Lines Matching +full:8 +full:m

91 #define COMPAT_OLD_DES3_SELECTED 8
132 v = (p[0] << 8) | p[1]; in get_uint16()
148 v = (p[0] << 24) | (p[1] << 16) | (p[2] << 8) | p[3]; in get_uint32()
425 #define SC_LOCAL_SUBKEY 8 in krb5_import()
559 struct mbuf *m; in krb5_make_token() local
576 MGET(m, M_WAITOK, MT_DATA); in krb5_make_token()
577 M_ALIGN(m, tlen); in krb5_make_token()
578 m->m_len = tlen; in krb5_make_token()
580 p = (uint8_t *) m->m_data; in krb5_make_token()
592 *p++ = inside_len >> 8; in krb5_make_token()
598 *p++ = inside_len >> 8; in krb5_make_token()
605 *p++ = inside_len >> 8; in krb5_make_token()
618 *mp = m; in krb5_make_token()
647 struct mbuf *m; in krb5_verify_token() local
652 m = *mp; in krb5_verify_token()
653 tlen = m_length(m, NULL); in krb5_verify_token()
661 if (m->m_len < 2) { in krb5_verify_token()
663 *mp = m = m_pullup(m, 2); in krb5_verify_token()
668 p = m->m_data; in krb5_verify_token()
683 if (m->m_len < len_len + 1) { in krb5_verify_token()
685 *mp = m = m_pullup(m, len_len + 1); in krb5_verify_token()
688 p = m->m_data + 1; in krb5_verify_token()
697 inside_len = (p[0] << 8) | p[1]; in krb5_verify_token()
702 inside_len = (p[0] << 16) | (p[1] << 8) | p[2]; in krb5_verify_token()
708 | (p[2] << 8) | p[3]; in krb5_verify_token()
728 if (m->m_len < hlen) { in krb5_verify_token()
730 *mp = m = m_pullup(m, hlen); in krb5_verify_token()
733 p = m->m_data + 1 + len_len; in krb5_verify_token()
858 krb5_get_mic_old(struct krb5_context *kc, struct mbuf *m, in krb5_get_mic_old() argument
865 char buf[8]; in krb5_get_mic_old()
867 mlen = m_length(m, &mlast); in krb5_get_mic_old()
889 mic->m_next = m; in krb5_get_mic_old()
894 krb5_checksum(kc->kc_checksumkey, 15, mic, mic->m_len - 8, in krb5_get_mic_old()
895 8 + mlen, cklen); in krb5_get_mic_old()
896 bcopy(tm->m_data, p + 8, cklen); in krb5_get_mic_old()
914 p[2] = (seq >> 8); in krb5_get_mic_old()
918 p[1] = (seq >> 8); in krb5_get_mic_old()
931 bcopy(p + 8, buf, 8); in krb5_get_mic_old()
937 mic->m_len += 8 + cklen; in krb5_get_mic_old()
938 krb5_encrypt(kc->kc_tokenkey, mic, mic->m_len - cklen - 8, 8, buf, 8); in krb5_get_mic_old()
945 krb5_get_mic_new(struct krb5_context *kc, struct mbuf *m, in krb5_get_mic_new() argument
955 mlen = m_length(m, &mlast); in krb5_get_mic_new()
984 p[8] = 0; in krb5_get_mic_new()
991 p[14] = (seq >> 8); in krb5_get_mic_new()
1001 krb5_checksum(key, 0, m, 0, mlen + 16, cklen); in krb5_get_mic_new()
1010 gss_qop_t qop_req, struct mbuf *m, struct mbuf **micp) in krb5_get_mic() argument
1024 return (krb5_get_mic_old(kc, m, micp, sgn_alg_des_md5)); in krb5_get_mic()
1027 return (krb5_get_mic_old(kc, m, micp, sgn_alg_des3_sha1)); in krb5_get_mic()
1031 return (krb5_get_mic_old(kc, m, micp, sgn_alg_hmac_md5)); in krb5_get_mic()
1034 return (krb5_get_mic_new(kc, m, micp)); in krb5_get_mic()
1041 krb5_verify_mic_old(struct krb5_context *kc, struct mbuf *m, struct mbuf *mic, in krb5_verify_mic_old() argument
1050 mlen = m_length(m, &mlast); in krb5_verify_mic_old()
1084 mic->m_next = m; in krb5_verify_mic_old()
1089 krb5_checksum(kc->kc_checksumkey, 15, mic, mic->m_len - 8, in krb5_verify_mic_old()
1090 8 + mlen, cklen); in krb5_verify_mic_old()
1093 if (bcmp(tm->m_data, p + 8, cklen)) { in krb5_verify_mic_old()
1107 bcopy(p, tm->m_data, 8); in krb5_verify_mic_old()
1108 tm->m_len = 8; in krb5_verify_mic_old()
1109 krb5_decrypt(kc->kc_tokenkey, tm, 0, 8, p + 8, 8); in krb5_verify_mic_old()
1113 seq = tp[3] | (tp[2] << 8) | (tp[1] << 16) | (tp[0] << 24); in krb5_verify_mic_old()
1115 seq = tp[0] | (tp[1] << 8) | (tp[2] << 16) | (tp[3] << 24); in krb5_verify_mic_old()
1138 krb5_verify_mic_new(struct krb5_context *kc, struct mbuf *m, struct mbuf *mic) in krb5_verify_mic_new() argument
1148 mlen = m_length(m, &mlast); in krb5_verify_mic_new()
1187 if (p[8] || p[9] || p[10] || p[11]) { in krb5_verify_mic_new()
1191 | (p[14] << 8) | p[15]; in krb5_verify_mic_new()
1208 krb5_checksum(key, 0, m, 0, mlen + 16, cklen); in krb5_verify_mic_new()
1219 struct mbuf *m, struct mbuf *mic, gss_qop_t *qop_state) in krb5_verify_mic() argument
1232 return (krb5_verify_mic_old(kc, m, mic, sgn_alg_des_md5)); in krb5_verify_mic()
1236 return (krb5_verify_mic_old(kc, m, mic, sgn_alg_hmac_md5)); in krb5_verify_mic()
1239 return (krb5_verify_mic_old(kc, m, mic, sgn_alg_des3_sha1)); in krb5_verify_mic()
1242 return (krb5_verify_mic_new(kc, m, mic)); in krb5_verify_mic()
1253 struct mbuf *m, *mlast, *tm, *cm, *pm; in krb5_wrap_old() local
1257 uint8_t buf[8]; in krb5_wrap_old()
1263 m = *mp; in krb5_wrap_old()
1264 mlen = m_length(m, &mlast); in krb5_wrap_old()
1274 datalen = mlen + 8 + padlen; in krb5_wrap_old()
1295 if (M_LEADINGSPACE(m) >= 8) { in krb5_wrap_old()
1296 m->m_data -= 8; in krb5_wrap_old()
1297 m->m_len += 8; in krb5_wrap_old()
1300 cm->m_len = 8; in krb5_wrap_old()
1301 cm->m_next = m; in krb5_wrap_old()
1302 m = cm; in krb5_wrap_old()
1304 arc4rand(m->m_data, 8, 0); in krb5_wrap_old()
1315 tm->m_next = m; in krb5_wrap_old()
1322 * checksum the 8 bytes of head that we care about. in krb5_wrap_old()
1330 krb5_checksum(kc->kc_checksumkey, 13, tm, tm->m_len - 8, in krb5_wrap_old()
1331 datalen + 8, cklen); in krb5_wrap_old()
1334 bcopy(cm->m_data, p + 8, cklen); in krb5_wrap_old()
1350 p[2] = (seq >> 8); in krb5_wrap_old()
1354 p[1] = (seq >> 8); in krb5_wrap_old()
1368 8, p + 8, 8); in krb5_wrap_old()
1379 buf[2] = (seq >> 8); in krb5_wrap_old()
1381 krb5_encrypt(kc->kc_encryptkey, m, 0, datalen, in krb5_wrap_old()
1384 krb5_encrypt(kc->kc_encryptkey, m, 0, datalen, in krb5_wrap_old()
1404 struct mbuf *m, *mlast, *tm; in krb5_wrap_new() local
1411 m = *mp; in krb5_wrap_new()
1412 mlen = m_length(m, &mlast); in krb5_wrap_new()
1438 M_PREPEND(m, 16 + blen, M_WAITOK); in krb5_wrap_new()
1460 M_PREPEND(m, 16, M_WAITOK); in krb5_wrap_new()
1469 p = m->m_data; in krb5_wrap_new()
1495 p[8] = 0; in krb5_wrap_new()
1502 p[14] = (seq >> 8); in krb5_wrap_new()
1514 m_copyback(m, 16 + blen + mlen, EC, zpad); in krb5_wrap_new()
1516 m_copyback(m, 16 + blen + mlen + EC, 16, p); in krb5_wrap_new()
1518 krb5_checksum(Ki, 0, m, 16, ctlen, cklen); in krb5_wrap_new()
1519 krb5_encrypt(Ke, m, 16, ctlen, NULL, 0); in krb5_wrap_new()
1528 krb5_checksum(Kc, 0, m, 16, mlen + 16, cklen); in krb5_wrap_new()
1536 p[4] = EC >> 8; in krb5_wrap_new()
1539 *mp = m; in krb5_wrap_new()
1582 m_trim(struct mbuf *m, int len) in m_trim() argument
1587 if (m == NULL) in m_trim()
1589 n = m_getptr(m, len, &off); in m_trim()
1604 struct mbuf *m, *mlast, *hm, *cm, *n; in krb5_unwrap_old() local
1612 m = *mp; in krb5_unwrap_old()
1613 m_length(m, &mlast); in krb5_unwrap_old()
1618 p = krb5_verify_token("\x02\x01", tlen, &m, &elen, TRUE); in krb5_unwrap_old()
1619 *mp = m; in krb5_unwrap_old()
1628 m_adj(m, p - (uint8_t *) m->m_data); in krb5_unwrap_old()
1660 krb5_decrypt(kc->kc_tokenkey, m, 8, 8, p + 8, 8); in krb5_unwrap_old()
1662 seq = p[3] | (p[2] << 8) | (p[1] << 16) | (p[0] << 24); in krb5_unwrap_old()
1664 seq = p[0] | (p[1] << 8) | (p[2] << 16) | (p[3] << 24); in krb5_unwrap_old()
1694 krb5_decrypt(kc->kc_encryptkey, m, 16 + cklen, in krb5_unwrap_old()
1697 krb5_decrypt(kc->kc_encryptkey, m, 16 + cklen, in krb5_unwrap_old()
1706 * RFC1964 specifies between 1<->8 bytes, each with a binary value in krb5_unwrap_old()
1712 n = m_getptr(m, tlen + datalen - 1, &i); in krb5_unwrap_old()
1723 if (padlen < 1 || padlen > 8 || padlen > tlen + datalen) in krb5_unwrap_old()
1725 m_copydata(m, tlen + datalen - padlen, padlen, buf); in krb5_unwrap_old()
1739 hm = m; in krb5_unwrap_old()
1740 *mp = m = m_split(m, 16 + cklen, M_WAITOK); in krb5_unwrap_old()
1741 mlast = m_last(m); in krb5_unwrap_old()
1742 hm->m_len = 8; in krb5_unwrap_old()
1743 hm->m_next = m; in krb5_unwrap_old()
1748 krb5_checksum(kc->kc_checksumkey, 13, hm, 0, datalen + 8, cklen); in krb5_unwrap_old()
1763 m_adj(m, 8); in krb5_unwrap_old()
1767 m_trim(m, datalen - 8 - padlen); in krb5_unwrap_old()
1770 *mp = m; in krb5_unwrap_old()
1782 struct mbuf *m, *mlast, *hm, *cm; in krb5_unwrap_new() local
1788 m = *mp; in krb5_unwrap_new()
1789 mlen = m_length(m, &mlast); in krb5_unwrap_new()
1793 if (m->m_len < 16) { in krb5_unwrap_new()
1794 m = m_pullup(m, 16); in krb5_unwrap_new()
1795 *mp = m; in krb5_unwrap_new()
1797 p = m->m_data; in krb5_unwrap_new()
1820 EC = (p[4] << 8) + p[5]; in krb5_unwrap_new()
1821 RRC = (p[6] << 8) + p[7]; in krb5_unwrap_new()
1827 if (p[8] || p[9] || p[10] || p[11]) { in krb5_unwrap_new()
1831 | (p[14] << 8) | p[15]; in krb5_unwrap_new()
1846 m_adj(m, 16); in krb5_unwrap_new()
1848 hm = m; in krb5_unwrap_new()
1849 *mp = m = m_split(m, 16, M_WAITOK); in krb5_unwrap_new()
1850 mlast = m_last(m); in krb5_unwrap_new()
1861 if (RRC <= sizeof(buf) && m->m_len >= rlen) { in krb5_unwrap_new()
1863 * Simple case, just rearrange the bytes in m. in krb5_unwrap_new()
1865 bcopy(m->m_data, buf, RRC); in krb5_unwrap_new()
1866 bcopy(m->m_data + RRC, m->m_data, rlen - RRC); in krb5_unwrap_new()
1867 bcopy(buf, m->m_data + rlen - RRC, RRC); in krb5_unwrap_new()
1873 rm = m; in krb5_unwrap_new()
1874 *mp = m = m_split(m, RRC, M_WAITOK); in krb5_unwrap_new()
1875 m_cat(m, rm); in krb5_unwrap_new()
1893 krb5_decrypt(Ke, m, 0, ctlen, NULL, 0); in krb5_unwrap_new()
1906 m_copydata(m, ctlen, cklen, buf); in krb5_unwrap_new()
1907 krb5_checksum(Ki, 0, m, 0, ctlen, cklen); in krb5_unwrap_new()
1908 m_copydata(m, ctlen, cklen, buf2); in krb5_unwrap_new()
1916 m_adj(m, blen); in krb5_unwrap_new()
1921 m_trim(m, plen); in krb5_unwrap_new()
1948 cm = m_split(m, plen, M_WAITOK); in krb5_unwrap_new()
1949 mlast = m_last(m); in krb5_unwrap_new()
1950 m->m_next = hm; in krb5_unwrap_new()
1954 krb5_checksum(Kc, 0, m, 0, plen + 16, cklen); in krb5_unwrap_new()
2041 * 8 bytes of header in krb5_wrap_size_limit()
2042 * 8 bytes of confounder in krb5_wrap_size_limit()
2043 * maximum of 8 bytes of padding in krb5_wrap_size_limit()
2047 overhead += 8 + 8 + ec->ec_msgblocklen; in krb5_wrap_size_limit()