Home
last modified time | relevance | path

Searched refs:pk_len (Results 1 – 25 of 236) sorted by relevance

12345678910

/dports/security/unicornscan/unicornscan-0.4.2/src/scan_progs/
H A Dpacket_parse.c64 p_len=pk_len; in packet_init()
174 size_t pk_len=0; in parse_packet() local
268 if (pk_len) { in decode_arp()
329 totlen=pk_len; in decode_ip()
338 pk_len=totlen; in decode_ip()
398 if (pk_len) { in decode_ip()
448 if (pk_len >= 4 && pk_len < sizeof(struct mytcphdr)) { in decode_tcp()
524 c[1].len=pk_len; in decode_tcp()
634 if (pk_len >= 4 && pk_len < sizeof(struct myudphdr)) { in decode_udp()
662 c[1].len=pk_len; in decode_udp()
[all …]
H A Dmaster.c447 uint16_t pk_len; in handle_ipoutput() local
457 pk_len=r_um.r->doff; in handle_ipoutput()
458 r_u.ptr=xmalloc(sizeof(ip_report_t) + pk_len + sizeof(pk_len)); in handle_ipoutput()
847 size_t pk_len=0; in do_connect() local
870 pk_len=r_u.r->doff; in do_connect()
963 if (totlen > pk_len) { in try_and_extract_tcp_data()
973 if (pk_len > totlen) { in try_and_extract_tcp_data()
975 pk_len=totlen; in try_and_extract_tcp_data()
1018 if (pk_len > 1280) { in try_and_extract_tcp_data()
1027 c->recv_len=pk_len; in try_and_extract_tcp_data()
[all …]
/dports/devel/silc-toolkit/silc-toolkit-1.1.12/lib/silccore/
H A Dsilcpubkey.c28 SilcUInt32 pk_len; in silc_public_key_payload_encode() local
35 pk = silc_pkcs_public_key_encode(public_key, &pk_len); in silc_public_key_payload_encode()
39 buffer = silc_buffer_alloc_size(4 + pk_len); in silc_public_key_payload_encode()
46 SILC_STR_UI_SHORT(pk_len), in silc_public_key_payload_encode()
48 SILC_STR_DATA(pk, pk_len), in silc_public_key_payload_encode()
66 SilcUInt16 pk_len, pk_type; in silc_public_key_payload_decode() local
76 SILC_STR_UI_SHORT(&pk_len), in silc_public_key_payload_decode()
79 if (ret < 0 || pk_len > data_len - 4) in silc_public_key_payload_decode()
86 SILC_STR_DATA(&pk, pk_len), in silc_public_key_payload_decode()
92 pk, pk_len, public_key); in silc_public_key_payload_decode()
H A Dsilcmessage.c117 sig->pk_len), in silc_message_signed_payload_parse()
122 sig->pk_len - 2) { in silc_message_signed_payload_parse()
157 SILC_STR_UI_SHORT(pk_len), in silc_message_signed_encode_data()
161 if (pk && pk_len) { in silc_message_signed_encode_data()
186 SilcUInt32 pk_len = 0; in silc_message_signed_payload_encode() local
202 pk, pk_len, pk_type); in silc_message_signed_payload_encode()
233 SILC_STR_UI_SHORT(pk_len), in silc_message_signed_payload_encode()
237 if (pk_len && pk) { in silc_message_signed_payload_encode()
727 sig->pk_data, sig->pk_len, in silc_message_signed_verify()
768 sig->pk_len, &pk)) in silc_message_signed_get_public_key()
[all …]
/dports/security/unicornscan/unicornscan-0.4.2/src/report_modules/udpstr/
H A Dmodule.c78 uint16_t pk_len=0, port=0, datalen=0, writestart=0; in create_report() local
88 pk_len=r_u.ir->doff; in create_report()
89 assert(pk_len > 0 && pk_len < s->vi->mtu); in create_report()
94 if (pk_len <= sizeof(struct myiphdr)) { in create_report()
105 if (pk_len < (sizeof(struct myiphdr) + sizeof(struct myudphdr) + 1)) { in create_report()
111 pk_len -= sizeof(struct myiphdr); in create_report()
114 datalen=pk_len - sizeof(struct myudphdr); in create_report()
115 pk_len -= sizeof(struct myudphdr); in create_report()
118 for (r_u.d += sizeof(struct myudphdr) ; pk_len != 0 ; pk_len--, r_u.d++) { in create_report()
/dports/security/unicornscan/unicornscan-0.4.2/src/report_modules/p0f/
H A Dmodule.c87 uint16_t pk_len=0; in create_report() local
94 pk_len=r_u.ir->doff; in create_report()
95 assert(pk_len > 0 && pk_len < s->vi->mtu); in create_report()
102 if (s->verbose > 5) hexdump(r_u.d, pk_len); in create_report()
104 result=p0f_parse(r_u.d, pk_len); in create_report()
/dports/net-im/libpurple/pidgin-2.14.8/libpurple/protocols/silc10/
H A Dpk.c35 SilcUInt32 pk_len; member
58 verify->pk_len, SILC_PKCS_FILE_PEM); in silcpurple_verify_cb()
86 silc_pkcs_public_key_decode(verify->pk, verify->pk_len, in silcpurple_verify_details()
126 unsigned char *pk, SilcUInt32 pk_len, in silcpurple_verify_public_key() argument
188 fingerprint = silc_hash_fingerprint(NULL, pk, pk_len); in silcpurple_verify_public_key()
212 verify->pk = silc_memdup(pk, pk_len); in silcpurple_verify_public_key()
213 verify->pk_len = pk_len; in silcpurple_verify_public_key()
217 fingerprint = verify->fingerprint = silc_hash_fingerprint(NULL, pk, pk_len); in silcpurple_verify_public_key()
218 babbleprint = verify->babbleprint = silc_hash_babbleprint(NULL, pk, pk_len); in silcpurple_verify_public_key()
/dports/net-im/pidgin/pidgin-2.14.8/libpurple/protocols/silc10/
H A Dpk.c35 SilcUInt32 pk_len; member
58 verify->pk_len, SILC_PKCS_FILE_PEM); in silcpurple_verify_cb()
86 silc_pkcs_public_key_decode(verify->pk, verify->pk_len, in silcpurple_verify_details()
126 unsigned char *pk, SilcUInt32 pk_len, in silcpurple_verify_public_key() argument
188 fingerprint = silc_hash_fingerprint(NULL, pk, pk_len); in silcpurple_verify_public_key()
212 verify->pk = silc_memdup(pk, pk_len); in silcpurple_verify_public_key()
213 verify->pk_len = pk_len; in silcpurple_verify_public_key()
217 fingerprint = verify->fingerprint = silc_hash_fingerprint(NULL, pk, pk_len); in silcpurple_verify_public_key()
218 babbleprint = verify->babbleprint = silc_hash_babbleprint(NULL, pk, pk_len); in silcpurple_verify_public_key()
/dports/net-im/finch/pidgin-2.14.8/libpurple/protocols/silc10/
H A Dpk.c35 SilcUInt32 pk_len; member
58 verify->pk_len, SILC_PKCS_FILE_PEM); in silcpurple_verify_cb()
86 silc_pkcs_public_key_decode(verify->pk, verify->pk_len, in silcpurple_verify_details()
126 unsigned char *pk, SilcUInt32 pk_len, in silcpurple_verify_public_key() argument
188 fingerprint = silc_hash_fingerprint(NULL, pk, pk_len); in silcpurple_verify_public_key()
212 verify->pk = silc_memdup(pk, pk_len); in silcpurple_verify_public_key()
213 verify->pk_len = pk_len; in silcpurple_verify_public_key()
217 fingerprint = verify->fingerprint = silc_hash_fingerprint(NULL, pk, pk_len); in silcpurple_verify_public_key()
218 babbleprint = verify->babbleprint = silc_hash_babbleprint(NULL, pk, pk_len); in silcpurple_verify_public_key()
/dports/sysutils/atf-sun50i_h6/arm-trusted-firmware-2.5/drivers/auth/
H A Dauth_mod.c152 unsigned int data_len, pk_len, pk_hash_len, sig_len, sig_alg_len; in auth_signature() local
176 &pk_ptr, &pk_len); in auth_signature()
178 rc = plat_get_rotpk_info(param->pk->cookie, &pk_ptr, &pk_len, in auth_signature()
187 pk_hash_len = pk_len; in auth_signature()
190 &pk_ptr, &pk_len); in auth_signature()
197 pk_ptr, pk_len); in auth_signature()
205 rc = crypto_mod_verify_hash(pk_ptr, pk_len, in auth_signature()
213 pk_ptr, pk_len); in auth_signature()
H A Dcrypto_mod.c70 void *pk_ptr, unsigned int pk_len) in crypto_mod_verify_signature() argument
79 assert(pk_len != 0); in crypto_mod_verify_signature()
84 pk_ptr, pk_len); in crypto_mod_verify_signature()
/dports/sysutils/atf-sun50i_a64/arm-trusted-firmware-2.5/drivers/auth/
H A Dauth_mod.c152 unsigned int data_len, pk_len, pk_hash_len, sig_len, sig_alg_len; in auth_signature() local
176 &pk_ptr, &pk_len); in auth_signature()
178 rc = plat_get_rotpk_info(param->pk->cookie, &pk_ptr, &pk_len, in auth_signature()
187 pk_hash_len = pk_len; in auth_signature()
190 &pk_ptr, &pk_len); in auth_signature()
197 pk_ptr, pk_len); in auth_signature()
205 rc = crypto_mod_verify_hash(pk_ptr, pk_len, in auth_signature()
213 pk_ptr, pk_len); in auth_signature()
H A Dcrypto_mod.c70 void *pk_ptr, unsigned int pk_len) in crypto_mod_verify_signature() argument
79 assert(pk_len != 0); in crypto_mod_verify_signature()
84 pk_ptr, pk_len); in crypto_mod_verify_signature()
/dports/sysutils/atf-rk3399/arm-trusted-firmware-2.5/drivers/auth/
H A Dauth_mod.c152 unsigned int data_len, pk_len, pk_hash_len, sig_len, sig_alg_len; in auth_signature() local
176 &pk_ptr, &pk_len); in auth_signature()
178 rc = plat_get_rotpk_info(param->pk->cookie, &pk_ptr, &pk_len, in auth_signature()
187 pk_hash_len = pk_len; in auth_signature()
190 &pk_ptr, &pk_len); in auth_signature()
197 pk_ptr, pk_len); in auth_signature()
205 rc = crypto_mod_verify_hash(pk_ptr, pk_len, in auth_signature()
213 pk_ptr, pk_len); in auth_signature()
/dports/sysutils/atf-rk3328/arm-trusted-firmware-2.5/drivers/auth/
H A Dauth_mod.c152 unsigned int data_len, pk_len, pk_hash_len, sig_len, sig_alg_len; in auth_signature() local
176 &pk_ptr, &pk_len); in auth_signature()
178 rc = plat_get_rotpk_info(param->pk->cookie, &pk_ptr, &pk_len, in auth_signature()
187 pk_hash_len = pk_len; in auth_signature()
190 &pk_ptr, &pk_len); in auth_signature()
197 pk_ptr, pk_len); in auth_signature()
205 rc = crypto_mod_verify_hash(pk_ptr, pk_len, in auth_signature()
213 pk_ptr, pk_len); in auth_signature()
/dports/sysutils/atf-fvp/arm-trusted-firmware-2.5/drivers/auth/
H A Dauth_mod.c152 unsigned int data_len, pk_len, pk_hash_len, sig_len, sig_alg_len; in auth_signature() local
176 &pk_ptr, &pk_len); in auth_signature()
178 rc = plat_get_rotpk_info(param->pk->cookie, &pk_ptr, &pk_len, in auth_signature()
187 pk_hash_len = pk_len; in auth_signature()
190 &pk_ptr, &pk_len); in auth_signature()
197 pk_ptr, pk_len); in auth_signature()
205 rc = crypto_mod_verify_hash(pk_ptr, pk_len, in auth_signature()
213 pk_ptr, pk_len); in auth_signature()
/dports/print/texlive-base/texlive-20150521-source/texk/ttf2pk2/
H A Dpklib.c101 int pk_len; variable
566 pk_len = bitmap_end - bitmap; in pk_rll_cvt()
654 pk_len = q - bitmap; in pk_bm_cvt()
819 if (pk_len + 8 < 4 * 256 && tfm_wid < (1<<24) && in PKputglyph()
823 putc(flag | ((pk_len + 8) >> 8), pk_file); in PKputglyph()
824 putc(pk_len + 8, pk_file); in PKputglyph()
833 else if (pk_len + 13 < 3 * 65536L && tfm_wid < (1<<24) && in PKputglyph()
838 putc(flag | 4 | ((pk_len + 13) >> 16), pk_file); in PKputglyph()
839 putshort(pk_len + 13); in PKputglyph()
851 putlong(pk_len + 28); in PKputglyph()
[all …]
/dports/print/freetype/freetype-1.3.1/contrib/ttf2pk/
H A Dpklib.c97 int pk_len; variable
562 pk_len = bitmap_end - bitmap; in pk_rll_cvt()
650 pk_len = q - bitmap; in pk_bm_cvt()
815 if (pk_len + 8 < 4 * 256 && tfm_wid < (1<<24) && in PKputglyph()
819 putc(flag | ((pk_len + 8) >> 8), pk_file); in PKputglyph()
820 putc(pk_len + 8, pk_file); in PKputglyph()
829 else if (pk_len + 13 < 3 * 65536L && tfm_wid < (1<<24) && in PKputglyph()
834 putc(flag | 4 | ((pk_len + 13) >> 16), pk_file); in PKputglyph()
835 putshort(pk_len + 13); in PKputglyph()
847 putlong(pk_len + 28); in PKputglyph()
[all …]
/dports/devel/silc-toolkit/silc-toolkit-1.1.12/lib/silccrypt/tests/
H A Dtest_silcpkcs.c14 SilcUInt32 pk_len = 0, prv_len = 0; in test() local
62 pk = silc_pkcs_get_public_key(pkcs, &pk_len); in test()
63 if (!pk || !pk_len) { in test()
81 pubkey = silc_pkcs_public_key_alloc("rsa", identifier, pk, pk_len); in test()
88 pk = silc_pkcs_public_key_encode(pubkey, &pk_len); in test()
94 if (!silc_pkcs_public_key_decode(pk, pk_len, &pubkey)) { in test()
/dports/devel/silc-toolkit/silc-toolkit-1.1.12/lib/silcske/
H A Dpayload.c226 buf = silc_buffer_alloc_size(4 + payload->pk_len + 2 + x_len + in silc_ske_payload_ke_encode()
233 SILC_STR_UI_SHORT(payload->pk_len), in silc_ske_payload_ke_encode()
236 payload->pk_len), in silc_ske_payload_ke_encode()
287 SILC_STR_UI_SHORT(&payload->pk_len), in silc_ske_payload_ke_decode()
298 payload->pk_type > SILC_SKE_PK_TYPE_SPKI) || !payload->pk_len)) { in silc_ske_payload_ke_decode()
304 tot_len += payload->pk_len + 4; in silc_ske_payload_ke_decode()
310 payload->pk_len), in silc_ske_payload_ke_decode()
/dports/net/hostapd/hostapd-2.9/src/eap_common/
H A Deap_gpsk_common.c114 u8 *pk, size_t pk_len) in eap_gpsk_derive_keys_helper() argument
181 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: PK", pos, pk_len); in eap_gpsk_derive_keys_helper()
182 os_memcpy(pk, pos, pk_len); in eap_gpsk_derive_keys_helper()
192 u8 *pk, size_t *pk_len) in eap_gpsk_derive_keys_aes() argument
214 *pk_len = EAP_GPSK_PK_LEN_AES; in eap_gpsk_derive_keys_aes()
220 pk, *pk_len); in eap_gpsk_derive_keys_aes()
285 u8 *pk, size_t *pk_len) in eap_gpsk_derive_keys() argument
321 pk, pk_len); in eap_gpsk_derive_keys()
/dports/net/hostapd-devel/hostap-14ab4a816/src/eap_common/
H A Deap_gpsk_common.c114 u8 *pk, size_t pk_len) in eap_gpsk_derive_keys_helper() argument
181 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: PK", pos, pk_len); in eap_gpsk_derive_keys_helper()
182 os_memcpy(pk, pos, pk_len); in eap_gpsk_derive_keys_helper()
192 u8 *pk, size_t *pk_len) in eap_gpsk_derive_keys_aes() argument
214 *pk_len = EAP_GPSK_PK_LEN_AES; in eap_gpsk_derive_keys_aes()
220 pk, *pk_len); in eap_gpsk_derive_keys_aes()
285 u8 *pk, size_t *pk_len) in eap_gpsk_derive_keys() argument
321 pk, pk_len); in eap_gpsk_derive_keys()
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/src/eap_common/
H A Deap_gpsk_common.c114 u8 *pk, size_t pk_len) in eap_gpsk_derive_keys_helper() argument
181 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: PK", pos, pk_len); in eap_gpsk_derive_keys_helper()
182 os_memcpy(pk, pos, pk_len); in eap_gpsk_derive_keys_helper()
192 u8 *pk, size_t *pk_len) in eap_gpsk_derive_keys_aes() argument
214 *pk_len = EAP_GPSK_PK_LEN_AES; in eap_gpsk_derive_keys_aes()
220 pk, *pk_len); in eap_gpsk_derive_keys_aes()
285 u8 *pk, size_t *pk_len) in eap_gpsk_derive_keys() argument
321 pk, pk_len); in eap_gpsk_derive_keys()
/dports/security/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
H A Deap_gpsk_common.c114 u8 *pk, size_t pk_len) in eap_gpsk_derive_keys_helper() argument
181 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: PK", pos, pk_len); in eap_gpsk_derive_keys_helper()
182 os_memcpy(pk, pos, pk_len); in eap_gpsk_derive_keys_helper()
192 u8 *pk, size_t *pk_len) in eap_gpsk_derive_keys_aes() argument
214 *pk_len = EAP_GPSK_PK_LEN_AES; in eap_gpsk_derive_keys_aes()
220 pk, *pk_len); in eap_gpsk_derive_keys_aes()
285 u8 *pk, size_t *pk_len) in eap_gpsk_derive_keys() argument
321 pk, pk_len); in eap_gpsk_derive_keys()
/dports/net/wpa_supplicant_gui/wpa_supplicant-2.9/src/eap_common/
H A Deap_gpsk_common.c114 u8 *pk, size_t pk_len) in eap_gpsk_derive_keys_helper() argument
181 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: PK", pos, pk_len); in eap_gpsk_derive_keys_helper()
182 os_memcpy(pk, pos, pk_len); in eap_gpsk_derive_keys_helper()
192 u8 *pk, size_t *pk_len) in eap_gpsk_derive_keys_aes() argument
214 *pk_len = EAP_GPSK_PK_LEN_AES; in eap_gpsk_derive_keys_aes()
220 pk, *pk_len); in eap_gpsk_derive_keys_aes()
285 u8 *pk, size_t *pk_len) in eap_gpsk_derive_keys() argument
321 pk, pk_len); in eap_gpsk_derive_keys()

12345678910