/freebsd/sbin/camcontrol/ |
H A D | persist.c | 433 uint32_t res_len = 0; in scsipersist() local 690 res_len = SPRI_MAX_LEN; in scsipersist() 693 res_len = sizeof(struct scsi_per_res_cap); in scsipersist() 722 res_len = sizeof(struct scsi_per_res_reg_move) + id_len; in scsipersist() 724 res_len = sizeof(struct scsi_per_res_out_parms); in scsipersist() 733 res_len += id_len; in scsipersist() 734 res_len += in scsipersist() 744 res_buf = malloc(res_len); in scsipersist() 746 warn("%s: error allocating %d bytes", __func__, res_len); in scsipersist() 750 bzero(res_buf, res_len); in scsipersist() [all …]
|
/freebsd/contrib/wpa/src/crypto/ |
H A D | milenage.c | 175 u8 *ck, u8 *res, size_t *res_len) in milenage_generate() argument 180 if (*res_len < 8) { in milenage_generate() 181 *res_len = 0; in milenage_generate() 186 *res_len = 0; in milenage_generate() 189 *res_len = 8; in milenage_generate() 271 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, in milenage_check() argument 284 *res_len = 8; in milenage_check() 285 wpa_hexdump_key(MSG_DEBUG, "Milenage: RES", res, *res_len); in milenage_check()
|
H A D | milenage.h | 14 u8 *ck, u8 *res, size_t *res_len); 20 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len,
|
H A D | tls_internal.c | 482 size_t res_len, ad_len; in tls_connection_handshake2() local 492 &res_len, &ad, &ad_len, need_more_data); in tls_connection_handshake2() 495 out = wpabuf_alloc_ext_data(res, res_len); in tls_connection_handshake2() 525 size_t res_len; in tls_connection_server_handshake() local 535 wpabuf_len(in_data), &res_len); in tls_connection_server_handshake() 540 out = wpabuf_alloc_ext_data(res, res_len); in tls_connection_server_handshake()
|
/freebsd/contrib/wpa/hostapd/ |
H A D | hlr_auc_gw.c | 90 size_t res_len; member 198 m->res_len = atoi(argv[i]); in get_milenage_cb() 473 m->res_len = atoi(pos); in read_milenage() 474 if (m->res_len && in read_milenage() 475 (m->res_len < EAP_AKA_RES_MIN_LEN || in read_milenage() 476 m->res_len > EAP_AKA_RES_MAX_LEN)) { in read_milenage() 743 size_t res_len; in aka_req_auth() local 752 res_len = EAP_AKA_RES_MAX_LEN; in aka_req_auth() 764 autn, ik, ck, res, &res_len); in aka_req_auth() 765 if (m->res_len >= EAP_AKA_RES_MIN_LEN && in aka_req_auth() [all …]
|
/freebsd/sys/contrib/libsodium/test/default/ |
H A D | secretstream.c | 16 unsigned long long res_len; in main() local 70 (state, c1, &res_len, m1, m1_len, NULL, 0, 0); in main() 72 assert(res_len == m1_len + crypto_secretstream_xchacha20poly1305_ABYTES); in main() 89 (state, m1, &res_len, &tag, in main() 94 assert(res_len == m1_len); in main() 252 (state, c1, &res_len, m1, m1_len, NULL, 0, in main() 255 assert(res_len == m1_len + crypto_secretstream_xchacha20poly1305_ABYTES); in main() 276 (state, m1, &res_len, &tag, in main() 281 assert(res_len == m1_len); in main()
|
/freebsd/contrib/netbsd-tests/lib/libutil/ |
H A D | t_snprintb.c | 72 int res_len) in h_snprintb_m() argument 79 ATF_REQUIRE_EQ(len, res_len); in h_snprintb_m() 80 ATF_REQUIRE_EQ(0, memcmp(res, buf, res_len + 1)); in h_snprintb_m()
|
/freebsd/contrib/wpa/src/utils/ |
H A D | utils_module_tests.c | 300 size_t res_len; in base64_tests() local 304 res2 = base64_encode("", ~0, &res_len); in base64_tests() 310 res2 = base64_encode("=", 1, &res_len); in base64_tests() 311 if (!res2 || res_len != 5 || res2[0] != 'P' || res2[1] != 'Q' || in base64_tests() 322 res = base64_decode("", 0, &res_len); in base64_tests() 328 res = base64_decode("a", 1, &res_len); in base64_tests() 334 res = base64_decode("====", 4, &res_len); in base64_tests() 340 res = base64_decode("PQ==", 4, &res_len); in base64_tests() 341 if (!res || res_len != 1 || res[0] != '=') in base64_tests() 345 res = base64_decode("P.Q-=!=*", 8, &res_len); in base64_tests() [all …]
|
H A D | common.c | 734 size_t merge_byte_arrays(u8 *res, size_t res_len, in merge_byte_arrays() argument 740 os_memset(res, 0, res_len); in merge_byte_arrays() 743 if (src1_len >= res_len) { in merge_byte_arrays() 744 os_memcpy(res, src1, res_len); in merge_byte_arrays() 745 return res_len; in merge_byte_arrays() 753 if (len + src2_len >= res_len) { in merge_byte_arrays() 754 os_memcpy(res + len, src2, res_len - len); in merge_byte_arrays() 755 return res_len; in merge_byte_arrays()
|
H A D | pcsc_funcs.h | 23 unsigned char *res, size_t *res_len,
|
H A D | pcsc_funcs.c | 1342 unsigned char *res, size_t *res_len, in scard_umts_auth() argument 1409 *res_len = *pos++; in scard_umts_auth() 1410 os_memcpy(res, pos, *res_len); in scard_umts_auth() 1411 pos += *res_len; in scard_umts_auth() 1412 wpa_hexdump(MSG_DEBUG, "SCARD: RES", res, *res_len); in scard_umts_auth()
|
/freebsd/sys/dev/fdt/ |
H A D | fdt_common.c | 452 int i, res_len, rv, tuple_size, tuples; in fdt_get_reserved_regions() local 472 res_len = OF_getproplen(root, "memreserve"); in fdt_get_reserved_regions() 473 if (res_len <= 0 || res_len > sizeof(reserve)) { in fdt_get_reserved_regions() 478 if (OF_getprop(root, "memreserve", reserve, res_len) <= 0) { in fdt_get_reserved_regions() 483 tuples = res_len / tuple_size; in fdt_get_reserved_regions()
|
/freebsd/contrib/wpa/src/common/ |
H A D | common_module_tests.c | 546 size_t res_len; in sae_pk_tests() local 562 res = sae_pk_base32_decode(pw, pw_len, &res_len); in sae_pk_tests() 570 if (res_len != bytes || os_memcmp(val, res, res_len) != 0) { in sae_pk_tests() 575 res, res_len); in sae_pk_tests()
|
/freebsd/contrib/wpa/src/eap_peer/ |
H A D | eap_aka.c | 25 size_t res_len; member 263 data->res_len = os_strlen(pos) / 2; in eap_aka_ext_sim_result() 264 if (data->res_len > EAP_AKA_RES_MAX_LEN) { in eap_aka_ext_sim_result() 265 data->res_len = 0; in eap_aka_ext_sim_result() 268 if (hexstr2bin(pos, data->res, data->res_len) < 0) in eap_aka_ext_sim_result() 270 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: RES", data->res, data->res_len); in eap_aka_ext_sim_result() 301 data->autn, data->res, &data->res_len, in eap_aka_umts_auth() 336 data->res, &data->res_len, data->auts); in eap_aka_umts_auth() 347 data->res_len = EAP_AKA_RES_MAX_LEN; in eap_aka_umts_auth() 801 eap_sim_msg_add(msg, EAP_SIM_AT_RES, data->res_len * 8, in eap_aka_response_challenge() [all …]
|
/freebsd/contrib/wpa/src/eap_server/ |
H A D | eap_sim_db.c | 55 size_t res_len; member 604 entry->u.aka.res_len = (end - start) / 2; in eap_sim_db_aka_resp_auth() 605 if (entry->u.aka.res_len > EAP_AKA_RES_MAX_LEN) { in eap_sim_db_aka_resp_auth() 607 entry->u.aka.res_len = 0; in eap_sim_db_aka_resp_auth() 610 if (hexstr2bin(start, entry->u.aka.res, entry->u.aka.res_len)) in eap_sim_db_aka_resp_auth() 1395 u8 *res, size_t *res_len, void *cb_session_ctx) in eap_sim_db_get_aka_auth() argument 1436 *res_len = entry->u.aka.res_len; in eap_sim_db_get_aka_auth()
|
H A D | eap_server_aka.c | 35 size_t res_len; member 916 data->ck, data->res, &data->res_len, sm); in eap_aka_fullauth() 1093 if (attr->res == NULL || attr->res_len < data->res_len || in eap_aka_process_challenge() 1094 attr->res_len_bits != data->res_len * 8 || in eap_aka_process_challenge() 1095 os_memcmp_const(attr->res, data->res, data->res_len) != 0) { in eap_aka_process_challenge() 1099 (unsigned long) attr->res_len, in eap_aka_process_challenge() 1101 (unsigned long) data->res_len * 8); in eap_aka_process_challenge()
|
H A D | eap_sim_db.h | 87 u8 *res, size_t *res_len, void *cb_session_ctx);
|
/freebsd/contrib/llvm-project/lldb/include/lldb/Core/ |
H A D | RichManglingContext.h | 83 llvm::StringRef processIPDStrResult(char *ipd_res, size_t res_len);
|
/freebsd/contrib/wpa/src/eap_common/ |
H A D | eap_sim_common.c | 234 u8 *res, size_t res_len) in prf_prime() argument 262 while (res_len) { in prf_prime() 267 hlen = res_len > SHA256_MAC_LEN ? SHA256_MAC_LEN : res_len; in prf_prime() 270 res_len -= hlen; in prf_prime() 803 attr->res_len = alen; in eap_sim_parse_attr()
|
H A D | ikev2_common.h | 323 size_t *res_len);
|
H A D | eap_sim_common.h | 191 size_t next_pseudonym_len, next_reauth_id_len, identity_len, res_len; member
|
/freebsd/include/rpcsvc/ |
H A D | pmap_prot.x | 204 % u_int res_len;
|
/freebsd/contrib/wpa/src/wps/ |
H A D | wps_common.c | 25 const char *label, u8 *res, size_t res_len) in wps_kdf() argument 34 WPA_PUT_BE32(key_bits, res_len * 8); in wps_kdf() 45 iter = (res_len + SHA256_MAC_LEN - 1) / SHA256_MAC_LEN; in wps_kdf() 47 left = res_len; in wps_kdf()
|
H A D | wps_i.h | 136 const char *label, u8 *res, size_t res_len);
|
/freebsd/contrib/wpa/wpa_supplicant/ |
H A D | config.c | 68 size_t res_len, *dst_len, prev_len; in wpa_config_parse_str() local 75 res_len = 0; in wpa_config_parse_str() 79 tmp = wpa_config_parse_string(value, &res_len); in wpa_config_parse_str() 89 (u8 *) tmp, res_len); in wpa_config_parse_str() 92 (u8 *) tmp, res_len); in wpa_config_parse_str() 95 if (data->param3 && res_len < (size_t) data->param3) { in wpa_config_parse_str() 98 (unsigned long) res_len, (long) data->param3); in wpa_config_parse_str() 103 if (data->param4 && res_len > (size_t) data->param4) { in wpa_config_parse_str() 106 (unsigned long) res_len, (long) data->param4); in wpa_config_parse_str() 122 (*dst && tmp && prev_len == res_len && in wpa_config_parse_str() [all …]
|