/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/ |
H A D | s2_pkt.c | 134 int mac_size; local 232 mac_size = 0; 240 mac_size = EVP_MD_CTX_size(s->read_hash); 241 if (mac_size < 0) 243 OPENSSL_assert(mac_size <= MAX_MAC_SIZE); 245 s->s2->ract_data = &p[mac_size]; 246 if (s->s2->padding + mac_size > s->s2->rlength) { 258 (s->s2->rlength >= (unsigned int)mac_size)) { 263 s->s2->ract_data_length -= mac_size; 266 if ((CRYPTO_memcmp(mac, s->s2->mac_data, mac_size) ! 489 int mac_size; local [all...] |
H A D | d1_pkt.c | 400 unsigned int mac_size, orig_len; local 460 /* s->read_hash != NULL => mac_size != -1 */ 463 mac_size = EVP_MD_CTX_size(s->read_hash); 464 OPENSSL_assert(mac_size <= EVP_MAX_MD_SIZE); 477 if (orig_len < mac_size || 480 orig_len < mac_size + 1)) { 494 ssl3_cbc_copy_mac(mac_tmp, rr, mac_size, orig_len); 495 rr->length -= mac_size; 500 * |mac_size| above. 502 rr->length -= mac_size; 1493 int i, mac_size, clear = 0; local [all...] |
H A D | s3_pkt.c | 315 unsigned mac_size, orig_len; local 468 /* s->read_hash != NULL => mac_size != -1 */ 471 mac_size = EVP_MD_CTX_size(s->read_hash); 472 OPENSSL_assert(mac_size <= EVP_MAX_MD_SIZE); 485 if (orig_len < mac_size || 488 orig_len < mac_size + 1)) { 502 ssl3_cbc_copy_mac(mac_tmp, rr, mac_size, orig_len); 503 rr->length -= mac_size; 508 * |mac_size| above. 510 rr->length -= mac_size; 862 int i, mac_size, clear = 0; local [all...] |
H A D | s3_cbc.c | 87 unsigned block_size, unsigned mac_size) 90 const unsigned overhead = 1 /* padding length byte */ + mac_size; 123 unsigned block_size, unsigned mac_size) 126 const unsigned overhead = 1 /* padding length byte */ + mac_size; 85 ssl3_cbc_remove_padding(const SSL *s, SSL3_RECORD *rec, unsigned block_size, unsigned mac_size) argument 121 tls1_cbc_remove_padding(const SSL *s, SSL3_RECORD *rec, unsigned block_size, unsigned mac_size) argument
|
H A D | d1_both.c | 269 unsigned int len, frag_off, mac_size, blocksize, used_len; local 285 mac_size = 0; 287 mac_size = EVP_MD_CTX_size(s->write_hash); 289 mac_size = 0; 337 + mac_size + blocksize; 352 used_len = DTLS1_RT_HEADER_LENGTH + mac_size + blocksize;
|
H A D | s3_enc.c | 502 int bs, i, mac_size = 0; local 554 mac_size = EVP_MD_CTX_size(s->read_hash); 556 return ssl3_cbc_remove_padding(s, rec, bs, mac_size);
|
H A D | t1_enc.c | 756 int bs, i, j, k, pad = 0, ret, mac_size = 0; local 912 mac_size = EVP_MD_CTX_size(s->read_hash); 914 ret = tls1_cbc_remove_padding(s, rec, bs, mac_size);
|
H A D | ssl_locl.h | 1442 unsigned block_size, unsigned mac_size); 1445 unsigned block_size, unsigned mac_size);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/ |
H A D | s2_pkt.c | 134 int mac_size; local 232 mac_size = 0; 240 mac_size = EVP_MD_CTX_size(s->read_hash); 241 if (mac_size < 0) 243 OPENSSL_assert(mac_size <= MAX_MAC_SIZE); 245 s->s2->ract_data = &p[mac_size]; 246 if (s->s2->padding + mac_size > s->s2->rlength) { 258 (s->s2->rlength >= (unsigned int)mac_size)) { 263 s->s2->ract_data_length -= mac_size; 266 if ((CRYPTO_memcmp(mac, s->s2->mac_data, mac_size) ! 489 int mac_size; local [all...] |
H A D | d1_pkt.c | 400 unsigned int mac_size, orig_len; local 460 /* s->read_hash != NULL => mac_size != -1 */ 463 mac_size = EVP_MD_CTX_size(s->read_hash); 464 OPENSSL_assert(mac_size <= EVP_MAX_MD_SIZE); 477 if (orig_len < mac_size || 480 orig_len < mac_size + 1)) { 494 ssl3_cbc_copy_mac(mac_tmp, rr, mac_size, orig_len); 495 rr->length -= mac_size; 500 * |mac_size| above. 502 rr->length -= mac_size; 1493 int i, mac_size, clear = 0; local [all...] |
H A D | s3_pkt.c | 315 unsigned mac_size, orig_len; local 468 /* s->read_hash != NULL => mac_size != -1 */ 471 mac_size = EVP_MD_CTX_size(s->read_hash); 472 OPENSSL_assert(mac_size <= EVP_MAX_MD_SIZE); 485 if (orig_len < mac_size || 488 orig_len < mac_size + 1)) { 502 ssl3_cbc_copy_mac(mac_tmp, rr, mac_size, orig_len); 503 rr->length -= mac_size; 508 * |mac_size| above. 510 rr->length -= mac_size; 862 int i, mac_size, clear = 0; local [all...] |
H A D | s3_cbc.c | 87 unsigned block_size, unsigned mac_size) 90 const unsigned overhead = 1 /* padding length byte */ + mac_size; 123 unsigned block_size, unsigned mac_size) 126 const unsigned overhead = 1 /* padding length byte */ + mac_size; 85 ssl3_cbc_remove_padding(const SSL *s, SSL3_RECORD *rec, unsigned block_size, unsigned mac_size) argument 121 tls1_cbc_remove_padding(const SSL *s, SSL3_RECORD *rec, unsigned block_size, unsigned mac_size) argument
|
H A D | d1_both.c | 269 unsigned int len, frag_off, mac_size, blocksize, used_len; local 285 mac_size = 0; 287 mac_size = EVP_MD_CTX_size(s->write_hash); 289 mac_size = 0; 337 + mac_size + blocksize; 352 used_len = DTLS1_RT_HEADER_LENGTH + mac_size + blocksize;
|
H A D | s3_enc.c | 502 int bs, i, mac_size = 0; local 554 mac_size = EVP_MD_CTX_size(s->read_hash); 556 return ssl3_cbc_remove_padding(s, rec, bs, mac_size);
|
H A D | t1_enc.c | 756 int bs, i, j, k, pad = 0, ret, mac_size = 0; local 912 mac_size = EVP_MD_CTX_size(s->read_hash); 914 ret = tls1_cbc_remove_padding(s, rec, bs, mac_size);
|
H A D | ssl_locl.h | 1442 unsigned block_size, unsigned mac_size); 1445 unsigned block_size, unsigned mac_size);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | s2_pkt.c | 133 unsigned int mac_size; local 238 mac_size = 0; 249 mac_size=EVP_MD_size(s->read_hash); 250 OPENSSL_assert(mac_size <= MAX_MAC_SIZE); 252 s->s2->ract_data= &p[mac_size]; 253 if (s->s2->padding + mac_size > s->s2->rlength) 264 (s->s2->rlength >= mac_size)) 267 s->s2->ract_data_length-=mac_size; 271 (unsigned int)mac_size) != 0) || 516 unsigned int j,k,olen,p,mac_size,b local [all...] |
H A D | s3_pkt.c | 240 unsigned int mac_size; local 377 mac_size=EVP_MD_size(s->read_hash); 379 if (rr->length > SSL3_RT_MAX_COMPRESSED_LENGTH+extra+mac_size) 389 /* check the MAC for rr->input (it's in mac_size bytes at the tail) */ 390 if (rr->length >= mac_size) 392 rr->length -= mac_size; 408 if (mac == NULL || memcmp(md, mac, mac_size) != 0) 570 int i,mac_size,clear=0; local 603 mac_size=0; 605 mac_size [all...] |
H A D | d1_pkt.c | 331 unsigned int mac_size; local 389 mac_size=EVP_MD_size(s->read_hash); 391 if (rr->length > SSL3_RT_MAX_COMPRESSED_LENGTH+mac_size) 401 /* check the MAC for rr->input (it's in mac_size bytes at the tail) */ 402 if (rr->length < mac_size) 412 rr->length-=mac_size; 414 if (memcmp(md,&(rr->data[rr->length]),mac_size) != 0) 1264 int i,mac_size,clear=0; local 1301 mac_size=0; 1303 mac_size [all...] |