/freebsd-10-stable/contrib/netbsd-tests/lib/libutil/ |
H A D | t_snprintb.c | 72 int res_len) 79 ATF_REQUIRE_EQ(len, res_len); 80 ATF_REQUIRE_EQ(0, memcmp(res, buf, res_len + 1)); 71 h_snprintb_m(const char *fmt, uint64_t val, int line_max, const char *res, int res_len) argument
|
/freebsd-10-stable/contrib/wpa/src/crypto/ |
H A D | milenage.c | 171 * @res_len: Max length for res; set to used length or 0 on failure 175 u8 *ck, u8 *res, size_t *res_len) 180 if (*res_len < 8) { 181 *res_len = 0; 186 *res_len = 0; 189 *res_len = 8; 266 * @res_len: Variable that will be set to RES length 271 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, 284 *res_len = 8; 285 wpa_hexdump_key(MSG_DEBUG, "Milenage: RES", res, *res_len); 173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument 270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument [all...] |
H A D | milenage.h | 14 u8 *ck, u8 *res, size_t *res_len); 20 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len,
|
H A D | tls_internal.c | 342 size_t res_len, ad_len; local 352 &res_len, &ad, &ad_len, need_more_data); 355 out = wpabuf_alloc_ext_data(res, res_len); 385 size_t res_len; local 395 wpabuf_len(in_data), &res_len); 400 out = wpabuf_alloc_ext_data(res, res_len);
|
/freebsd-10-stable/sbin/camcontrol/ |
H A D | persist.c | 433 uint32_t res_len = 0; local 694 res_len = SPRI_MAX_LEN; 697 res_len = sizeof(struct scsi_per_res_cap); 726 res_len = sizeof(struct scsi_per_res_reg_move) + id_len; 728 res_len = sizeof(struct scsi_per_res_out_parms); 737 res_len += id_len; 738 res_len += 748 res_buf = malloc(res_len); 750 warn("%s: error allocating %d bytes", __func__, res_len); 754 bzero(res_buf, res_len); [all...] |
/freebsd-10-stable/contrib/wpa/src/utils/ |
H A D | common.c | 583 size_t merge_byte_arrays(u8 *res, size_t res_len, argument 589 os_memset(res, 0, res_len); 592 if (src1_len >= res_len) { 593 os_memcpy(res, src1, res_len); 594 return res_len; 602 if (len + src2_len >= res_len) { 603 os_memcpy(res + len, src2, res_len - len); 604 return res_len;
|
H A D | pcsc_funcs.h | 30 unsigned char *res, size_t *res_len,
|
H A D | pcsc_funcs.c | 1308 * @res_len: Variable that will be set to RES length 1318 * buffers and res_len is set to length of received RES value. If USIM reports 1324 unsigned char *res, size_t *res_len, 1391 *res_len = *pos++; 1392 os_memcpy(res, pos, *res_len); 1393 pos += *res_len; 1394 wpa_hexdump(MSG_DEBUG, "SCARD: RES", res, *res_len); 1322 scard_umts_auth(struct scard_data *scard, const unsigned char *_rand, const unsigned char *autn, unsigned char *res, size_t *res_len, unsigned char *ik, unsigned char *ck, unsigned char *auts) argument
|
H A D | common.h | 451 size_t merge_byte_arrays(u8 *res, size_t res_len,
|
/freebsd-10-stable/sys/dev/fdt/ |
H A D | fdt_common.c | 567 int i, max_size, res_len, rv, tuple_size, tuples; local 588 res_len = OF_getproplen(root, "memreserve"); 589 if (res_len <= 0 || res_len > sizeof(reserve)) { 594 if (OF_getprop(root, "memreserve", reserve, res_len) <= 0) { 600 tuples = res_len / tuple_size;
|
/freebsd-10-stable/include/rpcsvc/ |
H A D | pmap_prot.x | 208 % u_int res_len;
|
/freebsd-10-stable/contrib/wpa/src/eap_server/ |
H A D | eap_sim_db.h | 87 u8 *res, size_t *res_len, void *cb_session_ctx);
|
H A D | eap_server_aka.c | 33 size_t res_len; member in struct:eap_aka_data 791 data->ck, data->res, &data->res_len, sm); 964 if (attr->res == NULL || attr->res_len < data->res_len || 965 attr->res_len_bits != data->res_len * 8 || 966 os_memcmp(attr->res, data->res, data->res_len) != 0) { 970 (unsigned long) attr->res_len, 972 (unsigned long) data->res_len * 8);
|
H A D | eap_sim_db.c | 56 size_t res_len; member in struct:eap_sim_db_pending::__anon4870::__anon4872 549 entry->u.aka.res_len = (end - start) / 2; 550 if (entry->u.aka.res_len > EAP_AKA_RES_MAX_LEN) { 552 entry->u.aka.res_len = 0; 555 if (hexstr2bin(start, entry->u.aka.res, entry->u.aka.res_len)) 1311 * @res_len: Buffer for RES length 1328 u8 *res, size_t *res_len, void *cb_session_ctx) 1369 *res_len = entry->u.aka.res_len; 1326 eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument
|
/freebsd-10-stable/contrib/binutils/binutils/ |
H A D | windmc.c | 48 rc_uint_type res_len; member in struct:mc_msg_item 603 mc_generate_bin_item (mc_node_lang *n, rc_uint_type *res_len) argument 608 *res_len = 0; 654 *res_len = (len + 3) & ~3; 725 mi[i].res = mc_generate_bin_item (nl[i], &mi[i].res_len); 726 dta_off += mi[i].res_len; 741 set_windmc_bfd_content (mi[i].res, mi[i].res_off, mi[i].res_len);
|
/freebsd-10-stable/contrib/wpa/src/wps/ |
H A D | wps_common.c | 22 const char *label, u8 *res, size_t res_len) 31 WPA_PUT_BE32(key_bits, res_len * 8); 42 iter = (res_len + SHA256_MAC_LEN - 1) / SHA256_MAC_LEN; 44 left = res_len; 21 wps_kdf(const u8 *key, const u8 *label_prefix, size_t label_prefix_len, const char *label, u8 *res, size_t res_len) argument
|
H A D | wps_i.h | 127 const char *label, u8 *res, size_t res_len);
|
/freebsd-10-stable/contrib/wpa/src/eap_common/ |
H A D | eap_sim_common.c | 235 u8 *res, size_t res_len) 263 while (res_len) { 268 hlen = res_len > SHA256_MAC_LEN ? SHA256_MAC_LEN : res_len; 271 res_len -= hlen; 805 attr->res_len = alen; 232 prf_prime(const u8 *k, const char *seed1, const u8 *seed2, size_t seed2_len, const u8 *seed3, size_t seed3_len, u8 *res, size_t res_len) argument
|
H A D | eap_sim_common.h | 191 size_t next_pseudonym_len, next_reauth_id_len, identity_len, res_len; member in struct:eap_sim_attrs
|
H A D | ikev2_common.h | 327 size_t *res_len);
|
H A D | ikev2_common.c | 494 size_t *res_len) 577 *res_len = decrypted_len; 490 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) argument
|
/freebsd-10-stable/contrib/wpa/wpa_supplicant/ |
H A D | config.c | 60 size_t res_len, *dst_len; local 67 res_len = 0; 71 tmp = wpa_config_parse_string(value, &res_len); 81 (u8 *) tmp, res_len); 84 (u8 *) tmp, res_len); 87 if (data->param3 && res_len < (size_t) data->param3) { 90 (unsigned long) res_len, (long) data->param3); 95 if (data->param4 && res_len > (size_t) data->param4) { 98 (unsigned long) res_len, (long) data->param4); 109 *dst_len = res_len; 1182 size_t res_len; local [all...] |
/freebsd-10-stable/contrib/wpa/hostapd/ |
H A D | hlr_auc_gw.c | 724 size_t res_len; local 733 res_len = EAP_AKA_RES_MAX_LEN; 743 autn, ik, ck, res, &res_len); 753 res_len = EAP_AKA_RES_MAX_LEN; 780 pos += wpa_snprintf_hex(pos, end - pos, res, res_len);
|
/freebsd-10-stable/contrib/wpa/src/eap_peer/ |
H A D | eap_aka.c | 24 size_t res_len; member in struct:eap_aka_data 156 data->autn, data->res, &data->res_len, 191 data->res, &data->res_len, data->auts); 202 data->res_len = EAP_AKA_RES_MAX_LEN; 539 eap_sim_msg_add(msg, EAP_SIM_AT_RES, data->res_len * 8, 540 data->res, data->res_len);
|
/freebsd-10-stable/crypto/heimdal/lib/krb5/ |
H A D | crypto.c | 1882 size_t res_len = (kt->bits + 7) / 8; local 1891 k = malloc(res_len); 1892 if(res_len != 0 && k == NULL) { 1898 ret = _krb5_n_fold(c, len, k, res_len);
|