/freebsd-10-stable/sbin/hastd/ |
H A D | lzf.h | 53 * in_data and write the result to out_data, up to a maximum length 78 void *out_data, unsigned int out_len); 83 * will be stored at out_data up to a maximum of out_len characters. 97 void *out_data, unsigned int out_len);
|
H A D | lzf.c | 100 void *out_data, unsigned int out_len 111 u8 *op = (u8 *)out_data; 294 return op - (u8 *)out_data; 313 void *out_data, unsigned int out_len) 316 u8 *op = (u8 *)out_data; 383 if (ref < (u8 *)out_data) 404 return op - (u8 *)out_data; 99 lzf_compress(const void *const in_data, unsigned int in_len, void *out_data, unsigned int out_len , LZF_STATE htab ) argument 312 lzf_decompress(const void *const in_data, unsigned int in_len, void *out_data, unsigned int out_len) argument
|
/freebsd-10-stable/crypto/heimdal/lib/gssapi/krb5/ |
H A D | decapsulate.c | 119 * Remove the GSS-API wrapping from `in_token' giving `out_data. 127 krb5_data *out_data, 143 out_data->length = input_token_buffer->length - 145 out_data->data = p; 150 * Remove the GSS-API wrapping from `in_token' giving `out_data. 157 krb5_data *out_data, 174 out_data->length = input_token_buffer->length - 176 out_data->data = p; 124 _gssapi_decapsulate( OM_uint32 *minor_status, gss_buffer_t input_token_buffer, krb5_data *out_data, const gss_OID mech ) argument 155 _gsskrb5_decapsulate(OM_uint32 *minor_status, gss_buffer_t input_token_buffer, krb5_data *out_data, const void *type, gss_OID oid) argument
|
/freebsd-10-stable/contrib/wpa/src/tls/ |
H A D | tlsv1_record.c | 268 * @out_data: Buffer for output data (must be at least as long as in_data) 269 * @out_len: Set to maximum out_data length by caller; used to return the 280 u8 *out_data, size_t *out_len, u8 *alert) 358 out_data, in_len) < 0) { 364 "data", out_data, plen); 386 os_memmove(out_data, out_data + rl->iv_size, 398 padlen = out_data[plen - 1]; 408 if (out_data[i] != padlen) { 412 out_data 278 tlsv1_record_receive(struct tlsv1_record_layer *rl, const u8 *in_data, size_t in_len, u8 *out_data, size_t *out_len, u8 *alert) argument [all...] |
H A D | tlsv1_server.h | 27 u8 *out_data, size_t out_len); 30 u8 *out_data, size_t out_len);
|
H A D | tlsv1_client.h | 29 u8 *out_data, size_t out_len);
|
H A D | tlsv1_record.h | 69 u8 *out_data, size_t *out_len, u8 *alert);
|
H A D | tlsv1_server.c | 193 * @out_data: Pointer to output buffer (encrypted TLS data) 194 * @out_len: Maximum out_data length 195 * Returns: Number of bytes written to out_data, -1 on failure 202 u8 *out_data, size_t out_len) 210 out_data, out_len, in_data, in_len, &rlen) < 0) { 226 * @out_data: Pointer to output buffer (decrypted data from TLS tunnel) 227 * @out_len: Maximum out_data length 228 * Returns: Number of bytes written to out_data, -1 on failure 235 u8 *out_data, size_t out_len) 244 out_pos = out_data; 200 tlsv1_server_encrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument 233 tlsv1_server_decrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument [all...] |
H A D | tlsv1_client_i.h | 82 u8 **out_data, size_t *out_len);
|
H A D | tlsv1_client_read.c | 892 u8 **out_data, size_t *out_len) 911 *out_data = os_malloc(left); 912 if (*out_data) { 913 os_memcpy(*out_data, pos, left); 923 u8 **out_data, size_t *out_len) 983 if (out_data && 984 tls_process_application_data(conn, ct, buf, len, out_data, 890 tls_process_application_data(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len, u8 **out_data, size_t *out_len) argument 921 tlsv1_client_process_handshake(struct tlsv1_client *conn, u8 ct, const u8 *buf, size_t *len, u8 **out_data, size_t *out_len) argument
|
H A D | tlsv1_client.c | 266 * @out_data: Pointer to output buffer (encrypted TLS data) 267 * @out_len: Maximum out_data length 268 * Returns: Number of bytes written to out_data, -1 on failure 275 u8 *out_data, size_t out_len) 283 out_data, out_len, in_data, in_len, &rlen) < 0) { 273 tlsv1_client_encrypt(struct tlsv1_client *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument
|
/freebsd-10-stable/contrib/wpa/src/eap_peer/ |
H A D | eap_tls_common.h | 100 struct wpabuf **out_data); 120 struct wpabuf **out_data);
|
H A D | eap_ttls.c | 969 struct wpabuf **out_data) 978 resp, out_data)) { 1144 struct wpabuf **out_data) 1197 out_data) < 0) 1215 struct wpabuf **out_data) 1250 out_data); 1266 struct wpabuf **out_data) 1281 *out_data = eap_peer_tls_build_ack(identifier, EAP_TYPE_TTLS, 1290 out_data); 1297 struct wpabuf **out_data) 966 eap_ttls_encrypt_response(struct eap_sm *sm, struct eap_ttls_data *data, struct wpabuf *resp, u8 identifier, struct wpabuf **out_data) argument 1138 eap_ttls_process_decrypted(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, u8 identifier, struct ttls_parse_avp *parse, struct wpabuf *in_decrypted, struct wpabuf **out_data) argument 1211 eap_ttls_implicit_identity_request(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, u8 identifier, struct wpabuf **out_data) argument 1264 eap_ttls_phase2_start(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, u8 identifier, struct wpabuf **out_data) argument 1294 eap_ttls_decrypt(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, u8 identifier, const struct wpabuf *in_data, struct wpabuf **out_data) argument 1366 eap_ttls_process_handshake(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, u8 identifier, const u8 *in_data, size_t in_len, struct wpabuf **out_data) argument [all...] |
H A D | eap_tls_common.c | 453 * @out_data: Buffer for returning a pointer to application data (if available) 459 struct wpabuf **out_data) 490 *out_data = appl_data; 507 * @out_data: Buffer for returning the allocated output buffer 512 struct wpabuf **out_data) 553 *out_data = eap_tls_msg_alloc(eap_type, 1 + length_included * 4 + len, 555 if (*out_data == NULL) 558 flags = wpabuf_put(*out_data, 1); 564 wpabuf_put_be32(*out_data, wpabuf_len(data->tls_out)); 567 wpabuf_put_data(*out_data, 457 eap_tls_process_input(struct eap_sm *sm, struct eap_ssl_data *data, const u8 *in_data, size_t in_len, struct wpabuf **out_data) argument 510 eap_tls_process_output(struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, int ret, struct wpabuf **out_data) argument 608 eap_peer_tls_process_helper(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const u8 *in_data, size_t in_len, struct wpabuf **out_data) argument 922 eap_peer_tls_encrypt(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const struct wpabuf *in_data, struct wpabuf **out_data) argument [all...] |
H A D | eap_fast.c | 1102 u8 identifier, struct wpabuf **out_data) 1111 resp, out_data)) { 1144 struct wpabuf **out_data) 1154 req->identifier, out_data); 1159 req->identifier, out_data); 1165 req->identifier, out_data); 1247 out_data); 1255 struct wpabuf **out_data) 1278 req->identifier, NULL, out_data); 1298 in_decrypted, out_data); 1099 eap_fast_encrypt_response(struct eap_sm *sm, struct eap_fast_data *data, struct wpabuf *resp, u8 identifier, struct wpabuf **out_data) argument 1139 eap_fast_process_decrypted(struct eap_sm *sm, struct eap_fast_data *data, struct eap_method_ret *ret, const struct eap_hdr *req, struct wpabuf *decrypted, struct wpabuf **out_data) argument 1251 eap_fast_decrypt(struct eap_sm *sm, struct eap_fast_data *data, struct eap_method_ret *ret, const struct eap_hdr *req, const struct wpabuf *in_data, struct wpabuf **out_data) argument [all...] |
H A D | eap_peap.c | 756 struct wpabuf **out_data) 794 req->identifier, NULL, out_data); 1015 rmsg, out_data)) { 752 eap_peap_decrypt(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, const struct eap_hdr *req, const struct wpabuf *in_data, struct wpabuf **out_data) argument
|
/freebsd-10-stable/crypto/heimdal/lib/krb5/ |
H A D | get_for_creds.c | 87 * in out_data. If hostname == NULL, pick it from server. 90 * @param auth_context the auth context with the key to encrypt the out_data. 96 * @param out_data the resulting credential. 111 krb5_data *out_data) 155 out_data); 173 * @param auth_context the auth context with the key to encrypt the out_data. 179 * @param out_data the resulting credential. 193 krb5_data *out_data) 449 out_data->length = len; 450 out_data 104 krb5_fwd_tgt_creds(krb5_context context, krb5_auth_context auth_context, const char *hostname, krb5_principal client, krb5_principal server, krb5_ccache ccache, int forwardable, krb5_data *out_data) argument 187 krb5_get_forwarded_creds(krb5_context context, krb5_auth_context auth_context, krb5_ccache ccache, krb5_flags flags, const char *hostname, krb5_creds *in_creds, krb5_data *out_data) argument [all...] |
/freebsd-10-stable/crypto/heimdal/kpasswd/ |
H A D | kpasswdd.c | 436 krb5_data *out_data, 562 out_data, 590 krb5_data out_data; local 596 krb5_data_zero (&out_data); 619 if (verify (&auth_context, realms, keytab, &ticket, &out_data, 639 &out_data); 640 memset (out_data.data, 0, out_data.length); 646 krb5_data_free(&out_data); 432 verify(krb5_auth_context *auth_context, krb5_realm *realms, krb5_keytab keytab, krb5_ticket **ticket, krb5_data *out_data, uint16_t *version, int s, struct sockaddr *sa, int sa_size, u_char *msg, size_t len, krb5_address *client_addr) argument
|
/freebsd-10-stable/contrib/telnet/libtelnet/ |
H A D | kerberos5.c | 751 krb5_data out_data; local 799 &out_data); 806 if(!Data(ap, KRB_FORWARD, out_data.data, out_data.length)) {
|
/freebsd-10-stable/contrib/wpa/src/crypto/ |
H A D | tls_nss.c | 451 struct wpabuf *out_data; local 484 out_data = wpabuf_alloc_ext_data(conn->push_buf, conn->push_buf_len); 485 if (out_data == NULL) 489 return out_data;
|
H A D | tls_openssl.c | 2354 struct wpabuf *out_data; local 2390 out_data = wpabuf_alloc(res); 2391 if (out_data == NULL) { 2400 res = res == 0 ? 0 : BIO_read(conn->ssl_out, wpabuf_mhead(out_data), 2409 wpabuf_free(out_data); 2412 wpabuf_put(out_data, res); 2414 return out_data; 2458 struct wpabuf *out_data; local 2463 out_data = openssl_handshake(conn, in_data, server); 2464 if (out_data [all...] |
H A D | tls_gnutls.c | 950 struct wpabuf *out_data; local 1029 out_data = conn->push_buf; 1031 return out_data;
|
/freebsd-10-stable/crypto/heimdal/appl/telnet/libtelnet/ |
H A D | kerberos5.c | 793 krb5_data out_data; local 843 &out_data); 851 if(!Data(ap, KRB_FORWARD, out_data.data, out_data.length)) {
|
/freebsd-10-stable/sys/dev/tws/ |
H A D | tws_user.c | 154 goto out_data; 185 out_data:
|
/freebsd-10-stable/crypto/heimdal/appl/rsh/ |
H A D | rsh.c | 168 krb5_data out_data; local 214 &out_data); 223 &out_data); 224 krb5_data_free (&out_data);
|