/freebsd-9.3-release/contrib/wpa/src/common/ |
H A D | ieee802_11_common.c | 22 static int ieee802_11_parse_vendor_specific(const u8 *pos, size_t elen, argument 31 if (elen < 4) { 35 (unsigned long) elen); 50 elems->wpa_ie_len = elen; 54 if (elen < 5) { 58 (unsigned long) elen); 71 elems->wmm_len = elen; 75 elems->wmm_tspec_len = elen; 81 pos[4], (unsigned long) elen); 88 elems->wps_ie_len = elen; 145 u8 id, elen; local [all...] |
/freebsd-9.3-release/crypto/openssh/regress/ |
H A D | integrity.sh | 26 elen=0 55 Bad?packet*) elen=`expr $elen + 1`; skip=3;; 62 verbose "test $tid: $ecnt errors: mac $emac padding $epad length $elen" 66 expect=`expr $ecnt - $epad - $elen`
|
/freebsd-9.3-release/contrib/bmake/ |
H A D | arch.c | 722 unsigned int elen = atoi(&memName[sizeof(AR_EFMT1)-1]); local 724 if (elen > MAXPATHLEN) 726 if (fread(memName, elen, 1, arch) != 1) 728 memName[elen] = '\0'; 729 fseek(arch, -elen, SEEK_CUR); 973 unsigned int elen = atoi(&arhPtr->AR_NAME[sizeof(AR_EFMT1)-1]); local 976 if (elen > MAXPATHLEN) { 980 if (fread(ename, elen, 1, arch) != 1) { 984 ename[elen] = '\0'; 990 fseek(arch, -sizeof(struct ar_hdr) - elen, SEEK_CU [all...] |
/freebsd-9.3-release/crypto/openssl/engines/vendor_defns/ |
H A D | sureware.h | 242 * exp is elen bytes long 244 * mlen,elen and dlen are all multiple of sizeof(unsigned long) 247 const unsigned long *mod, int elen,
|
/freebsd-9.3-release/contrib/wpa/src/eap_peer/ |
H A D | eap_leap.c | 340 size_t elen[5], password_len; local 378 elen[0] = 16; 380 elen[1] = LEAP_CHALLENGE_LEN; 382 elen[2] = LEAP_RESPONSE_LEN; 384 elen[3] = LEAP_CHALLENGE_LEN; 386 elen[4] = LEAP_RESPONSE_LEN; 387 md5_vector(5, addr, elen, key);
|
/freebsd-9.3-release/contrib/wpa/src/radius/ |
H A D | radius.c | 744 size_t elen[3]; local 749 elen[0] = sizeof(tv); 751 elen[1] = len; 753 elen[2] = sizeof(l); 754 md5_vector(3, addr, elen, msg->hdr->authenticator); 833 size_t elen[3]; local 858 elen[0] = secret_len; 861 elen[1] = MD5_MAC_LEN; 863 elen[2] = 2; /* Salt */ 866 elen[ 895 encrypt_ms_key(const u8 *key, size_t key_len, u16 salt, const u8 *req_authenticator, const u8 *secret, size_t secret_len, u8 *ebuf, size_t *elen) argument 1025 size_t elen; local [all...] |
/freebsd-9.3-release/contrib/bsnmp/lib/ |
H A D | snmpcrypto.c | 272 snmp_get_local_keys(struct snmp_user *user, uint8_t *eid, uint32_t elen) argument 280 if (user == NULL || eid == NULL || elen > SNMP_ENGINE_ID_SIZ) 293 memcpy(authbuf + keylen, eid, elen); 294 memcpy(authbuf + keylen + elen, user->auth_key, keylen); 296 if (EVP_DigestUpdate(&ctx, authbuf, 2 * keylen + elen) != 1 || 383 uint32_t elen __unused)
|
/freebsd-9.3-release/contrib/gcc/ |
H A D | c-cppbuiltin.c | 629 size_t elen = strlen (expansion); local 635 buf = (char *) alloca (mlen + elen + extra); 647 builtin_define_with_value_n (const char *macro, const char *expansion, size_t elen) argument 653 buf = (char *) alloca (mlen + elen + 2); 656 memcpy (buf + mlen + 1, expansion, elen); 657 buf[mlen + elen + 1] = '\0';
|
/freebsd-9.3-release/sys/netinet6/ |
H A D | ip6_input.c | 1503 int elen; local 1527 elen = (ip6e->ip6e_len + 2) << 2; 1529 elen = (ip6e->ip6e_len + 1) << 3; 1530 if (off + elen > m->m_len) 1540 elen = (ip6e->ip6e_len + 2) << 2; 1542 elen = (ip6e->ip6e_len + 1) << 3; 1543 if (elen != ext->m_len) { 1555 *mp = sbcreatecontrol((caddr_t)ip6e, elen, 1566 *mp = sbcreatecontrol((caddr_t)ip6e, elen, 1591 off += elen; 1651 size_t elen; local [all...] |
H A D | ip6_output.c | 3075 #define elen(x) \ macro 3078 len += elen(in6p->in6p_outputopts->ip6po_hbh); 3081 len += elen(in6p->in6p_outputopts->ip6po_dest1); 3082 len += elen(in6p->in6p_outputopts->ip6po_rthdr); 3083 len += elen(in6p->in6p_outputopts->ip6po_dest2); 3085 #undef elen macro
|
/freebsd-9.3-release/crypto/openssh/ |
H A D | hmac.c | 141 hmac_test(void *key, size_t klen, void *m, size_t mlen, u_char *e, size_t elen) argument 155 if (memcmp(e, digest, elen)) { 156 for (i = 0; i < elen; i++)
|
H A D | key.c | 365 int nlen, elen, hash_alg = -1; local 386 elen = BN_num_bytes(k->rsa->e); 387 len = nlen + elen; 1405 u_int signed_len, plen, clen, sklen, slen, kidlen, elen; local 1417 elen = 0; /* Not touched for v00 certs */ 1426 (!v00 && (exts = buffer_get_string_ret(b, &elen)) == NULL) || 1477 buffer_append(&key->cert->extensions, exts, elen); 1478 buffer_append(&tmp, exts, elen);
|
/freebsd-9.3-release/tools/tools/net80211/stumbler/ |
H A D | stumbler.c | 558 int eid, elen; local 562 elen = *data; 567 if (rd < elen) { 573 if (elen == 1 && data[0] == 0) { 577 memcpy(node->ssid, data, elen); 578 node->ssid[elen] = 0; 584 if( elen != 1) 594 if (elen < 6) 610 if (elen < 12) 618 if (elen < (pt [all...] |
/freebsd-9.3-release/sbin/setkey/ |
H A D | test-pfkey.c | 521 key_setsadbextbuf(dst, off, ebuf, elen, vbuf, vlen) 523 int off, elen, vlen; 525 memset(dst + off, 0, elen + vlen); 526 memcpy(dst + off, (caddr_t)ebuf, elen); 527 memcpy(dst + off + elen, vbuf, vlen);
|
H A D | parse.y | 1225 setvarbuf(buf, off, ebuf, elen, vbuf, vlen) 1229 int elen; 1234 memcpy(buf + *off, (caddr_t)ebuf, elen); 1235 memcpy(buf + *off + elen, vbuf, vlen); 1236 (*off) += PFKEY_ALIGN8(elen + vlen);
|
/freebsd-9.3-release/contrib/bsnmp/snmp_usm/ |
H A D | usm_snmp.c | 149 uint32_t elen; local 182 sub, eid, &elen, uname) < 0 || 187 if ((uuser = usm_new_user(eid, elen, uname)) == NULL) 301 &elen, uname) < 0) 303 uuser = usm_new_user(eid, elen, uname); 452 uint32_t *elen, char *uname) 462 *elen = i; 451 usm_user_index_decode(const struct asn_oid *oid, uint sub, uint8_t *engine, uint32_t *elen, char *uname) argument
|
/freebsd-9.3-release/contrib/libreadline/ |
H A D | histexpand.c | 370 int ll, elen; local 378 elen = 15; 382 elen = 18; 386 elen = 19; 390 elen = 29; 394 elen = 24; 398 elen = 23; 402 temp = (char *)xmalloc (ll + elen + 3);
|
/freebsd-9.3-release/sys/dev/cesa/ |
H A D | cesa.c | 602 unsigned int elen, eskip; local 621 elen = cci->cci_enc ? cci->cci_enc->crd_len : 0; 626 if (elen && mlen && 629 (eskip > (mskip + mlen)) || (mskip > (eskip + elen)))) { 671 if (elen && mlen) { 673 len = MAX(elen + eskip, mlen + mskip) - skip; 674 } else if (elen) { 676 len = elen; 751 if (eskip < cp.cp_size && elen > 0) { 757 MIN(elen, c [all...] |
/freebsd-9.3-release/contrib/binutils/binutils/ |
H A D | resrc.c | 2886 rc_uint_type elen, flags; 2893 elen = windres_get_16 (&wrtarget, mti->length, 2); 2895 if ((offset + elen) > length) 2904 (elen - BIN_MESSAGETABLE_ITEM_SIZE) / 2); 2907 (elen - BIN_MESSAGETABLE_ITEM_SIZE)); 2910 offset += elen; 2883 rc_uint_type elen, flags; local
|
/freebsd-9.3-release/contrib/wpa/src/eapol_supp/ |
H A D | eapol_supp_sm.c | 1202 u16 elen; local 1204 elen = be_to_host16(ehdr->length); 1205 if (elen > plen && elen <= len - sizeof(*hdr)) { 1215 "%d -> %d", (int) plen, elen); 1216 plen = elen;
|
/freebsd-9.3-release/crypto/heimdal/lib/krb5/ |
H A D | aes-test.c | 653 size_t elen; member in struct:__anon4628 691 cipher.length = krbencs[i].elen;
|
/freebsd-9.3-release/tools/tools/net80211/wesside/wesside/ |
H A D | wesside.c | 709 int eid, elen; local 713 elen = *ptr; 717 if (len < elen) { 727 victim.ssid = (char*) malloc(elen + 1); 733 memcpy(victim.ssid, ptr, elen); 734 victim.ssid[elen] = 0; 740 if( elen != 1) { 749 ptr += elen; 750 len -= elen;
|
/freebsd-9.3-release/sys/kgssapi/krb5/ |
H A D | krb5_mech.c | 1046 size_t mlen, tlen, elen, miclen; local 1053 p = krb5_verify_token("\x01\x01", tlen, &mic, &elen, FALSE); 1061 if (elen != tlen) 1607 size_t mlen, tlen, elen, datalen, padlen; local 1619 p = krb5_verify_token("\x02\x01", tlen, &m, &elen, TRUE); 1623 datalen = elen - tlen;
|
/freebsd-9.3-release/contrib/bsnmp/snmpd/ |
H A D | main.c | 2748 usm_find_user(uint8_t *engine, uint32_t elen, char *uname) argument 2753 if (uuser->user_engine_len == elen && 2754 memcmp(uuser->user_engine_id, engine, elen) == 0 && 2795 usm_new_user(uint8_t *eid, uint32_t elen, char *uname) argument 2802 if (uuser->user_engine_len == elen && 2805 memcmp(eid, uuser->user_engine_id, elen) == 0) 2814 memcpy(uuser->user_engine_id, eid, elen); 2815 uuser->user_engine_len = elen;
|
/freebsd-9.3-release/crypto/openssl/apps/ |
H A D | req.c | 1625 int elen, slen; local 1627 elen = strlen(end); 1629 if (elen > slen) 1631 tmp = str + slen - elen;
|