| /src/contrib/unbound/util/data/ |
| H A D | dname.c | 55 size_t labellen; in query_dname_len() local 59 labellen = sldns_buffer_read_u8(query); in query_dname_len() 60 if((labellen&0xc0)) in query_dname_len() 62 len += labellen + 1; in query_dname_len() 65 if(labellen == 0) in query_dname_len() 67 if(sldns_buffer_remaining(query) < labellen) in query_dname_len() 69 sldns_buffer_skip(query, (ssize_t)labellen); in query_dname_len() 77 size_t labellen; in dname_valid() local 80 labellen = *dname++; in dname_valid() 81 while(labellen) { in dname_valid() [all …]
|
| /src/lib/libveriexec/ |
| H A D | veriexec_get.c | 107 if (params.labellen > 0) { in veriexec_get_path_label() 108 if (buf != NULL && bufsz > params.labellen) { in veriexec_get_path_label() 145 if (params.labellen > 0) { in veriexec_get_pid_label() 146 if (buf != NULL && bufsz > params.labellen) { in veriexec_get_pid_label() 166 check_label_want(const char *label, size_t labellen, in check_label_want() argument 172 if (labellen > 0 && wantlen > 0 && in check_label_want() 207 return check_label_want(params.label, params.labellen, in veriexec_check_pid_label() 237 return check_label_want(params.label, params.labellen, in veriexec_check_path_label()
|
| /src/sys/security/mac_veriexec/ |
| H A D | veriexec_metadata.c | 373 mac_veriexec_init_label(char **labelp, size_t labellen, char *src, in mac_veriexec_init_label() argument 379 if (labellen < srclen) { in mac_veriexec_init_label() 385 labellen = srclen; in mac_veriexec_init_label() 389 return labellen; in mac_veriexec_init_label() 637 char *label, size_t labellen, int flags, const char *fp_type, int override) in mac_veriexec_metadata_add_file() argument 646 if ((flags & VERIEXEC_LABEL) != 0 && (label == NULL || labellen == 0)) in mac_veriexec_metadata_add_file() 683 ip->labellen = mac_veriexec_init_label( in mac_veriexec_metadata_add_file() 684 &ip->label, ip->labellen, label, in mac_veriexec_metadata_add_file() 685 labellen); in mac_veriexec_metadata_add_file() 686 } else if (ip->labellen > 0) { in mac_veriexec_metadata_add_file() [all …]
|
| H A D | mac_veriexec.c | 811 uint32_t labellen; member 986 result.labellen = ip->labellen; in mac_veriexec_syscall() 987 CP(result, result32, labellen); in mac_veriexec_syscall() 988 if (ip->labellen > 0) in mac_veriexec_syscall() 990 result32.label[result.labellen] = '\0'; in mac_veriexec_syscall() 1001 result.labellen = ip->labellen; in mac_veriexec_syscall() 1002 if (ip->labellen > 0) in mac_veriexec_syscall() 1004 result.label[result.labellen] = '\0'; in mac_veriexec_syscall()
|
| H A D | mac_veriexec.h | 82 size_t labellen; member 179 char *label, size_t labellen, int flags, const char *fp_type,
|
| H A D | mac_veriexec_internal.h | 58 size_t labellen; member
|
| /src/crypto/openssl/crypto/cms/ |
| H A D | cms_rsa.c | 46 int labellen = 0; in rsa_cms_decrypt() local 92 labellen = plab->parameter->value.octet_string->length; in rsa_cms_decrypt() 102 && EVP_PKEY_CTX_set0_rsa_oaep_label(pkctx, label, labellen) <= 0) { in rsa_cms_decrypt() 122 int pad_mode = RSA_PKCS1_PADDING, rv = 0, labellen; in rsa_cms_encrypt() local 142 labellen = EVP_PKEY_CTX_get0_rsa_oaep_label(pkctx, &label); in rsa_cms_encrypt() 143 if (labellen < 0) in rsa_cms_encrypt() 152 if (labellen > 0) { in rsa_cms_encrypt() 157 if (!ASN1_OCTET_STRING_set(los, label, labellen)) in rsa_cms_encrypt()
|
| /src/crypto/openssl/ssl/ |
| H A D | tls13_enc.c | 36 const unsigned char *label, size_t labellen, in tls13_hkdf_expand_ex() argument 53 if (labellen > TLS13_MAX_LABEL_LEN) { in tls13_hkdf_expand_ex() 82 (unsigned char *)label, labellen); in tls13_hkdf_expand_ex() 102 const unsigned char *label, size_t labellen, in tls13_hkdf_expand() argument 110 secret, label, labellen, data, datalen, in tls13_hkdf_expand() 355 size_t labellen, unsigned char *secret, in derive_secret_key_and_iv() argument 371 if (!tls13_hkdf_expand(s, md, insecret, label, labellen, hash, hashlen, in derive_secret_key_and_iv() 503 size_t labellen, hashlen = 0; in tls13_change_cipher_state() local 525 labellen = sizeof(client_early_traffic) - 1; in tls13_change_cipher_state() 617 labellen = sizeof(client_handshake_traffic) - 1; in tls13_change_cipher_state() [all …]
|
| /src/crypto/openssl/crypto/hpke/ |
| H A D | hpke_util.c | 306 size_t labellen = 0; in ossl_hpke_labeled_extract() local 313 labellen = strlen(label); in ossl_hpke_labeled_extract() 315 + suiteidlen + labellen + ikmlen; in ossl_hpke_labeled_extract() 325 || !WPACKET_memcpy(&pkt, label, labellen) in ossl_hpke_labeled_extract() 356 size_t labellen = 0; in ossl_hpke_labeled_expand() local 363 labellen = strlen(label); in ossl_hpke_labeled_expand() 365 + protocol_labellen + suiteidlen + labellen + infolen; in ossl_hpke_labeled_expand() 376 || !WPACKET_memcpy(&pkt, label, labellen) in ossl_hpke_labeled_expand()
|
| H A D | hpke.c | 1248 const unsigned char *label, size_t labellen) in OSSL_HPKE_export() argument 1260 if (labellen > OSSL_HPKE_MAX_PARMLEN) { in OSSL_HPKE_export() 1264 if (labellen > 0 && label == NULL) { in OSSL_HPKE_export() 1295 label, labellen); in OSSL_HPKE_export()
|
| /src/sys/dev/veriexec/ |
| H A D | verified_exec.c | 192 size_t labellen = 0; in verifiedexecioctl() local 197 labellen = strnlen(lparams->label, in verifiedexecioctl() 199 if (labellen > MAXLABELLEN) in verifiedexecioctl() 251 lparams->label : NULL, labellen, in verifiedexecioctl()
|
| /src/lib/libc/nameser/ |
| H A D | ns_name.c | 78 static int labellen(const u_char *); 120 if ((l = labellen(cp - 1)) < 0) { in ns_name_ntop() 375 if ((l = labellen(cp - 1)) < 0) { in ns_name_ntol() 440 if ((l = labellen(srcp - 1)) < 0) { in ns_name_unpack2() 544 if ((l0 = labellen(srcp)) < 0) { in ns_name_pack() 585 n = labellen(srcp); in ns_name_pack() 691 if (cp < eom && (l = labellen(cp - 1)) < 0) { in ns_name_skip() 945 n = labellen(cp - 1); /*%< XXX */ in dn_find() 1131 labellen(const u_char *lp) in labellen() function
|
| /src/usr.sbin/fstyp/ |
| H A D | ntfs.c | 101 convert_label(const void *label /* LE */, size_t labellen, char *label_out, in convert_label() argument 117 rc = iconv(cd, __DECONST(char **, &label), &labellen, &label_out, in convert_label()
|
| /src/crypto/openssl/test/ |
| H A D | tls13secretstest.c | 243 const unsigned char *label, size_t labellen, in test_secret() argument 259 if (!tls13_hkdf_expand(s, md, prk, label, labellen, hash, hashsize, in test_secret()
|
| /src/usr.bin/mkimg/ |
| H A D | scheme.h | 76 u_int labellen; member
|
| H A D | apm.c | 112 .labellen = APM_ENT_NAMELEN - 1,
|
| H A D | scheme.c | 168 if (strlen(p->label) > scheme->labellen) in scheme_check_part()
|
| H A D | gpt.c | 293 .labellen = 36,
|
| /src/contrib/unbound/sldns/ |
| H A D | wire2str.c | 874 uint8_t labellen = *pos++; in sldns_wire2str_dname_scan() local 878 if((labellen&0xc0) == 0xc0) { in sldns_wire2str_dname_scan() 887 target = ((labellen&0x3f)<<8) | *pos; in sldns_wire2str_dname_scan() 902 } else if((labellen&0xc0)) { in sldns_wire2str_dname_scan() 906 (int)(labellen&0xc0)); in sldns_wire2str_dname_scan() 911 if(in_buf && *dlen < (size_t)labellen) in sldns_wire2str_dname_scan() 912 labellen = (uint8_t)*dlen; in sldns_wire2str_dname_scan() 913 else if(!in_buf && pos+(size_t)labellen > pkt+pktlen) in sldns_wire2str_dname_scan() 914 labellen = (uint8_t)(pkt + pktlen - pos); in sldns_wire2str_dname_scan() 915 dname_len += ((size_t)labellen)+1; in sldns_wire2str_dname_scan() [all …]
|
| /src/crypto/openssl/providers/implementations/kdfs/ |
| H A D | hkdf.c | 644 const unsigned char *label, size_t labellen, in prov_tls13_hkdf_expand() argument 662 || !WPACKET_memcpy(&pkt, label, labellen) in prov_tls13_hkdf_expand() 684 size_t labellen, in prov_tls13_hkdf_generate_secret() argument 721 prefix, prefixlen, label, labellen, in prov_tls13_hkdf_generate_secret()
|
| /src/contrib/tcpdump/ |
| H A D | print-domain.c | 144 labellen(netdissect_options *ndo, in labellen() function 193 if ((l = labellen(ndo, cp)) == (u_int)-1) in fqdn_print() 236 if ((l = labellen(ndo, cp)) == (u_int)-1) in fqdn_print() 279 if ((l = labellen(ndo, cp)) == (u_int)-1) in fqdn_print()
|
| /src/crypto/openssl/include/openssl/ |
| H A D | hpke.h | 138 size_t labellen);
|
| /src/crypto/openssl/crypto/rsa/ |
| H A D | rsa_lib.c | 1214 size_t labellen; in EVP_PKEY_CTX_get0_rsa_oaep_label() local 1233 labellen = rsa_params[0].return_size; in EVP_PKEY_CTX_get0_rsa_oaep_label() 1234 if (labellen > INT_MAX) in EVP_PKEY_CTX_get0_rsa_oaep_label() 1237 return (int)labellen; in EVP_PKEY_CTX_get0_rsa_oaep_label()
|
| /src/contrib/wpa/src/eap_common/ |
| H A D | eap_pwd_common.c | 46 size_t labellen, u8 *result, size_t resultbitlen) in eap_pwd_kdf() argument 66 crypto_hash_update(hash, label, labellen); in eap_pwd_kdf()
|
| /src/contrib/bsddialog/lib/ |
| H A D | menubox.c | 301 int i, realw, labellen; in drawseparators() local 318 labellen = strcols(name) + strcols(desc) + 1; in drawseparators() 319 wmove(m->pad, i, (labellen < realw) ? realw/2 - labellen/2 : 0); in drawseparators()
|