/freebsd-10-stable/contrib/ncurses/ncurses/base/ |
H A D | MKunctrl.awk | 52 blob="" 65 blob = blob "\"" 66 blob = blob "\n \"" 95 blob = blob part "\\0"; 101 blob = blob "\""; 106 blob [all...] |
/freebsd-10-stable/contrib/wpa/wpa_supplicant/ |
H A D | config_none.c | 35 struct wpa_config_blob *blob; local 46 for (blob = config->blobs; blob; blob = blob->next) {
|
H A D | config_file.c | 269 struct wpa_config_blob *blob; local 275 wpa_printf(MSG_MSGDUMP, "Line: %d - start of a new named blob '%s'", 288 "blob", *line); 298 wpa_printf(MSG_ERROR, "Line %d: blob was not terminated " 304 blob = os_zalloc(sizeof(*blob)); 305 if (blob == NULL) { 309 blob->name = os_strdup(name); 310 blob->data = base64_decode(encoded, encoded_len, &blob 326 struct wpa_config_blob *blob; local 760 wpa_config_write_blob(FILE *f, struct wpa_config_blob *blob) argument 985 struct wpa_config_blob *blob; local [all...] |
/freebsd-10-stable/contrib/dialog/ |
H A D | argv.c | 33 dlg_string_to_argv(char *blob) argument 37 size_t length = strlen(blob); 43 char *param = blob; 47 if (quoted && blob[n] == '"') { 49 } else if (blob[n] == '"') { 57 } else if (blob[n] == '\\') { 58 if (quoted && !isspace(UCH(blob[n + 1]))) { 60 *param++ = blob[n]; 61 *param++ = blob[n + 1]; 65 } else if (!quoted && isspace(UCH(blob[ [all...] |
H A D | prgbox.c | 40 char *blob; local 70 if ((blob = malloc(4 + strlen(command))) != 0) { 71 sprintf(blob, "-c %s", command); 72 argv = dlg_string_to_argv(blob);
|
H A D | editbox.c | 58 char *blob = 0; local 72 if ((blob = dlg_malloc(char, size + 1)) == 0) { 75 blob[size] = '\0'; 79 size = fread(blob, sizeof(char), size, fp); 87 (*list)[need] = blob + n; 90 if (blob[n] == '\n') { 94 blob[n] = '\0'; 111 free(blob);
|
/freebsd-10-stable/contrib/dtc/ |
H A D | fdtput.c | 170 static int store_key_value(char **blob, const char *node_name, argument 176 node = fdt_path_offset(*blob, node_name); 182 err = fdt_setprop(*blob, node, property, buf, len); 184 *blob = realloc_property(*blob, node, property, len); 185 err = fdt_setprop(*blob, node, property, buf, len); 200 * @param blob FDT blob to write into 204 static int create_paths(char **blob, const char *in_path) argument 220 node = fdt_subnode_offset_namelen(*blob, offse 247 create_node(char **blob, const char *node_name) argument 282 char *blob; local [all...] |
H A D | fdtget.c | 118 * @param blob FDT blob 122 static int list_properties(const void *blob, int node) argument 128 prop = fdt_first_property_offset(blob, node); 133 data = fdt_get_property_by_offset(blob, prop, NULL); 134 name = fdt_string(blob, fdt32_to_cpu(data->nameoff)); 137 prop = fdt_next_property_offset(blob, prop); 146 * @param blob FDT blob 150 static int list_subnodes(const void *blob, in argument 206 show_data_for_item(const void *blob, struct display_info *disp, int node, const char *property) argument 253 char *blob; local [all...] |
H A D | flattree.c | 373 struct data blob = empty_data; local 385 die("Unknown device tree blob version %d\n", version); 403 "Warning: blob size %d >= minimum size %d\n", 417 * Assemble the blob: start with the header, add with alignment 421 blob = data_append_data(blob, &fdt, vi->hdr_size); 422 blob = data_append_align(blob, 8); 423 blob = data_merge(blob, reservebu 810 char *blob; local [all...] |
H A D | util.h | 121 * @param blob Poiner to buffer containing fdt 124 int utilfdt_write(const char *filename, const void *blob); 132 * @param blob Poiner to buffer containing fdt 135 int utilfdt_write_err(const char *filename, const void *blob);
|
H A D | fdtdump.c | 42 static void dump_blob(void *blob, bool debug) argument 44 uintptr_t blob_off = (uintptr_t)blob; 45 struct fdt_header *bph = blob; 50 (struct fdt_reserve_entry *)((char *)blob + off_mem_rsvmap); 51 const char *p_struct = (const char *)blob + off_dt; 52 const char *p_strings = (const char *)blob + off_str; 189 /* try and locate an embedded fdt in a bigger blob */
|
H A D | util.c | 258 fprintf(stderr, "Couldn't open blob from '%s': %s\n", filename, 272 int utilfdt_write_err(const char *filename, const void *blob) argument 278 const char *ptr = blob; 286 totalsize = fdt_totalsize(blob); 304 int utilfdt_write(const char *filename, const void *blob) argument 306 int ret = utilfdt_write_err(filename, blob); 309 fprintf(stderr, "Couldn't write blob to '%s': %s\n", filename,
|
/freebsd-10-stable/crypto/openssh/regress/unittests/sshbuf/ |
H A D | test_sshbuf_getput_fuzz.c | 32 attempt_parse_blob(u_char *blob, size_t len) argument 48 ASSERT_INT_EQ(sshbuf_put(p1, blob, len), 0); 83 u_char blob[] = { local 119 TEST_START("fuzz blob parsing"); 122 FUZZ_TRUNCATE_START | FUZZ_TRUNCATE_END, blob, sizeof(blob)); 125 attempt_parse_blob(blob, sizeof(blob));
|
/freebsd-10-stable/crypto/openssh/ |
H A D | ssh-pkcs11-client.c | 110 u_char *blob, *signature = NULL; local 119 if (key_to_blob(&key, &blob, &blen) == 0) 123 buffer_put_string(&msg, blob, blen); 126 free(blob); 191 u_char *blob; local 209 blob = buffer_get_string(&msg, &blen); 211 k = key_from_blob(blob, blen); 214 free(blob);
|
H A D | krl.c | 76 u_char *blob; member in struct:revoked_blob 124 if ((r = memcmp(a->blob, b->blob, MIN(a->len, b->len))) != 0) 128 return memcmp(a->blob, b->blob, a->len); 174 free(rb->blob); 179 free(rb->blob); 361 /* Convert "key" to a public key blob without any certificate information */ 363 plain_key_blob(const struct sshkey *key, u_char **blob, size_t *blen) argument 376 r = sshkey_to_blob(kcopy, blob, ble 383 revoke_blob(struct revoked_blob_tree *rbt, u_char *blob, size_t len) argument 402 u_char *blob; local 415 u_char *blob; local 530 u_char *blob; local 810 const u_char *blob; local 930 const u_char *blob; local [all...] |
H A D | key.c | 95 key_from_blob(const u_char *blob, u_int blen) argument 100 if ((r = sshkey_from_blob(blob, blen, &ret)) != 0) { 111 u_char *blob; local 119 if ((r = sshkey_to_blob(key, &blob, &blen)) != 0) { 127 *blobp = blob; 278 key_private_deserialize(struct sshbuf *blob) argument 283 if ((r = sshkey_private_deserialize(blob, &ret)) != 0) { 310 key_load_file(int fd, const char *filename, struct sshbuf *blob) argument 314 if ((r = sshkey_load_file(fd, blob)) != 0) {
|
H A D | ssh-pkcs11-helper.c | 119 u_char *blob; local 130 if (key_to_blob(keys[i], &blob, &blen) == 0) 132 buffer_put_string(&msg, blob, blen); 134 free(blob); 170 u_char *blob, *data, *signature = NULL; local 176 blob = get_string(&blen); 180 if ((key = key_from_blob(blob, blen)) != NULL) { 204 free(blob);
|
H A D | authfd.c | 245 const u_char *blob; local 248 if ((r = sshbuf_get_string_direct(ids, &blob, &blen)) != 0 || 251 if ((r = sshkey_from_blob(blob, blen, keyp)) != 0) 449 u_char *blob = NULL, type; local 463 if ((r = sshkey_to_blob(key, &blob, &blen)) != 0) 467 (r = sshbuf_put_string(msg, blob, blen)) != 0 || 487 if (blob != NULL) { 488 explicit_bzero(blob, blen); 489 free(blob); 617 u_char type, *blob local [all...] |
H A D | monitor_wrap.c | 408 u_char *blob; local 414 /* Convert the key to a blob and the pass it over */ 415 if (!key_to_blob(key, &blob, &len)) 422 buffer_put_string(&m, blob, len); 424 free(blob); 453 u_char *blob; local 459 /* Convert the key to a blob and the pass it over */ 460 if (!key_to_blob(key, &blob, &len)) 464 buffer_put_string(&m, blob, len); 467 free(blob); 887 u_char *blob; local 923 u_char *blob; local 953 u_char *blob; local [all...] |
H A D | monitor.c | 623 monitor_allowed_key(u_char *blob, u_int bloblen) argument 627 timingsafe_bcmp(key_blob, blob, key_bloblen)) 1193 u_char *blob; local 1203 blob = buffer_get_string(m, &bloblen); 1206 key = key_from_blob(blob, bloblen); 1273 key_blob = blob; 1281 free(blob); 1423 u_char *signature, *data, *blob; local 1428 blob = buffer_get_string(m, &bloblen); 1433 !monitor_allowed_key(blob, bloble 1657 u_char *blob = NULL; local 1703 u_char *blob; local 1741 u_char *blob, *response; local [all...] |
H A D | sshkey.c | 749 /* Use the existing blob */ 873 u_char *blob = NULL, *ret = NULL; local 893 (blob = malloc(blob_len)) == NULL) { 897 BN_bn2bin(k->rsa->n, blob); 898 BN_bn2bin(k->rsa->e, blob + nlen); 900 } else if ((r = to_blob(k, &blob, &blob_len, 1)) != 0) 906 if ((r = ssh_digest_memory(dgst_alg, blob, blob_len, 919 if (blob != NULL) { 920 explicit_bzero(blob, blob_len); 921 free(blob); 1234 struct sshbuf *blob; local 2143 sshkey_from_blob(const u_char *blob, size_t blen, struct sshkey **keyp) argument 3022 sshkey_private_to_blob2(const struct sshkey *prv, struct sshbuf *blob, const char *passphrase, const char *comment, const char *ciphername, int rounds) argument 3175 sshkey_parse_private2(struct sshbuf *blob, int type, const char *passphrase, struct sshkey **keyp, char **commentp) argument 3402 sshkey_private_rsa1_to_blob(struct sshkey *key, struct sshbuf *blob, const char *passphrase, const char *comment) argument 3499 sshkey_private_pem_to_blob(struct sshkey *key, struct sshbuf *blob, const char *_passphrase, const char *comment) argument 3556 sshkey_private_to_fileblob(struct sshkey *key, struct sshbuf *blob, const char *passphrase, const char *comment, int force_new_format, const char *new_format_cipher, int new_format_rounds) argument 3590 sshkey_parse_public_rsa1_fileblob(struct sshbuf *blob, struct sshkey **keyp, char **commentp) argument 3648 sshkey_parse_private_rsa1(struct sshbuf *blob, const char *passphrase, struct sshkey **keyp, char **commentp) argument 3768 sshkey_parse_private_pem_fileblob(struct sshbuf *blob, int type, const char *passphrase, struct sshkey **keyp) argument 3860 sshkey_parse_private_fileblob_type(struct sshbuf *blob, int type, const char *passphrase, struct sshkey **keyp, char **commentp) argument [all...] |
/freebsd-10-stable/contrib/wpa/src/eap_peer/ |
H A D | eap_fast_pac.c | 264 if (os_strncmp(pac_file, "blob://", 7) == 0) { 265 const struct wpa_config_blob *blob; local 266 blob = eap_get_config_blob(sm, pac_file + 7); 267 if (blob == NULL) { 268 wpa_printf(MSG_INFO, "EAP-FAST: No PAC blob '%s' - " 274 rc->pos = (char *) blob->data; 275 rc->end = (char *) blob->data + blob->len; 407 * @pac_file: Name of the PAC file/blob to load 536 if (os_strncmp(pac_file, "blob 537 struct wpa_config_blob *blob; local 751 const struct wpa_config_blob *blob = NULL; local [all...] |
/freebsd-10-stable/contrib/dtc/Documentation/ |
H A D | dtc-paper.tex | 48 The ``blob'' representing the device tree can be created using \dtc 51 the kernel. The compiler can produce either a binary ``blob'' or an 114 compact, flattened format. The resulting device tree ``blob'' is then 116 its runtime form. This blob is the only data communicated between the 122 device tree blob must be passed in from outside, rather than generated 124 \texttt{kexec} tools build the blob from the runtime device tree 125 before invoking the new kernel. For embedded systems the blob can 137 move the blob around as a whole, without needing to parse or adjust 139 within the blob. 144 practice this means limiting the use of internal offsets in the blob [all...] |
/freebsd-10-stable/contrib/wpa/wpa_supplicant/dbus/ |
H A D | dbus_old_handlers.c | 1325 struct wpa_config_blob *blob; local 1347 blob = os_zalloc(sizeof(*blob)); 1348 if (blob == NULL) { 1351 "Not enough memory to add blob."); 1354 blob->data = os_zalloc(entry.array_len); 1355 if (blob->data == NULL) { 1358 "Not enough memory to add blob data."); 1359 os_free(blob); 1363 blob [all...] |
/freebsd-10-stable/contrib/wpa/wpa_supplicant/examples/ |
H A D | wpas-dbus-new-signals.py | 99 def blobAdded(blob): 100 print "BlobAdded(%s)" % (blob) 102 def blobRemoved(blob): 103 print "BlobRemoved(%s)" % (blob)
|