/dports/www/firefox-legacy/firefox-52.8.0esr/netwerk/srtp/src/crypto/ae_xfm/ |
H A D | xfm.c | 52 #define MAC_KEY_LEN 16 macro 68 unsigned char mac_key[MAC_KEY_LEN]; in aes_128_cbc_hmac_sha1_96_func() 94 status = hmac_compute(&hmac_ctx, "MAC", 3, MAC_KEY_LEN, mac_key); in aes_128_cbc_hmac_sha1_96_func() 114 status = hmac_init(&hmac_ctx, mac_key, MAC_KEY_LEN); in aes_128_cbc_hmac_sha1_96_func() 142 unsigned char mac_key[MAC_KEY_LEN]; in aes_128_cbc_hmac_sha1_96_inv() 171 status = hmac_compute(&hmac_ctx, "MAC", 3, MAC_KEY_LEN, mac_key); in aes_128_cbc_hmac_sha1_96_inv() 190 status = hmac_init(&hmac_ctx, mac_key, MAC_KEY_LEN); in aes_128_cbc_hmac_sha1_96_inv() 227 unsigned char mac_key[MAC_KEY_LEN]; in aes_128_cbc_hmac_sha1_96_enc() 296 status = hmac_init(&hmac_ctx, mac_key, MAC_KEY_LEN); in aes_128_cbc_hmac_sha1_96_enc() 338 unsigned char mac_key[MAC_KEY_LEN]; in aes_128_cbc_hmac_sha1_96_dec() [all …]
|
/dports/editors/encryptpad/EncryptPad-0.5.0.1/deps/botan/src/lib/misc/cryptobox/ |
H A D | cryptobox.cpp | 33 const size_t MAC_KEY_LEN = 32; variable 38 const size_t PBKDF_OUTPUT_LEN = CIPHER_KEY_LEN + MAC_KEY_LEN + CIPHER_IV_LEN; 67 CIPHER_KEY_LEN + MAC_KEY_LEN + CIPHER_IV_LEN, in encrypt() 76 const uint8_t* iv = mk + CIPHER_KEY_LEN + MAC_KEY_LEN; in encrypt() 86 hmac->set_key(mac_key, MAC_KEY_LEN); in encrypt() 128 const uint8_t* iv = mk + CIPHER_KEY_LEN + MAC_KEY_LEN; in decrypt_bin() 133 hmac->set_key(mac_key, MAC_KEY_LEN); in decrypt_bin()
|
/dports/mail/thunderbird/thunderbird-91.8.0/comm/third_party/botan/src/lib/misc/cryptobox/ |
H A D | cryptobox.cpp | 33 const size_t MAC_KEY_LEN = 32; variable 38 const size_t PBKDF_OUTPUT_LEN = CIPHER_KEY_LEN + MAC_KEY_LEN + CIPHER_IV_LEN; 67 CIPHER_KEY_LEN + MAC_KEY_LEN + CIPHER_IV_LEN, in encrypt() 76 const uint8_t* iv = mk + CIPHER_KEY_LEN + MAC_KEY_LEN; in encrypt() 86 hmac->set_key(mac_key, MAC_KEY_LEN); in encrypt() 128 const uint8_t* iv = mk + CIPHER_KEY_LEN + MAC_KEY_LEN; in decrypt_bin() 133 hmac->set_key(mac_key, MAC_KEY_LEN); in decrypt_bin()
|
/dports/security/botan2/Botan-2.18.2/src/lib/misc/cryptobox/ |
H A D | cryptobox.cpp | 33 const size_t MAC_KEY_LEN = 32; variable 38 const size_t PBKDF_OUTPUT_LEN = CIPHER_KEY_LEN + MAC_KEY_LEN + CIPHER_IV_LEN; 67 CIPHER_KEY_LEN + MAC_KEY_LEN + CIPHER_IV_LEN, in encrypt() 76 const uint8_t* iv = mk + CIPHER_KEY_LEN + MAC_KEY_LEN; in encrypt() 86 hmac->set_key(mac_key, MAC_KEY_LEN); in encrypt() 128 const uint8_t* iv = mk + CIPHER_KEY_LEN + MAC_KEY_LEN; in decrypt_bin() 133 hmac->set_key(mac_key, MAC_KEY_LEN); in decrypt_bin()
|
/dports/security/botan110/Botan-1.10.17/src/constructs/cryptobox/ |
H A D | cryptobox.cpp | 34 const size_t MAC_KEY_LEN = 32; variable 39 const size_t PBKDF_OUTPUT_LEN = CIPHER_KEY_LEN + CIPHER_IV_LEN + MAC_KEY_LEN; 62 SymmetricKey mac_key(&mk[CIPHER_KEY_LEN], MAC_KEY_LEN); in encrypt() 63 InitializationVector iv(&mk[CIPHER_KEY_LEN + MAC_KEY_LEN], CIPHER_IV_LEN); in encrypt() 128 SymmetricKey mac_key(&mk[CIPHER_KEY_LEN], MAC_KEY_LEN); in decrypt() 129 InitializationVector iv(&mk[CIPHER_KEY_LEN + MAC_KEY_LEN], CIPHER_IV_LEN); in decrypt()
|
/dports/security/nmap/nmap-7.91/nping/ |
H A D | NEPContext.cc | 89 memset(this->nep_key_mac_c2s, 0, MAC_KEY_LEN); in reset() 90 memset(this->nep_key_mac_s2c, 0, MAC_KEY_LEN); in reset() 307 memcpy(this->nep_key_mac_c2s, key, MAC_KEY_LEN); in setMacKeyC2S() 316 *final_len=MAC_KEY_LEN; in getMacKeyC2S() 342 memcpy(this->nep_key_mac_s2c, key, MAC_KEY_LEN); in setMacKeyS2C() 351 *final_len=MAC_KEY_LEN; in getMacKeyS2C() 396 *final_len=MAC_KEY_LEN; in getCipherKeyC2S()
|
H A D | EchoClient.cc | 235 nping_print(DBG_4,"Session Key MAC_C2S:"); print_hexdump(DBG_4,ctx.getMacKeyC2S(), MAC_KEY_LEN); in nep_handshake() 236 nping_print(DBG_4,"Session Key MAC_S2C:"); print_hexdump(DBG_4,ctx.getMacKeyS2C(), MAC_KEY_LEN); in nep_handshake() 237 …ng_print(DBG_4,"Session Key CIPHER_C2S:"); print_hexdump(DBG_4,ctx.getCipherKeyC2S(), MAC_KEY_LEN); in nep_handshake() 238 …ng_print(DBG_4,"Session Key CIPHER_S2C:"); print_hexdump(DBG_4,ctx.getCipherKeyS2C(), MAC_KEY_LEN); in nep_handshake() 393 if( h.verifyMessageAuthenticationCode(this->ctx.getMacKeyS2C(), MAC_KEY_LEN )!=OP_SUCCESS ){ in parse_hs_server() 466 if( h.verifyMessageAuthenticationCode(this->ctx.getMacKeyS2C(), MAC_KEY_LEN )!=OP_SUCCESS ){ in parse_hs_final() 533 if( h.verifyMessageAuthenticationCode(this->ctx.getMacKeyS2C(), MAC_KEY_LEN )!=OP_SUCCESS ){ in parse_ready() 604 if( h.verifyMessageAuthenticationCode(this->ctx.getMacKeyS2C(), MAC_KEY_LEN )!=OP_SUCCESS ){ in parse_echo() 647 h->setMessageAuthenticationCode( this->ctx.getMacKeyC2S(), MAC_KEY_LEN); in generate_hs_client() 768 h->setMessageAuthenticationCode(this->ctx.getMacKeyC2S(), MAC_KEY_LEN); in generate_packet_spec()
|
H A D | NEPContext.h | 130 u8 nep_key_mac_c2s[MAC_KEY_LEN]; 131 u8 nep_key_mac_s2c[MAC_KEY_LEN];
|
H A D | EchoServer.cc | 1102 nping_print(DBG_3,"Session Key MAC_C2S:"); print_hexdump(DBG_3,ctx->getMacKeyC2S(), MAC_KEY_LEN); in parse_hs_client() 1103 nping_print(DBG_3,"Session Key MAC_S2C:"); print_hexdump(DBG_3,ctx->getMacKeyS2C(), MAC_KEY_LEN); in parse_hs_client() 1104 …g_print(DBG_3,"Session Key CIPHER_C2S:"); print_hexdump(DBG_3,ctx->getCipherKeyC2S(), MAC_KEY_LEN); in parse_hs_client() 1105 …g_print(DBG_3,"Session Key CIPHER_S2C:"); print_hexdump(DBG_3,ctx->getCipherKeyS2C(), MAC_KEY_LEN); in parse_hs_client() 1116 if( h.verifyMessageAuthenticationCode( ctx->getMacKeyC2S(), MAC_KEY_LEN)!=OP_SUCCESS ){ in parse_hs_client() 1188 if( h.verifyMessageAuthenticationCode( ctx->getMacKeyC2S(), MAC_KEY_LEN)!=OP_SUCCESS ){ in parse_packet_spec() 1248 h->setMessageAuthenticationCode( ctx->getMacKeyS2C(), MAC_KEY_LEN); in generate_hs_server() 1276 h->setMessageAuthenticationCode( ctx->getMacKeyS2C(), MAC_KEY_LEN); in generate_hs_final() 1301 h->setMessageAuthenticationCode(ctx->getMacKeyS2C(), MAC_KEY_LEN); in generate_ready() 1357 h->setMessageAuthenticationCode(ctx->getMacKeyS2C(), MAC_KEY_LEN); in generate_echo() [all …]
|
H A D | nping.h | 264 #define MAC_KEY_LEN (128/8) macro
|
/dports/security/arti/arti-9d0ede26801cdb182daa85c3eb5f0058dc178eb6/crates/tor-proto/src/crypto/handshake/ |
H A D | ntor_v3.rs | 34 const MAC_KEY_LEN: usize = 32; const 51 type MacKey = [u8; MAC_KEY_LEN]; 193 let mut mac_key = Zeroizing::new([0; MAC_KEY_LEN]); in kdf_msgkdf()
|