/netbsd-6-1-5-RELEASE/lib/libc/string/ |
H A D | memmem.c | 47 memmem(const void *block, size_t blen, const void *pat, size_t plen) argument 58 if (plen == 0) 61 if (blen < plen) 66 endp = bp + (blen - plen) + 1; 74 if ((*bp == *pp) && (memcmp(bp, pp, plen) == 0))
|
/netbsd-6-1-5-RELEASE/gnu/dist/gettext/gettext-tools/lib/ |
H A D | tmpdir.c | 99 size_t dlen, plen; local 104 plen = 4; 108 plen = strlen (pfx); 109 if (plen > 5) 110 plen = 5; 141 if (tmpl_len < dlen + 1 + plen + 6 + 1) 147 sprintf (tmpl, "%.*s/%.*sXXXXXX", (int) dlen, dir, (int) plen, pfx);
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/bin/tests/sockaddr/ |
H A D | t_sockaddr.c | 86 unsigned int plen; local 101 if (isc_netaddr_masktoprefixlen(&ina_a, &plen) != ISC_R_SUCCESS) 103 if (plen != 0) 106 if (isc_netaddr_masktoprefixlen(&ina_b, &plen) != ISC_R_SUCCESS) 108 if (plen != 31) 111 if (isc_netaddr_masktoprefixlen(&ina_c, &plen) != ISC_R_SUCCESS) 113 if (plen != 32) 116 if (isc_netaddr_masktoprefixlen(&ina_d, &plen) != ISC_R_SUCCESS) 118 if (plen != 24)
|
/netbsd-6-1-5-RELEASE/dist/ipf/lib/ |
H A D | printpacket6.c | 21 u_short plen, *addrs; local 30 plen = ntohs(*((u_short *)buf +2)); 33 printf("ip6/%d %d %#x %d", buf[0] & 0xf, plen, flow, p); 38 if (plen >= 4) 47 if (plen >= 4)
|
H A D | ipft_sn.c | 103 int n, plen, ilen; local 109 plen = (int)ntohl(rec->sp_plen); 110 if (ilen > plen || plen < sizeof(*rec)) 113 plen -= sizeof(*rec); 114 n = MIN(plen, ilen); 118 return plen;
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/crypto/ |
H A D | sha1-pbkdf2.c | 85 size_t left = buflen, plen; local 93 plen = left > SHA1_MAC_LEN ? SHA1_MAC_LEN : left; 94 os_memcpy(pos, digest, plen); 95 pos += plen; 96 left -= plen;
|
H A D | sha1-tprf.c | 39 size_t pos, plen; local 62 plen = buf_len - pos; 65 if (plen >= SHA1_MAC_LEN) { 69 os_memcpy(&buf[pos], hash, plen);
|
H A D | sha1.c | 131 size_t pos, plen; local 146 plen = buf_len - pos; 147 if (plen >= SHA1_MAC_LEN) { 156 os_memcpy(&buf[pos], hash, plen);
|
H A D | sha256.c | 126 size_t pos, plen; local 144 plen = buf_len - pos; 146 if (plen >= SHA256_MAC_LEN) { 152 os_memcpy(&buf[pos], hash, plen);
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/asn1/ |
H A D | bio_ndef.c | 96 static int ndef_prefix(BIO *b, unsigned char **pbuf, int *plen, void *parg); 97 static int ndef_prefix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg); 98 static int ndef_suffix(BIO *b, unsigned char **pbuf, int *plen, void *parg); 99 static int ndef_suffix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg); 155 static int ndef_prefix(BIO *b, unsigned char **pbuf, int *plen, void *parg) argument 175 *plen = *ndef_aux->boundary - *pbuf; 180 static int ndef_prefix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg) argument 194 *plen = 0; 198 static int ndef_suffix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg) argument 201 if (!ndef_prefix_free(b, pbuf, plen, par 208 ndef_suffix(BIO *b, unsigned char **pbuf, int *plen, void *parg) argument [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/libarchive/dist/cpio/test/ |
H A D | test_option_help.c | 50 size_t plen; local 58 p = slurpfile(&plen, "help.stdout"); 60 assert(plen >= 7);
|
/netbsd-6-1-5-RELEASE/external/bsd/libarchive/dist/tar/test/ |
H A D | test_help.c | 50 size_t plen; local 58 p = slurpfile(&plen, "help.stdout"); 60 assert(plen >= 6);
|
/netbsd-6-1-5-RELEASE/lib/libc/db/btree/ |
H A D | bt_overflow.c | 87 uint32_t sz, nb, plen; local 112 plen = (uint32_t)temp; 117 nb = MIN(sz, plen); 144 uint32_t sz, nb, plen; local 153 plen = (uint32_t)temp; 159 for (;; p = (char *)p + plen, last = h) { 168 nb = MIN(sz, plen); 200 uint32_t sz, plen; local 222 plen = (uint32_t)temp; 223 for (;; sz -= plen) { [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/evp/ |
H A D | e_rc4_hmac_md5.c | 127 size_t plen = key->payload_length; local 129 if (plen!=NO_PAYLOAD_LENGTH && len!=(plen+MD5_DIGEST_LENGTH)) return 0; 132 if (plen==NO_PAYLOAD_LENGTH) plen = len; 137 if (plen>md5_off && (blocks=(plen-md5_off)/MD5_CBLOCK) && 155 MD5_Update(&key->md,in+md5_off,plen-md5_off); 157 if (plen!=len) { /* "TLS" mode of operation */ 159 memcpy(out+rc4_off,in+rc4_off,plen [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_common/ |
H A D | eap_peap_common.c | 26 size_t pos, plen; local 77 plen = buf_len - pos; 79 if (plen >= SHA1_MAC_LEN) { 83 os_memcpy(&buf[pos], hash, plen);
|
H A D | eap_common.h | 21 const struct wpabuf *msg, size_t *plen);
|
/netbsd-6-1-5-RELEASE/usr.bin/find/ |
H A D | misc.c | 65 int nlen, plen, rest; local 68 plen = strlen(path); 75 while ((p - *store) + plen + rest + 1 > nlen) 85 memmove(p, path, plen); 86 p += plen;
|
/netbsd-6-1-5-RELEASE/external/bsd/tcpdump/dist/ |
H A D | print-bgp.c | 500 u_int plen; local 503 plen = pptr[0]; 504 if (32 < plen) 508 TCHECK2(pptr[1], (plen + 7) / 8); 509 memcpy(&addr, &pptr[1], (plen + 7) / 8); 510 if (plen % 8) { 511 ((u_char *)&addr)[(plen + 7) / 8 - 1] &= 512 ((0xff00 >> (plen % 8)) & 0xff); 514 snprintf(buf, buflen, "%s/%d", getname((u_char *)&addr), plen); 515 return 1 + (plen 525 u_int plen; local 706 u_int plen; local 743 u_int plen; local 953 int plen,tlen,strlen,tlv_type,tlv_len,ttlv_len; local 1020 u_int plen; local 1045 u_int plen; local 1082 u_int plen; local 1121 u_int plen; local 1150 u_int plen; local [all...] |
/netbsd-6-1-5-RELEASE/dist/smbfs/lib/smb/ |
H A D | rap.c | 166 smb_rap_rqparam(struct smb_rap *rap, char ptype, char plen, long value) argument 182 memset(p, value, plen); 183 len = plen; 198 int plen, len; local 212 if (smb_rap_parserqparam(p, &p, &plen) != 0) 214 len += plen; 239 int error, plen; local 241 error = smb_rap_parserqparam(p, &p, &plen); 251 error = smb_rap_rqparam(rap, ptype, plen, value); 265 int error, plen; local 286 int error, plen; local [all...] |
/netbsd-6-1-5-RELEASE/sys/netinet6/ |
H A D | ah_output.c | 151 size_t plen = 0; /* AH payload size in bytes */ local 152 size_t ahlen = 0; /* plen + sizeof(ah) */ 187 plen = ((*algo->sumsiz)(sav) + 3) & ~(4 - 1); /* XXX pad to 8byte? */ 188 ahlen = plen + sizeof(struct ah); 191 plen = ((*algo->sumsiz)(sav) + 3) & ~(4 - 1); /* XXX pad to 8byte? */ 192 ahlen = plen + sizeof(struct newah); 234 ahdr->ah_len = plen >> 2; 238 memset(ahdr + 1, 0, plen); 244 ahdr->ah_len = (plen >> 2) + 1; /* plus one for seq# */ 265 memset(ahdr + 1, 0, plen); 331 int plen, ahlen; local 363 size_t plen; /* AH payload size in bytes */ local [all...] |
H A D | ipcomp_output.c | 97 * complen plen 113 size_t plen0, plen; /* payload length to be compressed */ local 150 plen = 0; 152 plen += n->m_len; 155 if (plen < algo->minplen) 176 plen0 = plen; 196 if ((*algo->compress)(m, md, &plen) || mprev->m_next == NULL) { 210 if (plen0 < plen) { 224 m->m_pkthdr.len += plen; 254 compoff = m->m_pkthdr.len - plen; [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_peer/ |
H A D | eap_gtc.c | 57 size_t password_len, identity_len, len, plen; local 104 plen = password_len; 109 plen += 9 + identity_len + 1; 110 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen, 122 1, plen);
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/rsa/ |
H A D | rsa_test.c | 219 int plen; local 230 plen = sizeof(ptext_ex) - 1; 248 num = RSA_public_encrypt(plen, ptext_ex, ctext, key, 259 if (num != plen || memcmp(ptext, ptext_ex, num) != 0) 269 num = RSA_public_encrypt(plen, ptext_ex, ctext, key, 285 if (num != plen || memcmp(ptext, ptext_ex, num) != 0) 299 if (num != plen || memcmp(ptext, ptext_ex, num) != 0)
|
/netbsd-6-1-5-RELEASE/external/gpl2/xcvs/dist/lib/ |
H A D | tempname.c | 134 size_t dlen, plen; local 139 plen = 4; 143 plen = strlen (pfx); 144 if (plen > 5) 145 plen = 5; 176 if (tmpl_len < dlen + 1 + plen + 6 + 1) 182 sprintf (tmpl, "%.*s/%.*sXXXXXX", (int) dlen, dir, (int) plen, pfx);
|
/netbsd-6-1-5-RELEASE/dist/nvi/common/ |
H A D | search.c | 42 search_init(SCR *sp, dir_t dir, CHAR_T *ptrn, size_t plen, CHAR_T **epp, u_int flags) argument 70 if (plen == 1) { 104 if (--plen == 0 || p[0] == delim) { 105 if (plen != 0) 109 if (plen > 1 && p[0] == '\\' && p[1] == delim) { 111 --plen; 117 plen = t - ptrn; 121 if (re_compile(sp, ptrn, plen, &sp->re, &sp->re_len, &sp->re_c, 141 f_search(SCR *sp, MARK *fm, MARK *rm, CHAR_T *ptrn, size_t plen, CHAR_T **eptrn, u_int flags) argument 150 if (search_init(sp, FORWARD, ptrn, plen, eptr 285 b_search(SCR *sp, MARK *fm, MARK *rm, CHAR_T *ptrn, size_t plen, CHAR_T **eptrn, u_int flags) argument [all...] |