/freebsd-current/contrib/tcpdump/ |
H A D | print-ptp.c | 300 print_field(netdissect_options *ndo, const char *st, uint32_t flen, argument 308 switch(flen) {
|
/freebsd-current/contrib/bearssl/src/ssl/ |
H A D | ssl_engine.c | 430 size_t flen; local 432 flen = (size_t)1 << u; 433 if (obuf_len >= flen + MAX_OUT_OVERHEAD 434 && ibuf_len >= flen + MAX_IN_OVERHEAD)
|
/freebsd-current/sys/sys/ |
H A D | kbio.h | 246 char flen; member in struct:fkeyarg
|
/freebsd-current/sys/net/ |
H A D | bpf.c | 782 int flen) 802 if (cmd == BIOCSETF && flen == 1 && 1957 u_int flen; local 1990 flen = fp->bf_len; 1991 if (flen > bpf_maxinsns || (fp->bf_insns == NULL && flen != 0)) 1993 size = flen * sizeof(*fp->bf_insns); 1999 !bpf_validate(filter, flen)) { 2009 jfunc = bpf_jitter(filter, flen); 2044 if (bpf_check_upgrade(cmd, d, filter, flen) ! 781 bpf_check_upgrade(u_long cmd, struct bpf_d *d, struct bpf_insn *fcode, int flen) argument [all...] |
/freebsd-current/contrib/wpa/src/common/ |
H A D | ieee802_11_common.c | 2444 size_t flen, i; local 2450 flen = (rsnxe[0] & 0x0f) + 1; 2451 if (rsnxe + flen > end) 2453 if (flen > 4) 2454 flen = 4; 2455 for (i = 0; i < flen; i++)
|
H A D | wpa_common.c | 3720 size_t flen; local 3722 flen = (capab & 0xff00) ? 2 : 1; 3725 if (wpabuf_tailroom(buf) < 2 + flen) 3727 capab |= flen - 1; /* bit 0-3 = Field length (n - 1) */ 3730 wpabuf_put_u8(buf, flen);
|
/freebsd-current/crypto/openssl/providers/implementations/ciphers/ |
H A D | cipher_chacha20_poly1305_hw.c | 46 unsigned char *fixed, size_t flen) 50 if (flen != CHACHA20_POLY1305_IVLEN) 45 chacha_poly1305_tls_iv_set_fixed(PROV_CIPHER_CTX *bctx, unsigned char *fixed, size_t flen) argument
|
/freebsd-current/crypto/openssh/ |
H A D | ssh-pkcs11-client.c | 253 rsa_encrypt(int flen, const u_char *from, u_char *to, RSA *rsa, int padding) argument 283 (r = sshbuf_put_string(msg, from, flen)) != 0 ||
|
H A D | ssh-pkcs11.c | 422 pkcs11_rsa_private_encrypt(int flen, const u_char *from, u_char *to, RSA *rsa, argument 447 rv = f->C_Sign(si->session, (CK_BYTE *)from, flen, to, &tlen); 457 pkcs11_rsa_private_decrypt(int flen, const u_char *from, u_char *to, RSA *rsa, argument
|
/freebsd-current/contrib/wpa/hostapd/ |
H A D | hostapd_cli.c | 110 int flen; local 120 flen = strlen(ctrl_iface_dir) + strlen(ifname) + 2; 121 cfile = malloc(flen); 124 snprintf(cfile, flen, "%s/%s", ctrl_iface_dir, ifname);
|
/freebsd-current/contrib/file/src/ |
H A D | is_json.c | 425 const unsigned char *ue = uc + b->flen;
|
H A D | softmagic.c | 259 bb.flen, offset, cont_level, 371 bb.fbuf), bb.flen, offset, 838 size_t nbytes = b->flen; 1545 buffer_init(bb, -1, NULL, b->fbuf, b->flen); 1556 bb->fbuf, bb->flen, bb->elen, ms->offset, b->fbuf, 1557 b->flen, b->elen, offset, cont_level); 1890 bb.flen = nbytes - offset;
|
H A D | readcdf.c | 545 size_t nbytes = b->flen;
|
H A D | file.h | 188 size_t flen; member in struct:buffer
|
H A D | encoding.c | 80 size_t nbytes = b->flen;
|
H A D | compress.c | 279 size_t nbytes = b->flen;
|
/freebsd-current/contrib/unbound/validator/ |
H A D | val_sigcrypt.c | 1194 size_t flen[2]; local 1216 fd.rr_len = flen; 1237 flen[0] = d1->rr_len[p1->rr_idx]; 1238 flen[1] = d2->rr_len[p2->rr_idx];
|
/freebsd-current/contrib/bsnmp/snmpd/ |
H A D | config.c | 443 input_getnum(u_int base, u_int flen) argument 450 while (flen == 0 || cnt < flen) {
|
/freebsd-current/sys/cam/ctl/ |
H A D | ctl_tpc.c | 779 int flen; local 794 flen = list->fwd_sense_len; 795 if (flen > 64) { 796 flen = 64; 799 fbuf[1] = 2 + flen; 801 bcopy(&list->fwd_sense_data, &fbuf[4], flen); 802 flen += 4; 804 flen = 0; 810 flen ? SSD_ELEM_DESC : SSD_ELEM_SKIP, flen, fbu [all...] |
/freebsd-current/crypto/openssl/apps/lib/ |
H A D | apps.c | 2652 size_t i, flen = strlen(from) + 1, tlen = strlen(to) + 1; local 2653 tfrom = malloc(sizeof(*tfrom) * (flen + tlen)); 2656 tto = tfrom + flen; 2658 if (!MultiByteToWideChar(CP_ACP, 0, from, flen, (WCHAR *)tfrom, flen)) 2660 for (i = 0; i < flen; i++)
|
/freebsd-current/sys/dev/kbd/ |
H A D | kbd.c | 982 fkeyp->flen = kbd->kb_fkeytab[fkeyp->keynum].len; 995 kbd->kb_fkeytab[fkeyp->keynum].len = min(fkeyp->flen, MAXFK); 1105 if (oldkey->len != newkey->flen ||
|
/freebsd-current/contrib/wpa/src/crypto/ |
H A D | tls_openssl.c | 384 static int cryptoapi_rsa_pub_enc(int flen, const unsigned char *from, argument 392 static int cryptoapi_rsa_pub_dec(int flen, const unsigned char *from, argument 400 static int cryptoapi_rsa_priv_enc(int flen, const unsigned char *from, argument 422 if (flen != 16 /* MD5 */ + 20 /* SHA-1 */) { 443 if ((int) hash_size != flen) { 445 (unsigned) hash_size, flen); 479 static int cryptoapi_rsa_priv_dec(int flen, const unsigned char *from, argument
|
/freebsd-current/sys/dev/usb/wlan/ |
H A D | if_urtw.c | 3951 int actlen, flen, rssi; local 3969 flen = le32toh(rx->flag) & 0xfff; 3970 if (flen > actlen - sizeof(*rx)) 3988 flen = le32toh(rx->flag) & 0xfff; 3989 if (flen > actlen - sizeof(*rx)) 4001 if (flen < IEEE80211_ACK_LEN) 4013 m->m_pkthdr.len = m->m_len = flen - IEEE80211_CRC_LEN;
|
/freebsd-current/contrib/wpa/wpa_supplicant/ |
H A D | wpa_cli.c | 138 int flen, res; 159 flen = os_strlen(ctrl_iface_dir) + os_strlen(ifname) + 2; 160 cfile = os_malloc(flen); 163 res = os_snprintf(cfile, flen, "%s/%s", ctrl_iface_dir, 165 if (os_snprintf_error(flen, res)) {
|
/freebsd-current/contrib/wpa/src/radius/ |
H A D | radius.c | 790 int flen = attr->length - sizeof(*attr); local 791 wpabuf_put_data(eap, attr + 1, flen);
|