Lines Matching +full:aes +full:- +full:cmac

3  * - OpenSSL versions, if we are building with them
4 * - our versions
40 /* Check if CMAC key type specific code required */
49 (AES_128_KEY_SIZE - key_size));
54 msyslog(LOG_ERR, "make_mac: CMAC %s CTX new failed.", CMAC);
58 msyslog(LOG_ERR, "make_mac: CMAC %s Init failed.", CMAC);
61 msyslog(LOG_ERR, "make_mac: CMAC %s Update failed.", CMAC);
64 msyslog(LOG_ERR, "make_mac: CMAC %s Final failed.", CMAC);
71 /* Test our AES-128-CMAC implementation */
139 if (cmp_key->key_len > 64 || pkt_len % 4 != 0) {
142 len = compute_mac(dbuf, sizeof(dbuf), cmp_key->typen, pkt_data,
143 pkt_len, cmp_key->key_seq, cmp_key->key_len);
171 len = compute_mac(dbuf, sizeof(dbuf), cmp_key->typen,
172 pkt_ptr, pkt_len, cmp_key->key_seq,
173 cmp_key->key_len);
178 * is a 1-shot program, so snooping for timing attacks is
192 val = x - '0';
194 val = x - 'a' + 0xa;
196 val = x - 'A' + 0xA;
198 val = -1;
204 * Returns -1 if the reading failed, otherwise it returns the
225 return -1;
231 return -1;
242 kbuf[sizeof(kbuf) - 1] = '\0';
247 /* keep width 15 = sizeof struct key.typen - 1 synced */
249 &act->key_id, act->typen, keystring);
254 act->key_len = len;
255 memcpy(act->key_seq, keystring, len + 1);
260 act->key_len = len >> 1;
269 act->key_seq[j>>1] = (char)val;
272 act->typei = keytype_from_text(act->typen, NULL);
273 if (0 == act->typei) {
274 printf("%s: line %d: key %d, %s not supported - ignoring\n",
276 act->key_id, act->typen);
281 act->next = NULL;
285 prev->next = act;
317 for (itr_key = key_ptr; itr_key; itr_key = itr_key->next) {
318 if (itr_key->key_id == key_id) {