/netbsd-6-1-5-RELEASE/external/gpl3/gcc/dist/gcc/testsuite/gcc.dg/ |
H A D | pr48144.c | 8 (void *p, char *data, unsigned data_len) 13 for (i = 0; i + 8 <= data_len; i += 8) 15 memcpy (buf2, data + i, data_len); 7 foo(void *p, char *data, unsigned data_len) argument
|
/netbsd-6-1-5-RELEASE/external/gpl3/gcc/dist/gcc/testsuite/gcc.c-torture/compile/ |
H A D | pr42998.c | 3 void ndisc_fill_addr_option(unsigned char *opt, int data_len, argument 13 __builtin_constant_p(data_len) ? foo (opt+2) : bar (opt+2);
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/drivers/ |
H A D | driver_ndis_.c | 31 const u8 *data, size_t data_len); 52 size_t data_len = 0; local 62 data_len = (int) *pos++ << 8; 63 data_len += *pos++; 64 if (data_len > (size_t) (buf + len - pos)) { 69 wpa_hexdump(MSG_MSGDUMP, "NDIS: event data", data, data_len); 80 wpa_driver_ndis_event_media_specific(drv, data, data_len);
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/crypto/ |
H A D | aes-eax.c | 30 * @data_len: Length of data in bytes 36 u8 *data, size_t data_len, u8 *tag) 44 if (nonce_len > data_len) 47 buf_len = data_len; 68 if (aes_128_ctr_encrypt(key, nonce_mac, data, data_len)) 71 os_memcpy(buf + 16, data, data_len); 72 if (omac1_aes_128(key, buf, 16 + data_len, data_mac)) 94 * @data_len: Length of data in bytes 100 u8 *data, size_t data_len, const u8 *tag) 108 if (nonce_len > data_len) 34 aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len, const u8 *hdr, size_t hdr_len, u8 *data, size_t data_len, u8 *tag) argument 98 aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len, const u8 *hdr, size_t hdr_len, u8 *data, size_t data_len, const u8 *tag) argument [all...] |
H A D | sha256.h | 23 size_t data_len, u8 *mac); 25 const u8 *data, size_t data_len, u8 *buf, size_t buf_len);
|
H A D | aes_wrap.h | 30 int __must_check omac1_aes_128(const u8 *key, const u8 *data, size_t data_len, 34 u8 *data, size_t data_len); 38 u8 *data, size_t data_len, u8 *tag); 42 u8 *data, size_t data_len, const u8 *tag); 44 size_t data_len); 46 size_t data_len);
|
H A D | md5.h | 22 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, 29 size_t data_len, u8 *mac);
|
H A D | aes-cbc.c | 27 * @data_len: Length of data in bytes (must be divisible by 16) 30 int aes_128_cbc_encrypt(const u8 *key, const u8 *iv, u8 *data, size_t data_len) argument 42 blocks = data_len / AES_BLOCK_SIZE; 60 * @data_len: Length of data in bytes (must be divisible by 16) 63 int aes_128_cbc_decrypt(const u8 *key, const u8 *iv, u8 *data, size_t data_len) argument 75 blocks = data_len / AES_BLOCK_SIZE;
|
H A D | aes-ctr.c | 27 * @data_len: Length of data in bytes 31 u8 *data, size_t data_len) 34 size_t j, len, left = data_len; 30 aes_128_ctr_encrypt(const u8 *key, const u8 *nonce, u8 *data, size_t data_len) argument
|
H A D | sha1.h | 22 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, 25 const u8 *data, size_t data_len, u8 *buf, size_t buf_len);
|
H A D | sha1.c | 102 * @data_len: Length of the data area 106 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, argument 109 return hmac_sha1_vector(key, key_len, 1, &data, &data_len, mac); 119 * @data_len: Length of the data 128 const u8 *data, size_t data_len, u8 *buf, size_t buf_len) 140 len[1] = data_len; 127 sha1_prf(const u8 *key, size_t key_len, const char *label, const u8 *data, size_t data_len, u8 *buf, size_t buf_len) argument
|
H A D | sha256.c | 99 * @data_len: Length of the data area 103 size_t data_len, u8 *mac) 105 hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac); 115 * @data_len: Length of the data 123 const u8 *data, size_t data_len, u8 *buf, size_t buf_len) 137 len[2] = data_len; 102 hmac_sha256(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument 122 sha256_prf(const u8 *key, size_t key_len, const char *label, const u8 *data, size_t data_len, u8 *buf, size_t buf_len) argument
|
H A D | md5-non-fips.c | 104 * @data_len: Length of the data area 109 size_t data_len, u8 *mac) 112 &data_len, mac); 108 hmac_md5_non_fips_allow(const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument
|
H A D | md5.c | 103 * @data_len: Length of the data area 107 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, argument 110 return hmac_md5_vector(key, key_len, 1, &data, &data_len, mac);
|
H A D | rc4.c | 23 u8 *data, size_t data_len) 52 for (k = 0; k < data_len; k++) { 22 rc4_skip(const u8 *key, size_t keylen, size_t skip, u8 *data, size_t data_len) argument
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/tls/ |
H A D | pkcs5.h | 20 const char *passwd, size_t *data_len);
|
/netbsd-6-1-5-RELEASE/sbin/iscsid/ |
H A D | iscsid_discover.c | 107 uint32_t data_len; local 142 if (isns_get_tlv(t, ISNS_TLV_FIRST, &tag, &data_len, &data_p)) { 149 tag, data_len)); 154 isns_get_tlv(t, ISNS_TLV_NEXT, &tag, &data_len, &data_p); 157 tag, data_len)); 162 isns_get_tlv(t, ISNS_TLV_NEXT, &tag, &data_len, &data_p); 163 if (tag != isnst_iSCSIName || !data_len || data_len >= ISCSI_STRING_LENGTH) { 165 "length = %d)\n", tag, data_len)); 171 isns_get_tlv(t, ISNS_TLV_NEXT, &tag, &data_len, 576 uint32_t data_len; local [all...] |
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/util/ |
H A D | netstring.c | 289 ssize_t data_len; local 296 for (total = 0; (data = va_arg(ap, char *)) != 0; total += data_len) 297 if ((data_len = va_arg(ap, ssize_t)) < 0) 298 msg_panic("netstring_put_multi: bad data length %ld", (long) data_len); 307 data_len = va_arg(ap, ssize_t); 309 myname, (long) total, (int) (data_len < 30 ? data_len : 30), data); 319 data_len = va_arg(ap, ssize_t); 320 if (data_len > 0) 321 if (vstream_fwrite(stream, data, data_len) ! [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/hmac/ |
H A D | hmactest.c | 87 int data_len; member in struct:test_st 137 ebcdic2ascii(test[0].data, test[0].data, test[0].data_len); 138 ebcdic2ascii(test[1].data, test[1].data, test[1].data_len); 140 ebcdic2ascii(test[2].data, test[2].data, test[2].data_len); 147 test[i].data, test[i].data_len,
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/rc4/ |
H A D | rc4test.c | 84 static unsigned char data_len[7]={8,8,8,20,28,10}; variable 133 RC4(&key,data_len[i],&(data[i][0]),obuf); 134 if (memcmp(obuf,output[i],data_len[i]+1) != 0) 138 for (j=0; j<data_len[i]+1; j++) 143 for (j=0; j<data_len[i]+1; j++) 152 for (i=0; i<data_len[3]; i++) 179 for (i=0; i<data_len[3]; i++) 184 RC4(&key,data_len[3]-i,&(data[3][i]),&(obuf[i])); 185 if (memcmp(obuf,output[3],data_len[3]+1) != 0) 189 for (j=0; j<data_len[ [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/gssapi/krb5/ |
H A D | encapsulate.c | 39 _gssapi_encap_length (size_t data_len, argument 46 *len = 1 + 1 + mech->length + data_len; 54 _gsskrb5_encap_length (size_t data_len, argument 59 _gssapi_encap_length(data_len + 2, len, total_len, mech);
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/apps/ |
H A D | tsget | 18 my $data_len = length ${$state->{data}}; 19 if ($state->{bytes} < $data_len) { 20 $data_len = $data_len - $state->{bytes}; 21 $data_len = $maxlength if $data_len > $maxlength; 22 $return_data = substr ${$state->{data}}, $state->{bytes}, $data_len; 23 $state->{bytes} += $data_len;
|
/netbsd-6-1-5-RELEASE/sys/dev/scsipi/ |
H A D | scsipi_cd.h | 81 u_int8_t data_len[2]; member in struct:scsipi_read_header 94 u_int8_t data_len[2]; member in struct:scsipi_read_subchannel 105 u_int8_t data_len[2]; member in struct:scsipi_read_toc 157 uint8_t data_len[2]; member in struct:scsipi_get_configuration 162 uint8_t data_len[4]; member in struct:scsipi_get_conf_data 182 uint8_t data_len[2]; member in struct:scsipi_read_discinfo 189 uint8_t data_len[2]; member in struct:scsipi_read_discinfo_data 216 uint8_t data_len[2]; member in struct:scsipi_read_trackinfo 224 uint8_t data_len[2]; member in struct:scsipi_read_trackinfo_data
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/wpa_supplicant/tests/ |
H A D | test_wpa.c | 101 u16 data_len, size_t *msg_len, void **data_pos) 105 wpa_printf(MSG_DEBUG, "SUPP: %s(type=%d data_len=%d)", 106 __func__, type, data_len); 108 *msg_len = sizeof(*hdr) + data_len; 115 hdr->length = host_to_be16(data_len); 118 os_memcpy(hdr + 1, data, data_len); 120 os_memset(hdr + 1, 0, data_len); 242 size_t data_len, int encrypt) 246 wpa_printf(MSG_DEBUG, "AUTH: %s(addr=" MACSTR " data_len=%lu " 248 __func__, MAC2STR(addr), (unsigned long) data_len, encryp 100 supp_alloc_eapol(void *ctx, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument 241 auth_send_eapol(void *ctx, const u8 *addr, const u8 *data, size_t data_len, int encrypt) argument [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/libpcap/dist/pcap/ |
H A D | usb.h | 92 u_int32_t data_len; /* amount of urb data really present in this event*/ member in struct:_usb_header 117 u_int32_t data_len; /* amount of urb data really present in this event*/ member in struct:_usb_header_mmapped
|