/freebsd-10.0-release/contrib/wpa/src/common/ |
H A D | ieee802_11_common.c | 16 static int ieee802_11_parse_vendor_specific(const u8 *pos, size_t elen, argument 25 if (elen < 4) { 29 (unsigned long) elen); 44 elems->wpa_ie_len = elen; 48 if (elen < 5) { 52 (unsigned long) elen); 65 elems->wmm_len = elen; 69 elems->wmm_tspec_len = elen; 75 pos[4], (unsigned long) elen); 82 elems->wps_ie_len = elen; 165 u8 id, elen; local [all...] |
/freebsd-10.0-release/crypto/openssh/regress/ |
H A D | integrity.sh | 34 elen=0 61 Bad?packet*) elen=`expr $elen + 1`; skip=3;; 68 verbose "test $tid: $ecnt errors: mac $emac padding $epad length $elen" 72 expect=`expr $ecnt - $epad - $elen`
|
/freebsd-10.0-release/contrib/bmake/ |
H A D | arch.c | 722 unsigned int elen = atoi(&memName[sizeof(AR_EFMT1)-1]); local 724 if (elen > MAXPATHLEN) 726 if (fread(memName, elen, 1, arch) != 1) 728 memName[elen] = '\0'; 729 fseek(arch, -elen, SEEK_CUR); 973 unsigned int elen = atoi(&arhPtr->AR_NAME[sizeof(AR_EFMT1)-1]); local 976 if (elen > MAXPATHLEN) { 980 if (fread(ename, elen, 1, arch) != 1) { 984 ename[elen] = '\0'; 990 fseek(arch, -sizeof(struct ar_hdr) - elen, SEEK_CU [all...] |
/freebsd-10.0-release/crypto/openssl/engines/vendor_defns/ |
H A D | sureware.h | 230 * exp is elen bytes long 232 * mlen,elen and dlen are all multiple of sizeof(unsigned long) 235 int elen,const unsigned long *exponent,
|
/freebsd-10.0-release/contrib/wpa/src/eap_peer/ |
H A D | eap_leap.c | 335 size_t elen[5], password_len; local 373 elen[0] = 16; 375 elen[1] = LEAP_CHALLENGE_LEN; 377 elen[2] = LEAP_RESPONSE_LEN; 379 elen[3] = LEAP_CHALLENGE_LEN; 381 elen[4] = LEAP_RESPONSE_LEN; 382 md5_vector(5, addr, elen, key);
|
/freebsd-10.0-release/contrib/wpa/src/radius/ |
H A D | radius.c | 865 size_t elen[3]; local 870 elen[0] = sizeof(tv); 872 elen[1] = len; 874 elen[2] = sizeof(l); 875 md5_vector(3, addr, elen, msg->hdr->authenticator); 955 size_t elen[3]; local 980 elen[0] = secret_len; 983 elen[1] = MD5_MAC_LEN; 985 elen[2] = 2; /* Salt */ 988 elen[ 1017 encrypt_ms_key(const u8 *key, size_t key_len, u16 salt, const u8 *req_authenticator, const u8 *secret, size_t secret_len, u8 *ebuf, size_t *elen) argument 1147 size_t elen; local [all...] |
/freebsd-10.0-release/contrib/bsnmp/lib/ |
H A D | snmpcrypto.c | 272 snmp_get_local_keys(struct snmp_user *user, uint8_t *eid, uint32_t elen) argument 280 if (user == NULL || eid == NULL || elen > SNMP_ENGINE_ID_SIZ) 293 memcpy(authbuf + keylen, eid, elen); 294 memcpy(authbuf + keylen + elen, user->auth_key, keylen); 296 if (EVP_DigestUpdate(&ctx, authbuf, 2 * keylen + elen) != 1 || 383 uint32_t elen __unused)
|
/freebsd-10.0-release/contrib/gcc/ |
H A D | c-cppbuiltin.c | 629 size_t elen = strlen (expansion); local 635 buf = (char *) alloca (mlen + elen + extra); 647 builtin_define_with_value_n (const char *macro, const char *expansion, size_t elen) argument 653 buf = (char *) alloca (mlen + elen + 2); 656 memcpy (buf + mlen + 1, expansion, elen); 657 buf[mlen + elen + 1] = '\0';
|
/freebsd-10.0-release/contrib/apr-util/test/ |
H A D | testbuckets.c | 98 apr_size_t elen = strlen(expect); local 99 char *buf = malloc(elen); 100 apr_size_t len = elen; 106 (long)len, (long)elen); 107 ABTS_ASSERT(tc, msg, len == elen); 216 apr_size_t elen) 225 ABTS_ASSERT(tc, "read expected length", alen == elen); 226 ABTS_STR_NEQUAL(tc, edata, adata, elen); 213 test_bucket_content(abts_case *tc, apr_bucket *e, const char *edata, apr_size_t elen) argument
|
/freebsd-10.0-release/sys/netinet6/ |
H A D | ip6_input.c | 1508 int elen; local 1532 elen = (ip6e->ip6e_len + 2) << 2; 1534 elen = (ip6e->ip6e_len + 1) << 3; 1535 if (off + elen > m->m_len) 1545 elen = (ip6e->ip6e_len + 2) << 2; 1547 elen = (ip6e->ip6e_len + 1) << 3; 1548 if (elen != ext->m_len) { 1560 *mp = sbcreatecontrol((caddr_t)ip6e, elen, 1571 *mp = sbcreatecontrol((caddr_t)ip6e, elen, 1596 off += elen; 1656 size_t elen; local [all...] |
/freebsd-10.0-release/tools/tools/net80211/stumbler/ |
H A D | stumbler.c | 558 int eid, elen; local 562 elen = *data; 567 if (rd < elen) { 573 if (elen == 1 && data[0] == 0) { 577 memcpy(node->ssid, data, elen); 578 node->ssid[elen] = 0; 584 if( elen != 1) 594 if (elen < 6) 610 if (elen < 12) 618 if (elen < (pt [all...] |
/freebsd-10.0-release/contrib/wpa/src/wps/ |
H A D | wps_attr_parse.c | 76 u8 id, elen; local 80 elen = *pos++; 81 if (pos + elen > end) 83 if (wps_set_vendor_ext_wfa_subelem(attr, id, elen, pos) < 0) 85 pos += elen;
|
/freebsd-10.0-release/sbin/setkey/ |
H A D | test-pfkey.c | 521 key_setsadbextbuf(dst, off, ebuf, elen, vbuf, vlen) 523 int off, elen, vlen; 525 memset(dst + off, 0, elen + vlen); 526 memcpy(dst + off, (caddr_t)ebuf, elen); 527 memcpy(dst + off + elen, vbuf, vlen);
|
H A D | parse.y | 1225 setvarbuf(buf, off, ebuf, elen, vbuf, vlen) 1229 int elen; 1234 memcpy(buf + *off, (caddr_t)ebuf, elen); 1235 memcpy(buf + *off + elen, vbuf, vlen); 1236 (*off) += PFKEY_ALIGN8(elen + vlen);
|
/freebsd-10.0-release/contrib/bsnmp/snmp_usm/ |
H A D | usm_snmp.c | 149 uint32_t elen; local 182 sub, eid, &elen, uname) < 0 || 187 if ((uuser = usm_new_user(eid, elen, uname)) == NULL) 301 &elen, uname) < 0) 303 uuser = usm_new_user(eid, elen, uname); 452 uint32_t *elen, char *uname) 462 *elen = i; 451 usm_user_index_decode(const struct asn_oid *oid, uint sub, uint8_t *engine, uint32_t *elen, char *uname) argument
|
/freebsd-10.0-release/contrib/libreadline/ |
H A D | histexpand.c | 370 int ll, elen; local 378 elen = 15; 382 elen = 18; 386 elen = 19; 390 elen = 29; 394 elen = 24; 398 elen = 23; 402 temp = (char *)xmalloc (ll + elen + 3);
|
/freebsd-10.0-release/contrib/wpa/src/ap/ |
H A D | ieee802_11_shared.c | 382 const int elen = 2 + 1 + 10 + 5 + 1; local 394 hapd->time_adv = wpabuf_alloc(elen); 397 pos = wpabuf_put(hapd->time_adv, elen);
|
H A D | gas_serv.c | 897 u16 info_id, elen; local 904 elen = WPA_GET_LE16(pos); 907 if (pos + elen > end) { 914 rx_anqp_query_list(hapd, pos, pos + elen, &qi); 918 rx_anqp_vendor_specific(hapd, pos, pos + elen, &qi); 927 pos += elen;
|
/freebsd-10.0-release/sys/dev/cesa/ |
H A D | cesa.c | 599 unsigned int elen, eskip; local 618 elen = cci->cci_enc ? cci->cci_enc->crd_len : 0; 623 if (elen && mlen && 626 (eskip > (mskip + mlen)) || (mskip > (eskip + elen)))) { 668 if (elen && mlen) { 670 len = MAX(elen + eskip, mlen + mskip) - skip; 671 } else if (elen) { 673 len = elen; 748 if (eskip < cp.cp_size && elen > 0) { 754 MIN(elen, c [all...] |
/freebsd-10.0-release/contrib/binutils/binutils/ |
H A D | resrc.c | 2886 rc_uint_type elen, flags; 2893 elen = windres_get_16 (&wrtarget, mti->length, 2); 2895 if ((offset + elen) > length) 2904 (elen - BIN_MESSAGETABLE_ITEM_SIZE) / 2); 2907 (elen - BIN_MESSAGETABLE_ITEM_SIZE)); 2910 offset += elen; 2883 rc_uint_type elen, flags; local
|
/freebsd-10.0-release/contrib/wpa/src/eapol_supp/ |
H A D | eapol_supp_sm.c | 1195 u16 elen; local 1197 elen = be_to_host16(ehdr->length); 1198 if (elen > plen && elen <= len - sizeof(*hdr)) { 1208 "%d -> %d", (int) plen, elen); 1209 plen = elen;
|
/freebsd-10.0-release/tools/tools/net80211/wesside/wesside/ |
H A D | wesside.c | 709 int eid, elen; local 713 elen = *ptr; 717 if (len < elen) { 727 victim.ssid = (char*) malloc(elen + 1); 733 memcpy(victim.ssid, ptr, elen); 734 victim.ssid[elen] = 0; 740 if( elen != 1) { 749 ptr += elen; 750 len -= elen;
|
/freebsd-10.0-release/contrib/jemalloc/src/ |
H A D | ctl.c | 720 size_t elen, i, j; local 726 elen = (size_t)((uintptr_t)dot - (uintptr_t)elm); 727 if (elen == 0) { 742 if (strlen(child->name) == elen && 743 strncmp(elm, child->name, elen) == 0) { 803 elen = (size_t)((uintptr_t)dot - (uintptr_t)elm);
|
/freebsd-10.0-release/contrib/wpa/wpa_supplicant/ |
H A D | interworking.c | 293 u8 elen, auth_count, a; local 301 elen = *pos++; 302 if (pos + elen > end || elen < 2) { 306 e_end = pos + elen; 310 elen, e->method, auth_count);
|
/freebsd-10.0-release/sys/kgssapi/krb5/ |
H A D | krb5_mech.c | 1046 size_t mlen, tlen, elen, miclen; local 1053 p = krb5_verify_token("\x01\x01", tlen, &mic, &elen, FALSE); 1061 if (elen != tlen) 1607 size_t mlen, tlen, elen, datalen, padlen; local 1619 p = krb5_verify_token("\x02\x01", tlen, &m, &elen, TRUE); 1623 datalen = elen - tlen;
|