Searched refs:mic (Results 1 - 25 of 32) sorted by relevance

12

/freebsd-10.0-release/sys/kgssapi/
H A Dgss_verify_mic.c50 struct mbuf *m, *mic; local
62 MGET(mic, M_WAITOK, MT_DATA);
64 MCLGET(mic, M_WAITOK);
65 m_append(mic, token_buffer->length, token_buffer->value);
67 maj_stat = KGSS_VERIFY_MIC(ctx, minor_status, m, mic, qop_state);
70 m_freem(mic);
77 struct mbuf *m, struct mbuf *mic, gss_qop_t *qop_state)
85 return (KGSS_VERIFY_MIC(ctx, minor_status, m, mic, qop_state));
76 gss_verify_mic_mbuf(OM_uint32 *minor_status, const gss_ctx_id_t ctx, struct mbuf *m, struct mbuf *mic, gss_qop_t *qop_state) argument
H A Dgss_get_mic.c50 struct mbuf *m, *mic; local
62 maj_stat = KGSS_GET_MIC(ctx, minor_status, qop_req, m, &mic);
66 message_token->length = m_length(mic, NULL);
69 m_copydata(mic, 0, message_token->length,
71 m_freem(mic);
/freebsd-10.0-release/sys/rpc/rpcsec_gss/
H A Drpcsec_gss_prot.c121 struct mbuf *args, *mic; local
137 maj_stat = gss_get_mic_mbuf(&min_stat, ctx, qop, args, &mic);
153 len = m_length(mic, NULL);
154 put_uint32(&mic, len);
156 m_append(mic, RNDUP(len) - len, zpad);
162 m_cat(args, mic);
228 struct mbuf *results, *message, *mic; local
261 mic = results;
262 if (cklen > mic->m_len) {
263 mic
[all...]
H A Dsvc_rpcsec_gss.c1049 gss_buffer_desc mic; local
1060 &signbuf, &mic);
1068 KASSERT(mic.length <= MAX_AUTH_BYTES,
1072 rqst->rq_verf.oa_length = mic.length;
1073 bcopy(mic.value, rqst->rq_verf.oa_base, mic.length);
1075 gss_release_buffer(&min_stat, &mic);
/freebsd-10.0-release/sys/kgssapi/krb5/
H A Dkrb5_mech.c861 struct mbuf *mlast, *mic, *tm; local
870 p = krb5_make_token("\x01\x01", tlen, tlen, &mic);
888 mic->m_len = p - (uint8_t *) mic->m_data;
889 mic->m_next = m;
894 krb5_checksum(kc->kc_checksumkey, 15, mic, mic->m_len - 8,
897 mic->m_next = NULL;
934 * Set the mic buffer to its final size so that the encrypt
937 mic
949 struct mbuf *mlast, *mic; local
1041 krb5_verify_mic_old(struct krb5_context *kc, struct mbuf *m, struct mbuf *mic, uint8_t sgn_alg[2]) argument
1139 krb5_verify_mic_new(struct krb5_context *kc, struct mbuf *m, struct mbuf *mic) argument
1219 krb5_verify_mic(gss_ctx_id_t ctx, OM_uint32 *minor_status, struct mbuf *m, struct mbuf *mic, gss_qop_t *qop_state) argument
[all...]
/freebsd-10.0-release/crypto/openssh/
H A Dauth2-gss.c165 userauth_finish(authctxt, 0, "gssapi-with-mic", NULL);
250 userauth_finish(authctxt, authenticated, "gssapi-with-mic", NULL);
260 gss_buffer_desc mic, gssbuf; local
268 mic.value = packet_get_string(&len);
269 mic.length = len;
272 "gssapi-with-mic");
277 if (!GSS_ERROR(PRIVSEP(ssh_gssapi_checkmic(gssctxt, &gssbuf, &mic))))
283 free(mic.value);
290 userauth_finish(authctxt, authenticated, "gssapi-with-mic", NULL);
294 "gssapi-with-mic",
[all...]
/freebsd-10.0-release/contrib/wpa/src/eap_common/
H A Deap_gpsk_common.h58 int specifier, const u8 *data, size_t len, u8 *mic);
H A Deap_gpsk_common.c368 const u8 *data, size_t len, u8 *mic)
376 return omac1_aes_128(sk, data, len, mic);
388 * @mic: Buffer for the computed MIC, eap_gpsk_mic_len(cipher) bytes
392 int specifier, const u8 *data, size_t len, u8 *mic)
401 ret = eap_gpsk_compute_mic_aes(sk, sk_len, data, len, mic);
405 hmac_sha256(sk, sk_len, data, len, mic);
367 eap_gpsk_compute_mic_aes(const u8 *sk, size_t sk_len, const u8 *data, size_t len, u8 *mic) argument
391 eap_gpsk_compute_mic(const u8 *sk, size_t sk_len, int vendor, int specifier, const u8 *data, size_t len, u8 *mic) argument
H A Deap_sake_common.h92 const u8 *mic_pos, u8 *mic);
H A Deap_sake_common.c314 * @mic: Buffer for the computed 16-byte MIC
321 const u8 *mic_pos, u8 *mic)
370 mic, EAP_SAKE_MIC_LEN);
316 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) argument
/freebsd-10.0-release/contrib/wpa/src/eap_server/
H A Deap_server_gpsk.c253 u8 mic[EAP_GPSK_MAX_MIC_LEN]; local
438 data->specifier, payload, pos - payload, mic)
444 if (os_memcmp(mic, pos, miclen) != 0) {
447 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen);
470 u8 mic[EAP_GPSK_MAX_MIC_LEN]; local
507 data->specifier, payload, pos - payload, mic)
513 if (os_memcmp(mic, pos, miclen) != 0) {
516 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen);
H A Deap_server_sake.c200 u8 *mic; local
214 mic = wpabuf_put(msg, EAP_SAKE_MIC_LEN);
218 wpabuf_head(msg), wpabuf_len(msg), mic, mic))
/freebsd-10.0-release/contrib/wpa/src/rsn_supp/
H A Dtdls.c51 u8 mic[TDLS_MIC_LEN]; member in struct:wpa_tdls_ftie
414 * @mic: Pointer for writing MIC
420 const u8 *ftie, u8 *mic)
456 os_memset(_ftie->mic, 0, TDLS_MIC_LEN);
461 ret = omac1_aes_128(kck, buf, pos - buf, mic);
463 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE MIC", mic, 16);
476 * @mic: Pointer for writing MIC
482 const u8 *ftie, u8 *mic)
515 os_memset(_ftie->mic, 0, TDLS_MIC_LEN);
520 ret = omac1_aes_128(kck, buf, pos - buf, mic);
418 wpa_tdls_ftie_mic(const u8 *kck, u8 trans_seq, const u8 *lnkid, const u8 *rsnie, const u8 *timeoutie, const u8 *ftie, u8 *mic) argument
480 wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, u8 dtoken, const u8 *lnkid, const u8 *ftie, u8 *mic) argument
532 u8 mic[16]; local
560 u8 mic[16]; local
[all...]
H A Dwpa_ft.c303 ric_ies_len, ftie->mic) < 0) {
663 u8 mic[16]; local
760 mic) < 0) {
765 if (os_memcmp(mic, ftie->mic, 16) != 0) {
767 wpa_hexdump(MSG_MSGDUMP, "FT: Received MIC", ftie->mic, 16);
768 wpa_hexdump(MSG_MSGDUMP, "FT: Calculated MIC", mic, 16);
/freebsd-10.0-release/crypto/heimdal/appl/gssmask/
H A Dgssmaestro.c217 krb5_data *in, krb5_data *mic)
226 retdata(client, *mic);
232 krb5_data *in, krb5_data *mic)
240 putdata(client, *mic);
412 krb5_data msg, mic; local
418 krb5_data_zero(&mic);
420 val = get_mic(c1, hc1, &msg, &mic);
423 val = verify_mic(c2, hc2, &msg, &mic);
427 krb5_data_free(&mic);
522 /* mic */
216 get_mic(struct client *client, int32_t hContext, krb5_data *in, krb5_data *mic) argument
231 verify_mic(struct client *client, int32_t hContext, krb5_data *in, krb5_data *mic) argument
[all...]
H A Dgssmask.c607 krb5_data msg, mic; local
625 retdata(c, mic);
627 mic_token.length = mic.length;
628 mic_token.value = mic.data;
635 krb5_data_free(&mic);
/freebsd-10.0-release/contrib/wpa/src/common/
H A Dwpa_common.c28 * @mic: Pointer to the buffer to which the EAPOL-Key MIC is written
41 u8 *mic)
48 return hmac_md5(key, 16, buf, len, mic);
53 os_memcpy(mic, hash, MD5_MAC_LEN);
57 return omac1_aes_128(key, buf, len, mic);
137 const u8 *ric, size_t ric_len, u8 *mic)
169 os_memset(_ftie->mic, 0, sizeof(_ftie->mic));
178 if (omac1_aes_128(kck, buf, pos - buf, mic)) {
40 wpa_eapol_key_mic(const u8 *key, int ver, const u8 *buf, size_t len, u8 *mic) argument
133 wpa_ft_mic(const u8 *kck, const u8 *sta_addr, const u8 *ap_addr, u8 transaction_seqnum, const u8 *mdie, size_t mdie_len, const u8 *ftie, size_t ftie_len, const u8 *rsnie, size_t rsnie_len, const u8 *ric, size_t ric_len, u8 *mic) argument
H A Dwpa_common.h284 u8 mic[16]; member in struct:rsn_ftie
309 u8 *mic);
320 const u8 *ric, size_t ric_len, u8 *mic);
/freebsd-10.0-release/contrib/wpa/src/drivers/
H A Ddriver_bsd.c775 struct ieee80211_michael_event *mic; local
829 mic = (struct ieee80211_michael_event *) &ifan[1];
832 "keyix=%u src_addr=" MACSTR, mic->iev_keyix,
833 MAC2STR(mic->iev_src));
836 data.michael_mic_failure.src = mic->iev_src;
1206 struct ieee80211_michael_event *mic; local
1292 mic = (struct ieee80211_michael_event *) &ifan[1];
1295 "keyix=%u src_addr=" MACSTR, mic->iev_keyix,
1296 MAC2STR(mic->iev_src));
1300 !IEEE80211_IS_MULTICAST(mic
[all...]
/freebsd-10.0-release/sys/net80211/
H A Dieee80211_crypto_tkip.c98 u8 mic[IEEE80211_WEP_MICLEN]);
223 uint8_t mic[IEEE80211_WEP_MICLEN]; local
230 m, hdrlen, m->m_pkthdr.len - hdrlen, mic);
231 return m_append(m, tkip.ic_miclen, mic);
335 u8 mic[IEEE80211_WEP_MICLEN]; local
342 mic);
345 if (memcmp(mic, mic0, tkip.ic_miclen)) {
801 u8 mic[IEEE80211_WEP_MICLEN])
920 put_le32(mic, l);
921 put_le32(mic
799 michael_mic(struct tkip_ctx *ctx, const u8 *key, struct mbuf *m, u_int off, size_t data_len, u8 mic[IEEE80211_WEP_MICLEN]) argument
[all...]
H A Dieee80211_crypto_ccmp.c554 uint8_t mic[AES_BLOCK_LEN]; local
565 m_copydata(m, m->m_pkthdr.len - ccmp.ic_trailer, ccmp.ic_trailer, mic);
566 xor_block(mic, b, ccmp.ic_trailer);
622 if (memcmp(mic, a, ccmp.ic_trailer) != 0) {
/freebsd-10.0-release/contrib/wpa/src/eap_peer/
H A Deap_gpsk.c513 u8 mic[EAP_GPSK_MAX_MIC_LEN]; local
527 data->specifier, payload, pos - payload, mic)
532 if (os_memcmp(mic, pos, miclen) != 0) {
535 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen);
/freebsd-10.0-release/crypto/heimdal/lib/gssapi/spnego/
H A Daccept_sec_context.c411 heim_octet_string *mic,
423 if (mic != NULL)
454 ret = verify_mechlist_mic(minor_status, ctx, mech_buf, mic);
743 heim_octet_string *mic; local
794 mic = na->mechListMIC;
795 if (mic != NULL)
405 acceptor_complete(OM_uint32 * minor_status, gssspnego_ctx ctx, int *get_mic, gss_buffer_t mech_buf, gss_buffer_t mech_input_token, gss_buffer_t mech_output_token, heim_octet_string *mic, gss_buffer_t output_token) argument
/freebsd-10.0-release/sbin/nvmecontrol/
H A Didentify.c61 printf("Multi-Interface Cap: %02x\n", cdata->mic);
/freebsd-10.0-release/contrib/wpa/src/ap/
H A Dwpa_auth_ft.c732 _ftie->mic) < 0)
972 u8 mic[16]; local
1090 mic) < 0) {
1095 if (os_memcmp(mic, ftie->mic, 16) != 0) {
1099 wpa_hexdump(MSG_MSGDUMP, "FT: Received MIC", ftie->mic, 16);
1100 wpa_hexdump(MSG_MSGDUMP, "FT: Calculated MIC", mic, 16);

Completed in 341 milliseconds

12