Searched defs:hmac (Results 1 - 4 of 4) sorted by relevance
/net/sunrpc/auth_gss/ |
H A D | gss_krb5_mech.c | 82 .name = "rc4-hmac", 84 .cksum_name = "hmac(md5)", 103 .name = "des3-hmac-sha1", 105 .cksum_name = "hmac(sha1)", 126 .cksum_name = "hmac(sha1)", 149 .cksum_name = "hmac(sha1)", 430 struct crypto_hash *hmac; local 441 hmac = crypto_alloc_hash(ctx->gk5e->cksum_name, 0, CRYPTO_ALG_ASYNC); 442 if (IS_ERR(hmac)) { 444 __func__, PTR_ERR(hmac), ct [all...] |
H A D | gss_krb5_crypto.c | 647 struct xdr_netobj hmac; local 693 hmac.len = GSS_KRB5_MAX_CKSUM_LEN; 694 hmac.data = buf->tail[0].iov_base + buf->tail[0].iov_len; 701 * the hmac. 708 cksumkey, usage, &hmac); 821 /* Calculate our hmac over the plaintext data */ 830 /* Get the packet's hmac value */ 856 struct crypto_hash *hmac; local 865 hmac = crypto_alloc_hash(kctx->gk5e->cksum_name, 0, CRYPTO_ALG_ASYNC); 866 if (IS_ERR(hmac)) { 922 struct crypto_hash *hmac; local [all...] |
/net/sctp/ |
H A D | sm_make_chunk.c | 1266 __u8 *hmac; local 1268 /* Get the first hmac that the peer told us to use */ 1284 hmac = skb_put(retval->skb, hmac_desc->hmac_len); 1285 memset(hmac, 0, hmac_desc->hmac_len); 1665 if (sctp_sk(ep->base.sk)->hmac) { 1670 desc.tfm = sctp_sk(ep->base.sk)->hmac; 1732 if (!sctp_sk(ep->base.sk)->hmac) 1737 desc.tfm = sctp_sk(ep->base.sk)->hmac;
|
H A D | sm_statefuns.c | 3995 struct sctp_hmac *hmac; local 4024 hmac = sctp_auth_get_hmac(ntohs(auth_hdr->hmac_id)); 4025 if (sig_len != hmac->hmac_len) 4029 * verify the hmac. The steps involved are: 4035 digest = auth_hdr->hmac;
|
Completed in 202 milliseconds