/freebsd-current/sbin/setkey/ |
H A D | test-pfkey.c | 277 u_int s, i, slen, ilen, len; local 282 slen = sizeof(s); 284 memcpy(buf, &s, slen); 285 memcpy(buf + slen, &i, ilen); 287 len = sizeof(m_sens) + PFKEY_ALIGN8(slen) + PFKEY_ALIGN8(ilen); 292 m_sens.sadb_sens_sens_len = PFKEY_ALIGN8(slen); 299 buf, slen + ilen);
|
/freebsd-current/crypto/openssh/ |
H A D | ssh-rsa.c | 398 size_t slen = 0; local 418 slen = RSA_size(key->rsa); 419 if (slen <= 0 || slen > SSHBUF_MAX_BIGNUM) 430 if ((sig = malloc(slen)) == NULL) { 439 if (len < slen) { 440 size_t diff = slen - len; 443 } else if (len > slen) { 453 (ret = sshbuf_put_string(b, sig, slen)) != 0) 468 freezero(sig, slen); [all...] |
H A D | sshbuf-misc.c | 96 size_t i, slen = 0; local 104 slen = ((sshbuf_len(d) + 2) / 3) * 4 + 1; 105 if ((s = malloc(slen)) == NULL) 107 if (b64_ntop(sshbuf_ptr(d), sshbuf_len(d), s, slen) == -1) { 127 freezero(s, slen);
|
H A D | ssh-pkcs11-helper.c | 188 size_t blen, dlen, slen = 0; local 207 slen = RSA_size(key->rsa); 208 signature = xmalloc(slen); 212 slen = ret; 227 slen = xslen; 240 (r = sshbuf_put_string(msg, signature, slen)) != 0)
|
H A D | ssh-pkcs11-client.c | 258 size_t blen, slen = 0; local 290 if ((r = sshbuf_get_string(msg, &signature, &slen)) != 0) 292 if (slen <= (size_t)RSA_size(rsa)) { 293 memcpy(to, signature, slen); 294 ret = slen; 335 size_t blen, slen = 0; local 373 if ((r = sshbuf_get_string(msg, &signature, &slen)) != 0) 376 ret = d2i_ECDSA_SIG(NULL, &cp, slen);
|
H A D | ssh-xmss.c | 207 size_t slen = 0, len = 0, required_siglen; local 226 smlen = slen = datalen + required_siglen; 227 if ((sig = malloc(slen)) == NULL) 271 freezero(sig, slen);
|
H A D | kexgexs.c | 137 size_t slen, hashlen; local 185 &signature, &slen, hash, hashlen, kex->hostkey_alg)) < 0) 192 (r = sshpkt_put_string(ssh, signature, slen)) != 0 ||
|
H A D | ssh-keysign.c | 186 size_t slen, dlen; local 298 if ((r = sshkey_sign(keys[i], &signature, &slen, data, dlen, 305 if ((r = sshbuf_put_string(b, signature, slen)) != 0)
|
/freebsd-current/crypto/openssl/providers/implementations/kdfs/ |
H A D | tls1_prf.c | 75 const unsigned char *sec, size_t slen, 374 const unsigned char *sec, size_t slen, 383 size_t L_S1 = (slen + 1) / 2; 395 if (!tls1_prf_P_hash(sha1ctx, sec + slen - L_S2, L_S2, 407 if (!tls1_prf_P_hash(mdctx, sec, slen, seed, seed_len, out, olen)) 373 tls1_prf_alg(EVP_MAC_CTX *mdctx, EVP_MAC_CTX *sha1ctx, const unsigned char *sec, size_t slen, const unsigned char *seed, size_t seed_len, unsigned char *out, size_t olen) argument
|
/freebsd-current/share/examples/ipfilter/samples/ |
H A D | proxy.c | 141 int onoff, ofd, slen; local 166 slen = sizeof(usin); 167 (void) getsockname(ofd, (struct sockaddr *)&usin, &slen); 176 slen = sizeof(usin); 177 if (getsockname(ofd, (struct sockaddr *)&usin, &slen))
|
/freebsd-current/sys/netpfil/ipfilter/netinet/ |
H A D | ip_rcmd_pxy.c | 150 int slen = 0; /* silence gcc */ local 251 slen = ip6->ip6_plen; 255 slen = ip->ip_len; 306 ip6->ip6_plen = slen; 309 ip->ip_len = slen;
|
H A D | ip_dns_pxy.c | 262 int slen, blen; local 266 slen = len; 275 if (clen > slen) { 288 slen -= clen;
|
H A D | ip_tftp_pxy.c | 280 u_short slen = 0; /* silence gcc */ local 319 slen = ip->ip_len; 327 slen = ip6->ip6_plen; 387 ip->ip_len = slen; 392 ip6->ip6_plen = slen;
|
/freebsd-current/sys/netinet/libalias/ |
H A D | alias_proxy.c | 289 int slen; local 307 slen = strlen(buffer); 308 switch (slen % 2) { 311 slen += 2; 315 slen += 1; 338 bcopy(p, p + slen, dlen); 339 memcpy(p, buffer, slen); 349 AddSeq(lnk, delta + slen, pip->ip_hl, pip->ip_len, tc->th_seq, 358 pip->ip_len = htons(ntohs(pip->ip_len) + slen);
|
/freebsd-current/usr.bin/sed/ |
H A D | process.c | 385 regoff_t slen; local 403 slen = psl; 431 slen = psl - match[0].rm_eo; 440 slen = -1; 442 slen--; 451 } while (n >= 0 && slen >= 0 && 459 if (slen > 0) 460 cspace(&SS, s, slen, APPEND);
|
/freebsd-current/sys/sys/ |
H A D | qmath.h | 219 #define Q_TOSTR(q, prec, base, s, slen) \ 223 if (Q_LTZ(q) && ((ptrdiff_t)(slen)) > 0) \ 229 if ((_s - (s)) < ((ptrdiff_t)(slen))) \ 234 if (!((_s - (s)) < ((ptrdiff_t)(slen)))) \ 245 if ((_s - (s)) < ((ptrdiff_t)(slen))) \ 254 if ((_s - (s)) < ((ptrdiff_t)(slen))) \ 260 if ((_s - (s)) < ((ptrdiff_t)(slen)) && _r != NULL) \ 264 if (((ptrdiff_t)(slen)) > 0) \
|
/freebsd-current/contrib/wpa/wpa_supplicant/ |
H A D | hs20_supplicant.h | 23 const u8 *data, size_t slen, u8 dialog_token);
|
/freebsd-current/tools/test/stress2/misc/ |
H A D | uma_zalloc_arg.sh | 164 + size_t blen, slen; 167 + slen = strlen(str); 171 + if (blen == slen && strncmp(b, str, slen) == 0)
|
/freebsd-current/contrib/libexecinfo/ |
H A D | backtrace.c | 180 static const size_t slen = sizeof(char *) + 64; /* estimate */ local 190 if ((ptr = calloc(len, slen)) == NULL) 193 size_t psize = len * slen;
|
/freebsd-current/tools/regression/netinet/tcpdrop/ |
H A D | tcpdrop.c | 124 socklen_t slen; local 151 slen = sizeof(sin_local); 152 if (getsockname(sock, (struct sockaddr *)&sin_local, &slen) < 0) {
|
/freebsd-current/tools/tools/kttcp/ |
H A D | kttcp.c | 117 socklen_t slen; local 239 slen = sizeof ss; 240 s2 = accept(s, (struct sockaddr *)&ss, &slen);
|
/freebsd-current/usr.sbin/rpc.tlsservd/ |
H A D | rpc.tlscommon.c | 278 socklen_t slen; local 281 slen = sizeof(struct sockaddr_storage); 282 if (getpeername(s, sad, &slen) < 0)
|
/freebsd-current/lib/libc/rpc/ |
H A D | svc_generic.c | 201 socklen_t slen; local 262 slen = sizeof ss; 263 if (_getpeername(fd, (struct sockaddr *)(void *)&ss, &slen)
|
/freebsd-current/contrib/libedit/ |
H A D | el.c | 529 ssize_t slen; local 575 while ((slen = getline(&ptr, &len, fp)) != -1) { 578 if (slen > 0 && ptr[--slen] == '\n') 579 ptr[slen] = '\0';
|
/freebsd-current/crypto/openssl/apps/lib/ |
H A D | vms_term_sock.c | 299 unsigned int slen; 324 slen = sizeof(sin); 325 memset ((char *) &sin, 0, slen); 333 status = bind (SockDesc1, (struct sockaddr *) &sin, slen); 343 status = getsockname (SockDesc1, (struct sockaddr *) &sin, &slen); 296 unsigned int slen; local
|