/freebsd-10.1-release/contrib/ntp/sntp/ |
H A D | crypto.h | 29 extern int make_mac(const void *pkt_data, int pkt_size, int mac_size, 31 extern int auth_md5(const void *pkt_data, int pkt_size, int mac_size,
|
H A D | networking.c | 109 int mac_size; local 186 mac_size = exten_len << 2; 187 if (!auth_md5(rpkt, pkt_len - mac_size, 188 mac_size - 4, pkt_key)) {
|
H A D | crypto.c | 14 int mac_size, 19 u_int len = mac_size; 51 int mac_size, 59 if (mac_size > (int)sizeof(digest)) 11 make_mac( const void *pkt_data, int pkt_size, int mac_size, const struct key *cmp_key, void * digest ) argument 48 auth_md5( const void *pkt_data, int pkt_size, int mac_size, const struct key *cmp_key ) argument
|
H A D | main.c | 1125 int mac_size; local 1137 mac_size = 20; /* max room for MAC */ 1138 mac_size = make_mac(x_pkt, pkt_len, mac_size, 1140 if (mac_size > 0) 1141 pkt_len += mac_size + 4;
|
/freebsd-10.1-release/crypto/openssl/ssl/ |
H A D | d1_enc.c | 144 int bs, i, j, k, mac_size = 0; local 149 mac_size = EVP_MD_CTX_size(s->write_hash); 150 if (mac_size < 0) 171 mac_size = EVP_MD_CTX_size(s->read_hash); 172 OPENSSL_assert(mac_size >= 0); 248 return tls1_cbc_remove_padding(s, rec, bs, mac_size);
|
H A D | s2_pkt.c | 134 int mac_size; local 232 mac_size = 0; 240 mac_size = EVP_MD_CTX_size(s->read_hash); 241 if (mac_size < 0) 243 OPENSSL_assert(mac_size <= MAX_MAC_SIZE); 245 s->s2->ract_data = &p[mac_size]; 246 if (s->s2->padding + mac_size > s->s2->rlength) { 258 (s->s2->rlength >= (unsigned int)mac_size)) { 263 s->s2->ract_data_length -= mac_size; 266 if ((CRYPTO_memcmp(mac, s->s2->mac_data, mac_size) ! 489 int mac_size; local [all...] |
H A D | s3_pkt.c | 304 unsigned mac_size, orig_len; local 454 /* s->read_hash != NULL => mac_size != -1 */ 457 mac_size = EVP_MD_CTX_size(s->read_hash); 458 OPENSSL_assert(mac_size <= EVP_MAX_MD_SIZE); 471 if (orig_len < mac_size || 474 orig_len < mac_size + 1)) { 488 ssl3_cbc_copy_mac(mac_tmp, rr, mac_size, orig_len); 489 rr->length -= mac_size; 494 * |mac_size| above. 496 rr->length -= mac_size; 690 int i, mac_size, clear = 0; local [all...] |
H A D | d1_pkt.c | 449 unsigned int mac_size, orig_len; local 509 /* s->read_hash != NULL => mac_size != -1 */ 512 mac_size = EVP_MD_CTX_size(s->read_hash); 513 OPENSSL_assert(mac_size <= EVP_MAX_MD_SIZE); 526 if (orig_len < mac_size || 529 orig_len < mac_size + 1)) { 543 ssl3_cbc_copy_mac(mac_tmp, rr, mac_size, orig_len); 544 rr->length -= mac_size; 549 * |mac_size| above. 551 rr->length -= mac_size; 1554 int i, mac_size, clear = 0; local [all...] |
H A D | s3_cbc.c | 87 unsigned block_size, unsigned mac_size) 90 const unsigned overhead = 1 /* padding length byte */ + mac_size; 123 unsigned block_size, unsigned mac_size) 126 const unsigned overhead = 1 /* padding length byte */ + mac_size; 85 ssl3_cbc_remove_padding(const SSL *s, SSL3_RECORD *rec, unsigned block_size, unsigned mac_size) argument 121 tls1_cbc_remove_padding(const SSL *s, SSL3_RECORD *rec, unsigned block_size, unsigned mac_size) argument
|
H A D | d1_both.c | 269 unsigned int len, frag_off, mac_size, blocksize, used_len; local 283 mac_size = EVP_MD_CTX_size(s->write_hash); 285 mac_size = 0; 297 + mac_size + blocksize; 310 used_len = DTLS1_RT_HEADER_LENGTH + mac_size + blocksize;
|
H A D | s3_enc.c | 479 int bs, i, mac_size = 0; local 531 mac_size = EVP_MD_CTX_size(s->read_hash); 533 return ssl3_cbc_remove_padding(s, rec, bs, mac_size);
|
H A D | t1_enc.c | 728 int bs, i, j, k, pad = 0, ret, mac_size = 0; local 884 mac_size = EVP_MD_CTX_size(s->read_hash); 886 ret = tls1_cbc_remove_padding(s, rec, bs, mac_size);
|
H A D | ssl_locl.h | 1219 unsigned block_size, unsigned mac_size); 1222 unsigned block_size, unsigned mac_size);
|