HomeSort by: relevance | last modified time | path
    Searched defs:maclen (Results 1 - 17 of 17) sorted by relevancy

  /src/crypto/external/bsd/openssl/dist/crypto/pkcs12/
p12_mutl.c 77 unsigned char *mac, unsigned int *maclen,
166 || !HMAC_Final(hmac, mac, maclen)) {
179 unsigned char *mac, unsigned int *maclen)
181 return pkcs12_gen_mac(p12, pass, passlen, mac, maclen, NULL);
188 unsigned int maclen; local
195 if (!pkcs12_gen_mac(p12, pass, passlen, mac, &maclen, NULL)) {
200 if ((maclen != (unsigned int)ASN1_STRING_length(macoct))
201 || CRYPTO_memcmp(mac, ASN1_STRING_get0_data(macoct), maclen) != 0)
214 unsigned int maclen; local
229 if (!pkcs12_gen_mac(p12, pass, passlen, mac, &maclen, NULL))
    [all...]
p12_npas.c 66 unsigned int maclen; local
111 if (!PKCS12_gen_mac(p12, newpass, -1, mac, &maclen))
114 if (!ASN1_OCTET_STRING_set(macoct, mac, maclen))
  /src/crypto/external/bsd/openssl.old/dist/crypto/pkcs12/
p12_mutl.c 71 unsigned char *mac, unsigned int *maclen,
132 || !HMAC_Final(hmac, mac, maclen)) {
144 unsigned char *mac, unsigned int *maclen)
146 return pkcs12_gen_mac(p12, pass, passlen, mac, maclen, NULL);
153 unsigned int maclen; local
160 if (!pkcs12_gen_mac(p12, pass, passlen, mac, &maclen,
166 if ((maclen != (unsigned int)ASN1_STRING_length(macoct))
167 || CRYPTO_memcmp(mac, ASN1_STRING_get0_data(macoct), maclen) != 0)
180 unsigned int maclen; local
192 if (!pkcs12_gen_mac(p12, pass, passlen, mac, &maclen,
    [all...]
p12_npas.c 67 unsigned int maclen; local
111 if (!PKCS12_gen_mac(p12, newpass, -1, mac, &maclen))
114 if (!ASN1_OCTET_STRING_set(macoct, mac, maclen))
  /src/crypto/external/apache2/openssl/dist/crypto/pkcs12/
p12_npas.c 68 unsigned int maclen; local
117 if (!PKCS12_gen_mac(p12, newpass, -1, mac, &maclen))
120 if (!ASN1_OCTET_STRING_set(macoct, mac, maclen))
p12_mutl.c 172 unsigned char *mac, unsigned int *maclen,
291 || !HMAC_Final(hmac, mac, maclen)) {
304 unsigned char *mac, unsigned int *maclen)
306 return pkcs12_gen_mac(p12, pass, passlen, mac, maclen, NID_undef, NID_undef, NULL);
313 unsigned int maclen; local
338 if (!pkcs12_gen_mac(p12, pass, passlen, mac, &maclen, md_nid, NID_undef, NULL)) {
345 if (!pkcs12_gen_mac(p12, pass, passlen, mac, &maclen, NID_undef, NID_undef, NULL)) {
351 if ((maclen != (unsigned int)ASN1_STRING_length(macoct))
352 || CRYPTO_memcmp(mac, ASN1_STRING_get0_data(macoct), maclen) != 0)
364 unsigned int maclen; local
457 unsigned int maclen; local
    [all...]
  /src/external/bsd/dhcpcd/dist/src/
bpf.c 360 size_t maclen, nlft, njmps; local
395 hwaddr += maclen, hwaddr_len -= maclen, off += maclen)
404 maclen = sizeof(mac32);
405 memcpy(&mac32, hwaddr, maclen);
411 maclen = sizeof(mac16);
412 memcpy(&mac16, hwaddr, maclen);
418 maclen = sizeof(*hwaddr);
if-bsd.c 285 if_setmac(struct interface *ifp, void *mac, uint8_t maclen)
288 if (ifp->hwlen != maclen) {
301 sdl->sdl_alen = maclen;
302 memcpy(LLADDR(sdl), mac, maclen); local
313 .ifr_addr.sa_len = maclen,
317 memcpy(ifr.ifr_addr.sa_data, mac, maclen);
  /src/crypto/external/bsd/openssh/dist/
packet.c 1575 u_int maclen, aadlen = 0, authlen = 0, block_size; local
1597 maclen = mac && mac->enabled ? mac->mac_len : 0;
1660 DBG(debug("partial packet: block %d, need %d, maclen %d, authlen %d,"
1661 " aadlen %d", block_size, need, maclen, authlen, aadlen));
1674 * 'maclen' bytes of message authentication code.
1676 if (sshbuf_len(state->input) < aadlen + need + authlen + maclen)
1687 maclen)) != 0) {
1706 sshbuf_ptr(state->input), maclen)) != 0) {
2467 size_t keylen, ivlen, maclen; local
2499 (r = sshbuf_get_string(b, &mac->key, &maclen)) != 0
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/test/
evp_extra_test.c 1863 size_t maclen = 0; local
1928 || !TEST_true(EVP_DigestSignFinal(ctx, NULL, &maclen)))
1931 if (!TEST_ptr(mac = OPENSSL_malloc(maclen)))
1934 if (!TEST_true(EVP_DigestSignFinal(ctx, mac, &maclen)))
  /src/external/bsd/libpcap/dist/
pcap-linux.c 2929 unsigned int sk_type, tp_reserve, maclen, tp_hdrlen, netoff, macoff; local
3041 maclen = (sk_type == SOCK_DGRAM) ? 0 : MAX_LINKHEADER_SIZE;
3042 /* XXX: in the kernel maclen is calculated from
3057 netoff = TPACKET_ALIGN(tp_hdrlen + (maclen < 16 ? 16 : maclen)) + tp_reserve;
3069 macoff = netoff - maclen;
  /src/external/bsd/ntp/dist/ntpdc/
ntpdc.c 908 size_t maclen; local
952 * Only ntpd which expects REQ_LEN_NOMAC plus maclen
970 maclen = authencrypt(
972 if (!maclen) {
975 } else if (maclen != (size_t)(info_auth_hashlen + sizeof(keyid_t))) {
978 maclen, (info_auth_hashlen + sizeof(keyid_t)),
982 return sendpkt(&qpkt, reqsize + maclen);
  /src/external/bsd/mdocml/dist/
roff.c 2009 size_t maclen; local
2019 maclen = roff_getname(r, &cp, ln, ppos);
2022 r->current_string = roff_getstrn(r, mac, maclen, &deftype);
2031 t = roffhash_find(r->reqtab, mac, maclen);
2038 roff_setstrn(&r->strtab, mac, maclen, "", 0, 0);
2039 roff_setstrn(&r->rentab, mac, maclen, NULL, 0, 0);
  /src/external/bsd/ntp/dist/ntpq/
ntpq.c 1169 int maclen; local
1178 maclen = n - shouldbesize;
1179 if (maclen >= (int)MIN_MAC_LEN) {
1182 n, shouldbesize, maclen);
1185 (u_long)ntohl(lpkt[(n - maclen)/sizeof(u_int32) - 3]),
1186 (u_long)ntohl(lpkt[(n - maclen)/sizeof(u_int32) - 2]),
1187 (u_long)ntohl(lpkt[(n - maclen)/sizeof(u_int32) - 1]),
1188 (u_long)ntohl(lpkt[(n - maclen)/sizeof(u_int32)]),
1189 (u_long)ntohl(lpkt[(n - maclen)/sizeof(u_int32) + 1]),
1190 (u_long)ntohl(lpkt[(n - maclen)/sizeof(u_int32) + 2]))
1331 size_t maclen; local
    [all...]
  /src/crypto/external/bsd/openssl/dist/test/
evp_extra_test.c 2430 size_t maclen = AES_BLOCK_SIZE; local
2437 || !TEST_true(EVP_DigestSignFinal(mdctx, mac, &maclen))
2438 || !TEST_size_t_eq(maclen, AES_BLOCK_SIZE))
4878 size_t maclen = 0; local
4925 || !TEST_true(EVP_DigestSignFinal(ctx, NULL, &maclen)))
4928 if (!TEST_ptr(mac = OPENSSL_malloc(maclen)))
4931 if (!TEST_true(EVP_DigestSignFinal(ctx, mac, &maclen)))
5050 size_t maclen = 0; local
5078 if (EVP_DigestSign(ctx, NULL, &maclen, msg, sizeof(msg)) != 1)
5081 if (!TEST_ptr(mac = OPENSSL_malloc(maclen)))
    [all...]
  /src/crypto/external/apache2/openssl/dist/test/
evp_extra_test.c 3358 size_t maclen = AES_BLOCK_SIZE; local
3365 || !TEST_true(EVP_DigestSignFinal(mdctx, mac, &maclen))
3366 || !TEST_size_t_eq(maclen, AES_BLOCK_SIZE))
5922 size_t maclen = 0; local
5974 || !TEST_true(EVP_DigestSignFinal(ctx, NULL, &maclen)))
5977 if (!TEST_ptr(mac = OPENSSL_malloc(maclen)))
5980 if (!TEST_true(EVP_DigestSignFinal(ctx, mac, &maclen)))
6103 size_t maclen = 0; local
6132 if (EVP_DigestSign(ctx, NULL, &maclen, msg, sizeof(msg)) != 1)
6135 if (!TEST_ptr(mac = OPENSSL_malloc(maclen)))
    [all...]
  /src/external/bsd/ntp/dist/ntpd/
ntp_control.c 862 size_t maclen; local
880 maclen = authencrypt(res_keyid, (u_int32 *)&rpkt,
883 CTL_HEADER_LEN + maclen);
1184 size_t maclen; local
1274 maclen = rbufp->recv_length - properlen;
1276 maclen >= MIN_MAC_LEN && maclen <= MAX_MAC_LEN &&
1283 maclen));
1288 rbufp->recv_length - maclen,
1289 maclen)) {
1408 size_t maclen; local
    [all...]

Completed in 55 milliseconds