/third_party/openssl/crypto/modes/ |
D | wrap128.c | 183 size_t CRYPTO_128_wrap_pad(void *key, const unsigned char *icv, in CRYPTO_128_wrap_pad() argument 206 if (!icv) in CRYPTO_128_wrap_pad() 209 memcpy(aiv, icv, 4); /* Standard doesn't mention this. */ in CRYPTO_128_wrap_pad() 251 size_t CRYPTO_128_unwrap_pad(void *key, const unsigned char *icv, in CRYPTO_128_unwrap_pad() argument 299 if ((!icv && CRYPTO_memcmp(aiv, default_aiv, 4)) in CRYPTO_128_unwrap_pad() 300 || (icv && CRYPTO_memcmp(aiv, icv, 4))) { in CRYPTO_128_unwrap_pad()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
D | eap_ikev2_common.c | 74 u8 icv[IKEV2_MAX_HASH_LEN]; in eap_ikev2_validate_icv() local 98 wpabuf_len(msg) - icv_len, icv) < 0) { in eap_ikev2_validate_icv() 103 if (os_memcmp_const(icv, end - icv_len, icv_len) != 0) { in eap_ikev2_validate_icv() 106 icv, icv_len); in eap_ikev2_validate_icv()
|
D | eap_eke_common.c | 642 u8 icv[EAP_EKE_MAX_HASH_LEN]; in eap_eke_decrypt_prot() local 661 prot_len - block_size - icv_len, icv) < 0) in eap_eke_decrypt_prot() 663 if (os_memcmp_const(icv, prot + prot_len - icv_len, icv_len) != 0) { in eap_eke_decrypt_prot()
|
D | ikev2_common.c | 537 u8 *icv, *iv; in ikev2_build_encrypted() local 594 icv = wpabuf_put(msg, integ_alg->hash_len); in ikev2_build_encrypted() 602 wpabuf_len(msg) - integ_alg->hash_len, icv); in ikev2_build_encrypted()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
D | eap_ikev2_common.c | 74 u8 icv[IKEV2_MAX_HASH_LEN]; in eap_ikev2_validate_icv() local 98 wpabuf_len(msg) - icv_len, icv) < 0) { in eap_ikev2_validate_icv() 103 if (os_memcmp_const(icv, end - icv_len, icv_len) != 0) { in eap_ikev2_validate_icv() 106 icv, icv_len); in eap_ikev2_validate_icv()
|
D | eap_eke_common.c | 642 u8 icv[EAP_EKE_MAX_HASH_LEN]; in eap_eke_decrypt_prot() local 661 prot_len - block_size - icv_len, icv) < 0) in eap_eke_decrypt_prot() 663 if (os_memcmp_const(icv, prot + prot_len - icv_len, icv_len) != 0) { in eap_eke_decrypt_prot()
|
D | ikev2_common.c | 537 u8 *icv, *iv; in ikev2_build_encrypted() local 594 icv = wpabuf_put(msg, integ_alg->hash_len); in ikev2_build_encrypted() 602 wpabuf_len(msg) - integ_alg->hash_len, icv); in ikev2_build_encrypted()
|
/third_party/openssl/crypto/evp/ |
D | e_des3.c | 319 unsigned char icv[8], iv[8], sha1tmp[SHA_DIGEST_LENGTH]; in des_ede3_unwrap() local 327 des_ede_cbc_cipher(ctx, icv, in, 8); in des_ede3_unwrap() 341 BUF_reverse(icv, NULL, 8); in des_ede3_unwrap() 346 des_ede_cbc_cipher(ctx, icv, icv, 8); in des_ede3_unwrap() 350 if (!CRYPTO_memcmp(sha1tmp, icv, 8)) in des_ede3_unwrap() 352 OPENSSL_cleanse(icv, 8); in des_ede3_unwrap()
|
D | e_aes.c | 1127 } icv; member 2018 ctx->aes.ccm.kmac_param.icv.g[0] = 0; in s390x_aes_ccm_aad() 2019 ctx->aes.ccm.kmac_param.icv.g[1] = 0; in s390x_aes_ccm_aad() 2033 ctx->aes.ccm.kmac_param.icv.b[i] ^= aad[i]; in s390x_aes_ccm_aad() 2035 s390x_km(ctx->aes.ccm.kmac_param.icv.b, 16, in s390x_aes_ccm_aad() 2036 ctx->aes.ccm.kmac_param.icv.b, ctx->aes.ccm.fc, in s390x_aes_ccm_aad() 2055 s390x_km(ctx->aes.ccm.nonce.b, 16, ctx->aes.ccm.kmac_param.icv.b, in s390x_aes_ccm() 2095 ctx->aes.ccm.kmac_param.icv.b[i] ^= in[len + i]; in s390x_aes_ccm() 2097 s390x_km(ctx->aes.ccm.kmac_param.icv.b, 16, in s390x_aes_ccm() 2098 ctx->aes.ccm.kmac_param.icv.b, ctx->aes.ccm.fc, in s390x_aes_ccm() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/pae/ |
D | ieee802_1x_key.c | 180 size_t msg_bytes, u8 *icv) in ieee802_1x_icv_aes_cmac() argument 185 res = omac1_aes_128(ick, msg, msg_bytes, icv); in ieee802_1x_icv_aes_cmac() 187 res = omac1_aes_256(ick, msg, msg_bytes, icv); in ieee802_1x_icv_aes_cmac()
|
D | ieee802_1x_key.h | 22 size_t msg_bytes, u8 *icv);
|
D | ieee802_1x_kay_i.h | 80 const u8 *msg, size_t msg_len, u8 *icv); 422 u8 icv[0]; member
|
D | ieee802_1x_kay.c | 1896 return body->icv; in ieee802_1x_mka_decode_icv_body() 3038 u8 icv[MAX_ICV_LEN]; in ieee802_1x_kay_mkpdu_sanity_check() local 3133 buf, len - mka_alg_tbl[kay->mka_algindex].icv_len, icv)) { in ieee802_1x_kay_mkpdu_sanity_check() 3147 if (os_memcmp_const(msg_icv, icv, in ieee802_1x_kay_mkpdu_sanity_check() 3152 icv, mka_alg_tbl[kay->mka_algindex].icv_len); in ieee802_1x_kay_mkpdu_sanity_check()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/pae/ |
D | ieee802_1x_key.c | 180 size_t msg_bytes, u8 *icv) in ieee802_1x_icv_aes_cmac() argument 185 res = omac1_aes_128(ick, msg, msg_bytes, icv); in ieee802_1x_icv_aes_cmac() 187 res = omac1_aes_256(ick, msg, msg_bytes, icv); in ieee802_1x_icv_aes_cmac()
|
D | ieee802_1x_key.h | 22 size_t msg_bytes, u8 *icv);
|
D | ieee802_1x_kay_i.h | 80 const u8 *msg, size_t msg_len, u8 *icv); 422 u8 icv[0]; member
|
D | ieee802_1x_kay.c | 1933 return body->icv; in ieee802_1x_mka_decode_icv_body() 3075 u8 icv[MAX_ICV_LEN]; in ieee802_1x_kay_mkpdu_validity_check() local 3170 buf, len - mka_alg_tbl[kay->mka_algindex].icv_len, icv)) { in ieee802_1x_kay_mkpdu_validity_check() 3184 if (os_memcmp_const(msg_icv, icv, in ieee802_1x_kay_mkpdu_validity_check() 3189 icv, mka_alg_tbl[kay->mka_algindex].icv_len); in ieee802_1x_kay_mkpdu_validity_check()
|
/third_party/boost/tools/boost_install/test/iostreams/bzip2-1.0.6/ |
D | compress.c | 361 register UInt16 icv; in sendMTFValues() local 365 icv = mtfv[gs+(nn)]; \ in sendMTFValues() 366 cost01 += s->len_pack[icv][0]; \ in sendMTFValues() 367 cost23 += s->len_pack[icv][1]; \ in sendMTFValues() 368 cost45 += s->len_pack[icv][2]; \ in sendMTFValues() 390 UInt16 icv = mtfv[i]; in sendMTFValues() local 391 for (t = 0; t < nGroups; t++) cost[t] += s->len[t][icv]; in sendMTFValues()
|
/third_party/bzip2/ |
D | compress.c | 361 register UInt16 icv; in sendMTFValues() local 365 icv = mtfv[gs+(nn)]; \ in sendMTFValues() 366 cost01 += s->len_pack[icv][0]; \ in sendMTFValues() 367 cost23 += s->len_pack[icv][1]; \ in sendMTFValues() 368 cost45 += s->len_pack[icv][2]; \ in sendMTFValues() 390 UInt16 icv = mtfv[i]; in sendMTFValues() local 391 for (t = 0; t < nGroups; t++) cost[t] += s->len[t][icv]; in sendMTFValues()
|
/third_party/boost/tools/boost_install/test/iostreams/bzip2-1.0.8/ |
D | compress.c | 361 register UInt16 icv; in sendMTFValues() local 365 icv = mtfv[gs+(nn)]; \ in sendMTFValues() 366 cost01 += s->len_pack[icv][0]; \ in sendMTFValues() 367 cost23 += s->len_pack[icv][1]; \ in sendMTFValues() 368 cost45 += s->len_pack[icv][2]; \ in sendMTFValues() 390 UInt16 icv = mtfv[i]; in sendMTFValues() local 391 for (t = 0; t < nGroups; t++) cost[t] += s->len[t][icv]; in sendMTFValues()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
D | eap_pax.c | 340 const u8 *icv, *pos; in eap_pax_process() local 417 icv = pos + len - EAP_PAX_ICV_LEN; in eap_pax_process() 418 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", icv, EAP_PAX_ICV_LEN); in eap_pax_process() 428 if (os_memcmp_const(icv, icvbuf, EAP_PAX_ICV_LEN) != 0) { in eap_pax_process()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
D | eap_pax.c | 340 const u8 *icv, *pos; in eap_pax_process() local 417 icv = pos + len - EAP_PAX_ICV_LEN; in eap_pax_process() 418 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", icv, EAP_PAX_ICV_LEN); in eap_pax_process() 428 if (os_memcmp_const(icv, icvbuf, EAP_PAX_ICV_LEN) != 0) { in eap_pax_process()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
D | eap_server_pax.c | 205 u8 icvbuf[EAP_PAX_ICV_LEN], *icv; in eap_pax_check() local 280 icv = wpabuf_mhead_u8(respData) + mlen - EAP_PAX_ICV_LEN; in eap_pax_check() 281 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", icv, EAP_PAX_ICV_LEN); in eap_pax_check() 291 if (os_memcmp_const(icvbuf, icv, EAP_PAX_ICV_LEN) != 0) { in eap_pax_check()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
D | eap_server_pax.c | 205 u8 icvbuf[EAP_PAX_ICV_LEN], *icv; in eap_pax_check() local 280 icv = wpabuf_mhead_u8(respData) + mlen - EAP_PAX_ICV_LEN; in eap_pax_check() 281 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", icv, EAP_PAX_ICV_LEN); in eap_pax_check() 291 if (os_memcmp_const(icvbuf, icv, EAP_PAX_ICV_LEN) != 0) { in eap_pax_check()
|
/third_party/openssl/include/openssl/ |
D | modes.h | 165 size_t CRYPTO_128_wrap_pad(void *key, const unsigned char *icv, 168 size_t CRYPTO_128_unwrap_pad(void *key, const unsigned char *icv,
|