/netbsd-6-1-5-RELEASE/sys/sys/ |
H A D | param.h | 227 #define STACK_LEN_ALIGN(len, bytes) (((len) + (bytes)) & ~(bytes))
|
/netbsd-6-1-5-RELEASE/sys/compat/osf1/ |
H A D | osf1_file.c | 142 int len, reclen; /* BSD-format */ local 198 if ((len = buflen - auio.uio_resid) == 0) 201 for (cookie = cookiebuf; len > 0; len -= reclen) { 220 if (reclen > len || resid < osf1_reclen) {
|
/netbsd-6-1-5-RELEASE/sys/fs/ptyfs/ |
H A D | ptyfs_vfsops.c | 101 size_t len; local 117 len = strlen(bp); 118 if (len < sizeof(mp->mnt_stat.f_mntonname)) /* XXX */ 119 rv += len; 130 size_t len; local 135 len = snprintf(tbuf, bufsiz, "/dev/null"); 138 len = snprintf(tbuf, bufsiz, "%s/%llu", ptyfs__getpath(l, mp), 145 return len >= bufsiz ? ENOSPC : 0;
|
/netbsd-6-1-5-RELEASE/sys/netinet6/ |
H A D | ip6_output.c | 152 * header (with pri, len, nxt, hlim, src, dst). 175 int hlen, tlen, len, off; local 359 m->m_pkthdr.len += optlen; 360 plen = m->m_pkthdr.len - sizeof(*ip6); 903 tlen = m->m_pkthdr.len; 949 ia6->ia_ifa.ifa_data.ifad_outbytes += m->m_pkthdr.len; 1031 len = (mtu - hlen - sizeof(struct ip6_frag)) & ~7; 1032 if (len < 8) { 1074 for (off = hlen; off < tlen; off += len) { 1097 if (off + len > 2174 ip6_pcbopt(int optname, u_char *buf, int len, struct ip6_pktopts **pktopt, kauth_cred_t cred, int uproto) argument 2829 ip6_setpktopt(int optname, u_char *buf, int len, struct ip6_pktopts *opt, kauth_cred_t cred, int sticky, int cmsg, int uproto) argument 3297 int len; local [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/ssl/ |
H A D | ssl_locl.h | 604 unsigned int len; member in struct:ssl3_buf_freelist_st 833 int ssl_get_prev_session(SSL *s, unsigned char *session,int len, const unsigned char *limit); 863 int ssl_fill_hello_random(SSL *s, int server, unsigned char *field, int len); 873 int ssl2_set_certificate(SSL *s, int type, int len, const unsigned char *data); 882 int ssl2_read(SSL *s, void *buf, int len); 883 int ssl2_peek(SSL *s, void *buf, int len); 884 int ssl2_write(SSL *s, const void *buf, int len); 908 unsigned char *p, int len); 917 int ssl3_read_bytes(SSL *s, int type, unsigned char *buf, int len, int peek); 918 int ssl3_write_bytes(SSL *s, int type, const void *buf, int len); [all...] |
H A D | t1_enc.c | 256 int len,i,idx,count; local 267 len=slen/count; 279 if (!tls1_P_hash(md ,S1,len+(slen&1), 283 S1+=len; 360 printf("\tkey_block: len= %d, data= ", s->s3->tmp.key_block_length); 1075 int len) 1083 printf ("tls1_generate_master_secret(%p,%p, %p, %d)\n", s,out, p,len); 1104 p,len, local 1108 BIO_dump_fp(stderr, (char *)p, len); 1173 * note that SSL3_RANDOM_SIZE > max(prohibited label len) 1074 tls1_generate_master_secret(SSL *s, unsigned char *out, unsigned char *p, int len) argument [all...] |
H A D | t1_lib.c | 524 /* Check for enough room 2 for extension type, 2 for len 603 /* save position of id len */ 606 /* skip over id len */ 609 /* write id len */ 964 const size_t len = sizeof(kSafariExtensionsBlock); local 966 if (data + len != d+n) 968 if (memcmp(data, kSafariExtensionsBlock, len) != 0) 980 unsigned short len; local 1003 n2s(data,len); 1005 if (data > (d+n-len)) 1480 ssl_next_proto_validate(unsigned char *d, unsigned len) argument 2193 tls1_process_ticket(SSL *s, unsigned char *session_id, int len, const unsigned char *limit, SSL_SESSION **ret) argument [all...] |
H A D | d1_both.c | 167 unsigned long len, unsigned short seq_num, unsigned long frag_off, 233 unsigned int len, frag_off, mac_size, blocksize; local 308 len = curr_mtu; 310 len = s->init_num; 323 len = curr_mtu; 325 len = s->init_num; 329 len - DTLS1_HM_HEADER_LENGTH); 333 OPENSSL_assert(len >= DTLS1_HM_HEADER_LENGTH); 337 len); 358 OPENSSL_assert(len 806 unsigned long len, frag_off, frag_len; local 1358 dtls1_set_message_header(SSL *s, unsigned char *p, unsigned char mt, unsigned long len, unsigned long frag_off, unsigned long frag_len) argument 1377 dtls1_set_message_header_int(SSL *s, unsigned char mt, unsigned long len, unsigned short seq_num, unsigned long frag_off, unsigned long frag_len) argument [all...] |
H A D | d1_srvr.c | 1625 int len, slen; local 1693 EVP_EncryptUpdate(&ctx, p, &len, senc, slen); 1694 p += len; 1695 EVP_EncryptFinal(&ctx, p, &len); 1696 p += len; 1706 len = p - (unsigned char *)(s->init_buf->data); 1709 s2n(len - DTLS1_HM_HEADER_LENGTH - 6, p); 1712 s->init_num= len;
|
H A D | heartbeat_test.c | 24 * expected payload len: 0 118 memset(fixture.s->s3->wbuf.buf, 0, fixture.s->s3->wbuf.len); 236 printf("%s failed:\n expected payload len: %d\n received: %d\n",
|
H A D | s23_lib.c | 127 int ssl23_read(SSL *s, void *buf, int len) argument 141 return(SSL_read(s,buf,len)); 150 int ssl23_peek(SSL *s, void *buf, int len) argument 164 return(SSL_peek(s,buf,len)); 173 int ssl23_write(SSL *s, const void *buf, int len) argument 187 return(SSL_write(s,buf,len));
|
H A D | s3_clnt.c | 3335 unsigned int len, padding_len; local 3340 len = s->next_proto_negotiated_len; 3341 padding_len = 32 - ((len + 2) % 32); 3343 d[4] = len; 3344 memcpy(d + 5, s->next_proto_negotiated, len); 3345 d[5 + len] = padding_len; 3346 memset(d + 6 + len, 0, padding_len); 3348 l2n3(2 + len + padding_len, d); 3350 s->init_num = 4 + 2 + len + padding_len;
|
H A D | s3_enc.c | 159 const char *sender, int len, unsigned char *p); 571 void ssl3_finish_mac(SSL *s, const unsigned char *buf, int len) argument 575 BIO_write (s->s3->handshake_buffer,(void *)buf,len); 583 EVP_DigestUpdate(s->s3->handshake_dgst[i],buf,len); 643 const char *sender, int len, unsigned char *p) 646 ret=ssl3_handshake_mac(s,NID_md5,sender,len,p); 652 sha1len=ssl3_handshake_mac(s,NID_sha1,sender,len,p); 660 const char *sender, int len, unsigned char *p) 695 EVP_DigestUpdate(&ctx,sender,len); 828 int len) 642 ssl3_final_finish_mac(SSL *s, const char *sender, int len, unsigned char *p) argument 659 ssl3_handshake_mac(SSL *s, int md_nid, const char *sender, int len, unsigned char *p) argument 827 ssl3_generate_master_secret(SSL *s, unsigned char *out, unsigned char *p, int len) argument [all...] |
H A D | s3_lib.c | 3048 rlen = s->s3->rbuf.len; 3049 wlen = s->s3->wbuf.len; 3061 s->s3->rbuf.len = rlen; 3062 s->s3->wbuf.len = wlen; 4159 int ssl3_write(SSL *s, const void *buf, int len) argument 4184 buf,len); 4205 buf,len); 4212 static int ssl3_read_internal(SSL *s, void *buf, int len, int peek) argument 4219 ret=s->method->ssl_read_bytes(s,SSL3_RT_APPLICATION_DATA,buf,len,peek); 4228 ret=s->method->ssl_read_bytes(s,SSL3_RT_APPLICATION_DATA,buf,len,pee 4237 ssl3_read(SSL *s, void *buf, int len) argument 4242 ssl3_peek(SSL *s, void *buf, int len) argument [all...] |
H A D | s3_pkt.c | 122 unsigned int len, int create_empty_fragment); 134 int i,len,left; local 201 len = s->packet_length; 204 * 'len' bytes already pointed to by 'packet', 206 if (s->packet != pkt) /* len > 0 */ 208 memmove(pkt, s->packet, len+left); 210 rb->offset = len + align; 213 if (n > (int)(rb->len - rb->offset)) /* does not happen */ 226 if (max > (int)(rb->len - rb->offset)) 227 max = rb->len 582 ssl3_write_bytes(SSL *s, int type, const void *buf_, int len) argument 651 do_ssl3_write(SSL *s, int type, const unsigned char *buf, unsigned int len, int create_empty_fragment) argument 883 ssl3_write_pending(SSL *s, int type, const unsigned char *buf, unsigned int len) argument 965 ssl3_read_bytes(SSL *s, int type, unsigned char *buf, int len, int peek) argument [all...] |
H A D | s3_srvr.c | 2521 size_t len = strlen(kssl_ctx->client_princ); local 2522 if ( len < SSL_MAX_KRB5_PRINCIPAL_LENGTH ) 2524 s->session->krb5_client_princ_len = len; 2525 memcpy(s->session->krb5_client_princ,kssl_ctx->client_princ,len); 3379 int len, slen_full, slen; local 3479 EVP_EncryptUpdate(&ctx, p, &len, senc, slen); 3480 p += len; 3481 EVP_EncryptFinal(&ctx, p, &len); 3482 p += len; 3492 len [all...] |
H A D | ssl.h | 382 typedef int (*tls_session_ticket_ext_cb_fn)(SSL *s, const unsigned char *data, int len, void *arg); 418 int (*ssl_read)(SSL *s,void *buf,int len); 419 int (*ssl_peek)(SSL *s,void *buf,int len); 420 int (*ssl_write)(SSL *s,const void *buf,int len); 426 int (*ssl_read_bytes)(SSL *s, int type, unsigned char *buf, int len, 428 int (*ssl_write_bytes)(SSL *s, int type, const void *buf_, int len); 696 void SSL_CTX_set_msg_callback(SSL_CTX *ctx, void (*cb)(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg)); 697 void SSL_set_msg_callback(SSL *ssl, void (*cb)(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg)); 820 unsigned char *data,int len,int *copy); 895 void (*msg_callback)(int write_p, int version, int content_type, const void *buf, size_t len, SS [all...] |
H A D | ssl_ciph.c | 1540 char *SSL_CIPHER_description(const SSL_CIPHER *cipher, char *buf, int len) argument 1733 len=128; 1734 buf=OPENSSL_malloc(len); 1737 else if (len < 128) 1741 BIO_snprintf(buf,len,format,cipher->name,ver,kx,au,enc,mac,exp_str,alg_mkey,alg_auth,alg_enc,alg_mac,alg_ssl); 1743 BIO_snprintf(buf,len,format,cipher->name,ver,kx,au,enc,mac,exp_str);
|
H A D | ssl_lib.c | 1115 s->msg_callback = (void (*)(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg))(fp); 1212 ctx->msg_callback = (void (*)(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg))(fp); 1339 char *SSL_get_shared_ciphers(const SSL *s,char *buf,int len) argument 1347 (len < 2)) 1362 if (n+1 > len) 1372 len-=n+1; 1592 /* SSL_get0_next_proto_negotiated sets *data and *len to point to the client's 1600 void SSL_get0_next_proto_negotiated(const SSL *s, const unsigned char **data, unsigned *len) argument 1604 *len = 0; 1606 *len 3228 SSL_CTX_set_msg_callback(SSL_CTX *ctx, void (*cb)(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg)) argument 3232 SSL_set_msg_callback(SSL *ssl, void (*cb)(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg)) argument [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/test/ |
H A D | heartbeat_test.c | 24 * expected payload len: 0 118 memset(fixture.s->s3->wbuf.buf, 0, fixture.s->s3->wbuf.len); 236 printf("%s failed:\n expected payload len: %d\n received: %d\n",
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/ui/ |
H A D | ui_lib.c | 424 int len = 0; local 428 len = sizeof(prompt1) - 1 + strlen(object_desc); 430 len += sizeof(prompt2) - 1 + strlen(object_name); 431 len += sizeof(prompt3) - 1; 433 prompt = (char *)OPENSSL_malloc(len + 1); 434 BUF_strlcpy(prompt, prompt1, len + 1); 435 BUF_strlcat(prompt, object_desc, len + 1); 438 BUF_strlcat(prompt, prompt2, len + 1); 439 BUF_strlcat(prompt, object_name, len + 1); 441 BUF_strlcat(prompt, prompt3, len 473 print_error(const char *str, size_t len, UI *ui) argument [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/bn/ |
H A D | bn_lib.c | 587 BIGNUM *BN_bin2bn(const unsigned char *s, int len, BIGNUM *ret) argument 599 n=len; 808 common length ( basicall, min(len(a),len(b)) ), and dl, which is the 809 delta between the two lengths, calculated as len(a)-len(b).
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/conf/ |
H A D | conf_def.c | 505 int q,r,rr=0,to=0,len=0; local 511 len=strlen(from)+1; 512 if (!BUF_MEM_grow(buf,len)) goto err; 621 len = strlen(p)+len-(e-from); 622 BUF_MEM_grow_clean(buf, len); 629 len -= e-from;
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/ec/ |
H A D | ec_lib.c | 374 size_t EC_GROUP_set_seed(EC_GROUP *group, const unsigned char *p, size_t len) argument 383 if (!len || !p) 386 if ((group->seed = OPENSSL_malloc(len)) == NULL) 388 memcpy(group->seed, p, len); 389 group->seed_len = len; 391 return len;
|
H A D | ectest.c | 282 size_t i, len; local 395 len = EC_POINT_point2oct(group, Q, POINT_CONVERSION_COMPRESSED, buf, sizeof buf, ctx); 396 if (len == 0) ABORT; 397 if (!EC_POINT_oct2point(group, P, buf, len, ctx)) ABORT; 400 for (i = 0; i < len; i++) fprintf(stdout, "%02X", buf[i]); 402 len = EC_POINT_point2oct(group, Q, POINT_CONVERSION_UNCOMPRESSED, buf, sizeof buf, ctx); 403 if (len == 0) ABORT; 404 if (!EC_POINT_oct2point(group, P, buf, len, ctx)) ABORT; 407 for (i = 0; i < len; i++) fprintf(stdout, "%02X", buf[i]); 409 len 827 size_t i, len; local [all...] |