/external/boringssl/src/crypto/hmac_extra/ |
H A D | hmac_test.cc | 103 unsigned mac_len; 105 mac.get(), &mac_len)); 106 EXPECT_EQ(Bytes(output), Bytes(mac.get(), mac_len)); 113 ASSERT_TRUE(HMAC_Final(ctx.get(), mac.get(), &mac_len)); 114 EXPECT_EQ(Bytes(output), Bytes(mac.get(), mac_len)); 119 ASSERT_TRUE(HMAC_Final(ctx.get(), mac.get(), &mac_len)); 120 EXPECT_EQ(Bytes(output), Bytes(mac.get(), mac_len)); 127 ASSERT_TRUE(HMAC_Final(ctx.get(), mac.get(), &mac_len)); 128 EXPECT_EQ(Bytes(output), Bytes(mac.get(), mac_len));
|
/external/iptables/include/linux/netfilter_ipv4/ |
H A D | ipt_ULOG.h | 44 unsigned char mac_len; member in struct:ulog_packet_msg
|
/external/boringssl/src/crypto/cipher_extra/ |
H A D | e_ssl3.c | 185 unsigned mac_len; local 186 if (!ssl3_mac(ssl3_ctx, mac, &mac_len, ad, ad_len, in, in_len)) { 219 mac + tag_len, mac_len - tag_len)) { 230 size_t padding_len = block_size - ((in_len + mac_len) % block_size); 263 size_t mac_len = EVP_MD_CTX_size(&ssl3_ctx->md_ctx); local 264 if (in_len < mac_len) { 311 if (total < padding_length + 1 + mac_len) { 320 data_len = total - padding_length - 1 - mac_len; 322 data_len = total - mac_len; 330 if (CRYPTO_memcmp(&out[data_len], mac, mac_len) ! [all...] |
H A D | e_tls.c | 166 unsigned mac_len; local 171 !HMAC_Final(&tls_ctx->hmac_ctx, mac, &mac_len)) { 210 mac + tag_len, mac_len - tag_len)) { 221 unsigned padding_len = block_size - ((in_len + mac_len) % block_size); 336 size_t mac_len; local 341 if (!EVP_tls_cbc_digest_record(tls_ctx->hmac_ctx.md, mac, &mac_len, 347 assert(mac_len == HMAC_size(&tls_ctx->hmac_ctx)); 350 EVP_tls_cbc_copy_mac(record_mac, mac_len, out, data_plus_mac_len, total); 363 mac_len = mac_len_u; 365 assert(mac_len [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | crypto_linux.c | 60 u8 *mac, size_t mac_len) 102 res = recv(t, mac, mac_len, 0); 109 if ((size_t) res < mac_len) { 112 __func__, (int) res, (int) mac_len); 234 size_t mac_len; member in struct:crypto_hash 252 ctx->mac_len = MD5_MAC_LEN; 256 ctx->mac_len = SHA1_MAC_LEN; 260 ctx->mac_len = MD5_MAC_LEN; 264 ctx->mac_len = SHA1_MAC_LEN; 268 ctx->mac_len 57 linux_af_alg_hash_vector(const char *alg, const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac, size_t mac_len) argument [all...] |
H A D | crypto_openssl.c | 121 unsigned int mac_len; local 144 if (!EVP_DigestFinal(ctx, mac, &mac_len)) {
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | crypto_linux.c | 60 u8 *mac, size_t mac_len) 102 res = recv(t, mac, mac_len, 0); 109 if ((size_t) res < mac_len) { 112 __func__, (int) res, (int) mac_len); 234 size_t mac_len; member in struct:crypto_hash 252 ctx->mac_len = MD5_MAC_LEN; 256 ctx->mac_len = SHA1_MAC_LEN; 260 ctx->mac_len = MD5_MAC_LEN; 264 ctx->mac_len = SHA1_MAC_LEN; 268 ctx->mac_len 57 linux_af_alg_hash_vector(const char *alg, const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac, size_t mac_len) argument [all...] |
H A D | crypto_openssl.c | 121 unsigned int mac_len; local 144 if (!EVP_DigestFinal(ctx, mac, &mac_len)) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | crypto_linux.c | 60 u8 *mac, size_t mac_len) 102 res = recv(t, mac, mac_len, 0); 109 if ((size_t) res < mac_len) { 112 __func__, (int) res, (int) mac_len); 234 size_t mac_len; member in struct:crypto_hash 252 ctx->mac_len = MD5_MAC_LEN; 256 ctx->mac_len = SHA1_MAC_LEN; 260 ctx->mac_len = MD5_MAC_LEN; 264 ctx->mac_len = SHA1_MAC_LEN; 268 ctx->mac_len 57 linux_af_alg_hash_vector(const char *alg, const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac, size_t mac_len) argument [all...] |
H A D | crypto_openssl.c | 121 unsigned int mac_len; local 144 if (!EVP_DigestFinal(ctx, mac, &mac_len)) {
|
/external/syslinux/gpxe/src/net/ |
H A D | tls.c | 1091 size_t mac_len = tls->tx_cipherspec.digest->digestsize; local 1097 *plaintext_len = ( len + mac_len ); 1108 memcpy ( mac, digest, mac_len ); 1128 size_t mac_len = tls->tx_cipherspec.digest->digestsize; local 1140 padding_len = ( ( blocksize - 1 ) & -( iv_len + len + mac_len + 1 ) ); 1141 *plaintext_len = ( iv_len + len + mac_len + padding_len + 1 ); 1150 padding = ( mac + mac_len ); 1155 memcpy ( mac, digest, mac_len ); 1179 size_t mac_len = cipherspec->digest->digestsize; local 1180 uint8_t mac[mac_len]; 1274 size_t mac_len; local 1315 size_t mac_len; local 1378 size_t mac_len = cipherspec->digest->digestsize; local [all...] |
/external/scapy/scapy/layers/tls/ |
H A D | record_sslv2.py | 90 mac_len = self.tls_session.rcs.mac_len 91 if mac_len == 0: # should be TLS_NULL_WITH_NULL_NULL 93 if len(mac) != mac_len: 126 maclen = self.tls_session.rcs.mac_len
|
H A D | record.py | 348 mac_len = self.tls_session.rcs.mac_len 349 if mac_len == 0: # should be TLS_NULL_WITH_NULL_NULL 351 if len(mac) != mac_len: 432 l = self.tls_session.rcs.mac_len 457 l = self.tls_session.rcs.mac_len
|
H A D | basefields.py | 151 return pkt.tls_session.wcs.mac_len 167 l = pkt.tls_session.rcs.mac_len
|
H A D | session.py | 101 self.mac_len = self.cipher.tag_len 104 self.mac_len = self.hmac.hmac_len 107 self.mac_len = self.hash.hash_len 189 self.mac_len = cipher_alg.tag_len 192 self.mac_len = self.hmac.hmac_len
|
H A D | record_tls13.py | 71 tag_len = pkt.tls_session.rcs.mac_len
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_eke_common.c | 93 int mac_len; local 96 mac_len = SHA1_MAC_LEN; 98 mac_len = SHA256_MAC_LEN; 102 return AES_BLOCK_SIZE + 16 + mac_len; 108 int mac_len; local 111 mac_len = SHA1_MAC_LEN; 113 mac_len = SHA256_MAC_LEN; 117 return AES_BLOCK_SIZE + 2 * 16 + mac_len;
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_eke_common.c | 93 int mac_len; local 96 mac_len = SHA1_MAC_LEN; 98 mac_len = SHA256_MAC_LEN; 102 return AES_BLOCK_SIZE + 16 + mac_len; 108 int mac_len; local 111 mac_len = SHA1_MAC_LEN; 113 mac_len = SHA256_MAC_LEN; 117 return AES_BLOCK_SIZE + 2 * 16 + mac_len;
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_eke_common.c | 93 int mac_len; local 96 mac_len = SHA1_MAC_LEN; 98 mac_len = SHA256_MAC_LEN; 102 return AES_BLOCK_SIZE + 16 + mac_len; 108 int mac_len; local 111 mac_len = SHA1_MAC_LEN; 113 mac_len = SHA256_MAC_LEN; 117 return AES_BLOCK_SIZE + 2 * 16 + mac_len;
|
/external/boringssl/src/ssl/ |
H A D | t1_lib.cc | 3242 size_t mac_len = HMAC_size(hmac_ctx); local 3243 if (ticket_len < SSL_TICKET_KEY_NAME_LEN + iv_len + 1 + mac_len) { 3247 HMAC_Update(hmac_ctx, ticket, ticket_len - mac_len); 3250 CRYPTO_memcmp(mac, ticket + (ticket_len - mac_len), mac_len) == 0; 3261 mac_len;
|
/external/dnsmasq/src/ |
H A D | rfc2131.c | 94 int mac_len, char *interface, char *string, u32 xid); 1387 int mac_len, char *interface, char *string, u32 xid) 1395 print_mac(daemon->namebuff, ext_mac, mac_len); 1386 log_packet(char *type, void *addr, unsigned char *ext_mac, int mac_len, char *interface, char *string, u32 xid) argument
|
/external/scapy/scapy/layers/ |
H A D | dns.py | 706 FieldLenField("mac_len", 20, fmt="!H", length_of="mac_data"), 707 StrLenField("mac_data", "", length_from=lambda pkt: pkt.mac_len),
|