/freebsd-10.1-release/contrib/ncurses/ncurses/base/ |
H A D | MKunctrl.awk | 52 blob="" 65 blob = blob "\"" 66 blob = blob "\n \"" 95 blob = blob part "\\0"; 101 blob = blob "\""; 106 blob [all...] |
/freebsd-10.1-release/contrib/wpa/wpa_supplicant/ |
H A D | config_none.c | 35 struct wpa_config_blob *blob; local 46 for (blob = config->blobs; blob; blob = blob->next) {
|
H A D | config_file.c | 269 struct wpa_config_blob *blob; local 275 wpa_printf(MSG_MSGDUMP, "Line: %d - start of a new named blob '%s'", 288 "blob", *line); 298 wpa_printf(MSG_ERROR, "Line %d: blob was not terminated " 304 blob = os_zalloc(sizeof(*blob)); 305 if (blob == NULL) { 309 blob->name = os_strdup(name); 310 blob->data = base64_decode(encoded, encoded_len, &blob 326 struct wpa_config_blob *blob; local 760 wpa_config_write_blob(FILE *f, struct wpa_config_blob *blob) argument 985 struct wpa_config_blob *blob; local [all...] |
H A D | config.h | 103 * Alternatively, a named configuration blob can be used by setting 104 * this to blob://blob_name. 130 * Alternatively, a named configuration blob can be used by setting 131 * this to blob://blob_name. 828 struct wpa_config_blob *blob); 829 void wpa_config_free_blob(struct wpa_config_blob *blob);
|
/freebsd-10.1-release/contrib/dialog/ |
H A D | argv.c | 33 dlg_string_to_argv(char *blob) argument 37 size_t length = strlen(blob); 43 char *param = blob; 47 if (quoted && blob[n] == '"') { 49 } else if (blob[n] == '"') { 57 } else if (blob[n] == '\\') { 58 if (quoted && !isspace(UCH(blob[n + 1]))) { 60 *param++ = blob[n]; 61 *param++ = blob[n + 1]; 65 } else if (!quoted && isspace(UCH(blob[ [all...] |
H A D | prgbox.c | 40 char *blob; local 70 if ((blob = malloc(4 + strlen(command))) != 0) { 71 sprintf(blob, "-c %s", command); 72 argv = dlg_string_to_argv(blob);
|
H A D | editbox.c | 58 char *blob = 0; local 72 if ((blob = dlg_malloc(char, size + 1)) == 0) { 75 blob[size] = '\0'; 79 size = fread(blob, sizeof(char), size, fp); 87 (*list)[need] = blob + n; 90 if (blob[n] == '\n') { 94 blob[n] = '\0'; 111 free(blob);
|
/freebsd-10.1-release/contrib/dtc/ |
H A D | fdtput.c | 170 static int store_key_value(char **blob, const char *node_name, argument 176 node = fdt_path_offset(*blob, node_name); 182 err = fdt_setprop(*blob, node, property, buf, len); 184 *blob = realloc_property(*blob, node, property, len); 185 err = fdt_setprop(*blob, node, property, buf, len); 200 * @param blob FDT blob to write into 204 static int create_paths(char **blob, const char *in_path) argument 220 node = fdt_subnode_offset_namelen(*blob, offse 247 create_node(char **blob, const char *node_name) argument 282 char *blob; local [all...] |
H A D | fdtget.c | 118 * @param blob FDT blob 122 static int list_properties(const void *blob, int node) argument 128 prop = fdt_first_property_offset(blob, node); 133 data = fdt_get_property_by_offset(blob, prop, NULL); 134 name = fdt_string(blob, fdt32_to_cpu(data->nameoff)); 137 prop = fdt_next_property_offset(blob, prop); 146 * @param blob FDT blob 150 static int list_subnodes(const void *blob, in argument 206 show_data_for_item(const void *blob, struct display_info *disp, int node, const char *property) argument 253 char *blob; local [all...] |
H A D | flattree.c | 373 struct data blob = empty_data; local 385 die("Unknown device tree blob version %d\n", version); 403 "Warning: blob size %d >= minimum size %d\n", 417 * Assemble the blob: start with the header, add with alignment 421 blob = data_append_data(blob, &fdt, vi->hdr_size); 422 blob = data_append_align(blob, 8); 423 blob = data_merge(blob, reservebu 810 char *blob; local [all...] |
H A D | util.h | 121 * @param blob Poiner to buffer containing fdt 124 int utilfdt_write(const char *filename, const void *blob); 132 * @param blob Poiner to buffer containing fdt 135 int utilfdt_write_err(const char *filename, const void *blob);
|
H A D | fdtdump.c | 42 static void dump_blob(void *blob, bool debug) argument 44 uintptr_t blob_off = (uintptr_t)blob; 45 struct fdt_header *bph = blob; 50 (struct fdt_reserve_entry *)((char *)blob + off_mem_rsvmap); 51 const char *p_struct = (const char *)blob + off_dt; 52 const char *p_strings = (const char *)blob + off_str; 189 /* try and locate an embedded fdt in a bigger blob */
|
H A D | util.c | 258 fprintf(stderr, "Couldn't open blob from '%s': %s\n", filename, 272 int utilfdt_write_err(const char *filename, const void *blob) argument 278 const char *ptr = blob; 286 totalsize = fdt_totalsize(blob); 304 int utilfdt_write(const char *filename, const void *blob) argument 306 int ret = utilfdt_write_err(filename, blob); 309 fprintf(stderr, "Couldn't write blob to '%s': %s\n", filename,
|
/freebsd-10.1-release/crypto/openssh/ |
H A D | authfile.c | 95 key_private_to_blob2(Key *prv, Buffer *blob, const char *passphrase, argument 187 buffer_clear(blob); 188 buffer_append(blob, MARK_BEGIN, sizeof(MARK_BEGIN) - 1); 190 buffer_put_char(blob, cp[i]); 192 buffer_put_char(blob, '\n'); 195 buffer_put_char(blob, '\n'); 196 buffer_append(blob, MARK_END, sizeof(MARK_END) - 1); 199 return buffer_len(blob); 203 key_parse_private2(Buffer *blob, int type, const char *passphrase, argument 225 cp = buffer_ptr(blob); 428 key_private_rsa1_to_blob(Key *key, Buffer *blob, const char *passphrase, const char *comment) argument 513 key_private_pem_to_blob(Key *key, Buffer *blob, const char *_passphrase, const char *comment) argument 585 key_private_to_blob(Key *key, Buffer *blob, const char *passphrase, const char *comment, int force_new_format, const char *new_format_cipher, int new_format_rounds) argument 633 key_parse_public_rsa1(Buffer *blob, char **commentp) argument 676 key_load_file(int fd, const char *filename, Buffer *blob) argument 772 key_parse_private_rsa1(Buffer *blob, const char *passphrase, char **commentp) argument 874 key_parse_private_pem(Buffer *blob, int type, const char *passphrase, char **commentp) argument 996 key_parse_private_type(Buffer *blob, int type, const char *passphrase, char **commentp) argument [all...] |
H A D | ssh-pkcs11-client.c | 108 u_char *blob, *signature = NULL; local 117 if (key_to_blob(&key, &blob, &blen) == 0) 121 buffer_put_string(&msg, blob, blen); 124 free(blob); 189 u_char *blob; local 207 blob = buffer_get_string(&msg, &blen); 209 k = key_from_blob(blob, blen); 212 free(blob);
|
H A D | krl.c | 74 u_char *blob; member in struct:revoked_blob 122 if ((r = memcmp(a->blob, b->blob, MIN(a->len, b->len))) != 0) 126 return memcmp(a->blob, b->blob, a->len); 173 free(rb->blob); 178 free(rb->blob); 351 /* Convert "key" to a public key blob without any certificate information */ 353 plain_key_blob(const Key *key, u_char **blob, u_int *blen) argument 367 r = key_to_blob(kcopy, blob, ble 374 revoke_blob(struct revoked_blob_tree *rbt, u_char *blob, u_int len) argument 393 u_char *blob; local 405 u_char *blob; local 756 u_char type, *blob; local 890 u_char type, *blob, *rdata = NULL; local [all...] |
H A D | authfd.c | 318 u_char *blob; local 343 blob = buffer_get_string(&auth->identities, &blen); 345 key = key_from_blob(blob, blen); 346 free(blob); 423 u_char *blob; local 428 if (key_to_blob(key, &blob, &blen) == 0) 436 buffer_put_string(&msg, blob, blen); 439 free(blob); 550 u_char *blob; local 561 key_to_blob(key, &blob, [all...] |
H A D | ssh-pkcs11-helper.c | 119 u_char *blob; local 130 if (key_to_blob(keys[i], &blob, &blen) == 0) 132 buffer_put_string(&msg, blob, blen); 134 free(blob); 170 u_char *blob, *data, *signature = NULL; local 176 blob = get_string(&blen); 180 if ((key = key_from_blob(blob, blen)) != NULL) { 200 free(blob);
|
H A D | monitor_wrap.c | 393 u_char *blob; local 399 /* Convert the key to a blob and the pass it over */ 400 if (!key_to_blob(key, &blob, &len)) 407 buffer_put_string(&m, blob, len); 408 free(blob); 437 u_char *blob; local 443 /* Convert the key to a blob and the pass it over */ 444 if (!key_to_blob(key, &blob, &len)) 448 buffer_put_string(&m, blob, len); 451 free(blob); 467 mm_newkeys_from_blob(u_char *blob, int blen) argument 598 u_char *blob, *p; local 1085 u_char *blob; local 1121 u_char *blob; local 1151 u_char *blob; local [all...] |
H A D | key.c | 362 u_char *blob = NULL; local 388 blob = xmalloc(len); 389 BN_bn2bin(k->rsa->n, blob); 390 BN_bn2bin(k->rsa->e, blob + nlen); 396 key_to_blob(k, &blob, &len); 405 to_blob(k, &blob, &len, 1); 413 if (blob != NULL) { 415 if ((ssh_digest_memory(hash_alg, blob, len, 418 explicit_bzero(blob, len); 419 free(blob); 697 u_char *blob; local 871 u_char *blob; local 1402 cert_parse(Buffer *b, Key *key, const u_char *blob, u_int blen) argument 1526 key_from_blob2(const u_char *blob, u_int blen, int allow_cert) argument 1675 key_from_blob(const u_char *blob, u_int blen) argument 2468 key_private_deserialize(Buffer *blob) argument [all...] |
H A D | monitor.c | 610 monitor_allowed_key(u_char *blob, u_int bloblen) argument 614 timingsafe_bcmp(key_blob, blob, key_bloblen)) 1130 u_char *blob; local 1140 blob = buffer_get_string(m, &bloblen); 1142 key = key_from_blob(blob, bloblen); 1191 key_blob = blob; 1199 free(blob); 1343 u_char *signature, *data, *blob; local 1348 blob = buffer_get_string(m, &bloblen); 1353 !monitor_allowed_key(blob, bloble 1567 u_char *blob = NULL; local 1613 u_char *blob; local 1651 u_char *blob, *response; local 1821 void *blob; local 1866 u_char *blob, *p; local [all...] |
/freebsd-10.1-release/contrib/wpa/src/eap_peer/ |
H A D | eap_fast_pac.c | 264 if (os_strncmp(pac_file, "blob://", 7) == 0) { 265 const struct wpa_config_blob *blob; local 266 blob = eap_get_config_blob(sm, pac_file + 7); 267 if (blob == NULL) { 268 wpa_printf(MSG_INFO, "EAP-FAST: No PAC blob '%s' - " 274 rc->pos = (char *) blob->data; 275 rc->end = (char *) blob->data + blob->len; 407 * @pac_file: Name of the PAC file/blob to load 536 if (os_strncmp(pac_file, "blob 537 struct wpa_config_blob *blob; local 751 const struct wpa_config_blob *blob = NULL; local [all...] |
/freebsd-10.1-release/contrib/dtc/Documentation/ |
H A D | dtc-paper.tex | 48 The ``blob'' representing the device tree can be created using \dtc 51 the kernel. The compiler can produce either a binary ``blob'' or an 114 compact, flattened format. The resulting device tree ``blob'' is then 116 its runtime form. This blob is the only data communicated between the 122 device tree blob must be passed in from outside, rather than generated 124 \texttt{kexec} tools build the blob from the runtime device tree 125 before invoking the new kernel. For embedded systems the blob can 137 move the blob around as a whole, without needing to parse or adjust 139 within the blob. 144 practice this means limiting the use of internal offsets in the blob [all...] |
/freebsd-10.1-release/contrib/wpa/wpa_supplicant/dbus/ |
H A D | dbus_old_handlers.c | 1325 struct wpa_config_blob *blob; local 1347 blob = os_zalloc(sizeof(*blob)); 1348 if (blob == NULL) { 1351 "Not enough memory to add blob."); 1354 blob->data = os_zalloc(entry.array_len); 1355 if (blob->data == NULL) { 1358 "Not enough memory to add blob data."); 1359 os_free(blob); 1363 blob [all...] |
/freebsd-10.1-release/contrib/wpa/wpa_supplicant/examples/ |
H A D | wpas-dbus-new-signals.py | 99 def blobAdded(blob): 100 print "BlobAdded(%s)" % (blob) 102 def blobRemoved(blob): 103 print "BlobRemoved(%s)" % (blob)
|