/macosx-10.10.1/uucp-11/uucp/uuconf/ |
H A D | free.c | 44 uuconf_free (pblock, pbuf) 46 pointer pbuf; 50 if (pbuf == NULL) 55 free (pbuf); 61 if (q->plast == pbuf) 63 q->ifree = (char *) pbuf - q->u.ab;
|
/macosx-10.10.1/ntp-92/ntpd/ |
H A D | refclock_ripencc.c | 2977 /* pbuf is the pointer to the current location of the text output */ 2979 *pbuf; variable 3036 pbuf += sprintf(pbuf, "\nChannel A Configuration"); 3041 pbuf += sprintf(pbuf, "\n Transmit speed: %s at %s", 3045 pbuf += sprintf(pbuf, "\n Receive speed: %s at %s", 3053 pbuf += sprintf(pbuf, "\ [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/include/security_cryptkit/ |
H A D | feeFunctions.h | 56 extern void getpassword(const char *prompt, char *pbuf);
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_cryptkit/lib/ |
H A D | feeFunctions.h | 56 extern void getpassword(const char *prompt, char *pbuf);
|
/macosx-10.10.1/OpenLDAP-499.27/OpenLDAP/libraries/liblutil/ |
H A D | getpass.c | 72 static char pbuf[PBUF]; local 110 if ( i < (sizeof(pbuf)-1) ) 111 pbuf[i++] = c; 126 pbuf[i] = '\0'; 127 return (pbuf);
|
/macosx-10.10.1/ipsec-286.1.1/ipsec-tools/racoon/ |
H A D | remoteconf.c | 621 char buf[1024], *pbuf; local 622 pbuf = buf; 623 pbuf += snprintf (pbuf, sizeof(buf) - (pbuf - buf), "\tpeers_identifier %s", 626 pbuf += snprintf (pbuf, sizeof(buf) - (pbuf - buf), " \"%s\"", id->id->v); 636 char buf[1024], *pbuf; local 638 pbuf [all...] |
H A D | isakmp_ident.c | 279 vchar_t *pbuf = NULL; local 302 pbuf = isakmp_parse(msg); 303 if (pbuf == NULL) { 308 pa = ALIGNED_CAST(struct isakmp_parse_t *)pbuf->v; 413 if (pbuf) 414 vfree(pbuf); 528 vchar_t *pbuf = NULL; local 545 pbuf = isakmp_parse(msg); 546 if (pbuf == NULL) { 552 for (pa = ALIGNED_CAST(struct isakmp_parse_t *)pbuf 838 vchar_t *pbuf = NULL; local 1052 vchar_t *pbuf = NULL; local 1363 vchar_t *pbuf = NULL; local 1638 vchar_t *pbuf = NULL; local [all...] |
/macosx-10.10.1/apache-793/httpd/modules/dav/main/ |
H A D | util_lock.c | 44 dav_buffer *pbuf) 72 if (pbuf == NULL) 73 pbuf = &work_buf; 76 pbuf->cur_len = 0; 79 dav_check_bufsize(p, pbuf, count * 300); 87 dav_buffer_append(p, pbuf, 95 dav_buffer_append(p, pbuf, "<D:activelock>" DEBUG_CR "<D:locktype>"); 98 dav_buffer_append(p, pbuf, "<D:write/>"); 104 dav_buffer_append(p, pbuf, "</D:locktype>" DEBUG_CR "<D:lockscope>"); 107 dav_buffer_append(p, pbuf, "< 42 dav_lock_get_activelock(request_rec *r, dav_lock *lock, dav_buffer *pbuf) argument [all...] |
H A D | util.c | 104 DAV_DECLARE(void) dav_check_bufsize(apr_pool_t * p, dav_buffer *pbuf, argument 108 if (pbuf->cur_len + extra_needed > pbuf->alloc_len) { 111 pbuf->alloc_len += extra_needed + DAV_BUFFER_PAD; 112 newbuf = apr_palloc(p, pbuf->alloc_len); 113 memcpy(newbuf, pbuf->buf, pbuf->cur_len); 114 pbuf->buf = newbuf; 118 DAV_DECLARE(void) dav_set_bufsize(apr_pool_t * p, dav_buffer *pbuf, argument 127 if (size + DAV_BUFFER_PAD > pbuf 140 dav_buffer_init(apr_pool_t *p, dav_buffer *pbuf, const char *str) argument 148 dav_buffer_append(apr_pool_t *p, dav_buffer *pbuf, const char *str) argument 159 dav_buffer_place(apr_pool_t *p, dav_buffer *pbuf, const char *str) argument 169 dav_buffer_place_mem(apr_pool_t *p, dav_buffer *pbuf, const void *mem, apr_size_t amt, apr_size_t pad) argument 838 dav_validate_resource_state(apr_pool_t *p, const dav_resource *resource, dav_lockdb *lockdb, const dav_if_header *if_header, int flags, dav_buffer *pbuf, request_rec *r) argument [all...] |
/macosx-10.10.1/ksh-23/ksh/src/lib/libast/sfio/ |
H A D | sfpkrd.c | 94 { struct strpeek pbuf; local 95 pbuf.flags = 0; 96 pbuf.ctlbuf.maxlen = -1; 97 pbuf.ctlbuf.len = 0; 98 pbuf.ctlbuf.buf = NIL(char*); 99 pbuf.databuf.maxlen = n; 100 pbuf.databuf.buf = buf; 101 pbuf.databuf.len = 0; 103 if((r = ioctl(fd,I_PEEK,&pbuf)) < 0) 110 if(r > 0 && (r = pbuf [all...] |
/macosx-10.10.1/OpenSSL098-52/src/crypto/pkcs12/ |
H A D | p12_crpt.c | 93 const unsigned char *pbuf; local 103 pbuf = param->value.sequence->data; 104 if (!(pbe = d2i_PBEPARAM(NULL, &pbuf, param->value.sequence->length))) {
|
/macosx-10.10.1/file-46/file/src/ |
H A D | funcs.c | 313 if (ms->o.pbuf) { 314 free(ms->o.pbuf); 315 ms->o.pbuf = NULL; 333 char *pbuf, *op, *np; local 352 if ((pbuf = CAST(char *, realloc(ms->o.pbuf, psize))) == NULL) { 356 ms->o.pbuf = pbuf; 367 np = ms->o.pbuf; 393 return ms->o.pbuf; [all...] |
/macosx-10.10.1/passwordserver_sasl-193/cyrus_sasl/saslauthd/ |
H A D | auth_httpform.c | 516 char hbuf[NI_MAXHOST], pbuf[NI_MAXSERV]; 541 pbuf, sizeof(pbuf), niflags) != 0) { 543 strlcpy(pbuf, "unknown", sizeof(pbuf)); 547 ai->ai_canonname ? ai->ai_canonname : r_host, hbuf, pbuf); 551 pbuf, sizeof(pbuf), NI_NUMERICSERV) != 0) 552 strlcpy(pbuf, "unknown", sizeof(pbuf)); 510 char hbuf[NI_MAXHOST], pbuf[NI_MAXSERV]; local [all...] |
H A D | auth_rimap.c | 319 char hbuf[NI_MAXHOST], pbuf[NI_MAXSERV]; 344 pbuf, sizeof(pbuf), niflags) != 0) { 346 strlcpy(pbuf, "unknown", sizeof(pbuf)); 350 ai->ai_canonname ? ai->ai_canonname : r_host, hbuf, pbuf); 354 pbuf, sizeof(pbuf), NI_NUMERICSERV) != 0) 355 strlcpy(pbuf, "unknown", sizeof(pbuf)); 315 char hbuf[NI_MAXHOST], pbuf[NI_MAXSERV]; local [all...] |
/macosx-10.10.1/ipsec-286.1.1/ipsec-tools/libipsec/ |
H A D | policy_parse.y | 102 static u_int8_t *pbuf = NULL; /* sadb_x_policy buffer */ 103 static int tlen = 0; /* total length of pbuf */ 104 static int offset = 0; /* offset of pbuf */ 499 if (pbuf) { 500 free(pbuf); 503 pbuf = malloc(sizeof(struct sadb_x_policy)); 504 if (pbuf == NULL) { 510 memset(pbuf, 0, tlen); 511 p = ALIGNED_CAST(struct sadb_x_policy *)pbuf; 548 n = realloc(pbuf, tle [all...] |
/macosx-10.10.1/Heimdal-398.1.2/lib/roken/ |
H A D | iruserok.c | 226 char pbuf[MaxPathLen]; local 242 snprintf (pbuf, sizeof(pbuf), "%s/.rhosts", pwd->pw_dir); 252 hostf = fopen(pbuf, "r"); 262 if (lstat(pbuf, &sbuf) < 0)
|
/macosx-10.10.1/tcl-105/tcl/tcl/unix/ |
H A D | tclUnixCompat.c | 89 char pbuf[2048]; 166 return (getpwnam_r(name, &tsdPtr->pwd, tsdPtr->pbuf, sizeof(tsdPtr->pbuf), 170 return getpwnam_r(name, &tsdPtr->pwd, tsdPtr->pbuf, sizeof(tsdPtr->pbuf)); 181 if (CopyPwd(&tsdPtr->pwd, tsdPtr->pbuf, sizeof(tsdPtr->pbuf)) == -1) { 223 return (getpwuid_r(uid, &tsdPtr->pwd, tsdPtr->pbuf, sizeof(tsdPtr->pbuf), 227 return getpwuid_r(uid, &tsdPtr->pwd, tsdPtr->pbuf, sizeo 88 char pbuf[2048]; member in struct:ThreadSpecificData [all...] |
/macosx-10.10.1/tcl-105/tcl84/tcl/unix/ |
H A D | tclUnixCompat.c | 46 char pbuf[2048]; member in struct:ThreadSpecificData 381 return (getpwnam_r(name, &tsdPtr->pwd, tsdPtr->pbuf, sizeof(tsdPtr->pbuf), 385 return getpwnam_r(name, &tsdPtr->pwd, tsdPtr->pbuf, sizeof(tsdPtr->pbuf)); 394 if (CopyPwd(&tsdPtr->pwd, tsdPtr->pbuf, sizeof(tsdPtr->pbuf)) == -1) { 434 return (getpwuid_r(uid, &tsdPtr->pwd, tsdPtr->pbuf, sizeof(tsdPtr->pbuf), 438 return getpwuid_r(uid, &tsdPtr->pwd, tsdPtr->pbuf, sizeo [all...] |
/macosx-10.10.1/passwordserver_sasl-193/cyrus_sasl/sample/ |
H A D | client.c | 338 char hbuf[NI_MAXHOST], pbuf[NI_MAXSERV]; local 403 hbuf, sizeof(hbuf), pbuf, sizeof(pbuf), niflags); 407 strcpy(pbuf, "unknown"); 409 snprintf(localaddr, sizeof(localaddr), "%s;%s", hbuf, pbuf); 422 hbuf, sizeof(hbuf), pbuf, sizeof(pbuf), niflags); 426 strcpy(pbuf, "unknown"); 428 snprintf(remoteaddr, sizeof(remoteaddr), "%s;%s", hbuf, pbuf);
|
/macosx-10.10.1/OpenSSL098-52/src/crypto/asn1/ |
H A D | asn_pack.c | 73 const unsigned char *pbuf; local 74 pbuf = buf; 75 if (!(sk = d2i_ASN1_SET(NULL, &pbuf, len, d2i, free_func,
|
/macosx-10.10.1/OpenSSL098-52/src/crypto/ec/ |
H A D | ec_print.c | 142 unsigned char *buf, *pbuf; local 165 pbuf = buf; 168 int v = (int) *(pbuf++);
|
/macosx-10.10.1/OpenSSL098-52/src/crypto/evp/ |
H A D | p5_crpt.c | 114 const unsigned char *pbuf; local 123 pbuf = param->value.sequence->data; 124 if (!(pbe = d2i_PBEPARAM(NULL, &pbuf, param->value.sequence->length))) {
|
/macosx-10.10.1/less-25/less/ |
H A D | lessecho.c | 53 char *pbuf = buf; local 59 *pbuf++ = *p; 60 *pbuf = '\0';
|
/macosx-10.10.1/mail_cmds-30/mail/ |
H A D | head.c | 103 parse(line, hl, pbuf) 104 char line[], pbuf[]; 114 sp = pbuf;
|
/macosx-10.10.1/bash-94.1.2/bash-3.2/lib/sh/ |
H A D | eaccess.c | 110 char pbuf[size]; 111 snprintf (pbuf, sizeof(pbuf), "%s%s", DEV_FD_PREFIX, path + 8); 112 return (stat (pbuf, finfo));
|