/freebsd/crypto/heimdal/lib/gssapi/krb5/ |
H A D | unwrap.c | 63 int token_len; in unwrap_des() local 66 token_len = 22 + 8 + 15; /* 45 */ in unwrap_des() 67 if (input_message_buffer->length < token_len) in unwrap_des() 70 token_len = input_message_buffer->length; in unwrap_des() 75 token_len, in unwrap_des() 237 int token_len; in unwrap_des3() local 240 token_len = 34 + 8 + 15; /* 57 */ in unwrap_des3() 241 if (input_message_buffer->length < token_len) in unwrap_des3() 244 token_len = input_message_buffer->length; in unwrap_des3() 249 token_len, in unwrap_des3()
|
/freebsd/contrib/unbound/sldns/ |
H A D | str2wire.c | 189 size_t prev_len, char* token, size_t token_len) in rrinternal_get_owner() argument 192 if(sldns_bget_token(strbuf, token, "\t\n ", token_len) == -1) { in rrinternal_get_owner() 197 if(token_len < 2) /* make sure there is space to read "@" or "" */ in rrinternal_get_owner() 248 rrinternal_get_ttl(sldns_buffer* strbuf, char* token, size_t token_len, in rrinternal_get_ttl() argument 253 if(sldns_bget_token(strbuf, token, "\t\n ", token_len) == -1) { in rrinternal_get_ttl() 277 rrinternal_get_class(sldns_buffer* strbuf, char* token, size_t token_len, in rrinternal_get_class() argument 283 if(sldns_bget_token(strbuf, token, "\t\n ", token_len) == -1) { in rrinternal_get_class() 299 rrinternal_get_type(sldns_buffer* strbuf, char* token, size_t token_len, in rrinternal_get_type() argument 305 if(sldns_bget_token(strbuf, token, "\t\n ", token_len) == -1) { in rrinternal_get_type() 433 rrinternal_parse_unknown(sldns_buffer* strbuf, char* token, size_t token_len, in rrinternal_parse_unknown() argument [all …]
|
/freebsd/contrib/wpa/src/ap/ |
H A D | comeback_token.c | 35 const u8 *token, size_t token_len) in check_comeback_token() argument 43 if (token_len != SHA256_MAC_LEN || in check_comeback_token()
|
H A D | comeback_token.h | 14 const u8 *token, size_t token_len);
|
H A D | ieee802_11.c | 1371 size_t token_len = 0; in handle_auth_sae() local 1478 &token_len, groups, status_code == in handle_auth_sae() 1502 token, token_len) in handle_auth_sae()
|
/freebsd/usr.bin/indent/ |
H A D | indent_globs.h | 95 int token_len = e_token - s_token; \ 99 e_token = tokenbuf + token_len + 1; \
|
/freebsd/contrib/wpa/src/common/ |
H A D | sae.c | 1842 size_t *token_len, int h2e) in sae_parse_commit_token() argument 1848 if (token_len) in sae_parse_commit_token() 1849 *token_len = 0; in sae_parse_commit_token() 1870 if (token_len) in sae_parse_commit_token() 1871 *token_len = tlen; in sae_parse_commit_token() 1878 const u8 **token, size_t *token_len) in sae_parse_token_container() argument 1885 *token_len = pos[1] - 1; in sae_parse_token_container() 1887 *token, *token_len); in sae_parse_token_container() 2168 const u8 **token, size_t *token_len, int *allowed_groups, in sae_parse_commit() argument 2183 sae_parse_commit_token(sae, &pos, end, token, token_len, h2e); in sae_parse_commit() [all …]
|
H A D | sae.h | 140 const u8 **token, size_t *token_len, int *allowed_groups,
|
/freebsd/contrib/wpa/wpa_supplicant/ |
H A D | sme.c | 1677 size_t token_len; in sme_sae_auth() local 1704 token_len = len - sizeof(le16); in sme_sae_auth() 1709 if (token_len < 3) { in sme_sae_auth() 1718 elen == 0 || elen > token_len - 2 || in sme_sae_auth() 1724 token_len = elen - 1; in sme_sae_auth() 1727 *ie_offset = token_pos + token_len - data; in sme_sae_auth() 1729 wpa_s->sme.sae_token = wpabuf_alloc_copy(token_pos, token_len); in sme_sae_auth()
|
H A D | ctrl_iface.c | 6157 long int token_len; in p2ps_ctrl_parse_cpt_priority() local 6170 token_len = last - token; in p2ps_ctrl_parse_cpt_priority() 6172 if (token_len == 3 && in p2ps_ctrl_parse_cpt_priority() 6173 os_memcmp(token, "UDP", token_len) == 0) { in p2ps_ctrl_parse_cpt_priority() 6175 } else if (token_len == 3 && in p2ps_ctrl_parse_cpt_priority() 6176 os_memcmp(token, "MAC", token_len) == 0) { in p2ps_ctrl_parse_cpt_priority()
|
/freebsd/sys/cam/ctl/ |
H A D | ctl_tpc.c | 2344 int alloc_len, total_len, token_len; in ctl_receive_rod_token_information() local 2371 token_len = list_copy.res_token_valid ? 2 + sizeof(list_copy.res_token) : 0; in ctl_receive_rod_token_information() 2372 total_len = sizeof(*data) + list_copy.sense_len + 4 + token_len; in ctl_receive_rod_token_information() 2383 4 + token_len, data->available_data); in ctl_receive_rod_token_information() 2404 scsi_ulto4b(token_len, &ptr[0]); in ctl_receive_rod_token_information()
|