/freebsd/crypto/openssh/ |
H A D | kexsntrup761x25519.c | 51 size_t need; in kex_kem_sntrup761x25519_keypair() local 56 need = crypto_kem_sntrup761_PUBLICKEYBYTES + CURVE25519_SIZE; in kex_kem_sntrup761x25519_keypair() 57 if ((r = sshbuf_reserve(buf, need, &cp)) != 0) in kex_kem_sntrup761x25519_keypair() 87 size_t need; in kex_kem_sntrup761x25519_enc() local 94 need = crypto_kem_sntrup761_PUBLICKEYBYTES + CURVE25519_SIZE; in kex_kem_sntrup761x25519_enc() 95 if (sshbuf_len(client_blob) != need) { in kex_kem_sntrup761x25519_enc() 121 need = crypto_kem_sntrup761_CIPHERTEXTBYTES + CURVE25519_SIZE; in kex_kem_sntrup761x25519_enc() 122 if ((r = sshbuf_reserve(server_blob, need, &ciphertext)) != 0) in kex_kem_sntrup761x25519_enc() 171 size_t need; in kex_kem_sntrup761x25519_dec() local 176 need = crypto_kem_sntrup761_CIPHERTEXTBYTES + CURVE25519_SIZE; in kex_kem_sntrup761x25519_dec() [all …]
|
H A D | kexmlkem768x25519.c | 57 size_t need; in kex_kem_mlkem768x25519_keypair() local 63 need = crypto_kem_mlkem768_PUBLICKEYBYTES + CURVE25519_SIZE; in kex_kem_mlkem768x25519_keypair() 64 if ((r = sshbuf_reserve(buf, need, &cp)) != 0) in kex_kem_mlkem768x25519_keypair() 102 size_t need; in kex_kem_mlkem768x25519_enc() local 112 need = crypto_kem_mlkem768_PUBLICKEYBYTES + CURVE25519_SIZE; in kex_kem_mlkem768x25519_enc() 113 if (sshbuf_len(client_blob) != need) { in kex_kem_mlkem768x25519_enc() 198 size_t need; in kex_kem_mlkem768x25519_dec() local 207 need = crypto_kem_mlkem768_CIPHERTEXTBYTES + CURVE25519_SIZE; in kex_kem_mlkem768x25519_dec() 208 if (sshbuf_len(server_blob) != need) { in kex_kem_mlkem768x25519_dec()
|
H A D | dh.c | 284 dh_gen_key(DH *dh, int need) in dh_gen_key() argument 291 if (need < 0 || dh_p == NULL || in dh_gen_key() 293 need > INT_MAX / 2 || 2 * need > pbits) in dh_gen_key() 295 if (need < 256) in dh_gen_key() 296 need = 256; in dh_gen_key() 301 if (!DH_set_length(dh, MINIMUM(need * 2, pbits - 1))) in dh_gen_key()
|
H A D | bitmap.c | 171 size_t i, j, k, need = bitmap_nbytes(b); in bitmap_to_string() local 173 if (l < need || b->top >= b->len) in bitmap_to_string() 175 if (l > need) in bitmap_to_string() 176 l = need; in bitmap_to_string() 182 s[need - 1 - k++] = (b->d[i] >> (j * 8)) & 0xff; in bitmap_to_string()
|
/freebsd/contrib/ncurses/ncurses/tinfo/ |
H A D | lib_print.c | 52 size_t need; in NCURSES_EXPORT() local 72 need = onsize + (size_t) len + offsize; in NCURSES_EXPORT() 75 || (mybuf = typeMalloc(char, need + 1)) == 0) { in NCURSES_EXPORT() 81 _nc_STRCPY(mybuf, switchon, need); in NCURSES_EXPORT() 84 _nc_STRCPY(mybuf + onsize + len, prtr_off, need); in NCURSES_EXPORT() 93 result = (int) write(SP_PARM->_ofd, mybuf, need); in NCURSES_EXPORT()
|
H A D | lib_tgoto.c | 78 size_t need = 10; in tgoto_internal() local 83 need += strlen(BC); in tgoto_internal() 90 if ((used + need) > length) { in tgoto_internal() 91 length += (used + need); in tgoto_internal()
|
/freebsd/contrib/ncurses/ncurses/trace/ |
H A D | trace_buf.c | 53 size_t need = (size_t) (bufnum + 1) * 2; in _nc_trace_alloc() local 54 if ((MyList = typeRealloc(TRACEBUF, need, MyList)) != 0) { in _nc_trace_alloc() 55 while (need > MySize) in _nc_trace_alloc() 114 size_t need = strlen(value) + have; in _nc_trace_bufcat() local 116 buffer = _nc_trace_alloc(bufnum, 1 + need); in _nc_trace_bufcat() 118 _nc_STRCPY(buffer + have, value, need); in _nc_trace_bufcat()
|
/freebsd/contrib/sendmail/libsm/ |
H A D | mbdb.c | 482 int need; local 589 need = NEED_FULLNAME|NEED_HOMEDIR|NEED_SHELL|NEED_UID|NEED_GID; 627 if (!bitset(NEED_FULLNAME, need) || 633 need &= ~NEED_FULLNAME; 637 if (!bitset(NEED_HOMEDIR, need) || 643 need &= ~NEED_HOMEDIR; 647 if (!bitset(NEED_SHELL, need) || 653 need &= ~NEED_SHELL; 659 if (!bitset(NEED_UID, need)) 675 need &= ~NEED_UID; [all …]
|
/freebsd/contrib/ncurses/progs/ |
H A D | dump_entry.c | 118 strncpy_DYN(DYNBUF * dst, const char *src, size_t need) in strncpy_DYN() argument 120 size_t want = need + dst->used + 1; in strncpy_DYN() 127 _nc_STRNCPY(dst->text + dst->used, src, need + 1); in strncpy_DYN() 128 dst->used += need; in strncpy_DYN() 504 int need = op_length(src, step + n); in find_split() local 505 if ((n + need) > size) { in find_split() 527 size_t need = strlen(src); in fill_spaces() local 536 _nc_STRCPY(&result[d], fill, need + 1 - d); in fill_spaces() 539 need += size; in fill_spaces() 552 result = calloc(need + 1, sizeof(char)); in fill_spaces() [all …]
|
H A D | transform.c | 48 size_t need = (sizeof(ignore) - 1); in trim_suffix() local 50 if (*len > need) { in trim_suffix() 51 size_t first = *len - need; in trim_suffix() 61 *len -= need; in trim_suffix()
|
/freebsd/sys/contrib/libsodium/src/libsodium/crypto_pwhash/scryptsalsa208sha256/ |
H A D | crypto_scrypt-common.c | 147 size_t need; in escrypt_r() local 167 need = prefixlen + saltlen + 1 + in escrypt_r() 169 if (need > buflen || need < saltlen) { in escrypt_r() 205 size_t need; in escrypt_gensalt_r() local 207 need = prefixlen + saltlen + 1; in escrypt_gensalt_r() 208 if (need > buflen || need < saltlen || saltlen < srclen) { in escrypt_gensalt_r()
|
/freebsd/usr.bin/hexdump/ |
H A D | display.c | 235 int need, nread; in get() local 251 for (need = blocksize, nread = 0;;) { in get() 260 if (need == blocksize) in get() 266 if (need == 0 && vflag != ALL && in get() 275 bzero((char *)curp + nread, need); in get() 280 length == -1 ? need : MIN(length, need), stdin); in get() 290 if (!(need -= n)) { in get() 308 need = blocksize; in get()
|
/freebsd/contrib/file/magic/Magdir/ |
H A D | mup | 17 >>>>14 string x \b, need V%.4s 19 >>>>14 string x \b, need V%.3s 22 >>>7 string x \b, need V%.4s 24 >>>7 string x \b, need V%.3s
|
/freebsd/contrib/ncurses/ncurses/base/ |
H A D | lib_slkset.c | 84 size_t need; in NCURSES_EXPORT() local 87 need = mbrtowc(0, p, strlen(p), &state); in NCURSES_EXPORT() 88 if (need == (size_t) -1) in NCURSES_EXPORT() 90 mbrtowc(&wc, p, need, &state); in NCURSES_EXPORT() 96 p += need; in NCURSES_EXPORT()
|
/freebsd/contrib/capsicum-test/ |
H A D | CONTRIBUTING.md | 9 own the intellectual property, then you'll need to sign an [individual 13 then you'll need to sign a [corporate CLA][]. 15 You generally only need to submit a CLA once, so if you've already submitted 16 one (even if it was for a different project), you probably don't need to do it
|
/freebsd/tools/test/stress2/misc/ |
H A D | vm_fault_dontneed.sh | 50 need=2048 52 [ $need -gt $have ] && need=$((have - 1)) 53 dd if=/dev/zero of=$diskimage bs=1m count=$need status=none
|
H A D | maxmemdom.sh | 38 need=$((size * 2)) 43 $need ] && printf "Need %d MB on %s.\n" $need `dirname $diskimage` && exit
|
H A D | vmio.sh | 46 need=$((size * 2)) 51 -lt $need ] && 52 printf "Need %d MB on %s.\n" $need `dirname $diskimage` && exit 0
|
/freebsd/tools/boot/ |
H A D | full-test.readme | 1 First, you will need a few things. 3 (1) a small cache of binaries. You'll need to put these into 13 tools/boot/full-test.sh if need be, but you'll need at least amd64, arm64 and 22 since we need to fix arm64... 24 (5) You'll need to build the images. If you've done 1-5 correctly (and I've not
|
/freebsd/contrib/wpa/src/tls/ |
H A D | bignum.c | 77 size_t need = mp_unsigned_bin_size((mp_int *) n); in bignum_get_unsigned_bin() local 78 if (len && need > *len) { in bignum_get_unsigned_bin() 79 *len = need; in bignum_get_unsigned_bin() 87 *len = need; in bignum_get_unsigned_bin()
|
/freebsd/contrib/tnftp/ |
H A D | todo | 9 Interix may need hack to fix detection of getpgrp() void args. 19 check if we need #defines for memcpy() et al 23 system specific tests (to remove need for manual intervention):
|
/freebsd/crypto/openssl/ |
H A D | NOTES-ANDROID.md | 7 Beside basic tools like perl and make you'll need to download the Android 25 you still need to know the prefix to extend your PATH, in order to 29 Apart from `PATH` adjustment you need to set `ANDROID_NDK_ROOT` environment 35 `android-21`, etc. By default latest API level is chosen. If you need to target 64 Also, PATH would need even further adjustment to cover unprefixed, yet 65 target-specific, ar and ranlib. It's possible that you don't need to 82 remove occurrences of -ldl and -pie flags. You would also need to pick 88 If you need to pass additional flag to qemu, quotes are your friend, e.g.
|
/freebsd/contrib/bmake/unit-tests/ |
H A D | depsrc-optional.exp | 2 ExamineLater: need to examine "important" 4 ExamineLater: need to examine "optional" 5 ExamineLater: need to examine "optional-cohort"
|
/freebsd/contrib/dialog/ |
H A D | editbox.c | 42 size_t need = (size_t) (want | 31) + 3; in grow_list() local 43 *have = (int) need; in grow_list() 44 (*list) = dlg_realloc(char *, need, *list); in grow_list() 48 while (++last < need) { in grow_list() 93 unsigned need = 0; in load_list() local 97 (*list)[need] = blob + n; in load_list() 102 ++need; in load_list() 108 if (need == 0) { in load_list() 112 for (n = 0; n < need; ++n) { in load_list() 115 (*list)[need] = 0; in load_list() [all …]
|
/freebsd/sys/netpfil/ipfw/ |
H A D | ip_dn_glue.c | 564 int need = 0; in dn_compat_calc_size() local 572 need += V_dn_cfg.schk_count * sizeof(struct dn_pipe8) / 2; in dn_compat_calc_size() 573 need += V_dn_cfg.fsk_count * sizeof(struct dn_flow_set); in dn_compat_calc_size() 574 need += V_dn_cfg.si_count * sizeof(struct dn_flow_queue8); in dn_compat_calc_size() 575 need += V_dn_cfg.queue_count * sizeof(struct dn_flow_queue8); in dn_compat_calc_size() 577 return need; in dn_compat_calc_size() 671 int need = 0; in dn_compat_copy_pipe() local 683 need = pipe_size + queue_size * n_queue; in dn_compat_copy_pipe() 684 if (have < need) { in dn_compat_copy_pipe() 685 D("have %d < need %d", have, need); in dn_compat_copy_pipe() [all …]
|