/freebsd/contrib/ntp/sntp/tests/ |
H A D | packetProcessing.c | 166 uint32_t * pe = testpkt.p.exten + 7; in test_TooShortExtensionFieldLength() 229 testpkt.p.exten[0] = htonl(50); in test_AuthenticatedPacketInvalid() 231 &testpkt.p.exten[1], MAX_MDG_LEN); in test_AuthenticatedPacketInvalid() 236 testpkt.p.exten[1] += 1; in test_AuthenticatedPacketInvalid() 264 testpkt.p.exten[0] = htonl(50); in test_AuthenticatedPacketUnknownKey() 266 &testpkt.p.exten[1], MAX_MDG_LEN); in test_AuthenticatedPacketUnknownKey() 438 testpkt.p.exten[0] = htonl(k_id); in test_CorrectAuthenticatedPacketMD5() 440 &testpkt.p.exten[1], MAX_MDG_LEN); in test_CorrectAuthenticatedPacketMD5() 472 testpkt.p.exten[0] = htonl(k_id); in test_CorrectAuthenticatedPacketSHAKE128() 503 testpkt.p.exten[0] = htonl(k_id); in test_CorrectAuthenticatedPacketSHA1() [all …]
|
H A D | packetHandling.c | 117 TEST_ASSERT_EQUAL(testkey.key_id, ntohl(testpkt.exten[0])); in test_GenerateAuthenticatedPacket() 121 &testpkt.exten[1], MAX_MDG_LEN); in test_GenerateAuthenticatedPacket() 124 TEST_ASSERT_EQUAL_MEMORY(expected_mac, (void *)&testpkt.exten[1], in test_GenerateAuthenticatedPacket()
|
/freebsd/contrib/wpa/src/ap/ |
H A D | dhcp_snoop.c | 44 exten_len = len - ETH_HLEN - (sizeof(*b) - sizeof(b->exten)); in handle_dhcp() 53 if (WPA_GET_BE32(b->exten) != DHCP_MAGIC) in handle_dhcp() 58 pos = &b->exten[4]; in handle_dhcp()
|
/freebsd/contrib/ntp/ntpd/ |
H A D | ntp_proto.c | 862 struct exten *ep; in receive() 900 offsetof(struct exten, pkt)) { in receive() 4251 struct exten *exten; /* extension field */ in peer_xmit() local 4308 exten = NULL; in peer_xmit() 4351 exten = crypto_args(peer, in peer_xmit() 4418 exten = crypto_args(peer, in peer_xmit() 4472 if (exten != NULL) { in peer_xmit() 4473 if (exten->opcode != 0) in peer_xmit() 4475 NULL, sendlen, exten, 0); in peer_xmit() 4476 free(exten); in peer_xmit() [all …]
|
H A D | ntp_crypto.c | 462 ep = (struct exten *)pkt; in crypto_recv() 1088 struct exten *ep, /* extension pointer */ in crypto_xmit() 1092 struct exten *fp; /* extension pointers */ in crypto_xmit() 1114 fp = (struct exten *)pkt; in crypto_xmit() 1425 struct exten *ep, /* extension pointer */ in crypto_verify() 1704 struct exten * 1718 len = sizeof(struct exten); in crypto_args() 2229 struct exten *ep, /* extension pointer */ in crypto_bob() 2352 struct exten *ep, /* extension pointer */ in crypto_iff() 3278 struct exten *ep, /* cert info/value */ in cert_install() [all …]
|
H A D | ntp_io.c | 3286 len - MIN_V4_PKT_LEN, (u_char *)&pkt->exten);
|
/freebsd/sys/contrib/device-tree/Bindings/mfd/ |
H A D | richtek,rt5120.yaml | 83 "^(ldo|exten)$": 167 exten { 168 regulator-name = "rt5120-exten";
|
/freebsd/contrib/ntp/util/ |
H A D | ntp-keygen.c | 327 const char *exten = NULL; /* private extension */ in main() local 442 exten = EXT_KEY_PRIVATE; in main() 445 exten = EXT_KEY_TRUST; in main() 542 if (exten == NULL) { in main() 561 exten = EXT_KEY_TRUST; in main() 564 exten = EXT_KEY_PRIVATE; in main() 850 x509(pkey_sign, ectx, grpkey, exten, certname); in main() 1977 const char *exten, /* private cert extension */ in x509() argument 2076 if (exten != NULL) { in x509() 2077 fprintf(stderr, "%s: %s\n", LN_ext_key_usage, exten); in x509() [all …]
|
/freebsd/contrib/ntp/include/ |
H A D | ntp.h | 329 struct exten *cmmd; /* extension pointer */ 595 u_int32 exten[(NTP_MAXEXTEN + MAX_MAC_LEN) / sizeof(u_int32)]; member 597 u_int32 exten[(MAX_MAC_LEN) / sizeof(u_int32)]; member
|
H A D | ntp_crypto.h | 143 struct exten {
|
H A D | ntpd.h | 218 struct exten *, keyid_t); 228 extern struct exten *crypto_args (struct peer *, u_int, associd_t, char *);
|
/freebsd/contrib/ntp/sntp/ |
H A D | networking.h | 83 struct exten *cmmd; /* extension pointer */
|
H A D | networking.c | 143 exten_end = skip_efields(rpkt->exten, packet_end); in process_pkt()
|
H A D | main.c | 1146 x_pkt->exten[0] = htonl(key_id); in generate_pkt() 1148 (char *)&x_pkt->exten[1], MAX_MDG_LEN); in generate_pkt()
|
/freebsd/contrib/wpa/src/common/ |
H A D | dhcp.h | 76 u8 exten[312]; member
|
/freebsd/contrib/ntp/ntpdate/ |
H A D | ntpdate.c | 713 xpkt.exten[0] = htonl(sys_authkey); in transmit() 821 (long int)ntohl(rpkt->exten[0]), (long int)sys_authkey, in receive() 825 if (has_mac && ntohl(rpkt->exten[0]) == sys_authkey && in receive()
|
/freebsd/contrib/ntp/ |
H A D | CommitLog-4.1.0 | 980 exten grew from 672/4 to 5000/4 for PUBKEY. 2031 signature field. Update the inline docs on pkt's exten field. 2146 value. Add fstamp to struct peer. Resize the exten AUTOKEY field
|
H A D | ChangeLog | 1438 * CID 739722: Clean up the definition of the exten field of struct pkt.
|
H A D | CommitLog | 19545 …use args and not hard wire MD5, increase CMAC key to mandatory length 16, fix exten to match key id 56856 CID 739722: Clean up the definition of the exten field of struct pkt 56859 CID 739722: Clean up the definition of the exten field of struct pkt 56862 Clean up the definition of the exten field of struct pkt 56865 Clean up the definition of the exten field of struct pkt
|