Searched refs:b64len (Results 1 – 3 of 3) sorted by relevance
/dragonfly/crypto/openssh/ |
H A D | hostfile.c | 72 u_int b64len; in extract_salt() local 90 b64len = p - s; in extract_salt() 92 if (b64len == 0 || b64len > 1024) { in extract_salt() 93 debug2("extract_salt: bad encoded salt length %u", b64len); in extract_salt() 96 b64salt = xmalloc(1 + b64len); in extract_salt() 97 memcpy(b64salt, s, b64len); in extract_salt() 98 b64salt[b64len] = '\0'; in extract_salt()
|
/dragonfly/contrib/wpa_supplicant/src/eap_server/ |
H A D | tncs.c | 183 size_t b64len; in TNC_TNCS_SendMessage() local 198 b64 = base64_encode(message, messageLength, &b64len); in TNC_TNCS_SendMessage() 204 tncs->imv_data[imvID].imv_send = os_zalloc(b64len + 100); in TNC_TNCS_SendMessage() 212 b64len + 100, in TNC_TNCS_SendMessage()
|
/dragonfly/contrib/wpa_supplicant/src/eap_peer/ |
H A D | tncc.c | 148 size_t b64len; in TNC_TNCC_SendMessage() local 159 b64 = base64_encode(message, messageLength, &b64len); in TNC_TNCC_SendMessage() 166 imc->imc_send = os_zalloc(b64len + 100); in TNC_TNCC_SendMessage() 173 os_snprintf((char *) imc->imc_send, b64len + 100, in TNC_TNCC_SendMessage()
|