/freebsd-11.0-release/sys/kgssapi/ |
H A D | gss_verify_mic.c | 50 struct mbuf *m, *mic; local 62 MGET(mic, M_WAITOK, MT_DATA); 64 MCLGET(mic, M_WAITOK); 65 m_append(mic, token_buffer->length, token_buffer->value); 67 maj_stat = KGSS_VERIFY_MIC(ctx, minor_status, m, mic, qop_state); 70 m_freem(mic); 77 struct mbuf *m, struct mbuf *mic, gss_qop_t *qop_state) 85 return (KGSS_VERIFY_MIC(ctx, minor_status, m, mic, qop_state)); 76 gss_verify_mic_mbuf(OM_uint32 *minor_status, const gss_ctx_id_t ctx, struct mbuf *m, struct mbuf *mic, gss_qop_t *qop_state) argument
|
H A D | gss_get_mic.c | 50 struct mbuf *m, *mic; local 62 maj_stat = KGSS_GET_MIC(ctx, minor_status, qop_req, m, &mic); 66 message_token->length = m_length(mic, NULL); 69 m_copydata(mic, 0, message_token->length, 71 m_freem(mic);
|
/freebsd-11.0-release/sys/rpc/rpcsec_gss/ |
H A D | rpcsec_gss_prot.c | 121 struct mbuf *args, *mic; local 137 maj_stat = gss_get_mic_mbuf(&min_stat, ctx, qop, args, &mic); 153 len = m_length(mic, NULL); 154 put_uint32(&mic, len); 156 m_append(mic, RNDUP(len) - len, zpad); 162 m_cat(args, mic); 228 struct mbuf *results, *message, *mic; local 261 mic = results; 262 if (cklen > mic->m_len) { 263 mic [all...] |
H A D | svc_rpcsec_gss.c | 1046 gss_buffer_desc mic; local 1057 &signbuf, &mic); 1065 KASSERT(mic.length <= MAX_AUTH_BYTES, 1069 rqst->rq_verf.oa_length = mic.length; 1070 bcopy(mic.value, rqst->rq_verf.oa_base, mic.length); 1072 gss_release_buffer(&min_stat, &mic);
|
/freebsd-11.0-release/sys/kgssapi/krb5/ |
H A D | krb5_mech.c | 861 struct mbuf *mlast, *mic, *tm; local 870 p = krb5_make_token("\x01\x01", tlen, tlen, &mic); 888 mic->m_len = p - (uint8_t *) mic->m_data; 889 mic->m_next = m; 894 krb5_checksum(kc->kc_checksumkey, 15, mic, mic->m_len - 8, 897 mic->m_next = NULL; 934 * Set the mic buffer to its final size so that the encrypt 937 mic 949 struct mbuf *mlast, *mic; local 1041 krb5_verify_mic_old(struct krb5_context *kc, struct mbuf *m, struct mbuf *mic, uint8_t sgn_alg[2]) argument 1139 krb5_verify_mic_new(struct krb5_context *kc, struct mbuf *m, struct mbuf *mic) argument 1219 krb5_verify_mic(gss_ctx_id_t ctx, OM_uint32 *minor_status, struct mbuf *m, struct mbuf *mic, gss_qop_t *qop_state) argument [all...] |
/freebsd-11.0-release/crypto/openssh/ |
H A D | auth2-gss.c | 161 userauth_finish(authctxt, 0, "gssapi-with-mic", NULL); 248 userauth_finish(authctxt, authenticated, "gssapi-with-mic", NULL); 259 gss_buffer_desc mic, gssbuf; local 267 mic.value = packet_get_string(&len); 268 mic.length = len; 271 "gssapi-with-mic"); 276 if (!GSS_ERROR(PRIVSEP(ssh_gssapi_checkmic(gssctxt, &gssbuf, &mic)))) 282 free(mic.value); 289 userauth_finish(authctxt, authenticated, "gssapi-with-mic", NULL); 294 "gssapi-with-mic", [all...] |
/freebsd-11.0-release/contrib/wpa/src/eap_common/ |
H A D | eap_gpsk_common.h | 64 int specifier, const u8 *data, size_t len, u8 *mic);
|
H A D | eap_sake_common.h | 92 const u8 *mic_pos, u8 *mic);
|
H A D | eap_gpsk_common.c | 500 const u8 *data, size_t len, u8 *mic) 508 return omac1_aes_128(sk, data, len, mic); 520 * @mic: Buffer for the computed MIC, eap_gpsk_mic_len(cipher) bytes 524 int specifier, const u8 *data, size_t len, u8 *mic) 533 ret = eap_gpsk_compute_mic_aes(sk, sk_len, data, len, mic); 537 hmac_sha256(sk, sk_len, data, len, mic); 499 eap_gpsk_compute_mic_aes(const u8 *sk, size_t sk_len, const u8 *data, size_t len, u8 *mic) argument 523 eap_gpsk_compute_mic(const u8 *sk, size_t sk_len, int vendor, int specifier, const u8 *data, size_t len, u8 *mic) argument
|
H A D | eap_sake_common.c | 314 * @mic: Buffer for the computed 16-byte MIC 321 const u8 *mic_pos, u8 *mic) 370 mic, EAP_SAKE_MIC_LEN); 316 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) argument
|
/freebsd-11.0-release/contrib/wpa/src/eap_server/ |
H A D | eap_server_gpsk.c | 247 u8 mic[EAP_GPSK_MAX_MIC_LEN]; local 447 data->specifier, payload, pos - payload, mic) 453 if (os_memcmp_const(mic, pos, miclen) != 0) { 456 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen); 479 u8 mic[EAP_GPSK_MAX_MIC_LEN]; local 516 data->specifier, payload, pos - payload, mic) 522 if (os_memcmp_const(mic, pos, miclen) != 0) { 525 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen);
|
H A D | eap_server_sake.c | 185 u8 *mic; local 199 mic = wpabuf_put(msg, EAP_SAKE_MIC_LEN); 203 wpabuf_head(msg), wpabuf_len(msg), mic, mic))
|
/freebsd-11.0-release/contrib/wpa/src/rsn_supp/ |
H A D | tdls.c | 55 u8 mic[TDLS_MIC_LEN]; member in struct:wpa_tdls_ftie 469 * @mic: Pointer for writing MIC 475 const u8 *ftie, u8 *mic) 511 os_memset(_ftie->mic, 0, TDLS_MIC_LEN); 516 ret = omac1_aes_128(kck, buf, pos - buf, mic); 518 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE MIC", mic, 16); 531 * @mic: Pointer for writing MIC 537 const u8 *ftie, u8 *mic) 570 os_memset(_ftie->mic, 0, TDLS_MIC_LEN); 575 ret = omac1_aes_128(kck, buf, pos - buf, mic); 473 wpa_tdls_ftie_mic(const u8 *kck, u8 trans_seq, const u8 *lnkid, const u8 *rsnie, const u8 *timeoutie, const u8 *ftie, u8 *mic) argument 535 wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, u8 dtoken, const u8 *lnkid, const u8 *ftie, u8 *mic) argument 587 u8 mic[16]; local 615 u8 mic[16]; local [all...] |
H A D | wpa_ft.c | 301 ric_ies_len, ftie->mic) < 0) { 675 u8 mic[WPA_EAPOL_KEY_MIC_MAX_LEN]; local 778 mic) < 0) { 783 if (os_memcmp_const(mic, ftie->mic, 16) != 0) { 785 wpa_hexdump(MSG_MSGDUMP, "FT: Received MIC", ftie->mic, 16); 786 wpa_hexdump(MSG_MSGDUMP, "FT: Calculated MIC", mic, 16);
|
/freebsd-11.0-release/crypto/heimdal/appl/gssmask/ |
H A D | gssmaestro.c | 217 krb5_data *in, krb5_data *mic) 226 retdata(client, *mic); 232 krb5_data *in, krb5_data *mic) 240 putdata(client, *mic); 412 krb5_data msg, mic; local 418 krb5_data_zero(&mic); 420 val = get_mic(c1, hc1, &msg, &mic); 423 val = verify_mic(c2, hc2, &msg, &mic); 427 krb5_data_free(&mic); 522 /* mic */ 216 get_mic(struct client *client, int32_t hContext, krb5_data *in, krb5_data *mic) argument 231 verify_mic(struct client *client, int32_t hContext, krb5_data *in, krb5_data *mic) argument [all...] |
H A D | gssmask.c | 607 krb5_data msg, mic; local 625 retdata(c, mic); 627 mic_token.length = mic.length; 628 mic_token.value = mic.data; 635 krb5_data_free(&mic);
|
/freebsd-11.0-release/contrib/wpa/wpa_supplicant/ |
H A D | mesh_rsn.c | 517 (elems->mic - 2) - cat }; 519 if (!elems->mic || elems->mic_len < AES_BLOCK_SIZE) { 520 wpa_msg(wpa_s, MSG_DEBUG, "Mesh RSN: missing mic ie"); 524 ampe_buf = (u8 *) elems->mic + elems->mic_len; 528 crypt_len = elems_len - (elems->mic - start); 542 os_memcpy(crypt, elems->mic, crypt_len);
|
/freebsd-11.0-release/sys/net80211/ |
H A D | ieee80211_crypto_tkip.c | 99 u8 mic[IEEE80211_WEP_MICLEN]); 233 uint8_t mic[IEEE80211_WEP_MICLEN]; local 240 m, hdrlen, m->m_pkthdr.len - hdrlen, mic); 241 return m_append(m, tkip.ic_miclen, mic); 345 u8 mic[IEEE80211_WEP_MICLEN]; local 352 mic); 355 if (memcmp(mic, mic0, tkip.ic_miclen)) { 811 u8 mic[IEEE80211_WEP_MICLEN]) 930 put_le32(mic, l); 931 put_le32(mic 809 michael_mic(struct tkip_ctx *ctx, const u8 *key, struct mbuf *m, u_int off, size_t data_len, u8 mic[IEEE80211_WEP_MICLEN]) argument [all...] |
H A D | ieee80211_crypto_ccmp.c | 568 uint8_t mic[AES_BLOCK_LEN]; local 579 m_copydata(m, m->m_pkthdr.len - ccmp.ic_trailer, ccmp.ic_trailer, mic); 580 xor_block(mic, b, ccmp.ic_trailer); 636 if (memcmp(mic, a, ccmp.ic_trailer) != 0) {
|
/freebsd-11.0-release/contrib/wpa/src/common/ |
H A D | wpa_common.c | 55 * @mic: Pointer to the buffer to which the EAPOL-Key MIC is written 68 const u8 *buf, size_t len, u8 *mic) 75 return hmac_md5(key, key_len, buf, len, mic); 80 os_memcpy(mic, hash, MD5_MAC_LEN); 84 return omac1_aes_128(key, buf, len, mic); 90 return omac1_aes_128(key, buf, len, mic); 96 os_memcpy(mic, hash, MD5_MAC_LEN); 103 os_memcpy(mic, hash, 24); 214 const u8 *ric, size_t ric_len, u8 *mic) 277 if (omac1_aes_128_vector(kck, num_elem, addr, len, mic)) 67 wpa_eapol_key_mic(const u8 *key, size_t key_len, int akmp, int ver, const u8 *buf, size_t len, u8 *mic) argument 209 wpa_ft_mic(const u8 *kck, size_t kck_len, const u8 *sta_addr, const u8 *ap_addr, u8 transaction_seqnum, const u8 *mdie, size_t mdie_len, const u8 *ftie, size_t ftie_len, const u8 *rsnie, size_t rsnie_len, const u8 *ric, size_t ric_len, u8 *mic) argument [all...] |
H A D | wpa_common.h | 324 u8 mic[16]; member in struct:rsn_ftie 348 const u8 *buf, size_t len, u8 *mic); 360 const u8 *ric, size_t ric_len, u8 *mic);
|
H A D | ieee802_11_common.h | 60 const u8 *mic; member in struct:ieee802_11_elems
|
/freebsd-11.0-release/crypto/heimdal/lib/gssapi/spnego/ |
H A D | accept_sec_context.c | 411 heim_octet_string *mic, 423 if (mic != NULL) 454 ret = verify_mechlist_mic(minor_status, ctx, mech_buf, mic); 743 heim_octet_string *mic; local 794 mic = na->mechListMIC; 795 if (mic != NULL) 405 acceptor_complete(OM_uint32 * minor_status, gssspnego_ctx ctx, int *get_mic, gss_buffer_t mech_buf, gss_buffer_t mech_input_token, gss_buffer_t mech_output_token, heim_octet_string *mic, gss_buffer_t output_token) argument
|
/freebsd-11.0-release/contrib/wpa/src/drivers/ |
H A D | driver_bsd.c | 735 struct ieee80211_michael_event *mic; local 779 mic = (struct ieee80211_michael_event *) &ifan[1]; 782 "keyix=%u src_addr=" MACSTR, mic->iev_keyix, 783 MAC2STR(mic->iev_src)); 786 data.michael_mic_failure.src = mic->iev_src; 1207 struct ieee80211_michael_event *mic; local 1282 mic = (struct ieee80211_michael_event *) &ifan[1]; 1285 "keyix=%u src_addr=" MACSTR, mic->iev_keyix, 1286 MAC2STR(mic->iev_src)); 1290 !IEEE80211_IS_MULTICAST(mic [all...] |
/freebsd-11.0-release/contrib/wpa/src/eap_peer/ |
H A D | eap_gpsk.c | 552 u8 mic[EAP_GPSK_MAX_MIC_LEN]; local 566 data->specifier, payload, pos - payload, mic) 571 if (os_memcmp_const(mic, pos, miclen) != 0) { 574 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen);
|