/freebsd-11-stable/sys/kgssapi/ |
H A D | gss_verify_mic.c | 50 struct mbuf *m, *mic; local 62 MGET(mic, M_WAITOK, MT_DATA); 64 MCLGET(mic, M_WAITOK); 65 m_append(mic, token_buffer->length, token_buffer->value); 67 maj_stat = KGSS_VERIFY_MIC(ctx, minor_status, m, mic, qop_state); 70 m_freem(mic); 77 struct mbuf *m, struct mbuf *mic, gss_qop_t *qop_state) 85 return (KGSS_VERIFY_MIC(ctx, minor_status, m, mic, qop_state)); 76 gss_verify_mic_mbuf(OM_uint32 *minor_status, const gss_ctx_id_t ctx, struct mbuf *m, struct mbuf *mic, gss_qop_t *qop_state) argument
|
H A D | gss_get_mic.c | 50 struct mbuf *m, *mic; local 62 maj_stat = KGSS_GET_MIC(ctx, minor_status, qop_req, m, &mic); 66 message_token->length = m_length(mic, NULL); 69 m_copydata(mic, 0, message_token->length, 71 m_freem(mic);
|
/freebsd-11-stable/sys/dev/mmc/ |
H A D | mmc_ioctl.h | 46 #define mmc_ioc_cmd_set_data(mic, ptr) \ 47 (mic).data_ptr = (uint64_t)(uintptr_t)(ptr)
|
H A D | mmcsd.c | 193 static int mmcsd_ioctl_cmd(struct mmcsd_part *part, struct mmc_ioc_cmd *mic, 838 struct mmc_ioc_cmd *mic; local 853 mic = data; 854 err = mmcsd_ioctl_cmd(part, mic, fflag); 863 size = sizeof(*mic) * cnt; 864 mic = malloc(size, M_TEMP, M_WAITOK); 865 err = copyin((const void *)mimc->cmds, mic, size); 868 err = mmcsd_ioctl_cmd(part, &mic[i], fflag); 873 free(mic, M_TEMP); 882 mmcsd_ioctl_cmd(struct mmcsd_part *part, struct mmc_ioc_cmd *mic, in argument [all...] |
/freebsd-11-stable/sys/rpc/rpcsec_gss/ |
H A D | rpcsec_gss_prot.c | 121 struct mbuf *args, *mic; local 137 maj_stat = gss_get_mic_mbuf(&min_stat, ctx, qop, args, &mic); 153 len = m_length(mic, NULL); 154 put_uint32(&mic, len); 156 m_append(mic, RNDUP(len) - len, zpad); 162 m_cat(args, mic); 228 struct mbuf *results, *message, *mic; local 261 mic = results; 262 if (cklen > mic->m_len) { 263 mic [all...] |
H A D | svc_rpcsec_gss.c | 1080 gss_buffer_desc mic; local 1091 &signbuf, &mic); 1099 KASSERT(mic.length <= MAX_AUTH_BYTES, 1103 rqst->rq_verf.oa_length = mic.length; 1104 bcopy(mic.value, rqst->rq_verf.oa_base, mic.length); 1106 gss_release_buffer(&min_stat, &mic);
|
/freebsd-11-stable/sys/kgssapi/krb5/ |
H A D | krb5_mech.c | 861 struct mbuf *mlast, *mic, *tm; local 870 p = krb5_make_token("\x01\x01", tlen, tlen, &mic); 888 mic->m_len = p - (uint8_t *) mic->m_data; 889 mic->m_next = m; 894 krb5_checksum(kc->kc_checksumkey, 15, mic, mic->m_len - 8, 897 mic->m_next = NULL; 934 * Set the mic buffer to its final size so that the encrypt 937 mic 949 struct mbuf *mlast, *mic; local 1041 krb5_verify_mic_old(struct krb5_context *kc, struct mbuf *m, struct mbuf *mic, uint8_t sgn_alg[2]) argument 1139 krb5_verify_mic_new(struct krb5_context *kc, struct mbuf *m, struct mbuf *mic) argument 1219 krb5_verify_mic(gss_ctx_id_t ctx, OM_uint32 *minor_status, struct mbuf *m, struct mbuf *mic, gss_qop_t *qop_state) argument [all...] |
/freebsd-11-stable/crypto/openssh/ |
H A D | auth2-gss.c | 161 userauth_finish(authctxt, 0, "gssapi-with-mic", NULL); 248 userauth_finish(authctxt, authenticated, "gssapi-with-mic", NULL); 259 gss_buffer_desc mic, gssbuf; local 267 mic.value = packet_get_string(&len); 268 mic.length = len; 271 "gssapi-with-mic"); 276 if (!GSS_ERROR(PRIVSEP(ssh_gssapi_checkmic(gssctxt, &gssbuf, &mic)))) 282 free(mic.value); 289 userauth_finish(authctxt, authenticated, "gssapi-with-mic", NULL); 294 "gssapi-with-mic", [all...] |
/freebsd-11-stable/contrib/wpa/src/eap_common/ |
H A D | eap_gpsk_common.h | 64 int specifier, const u8 *data, size_t len, u8 *mic);
|
H A D | eap_sake_common.h | 92 const u8 *mic_pos, u8 *mic);
|
H A D | eap_gpsk_common.c | 501 const u8 *data, size_t len, u8 *mic) 509 return omac1_aes_128(sk, data, len, mic); 521 * @mic: Buffer for the computed MIC, eap_gpsk_mic_len(cipher) bytes 525 int specifier, const u8 *data, size_t len, u8 *mic) 534 ret = eap_gpsk_compute_mic_aes(sk, sk_len, data, len, mic); 538 ret = hmac_sha256(sk, sk_len, data, len, mic); 500 eap_gpsk_compute_mic_aes(const u8 *sk, size_t sk_len, const u8 *data, size_t len, u8 *mic) argument 524 eap_gpsk_compute_mic(const u8 *sk, size_t sk_len, int vendor, int specifier, const u8 *data, size_t len, u8 *mic) argument
|
H A D | eap_sake_common.c | 325 * @mic: Buffer for the computed 16-byte MIC 333 const u8 *mic_pos, u8 *mic) 383 mic, EAP_SAKE_MIC_LEN); 328 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) argument
|
/freebsd-11-stable/contrib/wpa/src/eap_server/ |
H A D | eap_server_gpsk.c | 247 u8 mic[EAP_GPSK_MAX_MIC_LEN]; local 446 data->specifier, payload, pos - payload, mic) 452 if (os_memcmp_const(mic, pos, miclen) != 0) { 455 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen); 478 u8 mic[EAP_GPSK_MAX_MIC_LEN]; local 515 data->specifier, payload, pos - payload, mic) 521 if (os_memcmp_const(mic, pos, miclen) != 0) { 524 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen);
|
H A D | eap_server_sake.c | 185 u8 *mic; local 199 mic = wpabuf_put(msg, EAP_SAKE_MIC_LEN); 203 wpabuf_head(msg), wpabuf_len(msg), mic, mic))
|
/freebsd-11-stable/contrib/wpa/src/rsn_supp/ |
H A D | tdls.c | 56 u8 mic[TDLS_MIC_LEN]; member in struct:wpa_tdls_ftie 467 * @mic: Pointer for writing MIC 473 const u8 *ftie, u8 *mic) 509 os_memset(_ftie->mic, 0, TDLS_MIC_LEN); 514 ret = omac1_aes_128(kck, buf, pos - buf, mic); 516 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE MIC", mic, 16); 529 * @mic: Pointer for writing MIC 535 const u8 *ftie, u8 *mic) 568 os_memset(_ftie->mic, 0, TDLS_MIC_LEN); 573 ret = omac1_aes_128(kck, buf, pos - buf, mic); 471 wpa_tdls_ftie_mic(const u8 *kck, u8 trans_seq, const u8 *lnkid, const u8 *rsnie, const u8 *timeoutie, const u8 *ftie, u8 *mic) argument 533 wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, u8 dtoken, const u8 *lnkid, const u8 *ftie, u8 *mic) argument 585 u8 mic[16]; local 613 u8 mic[16]; local [all...] |
H A D | wpa_ft.c | 310 fte_mic = ftie->mic; 320 fte_mic = ftie->mic; 847 u8 mic[WPA_EAPOL_KEY_MIC_MAX_LEN]; local 892 fte_mic = ftie->mic; 905 fte_mic = ftie->mic; 985 mic) < 0) { 990 if (os_memcmp_const(mic, fte_mic, 16) != 0) { 993 wpa_hexdump(MSG_MSGDUMP, "FT: Calculated MIC", mic, 16);
|
/freebsd-11-stable/crypto/heimdal/appl/gssmask/ |
H A D | gssmaestro.c | 217 krb5_data *in, krb5_data *mic) 226 retdata(client, *mic); 232 krb5_data *in, krb5_data *mic) 240 putdata(client, *mic); 412 krb5_data msg, mic; local 418 krb5_data_zero(&mic); 420 val = get_mic(c1, hc1, &msg, &mic); 423 val = verify_mic(c2, hc2, &msg, &mic); 427 krb5_data_free(&mic); 522 /* mic */ 216 get_mic(struct client *client, int32_t hContext, krb5_data *in, krb5_data *mic) argument 231 verify_mic(struct client *client, int32_t hContext, krb5_data *in, krb5_data *mic) argument [all...] |
H A D | gssmask.c | 607 krb5_data msg, mic; local 625 retdata(c, mic); 627 mic_token.length = mic.length; 628 mic_token.value = mic.data; 635 krb5_data_free(&mic);
|
/freebsd-11-stable/sys/net80211/ |
H A D | ieee80211_crypto_tkip.c | 99 u8 mic[IEEE80211_WEP_MICLEN]); 233 uint8_t mic[IEEE80211_WEP_MICLEN]; local 240 m, hdrlen, m->m_pkthdr.len - hdrlen, mic); 241 return m_append(m, tkip.ic_miclen, mic); 345 u8 mic[IEEE80211_WEP_MICLEN]; local 352 mic); 355 if (memcmp(mic, mic0, tkip.ic_miclen)) { 811 u8 mic[IEEE80211_WEP_MICLEN]) 930 put_le32(mic, l); 931 put_le32(mic 809 michael_mic(struct tkip_ctx *ctx, const u8 *key, struct mbuf *m, u_int off, size_t data_len, u8 mic[IEEE80211_WEP_MICLEN]) argument [all...] |
H A D | ieee80211_crypto_ccmp.c | 568 uint8_t mic[AES_BLOCK_LEN]; local 579 m_copydata(m, m->m_pkthdr.len - ccmp.ic_trailer, ccmp.ic_trailer, mic); 580 xor_block(mic, b, ccmp.ic_trailer); 636 if (memcmp(mic, a, ccmp.ic_trailer) != 0) {
|
/freebsd-11-stable/contrib/wpa/src/common/ |
H A D | wpa_common.c | 180 * @mic: Pointer to the buffer to which the EAPOL-Key MIC is written 193 const u8 *buf, size_t len, u8 *mic) 207 return hmac_md5(key, key_len, buf, len, mic); 213 os_memcpy(mic, hash, MD5_MAC_LEN); 218 return omac1_aes_128(key, buf, len, mic); 227 return omac1_aes_128(key, buf, len, mic); 233 return omac1_aes_128(key, buf, len, mic); 241 os_memcpy(mic, hash, MD5_MAC_LEN); 250 os_memcpy(mic, hash, 24); 273 os_memcpy(mic, has 192 wpa_eapol_key_mic(const u8 *key, size_t key_len, int akmp, int ver, const u8 *buf, size_t len, u8 *mic) argument 754 wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, const u8 *ap_addr, u8 transaction_seqnum, const u8 *mdie, size_t mdie_len, const u8 *ftie, size_t ftie_len, const u8 *rsnie, size_t rsnie_len, const u8 *ric, size_t ric_len, u8 *mic) argument [all...] |
H A D | wpa_common.h | 313 u8 mic[16]; member in struct:rsn_ftie 321 u8 mic[24]; member in struct:rsn_ftie_sha384 346 const u8 *buf, size_t len, u8 *mic); 375 const u8 *ric, size_t ric_len, u8 *mic);
|
/freebsd-11-stable/crypto/heimdal/lib/gssapi/spnego/ |
H A D | accept_sec_context.c | 411 heim_octet_string *mic, 423 if (mic != NULL) 454 ret = verify_mechlist_mic(minor_status, ctx, mech_buf, mic); 743 heim_octet_string *mic; local 794 mic = na->mechListMIC; 795 if (mic != NULL) 405 acceptor_complete(OM_uint32 * minor_status, gssspnego_ctx ctx, int *get_mic, gss_buffer_t mech_buf, gss_buffer_t mech_input_token, gss_buffer_t mech_output_token, heim_octet_string *mic, gss_buffer_t output_token) argument
|
/freebsd-11-stable/contrib/wpa/wpa_supplicant/ |
H A D | mesh_rsn.c | 646 elems->mic ? (elems->mic - 2) - cat : 0 }; 668 if (!elems->mic || elems->mic_len < AES_BLOCK_SIZE) { 669 wpa_msg(wpa_s, MSG_DEBUG, "Mesh RSN: missing mic ie"); 673 ampe_buf = (u8 *) elems->mic + elems->mic_len; 677 crypt_len = elems_len - (elems->mic - start); 691 os_memcpy(crypt, elems->mic, crypt_len);
|
/freebsd-11-stable/contrib/wpa/src/drivers/ |
H A D | driver_bsd.c | 778 struct ieee80211_michael_event *mic; local 825 mic = (struct ieee80211_michael_event *) &ifan[1]; 828 "keyix=%u src_addr=" MACSTR, mic->iev_keyix, 829 MAC2STR(mic->iev_src)); 832 data.michael_mic_failure.src = mic->iev_src; 1232 struct ieee80211_michael_event *mic; local 1333 mic = (struct ieee80211_michael_event *) &ifan[1]; 1336 "keyix=%u src_addr=" MACSTR, mic->iev_keyix, 1337 MAC2STR(mic->iev_src)); 1341 !IEEE80211_IS_MULTICAST(mic [all...] |