/freebsd-10.1-release/crypto/openssh/ |
H A D | schnorr.c | 70 const u_char *id, u_int idlen) 91 buffer_put_string(&b, id, idlen); 121 * 'idlen' bytes from 'id' will be included in the signature hash as an anti- 131 const u_char *id, u_int idlen, BIGNUM **r_p, BIGNUM **e_p) 181 id, idlen)) == NULL) { 217 * 'idlen' bytes from 'id' will be included in the signature hash as an anti- 224 const BIGNUM *x, const BIGNUM *g_x, const u_char *id, u_int idlen, 231 x, g_x, id, idlen, &r, &e) != 0) 256 * Signature hash will be salted with 'idlen' bytes from 'id'. 261 int hash_alg, const BIGNUM *g_x, const u_char *id, u_int idlen, 68 schnorr_hash(const BIGNUM *p, const BIGNUM *q, const BIGNUM *g, int hash_alg, const BIGNUM *g_v, const BIGNUM *g_x, const u_char *id, u_int idlen) argument 129 schnorr_sign(const BIGNUM *grp_p, const BIGNUM *grp_q, const BIGNUM *grp_g, int hash_alg, const BIGNUM *x, const BIGNUM *g_x, const u_char *id, u_int idlen, BIGNUM **r_p, BIGNUM **e_p) argument 223 schnorr_sign_buf(const BIGNUM *grp_p, const BIGNUM *grp_q, const BIGNUM *grp_g, const BIGNUM *x, const BIGNUM *g_x, const u_char *id, u_int idlen, u_char **sig, u_int *siglen) argument 260 schnorr_verify(const BIGNUM *grp_p, const BIGNUM *grp_q, const BIGNUM *grp_g, int hash_alg, const BIGNUM *g_x, const u_char *id, u_int idlen, const BIGNUM *r, const BIGNUM *e) argument 361 schnorr_verify_buf(const BIGNUM *grp_p, const BIGNUM *grp_q, const BIGNUM *grp_g, const BIGNUM *g_x, const u_char *id, u_int idlen, const u_char *sig, u_int siglen) argument [all...] |
/freebsd-10.1-release/crypto/openssl/crypto/cms/ |
H A D | cms.h | 186 unsigned char *id, size_t idlen); 207 unsigned char *id, size_t idlen, 223 const unsigned char *id, size_t idlen); 323 CMS_ReceiptRequest *CMS_ReceiptRequest_create0(unsigned char *id, int idlen,
|
H A D | cms_ess.c | 94 CMS_ReceiptRequest *CMS_ReceiptRequest_create0(unsigned char *id, int idlen, argument 106 ASN1_STRING_set0(rr->signedContentIdentifier, id, idlen);
|
H A D | cms_env.c | 416 const unsigned char *id, size_t idlen) 428 tmp_os.length = (int)idlen; 453 unsigned char *id, size_t idlen, 529 ASN1_STRING_set0(kekri->kekid->keyIdentifier, id, idlen); 415 CMS_RecipientInfo_kekri_id_cmp(CMS_RecipientInfo *ri, const unsigned char *id, size_t idlen) argument 451 CMS_add0_recipient_key(CMS_ContentInfo *cms, int nid, unsigned char *key, size_t keylen, unsigned char *id, size_t idlen, ASN1_GENERALIZEDTIME *date, ASN1_OBJECT *otherTypeId, ASN1_TYPE *otherType) argument
|
H A D | cms_smime.c | 628 unsigned char *id, size_t idlen) 643 if (!id || (CMS_RecipientInfo_kekri_id_cmp(ri, id, idlen) == 0)) { 626 CMS_decrypt_set1_key(CMS_ContentInfo *cms, unsigned char *key, size_t keylen, unsigned char *id, size_t idlen) argument
|
/freebsd-10.1-release/sbin/setkey/ |
H A D | test-pfkey.c | 372 u_int idlen = strlen(str), len; local 374 len = sizeof(m_id) + PFKEY_ALIGN8(idlen); 383 str, idlen);
|
/freebsd-10.1-release/sys/fs/nfsclient/ |
H A D | nfs_clport.c | 513 nfscl_fillclid(u_int64_t clval, char *uuid, u_int8_t *cp, u_int16_t idlen) argument 520 if (idlen >= sizeof (u_int64_t)) { 523 idlen -= sizeof (u_int64_t); 530 if (uuidlen > 0 && idlen >= uuidlen) { 533 idlen -= uuidlen; 539 while (idlen > 0) { 541 idlen--;
|
H A D | nfs_clstate.c | 737 u_int16_t idlen = 0; local 742 idlen = strlen(uuid); 743 if (idlen > 0) 744 idlen += sizeof (u_int64_t); 746 idlen += sizeof (u_int64_t) + 16; /* 16 random bytes */ 748 sizeof (struct nfsclclient) + idlen - 1, M_NFSCLCLIENT, 770 clp->nfsc_idlen = idlen;
|
/freebsd-10.1-release/sys/cam/ctl/ |
H A D | ctl_frontend_iscsi.c | 1959 int retval, len, idlen; local 2018 idlen = strlen(target) + strlen(",t,0x0001") + 1; 2019 idlen = roundup2(idlen, 4); 2020 len = sizeof(struct scsi_vpd_device_id) + idlen; 2028 desc->length = idlen; 2029 snprintf(desc->identifier, idlen, "%s,t,0x%4.4x", 2033 idlen = strlen(target) + 1; 2034 idlen = roundup2(idlen, [all...] |
/freebsd-10.1-release/crypto/openssl/ssl/ |
H A D | t1_lib.c | 578 long extlen, idlen, itmp; local 581 idlen = 0; 587 idlen += itmp + 2; 597 if ((long)(limit - ret - 7 - extlen - idlen) < 0) 600 if (extlen + idlen > 0xFFF0) 602 s2n(extlen + idlen + 5, ret); 604 s2n(idlen, ret);
|
/freebsd-10.1-release/crypto/openssl/apps/ |
H A D | cms.c | 1139 int idlen; local 1143 idlen = ASN1_STRING_length(scid); 1145 BIO_dump_indent(out, id, idlen, 4);
|
/freebsd-10.1-release/contrib/wpa/hostapd/ |
H A D | config_file.c | 1883 size_t idlen = os_strlen(pos); local 1884 if (idlen & 1) { 1890 bss->eap_fast_a_id = os_malloc(idlen / 2); 1893 idlen / 2)) { 1899 bss->eap_fast_a_id_len = idlen / 2;
|
/freebsd-10.1-release/sys/fs/nfsserver/ |
H A D | nfs_nfsdserv.c | 3420 int error = 0, idlen; local 3442 idlen = i; 3453 clp->lc_idlen = idlen; 3454 error = nfsrv_mtostr(nd, clp->lc_id, idlen); 3469 clp->lc_name = &clp->lc_id[idlen]; 3692 int error = 0, i, idlen; local 3712 idlen = i; 3722 clp->lc_idlen = idlen; 3723 error = nfsrv_mtostr(nd, clp->lc_id, idlen); 3737 clp->lc_name = &clp->lc_id[idlen]; [all...] |
/freebsd-10.1-release/contrib/sendmail/src/ |
H A D | conf.c | 5387 int idlen; local 5396 idlen = strlen(id) + SyslogPrefixLen; 5425 if ((strlen(newstring) + idlen + 1) < SYSLOG_BUFSIZE) 5481 idlen += 5; /* strlen("[999]"), see below */ 5483 (strlen(begin) + idlen) > SYSLOG_BUFSIZE) 5492 end = begin + SYSLOG_BUFSIZE - idlen - SL_SPLIT; 5505 end = begin + SYSLOG_BUFSIZE - idlen - SL_SPLIT;
|
/freebsd-10.1-release/sys/net/ |
H A D | if_spppsubr.c | 4680 u_char idlen, pwdlen; local 4684 idlen = sppp_strnlen(sp->myauth.name, AUTHNAMELEN); 4687 sizeof idlen, (const char *)&idlen, 4688 (size_t)idlen, sp->myauth.name,
|
/freebsd-10.1-release/sbin/ifconfig/ |
H A D | ifieee80211.c | 3180 int len, ssidmax, idlen; local 3208 idlen = sr->isr_meshid_len; 3211 idlen = sr->isr_ssid_len; 3215 , copy_essid(ssid, ssidmax, idp, idlen)
|