/freebsd/crypto/openssl/crypto/pkcs12/ |
H A D | p12_mutl.c | 77 unsigned char *mac, unsigned int *maclen, in pkcs12_gen_mac() argument 166 || !HMAC_Final(hmac, mac, maclen)) { in pkcs12_gen_mac() 179 unsigned char *mac, unsigned int *maclen) in PKCS12_gen_mac() argument 181 return pkcs12_gen_mac(p12, pass, passlen, mac, maclen, NULL); in PKCS12_gen_mac() 188 unsigned int maclen; in PKCS12_verify_mac() local 195 if (!pkcs12_gen_mac(p12, pass, passlen, mac, &maclen, NULL)) { in PKCS12_verify_mac() 200 if ((maclen != (unsigned int)ASN1_STRING_length(macoct)) in PKCS12_verify_mac() 201 || CRYPTO_memcmp(mac, ASN1_STRING_get0_data(macoct), maclen) != 0) in PKCS12_verify_mac() 214 unsigned int maclen; in PKCS12_set_mac() local 229 if (!pkcs12_gen_mac(p12, pass, passlen, mac, &maclen, NULL)) { in PKCS12_set_mac() [all …]
|
H A D | p12_npas.c | 66 unsigned int maclen; in newpass_p12() local 111 if (!PKCS12_gen_mac(p12, newpass, -1, mac, &maclen)) in newpass_p12() 114 if (!ASN1_OCTET_STRING_set(macoct, mac, maclen)) in newpass_p12()
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | OSSL_CRMF_pbmp_new.pod | 17 unsigned char **mac, size_t *maclen); 33 I<maclen> reference parameter unless it its NULL. 68 size_t maclen; 72 if (!OSSL_CRMF_pbm_new(pbm, msg, 5, sec, 6, &mac, &maclen))
|
H A D | PKCS12_gen_mac.pod | 13 unsigned char *mac, unsigned int *maclen);
|
/freebsd/tests/sys/opencrypto/ |
H A D | cryptotest.py | 125 maclen=16) 264 mackey=key, maclen=Tlen, ivlen=Nlen) 305 mackey=key, maclen=Tlen, ivlen=Nlen) 371 maclen=hashlen) 432 crid=crid, maclen=hashlen)
|
H A D | cryptodev.py | 177 crid=CRYPTOCAP_F_SOFTWARE | CRYPTOCAP_F_HARDWARE, maclen=None, argument 180 self._maclen = maclen 202 if maclen: 203 ses.maclen = maclen
|
/freebsd/contrib/ntp/ntpq/ |
H A D | ntpq.c | 1167 int maclen; in getresponse() 1176 maclen = n - shouldbesize; in getresponse() 1177 if (maclen >= (int)MIN_MAC_LEN) { in getresponse() 1180 n, shouldbesize, maclen); in getresponse() 1183 (u_long)ntohl(lpkt[(n - maclen)/sizeof(u_int32) - 3]), in getresponse() 1184 (u_long)ntohl(lpkt[(n - maclen)/sizeof(u_int32) - 2]), in getresponse() 1185 (u_long)ntohl(lpkt[(n - maclen)/sizeof(u_int32) - 1]), in getresponse() 1186 (u_long)ntohl(lpkt[(n - maclen)/sizeof(u_int32)]), in getresponse() 1187 (u_long)ntohl(lpkt[(n - maclen)/sizeof(u_int32) + 1]), in getresponse() 1188 (u_long)ntohl(lpkt[(n - maclen)/sizeo in getresponse() 1171 int maclen; getresponse() local 1333 size_t maclen; sendrequest() local [all...] |
/freebsd/sys/dev/irdma/ |
H A D | irdma_puda.h | 82 u8 maclen; member 100 u8 maclen; /* mac length in bytes */ member
|
H A D | irdma_puda.c | 506 hdr[0] = FIELD_PREP(IRDMA_UDA_QPSQ_MACLEN, info->maclen >> 1) | in irdma_puda_send() 579 info.maclen = buf->maclen; in irdma_puda_send_buf() 1323 txbuf->maclen = buf->maclen; in irdma_ieq_setup_tx_buf()
|
H A D | irdma_utils.c | 1393 iph = (struct ip *)(addr + buf->maclen); in irdma_gen1_ieq_update_tcpip_info() 1394 tcph = (struct tcphdr *)(addr + buf->maclen + iphlen); in irdma_gen1_ieq_update_tcpip_info() 1445 buf->maclen = (info->vlan_valid) ? 18 : 14; in irdma_gen1_puda_get_tcpip_info() 1448 buf->iph = mem + buf->maclen; in irdma_gen1_puda_get_tcpip_info() 1460 buf->totallen = pkt_len + buf->maclen; in irdma_gen1_puda_get_tcpip_info() 1472 buf->hdrlen = buf->maclen + iphlen + buf->tcphlen; in irdma_gen1_puda_get_tcpip_info()
|
/freebsd/crypto/openssl/providers/implementations/signature/ |
H A D | mac_legacy_sig.c | 153 int mac_digest_sign_final(void *vpmacctx, unsigned char *mac, size_t *maclen, in mac_digest_sign_final() argument 161 return EVP_MAC_final(pmacctx->macctx, mac, maclen, macsize); in mac_digest_sign_final()
|
/freebsd/contrib/ntp/ntpdc/ |
H A D | ntpdc.c | 906 size_t maclen; in sendrequest() local 968 maclen = authencrypt( in sendrequest() 970 if (!maclen) { in sendrequest() 973 } else if (maclen != (size_t)(info_auth_hashlen + sizeof(keyid_t))) { in sendrequest() 976 maclen, (info_auth_hashlen + sizeof(keyid_t)), in sendrequest() 980 return sendpkt(&qpkt, reqsize + maclen); in sendrequest()
|
/freebsd/sys/opencrypto/ |
H A D | cryptodev.c | 104 int maclen; member 159 CP(*from, *to, maclen); in session2_op_from_32() 472 if (sop->maclen != 0) { in cse_create() 479 csp.csp_auth_mlen = sop->maclen; in cse_create() 502 if (sop->maclen != 0) in cse_create() 503 cse->hashsize = sop->maclen; in cse_create()
|
H A D | cryptodev.h | 253 int maclen; /* length of MAC/tag */ member
|
/freebsd/crypto/openssh/ |
H A D | packet.c | 1564 u_int maclen, aadlen = 0, authlen = 0, block_size; in ssh_packet_read_poll2() local 1586 maclen = mac && mac->enabled ? mac->mac_len : 0; in ssh_packet_read_poll2() 1650 " aadlen %d", block_size, need, maclen, authlen, aadlen)); in ssh_packet_read_poll2() 1665 if (sshbuf_len(state->input) < aadlen + need + authlen + maclen) in ssh_packet_read_poll2() 1676 maclen)) != 0) { in ssh_packet_read_poll2() 1695 sshbuf_ptr(state->input), maclen)) != 0) { in ssh_packet_read_poll2() 2449 size_t keylen, ivlen, maclen; in newkeys_from_blob() local 2481 (r = sshbuf_get_string(b, &mac->key, &maclen)) != 0) in newkeys_from_blob() 2483 if (maclen > mac->key_len) { in newkeys_from_blob() 2487 mac->key_len = maclen; in newkeys_from_blob()
|
/freebsd/sys/contrib/openzfs/module/os/linux/zfs/ |
H A D | zio_crypt.c | 402 uint_t plain_full_len, maclen; in zio_do_crypt_uio() local 410 maclen = cuio->uio_iov[cuio->uio_iovcnt - 1].iov_len; in zio_do_crypt_uio() 412 ASSERT(maclen <= ZIO_DATA_MAC_LEN); in zio_do_crypt_uio() 425 plain_full_len = datalen + maclen; in zio_do_crypt_uio() 436 ccmp.ulMACSize = maclen; in zio_do_crypt_uio() 447 gcmp.ulTagBits = CRYPTO_BYTES2BITS(maclen); in zio_do_crypt_uio() 463 cipherdata.cd_length = datalen + maclen; in zio_do_crypt_uio()
|
/freebsd/contrib/ntp/ntpd/ |
H A D | ntp_control.c | 854 size_t maclen; in ctl_error() 872 maclen = authencrypt(res_keyid, (u_int32 *)&rpkt, in ctl_error() 875 CTL_HEADER_LEN + maclen); in ctl_error() 1176 size_t maclen; in process_control() 1266 maclen = rbufp->recv_length - properlen; in process_control() 1268 maclen >= MIN_MAC_LEN && maclen <= MAX_MAC_LEN && in process_control() 1275 maclen)); in process_control() 1280 rbufp->recv_length - maclen, in process_control() 1281 maclen)) { in process_control() 855 size_t maclen; ctl_error() local 1177 size_t maclen; process_control() local 1401 size_t maclen; ctl_flushpkt() local [all...] |
/freebsd/sys/dev/e1000/ |
H A D | e1000_82575.h | 102 u32 maclen:7; member
|
/freebsd/crypto/openssl/test/ |
H A D | evp_extra_test.c | 2430 size_t maclen = AES_BLOCK_SIZE; in get_cmac_val() local 2437 || !TEST_true(EVP_DigestSignFinal(mdctx, mac, &maclen)) in get_cmac_val() 2438 || !TEST_size_t_eq(maclen, AES_BLOCK_SIZE)) in get_cmac_val() 4878 size_t maclen = 0; in test_signatures_with_engine() local 4925 || !TEST_true(EVP_DigestSignFinal(ctx, NULL, &maclen))) in test_signatures_with_engine() 4928 if (!TEST_ptr(mac = OPENSSL_malloc(maclen))) in test_signatures_with_engine() 4931 if (!TEST_true(EVP_DigestSignFinal(ctx, mac, &maclen))) in test_signatures_with_engine() 5050 size_t maclen = 0; in test_ecx_not_private_key() local 5078 if (EVP_DigestSign(ctx, NULL, &maclen, msg, sizeof(msg)) != 1) in test_ecx_not_private_key() 5081 if (!TEST_ptr(mac = OPENSSL_malloc(maclen))) in test_ecx_not_private_key() [all …]
|
/freebsd/crypto/openssl/include/openssl/ |
H A D | crmf.h.in | 87 unsigned char **mac, size_t *maclen);
|
H A D | crmf.h | 134 unsigned char **mac, size_t *maclen);
|
H A D | pkcs12.h | 283 unsigned char *mac, unsigned int *maclen);
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | EVP_KDF-SS.pod | 52 =item "maclen" (B<OSSL_KDF_PARAM_MAC_SIZE>) <unsigned integer>
|
/freebsd/contrib/libpcap/ |
H A D | pcap-linux.c | 2924 unsigned int sk_type, tp_reserve, maclen, tp_hdrlen, netoff, macoff; in create_ring() local 3036 maclen = (sk_type == SOCK_DGRAM) ? 0 : MAX_LINKHEADER_SIZE; in create_ring() 3052 netoff = TPACKET_ALIGN(tp_hdrlen + (maclen < 16 ? 16 : maclen)) + tp_reserve; in create_ring() 3064 macoff = netoff - maclen; in create_ring()
|
/freebsd/contrib/mandoc/ |
H A D | roff.c | 1995 size_t maclen; in roff_parse() local 2005 maclen = roff_getname(r, &cp, ln, ppos); in roff_parse() 2008 r->current_string = roff_getstrn(r, mac, maclen, &deftype); in roff_parse() 2017 t = roffhash_find(r->reqtab, mac, maclen); in roff_parse() 2024 roff_setstrn(&r->strtab, mac, maclen, "", 0, 0); in roff_parse() 2025 roff_setstrn(&r->rentab, mac, maclen, NULL, 0, 0); in roff_parse()
|