Home
last modified time | relevance | path

Searched refs:rdlen (Results 1 – 18 of 18) sorted by relevance

/src/crypto/krb5/src/lib/krb5/os/
H A Ddnssrv.c194 int size, ret, rdlen; in k5_make_uri_query() local
218 ret = krb5int_dns_nextans(ds, &base, &rdlen); in k5_make_uri_query()
224 SAFE_GETUINT16(base, rdlen, p, 2, priority, out); in k5_make_uri_query()
225 SAFE_GETUINT16(base, rdlen, p, 2, weight, out); in k5_make_uri_query()
234 uri->host = k5memdup0(p, rdlen - 4, &ret); in k5_make_uri_query()
266 int size, ret, rdlen, nlen; in krb5int_make_srv_query_realm() local
299 ret = krb5int_dns_nextans(ds, &base, &rdlen); in krb5int_make_srv_query_realm()
305 SAFE_GETUINT16(base, rdlen, p, 2, priority, out); in krb5int_make_srv_query_realm()
306 SAFE_GETUINT16(base, rdlen, p, 2, weight, out); in krb5int_make_srv_query_realm()
307 SAFE_GETUINT16(base, rdlen, p, 2, port, out); in krb5int_make_srv_query_realm()
[all …]
H A Ddnsglue.c323 unsigned short ntype, nclass, rdlen; in krb5int_dns_nextans() local
345 SAFE_GETUINT16(ds->ansp, ds->anslen, p, 2, rdlen, out); in krb5int_dns_nextans()
347 if (!INCR_OK(ds->ansp, ds->anslen, p, rdlen)) in krb5int_dns_nextans()
349 if (rdlen > INT_MAX) in krb5int_dns_nextans()
353 *lenp = rdlen; in krb5int_dns_nextans()
354 ds->ptr = p + rdlen; in krb5int_dns_nextans()
357 p += rdlen; in krb5int_dns_nextans()
456 int ret, rdlen, len; in k5_try_realm_txt_rr() local
472 ret = krb5int_dns_nextans(ds, &base, &rdlen); in k5_try_realm_txt_rr()
477 if (!INCR_OK(base, rdlen, p, 1)) in k5_try_realm_txt_rr()
/src/contrib/ntp/ntpd/
H A Dntp_ppsdev.c127 ssize_t rdlen; in readFileAt() local
134 if (1 > (rdlen = read(dfd, ret, sb.st_size))) in readFileAt()
138 while (rdlen > 0 && ret[rdlen - 1] <= ' ') in readFileAt()
139 --rdlen; in readFileAt()
140 ret[rdlen] = '\0'; in readFileAt()
/src/sys/dev/virtio/random/
H A Dvirtio_random.c197 uint32_t rdlen; in vtrnd_detach() local
212 virtqueue_poll(sc->vtrnd_vq, &rdlen); in vtrnd_detach()
292 uint32_t rdlen; in vtrnd_harvest() local
299 cookie = virtqueue_dequeue(vq, &rdlen); in vtrnd_harvest()
304 *sz = MIN(rdlen, *sz); in vtrnd_harvest()
/src/lib/libc/nameser/
H A Dns_print.c107 u_long ttl, const u_char *rdata, size_t rdlen, in ns_sprintrrf() argument
112 const u_char *edata = rdata + rdlen; in ns_sprintrrf()
158 if (rdlen != (size_t)NS_INADDRSZ) in ns_sprintrrf()
263 if (rdlen < (size_t)NS_INT16SZ) in ns_sprintrrf()
281 if (rdlen < (size_t)NS_INT16SZ) in ns_sprintrrf()
322 (void) inet_nsap_ntoa(rdlen, rdata, t); in ns_sprintrrf()
328 if (rdlen != (size_t)NS_IN6ADDRSZ) in ns_sprintrrf()
347 if (rdlen < 2U*NS_INT16SZ) in ns_sprintrrf()
388 if (rdlen < 3U*NS_INT16SZ) in ns_sprintrrf()
417 if (rdlen < 1U + NS_INT32SZ) in ns_sprintrrf()
[all …]
/src/contrib/unbound/validator/
H A Dval_anchor.c611 int rdlen; in skip_to_special() local
613 while((rdlen=readkeyword_bindfile(in, buf, line, 1))) { in skip_to_special()
614 if(rdlen == 1 && isspace((unsigned char)*sldns_buffer_begin(buf))) { in skip_to_special()
618 if(rdlen != 1 || *sldns_buffer_begin(buf) != (uint8_t)spec) { in skip_to_special()
650 int rdlen; in process_bind_contents() local
653 while((rdlen=readkeyword_bindfile(in, buf, line, comments))) { in process_bind_contents()
654 if(rdlen == 1 && sldns_buffer_position(buf) == 1 in process_bind_contents()
659 } else if(rdlen == 1 && sldns_buffer_current(buf)[-1] == '"') { in process_bind_contents()
677 } else if(rdlen == 1 && sldns_buffer_current(buf)[-1] == ';') { in process_bind_contents()
702 } else if(rdlen == 1 && sldns_buffer_current(buf)[-1] == '}') { in process_bind_contents()
[all …]
H A Dval_sigcrypt.c259 size_t rdlen; in ds_get_sigdata() local
260 rrset_get_rdata(k, idx, &rdata, &rdlen); in ds_get_sigdata()
261 if(rdlen < 2+5) { in ds_get_sigdata()
267 *len = rdlen - 2 - 4; in ds_get_sigdata()
H A Dautotrust.c1447 uint16_t rdlen = htons(rdata_len); in add_key() local
1457 memmove(rr+dname_len+8, &rdlen, 2); in add_key()
/src/contrib/unbound/sldns/
H A Dwire2str.c526 size_t rrlen = *dlen, dname_off, rdlen, ordlen; in sldns_wire2str_rr_scan() local
570 rdlen = sldns_read_uint16(*d); in sldns_wire2str_rr_scan()
571 ordlen = rdlen; in sldns_wire2str_rr_scan()
574 if(*dlen < rdlen) { in sldns_wire2str_rr_scan()
575 w += sldns_str_print(s, slen, "\\# %u ", (unsigned)rdlen); in sldns_wire2str_rr_scan()
581 w += sldns_wire2str_rdata_scan(d, &rdlen, s, slen, rrtype, pkt, pktlen, in sldns_wire2str_rr_scan()
583 (*dlen) -= (ordlen-rdlen); in sldns_wire2str_rr_scan()
619 size_t rdlen, ordlen; in sldns_wire2str_rr_unknown_scan() local
632 rdlen = sldns_read_uint16(*d); in sldns_wire2str_rr_unknown_scan()
633 ordlen = rdlen; in sldns_wire2str_rr_unknown_scan()
[all …]
/src/sys/netinet/libalias/
H A Dalias_nbt.c461 u_short rdlen; member
486 bcount = ntohs(q->rdlen); in AliasHandleResourceNB()
563 bcount = ntohs(q->rdlen); in AliasHandleResourceA()
622 bcount = ntohs(q->rdlen); in AliasHandleResourceNULL()
657 bcount = ntohs(q->rdlen); in AliasHandleResourceNS()
690 bcount = ntohs(q->rdlen); in AliasHandleResourceNBSTAT()
/src/crypto/openssl/doc/man3/
H A DBIO_f_md.pod101 int rdlen;
111 rdlen = BIO_read(bio, buf, sizeof(buf));
113 } while (rdlen > 0);
/src/contrib/tcpdump/
H A Dprint-smb.c1143 u_int rdlen; in nbt_udp137_print() local
1153 rdlen = GET_BE_U_2(p); in nbt_udp137_print()
1154 ND_PRINT("ResourceLength=%u\nResourceData=\n", rdlen); in nbt_udp137_print()
1156 if (rdlen == 6) { in nbt_udp137_print()
1157 p = smb_fdata(ndo, p, "AddrType=[rw]\nAddress=[b.b.b.b]\n", p + rdlen, 0); in nbt_udp137_print()
1199 ND_MIN(rdlen, length - ND_BYTES_BETWEEN(data, p))); in nbt_udp137_print()
1200 p += rdlen; in nbt_udp137_print()
H A Dprint-domain.c908 uint16_t flags, rcode, rdlen, type; in domain_print() local
976 rdlen = GET_BE_U_2(cp); in domain_print()
977 cp += 2 + rdlen; in domain_print()
997 rdlen = GET_BE_U_2(cp); in domain_print()
998 cp += 2 + rdlen; in domain_print()
/src/sys/contrib/dev/broadcom/brcm80211/brcmfmac/
H A Dsdio.c1759 uint rdlen, pad; in brcmf_sdio_read_control() local
1780 rdlen = len - BRCMF_FIRSTREAD; in brcmf_sdio_read_control()
1781 if (bus->roundup && bus->blocksize && (rdlen > bus->blocksize)) { in brcmf_sdio_read_control()
1782 pad = bus->blocksize - (rdlen % bus->blocksize); in brcmf_sdio_read_control()
1785 rdlen += pad; in brcmf_sdio_read_control()
1786 } else if (rdlen % bus->head_align) { in brcmf_sdio_read_control()
1787 rdlen += bus->head_align - (rdlen % bus->head_align); in brcmf_sdio_read_control()
1791 if ((rdlen + BRCMF_FIRSTREAD) > bus->sdiodev->bus_if->maxctl) { in brcmf_sdio_read_control()
1793 rdlen, bus->sdiodev->bus_if->maxctl); in brcmf_sdio_read_control()
1807 sdret = brcmf_sdiod_recv_buf(bus->sdiodev, rbuf, rdlen); in brcmf_sdio_read_control()
[all …]
/src/sys/geom/union/
H A Dg_union.c887 off_t rdlen, len2rd, offset; in g_union_doio() local
981 rdlen = cbp->bio_length; in g_union_doio()
994 if (iocnt == 0 && rdlen == len2rd) { in g_union_doio()
1007 rdlen -= len2rd; in g_union_doio()
1023 if (rdlen == 0) in g_union_doio()
1035 cbp->bio_length = rdlen; in g_union_doio()
/src/crypto/openssl/crypto/asn1/
H A Dasn1_gen.c585 long rdlen; in asn1_str2type() local
701 if ((rdata = OPENSSL_hexstr2buf(str, &rdlen)) == NULL) { in asn1_str2type()
706 atmp->value.asn1_string->length = rdlen; in asn1_str2type()
/src/contrib/unbound/services/
H A Dauthzone.c1325 size_t rdlen; in decompress_rr_into_buffer() local
1351 rdlen = rr_rdlen; in decompress_rr_into_buffer()
1352 if(rdlen > 0 && desc && desc->_dname_count > 0) { in decompress_rr_into_buffer()
1359 while(rdlen > 0 && count) { in decompress_rr_into_buffer()
1382 rdlen -= compressed_len; in decompress_rr_into_buffer()
1398 rdlen -= len; in decompress_rr_into_buffer()
1404 if(rdlen > 0) { in decompress_rr_into_buffer()
1405 if(!sldns_buffer_available(buf, rdlen)) return 0; in decompress_rr_into_buffer()
1406 sldns_buffer_write(buf, rd, rdlen); in decompress_rr_into_buffer()
3658 uint16_t rdlen; in auth_zone_parse_notify_serial() local
[all …]
/src/contrib/ldns/
H A DChangelog642 * Bugfix: allow for unknown resource records in zonefile with rdlen=0.