/dports/security/unicornscan/unicornscan-0.4.2/src/scan_progs/ |
H A D | packet_parse.c | 64 p_len=pk_len; in packet_init() 174 size_t pk_len=0; in parse_packet() local 268 if (pk_len) { in decode_arp() 329 totlen=pk_len; in decode_ip() 338 pk_len=totlen; in decode_ip() 398 if (pk_len) { in decode_ip() 448 if (pk_len >= 4 && pk_len < sizeof(struct mytcphdr)) { in decode_tcp() 524 c[1].len=pk_len; in decode_tcp() 634 if (pk_len >= 4 && pk_len < sizeof(struct myudphdr)) { in decode_udp() 662 c[1].len=pk_len; in decode_udp() [all …]
|
H A D | master.c | 447 uint16_t pk_len; in handle_ipoutput() local 457 pk_len=r_um.r->doff; in handle_ipoutput() 458 r_u.ptr=xmalloc(sizeof(ip_report_t) + pk_len + sizeof(pk_len)); in handle_ipoutput() 847 size_t pk_len=0; in do_connect() local 870 pk_len=r_u.r->doff; in do_connect() 963 if (totlen > pk_len) { in try_and_extract_tcp_data() 973 if (pk_len > totlen) { in try_and_extract_tcp_data() 975 pk_len=totlen; in try_and_extract_tcp_data() 1018 if (pk_len > 1280) { in try_and_extract_tcp_data() 1027 c->recv_len=pk_len; in try_and_extract_tcp_data() [all …]
|
/dports/devel/silc-toolkit/silc-toolkit-1.1.12/lib/silccore/ |
H A D | silcpubkey.c | 28 SilcUInt32 pk_len; in silc_public_key_payload_encode() local 35 pk = silc_pkcs_public_key_encode(public_key, &pk_len); in silc_public_key_payload_encode() 39 buffer = silc_buffer_alloc_size(4 + pk_len); in silc_public_key_payload_encode() 46 SILC_STR_UI_SHORT(pk_len), in silc_public_key_payload_encode() 48 SILC_STR_DATA(pk, pk_len), in silc_public_key_payload_encode() 66 SilcUInt16 pk_len, pk_type; in silc_public_key_payload_decode() local 76 SILC_STR_UI_SHORT(&pk_len), in silc_public_key_payload_decode() 79 if (ret < 0 || pk_len > data_len - 4) in silc_public_key_payload_decode() 86 SILC_STR_DATA(&pk, pk_len), in silc_public_key_payload_decode() 92 pk, pk_len, public_key); in silc_public_key_payload_decode()
|
H A D | silcmessage.c | 117 sig->pk_len), in silc_message_signed_payload_parse() 122 sig->pk_len - 2) { in silc_message_signed_payload_parse() 157 SILC_STR_UI_SHORT(pk_len), in silc_message_signed_encode_data() 161 if (pk && pk_len) { in silc_message_signed_encode_data() 186 SilcUInt32 pk_len = 0; in silc_message_signed_payload_encode() local 202 pk, pk_len, pk_type); in silc_message_signed_payload_encode() 233 SILC_STR_UI_SHORT(pk_len), in silc_message_signed_payload_encode() 237 if (pk_len && pk) { in silc_message_signed_payload_encode() 727 sig->pk_data, sig->pk_len, in silc_message_signed_verify() 768 sig->pk_len, &pk)) in silc_message_signed_get_public_key() [all …]
|
/dports/security/unicornscan/unicornscan-0.4.2/src/report_modules/udpstr/ |
H A D | module.c | 78 uint16_t pk_len=0, port=0, datalen=0, writestart=0; in create_report() local 88 pk_len=r_u.ir->doff; in create_report() 89 assert(pk_len > 0 && pk_len < s->vi->mtu); in create_report() 94 if (pk_len <= sizeof(struct myiphdr)) { in create_report() 105 if (pk_len < (sizeof(struct myiphdr) + sizeof(struct myudphdr) + 1)) { in create_report() 111 pk_len -= sizeof(struct myiphdr); in create_report() 114 datalen=pk_len - sizeof(struct myudphdr); in create_report() 115 pk_len -= sizeof(struct myudphdr); in create_report() 118 for (r_u.d += sizeof(struct myudphdr) ; pk_len != 0 ; pk_len--, r_u.d++) { in create_report()
|
/dports/security/unicornscan/unicornscan-0.4.2/src/report_modules/p0f/ |
H A D | module.c | 87 uint16_t pk_len=0; in create_report() local 94 pk_len=r_u.ir->doff; in create_report() 95 assert(pk_len > 0 && pk_len < s->vi->mtu); in create_report() 102 if (s->verbose > 5) hexdump(r_u.d, pk_len); in create_report() 104 result=p0f_parse(r_u.d, pk_len); in create_report()
|
/dports/net-im/libpurple/pidgin-2.14.8/libpurple/protocols/silc10/ |
H A D | pk.c | 35 SilcUInt32 pk_len; member 58 verify->pk_len, SILC_PKCS_FILE_PEM); in silcpurple_verify_cb() 86 silc_pkcs_public_key_decode(verify->pk, verify->pk_len, in silcpurple_verify_details() 126 unsigned char *pk, SilcUInt32 pk_len, in silcpurple_verify_public_key() argument 188 fingerprint = silc_hash_fingerprint(NULL, pk, pk_len); in silcpurple_verify_public_key() 212 verify->pk = silc_memdup(pk, pk_len); in silcpurple_verify_public_key() 213 verify->pk_len = pk_len; in silcpurple_verify_public_key() 217 fingerprint = verify->fingerprint = silc_hash_fingerprint(NULL, pk, pk_len); in silcpurple_verify_public_key() 218 babbleprint = verify->babbleprint = silc_hash_babbleprint(NULL, pk, pk_len); in silcpurple_verify_public_key()
|
/dports/net-im/pidgin/pidgin-2.14.8/libpurple/protocols/silc10/ |
H A D | pk.c | 35 SilcUInt32 pk_len; member 58 verify->pk_len, SILC_PKCS_FILE_PEM); in silcpurple_verify_cb() 86 silc_pkcs_public_key_decode(verify->pk, verify->pk_len, in silcpurple_verify_details() 126 unsigned char *pk, SilcUInt32 pk_len, in silcpurple_verify_public_key() argument 188 fingerprint = silc_hash_fingerprint(NULL, pk, pk_len); in silcpurple_verify_public_key() 212 verify->pk = silc_memdup(pk, pk_len); in silcpurple_verify_public_key() 213 verify->pk_len = pk_len; in silcpurple_verify_public_key() 217 fingerprint = verify->fingerprint = silc_hash_fingerprint(NULL, pk, pk_len); in silcpurple_verify_public_key() 218 babbleprint = verify->babbleprint = silc_hash_babbleprint(NULL, pk, pk_len); in silcpurple_verify_public_key()
|
/dports/net-im/finch/pidgin-2.14.8/libpurple/protocols/silc10/ |
H A D | pk.c | 35 SilcUInt32 pk_len; member 58 verify->pk_len, SILC_PKCS_FILE_PEM); in silcpurple_verify_cb() 86 silc_pkcs_public_key_decode(verify->pk, verify->pk_len, in silcpurple_verify_details() 126 unsigned char *pk, SilcUInt32 pk_len, in silcpurple_verify_public_key() argument 188 fingerprint = silc_hash_fingerprint(NULL, pk, pk_len); in silcpurple_verify_public_key() 212 verify->pk = silc_memdup(pk, pk_len); in silcpurple_verify_public_key() 213 verify->pk_len = pk_len; in silcpurple_verify_public_key() 217 fingerprint = verify->fingerprint = silc_hash_fingerprint(NULL, pk, pk_len); in silcpurple_verify_public_key() 218 babbleprint = verify->babbleprint = silc_hash_babbleprint(NULL, pk, pk_len); in silcpurple_verify_public_key()
|
/dports/sysutils/atf-sun50i_h6/arm-trusted-firmware-2.5/drivers/auth/ |
H A D | auth_mod.c | 152 unsigned int data_len, pk_len, pk_hash_len, sig_len, sig_alg_len; in auth_signature() local 176 &pk_ptr, &pk_len); in auth_signature() 178 rc = plat_get_rotpk_info(param->pk->cookie, &pk_ptr, &pk_len, in auth_signature() 187 pk_hash_len = pk_len; in auth_signature() 190 &pk_ptr, &pk_len); in auth_signature() 197 pk_ptr, pk_len); in auth_signature() 205 rc = crypto_mod_verify_hash(pk_ptr, pk_len, in auth_signature() 213 pk_ptr, pk_len); in auth_signature()
|
H A D | crypto_mod.c | 70 void *pk_ptr, unsigned int pk_len) in crypto_mod_verify_signature() argument 79 assert(pk_len != 0); in crypto_mod_verify_signature() 84 pk_ptr, pk_len); in crypto_mod_verify_signature()
|
/dports/sysutils/atf-sun50i_a64/arm-trusted-firmware-2.5/drivers/auth/ |
H A D | auth_mod.c | 152 unsigned int data_len, pk_len, pk_hash_len, sig_len, sig_alg_len; in auth_signature() local 176 &pk_ptr, &pk_len); in auth_signature() 178 rc = plat_get_rotpk_info(param->pk->cookie, &pk_ptr, &pk_len, in auth_signature() 187 pk_hash_len = pk_len; in auth_signature() 190 &pk_ptr, &pk_len); in auth_signature() 197 pk_ptr, pk_len); in auth_signature() 205 rc = crypto_mod_verify_hash(pk_ptr, pk_len, in auth_signature() 213 pk_ptr, pk_len); in auth_signature()
|
H A D | crypto_mod.c | 70 void *pk_ptr, unsigned int pk_len) in crypto_mod_verify_signature() argument 79 assert(pk_len != 0); in crypto_mod_verify_signature() 84 pk_ptr, pk_len); in crypto_mod_verify_signature()
|
/dports/sysutils/atf-rk3399/arm-trusted-firmware-2.5/drivers/auth/ |
H A D | auth_mod.c | 152 unsigned int data_len, pk_len, pk_hash_len, sig_len, sig_alg_len; in auth_signature() local 176 &pk_ptr, &pk_len); in auth_signature() 178 rc = plat_get_rotpk_info(param->pk->cookie, &pk_ptr, &pk_len, in auth_signature() 187 pk_hash_len = pk_len; in auth_signature() 190 &pk_ptr, &pk_len); in auth_signature() 197 pk_ptr, pk_len); in auth_signature() 205 rc = crypto_mod_verify_hash(pk_ptr, pk_len, in auth_signature() 213 pk_ptr, pk_len); in auth_signature()
|
/dports/sysutils/atf-rk3328/arm-trusted-firmware-2.5/drivers/auth/ |
H A D | auth_mod.c | 152 unsigned int data_len, pk_len, pk_hash_len, sig_len, sig_alg_len; in auth_signature() local 176 &pk_ptr, &pk_len); in auth_signature() 178 rc = plat_get_rotpk_info(param->pk->cookie, &pk_ptr, &pk_len, in auth_signature() 187 pk_hash_len = pk_len; in auth_signature() 190 &pk_ptr, &pk_len); in auth_signature() 197 pk_ptr, pk_len); in auth_signature() 205 rc = crypto_mod_verify_hash(pk_ptr, pk_len, in auth_signature() 213 pk_ptr, pk_len); in auth_signature()
|
/dports/sysutils/atf-fvp/arm-trusted-firmware-2.5/drivers/auth/ |
H A D | auth_mod.c | 152 unsigned int data_len, pk_len, pk_hash_len, sig_len, sig_alg_len; in auth_signature() local 176 &pk_ptr, &pk_len); in auth_signature() 178 rc = plat_get_rotpk_info(param->pk->cookie, &pk_ptr, &pk_len, in auth_signature() 187 pk_hash_len = pk_len; in auth_signature() 190 &pk_ptr, &pk_len); in auth_signature() 197 pk_ptr, pk_len); in auth_signature() 205 rc = crypto_mod_verify_hash(pk_ptr, pk_len, in auth_signature() 213 pk_ptr, pk_len); in auth_signature()
|
/dports/print/texlive-base/texlive-20150521-source/texk/ttf2pk2/ |
H A D | pklib.c | 101 int pk_len; variable 566 pk_len = bitmap_end - bitmap; in pk_rll_cvt() 654 pk_len = q - bitmap; in pk_bm_cvt() 819 if (pk_len + 8 < 4 * 256 && tfm_wid < (1<<24) && in PKputglyph() 823 putc(flag | ((pk_len + 8) >> 8), pk_file); in PKputglyph() 824 putc(pk_len + 8, pk_file); in PKputglyph() 833 else if (pk_len + 13 < 3 * 65536L && tfm_wid < (1<<24) && in PKputglyph() 838 putc(flag | 4 | ((pk_len + 13) >> 16), pk_file); in PKputglyph() 839 putshort(pk_len + 13); in PKputglyph() 851 putlong(pk_len + 28); in PKputglyph() [all …]
|
/dports/print/freetype/freetype-1.3.1/contrib/ttf2pk/ |
H A D | pklib.c | 97 int pk_len; variable 562 pk_len = bitmap_end - bitmap; in pk_rll_cvt() 650 pk_len = q - bitmap; in pk_bm_cvt() 815 if (pk_len + 8 < 4 * 256 && tfm_wid < (1<<24) && in PKputglyph() 819 putc(flag | ((pk_len + 8) >> 8), pk_file); in PKputglyph() 820 putc(pk_len + 8, pk_file); in PKputglyph() 829 else if (pk_len + 13 < 3 * 65536L && tfm_wid < (1<<24) && in PKputglyph() 834 putc(flag | 4 | ((pk_len + 13) >> 16), pk_file); in PKputglyph() 835 putshort(pk_len + 13); in PKputglyph() 847 putlong(pk_len + 28); in PKputglyph() [all …]
|
/dports/devel/silc-toolkit/silc-toolkit-1.1.12/lib/silccrypt/tests/ |
H A D | test_silcpkcs.c | 14 SilcUInt32 pk_len = 0, prv_len = 0; in test() local 62 pk = silc_pkcs_get_public_key(pkcs, &pk_len); in test() 63 if (!pk || !pk_len) { in test() 81 pubkey = silc_pkcs_public_key_alloc("rsa", identifier, pk, pk_len); in test() 88 pk = silc_pkcs_public_key_encode(pubkey, &pk_len); in test() 94 if (!silc_pkcs_public_key_decode(pk, pk_len, &pubkey)) { in test()
|
/dports/devel/silc-toolkit/silc-toolkit-1.1.12/lib/silcske/ |
H A D | payload.c | 226 buf = silc_buffer_alloc_size(4 + payload->pk_len + 2 + x_len + in silc_ske_payload_ke_encode() 233 SILC_STR_UI_SHORT(payload->pk_len), in silc_ske_payload_ke_encode() 236 payload->pk_len), in silc_ske_payload_ke_encode() 287 SILC_STR_UI_SHORT(&payload->pk_len), in silc_ske_payload_ke_decode() 298 payload->pk_type > SILC_SKE_PK_TYPE_SPKI) || !payload->pk_len)) { in silc_ske_payload_ke_decode() 304 tot_len += payload->pk_len + 4; in silc_ske_payload_ke_decode() 310 payload->pk_len), in silc_ske_payload_ke_decode()
|
/dports/net/hostapd/hostapd-2.9/src/eap_common/ |
H A D | eap_gpsk_common.c | 114 u8 *pk, size_t pk_len) in eap_gpsk_derive_keys_helper() argument 181 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: PK", pos, pk_len); in eap_gpsk_derive_keys_helper() 182 os_memcpy(pk, pos, pk_len); in eap_gpsk_derive_keys_helper() 192 u8 *pk, size_t *pk_len) in eap_gpsk_derive_keys_aes() argument 214 *pk_len = EAP_GPSK_PK_LEN_AES; in eap_gpsk_derive_keys_aes() 220 pk, *pk_len); in eap_gpsk_derive_keys_aes() 285 u8 *pk, size_t *pk_len) in eap_gpsk_derive_keys() argument 321 pk, pk_len); in eap_gpsk_derive_keys()
|
/dports/net/hostapd-devel/hostap-14ab4a816/src/eap_common/ |
H A D | eap_gpsk_common.c | 114 u8 *pk, size_t pk_len) in eap_gpsk_derive_keys_helper() argument 181 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: PK", pos, pk_len); in eap_gpsk_derive_keys_helper() 182 os_memcpy(pk, pos, pk_len); in eap_gpsk_derive_keys_helper() 192 u8 *pk, size_t *pk_len) in eap_gpsk_derive_keys_aes() argument 214 *pk_len = EAP_GPSK_PK_LEN_AES; in eap_gpsk_derive_keys_aes() 220 pk, *pk_len); in eap_gpsk_derive_keys_aes() 285 u8 *pk, size_t *pk_len) in eap_gpsk_derive_keys() argument 321 pk, pk_len); in eap_gpsk_derive_keys()
|
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/src/eap_common/ |
H A D | eap_gpsk_common.c | 114 u8 *pk, size_t pk_len) in eap_gpsk_derive_keys_helper() argument 181 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: PK", pos, pk_len); in eap_gpsk_derive_keys_helper() 182 os_memcpy(pk, pos, pk_len); in eap_gpsk_derive_keys_helper() 192 u8 *pk, size_t *pk_len) in eap_gpsk_derive_keys_aes() argument 214 *pk_len = EAP_GPSK_PK_LEN_AES; in eap_gpsk_derive_keys_aes() 220 pk, *pk_len); in eap_gpsk_derive_keys_aes() 285 u8 *pk, size_t *pk_len) in eap_gpsk_derive_keys() argument 321 pk, pk_len); in eap_gpsk_derive_keys()
|
/dports/security/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | eap_gpsk_common.c | 114 u8 *pk, size_t pk_len) in eap_gpsk_derive_keys_helper() argument 181 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: PK", pos, pk_len); in eap_gpsk_derive_keys_helper() 182 os_memcpy(pk, pos, pk_len); in eap_gpsk_derive_keys_helper() 192 u8 *pk, size_t *pk_len) in eap_gpsk_derive_keys_aes() argument 214 *pk_len = EAP_GPSK_PK_LEN_AES; in eap_gpsk_derive_keys_aes() 220 pk, *pk_len); in eap_gpsk_derive_keys_aes() 285 u8 *pk, size_t *pk_len) in eap_gpsk_derive_keys() argument 321 pk, pk_len); in eap_gpsk_derive_keys()
|
/dports/net/wpa_supplicant_gui/wpa_supplicant-2.9/src/eap_common/ |
H A D | eap_gpsk_common.c | 114 u8 *pk, size_t pk_len) in eap_gpsk_derive_keys_helper() argument 181 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: PK", pos, pk_len); in eap_gpsk_derive_keys_helper() 182 os_memcpy(pk, pos, pk_len); in eap_gpsk_derive_keys_helper() 192 u8 *pk, size_t *pk_len) in eap_gpsk_derive_keys_aes() argument 214 *pk_len = EAP_GPSK_PK_LEN_AES; in eap_gpsk_derive_keys_aes() 220 pk, *pk_len); in eap_gpsk_derive_keys_aes() 285 u8 *pk, size_t *pk_len) in eap_gpsk_derive_keys() argument 321 pk, pk_len); in eap_gpsk_derive_keys()
|