/freebsd-11-stable/contrib/ntp/sntp/ |
H A D | crypto.h | 30 extern int make_mac(const void *pkt_data, int pkt_size, int mac_size, 32 extern int auth_md5(const void *pkt_data, int pkt_size, int mac_size,
|
H A D | crypto.c | 130 int mac_size, 138 if (cmp_key->key_len > 64 || mac_size <= 0) 149 if (len > (u_int)mac_size) 150 len = (u_int)mac_size; 166 int mac_size, 174 if (mac_size <= 0 || (size_t)mac_size > sizeof(dbuf)) 182 if (len > (u_int)mac_size) 183 len = (u_int)mac_size; 189 return ((u_int)mac_size 127 make_mac( const void * pkt_data, int pkt_size, int mac_size, Key_T const * cmp_key, void * digest ) argument 163 auth_md5( void const * pkt_data, int pkt_size, int mac_size, Key_T const * cmp_key ) argument [all...] |
H A D | networking.c | 110 int mac_size; local 191 mac_size = exten_len << 2; 192 if (!auth_md5(rpkt, pkt_len - mac_size, 193 mac_size - 4, pkt_key)) {
|
H A D | main.c | 1131 int mac_size; local 1146 mac_size = make_mac(x_pkt, pkt_len, MAX_MDG_LEN, 1148 if (mac_size > 0) 1149 pkt_len += mac_size + KEY_MAC_LEN; 1152 printf("generate_pkt: mac_size is %d\n", mac_size);
|
/freebsd-11-stable/crypto/openssl/ssl/ |
H A D | s2_pkt.c | 134 int mac_size; local 232 mac_size = 0; 240 mac_size = EVP_MD_CTX_size(s->read_hash); 241 if (mac_size < 0) 243 OPENSSL_assert(mac_size <= MAX_MAC_SIZE); 245 s->s2->ract_data = &p[mac_size]; 246 if (s->s2->padding + mac_size > s->s2->rlength) { 258 (s->s2->rlength >= (unsigned int)mac_size)) { 263 s->s2->ract_data_length -= mac_size; 266 if ((CRYPTO_memcmp(mac, s->s2->mac_data, mac_size) ! 495 int mac_size; local [all...] |
H A D | d1_pkt.c | 470 unsigned int mac_size, orig_len; local 530 /* s->read_hash != NULL => mac_size != -1 */ 533 mac_size = EVP_MD_CTX_size(s->read_hash); 534 OPENSSL_assert(mac_size <= EVP_MAX_MD_SIZE); 547 if (orig_len < mac_size || 550 orig_len < mac_size + 1)) { 564 ssl3_cbc_copy_mac(mac_tmp, rr, mac_size, orig_len); 565 rr->length -= mac_size; 570 * |mac_size| above. 572 rr->length -= mac_size; 1601 int i, mac_size, clear = 0; local [all...] |
H A D | s3_pkt.c | 318 unsigned mac_size, orig_len; local 471 /* s->read_hash != NULL => mac_size != -1 */ 474 mac_size = EVP_MD_CTX_size(s->read_hash); 475 OPENSSL_assert(mac_size <= EVP_MAX_MD_SIZE); 488 if (orig_len < mac_size || 491 orig_len < mac_size + 1)) { 505 ssl3_cbc_copy_mac(mac_tmp, rr, mac_size, orig_len); 506 rr->length -= mac_size; 511 * |mac_size| above. 513 rr->length -= mac_size; 866 int i, mac_size, clear = 0; local [all...] |
H A D | s3_cbc.c | 87 unsigned block_size, unsigned mac_size) 90 const unsigned overhead = 1 /* padding length byte */ + mac_size; 123 unsigned block_size, unsigned mac_size) 126 const unsigned overhead = 1 /* padding length byte */ + mac_size; 85 ssl3_cbc_remove_padding(const SSL *s, SSL3_RECORD *rec, unsigned block_size, unsigned mac_size) argument 121 tls1_cbc_remove_padding(const SSL *s, SSL3_RECORD *rec, unsigned block_size, unsigned mac_size) argument
|
H A D | d1_both.c | 269 unsigned int len, frag_off, mac_size, blocksize, used_len; local 285 mac_size = 0; 287 mac_size = EVP_MD_CTX_size(s->write_hash); 289 mac_size = 0; 337 + mac_size + blocksize; 352 used_len = DTLS1_RT_HEADER_LENGTH + mac_size + blocksize;
|
H A D | s3_enc.c | 517 int bs, i, mac_size = 0; local 569 mac_size = EVP_MD_CTX_size(s->read_hash); 571 return ssl3_cbc_remove_padding(s, rec, bs, mac_size);
|
H A D | t1_enc.c | 755 int bs, i, j, k, pad = 0, ret, mac_size = 0; local 911 mac_size = EVP_MD_CTX_size(s->read_hash); 913 ret = tls1_cbc_remove_padding(s, rec, bs, mac_size);
|
H A D | ssl_locl.h | 1455 unsigned block_size, unsigned mac_size); 1458 unsigned block_size, unsigned mac_size);
|
/freebsd-11-stable/sys/dev/mlx5/mlx5_core/ |
H A D | mlx5_main.c | 1818 size_t mac_size; local 1831 &mac_size);
|