| /src/contrib/ntp/sntp/tests/ |
| H A D | packetProcessing.c | 166 uint32_t * pe = testpkt.p.exten + 7; in test_TooShortExtensionFieldLength() 229 testpkt.p.exten[0] = htonl(50); in test_AuthenticatedPacketInvalid() 231 &testpkt.p.exten[1], MAX_MDG_LEN); in test_AuthenticatedPacketInvalid() 236 testpkt.p.exten[1] += 1; in test_AuthenticatedPacketInvalid() 264 testpkt.p.exten[0] = htonl(50); in test_AuthenticatedPacketUnknownKey() 266 &testpkt.p.exten[1], MAX_MDG_LEN); in test_AuthenticatedPacketUnknownKey() 438 testpkt.p.exten[0] = htonl(k_id); in test_CorrectAuthenticatedPacketMD5() 440 &testpkt.p.exten[1], MAX_MDG_LEN); in test_CorrectAuthenticatedPacketMD5() 472 testpkt.p.exten[0] = htonl(k_id); in test_CorrectAuthenticatedPacketSHAKE128() 473 mac_len = make_mac(&testpkt.p, pkt_len, key_ptr, &testpkt.p.exten[1], in test_CorrectAuthenticatedPacketSHAKE128() [all …]
|
| H A D | packetHandling.c | 117 TEST_ASSERT_EQUAL(testkey.key_id, ntohl(testpkt.exten[0])); in test_GenerateAuthenticatedPacket() 121 &testpkt.exten[1], MAX_MDG_LEN); in test_GenerateAuthenticatedPacket() 124 TEST_ASSERT_EQUAL_MEMORY(expected_mac, (void *)&testpkt.exten[1], in test_GenerateAuthenticatedPacket()
|
| /src/contrib/wpa/src/ap/ |
| H A D | dhcp_snoop.c | 44 exten_len = len - ETH_HLEN - (sizeof(*b) - sizeof(b->exten)); in handle_dhcp() 53 if (WPA_GET_BE32(b->exten) != DHCP_MAGIC) in handle_dhcp() 58 pos = &b->exten[4]; in handle_dhcp()
|
| /src/contrib/ntp/ntpd/ |
| H A D | ntp_proto.c | 862 struct exten *ep; in receive() 896 ep = (struct exten *)&((u_int32 *)pkt)[authlen / 4]; in receive() 900 offsetof(struct exten, pkt)) { in receive() 1331 rbufp->recv_length - MIN_V4_PKT_LEN, (u_char *)&pkt->exten); in receive() 1420 rbufp->recv_length - MIN_V4_PKT_LEN, (u_char *)&pkt->exten); in receive() 2627 len - MIN_V4_PKT_LEN, (u_char *)&pkt->exten); in process_packet() 4251 struct exten *exten; /* extension field */ in peer_xmit() local 4308 exten = NULL; in peer_xmit() 4320 exten = crypto_args(peer, CRYPTO_AUTO | in peer_xmit() 4323 exten = crypto_args(peer, CRYPTO_ASSOC | in peer_xmit() [all …]
|
| H A D | ntp_crypto.c | 185 static int crypto_verify (struct exten *, struct value *, 192 static int crypto_bob (struct exten *, struct value *); 193 static int crypto_bob2 (struct exten *, struct value *); 194 static int crypto_bob3 (struct exten *, struct value *); 195 static int crypto_iff (struct exten *, struct peer *); 196 static int crypto_gq (struct exten *, struct peer *); 197 static int crypto_mv (struct exten *, struct peer *); 198 static int crypto_send (struct exten *, struct value *, int); 202 static int cert_sign (struct exten *, struct value *); 203 static struct cert_info *cert_install (struct exten *, struct peer *); [all …]
|
| H A D | ntp_io.c | 3284 len - MIN_V4_PKT_LEN, (u_char *)&pkt->exten);
|
| /src/contrib/ntp/util/ |
| H A D | ntp-keygen.c | 327 const char *exten = NULL; /* private extension */ in main() local 442 exten = EXT_KEY_PRIVATE; in main() 445 exten = EXT_KEY_TRUST; in main() 542 if (exten == NULL) { in main() 561 exten = EXT_KEY_TRUST; in main() 564 exten = EXT_KEY_PRIVATE; in main() 850 x509(pkey_sign, ectx, grpkey, exten, certname); in main() 1977 const char *exten, /* private cert extension */ in x509() argument 2076 if (exten != NULL) { in x509() 2077 fprintf(stderr, "%s: %s\n", LN_ext_key_usage, exten); in x509() [all …]
|
| /src/contrib/ntp/include/ |
| H A D | ntp.h | 329 struct exten *cmmd; /* extension pointer */ 595 u_int32 exten[(NTP_MAXEXTEN + MAX_MAC_LEN) / sizeof(u_int32)]; member 597 u_int32 exten[(MAX_MAC_LEN) / sizeof(u_int32)]; member
|
| H A D | ntp_crypto.h | 143 struct exten {
|
| H A D | ntpd.h | 218 struct exten *, keyid_t); 228 extern struct exten *crypto_args (struct peer *, u_int, associd_t, char *);
|
| /src/contrib/ntp/sntp/ |
| H A D | networking.h | 83 struct exten *cmmd; /* extension pointer */
|
| H A D | networking.c | 143 exten_end = skip_efields(rpkt->exten, packet_end); in process_pkt()
|
| H A D | main.c | 1146 x_pkt->exten[0] = htonl(key_id); in generate_pkt() 1148 (char *)&x_pkt->exten[1], MAX_MDG_LEN); in generate_pkt()
|
| /src/contrib/wpa/src/common/ |
| H A D | dhcp.h | 76 u8 exten[312]; member
|
| /src/contrib/ntp/ntpdate/ |
| H A D | ntpdate.c | 713 xpkt.exten[0] = htonl(sys_authkey); in transmit() 821 (long int)ntohl(rpkt->exten[0]), (long int)sys_authkey, in receive() 825 if (has_mac && ntohl(rpkt->exten[0]) == sys_authkey && in receive()
|
| /src/contrib/ntp/ |
| H A D | CommitLog-4.1.0 | 980 exten grew from 672/4 to 5000/4 for PUBKEY. 2031 signature field. Update the inline docs on pkt's exten field. 2146 value. Add fstamp to struct peer. Resize the exten AUTOKEY field
|
| H A D | ChangeLog | 1438 * CID 739722: Clean up the definition of the exten field of struct pkt.
|
| H A D | CommitLog | 19545 …use args and not hard wire MD5, increase CMAC key to mandatory length 16, fix exten to match key id 56856 CID 739722: Clean up the definition of the exten field of struct pkt 56859 CID 739722: Clean up the definition of the exten field of struct pkt 56862 Clean up the definition of the exten field of struct pkt 56865 Clean up the definition of the exten field of struct pkt
|