/barrelfish-master/lib/openssl-1.0.0d/crypto/ec/ |
H A D | ec_print.c | 65 size_t buf_len=0; local 68 buf_len = EC_POINT_point2oct(group, point, form, 70 if (buf_len == 0) 73 if ((buf = OPENSSL_malloc(buf_len)) == NULL) 76 if (!EC_POINT_point2oct(group, point, form, buf, buf_len, ctx)) 82 ret = BN_bin2bn(buf, buf_len, ret); 94 size_t buf_len=0; local 98 if ((buf_len = BN_num_bytes(bn)) == 0) return NULL; 99 buf = OPENSSL_malloc(buf_len); 120 if (!EC_POINT_oct2point(group, ret, buf, buf_len, ct 141 size_t buf_len=0,i; local [all...] |
H A D | eck_prn.c | 150 size_t buf_len=0, i; local 249 buf_len = (size_t)BN_num_bytes(p); 250 if (buf_len < (i = (size_t)BN_num_bytes(a))) 251 buf_len = i; 252 if (buf_len < (i = (size_t)BN_num_bytes(b))) 253 buf_len = i; 254 if (buf_len < (i = (size_t)BN_num_bytes(gen))) 255 buf_len = i; 256 if (buf_len < (i = (size_t)BN_num_bytes(order))) 257 buf_len [all...] |
H A D | ec_asn1.c | 1214 size_t buf_len=0, tmp_len; local 1233 buf_len = (size_t)BN_num_bytes(a->priv_key); 1234 buffer = OPENSSL_malloc(buf_len); 1248 if (!M_ASN1_OCTET_STRING_set(priv_key->privateKey, buffer, buf_len)) 1277 if (tmp_len > buf_len) 1286 buf_len = tmp_len; 1290 a->conv_form, buffer, buf_len, NULL)) 1299 buf_len)) 1393 size_t buf_len=0; local 1402 buf_len [all...] |
H A D | ec_ameth.c | 431 size_t buf_len=0, i; local 462 buf_len = (size_t)BN_num_bytes(pub_key); 468 if (priv_key && (i = (size_t)BN_num_bytes(priv_key)) > buf_len) 469 buf_len = i; 476 buf_len += 10; 477 if ((buffer = OPENSSL_malloc(buf_len)) == NULL)
|
/barrelfish-master/include/lwip2/netif/ppp/ |
H A D | magic.h | 113 void magic_random_bytes(unsigned char *buf, u32_t buf_len);
|
H A D | magic.c | 162 void magic_random_bytes(unsigned char *buf, u32_t buf_len) { argument 167 while (buf_len > 0) { 175 n = LWIP_MIN(buf_len, MD5_HASH_SIZE); 178 buf_len -= n; 274 void magic_random_bytes(unsigned char *buf, u32_t buf_len) { argument 277 while (buf_len > 0) { 279 n = LWIP_MIN(buf_len, sizeof(new_rand)); 282 buf_len -= n;
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/evp/ |
H A D | bio_b64.c | 82 int buf_len; member in struct:b64_struct 119 ctx->buf_len=0; 160 ctx->buf_len=0; 167 if (ctx->buf_len > 0) 169 OPENSSL_assert(ctx->buf_len >= ctx->buf_off); 170 i=ctx->buf_len-ctx->buf_off; 178 if (ctx->buf_len == ctx->buf_off) 180 ctx->buf_len=0; 330 ctx->buf_len=0; 333 ctx->buf_len [all...] |
H A D | bio_ok.c | 147 size_t buf_len; member in struct:ok_struct 184 ctx->buf_len=0; 229 i=ctx->buf_len-ctx->buf_off; 238 if (ctx->buf_len == ctx->buf_off) 245 ctx->buf_len= ctx->buf_len_save- ctx->buf_off_save; 247 ctx->buf_len); 251 ctx->buf_len=0; 261 n=IOBS- ctx->buf_len; 262 i=BIO_read(b->next_bio,&(ctx->buf[ctx->buf_len]),n); 266 ctx->buf_len [all...] |
H A D | bio_enc.c | 78 int buf_len; member in struct:enc_struct 116 ctx->buf_len=0; 154 if (ctx->buf_len > 0) 156 i=ctx->buf_len-ctx->buf_off; 163 if (ctx->buf_len == ctx->buf_off) 165 ctx->buf_len=0; 189 &(ctx->buf_len)); 202 (unsigned char *)ctx->buf,&ctx->buf_len, 211 if(ctx->buf_len == 0) continue; 214 if (ctx->buf_len < [all...] |
H A D | evp_enc.c | 226 ctx->buf_len=0; 289 if(ctx->buf_len == 0 && (inl&(ctx->block_mask)) == 0) 302 i=ctx->buf_len; 310 ctx->buf_len+=inl; 337 ctx->buf_len=i; 360 bl=ctx->buf_len; 417 if (b > 1 && !ctx->buf_len) 448 if(ctx->buf_len) 458 if (ctx->buf_len || !ctx->final_used)
|
/barrelfish-master/lib/libc/posix1e/ |
H A D | acl_id_to_name.c | 57 _posix1e_acl_id_to_name(acl_tag_t tag, uid_t id, ssize_t buf_len, char *buf, argument 71 i = snprintf(buf, buf_len, "%d", id); 73 i = snprintf(buf, buf_len, "%s", p->pw_name); 87 i = snprintf(buf, buf_len, "%d", id); 89 i = snprintf(buf, buf_len, "%s", g->gr_name);
|
H A D | acl_support.h | 57 int _posix1e_acl_id_to_name(acl_tag_t tag, uid_t id, ssize_t buf_len, 59 int _posix1e_acl_perm_to_string(acl_perm_t perm, ssize_t buf_len,
|
H A D | acl_support.c | 277 _posix1e_acl_perm_to_string(acl_perm_t perm, ssize_t buf_len, char *buf) argument 280 if (buf_len < _POSIX1E_ACL_STRING_PERM_MAXSIZE + 1) {
|
/barrelfish-master/lib/lwip2/src/netif/ppp/ |
H A D | magic.c | 162 void magic_random_bytes(unsigned char *buf, u32_t buf_len) { argument 167 while (buf_len > 0) { 175 n = LWIP_MIN(buf_len, MD5_HASH_SIZE); 178 buf_len -= n; 274 void magic_random_bytes(unsigned char *buf, u32_t buf_len) { argument 277 while (buf_len > 0) { 279 n = LWIP_MIN(buf_len, sizeof(new_rand)); 282 buf_len -= n;
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/pkcs7/ |
H A D | bio_ber.c | 104 int buf_len; member in struct:bio_ber_struct 174 n=ctx->buf_len-j; 180 ctx->buf_len-j; 185 i=BER_BUF_SIZE-ctx->buf_len; 188 i=BIO_read(bio->next_bio,&(ctx->buf[ctx->buf_len]),i); 195 ctx->buf_len+=i; 198 max=ctx->buf_len; 204 if ((ctx->buf_len < BER_BUF_SIZE) && 282 n=ctx->buf_len-ctx->buf_off; 303 (unsigned char *)ctx->buf,&ctx->buf_len, [all...] |
/barrelfish-master/lib/lwip2/src/apps/snmp/ |
H A D | snmp_pbuf_stream.c | 80 snmp_pbuf_stream_writebuf(struct snmp_pbuf_stream* pbuf_stream, const void* buf, u16_t buf_len) argument 82 if (pbuf_stream->length < buf_len) { 86 if (pbuf_take_at(pbuf_stream->pbuf, buf, buf_len, pbuf_stream->offset) != ERR_OK) { 90 pbuf_stream->offset += buf_len; 91 pbuf_stream->length -= buf_len;
|
H A D | snmp_pbuf_stream.h | 62 err_t snmp_pbuf_stream_writebuf(struct snmp_pbuf_stream* pbuf_stream, const void* buf, u16_t buf_len);
|
H A D | snmp_asn1.h | 87 err_t snmp_asn1_dec_raw(struct snmp_pbuf_stream *pbuf_stream, u16_t len, u8_t *buf, u16_t* buf_len, u16_t buf_max_len);
|
H A D | snmp_core.c | 1205 * @param buf_len length of octet string 1210 snmp_decode_bits(const u8_t *buf, u32_t buf_len, u32_t *bit_value) argument 1216 while (buf_len > 0) { 1237 buf_len--; 1278 * @param buf_len max length of the bufffer 1284 snmp_encode_bits(u8_t *buf, u32_t buf_len, u32_t bit_value, u8_t bit_count) argument 1289 while ((buf_len > 0) && (bit_value != 0x00)) { 1306 buf_len--; 1312 buf_len -= len; 1314 while ((len < min_bytes) && (buf_len > [all...] |
/barrelfish-master/lib/openssl-1.0.0d/crypto/rsa/ |
H A D | rsa_ameth.c | 189 size_t buf_len=0; local 191 update_buflen(x->n, &buf_len); 192 update_buflen(x->e, &buf_len); 196 update_buflen(x->d, &buf_len); 197 update_buflen(x->p, &buf_len); 198 update_buflen(x->q, &buf_len); 199 update_buflen(x->dmp1, &buf_len); 200 update_buflen(x->dmq1, &buf_len); 201 update_buflen(x->iqmp, &buf_len); 204 m=(unsigned char *)OPENSSL_malloc(buf_len [all...] |
/barrelfish-master/lib/openssl-1.0.0d/apps/ |
H A D | ecparam.c | 479 size_t buf_len = 0, tmp_len = 0; local 525 if ((tmp_len = (size_t)BN_num_bytes(ec_p)) > buf_len) 526 buf_len = tmp_len; 527 if ((tmp_len = (size_t)BN_num_bytes(ec_a)) > buf_len) 528 buf_len = tmp_len; 529 if ((tmp_len = (size_t)BN_num_bytes(ec_b)) > buf_len) 530 buf_len = tmp_len; 531 if ((tmp_len = (size_t)BN_num_bytes(ec_gen)) > buf_len) 532 buf_len = tmp_len; 533 if ((tmp_len = (size_t)BN_num_bytes(ec_order)) > buf_len) [all...] |
/barrelfish-master/lib/openssl-1.0.0d/crypto/objects/ |
H A D | obj_dat.c | 466 int OBJ_obj2txt(char *buf, int buf_len, const ASN1_OBJECT *a, int no_name) argument 489 BUF_strlcpy(buf,s,buf_len); 557 if (buf && (buf_len > 0)) 560 buf_len--; 574 if (buf_len > 0) 577 buf_len--; 579 BUF_strlcpy(buf,bndec,buf_len); 580 if (i > buf_len) 582 buf += buf_len; 583 buf_len [all...] |
/barrelfish-master/lib/openssl-1.0.0d/crypto/ |
H A D | mem_dbg.c | 715 int buf_len; local 724 buf_len=strlen(buf); 726 if (128 - buf_len - 3 < info_len) 728 memcpy(buf + buf_len, amip->info, 128 - buf_len - 3); 729 buf_len = 128 - 3; 733 BUF_strlcpy(buf + buf_len, amip->info, 734 sizeof buf - buf_len); 735 buf_len = strlen(buf); 737 BIO_snprintf(buf + buf_len, sizeo [all...] |
/barrelfish-master/lib/openssl-1.0.0d/crypto/dh/ |
H A D | dh_ameth.c | 321 size_t buf_len=0; local 337 update_buflen(x->p, &buf_len); 339 if (buf_len == 0) 345 update_buflen(x->g, &buf_len); 346 update_buflen(pub_key, &buf_len); 347 update_buflen(priv_key, &buf_len); 356 m= OPENSSL_malloc(buf_len+10);
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/dsa/ |
H A D | dsa_ameth.c | 434 size_t buf_len=0; local 456 update_buflen(x->p, &buf_len); 457 update_buflen(x->q, &buf_len); 458 update_buflen(x->g, &buf_len); 459 update_buflen(priv_key, &buf_len); 460 update_buflen(pub_key, &buf_len); 462 m=(unsigned char *)OPENSSL_malloc(buf_len+10);
|