mac_len
unsigned int mac_len = 0;
(void) HMAC(EVP_sha1(), key, key_len, data, data_len, mac, &mac_len);
unsigned int mac_len = 0;
(void) HMAC(EVP_md5(), key, key_len, data, data_len, mac, &mac_len);
if (mech_params[mac_len] != 0)
mech_params[mac_len] = try_int(optarg,
addr_to_string(char *prefix, uchar_t *mac, int mac_len, char *buf, int buf_len)
for (i = 0; ((i < (mac_len)) && (n < buf_len)); i++)
size_t pt_len, total_decrypted_len, mac_len, pm_len, pd_len;
mac_len = length - pt_part;
ctx->ccm_processed_mac_len = mac_len;
bcopy(data + pt_part, ctx->ccm_mac_input_buf, mac_len);
int mac_len;
conv_str = _link_aton(str, &mac_len);
if (mac_len != ETHERADDRL) {
vnic_mac_addr_type_t mac_addr_type, uchar_t *mac_addr, uint_t mac_len,
mac_len != 0 || mac_prefix_len != 0 ||
mac_len = ETHERADDRL;
status = i_dladm_vnic_vrrp_mac(vrid, af, mac_addr, mac_len);
if (mac_len > MAXMACADDRLEN)
attr.va_mac_len = mac_len;
if (mac_len > 0)
bcopy(mac_addr, attr.va_mac_addr, mac_len);
Dwarf_Unsigned * mac_len,
*mac_len = head->mc_total_length;
size_t mac_len = AES_BLOCK_LEN;
mac_len = *(CK_MAC_GENERAL_PARAMS *)pMechanism->pParameter;
if (mac_len > AES_BLOCK_LEN) {
ctx->mac_len = mac_len;
if (soft_aes_ctx_sign_verify->mac_len == 0) {
*pulSignedLen = soft_aes_ctx_sign_verify->mac_len;
if (*pulSignedLen < soft_aes_ctx_sign_verify->mac_len) {
*pulSignedLen = soft_aes_ctx_sign_verify->mac_len;
*pulSignedLen = soft_aes_ctx_sign_verify->mac_len;
size_t mac_len; /* digest len in bytes */
size_t mac_len;
*pulSignedLen = soft_des_ctx_sign_verify->mac_len;
soft_des_ctx->mac_len = *((CK_MAC_GENERAL_PARAMS_PTR)
soft_des_ctx->mac_len = DES_MAC_LEN;
if (soft_des_ctx_sign_verify->mac_len == 0) {
*pulSignedLen = soft_des_ctx_sign_verify->mac_len;
if (*pulSignedLen < soft_des_ctx_sign_verify->mac_len) {
*pulSignedLen = soft_des_ctx_sign_verify->mac_len;
len = des_ctx->mac_len;
len = des_ctx->mac_len;
uint8_t *mac, size_t mac_len)
CK_ULONG ck_maclen = mac_len;
if (ck_maclen != mac_len) {
uint8_t *mac, size_t mac_len)
CK_ULONG ck_maclen = mac_len;
else if (ck_maclen != mac_len)
CK_ULONG mac_len = SMB2_SIG_SIZE;
CK_ULONG ck_maclen = mac_len;
else if (ck_maclen != mac_len)
ulong_t mac_len;
mac_len = STRUCT_FGET(in_param, ulMACSize);
if (mac_len > 16 || nonce_len > 13 ||
out_param->ulMACSize = mac_len;
size_t mac_len;
mac_len = CRYPTO_BITS2BYTES(AES_GMAC_TAG_BITS);
mac_len = AES_BLOCK_LEN;
if (mac->cd_length != mac_len)
if (crypto_compare_data(mac, buf, mac_len) != CRYPTO_SUCCESS)
uint8_t *data, size_t data_len, uint8_t *mac, size_t mac_len);
uint8_t *mac, size_t mac_len)
cmac.cd_length = mac_len;
cmac.cd_raw.iov_len = mac_len;
crypto_data_t *input, void *mac_buf, size_t mac_len)
.cd_length = mac_len,
.cd_raw.iov_len = mac_len,
uint8_t *mac, size_t mac_len)
return (smb2_mac(mech, key, key_len, &in_cd, mac, mac_len));
uint_t iv_len, block_size, mac_len = 0;
mac_len = assoc->ipsa_mac_len;
alloclen = padlen + 2 + mac_len;
if (mac_len > 0) {
ASSERT(tailmp->b_wptr + mac_len <= tailmp->b_datap->db_lim);
tailmp->b_wptr += mac_len;
uint_t mac_len = mip->mi_type->mt_addr_length;
if (!mac_unicst_verify((mac_handle_t)mip, mac_addr, mac_len)) {
if (check_dups && bcmp(mip->mi_addr, mac_addr, mac_len) == 0) {
int err = 0, mac_len = 0, mac_slot;
mac_len = create_arg->vc_mac_len;
if (mac_len == 0 || mac_len > MAXMACADDRLEN) {
mac_len = create_arg->vc_mac_len;
if (mac_len > MAXMACADDRLEN) {
&mac_addr_type, &mac_len, mac_addr, &mac_slot, mac_prefix_len,
create_arg->vc_mac_len = mac_len;
vnic_mac_addr_type_t *vnic_addr_type, int *mac_len, uchar_t *mac_addr,
mac_prefix_len, mac_len, mac_addr, flags, diag, vid,
vnic->vn_addr_len = *mac_len;
vnic_mac_addr_type_t mac_addr_type, uint_t mac_len, uchar_t *mac_addr,