/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/ec/ |
H A D | ec_print.c | 65 size_t buf_len=0; local 68 buf_len = EC_POINT_point2oct(group, point, form, 70 if (buf_len == 0) 73 if ((buf = OPENSSL_malloc(buf_len)) == NULL) 76 if (!EC_POINT_point2oct(group, point, form, buf, buf_len, ctx)) 82 ret = BN_bin2bn(buf, buf_len, ret); 94 size_t buf_len=0; local 98 if ((buf_len = BN_num_bytes(bn)) == 0) return NULL; 99 buf = OPENSSL_malloc(buf_len); 120 if (!EC_POINT_oct2point(group, ret, buf, buf_len, ct 141 size_t buf_len=0,i; local [all...] |
H A D | eck_prn.c | 150 size_t buf_len=0, i; local 250 buf_len = (size_t)BN_num_bytes(p); 251 if (buf_len < (i = (size_t)BN_num_bytes(a))) 252 buf_len = i; 253 if (buf_len < (i = (size_t)BN_num_bytes(b))) 254 buf_len = i; 255 if (buf_len < (i = (size_t)BN_num_bytes(gen))) 256 buf_len = i; 257 if (buf_len < (i = (size_t)BN_num_bytes(order))) 258 buf_len [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/crypto/ |
H A D | aes-eax.c | 39 size_t buf_len; local 45 buf_len = nonce_len; 47 buf_len = data_len; 48 if (hdr_len > buf_len) 49 buf_len = hdr_len; 50 buf_len += 16; 52 buf = os_malloc(buf_len); 103 size_t buf_len; local 109 buf_len = nonce_len; 111 buf_len [all...] |
H A D | sha1-tprf.c | 29 * @buf_len: Number of bytes of key to generate 36 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) 57 output_len[0] = (buf_len >> 8) & 0xff; 58 output_len[1] = buf_len & 0xff; 60 while (pos < buf_len) { 62 plen = buf_len - pos; 35 sha1_t_prf(const u8 *key, size_t key_len, const char *label, const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) argument
|
H A D | sha1.h | 25 const u8 *data, size_t data_len, u8 *buf, size_t buf_len); 27 const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len);
|
H A D | sha256.h | 25 const u8 *data, size_t data_len, u8 *buf, size_t buf_len);
|
H A D | sha256.c | 117 * @buf_len: Number of bytes of key to generate 123 const u8 *data, size_t data_len, u8 *buf, size_t buf_len) 141 WPA_PUT_LE16(length_le, buf_len * 8); 143 while (pos < buf_len) { 144 plen = buf_len - pos; 122 sha256_prf(const u8 *key, size_t key_len, const char *label, const u8 *data, size_t data_len, u8 *buf, size_t buf_len) argument
|
H A D | sha1.c | 121 * @buf_len: Number of bytes of key to generate 128 const u8 *data, size_t data_len, u8 *buf, size_t buf_len) 145 while (pos < buf_len) { 146 plen = buf_len - pos; 127 sha1_prf(const u8 *key, size_t key_len, const char *label, const u8 *data, size_t data_len, u8 *buf, size_t buf_len) argument
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_common/ |
H A D | eap_peap_common.h | 20 u8 *buf, size_t buf_len);
|
H A D | eap_peap_common.c | 23 u8 *buf, size_t buf_len) 66 extra[0] = buf_len & 0xff; 75 while (pos < buf_len) { 77 plen = buf_len - pos; 21 peap_prfplus(int version, const u8 *key, size_t key_len, const char *label, const u8 *seed, size_t seed_len, u8 *buf, size_t buf_len) argument
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/evp/ |
H A D | bio_b64.c | 82 int buf_len; member in struct:b64_struct 119 ctx->buf_len=0; 160 ctx->buf_len=0; 167 if (ctx->buf_len > 0) 169 OPENSSL_assert(ctx->buf_len >= ctx->buf_off); 170 i=ctx->buf_len-ctx->buf_off; 178 if (ctx->buf_len == ctx->buf_off) 180 ctx->buf_len=0; 331 ctx->buf_len=0; 334 ctx->buf_len [all...] |
H A D | bio_ok.c | 147 size_t buf_len; member in struct:ok_struct 184 ctx->buf_len=0; 229 i=ctx->buf_len-ctx->buf_off; 238 if (ctx->buf_len == ctx->buf_off) 245 ctx->buf_len= ctx->buf_len_save- ctx->buf_off_save; 247 ctx->buf_len); 251 ctx->buf_len=0; 261 n=IOBS- ctx->buf_len; 262 i=BIO_read(b->next_bio,&(ctx->buf[ctx->buf_len]),n); 266 ctx->buf_len [all...] |
H A D | bio_enc.c | 78 int buf_len; member in struct:enc_struct 116 ctx->buf_len=0; 154 if (ctx->buf_len > 0) 156 i=ctx->buf_len-ctx->buf_off; 163 if (ctx->buf_len == ctx->buf_off) 165 ctx->buf_len=0; 189 &(ctx->buf_len)); 202 (unsigned char *)ctx->buf,&ctx->buf_len, 211 if(ctx->buf_len == 0) continue; 214 if (ctx->buf_len < [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kadmin/ |
H A D | get.c | 124 format_keytype(krb5_key_data *k, krb5_salt *def_salt, char *buf, size_t buf_len) argument 134 strlcpy(buf, s, buf_len); 137 strlcat(buf, "(", buf_len); 145 strlcat(buf, s, buf_len); 155 strlcat(buf, s, buf_len); 158 strlcat(buf, ")", buf_len); 163 unsigned int subfield, char *buf, size_t buf_len, int condensed) 168 krb5_unparse_name_fixed_short(context, princ->principal, buf, buf_len); 170 krb5_unparse_name_fixed(context, princ->principal, buf, buf_len); 174 time_t2str(princ->princ_expire_time, buf, buf_len, !condense 162 format_field(kadm5_principal_ent_t princ, unsigned int field, unsigned int subfield, char *buf, size_t buf_len, int condensed) argument [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/roken/ |
H A D | parse_reply-test.c | 54 size_t buf_len; member in struct:testcase 119 buf = p2 - t->buf_len; 120 memcpy (buf, t->buf, t->buf_len); 121 parse_reply (buf, t->buf_len);
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_peer/ |
H A D | mschapv2.h | 32 const u8 *buf, size_t buf_len);
|
H A D | eap_fast_pac.c | 192 size_t buf_len; member in struct:eap_fast_read_ctx 201 if (fgets(rc->buf, rc->buf_len, rc->f) == NULL) 212 if (len >= rc->buf_len) 213 len = rc->buf_len - 1; 219 rc->buf[rc->buf_len - 1] = '\0'; 265 rc->buf_len = 2048; 266 rc->buf = os_malloc(rc->buf_len); 477 static void eap_fast_write(char **buf, char **pos, size_t *buf_len, argument 493 if (*pos - *buf + need > *buf_len) { 494 char *nbuf = os_realloc(*buf, *buf_len 573 eap_fast_add_pac_data(struct eap_fast_pac *pac, char **buf, char **pos, size_t *buf_len) argument 623 size_t buf_len; local [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/pkg_install/dist/create/ |
H A D | build.c | 125 ssize_t buf_len; local 153 buf_len = (len > (off_t)sizeof(buf)) ? (ssize_t)sizeof(buf) : (ssize_t)len; 155 if ((buf_len = read(fd, buf, buf_len)) == 0) 157 else if (buf_len < 0) 160 archive_write_data(archive, buf, (size_t)buf_len); 161 len -= buf_len; 175 ssize_t buf_len; local 209 buf_len = readlink(name, buf, sizeof buf); 210 if (buf_len < [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/apps/ |
H A D | ecparam.c | 479 size_t buf_len = 0, tmp_len = 0; local 525 if ((tmp_len = (size_t)BN_num_bytes(ec_p)) > buf_len) 526 buf_len = tmp_len; 527 if ((tmp_len = (size_t)BN_num_bytes(ec_a)) > buf_len) 528 buf_len = tmp_len; 529 if ((tmp_len = (size_t)BN_num_bytes(ec_b)) > buf_len) 530 buf_len = tmp_len; 531 if ((tmp_len = (size_t)BN_num_bytes(ec_gen)) > buf_len) 532 buf_len = tmp_len; 533 if ((tmp_len = (size_t)BN_num_bytes(ec_order)) > buf_len) [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/objects/ |
H A D | obj_dat.c | 466 int OBJ_obj2txt(char *buf, int buf_len, const ASN1_OBJECT *a, int no_name) argument 475 if (buf && buf_len > 0) 490 BUF_strlcpy(buf,s,buf_len); 558 if (buf && (buf_len > 1)) 562 buf_len--; 576 if (buf_len > 1) 580 buf_len--; 582 BUF_strlcpy(buf,bndec,buf_len); 583 if (i > buf_len) 585 buf += buf_len; [all...] |
/netbsd-6-1-5-RELEASE/common/dist/zlib/ |
H A D | minigzip.c | 141 off_t buf_len; /* length of the input file */ local 146 buf_len = sb.st_size; 147 if (buf_len <= 0) return Z_ERRNO; 150 buf = mmap((caddr_t) 0, buf_len, PROT_READ, MAP_SHARED, ifd, (off_t)0); 154 len = gzwrite(out, (char *)buf, (unsigned)buf_len); 156 if (len != (int)buf_len) error(gzerror(out, &err)); 158 munmap(buf, buf_len);
|
/netbsd-6-1-5-RELEASE/external/gpl3/gcc/dist/zlib/ |
H A D | minigzip.c | 139 off_t buf_len; /* length of the input file */ local 144 buf_len = sb.st_size; 145 if (buf_len <= 0) return Z_ERRNO; 148 buf = mmap((caddr_t) 0, buf_len, PROT_READ, MAP_SHARED, ifd, (off_t)0); 152 len = gzwrite(out, (char *)buf, (unsigned)buf_len); 154 if (len != (int)buf_len) error(gzerror(out, &err)); 156 munmap(buf, buf_len);
|
/netbsd-6-1-5-RELEASE/external/bsd/pkg_install/dist/admin/ |
H A D | audit.c | 292 size_t buf_len, buf_fetched; local 345 buf_len = st.size; 346 buf = xmalloc(buf_len + 1); 349 while (buf_fetched < buf_len) { 351 buf_len - buf_fetched); 362 buf[buf_len] = '\0'; 364 pv_check = read_pkg_vulnerabilities_memory(buf, buf_len, check_signature); 372 if (write(fd, buf, buf_len) != (ssize_t)buf_len)
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/ap/ |
H A D | peerkey_auth.c | 92 size_t buf_len; local 122 buf_len = kde.rsn_ie_len + 2 + RSN_SELECTOR_LEN + ETH_ALEN; 123 buf = os_malloc(buf_len); 157 size_t buf_len; local 166 buf_len = 2 + RSN_SELECTOR_LEN + ETH_ALEN + 170 pos = buf = os_malloc(buf_len); 210 size_t buf_len; local 219 buf_len = kde->rsn_ie_len + 224 pos = buf = os_malloc(buf_len);
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/ |
H A D | mem_dbg.c | 715 int buf_len; local 724 buf_len=strlen(buf); 726 if (128 - buf_len - 3 < info_len) 728 memcpy(buf + buf_len, amip->info, 128 - buf_len - 3); 729 buf_len = 128 - 3; 733 BUF_strlcpy(buf + buf_len, amip->info, 734 sizeof buf - buf_len); 735 buf_len = strlen(buf); 737 BIO_snprintf(buf + buf_len, sizeo [all...] |