Home
last modified time | relevance | path

Searched refs:MAC_KEY_LEN (Results 1 – 11 of 11) sorted by relevance

/dports/www/firefox-legacy/firefox-52.8.0esr/netwerk/srtp/src/crypto/ae_xfm/
H A Dxfm.c52 #define MAC_KEY_LEN 16 macro
68 unsigned char mac_key[MAC_KEY_LEN]; in aes_128_cbc_hmac_sha1_96_func()
94 status = hmac_compute(&hmac_ctx, "MAC", 3, MAC_KEY_LEN, mac_key); in aes_128_cbc_hmac_sha1_96_func()
114 status = hmac_init(&hmac_ctx, mac_key, MAC_KEY_LEN); in aes_128_cbc_hmac_sha1_96_func()
142 unsigned char mac_key[MAC_KEY_LEN]; in aes_128_cbc_hmac_sha1_96_inv()
171 status = hmac_compute(&hmac_ctx, "MAC", 3, MAC_KEY_LEN, mac_key); in aes_128_cbc_hmac_sha1_96_inv()
190 status = hmac_init(&hmac_ctx, mac_key, MAC_KEY_LEN); in aes_128_cbc_hmac_sha1_96_inv()
227 unsigned char mac_key[MAC_KEY_LEN]; in aes_128_cbc_hmac_sha1_96_enc()
296 status = hmac_init(&hmac_ctx, mac_key, MAC_KEY_LEN); in aes_128_cbc_hmac_sha1_96_enc()
338 unsigned char mac_key[MAC_KEY_LEN]; in aes_128_cbc_hmac_sha1_96_dec()
[all …]
/dports/editors/encryptpad/EncryptPad-0.5.0.1/deps/botan/src/lib/misc/cryptobox/
H A Dcryptobox.cpp33 const size_t MAC_KEY_LEN = 32; variable
38 const size_t PBKDF_OUTPUT_LEN = CIPHER_KEY_LEN + MAC_KEY_LEN + CIPHER_IV_LEN;
67 CIPHER_KEY_LEN + MAC_KEY_LEN + CIPHER_IV_LEN, in encrypt()
76 const uint8_t* iv = mk + CIPHER_KEY_LEN + MAC_KEY_LEN; in encrypt()
86 hmac->set_key(mac_key, MAC_KEY_LEN); in encrypt()
128 const uint8_t* iv = mk + CIPHER_KEY_LEN + MAC_KEY_LEN; in decrypt_bin()
133 hmac->set_key(mac_key, MAC_KEY_LEN); in decrypt_bin()
/dports/mail/thunderbird/thunderbird-91.8.0/comm/third_party/botan/src/lib/misc/cryptobox/
H A Dcryptobox.cpp33 const size_t MAC_KEY_LEN = 32; variable
38 const size_t PBKDF_OUTPUT_LEN = CIPHER_KEY_LEN + MAC_KEY_LEN + CIPHER_IV_LEN;
67 CIPHER_KEY_LEN + MAC_KEY_LEN + CIPHER_IV_LEN, in encrypt()
76 const uint8_t* iv = mk + CIPHER_KEY_LEN + MAC_KEY_LEN; in encrypt()
86 hmac->set_key(mac_key, MAC_KEY_LEN); in encrypt()
128 const uint8_t* iv = mk + CIPHER_KEY_LEN + MAC_KEY_LEN; in decrypt_bin()
133 hmac->set_key(mac_key, MAC_KEY_LEN); in decrypt_bin()
/dports/security/botan2/Botan-2.18.2/src/lib/misc/cryptobox/
H A Dcryptobox.cpp33 const size_t MAC_KEY_LEN = 32; variable
38 const size_t PBKDF_OUTPUT_LEN = CIPHER_KEY_LEN + MAC_KEY_LEN + CIPHER_IV_LEN;
67 CIPHER_KEY_LEN + MAC_KEY_LEN + CIPHER_IV_LEN, in encrypt()
76 const uint8_t* iv = mk + CIPHER_KEY_LEN + MAC_KEY_LEN; in encrypt()
86 hmac->set_key(mac_key, MAC_KEY_LEN); in encrypt()
128 const uint8_t* iv = mk + CIPHER_KEY_LEN + MAC_KEY_LEN; in decrypt_bin()
133 hmac->set_key(mac_key, MAC_KEY_LEN); in decrypt_bin()
/dports/security/botan110/Botan-1.10.17/src/constructs/cryptobox/
H A Dcryptobox.cpp34 const size_t MAC_KEY_LEN = 32; variable
39 const size_t PBKDF_OUTPUT_LEN = CIPHER_KEY_LEN + CIPHER_IV_LEN + MAC_KEY_LEN;
62 SymmetricKey mac_key(&mk[CIPHER_KEY_LEN], MAC_KEY_LEN); in encrypt()
63 InitializationVector iv(&mk[CIPHER_KEY_LEN + MAC_KEY_LEN], CIPHER_IV_LEN); in encrypt()
128 SymmetricKey mac_key(&mk[CIPHER_KEY_LEN], MAC_KEY_LEN); in decrypt()
129 InitializationVector iv(&mk[CIPHER_KEY_LEN + MAC_KEY_LEN], CIPHER_IV_LEN); in decrypt()
/dports/security/nmap/nmap-7.91/nping/
H A DNEPContext.cc89 memset(this->nep_key_mac_c2s, 0, MAC_KEY_LEN); in reset()
90 memset(this->nep_key_mac_s2c, 0, MAC_KEY_LEN); in reset()
307 memcpy(this->nep_key_mac_c2s, key, MAC_KEY_LEN); in setMacKeyC2S()
316 *final_len=MAC_KEY_LEN; in getMacKeyC2S()
342 memcpy(this->nep_key_mac_s2c, key, MAC_KEY_LEN); in setMacKeyS2C()
351 *final_len=MAC_KEY_LEN; in getMacKeyS2C()
396 *final_len=MAC_KEY_LEN; in getCipherKeyC2S()
H A DEchoClient.cc235 nping_print(DBG_4,"Session Key MAC_C2S:"); print_hexdump(DBG_4,ctx.getMacKeyC2S(), MAC_KEY_LEN); in nep_handshake()
236 nping_print(DBG_4,"Session Key MAC_S2C:"); print_hexdump(DBG_4,ctx.getMacKeyS2C(), MAC_KEY_LEN); in nep_handshake()
237 …ng_print(DBG_4,"Session Key CIPHER_C2S:"); print_hexdump(DBG_4,ctx.getCipherKeyC2S(), MAC_KEY_LEN); in nep_handshake()
238 …ng_print(DBG_4,"Session Key CIPHER_S2C:"); print_hexdump(DBG_4,ctx.getCipherKeyS2C(), MAC_KEY_LEN); in nep_handshake()
393 if( h.verifyMessageAuthenticationCode(this->ctx.getMacKeyS2C(), MAC_KEY_LEN )!=OP_SUCCESS ){ in parse_hs_server()
466 if( h.verifyMessageAuthenticationCode(this->ctx.getMacKeyS2C(), MAC_KEY_LEN )!=OP_SUCCESS ){ in parse_hs_final()
533 if( h.verifyMessageAuthenticationCode(this->ctx.getMacKeyS2C(), MAC_KEY_LEN )!=OP_SUCCESS ){ in parse_ready()
604 if( h.verifyMessageAuthenticationCode(this->ctx.getMacKeyS2C(), MAC_KEY_LEN )!=OP_SUCCESS ){ in parse_echo()
647 h->setMessageAuthenticationCode( this->ctx.getMacKeyC2S(), MAC_KEY_LEN); in generate_hs_client()
768 h->setMessageAuthenticationCode(this->ctx.getMacKeyC2S(), MAC_KEY_LEN); in generate_packet_spec()
H A DNEPContext.h130 u8 nep_key_mac_c2s[MAC_KEY_LEN];
131 u8 nep_key_mac_s2c[MAC_KEY_LEN];
H A DEchoServer.cc1102 nping_print(DBG_3,"Session Key MAC_C2S:"); print_hexdump(DBG_3,ctx->getMacKeyC2S(), MAC_KEY_LEN); in parse_hs_client()
1103 nping_print(DBG_3,"Session Key MAC_S2C:"); print_hexdump(DBG_3,ctx->getMacKeyS2C(), MAC_KEY_LEN); in parse_hs_client()
1104 …g_print(DBG_3,"Session Key CIPHER_C2S:"); print_hexdump(DBG_3,ctx->getCipherKeyC2S(), MAC_KEY_LEN); in parse_hs_client()
1105 …g_print(DBG_3,"Session Key CIPHER_S2C:"); print_hexdump(DBG_3,ctx->getCipherKeyS2C(), MAC_KEY_LEN); in parse_hs_client()
1116 if( h.verifyMessageAuthenticationCode( ctx->getMacKeyC2S(), MAC_KEY_LEN)!=OP_SUCCESS ){ in parse_hs_client()
1188 if( h.verifyMessageAuthenticationCode( ctx->getMacKeyC2S(), MAC_KEY_LEN)!=OP_SUCCESS ){ in parse_packet_spec()
1248 h->setMessageAuthenticationCode( ctx->getMacKeyS2C(), MAC_KEY_LEN); in generate_hs_server()
1276 h->setMessageAuthenticationCode( ctx->getMacKeyS2C(), MAC_KEY_LEN); in generate_hs_final()
1301 h->setMessageAuthenticationCode(ctx->getMacKeyS2C(), MAC_KEY_LEN); in generate_ready()
1357 h->setMessageAuthenticationCode(ctx->getMacKeyS2C(), MAC_KEY_LEN); in generate_echo()
[all …]
H A Dnping.h264 #define MAC_KEY_LEN (128/8) macro
/dports/security/arti/arti-9d0ede26801cdb182daa85c3eb5f0058dc178eb6/crates/tor-proto/src/crypto/handshake/
H A Dntor_v3.rs34 const MAC_KEY_LEN: usize = 32; const
51 type MacKey = [u8; MAC_KEY_LEN];
193 let mut mac_key = Zeroizing::new([0; MAC_KEY_LEN]); in kdf_msgkdf()