Searched refs:mic (Results 1 - 25 of 36) sorted by relevance

12

/freebsd-11-stable/sys/kgssapi/
H A Dgss_verify_mic.c50 struct mbuf *m, *mic; local
62 MGET(mic, M_WAITOK, MT_DATA);
64 MCLGET(mic, M_WAITOK);
65 m_append(mic, token_buffer->length, token_buffer->value);
67 maj_stat = KGSS_VERIFY_MIC(ctx, minor_status, m, mic, qop_state);
70 m_freem(mic);
77 struct mbuf *m, struct mbuf *mic, gss_qop_t *qop_state)
85 return (KGSS_VERIFY_MIC(ctx, minor_status, m, mic, qop_state));
76 gss_verify_mic_mbuf(OM_uint32 *minor_status, const gss_ctx_id_t ctx, struct mbuf *m, struct mbuf *mic, gss_qop_t *qop_state) argument
H A Dgss_get_mic.c50 struct mbuf *m, *mic; local
62 maj_stat = KGSS_GET_MIC(ctx, minor_status, qop_req, m, &mic);
66 message_token->length = m_length(mic, NULL);
69 m_copydata(mic, 0, message_token->length,
71 m_freem(mic);
/freebsd-11-stable/sys/dev/mmc/
H A Dmmc_ioctl.h46 #define mmc_ioc_cmd_set_data(mic, ptr) \
47 (mic).data_ptr = (uint64_t)(uintptr_t)(ptr)
H A Dmmcsd.c193 static int mmcsd_ioctl_cmd(struct mmcsd_part *part, struct mmc_ioc_cmd *mic,
838 struct mmc_ioc_cmd *mic; local
853 mic = data;
854 err = mmcsd_ioctl_cmd(part, mic, fflag);
863 size = sizeof(*mic) * cnt;
864 mic = malloc(size, M_TEMP, M_WAITOK);
865 err = copyin((const void *)mimc->cmds, mic, size);
868 err = mmcsd_ioctl_cmd(part, &mic[i], fflag);
873 free(mic, M_TEMP);
882 mmcsd_ioctl_cmd(struct mmcsd_part *part, struct mmc_ioc_cmd *mic, in argument
[all...]
/freebsd-11-stable/sys/rpc/rpcsec_gss/
H A Drpcsec_gss_prot.c121 struct mbuf *args, *mic; local
137 maj_stat = gss_get_mic_mbuf(&min_stat, ctx, qop, args, &mic);
153 len = m_length(mic, NULL);
154 put_uint32(&mic, len);
156 m_append(mic, RNDUP(len) - len, zpad);
162 m_cat(args, mic);
228 struct mbuf *results, *message, *mic; local
261 mic = results;
262 if (cklen > mic->m_len) {
263 mic
[all...]
H A Dsvc_rpcsec_gss.c1080 gss_buffer_desc mic; local
1091 &signbuf, &mic);
1099 KASSERT(mic.length <= MAX_AUTH_BYTES,
1103 rqst->rq_verf.oa_length = mic.length;
1104 bcopy(mic.value, rqst->rq_verf.oa_base, mic.length);
1106 gss_release_buffer(&min_stat, &mic);
/freebsd-11-stable/sys/kgssapi/krb5/
H A Dkrb5_mech.c861 struct mbuf *mlast, *mic, *tm; local
870 p = krb5_make_token("\x01\x01", tlen, tlen, &mic);
888 mic->m_len = p - (uint8_t *) mic->m_data;
889 mic->m_next = m;
894 krb5_checksum(kc->kc_checksumkey, 15, mic, mic->m_len - 8,
897 mic->m_next = NULL;
934 * Set the mic buffer to its final size so that the encrypt
937 mic
949 struct mbuf *mlast, *mic; local
1041 krb5_verify_mic_old(struct krb5_context *kc, struct mbuf *m, struct mbuf *mic, uint8_t sgn_alg[2]) argument
1139 krb5_verify_mic_new(struct krb5_context *kc, struct mbuf *m, struct mbuf *mic) argument
1219 krb5_verify_mic(gss_ctx_id_t ctx, OM_uint32 *minor_status, struct mbuf *m, struct mbuf *mic, gss_qop_t *qop_state) argument
[all...]
/freebsd-11-stable/crypto/openssh/
H A Dauth2-gss.c161 userauth_finish(authctxt, 0, "gssapi-with-mic", NULL);
248 userauth_finish(authctxt, authenticated, "gssapi-with-mic", NULL);
259 gss_buffer_desc mic, gssbuf; local
267 mic.value = packet_get_string(&len);
268 mic.length = len;
271 "gssapi-with-mic");
276 if (!GSS_ERROR(PRIVSEP(ssh_gssapi_checkmic(gssctxt, &gssbuf, &mic))))
282 free(mic.value);
289 userauth_finish(authctxt, authenticated, "gssapi-with-mic", NULL);
294 "gssapi-with-mic",
[all...]
/freebsd-11-stable/contrib/wpa/src/eap_common/
H A Deap_gpsk_common.h64 int specifier, const u8 *data, size_t len, u8 *mic);
H A Deap_sake_common.h92 const u8 *mic_pos, u8 *mic);
H A Deap_gpsk_common.c501 const u8 *data, size_t len, u8 *mic)
509 return omac1_aes_128(sk, data, len, mic);
521 * @mic: Buffer for the computed MIC, eap_gpsk_mic_len(cipher) bytes
525 int specifier, const u8 *data, size_t len, u8 *mic)
534 ret = eap_gpsk_compute_mic_aes(sk, sk_len, data, len, mic);
538 ret = hmac_sha256(sk, sk_len, data, len, mic);
500 eap_gpsk_compute_mic_aes(const u8 *sk, size_t sk_len, const u8 *data, size_t len, u8 *mic) argument
524 eap_gpsk_compute_mic(const u8 *sk, size_t sk_len, int vendor, int specifier, const u8 *data, size_t len, u8 *mic) argument
H A Deap_sake_common.c325 * @mic: Buffer for the computed 16-byte MIC
333 const u8 *mic_pos, u8 *mic)
383 mic, EAP_SAKE_MIC_LEN);
328 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) argument
/freebsd-11-stable/contrib/wpa/src/eap_server/
H A Deap_server_gpsk.c247 u8 mic[EAP_GPSK_MAX_MIC_LEN]; local
446 data->specifier, payload, pos - payload, mic)
452 if (os_memcmp_const(mic, pos, miclen) != 0) {
455 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen);
478 u8 mic[EAP_GPSK_MAX_MIC_LEN]; local
515 data->specifier, payload, pos - payload, mic)
521 if (os_memcmp_const(mic, pos, miclen) != 0) {
524 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen);
H A Deap_server_sake.c185 u8 *mic; local
199 mic = wpabuf_put(msg, EAP_SAKE_MIC_LEN);
203 wpabuf_head(msg), wpabuf_len(msg), mic, mic))
/freebsd-11-stable/contrib/wpa/src/rsn_supp/
H A Dtdls.c56 u8 mic[TDLS_MIC_LEN]; member in struct:wpa_tdls_ftie
467 * @mic: Pointer for writing MIC
473 const u8 *ftie, u8 *mic)
509 os_memset(_ftie->mic, 0, TDLS_MIC_LEN);
514 ret = omac1_aes_128(kck, buf, pos - buf, mic);
516 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE MIC", mic, 16);
529 * @mic: Pointer for writing MIC
535 const u8 *ftie, u8 *mic)
568 os_memset(_ftie->mic, 0, TDLS_MIC_LEN);
573 ret = omac1_aes_128(kck, buf, pos - buf, mic);
471 wpa_tdls_ftie_mic(const u8 *kck, u8 trans_seq, const u8 *lnkid, const u8 *rsnie, const u8 *timeoutie, const u8 *ftie, u8 *mic) argument
533 wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, u8 dtoken, const u8 *lnkid, const u8 *ftie, u8 *mic) argument
585 u8 mic[16]; local
613 u8 mic[16]; local
[all...]
H A Dwpa_ft.c310 fte_mic = ftie->mic;
320 fte_mic = ftie->mic;
847 u8 mic[WPA_EAPOL_KEY_MIC_MAX_LEN]; local
892 fte_mic = ftie->mic;
905 fte_mic = ftie->mic;
985 mic) < 0) {
990 if (os_memcmp_const(mic, fte_mic, 16) != 0) {
993 wpa_hexdump(MSG_MSGDUMP, "FT: Calculated MIC", mic, 16);
/freebsd-11-stable/crypto/heimdal/appl/gssmask/
H A Dgssmaestro.c217 krb5_data *in, krb5_data *mic)
226 retdata(client, *mic);
232 krb5_data *in, krb5_data *mic)
240 putdata(client, *mic);
412 krb5_data msg, mic; local
418 krb5_data_zero(&mic);
420 val = get_mic(c1, hc1, &msg, &mic);
423 val = verify_mic(c2, hc2, &msg, &mic);
427 krb5_data_free(&mic);
522 /* mic */
216 get_mic(struct client *client, int32_t hContext, krb5_data *in, krb5_data *mic) argument
231 verify_mic(struct client *client, int32_t hContext, krb5_data *in, krb5_data *mic) argument
[all...]
H A Dgssmask.c607 krb5_data msg, mic; local
625 retdata(c, mic);
627 mic_token.length = mic.length;
628 mic_token.value = mic.data;
635 krb5_data_free(&mic);
/freebsd-11-stable/sys/net80211/
H A Dieee80211_crypto_tkip.c99 u8 mic[IEEE80211_WEP_MICLEN]);
233 uint8_t mic[IEEE80211_WEP_MICLEN]; local
240 m, hdrlen, m->m_pkthdr.len - hdrlen, mic);
241 return m_append(m, tkip.ic_miclen, mic);
345 u8 mic[IEEE80211_WEP_MICLEN]; local
352 mic);
355 if (memcmp(mic, mic0, tkip.ic_miclen)) {
811 u8 mic[IEEE80211_WEP_MICLEN])
930 put_le32(mic, l);
931 put_le32(mic
809 michael_mic(struct tkip_ctx *ctx, const u8 *key, struct mbuf *m, u_int off, size_t data_len, u8 mic[IEEE80211_WEP_MICLEN]) argument
[all...]
H A Dieee80211_crypto_ccmp.c568 uint8_t mic[AES_BLOCK_LEN]; local
579 m_copydata(m, m->m_pkthdr.len - ccmp.ic_trailer, ccmp.ic_trailer, mic);
580 xor_block(mic, b, ccmp.ic_trailer);
636 if (memcmp(mic, a, ccmp.ic_trailer) != 0) {
/freebsd-11-stable/contrib/wpa/src/common/
H A Dwpa_common.c180 * @mic: Pointer to the buffer to which the EAPOL-Key MIC is written
193 const u8 *buf, size_t len, u8 *mic)
207 return hmac_md5(key, key_len, buf, len, mic);
213 os_memcpy(mic, hash, MD5_MAC_LEN);
218 return omac1_aes_128(key, buf, len, mic);
227 return omac1_aes_128(key, buf, len, mic);
233 return omac1_aes_128(key, buf, len, mic);
241 os_memcpy(mic, hash, MD5_MAC_LEN);
250 os_memcpy(mic, hash, 24);
273 os_memcpy(mic, has
192 wpa_eapol_key_mic(const u8 *key, size_t key_len, int akmp, int ver, const u8 *buf, size_t len, u8 *mic) argument
754 wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, const u8 *ap_addr, u8 transaction_seqnum, const u8 *mdie, size_t mdie_len, const u8 *ftie, size_t ftie_len, const u8 *rsnie, size_t rsnie_len, const u8 *ric, size_t ric_len, u8 *mic) argument
[all...]
H A Dwpa_common.h313 u8 mic[16]; member in struct:rsn_ftie
321 u8 mic[24]; member in struct:rsn_ftie_sha384
346 const u8 *buf, size_t len, u8 *mic);
375 const u8 *ric, size_t ric_len, u8 *mic);
/freebsd-11-stable/crypto/heimdal/lib/gssapi/spnego/
H A Daccept_sec_context.c411 heim_octet_string *mic,
423 if (mic != NULL)
454 ret = verify_mechlist_mic(minor_status, ctx, mech_buf, mic);
743 heim_octet_string *mic; local
794 mic = na->mechListMIC;
795 if (mic != NULL)
405 acceptor_complete(OM_uint32 * minor_status, gssspnego_ctx ctx, int *get_mic, gss_buffer_t mech_buf, gss_buffer_t mech_input_token, gss_buffer_t mech_output_token, heim_octet_string *mic, gss_buffer_t output_token) argument
/freebsd-11-stable/contrib/wpa/wpa_supplicant/
H A Dmesh_rsn.c646 elems->mic ? (elems->mic - 2) - cat : 0 };
668 if (!elems->mic || elems->mic_len < AES_BLOCK_SIZE) {
669 wpa_msg(wpa_s, MSG_DEBUG, "Mesh RSN: missing mic ie");
673 ampe_buf = (u8 *) elems->mic + elems->mic_len;
677 crypt_len = elems_len - (elems->mic - start);
691 os_memcpy(crypt, elems->mic, crypt_len);
/freebsd-11-stable/contrib/wpa/src/drivers/
H A Ddriver_bsd.c778 struct ieee80211_michael_event *mic; local
825 mic = (struct ieee80211_michael_event *) &ifan[1];
828 "keyix=%u src_addr=" MACSTR, mic->iev_keyix,
829 MAC2STR(mic->iev_src));
832 data.michael_mic_failure.src = mic->iev_src;
1232 struct ieee80211_michael_event *mic; local
1333 mic = (struct ieee80211_michael_event *) &ifan[1];
1336 "keyix=%u src_addr=" MACSTR, mic->iev_keyix,
1337 MAC2STR(mic->iev_src));
1341 !IEEE80211_IS_MULTICAST(mic
[all...]

Completed in 187 milliseconds

12