/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/rsa/ |
H A D | rsa_pmeth.c | 93 unsigned char *tbuf; member in struct:__anon648 107 rctx->tbuf = NULL; 139 if (ctx->tbuf) 141 ctx->tbuf = OPENSSL_malloc(EVP_PKEY_size(pk->pkey)); 142 if (!ctx->tbuf) 154 if (rctx->tbuf) 155 OPENSSL_free(rctx->tbuf); 242 memcpy(rctx->tbuf, tbs, tbslen); 243 rctx->tbuf[tbslen] = 245 ret = RSA_private_encrypt(tbslen + 1, rctx->tbuf, [all...] |
/netbsd-6-1-5-RELEASE/external/gpl3/gcc/dist/libcpp/ |
H A D | charset.c | 773 struct _cpp_strbuf tbuf; local 792 tbuf.asize = 1; 793 tbuf.text = XNEWVEC (uchar, tbuf.asize); 794 tbuf.len = 0; 796 if (!APPLY_CONVERSION (pfile->narrow_cset_desc, sbuf, 1, &tbuf)) 801 if (tbuf.len != 1) 808 c = tbuf.text[0]; 809 free(tbuf.text); 1086 struct _cpp_strbuf *tbuf, struc 1084 convert_ucn(cpp_reader *pfile, const uchar *from, const uchar *limit, struct _cpp_strbuf *tbuf, struct cset_converter cvt) argument 1117 emit_numeric_escape(cpp_reader *pfile, cppchar_t n, struct _cpp_strbuf *tbuf, struct cset_converter cvt) argument 1168 convert_hex(cpp_reader *pfile, const uchar *from, const uchar *limit, struct _cpp_strbuf *tbuf, struct cset_converter cvt) argument 1218 convert_oct(cpp_reader *pfile, const uchar *from, const uchar *limit, struct _cpp_strbuf *tbuf, struct cset_converter cvt) argument 1254 convert_escape(cpp_reader *pfile, const uchar *from, const uchar *limit, struct _cpp_strbuf *tbuf, struct cset_converter cvt) argument 1374 struct _cpp_strbuf tbuf; local [all...] |
/netbsd-6-1-5-RELEASE/sbin/dump/ |
H A D | itime.c | 241 char tbuf[BUFSIZ]; local 244 if ( (fgets(tbuf, sizeof (tbuf), df)) != tbuf) 247 if (makedumpdate(ddatep, tbuf) < 0) 259 makedumpdate(struct dumpdates *ddp, char *tbuf) argument 263 (void) sscanf(tbuf, DUMPINFMT, ddp->dd_name, &ddp->dd_level, un_buf);
|
/netbsd-6-1-5-RELEASE/dist/nvi/ip/ |
H A D | ip_read.c | 182 evp->e_csp = ipp->tbuf; 266 switch (*nr = read(fd, termread ? (char *)ipp->tbuf : bp, 267 termread ? sizeof(ipp->tbuf)/sizeof(CHAR_T) 279 CHAR2INT(sp, (char *)ipp->tbuf, *nr, wp, wlen); 280 MEMMOVEW(ipp->tbuf, wp, wlen); 338 MEMCPYW(ipp->tbuf, wp, wlen); 339 evp->e_str1 = ipp->tbuf; 344 MEMCPYW(ipp->tbuf, wp, wlen); 345 evp->e_str2 = ipp->tbuf;
|
/netbsd-6-1-5-RELEASE/sbin/dump_lfs/ |
H A D | lfs_inode.c | 83 char tbuf[LFS_SBPAD]; member in union:__anon5419 112 rawread(fsbtob(sblock, (off_t)sblock->lfs_sboffs[1]), u.tbuf, 113 sizeof(u.tbuf)); 116 lfs_sb_swap(u.tbuf, u.tbuf, 0); 124 memcpy(sblock, u.tbuf, sizeof(u.tbuf)); 129 memcpy(sblock, u.tbuf, sizeof(u.tbuf));
|
/netbsd-6-1-5-RELEASE/sys/compat/ibcs2/ |
H A D | ibcs2_exec_elf32.c | 82 char tbuf[sizeof(signature) - 1]; local 102 if ((error = exec_read_from(l, epp->ep_vp, s->sh_offset, tbuf, 106 if (memcmp(tbuf, signature, sizeof(signature) - 1) == 0)
|
/netbsd-6-1-5-RELEASE/sys/compat/linux/common/ |
H A D | linux_exec_elf32.c | 100 char tbuf[sizeof(signature)]; local 125 error = exec_read_from(l, epp->ep_vp, stroff + s->sh_name, tbuf, 129 if (!memcmp(tbuf, signature, sigsz)) { 130 DPRINTF(("linux_atexit_sig=%s\n", tbuf)); 164 char tbuf[sizeof(signature) - 1]; local 188 error = exec_read_from(l, epp->ep_vp, s->sh_offset, tbuf, 196 DPRINTF(("linux_gcc_sig: sig=%s\n", tbuf)); 197 if (!memcmp(tbuf, signature, sizeof(signature) - 1)) { 223 char tbuf[sizeof(signature)]; local 248 error = exec_read_from(l, epp->ep_vp, stroff + s->sh_name, tbuf, [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/ntp/dist/ntpd/ |
H A D | refclock_acts.c | 307 char tbuf[BMAX]; local 320 pp->lencode = refclock_gtraw(rbufp, tbuf, BMAX - (up->bufptr - 322 for (tptr = tbuf; *tptr != '\0'; tptr++) { 355 char tbuf[SMAX]; local 367 snprintf(tbuf, sizeof(tbuf), "acts: %04x (%d %d) %zu %s", modem, 371 printf("%s\n", tbuf); 378 strncpy(tbuf, pp->a_lastcode, SMAX); 379 strtok(tbuf, " "); 380 if (strcmp(tbuf, "N 729 char tbuf[SMAX]; local [all...] |
/netbsd-6-1-5-RELEASE/usr.bin/login/ |
H A D | login.c | 147 char tbuf[MAXPATHLEN + 2], tname[sizeof(_PATH_TTY) + 10]; local 165 tbuf[0] = '\0'; 333 if (failures && strcmp(tbuf, username)) { 335 badlogin(tbuf); 338 (void)strlcpy(tbuf, username, sizeof(tbuf)); 667 (void)snprintf(tbuf, 668 sizeof(tbuf), "%s/%s", _PATH_MAILDIR, pwd->pw_name); 669 if (stat(tbuf, &st) == 0 && st.st_size != 0) 683 tbuf[ 766 char tbuf[8192]; local 770 (void)write(fileno(stdout), tbuf, nchars); local [all...] |
H A D | login_pam.c | 111 char tbuf[MAXPATHLEN + 2], tname[sizeof(_PATH_TTY) + 10]; local 128 tbuf[0] = '\0'; 253 if (failures && strcmp(tbuf, username)) { 255 badlogin(tbuf); 632 (void)snprintf(tbuf, 633 sizeof(tbuf), "%s/%s", _PATH_MAILDIR, pwd->pw_name); 634 if (stat(tbuf, &st) == 0 && st.st_size != 0) 642 tbuf[0] = '-'; 643 (void)strlcpy(tbuf + 1, (p = strrchr(pwd->pw_shell, '/')) ? 644 p + 1 : pwd->pw_shell, sizeof(tbuf) [all...] |
/netbsd-6-1-5-RELEASE/usr.bin/skeyinit/ |
H A D | skeyinit.c | 54 char passwd[SKEY_MAX_PW_LEN+2], passwd2[SKEY_MAX_PW_LEN+2], tbuf[27], buf[80]; local 95 (void)snprintf(tbuf, sizeof(tbuf), "%05ld", (long) (now % 100000)); 96 (void)strlcat(defaultseed, tbuf, sizeof(defaultseed)); 337 (void)strftime(tbuf, sizeof(tbuf), " %b %d,%Y %T", tm); 370 pp->pw_name, n, seed, skey.val, tbuf); 373 pp->pw_name, skey_get_algorithm(), n, seed, skey.val, tbuf);
|
/netbsd-6-1-5-RELEASE/usr.sbin/rpcbind/ |
H A D | util.c | 111 struct netbuf *serv_nbp, *clnt_nbp = NULL, tbuf; local 271 tbuf.len = clnt_sa->sa_len; 272 tbuf.maxlen = sizeof (struct sockaddr_storage); 273 tbuf.buf = newsin; 280 tbuf.maxlen = sizeof (struct sockaddr_storage); 281 tbuf.len = clnt_sa->sa_len; 282 tbuf.buf = newsin6; 289 ret = taddr2uaddr(nconf, &tbuf);
|
/netbsd-6-1-5-RELEASE/tests/fs/nfs/nfsservice/rpcbind/ |
H A D | util.c | 114 struct netbuf *serv_nbp, *clnt_nbp = NULL, tbuf; local 274 tbuf.len = clnt_sa->sa_len; 275 tbuf.maxlen = sizeof (struct sockaddr_storage); 276 tbuf.buf = newsin; 283 tbuf.maxlen = sizeof (struct sockaddr_storage); 284 tbuf.len = clnt_sa->sa_len; 285 tbuf.buf = newsin6; 292 ret = taddr2uaddr(nconf, &tbuf);
|
/netbsd-6-1-5-RELEASE/crypto/dist/ipsec-tools/src/racoon/ |
H A D | logger.c | 82 p->tbuf = (time_t *)racoon_malloc(sizeof(time_t *) * siz); 83 if (p->tbuf == NULL) { 88 memset(p->tbuf, 0, sizeof(time_t *) * siz); 111 p->tbuf[p->head] = time(NULL); 197 tm = localtime(&p->tbuf[j]); 220 racoon_free(p->tbuf);
|
H A D | security.c | 72 vchar_t *tbuf = NULL; local 117 tbuf = isakmp_parsewoh(ISAKMP_NPTYPE_T, (struct isakmp_gen *)bp, len); 118 if (tbuf == NULL) 121 ta = (struct isakmp_parse_t *)tbuf->v;
|
/netbsd-6-1-5-RELEASE/usr.bin/last/ |
H A D | last.c | 360 static char tbuf[TBUFLEN]; local 364 strcpy(tbuf, "????"); 365 return tbuf; 367 strftime(tbuf, sizeof(tbuf), 372 return (tbuf);
|
/netbsd-6-1-5-RELEASE/usr.bin/tic/ |
H A D | tic.c | 90 grow_tbuf(TBUF *tbuf, size_t len) argument 94 buf = _ti_grow_tbuf(tbuf, len); 486 TBUF tbuf; local 530 buf = tbuf.buf = NULL; 531 buflen = tbuf.buflen = tbuf.bufpos = 0; 537 process_entry(&tbuf, flags); 546 if (!isspace((unsigned char)*buf) && tbuf.bufpos != 0) 547 process_entry(&tbuf, flags); 550 grow_tbuf(&tbuf, le [all...] |
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/flush/ |
H A D | flush.c | 394 struct utimbuf * tbuf, int how) 407 if (utime(path, tbuf) == 0) 479 struct utimbuf tbuf; local 551 tbuf.actime = tbuf.modtime = event_time(); 565 count += flush_one_file(STR(queue_id), queue_file, &tbuf, how); 609 struct utimbuf tbuf; local 624 tbuf.actime = tbuf.modtime = event_time(); 625 if (flush_one_file(queue_id, queue_file, &tbuf, UNTHROTTLE_AFTE 393 flush_one_file(const char *queue_id, VSTRING *queue_file, struct utimbuf * tbuf, int how) argument [all...] |
/netbsd-6-1-5-RELEASE/sys/fs/cd9660/ |
H A D | cd9660_node.c | 410 u_char tbuf[7]; local 413 tbuf[0] = cd9660_chars2ui(pi,4) - 1900; 416 tbuf[1] = cd9660_chars2ui(pi + 4,2); 419 tbuf[2] = cd9660_chars2ui(pi + 6,2); 422 tbuf[3] = cd9660_chars2ui(pi + 8,2); 425 tbuf[4] = cd9660_chars2ui(pi + 10,2); 428 tbuf[5] = cd9660_chars2ui(pi + 12,2); 431 tbuf[6] = pi[16]; 433 return cd9660_tstamp_conv7(tbuf,pu);
|
/netbsd-6-1-5-RELEASE/sys/compat/linux32/common/ |
H A D | linux32_dirent.c | 104 char *inp, *tbuf; /* BSD-format */ local 150 tbuf = malloc(buflen, M_TEMP, M_WAITOK); 155 aiov.iov_base = tbuf; 172 inp = tbuf; 253 free(tbuf, M_TEMP);
|
/netbsd-6-1-5-RELEASE/sys/ddb/ |
H A D | db_sym.c | 401 char tbuf[24]; local 403 db_format_radix(tbuf, 24, d, true); 404 (*pr)("+%s", tbuf); 425 char tbuf[24]; local 427 db_format_radix(tbuf, 24, off - val, true); 428 (*pr)("+%s", tbuf);
|
/netbsd-6-1-5-RELEASE/games/adventure/ |
H A D | io.c | 574 char *tbuf; local 577 if ((tbuf = (char *) malloc(msg->txtlen + 1)) == NULL) 579 memcpy(tbuf, msg->seekadr, msg->txtlen + 1); /* Room to null */ 580 s = tbuf; 583 while (s - tbuf < msg->txtlen) { /* read line at a time */ 609 free(tbuf);
|
/netbsd-6-1-5-RELEASE/external/gpl3/gdb/dist/sim/common/ |
H A D | syscall.c | 192 TADDR tbuf = sc->arg1; 208 int written = (*sc->write_mem) (cb, sc, tbuf, argv[argc], len + 1); 215 tbuf = len + 1; 218 if ((*sc->write_mem) (cb, sc, tbuf, "", 1) != 1) 224 tbuf++; 231 int written = (*sc->write_mem) (cb, sc, tbuf, envp[envc], len + 1); 238 tbuf = len + 1; 241 if ((*sc->write_mem) (cb, sc, tbuf, "", 1) != 1)
|
/netbsd-6-1-5-RELEASE/usr.sbin/pwd_mkdb/ |
H A D | pwd_mkdb.c | 814 char buf[MAX(MAXPATHLEN, LINE_MAX * 2)], tbuf[1024], *p; local 822 key.data = (u_char *)tbuf; 875 tbuf[0] = _PW_KEYBYNAME; 877 (void)memmove(tbuf + 1, pwd.pw_name, len); 883 tbuf[0] = _PW_KEYBYNUM; 887 (void)memmove(tbuf + 1, &x, sizeof(x)); 893 tbuf[0] = _PW_KEYBYUID; 894 (void)memmove(tbuf + 1, &pwd.pw_uid, sizeof(pwd.pw_uid)); 903 char tbuf[1024]; local 908 key.data = (u_char *)tbuf; 936 char tbuf[1024], *p; local [all...] |
/netbsd-6-1-5-RELEASE/sys/arch/amd64/amd64/ |
H A D | db_disasm.c | 1351 char tbuf[24]; local 1428 db_format_radix(tbuf, 24, imm64, true); 1429 db_printf("$%s", tbuf); 1435 db_format_radix(tbuf, 24, (unsigned int)imm, true); 1436 db_printf("$%s", tbuf); 1441 db_format_radix(tbuf, 24, imm, true); 1442 db_printf("$%s", tbuf); 1446 db_format_radix(tbuf, 24, (unsigned int)imm, true); 1447 db_printf("$%s", tbuf); 1451 db_format_radix(tbuf, 2 [all...] |