| /src/lib/libc/gen/ |
| fnmatch.c | 76 int negate, ok, need; local 91 need = 1; 92 for (ok = 0; (c = FOLDCASE(*pattern++, flags)) != ']' || need;) { 93 need = 0;
|
| /src/external/bsd/wpa/dist/src/tls/ |
| bignum.c | 77 size_t need = mp_unsigned_bin_size((mp_int *) n); local 78 if (len && need > *len) { 79 *len = need; 87 *len = need;
|
| /src/crypto/external/bsd/openssh/dist/ |
| kexmlkem768x25519.c | 53 size_t need; local 59 need = crypto_kem_mlkem768_PUBLICKEYBYTES + CURVE25519_SIZE; 60 if ((r = sshbuf_reserve(buf, need, &cp)) != 0) 98 size_t need; local 108 need = crypto_kem_mlkem768_PUBLICKEYBYTES + CURVE25519_SIZE; 109 if (sshbuf_len(client_blob) != need) { 194 size_t need; local 203 need = crypto_kem_mlkem768_CIPHERTEXTBYTES + CURVE25519_SIZE; 204 if (sshbuf_len(server_blob) != need) {
|
| kexsntrup761x25519.c | 52 size_t need; local 57 need = crypto_kem_sntrup761_PUBLICKEYBYTES + CURVE25519_SIZE; 58 if ((r = sshbuf_reserve(buf, need, &cp)) != 0) 88 size_t need; local 95 need = crypto_kem_sntrup761_PUBLICKEYBYTES + CURVE25519_SIZE; 96 if (sshbuf_len(client_blob) != need) { 122 need = crypto_kem_sntrup761_CIPHERTEXTBYTES + CURVE25519_SIZE; 123 if ((r = sshbuf_reserve(server_blob, need, &ciphertext)) != 0) 172 size_t need; local 177 need = crypto_kem_sntrup761_CIPHERTEXTBYTES + CURVE25519_SIZE [all...] |
| bitmap.c | 172 size_t i, j, k, need = bitmap_nbytes(b); local 174 if (l < need || b->top >= b->len) 176 if (l > need) 177 l = need; 183 s[need - 1 - k++] = (b->d[i] >> (j * 8)) & 0xff;
|
| sshbuf.c | 331 size_t rlen, need; local 351 need = len + buf->size - buf->alloc; 352 rlen = ROUNDUP(buf->alloc + need, SSHBUF_SIZE_INC); 353 SSHBUF_DBG(("need %zu initial rlen %zu", need, rlen)); 355 rlen = buf->alloc + need;
|
| /src/games/backgammon/backgammon/ |
| main.c | 70 static const char need[] = "Do you need instructions for this program?"; variable 120 /* need this now beceause getarg() may try to load a game */ 157 writel(need);
|
| /src/sys/external/isc/libsodium/dist/src/libsodium/crypto_pwhash/scryptsalsa208sha256/nosse/ |
| pwhash_scryptsalsa208sha256_nosse.c | 297 size_t B_size, V_size, XY_size, need; local 338 need = B_size + V_size; 339 if (need < V_size) { 344 need += XY_size; 345 if (need < XY_size) { 349 if (local->size < need) { 353 if (!alloc_region(local, need)) {
|
| /src/external/ibm-public/postfix/dist/src/oqmgr/ |
| qmgr_transport.c | 304 int need; local 323 need = xport->pending + 1; 327 if ((need -= MIN5af51743e4eef(queue->window - queue->busy_refcount,
|
| /src/external/ibm-public/postfix/dist/src/qmgr/ |
| qmgr_transport.c | 309 int need; local 328 need = xport->pending + 1; 332 if ((need -= MIN5af51743e4eef(queue->window - queue->busy_refcount,
|
| /src/sys/external/isc/libsodium/dist/src/libsodium/crypto_pwhash/scryptsalsa208sha256/ |
| crypto_scrypt-common.c | 147 size_t need; local 167 need = prefixlen + saltlen + 1 + 169 if (need > buflen || need < saltlen) { 205 size_t need; local 207 need = prefixlen + saltlen + 1; 208 if (need > buflen || need < saltlen || saltlen < srclen) {
|
| /src/sys/external/isc/libsodium/dist/src/libsodium/crypto_pwhash/scryptsalsa208sha256/sse/ |
| pwhash_scryptsalsa208sha256_sse.c | 313 size_t B_size, V_size, XY_size, need; local 358 need = B_size + V_size; 360 if (need < V_size) { 366 need += XY_size; 368 if (need < XY_size) { 373 if (local->size < need) { 377 if (!alloc_region(local, need)) {
|
| /src/usr.bin/hexdump/ |
| display.c | 239 int need, nread; local 251 for (need = blocksize, nread = 0;;) { 258 if (need == blocksize) 260 if (!need && vflag != ALL && 266 memset((char *)curp + nread, 0, need); 271 length == -1 ? need : MIN(length, need), stdin); 281 if (!(need -= n)) { 292 need = blocksize;
|
| /src/external/bsd/wpa/dist/src/crypto/ |
| md4-internal.c | 57 * except that you don't need to include two pages of legalese 113 size_t have, need; local 115 /* Check how many bytes we already have and how many more we need. */ 117 need = MD4_BLOCK_LENGTH - have; 122 if (len >= need) { 124 os_memcpy(ctx->buffer + have, input, need); 126 input += need; 127 len -= need;
|
| /src/external/gpl2/xcvs/dist/src/ |
| gssapi-client.c | 45 recv_bytes (int sock, char *buf, int need) 47 while (need > 0) 51 got = recv (sock, buf, need, 0); 58 need -= got; 72 * I think, basically, it will need to use buf_output and buf_read directly 140 int need; local 150 need = ((cbuf[0] & 0xff) << 8) | (cbuf[1] & 0xff); 152 if (need > sizeof buf) 181 recv_bytes (sock, buf, need); 182 tok_in.length = need; [all...] |
| /src/common/lib/libc/hash/rmd160/ |
| rmd160.c | 138 uint32_t have, off, need; local 141 need = 64 - have; 145 if (len >= need) { 147 memcpy(ctx->buffer + have, input, (size_t)need); 149 off = need;
|
| /src/crypto/external/bsd/netpgp/dist/src/netpgpverify/ |
| rmd160.c | 111 uint32_t have, off, need; local 114 need = 64 - have; 118 if (len >= need) { 120 memcpy(ctx->buffer + have, input, (size_t)need); 122 off = need;
|
| /src/external/bsd/openldap/dist/libraries/liblber/ |
| io.c | 157 ber_len_t need = (len + (LBER_EXBUFSIZ - 1)) / LBER_EXBUFSIZ; local 158 total = ( have + need ) * LBER_EXBUFSIZ;
|
| /src/external/bsd/wpa/dist/src/eap_peer/ |
| eap_fast_pac.c | 481 size_t i, need; local 489 need = os_strlen(field) + len * 2 + 30; 491 need += os_strlen(field) + len + 20; 493 if (*pos - *buf + need > *buf_len) { 494 char *nbuf = os_realloc(*buf, *buf_len + need); 502 *buf_len += need;
|
| eap_teap_pac.c | 482 size_t i, need; local 489 need = os_strlen(field) + len * 2 + 30; 491 need += os_strlen(field) + len + 20; 493 if (*pos - *buf + need > *buf_len) { 494 char *nbuf = os_realloc(*buf, *buf_len + need); 503 *buf_len += need;
|
| /src/external/gpl3/gcc/dist/libdecnumber/dpd/ |
| decimal128.c | 145 /* the dn is known to fit, but it may need to be padded */ 200 Int need; /* work */ local 247 need=12; /* process 12 declets */ 250 if (sourhi) need=11; /* declets to process */ 251 else if (sourmh) need=10; 252 else if (sourml) need=7; 253 else if (sourlo) need=4; 257 decDigitsFromDPD(dn, sourar, need); /* process declets */ 387 if (exp>0 || pre<-5) { /* need exponential form */ 409 *(c-1)='-'; /* oops, need '-' * [all...] |
| /src/external/gpl3/gcc.old/dist/libdecnumber/dpd/ |
| decimal128.c | 145 /* the dn is known to fit, but it may need to be padded */ 200 Int need; /* work */ local 247 need=12; /* process 12 declets */ 250 if (sourhi) need=11; /* declets to process */ 251 else if (sourmh) need=10; 252 else if (sourml) need=7; 253 else if (sourlo) need=4; 257 decDigitsFromDPD(dn, sourar, need); /* process declets */ 387 if (exp>0 || pre<-5) { /* need exponential form */ 409 *(c-1)='-'; /* oops, need '-' * [all...] |
| /src/external/gpl3/gdb/dist/libdecnumber/dpd/ |
| decimal128.c | 145 /* the dn is known to fit, but it may need to be padded */ 200 Int need; /* work */ local 247 need=12; /* process 12 declets */ 250 if (sourhi) need=11; /* declets to process */ 251 else if (sourmh) need=10; 252 else if (sourml) need=7; 253 else if (sourlo) need=4; 257 decDigitsFromDPD(dn, sourar, need); /* process declets */ 387 if (exp>0 || pre<-5) { /* need exponential form */ 409 *(c-1)='-'; /* oops, need '-' * [all...] |
| /src/external/gpl3/gdb.old/dist/libdecnumber/dpd/ |
| decimal128.c | 145 /* the dn is known to fit, but it may need to be padded */ 200 Int need; /* work */ local 247 need=12; /* process 12 declets */ 250 if (sourhi) need=11; /* declets to process */ 251 else if (sourmh) need=10; 252 else if (sourml) need=7; 253 else if (sourlo) need=4; 257 decDigitsFromDPD(dn, sourar, need); /* process declets */ 387 if (exp>0 || pre<-5) { /* need exponential form */ 409 *(c-1)='-'; /* oops, need '-' * [all...] |
| /src/external/ibm-public/postfix/dist/src/util/ |
| vstring.c | 131 /* need to be null terminated and may contain arbitrary binary data. 160 /* into the buffer before the buffer would need to grow. 359 ssize_t need; local 363 if ((need = len - bp->cnt) > 0) 364 vstring_extend(bp, need);
|