/freebsd-10.1-release/contrib/tcpdump/ |
H A D | print-sunrpc.c | 87 sunrpcrequest_print(register const u_char *bp, register u_int length, argument 115 ipaddr_string(&ip->ip_dst), dstid, length); 122 ip6addr_string(&ip6->ip6_dst), dstid, length); 126 printf("%s.%s > %s.%s: %d", "?", srcid, "?", dstid, length);
|
/freebsd-10.1-release/contrib/telnet/libtelnet/ |
H A D | encrypt.h | 80 int length; member in struct:__anon4566
|
/freebsd-10.1-release/contrib/telnet/telnetd/ |
H A D | authenc.c | 85 telnet_gets(const char *prompt __unused, char *result __unused, int length __unused, int echo __unused)
|
/freebsd-10.1-release/contrib/unbound/ldns/ |
H A D | keyraw.c | 181 uint16_t length; local 190 length = (64 + T * 8); 196 if(len < (size_t)1 + SHA_DIGEST_LENGTH + 3*length) 202 P = BN_bin2bn(key+offset, (int)length, NULL); 203 offset += length; 205 G = BN_bin2bn(key+offset, (int)length, NULL); 206 offset += length; 208 Y = BN_bin2bn(key+offset, (int)length, NULL); 209 offset += length; 252 /* key length a [all...] |
/freebsd-10.1-release/contrib/wpa/src/common/ |
H A D | eapol_common.h | 21 be16 length; member in struct:ieee802_1x_hdr 22 /* followed by length octets of data */ 69 /* followed by key: if packet body length = 44 + key length, then the 71 * if packet body length = 44, key field is absent and key_length
|
/freebsd-10.1-release/contrib/wpa/src/eap_common/ |
H A D | eap_common.c | 16 * eap_hdr_len_valid - Validate EAP header length field 18 * @min_payload: Minimum payload length needed 22 * length field is verified to be large enough to include the header and not 40 len = be_to_host16(hdr->length); 42 wpa_printf(MSG_INFO, "EAP: Invalid EAP length"); 55 * @plen: Pointer to variable to contain the returned payload length 77 len = be_to_host16(hdr->length); 85 "length"); 116 * @payload_len: Payload length in bytes (data after Type) 144 hdr->length [all...] |
/freebsd-10.1-release/crypto/heimdal/appl/telnet/libtelnet/ |
H A D | encrypt.h | 73 int length; member in struct:__anon4932
|
/freebsd-10.1-release/crypto/heimdal/appl/telnet/telnetd/ |
H A D | authenc.c | 76 telnet_gets(char *prompt, char *result, int length, int echo) argument
|
/freebsd-10.1-release/crypto/heimdal/appl/test/ |
H A D | gss_common.c | 47 len = buf->length; 78 buf->length = len; 98 fprintf (stderr, "%.*s\n", (int)status_string.length, 149 (int)name_token.length,
|
/freebsd-10.1-release/crypto/heimdal/lib/gssapi/ |
H A D | gsstool.c | 106 (int)str.length, (char *)str.value); 116 (int)mech_name.length, (char *)mech_name.value); 118 (int)mech_desc.length, (char *)mech_desc.value); 120 (int)sasl_name.length, (char *)sasl_name.value); 159 (int)name.length, (char *)name.value); 161 (int)desc.length, (char *)desc.value); 166 value.length = 0; 168 if (value.length) 170 (int)value.length, (char *)value.value);
|
/freebsd-10.1-release/crypto/heimdal/lib/gssapi/krb5/ |
H A D | process_context_token.c | 46 empty_buffer.length = 0;
|
/freebsd-10.1-release/crypto/heimdal/lib/gssapi/mech/ |
H A D | gss_authorize_localname.c | 102 value.length == user->gn_value.length && 103 memcmp(value.value, user->gn_value.value, user->gn_value.length) == 0) 175 userBuf.length = strlen(user);
|
H A D | mech_locl.h | 71 (buffer)->length = 0; \
|
/freebsd-10.1-release/crypto/heimdal/lib/gssapi/ntlm/ |
H A D | delete_sec_context.c | 57 output_token->length = 0;
|
H A D | release_cred.c | 57 memset(cred->key.data, 0, cred->key.length);
|
/freebsd-10.1-release/crypto/heimdal/lib/hx509/ |
H A D | ca.c | 287 * pathLenConstraint is negative path length constraint is used. 291 * @param pathLenConstraint path length constraint, negative, no 311 * pathLenConstraint is negative path length constraint is used. 315 * @param pathLenConstraint path length constraint, negative, no 485 gn.u.uniformResourceIdentifier.length = strlen(uri); 489 dp.distributionPoint->length, 496 if (dp.distributionPoint->length != size) 661 ASN1_MALLOC_ENCODE(KRB5PrincipalName, os.data, os.length, &p, &size, ret); 666 if (size != os.length) 697 os.length [all...] |
H A D | sel.h | 62 size_t length; member in struct:hx_expr_input
|
/freebsd-10.1-release/crypto/heimdal/lib/krb5/ |
H A D | crypto-arcfour.c | 82 ksign_c.checksum.length = sizeof(ksign_c_data); 147 k1_c.checksum.length = sizeof(k1_c_data); 156 k2_c.checksum.length = sizeof(k2_c_data); 162 cksum.checksum.length = 16; 172 k3_c.checksum.length = sizeof(k3_c_data); 215 k1_c.checksum.length = sizeof(k1_c_data); 224 k2_c.checksum.length = sizeof(k2_c_data); 230 k3_c.checksum.length = sizeof(k3_c_data); 245 cksum.checksum.length = 16;
|
/freebsd-10.1-release/crypto/openssh/ |
H A D | auth2-gss.c | 90 goid.length = len - 2; 143 recv_tok.length = len; /* u_int vs. size_t */ 153 if (send_tok.length != 0) { 155 packet_put_string(send_tok.value, send_tok.length); 162 if (send_tok.length != 0) { 164 packet_put_string(send_tok.value, send_tok.length); 197 recv_tok.length = len; 264 mic.length = len; 270 gssbuf.length = buffer_len(&b);
|
H A D | gss-genr.c | 53 ctx->oid->length == len && 66 ctx->oid->length = len; 75 ssh_gssapi_set_oid_data(ctx, oid->elements, oid->length); 112 buffer_append(&b, msg.value, msg.length); 123 buffer_append(&b, msg.value, msg.length); 219 gssbuf.length = strlen(gssbuf.value); 259 if (oid->length == spnego_oid.length && 260 (memcmp(oid->elements, spnego_oid.elements, oid->length) == 0))
|
H A D | mdoc2man.awk | 45 if(length(retval)) 82 if(length(line)&&!(match(line," $")||prenl)) 135 if(!nospace&&length(line)&&!(match(line," $")||prenl)) 187 if(length(refissue)) 189 if(length(refreport)) { 192 if(length(refdate)) 194 if(length(refopt)) 215 if(!length(name)) 217 if(!length(n)) 365 if(!ext&&!extopt&&length(lin [all...] |
/freebsd-10.1-release/sys/security/audit/ |
H A D | audit_syscalls.c | 75 if ((uap->length <= 0) || (uap->length > audit_qctrl.aq_bufsz)) 101 if (uap->length > MAX_AUDIT_RECORD_SIZE) 104 rec = malloc(uap->length, M_AUDITDATA, M_WAITOK); 106 error = copyin(uap->record, rec, uap->length); 117 error = mac_system_check_audit(td->td_ucred, rec, uap->length); 131 ar->k_ulen = uap->length; 178 if ((uap->length <= 0) || (uap->length > sizeof(union auditon_udata))) 205 error = copyin(uap->data, (void *)&udata, uap->length); [all...] |
/freebsd-10.1-release/usr.sbin/lpr/filters/ |
H A D | lpf.c | 66 static int width = 132; /* default line length */ 67 static int length = 66; /* page length */ variable 68 static int indent; /* indentation length */ 104 length = atoi(&cp[2]); 134 lineno = length; 201 if (++lineno >= length) {
|
/freebsd-10.1-release/usr.sbin/lpr/filters.ru/koi2855/ |
H A D | koi2855.c | 41 int length = 66; variable 73 length = i; 96 lines = length; 98 if (lines >= length) {
|
/freebsd-10.1-release/usr.sbin/ppp/ |
H A D | fsm.h | 145 u_short length; /* Length of packet */ member in struct:fsmheader 175 #define INC_FSM_OPT(ty, length, o) \ 178 (o)->hdr.len = (length); \ 179 (o) = (struct fsm_opt *)((u_char *)(o) + (length)); \
|