| /src/sbin/gpt/ |
| restore.c | 131 restore_ent(gpt_t gpt, prop_dictionary_t gpt_dict, void *secbuf, 169 memcpy((char *)secbuf + gpt->secsz + ((i - 1) * sizeof(ent)), 190 void *secbuf = NULL; local 279 if ((secbuf = calloc(gpt_size + 1, gpt->secsz)) == NULL) { 289 if (write(gpt->fd, secbuf, gpt->secsz) != (ssize_t)gpt->secsz) { 299 if (write(gpt->fd, secbuf, gpt->secsz) != (ssize_t)gpt->secsz) { 305 mbr = secbuf; 333 if (restore_ent(gpt, gpt_dict, secbuf, gpt_size, entries) == -1) 340 write(gpt->fd, (char *)secbuf + gpt->secsz, len) != (ssize_t) len) { 346 write(gpt->fd, (char *)secbuf + gpt->secsz, len) != (ssize_t) len) [all...] |
| /src/sys/arch/vax/vax/ |
| crx.c | 146 char secbuf[512]; local 186 error = uiomove(secbuf, 512, uio); 190 for (cp = secbuf, i = 512; --i >= 0;) 225 for (cp = secbuf, i = 512; --i >= 0;) 227 error = uiomove(secbuf, 512, uio);
|
| /src/external/bsd/ntp/dist/libntp/ |
| authreadkeys.c | 96 u_char secbuf[1]; /* begin of secret (formal only)*/ member in struct:keydata 290 memcpy(next->secbuf, keystr, len); 393 next->secbuf, next->seclen, next->keyacclist);
|
| /src/sys/arch/mac68k/obio/ |
| iwmreg.h | 104 unsigned char *secbuf; /* ptr to one sector buffer */ member in struct:cylCacheSlot
|
| iwm_fd.c | 1167 memcpy(fd->current_buffer, fd->r_slots[i].secbuf, 1239 fd->w_slots[i].secbuf = fd->current_buffer; 1298 fd->w_slots[i].secbuf = NULL; 1647 fd->w_slots[i].secbuf = NULL; 1650 fd->r_slots[i].secbuf = fd->cbuf + i * secsize;
|
| /src/external/gpl3/binutils/dist/bfd/ |
| ihex.c | 358 char secbuf[20]; local 363 sprintf (secbuf, ".sec%d", bfd_count_sections (abfd) + 1); 364 amt = strlen (secbuf) + 1; 368 strcpy (secname, secbuf);
|
| srec.c | 550 char secbuf[20]; local 555 sprintf (secbuf, ".sec%d", bfd_count_sections (abfd) + 1); 556 amt = strlen (secbuf) + 1; 558 strcpy (secname, secbuf);
|
| /src/external/gpl3/binutils.old/dist/bfd/ |
| ihex.c | 358 char secbuf[20]; local 363 sprintf (secbuf, ".sec%d", bfd_count_sections (abfd) + 1); 364 amt = strlen (secbuf) + 1; 368 strcpy (secname, secbuf);
|
| srec.c | 550 char secbuf[20]; local 555 sprintf (secbuf, ".sec%d", bfd_count_sections (abfd) + 1); 556 amt = strlen (secbuf) + 1; 558 strcpy (secname, secbuf);
|
| /src/external/gpl3/gdb/dist/bfd/ |
| ihex.c | 358 char secbuf[20]; local 363 sprintf (secbuf, ".sec%d", bfd_count_sections (abfd) + 1); 364 amt = strlen (secbuf) + 1; 368 strcpy (secname, secbuf);
|
| srec.c | 550 char secbuf[20]; local 555 sprintf (secbuf, ".sec%d", bfd_count_sections (abfd) + 1); 556 amt = strlen (secbuf) + 1; 558 strcpy (secname, secbuf);
|
| /src/external/gpl3/gdb.old/dist/bfd/ |
| ihex.c | 358 char secbuf[20]; local 363 sprintf (secbuf, ".sec%d", bfd_count_sections (abfd) + 1); 364 amt = strlen (secbuf) + 1; 368 strcpy (secname, secbuf);
|
| srec.c | 550 char secbuf[20]; local 555 sprintf (secbuf, ".sec%d", bfd_count_sections (abfd) + 1); 556 amt = strlen (secbuf) + 1; 558 strcpy (secname, secbuf);
|
| /src/external/bsd/ppp/dist/pppd/ |
| auth.c | 1858 char secbuf[MAXWORDLEN]; local 1861 strlcpy(secbuf, passwd, sizeof(secbuf)); 1863 if ( (*chap_passwd_hook)(client, secbuf) < 0) { 1871 secbuf[0] = 0; 1880 ret = scan_authfile(f, client, server, secbuf, &addrs, &opts, filename, 0); 1893 len = strlen(secbuf); 1898 BCOPY(secbuf, secret, len); 1899 BZERO(secbuf, sizeof(secbuf)); [all...] |
| eap.c | 449 unsigned char secbuf[MAXWORDLEN], clear[8], *sp, *dp, key[SHA_DIGEST_LENGTH]; local 492 sizeof (secbuf)) { 497 secbuf); 503 if (!DesDecrypt(secbuf, key, clear)) { 525 sp = secbuf + 8; 545 esp->es_server.ea_name, (char *)secbuf, 1) != 0) { 549 id = strtol((char *)secbuf, &cp, 10);
|