/freebsd-9.3-release/crypto/openssl/ssl/ |
H A D | t1_lib.c | 1030 int slen, mlen, renew_ticket = 0; local 1062 mlen = HMAC_size(&hctx); 1064 if (eticklen <= 16 + EVP_CIPHER_CTX_iv_length(&ctx) + mlen) { 1070 eticklen -= mlen; 1075 if (CRYPTO_memcmp(tick_hmac, etick + eticklen, mlen)) { 1089 if (EVP_DecryptFinal(&ctx, sdec + slen, &mlen) <= 0) { 1094 slen += mlen;
|
/freebsd-9.3-release/crypto/openssl/fips/sha/ |
H A D | fips_shatest.c | 313 unsigned int mlen, m1len, m2len, m3len; local 318 mlen = SeedLen; 320 mlen = EVP_MAX_MD_SIZE; 322 m1 = OPENSSL_malloc(mlen); 323 m2 = OPENSSL_malloc(mlen); 324 m3 = OPENSSL_malloc(mlen);
|
/freebsd-9.3-release/crypto/openssl/engines/vendor_defns/ |
H A D | sureware.h | 241 * mod and res are mlen bytes long. 244 * mlen,elen and dlen are all multiple of sizeof(unsigned long) 246 typedef int SureWareHook_Mod_Exp_t(char *const msg, int mlen,
|
/freebsd-9.3-release/crypto/openssl/crypto/rsa/ |
H A D | rsa_oaep.c | 92 int i, dblen, mlen = -1, one_index = 0, msg_index; local 182 mlen = dblen - msg_index; 184 if (tlen < mlen) { 186 mlen = -1; 188 memcpy(to, db + msg_index, mlen); 203 return mlen;
|
H A D | rsa_pk1.c | 190 int zero_index = 0, msg_index, mlen = -1; local 246 mlen = num - msg_index; 252 good &= constant_time_ge((unsigned int)(tlen), (unsigned int)(mlen)); 262 mlen = -1; 266 memcpy(to, em + msg_index, mlen); 271 if (mlen == -1) 274 return mlen;
|
/freebsd-9.3-release/crypto/openssl/crypto/cms/ |
H A D | cms_sd.c | 829 unsigned int mlen; local 830 if (EVP_DigestFinal_ex(&mctx, mval, &mlen) <= 0) { 835 if (mlen != (unsigned int)os->length) { 841 if (memcmp(mval, os->data, mlen)) {
|
/freebsd-9.3-release/crypto/openssh/ |
H A D | monitor_wrap.c | 128 u_int mlen = buffer_len(m); local 133 put_u32(buf, mlen + 1); 137 if (atomicio(vwrite, sock, buffer_ptr(m), mlen) != mlen)
|
/freebsd-9.3-release/contrib/file/src/ |
H A D | apprentice.c | 1313 size_t mlen; local 1315 mlen = maxfiles * sizeof(*filearr); 1317 realloc(filearr, mlen))) == NULL) { 1318 file_oomem(ms, mlen);
|
H A D | ascmagic.c | 106 size_t mlen, i; local 141 mlen = ulen * 6; 142 if ((utf8_buf = CAST(unsigned char *, malloc(mlen))) == NULL) { 143 file_oomem(ms, mlen); 146 if ((utf8_end = encode_utf8(utf8_buf, mlen, ubuf, ulen))
|
H A D | encoding.c | 70 size_t mlen; local 79 mlen = (nbytes + 1) * sizeof((*ubuf)[0]); 80 if ((*ubuf = CAST(unichar *, calloc((size_t)1, mlen))) == NULL) { 81 file_oomem(ms, mlen); 84 mlen = (nbytes + 1) * sizeof(nbuf[0]); 85 if ((nbuf = CAST(unsigned char *, calloc((size_t)1, mlen))) == NULL) { 86 file_oomem(ms, mlen);
|
/freebsd-9.3-release/lib/libfetch/ |
H A D | common.c | 416 size_t mlen) 424 if ((wc = strnstr(m, "*", mlen)) == NULL) 425 return (fetch_ssl_hname_equal(h, hlen, m, mlen)); 431 if (strnstr(wc + 1, "*", mlen - wcidx - 1) != NULL) 437 mdot1 = strnstr(m, ".", mlen); 438 if (mdot1 == NULL || mdot1 < wc || (mlen - (mdot1 - m)) < 4) 441 mdot2 = strnstr(mdot1 + 1, ".", mlen - mdot1idx - 1); 442 if (mdot2 == NULL || (mlen - (mdot2 - m)) < 2) 464 mlen - mdot1idx)) 415 fetch_ssl_hname_match(const char *h, size_t hlen, const char *m, size_t mlen) argument
|
/freebsd-9.3-release/lib/libradius/ |
H A D | radlib.c | 1292 rad_demangle(struct rad_handle *h, const void *mangled, size_t mlen) argument 1300 if ((mlen % 16 != 0) || mlen > 128) { 1302 (u_long)mlen); 1317 demangled = malloc(mlen); 1326 while (mlen) { 1328 mlen -= 16; 1332 if (mlen) { 1347 size_t mlen, size_t *len) 1357 if (mlen 1346 rad_demangle_mppe_key(struct rad_handle *h, const void *mangled, size_t mlen, size_t *len) argument [all...] |
/freebsd-9.3-release/lib/libc/stdio/ |
H A D | vswscanf.c | 73 size_t mlen; local 86 if ((mlen = wcsrtombs_l(mbstr, &strp, SIZE_T_MAX, &mbs, locale)) == (size_t)-1) { 92 f._bf._size = f._r = mlen;
|
/freebsd-9.3-release/lib/libc/regex/ |
H A D | engine.c | 190 mustlast = g->must + g->mlen - 1; 194 for (dp = start+g->mlen-1; dp < stop;) { 222 stop - dp >= g->mlen && 223 memcmp(dp, g->must, (size_t)g->mlen) == 0)
|
H A D | regcomp.c | 244 g->mlen = 0; 266 if(g->mlen > 3) { 1378 - findmust - fill in must and mlen with longest mandatory literal string 1385 * Note that must and mlen got initialized during setup. 1458 if (newlen > g->mlen) { /* ends one */ 1460 g->mlen = newlen; 1473 if (newlen > g->mlen) { /* ends one */ 1475 g->mlen = newlen; 1491 if (newlen > g->mlen) { /* ends one */ 1493 g->mlen [all...] |
H A D | regex2.h | 184 int mlen; /* length of must */ member in struct:re_guts
|
/freebsd-9.3-release/lib/libc/regex/grot/ |
H A D | debug.c | 44 fprintf(d, ", must(%ld) `%*s'", (long)g->mlen, (int)g->mlen,
|
/freebsd-9.3-release/usr.sbin/dumpcis/ |
H A D | printcis.c | 184 int rlen, mlen = 0; local 189 mlen = ((p[0] >> 2) & 3) + 1; 190 if (tp->length < rlen + mlen + 2) { 196 if (mlen) { 198 for (i = 0; i < mlen; i++, p++) { 204 i = tp->length - (rlen + mlen + 2); 206 if (!mlen) 210 if (mlen || i)
|
/freebsd-9.3-release/usr.sbin/bsnmpd/modules/snmp_bridge/ |
H A D | bridge_snmp.h | 319 u_char *bridge_get_basemac(const char *bif_name, u_char *mac, size_t mlen);
|
H A D | bridge_sys.c | 568 bridge_get_basemac(const char *bif_name, u_char *mac, size_t mlen) argument 591 if (sdl.sdl_alen > mlen)
|
/freebsd-9.3-release/usr.sbin/uathload/ |
H A D | uathload.c | 189 int mlen; local 191 mlen = len; 192 if (mlen > UATH_MAX_FWBLOCK_SIZE) 193 mlen = UATH_MAX_FWBLOCK_SIZE; 194 txmsg.remain = htobe32(len - mlen); 195 txmsg.len = htobe32(mlen); 198 VERBOSE("send block %2u: %zd bytes remaining", b, len - mlen); 207 if (write(data, txdata, mlen) != mlen) { 224 len -= mlen; [all...] |
/freebsd-9.3-release/usr.sbin/ppp/ |
H A D | auth.c | 464 size_t mlen = m_length(bp); local 466 if (len > mlen) 468 len, mlen);
|
H A D | command.c | 1441 size_t mlen; local 1451 mlen = strlen(mask); 1452 if (mlen == 0 || mlen > 4 || strspn(mask, "01234567") != mlen || 1453 (mlen == 4 && *mask != '0')) { 1497 else for (imask = mlen = 0; mask[mlen]; mlen++) 1498 imask = (imask * 8) + mask[mlen] [all...] |
H A D | pap.c | 119 int plen, mlen; local 123 mlen = strlen(message); 124 plen = mlen + 1; 134 *cp++ = mlen > 255 ? 255 : mlen; 135 memcpy(cp, message, mlen);
|
H A D | radius.c | 148 demangle(struct radius *r, const void *mangled, size_t mlen, argument 159 if (mlen % 16 != SALT_LEN) { 161 (u_long)mlen); 177 Clen = mlen - SALT_LEN; 210 if (*len > mlen - 1) {
|