Searched refs:maclen (Results 1 – 12 of 12) sorted by relevance
/openssl/crypto/pkcs12/ |
H A D | p12_mutl.c | 157 unsigned char *mac, unsigned int *maclen, in pkcs12_gen_mac() argument 276 || !HMAC_Final(hmac, mac, maclen)) { in pkcs12_gen_mac() 289 unsigned char *mac, unsigned int *maclen) in PKCS12_gen_mac() argument 298 unsigned int maclen; in PKCS12_verify_mac() local 336 if ((maclen != (unsigned int)ASN1_STRING_length(macoct)) in PKCS12_verify_mac() 337 || CRYPTO_memcmp(mac, ASN1_STRING_get0_data(macoct), maclen) != 0) in PKCS12_verify_mac() 349 unsigned int maclen; in PKCS12_set_mac() local 369 if (!ASN1_OCTET_STRING_set(macoct, mac, maclen)) { in PKCS12_set_mac() 441 unsigned int maclen; in PKCS12_set_pbmac1_pbkdf2() local 513 if (!pkcs12_gen_mac(p12, pass, passlen, mac, &maclen, in PKCS12_set_pbmac1_pbkdf2() [all …]
|
H A D | p12_npas.c | 68 unsigned int maclen; in newpass_p12() local 117 if (!PKCS12_gen_mac(p12, newpass, -1, mac, &maclen)) in newpass_p12() 120 if (!ASN1_OCTET_STRING_set(macoct, mac, maclen)) in newpass_p12()
|
/openssl/doc/man3/ |
H A D | OSSL_CRMF_pbmp_new.pod | 17 unsigned char **mac, size_t *maclen); 33 I<maclen> reference parameter unless it its NULL. 68 size_t maclen; 72 if (!OSSL_CRMF_pbm_new(pbm, msg, 5, sec, 6, &mac, &maclen))
|
H A D | PKCS12_gen_mac.pod | 14 unsigned char *mac, unsigned int *maclen);
|
H A D | EVP_KDF.pod | 239 =item "maclen" (B<OSSL_KDF_PARAM_MAC_SIZE>) <unsigned integer>
|
/openssl/providers/implementations/signature/ |
H A D | mac_legacy_sig.c | 151 int mac_digest_sign_final(void *vpmacctx, unsigned char *mac, size_t *maclen, in mac_digest_sign_final() argument 159 return EVP_MAC_final(pmacctx->macctx, mac, maclen, macsize); in mac_digest_sign_final()
|
/openssl/include/openssl/ |
H A D | crmf.h.in | 94 unsigned char **mac, size_t *maclen);
|
H A D | pkcs12.h.in | 267 unsigned char *mac, unsigned int *maclen);
|
/openssl/test/ |
H A D | evp_extra_test.c | 2785 size_t maclen = AES_BLOCK_SIZE; in get_cmac_val() local 2792 || !TEST_true(EVP_DigestSignFinal(mdctx, mac, &maclen)) in get_cmac_val() 2793 || !TEST_size_t_eq(maclen, AES_BLOCK_SIZE)) in get_cmac_val() 5350 size_t maclen = 0; in test_signatures_with_engine() local 5402 || !TEST_true(EVP_DigestSignFinal(ctx, NULL, &maclen))) in test_signatures_with_engine() 5405 if (!TEST_ptr(mac = OPENSSL_malloc(maclen))) in test_signatures_with_engine() 5408 if (!TEST_true(EVP_DigestSignFinal(ctx, mac, &maclen))) in test_signatures_with_engine() 5532 size_t maclen = 0; in test_ecx_not_private_key() local 5560 if (EVP_DigestSign(ctx, NULL, &maclen, msg, sizeof(msg)) != 1) in test_ecx_not_private_key() 5563 if (!TEST_ptr(mac = OPENSSL_malloc(maclen))) in test_ecx_not_private_key() [all …]
|
/openssl/doc/man7/ |
H A D | EVP_KDF-SS.pod | 52 =item "maclen" (B<OSSL_KDF_PARAM_MAC_SIZE>) <unsigned integer>
|
H A D | provider-kdf.pod | 181 =item "maclen" (B<OSSL_KDF_PARAM_MAC_SIZE>) <octet string>
|
/openssl/doc/man1/ |
H A D | openssl-kdf.pod.in | 162 openssl kdf -keylen 64 -kdfopt mac:KMAC-128 -kdfopt maclen:20 \
|
Completed in 39 milliseconds