Lines Matching full:hmac
47 void *hmac) in subflow_generate_hmac() argument
54 mptcp_crypto_hmac_sha(key1, key2, msg, 8, hmac); in subflow_generate_hmac()
63 /* validate received token and create truncated hmac and nonce for SYN-ACK */
68 u8 hmac[SHA256_DIGEST_SIZE]; in subflow_token_join_request() local
89 subflow_req->remote_nonce, hmac); in subflow_token_join_request()
91 subflow_req->thmac = get_unaligned_be64(hmac); in subflow_token_join_request()
255 /* validate received truncated hmac and create hmac for third ACK */
258 u8 hmac[SHA256_DIGEST_SIZE]; in subflow_thmac_valid() local
263 hmac); in subflow_thmac_valid()
265 thmac = get_unaligned_be64(hmac); in subflow_thmac_valid()
326 u8 hmac[SHA256_DIGEST_SIZE]; in subflow_finish_connect() local
347 hmac); in subflow_finish_connect()
348 memcpy(subflow->hmac, hmac, MPTCPOPT_HMAC_LEN); in subflow_finish_connect()
415 /* validate hmac received in third ACK */
420 u8 hmac[SHA256_DIGEST_SIZE]; in subflow_hmac_valid() local
430 subflow_req->local_nonce, hmac); in subflow_hmac_valid()
432 return !crypto_memneq(hmac, mp_opt->hmac, MPTCPOPT_HMAC_LEN); in subflow_hmac_valid()