/freebsd/crypto/openssh/ |
H A D | kexsntrup761x25519.c | 47 size_t need; in kex_kem_sntrup761x25519_keypair() local 52 need = crypto_kem_sntrup761_PUBLICKEYBYTES + CURVE25519_SIZE; in kex_kem_sntrup761x25519_keypair() 53 if ((r = sshbuf_reserve(buf, need, &cp)) != 0) in kex_kem_sntrup761x25519_keypair() 83 size_t need; in kex_kem_sntrup761x25519_enc() local 90 need = crypto_kem_sntrup761_PUBLICKEYBYTES + CURVE25519_SIZE; in kex_kem_sntrup761x25519_enc() 91 if (sshbuf_len(client_blob) != need) { in kex_kem_sntrup761x25519_enc() 117 need = crypto_kem_sntrup761_CIPHERTEXTBYTES + CURVE25519_SIZE; in kex_kem_sntrup761x25519_enc() 118 if ((r = sshbuf_reserve(server_blob, need, &ciphertext)) != 0) in kex_kem_sntrup761x25519_enc() 167 size_t need; in kex_kem_sntrup761x25519_dec() local 172 need = crypto_kem_sntrup761_CIPHERTEXTBYTES + CURVE25519_SIZE; in kex_kem_sntrup761x25519_dec() [all …]
|
H A D | dh.c | 284 dh_gen_key(DH *dh, int need) in dh_gen_key() argument 291 if (need < 0 || dh_p == NULL || in dh_gen_key() 293 need > INT_MAX / 2 || 2 * need > pbits) in dh_gen_key() 295 if (need < 256) in dh_gen_key() 296 need = 256; in dh_gen_key() 301 if (!DH_set_length(dh, MINIMUM(need * 2, pbits - 1))) in dh_gen_key()
|
H A D | bitmap.c | 171 size_t i, j, k, need = bitmap_nbytes(b); in bitmap_to_string() local 173 if (l < need || b->top >= b->len) in bitmap_to_string() 175 if (l > need) in bitmap_to_string() 176 l = need; in bitmap_to_string() 182 s[need - 1 - k++] = (b->d[i] >> (j * 8)) & 0xff; in bitmap_to_string()
|
/freebsd/contrib/ncurses/ncurses/tinfo/ |
H A D | lib_print.c | 52 size_t need; in NCURSES_EXPORT() local 72 need = onsize + (size_t) len + offsize; in NCURSES_EXPORT() 75 || (mybuf = typeMalloc(char, need + 1)) == 0) { in NCURSES_EXPORT() 80 _nc_STRCPY(mybuf, switchon, need); in NCURSES_EXPORT() 83 _nc_STRCPY(mybuf + onsize + len, prtr_off, need); in NCURSES_EXPORT() 92 result = (int) write(TerminalOf(SP_PARM)->Filedes, mybuf, need); in NCURSES_EXPORT()
|
H A D | lib_tgoto.c | 78 size_t need = 10; in tgoto_internal() local 83 need += strlen(BC); in tgoto_internal() 90 if ((used + need) > length) { in tgoto_internal() 91 length += (used + need); in tgoto_internal()
|
/freebsd/contrib/ncurses/ncurses/trace/ |
H A D | trace_buf.c | 53 size_t need = (size_t) (bufnum + 1) * 2; in _nc_trace_alloc() local 54 if ((MyList = typeRealloc(TRACEBUF, need, MyList)) != 0) { in _nc_trace_alloc() 55 while (need > MySize) in _nc_trace_alloc() 110 size_t need = strlen(value) + have; in _nc_trace_bufcat() local 112 buffer = _nc_trace_alloc(bufnum, 1 + need); in _nc_trace_bufcat() 114 _nc_STRCPY(buffer + have, value, need); in _nc_trace_bufcat()
|
/freebsd/sys/contrib/openzfs/module/icp/algs/modes/ |
H A D | cbc.c | 42 size_t need = 0; in cbc_encrypt_contiguous_blocks() local 68 need = block_size - ctx->cbc_remainder_len; in cbc_encrypt_contiguous_blocks() 70 if (need > remainder) in cbc_encrypt_contiguous_blocks() 74 [ctx->cbc_remainder_len], datap, need); in cbc_encrypt_contiguous_blocks() 106 datap += need; in cbc_encrypt_contiguous_blocks() 148 size_t need = 0; in cbc_decrypt_contiguous_blocks() local 174 need = block_size - ctx->cbc_remainder_len; in cbc_decrypt_contiguous_blocks() 176 if (need > remainder) in cbc_decrypt_contiguous_blocks() 180 [ctx->cbc_remainder_len], datap, need); in cbc_decrypt_contiguous_blocks() 217 datap += need; in cbc_decrypt_contiguous_blocks()
|
H A D | ecb.c | 40 size_t need = 0; in ecb_cipher_contiguous_blocks() local 66 need = block_size - ctx->ecb_remainder_len; in ecb_cipher_contiguous_blocks() 68 if (need > remainder) in ecb_cipher_contiguous_blocks() 72 [ctx->ecb_remainder_len], datap, need); in ecb_cipher_contiguous_blocks() 94 datap += need; in ecb_cipher_contiguous_blocks()
|
/freebsd/contrib/sendmail/libsm/ |
H A D | mbdb.c | 482 int need; local 633 need &= ~NEED_FULLNAME; 637 if (!bitset(NEED_HOMEDIR, need) || 643 need &= ~NEED_HOMEDIR; 647 if (!bitset(NEED_SHELL, need) || 653 need &= ~NEED_SHELL; 659 if (!bitset(NEED_UID, need)) 675 need &= ~NEED_UID; 681 if (!bitset(NEED_GID, need)) 697 need &= ~NEED_GID; [all …]
|
/freebsd/contrib/ncurses/progs/ |
H A D | dump_entry.c | 130 dst->used += need; in strncpy_DYN() 537 need += size; in fill_spaces() 574 int want = gaps + need; in wrap_concat() 595 need = last; in wrap_concat() 633 need -= size; in wrap_concat() 634 if (need > 0) { in wrap_concat() 641 if (need > 0) { in wrap_concat() 732 need = buffer->used - need; in leading_DYN() 735 while (--need != 0) { in leading_DYN() 1152 need -= 2; in fmt_entry() [all …]
|
H A D | transform.c | 48 size_t need = (sizeof(ignore) - 1); in trim_suffix() local 50 if (*len > need) { in trim_suffix() 51 size_t first = *len - need; in trim_suffix() 61 *len -= need; in trim_suffix()
|
H A D | tabs.c | 268 size_t need = 1 + strlen(copied); in add_to_tab_list() local 275 need += strlen(comma); in add_to_tab_list() 277 need += strlen(*append); in add_to_tab_list() 279 result = malloc(need); in add_to_tab_list() 285 _nc_STRCPY(result, *append, need); in add_to_tab_list() 288 _nc_STRCAT(result, comma, need); in add_to_tab_list() 289 _nc_STRCAT(result, copied, need); in add_to_tab_list()
|
/freebsd/sys/contrib/libsodium/src/libsodium/crypto_pwhash/scryptsalsa208sha256/ |
H A D | crypto_scrypt-common.c | 147 size_t need; in escrypt_r() local 167 need = prefixlen + saltlen + 1 + in escrypt_r() 169 if (need > buflen || need < saltlen) { in escrypt_r() 205 size_t need; in escrypt_gensalt_r() local 207 need = prefixlen + saltlen + 1; in escrypt_gensalt_r() 208 if (need > buflen || need < saltlen || saltlen < srclen) { in escrypt_gensalt_r()
|
/freebsd/contrib/file/magic/Magdir/ |
H A D | mup | 17 >>>>14 string x \b, need V%.4s 19 >>>>14 string x \b, need V%.3s 22 >>>7 string x \b, need V%.4s 24 >>>7 string x \b, need V%.3s
|
/freebsd/usr.bin/hexdump/ |
H A D | display.c | 235 int need, nread; in get() local 251 for (need = blocksize, nread = 0;;) { in get() 260 if (need == blocksize) in get() 266 if (need == 0 && vflag != ALL && in get() 275 bzero((char *)curp + nread, need); in get() 280 length == -1 ? need : MIN(length, need), stdin); in get() 290 if (!(need -= n)) { in get() 308 need = blocksize; in get()
|
/freebsd/contrib/ncurses/ncurses/base/ |
H A D | lib_slkset.c | 84 size_t need; in NCURSES_EXPORT() local 87 need = mbrtowc(0, p, strlen(p), &state); in NCURSES_EXPORT() 88 if (need == (size_t) -1) in NCURSES_EXPORT() 90 mbrtowc(&wc, p, need, &state); in NCURSES_EXPORT() 96 p += need; in NCURSES_EXPORT()
|
/freebsd/tools/test/stress2/misc/ |
H A D | maxmemdom.sh | 38 need=$((size * 2)) 43 $need ] && printf "Need %d MB on %s.\n" $need `dirname $diskimage` && exit
|
H A D | vm_fault_dontneed.sh | 50 need=2048 52 [ $need -gt $have ] && need=$((have - 1)) 53 dd if=/dev/zero of=$diskimage bs=1m count=$need status=none
|
H A D | vmio.sh | 46 need=$((size * 2)) 51 -lt $need ] && 52 printf "Need %d MB on %s.\n" $need `dirname $diskimage` && exit 0
|
/freebsd/contrib/capsicum-test/ |
H A D | CONTRIBUTING.md | 9 own the intellectual property, then you'll need to sign an [individual 13 then you'll need to sign a [corporate CLA][]. 15 You generally only need to submit a CLA once, so if you've already submitted 16 one (even if it was for a different project), you probably don't need to do it
|
/freebsd/tools/boot/ |
H A D | full-test.readme | 1 First, you will need a few things. 3 (1) a small cache of binaries. You'll need to put these into 13 tools/boot/full-test.sh if need be, but you'll need at least amd64, arm64 and 22 since we need to fix arm64... 24 (5) You'll need to build the images. If you've done 1-5 correctly (and I've not
|
/freebsd/contrib/wpa/src/tls/ |
H A D | bignum.c | 77 size_t need = mp_unsigned_bin_size((mp_int *) n); in bignum_get_unsigned_bin() local 78 if (len && need > *len) { in bignum_get_unsigned_bin() 79 *len = need; in bignum_get_unsigned_bin() 87 *len = need; in bignum_get_unsigned_bin()
|
/freebsd/contrib/tnftp/ |
H A D | todo | 9 Interix may need hack to fix detection of getpgrp() void args. 19 check if we need #defines for memcpy() et al 23 system specific tests (to remove need for manual intervention):
|
/freebsd/contrib/bmake/unit-tests/ |
H A D | depsrc-optional.exp | 2 ExamineLater: need to examine "important" 4 ExamineLater: need to examine "optional" 5 ExamineLater: need to examine "optional-cohort"
|
/freebsd/crypto/openssl/ |
H A D | NOTES-ANDROID.md | 7 Beside basic tools like perl and make you'll need to download the Android 25 you still need to know the prefix to extend your PATH, in order to 29 Apart from `PATH` adjustment you need to set `ANDROID_NDK_ROOT` environment 35 `android-21`, etc. By default latest API level is chosen. If you need to target 64 Also, PATH would need even further adjustment to cover unprefixed, yet 65 target-specific, ar and ranlib. It's possible that you don't need to 82 remove occurrences of -ldl and -pie flags. You would also need to pick 88 If you need to pass additional flag to qemu, quotes are your friend, e.g.
|