Searched refs:out_data (Results 1 - 24 of 24) sorted by relevance

/netbsd-6-1-5-RELEASE/external/bsd/liblzf/dist/
H A Dlzf_d.c55 void *out_data, unsigned int out_len)
58 u8 *op = (u8 *)out_data;
125 if (ref < (u8 *)out_data)
146 return (unsigned)(op - (u8 *)out_data);
54 lzf_decompress(const void *const in_data, unsigned int in_len, void *out_data, unsigned int out_len) argument
H A Dlzf_c.c100 void *out_data, unsigned int out_len
111 u8 *op = (u8 *)out_data;
296 return (unsigned)(op - (u8 *)out_data);
99 lzf_compress(const void *const in_data, unsigned int in_len, void *out_data, unsigned int out_len , LZF_STATE htab ) argument
/netbsd-6-1-5-RELEASE/external/bsd/liblzf/dist/cs/
H A DCLZF.cs153 public int lzf_compress (byte[] in_data, int in_len,byte[] out_data, int out_len) argument
204 out_data[oidx++] = (byte)(lit - 1);
207 out_data[oidx++] = in_data[iidx+lit];
216 out_data[oidx++] = (byte)((off >> 8) + (len << 5));
220 out_data[oidx++] = (byte)((off >> 8) + ( 7 << 5));
221 out_data[oidx++] = (byte)(len - 7);
224 out_data[oidx++] = (byte)off;
251 out_data[oidx++] = (byte)(MAX_LIT - 1);
254 out_data[oidx++] = in_data[iidx+lit];
264 out_data[oid
277 lzf_decompress( byte[] in_data, int in_len, byte[] out_data, int out_len) argument
[all...]
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/tls/
H A Dtlsv1_record.c236 * @out_data: Buffer for output data (must be at least as long as in_data)
237 * @out_len: Set to maximum out_data length by caller; used to return the
247 u8 *out_data, size_t *out_len, u8 *alert)
315 os_memcpy(out_data, in_data, in_len);
319 if (crypto_cipher_decrypt(rl->read_cbc, out_data,
320 out_data, in_len) < 0) {
331 padlen = out_data[in_len - 1];
341 if (out_data[i] != padlen) {
345 out_data + in_len - padlen,
357 out_data, in_le
245 tlsv1_record_receive(struct tlsv1_record_layer *rl, const u8 *in_data, size_t in_len, u8 *out_data, size_t *out_len, u8 *alert) argument
[all...]
H A Dtlsv1_client.h35 u8 *out_data, size_t out_len);
38 u8 *out_data, size_t out_len);
H A Dtlsv1_server.h33 u8 *out_data, size_t out_len);
36 u8 *out_data, size_t out_len);
H A Dtlsv1_record.h72 u8 *out_data, size_t *out_len, u8 *alert);
H A Dtlsv1_client.c214 * @out_data: Pointer to output buffer (encrypted TLS data)
215 * @out_len: Maximum out_data length
216 * Returns: Number of bytes written to out_data, -1 on failure
223 u8 *out_data, size_t out_len)
230 os_memcpy(out_data + TLS_RECORD_HEADER_LEN, in_data, in_len);
233 out_data, out_len, in_len, &rlen) < 0) {
249 * @out_data: Pointer to output buffer (decrypted data from TLS tunnel)
250 * @out_len: Maximum out_data length
251 * Returns: Number of bytes written to out_data, -1 on failure
258 u8 *out_data, size_
221 tlsv1_client_encrypt(struct tlsv1_client *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument
256 tlsv1_client_decrypt(struct tlsv1_client *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument
[all...]
H A Dtlsv1_server.c188 * @out_data: Pointer to output buffer (encrypted TLS data)
189 * @out_len: Maximum out_data length
190 * Returns: Number of bytes written to out_data, -1 on failure
197 u8 *out_data, size_t out_len)
204 os_memcpy(out_data + TLS_RECORD_HEADER_LEN, in_data, in_len);
207 out_data, out_len, in_len, &rlen) < 0) {
223 * @out_data: Pointer to output buffer (decrypted data from TLS tunnel)
224 * @out_len: Maximum out_data length
225 * Returns: Number of bytes written to out_data, -1 on failure
232 u8 *out_data, size_
195 tlsv1_server_encrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument
230 tlsv1_server_decrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument
[all...]
H A Dtlsv1_client_i.h85 u8 **out_data, size_t *out_len);
H A Dtlsv1_client_read.c869 u8 **out_data, size_t *out_len)
888 *out_data = os_malloc(left);
889 if (*out_data) {
890 os_memcpy(*out_data, pos, left);
900 u8 **out_data, size_t *out_len)
960 if (out_data &&
961 tls_process_application_data(conn, ct, buf, len, out_data,
867 tls_process_application_data(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len, u8 **out_data, size_t *out_len) argument
898 tlsv1_client_process_handshake(struct tlsv1_client *conn, u8 ct, const u8 *buf, size_t *len, u8 **out_data, size_t *out_len) argument
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/gssapi/krb5/
H A Ddecapsulate.c121 * Remove the GSS-API wrapping from `in_token' giving `out_data.
129 krb5_data *out_data,
145 out_data->length = input_token_buffer->length -
147 out_data->data = p;
152 * Remove the GSS-API wrapping from `in_token' giving `out_data.
159 krb5_data *out_data,
176 out_data->length = input_token_buffer->length -
178 out_data->data = p;
126 _gssapi_decapsulate( OM_uint32 *minor_status, gss_buffer_t input_token_buffer, krb5_data *out_data, const gss_OID mech ) argument
157 _gsskrb5_decapsulate(OM_uint32 *minor_status, gss_buffer_t input_token_buffer, krb5_data *out_data, const void *type, gss_OID oid) argument
/netbsd-6-1-5-RELEASE/usr.sbin/isdn/daicctl/
H A Dmain.c160 u_int8_t out_data[16]; local
170 req.out_param_len = sizeof out_data;
171 req.out_param = &out_data;
177 printf("Return code: 0x%02x\n", out_data[0]);
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_peer/
H A Deap_tls_common.h98 struct wpabuf **out_data);
118 struct wpabuf **out_data);
H A Deap_tls_common.c423 * @out_data: Buffer for returning a pointer to application data (if available)
429 struct wpabuf **out_data)
460 *out_data = appl_data;
477 * @out_data: Buffer for returning the allocated output buffer
482 struct wpabuf **out_data)
523 *out_data = eap_msg_alloc(EAP_VENDOR_IETF, eap_type,
526 if (*out_data == NULL)
529 flags = wpabuf_put(*out_data, 1);
535 wpabuf_put_be32(*out_data, wpabuf_len(data->tls_out));
538 wpabuf_put_data(*out_data,
427 eap_tls_process_input(struct eap_sm *sm, struct eap_ssl_data *data, const u8 *in_data, size_t in_len, struct wpabuf **out_data) argument
480 eap_tls_process_output(struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, int ret, struct wpabuf **out_data) argument
579 eap_peer_tls_process_helper(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const u8 *in_data, size_t in_len, struct wpabuf **out_data) argument
879 eap_peer_tls_encrypt(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const struct wpabuf *in_data, struct wpabuf **out_data) argument
[all...]
H A Deap_ttls.c1249 struct wpabuf **out_data)
1258 resp, out_data)) {
1429 struct wpabuf **out_data)
1482 out_data) < 0)
1501 struct wpabuf **out_data)
1508 *out_data = eap_ttls_build_phase_finished(sm, data, identifier, 1);
1518 struct wpabuf **out_data)
1538 out_data);
1554 struct wpabuf **out_data)
1569 *out_data
1246 eap_ttls_encrypt_response(struct eap_sm *sm, struct eap_ttls_data *data, struct wpabuf *resp, u8 identifier, struct wpabuf **out_data) argument
1423 eap_ttls_process_decrypted(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, u8 identifier, struct ttls_parse_avp *parse, struct wpabuf *in_decrypted, struct wpabuf **out_data) argument
1497 eap_ttls_final_phase_finished(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, u8 identifier, struct wpabuf **out_data) argument
1514 eap_ttls_implicit_identity_request(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, u8 identifier, struct wpabuf **out_data) argument
1552 eap_ttls_phase2_start(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, u8 identifier, struct wpabuf **out_data) argument
1582 eap_ttls_decrypt(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, u8 identifier, const struct wpabuf *in_data, struct wpabuf **out_data) argument
1705 eap_ttls_process_handshake(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, u8 identifier, const u8 *in_data, size_t in_len, struct wpabuf **out_data) argument
[all...]
H A Deap_fast.c1103 u8 identifier, struct wpabuf **out_data)
1112 resp, out_data)) {
1145 struct wpabuf **out_data)
1155 req->identifier, out_data);
1160 req->identifier, out_data);
1166 req->identifier, out_data);
1248 out_data);
1256 struct wpabuf **out_data)
1279 req->identifier, NULL, out_data);
1299 in_decrypted, out_data);
1100 eap_fast_encrypt_response(struct eap_sm *sm, struct eap_fast_data *data, struct wpabuf *resp, u8 identifier, struct wpabuf **out_data) argument
1140 eap_fast_process_decrypted(struct eap_sm *sm, struct eap_fast_data *data, struct eap_method_ret *ret, const struct eap_hdr *req, struct wpabuf *decrypted, struct wpabuf **out_data) argument
1252 eap_fast_decrypt(struct eap_sm *sm, struct eap_fast_data *data, struct eap_method_ret *ret, const struct eap_hdr *req, const struct wpabuf *in_data, struct wpabuf **out_data) argument
[all...]
H A Deap_peap.c760 struct wpabuf **out_data)
798 req->identifier, NULL, out_data);
1019 rmsg, out_data)) {
756 eap_peap_decrypt(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, const struct eap_hdr *req, const struct wpabuf *in_data, struct wpabuf **out_data) argument
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/krb5/
H A Dget_for_creds.c89 * in out_data. If hostname == NULL, pick it from server.
92 * @param auth_context the auth context with the key to encrypt the out_data.
98 * @param out_data the resulting credential.
113 krb5_data *out_data)
157 out_data);
175 * @param auth_context the auth context with the key to encrypt the out_data.
181 * @param out_data the resulting credential.
195 krb5_data *out_data)
451 out_data->length = len;
452 out_data
106 krb5_fwd_tgt_creds(krb5_context context, krb5_auth_context auth_context, const char *hostname, krb5_principal client, krb5_principal server, krb5_ccache ccache, int forwardable, krb5_data *out_data) argument
189 krb5_get_forwarded_creds(krb5_context context, krb5_auth_context auth_context, krb5_ccache ccache, krb5_flags flags, const char *hostname, krb5_creds *in_creds, krb5_data *out_data) argument
[all...]
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kpasswd/
H A Dkpasswdd.c438 krb5_data *out_data,
548 out_data,
576 krb5_data out_data; local
582 krb5_data_zero (&out_data);
609 if (verify (&auth_context, realms, keytab, &ticket, &out_data,
616 &out_data);
617 memset (out_data.data, 0, out_data.length);
622 krb5_data_free (&out_data);
434 verify(krb5_auth_context *auth_context, krb5_realm *realms, krb5_keytab keytab, krb5_ticket **ticket, krb5_data *out_data, uint16_t *version, int s, struct sockaddr *sa, int sa_size, u_char *msg, size_t len) argument
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/crypto/
H A Dtls_nss.c464 struct wpabuf *out_data; local
497 out_data = wpabuf_alloc_ext_data(conn->push_buf, conn->push_buf_len);
498 if (out_data == NULL)
502 return out_data;
H A Dtls_openssl.c2243 struct wpabuf *out_data; local
2279 out_data = wpabuf_alloc(res);
2280 if (out_data == NULL) {
2289 res = res == 0 ? 0 : BIO_read(conn->ssl_out, wpabuf_mhead(out_data),
2298 wpabuf_free(out_data);
2301 wpabuf_put(out_data, res);
2303 return out_data;
2347 struct wpabuf *out_data; local
2352 out_data = openssl_handshake(conn, in_data, server);
2353 if (out_data
[all...]
H A Dtls_gnutls.c1011 struct wpabuf *out_data; local
1103 out_data = conn->push_buf;
1105 return out_data;
/netbsd-6-1-5-RELEASE/lib/libtelnet/
H A Dkerberos5.c676 krb5_data out_data; local
715 ccache, flags.i, RemoteHostName, &creds, &out_data);
722 if (!Data(ap, KRB_FORWARD, out_data.data, out_data.length)) {

Completed in 178 milliseconds