/freebsd-current/sys/contrib/dev/iwlwifi/fw/ |
H A D | pnvm.h | 21 u8 *pnvm_name, size_t max_len) 25 snprintf(pnvm_name, max_len, "%s.pnvm", 20 iwl_pnvm_get_fs_name(struct iwl_trans *trans, u8 *pnvm_name, size_t max_len) argument
|
/freebsd-current/contrib/wpa/src/utils/ |
H A D | uuid.h | 15 int uuid_bin2str(const u8 *bin, char *str, size_t max_len);
|
H A D | ip_addr.h | 19 u8 max_len[16]; member in union:hostapd_ip_addr::__anon6518
|
H A D | uuid.c | 50 int uuid_bin2str(const u8 *bin, char *str, size_t max_len) argument 53 len = os_snprintf(str, max_len, "%02x%02x%02x%02x-%02x%02x-%02x%02x-" 59 if (os_snprintf_error(max_len, len))
|
/freebsd-current/crypto/heimdal/lib/roken/ |
H A D | concat.c | 69 roken_vmconcat (char **s, size_t max_len, va_list args) argument 82 if(max_len && len + n > max_len){ 101 roken_mconcat (char **s, size_t max_len, ...) argument 106 va_start(args, max_len); 107 ret = roken_vmconcat (s, max_len, args);
|
/freebsd-current/crypto/openssl/providers/common/ |
H A D | provider_seeding.c | 48 int entropy, size_t min_len, size_t max_len) 53 pout, entropy, min_len, max_len); 64 size_t min_len, size_t max_len, 70 min_len, max_len, salt, salt_len); 47 ossl_prov_get_entropy(PROV_CTX *prov_ctx, unsigned char **pout, int entropy, size_t min_len, size_t max_len) argument 63 ossl_prov_get_nonce(PROV_CTX *prov_ctx, unsigned char **pout, size_t min_len, size_t max_len, const void *salt,size_t salt_len) argument
|
/freebsd-current/crypto/openssl/providers/implementations/include/prov/ |
H A D | seeding.h | 34 int entropy, size_t min_len, size_t max_len); 38 size_t min_len, size_t max_len,
|
/freebsd-current/crypto/openssl/crypto/rand/ |
H A D | prov_seed.c | 17 size_t min_len, size_t max_len) 23 pool = ossl_rand_pool_new(entropy, 1, min_len, max_len); 48 unsigned char **pout, size_t min_len, size_t max_len, 54 pool = ossl_rand_pool_new(0, 0, min_len, max_len); 15 ossl_rand_get_entropy(ossl_unused const OSSL_CORE_HANDLE *handle, unsigned char **pout, int entropy, size_t min_len, size_t max_len) argument 47 ossl_rand_get_nonce(ossl_unused const OSSL_CORE_HANDLE *handle, unsigned char **pout, size_t min_len, size_t max_len, const void *salt, size_t salt_len) argument
|
H A D | rand_pool.c | 23 size_t min_len, size_t max_len) 34 pool->max_len = (max_len > RAND_POOL_MAX_LENGTH) ? 35 RAND_POOL_MAX_LENGTH : max_len; 37 if (pool->alloc_len > pool->max_len) 38 pool->alloc_len = pool->max_len; 85 pool->min_len = pool->max_len = pool->alloc_len = pool->len; 209 const size_t limit = pool->max_len / 2; 212 if (pool->attached || len > pool->max_len - pool->len) { 218 newlen = newlen < limit ? newlen * 2 : pool->max_len; 22 ossl_rand_pool_new(int entropy_requested, int secure, size_t min_len, size_t max_len) argument [all...] |
/freebsd-current/sys/dev/usb/ |
H A D | usb_util.h | 34 uint8_t usb_make_str_desc(void *ptr, uint16_t max_len, const char *s);
|
H A D | usb_util.c | 168 usb_make_str_desc(void *ptr, uint16_t max_len, const char *s) argument 174 if (max_len < 2) { 178 max_len = ((max_len / 2) - 1); 188 if (max_len > j) { 189 max_len = j; 191 totlen = (max_len + 1) * 2; 196 while (max_len--) { 197 USETW2(p->bString[max_len], 0, s[max_len]); [all...] |
H A D | usb_handle_request.c | 474 uint16_t max_len; /* max fragment length */ local 533 max_len = 0; 627 &max_len, req, off, state); 640 max_len = 0; 651 err = (usb_temp_get_desc_p) (udev, &req, &src_zcopy, &max_len); 661 max_len = 1; 679 max_len = sizeof(temp.wStatus); 743 max_len = sizeof(temp.wStatus); 753 max_len -= off; 757 if (max_len > xfe [all...] |
/freebsd-current/crypto/openssl/crypto/asn1/ |
H A D | evp_asn1.c | 30 /* int max_len: for returned value 34 int ASN1_TYPE_get_octetstring(const ASN1_TYPE *a, unsigned char *data, int max_len) argument 45 if (ret < max_len) 48 num = max_len; 64 long *num, unsigned char *data, int max_len) 71 if (max_len > ret) 74 n = max_len; 110 unsigned char *data, int max_len) 124 ret = asn1_type_get_int_oct(atmp->oct, atmp->num, num, data, max_len); 166 unsigned char *data, int max_len) 63 asn1_type_get_int_oct(ASN1_OCTET_STRING *oct, int32_t anum, long *num, unsigned char *data, int max_len) argument [all...] |
/freebsd-current/contrib/llvm-project/compiler-rt/lib/sanitizer_common/ |
H A D | sanitizer_file.cpp | 128 uptr *read_len, uptr max_len, error_t *errno_p) { 132 if (!max_len) 135 uptr kMinFileLen = Min(PageSize, max_len); 138 for (uptr size = kMinFileLen;; size = Min(size * 2, max_len)) { 159 if (just_read == 0 || *read_len == max_len) { 172 InternalMmapVectorNoCtor<char> *buff, uptr max_len, 175 if (!max_len) 182 while (read_len < max_len) { 184 buff->resize(Min(Max(PageSize, read_len * 2), max_len)); 186 CHECK_LE(buff->size(), max_len); 127 ReadFileToBuffer(const char *file_name, char **buff, uptr *buff_size, uptr *read_len, uptr max_len, error_t *errno_p) argument 171 ReadFileToVector(const char *file_name, InternalMmapVectorNoCtor<char> *buff, uptr max_len, error_t *errno_p) argument [all...] |
/freebsd-current/contrib/bearssl/src/ssl/ |
H A D | ssl_rec_cbc.c | 64 size_t min_len, max_len; local 68 max_len = (16384 + 256 + cc->mac_len) & ~(blen - 1); 71 max_len += blen; 73 return min_len <= rlen && rlen <= max_len; 107 uint32_t u, v, len, blen, min_len, max_len; local 135 max_len = len - 1; 141 pad_len = buf[max_len]; 142 good = LE(pad_len, (uint32_t)(max_len - min_len)); 143 len = MUX(good, (uint32_t)(max_len - pad_len), min_len); 149 for (u = min_len; u < max_len; [all...] |
/freebsd-current/sys/contrib/openzfs/module/os/linux/zfs/ |
H A D | zpl_export.c | 35 zpl_encode_fh(struct inode *ip, __u32 *fh, int *max_len, struct inode *parent) argument 38 zpl_encode_fh(struct dentry *dentry, __u32 *fh, int *max_len, int connectable) 48 len_bytes = *max_len * sizeof (__u32); 66 *max_len = roundup(len_bytes, sizeof (__u32)) / sizeof (__u32);
|
/freebsd-current/sys/contrib/openzfs/lib/libzutil/os/freebsd/ |
H A D | zutil_device_path_os.c | 49 zfs_append_partition(char *path, size_t max_len) argument 51 return (strnlen(path, max_len));
|
/freebsd-current/crypto/openssl/include/crypto/ |
H A D | rand.h | 113 size_t min_len, size_t max_len); 117 unsigned char **pout, size_t min_len, size_t max_len,
|
H A D | rand_pool.h | 20 * The max_len value for the buffer provided to the rand_drbg_get_entropy() 79 size_t max_len; /* maximum number of random bytes (allocated buffer size) */ member in struct:rand_pool_st 86 size_t min_len, size_t max_len);
|
/freebsd-current/contrib/llvm-project/lldb/source/Commands/ |
H A D | CommandObjectApropos.cpp | 64 const size_t max_len = commands_found.GetMaxStringLength(); local 69 "--", commands_help.GetStringAtIndex(i), max_len);
|
/freebsd-current/contrib/bearssl/src/mac/ |
H A D | hmac_ct.c | 47 const void *data, size_t len, size_t min_len, size_t max_len, 110 max_len -= zlen; 120 * directly. Now only len and max_len matter. 125 * block, if length is max_len 135 km = ((kr + (uint32_t)max_len + po + bs - 1) & ~(bs - 1)) - kr; 139 * d is from data[] if u < max_len, 0x00 otherwise 142 * they relate only to u and max_len, not to the actual length. 159 d = (u < max_len) ? ((const unsigned char *)data)[u] : 0x00; 46 br_hmac_outCT(const br_hmac_context *ctx, const void *data, size_t len, size_t min_len, size_t max_len, void *out) argument
|
/freebsd-current/contrib/bearssl/inc/ |
H A D | bearssl_hmac.h | 208 * parameter must lie between `min_len` and `max_len` (inclusive); 209 * `max_len` bytes are actually read from `data`. Computing time (and 216 * The difference `max_len - min_len` MUST be less than 2<sup>30</sup> 229 * \param max_len maximum extra input length (in bytes). 234 const void *data, size_t len, size_t min_len, size_t max_len,
|
/freebsd-current/contrib/wpa/src/eap_peer/ |
H A D | eap_fast_pac.h | 44 size_t max_len);
|
H A D | eap_teap_pac.h | 44 size_t max_len);
|
/freebsd-current/contrib/ntp/sntp/libopts/ |
H A D | enum.c | 40 size_t max_len = 0; local 74 if (len > max_len) 75 max_len = len; 85 if (max_len > 35) { 110 if (snprintf(fmt, 16, ENUM_ERR_WIDTH, (int)max_len) >= 16) 112 max_len = 78 / max_len; /* max_len is now max entries on a line */ 120 if (++ent_no == max_len) {
|