/dports/security/arti/arti-9d0ede26801cdb182daa85c3eb5f0058dc178eb6/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/doc/man1/ |
H A D | openssl-kdf.pod.in | 137 openssl kdf -keylen 64 -kdfopt mac:KMAC-128 -kdfopt maclen:20 \
|
/dports/security/arti/arti-9d0ede26801cdb182daa85c3eb5f0058dc178eb6/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/doc/man3/ |
H A D | EVP_KDF.pod | 233 =item "maclen" (B<OSSL_KDF_PARAM_MAC_SIZE>) <unsigned integer>
|
H A D | OSSL_CRMF_pbmp_new.pod | 17 unsigned char **mac, size_t *maclen); 33 I<maclen> reference parameter unless it its NULL. 68 size_t maclen; 72 if (!OSSL_CRMF_pbm_new(pbm, msg, 5, sec, 6, &mac, &maclen))
|
H A D | PKCS12_gen_mac.pod | 13 unsigned char *mac, unsigned int *maclen);
|
/dports/security/arti/arti-9d0ede26801cdb182daa85c3eb5f0058dc178eb6/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/doc/man7/ |
H A D | EVP_KDF-SS.pod | 48 =item "maclen" (B<OSSL_KDF_PARAM_MAC_SIZE>) <unsigned integer>
|
H A D | provider-kdf.pod | 181 =item "maclen" (B<OSSL_KDF_PARAM_MAC_SIZE>) <octet string>
|
/dports/security/arti/arti-9d0ede26801cdb182daa85c3eb5f0058dc178eb6/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/include/openssl/ |
H A D | crmf.h.in | 87 unsigned char **mac, size_t *maclen);
|
H A D | pkcs12.h.in | 260 unsigned char *mac, unsigned int *maclen);
|
/dports/security/arti/arti-9d0ede26801cdb182daa85c3eb5f0058dc178eb6/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/providers/implementations/signature/ |
H A D | mac_legacy_sig.c | 145 int mac_digest_sign_final(void *vpmacctx, unsigned char *mac, size_t *maclen, in mac_digest_sign_final() argument 153 return EVP_MAC_final(pmacctx->macctx, mac, maclen, macsize); in mac_digest_sign_final()
|
/dports/security/arti/arti-9d0ede26801cdb182daa85c3eb5f0058dc178eb6/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/test/ |
H A D | evp_extra_test.c | 1964 size_t maclen; in get_cmac_val() local 1971 || !TEST_true(EVP_DigestSignFinal(mdctx, mac, &maclen)) in get_cmac_val() 1972 || !TEST_size_t_eq(maclen, AES_BLOCK_SIZE)) in get_cmac_val()
|
/dports/security/botan2/Botan-2.18.2/src/tests/ |
H A D | test_sodium.cpp | 210 unsigned long long maclen = 0; in aead_chacha20poly1305() local 212 ctext.data(), mac.data(), &maclen, in.data(), in.size(), in aead_chacha20poly1305() 215 result.test_eq("maclen", size_t(maclen), 16); in aead_chacha20poly1305() 264 unsigned long long maclen = 0; in aead_chacha20poly1305_ietf() local 266 ctext.data(), mac.data(), &maclen, in.data(), in.size(), in aead_chacha20poly1305_ietf() 269 result.test_eq("maclen", size_t(maclen), 16); in aead_chacha20poly1305_ietf() 318 unsigned long long maclen = 0; in aead_xchacha20poly1305() local 320 ctext.data(), mac.data(), &maclen, in.data(), in.size(), in aead_xchacha20poly1305() 323 result.test_eq("maclen", size_t(maclen), 16); in aead_xchacha20poly1305()
|
/dports/security/cargo-audit/rustsec-cargo-audit-v0.15.2/cargo-audit/cargo-crates/openssl-src-111.14.0+1.1.1j/openssl/crypto/pkcs12/ |
H A D | p12_mutl.c | 71 unsigned char *mac, unsigned int *maclen, in pkcs12_gen_mac() argument 132 || !HMAC_Final(hmac, mac, maclen)) { in pkcs12_gen_mac() 144 unsigned char *mac, unsigned int *maclen) in PKCS12_gen_mac() argument 146 return pkcs12_gen_mac(p12, pass, passlen, mac, maclen, NULL); in PKCS12_gen_mac() 153 unsigned int maclen; in PKCS12_verify_mac() local 160 if (!pkcs12_gen_mac(p12, pass, passlen, mac, &maclen, in PKCS12_verify_mac() 166 if ((maclen != (unsigned int)ASN1_STRING_length(macoct)) in PKCS12_verify_mac() 167 || CRYPTO_memcmp(mac, ASN1_STRING_get0_data(macoct), maclen) != 0) in PKCS12_verify_mac() 180 unsigned int maclen; in PKCS12_set_mac() local 192 if (!pkcs12_gen_mac(p12, pass, passlen, mac, &maclen, in PKCS12_set_mac() [all …]
|
H A D | p12_npas.c | 67 unsigned int maclen; in newpass_p12() local 111 if (!PKCS12_gen_mac(p12, newpass, -1, mac, &maclen)) in newpass_p12() 114 if (!ASN1_OCTET_STRING_set(macoct, mac, maclen)) in newpass_p12()
|
/dports/security/cargo-audit/rustsec-cargo-audit-v0.15.2/cargo-audit/cargo-crates/openssl-src-111.14.0+1.1.1j/openssl/include/openssl/ |
H A D | pkcs12.h | 173 unsigned char *mac, unsigned int *maclen);
|
/dports/security/cargo-audit/rustsec-cargo-audit-v0.15.2/cargo-audit/cargo-crates/openssl-src-111.15.0+1.1.1k/openssl/crypto/pkcs12/ |
H A D | p12_mutl.c | 71 unsigned char *mac, unsigned int *maclen, in pkcs12_gen_mac() argument 132 || !HMAC_Final(hmac, mac, maclen)) { in pkcs12_gen_mac() 144 unsigned char *mac, unsigned int *maclen) in PKCS12_gen_mac() argument 146 return pkcs12_gen_mac(p12, pass, passlen, mac, maclen, NULL); in PKCS12_gen_mac() 153 unsigned int maclen; in PKCS12_verify_mac() local 160 if (!pkcs12_gen_mac(p12, pass, passlen, mac, &maclen, in PKCS12_verify_mac() 166 if ((maclen != (unsigned int)ASN1_STRING_length(macoct)) in PKCS12_verify_mac() 167 || CRYPTO_memcmp(mac, ASN1_STRING_get0_data(macoct), maclen) != 0) in PKCS12_verify_mac() 180 unsigned int maclen; in PKCS12_set_mac() local 192 if (!pkcs12_gen_mac(p12, pass, passlen, mac, &maclen, in PKCS12_set_mac() [all …]
|
H A D | p12_npas.c | 67 unsigned int maclen; in newpass_p12() local 111 if (!PKCS12_gen_mac(p12, newpass, -1, mac, &maclen)) in newpass_p12() 114 if (!ASN1_OCTET_STRING_set(macoct, mac, maclen)) in newpass_p12()
|
/dports/security/cargo-audit/rustsec-cargo-audit-v0.15.2/cargo-audit/cargo-crates/openssl-src-111.15.0+1.1.1k/openssl/include/openssl/ |
H A D | pkcs12.h | 173 unsigned char *mac, unsigned int *maclen);
|
/dports/security/cargo-audit/rustsec-cargo-audit-v0.15.2/cargo-audit/cargo-crates/openssl-src-111.16.0+1.1.1l/openssl/crypto/pkcs12/ |
H A D | p12_mutl.c | 71 unsigned char *mac, unsigned int *maclen, in pkcs12_gen_mac() argument 132 || !HMAC_Final(hmac, mac, maclen)) { in pkcs12_gen_mac() 144 unsigned char *mac, unsigned int *maclen) in PKCS12_gen_mac() argument 146 return pkcs12_gen_mac(p12, pass, passlen, mac, maclen, NULL); in PKCS12_gen_mac() 153 unsigned int maclen; in PKCS12_verify_mac() local 160 if (!pkcs12_gen_mac(p12, pass, passlen, mac, &maclen, in PKCS12_verify_mac() 166 if ((maclen != (unsigned int)ASN1_STRING_length(macoct)) in PKCS12_verify_mac() 167 || CRYPTO_memcmp(mac, ASN1_STRING_get0_data(macoct), maclen) != 0) in PKCS12_verify_mac() 180 unsigned int maclen; in PKCS12_set_mac() local 192 if (!pkcs12_gen_mac(p12, pass, passlen, mac, &maclen, in PKCS12_set_mac() [all …]
|
H A D | p12_npas.c | 67 unsigned int maclen; in newpass_p12() local 111 if (!PKCS12_gen_mac(p12, newpass, -1, mac, &maclen)) in newpass_p12() 114 if (!ASN1_OCTET_STRING_set(macoct, mac, maclen)) in newpass_p12()
|
/dports/security/cargo-audit/rustsec-cargo-audit-v0.15.2/cargo-audit/cargo-crates/openssl-src-111.16.0+1.1.1l/openssl/include/openssl/ |
H A D | pkcs12.h | 173 unsigned char *mac, unsigned int *maclen);
|
/dports/security/dropbear/dropbear-2020.81/libtomcrypt/doc/ |
H A D | crypt.tex | 3315 unsigned long *maclen); 3319 The \textit{maclen} parameter specifies the maximum size of the destination buffer, and is updated … 3330 unsigned long *maclen); 3342 unsigned long *maclen); 3392 unsigned long *maclen); 3398 unsigned long *maclen); 3402 The \textit{maclen} parameter specifies the maximum size of the destination buffer, and is updated … 3413 unsigned long *maclen); 3422 unsigned long *maclen); 3434 unsigned long *maclen); [all …]
|
/dports/security/dropbear/dropbear-2020.81/libtomcrypt/src/headers/ |
H A D | tomcrypt_mac.h | 120 int poly1305_done(poly1305_state *st, unsigned char *mac, unsigned long *maclen); 121 …g keylen, const unsigned char *in, unsigned long inlen, unsigned char *mac, unsigned long *maclen); 122 …gned char *key, unsigned long keylen, unsigned char *mac, unsigned long *maclen, const unsigned ch… 123 …*fname, const unsigned char *key, unsigned long keylen, unsigned char *mac, unsigned long *maclen); 131 int blake2smac_done(blake2smac_state *st, unsigned char *mac, unsigned long *maclen); 132 …g keylen, const unsigned char *in, unsigned long inlen, unsigned char *mac, unsigned long *maclen); 133 …gned char *key, unsigned long keylen, unsigned char *mac, unsigned long *maclen, const unsigned ch… 134 …*fname, const unsigned char *key, unsigned long keylen, unsigned char *mac, unsigned long *maclen); 142 int blake2bmac_done(blake2bmac_state *st, unsigned char *mac, unsigned long *maclen); 143 …g keylen, const unsigned char *in, unsigned long inlen, unsigned char *mac, unsigned long *maclen); [all …]
|
/dports/security/dropbear/dropbear-2020.81/libtomcrypt/src/mac/blake2/ |
H A D | blake2bmac.c | 51 int blake2bmac_done(blake2bmac_state *st, unsigned char *mac, unsigned long *maclen) in blake2bmac_done() argument 55 LTC_ARGCHK(maclen != NULL); in blake2bmac_done() 56 LTC_ARGCHK(*maclen >= st->blake2b.outlen); in blake2bmac_done() 58 *maclen = st->blake2b.outlen; in blake2bmac_done()
|
H A D | blake2bmac_file.c | 23 … *fname, const unsigned char *key, unsigned long keylen, unsigned char *mac, unsigned long *maclen) in blake2bmac_file() argument 30 LTC_UNUSED_PARAM(maclen); in blake2bmac_file() 42 LTC_ARGCHK(maclen != NULL); in blake2bmac_file() 48 if ((err = blake2bmac_init(&st, *maclen, key, keylen)) != CRYPT_OK) { in blake2bmac_file() 71 err = blake2bmac_done(&st, mac, maclen); in blake2bmac_file()
|
H A D | blake2bmac_memory.c | 24 …ng keylen, const unsigned char *in, unsigned long inlen, unsigned char *mac, unsigned long *maclen) in blake2bmac_memory() argument 32 LTC_ARGCHK(maclen != NULL); in blake2bmac_memory() 34 if ((err = blake2bmac_init(&st, *maclen, key, keylen)) != CRYPT_OK) { goto LBL_ERR; } in blake2bmac_memory() 36 err = blake2bmac_done(&st, mac, maclen); in blake2bmac_memory()
|