/freebsd-10.0-release/crypto/openssh/ |
H A D | ssh-dss.c | 53 u_int rlen, slen, len, dlen; local 73 rlen = BN_num_bytes(sig->r); 75 if (rlen > INTBLOB_LEN || slen > INTBLOB_LEN) { 76 error("bad sig size %u %u", rlen, slen); 81 BN_bn2bin(sig->r, sigblob+ SIGBLOB_LEN - INTBLOB_LEN - rlen); 117 int rlen, ret; local 145 rlen = buffer_len(&b); 147 if (rlen != 0) { 149 "remaining bytes in signature %d", rlen);
|
H A D | ssh-ecdsa.c | 104 int rlen, ret; local 127 rlen = buffer_len(&b); 129 if (rlen != 0) { 130 error("%s: remaining bytes in signature %d", __func__, rlen);
|
H A D | mac.c | 99 size_t nlen, rlen = 0; local 104 ret[rlen++] = '\n'; 106 ret = xrealloc(ret, 1, rlen + nlen + 2); 107 memcpy(ret + rlen, m->name, nlen + 1); 108 rlen += nlen;
|
/freebsd-10.0-release/contrib/tcpdump/ |
H A D | print-forces.c | 75 u_int rlen; local 83 rlen = len - TLV_HDRL; 94 hex_print_with_offset(ib, tdp, rlen, 0); 108 u_int rlen; local 116 rlen = len; 118 while (rlen != 0) { 122 invilv = ilv_valid(ilv, rlen); 125 hex_print_with_offset(ib, tdp, rlen, 0); 136 ilv = GO_NXT_ILV(ilv, rlen); 151 u_int rlen; local 645 u_int rlen; local 673 u_int rlen; local 714 u_int rlen; local 760 u_int rlen; local 824 u_int rlen; local 899 u_int rlen; local [all...] |
H A D | forces.h | 435 #define GO_NXT_TLV(tlv,rlen) ((rlen) -= F_ALN_LEN(EXTRACT_16BITS(&(tlv)->length)), \ 442 #define GO_NXT_ILV(ilv,rlen) ((rlen) -= F_ALN_LEN(EXTRACT_32BITS(&(ilv)->length)), \ 458 static inline int tlv_valid(const struct forces_tlv *tlv, u_int rlen) argument 460 if (rlen < TLV_HDRL) 464 if (EXTRACT_16BITS(&tlv->length) > rlen) 466 if (rlen < F_ALN_LEN(EXTRACT_16BITS(&tlv->length))) 472 static inline int ilv_valid(const struct forces_ilv *ilv, u_int rlen) argument 474 if (rlen < ILV_HDR [all...] |
/freebsd-10.0-release/sys/boot/uboot/lib/ |
H A D | net.c | 169 int err, rlen; local 176 err = ub_dev_recv(sc->sc_handle, sc->sc_rxbuf, len, &rlen); 181 rlen = 0; 184 } while ((rlen == -1 || rlen == 0) && (getsecs() - t < timeout)); 187 printf("net_get: received len %d (%x)\n", rlen, rlen); 190 if (rlen > 0) { 191 memcpy(pkt, sc->sc_rxbuf, MIN(len, rlen)); 192 if (rlen ! [all...] |
H A D | glue.c | 327 lbasize_t *rlen) 340 if (!err && rlen) 341 *rlen = act_len; 360 ub_dev_recv(int handle, void *buf, int len, int *rlen) argument 373 *rlen = act_len; 326 ub_dev_read(int handle, void *buf, lbasize_t len, lbastart_t start, lbasize_t *rlen) argument
|
/freebsd-10.0-release/share/examples/libusb20/ |
H A D | bulk.c | 120 uint32_t rlen; local 124 if ((rv = libusb20_tr_bulk_intr_sync(xfr_out, out_buf, out_len, &rlen, TIMEOUT)) 129 printf("sent %d bytes\n", rlen); 132 if ((rv = libusb20_tr_bulk_intr_sync(xfr_in, in_buf, BUFLEN, &rlen, TIMEOUT)) 137 printf("received %d bytes\n", rlen); 138 if (rlen > 0) 139 print_formatted(in_buf, rlen);
|
H A D | control.c | 163 uint32_t rlen; local 165 if ((rv = libusb20_tr_bulk_intr_sync(xfr_intr, in_buf, BUFLEN, &rlen, TIMEOUT)) 170 printf("received %d bytes\n", rlen); 171 if (rlen > 0) 172 print_formatted(in_buf, rlen);
|
/freebsd-10.0-release/contrib/wpa/src/eap_server/ |
H A D | eap_server_gtc.c | 98 size_t rlen; local 100 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_GTC, respData, &rlen); 101 if (pos == NULL || rlen < 1) 104 wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-GTC: Response", pos, rlen); 110 if (rlen < 10) { 117 end = pos + rlen; 162 rlen = end - pos; 165 pos, rlen); 177 if (rlen != sm->user->password_len || 178 os_memcmp(pos, sm->user->password, rlen) ! [all...] |
/freebsd-10.0-release/usr.bin/tip/libacu/ |
H A D | hayes.c | 275 rlen = read(FD, dumbuf, min(len, DUMBUFLEN)); 276 dumbuf[rlen] = '\0'; 277 printf("read (%d): %s\r\n", rlen, dumbuf); 284 rlen = read(FD, dumbuf, min(len, DUMBUFLEN)); 285 dumbuf[rlen] = '\0'; 286 printf("read (%d): %s\r\n", rlen, dumbuf);
|
/freebsd-10.0-release/contrib/subversion/subversion/libsvn_repos/ |
H A D | load.c | 311 apr_size_t num_to_read, rlen, wlen; 342 rlen = buflen; 344 rlen = (apr_size_t) content_length; 346 num_to_read = rlen; 347 SVN_ERR(svn_stream_read(stream, buffer, &rlen)); 348 content_length -= rlen; 349 if (rlen != num_to_read) 355 wlen = rlen; 357 if (wlen != rlen) 638 apr_size_t rlen, num_to_rea 310 apr_size_t num_to_read, rlen, wlen; local 636 apr_size_t rlen, num_to_read; local [all...] |
/freebsd-10.0-release/lib/libc/iconv/ |
H A D | citrus_memstream.c | 44 size_t * __restrict rlen) 63 *rlen = ret; 71 const char * __restrict key, size_t * __restrict rlen, int iscasesensitive) 108 *rlen = len; 43 _citrus_memory_stream_getln(struct _citrus_memory_stream * __restrict ms, size_t * __restrict rlen) argument 70 _citrus_memory_stream_matchline(struct _citrus_memory_stream * __restrict ms, const char * __restrict key, size_t * __restrict rlen, int iscasesensitive) argument
|
/freebsd-10.0-release/sys/contrib/ia64/libuwx/src/ |
H A D | uwx_uinfo.h | 40 unsigned int rlen; /* length of region (# instruction slots) */ member in struct:uwx_rhdr
|
H A D | uwx_trace.c | 134 (int)cur_slot, (int)rhdr->rlen); 137 cur_slot, (int)rhdr->rlen, rhdr->ecount); 138 if (ip_slot < rhdr->rlen)
|
/freebsd-10.0-release/contrib/wpa/src/tls/ |
H A D | tlsv1_server_write.c | 47 size_t rlen; local 142 &rlen) < 0) { 148 pos = rhdr + rlen; 160 size_t rlen; local 227 &rlen) < 0) { 233 pos = rhdr + rlen; 249 size_t rlen; local 419 &rlen) < 0) { 425 pos = rhdr + rlen; 439 size_t rlen; local 505 size_t rlen; local 541 size_t rlen; local 575 size_t rlen, hlen; local [all...] |
H A D | tlsv1_record.c | 282 size_t i, rlen, hlen; local 299 rlen = WPA_GET_BE16(in_data + 3); 301 "length %d", ct, in_data[1], in_data[2], (int) rlen); 316 if (TLS_RECORD_HEADER_LEN + rlen > 18432) { 318 (unsigned long) (TLS_RECORD_HEADER_LEN + rlen)); 326 if (rlen > in_len) { 328 "(rlen=%lu > in_len=%lu)", 329 (unsigned long) rlen, (unsigned long) in_len); 334 in_data, rlen); 346 in_len = rlen; [all...] |
H A D | tlsv1_client_write.c | 133 size_t rlen; local 192 &rlen) < 0) { 198 pos = rhdr + rlen; 375 size_t rlen; local 414 &rlen) < 0) { 420 pos = rhdr + rlen; 433 size_t rlen, hlen, clen; local 591 &rlen) < 0) { 597 pos = rhdr + rlen; 610 size_t rlen; local 644 size_t rlen, hlen; local [all...] |
/freebsd-10.0-release/sys/boot/i386/libi386/ |
H A D | biospnp.c | 191 u_int tag, i, rlen, dlen; local 198 for (i = 0; i < dlen; i+= rlen) { 202 rlen = PNP_SRES_LEN(tag); 216 rlen = *(u_int16_t *)(p + i); 222 str = malloc(rlen + 1); 223 bcopy(p + i, str, rlen); 224 str[rlen] = 0;
|
/freebsd-10.0-release/usr.sbin/ppp/ |
H A D | vjcomp.c | 118 int len, olen, rlen; local 146 rlen = len; 148 bp = mbuf_Read(bp, bufp, rlen); 156 len += rlen;
|
/freebsd-10.0-release/lib/libdevinfo/ |
H A D | devinfo.c | 174 size_t oidlen, rlen; local 211 rlen = sizeof(udev); 212 error = sysctl(oid, oidlen, &udev, &rlen, NULL, 0); 257 size_t oidlen, rlen; local 296 rlen = sizeof(urman); 297 error = sysctl(oid, oidlen, &urman, &rlen, NULL, 0); 325 rlen = sizeof(ures); 326 error = sysctl(oid, oidlen, &ures, &rlen, NULL, 0);
|
/freebsd-10.0-release/contrib/smbfs/lib/smb/ |
H A D | rap.c | 56 smb_rap_parserqparam(const char *s, char **next, int *rlen) argument 87 *rlen = len; 93 smb_rap_parserpparam(const char *s, char **next, int *rlen) argument 117 *rlen = len; 123 smb_rap_parserpdata(const char *s, char **next, int *rlen) argument 148 *rlen = len;
|
/freebsd-10.0-release/libexec/rtld-elf/mips/ |
H A D | reloc.c | 204 const size_t rlen = local 208 Elf_Sxword old = load_ptr(where, rlen); 221 store_ptr(where, val, rlen); 401 const size_t rlen = local 405 Elf_Sxword old = load_ptr(where, rlen); 447 store_ptr(where, val, rlen); 458 const size_t rlen = sizeof(Elf_Addr); local 459 Elf_Addr old = load_ptr(where, rlen); 469 store_ptr(where, val, rlen); 482 const size_t rlen local 509 const size_t rlen = sizeof(Elf_Addr); local [all...] |
/freebsd-10.0-release/contrib/ntp/clockstuff/ |
H A D | clktest.c | 289 int rlen; local 294 rlen = read(fd, raw, sizeof(raw)); 295 if (rlen < 0) { 300 if (rlen == 0) { 307 rpend = &raw[rlen];
|
/freebsd-10.0-release/lib/libfetch/ |
H A D | common.c | 530 size_t rlen) 537 if ((raddr = fetch_ssl_get_numeric_addrinfo(r, rlen)) == NULL) 898 ssize_t rlen; local 901 rlen = SSL_read(ssl, buf, len); 902 if (rlen < 0) { 903 ssl_err = SSL_get_error(ssl, rlen); 912 return (rlen); 946 ssize_t rlen; local 948 rlen = read(sd, buf, len); 949 if (rlen < 529 fetch_ssl_ipaddr_match(const struct addrinfo *laddr, const char *r, size_t rlen) argument 966 ssize_t rlen, total; local [all...] |