/freebsd-11-stable/crypto/heimdal/lib/asn1/ |
H A D | der_free.c | 96 k->length = 0; 104 k->length = 0; 119 k->length = 0; 127 k->length = 0; 135 k->length = 0; 143 k->length = 0;
|
H A D | asn1_print.c | 61 size_t length; local 70 errx (1, "unreasonable length (%u) > %u", 85 ret = der_get_length (buf, len, &length, &sz); 89 errx (1, "unreasonable tag length (%u) > %u", 93 if (length == ASN1_INDEFINITE) { 108 length = len; 109 } else if (length > len) { 112 errx (1, "unreasonable inner length (%u) > %u", 113 (unsigned)length, (unsigned)len); 116 printf ("%lu bytes [%u]", (unsigned long)length, ta [all...] |
/freebsd-11-stable/lib/libgssapi/ |
H A D | gss_import_sec_context.c | 57 len = interprocess_token->length; 60 mech_oid.length = (p[0] << 8) | p[1]; 61 if (len < mech_oid.length + 2) 64 buf.length = len - 2 - mech_oid.length; 65 buf.value = p + 2 + mech_oid.length;
|
/freebsd-11-stable/crypto/openssl/crypto/camellia/ |
H A D | camellia.h | 108 size_t length, const CAMELLIA_KEY *key, 111 size_t length, const CAMELLIA_KEY *key, 114 size_t length, const CAMELLIA_KEY *key, 117 size_t length, const CAMELLIA_KEY *key, 120 size_t length, const CAMELLIA_KEY *key, 123 size_t length, const CAMELLIA_KEY *key,
|
/freebsd-11-stable/crypto/heimdal/lib/gssapi/mech/ |
H A D | gss_import_sec_context.c | 52 len = interprocess_token->length; 55 mech_oid.length = (p[0] << 8) | p[1]; 56 if (len < mech_oid.length + 2) 59 buf.length = len - 2 - mech_oid.length; 60 buf.value = p + 2 + mech_oid.length;
|
H A D | context.c | 86 if (value != mg->maj_stat || mg->maj_error.length == 0) 88 string->value = malloc(mg->maj_error.length + 1); 89 string->length = mg->maj_error.length; 90 memcpy(string->value, mg->maj_error.value, mg->maj_error.length); 91 ((char *) string->value)[string->length] = '\0'; 95 if (value != mg->min_stat || mg->min_error.length == 0) 97 string->value = malloc(mg->min_error.length + 1); 98 string->length = mg->min_error.length; [all...] |
/freebsd-11-stable/sys/libkern/ |
H A D | bcmp.c | 45 bcmp(b1, b2, length) 47 size_t length; 60 int shl, shr, len = length; 105 len <<= 3; /* remaining length in bits */ 136 if (length == 0) 143 while (--length); 144 return(length);
|
/freebsd-11-stable/contrib/subversion/subversion/libsvn_subr/ |
H A D | prefix_string.c | 38 * ordinary nodes have a length information so that no terminating 0 is 56 * meaning DATA may or may not be NUL terminated. The actual length is 57 * provided by the node_t.length field (minus parent node length). */ 75 apr_uint32_t length; member in struct:node_t 193 (unsigned char)s[node->length], 199 || node->sub_nodes[idx]->key.data[0] != s[node->length]) 208 if (strcmp(sub_node->key.data, s + node->length) == 0) 218 apr_size_t sub_node_len = sub_node->length - node->length; [all...] |
/freebsd-11-stable/contrib/ntp/lib/isc/ |
H A D | bitstring.c | 44 unsigned int length, unsigned int size, isc_boolean_t lsb0) 48 * at 'data'. 'length' bits of the bitstring are valid. If 'lsb0' 55 REQUIRE(length <= size); 59 bitstring->length = length; 75 bitstring->length = 0; 96 REQUIRE(sbitpos <= source->length); 101 REQUIRE(sbitpos + n <= source->length); 104 REQUIRE(tbitpos <= target->length); 111 if (tlast > target->length) 43 isc_bitstring_init(isc_bitstring_t *bitstring, unsigned char *data, unsigned int length, unsigned int size, isc_boolean_t lsb0) argument [all...] |
H A D | buffer.c | 31 isc__buffer_init(isc_buffer_t *b, const void *base, unsigned int length) { argument 33 * Make 'b' refer to the 'length'-byte region starting at 'base'. 39 ISC__BUFFER_INIT(b, base, length); 53 isc_buffer_reinit(isc_buffer_t *b, void *base, unsigned int length) { argument 60 * The buffer must not be smaller than the length of the original 63 REQUIRE(b->length <= length); 66 (void)memmove(base, b->base, b->length); 68 b->length = length; 240 unsigned int length; local 398 isc__buffer_putmem(isc_buffer_t *b, const unsigned char *base, unsigned int length) argument 449 isc_buffer_allocate(isc_mem_t *mctx, isc_buffer_t **dynbuffer, unsigned int length) argument 462 length); local [all...] |
/freebsd-11-stable/crypto/heimdal/lib/gssapi/krb5/ |
H A D | encapsulate.c | 44 *len = 1 + 1 + mech->length + data_len; 89 *p++ = mech->length; 90 memcpy (p, mech->elements, mech->length); 91 p += mech->length; 110 _gssapi_encap_length (in_data->length, &len, &outer_len, mech); 112 output_token->length = outer_len; 120 memcpy (p, in_data->data, in_data->length); 141 _gsskrb5_encap_length (in_data->length, &len, &outer_len, mech); 143 output_token->length = outer_len; 151 memcpy (p, in_data->data, in_data->length); [all...] |
/freebsd-11-stable/contrib/llvm-project/compiler-rt/lib/safestack/ |
H A D | safestack_platform.h | 93 inline void *Mmap(void *addr, size_t length, int prot, int flags, int fd, argument 96 return __mmap(addr, length, prot, flags, fd, 0, offset); 98 return (void *)__syscall(SYS_mmap, addr, length, prot, flags, fd, offset); 100 return (void *)syscall(SYS_mmap, addr, length, prot, flags, fd, offset); 104 inline int Munmap(void *addr, size_t length) { argument 107 return _REAL(munmap, addr, length); 109 return syscall(SYS_munmap, addr, length); 113 inline int Mprotect(void *addr, size_t length, int prot) { argument 116 return _REAL(mprotect, addr, length, prot); 118 return syscall(SYS_mprotect, addr, length, pro [all...] |
/freebsd-11-stable/contrib/llvm-project/lldb/source/Plugins/SymbolFile/DWARF/ |
H A D | DWARFDebugArangeSet.cpp | 18 m_header.length = 0; 27 m_header.length = 0; 46 // length containing the length of the set of entries for this compilation 47 // unit, not including the length field itself; a 2-byte version identifier 54 // consists of an address and a length, each in the size appropriate for an 56 m_header.length = data.GetDWARFInitialLength(offset_ptr); 65 // 3 - the length seems to make sense 75 if (m_header.length == 0) 77 "Invalid arange header length"); [all...] |
/freebsd-11-stable/crypto/openssl/crypto/asn1/ |
H A D | asn1_lib.c | 67 static void asn1_put_length(unsigned char **pp, int length); 73 * If there is 0 or 1 byte left, the length check should pick things up 195 * class 0 is constructed constructed == 2 for indefinite length constructed 197 void ASN1_put_object(unsigned char **pp, int constructed, int length, int tag, argument 223 asn1_put_length(&p, length); 236 static void asn1_put_length(unsigned char **pp, int length) argument 240 if (length <= 127) 241 *(p++) = (unsigned char)length; 243 l = length; 249 p[i] = length 257 ASN1_object_size(int constructed, int length, int tag) argument 310 asn1_GetSequence(ASN1_const_CTX *c, long *length) argument [all...] |
H A D | a_bytes.c | 66 const unsigned char **pp, long length, 73 long length, int type) 83 inf = ASN1_get_object(&p, &len, &tag, &xclass, length); 98 return (d2i_ASN1_BIT_STRING(a, pp, length)); 120 ret->length = (int)len; 145 ret = a->length; 156 memcpy(p, a->data, a->length); 157 p += a->length; 170 long length, int Ptag, int Pclass) 173 ASN1_STRING *s = int_d2i_ASN1_bytes(a, pp, length, Pta 72 d2i_ASN1_type_bytes(ASN1_STRING **a, const unsigned char **pp, long length, int type) argument 169 d2i_ASN1_bytes(ASN1_STRING **a, const unsigned char **pp, long length, int Ptag, int Pclass) argument 179 int_d2i_ASN1_bytes(ASN1_STRING **a, const unsigned char **pp, long length, int Ptag, int Pclass, int depth, int *perr) argument [all...] |
/freebsd-11-stable/sys/kern/ |
H A D | imgact_shell.c | 105 size_t length; local 188 * area, and 'length' as the number of bytes being removed. 194 length = (imgp->args->argc == 0) ? 0 : 197 if (offset > imgp->args->stringspace + length) { 203 bcopy(imgp->args->begin_argv + length, imgp->args->begin_argv + offset, 204 imgp->args->endp - (imgp->args->begin_argv + length)); 206 offset -= length; /* calculate actual adjustment */ 225 length = interpe - interpb; 226 bcopy(interpb, imgp->args->begin_argv, length); 227 *(imgp->args->begin_argv + length) [all...] |
/freebsd-11-stable/crypto/heimdal/lib/krb5/ |
H A D | aes-test.c | 45 hex_dump_data(const void *data, size_t length) argument 49 hex_encode(data, length, &p); 209 password.length = strlen(password.data); 214 salt.saltvalue.length = strlen(salt.saltvalue.data); 216 salt.saltvalue.length = keys[i].saltlen; 219 opaque.length = sizeof(iter); 228 PKCS5_PBKDF2_HMAC_SHA1(password.data, password.length, 229 salt.saltvalue.data, salt.saltvalue.length, 261 if (key.keyvalue.length != keys[i].keylen) { 262 krb5_warnx(context, "%d: key wrong length ( [all...] |
H A D | salt-des.c | 58 char c = ((i < pw.length) ? ((char*)pw.data)[i] : 0) ^ 59 ((i < cell.length) ? 89 memcpy(password, pw.data, min(pw.length, sizeof(password))); 90 if(pw.length < sizeof(password)) { 91 int len = min(cell.length, sizeof(password) - pw.length); 94 memcpy(password + pw.length, cell.data, len); 95 for (i = pw.length; i < pw.length + len; ++i) 98 passlen = min(sizeof(password), pw.length 138 DES_string_to_key_int(unsigned char *data, size_t length, DES_cblock *key) argument [all...] |
/freebsd-11-stable/crypto/heimdal/lib/kadm5/ |
H A D | keys.c | 61 keys[i].key.keyvalue.length = 0; 84 if (keys1[i].salt->salt.length != keys2[j].salt->salt.length) 87 keys1[i].salt->salt.length) != 0) 92 if (keys1[i].key.keyvalue.length != keys2[j].key.keyvalue.length) 95 keys1[i].key.keyvalue.length) != 0)
|
/freebsd-11-stable/crypto/openssl/crypto/objects/ |
H A D | obj_lib.c | 83 data = OPENSSL_malloc(o->length); 87 memcpy(data, o->data, o->length); 90 r->length = o->length; 131 ret = (a->length - b->length); 134 return (memcmp(a->data, b->data, a->length));
|
/freebsd-11-stable/contrib/tcpdump/ |
H A D | print-resp.c | 59 #define resp_print_length_too_large(ndo) ND_PRINT((ndo, " length too large")) 60 #define resp_print_length_negative(ndo) ND_PRINT((ndo, " length negative and not -1")) 175 * Get a bulk string or array length. 213 resp_print(netdissect_options *ndo, const u_char *bp, u_int length) argument 215 int ret_len = 0, length_cur = length; 217 if(!bp || length <= 0) 229 * 'length' bytes have been processed or we reach a trunc condition. 244 resp_parse(netdissect_options *ndo, register const u_char *bp, int length) argument 249 LCHECK2(length, 1); 255 case RESP_SIMPLE_STRING: ret_len = resp_print_simple_string(ndo, bp, length); brea 275 resp_print_simple_string(netdissect_options *ndo, register const u_char *bp, int length) argument 280 resp_print_integer(netdissect_options *ndo, register const u_char *bp, int length) argument 285 resp_print_error(netdissect_options *ndo, register const u_char *bp, int length) argument 290 resp_print_string_error_integer(netdissect_options *ndo, register const u_char *bp, int length) argument 325 resp_print_bulk_string(netdissect_options *ndo, register const u_char *bp, int length) argument 371 resp_print_bulk_array(netdissect_options *ndo, register const u_char *bp, int length) argument 410 resp_print_inline(netdissect_options *ndo, register const u_char *bp, int length) argument [all...] |
H A D | print-ap1394.c | 59 ap1394_hdr_print(netdissect_options *ndo, register const u_char *bp, u_int length) argument 79 ND_PRINT((ndo, ", length %u: ", length)); 85 * 'h->len' is the length of the packet off the wire, and 'h->caplen' 91 u_int length = h->len; local 103 ap1394_hdr_print(ndo, p, length); 105 length -= FIREWIRE_HDRLEN; 115 if (ethertype_print(ndo, ether_type, p, length, caplen, &src, &dst) == 0) { 118 ap1394_hdr_print(ndo, (const u_char *)fp, length + FIREWIRE_HDRLEN);
|
H A D | print-atalk.c | 84 /* Cut short by the snapshot length. */ 95 register const u_char *bp, u_int length) 103 if (length < sizeof(*lp)) { 104 ND_PRINT((ndo, " [|llap %u]", length)); 105 return (length); 109 return (0); /* cut short by the snapshot length */ 113 length -= sizeof(*lp); 118 if (length < ddpSSize) { 119 ND_PRINT((ndo, " [|sddp %u]", length)); 120 return (length); 94 llap_print(netdissect_options *ndo, register const u_char *bp, u_int length) argument 179 atalk_print(netdissect_options *ndo, register const u_char *bp, u_int length) argument 210 aarp_print(netdissect_options *ndo, register const u_char *bp, u_int length) argument 254 ddp_print(netdissect_options *ndo, register const u_char *bp, register u_int length, register int t, register u_short snet, register u_char snode, u_char skt) argument 280 atp_print(netdissect_options *ndo, register const struct atATP *ap, u_int length) argument 409 nbp_print(netdissect_options *ndo, register const struct atNBP *np, u_int length, register u_short snet, register u_char snode, register u_char skt) argument 480 register u_int length; local [all...] |
/freebsd-11-stable/contrib/gdb/gdb/ |
H A D | bcache.c | 43 /* Assume the data length is no more than 64k. */ 44 unsigned short length; member in struct:bstring 47 avoids the need to do length or memcmp calls. It proves to be 91 length/data compare missed. */ 101 hash(const void *addr, int length) 107 e = k+length; 119 /* If the average chain length grows beyond this, then we want to 176 new_bucket = &new_buckets[(hash (&s->d.data, s->length) 202 bcache_data (const void *addr, int length, struct bcache *bcache) 209 /* If our average chain length i 100 hash(const void *addr, int length) argument 199 bcache_data(const void *addr, int length, struct bcache *bcache) argument 251 deprecated_bcache(const void *addr, int length, struct bcache *bcache) argument 257 bcache(const void *addr, int length, struct bcache *bcache) argument [all...] |
/freebsd-11-stable/stand/ficl/ |
H A D | fileaccess.c | 35 int length = stackPopINT(pVM->pStack); local 40 char *filename = (char *)alloca(length + 1); 41 memcpy(filename, address, length); 42 filename[length] = 0; 110 int length = stackPopINT(pVM->pStack); local 113 char *filename = (char *)alloca(length + 1); 114 memcpy(filename, address, length); 115 filename[length] = 0; 122 int length; local 127 length 147 int length = stackPopINT(pVM->pStack); local 278 int length = stackPopINT(pVM->pStack); local 294 int length = stackPopINT(pVM->pStack); local 335 int length = stackPopINT(pVM->pStack); local 348 size_t length = (size_t)stackPopINT(pVM->pStack); local [all...] |