/netbsd-6-1-5-RELEASE/external/gpl3/binutils/dist/gas/testsuite/gas/d10v/ |
H A D | instruction_packing-005.s | 1 .globl in_data 4 .type in_data,@object 5 .size in_data,2 6 in_data: label 14 ld r0,@((in_data),r14)
|
H A D | instruction_packing-005.d | 27 00000000 <in_data>:
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/krb5/ |
H A D | mk_req_ext.c | 42 krb5_data *in_data, 83 if (in_data) { 90 in_data->data, 91 in_data->length, 102 in_data->data, 103 in_data->length, 115 in_data->data, 116 in_data->length, 152 krb5_data *in_data, 159 in_data, 39 _krb5_mk_req_internal(krb5_context context, krb5_auth_context *auth_context, const krb5_flags ap_req_options, krb5_data *in_data, krb5_creds *in_creds, krb5_data *outbuf, krb5_key_usage checksum_usage, krb5_key_usage encrypt_usage) argument 149 krb5_mk_req_extended(krb5_context context, krb5_auth_context *auth_context, const krb5_flags ap_req_options, krb5_data *in_data, krb5_creds *in_creds, krb5_data *outbuf) argument [all...] |
H A D | mk_req.c | 43 krb5_data *in_data, 75 in_data, 88 krb5_data *in_data, 113 server, in_data, ccache, outbuf); 39 krb5_mk_req_exact(krb5_context context, krb5_auth_context *auth_context, const krb5_flags ap_req_options, const krb5_principal server, krb5_data *in_data, krb5_ccache ccache, krb5_data *outbuf) argument 83 krb5_mk_req(krb5_context context, krb5_auth_context *auth_context, const krb5_flags ap_req_options, const char *service, const char *hostname, krb5_data *in_data, krb5_ccache ccache, krb5_data *outbuf) argument
|
H A D | rd_cred.c | 60 krb5_data *in_data, 81 ret = decode_KRB_CRED(in_data->data, in_data->length, 331 krb5_data *in_data) 337 ret = krb5_rd_cred(context, auth_context, in_data, &creds, NULL); 58 krb5_rd_cred(krb5_context context, krb5_auth_context auth_context, krb5_data *in_data, krb5_creds ***ret_creds, krb5_replay_data *outdata) argument 328 krb5_rd_cred2(krb5_context context, krb5_auth_context auth_context, krb5_ccache ccache, krb5_data *in_data) argument
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/gssapi/krb5/ |
H A D | encapsulate.c | 104 const krb5_data *in_data, 112 _gssapi_encap_length (in_data->length, &len, &outer_len, mech); 122 memcpy (p, in_data->data, in_data->length); 134 const krb5_data *in_data, 143 _gsskrb5_encap_length (in_data->length, &len, &outer_len, mech); 153 memcpy (p, in_data->data, in_data->length); 102 _gssapi_encapsulate( OM_uint32 *minor_status, const krb5_data *in_data, gss_buffer_t output_token, const gss_OID mech ) argument 132 _gsskrb5_encapsulate( OM_uint32 *minor_status, const krb5_data *in_data, gss_buffer_t output_token, const void *type, const gss_OID mech ) argument
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/tls/ |
H A D | tlsv1_record.c | 234 * @in_data: Received data 236 * @out_data: Buffer for output data (must be at least as long as in_data) 246 const u8 *in_data, size_t in_len, 255 in_data, in_len); 265 "length %d", in_data[0], in_data[1], in_data[2], 266 WPA_GET_BE16(in_data + 3)); 268 if (in_data[0] != TLS_CONTENT_TYPE_HANDSHAKE && 269 in_data[ 245 tlsv1_record_receive(struct tlsv1_record_layer *rl, const u8 *in_data, size_t in_len, u8 *out_data, size_t *out_len, u8 *alert) argument [all...] |
H A D | tlsv1_client.h | 30 const u8 *in_data, size_t in_len, 34 const u8 *in_data, size_t in_len, 37 const u8 *in_data, size_t in_len,
|
H A D | tlsv1_server.h | 30 const u8 *in_data, size_t in_len, size_t *out_len); 32 const u8 *in_data, size_t in_len, 35 const u8 *in_data, size_t in_len,
|
H A D | tlsv1_client_read.c | 28 const u8 *in_data, size_t *in_len); 30 const u8 *in_data, size_t *in_len); 32 const u8 *in_data, size_t *in_len); 36 const u8 *in_data, size_t *in_len) 50 pos = in_data; 199 *in_len = end - in_data; 214 const u8 *in_data, size_t *in_len) 230 pos = in_data; 254 return tls_process_server_key_exchange(conn, ct, in_data, 257 return tls_process_certificate_request(conn, ct, in_data, 35 tls_process_server_hello(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 213 tls_process_certificate(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 476 tls_process_server_key_exchange(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 565 tls_process_certificate_request(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 629 tls_process_server_hello_done(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 686 tls_process_server_change_cipher_spec(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 757 tls_process_server_finished(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 867 tls_process_application_data(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len, u8 **out_data, size_t *out_len) argument [all...] |
H A D | tlsv1_client.c | 124 * @in_data: Input data from TLS peer 132 const u8 *in_data, size_t in_len, 147 if (in_data == NULL || in_len == 0) 150 pos = in_data; 151 end = in_data + in_len; 212 * @in_data: Pointer to plaintext data to be encrypted 222 const u8 *in_data, size_t in_len, 228 in_data, in_len); 230 os_memcpy(out_data + TLS_RECORD_HEADER_LEN, in_data, in_len); 247 * @in_data 131 tlsv1_client_handshake(struct tlsv1_client *conn, const u8 *in_data, size_t in_len, size_t *out_len, u8 **appl_data, size_t *appl_data_len) argument 221 tlsv1_client_encrypt(struct tlsv1_client *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument 256 tlsv1_client_decrypt(struct tlsv1_client *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument [all...] |
H A D | tlsv1_server.c | 106 * @in_data: Input data from TLS peer 112 const u8 *in_data, size_t in_len, 119 if (in_data == NULL || in_len == 0) { 124 pos = in_data; 125 end = in_data + in_len; 186 * @in_data: Pointer to plaintext data to be encrypted 196 const u8 *in_data, size_t in_len, 202 in_data, in_len); 204 os_memcpy(out_data + TLS_RECORD_HEADER_LEN, in_data, in_len); 221 * @in_data 111 tlsv1_server_handshake(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, size_t *out_len) argument 195 tlsv1_server_encrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument 230 tlsv1_server_decrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument [all...] |
H A D | tlsv1_server_read.c | 29 const u8 *in_data, size_t *in_len); 31 u8 ct, const u8 *in_data, 36 const u8 *in_data, size_t *in_len) 53 pos = in_data; 251 *in_len = end - in_data; 268 const u8 *in_data, size_t *in_len) 284 pos = in_data; 318 return tls_process_client_key_exchange(conn, ct, in_data, 461 *in_len = end - in_data; 671 const u8 *in_data, size_ 35 tls_process_client_hello(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 267 tls_process_certificate(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 670 tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 748 tls_process_certificate_verify(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 914 tls_process_change_cipher_spec(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 964 tls_process_client_finished(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument [all...] |
H A D | tlsv1_record.h | 71 const u8 *in_data, size_t in_len,
|
/netbsd-6-1-5-RELEASE/external/bsd/liblzf/dist/cs/ |
H A D | CLZF.cs | 153 public int lzf_compress (byte[] in_data, int in_len,byte[] out_data, int out_len) argument 169 UInt32 hval = FRST (in_data,iidx); 177 hval = NEXT (hval, in_data,iidx); 185 && in_data[reference+0] == in_data[iidx+0] 186 && in_data[reference+1] == in_data[iidx+1] 187 && in_data[reference+2] == in_data[iidx+2] 200 while (len < maxlen && in_data[referenc 277 lzf_decompress( byte[] in_data, int in_len, byte[] out_data, int out_len) argument [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/crypto/ |
H A D | tls_internal.c | 336 const struct wpabuf *in_data, 349 in_data ? wpabuf_head(in_data) : NULL, 350 in_data ? wpabuf_len(in_data) : 0, 379 const struct wpabuf *in_data, 393 res = tlsv1_server_handshake(conn->server, wpabuf_head(in_data), 394 wpabuf_len(in_data), &res_len); 414 const struct wpabuf *in_data) 420 buf = wpabuf_alloc(wpabuf_len(in_data) 334 tls_connection_handshake(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data) argument 377 tls_connection_server_handshake(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data) argument 412 tls_connection_encrypt(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data) argument 458 tls_connection_decrypt(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data) argument [all...] |
H A D | tls_none.c | 111 const struct wpabuf *in_data, 120 const struct wpabuf *in_data, 129 const struct wpabuf *in_data) 137 const struct wpabuf *in_data) 109 tls_connection_handshake(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data) argument 118 tls_connection_server_handshake(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data) argument 127 tls_connection_encrypt(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data) argument 135 tls_connection_decrypt(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data) argument
|
H A D | tls_nss.c | 461 const struct wpabuf *in_data, 467 in_data ? (unsigned int) wpabuf_len(in_data) : 0); 472 if (in_data && wpabuf_len(in_data) > 0) { 479 conn->pull_buf = os_malloc(wpabuf_len(in_data)); 482 os_memcpy(conn->pull_buf, wpabuf_head(in_data), 483 wpabuf_len(in_data)); 485 conn->pull_buf_len = wpabuf_len(in_data); 508 const struct wpabuf *in_data, 459 tls_connection_handshake(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data) argument 506 tls_connection_server_handshake(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data) argument 515 tls_connection_encrypt(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data) argument 541 tls_connection_decrypt(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data) argument [all...] |
H A D | tls.h | 339 * @in_data: Input data from TLS server 349 * in_data == %NULL and the library is expected to return ClientHello packet. 351 * to TLS library by calling this function again with in_data pointing to the 364 const struct wpabuf *in_data, 371 * @in_data: Input data from TLS peer 379 const struct wpabuf *in_data, 386 * @in_data: Plaintext data to be encrypted 395 const struct wpabuf *in_data); 401 * @in_data: Encrypted TLS data 410 const struct wpabuf *in_data); [all...] |
H A D | tls_schannel.c | 319 const struct wpabuf *in_data, 337 (int) wpabuf_len(in_data)); 346 inbufs[0].pvBuffer = (u8 *) wpabuf_head(in_data); 347 inbufs[0].cbBuffer = wpabuf_len(in_data); 466 const struct wpabuf *in_data, 475 const struct wpabuf *in_data) 498 out = wpabuf_alloc(sizes.cbHeader + wpabuf_len(in_data) + 507 wpabuf_put_buf(out, in_data); 508 bufs[1].cbBuffer = wpabuf_len(in_data); 557 const struct wpabuf *in_data) 317 tls_connection_handshake(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data) argument 464 tls_connection_server_handshake(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data) argument 473 tls_connection_encrypt(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data) argument 555 tls_connection_decrypt(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data) argument [all...] |
H A D | tls_gnutls.c | 1007 const struct wpabuf *in_data, 1017 if (in_data && wpabuf_len(in_data) > 0) { 1024 conn->pull_buf = wpabuf_dup(in_data); 1111 const struct wpabuf *in_data, 1114 return tls_connection_handshake(tls_ctx, conn, in_data, appl_data); 1120 const struct wpabuf *in_data) 1127 res = gnutls_ia_send(conn->session, wpabuf_head(in_data), 1128 wpabuf_len(in_data)); 1131 res = gnutls_record_send(conn->session, wpabuf_head(in_data), 1005 tls_connection_handshake(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data) argument 1109 tls_connection_server_handshake(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data) argument 1118 tls_connection_encrypt(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data) argument 1145 tls_connection_decrypt(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data) argument [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_peer/ |
H A D | eap_tls_common.h | 97 u8 id, const u8 *in_data, size_t in_len, 113 const struct wpabuf *in_data, 117 const struct wpabuf *in_data,
|
H A D | eap_tls_common.c | 316 * @in_data: Next incoming TLS segment 321 const struct wpabuf *in_data) 326 in_len = in_data ? wpabuf_len(in_data) : 0; 364 wpabuf_put_buf(data->tls_in, in_data); 380 * @in_data: Next incoming TLS segment 390 struct eap_ssl_data *data, const struct wpabuf *in_data, 395 if (data->tls_in_left > wpabuf_len(in_data) || data->tls_in) { 397 int res = eap_peer_tls_reassemble_fragment(data, in_data); 408 data->tls_in = wpabuf_dup(in_data); 320 eap_peer_tls_reassemble_fragment(struct eap_ssl_data *data, const struct wpabuf *in_data) argument 389 eap_peer_tls_data_reassemble( struct eap_ssl_data *data, const struct wpabuf *in_data, int *need_more_input) argument 427 eap_tls_process_input(struct eap_sm *sm, struct eap_ssl_data *data, const u8 *in_data, size_t in_len, struct wpabuf **out_data) argument 579 eap_peer_tls_process_helper(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const u8 *in_data, size_t in_len, struct wpabuf **out_data) argument 847 eap_peer_tls_decrypt(struct eap_sm *sm, struct eap_ssl_data *data, const struct wpabuf *in_data, struct wpabuf **in_decrypted) argument 879 eap_peer_tls_encrypt(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const struct wpabuf *in_data, struct wpabuf **out_data) argument [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/liblzf/dist/ |
H A D | lzf_d.c | 54 lzf_decompress (const void *const in_data, unsigned int in_len, argument 57 u8 const *ip = (const u8 *)in_data;
|
/netbsd-6-1-5-RELEASE/usr.sbin/isdn/daicctl/ |
H A D | main.c | 155 static u_int8_t in_data[] = { local 168 req.in_param_len = sizeof in_data; 169 req.in_param = &in_data;
|