Home
last modified time | relevance | path

Searched refs:mac_len (Results 1 – 25 of 28) sorted by relevance

12

/external/boringssl/src/crypto/hmac_extra/
Dhmac_test.cc104 unsigned mac_len; in TEST() local
106 mac.get(), &mac_len)); in TEST()
107 EXPECT_EQ(Bytes(output), Bytes(mac.get(), mac_len)); in TEST()
114 ASSERT_TRUE(HMAC_Final(ctx.get(), mac.get(), &mac_len)); in TEST()
115 EXPECT_EQ(Bytes(output), Bytes(mac.get(), mac_len)); in TEST()
120 ASSERT_TRUE(HMAC_Final(ctx.get(), mac.get(), &mac_len)); in TEST()
121 EXPECT_EQ(Bytes(output), Bytes(mac.get(), mac_len)); in TEST()
128 ASSERT_TRUE(HMAC_Final(ctx.get(), mac.get(), &mac_len)); in TEST()
129 EXPECT_EQ(Bytes(output), Bytes(mac.get(), mac_len)); in TEST()
/external/rust/crates/quiche/deps/boringssl/src/crypto/hmac_extra/
Dhmac_test.cc104 unsigned mac_len; in TEST() local
106 mac.get(), &mac_len)); in TEST()
107 EXPECT_EQ(Bytes(output), Bytes(mac.get(), mac_len)); in TEST()
114 ASSERT_TRUE(HMAC_Final(ctx.get(), mac.get(), &mac_len)); in TEST()
115 EXPECT_EQ(Bytes(output), Bytes(mac.get(), mac_len)); in TEST()
120 ASSERT_TRUE(HMAC_Final(ctx.get(), mac.get(), &mac_len)); in TEST()
121 EXPECT_EQ(Bytes(output), Bytes(mac.get(), mac_len)); in TEST()
128 ASSERT_TRUE(HMAC_Final(ctx.get(), mac.get(), &mac_len)); in TEST()
129 EXPECT_EQ(Bytes(output), Bytes(mac.get(), mac_len)); in TEST()
/external/openssh/
Dmac.c112 mac->key_len = mac->mac_len = ssh_hmac_bytes(macalg->alg); in mac_setup_by_alg()
114 mac->mac_len = macalg->len / 8; in mac_setup_by_alg()
119 mac->mac_len = macalg->truncatebits / 8; in mac_setup_by_alg()
175 if (mac->mac_len > sizeof(u)) in mac_compute()
202 if (dlen > mac->mac_len) in mac_compute()
203 dlen = mac->mac_len; in mac_compute()
217 if (mac->mac_len > mlen) in mac_check()
222 if (timingsafe_bcmp(ourmac, theirmac, mac->mac_len) != 0) in mac_check()
Dmac.h34 u_int mac_len; member
Dpacket.c1198 if ((r = sshbuf_put(state->output, macbuf, mac->mac_len)) != 0) in ssh_packet_send2_wrapped()
1512 maclen = mac && mac->enabled ? mac->mac_len : 0; in ssh_packet_read_poll2()
1633 if ((r = sshbuf_consume(state->input, mac->mac_len)) != 0) in ssh_packet_read_poll2()
/external/wpa_supplicant_8/src/crypto/
Dcrypto_linux.c60 u8 *mac, size_t mac_len) in linux_af_alg_hash_vector() argument
102 res = recv(t, mac, mac_len, 0); in linux_af_alg_hash_vector()
109 if ((size_t) res < mac_len) { in linux_af_alg_hash_vector()
112 __func__, (int) res, (int) mac_len); in linux_af_alg_hash_vector()
234 size_t mac_len; member
252 ctx->mac_len = MD5_MAC_LEN; in crypto_hash_init()
256 ctx->mac_len = SHA1_MAC_LEN; in crypto_hash_init()
260 ctx->mac_len = MD5_MAC_LEN; in crypto_hash_init()
264 ctx->mac_len = SHA1_MAC_LEN; in crypto_hash_init()
268 ctx->mac_len = SHA256_MAC_LEN; in crypto_hash_init()
[all …]
/external/rust/crates/quiche/deps/boringssl/src/crypto/cipher_extra/
De_tls.c168 unsigned mac_len; in aead_tls_seal_scatter() local
173 !HMAC_Final(&tls_ctx->hmac_ctx, mac, &mac_len)) { in aead_tls_seal_scatter()
212 mac + tag_len, mac_len - tag_len)) { in aead_tls_seal_scatter()
223 unsigned padding_len = block_size - ((in_len + mac_len) % block_size); in aead_tls_seal_scatter()
340 size_t mac_len; in aead_tls_open() local
345 if (!EVP_tls_cbc_digest_record(tls_ctx->hmac_ctx.md, mac, &mac_len, in aead_tls_open()
351 assert(mac_len == HMAC_size(&tls_ctx->hmac_ctx)); in aead_tls_open()
354 EVP_tls_cbc_copy_mac(record_mac, mac_len, out, data_plus_mac_len, total); in aead_tls_open()
367 mac_len = mac_len_u; in aead_tls_open()
369 assert(mac_len == HMAC_size(&tls_ctx->hmac_ctx)); in aead_tls_open()
[all …]
/external/boringssl/src/crypto/cipher_extra/
De_tls.c168 unsigned mac_len; in aead_tls_seal_scatter() local
173 !HMAC_Final(&tls_ctx->hmac_ctx, mac, &mac_len)) { in aead_tls_seal_scatter()
212 mac + tag_len, mac_len - tag_len)) { in aead_tls_seal_scatter()
223 unsigned padding_len = block_size - ((in_len + mac_len) % block_size); in aead_tls_seal_scatter()
340 size_t mac_len; in aead_tls_open() local
345 if (!EVP_tls_cbc_digest_record(tls_ctx->hmac_ctx.md, mac, &mac_len, in aead_tls_open()
351 assert(mac_len == HMAC_size(&tls_ctx->hmac_ctx)); in aead_tls_open()
354 EVP_tls_cbc_copy_mac(record_mac, mac_len, out, data_plus_mac_len, total); in aead_tls_open()
367 mac_len = mac_len_u; in aead_tls_open()
369 assert(mac_len == HMAC_size(&tls_ctx->hmac_ctx)); in aead_tls_open()
[all …]
/external/scapy/scapy/layers/tls/
Drecord_sslv2.py90 mac_len = self.tls_session.rcs.mac_len
91 if mac_len == 0: # should be TLS_NULL_WITH_NULL_NULL
93 if len(mac) != mac_len:
126 maclen = self.tls_session.rcs.mac_len
Drecord.py348 mac_len = self.tls_session.rcs.mac_len
349 if mac_len == 0: # should be TLS_NULL_WITH_NULL_NULL
351 if len(mac) != mac_len:
432 l = self.tls_session.rcs.mac_len
457 l = self.tls_session.rcs.mac_len
Dbasefields.py151 return pkt.tls_session.wcs.mac_len
167 l = pkt.tls_session.rcs.mac_len
Dsession.py101 self.mac_len = self.cipher.tag_len
104 self.mac_len = self.hmac.hmac_len
107 self.mac_len = self.hash.hash_len
189 self.mac_len = cipher_alg.tag_len
192 self.mac_len = self.hmac.hmac_len
Drecord_tls13.py71 tag_len = pkt.tls_session.rcs.mac_len
/external/wpa_supplicant_8/src/eap_common/
Deap_eke_common.c93 int mac_len; in eap_eke_pnonce_len() local
96 mac_len = SHA1_MAC_LEN; in eap_eke_pnonce_len()
98 mac_len = SHA256_MAC_LEN; in eap_eke_pnonce_len()
102 return AES_BLOCK_SIZE + 16 + mac_len; in eap_eke_pnonce_len()
108 int mac_len; in eap_eke_pnonce_ps_len() local
111 mac_len = SHA1_MAC_LEN; in eap_eke_pnonce_ps_len()
113 mac_len = SHA256_MAC_LEN; in eap_eke_pnonce_ps_len()
117 return AES_BLOCK_SIZE + 2 * 16 + mac_len; in eap_eke_pnonce_ps_len()
Deap_teap_common.c319 u8 *mac, size_t mac_len) in eap_teap_tls_mac() argument
325 os_memset(mac, 0, mac_len); in eap_teap_tls_mac()
349 if (mac_len > sizeof(tmp)) in eap_teap_tls_mac()
350 mac_len = sizeof(tmp); in eap_teap_tls_mac()
351 os_memcpy(mac, tmp, mac_len); in eap_teap_tls_mac()
/external/iptables/include/linux/netfilter_ipv4/
Dipt_ULOG.h44 unsigned char mac_len; member
/external/linux-kselftest/tools/testing/selftests/bpf/progs/
Dkfree_skb.c42 __u16 mac_len, hdr_len, queue_mapping; member
/external/boringssl/src/util/fipstools/acvp/modulewrapper/
Dmodulewrapper.cc1543 uint32_t mac_len; in CMAC_AES() local
1544 if (args[0].size() != sizeof(mac_len)) { in CMAC_AES()
1547 memcpy(&mac_len, args[0].data(), sizeof(mac_len)); in CMAC_AES()
1548 if (mac_len > sizeof(mac)) { in CMAC_AES()
1552 return write_reply({Span<const uint8_t>(mac, mac_len)}); in CMAC_AES()
/external/rust/crates/quiche/deps/boringssl/src/crypto/pkcs8/
Dpkcs8_x509.c1259 unsigned mac_len; in PKCS12_create() local
1266 CBB_len(&auth_safe_data), mac, &mac_len)) { in PKCS12_create()
1275 !CBB_add_bytes(&mac_cbb, mac, mac_len) || in PKCS12_create()
/external/nos/host/generic/nugget/proto/nugget/app/protoapi/
Dtesting_api.proto328 uint32 mac_len = 3; field
/external/boringssl/src/crypto/pkcs8/
Dpkcs8_x509.c1290 unsigned mac_len; in PKCS12_create() local
1297 CBB_len(&auth_safe_data), mac, &mac_len)) { in PKCS12_create()
1306 !CBB_add_bytes(&mac_cbb, mac, mac_len) || in PKCS12_create()
/external/rust/crates/quiche/deps/boringssl/src/ssl/
Dt1_lib.cc3366 size_t mac_len = HMAC_size(hmac_ctx); in decrypt_ticket_with_cipher_ctx() local
3367 if (ticket.size() < SSL_TICKET_KEY_NAME_LEN + iv_len + 1 + mac_len) { in decrypt_ticket_with_cipher_ctx()
3372 auto ticket_mac = ticket.subspan(ticket.size() - mac_len); in decrypt_ticket_with_cipher_ctx()
3373 ticket = ticket.subspan(0, ticket.size() - mac_len); in decrypt_ticket_with_cipher_ctx()
3376 assert(mac_len == ticket_mac.size()); in decrypt_ticket_with_cipher_ctx()
3377 bool mac_ok = CRYPTO_memcmp(mac, ticket_mac.data(), mac_len) == 0; in decrypt_ticket_with_cipher_ctx()
/external/boringssl/src/ssl/
Dt1_lib.cc3894 size_t mac_len = HMAC_size(hmac_ctx); in decrypt_ticket_with_cipher_ctx() local
3895 if (ticket.size() < SSL_TICKET_KEY_NAME_LEN + iv_len + 1 + mac_len) { in decrypt_ticket_with_cipher_ctx()
3900 auto ticket_mac = ticket.subspan(ticket.size() - mac_len); in decrypt_ticket_with_cipher_ctx()
3901 ticket = ticket.subspan(0, ticket.size() - mac_len); in decrypt_ticket_with_cipher_ctx()
3904 assert(mac_len == ticket_mac.size()); in decrypt_ticket_with_cipher_ctx()
3905 bool mac_ok = CRYPTO_memcmp(mac, ticket_mac.data(), mac_len) == 0; in decrypt_ticket_with_cipher_ctx()
/external/dnsmasq/src/
Drfc2131.c96 static void log_packet(char* type, void* addr, unsigned char* ext_mac, int mac_len, char* interface,
1228 static void log_packet(char* type, void* addr, unsigned char* ext_mac, int mac_len, char* interface, in log_packet() argument
1235 print_mac(daemon->namebuff, ext_mac, mac_len); in log_packet()
/external/scapy/scapy/layers/
Ddns.py707 StrLenField("mac_data", "", length_from=lambda pkt: pkt.mac_len),

12