/freebsd-9.3-release/contrib/ntp/sntp/ |
H A D | crypto.h | 29 extern int make_mac(const void *pkt_data, int pkt_size, int mac_size, 31 extern int auth_md5(const void *pkt_data, int pkt_size, int mac_size,
|
H A D | networking.c | 109 int mac_size; local 186 mac_size = exten_len << 2; 187 if (!auth_md5(rpkt, pkt_len - mac_size, 188 mac_size - 4, pkt_key)) {
|
H A D | crypto.c | 14 int mac_size, 19 u_int len = mac_size; 51 int mac_size, 59 if (mac_size > (int)sizeof(digest)) 11 make_mac( const void *pkt_data, int pkt_size, int mac_size, const struct key *cmp_key, void * digest ) argument 48 auth_md5( const void *pkt_data, int pkt_size, int mac_size, const struct key *cmp_key ) argument
|
H A D | main.c | 1125 int mac_size; local 1137 mac_size = 20; /* max room for MAC */ 1138 mac_size = make_mac(x_pkt, pkt_len, mac_size, 1140 if (mac_size > 0) 1141 pkt_len += mac_size + 4;
|
/freebsd-9.3-release/crypto/openssl/ssl/ |
H A D | d1_enc.c | 144 int bs, i, j, k, mac_size = 0; local 149 mac_size = EVP_MD_size(s->write_hash); 150 if (mac_size < 0) 171 mac_size = EVP_MD_size(s->read_hash); 172 OPENSSL_assert(mac_size >= 0); 247 return tls1_cbc_remove_padding(s, rec, bs, mac_size);
|
H A D | s2_pkt.c | 134 unsigned int mac_size; local 232 mac_size = 0; 240 mac_size = EVP_MD_size(s->read_hash); 241 OPENSSL_assert(mac_size <= MAX_MAC_SIZE); 243 s->s2->ract_data = &p[mac_size]; 244 if (s->s2->padding + mac_size > s->s2->rlength) { 255 if ((!s->s2->clear_text) && (s->s2->rlength >= mac_size)) { 257 s->s2->ract_data_length -= mac_size; 260 if ((CRYPTO_memcmp(mac, s->s2->mac_data, mac_size) != 0) || 482 unsigned int j, k, olen, p, mac_size, b local [all...] |
H A D | s3_pkt.c | 258 unsigned mac_size, orig_len; local 393 /* s->read_hash != NULL => mac_size != -1 */ 396 mac_size = EVP_MD_size(s->read_hash); 397 OPENSSL_assert(mac_size <= EVP_MAX_MD_SIZE); 410 if (orig_len < mac_size || 413 orig_len < mac_size + 1)) { 427 ssl3_cbc_copy_mac(mac_tmp, rr, mac_size, orig_len); 428 rr->length -= mac_size; 433 * |mac_size| above. 435 rr->length -= mac_size; 625 int i, mac_size, clear = 0; local [all...] |
H A D | d1_pkt.c | 373 unsigned int mac_size, orig_len; local 432 /* s->read_hash != NULL => mac_size != -1 */ 435 mac_size = EVP_MD_size(s->read_hash); 436 OPENSSL_assert(mac_size <= EVP_MAX_MD_SIZE); 449 if (orig_len < mac_size || 452 orig_len < mac_size + 1)) { 466 ssl3_cbc_copy_mac(mac_tmp, rr, mac_size, orig_len); 467 rr->length -= mac_size; 472 * |mac_size| above. 474 rr->length -= mac_size; 1370 int i, mac_size, clear = 0; local [all...] |
H A D | s3_cbc.c | 87 unsigned block_size, unsigned mac_size) 90 const unsigned overhead = 1 /* padding length byte */ + mac_size; 123 unsigned block_size, unsigned mac_size) 126 const unsigned overhead = 1 /* padding length byte */ + mac_size; 85 ssl3_cbc_remove_padding(const SSL *s, SSL3_RECORD *rec, unsigned block_size, unsigned mac_size) argument 121 tls1_cbc_remove_padding(const SSL *s, SSL3_RECORD *rec, unsigned block_size, unsigned mac_size) argument
|
H A D | d1_both.c | 232 unsigned int len, frag_off, mac_size, blocksize; local 282 mac_size = EVP_MD_size(s->write_hash); 284 mac_size = 0; 295 DTLS1_RT_HEADER_LENGTH - mac_size - blocksize; 305 mac_size - blocksize;
|
H A D | s3_enc.c | 447 int bs, i, mac_size = 0; local 498 mac_size = EVP_MD_size(s->read_hash); 501 return ssl3_cbc_remove_padding(s, rec, bs, mac_size);
|
H A D | t1_enc.c | 577 int bs, i, j, k, pad = 0, ret, mac_size = 0; local 663 mac_size = EVP_MD_size(s->read_hash); 665 ret = tls1_cbc_remove_padding(s, rec, bs, mac_size);
|
H A D | ssl_locl.h | 1062 unsigned block_size, unsigned mac_size); 1065 unsigned block_size, unsigned mac_size);
|