/freebsd-11-stable/contrib/ipfilter/tools/ |
H A D | ipfsyncd.c | 452 do_packet(pklen, buff) 453 int pklen; 462 while (pklen > 0) { 463 if (pklen < sizeof(*sh)) { 464 syslog(LOG_ERR, "packet length too short:%d", pklen); 465 debug(2, "packet length too short:%d\n", pklen); 479 if (pklen < len + sizeof(*sh)) { 480 syslog(LOG_ERR, "packet length too short:%d", pklen); 481 debug(2, "packet length too short:%d\n", pklen); 504 pklen [all...] |
/freebsd-11-stable/crypto/openssh/ |
H A D | kexc25519c.c | 81 size_t slen, pklen, sbloblen, hashlen; local 108 if ((r = sshpkt_get_string(ssh, &server_pubkey, &pklen)) != 0 || 112 if (pklen != CURVE25519_SIZE) {
|
H A D | kexc25519s.c | 66 size_t slen, pklen, sbloblen, hashlen; local 88 if ((r = sshpkt_get_string(ssh, &client_pubkey, &pklen)) != 0 || 91 if (pklen != CURVE25519_SIZE) {
|
H A D | sshkey.c | 2683 size_t pklen = 0, sklen = 0; local 2797 if ((r = sshbuf_get_string(buf, &ed25519_pk, &pklen)) != 0 || 2800 if (pklen != ED25519_PK_SZ || sklen != ED25519_SK_SZ) { 2811 (r = sshbuf_get_string(buf, &ed25519_pk, &pklen)) != 0 || 2814 if (pklen != ED25519_PK_SZ || sklen != ED25519_SK_SZ) { 2854 explicit_bzero(ed25519_pk, pklen);
|
/freebsd-11-stable/crypto/openssl/crypto/dsa/ |
H A D | dsa_ameth.c | 73 int pklen, pmlen; local 82 if (!X509_PUBKEY_get0_param(NULL, &p, &pklen, &palg, pubkey)) 106 if (!(public_key = d2i_ASN1_INTEGER(NULL, &p, pklen))) { 187 int pklen, pmlen; local 200 if (!PKCS8_pkey_get0(NULL, &p, &pklen, &palg, p8)) 207 if (!(ndsa = d2i_ASN1_SEQUENCE_ANY(NULL, &p, pklen))) 233 if (!(privkey = d2i_ASN1_INTEGER(NULL, &p, pklen))) 238 if (!(privkey = d2i_ASN1_UINTEGER(NULL, &q, pklen)))
|
/freebsd-11-stable/contrib/unbound/validator/ |
H A D | val_kentry.c | 374 unsigned int pklen = 0; local 380 pklen = (unsigned)data->rr_len[idx]-2-4; 381 return sldns_rr_dnskey_key_size_raw(pk, pklen, algo);
|
H A D | val_sigcrypt.c | 191 unsigned char** pk, unsigned int* pklen) 198 *pklen = 0; 202 *pklen = (unsigned)len-2-4; 190 dnskey_get_pubkey(struct ub_packed_rrset_key* k, size_t idx, unsigned char** pk, unsigned int* pklen) argument
|
/freebsd-11-stable/crypto/openssl/crypto/dh/ |
H A D | dh_ameth.c | 100 int pklen, pmlen; local 109 if (!X509_PUBKEY_get0_param(NULL, &p, &pklen, &palg, pubkey)) 127 if (!(public_key = d2i_ASN1_INTEGER(NULL, &p, pklen))) { 209 int pklen, pmlen; local 218 if (!PKCS8_pkey_get0(NULL, &p, &pklen, &palg, p8)) 226 if (!(privkey = d2i_ASN1_INTEGER(NULL, &p, pklen)))
|
/freebsd-11-stable/crypto/openssl/crypto/rsa/ |
H A D | rsa_ameth.c | 96 int pklen; local 98 if (!X509_PUBKEY_get0_param(NULL, &p, &pklen, NULL, pubkey)) 100 if (!(rsa = d2i_RSAPublicKey(NULL, &p, pklen))) { 156 int pklen; local 157 if (!PKCS8_pkey_get0(NULL, &p, &pklen, NULL, p8)) 159 return old_rsa_priv_decode(pkey, &p, pklen);
|
/freebsd-11-stable/crypto/openssl/crypto/pem/ |
H A D | pvkfmt.c | 803 int outlen = 24, pklen; local 809 pklen = do_i2b(NULL, pk, 0); 810 if (pklen < 0) 812 outlen += pklen; 834 write_ledword(&p, pklen); 865 if (!EVP_DecryptUpdate(&cctx, p, &enctmplen, p, pklen - 8))
|
/freebsd-11-stable/crypto/openssl/crypto/ec/ |
H A D | ec_ameth.c | 191 int ptype, pklen; local 195 if (!X509_PUBKEY_get0_param(NULL, &p, &pklen, &palg, pubkey)) 207 if (!o2i_ECPublicKey(&eckey, &p, pklen)) { 241 int ptype, pklen; local 245 if (!PKCS8_pkey_get0(NULL, &p, &pklen, &palg, p8)) 255 if (!d2i_ECPrivateKey(&eckey, &p, pklen)) {
|
/freebsd-11-stable/contrib/unbound/sldns/ |
H A D | str2wire.c | 2056 size_t hitlen, pklen = 0; local 2091 pklen = *len - 4 - hitlen; 2092 if((e = sldns_str2wire_b64_buf(s, rd+4+hitlen, &pklen)) != 0) 2094 if(pklen > 65535) 2096 sldns_write_uint16(rd+2, (uint16_t)pklen); 2098 *len = 4 + hitlen + pklen;
|
H A D | wire2str.c | 1607 uint16_t pklen; local 1614 pklen = sldns_read_uint16((*d)+2); 1615 if(*dl < (size_t)4 + (size_t)hitlen + (size_t)pklen) 1624 w += sldns_wire2str_b64_scan_num(d, dl, s, sl, pklen);
|