Searched refs:tbuf (Results 26 - 50 of 175) sorted by relevance

1234567

/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/rsa/
H A Drsa_pmeth.c93 unsigned char *tbuf; member in struct:__anon648
107 rctx->tbuf = NULL;
139 if (ctx->tbuf)
141 ctx->tbuf = OPENSSL_malloc(EVP_PKEY_size(pk->pkey));
142 if (!ctx->tbuf)
154 if (rctx->tbuf)
155 OPENSSL_free(rctx->tbuf);
242 memcpy(rctx->tbuf, tbs, tbslen);
243 rctx->tbuf[tbslen] =
245 ret = RSA_private_encrypt(tbslen + 1, rctx->tbuf,
[all...]
/netbsd-6-1-5-RELEASE/external/gpl3/gcc/dist/libcpp/
H A Dcharset.c773 struct _cpp_strbuf tbuf; local
792 tbuf.asize = 1;
793 tbuf.text = XNEWVEC (uchar, tbuf.asize);
794 tbuf.len = 0;
796 if (!APPLY_CONVERSION (pfile->narrow_cset_desc, sbuf, 1, &tbuf))
801 if (tbuf.len != 1)
808 c = tbuf.text[0];
809 free(tbuf.text);
1086 struct _cpp_strbuf *tbuf, struc
1084 convert_ucn(cpp_reader *pfile, const uchar *from, const uchar *limit, struct _cpp_strbuf *tbuf, struct cset_converter cvt) argument
1117 emit_numeric_escape(cpp_reader *pfile, cppchar_t n, struct _cpp_strbuf *tbuf, struct cset_converter cvt) argument
1168 convert_hex(cpp_reader *pfile, const uchar *from, const uchar *limit, struct _cpp_strbuf *tbuf, struct cset_converter cvt) argument
1218 convert_oct(cpp_reader *pfile, const uchar *from, const uchar *limit, struct _cpp_strbuf *tbuf, struct cset_converter cvt) argument
1254 convert_escape(cpp_reader *pfile, const uchar *from, const uchar *limit, struct _cpp_strbuf *tbuf, struct cset_converter cvt) argument
1374 struct _cpp_strbuf tbuf; local
[all...]
/netbsd-6-1-5-RELEASE/sbin/dump/
H A Ditime.c241 char tbuf[BUFSIZ]; local
244 if ( (fgets(tbuf, sizeof (tbuf), df)) != tbuf)
247 if (makedumpdate(ddatep, tbuf) < 0)
259 makedumpdate(struct dumpdates *ddp, char *tbuf) argument
263 (void) sscanf(tbuf, DUMPINFMT, ddp->dd_name, &ddp->dd_level, un_buf);
/netbsd-6-1-5-RELEASE/dist/nvi/ip/
H A Dip_read.c182 evp->e_csp = ipp->tbuf;
266 switch (*nr = read(fd, termread ? (char *)ipp->tbuf : bp,
267 termread ? sizeof(ipp->tbuf)/sizeof(CHAR_T)
279 CHAR2INT(sp, (char *)ipp->tbuf, *nr, wp, wlen);
280 MEMMOVEW(ipp->tbuf, wp, wlen);
338 MEMCPYW(ipp->tbuf, wp, wlen);
339 evp->e_str1 = ipp->tbuf;
344 MEMCPYW(ipp->tbuf, wp, wlen);
345 evp->e_str2 = ipp->tbuf;
/netbsd-6-1-5-RELEASE/sbin/dump_lfs/
H A Dlfs_inode.c83 char tbuf[LFS_SBPAD]; member in union:__anon5419
112 rawread(fsbtob(sblock, (off_t)sblock->lfs_sboffs[1]), u.tbuf,
113 sizeof(u.tbuf));
116 lfs_sb_swap(u.tbuf, u.tbuf, 0);
124 memcpy(sblock, u.tbuf, sizeof(u.tbuf));
129 memcpy(sblock, u.tbuf, sizeof(u.tbuf));
/netbsd-6-1-5-RELEASE/sys/compat/ibcs2/
H A Dibcs2_exec_elf32.c82 char tbuf[sizeof(signature) - 1]; local
102 if ((error = exec_read_from(l, epp->ep_vp, s->sh_offset, tbuf,
106 if (memcmp(tbuf, signature, sizeof(signature) - 1) == 0)
/netbsd-6-1-5-RELEASE/sys/compat/linux/common/
H A Dlinux_exec_elf32.c100 char tbuf[sizeof(signature)]; local
125 error = exec_read_from(l, epp->ep_vp, stroff + s->sh_name, tbuf,
129 if (!memcmp(tbuf, signature, sigsz)) {
130 DPRINTF(("linux_atexit_sig=%s\n", tbuf));
164 char tbuf[sizeof(signature) - 1]; local
188 error = exec_read_from(l, epp->ep_vp, s->sh_offset, tbuf,
196 DPRINTF(("linux_gcc_sig: sig=%s\n", tbuf));
197 if (!memcmp(tbuf, signature, sizeof(signature) - 1)) {
223 char tbuf[sizeof(signature)]; local
248 error = exec_read_from(l, epp->ep_vp, stroff + s->sh_name, tbuf,
[all...]
/netbsd-6-1-5-RELEASE/external/bsd/ntp/dist/ntpd/
H A Drefclock_acts.c307 char tbuf[BMAX]; local
320 pp->lencode = refclock_gtraw(rbufp, tbuf, BMAX - (up->bufptr -
322 for (tptr = tbuf; *tptr != '\0'; tptr++) {
355 char tbuf[SMAX]; local
367 snprintf(tbuf, sizeof(tbuf), "acts: %04x (%d %d) %zu %s", modem,
371 printf("%s\n", tbuf);
378 strncpy(tbuf, pp->a_lastcode, SMAX);
379 strtok(tbuf, " ");
380 if (strcmp(tbuf, "N
729 char tbuf[SMAX]; local
[all...]
/netbsd-6-1-5-RELEASE/usr.bin/login/
H A Dlogin.c147 char tbuf[MAXPATHLEN + 2], tname[sizeof(_PATH_TTY) + 10]; local
165 tbuf[0] = '\0';
333 if (failures && strcmp(tbuf, username)) {
335 badlogin(tbuf);
338 (void)strlcpy(tbuf, username, sizeof(tbuf));
667 (void)snprintf(tbuf,
668 sizeof(tbuf), "%s/%s", _PATH_MAILDIR, pwd->pw_name);
669 if (stat(tbuf, &st) == 0 && st.st_size != 0)
683 tbuf[
766 char tbuf[8192]; local
770 (void)write(fileno(stdout), tbuf, nchars); local
[all...]
H A Dlogin_pam.c111 char tbuf[MAXPATHLEN + 2], tname[sizeof(_PATH_TTY) + 10]; local
128 tbuf[0] = '\0';
253 if (failures && strcmp(tbuf, username)) {
255 badlogin(tbuf);
632 (void)snprintf(tbuf,
633 sizeof(tbuf), "%s/%s", _PATH_MAILDIR, pwd->pw_name);
634 if (stat(tbuf, &st) == 0 && st.st_size != 0)
642 tbuf[0] = '-';
643 (void)strlcpy(tbuf + 1, (p = strrchr(pwd->pw_shell, '/')) ?
644 p + 1 : pwd->pw_shell, sizeof(tbuf)
[all...]
/netbsd-6-1-5-RELEASE/usr.bin/skeyinit/
H A Dskeyinit.c54 char passwd[SKEY_MAX_PW_LEN+2], passwd2[SKEY_MAX_PW_LEN+2], tbuf[27], buf[80]; local
95 (void)snprintf(tbuf, sizeof(tbuf), "%05ld", (long) (now % 100000));
96 (void)strlcat(defaultseed, tbuf, sizeof(defaultseed));
337 (void)strftime(tbuf, sizeof(tbuf), " %b %d,%Y %T", tm);
370 pp->pw_name, n, seed, skey.val, tbuf);
373 pp->pw_name, skey_get_algorithm(), n, seed, skey.val, tbuf);
/netbsd-6-1-5-RELEASE/usr.sbin/rpcbind/
H A Dutil.c111 struct netbuf *serv_nbp, *clnt_nbp = NULL, tbuf; local
271 tbuf.len = clnt_sa->sa_len;
272 tbuf.maxlen = sizeof (struct sockaddr_storage);
273 tbuf.buf = newsin;
280 tbuf.maxlen = sizeof (struct sockaddr_storage);
281 tbuf.len = clnt_sa->sa_len;
282 tbuf.buf = newsin6;
289 ret = taddr2uaddr(nconf, &tbuf);
/netbsd-6-1-5-RELEASE/tests/fs/nfs/nfsservice/rpcbind/
H A Dutil.c114 struct netbuf *serv_nbp, *clnt_nbp = NULL, tbuf; local
274 tbuf.len = clnt_sa->sa_len;
275 tbuf.maxlen = sizeof (struct sockaddr_storage);
276 tbuf.buf = newsin;
283 tbuf.maxlen = sizeof (struct sockaddr_storage);
284 tbuf.len = clnt_sa->sa_len;
285 tbuf.buf = newsin6;
292 ret = taddr2uaddr(nconf, &tbuf);
/netbsd-6-1-5-RELEASE/crypto/dist/ipsec-tools/src/racoon/
H A Dlogger.c82 p->tbuf = (time_t *)racoon_malloc(sizeof(time_t *) * siz);
83 if (p->tbuf == NULL) {
88 memset(p->tbuf, 0, sizeof(time_t *) * siz);
111 p->tbuf[p->head] = time(NULL);
197 tm = localtime(&p->tbuf[j]);
220 racoon_free(p->tbuf);
H A Dsecurity.c72 vchar_t *tbuf = NULL; local
117 tbuf = isakmp_parsewoh(ISAKMP_NPTYPE_T, (struct isakmp_gen *)bp, len);
118 if (tbuf == NULL)
121 ta = (struct isakmp_parse_t *)tbuf->v;
/netbsd-6-1-5-RELEASE/usr.bin/last/
H A Dlast.c360 static char tbuf[TBUFLEN]; local
364 strcpy(tbuf, "????");
365 return tbuf;
367 strftime(tbuf, sizeof(tbuf),
372 return (tbuf);
/netbsd-6-1-5-RELEASE/usr.bin/tic/
H A Dtic.c90 grow_tbuf(TBUF *tbuf, size_t len) argument
94 buf = _ti_grow_tbuf(tbuf, len);
486 TBUF tbuf; local
530 buf = tbuf.buf = NULL;
531 buflen = tbuf.buflen = tbuf.bufpos = 0;
537 process_entry(&tbuf, flags);
546 if (!isspace((unsigned char)*buf) && tbuf.bufpos != 0)
547 process_entry(&tbuf, flags);
550 grow_tbuf(&tbuf, le
[all...]
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/flush/
H A Dflush.c394 struct utimbuf * tbuf, int how)
407 if (utime(path, tbuf) == 0)
479 struct utimbuf tbuf; local
551 tbuf.actime = tbuf.modtime = event_time();
565 count += flush_one_file(STR(queue_id), queue_file, &tbuf, how);
609 struct utimbuf tbuf; local
624 tbuf.actime = tbuf.modtime = event_time();
625 if (flush_one_file(queue_id, queue_file, &tbuf, UNTHROTTLE_AFTE
393 flush_one_file(const char *queue_id, VSTRING *queue_file, struct utimbuf * tbuf, int how) argument
[all...]
/netbsd-6-1-5-RELEASE/sys/fs/cd9660/
H A Dcd9660_node.c410 u_char tbuf[7]; local
413 tbuf[0] = cd9660_chars2ui(pi,4) - 1900;
416 tbuf[1] = cd9660_chars2ui(pi + 4,2);
419 tbuf[2] = cd9660_chars2ui(pi + 6,2);
422 tbuf[3] = cd9660_chars2ui(pi + 8,2);
425 tbuf[4] = cd9660_chars2ui(pi + 10,2);
428 tbuf[5] = cd9660_chars2ui(pi + 12,2);
431 tbuf[6] = pi[16];
433 return cd9660_tstamp_conv7(tbuf,pu);
/netbsd-6-1-5-RELEASE/sys/compat/linux32/common/
H A Dlinux32_dirent.c104 char *inp, *tbuf; /* BSD-format */ local
150 tbuf = malloc(buflen, M_TEMP, M_WAITOK);
155 aiov.iov_base = tbuf;
172 inp = tbuf;
253 free(tbuf, M_TEMP);
/netbsd-6-1-5-RELEASE/sys/ddb/
H A Ddb_sym.c401 char tbuf[24]; local
403 db_format_radix(tbuf, 24, d, true);
404 (*pr)("+%s", tbuf);
425 char tbuf[24]; local
427 db_format_radix(tbuf, 24, off - val, true);
428 (*pr)("+%s", tbuf);
/netbsd-6-1-5-RELEASE/games/adventure/
H A Dio.c574 char *tbuf; local
577 if ((tbuf = (char *) malloc(msg->txtlen + 1)) == NULL)
579 memcpy(tbuf, msg->seekadr, msg->txtlen + 1); /* Room to null */
580 s = tbuf;
583 while (s - tbuf < msg->txtlen) { /* read line at a time */
609 free(tbuf);
/netbsd-6-1-5-RELEASE/external/gpl3/gdb/dist/sim/common/
H A Dsyscall.c192 TADDR tbuf = sc->arg1;
208 int written = (*sc->write_mem) (cb, sc, tbuf, argv[argc], len + 1);
215 tbuf = len + 1;
218 if ((*sc->write_mem) (cb, sc, tbuf, "", 1) != 1)
224 tbuf++;
231 int written = (*sc->write_mem) (cb, sc, tbuf, envp[envc], len + 1);
238 tbuf = len + 1;
241 if ((*sc->write_mem) (cb, sc, tbuf, "", 1) != 1)
/netbsd-6-1-5-RELEASE/usr.sbin/pwd_mkdb/
H A Dpwd_mkdb.c814 char buf[MAX(MAXPATHLEN, LINE_MAX * 2)], tbuf[1024], *p; local
822 key.data = (u_char *)tbuf;
875 tbuf[0] = _PW_KEYBYNAME;
877 (void)memmove(tbuf + 1, pwd.pw_name, len);
883 tbuf[0] = _PW_KEYBYNUM;
887 (void)memmove(tbuf + 1, &x, sizeof(x));
893 tbuf[0] = _PW_KEYBYUID;
894 (void)memmove(tbuf + 1, &pwd.pw_uid, sizeof(pwd.pw_uid));
903 char tbuf[1024]; local
908 key.data = (u_char *)tbuf;
936 char tbuf[1024], *p; local
[all...]
/netbsd-6-1-5-RELEASE/sys/arch/amd64/amd64/
H A Ddb_disasm.c1351 char tbuf[24]; local
1428 db_format_radix(tbuf, 24, imm64, true);
1429 db_printf("$%s", tbuf);
1435 db_format_radix(tbuf, 24, (unsigned int)imm, true);
1436 db_printf("$%s", tbuf);
1441 db_format_radix(tbuf, 24, imm, true);
1442 db_printf("$%s", tbuf);
1446 db_format_radix(tbuf, 24, (unsigned int)imm, true);
1447 db_printf("$%s", tbuf);
1451 db_format_radix(tbuf, 2
[all...]

Completed in 222 milliseconds

1234567