Home
last modified time | relevance | path

Searched refs:hmac (Results 1 – 12 of 12) sorted by relevance

/net/sctp/
DKconfig55 This option sets the default sctp cookie hmac algorithm
59 bool "Enable optional MD5 hmac cookie generation"
61 Enable optional MD5 hmac based SCTP cookie generation
65 bool "Enable optional SHA1 hmac cookie generation"
67 Enable optional SHA1 hmac based SCTP cookie generation
71 bool "Use no hmac alg in SCTP cookie generation"
73 Use no hmac algorithm in SCTP cookie generation
78 bool "Enable optional MD5 hmac cookie generation"
80 Enable optional MD5 hmac based SCTP cookie generation
85 bool "Enable optional SHA1 hmac cookie generation"
[all …]
Dsm_make_chunk.c1672 if (sctp_sk(ep->base.sk)->hmac) { in sctp_pack_cookie()
1673 struct crypto_shash *tfm = sctp_sk(ep->base.sk)->hmac; in sctp_pack_cookie()
1736 if (!sctp_sk(ep->base.sk)->hmac) in sctp_unpack_cookie()
1741 struct crypto_shash *tfm = sctp_sk(ep->base.sk)->hmac; in sctp_unpack_cookie()
Dauth.c741 digest = auth->auth_hdr.hmac; in sctp_auth_calculate_hmac()
Dsm_statefuns.c4250 struct sctp_hmac *hmac; in sctp_sf_authenticate() local
4280 hmac = sctp_auth_get_hmac(ntohs(auth_hdr->hmac_id)); in sctp_sf_authenticate()
4281 if (sig_len != hmac->hmac_len) in sctp_sf_authenticate()
4291 digest = auth_hdr->hmac; in sctp_sf_authenticate()
Dsocket.c4960 sp->hmac = NULL; in sctp_init_sock()
5009 crypto_free_shash(sp->hmac); in sctp_destruct_common()
8266 if (!sp->hmac && sp->sctp_hmac_alg) { in sctp_listen_start()
8274 sctp_sk(sk)->hmac = tfm; in sctp_listen_start()
9284 newsp->hmac = NULL; in sctp_sock_migrate()
/net/mptcp/
Doptions.c128 memcpy(mp_opt->hmac, ptr, MPTCPOPT_HMAC_LEN); in mptcp_parse_option()
446 memcpy(opts->hmac, subflow->hmac, MPTCPOPT_HMAC_LEN); in mptcp_established_options_mp()
548 u8 hmac[SHA256_DIGEST_SIZE]; in add_addr_generate_hmac() local
556 mptcp_crypto_hmac_sha(key1, key2, msg, 7, hmac); in add_addr_generate_hmac()
558 return get_unaligned_be64(&hmac[SHA256_DIGEST_SIZE - sizeof(u64)]); in add_addr_generate_hmac()
565 u8 hmac[SHA256_DIGEST_SIZE]; in add_addr6_generate_hmac() local
573 mptcp_crypto_hmac_sha(key1, key2, msg, 19, hmac); in add_addr6_generate_hmac()
575 return get_unaligned_be64(&hmac[SHA256_DIGEST_SIZE - sizeof(u64)]); in add_addr6_generate_hmac()
862 u64 hmac = 0; in add_addr_hmac_valid() local
868 hmac = add_addr_generate_hmac(msk->remote_key, in add_addr_hmac_valid()
[all …]
Dcrypto_test.c35 char hmac[32], hmac_hex[65]; in mptcp_crypto_test_basic() local
51 mptcp_crypto_hmac_sha(key1, key2, msg, 8, hmac); in mptcp_crypto_test_basic()
53 sprintf(&hmac_hex[j << 1], "%02x", hmac[j] & 0xff); in mptcp_crypto_test_basic()
Dsubflow.c46 void *hmac) in subflow_generate_hmac() argument
53 mptcp_crypto_hmac_sha(key1, key2, msg, 8, hmac); in subflow_generate_hmac()
67 u8 hmac[SHA256_DIGEST_SIZE]; in subflow_token_join_request() local
88 subflow_req->remote_nonce, hmac); in subflow_token_join_request()
90 subflow_req->thmac = get_unaligned_be64(hmac); in subflow_token_join_request()
257 u8 hmac[SHA256_DIGEST_SIZE]; in subflow_thmac_valid() local
262 hmac); in subflow_thmac_valid()
264 thmac = get_unaligned_be64(hmac); in subflow_thmac_valid()
324 u8 hmac[SHA256_DIGEST_SIZE]; in subflow_finish_connect() local
345 hmac); in subflow_finish_connect()
[all …]
Dcrypto.c44 void mptcp_crypto_hmac_sha(u64 key1, u64 key2, u8 *msg, int len, void *hmac) in mptcp_crypto_hmac_sha() argument
78 sha256(input, SHA256_BLOCK_SIZE + SHA256_DIGEST_SIZE, hmac); in mptcp_crypto_hmac_sha()
Dprotocol.h113 u8 hmac[20]; member
321 u8 hmac[MPTCPOPT_HMAC_LEN]; member
434 void mptcp_crypto_hmac_sha(u64 key1, u64 key2, u8 *msg, int len, void *hmac);
/net/ipv6/
Dseg6_hmac.c273 if (memcmp(hmac_output, tlv->hmac, SEG6_HMAC_FIELD_LEN) != 0) in seg6_hmac_validate_skb()
343 memset(tlv->hmac, 0, SEG6_HMAC_FIELD_LEN); in seg6_push_hmac()
344 err = seg6_hmac_compute(hinfo, srh, saddr, tlv->hmac); in seg6_push_hmac()
/net/sunrpc/auth_gss/
Dgss_krb5_crypto.c603 struct xdr_netobj hmac; in gss_krb5_aes_encrypt() local
649 hmac.len = GSS_KRB5_MAX_CKSUM_LEN; in gss_krb5_aes_encrypt()
650 hmac.data = buf->tail[0].iov_base + buf->tail[0].iov_len; in gss_krb5_aes_encrypt()
664 cksumkey, usage, &hmac); in gss_krb5_aes_encrypt()