Home
last modified time | relevance | path

Searched refs:HMAC (Results 1 – 25 of 32) sorted by relevance

12

/OK3568_Linux_fs/kernel/Documentation/networking/
H A Dseg6-sysctl.rst20 Define HMAC policy for ingress SR-enabled packets on this interface.
22 * -1 - Ignore HMAC field
23 * 0 - Accept SR packets without HMAC, validate SR packets with HMAC
24 * 1 - Drop SR packets without HMAC, validate SR packets with HMAC
/OK3568_Linux_fs/kernel/Documentation/ABI/testing/
H A Devm7 HMAC-sha1 value across the extended attributes, storing the
11 an HMAC-sha1 generated locally with a
23 0 Enable HMAC validation and creation
26 runtime. Not supported if HMAC validation and
35 will enable HMAC validation and creation
41 will enable HMAC and digital signature validation and
42 HMAC creation and disable all further modification of policy.
65 Note that once an HMAC key has been loaded, it will no longer
67 HMAC key has been loaded will clear the corresponding flag.
74 Loading an HMAC key is the only way to disable metadata
/OK3568_Linux_fs/kernel/security/integrity/evm/
H A DKconfig21 Include filesystem UUID for HMAC calculation.
26 WARNING: changing the HMAC calculation method or adding
35 Include additional SMACK xattrs for HMAC calculation.
39 in the HMAC calculation, enabling this option includes newly defined
43 WARNING: changing the HMAC calculation method or adding
52 Allow userland to provide additional xattrs for HMAC calculation.
/OK3568_Linux_fs/yocto/meta-openembedded/meta-perl/recipes-perl/libdigest/
H A Dlibdigest-hmac-perl_1.03.bb3 HOMEPAGE = "http://search.cpan.org/~gaas/Digest-HMAC-1.03/"
11 SRC_URI = "http://search.cpan.org/CPAN/authors/id/G/GA/GAAS/Digest-HMAC-${PV}.tar.gz \
17 S = "${WORKDIR}/Digest-HMAC-${PV}"
/OK3568_Linux_fs/external/security/librkcrypto/test/
H A Dmain.c25 HMAC, enumerator
68 {"hmac", 0, NULL, HMAC}, in main()
104 case HMAC: in main()
/OK3568_Linux_fs/buildroot/package/perl-digest-hmac/
H A Dperl-digest-hmac.mk8 PERL_DIGEST_HMAC_SOURCE = Digest-HMAC-$(PERL_DIGEST_HMAC_VERSION).tar.gz
12 PERL_DIGEST_HMAC_DISTNAME = Digest-HMAC
H A Dperl-digest-hmac.hash2 md5 746a5edffd1485d7500e005730c271c8 Digest-HMAC-1.04.tar.gz
3 sha256 d6bc8156aa275c44d794b7c18f44cdac4a58140245c959e6b19b2c3838b08ed4 Digest-HMAC-1.04.tar.gz
H A DConfig.in6 http://metacpan.org/release/Digest-HMAC
/OK3568_Linux_fs/external/security/rk_tee_user/v2/host/openssl/include/openssl/
H A Dhmac.h64 # error HMAC is disabled.
98 unsigned char *HMAC(const EVP_MD *evp_md, const void *key, int key_len,
/OK3568_Linux_fs/u-boot/drivers/crypto/rockchip/
H A DKconfig38 This enable HMAC algorithm support for
46 This enable HMAC algorithm support for
/OK3568_Linux_fs/kernel/Documentation/crypto/
H A Darchitecture.rst27 chaining mode, the HMAC mechanism, etc.
377 For example, HMAC(SHA256) is implemented with hmac.c and
400 The following call sequence is applicable when a caller triggers an HMAC
403 1. The AHASH API functions are invoked by the caller. The HMAC
406 During initialization of the HMAC cipher, the SHASH cipher type of
410 At one time, the HMAC implementation requires a SHA256 operation
413 2. The HMAC instance now invokes the SHASH API with the SHA256 cipher
H A Duserspace-if.rst34 - Message digest including keyed message digest (HMAC, CMAC)
134 the setsockopt() option of ALG_SET_KEY. If the key is not set the HMAC
135 operation is performed without the initial HMAC state change caused by
/OK3568_Linux_fs/buildroot/package/luaossl/
H A DConfig.in14 digest, HMAC, cipher, and CSPRNG interfaces.
/OK3568_Linux_fs/kernel/arch/arm64/
H A DMakefile.postlink20 quiet_cmd_gen_hmac = HMAC $@
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/include/openssl/
H A Dhmac.h80 OPENSSL_EXPORT uint8_t *HMAC(const EVP_MD *evp_md, const void *key,
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/include/openssl/
H A Dhmac.h80 OPENSSL_EXPORT uint8_t *HMAC(const EVP_MD *evp_md, const void *key,
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/host_include/openssl/
H A Dhmac.h80 OPENSSL_EXPORT uint8_t *HMAC(const EVP_MD *evp_md, const void *key,
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/host_include/openssl/
H A Dhmac.h80 OPENSSL_EXPORT uint8_t *HMAC(const EVP_MD *evp_md, const void *key,
/OK3568_Linux_fs/external/security/rk_tee_user/v1/export-user_ta/include/openssl/
H A Dhmac.h80 OPENSSL_EXPORT uint8_t *HMAC(const EVP_MD *evp_md, const void *key,
/OK3568_Linux_fs/external/security/rk_tee_user/v1/export-user_ta/host_include/openssl/
H A Dhmac.h80 OPENSSL_EXPORT uint8_t *HMAC(const EVP_MD *evp_md, const void *key,
/OK3568_Linux_fs/buildroot/package/tpm2-totp/
H A DConfig.in15 of in-TPM hmac calculation, the tpm2-totp's secret HMAC keys
/OK3568_Linux_fs/yocto/meta-openembedded/meta-networking/recipes-connectivity/mbedtls/
H A Dmbedtls_2.28.2.bb10 - Entropy pool and random generators, like CTR-DRBG and HMAC-DRBG \
/OK3568_Linux_fs/kernel/Documentation/filesystems/
H A Dubifs-authentication.rst270 keyed hash (HMAC) over its own contents and a hash of the root node of the index
311 Figure 3: Coverage areas of index node hash and master node HMAC
332 between the bud nodes. This new node type contains a HMAC over the current state
365 node is authenticated with a HMAC as described above, it is not possible to
368 To avoid tampering with this and other values stored there, a HMAC is added to
427 UBIFS authentication key. Instead, in addition the each HMAC a digital
431 to the way the IMA/EVM subsystem deals with such situations. The HMAC key
/OK3568_Linux_fs/kernel/drivers/crypto/
H A DKconfig673 - SHA1, HMAC-SHA1
674 - SHA256, HMAC-SHA256
686 bool "Hash/HMAC only"
689 Enable hashes/HMAC algorithms only:
690 - SHA1, HMAC-SHA1
691 - SHA256, HMAC-SHA256
846 SHA384 and SHA512 hash algorithms for both basic hash and HMAC.
847 Additionally, it accelerates combined AES-CBC/HMAC-SHA AEAD operations.
/OK3568_Linux_fs/kernel/net/sctp/
H A DKconfig52 prompt "Default SCTP cookie HMAC encoding"

12