/freebsd-10-stable/sys/contrib/octeon-sdk/ |
H A D | cvmx-mgmt-port.h | 154 * @param buffer_len Size of the buffer to receive the packet into 160 extern int cvmx_mgmt_port_receive(int port, int buffer_len, uint8_t *buffer);
|
H A D | cvmx-mgmt-port.c | 639 * @param buffer_len Size of the buffer to receive the packet into 645 int cvmx_mgmt_port_receive(int port, int buffer_len, uint8_t *buffer) argument 655 if (buffer_len < 1) 684 if (length > buffer_len) 685 length = buffer_len; 690 buffer_len -= length; 709 if (buffer_len >= state->rx_ring[state->rx_read_index].s.len) 718 cvmx_dprintf("ERROR: cvmx_mgmt_port_receive: Packet (%d) larger than supplied buffer (%d)\n", state->rx_ring[state->rx_read_index].s.len, buffer_len);
|
/freebsd-10-stable/contrib/file/src/ |
H A D | vasprintf.c | 141 size_t buffer_len; /* length of output buffer */ member in struct:__anon147 159 if (len + ALLOC_SECURITY_MARGIN + s->real_len > s->buffer_len) { 169 s->buffer_len = len; 171 (s->buffer_base)[s->buffer_len - 1] = 1; /* overflow marker */ 220 assert((s->buffer_base)[s->buffer_len - 1] == 1); 576 s->buffer_len = 0;
|
/freebsd-10-stable/crypto/openssh/ |
H A D | serverloop.c | 198 while (buffer_len(&stderr_buffer) > 0 && 200 len = buffer_len(&stderr_buffer); 227 while (buffer_len(&stdout_buffer) > 0 && 229 len = buffer_len(&stdout_buffer); 323 if (buffer_len(&stdin_buffer) < buffer_high && 341 if (fdin != -1 && buffer_len(&stdin_buffer) > 0) 482 dlen = buffer_len(&stdin_buffer); 524 if (buffer_len(&stdout_buffer) > 0) { 527 buffer_len(&stdout_buffer)); 530 stdout_bytes += buffer_len( [all...] |
H A D | nchan.c | 156 if (buffer_len(&c->input)) { 220 if (buffer_len(&c->output)) { 414 buffer_len(&c->output) == 0 && 457 buffer_len(&c->extended) > 0) { 459 c->self, c->efd, buffer_len(&c->extended));
|
H A D | ssh-pkcs11-helper.c | 106 int mlen = buffer_len(m); 219 buf_len = buffer_len(&iqueue); 251 if (buf_len < buffer_len(&iqueue)) { 255 consumed = buf_len - buffer_len(&iqueue); 321 olen = buffer_len(&oqueue);
|
H A D | clientloop.c | 526 while (buffer_len(&stdin_buffer) > 0 && 528 len = buffer_len(&stdin_buffer); 537 if (stdin_eof && buffer_len(&stdin_buffer) == 0) { 630 if (buffer_len(&stdout_buffer) < buffer_high && 631 buffer_len(&stderr_buffer) < buffer_high && 642 if (buffer_len(&stdout_buffer) > 0) 644 if (buffer_len(&stderr_buffer) > 0) 726 if (buffer_len(bout) > 0) 728 buffer_len(bout)); 729 if (buffer_len(ber [all...] |
H A D | channels.h | 203 buffer_len(&c->extended) > 0)) 207 buffer_len(&c->extended) > 0))
|
H A D | ssh-pkcs11-client.c | 54 int mlen = buffer_len(m); 59 buffer_len(m)) != buffer_len(m))
|
H A D | channels.c | 517 buffer_len(&c->input) > packet_get_maxsize()) { 519 c->self, buffer_len(&c->input)); 523 if (buffer_len(&c->output) > packet_get_maxsize()) { 525 c->self, buffer_len(&c->output), 671 c->istate, buffer_len(&c->input), 672 c->ostate, buffer_len(&c->output), 840 if (buffer_len(&c->input) < packet_get_maxsize()) 842 if (buffer_len(&c->output) > 0) 853 buffer_len(&c->input) < limit && 858 if (buffer_len( [all...] |
H A D | buffer.h | 34 #define buffer_len(b) ((u_int) sshbuf_len(b)) macro
|
H A D | gss-genr.c | 132 ret = xmalloc(buffer_len(&b)); 133 buffer_get(&b, ret, buffer_len(&b));
|
H A D | ttymodes.c | 337 packet_put_string(buffer_ptr(&buf), buffer_len(&buf)); 339 packet_put_raw(buffer_ptr(&buf), buffer_len(&buf));
|
H A D | compat.c | 268 if (buffer_len(&b) > 0)
|
H A D | mux.c | 289 while (buffer_len(m) > 0) { 344 while (buffer_len(m) > 0) { 650 buffer_put_string(&c->output, buffer_ptr(&out), buffer_len(&out)); 1071 buffer_put_string(&cc->output, buffer_ptr(&reply), buffer_len(&reply)); 1137 buffer_len(&out)); 1157 __func__, c->self, type, buffer_len(&in)); 1185 if (buffer_len(&out) != 0) { 1187 buffer_len(&out)); 1214 buffer_put_string(&mux_chan->output, buffer_ptr(&m), buffer_len(&m)); 1235 buffer_put_string(&mux_chan->output, buffer_ptr(&m), buffer_len( [all...] |
H A D | monitor.c | 515 buffer_ptr(&logmsg), buffer_len(&logmsg)) != buffer_len(&logmsg)) { 533 buffer_ptr(&logmsg), buffer_len(&logmsg)) != buffer_len(&logmsg)) 1079 buffer_put_string(m, buffer_ptr(&loginmsg), buffer_len(&loginmsg)); 1312 len = buffer_len(&b); 1353 if (buffer_len(&b) != 0) 1413 if (buffer_len(&b) != 0) 1554 buffer_put_string(m, buffer_ptr(&loginmsg), buffer_len(&loginmsg)); 1641 if (buffer_len( [all...] |
H A D | monitor_wrap.c | 114 put_u32(buffer_ptr(&log_msg), buffer_len(&log_msg) - 4); 116 buffer_len(&log_msg)) != buffer_len(&log_msg)) 134 u_int mlen = buffer_len(m); 212 debug3("%s: remaining %d", __func__, buffer_len(&m));
|
H A D | auth2.c | 358 if (buffer_len(&loginmsg) > 0) { 450 if (buffer_len(&b) > 0)
|
H A D | auth1.c | 342 len = buffer_len(&loginmsg);
|
H A D | auth2-gss.c | 274 gssbuf.length = buffer_len(&b);
|
H A D | auth2-chall.c | 120 if (buffer_len(&b) > 0)
|
/freebsd-10-stable/usr.sbin/keyserv/ |
H A D | crypt_server.c | 82 static void arcfour(unsigned char *buffer_ptr,int buffer_len,arcfour_key * key); 110 static void arcfour(unsigned char *buffer_ptr, int buffer_len, arcfour_key *key) argument 122 for(counter = 0; counter < buffer_len; counter ++)
|
/freebsd-10-stable/contrib/ntp/sntp/libevent/ |
H A D | evbuffer-internal.h | 176 size_t buffer_len; member in struct:evbuffer_chain
|
H A D | buffer.c | 130 0 : (ch)->buffer_len - ((ch)->misalign + (ch)->off)) 182 chain->buffer_len = to_alloc - EVBUFFER_CHAIN_SIZE; 219 chain->buffer_len, 928 tmp->buffer_len = chain->buffer_len; 1389 } else if (chain->buffer_len - chain->misalign >= (size_t)size) { 1750 remain = chain->buffer_len - (size_t)chain->misalign - chain->off; 1777 to_alloc = chain->buffer_len; 1843 chain->misalign = chain->buffer_len; 1877 EVUTIL_ASSERT(datlen <= tmp->buffer_len); [all...] |
/freebsd-10-stable/contrib/dialog/ |
H A D | textbox.c | 43 long buffer_len; member in struct:__anon909 121 * buffer_len, fd_bytes_read, bytes_read are modified 156 if (obj->bytes_read > obj->buffer_len) { 163 obj->buffer_len = obj->bytes_read; 166 obj->buf = xalloc((size_t) obj->buffer_len + 1);
|