/openbsd-current/usr.sbin/eigrpd/ |
H A D | rtp.c | 29 static struct pbuf *rtp_buf_new(struct ibuf *); 30 static struct pbuf *rtp_buf_hold(struct pbuf *); 31 static void rtp_buf_release(struct pbuf *); 32 static struct packet *rtp_packet_new(struct nbr *, uint32_t, struct pbuf *); 40 static struct pbuf * 43 struct pbuf *pbuf; local 45 if ((pbuf = calloc(1, sizeof(*pbuf))) 53 rtp_buf_hold(struct pbuf *pbuf) argument 60 rtp_buf_release(struct pbuf *pbuf) argument 69 rtp_packet_new(struct nbr *nbr, uint32_t seq_num, struct pbuf *pbuf) argument 149 struct pbuf *pbuf; local 164 struct pbuf *pbuf; local [all...] |
H A D | eigrpe.h | 28 struct pbuf { struct 37 struct pbuf *pbuf; member in struct:packet
|
/openbsd-current/usr.sbin/tcpdump/ |
H A D | print-etherip.c | 62 const u_char *pbuf = bp; local 73 switch (*pbuf >> 4) { 97 pbuf += hlen; 102 ether_print(pbuf, len); 103 eh = (struct ether_header *)pbuf; 108 etype = EXTRACT_16BITS(pbuf + offsetof(struct ether_header, ether_type)); 109 pbuf += sizeof(struct ether_header); 116 if (llc_print(pbuf, len, plen, ESRC(eh), EDST(eh)) == 0) { 124 default_print(pbuf, plen); 126 } else if (ether_encap_print(etype, pbuf, le [all...] |
/openbsd-current/lib/libcrypto/asn1/ |
H A D | bio_ndef.c | 100 static int ndef_prefix(BIO *b, unsigned char **pbuf, int *plen, void *parg); 101 static int ndef_prefix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg); 102 static int ndef_suffix(BIO *b, unsigned char **pbuf, int *plen, void *parg); 103 static int ndef_suffix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg); 174 ndef_prefix(BIO *b, unsigned char **pbuf, int *plen, void *parg) argument 189 *pbuf = p; 194 *plen = *ndef_aux->boundary - *pbuf; 200 ndef_prefix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg) argument 210 *pbuf = NULL; 217 ndef_suffix_free(BIO *b, unsigned char **pbuf, in argument 234 ndef_suffix(BIO *b, unsigned char **pbuf, int *plen, void *parg) argument [all...] |
/openbsd-current/usr.sbin/dhcpd/ |
H A D | inet.c | 157 static char pbuf[32]; local 161 strlcpy(pbuf, "<null address>", sizeof(pbuf)); 163 s = inet_ntop(AF_INET, &addr.iabuf, pbuf, sizeof pbuf); 165 strlcpy(pbuf, "<invalid address>", sizeof(pbuf)); 167 return (pbuf);
|
/openbsd-current/usr.sbin/smtpd/ |
H A D | aliases.c | 38 char *pbuf; local 46 pbuf = strchr(buf, *env->sc_subaddressing_delim); 47 if (pbuf) { 53 *pbuf = '\0'; 89 char *pbuf; local 106 pbuf = strchr(user, *env->sc_subaddressing_delim); 107 if (pbuf) { 108 if (!bsnprintf(tag, sizeof(tag), "%s", pbuf + 1)) 111 *pbuf = '\0';
|
H A D | mda_variables.c | 242 char tmpbuf[EXPAND_BUFFER], *ptmp, *pbuf, *ebuf; local 254 pbuf = buf; 259 if (strncmp(pbuf, "~/", 2) == 0) { 268 pbuf += 2; 272 for (; *pbuf && ret < sizeof tmpbuf; ret += tmpret) { 273 if (*pbuf == '%' && *(pbuf + 1) == '%') { 274 *ptmp++ = *pbuf++; 275 pbuf += 1; 280 if (*pbuf ! [all...] |
/openbsd-current/usr.sbin/makefs/ |
H A D | msdos.c | 170 char pbuf[PATH_MAX]; local 177 if ((size_t)snprintf(pbuf, sizeof(pbuf), "%s/%s", path, 178 cur->name) >= sizeof(pbuf)) { 179 warnx("path %s too long", pbuf); 199 if ((de = msdosfs_mkdire(pbuf, dir, cur)) == NULL) { 200 warn("msdosfs_mkdire %s", pbuf); 203 if (msdos_populate_dir(pbuf, de, cur->child, cur, 205 warn("msdos_populate_dir %s", pbuf); 214 if (msdosfs_mkfile(pbuf, di [all...] |
/openbsd-current/lib/libc/stdio/ |
H A D | open_wmemstream.c | 32 wchar_t **pbuf; /* point to the stream */ member in struct:state 58 *st->pbuf = st->string = p; 123 open_wmemstream(wchar_t **pbuf, size_t *psize) argument 128 if (pbuf == NULL || psize == NULL) { 150 st->pbuf = pbuf; 154 *pbuf = st->string;
|
H A D | open_memstream.c | 31 char **pbuf; /* point to the stream */ member in struct:state 56 *st->pbuf = st->string = p; 113 open_memstream(char **pbuf, size_t *psize) argument 118 if (pbuf == NULL || psize == NULL) { 140 st->pbuf = pbuf; 143 *pbuf = st->string;
|
/openbsd-current/lib/libskey/ |
H A D | skeylogin.c | 422 char secret[SKEY_MAX_SEED_LEN], pbuf[SKEY_MAX_PW_LEN+1], *p, *u; local 432 if (gethostname(pbuf, sizeof(pbuf)) == -1) 433 *(p = pbuf) = '.'; 435 for (p = pbuf; isalnum((unsigned char)*p); p++) 439 if (*p && p - pbuf < 4) 440 (void)strncpy(p, "asjd", 4 - (p - pbuf)); 441 pbuf[4] = '\0'; 469 pbuf[i] = (ptr % 10) + '0'; 472 pbuf[ 517 char pbuf[SKEY_MAX_PW_LEN+1], skeyprompt[SKEY_MAX_CHALLENGE+1]; local 527 tgetline(fileno(stdin), pbuf, sizeof(pbuf), 120); local [all...] |
/openbsd-current/usr.bin/dig/lib/isc/ |
H A D | sockaddr.c | 109 char pbuf[sizeof("65000")]; local 123 snprintf(pbuf, sizeof(pbuf), "%u", ntohs(sin->sin_port)); 127 snprintf(pbuf, sizeof(pbuf), "%u", ntohs(sin6->sin6_port)); 133 plen = strlen(pbuf); 134 INSIST(plen < sizeof(pbuf)); 147 isc_buffer_putmem(target, (const unsigned char *)pbuf, plen);
|
/openbsd-current/games/hack/ |
H A D | hack.topl.c | 212 char pbuf[BUFSZ]; local 213 char *bp = pbuf, *tl; 217 (void) vsnprintf(pbuf, sizeof pbuf, line, ap); 218 if(flags.toplin == 1 && !strcmp(pbuf, toplines)) return;
|
/openbsd-current/sbin/isakmpd/ |
H A D | vendor.c | 112 u_int8_t *pbuf = p->p; local 121 vlen = GET_ISAKMP_GEN_LENGTH(pbuf) - ISAKMP_GEN_SZ; 131 if (memcmp(openbsd_vendor_cap[i].hash, pbuf + ISAKMP_GEN_SZ,
|
/openbsd-current/libexec/login_passwd/ |
H A D | login_passwd.c | 58 char response[1024], pbuf[1024], *pass = ""; local 150 pass = readpassphrase("Password:", pbuf, sizeof(pbuf),
|
/openbsd-current/lib/libcrypto/ec/ |
H A D | ec_print.c | 131 unsigned char *buf, *pbuf; local 151 pbuf = buf; 153 int v = (int) *(pbuf++);
|
/openbsd-current/regress/lib/libcrypto/bio/ |
H A D | bio_mem.c | 34 BUF_MEM *pbuf; local 72 if (!BIO_get_mem_ptr(bio, &pbuf)) { 76 if (pbuf->length != data_len) { 78 pbuf->length, data_len); 81 if (memcmp(pbuf->data, data, data_len) != 0) { 85 pbuf = NULL;
|
/openbsd-current/lib/libcrypto/evp/ |
H A D | evp_pbe.c | 244 const unsigned char *pbuf; local 259 pbuf = param->value.sequence->data; 260 if (!(pbe = d2i_PBEPARAM(NULL, &pbuf, param->value.sequence->length))) { 422 const unsigned char *pbuf; local 434 pbuf = param->value.sequence->data; 436 if (!(pbe2 = d2i_PBE2PARAM(NULL, &pbuf, plen))) { 510 const unsigned char *pbuf; local 535 pbuf = param->value.sequence->data; 538 if (!(kdf = d2i_PBKDF2PARAM(NULL, &pbuf, plen)) ) { 605 const unsigned char *pbuf; local [all...] |
/openbsd-current/usr.sbin/lpr/common_source/ |
H A D | common.c | 119 char pbuf[NI_MAXSERV]; local 130 snprintf(pbuf, sizeof(pbuf), "%d", rport); 132 snprintf(pbuf, sizeof(pbuf), "printer"); 134 error = getaddrinfo(rhost, pbuf, &hints, &res);
|
/openbsd-current/lib/libc/net/ |
H A D | ruserok.c | 92 char pbuf[PATH_MAX], pwbuf[_PW_BUF_LEN]; local 113 len = snprintf(pbuf, sizeof pbuf, "%s/.rhosts", pwd->pw_dir); 114 if (len < 0 || len >= sizeof pbuf) 124 hostf = fopen(pbuf, "re"); 134 if (lstat(pbuf, &sbuf) == -1)
|
H A D | rcmd.c | 64 char pbuf[NI_MAXSERV]; local 96 snprintf(pbuf, sizeof(pbuf), "%u", ntohs(rport)); 101 error = getaddrinfo(*ahost, pbuf, &hints, &res);
|
/openbsd-current/usr.bin/mail/ |
H A D | head.c | 91 parse(char *line, struct headline *hl, char *pbuf) argument 100 sp = pbuf;
|
/openbsd-current/sys/dev/ |
H A D | softraid_raid6.c | 81 void *pbuf; member in struct:sr_raid6_opaque 365 * 0, pbuf, NULL, 0); 367 * 0, pbuf, qbuf, gf_pow[i]); 383 void *pbuf, *data, *qbuf; local 513 * P: sr_raid6_xorp(pbuf, --, length); 514 * Dz: sr_raid6_xorp(pbuf, --, length); 559 * initialize pbuf with contents of new data to be 561 * parity in the intr routine. The result in pbuf 568 pbuf = sr_block_get(sd, length); 569 if (pbuf 731 sr_raid6_addio(struct sr_workunit *wu, int chunk, daddr_t blkno, long len, void *data, int xsflags, int ccbflags, void *pbuf, void *qbuf, int gn) argument 784 uint32_t *pbuf = p, *data = d; local [all...] |
/openbsd-current/gnu/usr.bin/binutils/gdb/ |
H A D | ser-e7kpc.c | 189 static char pbuf[1000]; local 195 x = pbuf[pbuf_index++]; 209 pbuf[i] = tmp[i ^ 1]; 212 x = pbuf[pbuf_index++];
|
/openbsd-current/usr.sbin/mopd/otherOS/ |
H A D | pf-snit.c | 317 struct strbuf pbuf, dbuf; local 324 pbuf.len = sizeof(struct sockaddr); 325 pbuf.buf = (char *) &sa; 331 if (putmsg(fd, &pbuf, &dbuf, 0) == 0)
|