/freebsd-11.0-release/crypto/heimdal/lib/krb5/ |
H A D | build_auth.c | 44 size_t len = 0; local 48 &etypes.len, &etypes.val, 53 ASN1_MALLOC_ENCODE(EtypeList, buf, buf_size, &etypes, &len, ret); 58 if(buf_size != len) 70 ad.val[0].ad_data.length = len; 73 ASN1_MALLOC_ENCODE(AD_IF_RELEVANT, buf, buf_size, &ad, &len, ret); 78 if(buf_size != len) 98 (*auth_data)->val[0].ad_data.length = len; 116 size_t len = 0; local 173 ASN1_MALLOC_ENCODE(Authenticator, buf, buf_size, &auth, &len, re [all...] |
H A D | salt-des3.c | 46 size_t len; local 51 len = password.length + salt.saltvalue.length; 52 str = malloc(len); 53 if(len != 0 && str == NULL) { 64 ret = _krb5_n_fold(str, len, tmp, 24); 66 memset(str, 0, len); 96 memset(str, 0, len); 111 size_t len = password.length + salt.saltvalue.length; local 114 s = malloc(len); 115 if(len ! [all...] |
/freebsd-11.0-release/crypto/heimdal/lib/roken/ |
H A D | parse_units.h | 69 unparse_units (int num, const struct units *units, char *s, size_t len); 73 size_t len); 76 unparse_flags (int num, const struct units *units, char *s, size_t len);
|
H A D | socket_wrapper.h | 48 ssize_t swrap_recvfrom(int s, void *buf, size_t len, int flags, struct sockaddr *from, socklen_t *fromlen); 49 ssize_t swrap_sendto(int s, const void *buf, size_t len, int flags, const struct sockaddr *to, socklen_t tolen); 51 ssize_t swrap_recv(int s, void *buf, size_t len, int flags); 52 ssize_t swrap_send(int s, const void *buf, size_t len, int flags); 102 #define recvfrom(s,buf,len,flags,from,fromlen) swrap_recvfrom(s,buf,len,flags,from,fromlen) 107 #define sendto(s,buf,len,flags,to,tolen) swrap_sendto(s,buf,len,flags,to,tolen) 117 #define recv(s,buf,len,flags) swrap_recv(s,buf,len,flag [all...] |
/freebsd-11.0-release/contrib/wpa/src/eap_server/ |
H A D | eap_server_identity.c | 86 size_t len; local 89 respData, &len); 104 size_t len; local 118 respData, &len); 122 wpa_hexdump_ascii(MSG_DEBUG, "EAP-Identity: Peer identity", pos, len); 123 buf = os_malloc(len * 4 + 1); 125 printf_encode(buf, len * 4 + 1, pos, len); 132 sm->identity = os_malloc(len ? len [all...] |
/freebsd-11.0-release/contrib/wpa/src/utils/ |
H A D | uuid.c | 51 int len; local 52 len = os_snprintf(str, max_len, "%02x%02x%02x%02x-%02x%02x-%02x%02x-" 58 if (os_snprintf_error(max_len, len))
|
/freebsd-11.0-release/contrib/sendmail/libsm/ |
H A D | inet6_ntop.c | 27 ** len -- length of dst 34 sm_inet6_ntop(ipv6, dst, len) 37 size_t len; 43 r = sm_snprintf(dst, len,
|
H A D | strl.c | 127 ** strlcat2 will append at most len - strlen(dst) - 1 chars. 128 ** terminates with '\0' if len > 0 137 ** len -- max. length of "destination" string. 142 ** if this is greater than len then an overflow would have 148 sm_strlcat2(dst, src1, src2, len) 152 ssize_t len; 160 if (len < o + 1) 163 len -= o + 1; /* space left in dst */ 166 for (i = 0, j = o; i < len && (dst[j] = src1[i]) != 0; i++, j++) 172 /* no: terminate dst; there is space since i < len */ 212 sm_strlcpyn(char *dst, ssize_t len, int n, ...) argument [all...] |
/freebsd-11.0-release/crypto/openssl/crypto/pem/ |
H A D | pem_oth.c | 75 long len; local 78 if (!PEM_bytes_read_bio(&data, &len, NULL, name, bp, cb, u)) 81 ret = d2i(x, &p, len);
|
/freebsd-11.0-release/lib/libc/gen/ |
H A D | confstr.c | 46 confstr(int name, char *buf, size_t len) argument 112 if (len != 0 && buf != NULL) 113 strlcpy(buf, p, len);
|
/freebsd-11.0-release/lib/libc/iconv/ |
H A D | citrus_pivot_factory.c | 105 convert_line(struct src_head *sh, const char *line, size_t len) argument 117 p = memchr(line, T_COMM, len); 119 len = p - line; 122 line = _bcs_skip_ws_len(line, &len); 123 if (len == 0) 125 p = _bcs_skip_nonws_len(line, &len); 131 line = _bcs_skip_ws_len(p, &len); 132 if (len == 0) 134 p = _bcs_skip_nonws_len(line, &len); 140 line = _bcs_skip_ws_len(p, &len); [all...] |
/freebsd-11.0-release/crypto/heimdal/lib/wind/ |
H A D | test-bidi.c | 43 unsigned len; member in struct:test 66 if (_wind_stringprep_testbidi(t->vals, t->len, WIND_PROFILE_NAME)) { 74 if (!_wind_stringprep_testbidi(t->vals, t->len, WIND_PROFILE_NAME)) {
|
/freebsd-11.0-release/crypto/openssh/ |
H A D | entropy.c | 69 * Collect 'len' bytes of entropy into 'buf' from PRNGD/EGD daemon 77 get_random_bytes_prngd(unsigned char *buf, int len, argument 93 if (len <= 0 || len > 255) 94 fatal("Too many bytes (%d) to read from PRNGD", len); 135 msg[1] = len; 148 if (atomicio(read, fd, buf, len) != (size_t)len) { 200 u_int len; local 202 buf = buffer_get_string_ret(m, &len); [all...] |
H A D | ssh-ed25519.c | 40 size_t slen = 0, len; local 72 len = sshbuf_len(b); 74 if ((*sigp = malloc(len)) == NULL) { 78 memcpy(*sigp, sshbuf_ptr(b), len); 81 *lenp = len; 103 size_t len; local 116 (r = sshbuf_get_string_direct(b, &sigblob, &len)) != 0) 126 if (len > crypto_sign_ed25519_BYTES) { 130 if (datalen >= SIZE_MAX - len) { 134 smlen = len [all...] |
/freebsd-11.0-release/crypto/openssh/openbsd-compat/ |
H A D | inet_ntop.c | 119 struct { int base, len; } best, cur; member in struct:__anon6126 137 cur.base = i, cur.len = 1; 139 cur.len++; 142 if (best.base == -1 || cur.len > best.len) 149 if (best.base == -1 || cur.len > best.len) 152 if (best.base != -1 && best.len < 2) 163 i < (best.base + best.len)) { 179 (best.len [all...] |
/freebsd-11.0-release/contrib/libucl/src/ |
H A D | ucl_sexp.c | 51 len = 0; \ 65 uint64_t len = 0, mult = 1; local 135 if (len == 0) { 144 len += (*p - '0') * mult; 147 if (len > UINT32_MAX) { 165 if ((uint64_t)(end - p) > len || len == 0) { 167 "remain", (long long unsigned)len, (long)(end - p)); 174 obj->len = len; [all...] |
/freebsd-11.0-release/contrib/ntp/lib/isc/include/isc/ |
H A D | hmacmd5.h | 52 unsigned int len); 59 unsigned int len); 68 isc_hmacmd5_verify2(isc_hmacmd5_t *ctx, unsigned char *digest, size_t len);
|
/freebsd-11.0-release/contrib/ntp/lib/isc/unix/ |
H A D | os.c | 67 size_t len; local 69 len = sizeof(ncpu); 70 result = sysctlbyname("hw.ncpu", &ncpu, &len , 0, 0);
|
/freebsd-11.0-release/contrib/ncurses/form/ |
H A D | fty_ipv4.c | 54 int num = 0, len; local 59 num = sscanf(bp, "%u.%u.%u.%u%n", &d1, &d2, &d3, &d4, &len); 62 bp += len; /* Make bp point to what sscanf() left */
|
/freebsd-11.0-release/contrib/file/src/ |
H A D | strcasestr.c | 70 size_t len; local 74 len = strlen(find); 80 } while (_strncasecmp(s, find, len) != 0);
|
/freebsd-11.0-release/contrib/gcclibs/include/ |
H A D | md5.h | 101 extern void md5_process_block (const void *buffer, size_t len, 108 extern void md5_process_bytes (const void *buffer, size_t len, 139 extern void *md5_buffer (const char *buffer, size_t len, void *resblock);
|
/freebsd-11.0-release/contrib/gdb/gdb/ |
H A D | i386fbsd-nat.c | 96 size_t len; 100 len = sizeof (ps_strings); 101 if (sysctl (mib, 2, &ps_strings, &len, NULL, 0) == 0) 95 size_t len; local
|
/freebsd-11.0-release/contrib/binutils/include/ |
H A D | md5.h | 101 extern void md5_process_block (const void *buffer, size_t len, 108 extern void md5_process_bytes (const void *buffer, size_t len, 139 extern void *md5_buffer (const char *buffer, size_t len, void *resblock);
|
/freebsd-11.0-release/contrib/apr/network_io/unix/ |
H A D | inet_ntop.c | 150 struct { int base, len; } best = {-1, 0}, cur = {-1, 0}; member in struct:__anon114 174 cur.len = 1; 177 cur.len++; 181 if (best.base == -1 || cur.len > best.len) { 192 if (best.base == -1 || cur.len > best.len) { 196 if (best.base != -1 && best.len < 2) { 208 i += best.len; 217 (best.len [all...] |
/freebsd-11.0-release/contrib/binutils/libiberty/ |
H A D | objalloc.c | 115 _objalloc_alloc (struct objalloc *o, unsigned long len) argument 119 if (len == 0) 120 len = 1; 122 len = (len + OBJALLOC_ALIGN - 1) &~ (OBJALLOC_ALIGN - 1); 124 if (len <= o->current_space) 126 o->current_ptr += len; 127 o->current_space -= len; 128 return (PTR) (o->current_ptr - len); 131 if (len > [all...] |