Searched refs:maclen (Results 1 - 9 of 9) sorted by relevance

/freebsd-9.3-release/crypto/openssl/crypto/pkcs12/
H A Dp12_mutl.c69 unsigned char *mac, unsigned int *maclen)
100 HMAC_Final(&hmac, mac, maclen);
109 unsigned int maclen; local
114 if (!PKCS12_gen_mac(p12, pass, passlen, mac, &maclen)) {
118 if ((maclen != (unsigned int)p12->mac->dinfo->digest->length)
119 || memcmp(mac, p12->mac->dinfo->digest->data, maclen))
131 unsigned int maclen; local
139 if (!PKCS12_gen_mac(p12, pass, passlen, mac, &maclen)) {
143 if (!(M_ASN1_OCTET_STRING_set(p12->mac->dinfo->digest, mac, maclen))) {
68 PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, unsigned char *mac, unsigned int *maclen) argument
H A Dp12_npas.c114 unsigned int maclen; local
166 if (!PKCS12_gen_mac(p12, newpass, -1, mac, &maclen))
170 if (!ASN1_OCTET_STRING_set(macnew, mac, maclen))
H A Dpkcs12.h235 unsigned char *mac, unsigned int *maclen);
/freebsd-9.3-release/contrib/ntp/ntpq/
H A Dntpq.c1074 int maclen; local
1083 maclen = n - shouldbesize;
1084 if (maclen >= (int)MIN_MAC_LEN) {
1087 n, shouldbesize, maclen);
1090 (u_long)ntohl(lpkt[(n - maclen)/sizeof(u_int32) - 3]),
1091 (u_long)ntohl(lpkt[(n - maclen)/sizeof(u_int32) - 2]),
1092 (u_long)ntohl(lpkt[(n - maclen)/sizeof(u_int32) - 1]),
1093 (u_long)ntohl(lpkt[(n - maclen)/sizeof(u_int32)]),
1094 (u_long)ntohl(lpkt[(n - maclen)/sizeof(u_int32) + 1]),
1095 (u_long)ntohl(lpkt[(n - maclen)/sizeo
1236 size_t maclen; local
[all...]
/freebsd-9.3-release/contrib/ntp/ntpdc/
H A Dntpdc.c879 size_t maclen; local
923 * Only ntpd which expects REQ_LEN_NOMAC plus maclen
942 maclen = authencrypt(
944 if (!maclen) {
947 } else if (maclen != (int)(info_auth_hashlen + sizeof(keyid_t))) {
950 maclen, (info_auth_hashlen + sizeof(keyid_t)),
954 return sendpkt(&qpkt, reqsize + maclen);
/freebsd-9.3-release/contrib/ntp/ntpd/
H A Dntp_control.c853 size_t maclen; local
871 maclen = authencrypt(res_keyid, (u_int32 *)&rpkt,
874 CTL_HEADER_LEN + maclen);
1175 size_t maclen; local
1258 maclen = rbufp->recv_length - properlen;
1260 maclen >= MIN_MAC_LEN && maclen <= MAX_MAC_LEN &&
1267 maclen));
1272 rbufp->recv_length - maclen,
1273 maclen)) {
1392 size_t maclen; local
[all...]
/freebsd-9.3-release/sys/dev/e1000/
H A De1000_82575.h104 u32 maclen:7; member in struct:e1000_adv_context_desc::__anon7759::__anon7760
/freebsd-9.3-release/crypto/openssh/
H A Dpacket.c1269 u_int maclen, authlen = 0, aadlen = 0, block_size; local
1285 maclen = mac && mac->enabled ? mac->mac_len : 0;
1345 DBG(debug("partial packet: block %d, need %d, maclen %d, authlen %d,"
1346 " aadlen %d", block_size, need, maclen, authlen, aadlen));
1360 * 'maclen' bytes of message authentication code.
1362 if (buffer_len(&active_state->input) < aadlen + need + authlen + maclen)
/freebsd-9.3-release/contrib/libpcap/
H A Dpcap-linux.c3279 unsigned int sk_type, tp_reserve, maclen, tp_hdrlen, netoff, macoff; local
3365 maclen = (sk_type == SOCK_DGRAM) ? 0 : MAX_LINKHEADER_SIZE;
3366 /* XXX: in the kernel maclen is calculated from
3381 netoff = TPACKET_ALIGN(tp_hdrlen + (maclen < 16 ? 16 : maclen)) + tp_reserve;
3393 macoff = netoff - maclen;

Completed in 129 milliseconds