Symbol: hmac
arch/s390/crypto/hmac_s390.c
376
struct s390_hmac_alg *hmac;
arch/s390/crypto/hmac_s390.c
380
hmac = &s390_hmac_algs[i];
arch/s390/crypto/hmac_s390.c
381
if (!hmac->registered)
arch/s390/crypto/hmac_s390.c
383
crypto_unregister_shash(&hmac->alg);
arch/s390/crypto/hmac_s390.c
389
struct s390_hmac_alg *hmac;
arch/s390/crypto/hmac_s390.c
398
hmac = &s390_hmac_algs[i];
arch/s390/crypto/hmac_s390.c
399
if (!cpacf_query_func(CPACF_KMAC, hmac->fc))
arch/s390/crypto/hmac_s390.c
402
rc = crypto_register_shash(&hmac->alg);
arch/s390/crypto/hmac_s390.c
405
hmac->alg.halg.base.cra_name);
arch/s390/crypto/hmac_s390.c
408
hmac->registered = true;
arch/s390/crypto/hmac_s390.c
409
pr_debug("registered %s\n", hmac->alg.halg.base.cra_name);
drivers/char/tpm/tpm2-sessions.c
589
u8 *hmac = NULL;
drivers/char/tpm/tpm2-sessions.c
648
hmac = &buf->data[offset_s];
drivers/char/tpm/tpm2-sessions.c
663
if (!hmac) {
drivers/char/tpm/tpm2-sessions.c
722
hmac_sha256_final(&hctx, hmac);
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-hash.c
501
int hmac = 0;
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-hash.c
575
if (tfmctx->keylen && hmac == 0) {
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-hash.c
576
hmac = 1;
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-hash.c
597
if (tfmctx->keylen && hmac == 2) {
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-hash.c
685
if (hmac > 0)
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-hash.c
690
if (hmac < 2)
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-hash.c
693
if (hmac == 1 && !err) {
drivers/crypto/allwinner/sun8i-ss/sun8i-ss-hash.c
694
hmac = 2;
drivers/crypto/atmel-sha.c
1689
struct atmel_sha_hmac_ctx *hmac = crypto_ahash_ctx(tfm);
drivers/crypto/atmel-sha.c
1694
hmac->resume = resume;
drivers/crypto/atmel-sha.c
1726
if (likely(!atmel_sha_hmac_key_get(&hmac->hkey, &key, &keylen)))
drivers/crypto/atmel-sha.c
1734
memcpy((u8 *)hmac->ipad, key, keylen);
drivers/crypto/atmel-sha.c
1735
memset((u8 *)hmac->ipad + keylen, 0, bs - keylen);
drivers/crypto/atmel-sha.c
1750
struct atmel_sha_hmac_ctx *hmac = crypto_ahash_ctx(tfm);
drivers/crypto/atmel-sha.c
1758
hmac->ipad[i] = atmel_sha_read(dd, SHA_REG_DIGEST(i));
drivers/crypto/atmel-sha.c
1759
memset((u8 *)hmac->ipad + ds, 0, bs - ds);
drivers/crypto/atmel-sha.c
1767
struct atmel_sha_hmac_ctx *hmac = crypto_ahash_ctx(tfm);
drivers/crypto/atmel-sha.c
1772
unsafe_memcpy(hmac->opad, hmac->ipad, bs,
drivers/crypto/atmel-sha.c
1775
hmac->ipad[i] ^= 0x36363636;
drivers/crypto/atmel-sha.c
1776
hmac->opad[i] ^= 0x5c5c5c5c;
drivers/crypto/atmel-sha.c
1779
return atmel_sha_cpu_hash(dd, hmac->ipad, bs, false,
drivers/crypto/atmel-sha.c
1787
struct atmel_sha_hmac_ctx *hmac = crypto_ahash_ctx(tfm);
drivers/crypto/atmel-sha.c
1794
hmac->ipad[i] = atmel_sha_read(dd, SHA_REG_DIGEST(i));
drivers/crypto/atmel-sha.c
1795
return atmel_sha_cpu_hash(dd, hmac->opad, bs, false,
drivers/crypto/atmel-sha.c
1803
struct atmel_sha_hmac_ctx *hmac = crypto_ahash_ctx(tfm);
drivers/crypto/atmel-sha.c
1809
hmac->opad[i] = atmel_sha_read(dd, SHA_REG_DIGEST(i));
drivers/crypto/atmel-sha.c
1810
atmel_sha_hmac_key_release(&hmac->hkey);
drivers/crypto/atmel-sha.c
1811
return hmac->resume(dd);
drivers/crypto/atmel-sha.c
1853
struct atmel_sha_hmac_ctx *hmac = crypto_ahash_ctx(tfm);
drivers/crypto/atmel-sha.c
1855
return atmel_sha_hmac_key_set(&hmac->hkey, key, keylen);
drivers/crypto/atmel-sha.c
1874
struct atmel_sha_hmac_ctx *hmac = crypto_ahash_ctx(tfm);
drivers/crypto/atmel-sha.c
1882
memcpy(ctx->digest, hmac->ipad, hs);
drivers/crypto/atmel-sha.c
1891
struct atmel_sha_hmac_ctx *hmac = crypto_ahash_ctx(tfm);
drivers/crypto/atmel-sha.c
1908
atmel_sha_write(dd, SHA_REG_DIN(i), hmac->opad[i]);
drivers/crypto/atmel-sha.c
1950
struct atmel_sha_hmac_ctx *hmac = crypto_ahash_ctx(tfm);
drivers/crypto/atmel-sha.c
1986
atmel_sha_write(dd, SHA_REG_DIN(i), hmac->ipad[i]);
drivers/crypto/atmel-sha.c
1990
atmel_sha_write(dd, SHA_REG_DIN(i), hmac->opad[i]);
drivers/crypto/atmel-sha.c
2025
struct atmel_sha_hmac_ctx *hmac = crypto_tfm_ctx(tfm);
drivers/crypto/atmel-sha.c
2029
hmac->base.start = atmel_sha_hmac_start;
drivers/crypto/atmel-sha.c
2030
atmel_sha_hmac_key_init(&hmac->hkey);
drivers/crypto/atmel-sha.c
2037
struct atmel_sha_hmac_ctx *hmac = crypto_tfm_ctx(tfm);
drivers/crypto/atmel-sha.c
2039
atmel_sha_hmac_key_release(&hmac->hkey);
drivers/crypto/atmel-sha.c
2285
struct atmel_sha_hmac_ctx *hmac = crypto_ahash_ctx(tfm);
drivers/crypto/atmel-sha.c
2297
ctx->flags = hmac->base.flags;
drivers/crypto/atmel-sha.c
2308
struct atmel_sha_hmac_ctx *hmac = crypto_ahash_ctx(tfm);
drivers/crypto/atmel-sha.c
2315
atmel_sha_write(dd, SHA_REG_DIN(i), hmac->ipad[i]);
drivers/crypto/atmel-sha.c
2319
atmel_sha_write(dd, SHA_REG_DIN(i), hmac->opad[i]);
drivers/crypto/axis/artpec6_crypto.c
2262
artpec6_crypto_init_hash(struct ahash_request *req, u8 type, int hmac)
drivers/crypto/axis/artpec6_crypto.c
2272
if (hmac)
drivers/crypto/axis/artpec6_crypto.c
2277
oper = hmac ? regk_crypto_hmac_sha1 : regk_crypto_sha1;
drivers/crypto/axis/artpec6_crypto.c
2280
oper = hmac ? regk_crypto_hmac_sha256 : regk_crypto_sha256;
drivers/crypto/cavium/cpt/cptvf_algs.h
95
struct fchmac_context hmac;
drivers/crypto/ccree/cc_aead.c
100
hmac->ipad_opad_dma_addr);
drivers/crypto/ccree/cc_aead.c
1003
ctx->auth_state.hmac.ipad_opad_dma_addr, digest_size,
drivers/crypto/ccree/cc_aead.c
102
&hmac->ipad_opad_dma_addr);
drivers/crypto/ccree/cc_aead.c
103
hmac->ipad_opad_dma_addr = 0;
drivers/crypto/ccree/cc_aead.c
104
hmac->ipad_opad = NULL;
drivers/crypto/ccree/cc_aead.c
106
if (hmac->padded_authkey) {
drivers/crypto/ccree/cc_aead.c
108
hmac->padded_authkey,
drivers/crypto/ccree/cc_aead.c
109
hmac->padded_authkey_dma_addr);
drivers/crypto/ccree/cc_aead.c
111
&hmac->padded_authkey_dma_addr);
drivers/crypto/ccree/cc_aead.c
112
hmac->padded_authkey_dma_addr = 0;
drivers/crypto/ccree/cc_aead.c
113
hmac->padded_authkey = NULL;
drivers/crypto/ccree/cc_aead.c
1132
(ctx->auth_state.hmac.ipad_opad_dma_addr + digest_size),
drivers/crypto/ccree/cc_aead.c
169
struct cc_hmac_s *hmac = &ctx->auth_state.hmac;
drivers/crypto/ccree/cc_aead.c
171
dma_addr_t *pkey_dma = &hmac->padded_authkey_dma_addr;
drivers/crypto/ccree/cc_aead.c
174
hmac->ipad_opad = dma_alloc_coherent(dev, digest_size,
drivers/crypto/ccree/cc_aead.c
175
&hmac->ipad_opad_dma_addr,
drivers/crypto/ccree/cc_aead.c
178
if (!hmac->ipad_opad) {
drivers/crypto/ccree/cc_aead.c
184
hmac->ipad_opad);
drivers/crypto/ccree/cc_aead.c
186
hmac->padded_authkey = dma_alloc_coherent(dev,
drivers/crypto/ccree/cc_aead.c
191
if (!hmac->padded_authkey) {
drivers/crypto/ccree/cc_aead.c
196
ctx->auth_state.hmac.ipad_opad = NULL;
drivers/crypto/ccree/cc_aead.c
197
ctx->auth_state.hmac.padded_authkey = NULL;
drivers/crypto/ccree/cc_aead.c
301
struct cc_hmac_s *hmac = &ctx->auth_state.hmac;
drivers/crypto/ccree/cc_aead.c
338
hmac->padded_authkey_dma_addr,
drivers/crypto/ccree/cc_aead.c
349
(hmac->ipad_opad_dma_addr + digest_ofs),
drivers/crypto/ccree/cc_aead.c
426
ctx->auth_state.hmac.padded_authkey_dma_addr;
drivers/crypto/ccree/cc_aead.c
52
struct cc_hmac_s hmac;
drivers/crypto/ccree/cc_aead.c
95
struct cc_hmac_s *hmac = &ctx->auth_state.hmac;
drivers/crypto/ccree/cc_aead.c
97
if (hmac->ipad_opad) {
drivers/crypto/ccree/cc_aead.c
99
hmac->ipad_opad,
drivers/crypto/inside-secure/safexcel_hash.c
1028
req->hmac = true;
drivers/crypto/inside-secure/safexcel_hash.c
1105
req->hmac = true;
drivers/crypto/inside-secure/safexcel_hash.c
1375
req->hmac = true;
drivers/crypto/inside-secure/safexcel_hash.c
1447
req->hmac = true;
drivers/crypto/inside-secure/safexcel_hash.c
1633
req->hmac = true;
drivers/crypto/inside-secure/safexcel_hash.c
1705
req->hmac = true;
drivers/crypto/inside-secure/safexcel_hash.c
1828
req->hmac = true;
drivers/crypto/inside-secure/safexcel_hash.c
2224
req->hmac = true;
drivers/crypto/inside-secure/safexcel_hash.c
272
if (sreq->hmac &&
drivers/crypto/inside-secure/safexcel_hash.c
2749
req->hmac = true;
drivers/crypto/inside-secure/safexcel_hash.c
2820
req->hmac = true;
drivers/crypto/inside-secure/safexcel_hash.c
283
sreq->hmac = 0;
drivers/crypto/inside-secure/safexcel_hash.c
2891
req->hmac = true;
drivers/crypto/inside-secure/safexcel_hash.c
2962
req->hmac = true;
drivers/crypto/inside-secure/safexcel_hash.c
42
bool hmac;
drivers/crypto/inside-secure/safexcel_hash.c
703
(req->finish && req->hmac &&
drivers/crypto/inside-secure/safexcel_hash.c
827
} else if (unlikely(req->hmac &&
drivers/crypto/inside-secure/safexcel_hash.c
861
} else if (req->hmac) {
drivers/crypto/marvell/octeontx/otx_cptvf_algs.c
108
if (memcmp(rctx->fctx.hmac.s.hmac_calc,
drivers/crypto/marvell/octeontx/otx_cptvf_algs.c
109
rctx->fctx.hmac.s.hmac_recv,
drivers/crypto/marvell/octeontx/otx_cptvf_algs.c
1117
rctx->fctx.hmac.s.hmac_recv, mac_len,
drivers/crypto/marvell/octeontx/otx_cptvf_algs.c
1124
req_info->out[argcnt].vptr = rctx->fctx.hmac.s.hmac_calc;
drivers/crypto/marvell/octeontx/otx_cptvf_algs.c
911
memcpy(fctx->hmac.e.ipad, ctx->ipad, ds);
drivers/crypto/marvell/octeontx/otx_cptvf_algs.c
913
memcpy(fctx->hmac.e.opad, ctx->opad, ds);
drivers/crypto/marvell/octeontx/otx_cptvf_algs.h
126
union otx_cpt_fchmac_ctx hmac;
drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.c
1196
rctx->fctx.hmac.s.hmac_recv, mac_len,
drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.c
1201
req_info->out[argcnt].vptr = rctx->fctx.hmac.s.hmac_calc;
drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.c
93
if (memcmp(rctx->fctx.hmac.s.hmac_calc,
drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.c
94
rctx->fctx.hmac.s.hmac_recv,
drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.c
997
memcpy(fctx->hmac.e.ipad, ctx->ipad, ds);
drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.c
999
memcpy(fctx->hmac.e.opad, ctx->opad, ds);
drivers/crypto/marvell/octeontx2/otx2_cptvf_algs.h
117
union otx2_cpt_fc_hmac_ctx hmac;
drivers/crypto/starfive/jh7110-cryp.h
90
u32 hmac :1;
drivers/crypto/starfive/jh7110-hash.c
74
rctx->csr.hash.hmac = 1;
drivers/gpu/drm/nouveau/nvkm/subdev/gsp/rm/r535/nvrm/gsp.h
661
NvU8 hmac[32];
drivers/net/ethernet/3com/typhoon.c
1342
u32 hmac;
drivers/net/ethernet/3com/typhoon.c
1378
hmac = le32_to_cpu(fHdr->hmacDigest[0]);
drivers/net/ethernet/3com/typhoon.c
1379
iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_0);
drivers/net/ethernet/3com/typhoon.c
1380
hmac = le32_to_cpu(fHdr->hmacDigest[1]);
drivers/net/ethernet/3com/typhoon.c
1381
iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_1);
drivers/net/ethernet/3com/typhoon.c
1382
hmac = le32_to_cpu(fHdr->hmacDigest[2]);
drivers/net/ethernet/3com/typhoon.c
1383
iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_2);
drivers/net/ethernet/3com/typhoon.c
1384
hmac = le32_to_cpu(fHdr->hmacDigest[3]);
drivers/net/ethernet/3com/typhoon.c
1385
iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_3);
drivers/net/ethernet/3com/typhoon.c
1386
hmac = le32_to_cpu(fHdr->hmacDigest[4]);
drivers/net/ethernet/3com/typhoon.c
1387
iowrite32(hmac, ioaddr + TYPHOON_REG_DOWNLOAD_HMAC_4);
drivers/net/wireguard/noise.c
360
hmac(secret, data, chaining_key, data_len, NOISE_HASH_LEN);
drivers/net/wireguard/noise.c
367
hmac(output, output, secret, 1, BLAKE2S_HASH_SIZE);
drivers/net/wireguard/noise.c
375
hmac(output, output, secret, BLAKE2S_HASH_SIZE + 1, BLAKE2S_HASH_SIZE);
drivers/net/wireguard/noise.c
383
hmac(output, output, secret, BLAKE2S_HASH_SIZE + 1, BLAKE2S_HASH_SIZE);
drivers/nvme/common/auth.c
104
.hmac = "hmac(sha384)",
drivers/nvme/common/auth.c
109
.hmac = "hmac(sha512)",
drivers/nvme/common/auth.c
118
return hash_map[hmac_id].hmac;
drivers/nvme/common/auth.c
138
if (!strlen(hash_map[i].hmac))
drivers/nvme/common/auth.c
140
if (!strncmp(hash_map[i].hmac, hmac_name,
drivers/nvme/common/auth.c
141
strlen(hash_map[i].hmac)))
drivers/nvme/common/auth.c
94
const char hmac[15];
drivers/nvme/common/auth.c
99
.hmac = "hmac(sha256)",
drivers/nvme/common/keyring.c
105
psk_ver, generated ? 'G' : 'R', hmac, hostnqn, subnqn);
drivers/nvme/common/keyring.c
93
u8 hmac, u8 psk_ver, bool generated)
drivers/nvme/target/auth.c
50
const char *hmac = nvme_auth_hmac_name(key_hash);
drivers/nvme/target/auth.c
52
if (!crypto_has_shash(hmac, 0, 0)) {
drivers/nvme/target/auth.c
53
pr_err("DH-HMAC-CHAP hash %s unsupported\n", hmac);
drivers/thunderbolt/domain.c
716
u8 hmac[TB_SWITCH_KEY_SIZE];
drivers/thunderbolt/domain.c
733
static_assert(sizeof(hmac) == SHA256_DIGEST_SIZE);
drivers/thunderbolt/domain.c
735
challenge, sizeof(challenge), hmac);
drivers/thunderbolt/domain.c
738
if (crypto_memneq(response, hmac, sizeof(hmac)))
fs/smb/client/cifsencrypt.c
36
if (ctx->hmac) {
fs/smb/client/cifsencrypt.c
37
hmac_sha256_update(ctx->hmac, data, len);
fs/smb/client/cifsencrypt.c
49
if (ctx->hmac) {
fs/smb/client/cifsencrypt.c
50
hmac_sha256_final(ctx->hmac, out);
fs/smb/client/cifsglob.h
2325
struct hmac_sha256_ctx *hmac;
fs/smb/client/smb2transport.c
254
&(struct cifs_calc_sig_ctx){ .hmac = &hmac_ctx });
fs/ubifs/auth.c
388
int len, int ofs_hmac, void *hmac)
fs/ubifs/auth.c
416
return crypto_shash_final(shash, hmac);
fs/ubifs/auth.c
451
u8 *hmac;
fs/ubifs/auth.c
454
hmac = kmalloc(hmac_len, GFP_NOFS);
fs/ubifs/auth.c
455
if (!hmac)
fs/ubifs/auth.c
458
err = ubifs_node_calc_hmac(c, node, len, ofs_hmac, hmac);
fs/ubifs/auth.c
46
u8 *hmac)
fs/ubifs/auth.c
460
kfree(hmac);
fs/ubifs/auth.c
464
err = crypto_memneq(hmac, node + ofs_hmac, hmac_len);
fs/ubifs/auth.c
466
kfree(hmac);
fs/ubifs/auth.c
48
return crypto_shash_tfm_digest(c->hmac_tfm, hash, c->hash_len, hmac);
fs/ubifs/auth.c
508
int ubifs_hmac_wkm(struct ubifs_info *c, u8 *hmac)
fs/ubifs/auth.c
516
sizeof(well_known_message) - 1, hmac);
fs/ubifs/auth.c
527
bool ubifs_hmac_zero(struct ubifs_info *c, const u8 *hmac)
fs/ubifs/auth.c
529
return !memchr_inv(hmac, 0, c->hmac_desc_len);
fs/ubifs/auth.c
80
err = ubifs_hash_calc_hmac(c, hash, auth->hmac);
fs/ubifs/master.c
138
if (ubifs_hmac_zero(c, c->mst_node->hmac)) {
fs/ubifs/master.c
146
offsetof(struct ubifs_mst_node, hmac));
fs/ubifs/master.c
28
int hmac_offs = offsetof(struct ubifs_mst_node, hmac);
fs/ubifs/master.c
461
offsetof(struct ubifs_mst_node, hmac));
fs/ubifs/master.c
473
offsetof(struct ubifs_mst_node, hmac));
fs/ubifs/recovery.c
204
offsetof(struct ubifs_mst_node, hmac), 1);
fs/ubifs/replay.c
601
u8 hmac[UBIFS_HMAC_ARR_SZ];
fs/ubifs/replay.c
618
c->hash_len, hmac);
fs/ubifs/replay.c
622
err = ubifs_check_hmac(c, auth->hmac, hmac);
fs/ubifs/sb.c
323
offsetof(struct ubifs_sb_node, hmac));
fs/ubifs/sb.c
343
offsetof(struct ubifs_mst_node, hmac));
fs/ubifs/sb.c
348
0, offsetof(struct ubifs_mst_node, hmac));
fs/ubifs/sb.c
587
if (ubifs_hmac_zero(c, sup->hmac)) {
fs/ubifs/sb.c
599
hmac));
fs/ubifs/sb.c
621
offsetof(struct ubifs_sb_node, hmac), 1);
fs/ubifs/super.c
1377
if (ubifs_authenticated(c) && ubifs_hmac_zero(c, c->sup_node->hmac)) {
fs/ubifs/ubifs-media.h
678
__u8 hmac[UBIFS_MAX_HMAC_LEN];
fs/ubifs/ubifs-media.h
754
__u8 hmac[UBIFS_MAX_HMAC_LEN];
fs/ubifs/ubifs-media.h
781
__u8 hmac[];
fs/ubifs/ubifs.h
1710
bool ubifs_hmac_zero(struct ubifs_info *c, const u8 *hmac);
fs/ubifs/ubifs.h
1712
int ubifs_hmac_wkm(struct ubifs_info *c, u8 *hmac);
include/net/mptcp.h
94
u8 hmac[MPTCPOPT_HMAC_LEN];
include/uapi/linux/seg6_hmac.h
15
__u8 hmac[SEG6_HMAC_FIELD_LEN];
net/ceph/crypto.c
442
int buf_len, u8 hmac[SHA256_DIGEST_SIZE])
net/ceph/crypto.c
447
memset(hmac, 0, SHA256_DIGEST_SIZE);
net/ceph/crypto.c
450
hmac_sha256(&key->hmac_key, buf, buf_len, hmac);
net/ceph/crypto.h
45
int buf_len, u8 hmac[SHA256_DIGEST_SIZE]);
net/ceph/messenger_v2.c
2430
u8 hmac[SHA256_DIGEST_SIZE];
net/ceph/messenger_v2.c
2439
hmac);
net/ceph/messenger_v2.c
2442
if (crypto_memneq(p, hmac, SHA256_DIGEST_SIZE)) {
net/ceph/messenger_v2.c
783
u8 hmac[SHA256_DIGEST_SIZE])
net/ceph/messenger_v2.c
792
memset(hmac, 0, SHA256_DIGEST_SIZE);
net/ceph/messenger_v2.c
800
hmac_sha256_final(&ctx, hmac);
net/ipv6/seg6_hmac.c
216
if (crypto_memneq(hmac_output, tlv->hmac, SEG6_HMAC_FIELD_LEN))
net/ipv6/seg6_hmac.c
299
memset(tlv->hmac, 0, SEG6_HMAC_FIELD_LEN);
net/ipv6/seg6_hmac.c
300
err = seg6_hmac_compute(hinfo, srh, saddr, tlv->hmac);
net/mptcp/crypto.c
43
void mptcp_crypto_hmac_sha(u64 key1, u64 key2, u8 *msg, int len, void *hmac)
net/mptcp/crypto.c
47
hmac_sha256_usingrawkey((const u8 *)key, sizeof(key), msg, len, hmac);
net/mptcp/crypto_test.c
35
char hmac[32], hmac_hex[65];
net/mptcp/crypto_test.c
51
mptcp_crypto_hmac_sha(key1, key2, msg, 8, hmac);
net/mptcp/crypto_test.c
53
sprintf(&hmac_hex[j << 1], "%02x", hmac[j] & 0xff);
net/mptcp/options.c
1144
u64 hmac = 0;
net/mptcp/options.c
1149
hmac = add_addr_generate_hmac(READ_ONCE(msk->remote_key),
net/mptcp/options.c
1154
msk, hmac, mp_opt->ahmac);
net/mptcp/options.c
1156
return hmac == mp_opt->ahmac;
net/mptcp/options.c
150
memcpy(mp_opt->hmac, ptr, MPTCPOPT_HMAC_LEN);
net/mptcp/options.c
1580
memcpy(ptr, opts->hmac, MPTCPOPT_HMAC_LEN);
net/mptcp/options.c
516
memcpy(opts->hmac, subflow->hmac, MPTCPOPT_HMAC_LEN);
net/mptcp/options.c
631
u8 hmac[SHA256_DIGEST_SIZE];
net/mptcp/options.c
649
mptcp_crypto_hmac_sha(key1, key2, msg, i, hmac);
net/mptcp/options.c
651
return get_unaligned_be64(&hmac[SHA256_DIGEST_SIZE - sizeof(u64)]);
net/mptcp/protocol.h
1051
void mptcp_crypto_hmac_sha(u64 key1, u64 key2, u8 *msg, int len, void *hmac);
net/mptcp/protocol.h
172
u8 hmac[MPTCPOPT_HMAC_LEN];
net/mptcp/protocol.h
561
u8 hmac[MPTCPOPT_HMAC_LEN]; /* MPJ subflow only */
net/mptcp/subflow.c
416
u8 hmac[SHA256_DIGEST_SIZE];
net/mptcp/subflow.c
421
hmac);
net/mptcp/subflow.c
423
thmac = get_unaligned_be64(hmac);
net/mptcp/subflow.c
51
void *hmac)
net/mptcp/subflow.c
568
u8 hmac[SHA256_DIGEST_SIZE];
net/mptcp/subflow.c
58
mptcp_crypto_hmac_sha(key1, key2, msg, 8, hmac);
net/mptcp/subflow.c
595
hmac);
net/mptcp/subflow.c
596
memcpy(subflow->hmac, hmac, MPTCPOPT_HMAC_LEN);
net/mptcp/subflow.c
73
u8 hmac[SHA256_DIGEST_SIZE];
net/mptcp/subflow.c
757
u8 hmac[SHA256_DIGEST_SIZE];
net/mptcp/subflow.c
762
subflow_req->local_nonce, hmac);
net/mptcp/subflow.c
764
return !crypto_memneq(hmac, mp_opt->hmac, MPTCPOPT_HMAC_LEN);
net/mptcp/subflow.c
80
subflow_req->remote_nonce, hmac);
net/mptcp/subflow.c
82
subflow_req->thmac = get_unaligned_be64(hmac);
net/sctp/sm_statefuns.c
4366
const struct sctp_hmac *hmac;
net/sctp/sm_statefuns.c
4396
hmac = sctp_auth_get_hmac(ntohs(auth_hdr->hmac_id));
net/sctp/sm_statefuns.c
4397
if (sig_len != hmac->hmac_len)
net/sunrpc/auth_gss/gss_krb5_crypto.c
586
struct xdr_netobj hmac;
net/sunrpc/auth_gss/gss_krb5_crypto.c
625
hmac.len = kctx->gk5e->cksumlength;
net/sunrpc/auth_gss/gss_krb5_crypto.c
626
hmac.data = buf->tail[0].iov_base + buf->tail[0].iov_len;
net/sunrpc/auth_gss/gss_krb5_crypto.c
639
offset + GSS_KRB5_TOK_HDR_LEN, &hmac);
net/sunrpc/auth_gss/gss_krb5_crypto.c
818
struct xdr_netobj hmac;
net/sunrpc/auth_gss/gss_krb5_crypto.c
859
hmac.data = buf->tail[0].iov_base + buf->tail[0].iov_len;
net/sunrpc/auth_gss/gss_krb5_crypto.c
860
hmac.len = kctx->gk5e->cksumlength;
net/sunrpc/auth_gss/gss_krb5_crypto.c
862
buf, offset + GSS_KRB5_TOK_HDR_LEN, &hmac);
security/keys/encrypted-keys/encrypted.c
660
u8 *hmac;
security/keys/encrypted-keys/encrypted.c
681
hmac = epayload->format + epayload->datablob_len;
security/keys/encrypted-keys/encrypted.c
682
ret = hex2bin(hmac, hex_encoded_data + (encrypted_datalen * 2),
security/keys/trusted-keys/trusted_tpm2.c
207
const u8 *hmac, u16 hmac_len)
security/keys/trusted-keys/trusted_tpm2.c
219
if (hmac && hmac_len)
security/keys/trusted-keys/trusted_tpm2.c
220
tpm_buf_append(buf, hmac, hmac_len);