/macosx-10.10.1/OpenSSL098-52/src/ssl/ |
H A D | ssl_ciph.c | 756 int j, multi, found, rule, retval, ok, buflen; local 791 buflen = 0; 802 buflen++; 805 if (buflen == 0) 836 * with the strncmp, because the "buflen" limitation 838 * "ADH-MY-CIPHER" look like a match for buflen=3. 850 if (!strncmp(buf, ca_list[j]->name, buflen) && 851 (ca_list[j]->name[buflen] == '\0')) 893 if ((buflen == 8) &&
|
/macosx-10.10.1/xnu-2782.1.97/bsd/vfs/ |
H A D | vfs_utfconv.c | 255 * ENAMETOOLONG: Name didn't fit; only buflen bytes were encoded 261 size_t * utf8len, size_t buflen, u_int16_t altslash, int flags) 277 bufend = bufstart + buflen; 412 size_t *ucslen, size_t buflen, u_int16_t altslash, int flags) 431 bufend = (u_int16_t *)((u_int8_t *)ucsp + buflen); 712 * and produces normalized UTF-8 output into a buffer of buflen bytes 733 size_t *outlen, size_t buflen, int flags) 755 outbufend = outbufstart + buflen; 815 &uft8_bytes, buflen, 0, UTF_NO_NULL_TERM); 260 utf8_encodestr(const u_int16_t * ucsp, size_t ucslen, u_int8_t * utf8p, size_t * utf8len, size_t buflen, u_int16_t altslash, int flags) argument 411 utf8_decodestr(const u_int8_t* utf8p, size_t utf8len, u_int16_t* ucsp, size_t *ucslen, size_t buflen, u_int16_t altslash, int flags) argument 732 utf8_normalizestr(const u_int8_t* instr, size_t inlen, u_int8_t* outstr, size_t *outlen, size_t buflen, int flags) argument
|
/macosx-10.10.1/Libc-1044.1.2/gen/FreeBSD/ |
H A D | wordexp.c | 261 int buflen; local 275 buflen = (sizeof(cmd) - 1) + strlen(words) + 1; 276 if ((buf = malloc(buflen)) == NULL) {
|
/macosx-10.10.1/bind9-45.101/bind9/lib/tests/ |
H A D | t_api.c | 98 t_getdate(char *buf, size_t buflen); 572 t_getdate(char *buf, size_t buflen) { argument 579 n = strftime(buf, buflen - 1, "%A %d %B %H:%M:%S %Y\n", p);
|
/macosx-10.10.1/OpenLDAP-499.27/OpenLDAP/libraries/liblutil/ |
H A D | utils.c | 913 size_t buflen, 927 len = snprintf( ptr, buflen, "%lu%c", v[ i ], time_unit[ i ] ); 928 if ( len < 0 || (unsigned)len >= buflen ) { 931 buflen -= len; 911 lutil_unparse_time( char *buf, size_t buflen, unsigned long t ) argument
|
/macosx-10.10.1/bind9-45.101/bind9/unit/atf-src/atf-c/detail/ |
H A D | fs.c | 91 invalid_umask_format(const atf_error_t err, char *buf, size_t buflen) argument 98 snprintf(buf, buflen, "Could not create the temporary %s %s because " 137 unknown_type_format(const atf_error_t err, char *buf, size_t buflen) argument 144 snprintf(buf, buflen, "Unknown file type %d of %s", data->m_type,
|
/macosx-10.10.1/curl-83.1.2/curl/lib/ |
H A D | easy.c | 1129 CURLcode curl_easy_recv(CURL *curl, void *buffer, size_t buflen, size_t *n) argument 1142 ret = Curl_read(c, sfd, buffer, buflen, &n1); 1156 CURLcode curl_easy_send(CURL *curl, const void *buffer, size_t buflen, argument 1170 ret = Curl_write(c, sfd, buffer, buflen, &n1);
|
/macosx-10.10.1/cxxfilt-11/cxxfilt/binutils/ |
H A D | windres.c | 689 static int buflen = 0; 694 if ((buflen < slen * 2 + 2) || !buf) 696 buflen = slen * 2 + 2; 699 buf = (char *) xmalloc (buflen); 684 static int buflen = 0; local
|
/macosx-10.10.1/mDNSResponder-561.1.1/mDNSShared/ |
H A D | dnssd_ipc.h | 206 int get_string(const char **ptr, const char *const end, char *buffer, int buflen);
|
H A D | DebugServices.c | 1172 DEBUG_EXPORT size_t DebugSNPrintF(char *sbuffer, size_t buflen, const char *fmt, ...) argument 1178 length = DebugSNPrintFVAList(sbuffer, buflen, fmt, ptr); 1188 DEBUG_EXPORT size_t DebugSNPrintFVAList(char *sbuffer, size_t buflen, const char *fmt, va_list arg) argument 1206 if (buflen == 0) return(0); 1207 buflen--; // Pre-reserve one space in the buffer for the terminating nul 1208 if (buflen == 0) goto exit; 1215 if (++nwritten >= buflen) goto exit; 1582 if (++nwritten >= buflen) goto exit; 1589 if (++nwritten >= buflen) goto exit; 1592 if (i > buflen [all...] |
/macosx-10.10.1/OpenSSL098-52/src/engines/ |
H A D | e_capi.c | 1131 DWORD err, idx, flags, buflen = 0, clen; local 1140 if (!CryptGetProvParam(hprov, PP_ENUMCONTAINERS, NULL, &buflen, CRYPT_FIRST)) 1147 CAPI_trace(ctx, "Got max container len %d\n", buflen); 1148 if (buflen == 0) 1149 buflen = 1024; 1150 cname = OPENSSL_malloc(buflen); 1159 clen = buflen; 1176 if (!cname[0] && (clen == buflen))
|
/macosx-10.10.1/smb-759.0/lib/smb/ |
H A D | smbio.c | 181 ssize_t smbio_read(void *smbctx, int fid, uint8_t *buf, size_t buflen) argument 186 (uint32_t)buflen, (char *)buf);
|
/macosx-10.10.1/vim-55/src/proto/ |
H A D | charset.pro | 6 char_u *str_foldcase __ARGS((char_u *str, int orglen, char_u *buf, int buflen));
|
H A D | ex_cmds.pro | 12 void append_redir __ARGS((char_u *buf, int buflen, char_u *opt, char_u *fname));
|
/macosx-10.10.1/configd-699.1.5/SystemConfiguration.fproj/ |
H A D | BridgeConfiguration.c | 81 size_t buflen; local 90 buflen = sizeof(struct ifbifconf) + len; 91 buf = malloc(buflen); 93 bzero(buf, buflen); 110 buflen = sizeof(struct ifbifconf) + len; 111 buf = reallocf(buf, buflen);
|
/macosx-10.10.1/dtrace-147/disassembler/ |
H A D | dis_tables.c | 3440 * Print a numeric immediate into end of buf, maximum length buflen. 3458 size_t buflen, int disp, int try_neg) 3469 dis->d86_sprintf_func(buf + curlen, buflen - curlen, 3474 dis->d86_sprintf_func(buf + curlen, buflen - curlen, 3477 dis->d86_sprintf_func(buf + curlen, buflen - curlen, 3500 size_t buflen) 3513 dis->d86_sprintf_func(buf, buflen, "%-6s ", dis->d86_mnem); 3525 (void) strlcat(buf, ",", buflen); 3527 (void) strlcat(buf, op->d86_prefix, buflen); 3559 (void) strlcat(buf, op->d86_opnd, buflen); 3457 print_imm(dis86_t *dis, uint64_t usv, uint64_t mask, char *buf, size_t buflen, int disp, int try_neg) argument 3499 dtrace_disx86_str(dis86_t *dis, uint_t mode, uint64_t pc, char *buf, size_t buflen) argument [all...] |
/macosx-10.10.1/libresolv-57/ |
H A D | res_query.c | 156 size_t buflen; local 172 buflen = context->ansmaxlen - context->anslen; 173 if (buflen < NS_HFIXEDSZ) 184 n = dn_comp((char *)fullname, cp, buflen, dnlist, &dnlist[1]); 195 if (buflen < n + rdlen + 10) 204 buflen -= n;
|
/macosx-10.10.1/postfix-255/postfix/src/util/ |
H A D | events.c | 324 #define EVENT_BUFFER_READ(event_count, event_buf, buflen, delay) do { \ 335 (buflen), (tsp)); \ 405 #define EVENT_BUFFER_READ(event_count, event_buf, buflen, delay) do { \ 408 dvpoll.dp_nfds = (buflen); \ 485 #define EVENT_BUFFER_READ(event_count, event_buf, buflen, delay) do { \ 486 (event_count) = epoll_wait(event_epollfd, (event_buf), (buflen), \
|
/macosx-10.10.1/xnu-2782.1.97/bsd/dev/i386/ |
H A D | dis_tables.c | 3458 * Print a numeric immediate into end of buf, maximum length buflen. 3476 size_t buflen, int disp, int try_neg) 3487 dis->d86_sprintf_func(buf + curlen, buflen - curlen, 3492 dis->d86_sprintf_func(buf + curlen, buflen - curlen, 3495 dis->d86_sprintf_func(buf + curlen, buflen - curlen, 3518 size_t buflen) 3531 dis->d86_sprintf_func(buf, buflen, "%-6s ", dis->d86_mnem); 3543 (void) strlcat(buf, ",", buflen); 3545 (void) strlcat(buf, op->d86_prefix, buflen); 3577 (void) strlcat(buf, op->d86_opnd, buflen); [all...] |
/macosx-10.10.1/passwordserver_sasl-193/cyrus_sasl/plugins/ |
H A D | ntlm.c | 354 unsigned *buflen __attribute__((unused)), 370 char **buf, unsigned *buflen, int *result) 372 if (_plug_buf_alloc(utils, buf, buflen, 2 * passwd->len) != SASL_OK) { 390 char **buf, unsigned *buflen, int *result) 392 memset(P16(P21, passwd, utils, buf, buflen, result) + 16, 0, 5); 409 char **buf, unsigned *buflen, int *result) 418 if (_plug_buf_alloc(utils, buf, buflen, 2 * len + 1) != SASL_OK) { 424 P16_nt(hash, passwd, utils, buf, buflen, result); 1310 char **buf, unsigned *buflen, 1324 if (_plug_buf_alloc(utils, buf, buflen, *outle 368 P16_nt(unsigned char *P16, sasl_secret_t *passwd, const sasl_utils_t *utils, char **buf, unsigned *buflen, int *result) argument 384 P21(unsigned char *P21, sasl_secret_t *passwd, unsigned char * (*P16)(unsigned char *, sasl_secret_t *, const sasl_utils_t *, char **, unsigned *, int *), const sasl_utils_t *utils, char **buf, unsigned *buflen, int *result) argument 404 V2(unsigned char *V2, sasl_secret_t *passwd, const char *authid, const char *target, const unsigned char *challenge, const unsigned char *blob, unsigned bloblen, const sasl_utils_t *utils, char **buf, unsigned *buflen, int *result) argument 1309 create_challenge(const sasl_utils_t *utils, char **buf, unsigned *buflen, const char *target, uint32 flags, const u_char *nonce, unsigned *outlen) argument 1775 create_request(const sasl_utils_t *utils, char **buf, unsigned *buflen, const char *domain, const char *wkstn, unsigned *outlen) argument 1818 create_response(const sasl_utils_t *utils, char **buf, unsigned *buflen, const u_char *lm_resp, const u_char *nt_resp, const char *domain, const char *user, const char *wkstn, const u_char *key, uint32 flags, unsigned *outlen) argument [all...] |
/macosx-10.10.1/xnu-2782.1.97/bsd/kern/ |
H A D | kern_sysctl.c | 677 int buflen; member in struct:sysdoproc_args 695 if (args->buflen >= args->sizeof_kproc) { 714 args->buflen -= args->sizeof_kproc; 731 int buflen = where != USER_ADDR_NULL ? req->oldlen : 0; variable 791 args.buflen = buflen; 1261 int buflen = where != USER_ADDR_NULL ? *sizep : 0; local 1281 buflen -= sizeof(int); /* reserve first word to return argc */ 1283 /* we only care about buflen when where (oldp from sysctl) is not NULL. */ 1287 if (where != USER_ADDR_NULL && (buflen < [all...] |
/macosx-10.10.1/OpenLDAP-499.27/OpenLDAP/servers/slapd/back-meta/ |
H A D | config.c | 128 ber_len_t buflen, 138 snprintf( buf, buflen, 147 snprintf( buf, buflen, 155 snprintf( buf, buflen, "missing pattern" ); 162 snprintf( buf, buflen, "too many args" ); 192 snprintf( buf, buflen, "unknown style in \"dn.<style>\"" ); 198 snprintf( buf, buflen, "missing colon after \"dn.<style>\"" ); 213 snprintf( buf, buflen, "DN=\"%s\" is invalid", pattern ); 218 snprintf( buf, buflen, 123 meta_subtree_config( metatarget_t *mt, int argc, char **argv, char *buf, ber_len_t buflen, char *log_prefix ) argument
|
/macosx-10.10.1/BerkeleyDB-21/db/build_vxworks/db_load/ |
H A D | db_load.c | 780 size_t buflen, linelen, start; local 793 buflen = 4096; 796 if ((buf = malloc(buflen)) == NULL) 825 if (linelen + start == buflen) { 827 realloc(G(hdrbuf), buflen *= 2);
|
/macosx-10.10.1/BerkeleyDB-21/db/db_load/ |
H A D | db_load.c | 765 size_t buflen, linelen, start; local 778 buflen = 4096; 781 if ((buf = malloc(buflen)) == NULL) 810 if (linelen + start == buflen) { 812 realloc(G(hdrbuf), buflen *= 2);
|
/macosx-10.10.1/curl-83.1.2/curl/packages/OS400/ |
H A D | os400sys.c | 1404 Curl_os400_sendto(int sd, char * buffer, int buflen, int flags, argument 1416 return sendto(sd, buffer, buflen, flags, (struct sockaddr *) &laddr, i); 1421 Curl_os400_recvfrom(int sd, char * buffer, int buflen, int flags, argument 1433 return recvfrom(sd, buffer, buflen, flags, fromaddr, addrlen); 1437 rcvlen = recvfrom(sd, buffer, buflen, flags,
|