '>I H%us B H%us' % (len(self.nonce), len(self.hmac)) 651 auth_cmd = AuthCommand(session_handle=policy_handle, hmac=auth_value) 653 auth_cmd = AuthCommand(hmac=auth_value)
|
/Linux-v6.1/drivers/thunderbolt/ |
D | domain.c | 704 u8 hmac[TB_SWITCH_KEY_SIZE]; in tb_domain_challenge_switch_key() local 740 memset(hmac, 0, sizeof(hmac)); in tb_domain_challenge_switch_key() 741 ret = crypto_shash_digest(shash, challenge, sizeof(hmac), hmac); in tb_domain_challenge_switch_key() 746 if (memcmp(response, hmac, sizeof(hmac))) { in tb_domain_challenge_switch_key()
|
/Linux-v6.1/drivers/crypto/allwinner/sun8i-ss/ |
D | sun8i-ss-hash.c | 505 int hmac = 0; in sun8i_ss_hash_run() local 579 if (tfmctx->keylen && hmac == 0) { in sun8i_ss_hash_run() 580 hmac = 1; in sun8i_ss_hash_run() 601 if (tfmctx->keylen && hmac == 2) { in sun8i_ss_hash_run() 689 if (hmac > 0) in sun8i_ss_hash_run() 694 if (hmac < 2) in sun8i_ss_hash_run() 697 if (hmac == 1 && !err) { in sun8i_ss_hash_run() 698 hmac = 2; in sun8i_ss_hash_run()
|
/Linux-v6.1/drivers/crypto/keembay/ |
D | Kconfig | 81 bool "Enable sha224 and hmac(sha224) support in Intel Keem Bay OCS HCU" 84 Enables support for sha224 and hmac(sha224) algorithms in the Intel 88 Provides OCS HCU hardware acceleration of sha224 and hmac(224).
|
/Linux-v6.1/include/uapi/linux/ |
D | seg6_hmac.h | 15 __u8 hmac[SEG6_HMAC_FIELD_LEN]; member
|
/Linux-v6.1/net/ipv6/ |
D | seg6_hmac.c | 272 if (memcmp(hmac_output, tlv->hmac, SEG6_HMAC_FIELD_LEN) != 0) in seg6_hmac_validate_skb() 342 memset(tlv->hmac, 0, SEG6_HMAC_FIELD_LEN); in seg6_push_hmac() 343 err = seg6_hmac_compute(hinfo, srh, saddr, tlv->hmac); in seg6_push_hmac()
|
/Linux-v6.1/drivers/crypto/inside-secure/ |
D | safexcel_hash.c | 42 bool hmac; member 270 if (sreq->hmac && in safexcel_handle_req_result() 281 sreq->hmac = 0; in safexcel_handle_req_result() 705 (req->finish && req->hmac && in safexcel_ahash_enqueue() 829 } else if (unlikely(req->hmac && in safexcel_ahash_final() 863 } else if (req->hmac) { in safexcel_ahash_final() 1030 req->hmac = true; in safexcel_hmac_sha1_init() 1128 req->hmac = true; in safexcel_hmac_init_iv() 1403 req->hmac = true; in safexcel_hmac_sha224_init() 1475 req->hmac = true; in safexcel_hmac_sha256_init() [all …]
|
/Linux-v6.1/security/keys/trusted-keys/ |
D | trusted_tpm2.c | 202 const u8 *hmac, u16 hmac_len) in tpm2_buf_append_auth() argument 214 if (hmac && hmac_len) in tpm2_buf_append_auth() 215 tpm_buf_append(buf, hmac, hmac_len); in tpm2_buf_append_auth()
|
/Linux-v6.1/drivers/crypto/cavium/cpt/ |
D | cptvf_algs.h | 95 struct fchmac_context hmac; member
|
/Linux-v6.1/drivers/net/wireguard/ |
D | noise.c | 305 static void hmac(u8 *out, const u8 *in, const u8 *key, const size_t inlen, const size_t keylen) in hmac() function 360 hmac(secret, data, chaining_key, data_len, NOISE_HASH_LEN); in kdf() 367 hmac(output, output, secret, 1, BLAKE2S_HASH_SIZE); in kdf() 375 hmac(output, output, secret, BLAKE2S_HASH_SIZE + 1, BLAKE2S_HASH_SIZE); in kdf() 383 hmac(output, output, secret, BLAKE2S_HASH_SIZE + 1, BLAKE2S_HASH_SIZE); in kdf()
|
/Linux-v6.1/drivers/nvme/target/ |
D | auth.c | 37 const char *hmac = nvme_auth_hmac_name(key_hash); in nvmet_auth_set_key() local 39 if (!crypto_has_shash(hmac, 0, 0)) { in nvmet_auth_set_key() 40 pr_err("DH-HMAC-CHAP hash %s unsupported\n", hmac); in nvmet_auth_set_key()
|
/Linux-v6.1/net/sunrpc/auth_gss/ |
D | gss_krb5_crypto.c | 603 struct xdr_netobj hmac; in gss_krb5_aes_encrypt() local 649 hmac.len = GSS_KRB5_MAX_CKSUM_LEN; in gss_krb5_aes_encrypt() 650 hmac.data = buf->tail[0].iov_base + buf->tail[0].iov_len; in gss_krb5_aes_encrypt() 664 cksumkey, usage, &hmac); in gss_krb5_aes_encrypt()
|
/Linux-v6.1/drivers/net/ethernet/3com/ |
D | typhoon.c | 1342 u32 hmac; in typhoon_download_firmware() local 1378 hmac = le32_to_cpu(fHdr->hmacDigest[0]); in typhoon_download_firmware() 1379 iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_0); in typhoon_download_firmware() 1380 hmac = le32_to_cpu(fHdr->hmacDigest[1]); in typhoon_download_firmware() 1381 iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_1); in typhoon_download_firmware() 1382 hmac = le32_to_cpu(fHdr->hmacDigest[2]); in typhoon_download_firmware() 1383 iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_2); in typhoon_download_firmware() 1384 hmac = le32_to_cpu(fHdr->hmacDigest[3]); in typhoon_download_firmware() 1385 iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_3); in typhoon_download_firmware() 1386 hmac = le32_to_cpu(fHdr->hmacDigest[4]); in typhoon_download_firmware() [all …]
|