Searched refs:pbuf (Results 1 - 25 of 69) sorted by relevance

123

/openbsd-current/usr.sbin/eigrpd/
H A Drtp.c29 static struct pbuf *rtp_buf_new(struct ibuf *);
30 static struct pbuf *rtp_buf_hold(struct pbuf *);
31 static void rtp_buf_release(struct pbuf *);
32 static struct packet *rtp_packet_new(struct nbr *, uint32_t, struct pbuf *);
40 static struct pbuf *
43 struct pbuf *pbuf; local
45 if ((pbuf = calloc(1, sizeof(*pbuf)))
53 rtp_buf_hold(struct pbuf *pbuf) argument
60 rtp_buf_release(struct pbuf *pbuf) argument
69 rtp_packet_new(struct nbr *nbr, uint32_t seq_num, struct pbuf *pbuf) argument
149 struct pbuf *pbuf; local
164 struct pbuf *pbuf; local
[all...]
H A Deigrpe.h28 struct pbuf { struct
37 struct pbuf *pbuf; member in struct:packet
/openbsd-current/usr.sbin/tcpdump/
H A Dprint-etherip.c62 const u_char *pbuf = bp; local
73 switch (*pbuf >> 4) {
97 pbuf += hlen;
102 ether_print(pbuf, len);
103 eh = (struct ether_header *)pbuf;
108 etype = EXTRACT_16BITS(pbuf + offsetof(struct ether_header, ether_type));
109 pbuf += sizeof(struct ether_header);
116 if (llc_print(pbuf, len, plen, ESRC(eh), EDST(eh)) == 0) {
124 default_print(pbuf, plen);
126 } else if (ether_encap_print(etype, pbuf, le
[all...]
/openbsd-current/lib/libcrypto/asn1/
H A Dbio_ndef.c100 static int ndef_prefix(BIO *b, unsigned char **pbuf, int *plen, void *parg);
101 static int ndef_prefix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg);
102 static int ndef_suffix(BIO *b, unsigned char **pbuf, int *plen, void *parg);
103 static int ndef_suffix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg);
174 ndef_prefix(BIO *b, unsigned char **pbuf, int *plen, void *parg) argument
189 *pbuf = p;
194 *plen = *ndef_aux->boundary - *pbuf;
200 ndef_prefix_free(BIO *b, unsigned char **pbuf, int *plen, void *parg) argument
210 *pbuf = NULL;
217 ndef_suffix_free(BIO *b, unsigned char **pbuf, in argument
234 ndef_suffix(BIO *b, unsigned char **pbuf, int *plen, void *parg) argument
[all...]
/openbsd-current/usr.sbin/dhcpd/
H A Dinet.c157 static char pbuf[32]; local
161 strlcpy(pbuf, "<null address>", sizeof(pbuf));
163 s = inet_ntop(AF_INET, &addr.iabuf, pbuf, sizeof pbuf);
165 strlcpy(pbuf, "<invalid address>", sizeof(pbuf));
167 return (pbuf);
/openbsd-current/usr.sbin/smtpd/
H A Daliases.c38 char *pbuf; local
46 pbuf = strchr(buf, *env->sc_subaddressing_delim);
47 if (pbuf) {
53 *pbuf = '\0';
89 char *pbuf; local
106 pbuf = strchr(user, *env->sc_subaddressing_delim);
107 if (pbuf) {
108 if (!bsnprintf(tag, sizeof(tag), "%s", pbuf + 1))
111 *pbuf = '\0';
H A Dmda_variables.c242 char tmpbuf[EXPAND_BUFFER], *ptmp, *pbuf, *ebuf; local
254 pbuf = buf;
259 if (strncmp(pbuf, "~/", 2) == 0) {
268 pbuf += 2;
272 for (; *pbuf && ret < sizeof tmpbuf; ret += tmpret) {
273 if (*pbuf == '%' && *(pbuf + 1) == '%') {
274 *ptmp++ = *pbuf++;
275 pbuf += 1;
280 if (*pbuf !
[all...]
/openbsd-current/usr.sbin/makefs/
H A Dmsdos.c170 char pbuf[PATH_MAX]; local
177 if ((size_t)snprintf(pbuf, sizeof(pbuf), "%s/%s", path,
178 cur->name) >= sizeof(pbuf)) {
179 warnx("path %s too long", pbuf);
199 if ((de = msdosfs_mkdire(pbuf, dir, cur)) == NULL) {
200 warn("msdosfs_mkdire %s", pbuf);
203 if (msdos_populate_dir(pbuf, de, cur->child, cur,
205 warn("msdos_populate_dir %s", pbuf);
214 if (msdosfs_mkfile(pbuf, di
[all...]
/openbsd-current/lib/libc/stdio/
H A Dopen_wmemstream.c32 wchar_t **pbuf; /* point to the stream */ member in struct:state
58 *st->pbuf = st->string = p;
123 open_wmemstream(wchar_t **pbuf, size_t *psize) argument
128 if (pbuf == NULL || psize == NULL) {
150 st->pbuf = pbuf;
154 *pbuf = st->string;
H A Dopen_memstream.c31 char **pbuf; /* point to the stream */ member in struct:state
56 *st->pbuf = st->string = p;
113 open_memstream(char **pbuf, size_t *psize) argument
118 if (pbuf == NULL || psize == NULL) {
140 st->pbuf = pbuf;
143 *pbuf = st->string;
/openbsd-current/lib/libskey/
H A Dskeylogin.c422 char secret[SKEY_MAX_SEED_LEN], pbuf[SKEY_MAX_PW_LEN+1], *p, *u; local
432 if (gethostname(pbuf, sizeof(pbuf)) == -1)
433 *(p = pbuf) = '.';
435 for (p = pbuf; isalnum((unsigned char)*p); p++)
439 if (*p && p - pbuf < 4)
440 (void)strncpy(p, "asjd", 4 - (p - pbuf));
441 pbuf[4] = '\0';
469 pbuf[i] = (ptr % 10) + '0';
472 pbuf[
517 char pbuf[SKEY_MAX_PW_LEN+1], skeyprompt[SKEY_MAX_CHALLENGE+1]; local
527 tgetline(fileno(stdin), pbuf, sizeof(pbuf), 120); local
[all...]
/openbsd-current/usr.bin/dig/lib/isc/
H A Dsockaddr.c109 char pbuf[sizeof("65000")]; local
123 snprintf(pbuf, sizeof(pbuf), "%u", ntohs(sin->sin_port));
127 snprintf(pbuf, sizeof(pbuf), "%u", ntohs(sin6->sin6_port));
133 plen = strlen(pbuf);
134 INSIST(plen < sizeof(pbuf));
147 isc_buffer_putmem(target, (const unsigned char *)pbuf, plen);
/openbsd-current/games/hack/
H A Dhack.topl.c212 char pbuf[BUFSZ]; local
213 char *bp = pbuf, *tl;
217 (void) vsnprintf(pbuf, sizeof pbuf, line, ap);
218 if(flags.toplin == 1 && !strcmp(pbuf, toplines)) return;
/openbsd-current/sbin/isakmpd/
H A Dvendor.c112 u_int8_t *pbuf = p->p; local
121 vlen = GET_ISAKMP_GEN_LENGTH(pbuf) - ISAKMP_GEN_SZ;
131 if (memcmp(openbsd_vendor_cap[i].hash, pbuf + ISAKMP_GEN_SZ,
/openbsd-current/libexec/login_passwd/
H A Dlogin_passwd.c58 char response[1024], pbuf[1024], *pass = ""; local
150 pass = readpassphrase("Password:", pbuf, sizeof(pbuf),
/openbsd-current/lib/libcrypto/ec/
H A Dec_print.c131 unsigned char *buf, *pbuf; local
151 pbuf = buf;
153 int v = (int) *(pbuf++);
/openbsd-current/regress/lib/libcrypto/bio/
H A Dbio_mem.c34 BUF_MEM *pbuf; local
72 if (!BIO_get_mem_ptr(bio, &pbuf)) {
76 if (pbuf->length != data_len) {
78 pbuf->length, data_len);
81 if (memcmp(pbuf->data, data, data_len) != 0) {
85 pbuf = NULL;
/openbsd-current/lib/libcrypto/evp/
H A Devp_pbe.c244 const unsigned char *pbuf; local
259 pbuf = param->value.sequence->data;
260 if (!(pbe = d2i_PBEPARAM(NULL, &pbuf, param->value.sequence->length))) {
422 const unsigned char *pbuf; local
434 pbuf = param->value.sequence->data;
436 if (!(pbe2 = d2i_PBE2PARAM(NULL, &pbuf, plen))) {
510 const unsigned char *pbuf; local
535 pbuf = param->value.sequence->data;
538 if (!(kdf = d2i_PBKDF2PARAM(NULL, &pbuf, plen)) ) {
605 const unsigned char *pbuf; local
[all...]
/openbsd-current/usr.sbin/lpr/common_source/
H A Dcommon.c119 char pbuf[NI_MAXSERV]; local
130 snprintf(pbuf, sizeof(pbuf), "%d", rport);
132 snprintf(pbuf, sizeof(pbuf), "printer");
134 error = getaddrinfo(rhost, pbuf, &hints, &res);
/openbsd-current/lib/libc/net/
H A Druserok.c92 char pbuf[PATH_MAX], pwbuf[_PW_BUF_LEN]; local
113 len = snprintf(pbuf, sizeof pbuf, "%s/.rhosts", pwd->pw_dir);
114 if (len < 0 || len >= sizeof pbuf)
124 hostf = fopen(pbuf, "re");
134 if (lstat(pbuf, &sbuf) == -1)
H A Drcmd.c64 char pbuf[NI_MAXSERV]; local
96 snprintf(pbuf, sizeof(pbuf), "%u", ntohs(rport));
101 error = getaddrinfo(*ahost, pbuf, &hints, &res);
/openbsd-current/usr.bin/mail/
H A Dhead.c91 parse(char *line, struct headline *hl, char *pbuf) argument
100 sp = pbuf;
/openbsd-current/sys/dev/
H A Dsoftraid_raid6.c81 void *pbuf; member in struct:sr_raid6_opaque
365 * 0, pbuf, NULL, 0);
367 * 0, pbuf, qbuf, gf_pow[i]);
383 void *pbuf, *data, *qbuf; local
513 * P: sr_raid6_xorp(pbuf, --, length);
514 * Dz: sr_raid6_xorp(pbuf, --, length);
559 * initialize pbuf with contents of new data to be
561 * parity in the intr routine. The result in pbuf
568 pbuf = sr_block_get(sd, length);
569 if (pbuf
731 sr_raid6_addio(struct sr_workunit *wu, int chunk, daddr_t blkno, long len, void *data, int xsflags, int ccbflags, void *pbuf, void *qbuf, int gn) argument
784 uint32_t *pbuf = p, *data = d; local
[all...]
/openbsd-current/gnu/usr.bin/binutils/gdb/
H A Dser-e7kpc.c189 static char pbuf[1000]; local
195 x = pbuf[pbuf_index++];
209 pbuf[i] = tmp[i ^ 1];
212 x = pbuf[pbuf_index++];
/openbsd-current/usr.sbin/mopd/otherOS/
H A Dpf-snit.c317 struct strbuf pbuf, dbuf; local
324 pbuf.len = sizeof(struct sockaddr);
325 pbuf.buf = (char *) &sa;
331 if (putmsg(fd, &pbuf, &dbuf, 0) == 0)

Completed in 180 milliseconds

123