/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/tls/ |
H A D | pkcs8.c | 43 pos = hdr.payload; 59 if (bignum_set_unsigned_bin(zero, hdr.payload, hdr.length) < 0) { 64 pos = hdr.payload + hdr.length; 87 if (asn1_get_oid(hdr.payload, hdr.length, &oid, &pos)) { 109 pos = hdr.payload + hdr.length; 123 crypto_rsa_import_private_key(hdr.payload, hdr.length); 156 pos = hdr.payload; 169 enc_alg = hdr.payload; 171 pos = hdr.payload + hdr.length; 183 data = pkcs5_decrypt(enc_alg, enc_alg_len, hdr.payload, hd [all...] |
H A D | pkcs5.c | 95 pos = hdr.payload; 96 end = hdr.payload + hdr.length; 108 pos = hdr.payload + hdr.length; 109 os_memcpy(params->salt, hdr.payload, hdr.length); 122 params->iter_count = *hdr.payload; 124 params->iter_count = WPA_GET_BE16(hdr.payload); 126 params->iter_count = WPA_GET_BE32(hdr.payload); 130 hdr.payload, hdr.length);
|
H A D | x509v3.c | 208 pos = hdr.payload; 250 pos = hdr.payload; 271 pos = hdr.payload; 326 pos = hdr.payload; 346 set_pos = hdr.payload; 347 pos = set_end = hdr.payload + hdr.length; 359 seq_pos = hdr.payload; 360 seq_end = hdr.payload + hdr.length; 425 os_memcpy(name->email, hdr.payload, hdr.length); 442 hdr.payload, hd [all...] |
H A D | tlsv1_record.c | 142 * beginning for record layer to fill in; payload filled in after this and 145 * @payload_len: Length of the payload 155 u8 *pos, *ct_start, *length, *payload; local 172 payload = pos; 203 size_t len = pos - payload; 217 if (crypto_cipher_encrypt(rl->write_cbc, payload, 218 payload, pos - payload) < 0)
|
H A D | asn1.c | 80 hdr->payload = pos; 143 *next = hdr.payload + hdr.length; 145 return asn1_parse_oid(hdr.payload, hdr.length, oid);
|
H A D | asn1.h | 53 const u8 *payload; member in struct:asn1_hdr
|
H A D | rsa.c | 52 if (bignum_set_unsigned_bin(num, hdr.payload, hdr.length) < 0) { 57 return hdr.payload + hdr.length; 101 pos = hdr.payload; 185 pos = hdr.payload;
|
H A D | tlsv1_cred.c | 364 pos = hdr.payload; 377 wpa_hexdump(MSG_MSGDUMP, "DH: prime (p)", hdr.payload, hdr.length); 384 os_memcpy(cred->dh_p, hdr.payload, hdr.length); 386 pos = hdr.payload + hdr.length; 399 wpa_hexdump(MSG_MSGDUMP, "DH: base (g)", hdr.payload, hdr.length); 406 os_memcpy(cred->dh_g, hdr.payload, hdr.length);
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/ssl/ |
H A D | heartbeat_test.c | 24 * expected payload len: 0 56 /* Maximum number of payload characters to print as test output */ 65 unsigned char* payload; member in struct:heartbeat_test_fixture 141 * payload we seek. 165 * a total of 6 bytes, at which point we can grab the length and the payload 180 const unsigned char *payload, const int n) 192 const unsigned char c = payload[i]; 203 unsigned char *payload = fixture.payload; local 209 s->s3->rrec.data = payload; 179 print_payload(const char* const prefix, const unsigned char *payload, const int n) argument [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/test/ |
H A D | heartbeat_test.c | 24 * expected payload len: 0 56 /* Maximum number of payload characters to print as test output */ 65 unsigned char* payload; member in struct:heartbeat_test_fixture 141 * payload we seek. 165 * a total of 6 bytes, at which point we can grab the length and the payload 180 const unsigned char *payload, const int n) 192 const unsigned char c = payload[i]; 203 unsigned char *payload = fixture.payload; local 209 s->s3->rrec.data = payload; 179 print_payload(const char* const prefix, const unsigned char *payload, const int n) argument [all...] |
/netbsd-6-1-5-RELEASE/crypto/dist/ipsec-tools/src/racoon/ |
H A D | isakmp_inf.c | 135 vchar_t *hash, *payload; 184 "message has no hash payload.\n"); 212 "too long payload length (broken message?)\n"); 218 "too short payload length (broken message?)\n"); 222 payload = vmalloc(ntohs(nd->len)); 223 if (payload == NULL) { 229 memcpy(payload->v, (caddr_t) nd, ntohs(nd->len)); 232 hash = oakley_compute_hash1(iph1, isakmp->msgid, payload); 237 vfree(payload); 246 vfree(payload); 134 vchar_t *hash, *payload; local 581 vchar_t *payload = NULL; local 627 vchar_t *payload = NULL; local 699 vchar_t *payload = NULL; local 771 vchar_t *payload = NULL; local 830 vchar_t *payload = NULL; local 1410 vchar_t *payload = NULL; local 1499 vchar_t *payload = NULL; local [all...] |
H A D | isakmp_var.h | 110 struct payload_list *plist, vchar_t *payload, 113 static inline struct payload_list *isakmp_plist_append(plist, payload, payload_type) 115 vchar_t *payload; variable 118 return isakmp_plist_append_full(plist, payload, payload_type, 0);
|
H A D | isakmp_cfg.c | 193 /* Check that the payload header fits in the packet */ 196 "Short payload header\n"); 200 /* Check that the payload fits in the packet */ 203 "Short payload\n"); 207 plog(LLV_DEBUG, LOCATION, NULL, "Seen payload %d\n", np); 213 vchar_t *payload; local 221 if ((payload = vmalloc(plen)) == NULL) { 226 memcpy(payload->v, nph, plen); 229 packet->msgid, payload)) == NULL) { 232 vfree(payload); 496 vchar_t *payload; local 664 vchar_t *payload; local [all...] |
/netbsd-6-1-5-RELEASE/external/cddl/osnet/sys/kern/ |
H A D | fm.c | 490 i_fm_payload_set(nvlist_t *payload, const char *name, va_list ap) argument 499 ret = nvlist_add_byte(payload, name, 504 ret = nvlist_add_byte_array(payload, name, 508 ret = nvlist_add_boolean_value(payload, name, 513 ret = nvlist_add_boolean_array(payload, name, 517 ret = nvlist_add_int8(payload, name, 522 ret = nvlist_add_int8_array(payload, name, 526 ret = nvlist_add_uint8(payload, name, 531 ret = nvlist_add_uint8_array(payload, name, 535 ret = nvlist_add_int16(payload, nam 616 fm_payload_set(nvlist_t *payload, ...) argument [all...] |
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/util/ |
H A D | mymalloc.c | 103 char payload[1]; /* actually a bunch of bytes */ member in union:MBLOCK::__anon2531 113 real_ptr = (MBLOCK *) (ptr - offsetof(MBLOCK, u.payload[0])); \ 124 ptr = real_ptr->u.payload; \ 127 #define SPACE_FOR(len) (offsetof(MBLOCK, u.payload[0]) + len)
|
/netbsd-6-1-5-RELEASE/usr.sbin/btattach/ |
H A D | init_csr.c | 55 uint16_t payload[4]; member in struct:bccmd::__anon9941 99 cmd.message.payload[0] = htole16((speed * 64 + 7812) / 15625);
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/wps/ |
H A D | ndef.c | 31 u8 *payload; member in struct:ndef_record 71 record->payload = record->payload_length == 0 ? NULL : pos; 94 return wpabuf_alloc_copy(record.payload, 106 u8 id_length, void *payload, 117 /* payload length */ 147 wpabuf_put_data(record, payload, payload_length); 104 ndef_build_record(u8 flags, void *type, u8 type_length, void *id, u8 id_length, void *payload, u32 payload_length) argument
|
/netbsd-6-1-5-RELEASE/tests/net/icmp/ |
H A D | t_forward.c | 71 char payload[1024]; local 97 if (rump_sys_sendto(s, payload, sizeof(payload), 0,
|
/netbsd-6-1-5-RELEASE/external/zlib/pigz/dist/ |
H A D | yarn.c | 190 /* structure in which to pass the probe and its payload to ignition() */ 193 void *payload; member in struct:capsule 238 capsule->probe(capsule->payload); 250 thread *launch(void (*probe)(void *), void *payload) argument 263 capsule->payload = payload;
|
/netbsd-6-1-5-RELEASE/usr.sbin/fwctl/ |
H A D | fwmpegts.c | 77 . MPEG TS payload 188 bytes . 89 The length is payload length, i.e. includes CIP header and data size. 99 and thus the payload is divided in 8 blocks as follows: 105 We have several cases of payload distribution based on stream 107 1) R < 1.5 Mbps: any of db0..db7 may be payload, 108 2) 1.5 < R < 3 Mbps: db0/db1 or db2/db3 or db4/db5 or db6/db7 is payload, 109 3) 3 < R < 6 Mbps: db0/db1/db2/db3 or db4/db5/db6/db7 is payload, 110 4) R > 6 Mbps: all db0..db7 contain the payload. 131 mpeg_ts_pld payload; member in struct:mpeg_pldt 216 /* no payload */ [all...] |
/netbsd-6-1-5-RELEASE/sys/dev/ieee1394/ |
H A D | iec68113.h | 129 uint8_t payload[77]; member in struct:dvdbc 130 #define DV_DSF_12 0x80 /* PAL: payload[0] in Header DIF */
|
H A D | firewire.h | 151 uint32_t payload[0]; member in struct:fw_pkt::__anon7661::__anon7663 196 uint32_t payload[0]; member in struct:fw_pkt::__anon7661::__anon7671 203 uint32_t payload[0]; member in struct:fw_pkt::__anon7661::__anon7672 210 uint32_t payload[0]; member in struct:fw_pkt::__anon7661::__anon7673 217 uint32_t payload[0]; member in struct:fw_pkt::__anon7661::__anon7674
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_peer/ |
H A D | eap_gpsk.c | 260 const u8 *payload, 274 end = payload + payload_len; 276 pos = eap_gpsk_process_id_server(data, payload, end); 514 const u8 *payload, 532 data->specifier, payload, pos - payload, mic) 553 const u8 *payload, 566 end = payload + payload_len; 568 pos = eap_gpsk_validate_rand(data, payload, end); 572 pos = eap_gpsk_validate_gpsk_3_mic(data, payload, po 256 eap_gpsk_process_gpsk_1(struct eap_sm *sm, struct eap_gpsk_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 513 eap_gpsk_validate_gpsk_3_mic(struct eap_gpsk_data *data, const u8 *payload, const u8 *pos, const u8 *end) argument 549 eap_gpsk_process_gpsk_3(struct eap_sm *sm, struct eap_gpsk_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument [all...] |
H A D | eap_sake.c | 150 const u8 *payload, 163 if (eap_sake_parse_attributes(payload, payload_len, &attr)) 194 const u8 *payload, 213 if (eap_sake_parse_attributes(payload, payload_len, &attr)) 294 const u8 *payload, 309 if (eap_sake_parse_attributes(payload, payload_len, &attr)) 146 eap_sake_process_identity(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 190 eap_sake_process_challenge(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 290 eap_sake_process_confirm(struct eap_sm *sm, struct eap_sake_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_server/ |
H A D | eap_server_gpsk.c | 252 const u8 *payload, size_t payloadlen) 265 pos = payload; 266 end = payload + payloadlen; 443 data->specifier, payload, pos - payload, mic) 470 const u8 *payload, size_t payloadlen) 482 pos = payload; 483 end = payload + payloadlen; 512 data->specifier, payload, pos - payload, mi 250 eap_gpsk_process_gpsk_2(struct eap_sm *sm, struct eap_gpsk_data *data, const u8 *payload, size_t payloadlen) argument 468 eap_gpsk_process_gpsk_4(struct eap_sm *sm, struct eap_gpsk_data *data, const u8 *payload, size_t payloadlen) argument [all...] |