/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl/crypto/dsa/ |
H A D | dsa_gen.c | 142 unsigned char buf[SHA256_DIGEST_LENGTH], buf2[SHA256_DIGEST_LENGTH]; local 216 memcpy(buf2, seed, qsize); 227 if (!EVP_Digest(buf, qsize, buf2, NULL, evpmd, NULL)) 230 md[i] ^= buf2[i];
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wpa_supplicant/src/eap_server/ |
H A D | eap_peap.c | 1201 struct wpabuf *buf, *buf2; local 1215 buf2 = eap_peapv2_tlv_eap_payload(buf); 1216 if (buf2 == NULL) 1219 wpa_hexdump_buf(MSG_DEBUG, "EAP-PEAPv2: Identity Request", buf2); 1223 wpabuf_free(buf2); 1228 wpabuf_head(buf2), wpabuf_len(buf2), 1231 wpabuf_free(buf2);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wpa_supplicant/src/eap_server/ |
H A D | eap_peap.c | 1201 struct wpabuf *buf, *buf2; local 1215 buf2 = eap_peapv2_tlv_eap_payload(buf); 1216 if (buf2 == NULL) 1219 wpa_hexdump_buf(MSG_DEBUG, "EAP-PEAPv2: Identity Request", buf2); 1223 wpabuf_free(buf2); 1228 wpabuf_head(buf2), wpabuf_len(buf2), 1231 wpabuf_free(buf2);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/wpa_supplicant/src/eap_server/ |
H A D | eap_peap.c | 1201 struct wpabuf *buf, *buf2; local 1215 buf2 = eap_peapv2_tlv_eap_payload(buf); 1216 if (buf2 == NULL) 1219 wpa_hexdump_buf(MSG_DEBUG, "EAP-PEAPv2: Identity Request", buf2); 1223 wpabuf_free(buf2); 1228 wpabuf_head(buf2), wpabuf_len(buf2), 1231 wpabuf_free(buf2);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/quagga/ospfd/ |
H A D | ospf_spf.c | 544 char buf2[BUFSIZ]; local 571 inet_ntop (AF_INET, &l->link_data, buf2, BUFSIZ)); 581 inet_ntop (AF_INET, &l->link_data, buf2, BUFSIZ)); 1133 char buf2[BUFSIZ]; 1149 buf2, BUFSIZ)); 1156 buf2, BUFSIZ));
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl-1.0.0q/ssl/ |
H A D | s2_srvr.c | 931 unsigned char *p,*p2,*buf2; local 1076 buf2=OPENSSL_malloc((unsigned int)i); 1077 if (buf2 == NULL) 1082 p2=buf2; 1084 EVP_VerifyUpdate(&ctx,buf2,(unsigned int)i); 1085 OPENSSL_free(buf2);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/fs/ubifs/ |
H A D | recovery.c | 221 void *buf1 = NULL, *buf2 = NULL, *cor1 = NULL, *cor2 = NULL; local 232 err = get_master_node(c, UBIFS_MST_LNUM + 1, &buf2, &mst2, &cor2); 247 offs2 = (void *)mst2 - buf2; 284 offs2 = (void *)mst2 - buf2; 311 vfree(buf2); 328 vfree(buf2);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/security/tomoyo/ |
H A D | file.c | 1086 struct tomoyo_path_info buf2; local 1095 buf2.name = NULL; 1098 !tomoyo_get_realpath(&buf2, path2)) 1110 tomoyo_add_slash(&buf2); 1116 r.param.path2.filename2 = &buf2; 1123 kfree(buf2.name);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/security/tomoyo/ |
H A D | file.c | 1086 struct tomoyo_path_info buf2; local 1095 buf2.name = NULL; 1098 !tomoyo_get_realpath(&buf2, path2)) 1110 tomoyo_add_slash(&buf2); 1116 r.param.path2.filename2 = &buf2; 1123 kfree(buf2.name);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/fs/ubifs/ |
H A D | recovery.c | 221 void *buf1 = NULL, *buf2 = NULL, *cor1 = NULL, *cor2 = NULL; local 232 err = get_master_node(c, UBIFS_MST_LNUM + 1, &buf2, &mst2, &cor2); 247 offs2 = (void *)mst2 - buf2; 284 offs2 = (void *)mst2 - buf2; 311 vfree(buf2); 328 vfree(buf2);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/quagga/ospfd/ |
H A D | ospf_spf.c | 544 char buf2[BUFSIZ]; local 571 inet_ntop (AF_INET, &l->link_data, buf2, BUFSIZ)); 581 inet_ntop (AF_INET, &l->link_data, buf2, BUFSIZ)); 1133 char buf2[BUFSIZ]; 1149 buf2, BUFSIZ)); 1156 buf2, BUFSIZ));
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl-1.0.0q/ssl/ |
H A D | s2_srvr.c | 931 unsigned char *p,*p2,*buf2; local 1076 buf2=OPENSSL_malloc((unsigned int)i); 1077 if (buf2 == NULL) 1082 p2=buf2; 1084 EVP_VerifyUpdate(&ctx,buf2,(unsigned int)i); 1085 OPENSSL_free(buf2);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/quagga/ospfd/ |
H A D | ospf_spf.c | 544 char buf2[BUFSIZ]; local 571 inet_ntop (AF_INET, &l->link_data, buf2, BUFSIZ)); 581 inet_ntop (AF_INET, &l->link_data, buf2, BUFSIZ)); 1133 char buf2[BUFSIZ]; 1149 buf2, BUFSIZ)); 1156 buf2, BUFSIZ));
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl-1.0.0q/ssl/ |
H A D | s2_srvr.c | 931 unsigned char *p,*p2,*buf2; local 1076 buf2=OPENSSL_malloc((unsigned int)i); 1077 if (buf2 == NULL) 1082 p2=buf2; 1084 EVP_VerifyUpdate(&ctx,buf2,(unsigned int)i); 1085 OPENSSL_free(buf2);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl-1.0.0q/apps/ |
H A D | speed.c | 337 unsigned char *buf=NULL,*buf2=NULL; local 643 if ((buf2=(unsigned char *)OPENSSL_malloc((int)BUFSIZE)) == NULL) 1722 AES_ige_encrypt(buf,buf2, 1736 AES_ige_encrypt(buf,buf2, 1750 AES_ige_encrypt(buf,buf2, 1960 ret=RSA_sign(NID_md5_sha1, buf,36, buf2, &rsa_num, rsa_key[j]); 1976 ret=RSA_sign(NID_md5_sha1, buf,36, buf2, 1996 ret=RSA_verify(NID_md5_sha1, buf,36, buf2, rsa_num, rsa_key[j]); 2011 ret=RSA_verify(NID_md5_sha1, buf,36, buf2, 2054 ret=DSA_sign(EVP_PKEY_DSA,buf,20,buf2, [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl/apps/ |
H A D | speed.c | 375 unsigned char *buf = NULL, *buf2 = NULL; local 690 if ((buf2 = (unsigned char *)OPENSSL_malloc((int)BUFSIZE)) == NULL) { 1775 AES_ige_encrypt(buf, buf2, 1788 AES_ige_encrypt(buf, buf2, 1801 AES_ige_encrypt(buf, buf2, 2022 ret = RSA_sign(NID_md5_sha1, buf, 36, buf2, &rsa_num, rsa_key[j]); 2034 ret = RSA_sign(NID_md5_sha1, buf, 36, buf2, 2053 ret = RSA_verify(NID_md5_sha1, buf, 36, buf2, rsa_num, rsa_key[j]); 2064 ret = RSA_verify(NID_md5_sha1, buf, 36, buf2, 2105 ret = DSA_sign(EVP_PKEY_DSA, buf, 20, buf2, [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl/apps/ |
H A D | speed.c | 375 unsigned char *buf = NULL, *buf2 = NULL; local 690 if ((buf2 = (unsigned char *)OPENSSL_malloc((int)BUFSIZE)) == NULL) { 1775 AES_ige_encrypt(buf, buf2, 1788 AES_ige_encrypt(buf, buf2, 1801 AES_ige_encrypt(buf, buf2, 2022 ret = RSA_sign(NID_md5_sha1, buf, 36, buf2, &rsa_num, rsa_key[j]); 2034 ret = RSA_sign(NID_md5_sha1, buf, 36, buf2, 2053 ret = RSA_verify(NID_md5_sha1, buf, 36, buf2, rsa_num, rsa_key[j]); 2064 ret = RSA_verify(NID_md5_sha1, buf, 36, buf2, 2105 ret = DSA_sign(EVP_PKEY_DSA, buf, 20, buf2, [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl-1.0.0q/apps/ |
H A D | speed.c | 337 unsigned char *buf=NULL,*buf2=NULL; local 643 if ((buf2=(unsigned char *)OPENSSL_malloc((int)BUFSIZE)) == NULL) 1722 AES_ige_encrypt(buf,buf2, 1736 AES_ige_encrypt(buf,buf2, 1750 AES_ige_encrypt(buf,buf2, 1960 ret=RSA_sign(NID_md5_sha1, buf,36, buf2, &rsa_num, rsa_key[j]); 1976 ret=RSA_sign(NID_md5_sha1, buf,36, buf2, 1996 ret=RSA_verify(NID_md5_sha1, buf,36, buf2, rsa_num, rsa_key[j]); 2011 ret=RSA_verify(NID_md5_sha1, buf,36, buf2, 2054 ret=DSA_sign(EVP_PKEY_DSA,buf,20,buf2, [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl/apps/ |
H A D | speed.c | 375 unsigned char *buf = NULL, *buf2 = NULL; local 690 if ((buf2 = (unsigned char *)OPENSSL_malloc((int)BUFSIZE)) == NULL) { 1775 AES_ige_encrypt(buf, buf2, 1788 AES_ige_encrypt(buf, buf2, 1801 AES_ige_encrypt(buf, buf2, 2022 ret = RSA_sign(NID_md5_sha1, buf, 36, buf2, &rsa_num, rsa_key[j]); 2034 ret = RSA_sign(NID_md5_sha1, buf, 36, buf2, 2053 ret = RSA_verify(NID_md5_sha1, buf, 36, buf2, rsa_num, rsa_key[j]); 2064 ret = RSA_verify(NID_md5_sha1, buf, 36, buf2, 2105 ret = DSA_sign(EVP_PKEY_DSA, buf, 20, buf2, [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl-1.0.0q/apps/ |
H A D | speed.c | 337 unsigned char *buf=NULL,*buf2=NULL; local 643 if ((buf2=(unsigned char *)OPENSSL_malloc((int)BUFSIZE)) == NULL) 1722 AES_ige_encrypt(buf,buf2, 1736 AES_ige_encrypt(buf,buf2, 1750 AES_ige_encrypt(buf,buf2, 1960 ret=RSA_sign(NID_md5_sha1, buf,36, buf2, &rsa_num, rsa_key[j]); 1976 ret=RSA_sign(NID_md5_sha1, buf,36, buf2, 1996 ret=RSA_verify(NID_md5_sha1, buf,36, buf2, rsa_num, rsa_key[j]); 2011 ret=RSA_verify(NID_md5_sha1, buf,36, buf2, 2054 ret=DSA_sign(EVP_PKEY_DSA,buf,20,buf2, [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/source4/heimdal/lib/krb5/ |
H A D | init_creds_pw.c | 450 char buf1[BUFSIZ], buf2[BUFSIZ]; local 496 password_data[1].data = buf2; 497 password_data[1].length = sizeof(buf2); 508 memset (buf2, 0, sizeof(buf2)); 512 if (strcmp (buf1, buf2) == 0) 515 memset (buf2, 0, sizeof(buf2)); 547 memset (buf2, 0, sizeof(buf2)); [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.5.8/source4/heimdal/lib/krb5/ |
H A D | init_creds_pw.c | 450 char buf1[BUFSIZ], buf2[BUFSIZ]; local 496 password_data[1].data = buf2; 497 password_data[1].length = sizeof(buf2); 508 memset (buf2, 0, sizeof(buf2)); 512 if (strcmp (buf1, buf2) == 0) 515 memset (buf2, 0, sizeof(buf2)); 547 memset (buf2, 0, sizeof(buf2)); [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.5.8/source4/heimdal/lib/krb5/ |
H A D | init_creds_pw.c | 450 char buf1[BUFSIZ], buf2[BUFSIZ]; local 496 password_data[1].data = buf2; 497 password_data[1].length = sizeof(buf2); 508 memset (buf2, 0, sizeof(buf2)); 512 if (strcmp (buf1, buf2) == 0) 515 memset (buf2, 0, sizeof(buf2)); 547 memset (buf2, 0, sizeof(buf2)); [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/busybox/libbb/ |
H A D | lineedit.c | 1726 char buf2[4]; local 1729 buf2[l++] = *prmt_ptr; 1730 buf2[l] = '\0'; 1731 h = strtoul(buf2, &pbuf, 16); 1732 if (h > UCHAR_MAX || (pbuf - buf2) < l) { 1733 buf2[--l] = '\0'; 1738 c = (char)strtoul(buf2, NULL, 16);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/busybox/libbb/ |
H A D | lineedit.c | 1726 char buf2[4]; local 1729 buf2[l++] = *prmt_ptr; 1730 buf2[l] = '\0'; 1731 h = strtoul(buf2, &pbuf, 16); 1732 if (h > UCHAR_MAX || (pbuf - buf2) < l) { 1733 buf2[--l] = '\0'; 1738 c = (char)strtoul(buf2, NULL, 16);
|