/external/boringssl/src/crypto/hmac_extra/ |
D | hmac_test.cc | 104 unsigned mac_len; in TEST() local 106 mac.get(), &mac_len)); in TEST() 107 EXPECT_EQ(Bytes(output), Bytes(mac.get(), mac_len)); in TEST() 114 ASSERT_TRUE(HMAC_Final(ctx.get(), mac.get(), &mac_len)); in TEST() 115 EXPECT_EQ(Bytes(output), Bytes(mac.get(), mac_len)); in TEST() 120 ASSERT_TRUE(HMAC_Final(ctx.get(), mac.get(), &mac_len)); in TEST() 121 EXPECT_EQ(Bytes(output), Bytes(mac.get(), mac_len)); in TEST() 128 ASSERT_TRUE(HMAC_Final(ctx.get(), mac.get(), &mac_len)); in TEST() 129 EXPECT_EQ(Bytes(output), Bytes(mac.get(), mac_len)); in TEST()
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/hmac_extra/ |
D | hmac_test.cc | 104 unsigned mac_len; in TEST() local 106 mac.get(), &mac_len)); in TEST() 107 EXPECT_EQ(Bytes(output), Bytes(mac.get(), mac_len)); in TEST() 114 ASSERT_TRUE(HMAC_Final(ctx.get(), mac.get(), &mac_len)); in TEST() 115 EXPECT_EQ(Bytes(output), Bytes(mac.get(), mac_len)); in TEST() 120 ASSERT_TRUE(HMAC_Final(ctx.get(), mac.get(), &mac_len)); in TEST() 121 EXPECT_EQ(Bytes(output), Bytes(mac.get(), mac_len)); in TEST() 128 ASSERT_TRUE(HMAC_Final(ctx.get(), mac.get(), &mac_len)); in TEST() 129 EXPECT_EQ(Bytes(output), Bytes(mac.get(), mac_len)); in TEST()
|
/external/openssh/ |
D | mac.c | 112 mac->key_len = mac->mac_len = ssh_hmac_bytes(macalg->alg); in mac_setup_by_alg() 114 mac->mac_len = macalg->len / 8; in mac_setup_by_alg() 119 mac->mac_len = macalg->truncatebits / 8; in mac_setup_by_alg() 175 if (mac->mac_len > sizeof(u)) in mac_compute() 202 if (dlen > mac->mac_len) in mac_compute() 203 dlen = mac->mac_len; in mac_compute() 217 if (mac->mac_len > mlen) in mac_check() 222 if (timingsafe_bcmp(ourmac, theirmac, mac->mac_len) != 0) in mac_check()
|
D | mac.h | 34 u_int mac_len; member
|
D | packet.c | 1198 if ((r = sshbuf_put(state->output, macbuf, mac->mac_len)) != 0) in ssh_packet_send2_wrapped() 1512 maclen = mac && mac->enabled ? mac->mac_len : 0; in ssh_packet_read_poll2() 1633 if ((r = sshbuf_consume(state->input, mac->mac_len)) != 0) in ssh_packet_read_poll2()
|
/external/wpa_supplicant_8/src/crypto/ |
D | crypto_linux.c | 60 u8 *mac, size_t mac_len) in linux_af_alg_hash_vector() argument 102 res = recv(t, mac, mac_len, 0); in linux_af_alg_hash_vector() 109 if ((size_t) res < mac_len) { in linux_af_alg_hash_vector() 112 __func__, (int) res, (int) mac_len); in linux_af_alg_hash_vector() 234 size_t mac_len; member 252 ctx->mac_len = MD5_MAC_LEN; in crypto_hash_init() 256 ctx->mac_len = SHA1_MAC_LEN; in crypto_hash_init() 260 ctx->mac_len = MD5_MAC_LEN; in crypto_hash_init() 264 ctx->mac_len = SHA1_MAC_LEN; in crypto_hash_init() 268 ctx->mac_len = SHA256_MAC_LEN; in crypto_hash_init() [all …]
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/cipher_extra/ |
D | e_tls.c | 168 unsigned mac_len; in aead_tls_seal_scatter() local 173 !HMAC_Final(&tls_ctx->hmac_ctx, mac, &mac_len)) { in aead_tls_seal_scatter() 212 mac + tag_len, mac_len - tag_len)) { in aead_tls_seal_scatter() 223 unsigned padding_len = block_size - ((in_len + mac_len) % block_size); in aead_tls_seal_scatter() 340 size_t mac_len; in aead_tls_open() local 345 if (!EVP_tls_cbc_digest_record(tls_ctx->hmac_ctx.md, mac, &mac_len, in aead_tls_open() 351 assert(mac_len == HMAC_size(&tls_ctx->hmac_ctx)); in aead_tls_open() 354 EVP_tls_cbc_copy_mac(record_mac, mac_len, out, data_plus_mac_len, total); in aead_tls_open() 367 mac_len = mac_len_u; in aead_tls_open() 369 assert(mac_len == HMAC_size(&tls_ctx->hmac_ctx)); in aead_tls_open() [all …]
|
/external/boringssl/src/crypto/cipher_extra/ |
D | e_tls.c | 168 unsigned mac_len; in aead_tls_seal_scatter() local 173 !HMAC_Final(&tls_ctx->hmac_ctx, mac, &mac_len)) { in aead_tls_seal_scatter() 212 mac + tag_len, mac_len - tag_len)) { in aead_tls_seal_scatter() 223 unsigned padding_len = block_size - ((in_len + mac_len) % block_size); in aead_tls_seal_scatter() 340 size_t mac_len; in aead_tls_open() local 345 if (!EVP_tls_cbc_digest_record(tls_ctx->hmac_ctx.md, mac, &mac_len, in aead_tls_open() 351 assert(mac_len == HMAC_size(&tls_ctx->hmac_ctx)); in aead_tls_open() 354 EVP_tls_cbc_copy_mac(record_mac, mac_len, out, data_plus_mac_len, total); in aead_tls_open() 367 mac_len = mac_len_u; in aead_tls_open() 369 assert(mac_len == HMAC_size(&tls_ctx->hmac_ctx)); in aead_tls_open() [all …]
|
/external/scapy/scapy/layers/tls/ |
D | record_sslv2.py | 90 mac_len = self.tls_session.rcs.mac_len 91 if mac_len == 0: # should be TLS_NULL_WITH_NULL_NULL 93 if len(mac) != mac_len: 126 maclen = self.tls_session.rcs.mac_len
|
D | record.py | 348 mac_len = self.tls_session.rcs.mac_len 349 if mac_len == 0: # should be TLS_NULL_WITH_NULL_NULL 351 if len(mac) != mac_len: 432 l = self.tls_session.rcs.mac_len 457 l = self.tls_session.rcs.mac_len
|
D | basefields.py | 151 return pkt.tls_session.wcs.mac_len 167 l = pkt.tls_session.rcs.mac_len
|
D | session.py | 101 self.mac_len = self.cipher.tag_len 104 self.mac_len = self.hmac.hmac_len 107 self.mac_len = self.hash.hash_len 189 self.mac_len = cipher_alg.tag_len 192 self.mac_len = self.hmac.hmac_len
|
D | record_tls13.py | 71 tag_len = pkt.tls_session.rcs.mac_len
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_eke_common.c | 93 int mac_len; in eap_eke_pnonce_len() local 96 mac_len = SHA1_MAC_LEN; in eap_eke_pnonce_len() 98 mac_len = SHA256_MAC_LEN; in eap_eke_pnonce_len() 102 return AES_BLOCK_SIZE + 16 + mac_len; in eap_eke_pnonce_len() 108 int mac_len; in eap_eke_pnonce_ps_len() local 111 mac_len = SHA1_MAC_LEN; in eap_eke_pnonce_ps_len() 113 mac_len = SHA256_MAC_LEN; in eap_eke_pnonce_ps_len() 117 return AES_BLOCK_SIZE + 2 * 16 + mac_len; in eap_eke_pnonce_ps_len()
|
D | eap_teap_common.c | 319 u8 *mac, size_t mac_len) in eap_teap_tls_mac() argument 325 os_memset(mac, 0, mac_len); in eap_teap_tls_mac() 349 if (mac_len > sizeof(tmp)) in eap_teap_tls_mac() 350 mac_len = sizeof(tmp); in eap_teap_tls_mac() 351 os_memcpy(mac, tmp, mac_len); in eap_teap_tls_mac()
|
/external/iptables/include/linux/netfilter_ipv4/ |
D | ipt_ULOG.h | 44 unsigned char mac_len; member
|
/external/linux-kselftest/tools/testing/selftests/bpf/progs/ |
D | kfree_skb.c | 42 __u16 mac_len, hdr_len, queue_mapping; member
|
/external/boringssl/src/util/fipstools/acvp/modulewrapper/ |
D | modulewrapper.cc | 1543 uint32_t mac_len; in CMAC_AES() local 1544 if (args[0].size() != sizeof(mac_len)) { in CMAC_AES() 1547 memcpy(&mac_len, args[0].data(), sizeof(mac_len)); in CMAC_AES() 1548 if (mac_len > sizeof(mac)) { in CMAC_AES() 1552 return write_reply({Span<const uint8_t>(mac, mac_len)}); in CMAC_AES()
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/pkcs8/ |
D | pkcs8_x509.c | 1259 unsigned mac_len; in PKCS12_create() local 1266 CBB_len(&auth_safe_data), mac, &mac_len)) { in PKCS12_create() 1275 !CBB_add_bytes(&mac_cbb, mac, mac_len) || in PKCS12_create()
|
/external/nos/host/generic/nugget/proto/nugget/app/protoapi/ |
D | testing_api.proto | 328 uint32 mac_len = 3; field
|
/external/boringssl/src/crypto/pkcs8/ |
D | pkcs8_x509.c | 1290 unsigned mac_len; in PKCS12_create() local 1297 CBB_len(&auth_safe_data), mac, &mac_len)) { in PKCS12_create() 1306 !CBB_add_bytes(&mac_cbb, mac, mac_len) || in PKCS12_create()
|
/external/rust/crates/quiche/deps/boringssl/src/ssl/ |
D | t1_lib.cc | 3366 size_t mac_len = HMAC_size(hmac_ctx); in decrypt_ticket_with_cipher_ctx() local 3367 if (ticket.size() < SSL_TICKET_KEY_NAME_LEN + iv_len + 1 + mac_len) { in decrypt_ticket_with_cipher_ctx() 3372 auto ticket_mac = ticket.subspan(ticket.size() - mac_len); in decrypt_ticket_with_cipher_ctx() 3373 ticket = ticket.subspan(0, ticket.size() - mac_len); in decrypt_ticket_with_cipher_ctx() 3376 assert(mac_len == ticket_mac.size()); in decrypt_ticket_with_cipher_ctx() 3377 bool mac_ok = CRYPTO_memcmp(mac, ticket_mac.data(), mac_len) == 0; in decrypt_ticket_with_cipher_ctx()
|
/external/boringssl/src/ssl/ |
D | t1_lib.cc | 3894 size_t mac_len = HMAC_size(hmac_ctx); in decrypt_ticket_with_cipher_ctx() local 3895 if (ticket.size() < SSL_TICKET_KEY_NAME_LEN + iv_len + 1 + mac_len) { in decrypt_ticket_with_cipher_ctx() 3900 auto ticket_mac = ticket.subspan(ticket.size() - mac_len); in decrypt_ticket_with_cipher_ctx() 3901 ticket = ticket.subspan(0, ticket.size() - mac_len); in decrypt_ticket_with_cipher_ctx() 3904 assert(mac_len == ticket_mac.size()); in decrypt_ticket_with_cipher_ctx() 3905 bool mac_ok = CRYPTO_memcmp(mac, ticket_mac.data(), mac_len) == 0; in decrypt_ticket_with_cipher_ctx()
|
/external/dnsmasq/src/ |
D | rfc2131.c | 96 static void log_packet(char* type, void* addr, unsigned char* ext_mac, int mac_len, char* interface, 1228 static void log_packet(char* type, void* addr, unsigned char* ext_mac, int mac_len, char* interface, in log_packet() argument 1235 print_mac(daemon->namebuff, ext_mac, mac_len); in log_packet()
|
/external/scapy/scapy/layers/ |
D | dns.py | 707 StrLenField("mac_data", "", length_from=lambda pkt: pkt.mac_len),
|