Lines Matching full:hmac
46 void *hmac) in subflow_generate_hmac() argument
53 mptcp_crypto_hmac_sha(key1, key2, msg, 8, hmac); in subflow_generate_hmac()
62 /* validate received token and create truncated hmac and nonce for SYN-ACK */
67 u8 hmac[SHA256_DIGEST_SIZE]; in subflow_token_join_request() local
88 subflow_req->remote_nonce, hmac); in subflow_token_join_request()
90 subflow_req->thmac = get_unaligned_be64(hmac); in subflow_token_join_request()
254 /* validate received truncated hmac and create hmac for third ACK */
257 u8 hmac[SHA256_DIGEST_SIZE]; in subflow_thmac_valid() local
262 hmac); in subflow_thmac_valid()
264 thmac = get_unaligned_be64(hmac); in subflow_thmac_valid()
325 u8 hmac[SHA256_DIGEST_SIZE]; in subflow_finish_connect() local
346 hmac); in subflow_finish_connect()
347 memcpy(subflow->hmac, hmac, MPTCPOPT_HMAC_LEN); in subflow_finish_connect()
441 /* validate hmac received in third ACK */
446 u8 hmac[SHA256_DIGEST_SIZE]; in subflow_hmac_valid() local
456 subflow_req->local_nonce, hmac); in subflow_hmac_valid()
458 return !crypto_memneq(hmac, mp_opt->hmac, MPTCPOPT_HMAC_LEN); in subflow_hmac_valid()