/net/sctp/ |
D | Kconfig | 55 This option sets the default sctp cookie hmac algorithm 59 bool "Enable optional MD5 hmac cookie generation" 61 Enable optional MD5 hmac based SCTP cookie generation 65 bool "Enable optional SHA1 hmac cookie generation" 67 Enable optional SHA1 hmac based SCTP cookie generation 71 bool "Use no hmac alg in SCTP cookie generation" 73 Use no hmac algorithm in SCTP cookie generation 78 bool "Enable optional MD5 hmac cookie generation" 80 Enable optional MD5 hmac based SCTP cookie generation 85 bool "Enable optional SHA1 hmac cookie generation" [all …]
|
D | sm_make_chunk.c | 1672 if (sctp_sk(ep->base.sk)->hmac) { in sctp_pack_cookie() 1673 struct crypto_shash *tfm = sctp_sk(ep->base.sk)->hmac; in sctp_pack_cookie() 1736 if (!sctp_sk(ep->base.sk)->hmac) in sctp_unpack_cookie() 1741 struct crypto_shash *tfm = sctp_sk(ep->base.sk)->hmac; in sctp_unpack_cookie()
|
D | auth.c | 741 digest = auth->auth_hdr.hmac; in sctp_auth_calculate_hmac()
|
D | sm_statefuns.c | 4250 struct sctp_hmac *hmac; in sctp_sf_authenticate() local 4280 hmac = sctp_auth_get_hmac(ntohs(auth_hdr->hmac_id)); in sctp_sf_authenticate() 4281 if (sig_len != hmac->hmac_len) in sctp_sf_authenticate() 4291 digest = auth_hdr->hmac; in sctp_sf_authenticate()
|
D | socket.c | 4960 sp->hmac = NULL; in sctp_init_sock() 5009 crypto_free_shash(sp->hmac); in sctp_destruct_common() 8266 if (!sp->hmac && sp->sctp_hmac_alg) { in sctp_listen_start() 8274 sctp_sk(sk)->hmac = tfm; in sctp_listen_start() 9284 newsp->hmac = NULL; in sctp_sock_migrate()
|
/net/mptcp/ |
D | options.c | 128 memcpy(mp_opt->hmac, ptr, MPTCPOPT_HMAC_LEN); in mptcp_parse_option() 446 memcpy(opts->hmac, subflow->hmac, MPTCPOPT_HMAC_LEN); in mptcp_established_options_mp() 548 u8 hmac[SHA256_DIGEST_SIZE]; in add_addr_generate_hmac() local 556 mptcp_crypto_hmac_sha(key1, key2, msg, 7, hmac); in add_addr_generate_hmac() 558 return get_unaligned_be64(&hmac[SHA256_DIGEST_SIZE - sizeof(u64)]); in add_addr_generate_hmac() 565 u8 hmac[SHA256_DIGEST_SIZE]; in add_addr6_generate_hmac() local 573 mptcp_crypto_hmac_sha(key1, key2, msg, 19, hmac); in add_addr6_generate_hmac() 575 return get_unaligned_be64(&hmac[SHA256_DIGEST_SIZE - sizeof(u64)]); in add_addr6_generate_hmac() 862 u64 hmac = 0; in add_addr_hmac_valid() local 868 hmac = add_addr_generate_hmac(msk->remote_key, in add_addr_hmac_valid() [all …]
|
D | crypto_test.c | 35 char hmac[32], hmac_hex[65]; in mptcp_crypto_test_basic() local 51 mptcp_crypto_hmac_sha(key1, key2, msg, 8, hmac); in mptcp_crypto_test_basic() 53 sprintf(&hmac_hex[j << 1], "%02x", hmac[j] & 0xff); in mptcp_crypto_test_basic()
|
D | subflow.c | 46 void *hmac) in subflow_generate_hmac() argument 53 mptcp_crypto_hmac_sha(key1, key2, msg, 8, hmac); in subflow_generate_hmac() 67 u8 hmac[SHA256_DIGEST_SIZE]; in subflow_token_join_request() local 88 subflow_req->remote_nonce, hmac); in subflow_token_join_request() 90 subflow_req->thmac = get_unaligned_be64(hmac); in subflow_token_join_request() 257 u8 hmac[SHA256_DIGEST_SIZE]; in subflow_thmac_valid() local 262 hmac); in subflow_thmac_valid() 264 thmac = get_unaligned_be64(hmac); in subflow_thmac_valid() 324 u8 hmac[SHA256_DIGEST_SIZE]; in subflow_finish_connect() local 345 hmac); in subflow_finish_connect() [all …]
|
D | crypto.c | 44 void mptcp_crypto_hmac_sha(u64 key1, u64 key2, u8 *msg, int len, void *hmac) in mptcp_crypto_hmac_sha() argument 78 sha256(input, SHA256_BLOCK_SIZE + SHA256_DIGEST_SIZE, hmac); in mptcp_crypto_hmac_sha()
|
D | protocol.h | 113 u8 hmac[20]; member 321 u8 hmac[MPTCPOPT_HMAC_LEN]; member 434 void mptcp_crypto_hmac_sha(u64 key1, u64 key2, u8 *msg, int len, void *hmac);
|
/net/ipv6/ |
D | seg6_hmac.c | 273 if (memcmp(hmac_output, tlv->hmac, SEG6_HMAC_FIELD_LEN) != 0) in seg6_hmac_validate_skb() 343 memset(tlv->hmac, 0, SEG6_HMAC_FIELD_LEN); in seg6_push_hmac() 344 err = seg6_hmac_compute(hinfo, srh, saddr, tlv->hmac); in seg6_push_hmac()
|
/net/sunrpc/auth_gss/ |
D | gss_krb5_crypto.c | 603 struct xdr_netobj hmac; in gss_krb5_aes_encrypt() local 649 hmac.len = GSS_KRB5_MAX_CKSUM_LEN; in gss_krb5_aes_encrypt() 650 hmac.data = buf->tail[0].iov_base + buf->tail[0].iov_len; in gss_krb5_aes_encrypt() 664 cksumkey, usage, &hmac); in gss_krb5_aes_encrypt()
|