/freebsd-10.0-release/sys/kgssapi/ |
H A D | gss_verify_mic.c | 50 struct mbuf *m, *mic; local 62 MGET(mic, M_WAITOK, MT_DATA); 64 MCLGET(mic, M_WAITOK); 65 m_append(mic, token_buffer->length, token_buffer->value); 67 maj_stat = KGSS_VERIFY_MIC(ctx, minor_status, m, mic, qop_state); 70 m_freem(mic); 77 struct mbuf *m, struct mbuf *mic, gss_qop_t *qop_state) 85 return (KGSS_VERIFY_MIC(ctx, minor_status, m, mic, qop_state)); 76 gss_verify_mic_mbuf(OM_uint32 *minor_status, const gss_ctx_id_t ctx, struct mbuf *m, struct mbuf *mic, gss_qop_t *qop_state) argument
|
H A D | gss_get_mic.c | 50 struct mbuf *m, *mic; local 62 maj_stat = KGSS_GET_MIC(ctx, minor_status, qop_req, m, &mic); 66 message_token->length = m_length(mic, NULL); 69 m_copydata(mic, 0, message_token->length, 71 m_freem(mic);
|
/freebsd-10.0-release/sys/rpc/rpcsec_gss/ |
H A D | rpcsec_gss_prot.c | 121 struct mbuf *args, *mic; local 137 maj_stat = gss_get_mic_mbuf(&min_stat, ctx, qop, args, &mic); 153 len = m_length(mic, NULL); 154 put_uint32(&mic, len); 156 m_append(mic, RNDUP(len) - len, zpad); 162 m_cat(args, mic); 228 struct mbuf *results, *message, *mic; local 261 mic = results; 262 if (cklen > mic->m_len) { 263 mic [all...] |
H A D | svc_rpcsec_gss.c | 1049 gss_buffer_desc mic; local 1060 &signbuf, &mic); 1068 KASSERT(mic.length <= MAX_AUTH_BYTES, 1072 rqst->rq_verf.oa_length = mic.length; 1073 bcopy(mic.value, rqst->rq_verf.oa_base, mic.length); 1075 gss_release_buffer(&min_stat, &mic);
|
/freebsd-10.0-release/sys/kgssapi/krb5/ |
H A D | krb5_mech.c | 861 struct mbuf *mlast, *mic, *tm; local 870 p = krb5_make_token("\x01\x01", tlen, tlen, &mic); 888 mic->m_len = p - (uint8_t *) mic->m_data; 889 mic->m_next = m; 894 krb5_checksum(kc->kc_checksumkey, 15, mic, mic->m_len - 8, 897 mic->m_next = NULL; 934 * Set the mic buffer to its final size so that the encrypt 937 mic 949 struct mbuf *mlast, *mic; local 1041 krb5_verify_mic_old(struct krb5_context *kc, struct mbuf *m, struct mbuf *mic, uint8_t sgn_alg[2]) argument 1139 krb5_verify_mic_new(struct krb5_context *kc, struct mbuf *m, struct mbuf *mic) argument 1219 krb5_verify_mic(gss_ctx_id_t ctx, OM_uint32 *minor_status, struct mbuf *m, struct mbuf *mic, gss_qop_t *qop_state) argument [all...] |
/freebsd-10.0-release/crypto/openssh/ |
H A D | auth2-gss.c | 165 userauth_finish(authctxt, 0, "gssapi-with-mic", NULL); 250 userauth_finish(authctxt, authenticated, "gssapi-with-mic", NULL); 260 gss_buffer_desc mic, gssbuf; local 268 mic.value = packet_get_string(&len); 269 mic.length = len; 272 "gssapi-with-mic"); 277 if (!GSS_ERROR(PRIVSEP(ssh_gssapi_checkmic(gssctxt, &gssbuf, &mic)))) 283 free(mic.value); 290 userauth_finish(authctxt, authenticated, "gssapi-with-mic", NULL); 294 "gssapi-with-mic", [all...] |
/freebsd-10.0-release/contrib/wpa/src/eap_common/ |
H A D | eap_gpsk_common.h | 58 int specifier, const u8 *data, size_t len, u8 *mic);
|
H A D | eap_gpsk_common.c | 368 const u8 *data, size_t len, u8 *mic) 376 return omac1_aes_128(sk, data, len, mic); 388 * @mic: Buffer for the computed MIC, eap_gpsk_mic_len(cipher) bytes 392 int specifier, const u8 *data, size_t len, u8 *mic) 401 ret = eap_gpsk_compute_mic_aes(sk, sk_len, data, len, mic); 405 hmac_sha256(sk, sk_len, data, len, mic); 367 eap_gpsk_compute_mic_aes(const u8 *sk, size_t sk_len, const u8 *data, size_t len, u8 *mic) argument 391 eap_gpsk_compute_mic(const u8 *sk, size_t sk_len, int vendor, int specifier, const u8 *data, size_t len, u8 *mic) argument
|
H A D | eap_sake_common.h | 92 const u8 *mic_pos, u8 *mic);
|
H A D | eap_sake_common.c | 314 * @mic: Buffer for the computed 16-byte MIC 321 const u8 *mic_pos, u8 *mic) 370 mic, EAP_SAKE_MIC_LEN); 316 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) argument
|
/freebsd-10.0-release/contrib/wpa/src/eap_server/ |
H A D | eap_server_gpsk.c | 253 u8 mic[EAP_GPSK_MAX_MIC_LEN]; local 438 data->specifier, payload, pos - payload, mic) 444 if (os_memcmp(mic, pos, miclen) != 0) { 447 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen); 470 u8 mic[EAP_GPSK_MAX_MIC_LEN]; local 507 data->specifier, payload, pos - payload, mic) 513 if (os_memcmp(mic, pos, miclen) != 0) { 516 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen);
|
H A D | eap_server_sake.c | 200 u8 *mic; local 214 mic = wpabuf_put(msg, EAP_SAKE_MIC_LEN); 218 wpabuf_head(msg), wpabuf_len(msg), mic, mic))
|
/freebsd-10.0-release/contrib/wpa/src/rsn_supp/ |
H A D | tdls.c | 51 u8 mic[TDLS_MIC_LEN]; member in struct:wpa_tdls_ftie 414 * @mic: Pointer for writing MIC 420 const u8 *ftie, u8 *mic) 456 os_memset(_ftie->mic, 0, TDLS_MIC_LEN); 461 ret = omac1_aes_128(kck, buf, pos - buf, mic); 463 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE MIC", mic, 16); 476 * @mic: Pointer for writing MIC 482 const u8 *ftie, u8 *mic) 515 os_memset(_ftie->mic, 0, TDLS_MIC_LEN); 520 ret = omac1_aes_128(kck, buf, pos - buf, mic); 418 wpa_tdls_ftie_mic(const u8 *kck, u8 trans_seq, const u8 *lnkid, const u8 *rsnie, const u8 *timeoutie, const u8 *ftie, u8 *mic) argument 480 wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, u8 dtoken, const u8 *lnkid, const u8 *ftie, u8 *mic) argument 532 u8 mic[16]; local 560 u8 mic[16]; local [all...] |
H A D | wpa_ft.c | 303 ric_ies_len, ftie->mic) < 0) { 663 u8 mic[16]; local 760 mic) < 0) { 765 if (os_memcmp(mic, ftie->mic, 16) != 0) { 767 wpa_hexdump(MSG_MSGDUMP, "FT: Received MIC", ftie->mic, 16); 768 wpa_hexdump(MSG_MSGDUMP, "FT: Calculated MIC", mic, 16);
|
/freebsd-10.0-release/crypto/heimdal/appl/gssmask/ |
H A D | gssmaestro.c | 217 krb5_data *in, krb5_data *mic) 226 retdata(client, *mic); 232 krb5_data *in, krb5_data *mic) 240 putdata(client, *mic); 412 krb5_data msg, mic; local 418 krb5_data_zero(&mic); 420 val = get_mic(c1, hc1, &msg, &mic); 423 val = verify_mic(c2, hc2, &msg, &mic); 427 krb5_data_free(&mic); 522 /* mic */ 216 get_mic(struct client *client, int32_t hContext, krb5_data *in, krb5_data *mic) argument 231 verify_mic(struct client *client, int32_t hContext, krb5_data *in, krb5_data *mic) argument [all...] |
H A D | gssmask.c | 607 krb5_data msg, mic; local 625 retdata(c, mic); 627 mic_token.length = mic.length; 628 mic_token.value = mic.data; 635 krb5_data_free(&mic);
|
/freebsd-10.0-release/contrib/wpa/src/common/ |
H A D | wpa_common.c | 28 * @mic: Pointer to the buffer to which the EAPOL-Key MIC is written 41 u8 *mic) 48 return hmac_md5(key, 16, buf, len, mic); 53 os_memcpy(mic, hash, MD5_MAC_LEN); 57 return omac1_aes_128(key, buf, len, mic); 137 const u8 *ric, size_t ric_len, u8 *mic) 169 os_memset(_ftie->mic, 0, sizeof(_ftie->mic)); 178 if (omac1_aes_128(kck, buf, pos - buf, mic)) { 40 wpa_eapol_key_mic(const u8 *key, int ver, const u8 *buf, size_t len, u8 *mic) argument 133 wpa_ft_mic(const u8 *kck, const u8 *sta_addr, const u8 *ap_addr, u8 transaction_seqnum, const u8 *mdie, size_t mdie_len, const u8 *ftie, size_t ftie_len, const u8 *rsnie, size_t rsnie_len, const u8 *ric, size_t ric_len, u8 *mic) argument
|
H A D | wpa_common.h | 284 u8 mic[16]; member in struct:rsn_ftie 309 u8 *mic); 320 const u8 *ric, size_t ric_len, u8 *mic);
|
/freebsd-10.0-release/contrib/wpa/src/drivers/ |
H A D | driver_bsd.c | 775 struct ieee80211_michael_event *mic; local 829 mic = (struct ieee80211_michael_event *) &ifan[1]; 832 "keyix=%u src_addr=" MACSTR, mic->iev_keyix, 833 MAC2STR(mic->iev_src)); 836 data.michael_mic_failure.src = mic->iev_src; 1206 struct ieee80211_michael_event *mic; local 1292 mic = (struct ieee80211_michael_event *) &ifan[1]; 1295 "keyix=%u src_addr=" MACSTR, mic->iev_keyix, 1296 MAC2STR(mic->iev_src)); 1300 !IEEE80211_IS_MULTICAST(mic [all...] |
/freebsd-10.0-release/sys/net80211/ |
H A D | ieee80211_crypto_tkip.c | 98 u8 mic[IEEE80211_WEP_MICLEN]); 223 uint8_t mic[IEEE80211_WEP_MICLEN]; local 230 m, hdrlen, m->m_pkthdr.len - hdrlen, mic); 231 return m_append(m, tkip.ic_miclen, mic); 335 u8 mic[IEEE80211_WEP_MICLEN]; local 342 mic); 345 if (memcmp(mic, mic0, tkip.ic_miclen)) { 801 u8 mic[IEEE80211_WEP_MICLEN]) 920 put_le32(mic, l); 921 put_le32(mic 799 michael_mic(struct tkip_ctx *ctx, const u8 *key, struct mbuf *m, u_int off, size_t data_len, u8 mic[IEEE80211_WEP_MICLEN]) argument [all...] |
H A D | ieee80211_crypto_ccmp.c | 554 uint8_t mic[AES_BLOCK_LEN]; local 565 m_copydata(m, m->m_pkthdr.len - ccmp.ic_trailer, ccmp.ic_trailer, mic); 566 xor_block(mic, b, ccmp.ic_trailer); 622 if (memcmp(mic, a, ccmp.ic_trailer) != 0) {
|
/freebsd-10.0-release/contrib/wpa/src/eap_peer/ |
H A D | eap_gpsk.c | 513 u8 mic[EAP_GPSK_MAX_MIC_LEN]; local 527 data->specifier, payload, pos - payload, mic) 532 if (os_memcmp(mic, pos, miclen) != 0) { 535 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen);
|
/freebsd-10.0-release/crypto/heimdal/lib/gssapi/spnego/ |
H A D | accept_sec_context.c | 411 heim_octet_string *mic, 423 if (mic != NULL) 454 ret = verify_mechlist_mic(minor_status, ctx, mech_buf, mic); 743 heim_octet_string *mic; local 794 mic = na->mechListMIC; 795 if (mic != NULL) 405 acceptor_complete(OM_uint32 * minor_status, gssspnego_ctx ctx, int *get_mic, gss_buffer_t mech_buf, gss_buffer_t mech_input_token, gss_buffer_t mech_output_token, heim_octet_string *mic, gss_buffer_t output_token) argument
|
/freebsd-10.0-release/sbin/nvmecontrol/ |
H A D | identify.c | 61 printf("Multi-Interface Cap: %02x\n", cdata->mic);
|
/freebsd-10.0-release/contrib/wpa/src/ap/ |
H A D | wpa_auth_ft.c | 732 _ftie->mic) < 0) 972 u8 mic[16]; local 1090 mic) < 0) { 1095 if (os_memcmp(mic, ftie->mic, 16) != 0) { 1099 wpa_hexdump(MSG_MSGDUMP, "FT: Received MIC", ftie->mic, 16); 1100 wpa_hexdump(MSG_MSGDUMP, "FT: Calculated MIC", mic, 16);
|