/dragonfly/lib/libc/rpc/ |
H A D | clnt_vc.c | 174 ct = (struct ct_data *)mem_alloc(sizeof (*ct)); in clnt_vc_create() 246 ct->ct_fd = fd; in clnt_vc_create() 269 xdrmem_create(&(ct->ct_xdrs), ct->ct_u.ct_mcallc, MCALL_MSG_SIZE, in clnt_vc_create() 277 ct->ct_mpos = XDR_GETPOS(&(ct->ct_xdrs)); in clnt_vc_create() 295 if (ct) { in clnt_vc_create() 297 mem_free(ct->ct_addr.buf, ct->ct_addr.len); in clnt_vc_create() 348 if ((! XDR_PUTBYTES(xdrs, ct->ct_u.ct_mcallc, ct->ct_mpos)) || in clnt_vc_call() 429 struct ct_data *ct; in clnt_vc_geterr() local 528 memcpy(info, ct->ct_addr.buf, (size_t)ct->ct_addr.len); in clnt_vc_control() 617 if (ct->ct_closeit && ct->ct_fd != -1) { in clnt_vc_destroy() [all …]
|
/dragonfly/games/hack/ |
H A D | hack.makemon.c | 81 int tmp, ct; in makemon() local 92 ct = CMNUM - strlen(fut_geno); in makemon() 96 ct++; in makemon() 97 if (ct <= 0) in makemon() 102 if (tmp >= ct) in makemon() 103 tmp = rn1(ct - ct / 2, ct / 2); in makemon() 104 for (ct = 0; ct < CMNUM; ct++) { in makemon() 105 ptr = &mons[ct]; in makemon() 263 int ct; in mkmon_at() local 266 for (ct = 0; ct < CMNUM; ct++) { in mkmon_at() [all …]
|
H A D | hack.invent.c | 727 unsigned ct = 0; in doinv() local 743 any[ct++] = ilet; in doinv() 749 any[ct] = 0; in doinv() 840 int ct = 0; in dolook() local 860 ct++; in dolook() 876 if (!ct++) in dolook() 881 if (ct == 1 && !gold) { in dolook() 885 if (ct > 1) in dolook() 977 int ct = 0; in doprarm() local 989 lets[ct] = 0; in doprarm() [all …]
|
H A D | hack.main.c | 496 int c, ct; in askname() local 499 ct = 0; in askname() 505 if (ct) in askname() 506 ct--; in askname() 512 if (ct < (int)sizeof(plname) - 1) in askname() 513 plname[ct++] = c; in askname() 515 plname[ct] = 0; in askname() 516 if (ct == 0) in askname()
|
/dragonfly/contrib/wpa_supplicant/src/tls/ |
H A D | tlsv1_client_read.c | 86 if (ct != TLS_CONTENT_TYPE_HANDSHAKE) { in tls_process_server_hello() 88 "received content type 0x%x", ct); in tls_process_server_hello() 355 if (ct != TLS_CONTENT_TYPE_HANDSHAKE) { in tls_process_certificate() 357 "received content type 0x%x", ct); in tls_process_certificate() 825 if (ct != TLS_CONTENT_TYPE_HANDSHAKE) { in tls_process_certificate_status() 828 ct); in tls_process_certificate_status() 1021 if (ct != TLS_CONTENT_TYPE_HANDSHAKE) { in tls_process_server_key_exchange() 1023 "received content type 0x%x", ct); in tls_process_server_key_exchange() 1241 u8 ct, const u8 *in_data, in tls_process_server_change_cipher_spec() argument 1479 if (ct == TLS_CONTENT_TYPE_ALERT) { in tlsv1_client_process_handshake() [all …]
|
H A D | tlsv1_server_read.c | 26 u8 ct, const u8 *in_data, 131 if (ct != TLS_CONTENT_TYPE_HANDSHAKE) { in tls_process_client_hello() 133 ct); in tls_process_client_hello() 407 ct); in tls_process_certificate() 818 ct); in tls_process_client_key_exchange() 908 ct); in tls_process_certificate_verify() 1046 u8 ct, const u8 *in_data, in tls_process_change_cipher_spec() argument 1054 ct); in tls_process_change_cipher_spec() 1144 ct); in tls_process_client_finished() 1272 if (ct == TLS_CONTENT_TYPE_ALERT) { in tlsv1_server_process_handshake() [all …]
|
H A D | tlsv1_record.c | 287 u8 ct; in tlsv1_record_receive() local 298 ct = in_data[0]; in tlsv1_record_receive() 301 "length %d", ct, in_data[1], in_data[2], (int) rlen); in tlsv1_record_receive() 336 if (ct != TLS_CONTENT_TYPE_HANDSHAKE && in tlsv1_record_receive() 337 ct != TLS_CONTENT_TYPE_CHANGE_CIPHER_SPEC && in tlsv1_record_receive() 338 ct != TLS_CONTENT_TYPE_ALERT && in tlsv1_record_receive() 339 ct != TLS_CONTENT_TYPE_APPLICATION_DATA) { in tlsv1_record_receive() 341 "content type 0x%x", ct); in tlsv1_record_receive()
|
/dragonfly/sys/dev/disk/isp/ |
H A D | isp_target.c | 803 ct->ct_nphdl = CT7_OK; in isp_target_async() 804 ct->ct_syshandle = bus; in isp_target_async() 810 ct->ct_status = CT_OK; in isp_target_async() 811 ct->ct_syshandle = bus; in isp_target_async() 816 ct->ct_status = CT_OK; in isp_target_async() 819 ct->ct_fwhandle = 0; in isp_target_async() 1375 if (ct->ct_syshandle) { in isp_handle_ctio() 1447 …, ISP_LOGERR, "Firmware rejected CTIO for bad nexus %d/%d/%d", ct->ct_iid, ct->ct_tgt, ct->ct_lun); in isp_handle_ctio() 1525 if (ct->ct_syshandle) { in isp_handle_ctio2() 1680 if (ct->ct_syshandle) { in isp_handle_ctio7() [all …]
|
/dragonfly/contrib/openbsd_libm/src/ |
H A D | s_casinl.c | 69 static long double complex ca, ct, zz, z2; in casinl() local 97 ct = z2 * ca; in casinl() 98 ca = ct; in casinl() 106 ct *= b; in casinl() 107 sum += ct; in casinl() 108 b = cabsl(ct); in casinl() 117 ct = ca * I; /* iz */ in casinl() 125 zz = ct + z2; in casinl()
|
H A D | s_casinf.c | 58 static float complex ca, ct, zz, z2; in casinf() local 119 ct = ca * I; /* iz */ in casinf() 127 zz = ct + z2; in casinf()
|
/dragonfly/usr.sbin/nvmmctl/ |
H A D | nvmmctl.c | 64 const struct cmdtab *ct; in main() local 71 for (ct = nvmm_cmdtab; ct->label != NULL; ct++) { in main() 72 if (strcmp(argv[0], ct->label) == 0) { in main() 73 if (!ct->argsoptional && in main() 74 ((ct->takesargs == 0) ^ (argv[1] == NULL))) in main() 78 (*ct->func)(argv + 1); in main() 83 if (ct->label == NULL) in main()
|
/dragonfly/crypto/libressl/crypto/aes/ |
H A D | aes_locl.h | 68 #define PUTU32(ct, st) { (ct)[0] = (u8)((st) >> 24); (ct)[1] = (u8)((st) >> 16); (ct)[2] = (u8)((st… argument
|
/dragonfly/usr.bin/mt/ |
H A D | mt.c | 562 struct compression_types *ct; in comptostring() local 569 for (ct = comp_types; ct->name; ct++) in comptostring() 570 if (ct->comp_number == comp) in comptostring() 573 if (ct->comp_number == 0xf0f0f0f0) { in comptostring() 577 return(ct->name); in comptostring() 583 struct compression_types *ct; in stringtocomp() local 586 for (ct = comp_types; ct->name; ct++) in stringtocomp() 587 if (strncasecmp(ct->name, s, l) == 0) in stringtocomp() 590 return(ct->comp_number); in stringtocomp()
|
/dragonfly/usr.bin/last/ |
H A D | last.c | 327 char *ct; in wtmpx() local 370 ct = fmttime(bp->ut_xtime, fulltime); in wtmpx() 374 hostsz, hostsz, bp->ut_host, ct); in wtmpx() 387 ct = fmttime(bp->ut_xtime, fulltime); in wtmpx() 395 ct); in wtmpx() 414 ct = fmttime(bp->ut_xtime, fulltime); in wtmpx() 419 ct); in wtmpx() 450 if ((ct = strrchr(file, '/')) != NULL) in wtmpx() 451 ct++; in wtmpx() 452 printf("\n%s begins %s\n", ct ? ct : file, crmsg); in wtmpx()
|
/dragonfly/contrib/zstd/lib/compress/ |
H A D | fse_compress.c | 67 size_t FSE_buildCTable_wksp(FSE_CTable* ct, in FSE_buildCTable_wksp() argument 73 void* const ptr = ct; in FSE_buildCTable_wksp() 317 void FSE_freeCTable (FSE_CTable* ct) { ZSTD_free(ct); } in FSE_freeCTable() argument 501 size_t FSE_buildCTable_raw (FSE_CTable* ct, unsigned nbBits) in FSE_buildCTable_raw() argument 506 void* const ptr = ct; in FSE_buildCTable_raw() 536 void* ptr = ct; in FSE_buildCTable_rle() 576 FSE_initCState2(&CState1, ct, *--ip); in FSE_compress_usingCTable_generic() 577 FSE_initCState2(&CState2, ct, *--ip); in FSE_compress_usingCTable_generic() 581 FSE_initCState2(&CState2, ct, *--ip); in FSE_compress_usingCTable_generic() 582 FSE_initCState2(&CState1, ct, *--ip); in FSE_compress_usingCTable_generic() [all …]
|
/dragonfly/usr.bin/systat/ |
H A D | cmds.c | 144 struct cmdtab *ct, *found; in lookup() local 150 for (ct = cmdtab; (p = ct->c_name); ct++) { in lookup() 153 return (ct); in lookup() 158 found = ct; in lookup()
|
/dragonfly/contrib/zstd/lib/common/ |
H A D | fse.h | 168 FSE_PUBLIC_API void FSE_freeCTable (FSE_CTable* ct); 173 FSE_PUBLIC_API size_t FSE_buildCTable(FSE_CTable* ct, const short* normalizedCounter, unsigned maxS… 180 …usingCTable (void* dst, size_t dstCapacity, const void* src, size_t srcSize, const FSE_CTable* ct); 330 size_t FSE_buildCTable_raw (FSE_CTable* ct, unsigned nbBits); 333 size_t FSE_buildCTable_rle (FSE_CTable* ct, unsigned char symbolValue); 383 static void FSE_initCState(FSE_CState_t* CStatePtr, const FSE_CTable* ct); 513 MEM_STATIC void FSE_initCState(FSE_CState_t* statePtr, const FSE_CTable* ct) in FSE_initCState() argument 515 const void* ptr = ct; in FSE_initCState() 520 statePtr->symbolTT = ct + 1 + (tableLog ? (1<<(tableLog-1)) : 1); in FSE_initCState() 528 MEM_STATIC void FSE_initCState2(FSE_CState_t* statePtr, const FSE_CTable* ct, U32 symbol) in FSE_initCState2() argument [all …]
|
/dragonfly/usr.bin/tftp/ |
H A D | tftpsubs.c | 168 writeit(FILE *file, struct tftphdr **dpp, int ct, int convert) in writeit() argument 170 bfs[current].counter = ct; /* set size of data to write */ in writeit() 176 return ct; /* this is a lie of course */ in writeit() 190 int ct; in write_behind() local 212 ct = count; in write_behind() 213 while (ct--) { /* loop over the buffer */ in write_behind()
|
/dragonfly/usr.bin/localedef/ |
H A D | ctype.c | 294 _FileRuneEntry *ct = NULL; in dump_ctype() local 411 ct[rl.runetype_ext_nranges-1].max = wc; in dump_ctype() 414 ct = realloc(ct, in dump_ctype() 415 sizeof (*ct) * rl.runetype_ext_nranges); in dump_ctype() 416 ct[rl.runetype_ext_nranges - 1].min = wc; in dump_ctype() 417 ct[rl.runetype_ext_nranges - 1].max = wc; in dump_ctype() 418 ct[rl.runetype_ext_nranges - 1].map = ctn->ctype; in dump_ctype() 455 (wr_category(ct, sizeof (*ct) * rl.runetype_ext_nranges, f) < 0) || in dump_ctype()
|
/dragonfly/contrib/wpa_supplicant/src/crypto/ |
H A D | aes_i.h | 111 #define PUTU32(ct, st) { *((u32 *)(ct)) = SWAP((st)); } argument 115 #define PUTU32(ct, st) { \ argument 116 (ct)[0] = (u8)((st) >> 24); (ct)[1] = (u8)((st) >> 16); \ 117 (ct)[2] = (u8)((st) >> 8); (ct)[3] = (u8)(st); }
|
H A D | aes-internal-enc.c | 23 static void rijndaelEncrypt(const u32 rk[], int Nr, const u8 pt[16], u8 ct[16]) in rijndaelEncrypt() 88 PUTU32(ct , s0); in rijndaelEncrypt() 90 PUTU32(ct + 4, s1); in rijndaelEncrypt() 92 PUTU32(ct + 8, s2); in rijndaelEncrypt() 94 PUTU32(ct + 12, s3); in rijndaelEncrypt()
|
/dragonfly/bin/ed/ |
H A D | buf.c | 51 int len, ct; in get_sbuf_line() local 67 if ((ct = fread(sfbuf, sizeof(char), len, sfp)) < 0 || ct != len) { in get_sbuf_line() 84 int len, ct; in put_sbuf_line() local 113 if ((ct = fwrite(cs, sizeof(char), len, sfp)) < 0 || ct != len) { in put_sbuf_line()
|
/dragonfly/test/stress/stress2/testcases/run/ |
H A D | run.c | 93 char ct[80]; in test() local 100 (void) strftime(ct, sizeof(ct), "%T", tm); in test() 101 printf("%s Loop #%d\n", ct, loop++); in test()
|
/dragonfly/usr.bin/telnet/ |
H A D | commands.c | 897 for (ct = Setlist; ct->name; ct++) in setcmd() 898 printf("%-15s %s\n", ct->name, ct->help); in setcmd() 906 if (ct == NULL) { in setcmd() 942 printf("%s set to \"%s\".\n", ct->name, (char *)ct->charp); in setcmd() 950 printf("%s character is '%s'.\n", ct->name, control(*(ct->charp))); in setcmd() 969 for (ct = Setlist; ct->name; ct++) in unsetcmd() 970 printf("%-15s %s\n", ct->name, ct->help); in unsetcmd() 981 ct = getset(name); in unsetcmd() 982 if (ct == NULL) { in unsetcmd() 1008 printf("%s reset to \"%s\".\n", ct->name, (char *)ct->charp); in unsetcmd() [all …]
|
/dragonfly/contrib/tcpdump/ |
H A D | print-esp.c | 185 const u_char *iv, const u_char *ct, unsigned int ctlen) in do_decrypt() argument 258 if (!EVP_DecryptUpdate(ctx, pt, &len, ct, ctlen)) { in do_decrypt() 290 const u_char *ct; in esp_decrypt_buffer_by_ikev2_print() local 315 ct = iv + sa->ivlen; in esp_decrypt_buffer_by_ikev2_print() 316 ctlen = end-ct; in esp_decrypt_buffer_by_ikev2_print() 318 if(end <= ct) return 0; in esp_decrypt_buffer_by_ikev2_print() 321 ct, ctlen); in esp_decrypt_buffer_by_ikev2_print() 742 const u_char *ct; in esp_print() local 835 ct = iv + ivlen; in esp_print() 843 if (ep - ct < sa->authlen) { in esp_print() [all …]
|