Home
last modified time | relevance | path

Searched refs:maclen (Results 1 – 25 of 31) sorted by relevance

12

/freebsd/crypto/openssl/crypto/pkcs12/
H A Dp12_mutl.c77 unsigned char *mac, unsigned int *maclen, in pkcs12_gen_mac() argument
166 || !HMAC_Final(hmac, mac, maclen)) { in pkcs12_gen_mac()
179 unsigned char *mac, unsigned int *maclen) in PKCS12_gen_mac() argument
181 return pkcs12_gen_mac(p12, pass, passlen, mac, maclen, NULL); in PKCS12_gen_mac()
188 unsigned int maclen; in PKCS12_verify_mac() local
195 if (!pkcs12_gen_mac(p12, pass, passlen, mac, &maclen, NULL)) { in PKCS12_verify_mac()
200 if ((maclen != (unsigned int)ASN1_STRING_length(macoct)) in PKCS12_verify_mac()
201 || CRYPTO_memcmp(mac, ASN1_STRING_get0_data(macoct), maclen) != 0) in PKCS12_verify_mac()
214 unsigned int maclen; in PKCS12_set_mac() local
229 if (!pkcs12_gen_mac(p12, pass, passlen, mac, &maclen, NULL)) { in PKCS12_set_mac()
[all …]
H A Dp12_npas.c66 unsigned int maclen; in newpass_p12() local
111 if (!PKCS12_gen_mac(p12, newpass, -1, mac, &maclen)) in newpass_p12()
114 if (!ASN1_OCTET_STRING_set(macoct, mac, maclen)) in newpass_p12()
/freebsd/crypto/openssl/doc/man3/
H A DOSSL_CRMF_pbmp_new.pod17 unsigned char **mac, size_t *maclen);
33 I<maclen> reference parameter unless it its NULL.
68 size_t maclen;
72 if (!OSSL_CRMF_pbm_new(pbm, msg, 5, sec, 6, &mac, &maclen))
H A DPKCS12_gen_mac.pod13 unsigned char *mac, unsigned int *maclen);
/freebsd/tests/sys/opencrypto/
H A Dcryptotest.py125 maclen=16)
264 mackey=key, maclen=Tlen, ivlen=Nlen)
305 mackey=key, maclen=Tlen, ivlen=Nlen)
371 maclen=hashlen)
432 crid=crid, maclen=hashlen)
H A Dcryptodev.py177 crid=CRYPTOCAP_F_SOFTWARE | CRYPTOCAP_F_HARDWARE, maclen=None, argument
180 self._maclen = maclen
202 if maclen:
203 ses.maclen = maclen
/freebsd/contrib/ntp/ntpq/
H A Dntpq.c1167 int maclen; in getresponse() local
1176 maclen = n - shouldbesize; in getresponse()
1177 if (maclen >= (int)MIN_MAC_LEN) { in getresponse()
1180 n, shouldbesize, maclen); in getresponse()
1186 (u_long)ntohl(lpkt[(n - maclen)/sizeof(u_int32)]), in getresponse()
1189 key = ntohl(lpkt[(n - maclen) / sizeof(u_int32)]); in getresponse()
1195 n - maclen, maclen)) { in getresponse()
1329 size_t maclen; in sendrequest() local
1410 if (!maclen) { in sendrequest()
1416 maclen, (info_auth_hashlen + sizeof(keyid_t)), in sendrequest()
[all …]
/freebsd/sys/dev/irdma/
H A Dirdma_puda.h82 u8 maclen; member
100 u8 maclen; /* mac length in bytes */ member
H A Dirdma_puda.c506 hdr[0] = FIELD_PREP(IRDMA_UDA_QPSQ_MACLEN, info->maclen >> 1) | in irdma_puda_send()
579 info.maclen = buf->maclen; in irdma_puda_send_buf()
1323 txbuf->maclen = buf->maclen; in irdma_ieq_setup_tx_buf()
H A Dirdma_utils.c1393 iph = (struct ip *)(addr + buf->maclen); in irdma_gen1_ieq_update_tcpip_info()
1394 tcph = (struct tcphdr *)(addr + buf->maclen + iphlen); in irdma_gen1_ieq_update_tcpip_info()
1445 buf->maclen = (info->vlan_valid) ? 18 : 14; in irdma_gen1_puda_get_tcpip_info()
1448 buf->iph = mem + buf->maclen; in irdma_gen1_puda_get_tcpip_info()
1460 buf->totallen = pkt_len + buf->maclen; in irdma_gen1_puda_get_tcpip_info()
1472 buf->hdrlen = buf->maclen + iphlen + buf->tcphlen; in irdma_gen1_puda_get_tcpip_info()
/freebsd/crypto/openssl/providers/implementations/signature/
H A Dmac_legacy_sig.c153 int mac_digest_sign_final(void *vpmacctx, unsigned char *mac, size_t *maclen, in mac_digest_sign_final() argument
161 return EVP_MAC_final(pmacctx->macctx, mac, maclen, macsize); in mac_digest_sign_final()
/freebsd/contrib/ntp/ntpdc/
H A Dntpdc.c906 size_t maclen; in sendrequest() local
968 maclen = authencrypt( in sendrequest()
970 if (!maclen) { in sendrequest()
973 } else if (maclen != (size_t)(info_auth_hashlen + sizeof(keyid_t))) { in sendrequest()
976 maclen, (info_auth_hashlen + sizeof(keyid_t)), in sendrequest()
980 return sendpkt(&qpkt, reqsize + maclen); in sendrequest()
/freebsd/sys/opencrypto/
H A Dcryptodev.c104 int maclen; member
159 CP(*from, *to, maclen); in session2_op_from_32()
472 if (sop->maclen != 0) { in cse_create()
479 csp.csp_auth_mlen = sop->maclen; in cse_create()
502 if (sop->maclen != 0) in cse_create()
503 cse->hashsize = sop->maclen; in cse_create()
H A Dcryptodev.h253 int maclen; /* length of MAC/tag */ member
/freebsd/crypto/openssh/
H A Dpacket.c1473 u_int maclen, aadlen = 0, authlen = 0, block_size; in ssh_packet_read_poll2() local
1495 maclen = mac && mac->enabled ? mac->mac_len : 0; in ssh_packet_read_poll2()
1559 " aadlen %d", block_size, need, maclen, authlen, aadlen)); in ssh_packet_read_poll2()
1574 if (sshbuf_len(state->input) < aadlen + need + authlen + maclen) in ssh_packet_read_poll2()
1585 maclen)) != 0) { in ssh_packet_read_poll2()
1604 sshbuf_ptr(state->input), maclen)) != 0) { in ssh_packet_read_poll2()
2350 size_t keylen, ivlen, maclen; in newkeys_from_blob() local
2382 (r = sshbuf_get_string(b, &mac->key, &maclen)) != 0) in newkeys_from_blob()
2384 if (maclen > mac->key_len) { in newkeys_from_blob()
2388 mac->key_len = maclen; in newkeys_from_blob()
/freebsd/sys/contrib/openzfs/module/os/linux/zfs/
H A Dzio_crypt.c402 uint_t plain_full_len, maclen; in zio_do_crypt_uio() local
410 maclen = cuio->uio_iov[cuio->uio_iovcnt - 1].iov_len; in zio_do_crypt_uio()
412 ASSERT(maclen <= ZIO_DATA_MAC_LEN); in zio_do_crypt_uio()
425 plain_full_len = datalen + maclen; in zio_do_crypt_uio()
436 ccmp.ulMACSize = maclen; in zio_do_crypt_uio()
447 gcmp.ulTagBits = CRYPTO_BYTES2BITS(maclen); in zio_do_crypt_uio()
463 cipherdata.cd_length = datalen + maclen; in zio_do_crypt_uio()
/freebsd/contrib/ntp/ntpd/
H A Dntp_control.c854 size_t maclen; in ctl_error() local
875 CTL_HEADER_LEN + maclen); in ctl_error()
1176 size_t maclen; in process_control() local
1266 maclen = rbufp->recv_length - properlen; in process_control()
1268 maclen >= MIN_MAC_LEN && maclen <= MAX_MAC_LEN && in process_control()
1275 maclen)); in process_control()
1280 rbufp->recv_length - maclen, in process_control()
1281 maclen)) { in process_control()
1400 size_t maclen; in ctl_flushpkt() local
1462 maclen = authencrypt(res_keyid, in ctl_flushpkt()
[all …]
/freebsd/sys/dev/e1000/
H A De1000_82575.h102 u32 maclen:7; member
/freebsd/crypto/openssl/test/
H A Devp_extra_test.c2426 size_t maclen = AES_BLOCK_SIZE; in get_cmac_val() local
2433 || !TEST_true(EVP_DigestSignFinal(mdctx, mac, &maclen)) in get_cmac_val()
2434 || !TEST_size_t_eq(maclen, AES_BLOCK_SIZE)) in get_cmac_val()
4833 size_t maclen = 0; in test_signatures_with_engine() local
4880 || !TEST_true(EVP_DigestSignFinal(ctx, NULL, &maclen))) in test_signatures_with_engine()
4883 if (!TEST_ptr(mac = OPENSSL_malloc(maclen))) in test_signatures_with_engine()
4886 if (!TEST_true(EVP_DigestSignFinal(ctx, mac, &maclen))) in test_signatures_with_engine()
5005 size_t maclen = 0; in test_ecx_not_private_key() local
5033 if (EVP_DigestSign(ctx, NULL, &maclen, msg, sizeof(msg)) != 1) in test_ecx_not_private_key()
5036 if (!TEST_ptr(mac = OPENSSL_malloc(maclen))) in test_ecx_not_private_key()
[all …]
/freebsd/crypto/openssl/include/openssl/
H A Dcrmf.h.in87 unsigned char **mac, size_t *maclen);
H A Dcrmf.h134 unsigned char **mac, size_t *maclen);
H A Dpkcs12.h283 unsigned char *mac, unsigned int *maclen);
/freebsd/crypto/openssl/doc/man7/
H A DEVP_KDF-SS.pod50 =item "maclen" (B<OSSL_KDF_PARAM_MAC_SIZE>) <unsigned integer>
/freebsd/contrib/libpcap/
H A Dpcap-linux.c2884 unsigned int sk_type, tp_reserve, maclen, tp_hdrlen, netoff, macoff; in create_ring() local
3001 maclen = (sk_type == SOCK_DGRAM) ? 0 : MAX_LINKHEADER_SIZE; in create_ring()
3017 netoff = TPACKET_ALIGN(tp_hdrlen + (maclen < 16 ? 16 : maclen)) + tp_reserve; in create_ring()
3029 macoff = netoff - maclen; in create_ring()
/freebsd/contrib/mandoc/
H A Droff.c2009 size_t maclen; in roff_parse() local
2019 maclen = roff_getname(r, &cp, ln, ppos); in roff_parse()
2022 r->current_string = roff_getstrn(r, mac, maclen, &deftype); in roff_parse()
2031 t = roffhash_find(r->reqtab, mac, maclen); in roff_parse()
2038 roff_setstrn(&r->strtab, mac, maclen, "", 0, 0); in roff_parse()
2039 roff_setstrn(&r->rentab, mac, maclen, NULL, 0, 0); in roff_parse()

12