| /src/external/bsd/ntp/dist/sntp/ |
| networking.c | 112 int mac_size; local 193 mac_size = exten_len << 2; 194 if (!auth_md5(rpkt, pkt_len - mac_size, 195 mac_size - 4, pkt_key)) {
|
| main.c | 1135 int mac_size; local 1150 mac_size = make_mac(x_pkt, pkt_len, pkt_key, 1152 if (mac_size > 0) 1153 pkt_len += mac_size + KEY_MAC_LEN; 1156 printf("generate_pkt: mac_size is %d\n", mac_size);
|
| /src/crypto/external/apache2/openssl/dist/ssl/record/methods/ |
| dtls_meth.c | 114 size_t mac_size = 0; local 158 mac_size = (size_t)imac_size; 165 if (rr->orig_len < mac_size) { 169 rr->length -= mac_size; 172 if (i == 0 || CRYPTO_memcmp(md, mac, (size_t)mac_size) != 0) { 181 mac_size = 0; 190 enc_err = rl->funcs->cipher(rl, rr, 1, 0, &macbuf, mac_size); 221 /* rl->md_ctx != NULL => mac_size != -1 */ 225 || CRYPTO_memcmp(md, macbuf.mac, mac_size) != 0) 227 if (rr->length > SSL3_RT_MAX_COMPRESSED_LENGTH + mac_size) [all...] |
| tls_common.c | 553 size_t mac_size = 0; local 779 mac_size = (size_t)imac_size; 793 if (thisrr->length < mac_size) { 797 thisrr->length -= mac_size; 800 if (i == 0 || CRYPTO_memcmp(md, mac, mac_size) != 0) { 810 mac_size = 0; 813 if (mac_size > 0) { 822 enc_err = rl->funcs->cipher(rl, rr, num_recs, 0, macbufs, mac_size); 892 || CRYPTO_memcmp(md, thismb->mac, (size_t)mac_size) != 0) 894 if (thisrr->length > SSL3_RT_MAX_COMPRESSED_LENGTH + mac_size) 1762 int mac_size = 0, ret = 0; local [all...] |
| /src/crypto/external/bsd/openssl/dist/ssl/record/ |
| rec_layer_d1.c | 796 int i, mac_size, clear = 0; local 838 mac_size = 0; 840 mac_size = EVP_MD_CTX_get_size(s->write_hash); 841 if (mac_size < 0) { 921 if (!SSL_WRITE_ETM(s) && mac_size != 0) { 928 SSL3_RECORD_add_length(&wr, mac_size); 938 if (s->method->ssl3_enc->enc(s, &wr, 1, 1, NULL, mac_size) < 1) { 945 if (SSL_WRITE_ETM(s) && mac_size != 0) { 951 SSL3_RECORD_add_length(&wr, mac_size);
|
| rec_layer_s3.c | 689 int i, mac_size, clear = 0; local 735 mac_size = 0; 737 mac_size = EVP_MD_CTX_get_size(s->write_hash); 738 if (mac_size < 0) { 1008 if (!BIO_get_ktls_send(s->wbio) && !SSL_WRITE_ETM(s) && mac_size != 0) { 1011 if (!WPACKET_allocate_bytes(thispkt, mac_size, &mac) 1027 - mac_size, NULL) 1050 if (tls13_enc(s, wr, numpipes, 1, NULL, mac_size) < 1) { 1059 mac_size) < 1) { 1081 - mac_size >= thiswr->length [all...] |
| ssl3_record.c | 184 size_t mac_size = 0; local 537 mac_size = (size_t)imac_size; 551 if (thisrr->length < mac_size) { 555 thisrr->length -= mac_size; 558 if (i == 0 || CRYPTO_memcmp(md, mac, mac_size) != 0) { 568 mac_size = 0; 571 if (mac_size > 0) { 580 enc_err = s->method->ssl3_enc->enc(s, rr, num_recs, 0, macbufs, mac_size); 637 /* s->read_hash != NULL => mac_size != -1 */ 645 || CRYPTO_memcmp(md, thismb->mac, (size_t)mac_size) != 0 1519 size_t mac_size = 0; local [all...] |
| /src/crypto/external/bsd/openssl.old/dist/ssl/record/ |
| rec_layer_d1.c | 804 int i, mac_size, clear = 0; local 847 mac_size = 0; 849 mac_size = EVP_MD_CTX_size(s->write_hash); 850 if (mac_size < 0) { 927 if (!SSL_WRITE_ETM(s) && mac_size != 0) { 935 SSL3_RECORD_add_length(&wr, mac_size); 953 if (SSL_WRITE_ETM(s) && mac_size != 0) { 960 SSL3_RECORD_add_length(&wr, mac_size);
|
| rec_layer_s3.c | 674 int i, mac_size, clear = 0; local 719 mac_size = 0; 722 mac_size = EVP_MD_CTX_size(s->write_hash); 723 if (mac_size < 0) { 975 if (!SSL_WRITE_ETM(s) && mac_size != 0) { 978 if (!WPACKET_allocate_bytes(thispkt, mac_size, &mac) 994 - mac_size, 1046 - mac_size >= thiswr->length) 1056 if (SSL_WRITE_ETM(s) && mac_size != 0) { 1059 if (!WPACKET_allocate_bytes(thispkt, mac_size, &mac [all...] |
| ssl3_record.c | 184 size_t mac_size; local 507 mac_size = (size_t)imac_size; 511 if (thisrr->length < mac_size) { 516 thisrr->length -= mac_size; 519 if (i == 0 || CRYPTO_memcmp(md, mac, mac_size) != 0) { 580 /* s->read_hash != NULL => mac_size != -1 */ 584 mac_size = EVP_MD_CTX_size(s->read_hash); 585 if (!ossl_assert(mac_size <= EVP_MAX_MD_SIZE)) { 599 if (thisrr->orig_len < mac_size || 602 thisrr->orig_len < mac_size + 1)) 851 size_t bs, mac_size = 0; local 943 size_t bs, mac_size = 0, ctr, padnum, loop; local 1619 size_t mac_size; local [all...] |
| /src/external/bsd/nsd/dist/ |
| tsig.h | 125 uint16_t mac_size; member in struct:tsig_record
|
| tsig.c | 448 tsig->mac_size = 0; 472 uint16_t mac_size = htons(tsig->prior_mac_size); local 474 &mac_size, 475 sizeof(mac_size)); 519 tsig->mac_size = tsig->prior_mac_size; 532 if (tsig->mac_size != tsig->prior_mac_size 535 tsig->mac_size) != 0) 637 tsig->mac_size = buffer_read_u16(packet); 638 if (!buffer_available(packet, tsig->mac_size)) { 640 tsig->mac_size = 0 [all...] |
| /src/crypto/external/bsd/openssl/dist/ssl/statem/ |
| statem_dtls.c | 114 size_t len, frag_off, mac_size, blocksize, used_len; local 133 mac_size = 0; 135 mac_size = EVP_MD_CTX_get_size(s->write_hash); 137 mac_size = 0; 185 + mac_size + blocksize; 200 used_len = DTLS1_RT_HEADER_LENGTH + mac_size + blocksize;
|
| /src/crypto/external/bsd/openssl.old/dist/ssl/statem/ |
| statem_dtls.c | 118 size_t len, frag_off, mac_size, blocksize, used_len; local 137 mac_size = 0; 139 mac_size = EVP_MD_CTX_size(s->write_hash); 141 mac_size = 0; 189 + mac_size + blocksize; 204 used_len = DTLS1_RT_HEADER_LENGTH + mac_size + blocksize;
|
| /src/crypto/external/bsd/openssl/dist/test/ |
| evp_kdf_test.c | 1459 size_t mac_size = 20; local 1488 *p++ = OSSL_PARAM_construct_size_t(OSSL_KDF_PARAM_MAC_SIZE, &mac_size);
|
| /src/crypto/external/apache2/openssl/dist/test/ |
| evp_kdf_test.c | 1959 size_t mac_size = 20; local 1988 *p++ = OSSL_PARAM_construct_size_t(OSSL_KDF_PARAM_MAC_SIZE, &mac_size);
|