/macosx-10.10/ppp-786.1.1/Authenticators/Radius/ |
H A D | radius.h | 58 int radius_decryptmppekey(char *key, u_int8_t *attr_value, size_t attr_len, char *secret, char *authenticator, size_t auth_len);
|
H A D | radius_eap.c | 194 size_t attr_len; local 270 while ((attr_type = rad_get_attr(rad_handle, (const void **)&attr_value, &attr_len)) > 0 ) { 276 attr_type = rad_get_vendor_attr(&attr_vendor, (const void **)&attr_value, &attr_len); 283 radius_decryptmppekey((char*)eap_mppe_send_key, attr_value, attr_len, (char*)rad_server_secret(rad_handle), auth, len); 295 radius_decryptmppekey((char*)eap_mppe_recv_key, attr_value, attr_len, (char*)rad_server_secret(rad_handle), auth, len); 318 while ((attr_type = rad_get_attr(rad_handle, (const void **)&attr_value, &attr_len)) > 0 ) { 325 if ((output_buffer_len + attr_len) <= sizeof(output_buffer)) { 326 bcopy(attr_value, output_buffer + output_buffer_len, attr_len); 327 output_buffer_len += attr_len; 333 last_state_attr_len = attr_len; [all...] |
H A D | main.c | 576 size_t attr_len, len; local 706 while ((attr_type = rad_get_attr(h, (const void **)&attr_value, &attr_len)) > 0 ) { 712 attr_type = rad_get_vendor_attr(&attr_vendor, (const void **)&attr_value, &attr_len); 719 radius_decryptmppekey((char*)mppe_send_key, attr_value, attr_len, (char*)rad_server_secret(h), auth, len); 731 radius_decryptmppekey((char*)mppe_recv_key, attr_value, attr_len, (char*)rad_server_secret(h), auth, len); 739 if (attr_len && (attr_len - 1) < message_space) { 740 memcpy(message, attr_value + 1, attr_len - 1); 741 message[attr_len - 1] = 0; 767 while ((attr_type = rad_get_attr(h, (const void **)&attr_value, &attr_len)) > 944 radius_decryptmppekey(char *key, u_int8_t *attr_value, size_t attr_len, char *secret, char *authenticator, size_t auth_len) argument [all...] |
/macosx-10.10/zsh-61/zsh/Src/Modules/ |
H A D | attr.c | 101 int list_len, val_len = 0, attr_len = 0, slen; local 117 attr_len = xgetxattr(file, attr, value, val_len, symlink); 118 if (attr_len > 0 && attr_len <= val_len) { 119 value[attr_len] = '\0'; 121 setsparam(param, metafy(value, attr_len, META_DUP)); 128 if (list_len < 0 || val_len < 0 || attr_len < 0 || attr_len > val_len) { 130 ret = 1 + (attr_len > val_len || attr_len < [all...] |
/macosx-10.10/ipsec-286.1.1/ipsec-tools/racoon/ |
H A D | vpn.c | 493 vpn_xauth_reply(u_int32_t address, void *attr_list, size_t attr_len) argument 502 int tlen = attr_len; 544 payload = vmalloc(sizeof(struct isakmp_pl_attr) + attr_len); 557 memcpy(attr_ptr, attr_list, attr_len);
|
H A D | vpn_control.c | 610 vpncontrol_notify_need_authinfo(phase1_handle_t *iph1, void* attr_list, size_t attr_len) argument 626 msg = (struct vpnctl_status_need_authinfo *)racoon_malloc(msg_size = sizeof(struct vpnctl_status_need_authinfo) + attr_len); 648 memcpy(ptr, attr_list, attr_len);
|
/macosx-10.10/ntfs-84/kext/ |
H A D | ntfs_attr_list.c | 236 unsigned al_alloc, al_size, bytes_free, attr_len, mp_size = 0; local 395 attr_len = offsetof(ATTR_RECORD, reservedR) + sizeof(a->reservedR) + 402 if (attr_len > bytes_free) { 416 attr_len > le32_to_cpu(m->bytes_allocated) - 579 attr_len = (al_size + vol->cluster_size_mask) & 581 err = ntfs_cluster_alloc(vol, 0, attr_len / vol->cluster_size, 793 a->highest_vcn = cpu_to_sle64((attr_len / vol->cluster_size) - 1); 794 a->allocated_size = cpu_to_sle64(attr_len); 1020 attr_len = le32_to_cpu(a->length); 1023 attr_len); [all...] |
H A D | ntfs_attr.c | 3579 unsigned attr_len; local 3604 attr_len = le32_to_cpu(al_ctx->a->length); 3606 err = ntfs_attr_record_make_space(m, a, attr_len); 3613 memcpy(a, al_ctx->a, attr_len); 3655 ctx->a = (ATTR_RECORD*)((u8*)ctx->a - attr_len); 3692 unsigned attr_len; local 3710 attr_len = le32_to_cpu(a->length); 3712 a_copy = OSMalloc(attr_len, ntfs_malloc_tag); 3722 memcpy(a_copy, a, attr_len); 3771 err = ntfs_attr_record_make_space(m, a, attr_len); 4083 unsigned attr_len; local 5956 unsigned attr_len, arec_size, name_size, mp_size, mp_ofs, max_size; local 7677 unsigned mp_size, attr_len, arec_size; local 8943 unsigned attr_len, init_len, bytes; local 9037 u32 attr_len; local [all...] |
H A D | ntfs_mft.c | 817 unsigned mp_size, attr_len = 0; local 973 attr_len = le32_to_cpu(a->length); 1087 err2 = ntfs_attr_record_resize(ctx->m, a, attr_len); 1096 attr_len - mp_ofs, mftbmp_ni->rl.rl, 1281 unsigned mp_size, attr_len = 0; local 1458 attr_len = (int)le32_to_cpu(a->length); 1591 err2 = ntfs_attr_record_resize(ctx->m, a, attr_len); 1600 attr_len - mp_ofs, mft_ni->rl.rl,
|
/macosx-10.10/libpcap-48/libpcap/ |
H A D | pcap-netfilter-linux.c | 145 int attr_len = nlh->nlmsg_len - NLMSG_ALIGN(HDR_LENGTH); local 147 while (NFA_OK(attr, attr_len)) { 169 attr = NFA_NEXT(attr, attr_len);
|
/macosx-10.10/eap8021x-198/EAP8021X.fproj/ |
H A D | eapmschapv2_plugin.c | 569 const char * attr, int attr_len, 576 if (val != NULL && message_length > attr_len) { 577 val += attr_len; 587 const char * attr, int attr_len, 596 && message_length > (attr_len + MSCHAP2_CHALLENGE_SIZE * 2)) { 600 val += attr_len; 568 mschap2_message_int32_attr(const char * message, uint16_t message_length, const char * attr, int attr_len, int32_t * int_value) argument 586 mschap2_message_challenge_attr(const char * message, uint16_t message_length, const char * attr, int attr_len, uint8_t challenge[MSCHAP2_CHALLENGE_SIZE]) argument
|