| /src/crypto/external/bsd/openssl/dist/crypto/pkcs12/ |
| p12_mutl.c | 77 unsigned char *mac, unsigned int *maclen, 166 || !HMAC_Final(hmac, mac, maclen)) { 179 unsigned char *mac, unsigned int *maclen) 181 return pkcs12_gen_mac(p12, pass, passlen, mac, maclen, NULL); 188 unsigned int maclen; local 195 if (!pkcs12_gen_mac(p12, pass, passlen, mac, &maclen, NULL)) { 200 if ((maclen != (unsigned int)ASN1_STRING_length(macoct)) 201 || CRYPTO_memcmp(mac, ASN1_STRING_get0_data(macoct), maclen) != 0) 214 unsigned int maclen; local 229 if (!pkcs12_gen_mac(p12, pass, passlen, mac, &maclen, NULL)) [all...] |
| p12_npas.c | 66 unsigned int maclen; local 111 if (!PKCS12_gen_mac(p12, newpass, -1, mac, &maclen)) 114 if (!ASN1_OCTET_STRING_set(macoct, mac, maclen))
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/pkcs12/ |
| p12_mutl.c | 71 unsigned char *mac, unsigned int *maclen, 132 || !HMAC_Final(hmac, mac, maclen)) { 144 unsigned char *mac, unsigned int *maclen) 146 return pkcs12_gen_mac(p12, pass, passlen, mac, maclen, NULL); 153 unsigned int maclen; local 160 if (!pkcs12_gen_mac(p12, pass, passlen, mac, &maclen, 166 if ((maclen != (unsigned int)ASN1_STRING_length(macoct)) 167 || CRYPTO_memcmp(mac, ASN1_STRING_get0_data(macoct), maclen) != 0) 180 unsigned int maclen; local 192 if (!pkcs12_gen_mac(p12, pass, passlen, mac, &maclen, [all...] |
| p12_npas.c | 67 unsigned int maclen; local 111 if (!PKCS12_gen_mac(p12, newpass, -1, mac, &maclen)) 114 if (!ASN1_OCTET_STRING_set(macoct, mac, maclen))
|
| /src/crypto/external/apache2/openssl/dist/crypto/pkcs12/ |
| p12_npas.c | 68 unsigned int maclen; local 117 if (!PKCS12_gen_mac(p12, newpass, -1, mac, &maclen)) 120 if (!ASN1_OCTET_STRING_set(macoct, mac, maclen))
|
| p12_mutl.c | 172 unsigned char *mac, unsigned int *maclen, 291 || !HMAC_Final(hmac, mac, maclen)) { 304 unsigned char *mac, unsigned int *maclen) 306 return pkcs12_gen_mac(p12, pass, passlen, mac, maclen, NID_undef, NID_undef, NULL); 313 unsigned int maclen; local 338 if (!pkcs12_gen_mac(p12, pass, passlen, mac, &maclen, md_nid, NID_undef, NULL)) { 345 if (!pkcs12_gen_mac(p12, pass, passlen, mac, &maclen, NID_undef, NID_undef, NULL)) { 351 if ((maclen != (unsigned int)ASN1_STRING_length(macoct)) 352 || CRYPTO_memcmp(mac, ASN1_STRING_get0_data(macoct), maclen) != 0) 364 unsigned int maclen; local 457 unsigned int maclen; local [all...] |
| /src/external/bsd/dhcpcd/dist/src/ |
| bpf.c | 360 size_t maclen, nlft, njmps; local 395 hwaddr += maclen, hwaddr_len -= maclen, off += maclen) 404 maclen = sizeof(mac32); 405 memcpy(&mac32, hwaddr, maclen); 411 maclen = sizeof(mac16); 412 memcpy(&mac16, hwaddr, maclen); 418 maclen = sizeof(*hwaddr);
|
| if-bsd.c | 285 if_setmac(struct interface *ifp, void *mac, uint8_t maclen) 288 if (ifp->hwlen != maclen) { 301 sdl->sdl_alen = maclen; 302 memcpy(LLADDR(sdl), mac, maclen); local 313 .ifr_addr.sa_len = maclen, 317 memcpy(ifr.ifr_addr.sa_data, mac, maclen);
|
| /src/crypto/external/bsd/openssh/dist/ |
| packet.c | 1575 u_int maclen, aadlen = 0, authlen = 0, block_size; local 1597 maclen = mac && mac->enabled ? mac->mac_len : 0; 1660 DBG(debug("partial packet: block %d, need %d, maclen %d, authlen %d," 1661 " aadlen %d", block_size, need, maclen, authlen, aadlen)); 1674 * 'maclen' bytes of message authentication code. 1676 if (sshbuf_len(state->input) < aadlen + need + authlen + maclen) 1687 maclen)) != 0) { 1706 sshbuf_ptr(state->input), maclen)) != 0) { 2467 size_t keylen, ivlen, maclen; local 2499 (r = sshbuf_get_string(b, &mac->key, &maclen)) != 0 [all...] |
| /src/crypto/external/bsd/openssl.old/dist/test/ |
| evp_extra_test.c | 1863 size_t maclen = 0; local 1928 || !TEST_true(EVP_DigestSignFinal(ctx, NULL, &maclen))) 1931 if (!TEST_ptr(mac = OPENSSL_malloc(maclen))) 1934 if (!TEST_true(EVP_DigestSignFinal(ctx, mac, &maclen)))
|
| /src/external/bsd/libpcap/dist/ |
| pcap-linux.c | 2929 unsigned int sk_type, tp_reserve, maclen, tp_hdrlen, netoff, macoff; local 3041 maclen = (sk_type == SOCK_DGRAM) ? 0 : MAX_LINKHEADER_SIZE; 3042 /* XXX: in the kernel maclen is calculated from 3057 netoff = TPACKET_ALIGN(tp_hdrlen + (maclen < 16 ? 16 : maclen)) + tp_reserve; 3069 macoff = netoff - maclen;
|
| /src/external/bsd/ntp/dist/ntpdc/ |
| ntpdc.c | 908 size_t maclen; local 952 * Only ntpd which expects REQ_LEN_NOMAC plus maclen 970 maclen = authencrypt( 972 if (!maclen) { 975 } else if (maclen != (size_t)(info_auth_hashlen + sizeof(keyid_t))) { 978 maclen, (info_auth_hashlen + sizeof(keyid_t)), 982 return sendpkt(&qpkt, reqsize + maclen);
|
| /src/external/bsd/mdocml/dist/ |
| roff.c | 2009 size_t maclen; local 2019 maclen = roff_getname(r, &cp, ln, ppos); 2022 r->current_string = roff_getstrn(r, mac, maclen, &deftype); 2031 t = roffhash_find(r->reqtab, mac, maclen); 2038 roff_setstrn(&r->strtab, mac, maclen, "", 0, 0); 2039 roff_setstrn(&r->rentab, mac, maclen, NULL, 0, 0);
|
| /src/external/bsd/ntp/dist/ntpq/ |
| ntpq.c | 1169 int maclen; local 1178 maclen = n - shouldbesize; 1179 if (maclen >= (int)MIN_MAC_LEN) { 1182 n, shouldbesize, maclen); 1185 (u_long)ntohl(lpkt[(n - maclen)/sizeof(u_int32) - 3]), 1186 (u_long)ntohl(lpkt[(n - maclen)/sizeof(u_int32) - 2]), 1187 (u_long)ntohl(lpkt[(n - maclen)/sizeof(u_int32) - 1]), 1188 (u_long)ntohl(lpkt[(n - maclen)/sizeof(u_int32)]), 1189 (u_long)ntohl(lpkt[(n - maclen)/sizeof(u_int32) + 1]), 1190 (u_long)ntohl(lpkt[(n - maclen)/sizeof(u_int32) + 2])) 1331 size_t maclen; local [all...] |
| /src/crypto/external/bsd/openssl/dist/test/ |
| evp_extra_test.c | 2430 size_t maclen = AES_BLOCK_SIZE; local 2437 || !TEST_true(EVP_DigestSignFinal(mdctx, mac, &maclen)) 2438 || !TEST_size_t_eq(maclen, AES_BLOCK_SIZE)) 4878 size_t maclen = 0; local 4925 || !TEST_true(EVP_DigestSignFinal(ctx, NULL, &maclen))) 4928 if (!TEST_ptr(mac = OPENSSL_malloc(maclen))) 4931 if (!TEST_true(EVP_DigestSignFinal(ctx, mac, &maclen))) 5050 size_t maclen = 0; local 5078 if (EVP_DigestSign(ctx, NULL, &maclen, msg, sizeof(msg)) != 1) 5081 if (!TEST_ptr(mac = OPENSSL_malloc(maclen))) [all...] |
| /src/crypto/external/apache2/openssl/dist/test/ |
| evp_extra_test.c | 3358 size_t maclen = AES_BLOCK_SIZE; local 3365 || !TEST_true(EVP_DigestSignFinal(mdctx, mac, &maclen)) 3366 || !TEST_size_t_eq(maclen, AES_BLOCK_SIZE)) 5922 size_t maclen = 0; local 5974 || !TEST_true(EVP_DigestSignFinal(ctx, NULL, &maclen))) 5977 if (!TEST_ptr(mac = OPENSSL_malloc(maclen))) 5980 if (!TEST_true(EVP_DigestSignFinal(ctx, mac, &maclen))) 6103 size_t maclen = 0; local 6132 if (EVP_DigestSign(ctx, NULL, &maclen, msg, sizeof(msg)) != 1) 6135 if (!TEST_ptr(mac = OPENSSL_malloc(maclen))) [all...] |
| /src/external/bsd/ntp/dist/ntpd/ |
| ntp_control.c | 862 size_t maclen; local 880 maclen = authencrypt(res_keyid, (u_int32 *)&rpkt, 883 CTL_HEADER_LEN + maclen); 1184 size_t maclen; local 1274 maclen = rbufp->recv_length - properlen; 1276 maclen >= MIN_MAC_LEN && maclen <= MAX_MAC_LEN && 1283 maclen)); 1288 rbufp->recv_length - maclen, 1289 maclen)) { 1408 size_t maclen; local [all...] |