/netbsd-6-1-5-RELEASE/external/bsd/liblzf/dist/ |
H A D | lzf_d.c | 55 void *out_data, unsigned int out_len) 58 u8 *op = (u8 *)out_data; 125 if (ref < (u8 *)out_data) 146 return (unsigned)(op - (u8 *)out_data); 54 lzf_decompress(const void *const in_data, unsigned int in_len, void *out_data, unsigned int out_len) argument
|
H A D | lzf_c.c | 100 void *out_data, unsigned int out_len 111 u8 *op = (u8 *)out_data; 296 return (unsigned)(op - (u8 *)out_data); 99 lzf_compress(const void *const in_data, unsigned int in_len, void *out_data, unsigned int out_len , LZF_STATE htab ) argument
|
/netbsd-6-1-5-RELEASE/external/bsd/liblzf/dist/cs/ |
H A D | CLZF.cs | 153 public int lzf_compress (byte[] in_data, int in_len,byte[] out_data, int out_len) argument 204 out_data[oidx++] = (byte)(lit - 1); 207 out_data[oidx++] = in_data[iidx+lit]; 216 out_data[oidx++] = (byte)((off >> 8) + (len << 5)); 220 out_data[oidx++] = (byte)((off >> 8) + ( 7 << 5)); 221 out_data[oidx++] = (byte)(len - 7); 224 out_data[oidx++] = (byte)off; 251 out_data[oidx++] = (byte)(MAX_LIT - 1); 254 out_data[oidx++] = in_data[iidx+lit]; 264 out_data[oid 277 lzf_decompress( byte[] in_data, int in_len, byte[] out_data, int out_len) argument [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/tls/ |
H A D | tlsv1_record.c | 236 * @out_data: Buffer for output data (must be at least as long as in_data) 237 * @out_len: Set to maximum out_data length by caller; used to return the 247 u8 *out_data, size_t *out_len, u8 *alert) 315 os_memcpy(out_data, in_data, in_len); 319 if (crypto_cipher_decrypt(rl->read_cbc, out_data, 320 out_data, in_len) < 0) { 331 padlen = out_data[in_len - 1]; 341 if (out_data[i] != padlen) { 345 out_data + in_len - padlen, 357 out_data, in_le 245 tlsv1_record_receive(struct tlsv1_record_layer *rl, const u8 *in_data, size_t in_len, u8 *out_data, size_t *out_len, u8 *alert) argument [all...] |
H A D | tlsv1_client.h | 35 u8 *out_data, size_t out_len); 38 u8 *out_data, size_t out_len);
|
H A D | tlsv1_server.h | 33 u8 *out_data, size_t out_len); 36 u8 *out_data, size_t out_len);
|
H A D | tlsv1_record.h | 72 u8 *out_data, size_t *out_len, u8 *alert);
|
H A D | tlsv1_client.c | 214 * @out_data: Pointer to output buffer (encrypted TLS data) 215 * @out_len: Maximum out_data length 216 * Returns: Number of bytes written to out_data, -1 on failure 223 u8 *out_data, size_t out_len) 230 os_memcpy(out_data + TLS_RECORD_HEADER_LEN, in_data, in_len); 233 out_data, out_len, in_len, &rlen) < 0) { 249 * @out_data: Pointer to output buffer (decrypted data from TLS tunnel) 250 * @out_len: Maximum out_data length 251 * Returns: Number of bytes written to out_data, -1 on failure 258 u8 *out_data, size_ 221 tlsv1_client_encrypt(struct tlsv1_client *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument 256 tlsv1_client_decrypt(struct tlsv1_client *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument [all...] |
H A D | tlsv1_server.c | 188 * @out_data: Pointer to output buffer (encrypted TLS data) 189 * @out_len: Maximum out_data length 190 * Returns: Number of bytes written to out_data, -1 on failure 197 u8 *out_data, size_t out_len) 204 os_memcpy(out_data + TLS_RECORD_HEADER_LEN, in_data, in_len); 207 out_data, out_len, in_len, &rlen) < 0) { 223 * @out_data: Pointer to output buffer (decrypted data from TLS tunnel) 224 * @out_len: Maximum out_data length 225 * Returns: Number of bytes written to out_data, -1 on failure 232 u8 *out_data, size_ 195 tlsv1_server_encrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument 230 tlsv1_server_decrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument [all...] |
H A D | tlsv1_client_i.h | 85 u8 **out_data, size_t *out_len);
|
H A D | tlsv1_client_read.c | 869 u8 **out_data, size_t *out_len) 888 *out_data = os_malloc(left); 889 if (*out_data) { 890 os_memcpy(*out_data, pos, left); 900 u8 **out_data, size_t *out_len) 960 if (out_data && 961 tls_process_application_data(conn, ct, buf, len, out_data, 867 tls_process_application_data(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len, u8 **out_data, size_t *out_len) argument 898 tlsv1_client_process_handshake(struct tlsv1_client *conn, u8 ct, const u8 *buf, size_t *len, u8 **out_data, size_t *out_len) argument
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/gssapi/krb5/ |
H A D | decapsulate.c | 121 * Remove the GSS-API wrapping from `in_token' giving `out_data. 129 krb5_data *out_data, 145 out_data->length = input_token_buffer->length - 147 out_data->data = p; 152 * Remove the GSS-API wrapping from `in_token' giving `out_data. 159 krb5_data *out_data, 176 out_data->length = input_token_buffer->length - 178 out_data->data = p; 126 _gssapi_decapsulate( OM_uint32 *minor_status, gss_buffer_t input_token_buffer, krb5_data *out_data, const gss_OID mech ) argument 157 _gsskrb5_decapsulate(OM_uint32 *minor_status, gss_buffer_t input_token_buffer, krb5_data *out_data, const void *type, gss_OID oid) argument
|
/netbsd-6-1-5-RELEASE/usr.sbin/isdn/daicctl/ |
H A D | main.c | 160 u_int8_t out_data[16]; local 170 req.out_param_len = sizeof out_data; 171 req.out_param = &out_data; 177 printf("Return code: 0x%02x\n", out_data[0]);
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_peer/ |
H A D | eap_tls_common.h | 98 struct wpabuf **out_data); 118 struct wpabuf **out_data);
|
H A D | eap_tls_common.c | 423 * @out_data: Buffer for returning a pointer to application data (if available) 429 struct wpabuf **out_data) 460 *out_data = appl_data; 477 * @out_data: Buffer for returning the allocated output buffer 482 struct wpabuf **out_data) 523 *out_data = eap_msg_alloc(EAP_VENDOR_IETF, eap_type, 526 if (*out_data == NULL) 529 flags = wpabuf_put(*out_data, 1); 535 wpabuf_put_be32(*out_data, wpabuf_len(data->tls_out)); 538 wpabuf_put_data(*out_data, 427 eap_tls_process_input(struct eap_sm *sm, struct eap_ssl_data *data, const u8 *in_data, size_t in_len, struct wpabuf **out_data) argument 480 eap_tls_process_output(struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, int ret, struct wpabuf **out_data) argument 579 eap_peer_tls_process_helper(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const u8 *in_data, size_t in_len, struct wpabuf **out_data) argument 879 eap_peer_tls_encrypt(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const struct wpabuf *in_data, struct wpabuf **out_data) argument [all...] |
H A D | eap_ttls.c | 1249 struct wpabuf **out_data) 1258 resp, out_data)) { 1429 struct wpabuf **out_data) 1482 out_data) < 0) 1501 struct wpabuf **out_data) 1508 *out_data = eap_ttls_build_phase_finished(sm, data, identifier, 1); 1518 struct wpabuf **out_data) 1538 out_data); 1554 struct wpabuf **out_data) 1569 *out_data 1246 eap_ttls_encrypt_response(struct eap_sm *sm, struct eap_ttls_data *data, struct wpabuf *resp, u8 identifier, struct wpabuf **out_data) argument 1423 eap_ttls_process_decrypted(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, u8 identifier, struct ttls_parse_avp *parse, struct wpabuf *in_decrypted, struct wpabuf **out_data) argument 1497 eap_ttls_final_phase_finished(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, u8 identifier, struct wpabuf **out_data) argument 1514 eap_ttls_implicit_identity_request(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, u8 identifier, struct wpabuf **out_data) argument 1552 eap_ttls_phase2_start(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, u8 identifier, struct wpabuf **out_data) argument 1582 eap_ttls_decrypt(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, u8 identifier, const struct wpabuf *in_data, struct wpabuf **out_data) argument 1705 eap_ttls_process_handshake(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, u8 identifier, const u8 *in_data, size_t in_len, struct wpabuf **out_data) argument [all...] |
H A D | eap_fast.c | 1103 u8 identifier, struct wpabuf **out_data) 1112 resp, out_data)) { 1145 struct wpabuf **out_data) 1155 req->identifier, out_data); 1160 req->identifier, out_data); 1166 req->identifier, out_data); 1248 out_data); 1256 struct wpabuf **out_data) 1279 req->identifier, NULL, out_data); 1299 in_decrypted, out_data); 1100 eap_fast_encrypt_response(struct eap_sm *sm, struct eap_fast_data *data, struct wpabuf *resp, u8 identifier, struct wpabuf **out_data) argument 1140 eap_fast_process_decrypted(struct eap_sm *sm, struct eap_fast_data *data, struct eap_method_ret *ret, const struct eap_hdr *req, struct wpabuf *decrypted, struct wpabuf **out_data) argument 1252 eap_fast_decrypt(struct eap_sm *sm, struct eap_fast_data *data, struct eap_method_ret *ret, const struct eap_hdr *req, const struct wpabuf *in_data, struct wpabuf **out_data) argument [all...] |
H A D | eap_peap.c | 760 struct wpabuf **out_data) 798 req->identifier, NULL, out_data); 1019 rmsg, out_data)) { 756 eap_peap_decrypt(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, const struct eap_hdr *req, const struct wpabuf *in_data, struct wpabuf **out_data) argument
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/krb5/ |
H A D | get_for_creds.c | 89 * in out_data. If hostname == NULL, pick it from server. 92 * @param auth_context the auth context with the key to encrypt the out_data. 98 * @param out_data the resulting credential. 113 krb5_data *out_data) 157 out_data); 175 * @param auth_context the auth context with the key to encrypt the out_data. 181 * @param out_data the resulting credential. 195 krb5_data *out_data) 451 out_data->length = len; 452 out_data 106 krb5_fwd_tgt_creds(krb5_context context, krb5_auth_context auth_context, const char *hostname, krb5_principal client, krb5_principal server, krb5_ccache ccache, int forwardable, krb5_data *out_data) argument 189 krb5_get_forwarded_creds(krb5_context context, krb5_auth_context auth_context, krb5_ccache ccache, krb5_flags flags, const char *hostname, krb5_creds *in_creds, krb5_data *out_data) argument [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kpasswd/ |
H A D | kpasswdd.c | 438 krb5_data *out_data, 548 out_data, 576 krb5_data out_data; local 582 krb5_data_zero (&out_data); 609 if (verify (&auth_context, realms, keytab, &ticket, &out_data, 616 &out_data); 617 memset (out_data.data, 0, out_data.length); 622 krb5_data_free (&out_data); 434 verify(krb5_auth_context *auth_context, krb5_realm *realms, krb5_keytab keytab, krb5_ticket **ticket, krb5_data *out_data, uint16_t *version, int s, struct sockaddr *sa, int sa_size, u_char *msg, size_t len) argument
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/crypto/ |
H A D | tls_nss.c | 464 struct wpabuf *out_data; local 497 out_data = wpabuf_alloc_ext_data(conn->push_buf, conn->push_buf_len); 498 if (out_data == NULL) 502 return out_data;
|
H A D | tls_openssl.c | 2243 struct wpabuf *out_data; local 2279 out_data = wpabuf_alloc(res); 2280 if (out_data == NULL) { 2289 res = res == 0 ? 0 : BIO_read(conn->ssl_out, wpabuf_mhead(out_data), 2298 wpabuf_free(out_data); 2301 wpabuf_put(out_data, res); 2303 return out_data; 2347 struct wpabuf *out_data; local 2352 out_data = openssl_handshake(conn, in_data, server); 2353 if (out_data [all...] |
H A D | tls_gnutls.c | 1011 struct wpabuf *out_data; local 1103 out_data = conn->push_buf; 1105 return out_data;
|
/netbsd-6-1-5-RELEASE/lib/libtelnet/ |
H A D | kerberos5.c | 676 krb5_data out_data; local 715 ccache, flags.i, RemoteHostName, &creds, &out_data); 722 if (!Data(ap, KRB_FORWARD, out_data.data, out_data.length)) {
|