Home
last modified time | relevance | path

Searched refs:mac_len (Results 1 – 18 of 18) sorted by relevance

/external/boringssl/src/crypto/hmac_extra/
Dhmac_test.cc103 unsigned mac_len; in TEST() local
105 mac.get(), &mac_len)); in TEST()
106 EXPECT_EQ(Bytes(output), Bytes(mac.get(), mac_len)); in TEST()
113 ASSERT_TRUE(HMAC_Final(ctx.get(), mac.get(), &mac_len)); in TEST()
114 EXPECT_EQ(Bytes(output), Bytes(mac.get(), mac_len)); in TEST()
119 ASSERT_TRUE(HMAC_Final(ctx.get(), mac.get(), &mac_len)); in TEST()
120 EXPECT_EQ(Bytes(output), Bytes(mac.get(), mac_len)); in TEST()
127 ASSERT_TRUE(HMAC_Final(ctx.get(), mac.get(), &mac_len)); in TEST()
128 EXPECT_EQ(Bytes(output), Bytes(mac.get(), mac_len)); in TEST()
/external/openssh/
Dmac.c122 mac->key_len = mac->mac_len = ssh_hmac_bytes(macalg->alg); in mac_setup_by_alg()
124 mac->mac_len = macalg->len / 8; in mac_setup_by_alg()
129 mac->mac_len = macalg->truncatebits / 8; in mac_setup_by_alg()
185 if (mac->mac_len > sizeof(u)) in mac_compute()
212 if (dlen > mac->mac_len) in mac_compute()
213 dlen = mac->mac_len; in mac_compute()
227 if (mac->mac_len > mlen) in mac_check()
232 if (timingsafe_bcmp(ourmac, theirmac, mac->mac_len) != 0) in mac_check()
Dmac.h34 u_int mac_len; member
Dpacket.c1274 if ((r = sshbuf_put(state->output, macbuf, mac->mac_len)) != 0) in ssh_packet_send2_wrapped()
1740 maclen = mac && mac->enabled ? mac->mac_len : 0; in ssh_packet_read_poll2()
1861 if ((r = sshbuf_consume(state->input, mac->mac_len)) != 0) in ssh_packet_read_poll2()
/external/wpa_supplicant_8/src/crypto/
Dcrypto_linux.c60 u8 *mac, size_t mac_len) in linux_af_alg_hash_vector() argument
102 res = recv(t, mac, mac_len, 0); in linux_af_alg_hash_vector()
109 if ((size_t) res < mac_len) { in linux_af_alg_hash_vector()
112 __func__, (int) res, (int) mac_len); in linux_af_alg_hash_vector()
234 size_t mac_len; member
252 ctx->mac_len = MD5_MAC_LEN; in crypto_hash_init()
256 ctx->mac_len = SHA1_MAC_LEN; in crypto_hash_init()
260 ctx->mac_len = MD5_MAC_LEN; in crypto_hash_init()
264 ctx->mac_len = SHA1_MAC_LEN; in crypto_hash_init()
268 ctx->mac_len = SHA256_MAC_LEN; in crypto_hash_init()
[all …]
Dcrypto_openssl.c152 unsigned int mac_len; in openssl_digest_vector() local
175 if (!EVP_DigestFinal(ctx, mac, &mac_len)) { in openssl_digest_vector()
/external/boringssl/src/crypto/cipher_extra/
De_tls.c168 unsigned mac_len; in aead_tls_seal_scatter() local
173 !HMAC_Final(&tls_ctx->hmac_ctx, mac, &mac_len)) { in aead_tls_seal_scatter()
212 mac + tag_len, mac_len - tag_len)) { in aead_tls_seal_scatter()
223 unsigned padding_len = block_size - ((in_len + mac_len) % block_size); in aead_tls_seal_scatter()
340 size_t mac_len; in aead_tls_open() local
345 if (!EVP_tls_cbc_digest_record(tls_ctx->hmac_ctx.md, mac, &mac_len, in aead_tls_open()
351 assert(mac_len == HMAC_size(&tls_ctx->hmac_ctx)); in aead_tls_open()
354 EVP_tls_cbc_copy_mac(record_mac, mac_len, out, data_plus_mac_len, total); in aead_tls_open()
367 mac_len = mac_len_u; in aead_tls_open()
369 assert(mac_len == HMAC_size(&tls_ctx->hmac_ctx)); in aead_tls_open()
[all …]
/external/scapy/scapy/layers/tls/
Drecord_sslv2.py90 mac_len = self.tls_session.rcs.mac_len
91 if mac_len == 0: # should be TLS_NULL_WITH_NULL_NULL
93 if len(mac) != mac_len:
126 maclen = self.tls_session.rcs.mac_len
Drecord.py348 mac_len = self.tls_session.rcs.mac_len
349 if mac_len == 0: # should be TLS_NULL_WITH_NULL_NULL
351 if len(mac) != mac_len:
432 l = self.tls_session.rcs.mac_len
457 l = self.tls_session.rcs.mac_len
Dbasefields.py151 return pkt.tls_session.wcs.mac_len
167 l = pkt.tls_session.rcs.mac_len
Dsession.py101 self.mac_len = self.cipher.tag_len
104 self.mac_len = self.hmac.hmac_len
107 self.mac_len = self.hash.hash_len
189 self.mac_len = cipher_alg.tag_len
192 self.mac_len = self.hmac.hmac_len
Drecord_tls13.py71 tag_len = pkt.tls_session.rcs.mac_len
/external/wpa_supplicant_8/src/eap_common/
Deap_eke_common.c93 int mac_len; in eap_eke_pnonce_len() local
96 mac_len = SHA1_MAC_LEN; in eap_eke_pnonce_len()
98 mac_len = SHA256_MAC_LEN; in eap_eke_pnonce_len()
102 return AES_BLOCK_SIZE + 16 + mac_len; in eap_eke_pnonce_len()
108 int mac_len; in eap_eke_pnonce_ps_len() local
111 mac_len = SHA1_MAC_LEN; in eap_eke_pnonce_ps_len()
113 mac_len = SHA256_MAC_LEN; in eap_eke_pnonce_ps_len()
117 return AES_BLOCK_SIZE + 2 * 16 + mac_len; in eap_eke_pnonce_ps_len()
/external/iptables/include/linux/netfilter_ipv4/
Dipt_ULOG.h44 unsigned char mac_len; member
/external/boringssl/src/crypto/pkcs8/
Dpkcs8_x509.c1235 unsigned mac_len; in PKCS12_create() local
1242 CBB_len(&auth_safe_data), mac, &mac_len)) { in PKCS12_create()
1251 !CBB_add_bytes(&mac_cbb, mac, mac_len) || in PKCS12_create()
/external/boringssl/src/ssl/
Dt1_lib.cc3438 size_t mac_len = HMAC_size(hmac_ctx); in decrypt_ticket_with_cipher_ctx() local
3439 if (ticket.size() < SSL_TICKET_KEY_NAME_LEN + iv_len + 1 + mac_len) { in decrypt_ticket_with_cipher_ctx()
3444 auto ticket_mac = ticket.subspan(ticket.size() - mac_len); in decrypt_ticket_with_cipher_ctx()
3445 ticket = ticket.subspan(0, ticket.size() - mac_len); in decrypt_ticket_with_cipher_ctx()
3448 assert(mac_len == ticket_mac.size()); in decrypt_ticket_with_cipher_ctx()
3449 bool mac_ok = CRYPTO_memcmp(mac, ticket_mac.data(), mac_len) == 0; in decrypt_ticket_with_cipher_ctx()
/external/dnsmasq/src/
Drfc2131.c96 static void log_packet(char* type, void* addr, unsigned char* ext_mac, int mac_len, char* interface,
1228 static void log_packet(char* type, void* addr, unsigned char* ext_mac, int mac_len, char* interface, in log_packet() argument
1235 print_mac(daemon->namebuff, ext_mac, mac_len); in log_packet()
/external/scapy/scapy/layers/
Ddns.py707 StrLenField("mac_data", "", length_from=lambda pkt: pkt.mac_len),