Lines Matching refs:state
324 ns_tcp_tsig_state *state)
327 if (state == NULL || k == NULL || querysig == NULL || querysiglen < 0)
329 state->counter = -1;
330 state->key = k;
331 if (state->key->dk_alg != KEY_HMAC_MD5)
333 if (querysiglen > (int)sizeof(state->sig))
335 memcpy(state->sig, querysig, querysiglen);
336 state->siglen = querysiglen;
341 ns_verify_tcp(u_char *msg, int *msglen, ns_tcp_tsig_state *state,
353 if (msg == NULL || msglen == NULL || state == NULL)
358 state->counter++;
359 if (state->counter == 0)
360 return (ns_verify(msg, msglen, state->key,
361 state->sig, state->siglen,
362 state->sig, &state->siglen, ×igned, 0));
364 if (state->siglen > 0) {
365 u_int16_t siglen_n = htons(state->siglen);
367 dst_verify_data(SIG_MODE_INIT, state->key, &state->ctx,
369 dst_verify_data(SIG_MODE_UPDATE, state->key, &state->ctx,
371 dst_verify_data(SIG_MODE_UPDATE, state->key, &state->ctx,
372 state->sig, state->siglen, NULL, 0);
373 state->siglen = 0;
381 dst_verify_data(SIG_MODE_UPDATE, state->key, &state->ctx,
387 dst_verify_data(SIG_MODE_UPDATE, state->key, &state->ctx,
417 if ((ns_samename(state->key->dk_key_name, name) != 1 ||
418 state->key->dk_alg != KEY_HMAC_MD5))
458 dst_verify_data(SIG_MODE_UPDATE, state->key, &state->ctx,
461 n = dst_verify_data(SIG_MODE_FINAL, state->key, &state->ctx, NULL, 0,
466 if (sigfieldlen > sizeof(state->sig))
469 memcpy(state->sig, sigstart, sigfieldlen);
470 state->siglen = sigfieldlen;