Lines Matching refs:cklen

863 	size_t tlen, mlen, cklen;  in krb5_get_mic_old()  local
886 cklen = kc->kc_checksumkey->ks_class->ec_checksumlen; in krb5_get_mic_old()
891 tm->m_len = cklen; in krb5_get_mic_old()
895 8 + mlen, cklen); in krb5_get_mic_old()
896 bcopy(tm->m_data, p + 8, cklen); in krb5_get_mic_old()
937 mic->m_len += 8 + cklen; in krb5_get_mic_old()
938 krb5_encrypt(kc->kc_tokenkey, mic, mic->m_len - cklen - 8, 8, buf, 8); in krb5_get_mic_old()
952 size_t mlen, cklen; in krb5_get_mic_new() local
956 cklen = key->ks_class->ec_checksumlen; in krb5_get_mic_new()
958 KASSERT(16 + cklen <= MLEN, ("checksum too large for an mbuf")); in krb5_get_mic_new()
960 M_ALIGN(mic, 16 + cklen); in krb5_get_mic_new()
961 mic->m_len = 16 + cklen; in krb5_get_mic_new()
1001 krb5_checksum(key, 0, m, 0, mlen + 16, cklen); in krb5_get_mic_new()
1047 size_t cklen; in krb5_verify_mic_old() local
1082 cklen = kc->kc_checksumkey->ks_class->ec_checksumlen; in krb5_verify_mic_old()
1086 tm->m_len = cklen; in krb5_verify_mic_old()
1090 8 + mlen, cklen); in krb5_verify_mic_old()
1093 if (bcmp(tm->m_data, p + 8, cklen)) { in krb5_verify_mic_old()
1145 size_t mlen, cklen; in krb5_verify_mic_new() local
1149 cklen = key->ks_class->ec_checksumlen; in krb5_verify_mic_new()
1152 if (mic->m_len != 16 + cklen) in krb5_verify_mic_new()
1206 m_copydata(mic, 16, cklen, buf); in krb5_verify_mic_new()
1208 krb5_checksum(key, 0, m, 0, mlen + 16, cklen); in krb5_verify_mic_new()
1210 if (bcmp(buf, p + 16, cklen)) { in krb5_verify_mic_new()
1256 size_t cklen; in krb5_wrap_old() local
1324 cklen = kc->kc_checksumkey->ks_class->ec_checksumlen; in krb5_wrap_old()
1328 cm->m_len = cklen; in krb5_wrap_old()
1331 datalen + 8, cklen); in krb5_wrap_old()
1334 bcopy(cm->m_data, p + 8, cklen); in krb5_wrap_old()
1407 size_t mlen, blen, mblen, cklen, ctlen; in krb5_wrap_new() local
1416 cklen = ec->ec_checksumlen; in krb5_wrap_new()
1445 if (M_TRAILINGSPACE(mlast) >= EC + 16 + cklen) { in krb5_wrap_new()
1447 mlast->m_len += EC + 16 + cklen; in krb5_wrap_new()
1450 tm->m_len = EC + 16 + cklen; in krb5_wrap_new()
1463 tm->m_len = cklen + 16; in krb5_wrap_new()
1466 EC = cklen; in krb5_wrap_new()
1518 krb5_checksum(Ki, 0, m, 16, ctlen, cklen); in krb5_wrap_new()
1528 krb5_checksum(Kc, 0, m, 16, mlen + 16, cklen); in krb5_wrap_new()
1607 size_t cklen; in krb5_unwrap_old() local
1616 cklen = kc->kc_tokenkey->ks_class->ec_checksumlen; in krb5_unwrap_old()
1694 krb5_decrypt(kc->kc_encryptkey, m, 16 + cklen, in krb5_unwrap_old()
1697 krb5_decrypt(kc->kc_encryptkey, m, 16 + cklen, in krb5_unwrap_old()
1740 *mp = m = m_split(m, 16 + cklen, M_WAITOK); in krb5_unwrap_old()
1745 cm->m_len = cklen; in krb5_unwrap_old()
1748 krb5_checksum(kc->kc_checksumkey, 13, hm, 0, datalen + 8, cklen); in krb5_unwrap_old()
1752 if (bcmp(cm->m_data, hm->m_data + 16, cklen)) { in krb5_unwrap_old()
1785 size_t blen, cklen, ctlen, mlen, plen, tlen; in krb5_unwrap_new() local
1881 cklen = ec->ec_checksumlen; in krb5_unwrap_new()
1889 if (mlen < 16 + 2*blen + cklen) in krb5_unwrap_new()
1892 ctlen = mlen - 16 - cklen; in krb5_unwrap_new()
1906 m_copydata(m, ctlen, cklen, buf); in krb5_unwrap_new()
1907 krb5_checksum(Ki, 0, m, 0, ctlen, cklen); in krb5_unwrap_new()
1908 m_copydata(m, ctlen, cklen, buf2); in krb5_unwrap_new()
1910 if (bcmp(buf, buf2, cklen)) in krb5_unwrap_new()
1917 tlen = 16 + EC + cklen; in krb5_unwrap_new()
1930 if (mlen < 16 + cklen || EC != cklen) in krb5_unwrap_new()
1938 plen = mlen - 16 - cklen; in krb5_unwrap_new()
1953 bcopy(cm->m_data, buf, cklen); in krb5_unwrap_new()
1954 krb5_checksum(Kc, 0, m, 0, plen + 16, cklen); in krb5_unwrap_new()
1955 if (bcmp(cm->m_data, buf, cklen)) in krb5_unwrap_new()