Searched defs:hmac (Results 1 - 4 of 4) sorted by relevance

/net/sunrpc/auth_gss/
H A Dgss_krb5_mech.c82 .name = "rc4-hmac",
84 .cksum_name = "hmac(md5)",
103 .name = "des3-hmac-sha1",
105 .cksum_name = "hmac(sha1)",
126 .cksum_name = "hmac(sha1)",
149 .cksum_name = "hmac(sha1)",
430 struct crypto_hash *hmac; local
441 hmac = crypto_alloc_hash(ctx->gk5e->cksum_name, 0, CRYPTO_ALG_ASYNC);
442 if (IS_ERR(hmac)) {
444 __func__, PTR_ERR(hmac), ct
[all...]
H A Dgss_krb5_crypto.c647 struct xdr_netobj hmac; local
693 hmac.len = GSS_KRB5_MAX_CKSUM_LEN;
694 hmac.data = buf->tail[0].iov_base + buf->tail[0].iov_len;
701 * the hmac.
708 cksumkey, usage, &hmac);
821 /* Calculate our hmac over the plaintext data */
830 /* Get the packet's hmac value */
856 struct crypto_hash *hmac; local
865 hmac = crypto_alloc_hash(kctx->gk5e->cksum_name, 0, CRYPTO_ALG_ASYNC);
866 if (IS_ERR(hmac)) {
922 struct crypto_hash *hmac; local
[all...]
/net/sctp/
H A Dsm_make_chunk.c1266 __u8 *hmac; local
1268 /* Get the first hmac that the peer told us to use */
1284 hmac = skb_put(retval->skb, hmac_desc->hmac_len);
1285 memset(hmac, 0, hmac_desc->hmac_len);
1665 if (sctp_sk(ep->base.sk)->hmac) {
1670 desc.tfm = sctp_sk(ep->base.sk)->hmac;
1732 if (!sctp_sk(ep->base.sk)->hmac)
1737 desc.tfm = sctp_sk(ep->base.sk)->hmac;
H A Dsm_statefuns.c3995 struct sctp_hmac *hmac; local
4024 hmac = sctp_auth_get_hmac(ntohs(auth_hdr->hmac_id));
4025 if (sig_len != hmac->hmac_len)
4029 * verify the hmac. The steps involved are:
4035 digest = auth_hdr->hmac;

Completed in 202 milliseconds