/barrelfish-2018-10-04/lib/octopus/parser/ |
H A D | parse_names.c | 46 * \param[out] len Size of array. 51 errval_t oct_parse_names(char* input, char*** names, size_t* len) argument 72 *len = --i; 76 *len = 0; 93 *len = 0; 101 qsort(*names, *len, sizeof(char*), cmpstringp); 113 * \param len Size of the names array 117 void oct_free_names(char** names, size_t len) argument 120 for (size_t i = 0; i < len; i++) {
|
/barrelfish-2018-10-04/include/lwip2/lwip/ |
H A D | netbuf.h | 85 void **dataptr, u16_t *len); 90 #define netbuf_copy_partial(buf, dataptr, len, offset) \ 91 pbuf_copy_partial((buf)->p, (dataptr), (len), (offset)) 92 #define netbuf_copy(buf,dataptr,len) netbuf_copy_partial(buf, dataptr, len, 0) 93 #define netbuf_take(buf, dataptr, len) pbuf_take((buf)->p, dataptr, len)
|
/barrelfish-2018-10-04/lib/lwip2/src/netif/ppp/ |
H A D | eap.c | 257 if(p->tot_len != p->len) { 288 if(p->tot_len != p->len) { 526 mytce.modulus.len = sizeof (wkmodulus); 528 mytce.generator.len = 1; 546 tpw.pebuf.password.len = t_fromb64((char *)tpw.pwbuf, 549 tpw.pebuf.salt.len = t_fromb64((char *)tpw.saltbuf, 643 int len; local 664 int len = (int)strlen(pcb->remote_name); local 665 if (len > MAXNAMELEN) { 666 len 1311 eap_request(ppp_pcb *pcb, u_char *inp, int id, int len) argument 1725 eap_response(ppp_pcb *pcb, u_char *inp, int id, int len) argument 2017 eap_success(ppp_pcb *pcb, u_char *inp, int id, int len) argument 2043 eap_failure(ppp_pcb *pcb, u_char *inp, int id, int len) argument 2072 int len; local 2136 int code, id, len, rtype, vallen; local [all...] |
H A D | chap-new.c | 94 unsigned char *pkt, int len); 101 unsigned char *pkt, int len); 103 unsigned char *pkt, int len); 242 if(p->tot_len != p->len) { 258 int clen = 1, nlen, len; local 269 len = CHAP_HDRLEN + 1 + clen + nlen; 270 pcb->chap_server.challenge_pktlen = PPP_HDRLEN + len; 275 p[2] = len >> 8; 276 p[3] = len; 283 unsigned char *pkt, int len) { 282 chap_handle_response(ppp_pcb *pcb, int id, unsigned char *pkt, int len) argument 435 chap_respond(ppp_pcb *pcb, int id, unsigned char *pkt, int len) argument 497 chap_handle_status(ppp_pcb *pcb, int code, int id, unsigned char *pkt, int len) argument 537 int len; local 595 int code, id, len; local [all...] |
H A D | utils.c | 76 static void ppp_format_packet(const u_char *p, int len, 81 int len; member in struct:buffer_info 87 * always leaves destination null-terminated (for len > 0). 89 size_t ppp_strlcpy(char *dest, const char *src, size_t len) { argument 92 if (len != 0) { 93 if (ret < len) 96 strncpy(dest, src, len - 1); 97 dest[len-1] = 0; 105 * always leaves destination null-terminated (for len > 0). 107 size_t ppp_strlcat(char *dest, const char *src, size_t len) { argument 140 int base, len, neg, quoted; local 448 ppp_format_packet(const u_char *p, int len, void (*printer) (void *, const char *, ...), void *arg) argument 574 ppp_print_string(const u_char *p, int len, void (*printer) (void *, const char *, ...), void *arg) argument 707 ppp_dump_packet(ppp_pcb *pcb, const char *tag, unsigned char *p, int len) argument [all...] |
/barrelfish-2018-10-04/include/lwip2/netif/ppp/ |
H A D | eap.c | 257 if(p->tot_len != p->len) { 288 if(p->tot_len != p->len) { 526 mytce.modulus.len = sizeof (wkmodulus); 528 mytce.generator.len = 1; 546 tpw.pebuf.password.len = t_fromb64((char *)tpw.pwbuf, 549 tpw.pebuf.salt.len = t_fromb64((char *)tpw.saltbuf, 643 int len; local 664 int len = (int)strlen(pcb->remote_name); local 665 if (len > MAXNAMELEN) { 666 len 1311 eap_request(ppp_pcb *pcb, u_char *inp, int id, int len) argument 1725 eap_response(ppp_pcb *pcb, u_char *inp, int id, int len) argument 2017 eap_success(ppp_pcb *pcb, u_char *inp, int id, int len) argument 2043 eap_failure(ppp_pcb *pcb, u_char *inp, int id, int len) argument 2072 int len; local 2136 int code, id, len, rtype, vallen; local [all...] |
H A D | chap-new.c | 94 unsigned char *pkt, int len); 101 unsigned char *pkt, int len); 103 unsigned char *pkt, int len); 242 if(p->tot_len != p->len) { 258 int clen = 1, nlen, len; local 269 len = CHAP_HDRLEN + 1 + clen + nlen; 270 pcb->chap_server.challenge_pktlen = PPP_HDRLEN + len; 275 p[2] = len >> 8; 276 p[3] = len; 283 unsigned char *pkt, int len) { 282 chap_handle_response(ppp_pcb *pcb, int id, unsigned char *pkt, int len) argument 435 chap_respond(ppp_pcb *pcb, int id, unsigned char *pkt, int len) argument 497 chap_handle_status(ppp_pcb *pcb, int code, int id, unsigned char *pkt, int len) argument 537 int len; local 595 int code, id, len; local [all...] |
H A D | utils.c | 76 static void ppp_format_packet(const u_char *p, int len, 81 int len; member in struct:buffer_info 87 * always leaves destination null-terminated (for len > 0). 89 size_t ppp_strlcpy(char *dest, const char *src, size_t len) { argument 92 if (len != 0) { 93 if (ret < len) 96 strncpy(dest, src, len - 1); 97 dest[len-1] = 0; 105 * always leaves destination null-terminated (for len > 0). 107 size_t ppp_strlcat(char *dest, const char *src, size_t len) { argument 140 int base, len, neg, quoted; local 448 ppp_format_packet(const u_char *p, int len, void (*printer) (void *, const char *, ...), void *arg) argument 574 ppp_print_string(const u_char *p, int len, void (*printer) (void *, const char *, ...), void *arg) argument 707 ppp_dump_packet(ppp_pcb *pcb, const char *tag, unsigned char *p, int len) argument [all...] |
/barrelfish-2018-10-04/lib/libc/inet/ |
H A D | inet_cidr_ntop.c | 113 size_t len = 4; local 124 len = 4; 126 for (len = 1, b = 1 ; b < 4U; b++) 128 len = b + 1; 132 if (len > bytes) 133 bytes = len; 165 struct { int base, len; } best, cur; member in struct:__anon981 183 best.len = 0; 185 cur.len = 0; 189 cur.base = i, cur.len [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/asn1/ |
H A D | a_bitstr.c | 63 int ASN1_BIT_STRING_set(ASN1_BIT_STRING *x, unsigned char *d, int len) argument 64 { return M_ASN1_BIT_STRING_set(x, d, len); } 68 int ret,j,bits,len; local 73 len=a->length; 75 if (len > 0) 83 for ( ; len > 0; len--) 85 if (a->data[len-1]) break; 87 j=a->data[len-1]; 102 ret=1+len; 116 c2i_ASN1_BIT_STRING(ASN1_BIT_STRING **a, const unsigned char **pp, long len) argument [all...] |
H A D | a_int.c | 179 long len) 195 pend = p + len; 199 s=(unsigned char *)OPENSSL_malloc((int)len+1); 206 if(!len) { 214 if ((*p == 0xff) && (len != 1)) { 216 len--; 218 i = len; 231 * where the number of bytes is larger than len. 235 s[len] = 0; 236 len 178 c2i_ASN1_INTEGER(ASN1_INTEGER **a, const unsigned char **pp, long len) argument 277 long len; local 407 int len,j; local [all...] |
H A D | asn1_par.c | 102 int ASN1_parse(BIO *bp, const unsigned char *pp, long len, int indent) argument 104 return(asn1_parse2(bp,&pp,len,0,0,indent,0)); 107 int ASN1_parse_dump(BIO *bp, const unsigned char *pp, long len, int indent, int dump) argument 109 return(asn1_parse2(bp,&pp,len,0,0,indent,dump)); 116 long len; local 135 j=ASN1_get_object(&p,&len,&tag,&xclass,length); 155 depth,(long)hl,len) <= 0) 168 ep=p+len; 170 if (len > length) 177 if ((j == 0x21) && (len [all...] |
/barrelfish-2018-10-04/lib/lwip2/src/apps/snmp/ |
H A D | snmp_traps.c | 280 struct snmp_varbind_len len; local 282 if (snmp_varbind_length(varbind, &len) == ERR_OK) { 283 tot_len += 1 + len.vb_len_len + len.vb_value_len; 308 u16_t len; local 313 snmp_asn1_enc_u32t_cnt(trap->ts, &len); 314 snmp_asn1_enc_length_cnt(len, &lenlen); 315 tot_len += 1 + len + lenlen; 317 snmp_asn1_enc_s32t_cnt(trap->spc_trap, &len); 318 snmp_asn1_enc_length_cnt(len, [all...] |
/barrelfish-2018-10-04/lib/libc/net/ |
H A D | getifmaddrs.c | 57 size_t len; local 107 len = SA_RLEN(sa); 108 dcnt += len; 109 p += len; 144 len = SA_RLEN(sa); 149 memcpy(data, p, len); 150 data += len; 156 memcpy(data, p, len); 157 data += len; 163 memcpy(data, p, len); [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/des/ |
H A D | DES.xs | 7 static STRLEN len; 68 STRLEN len,l; 72 len=((((unsigned long)l)+7)/8)*8; 75 SvGROW(s,len); 76 SvCUR_set(s,len); 80 sv_setpvn(ST(2),(char *)c[len-8],8); 95 STRLEN len,l; 98 len=((((unsigned long)l)+7)/8)*8; 101 SvGROW(s,len); 102 SvCUR_set(s,len); [all...] |
/barrelfish-2018-10-04/lib/libc/xdr/ |
H A D | xdr_sizeof.c | 58 x_putbytes(XDR *xdrs, const char *bp, u_int len) argument 60 xdrs->x_handy += len; 79 x_inline(XDR *xdrs, u_int len) argument 81 if (len == 0) { 87 if (len < (u_int)(uintptr_t)xdrs->x_base) { 89 xdrs->x_handy += len; 95 if ((xdrs->x_private = (caddr_t) malloc(len)) == NULL) { 99 xdrs->x_base = (caddr_t)(uintptr_t)len; 100 xdrs->x_handy += len;
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/bn/ |
H A D | bn_mpi.c | 93 long len; local 101 len=((long)d[0]<<24)|((long)d[1]<<16)|((int)d[2]<<8)|(int)d[3]; 102 if ((len+4) != n) 111 if (len == 0) 120 if (BN_bin2bn(d,(int)len,a) == NULL)
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/x509/ |
H A D | x509spki.c | 78 NETSCAPE_SPKI * NETSCAPE_SPKI_b64_decode(const char *str, int len) argument 84 if(len <= 0) len = strlen(str); 85 if (!(spki_der = OPENSSL_malloc(len + 1))) { 89 spki_len = EVP_DecodeBlock(spki_der, (const unsigned char *)str, len);
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/demos/bio/ |
H A D | sconnect.c | 28 int i,len,off,ret=1; local 62 len=strlen(p); 67 i=BIO_write(out,&(p[off]),len); 82 len-=i; 83 if (len <= 0) break;
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/demos/eay/ |
H A D | conn.c | 24 int i,len,off,ret=1; local 46 len=strlen(p); 51 i=BIO_write(bio,&(p[off]),len); 66 len-=i; 67 if (len <= 0) break;
|
/barrelfish-2018-10-04/include/bench/ |
H A D | bench.h | 28 cycles_t bench_avg(cycles_t *array, size_t len); 29 cycles_t bench_variance(cycles_t *array, size_t len); 30 void bench_stddev(cycles_t *array, size_t len, uint8_t correction, 32 cycles_t bench_min(cycles_t *array, size_t len); 33 cycles_t bench_max(cycles_t *array, size_t len);
|
/barrelfish-2018-10-04/lib/lwip2/src/core/ |
H A D | pbuf.c | 29 * ->len field. It can be found by traversing the list. If the last 34 * loop end condition (tot_len == p->len), NOT (next == NULL). 301 p->len = LWIP_MIN(length, PBUF_POOL_BUFSIZE_ALIGNED - LWIP_MEM_ALIGN_SIZE(offset)); 302 LWIP_ASSERT("check p->payload + p->len does not overflow pbuf", 303 ((u8_t*)p->payload + p->len <= 315 rem_len = length - p->len; 335 q->len = LWIP_MIN((u16_t)rem_len, PBUF_POOL_BUFSIZE_ALIGNED); 339 LWIP_ASSERT("check p->payload + p->len does not overflow pbuf", 340 ((u8_t*)p->payload + p->len <= 344 rem_len -= q->len; 802 u16_t len; local 950 u16_t offset_to=0, offset_from=0, len; local 1015 pbuf_copy_partial(const struct pbuf *buf, void *dataptr, u16_t len, u16_t offset) argument 1149 pbuf_take(struct pbuf *buf, const void *dataptr, u16_t len) argument 1193 pbuf_take_at(struct pbuf *buf, const void *dataptr, u16_t len, u16_t offset) argument 1262 pbuf_fill_chksum(struct pbuf *p, u16_t start_offset, const void *dataptr, u16_t len, u16_t *chksum) argument [all...] |
/barrelfish-2018-10-04/lib/libc/gen/ |
H A D | confstr.c | 46 confstr(int name, char *buf, size_t len) argument 112 if (len != 0 && buf != NULL) 113 strlcpy(buf, p, len);
|
/barrelfish-2018-10-04/lib/libc/iconv/ |
H A D | citrus_pivot_factory.c | 105 convert_line(struct src_head *sh, const char *line, size_t len) argument 117 p = memchr(line, T_COMM, len); 119 len = p - line; 122 line = _bcs_skip_ws_len(line, &len); 123 if (len == 0) 125 p = _bcs_skip_nonws_len(line, &len); 131 line = _bcs_skip_ws_len(p, &len); 132 if (len == 0) 134 p = _bcs_skip_nonws_len(line, &len); 140 line = _bcs_skip_ws_len(p, &len); [all...] |
/barrelfish-2018-10-04/lib/libc/posix1e/ |
H A D | mac_get.c | 69 socklen_t len; local 71 len = sizeof(*label); 72 return (getsockopt(fd, SOL_SOCKET, SO_PEERLABEL, label, &len));
|