Searched refs:len (Results 1 - 25 of 7563) sorted by last modified time

1234567891011>>

/netbsd-6-1-5-RELEASE/sys/sys/
H A Dparam.h227 #define STACK_LEN_ALIGN(len, bytes) (((len) + (bytes)) & ~(bytes))
/netbsd-6-1-5-RELEASE/sys/compat/osf1/
H A Dosf1_file.c142 int len, reclen; /* BSD-format */ local
198 if ((len = buflen - auio.uio_resid) == 0)
201 for (cookie = cookiebuf; len > 0; len -= reclen) {
220 if (reclen > len || resid < osf1_reclen) {
/netbsd-6-1-5-RELEASE/sys/fs/ptyfs/
H A Dptyfs_vfsops.c101 size_t len; local
117 len = strlen(bp);
118 if (len < sizeof(mp->mnt_stat.f_mntonname)) /* XXX */
119 rv += len;
130 size_t len; local
135 len = snprintf(tbuf, bufsiz, "/dev/null");
138 len = snprintf(tbuf, bufsiz, "%s/%llu", ptyfs__getpath(l, mp),
145 return len >= bufsiz ? ENOSPC : 0;
/netbsd-6-1-5-RELEASE/sys/netinet6/
H A Dip6_output.c152 * header (with pri, len, nxt, hlim, src, dst).
175 int hlen, tlen, len, off; local
359 m->m_pkthdr.len += optlen;
360 plen = m->m_pkthdr.len - sizeof(*ip6);
903 tlen = m->m_pkthdr.len;
949 ia6->ia_ifa.ifa_data.ifad_outbytes += m->m_pkthdr.len;
1031 len = (mtu - hlen - sizeof(struct ip6_frag)) & ~7;
1032 if (len < 8) {
1074 for (off = hlen; off < tlen; off += len) {
1097 if (off + len >
2174 ip6_pcbopt(int optname, u_char *buf, int len, struct ip6_pktopts **pktopt, kauth_cred_t cred, int uproto) argument
2829 ip6_setpktopt(int optname, u_char *buf, int len, struct ip6_pktopts *opt, kauth_cred_t cred, int sticky, int cmsg, int uproto) argument
3297 int len; local
[all...]
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/ssl/
H A Dssl_locl.h604 unsigned int len; member in struct:ssl3_buf_freelist_st
833 int ssl_get_prev_session(SSL *s, unsigned char *session,int len, const unsigned char *limit);
863 int ssl_fill_hello_random(SSL *s, int server, unsigned char *field, int len);
873 int ssl2_set_certificate(SSL *s, int type, int len, const unsigned char *data);
882 int ssl2_read(SSL *s, void *buf, int len);
883 int ssl2_peek(SSL *s, void *buf, int len);
884 int ssl2_write(SSL *s, const void *buf, int len);
908 unsigned char *p, int len);
917 int ssl3_read_bytes(SSL *s, int type, unsigned char *buf, int len, int peek);
918 int ssl3_write_bytes(SSL *s, int type, const void *buf, int len);
[all...]
H A Dt1_enc.c256 int len,i,idx,count; local
267 len=slen/count;
279 if (!tls1_P_hash(md ,S1,len+(slen&1),
283 S1+=len;
360 printf("\tkey_block: len= %d, data= ", s->s3->tmp.key_block_length);
1075 int len)
1083 printf ("tls1_generate_master_secret(%p,%p, %p, %d)\n", s,out, p,len);
1104 p,len, local
1108 BIO_dump_fp(stderr, (char *)p, len);
1173 * note that SSL3_RANDOM_SIZE > max(prohibited label len)
1074 tls1_generate_master_secret(SSL *s, unsigned char *out, unsigned char *p, int len) argument
[all...]
H A Dt1_lib.c524 /* Check for enough room 2 for extension type, 2 for len
603 /* save position of id len */
606 /* skip over id len */
609 /* write id len */
964 const size_t len = sizeof(kSafariExtensionsBlock); local
966 if (data + len != d+n)
968 if (memcmp(data, kSafariExtensionsBlock, len) != 0)
980 unsigned short len; local
1003 n2s(data,len);
1005 if (data > (d+n-len))
1480 ssl_next_proto_validate(unsigned char *d, unsigned len) argument
2193 tls1_process_ticket(SSL *s, unsigned char *session_id, int len, const unsigned char *limit, SSL_SESSION **ret) argument
[all...]
H A Dd1_both.c167 unsigned long len, unsigned short seq_num, unsigned long frag_off,
233 unsigned int len, frag_off, mac_size, blocksize; local
308 len = curr_mtu;
310 len = s->init_num;
323 len = curr_mtu;
325 len = s->init_num;
329 len - DTLS1_HM_HEADER_LENGTH);
333 OPENSSL_assert(len >= DTLS1_HM_HEADER_LENGTH);
337 len);
358 OPENSSL_assert(len
806 unsigned long len, frag_off, frag_len; local
1358 dtls1_set_message_header(SSL *s, unsigned char *p, unsigned char mt, unsigned long len, unsigned long frag_off, unsigned long frag_len) argument
1377 dtls1_set_message_header_int(SSL *s, unsigned char mt, unsigned long len, unsigned short seq_num, unsigned long frag_off, unsigned long frag_len) argument
[all...]
H A Dd1_srvr.c1625 int len, slen; local
1693 EVP_EncryptUpdate(&ctx, p, &len, senc, slen);
1694 p += len;
1695 EVP_EncryptFinal(&ctx, p, &len);
1696 p += len;
1706 len = p - (unsigned char *)(s->init_buf->data);
1709 s2n(len - DTLS1_HM_HEADER_LENGTH - 6, p);
1712 s->init_num= len;
H A Dheartbeat_test.c24 * expected payload len: 0
118 memset(fixture.s->s3->wbuf.buf, 0, fixture.s->s3->wbuf.len);
236 printf("%s failed:\n expected payload len: %d\n received: %d\n",
H A Ds23_lib.c127 int ssl23_read(SSL *s, void *buf, int len) argument
141 return(SSL_read(s,buf,len));
150 int ssl23_peek(SSL *s, void *buf, int len) argument
164 return(SSL_peek(s,buf,len));
173 int ssl23_write(SSL *s, const void *buf, int len) argument
187 return(SSL_write(s,buf,len));
H A Ds3_clnt.c3335 unsigned int len, padding_len; local
3340 len = s->next_proto_negotiated_len;
3341 padding_len = 32 - ((len + 2) % 32);
3343 d[4] = len;
3344 memcpy(d + 5, s->next_proto_negotiated, len);
3345 d[5 + len] = padding_len;
3346 memset(d + 6 + len, 0, padding_len);
3348 l2n3(2 + len + padding_len, d);
3350 s->init_num = 4 + 2 + len + padding_len;
H A Ds3_enc.c159 const char *sender, int len, unsigned char *p);
571 void ssl3_finish_mac(SSL *s, const unsigned char *buf, int len) argument
575 BIO_write (s->s3->handshake_buffer,(void *)buf,len);
583 EVP_DigestUpdate(s->s3->handshake_dgst[i],buf,len);
643 const char *sender, int len, unsigned char *p)
646 ret=ssl3_handshake_mac(s,NID_md5,sender,len,p);
652 sha1len=ssl3_handshake_mac(s,NID_sha1,sender,len,p);
660 const char *sender, int len, unsigned char *p)
695 EVP_DigestUpdate(&ctx,sender,len);
828 int len)
642 ssl3_final_finish_mac(SSL *s, const char *sender, int len, unsigned char *p) argument
659 ssl3_handshake_mac(SSL *s, int md_nid, const char *sender, int len, unsigned char *p) argument
827 ssl3_generate_master_secret(SSL *s, unsigned char *out, unsigned char *p, int len) argument
[all...]
H A Ds3_lib.c3048 rlen = s->s3->rbuf.len;
3049 wlen = s->s3->wbuf.len;
3061 s->s3->rbuf.len = rlen;
3062 s->s3->wbuf.len = wlen;
4159 int ssl3_write(SSL *s, const void *buf, int len) argument
4184 buf,len);
4205 buf,len);
4212 static int ssl3_read_internal(SSL *s, void *buf, int len, int peek) argument
4219 ret=s->method->ssl_read_bytes(s,SSL3_RT_APPLICATION_DATA,buf,len,peek);
4228 ret=s->method->ssl_read_bytes(s,SSL3_RT_APPLICATION_DATA,buf,len,pee
4237 ssl3_read(SSL *s, void *buf, int len) argument
4242 ssl3_peek(SSL *s, void *buf, int len) argument
[all...]
H A Ds3_pkt.c122 unsigned int len, int create_empty_fragment);
134 int i,len,left; local
201 len = s->packet_length;
204 * 'len' bytes already pointed to by 'packet',
206 if (s->packet != pkt) /* len > 0 */
208 memmove(pkt, s->packet, len+left);
210 rb->offset = len + align;
213 if (n > (int)(rb->len - rb->offset)) /* does not happen */
226 if (max > (int)(rb->len - rb->offset))
227 max = rb->len
582 ssl3_write_bytes(SSL *s, int type, const void *buf_, int len) argument
651 do_ssl3_write(SSL *s, int type, const unsigned char *buf, unsigned int len, int create_empty_fragment) argument
883 ssl3_write_pending(SSL *s, int type, const unsigned char *buf, unsigned int len) argument
965 ssl3_read_bytes(SSL *s, int type, unsigned char *buf, int len, int peek) argument
[all...]
H A Ds3_srvr.c2521 size_t len = strlen(kssl_ctx->client_princ); local
2522 if ( len < SSL_MAX_KRB5_PRINCIPAL_LENGTH )
2524 s->session->krb5_client_princ_len = len;
2525 memcpy(s->session->krb5_client_princ,kssl_ctx->client_princ,len);
3379 int len, slen_full, slen; local
3479 EVP_EncryptUpdate(&ctx, p, &len, senc, slen);
3480 p += len;
3481 EVP_EncryptFinal(&ctx, p, &len);
3482 p += len;
3492 len
[all...]
H A Dssl.h382 typedef int (*tls_session_ticket_ext_cb_fn)(SSL *s, const unsigned char *data, int len, void *arg);
418 int (*ssl_read)(SSL *s,void *buf,int len);
419 int (*ssl_peek)(SSL *s,void *buf,int len);
420 int (*ssl_write)(SSL *s,const void *buf,int len);
426 int (*ssl_read_bytes)(SSL *s, int type, unsigned char *buf, int len,
428 int (*ssl_write_bytes)(SSL *s, int type, const void *buf_, int len);
696 void SSL_CTX_set_msg_callback(SSL_CTX *ctx, void (*cb)(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg));
697 void SSL_set_msg_callback(SSL *ssl, void (*cb)(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg));
820 unsigned char *data,int len,int *copy);
895 void (*msg_callback)(int write_p, int version, int content_type, const void *buf, size_t len, SS
[all...]
H A Dssl_ciph.c1540 char *SSL_CIPHER_description(const SSL_CIPHER *cipher, char *buf, int len) argument
1733 len=128;
1734 buf=OPENSSL_malloc(len);
1737 else if (len < 128)
1741 BIO_snprintf(buf,len,format,cipher->name,ver,kx,au,enc,mac,exp_str,alg_mkey,alg_auth,alg_enc,alg_mac,alg_ssl);
1743 BIO_snprintf(buf,len,format,cipher->name,ver,kx,au,enc,mac,exp_str);
H A Dssl_lib.c1115 s->msg_callback = (void (*)(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg))(fp);
1212 ctx->msg_callback = (void (*)(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg))(fp);
1339 char *SSL_get_shared_ciphers(const SSL *s,char *buf,int len) argument
1347 (len < 2))
1362 if (n+1 > len)
1372 len-=n+1;
1592 /* SSL_get0_next_proto_negotiated sets *data and *len to point to the client's
1600 void SSL_get0_next_proto_negotiated(const SSL *s, const unsigned char **data, unsigned *len) argument
1604 *len = 0;
1606 *len
3228 SSL_CTX_set_msg_callback(SSL_CTX *ctx, void (*cb)(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg)) argument
3232 SSL_set_msg_callback(SSL *ssl, void (*cb)(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg)) argument
[all...]
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/test/
H A Dheartbeat_test.c24 * expected payload len: 0
118 memset(fixture.s->s3->wbuf.buf, 0, fixture.s->s3->wbuf.len);
236 printf("%s failed:\n expected payload len: %d\n received: %d\n",
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/ui/
H A Dui_lib.c424 int len = 0; local
428 len = sizeof(prompt1) - 1 + strlen(object_desc);
430 len += sizeof(prompt2) - 1 + strlen(object_name);
431 len += sizeof(prompt3) - 1;
433 prompt = (char *)OPENSSL_malloc(len + 1);
434 BUF_strlcpy(prompt, prompt1, len + 1);
435 BUF_strlcat(prompt, object_desc, len + 1);
438 BUF_strlcat(prompt, prompt2, len + 1);
439 BUF_strlcat(prompt, object_name, len + 1);
441 BUF_strlcat(prompt, prompt3, len
473 print_error(const char *str, size_t len, UI *ui) argument
[all...]
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/bn/
H A Dbn_lib.c587 BIGNUM *BN_bin2bn(const unsigned char *s, int len, BIGNUM *ret) argument
599 n=len;
808 common length ( basicall, min(len(a),len(b)) ), and dl, which is the
809 delta between the two lengths, calculated as len(a)-len(b).
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/conf/
H A Dconf_def.c505 int q,r,rr=0,to=0,len=0; local
511 len=strlen(from)+1;
512 if (!BUF_MEM_grow(buf,len)) goto err;
621 len = strlen(p)+len-(e-from);
622 BUF_MEM_grow_clean(buf, len);
629 len -= e-from;
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/ec/
H A Dec_lib.c374 size_t EC_GROUP_set_seed(EC_GROUP *group, const unsigned char *p, size_t len) argument
383 if (!len || !p)
386 if ((group->seed = OPENSSL_malloc(len)) == NULL)
388 memcpy(group->seed, p, len);
389 group->seed_len = len;
391 return len;
H A Dectest.c282 size_t i, len; local
395 len = EC_POINT_point2oct(group, Q, POINT_CONVERSION_COMPRESSED, buf, sizeof buf, ctx);
396 if (len == 0) ABORT;
397 if (!EC_POINT_oct2point(group, P, buf, len, ctx)) ABORT;
400 for (i = 0; i < len; i++) fprintf(stdout, "%02X", buf[i]);
402 len = EC_POINT_point2oct(group, Q, POINT_CONVERSION_UNCOMPRESSED, buf, sizeof buf, ctx);
403 if (len == 0) ABORT;
404 if (!EC_POINT_oct2point(group, P, buf, len, ctx)) ABORT;
407 for (i = 0; i < len; i++) fprintf(stdout, "%02X", buf[i]);
409 len
827 size_t i, len; local
[all...]

Completed in 240 milliseconds

1234567891011>>