/freebsd-10-stable/crypto/heimdal/lib/krb5/ |
H A D | mk_req_ext.c | 40 krb5_data *in_data, 81 if (in_data) { 88 in_data->data, 89 in_data->length, 100 in_data->data, 101 in_data->length, 113 in_data->data, 114 in_data->length, 150 krb5_data *in_data, 157 in_data, 37 _krb5_mk_req_internal(krb5_context context, krb5_auth_context *auth_context, const krb5_flags ap_req_options, krb5_data *in_data, krb5_creds *in_creds, krb5_data *outbuf, krb5_key_usage checksum_usage, krb5_key_usage encrypt_usage) argument 147 krb5_mk_req_extended(krb5_context context, krb5_auth_context *auth_context, const krb5_flags ap_req_options, krb5_data *in_data, krb5_creds *in_creds, krb5_data *outbuf) argument [all...] |
H A D | mk_req.c | 41 krb5_data *in_data, 73 in_data, 86 krb5_data *in_data, 111 server, in_data, ccache, outbuf); 37 krb5_mk_req_exact(krb5_context context, krb5_auth_context *auth_context, const krb5_flags ap_req_options, const krb5_principal server, krb5_data *in_data, krb5_ccache ccache, krb5_data *outbuf) argument 81 krb5_mk_req(krb5_context context, krb5_auth_context *auth_context, const krb5_flags ap_req_options, const char *service, const char *hostname, krb5_data *in_data, krb5_ccache ccache, krb5_data *outbuf) argument
|
H A D | rd_cred.c | 58 krb5_data *in_data, 80 ret = decode_KRB_CRED(in_data->data, in_data->length, 330 krb5_data *in_data) 336 ret = krb5_rd_cred(context, auth_context, in_data, &creds, NULL); 56 krb5_rd_cred(krb5_context context, krb5_auth_context auth_context, krb5_data *in_data, krb5_creds ***ret_creds, krb5_replay_data *outdata) argument 327 krb5_rd_cred2(krb5_context context, krb5_auth_context auth_context, krb5_ccache ccache, krb5_data *in_data) argument
|
H A D | sendauth.c | 71 krb5_data *in_data, 161 in_data, 64 krb5_sendauth(krb5_context context, krb5_auth_context *auth_context, krb5_pointer p_fd, const char *appl_version, krb5_principal client, krb5_principal server, krb5_flags ap_req_options, krb5_data *in_data, krb5_creds *in_creds, krb5_ccache ccache, krb5_error **ret_error, krb5_ap_rep_enc_part **rep_result, krb5_creds **out_creds) argument
|
/freebsd-10-stable/crypto/heimdal/lib/gssapi/krb5/ |
H A D | encapsulate.c | 102 const krb5_data *in_data, 110 _gssapi_encap_length (in_data->length, &len, &outer_len, mech); 120 memcpy (p, in_data->data, in_data->length); 132 const krb5_data *in_data, 141 _gsskrb5_encap_length (in_data->length, &len, &outer_len, mech); 151 memcpy (p, in_data->data, in_data->length); 100 _gssapi_encapsulate( OM_uint32 *minor_status, const krb5_data *in_data, gss_buffer_t output_token, const gss_OID mech ) argument 130 _gsskrb5_encapsulate( OM_uint32 *minor_status, const krb5_data *in_data, gss_buffer_t output_token, const void *type, const gss_OID mech ) argument
|
/freebsd-10-stable/contrib/wpa/src/crypto/ |
H A D | tls_internal.c | 326 const struct wpabuf *in_data, 329 return tls_connection_handshake2(tls_ctx, conn, in_data, appl_data, 336 const struct wpabuf *in_data, 350 in_data ? wpabuf_head(in_data) : NULL, 351 in_data ? wpabuf_len(in_data) : 0, 380 const struct wpabuf *in_data, 394 res = tlsv1_server_handshake(conn->server, wpabuf_head(in_data), 395 wpabuf_len(in_data), 324 tls_connection_handshake(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data) argument 334 tls_connection_handshake2(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data, int *need_more_data) argument 378 tls_connection_server_handshake(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data) argument 413 tls_connection_encrypt(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data) argument 459 tls_connection_decrypt(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data) argument 467 tls_connection_decrypt2(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data, int *need_more_data) argument [all...] |
H A D | tls_none.c | 98 const struct wpabuf *in_data, 107 const struct wpabuf *in_data, 116 const struct wpabuf *in_data) 124 const struct wpabuf *in_data) 96 tls_connection_handshake(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data) argument 105 tls_connection_server_handshake(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data) argument 114 tls_connection_encrypt(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data) argument 122 tls_connection_decrypt(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data) argument
|
H A D | tls.h | 325 * @in_data: Input data from TLS server 335 * in_data == %NULL and the library is expected to return ClientHello packet. 337 * to TLS library by calling this function again with in_data pointing to the 350 const struct wpabuf *in_data, 355 const struct wpabuf *in_data, 363 * @in_data: Input data from TLS peer 371 const struct wpabuf *in_data, 378 * @in_data: Plaintext data to be encrypted 387 const struct wpabuf *in_data); 393 * @in_data [all...] |
H A D | tls_nss.c | 448 const struct wpabuf *in_data, 454 in_data ? (unsigned int) wpabuf_len(in_data) : 0); 459 if (in_data && wpabuf_len(in_data) > 0) { 466 conn->pull_buf = os_malloc(wpabuf_len(in_data)); 469 os_memcpy(conn->pull_buf, wpabuf_head(in_data), 470 wpabuf_len(in_data)); 472 conn->pull_buf_len = wpabuf_len(in_data); 495 const struct wpabuf *in_data, 446 tls_connection_handshake(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data) argument 493 tls_connection_server_handshake(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data) argument 502 tls_connection_encrypt(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data) argument 528 tls_connection_decrypt(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data) argument [all...] |
H A D | tls_schannel.c | 313 const struct wpabuf *in_data, 331 (int) wpabuf_len(in_data)); 340 inbufs[0].pvBuffer = (u8 *) wpabuf_head(in_data); 341 inbufs[0].cbBuffer = wpabuf_len(in_data); 460 const struct wpabuf *in_data, 469 const struct wpabuf *in_data) 492 out = wpabuf_alloc(sizes.cbHeader + wpabuf_len(in_data) + 501 wpabuf_put_buf(out, in_data); 502 bufs[1].cbBuffer = wpabuf_len(in_data); 551 const struct wpabuf *in_data) 311 tls_connection_handshake(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data) argument 458 tls_connection_server_handshake(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data) argument 467 tls_connection_encrypt(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data) argument 549 tls_connection_decrypt(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data) argument [all...] |
H A D | tls_gnutls.c | 946 const struct wpabuf *in_data, 956 if (in_data && wpabuf_len(in_data) > 0) { 963 conn->pull_buf = wpabuf_dup(in_data); 1037 const struct wpabuf *in_data, 1040 return tls_connection_handshake(tls_ctx, conn, in_data, appl_data); 1046 const struct wpabuf *in_data) 1051 res = gnutls_record_send(conn->session, wpabuf_head(in_data), 1052 wpabuf_len(in_data)); 1067 const struct wpabuf *in_data) 944 tls_connection_handshake(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data) argument 1035 tls_connection_server_handshake(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data) argument 1044 tls_connection_encrypt(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data) argument 1065 tls_connection_decrypt(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data) argument [all...] |
/freebsd-10-stable/sbin/hastd/ |
H A D | lzf.h | 53 * in_data and write the result to out_data, up to a maximum length 77 lzf_compress (const void *const in_data, unsigned int in_len, 82 * function and stored at location in_data and length in_len. The result 96 lzf_decompress (const void *const in_data, unsigned int in_len,
|
H A D | lzf.c | 99 lzf_compress (const void *const in_data, unsigned int in_len, argument 110 const u8 *ip = (const u8 *)in_data; 157 && ref > (const u8 *)in_data 312 lzf_decompress (const void *const in_data, unsigned int in_len, argument 315 u8 const *ip = (const u8 *)in_data;
|
/freebsd-10-stable/contrib/wpa/src/tls/ |
H A D | tlsv1_client.h | 24 const u8 *in_data, size_t in_len, 28 const u8 *in_data, size_t in_len, 31 const u8 *in_data, size_t in_len,
|
H A D | tlsv1_server.h | 24 const u8 *in_data, size_t in_len, size_t *out_len); 26 const u8 *in_data, size_t in_len, 29 const u8 *in_data, size_t in_len,
|
H A D | tlsv1_record.c | 266 * @in_data: Received data 268 * @out_data: Buffer for output data (must be at least as long as in_data) 272 * Returns: Number of bytes used from in_data on success, 0 if record was not 279 const u8 *in_data, size_t in_len, 294 in_data, in_len); 298 ct = in_data[0]; 299 rlen = WPA_GET_BE16(in_data + 3); 301 "length %d", ct, in_data[1], in_data[2], (int) rlen); 308 if (in_data[ 278 tlsv1_record_receive(struct tlsv1_record_layer *rl, const u8 *in_data, size_t in_len, u8 *out_data, size_t *out_len, u8 *alert) argument [all...] |
H A D | tlsv1_client_read.c | 23 const u8 *in_data, size_t *in_len); 25 const u8 *in_data, size_t *in_len); 27 const u8 *in_data, size_t *in_len); 31 const u8 *in_data, size_t *in_len) 46 pos = in_data; 200 *in_len = end - in_data; 215 const u8 *in_data, size_t *in_len) 231 pos = in_data; 255 return tls_process_server_key_exchange(conn, ct, in_data, 258 return tls_process_certificate_request(conn, ct, in_data, 30 tls_process_server_hello(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 214 tls_process_certificate(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 478 tls_process_server_key_exchange(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 567 tls_process_certificate_request(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 631 tls_process_server_hello_done(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 688 tls_process_server_change_cipher_spec(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 759 tls_process_server_finished(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 890 tls_process_application_data(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len, u8 **out_data, size_t *out_len) argument [all...] |
H A D | tlsv1_server.c | 102 * @in_data: Input data from TLS peer 108 const u8 *in_data, size_t in_len, 116 if (in_data == NULL || in_len == 0) { 121 pos = in_data; 122 end = in_data + in_len; 191 * @in_data: Pointer to plaintext data to be encrypted 201 const u8 *in_data, size_t in_len, 207 in_data, in_len); 210 out_data, out_len, in_data, in_len, &rlen) < 0) { 224 * @in_data 107 tlsv1_server_handshake(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, size_t *out_len) argument 200 tlsv1_server_encrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument 233 tlsv1_server_decrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument [all...] |
H A D | tlsv1_server_read.c | 24 const u8 *in_data, size_t *in_len); 26 u8 ct, const u8 *in_data, 31 const u8 *in_data, size_t *in_len) 48 pos = in_data; 261 *in_len = end - in_data; 278 const u8 *in_data, size_t *in_len) 294 pos = in_data; 328 return tls_process_client_key_exchange(conn, ct, in_data, 471 *in_len = end - in_data; 689 const u8 *in_data, size_ 30 tls_process_client_hello(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 277 tls_process_certificate(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 688 tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 766 tls_process_certificate_verify(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 1012 tls_process_change_cipher_spec(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 1062 tls_process_client_finished(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument [all...] |
H A D | tlsv1_client.c | 130 * @in_data: Input data from TLS peer 140 const u8 *in_data, size_t in_len, 167 wpabuf_put_data(conn->partial_input, in_data, in_len); 168 in_data = wpabuf_head(conn->partial_input); 172 if (in_data == NULL || in_len == 0) 175 pos = in_data; 176 end = in_data + in_len; 264 * @in_data: Pointer to plaintext data to be encrypted 274 const u8 *in_data, size_t in_len, 280 in_data, in_le 139 tlsv1_client_handshake(struct tlsv1_client *conn, const u8 *in_data, size_t in_len, size_t *out_len, u8 **appl_data, size_t *appl_data_len, int *need_more_data) argument 273 tlsv1_client_encrypt(struct tlsv1_client *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument 306 tlsv1_client_decrypt(struct tlsv1_client *conn, const u8 *in_data, size_t in_len, int *need_more_data) argument [all...] |
H A D | tlsv1_record.h | 68 const u8 *in_data, size_t in_len,
|
/freebsd-10-stable/contrib/wpa/src/eap_peer/ |
H A D | eap_tls_common.h | 99 u8 id, const u8 *in_data, size_t in_len, 115 const struct wpabuf *in_data, 119 const struct wpabuf *in_data,
|
H A D | eap_tls_common.c | 345 * @in_data: Next incoming TLS segment 350 const struct wpabuf *in_data) 355 in_len = in_data ? wpabuf_len(in_data) : 0; 393 if (in_data) 394 wpabuf_put_buf(data->tls_in, in_data); 410 * @in_data: Next incoming TLS segment 420 struct eap_ssl_data *data, const struct wpabuf *in_data, 425 if (data->tls_in_left > wpabuf_len(in_data) || data->tls_in) { 427 int res = eap_peer_tls_reassemble_fragment(data, in_data); 349 eap_peer_tls_reassemble_fragment(struct eap_ssl_data *data, const struct wpabuf *in_data) argument 419 eap_peer_tls_data_reassemble( struct eap_ssl_data *data, const struct wpabuf *in_data, int *need_more_input) argument 457 eap_tls_process_input(struct eap_sm *sm, struct eap_ssl_data *data, const u8 *in_data, size_t in_len, struct wpabuf **out_data) argument 608 eap_peer_tls_process_helper(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const u8 *in_data, size_t in_len, struct wpabuf **out_data) argument 890 eap_peer_tls_decrypt(struct eap_sm *sm, struct eap_ssl_data *data, const struct wpabuf *in_data, struct wpabuf **in_decrypted) argument 922 eap_peer_tls_encrypt(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const struct wpabuf *in_data, struct wpabuf **out_data) argument [all...] |
H A D | eap_ttls.c | 1296 const struct wpabuf *in_data, 1307 in_data ? (unsigned long) wpabuf_len(in_data) : 0); 1325 if ((in_data == NULL || wpabuf_len(in_data) == 0) && 1331 if (in_data == NULL || wpabuf_len(in_data) == 0) { 1338 retval = eap_peer_tls_decrypt(sm, &data->ssl, in_data, &in_decrypted); 1370 const u8 *in_data, size_t in_len, 1377 in_data, in_le 1294 eap_ttls_decrypt(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, u8 identifier, const struct wpabuf *in_data, struct wpabuf **out_data) argument 1366 eap_ttls_process_handshake(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, u8 identifier, const u8 *in_data, size_t in_len, struct wpabuf **out_data) argument [all...] |
/freebsd-10-stable/contrib/wpa/src/eap_server/ |
H A D | eap_server_peap.c | 646 struct wpabuf *in_data) 654 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_TLV, in_data, &left); 764 struct wpabuf *in_data) 774 pos = eap_hdr_validate(EAP_VENDOR_MICROSOFT, 0x21, in_data, &left); 894 struct wpabuf *in_data) 902 eap_peap_process_phase2_tlv(sm, data, in_data); 908 eap_peap_process_phase2_soh(sm, data, in_data); 919 hdr = wpabuf_head(in_data); 922 if (wpabuf_len(in_data) > sizeof(*hdr) && *pos == EAP_TYPE_NAK) { 923 left = wpabuf_len(in_data) 644 eap_peap_process_phase2_tlv(struct eap_sm *sm, struct eap_peap_data *data, struct wpabuf *in_data) argument 762 eap_peap_process_phase2_soh(struct eap_sm *sm, struct eap_peap_data *data, struct wpabuf *in_data) argument 892 eap_peap_process_phase2_response(struct eap_sm *sm, struct eap_peap_data *data, struct wpabuf *in_data) argument [all...] |