/netbsd-current/sbin/gpt/ |
H A D | restore.c | 128 restore_ent(gpt_t gpt, prop_dictionary_t gpt_dict, void *secbuf, u_int gpt_size, argument 166 memcpy((char *)secbuf + gpt->secsz + ((i - 1) * sizeof(ent)), 187 void *secbuf = NULL; local 276 if ((secbuf = calloc(gpt_size + 1, gpt->secsz)) == NULL) { 286 if (write(gpt->fd, secbuf, gpt->secsz) != (ssize_t)gpt->secsz) { 296 if (write(gpt->fd, secbuf, gpt->secsz) != (ssize_t)gpt->secsz) { 302 mbr = secbuf; 330 if (restore_ent(gpt, gpt_dict, secbuf, gpt_size, entries) == -1) 337 write(gpt->fd, (char *)secbuf + gpt->secsz, len) != (ssize_t) len) { 343 write(gpt->fd, (char *)secbuf [all...] |
/netbsd-current/sys/arch/vax/vax/ |
H A D | crx.c | 146 char secbuf[512]; local 186 error = uiomove(secbuf, 512, uio); 190 for (cp = secbuf, i = 512; --i >= 0;) 225 for (cp = secbuf, i = 512; --i >= 0;) 227 error = uiomove(secbuf, 512, uio);
|
/netbsd-current/external/bsd/ntp/dist/libntp/ |
H A D | authreadkeys.c | 96 u_char secbuf[1]; /* begin of secret (formal only)*/ member in struct:keydata 270 memcpy(next->secbuf, token, len); 300 memcpy(next->secbuf, keystr, len); 396 next->secbuf, next->seclen, next->keyacclist);
|
/netbsd-current/sys/arch/mac68k/obio/ |
H A D | iwmreg.h | 104 unsigned char *secbuf; /* ptr to one sector buffer */ member in struct:cylCacheSlot
|
H A D | iwm_fd.c | 1163 memcpy(fd->current_buffer, fd->r_slots[i].secbuf, 1235 fd->w_slots[i].secbuf = fd->current_buffer; 1294 fd->w_slots[i].secbuf = NULL; 1643 fd->w_slots[i].secbuf = NULL; 1646 fd->r_slots[i].secbuf = fd->cbuf + i * secsize;
|
/netbsd-current/external/gpl3/binutils/dist/bfd/ |
H A D | ihex.c | 358 char secbuf[20]; local 363 sprintf (secbuf, ".sec%d", bfd_count_sections (abfd) + 1); 364 amt = strlen (secbuf) + 1; 368 strcpy (secname, secbuf);
|
H A D | srec.c | 550 char secbuf[20]; local 555 sprintf (secbuf, ".sec%d", bfd_count_sections (abfd) + 1); 556 amt = strlen (secbuf) + 1; 558 strcpy (secname, secbuf);
|
/netbsd-current/external/gpl3/binutils.old/dist/bfd/ |
H A D | ihex.c | 358 char secbuf[20]; local 363 sprintf (secbuf, ".sec%d", bfd_count_sections (abfd) + 1); 364 amt = strlen (secbuf) + 1; 368 strcpy (secname, secbuf);
|
H A D | srec.c | 551 char secbuf[20]; local 556 sprintf (secbuf, ".sec%d", bfd_count_sections (abfd) + 1); 557 amt = strlen (secbuf) + 1; 559 strcpy (secname, secbuf);
|
/netbsd-current/external/gpl3/gdb.old/dist/bfd/ |
H A D | ihex.c | 358 char secbuf[20]; local 363 sprintf (secbuf, ".sec%d", bfd_count_sections (abfd) + 1); 364 amt = strlen (secbuf) + 1; 368 strcpy (secname, secbuf);
|
H A D | srec.c | 550 char secbuf[20]; local 555 sprintf (secbuf, ".sec%d", bfd_count_sections (abfd) + 1); 556 amt = strlen (secbuf) + 1; 558 strcpy (secname, secbuf);
|
/netbsd-current/external/gpl3/gdb/dist/bfd/ |
H A D | ihex.c | 358 char secbuf[20]; local 363 sprintf (secbuf, ".sec%d", bfd_count_sections (abfd) + 1); 364 amt = strlen (secbuf) + 1; 368 strcpy (secname, secbuf);
|
H A D | srec.c | 550 char secbuf[20]; local 555 sprintf (secbuf, ".sec%d", bfd_count_sections (abfd) + 1); 556 amt = strlen (secbuf) + 1; 558 strcpy (secname, secbuf);
|
/netbsd-current/external/bsd/ppp/dist/pppd/ |
H A D | auth.c | 1791 char secbuf[MAXWORDLEN]; local 1794 strlcpy(secbuf, passwd, sizeof(secbuf)); 1796 if ( (*chap_passwd_hook)(client, secbuf) < 0) { 1804 secbuf[0] = 0; 1813 ret = scan_authfile(f, client, server, secbuf, &addrs, &opts, filename, 0); 1826 len = strlen(secbuf); 1831 BCOPY(secbuf, secret, len); 1832 BZERO(secbuf, sizeof(secbuf)); [all...] |
H A D | eap.c | 433 unsigned char secbuf[MAXWORDLEN], clear[8], *sp, *dp; local 476 sizeof (secbuf)) { 481 secbuf); 486 if (!DesDecrypt(secbuf, clear)) { 508 sp = secbuf + 8; 528 esp->es_server.ea_name, (char *)secbuf, 1) != 0) { 532 id = strtol((char *)secbuf, &cp, 10);
|