/netbsd-6-1-5-RELEASE/dist/smbfs/lib/smb/ |
H A D | nls.c | 107 size_t inlen, outlen; local 111 inlen = outlen = strlen(src); 113 while (iconv(nls_toloc, &src, &inlen, &p, &outlen) == -1) { 115 inlen--; 126 size_t inlen, outlen; local 130 inlen = outlen = strlen(src); 132 while (iconv(nls_toext, &src, &inlen, &p, &outlen) == -1) { 134 inlen--; 146 size_t inlen, outlen; local 153 inlen 168 size_t inlen, outlen; local [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/tls/ |
H A D | pkcs1.h | 19 int use_private, const u8 *in, size_t inlen, 22 const u8 *in, size_t inlen,
|
H A D | pkcs1.c | 23 const u8 *in, size_t inlen, 39 if (modlen < 12 || modlen > *outlen || inlen > modlen - 11) { 41 "lengths (modlen=%lu outlen=%lu inlen=%lu)", 44 (unsigned long) inlen); 51 ps_len = modlen - inlen - 3; 79 os_memcpy(pos, in, inlen); /* D */ 86 int use_private, const u8 *in, size_t inlen, 93 if (pkcs1_generate_encryption_block(block_type, modlen, in, inlen, 102 const u8 *in, size_t inlen, 108 res = crypto_rsa_exptmod(in, inlen, ou 22 pkcs1_generate_encryption_block(u8 block_type, size_t modlen, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 85 pkcs1_encrypt(int block_type, struct crypto_rsa_key *key, int use_private, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 101 pkcs1_v15_private_key_decrypt(struct crypto_rsa_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument [all...] |
H A D | rsa.h | 25 int crypto_rsa_exptmod(const u8 *in, size_t inlen, u8 *out, size_t *outlen,
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/libsaslc/dist/src/ |
H A D | crypto.c | 58 * @param inlen input data length (in bytes) 64 saslc__crypto_encode_base64(const void *in, size_t inlen, argument 73 enclen = (((inlen + 2) / 3)) * 4; 87 if (BIO_write(b64, in, (int)inlen) != (int)inlen) { 110 * @param inlen input data length (in bytes) 116 saslc__crypto_decode_base64(const char *in, size_t inlen, argument 125 declen = ((inlen + 3) / 4) * 3; 139 if (BIO_write(bio, in, (int)inlen) != (int)inlen) { 247 saslc__crypto_hmac_md5_hash(const unsigned char *key, size_t keylen, const unsigned char *in, size_t inlen, unsigned char *hmac) argument 271 saslc__crypto_hmac_md5_hex(const unsigned char *key, size_t keylen, const unsigned char *in, size_t inlen) argument [all...] |
H A D | xsess.c | 395 * and its lenght are stored in in and inlen, output is stored in out and 401 * @param inlen input data length 409 saslc_sess_cont(saslc_sess_t *sess, const void *in, size_t inlen, argument 432 saslc__msg_dbg("%s: encoded: inlen=%zu in='%s'", __func__, inlen, 434 if (inlen == 0 || (sess->flags & SASLC_FLAGS_BASE64_IN) == 0) 437 if (saslc__crypto_decode_base64(in, inlen, &dec, &inlen) 445 saslc__msg_dbg("%s: decoded: inlen=%zu in='%s'", __func__, inlen, 489 saslc__sess_copyout(saslc_sess_t *sess, const void *in, size_t inlen, void **out, size_t *outlen) argument 528 saslc__sess_xxcode(saslc_sess_t *sess, saslc__mech_xxcode_t xxcode, const void *in, size_t inlen, void **out, size_t *outlen) argument 605 saslc_sess_encode(saslc_sess_t *sess, const void *in, size_t inlen, void **out, size_t *outlen) argument 626 saslc_sess_decode(saslc_sess_t *sess, const void *in, size_t inlen, void **out, size_t *outlen) argument [all...] |
H A D | mech_anonymous.c | 58 * @param inlen input data length 68 saslc__mech_anonymous_cont(saslc_sess_t *sess, const void *in, size_t inlen, argument
|
H A D | mech_external.c | 55 * @param inlen input data length 64 saslc__mech_external_cont(saslc_sess_t *sess, const void *in, size_t inlen, argument
|
H A D | mech_crammd5.c | 62 * @param inlen input data length 70 saslc__mech_crammd5_cont(saslc_sess_t *sess, const void *in, size_t inlen, argument 78 if (inlen == 0) { 96 strlen(passwd), in, inlen);
|
H A D | buffer.c | 140 * @param inlen input buffer length 148 * buffer can be flushed by calling with inlen = 0. 152 size_t inlen, uint8_t **out, size_t *outlen) 157 if (inlen == 0) { /* flush internal buffer */ 167 len = MIN(inlen, ctx->bufneed); 242 * @param inlen input buffer length 250 size_t inlen, uint8_t **out, size_t *outlen) 255 if (inlen == 0) { /* we cannot flush the decode buffer */ 257 "bad inlen: cannot flush decode buffer"); 263 len = MIN(inlen, ct 151 saslc__buffer_fetch(saslc__buffer_context_t *ctx, const uint8_t *in, size_t inlen, uint8_t **out, size_t *outlen) argument 249 saslc__buffer32_fetch(saslc__buffer32_context_t *ctx, const uint8_t *in, size_t inlen, uint8_t **out, size_t *outlen) argument [all...] |
H A D | mech_login.c | 59 * @param inlen input data length 69 size_t inlen __unused, void **out, size_t *outlen)
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/crypto/ |
H A D | crypto_internal-rsa.c | 71 const u8 *in, size_t inlen, 75 0, in, inlen, out, outlen); 80 const u8 *in, size_t inlen, 84 in, inlen, out, outlen); 89 const u8 *in, size_t inlen, 93 1, in, inlen, out, outlen); 70 crypto_public_key_encrypt_pkcs1_v15(struct crypto_public_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 79 crypto_private_key_decrypt_pkcs1_v15(struct crypto_private_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 88 crypto_private_key_sign_pkcs1(struct crypto_private_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument
|
H A D | sha256-internal.c | 29 unsigned long inlen); 158 @param inlen The length of the data (octets) 162 unsigned long inlen) 170 while (inlen > 0) { 171 if (md->curlen == 0 && inlen >= block_size) { 176 inlen -= block_size; 178 n = MIN(inlen, (block_size - md->curlen)); 182 inlen -= n; 161 sha256_process(struct sha256_state *md, const unsigned char *in, unsigned long inlen) argument
|
/netbsd-6-1-5-RELEASE/sys/netsmb/ |
H A D | iconv.c | 55 size_t inlen, outlen; local 62 inlen = outlen = strlen(src); 66 error = iconv_conv(handle, &src, &inlen, &p, &outlen); 78 size_t inlen, outlen; local 87 inlen = outlen = size; 91 error = iconv_conv(handle, &s, &inlen, &d, &outlen);
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/ecdh/ |
H A D | ech_key.c | 74 void *(*KDF)(const void *in, size_t inlen, void *out, size_t *outlen)) 72 ECDH_compute_key(void *out, size_t outlen, const EC_POINT *pub_key, EC_KEY *eckey, void *(*KDF)(const void *in, size_t inlen, void *out, size_t *outlen)) argument
|
H A D | ech_locl.h | 69 void *(*KDF)(const void *in, size_t inlen, void *out, size_t *outlen));
|
H A D | ecdh.h | 95 void *(*KDF)(const void *in, size_t inlen, void *out, size_t *outlen));
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/pkcs12/ |
H A D | p12_decr.c | 72 int passlen, unsigned char *in, int inlen, unsigned char **data, 87 if(!(out = OPENSSL_malloc(inlen + EVP_CIPHER_CTX_block_size(&ctx)))) { 92 if (!EVP_CipherUpdate(&ctx, out, &i, in, inlen)) 163 int inlen; local 168 inlen = ASN1_item_i2d(obj, &in, it); 173 if (!PKCS12_pbe_crypt(algor, pass, passlen, in, inlen, &oct->data, 179 if (zbuf) OPENSSL_cleanse(in, inlen); 71 PKCS12_pbe_crypt(X509_ALGOR *algor, const char *pass, int passlen, unsigned char *in, int inlen, unsigned char **data, int *datalen, int en_de) argument
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/cms/ |
H A D | cms_pwri.c | 226 const unsigned char *in, size_t inlen, EVP_CIPHER_CTX *ctx) 231 if (inlen < 2 * blocklen) 236 if (inlen % blocklen) 241 tmp = OPENSSL_malloc(inlen); 243 EVP_DecryptUpdate(ctx, tmp + inlen - 2 * blocklen, &outl, 244 in + inlen - 2 * blocklen, blocklen * 2); 250 tmp + inlen - blocklen, blocklen); 252 EVP_DecryptUpdate(ctx, tmp, &outl, in, inlen - blocklen); 257 EVP_DecryptUpdate(ctx, tmp, &outl, tmp, inlen); 264 if (inlen < (size_ 225 kek_unwrap_key(unsigned char *out, size_t *outlen, const unsigned char *in, size_t inlen, EVP_CIPHER_CTX *ctx) argument 279 kek_wrap_key(unsigned char *out, size_t *outlen, const unsigned char *in, size_t inlen, EVP_CIPHER_CTX *ctx) argument [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/aes/ |
H A D | aes_wrap.c | 64 const unsigned char *in, unsigned int inlen) 68 if ((inlen & 0x7) || (inlen < 8)) 72 memcpy(out + 8, in, inlen); 81 for (i = 0; i < inlen; i += 8, t++, R += 8) 96 return inlen + 8; 101 const unsigned char *in, unsigned int inlen) 105 inlen -= 8; 106 if (inlen & 0x7) 108 if (inlen < 62 AES_wrap_key(AES_KEY *key, const unsigned char *iv, unsigned char *out, const unsigned char *in, unsigned int inlen) argument 99 AES_unwrap_key(AES_KEY *key, const unsigned char *iv, unsigned char *out, const unsigned char *in, unsigned int inlen) argument [all...] |
H A D | aes.h | 145 const unsigned char *in, unsigned int inlen); 148 const unsigned char *in, unsigned int inlen);
|
/netbsd-6-1-5-RELEASE/sys/arch/x68k/x68k/ |
H A D | kgdb_stub.c | 328 int inlen; local 341 for (inlen = 0; constab[inlen].cn_probe; inlen++) 342 if (major(constab[inlen].cn_dev) == major(kgdb_dev)) { 343 kgdb_getc = constab[inlen].cn_getc; 344 kgdb_putc = constab[inlen].cn_putc; 403 in = kgdb_recv(inbuffer, &inlen); 421 if (inlen == 0) { 450 for (len = 0; len < inlen; le [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/asn1/ |
H A D | tasn_utl.c | 165 int asn1_enc_save(ASN1_VALUE **pval, const unsigned char *in, int inlen, argument 175 enc->enc = OPENSSL_malloc(inlen); 178 memcpy(enc->enc, in, inlen); 179 enc->len = inlen;
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/rand/ |
H A D | rand_lib.c | 239 static int drbg_rand_add(DRBG_CTX *ctx, const void *in, int inlen, argument 242 RAND_SSLeay()->add(in, inlen, entropy); 246 static int drbg_rand_seed(DRBG_CTX *ctx, const void *in, int inlen) argument 248 RAND_SSLeay()->seed(in, inlen);
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/hcrypto/ |
H A D | evp.c | 831 * @param inlen length of data. 845 void *in, size_t inlen) 858 if (ctx->buf_len == 0 && (inlen & ctx->block_mask) == 0) { 859 ret = (*ctx->cipher->do_cipher)(ctx, out, in, inlen); 861 *outlen = inlen; 875 if (inlen < left) { 876 memcpy(ctx->buf + ctx->buf_len, in, inlen); 877 ctx->buf_len += inlen; 889 inlen -= left; 895 if (inlen) { 844 EVP_CipherUpdate(EVP_CIPHER_CTX *ctx, void *out, int *outlen, void *in, size_t inlen) argument [all...] |