/freebsd-11-stable/contrib/file/src/ |
H A D | buffer.c | 52 b->elen = 0; 66 if (b->elen != 0) 67 return b->elen == FILE_BADSIZE ? -1 : 0; 72 b->elen = CAST(size_t, b->st.st_size) < b->flen ? 74 if ((b->ebuf = malloc(b->elen)) == NULL) 77 b->eoff = b->st.st_size - b->elen; 78 if (pread(b->fd, b->ebuf, b->elen, b->eoff) == -1) { 86 b->elen = FILE_BADSIZE;
|
/freebsd-11-stable/contrib/wpa/src/ap/ |
H A D | taxonomy.c | 60 u16 id, elen; local 63 elen = WPA_GET_BE16(data + 2); 67 if (elen > data_len) 72 size_t n = (elen < name_len) ? elen : name_len; 77 data += elen; 78 data_len -= elen; 124 u8 id, elen; local 128 elen = *ie++; 131 if (elen > ie_le [all...] |
H A D | ieee802_11_shared.c | 633 const int elen = 2 + 1 + 10 + 5 + 1; local 645 hapd->time_adv = wpabuf_alloc(elen); 648 pos = wpabuf_put(hapd->time_adv, elen); 822 size_t elen; local 831 elen = hostapd_eid_owe_trans_len(hapd); 832 if (len < elen) { 839 *pos++ = elen - 2;
|
/freebsd-11-stable/contrib/wpa/src/common/ |
H A D | ieee802_11_common.c | 20 static int ieee802_11_parse_vendor_specific(const u8 *pos, size_t elen, argument 29 if (elen < 4) { 33 (unsigned long) elen); 48 elems->wpa_ie_len = elen; 52 if (elen < 5) { 56 (unsigned long) elen); 69 elems->wmm_len = elen; 73 elems->wmm_tspec_len = elen; 79 pos[4], (unsigned long) elen); 86 elems->wps_ie_len = elen; 192 ieee802_11_parse_extension(const u8 *pos, size_t elen, struct ieee802_11_elems *elems, int show_errors) argument 319 u8 id = elem->id, elen = elem->datalen; local [all...] |
/freebsd-11-stable/crypto/openssh/regress/ |
H A D | integrity.sh | 25 elen=0 59 Bad?packet*) elen=`expr $elen + 1`; skip=3;; 66 verbose "test $tid: $ecnt errors: mac $emac padding $epad length $elen" 70 expect=`expr $ecnt - $epad - $elen`
|
/freebsd-11-stable/contrib/wpa/wpa_supplicant/ |
H A D | wifi_display.c | 390 u16 elen; local 402 elen = WPA_GET_BE16(buf + i + 1); 403 if (i + WIFI_DISPLAY_SUBELEM_HEADER_LEN + elen > buflen) 415 if (elen > 1000) 417 subelem = os_zalloc(2 * elen + 1); 420 wpa_snprintf_hex(subelem, 2 * elen + 1, 423 elen); 427 i += elen + WIFI_DISPLAY_SUBELEM_HEADER_LEN;
|
H A D | mbo.c | 438 u8 id, elen; local 450 elen = *pos++; 453 if (elen > len) 458 if (elen != 1) 469 if (elen != 1) 476 if (elen != 2) 511 pos += elen; 512 len -= elen; 530 id, elen, len);
|
H A D | wnm_sta.c | 423 u8 id, u8 elen, const u8 *pos) 427 if (elen < 2 + 2) { 436 if (elen < 2) { 445 if (elen < 1) { 454 if (elen < 10) { 464 if (elen < 8) { 475 if (elen < 1) { 485 rep->meas_pilot->subelem_len = elen - 1; 486 os_memcpy(rep->meas_pilot->subelems, pos + 1, elen - 1); 489 if (elen < 422 wnm_parse_neighbor_report_elem(struct neighbor_report *rep, u8 id, u8 elen, const u8 *pos) argument 566 u8 id, elen; local [all...] |
/freebsd-11-stable/contrib/bmake/ |
H A D | arch.c | 722 unsigned int elen = atoi(&memName[sizeof(AR_EFMT1)-1]); local 724 if (elen > MAXPATHLEN) 726 if (fread(memName, elen, 1, arch) != 1) 728 memName[elen] = '\0'; 729 if (fseek(arch, -elen, SEEK_CUR) != 0) 977 unsigned int elen = atoi(&arhPtr->AR_NAME[sizeof(AR_EFMT1)-1]); local 980 if (elen > MAXPATHLEN) { 984 if (fread(ename, elen, 1, arch) != 1) { 988 ename[elen] = '\0'; 994 if (fseek(arch, -sizeof(struct ar_hdr) - elen, [all...] |
/freebsd-11-stable/crypto/openssl/engines/vendor_defns/ |
H A D | sureware.h | 242 * exp is elen bytes long 244 * mlen,elen and dlen are all multiple of sizeof(unsigned long) 247 const unsigned long *mod, int elen,
|
/freebsd-11-stable/contrib/wpa/src/eap_peer/ |
H A D | eap_leap.c | 342 size_t elen[5], password_len; local 380 elen[0] = 16; 382 elen[1] = LEAP_CHALLENGE_LEN; 384 elen[2] = LEAP_RESPONSE_LEN; 386 elen[3] = LEAP_CHALLENGE_LEN; 388 elen[4] = LEAP_RESPONSE_LEN; 389 md5_vector(5, addr, elen, key);
|
/freebsd-11-stable/contrib/libucl/tests/ |
H A D | test_msgpack.c | 108 size_t klen, elen, elen2; local 164 emitted = ucl_object_emit_len (obj, UCL_EMIT_MSGPACK, &elen); 169 fprintf (out, "%*.s\n", (int)elen, emitted); 177 if (!ucl_parser_add_chunk_full (parser, emitted, elen, 0, 190 assert (elen2 == elen); 191 assert (memcmp (emitted, emitted2, elen) == 0);
|
/freebsd-11-stable/contrib/gcc/ |
H A D | c-cppbuiltin.c | 639 size_t elen = strlen (expansion); local 645 buf = (char *) alloca (mlen + elen + extra); 657 builtin_define_with_value_n (const char *macro, const char *expansion, size_t elen) argument 663 buf = (char *) alloca (mlen + elen + 2); 666 memcpy (buf + mlen + 1, expansion, elen); 667 buf[mlen + elen + 1] = '\0';
|
/freebsd-11-stable/contrib/bsnmp/lib/ |
H A D | snmpcrypto.c | 272 snmp_get_local_keys(struct snmp_user *user, uint8_t *eid, uint32_t elen) argument 280 if (user == NULL || eid == NULL || elen > SNMP_ENGINE_ID_SIZ) 293 memcpy(authbuf + keylen, eid, elen); 294 memcpy(authbuf + keylen + elen, user->auth_key, keylen); 296 if (EVP_DigestUpdate(&ctx, authbuf, 2 * keylen + elen) != 1 || 383 uint32_t elen __unused)
|
/freebsd-11-stable/contrib/apr-util/test/ |
H A D | testbuckets.c | 98 apr_size_t elen = strlen(expect); local 99 char *buf = malloc(elen); 100 apr_size_t len = elen; 106 (long)len, (long)elen); 107 ABTS_ASSERT(tc, msg, len == elen); 216 apr_size_t elen) 225 ABTS_ASSERT(tc, "read expected length", alen == elen); 226 ABTS_STR_NEQUAL(tc, edata, adata, elen); 213 test_bucket_content(abts_case *tc, apr_bucket *e, const char *edata, apr_size_t elen) argument
|
/freebsd-11-stable/sys/netinet6/ |
H A D | ip6_input.c | 1436 int elen; local 1460 elen = (ip6e->ip6e_len + 2) << 2; 1462 elen = (ip6e->ip6e_len + 1) << 3; 1463 if (off + elen > m->m_len) 1473 elen = (ip6e->ip6e_len + 2) << 2; 1475 elen = (ip6e->ip6e_len + 1) << 3; 1476 if (elen != ext->m_len) { 1488 *mp = sbcreatecontrol((caddr_t)ip6e, elen, 1499 *mp = sbcreatecontrol((caddr_t)ip6e, elen, 1524 off += elen; 1625 size_t elen; local [all...] |
/freebsd-11-stable/crypto/openssh/ |
H A D | hmac.c | 141 hmac_test(void *key, size_t klen, void *m, size_t mlen, u_char *e, size_t elen) argument 155 if (memcmp(e, digest, elen)) { 156 for (i = 0; i < elen; i++)
|
/freebsd-11-stable/tools/tools/net80211/stumbler/ |
H A D | stumbler.c | 558 int eid, elen; local 562 elen = *data; 567 if (rd < elen) { 573 if (elen == 1 && data[0] == 0) { 577 memcpy(node->ssid, data, elen); 578 node->ssid[elen] = 0; 584 if( elen != 1) 594 if (elen < 6) 610 if (elen < 12) 618 if (elen < (pt [all...] |
/freebsd-11-stable/sbin/setkey/ |
H A D | test-pfkey.c | 521 key_setsadbextbuf(dst, off, ebuf, elen, vbuf, vlen) 523 int off, elen, vlen; 525 memset(dst + off, 0, elen + vlen); 526 memcpy(dst + off, (caddr_t)ebuf, elen); 527 memcpy(dst + off + elen, vbuf, vlen);
|
/freebsd-11-stable/contrib/wpa/src/wps/ |
H A D | wps_attr_parse.c | 95 u8 id, elen; local 99 elen = *pos++; 100 if (elen > end - pos) 102 if (wps_set_vendor_ext_wfa_subelem(attr, id, elen, pos) < 0) 104 pos += elen;
|
/freebsd-11-stable/contrib/bsnmp/snmp_usm/ |
H A D | usm_snmp.c | 149 uint32_t elen; local 186 sub, eid, &elen, uname) < 0 || 191 if ((uuser = usm_new_user(eid, elen, uname)) == NULL) 305 &elen, uname) < 0) 307 uuser = usm_new_user(eid, elen, uname); 456 uint32_t *elen, char *uname) 466 *elen = i; 455 usm_user_index_decode(const struct asn_oid *oid, uint sub, uint8_t *engine, uint32_t *elen, char *uname) argument
|
/freebsd-11-stable/contrib/wpa/src/radius/ |
H A D | radius.c | 991 size_t elen[3]; local 1020 elen[0] = secret_len; 1023 elen[1] = MD5_MAC_LEN; 1025 elen[2] = 2; /* Salt */ 1028 elen[1] = MD5_MAC_LEN; 1030 if (md5_vector(first ? 3 : 2, addr, elen, hash) < 0) { 1062 u8 *ebuf, size_t *elen) 1079 *elen = len; 1197 size_t elen; local 1222 secret_len, pos, &elen); 1059 encrypt_ms_key(const u8 *key, size_t key_len, u16 salt, const u8 *req_authenticator, const u8 *secret, size_t secret_len, u8 *ebuf, size_t *elen) argument [all...] |
/freebsd-11-stable/contrib/libreadline/ |
H A D | histexpand.c | 370 int ll, elen; local 378 elen = 15; 382 elen = 18; 386 elen = 19; 390 elen = 29; 394 elen = 24; 398 elen = 23; 402 temp = (char *)xmalloc (ll + elen + 3);
|
/freebsd-11-stable/sys/dev/ixl/ |
H A D | ixl_txrx.c | 703 int elen, ip_hlen = 0, tcp_hlen; local 725 elen = ETHER_HDR_LEN + ETHER_VLAN_ENCAP_LEN; 728 elen = ETHER_HDR_LEN; 734 ip = (struct ip *)(mp->m_data + elen); 747 ip6 = (struct ip6_hdr *)(mp->m_data + elen); 758 *off |= (elen >> 1) << I40E_TX_DESC_LENGTH_MACLEN_SHIFT; 805 int idx, elen, ip_hlen, tcp_hlen; local 824 elen = ETHER_HDR_LEN + ETHER_VLAN_ENCAP_LEN; 827 elen = ETHER_HDR_LEN; 834 ip6 = (struct ip6_hdr *)(mp->m_data + elen); [all...] |
/freebsd-11-stable/contrib/wpa/src/eap_server/ |
H A D | eap_server_fast.c | 184 u8 id, elen; local 187 elen = *pos++; 188 if (elen > end - pos) 195 if (elen != EAP_FAST_PAC_KEY_LEN) { 198 elen); 208 if (elen != 4) { 211 elen); 219 identity_len = elen; 223 pos += elen;
|