/freebsd-10.0-release/crypto/openssl/crypto/pkcs12/ |
H A D | p12_mutl.c | 68 unsigned char *mac, unsigned int *maclen) 103 || !HMAC_Final(&hmac, mac, maclen)) 116 unsigned int maclen; local 121 if (!PKCS12_gen_mac (p12, pass, passlen, mac, &maclen)) { 125 if ((maclen != (unsigned int)p12->mac->dinfo->digest->length) 126 || memcmp (mac, p12->mac->dinfo->digest->data, maclen)) return 0; 136 unsigned int maclen; local 144 if (!PKCS12_gen_mac (p12, pass, passlen, mac, &maclen)) { 148 if (!(M_ASN1_OCTET_STRING_set (p12->mac->dinfo->digest, mac, maclen))) { 67 PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, unsigned char *mac, unsigned int *maclen) argument
|
H A D | p12_npas.c | 112 unsigned int maclen; local 159 if(!PKCS12_gen_mac(p12, newpass, -1, mac, &maclen)) goto saferr; 161 if(!ASN1_OCTET_STRING_set(macnew, mac, maclen)) goto saferr;
|
H A D | pkcs12.h | 226 unsigned char *mac, unsigned int *maclen);
|
/freebsd-10.0-release/contrib/ntp/ntpq/ |
H A D | ntpq.c | 1020 int maclen; local 1033 } if ((maclen = n - shouldbesize) >= MIN_MAC_LEN) { 1036 n, shouldbesize, maclen); 1039 (u_long)ntohl(lpkt[(n - maclen)/sizeof(u_long) - 3]), 1040 (u_long)ntohl(lpkt[(n - maclen)/sizeof(u_long) - 2]), 1041 (u_long)ntohl(lpkt[(n - maclen)/sizeof(u_long) - 1]), 1042 (u_long)ntohl(lpkt[(n - maclen)/sizeof(u_long)]), 1043 (u_long)ntohl(lpkt[(n - maclen)/sizeof(u_long) + 1]), 1044 (u_long)ntohl(lpkt[(n - maclen)/sizeof(u_long) + 2])); 1045 key = ntohl(lpkt[(n - maclen) / sizeo 1223 int maclen = 0; local [all...] |
/freebsd-10.0-release/contrib/ntp/ntpdc/ |
H A D | ntpdc.c | 942 int maclen = 0; local 953 maclen = getkeyid("Keyid: "); 954 if (maclen == 0) { 959 info_auth_keyid = maclen; 977 maclen = authencrypt(info_auth_keyid, (u_int32 *)&qpkt, 979 if (maclen == 0) { 983 return sendpkt((char *)&qpkt, (int)(req_pkt_size + maclen));
|
/freebsd-10.0-release/contrib/ntp/ntpd/ |
H A D | ntp_control.c | 534 int maclen; local 538 maclen = authencrypt(res_keyid, (u_int32 *)&rpkt, 541 CTL_HEADER_LEN + maclen); 564 int maclen; local 655 maclen = rbufp->recv_length - properlen; 657 maclen >= MIN_MAC_LEN && maclen <= MAX_MAC_LEN && 667 rbufp->recv_length, properlen, res_keyid, maclen); 676 rbufp->recv_length - maclen, maclen)) { 852 int maclen; local [all...] |
/freebsd-10.0-release/contrib/mdocml/ |
H A D | roff.c | 705 size_t maclen; local 719 maclen = strcspn(mac + 1, " \\\t\0") + 1; 721 t = (r->current_string = roff_getstrn(r, mac, maclen)) 722 ? ROFF_USERDEF : roffhash_find(mac, maclen); 724 *pos += (int)maclen;
|
/freebsd-10.0-release/sys/dev/e1000/ |
H A D | e1000_82575.h | 104 u32 maclen:7; member in struct:e1000_adv_context_desc::__anon8220::__anon8221
|
/freebsd-10.0-release/crypto/openssh/ |
H A D | packet.c | 1264 u_int maclen, authlen = 0, aadlen = 0, block_size; local 1280 maclen = mac && mac->enabled ? mac->mac_len : 0; 1336 DBG(debug("partial packet: block %d, need %d, maclen %d, authlen %d," 1337 " aadlen %d", block_size, need, maclen, authlen, aadlen)); 1351 * 'maclen' bytes of message authentication code. 1353 if (buffer_len(&active_state->input) < aadlen + need + authlen + maclen)
|
/freebsd-10.0-release/contrib/libpcap/ |
H A D | pcap-linux.c | 3279 unsigned int sk_type, tp_reserve, maclen, tp_hdrlen, netoff, macoff; local 3365 maclen = (sk_type == SOCK_DGRAM) ? 0 : MAX_LINKHEADER_SIZE; 3366 /* XXX: in the kernel maclen is calculated from 3381 netoff = TPACKET_ALIGN(tp_hdrlen + (maclen < 16 ? 16 : maclen)) + tp_reserve; 3393 macoff = netoff - maclen;
|