/freebsd-11-stable/contrib/nvi/vi/ |
H A D | v_search.c | 351 len = VIP(sp)->klen + MAX(RE_WSTART_LEN, 1) 365 MEMCPY(p, VIP(sp)->keyw, VIP(sp)->klen); 366 p += VIP(sp)->klen;
|
H A D | vi.h | 236 size_t klen; /* Keyword length. */ member in struct:_vi_private
|
/freebsd-11-stable/crypto/openssl/crypto/evp/ |
H A D | openbsd_hw.c | 130 const unsigned char *key, int klen) 143 memcpy(CDATA(ctx)->key, key, klen); 146 CDATA(ctx)->keylen = klen;
|
/freebsd-11-stable/sys/opencrypto/ |
H A D | cryptosoft.c | 322 int klen) 326 klen /= 8; 336 for (k = 0; k < klen; k++) 340 axf->Update(sw->sw_ictx, key, klen); 341 axf->Update(sw->sw_ictx, hmac_ipad_buffer, axf->blocksize - klen); 343 for (k = 0; k < klen; k++) 347 axf->Update(sw->sw_octx, key, klen); 348 axf->Update(sw->sw_octx, hmac_opad_buffer, axf->blocksize - klen); 350 for (k = 0; k < klen; k++) 368 sw->sw_klen = klen; 321 swcr_authprepare(struct auth_hash *axf, struct swcr_data *sw, u_char *key, int klen) argument [all...] |
/freebsd-11-stable/contrib/subversion/subversion/libsvn_ra_serf/ |
H A D | merge.c | 318 apr_ssize_t klen; 322 apr_hash_this(hi, &key, &klen, &val); 325 path.len = klen; 316 apr_ssize_t klen; local
|
H A D | xml.c | 580 apr_ssize_t klen; 584 apr_hash_this(hi, &key, &klen, &val); 585 apr_hash_set(data, key, klen, val); 578 apr_ssize_t klen; local
|
/freebsd-11-stable/usr.sbin/ppp/ |
H A D | chap.c | 135 size_t nlen, klen; local 138 klen = strlen(key); 159 for (f = 0; f < klen; f++) { 169 MD4Update(&MD4context, expkey, klen << 1); 205 for (f = 0; f < klen; f++) { 213 NtPasswordHash(expkey, klen * 2, pwdhash); 218 expkey, klen * 2, ntresponse); 224 GenerateAuthenticatorResponse(expkey, klen * 2, ntresponse, 242 MD5Update(&MD5context, key, klen);
|
H A D | radius.c | 896 const char *key, int klen, const char *nchallenge, 952 if (rad_put_attr(r->cx.rad, RAD_USER_PASSWORD, key, klen) != 0) { 964 if (rad_put_attr(r->cx.rad, RAD_CHAP_PASSWORD, key, klen) != 0 || 976 if (klen != 50) { 977 log_Printf(LogERROR, "CHAP80: Unrecognised key length %d\n", klen); 995 if (klen != sizeof(*keyv2) + 1) { 996 log_Printf(LogERROR, "CHAP81: Unrecognised key length %d\n", klen); 895 radius_Authenticate(struct radius *r, struct authinfo *authp, const char *name, const char *key, int klen, const char *nchallenge, int nclen) argument
|
/freebsd-11-stable/contrib/subversion/subversion/libsvn_fs_x/ |
H A D | caching.c | 322 apr_ssize_t klen, 345 serializer, deserializer, klen, 357 klen, prefix, priority, FALSE, has_namespace, 363 cache_p, serializer, deserializer, klen, pages, 315 create_cache(svn_cache__t **cache_p, svn_memcache_t *memcache, svn_membuffer_t *membuffer, apr_int64_t pages, apr_int64_t items_per_page, svn_cache__serialize_func_t serializer, svn_cache__deserialize_func_t deserializer, apr_ssize_t klen, const char *prefix, apr_uint32_t priority, svn_boolean_t has_namespace, svn_fs_t *fs, svn_boolean_t no_handler, svn_boolean_t dummy_cache, apr_pool_t *result_pool, apr_pool_t *scratch_pool) argument
|
/freebsd-11-stable/contrib/jemalloc/src/ |
H A D | jemalloc.c | 879 malloc_conf_error(const char *msg, const char *k, size_t klen, const char *v, argument 883 malloc_printf("<jemalloc>: %s: %.*s:%.*s\n", msg, (int)klen, k, 913 size_t klen, vlen; local 1006 while (*opts != '\0' && !malloc_conf_next(&opts, &k, &klen, &v, 1009 (sizeof(n)-1 == klen && strncmp(n, k, klen) == 0) 1021 k, klen, v, vlen); \ 1037 k, klen, v, vlen); \ 1051 k, klen, v, vlen); \ 1072 k, klen, [all...] |
/freebsd-11-stable/contrib/subversion/subversion/libsvn_repos/ |
H A D | dump.c | 932 extract_mergeinfo_paths(void *baton, const void *key, apr_ssize_t klen, 939 SVN_ERR(svn_utf__normalize(&normkey, key, klen, &xb->buffer)); 946 apr_pmemdup(xb->buffer.pool, key, klen + 1), klen, 960 filter_mergeinfo_paths(void *baton, const void *key, apr_ssize_t klen, 965 if (apr_hash_get(fb->paths, key, klen)) 966 apr_hash_set(fb->paths, key, klen, NULL); 984 verify_mergeinfo_normalization(void *baton, const void *key, apr_ssize_t klen, 993 SVN_ERR(svn_utf__normalize(&normpath, path, klen, &vb->buffer)); 2255 verify_directory_entry(void *baton, const void *key, apr_ssize_t klen, 928 extract_mergeinfo_paths(void *baton, const void *key, apr_ssize_t klen, void *val, apr_pool_t *iterpool) argument 956 filter_mergeinfo_paths(void *baton, const void *key, apr_ssize_t klen, void *val, apr_pool_t *iterpool) argument 980 verify_mergeinfo_normalization(void *baton, const void *key, apr_ssize_t klen, void *val, apr_pool_t *iterpool) argument 2249 verify_directory_entry(void *baton, const void *key, apr_ssize_t klen, void *val, apr_pool_t *pool) argument 2301 check_name_collision(void *baton, const void *key, apr_ssize_t klen, void *val, apr_pool_t *iterpool) argument [all...] |
H A D | authz_parse.c | 1064 apr_ssize_t klen, 1120 SVN_ERR(expand_group_callback(cb, key, klen, 1140 apr_ssize_t klen, 1196 apr_ssize_t klen, 1274 apr_ssize_t klen, 1062 expand_group_callback(void *baton, const void *key, apr_ssize_t klen, void *value, apr_pool_t *scratch_pool) argument 1138 merge_alias_ace(void *baton, const void *key, apr_ssize_t klen, void *value, apr_pool_t *scratch_pool) argument 1194 array_insert_ace(void *baton, const void *key, apr_ssize_t klen, void *value, apr_pool_t *scratch_pool) argument 1272 update_user_rights(void *baton, const void *key, apr_ssize_t klen, void *value, apr_pool_t *scratch_pool) argument
|
/freebsd-11-stable/crypto/openssh/ |
H A D | cipher.c | 329 int klen; local 386 klen = EVP_CIPHER_CTX_key_length(cc->evp); 387 if (klen > 0 && keylen != (u_int)klen) {
|
/freebsd-11-stable/sys/dev/cxgbe/crypto/ |
H A D | t4_crypto.c | 1741 int klen) 1752 klen /= 8; 1753 if (klen > axf->blocksize) { 1755 axf->Update(&auth_ctx, key, klen); 1757 klen = axf->hashsize; 1759 memcpy(s->hmac.ipad, key, klen); 1761 memset(s->hmac.ipad + klen, 0, axf->blocksize - klen); 1786 ccr_init_gmac_hash(struct ccr_session *s, char *key, int klen) argument 1792 rounds = rijndaelKeySetupEnc(keysched, key, klen); 1740 ccr_init_hmac_digest(struct ccr_session *s, int cri_alg, char *key, int klen) argument 1797 ccr_aes_check_keylen(int alg, int klen) argument 1819 ccr_aes_setkey(struct ccr_session *s, int alg, const void *key, int klen) argument [all...] |
/freebsd-11-stable/contrib/subversion/subversion/libsvn_fs_fs/ |
H A D | caching.c | 300 apr_ssize_t klen, 318 serializer, deserializer, klen, 330 klen, prefix, priority, FALSE, has_namespace, 336 cache_p, serializer, deserializer, klen, pages, 293 create_cache(svn_cache__t **cache_p, svn_memcache_t *memcache, svn_membuffer_t *membuffer, apr_int64_t pages, apr_int64_t items_per_page, svn_cache__serialize_func_t serializer, svn_cache__deserialize_func_t deserializer, apr_ssize_t klen, const char *prefix, apr_uint32_t priority, svn_boolean_t has_namespace, svn_fs_t *fs, svn_boolean_t no_handler, apr_pool_t *result_pool, apr_pool_t *scratch_pool) argument
|
/freebsd-11-stable/usr.sbin/ancontrol/ |
H A D | ancontrol.c | 1274 k->klen = n; 1278 k->klen = strlen(s); 1302 if (!(k->klen==0 || k->klen==5 || k->klen==13)) { 1356 switch (k->klen) { 1368 i, k->klen); 1409 k->klen=0;
|
/freebsd-11-stable/crypto/openssl/crypto/pem/ |
H A D | pem_info.c | 308 unsigned char *kstr, int klen, 372 enc, kstr, klen, cb, u) <= 0) 307 PEM_X509_INFO_write_bio(BIO *bp, X509_INFO *xi, EVP_CIPHER *enc, unsigned char *kstr, int klen, pem_password_cb *cb, void *u) argument
|
/freebsd-11-stable/sbin/gbde/ |
H A D | gbde.c | 208 int kfd, klen, bpos = 0; local 215 klen = read(kfd, buf1, BUFSIZ); 216 if (klen == -1) 221 g_bde_hash_pass(sc, buf1, klen); 267 encrypt_sector(void *d, int len, int klen, void *key) argument 276 error = rijndael_makeKey(&ki, DIR_ENCRYPT, klen, key);
|
/freebsd-11-stable/sys/dev/safe/ |
H A D | safe.c | 643 safe_setup_mackey(struct safe_session *ses, int algo, caddr_t key, int klen) argument 650 for (i = 0; i < klen; i++) 655 MD5Update(&md5ctx, key, klen); 656 MD5Update(&md5ctx, hmac_ipad_buffer, MD5_HMAC_BLOCK_LEN - klen); 660 SHA1Update(&sha1ctx, key, klen); 662 SHA1_HMAC_BLOCK_LEN - klen); 666 for (i = 0; i < klen; i++) 671 MD5Update(&md5ctx, key, klen); 672 MD5Update(&md5ctx, hmac_opad_buffer, MD5_HMAC_BLOCK_LEN - klen); 676 SHA1Update(&sha1ctx, key, klen); [all...] |
/freebsd-11-stable/crypto/openssl/crypto/rsa/ |
H A D | rsa_pmeth.c | 415 int klen = RSA_size(ctx->pkey->pkey.rsa); local 418 if (!RSA_padding_add_PKCS1_OAEP_mgf1(rctx->tbuf, klen, 424 ret = RSA_public_encrypt(klen, rctx->tbuf, out,
|
/freebsd-11-stable/contrib/ldns/ |
H A D | radix.c | 98 node->klen = len; 235 prefix->klen = len; /* redundant */ 658 cur_node->klen, cur_node->data); 668 cur_node->klen); 704 radix_strlen_t cur_len = cur_node->klen; 720 cur_node->klen = 0; 1465 node->klen = 0;
|
/freebsd-11-stable/contrib/apr-util/dbd/ |
H A D | apr_dbd_mysql.c | 1103 size_t klen; local 1142 klen = 0; 1147 ++klen; 1151 ++klen; 1157 if (!strncasecmp(fields[i].field, key, klen)) {
|
/freebsd-11-stable/sys/dev/ubsec/ |
H A D | ubsec.c | 849 ubsec_setup_mackey(struct ubsec_session *ses, int algo, caddr_t key, int klen) argument 855 for (i = 0; i < klen; i++) 860 MD5Update(&md5ctx, key, klen); 861 MD5Update(&md5ctx, hmac_ipad_buffer, MD5_HMAC_BLOCK_LEN - klen); 865 SHA1Update(&sha1ctx, key, klen); 867 SHA1_HMAC_BLOCK_LEN - klen); 871 for (i = 0; i < klen; i++) 876 MD5Update(&md5ctx, key, klen); 877 MD5Update(&md5ctx, hmac_opad_buffer, MD5_HMAC_BLOCK_LEN - klen); 881 SHA1Update(&sha1ctx, key, klen); [all...] |
/freebsd-11-stable/contrib/subversion/subversion/libsvn_wc/ |
H A D | status.c | 1349 apr_ssize_t klen; 1359 klen = item.klen; 1362 child_dirent = apr_hash_get(dirents, key, klen); 1363 child_info = apr_hash_get(nodes, key, klen); 1373 apr_hash_get(conflicts, key, klen) != NULL, 1346 apr_ssize_t klen; local
|
/freebsd-11-stable/contrib/subversion/subversion/libsvn_fs_base/ |
H A D | dag.c | 323 apr_ssize_t klen; 328 apr_hash_this(hi, &key, &klen, &val); 332 apr_hash_set(*entries_p, key, klen, dirent); 320 apr_ssize_t klen; local
|