/freebsd-11.0-release/crypto/heimdal/lib/gssapi/krb5/ |
H A D | cfx.c | 71 /* Header is concatenated with data before encryption */ 93 /* Checksum is concatenated with data */ 154 /* Checksum is concatenated with data */ 166 rrc_rotate(void *data, size_t len, uint16_t rrc, krb5_boolean unrotate) argument 190 memcpy(tmp, data, rrc); 191 memmove(data, (u_char *)data + rrc, left); 192 memcpy((u_char *)data + left, tmp, rrc); 194 memcpy(tmp, (u_char *)data + left, rrc); 195 memmove((u_char *)data 1382 krb5_data data; local [all...] |
/freebsd-11.0-release/contrib/apr-util/dbd/ |
H A D | apr_dbd_sqlite2.c | 56 char **data; member in struct:apr_dbd_row_t 73 static apr_status_t free_table(void *data) argument 75 sqlite_free_table(data); 179 row->data = res->res + res->sz + (res->sz * row->n); 190 return row->data[n]; 194 apr_dbd_type_e type, void *data) 200 if (row->data[n] == NULL) { 206 *(char*)data = atoi(row->data[n]); 209 *(unsigned char*)data 193 dbd_sqlite_datum_get(const apr_dbd_row_t *row, int n, apr_dbd_type_e type, void *data) argument 308 free_mem(void *data) argument 449 error_free(void *data) argument [all...] |
/freebsd-11.0-release/sys/fs/fuse/ |
H A D | fuse_ipc.c | 88 static struct fuse_ticket *fticket_alloc(struct fuse_data *data); 208 struct fuse_data *data = arg; local 210 debug_printf("ftick=%p data=%p\n", ftick, data); 215 ftick->tk_data = data; 221 ftick->tk_unique = atomic_fetchadd_long(&data->ticketer, 1); 223 ftick->tk_unique = atomic_fetchadd_long(&data->ticketer, 1); 276 fticket_alloc(struct fuse_data *data) argument 278 return uma_zalloc_arg(ticket_zone, data, M_WAITOK); 317 struct fuse_data *data; local 414 struct fuse_data *data; local 434 fdata_trydestroy(struct fuse_data *data) argument 456 fdata_set_dead(struct fuse_data *data) argument 475 fuse_ticket_fetch(struct fuse_data *data) argument 778 struct fuse_data *data = fuse_get_mpdata(mp); local [all...] |
/freebsd-11.0-release/sys/dev/ep/ |
H A D | if_ep_isa.c | 110 * We get eeprom data from the id_port given an offset into the eeprom. 113 * the eeprom data. We then read the port 16 times and with every read; the 116 * compares the data on the bus; if there is a difference then that card goes 117 * into ID_WAIT state again). In the meantime; one bit of data is returned in 119 * read 16 times getting one bit of data with each read. 126 uint16_t data = 0; local 132 data = (data << 1) | (inw(id_port) & 1); 134 return (data); 167 uint16_t data; local [all...] |
/freebsd-11.0-release/sys/amd64/pci/ |
H A D | pci_cfgreg.c | 56 unsigned reg, int data, unsigned bytes); 58 static void pcireg_cfgwrite(int bus, int slot, int func, int reg, int data, int bytes); 162 pci_cfgregwrite(int bus, int slot, int func, int reg, u_int32_t data, int bytes) argument 168 pciereg_cfgwrite(bus, slot, func, reg, data, bytes); 170 pcireg_cfgwrite(bus, slot, func, reg, data, bytes); 177 /* enable configuration space accesses and return data port address */ 207 int data = -1; local 215 data = inb(port); 218 data = inw(port); 221 data 231 pcireg_cfgwrite(int bus, int slot, int func, int reg, int data, int bytes) argument 317 int data = -1; local 344 pciereg_cfgwrite(int bus, unsigned slot, unsigned func, unsigned reg, int data, unsigned bytes) argument [all...] |
/freebsd-11.0-release/sys/geom/journal/ |
H A D | g_journal.h | 99 * We keep pointers to journaled data in bio structure and because we 100 * need to store two off_t values (offset in data provider and offset in 297 journal_metadata_encode(struct g_journal_metadata *md, u_char *data) argument 301 bcopy(md->md_magic, data, 16); 302 le32enc(data + 16, md->md_version); 303 le32enc(data + 20, md->md_id); 304 *(data + 24) = md->md_type; 305 le64enc(data + 25, md->md_jstart); 306 le64enc(data + 33, md->md_jend); 307 le64enc(data 318 journal_metadata_decode_v0(const u_char *data, struct g_journal_metadata *md) argument 339 journal_metadata_decode(const u_char *data, struct g_journal_metadata *md) argument [all...] |
/freebsd-11.0-release/crypto/openssl/crypto/bio/ |
H A D | bss_acpt.c | 99 static int acpt_free(BIO *data); 101 static void acpt_close_socket(BIO *data); 184 BIO_ACCEPT *data; local 188 data = (BIO_ACCEPT *)a->ptr; 192 BIO_ACCEPT_free(data); 304 BIO_ACCEPT *data; local 307 data = (BIO_ACCEPT *)b->ptr; 310 ret = acpt_state(b, data); 323 BIO_ACCEPT *data; local 326 data 343 BIO_ACCEPT *data; local [all...] |
/freebsd-11.0-release/tools/KSE/rr/ |
H A D | rr.c | 79 static void init_uts(struct uts_data *data, struct uts_runq *q); 80 static void start_uts(struct uts_data *data, int newgrp); 89 static void thread_start(struct uts_data *data, const void *func, int arg); 125 enter_uts(struct uts_data *data) argument 130 td = data->mb.km_curthread; 131 data->mb.km_curthread = NULL; 133 thread_to_uts(td, &data->mb); 140 init_uts(struct uts_data *data, struct uts_runq *q) argument 175 bzero(&data->mb, sizeof(struct kse_mailbox)); 176 data 188 start_uts(struct uts_data *data, int newgrp) argument 329 struct uts_data *data; local 393 thread_start(struct uts_data *data, const void *func, int arg) argument [all...] |
/freebsd-11.0-release/crypto/heimdal/lib/hx509/ |
H A D | ks_p12.c | 71 const void *data, size_t length, 83 ret = decode_PKCS8PrivateKeyInfo(data, length, &ki, NULL); 100 const void *data, size_t length, 109 ret = decode_PKCS8EncryptedPrivateKeyInfo(data, length, &pk, NULL); 122 ret = keyBag_parser(context, c, content.data, content.length, attrs); 130 const void *data, size_t length, 138 ret = decode_PKCS12_CertBag(data, length, &cb, NULL); 147 ret = decode_PKCS12_OctetString(cb.certValue.data, 155 ret = hx509_cert_init_data(context, os.data, os.length, &cert); 206 sc.val[i].bagValue.data, 69 keyBag_parser(hx509_context context, struct hx509_collector *c, const void *data, size_t length, const PKCS12_Attributes *attrs) argument 98 ShroudedKeyBag_parser(hx509_context context, struct hx509_collector *c, const void *data, size_t length, const PKCS12_Attributes *attrs) argument 128 certBag_parser(hx509_context context, struct hx509_collector *c, const void *data, size_t length, const PKCS12_Attributes *attrs) argument 215 safeContent_parser(hx509_context context, struct hx509_collector *c, const void *data, size_t length, const PKCS12_Attributes *attrs) argument 232 encryptedData_parser(hx509_context context, struct hx509_collector *c, const void *data, size_t length, const PKCS12_Attributes *attrs) argument 260 envelopedData_parser(hx509_context context, struct hx509_collector *c, const void *data, size_t length, const PKCS12_Attributes *attrs) argument 308 parse_pkcs12_type(hx509_context context, struct hx509_collector *c, const heim_oid *oid, const void *data, size_t length, const PKCS12_Attributes *attrs) argument 322 p12_init(hx509_context context, hx509_certs certs, void **data, int flags, const char *residue, hx509_lock lock) argument 448 addBag(hx509_context context, PKCS12_AuthenticatedSafe *as, const heim_oid *oid, void *data, size_t length) argument 564 p12_store(hx509_context context, hx509_certs certs, void *data, int flags, hx509_lock lock) argument 643 p12_free(hx509_certs certs, void *data) argument 653 p12_add(hx509_context context, hx509_certs certs, void *data, hx509_cert c) argument 660 p12_iter_start(hx509_context context, hx509_certs certs, void *data, void **cursor) argument 670 p12_iter(hx509_context context, hx509_certs certs, void *data, void *cursor, hx509_cert *cert) argument 681 p12_iter_end(hx509_context context, hx509_certs certs, void *data, void *cursor) argument [all...] |
H A D | ks_mem.c | 53 hx509_certs certs, void **data, int flags, 67 *data = mem; 72 mem_free(hx509_certs certs, void *data) argument 74 struct mem_data *mem = data; 90 mem_add(hx509_context context, hx509_certs certs, void *data, hx509_cert c) argument 92 struct mem_data *mem = data; 110 void *data, 127 void *data, 132 struct mem_data *mem = data; 147 void *data, 52 mem_init(hx509_context context, hx509_certs certs, void **data, int flags, const char *residue, hx509_lock lock) argument 108 mem_iter_start(hx509_context context, hx509_certs certs, void *data, void **cursor) argument 125 mem_iter(hx509_context contexst, hx509_certs certs, void *data, void *cursor, hx509_cert *cert) argument 145 mem_iter_end(hx509_context context, hx509_certs certs, void *data, void *cursor) argument 155 mem_getkeys(hx509_context context, hx509_certs certs, void *data, hx509_private_key **keys) argument 180 mem_addkey(hx509_context context, hx509_certs certs, void *data, hx509_private_key key) argument [all...] |
/freebsd-11.0-release/crypto/heimdal/lib/krb5/ |
H A D | crypto-des3.c | 44 DES_cblock *k = key->keyvalue.data; 90 const void *data, 95 return _krb5_des_checksum(context, EVP_md5(), key, data, len, C); 101 const void *data, 106 return _krb5_des_verify(context, EVP_md5(), key, data, len, C); 197 const void *data, 200 unsigned char *x = key->keyvalue.data; 201 const u_char *q = data; 205 memset(key->keyvalue.data, 0, key->keyvalue.length); 220 k = key->keyvalue.data; 88 RSA_MD5_DES3_checksum(krb5_context context, struct _krb5_key_data *key, const void *data, size_t len, unsigned usage, Checksum *C) argument 99 RSA_MD5_DES3_verify(krb5_context context, struct _krb5_key_data *key, const void *data, size_t len, unsigned usage, Checksum *C) argument 195 _krb5_DES3_random_to_key(krb5_context context, krb5_keyblock *key, const void *data, size_t size) argument [all...] |
/freebsd-11.0-release/contrib/subversion/subversion/libsvn_fs_x/ |
H A D | id.c | 82 const char *data) 84 part->number = svn__base36toui64(&data, data); 85 switch (data[0]) 88 case '-': part->change_set = -svn__base36toui64(&data, data + 1); 92 case '+': part->change_set = svn__base36toui64(&data, data + 1); 142 const char *data) 144 if (!part_parse(part, data)) 80 part_parse(svn_fs_x__id_t *part, const char *data) argument 139 svn_fs_x__id_parse(svn_fs_x__id_t *part, const char *data) argument [all...] |
/freebsd-11.0-release/contrib/serf/buckets/ |
H A D | socket_buckets.c | 83 socket_context_t *ctx = bucket->data; 91 const char **data, apr_size_t *len) 93 socket_context_t *ctx = bucket->data; 95 return serf_databuf_read(&ctx->databuf, requested, data, len); 100 const char **data, apr_size_t *len) 102 socket_context_t *ctx = bucket->data; 104 return serf_databuf_readline(&ctx->databuf, acceptable, found, data, len); 108 const char **data, 111 socket_context_t *ctx = bucket->data; 113 return serf_databuf_peek(&ctx->databuf, data, le 89 serf_socket_read(serf_bucket_t *bucket, apr_size_t requested, const char **data, apr_size_t *len) argument 98 serf_socket_readline(serf_bucket_t *bucket, int acceptable, int *found, const char **data, apr_size_t *len) argument 107 serf_socket_peek(serf_bucket_t *bucket, const char **data, apr_size_t *len) argument [all...] |
/freebsd-11.0-release/crypto/openssl/crypto/x509v3/ |
H A D | pcy_node.c | 69 return OBJ_cmp((*a)->data->valid_policy, (*b)->data->valid_policy); 85 l.data = &n; 104 if (!OBJ_cmp(node->data->valid_policy, id)) 112 const X509_POLICY_DATA *data, 120 node->data = data; 124 if (OBJ_obj2nid(data->valid_policy) == NID_any_policy) { 144 if (!sk_X509_POLICY_DATA_push(tree->extra_data, data)) 174 const X509_POLICY_DATA *x = node->data; 111 level_add_node(X509_POLICY_LEVEL *level, const X509_POLICY_DATA *data, X509_POLICY_NODE *parent, X509_POLICY_TREE *tree) argument [all...] |
/freebsd-11.0-release/sys/dev/drm2/ |
H A D | drm_buffer.c | 29 * Multipart buffer for coping data which is larger than the page size. 67 (*buf)->data[idx] = 72 if ((*buf)->data[idx] == NULL) { 86 if ((*buf)->data[idx]) 87 free((*buf)->data[idx], DRM_MEM_DRIVER); 90 free((*buf)->data[idx], DRM_MEM_DRIVER); 98 * Copy the user data to the begin of the buffer and reset the processing 101 * user_data: A pointer the data that is copied to the buffer. 119 if (DRM_COPY_FROM_USER(buf->data[idx], 122 DRM_ERROR("Failed to copy user data ( [all...] |
/freebsd-11.0-release/contrib/wpa/src/wps/ |
H A D | wps_upnp_ssdp.c | 367 * small changes in data content; and they are sent (UDP) to a specific 502 * @data: NULL terminated M-SEARCH message 520 struct sockaddr_in *client, const char *data) 523 const char *start = data; 535 data += line_length(data); 538 for (; *data != '\0'; data += line_length(data)) { 539 if (token_eq(data, "hos 519 ssdp_parse_msearch(struct upnp_wps_device_sm *sm, struct sockaddr_in *client, const char *data) argument [all...] |
/freebsd-11.0-release/sys/dev/ath/ath_hal/ar9002/ |
H A D | ar9280.c | 253 ar9280GetMinPower(struct ath_hal *ah, EXPN_DATA_PER_CHANNEL_5112 *data) 259 minGain = data->pDataPerXPD[0].xpd_gain; 261 if (data->pDataPerXPD[i].xpd_gain < minGain) { 263 minGain = data->pDataPerXPD[i].xpd_gain; 266 minPwr = data->pDataPerXPD[minIndex].pwr_t4[0]; 267 minPcdac = data->pDataPerXPD[minIndex].pcdac[0]; 269 if (data->pDataPerXPD[minIndex].pwr_t4[i] < minPwr) { 270 minPwr = data->pDataPerXPD[minIndex].pwr_t4[i]; 271 minPcdac = data->pDataPerXPD[minIndex].pcdac[i]; 288 EXPN_DATA_PER_CHANNEL_5112 *data [all...] |
H A D | ar9287.c | 195 ar9287GetMinPower(struct ath_hal *ah, EXPN_DATA_PER_CHANNEL_5112 *data) 201 minGain = data->pDataPerXPD[0].xpd_gain; 203 if (data->pDataPerXPD[i].xpd_gain < minGain) { 205 minGain = data->pDataPerXPD[i].xpd_gain; 208 minPwr = data->pDataPerXPD[minIndex].pwr_t4[0]; 209 minPcdac = data->pDataPerXPD[minIndex].pcdac[0]; 211 if (data->pDataPerXPD[minIndex].pwr_t4[i] < minPwr) { 212 minPwr = data->pDataPerXPD[minIndex].pwr_t4[i]; 213 minPcdac = data->pDataPerXPD[minIndex].pcdac[i]; 230 EXPN_DATA_PER_CHANNEL_5112 *data [all...] |
/freebsd-11.0-release/crypto/heimdal/appl/kf/ |
H A D | kfd.c | 132 krb5_data data; local 179 data.data = "old clnt"; /* XXX old clients only had room for 182 data.length = strlen(data.data) + 1; 183 krb5_write_message(context, &sock, &data); 197 krb5_data_zero (&data); 199 if(((char*)remotename.data)[remotename.length-1] != '\0') 201 if(((char*)tk_file.data)[tk_fil [all...] |
/freebsd-11.0-release/contrib/wpa/src/eap_peer/ |
H A D | eap_mschapv2.c | 36 /* followed by data */ 106 struct eap_mschapv2_data *data; local 107 data = os_zalloc(sizeof(*data)); 108 if (data == NULL) 112 data->peer_challenge = os_malloc(MSCHAPV2_CHAL_LEN); 113 if (data->peer_challenge == NULL) { 114 eap_mschapv2_deinit(sm, data); 117 os_memcpy(data->peer_challenge, sm->peer_challenge, 122 data 139 struct eap_mschapv2_data *data = priv; local 147 eap_mschapv2_challenge_reply( struct eap_sm *sm, struct eap_mschapv2_data *data, u8 id, u8 mschapv2_id, const u8 *auth_challenge) argument 239 eap_mschapv2_challenge( struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) argument 297 eap_mschapv2_password_changed(struct eap_sm *sm, struct eap_mschapv2_data *data) argument 344 eap_mschapv2_success(struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) argument 400 eap_mschapv2_failure_txt(struct eap_sm *sm, struct eap_mschapv2_data *data, char *txt) argument 510 eap_mschapv2_change_password( struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, u8 id) argument 651 eap_mschapv2_failure(struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) argument 754 eap_mschapv2_copy_challenge(struct eap_mschapv2_data *data, const struct wpabuf *reqData) argument 779 struct eap_mschapv2_data *data = priv; local 839 struct eap_mschapv2_data *data = priv; local 846 struct eap_mschapv2_data *data = priv; local [all...] |
/freebsd-11.0-release/lib/libc/db/recno/ |
H A D | rec_close.c | 111 DBT data, key; local 142 key.data = &trec; 150 status = (dbp->seq)(dbp, &key, &data, R_FIRST); 152 if (_write(t->bt_rfd, data.data, data.size) != 153 (ssize_t)data.size) 155 status = (dbp->seq)(dbp, &key, &data, R_NEXT); 161 status = (dbp->seq)(dbp, &key, &data, R_FIRST); 163 iov[0].iov_base = data [all...] |
/freebsd-11.0-release/contrib/llvm/lib/DebugInfo/DWARF/ |
H A D | DWARFDebugLoc.cpp | 38 void DWARFDebugLoc::parse(DataExtractor data, unsigned AddressSize) { argument 40 while (data.isValidOffset(Offset+AddressSize-1)) { 50 E.Begin = data.getUnsigned(&Offset, AddressSize); 56 E.End = data.getUnsigned(&Offset, AddressSize); 66 unsigned Bytes = data.getU16(&Offset); 68 StringRef str = data.getData().substr(Offset, Bytes); 74 if (data.isValidOffset(Offset)) 78 void DWARFDebugLocDWO::parse(DataExtractor data) { argument 80 while (data.isValidOffset(Offset)) { 86 data [all...] |
/freebsd-11.0-release/contrib/wpa/src/drivers/ |
H A D | driver_privsep.c | 44 const void *data, size_t data_len, 52 io[1].iov_base = (u8 *) data; 57 msg.msg_iovlen = data ? 2 : 1; 227 struct privsep_cmd_authenticate *data; local 237 buflen = sizeof(*data) + params->ie_len + params->sae_data_len; 238 data = os_zalloc(buflen); 239 if (data == NULL) 242 data->freq = params->freq; 243 os_memcpy(data->bssid, params->bssid, ETH_ALEN); 244 os_memcpy(data 43 wpa_priv_cmd(struct wpa_driver_privsep_data *drv, int cmd, const void *data, size_t data_len, void *reply, size_t *reply_len) argument 277 struct privsep_cmd_associate *data; local 364 union wpa_event_data data; local 392 union wpa_event_data data; local 422 union wpa_event_data data; local 442 union wpa_event_data data; local 456 union wpa_event_data data; local 469 union wpa_event_data data; local 483 union wpa_event_data data; local [all...] |
/freebsd-11.0-release/sbin/pfctl/ |
H A D | pfctl_qstats.c | 59 union class_stats data; member in struct:queue_stats 178 pq.buf = &qstats.data; 179 pq.nbytes = sizeof(qstats.data); 186 memcpy(&node->qstats.data, &qstats.data, 187 sizeof(qstats.data)); 195 memset(&qstats.data, 0, sizeof(qstats.data)); 198 memcpy(&node->qstats.data, &qstats.data, [all...] |
/freebsd-11.0-release/crypto/heimdal/appl/telnet/libtelnet/ |
H A D | auth.c | 366 auth_send(unsigned char *data, int cnt) argument 381 printd(data, cnt); printf("\r\n"); 385 * Save the data, if it is new, so that we can continue looking 388 if (data < _auth_send_data || 389 data > _auth_send_data + sizeof(_auth_send_data)) { 393 memmove(_auth_send_data, data, auth_send_cnt); 399 auth_send_data = data; 461 auth_is(unsigned char *data, int cnt) argument 468 if (data[0] == AUTHTYPE_NULL) { 473 if ((ap = findauthenticator(data[ 482 auth_reply(unsigned char *data, int cnt) argument 498 auth_name(unsigned char *data, int cnt) argument 596 auth_printsub(unsigned char *data, size_t cnt, unsigned char *buf, size_t buflen) argument 608 auth_gen_printsub(unsigned char *data, size_t cnt, unsigned char *buf, size_t buflen) argument [all...] |