/freebsd-9.3-release/crypto/openssl/crypto/pkcs12/ |
H A D | p12_mutl.c | 69 unsigned char *mac, unsigned int *maclen) 100 HMAC_Final(&hmac, mac, maclen); 109 unsigned int maclen; local 114 if (!PKCS12_gen_mac(p12, pass, passlen, mac, &maclen)) { 118 if ((maclen != (unsigned int)p12->mac->dinfo->digest->length) 119 || memcmp(mac, p12->mac->dinfo->digest->data, maclen)) 131 unsigned int maclen; local 139 if (!PKCS12_gen_mac(p12, pass, passlen, mac, &maclen)) { 143 if (!(M_ASN1_OCTET_STRING_set(p12->mac->dinfo->digest, mac, maclen))) { 68 PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, unsigned char *mac, unsigned int *maclen) argument
|
H A D | p12_npas.c | 114 unsigned int maclen; local 166 if (!PKCS12_gen_mac(p12, newpass, -1, mac, &maclen)) 170 if (!ASN1_OCTET_STRING_set(macnew, mac, maclen))
|
H A D | pkcs12.h | 235 unsigned char *mac, unsigned int *maclen);
|
/freebsd-9.3-release/contrib/ntp/ntpq/ |
H A D | ntpq.c | 1074 int maclen; local 1083 maclen = n - shouldbesize; 1084 if (maclen >= (int)MIN_MAC_LEN) { 1087 n, shouldbesize, maclen); 1090 (u_long)ntohl(lpkt[(n - maclen)/sizeof(u_int32) - 3]), 1091 (u_long)ntohl(lpkt[(n - maclen)/sizeof(u_int32) - 2]), 1092 (u_long)ntohl(lpkt[(n - maclen)/sizeof(u_int32) - 1]), 1093 (u_long)ntohl(lpkt[(n - maclen)/sizeof(u_int32)]), 1094 (u_long)ntohl(lpkt[(n - maclen)/sizeof(u_int32) + 1]), 1095 (u_long)ntohl(lpkt[(n - maclen)/sizeo 1236 size_t maclen; local [all...] |
/freebsd-9.3-release/contrib/ntp/ntpdc/ |
H A D | ntpdc.c | 879 size_t maclen; local 923 * Only ntpd which expects REQ_LEN_NOMAC plus maclen 942 maclen = authencrypt( 944 if (!maclen) { 947 } else if (maclen != (int)(info_auth_hashlen + sizeof(keyid_t))) { 950 maclen, (info_auth_hashlen + sizeof(keyid_t)), 954 return sendpkt(&qpkt, reqsize + maclen);
|
/freebsd-9.3-release/contrib/ntp/ntpd/ |
H A D | ntp_control.c | 853 size_t maclen; local 871 maclen = authencrypt(res_keyid, (u_int32 *)&rpkt, 874 CTL_HEADER_LEN + maclen); 1175 size_t maclen; local 1258 maclen = rbufp->recv_length - properlen; 1260 maclen >= MIN_MAC_LEN && maclen <= MAX_MAC_LEN && 1267 maclen)); 1272 rbufp->recv_length - maclen, 1273 maclen)) { 1392 size_t maclen; local [all...] |
/freebsd-9.3-release/sys/dev/e1000/ |
H A D | e1000_82575.h | 104 u32 maclen:7; member in struct:e1000_adv_context_desc::__anon7759::__anon7760
|
/freebsd-9.3-release/crypto/openssh/ |
H A D | packet.c | 1269 u_int maclen, authlen = 0, aadlen = 0, block_size; local 1285 maclen = mac && mac->enabled ? mac->mac_len : 0; 1345 DBG(debug("partial packet: block %d, need %d, maclen %d, authlen %d," 1346 " aadlen %d", block_size, need, maclen, authlen, aadlen)); 1360 * 'maclen' bytes of message authentication code. 1362 if (buffer_len(&active_state->input) < aadlen + need + authlen + maclen)
|
/freebsd-9.3-release/contrib/libpcap/ |
H A D | pcap-linux.c | 3279 unsigned int sk_type, tp_reserve, maclen, tp_hdrlen, netoff, macoff; local 3365 maclen = (sk_type == SOCK_DGRAM) ? 0 : MAX_LINKHEADER_SIZE; 3366 /* XXX: in the kernel maclen is calculated from 3381 netoff = TPACKET_ALIGN(tp_hdrlen + (maclen < 16 ? 16 : maclen)) + tp_reserve; 3393 macoff = netoff - maclen;
|