/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/ |
H A D | s3_cbc.c | 204 * ssl3_cbc_copy_mac copies |md_size| bytes from the end of |rec| to |out| in 212 * rec->orig_len >= md_size 213 * md_size <= EVP_MAX_MD_SIZE 225 unsigned md_size, unsigned orig_len) 238 unsigned mac_start = mac_end - md_size; 248 OPENSSL_assert(orig_len >= md_size); 249 OPENSSL_assert(md_size <= EVP_MAX_MD_SIZE); 256 if (orig_len > md_size + 255 + 1) 257 scan_start = orig_len - (md_size + 255 + 1); 259 * div_spoiler contains a multiple of md_size tha 223 ssl3_cbc_copy_mac(unsigned char *out, const SSL3_RECORD *rec, unsigned md_size, unsigned orig_len) argument 432 unsigned md_size, md_block_size = 64; local [all...] |
H A D | s2_lib.c | 469 int md_size; local 485 md_size = EVP_MD_size(md5); 486 if (md_size < 0) 488 for (i = 0; i < s->s2->key_material_length; i += md_size) { 489 if (((km - s->s2->key_material) + md_size) > 510 km += md_size;
|
H A D | s3_enc.c | 728 size_t md_size, orig_len; local 747 md_size = t; 748 npad = (48 / md_size) * md_size; 753 orig_len = rec->length + md_size + ((unsigned int)rec->type >> 8); 775 memcpy(header + j, mac_sec, md_size); 776 j += md_size; 787 md, &md_size, 789 rec->length + md_size, orig_len, 790 mac_sec, md_size, [all...] |
H A D | t1_enc.c | 1011 size_t md_size, orig_len; local 1031 md_size = t; 1055 orig_len = rec->length + md_size + ((unsigned int)rec->type >> 8); 1074 md, &md_size, 1076 rec->length + md_size, orig_len, 1086 || EVP_DigestSignFinal(mac_ctx, md, &md_size) <= 0) { 1127 for (z = 0; z < md_size; z++) 1132 return (md_size);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/ |
H A D | s3_cbc.c | 204 * ssl3_cbc_copy_mac copies |md_size| bytes from the end of |rec| to |out| in 212 * rec->orig_len >= md_size 213 * md_size <= EVP_MAX_MD_SIZE 225 unsigned md_size, unsigned orig_len) 238 unsigned mac_start = mac_end - md_size; 248 OPENSSL_assert(orig_len >= md_size); 249 OPENSSL_assert(md_size <= EVP_MAX_MD_SIZE); 256 if (orig_len > md_size + 255 + 1) 257 scan_start = orig_len - (md_size + 255 + 1); 259 * div_spoiler contains a multiple of md_size tha 223 ssl3_cbc_copy_mac(unsigned char *out, const SSL3_RECORD *rec, unsigned md_size, unsigned orig_len) argument 432 unsigned md_size, md_block_size = 64; local [all...] |
H A D | s2_lib.c | 469 int md_size; local 485 md_size = EVP_MD_size(md5); 486 if (md_size < 0) 488 for (i = 0; i < s->s2->key_material_length; i += md_size) { 489 if (((km - s->s2->key_material) + md_size) > 510 km += md_size;
|
H A D | s3_enc.c | 728 size_t md_size, orig_len; local 747 md_size = t; 748 npad = (48 / md_size) * md_size; 753 orig_len = rec->length + md_size + ((unsigned int)rec->type >> 8); 775 memcpy(header + j, mac_sec, md_size); 776 j += md_size; 787 md, &md_size, 789 rec->length + md_size, orig_len, 790 mac_sec, md_size, [all...] |
H A D | t1_enc.c | 1011 size_t md_size, orig_len; local 1031 md_size = t; 1055 orig_len = rec->length + md_size + ((unsigned int)rec->type >> 8); 1074 md, &md_size, 1076 rec->length + md_size, orig_len, 1086 || EVP_DigestSignFinal(mac_ctx, md, &md_size) <= 0) { 1127 for (z = 0; z < md_size; z++) 1132 return (md_size);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/evp/ |
H A D | bio_ok.c | 466 if(ctx->buf_len+ 2* md->digest->md_size > OK_BLOCK_SIZE) return; 472 RAND_pseudo_bytes(md->md_data, md->digest->md_size); 473 memcpy(&(ctx->buf[ctx->buf_len]), md->md_data, md->digest->md_size); 474 longswap(&(ctx->buf[ctx->buf_len]), md->digest->md_size); 475 ctx->buf_len+= md->digest->md_size; 479 ctx->buf_len+= md->digest->md_size; 494 if((int)(ctx->buf_len-ctx->buf_off) < 2*md->digest->md_size) return; 497 memcpy(md->md_data, &(ctx->buf[ctx->buf_off]), md->digest->md_size); 498 longswap(md->md_data, md->digest->md_size); 499 ctx->buf_off+= md->digest->md_size; [all...] |
H A D | digest.c | 230 OPENSSL_assert(ctx->digest->md_size <= EVP_MAX_MD_SIZE); 233 *size=ctx->digest->md_size;
|
H A D | bio_md.c | 255 if (size < ctx->digest->md_size)
|
H A D | evp_lib.c | 258 return md->md_size;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/evp/ |
H A D | bio_ok.c | 485 if (ctx->buf_len + 2 * md->digest->md_size > OK_BLOCK_SIZE) 494 if (RAND_pseudo_bytes(md->md_data, md->digest->md_size) < 0) 496 memcpy(&(ctx->buf[ctx->buf_len]), md->md_data, md->digest->md_size); 497 longswap(&(ctx->buf[ctx->buf_len]), md->digest->md_size); 498 ctx->buf_len += md->digest->md_size; 504 ctx->buf_len += md->digest->md_size; 523 if ((int)(ctx->buf_len - ctx->buf_off) < 2 * md->digest->md_size) 528 memcpy(md->md_data, &(ctx->buf[ctx->buf_off]), md->digest->md_size); 529 longswap(md->md_data, md->digest->md_size); 530 ctx->buf_off += md->digest->md_size; [all...] |
H A D | digest.c | 279 OPENSSL_assert(ctx->digest->md_size <= EVP_MAX_MD_SIZE); 282 *size = ctx->digest->md_size;
|
H A D | bio_md.c | 257 if (size < ctx->digest->md_size)
|
H A D | evp_lib.c | 316 return md->md_size;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/evp/ |
H A D | bio_ok.c | 485 if (ctx->buf_len + 2 * md->digest->md_size > OK_BLOCK_SIZE) 494 if (RAND_pseudo_bytes(md->md_data, md->digest->md_size) < 0) 496 memcpy(&(ctx->buf[ctx->buf_len]), md->md_data, md->digest->md_size); 497 longswap(&(ctx->buf[ctx->buf_len]), md->digest->md_size); 498 ctx->buf_len += md->digest->md_size; 504 ctx->buf_len += md->digest->md_size; 523 if ((int)(ctx->buf_len - ctx->buf_off) < 2 * md->digest->md_size) 528 memcpy(md->md_data, &(ctx->buf[ctx->buf_off]), md->digest->md_size); 529 longswap(md->md_data, md->digest->md_size); 530 ctx->buf_off += md->digest->md_size; [all...] |
H A D | digest.c | 279 OPENSSL_assert(ctx->digest->md_size <= EVP_MAX_MD_SIZE); 282 *size = ctx->digest->md_size;
|
H A D | bio_md.c | 257 if (size < ctx->digest->md_size)
|
H A D | evp_lib.c | 316 return md->md_size;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/pkcs12/ |
H A D | p12_mutl.c | 76 int md_size; local 93 md_size = EVP_MD_size(md_type); 94 if (md_size < 0) 97 md_size, key, md_type)) { 102 if (!HMAC_Init_ex(&hmac, key, md_size, md_type, NULL)
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/pkcs12/ |
H A D | p12_mutl.c | 76 int md_size; local 93 md_size = EVP_MD_size(md_type); 94 if (md_size < 0) 97 md_size, key, md_type)) { 102 if (!HMAC_Init_ex(&hmac, key, md_size, md_type, NULL)
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | s3_enc.c | 588 unsigned int md_size; local 606 md_size=EVP_MD_size(hash); 607 npad=(48/md_size)*md_size; 613 EVP_DigestUpdate(&md_ctx,mac_sec,md_size); 625 EVP_DigestUpdate(&md_ctx,mac_sec,md_size); 627 EVP_DigestUpdate(&md_ctx,md,md_size); 628 EVP_DigestFinal_ex( &md_ctx,md,&md_size); 633 return(md_size);
|
H A D | t1_enc.c | 718 unsigned int md_size; local 738 md_size=EVP_MD_size(hash); 752 HMAC_Final(&hmac,md,&md_size); 757 {unsigned int z; for (z=0; z<md_size; z++) printf("%02X ",mac_sec[z]); printf("\n"); } 776 {unsigned int z; for (z=0; z<md_size; z++) printf("%02X ",md[z]); printf("\n"); } 778 return(md_size);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/src/openvpn/ |
H A D | crypto.c | 1361 const int md_size = md_kt_size (nonce_md); local 1365 const int blen = min_int (len, md_size); 1366 md_full(nonce_md, nonce_data, md_size + nonce_secret_len, nonce_data);
|