/macosx-10.9.5/cctools-845/as/ |
H A D | flonum-copy.c | 28 int in_length; /* 0 origin */ local 32 in_length = in -> leader - in -> low; 33 if (in_length < 0) 44 if (in_length <= out_length) 51 if (in_length < out_length) 53 memset((char *)(out->low + in_length + 1), '\0', 54 out_length - in_length); 58 (int)((in_length + 1) * sizeof(LITTLENUM_TYPE))); 66 shorten = in_length - out_length;
|
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/mac/krb4_sources/ |
H A D | rd_priv.c | 49 * the length of that message, "in_length", the key "schedule" 64 krb_rd_priv(void *in, u_int32_t in_length, argument 88 if(clen + 2 > in_length) 95 if(m_data->app_length + 17 > in_length)
|
H A D | rd_safe.c | 93 * "in_length", the "key" to compute the checksum with, and the 108 krb_rd_safe(void *in, u_int32_t in_length, des_cblock *key, argument 135 if(m_data->app_length + 31 > in_length)
|
H A D | krb-protos.h | 517 u_int32_t in_length, 524 u_int32_t in_length, 543 u_int32_t in_length,
|
/macosx-10.9.5/eap8021x-180/EAP8021X.fproj/ |
H A D | md5_plugin.c | 58 uint16_t in_length = EAPPacketGetLength(in_pkt_p); local 63 if (in_length < sizeof(*in_md5_p)) { 65 in_length, sizeof(*in_md5_p)); 68 if (in_length < (sizeof(*in_md5_p) + in_md5_p->value_size)) { 70 in_length, sizeof(*in_md5_p) + in_md5_p->value_size);
|
H A D | eapgtc_plugin.c | 64 int in_length; local 70 in_length = EAPPacketGetLength((EAPPacketRef)in_pkt_p) - sizeof(*in_pkt_p); 71 if (in_length >= EAPGTC_CHALLENGE_PREFIX_LENGTH
|
H A D | eapmschapv2_plugin.c | 378 uint16_t in_length, 387 if (in_length < sizeof(*challenge_p)) { 389 in_length, sizeof(*challenge_p)); 464 uint16_t in_length, 477 if (in_length < sizeof(*r_p)) { 478 EAPLOG_FL(LOG_NOTICE, "length %d < %ld", in_length, sizeof(*r_p)); 698 uint16_t in_length, 714 if (in_length < sizeof(*r_p)) { 716 in_length, sizeof(*r_p)); 733 message_length = in_length 376 eapmschapv2_challenge(EAPClientPluginDataRef plugin, EAPMSCHAPv2PacketRef in_pkt_p, uint16_t in_length, EAPClientStatus * client_status, EAPClientDomainSpecificError * error) argument 462 eapmschapv2_success_request(EAPClientPluginDataRef plugin, EAPMSCHAPv2PacketRef in_pkt_p, uint16_t in_length, EAPClientStatus * client_status, EAPClientDomainSpecificError * error) argument 696 eapmschapv2_failure_request(EAPClientPluginDataRef plugin, EAPMSCHAPv2PacketRef in_pkt_p, uint16_t in_length, EAPClientStatus * client_status, EAPClientDomainSpecificError * error) argument 863 uint16_t in_length = EAPPacketGetLength(in_pkt); local [all...] |
H A D | eaptls_plugin.c | 438 u_int16_t in_length = EAPPacketGetLength(in_pkt); local 448 if (in_length < sizeof(*eaptls_in)) { 450 in_length, sizeof(*eaptls_in)); 464 tls_message_length = in_data_length = in_length - sizeof(EAPTLSPacket); 476 else if (in_length == sizeof(*eaptls_in)) { 480 if (in_length < sizeof(EAPTLSLengthIncludedPacket)) { 483 in_length, sizeof(EAPTLSLengthIncludedPacket)); 487 in_data_length = in_length - sizeof(EAPTLSLengthIncludedPacket);
|
H A D | peap_plugin.c | 619 uint16_t in_length; local 623 in_length = EAPPacketGetLength((EAPPacketRef)in_pkt_p); 624 if (in_length < sizeof(EAPExtensionsPacket)) { 627 in_length, sizeof(EAPExtensionsPacket)); 1175 u_int16_t in_length = EAPPacketGetLength(in_pkt); local 1185 if (in_length < sizeof(*eaptls_in)) { 1187 in_length, sizeof(*eaptls_in)); 1201 tls_message_length = in_data_length = in_length - sizeof(EAPTLSPacket); 1213 else if (in_length == sizeof(*eaptls_in)) { 1217 if (in_length < sizeo [all...] |
H A D | eapttls_plugin.c | 1153 u_int16_t in_length = EAPPacketGetLength(in_pkt); local 1163 if (in_length < sizeof(*eaptls_in)) { 1165 in_length, sizeof(*eaptls_in)); 1179 tls_message_length = in_data_length = in_length - sizeof(EAPTLSPacket); 1191 else if (in_length == sizeof(*eaptls_in)) { 1195 if (in_length < sizeof(EAPTLSLengthIncludedPacket)) { 1198 in_length, sizeof(EAPTLSLengthIncludedPacket)); 1202 in_data_length = in_length - sizeof(EAPTLSLengthIncludedPacket);
|
H A D | eapaka_plugin.c | 1239 uint16_t in_length = EAPPacketGetLength(in_pkt); local 1244 if (in_length <= kEAPSIMAKAPacketHeaderLength) { 1246 in_length, kEAPSIMAKAPacketHeaderLength); 1251 in_length - kEAPSIMAKAPacketHeaderLength) == FALSE) {
|
H A D | eapsim_plugin.c | 1588 uint16_t in_length = EAPPacketGetLength(in_pkt); local 1593 if (in_length <= kEAPSIMAKAPacketHeaderLength) { 1595 in_length, kEAPSIMAKAPacketHeaderLength); 1600 in_length - kEAPSIMAKAPacketHeaderLength) == FALSE) {
|
H A D | eapfast_plugin.c | 3210 u_int16_t in_length = EAPPacketGetLength(in_pkt); local 3220 if (in_length < sizeof(*eaptls_in)) { 3221 EAPLOG_FL(LOG_NOTICE, "length %d < %ld", in_length, sizeof(*eaptls_in)); 3235 tls_message_length = in_data_length = in_length - sizeof(EAPTLSPacket); 3247 else if (in_length == sizeof(*eaptls_in)) { 3251 if (in_length < sizeof(EAPTLSLengthIncludedPacket)) { 3254 in_length, sizeof(EAPTLSLengthIncludedPacket)); 3266 in_data_length = in_length - sizeof(EAPTLSLengthIncludedPacket);
|
/macosx-10.9.5/MITKerberosShim-62.1/PrivateKerberos/ |
H A D | KerberosDebug.h | 55 void dprintmem (const void *in_data, size_t in_length);
|
/macosx-10.9.5/Security-55471.14.18/include/securityd_client/ |
H A D | sec_xdr.h | 55 size_t in_length, uint8_t *in_data);
|
H A D | sec_xdr.c | 159 size_t in_length, uint8_t *in_data) 163 uint8_t *data = in_data ? in_data : calloc(1, ALIGNUP(in_length)); 169 arena->end = data + in_length; 158 sec_xdr_arena_init(sec_xdr_arena_allocator_t *arena, XDR *xdr, size_t in_length, uint8_t *in_data) argument
|
/macosx-10.9.5/Security-55471.14.18/libsecurityd/lib/ |
H A D | sec_xdr.h | 55 size_t in_length, uint8_t *in_data);
|
H A D | sec_xdr.c | 159 size_t in_length, uint8_t *in_data) 163 uint8_t *data = in_data ? in_data : calloc(1, ALIGNUP(in_length)); 169 arena->end = data + in_length; 158 sec_xdr_arena_init(sec_xdr_arena_allocator_t *arena, XDR *xdr, size_t in_length, uint8_t *in_data) argument
|
/macosx-10.9.5/MITKerberosShim-62.1/ |
H A D | Krb4DeprecatedAPIs.c | 348 int krb_rd_err(u_char *in, u_long in_length, long *code, void *m_data) argument 353 long krb_rd_priv(u_char *in, UInt32 in_length, argument 375 long krb_rd_safe(u_char *in, UInt32 in_length, void *key, argument
|
H A D | misc.c | 887 void dprintmem (const void *in_data, size_t in_length); 904 void dprintmem (const void *in_data, size_t in_length) argument
|
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/mac/kerberos_includes/ |
H A D | krb-protos.h | 521 u_int32_t in_length, 528 u_int32_t in_length, 547 u_int32_t in_length,
|
/macosx-10.9.5/rsync-42/rsync/zlib/ |
H A D | trees.c | 1049 ulg in_length = (ulg)((long)s->strstart - s->block_start); local 1057 s->last_lit, in_length, out_length, 1058 100L - out_length*100L/in_length)); 1059 if (s->matches < s->last_lit/2 && out_length < in_length/2) return 1;
|
/macosx-10.9.5/sudo-72/src/zlib/ |
H A D | trees.c | 1035 ulg in_length = (ulg)((long)s->strstart - s->block_start); local 1043 s->last_lit, in_length, out_length, 1044 100L - out_length*100L/in_length)); 1045 if (s->matches < s->last_lit/2 && out_length < in_length/2) return 1;
|
/macosx-10.9.5/xnu-2422.115.4/libkern/zlib/ |
H A D | trees.c | 1076 ulg in_length = (ulg)((long)s->strstart - s->block_start); local 1084 s->last_lit, in_length, out_length, 1085 100L - out_length*100L/in_length)); 1086 if (s->matches < s->last_lit/2 && out_length < in_length/2) return 1;
|
/macosx-10.9.5/zlib-53/zlib/ |
H A D | trees.c | 1053 ulg in_length = (ulg)((long)s->strstart - s->block_start); local 1061 s->last_lit, in_length, out_length, 1062 100L - out_length*100L/in_length)); 1063 if (s->matches < s->last_lit/2 && out_length < in_length/2) return 1;
|