| /xnu-8020.140.41/bsd/security/audit/ |
| H A D | audit_bsm_token.c | 1179 u_int32_t totlen; in au_to_exec_strings() local 1186 totlen = 0; in au_to_exec_strings() 1192 if (totlen + nextlen + 1 >= totlen_max) { in au_to_exec_strings() 1196 totlen += nextlen + 1; in au_to_exec_strings() 1197 p = strs + totlen; in au_to_exec_strings() 1200 tokenlen = sizeof(u_char) + sizeof(u_int32_t) + totlen; in au_to_exec_strings() 1207 ADD_STRING(dptr, strs, totlen); in au_to_exec_strings() 1269 size_t totlen = 0; in au_to_exec_args() local 1278 if (totlen + nextlen + 1 >= totlen_max) { in au_to_exec_args() 1282 totlen += nextlen + 1; in au_to_exec_args() [all …]
|
| /xnu-8020.140.41/bsd/nfs/ |
| H A D | nfs_syscalls.c | 1582 uint numExports, totlen, count; in nfssvc_exportstats() local 1624 totlen = sizeof(struct nfs_export_stat_desc) + (numExports * sizeof(struct nfs_export_stat_rec)); in nfssvc_exportstats() 1630 if (newlenp && newlen >= sizeof(totlen)) { in nfssvc_exportstats() 1631 error = copyout(&totlen, newlenp, sizeof(totlen)); in nfssvc_exportstats() 1637 if (oldlen < sizeof(struct nfs_export_stat_desc) || newlen < sizeof(totlen)) { in nfssvc_exportstats() 1640 if (newlenp && newlen >= sizeof(totlen)) { in nfssvc_exportstats() 1641 (void)copyout(&totlen, newlenp, sizeof(totlen)); in nfssvc_exportstats() 1647 error = copyout(&totlen, newlenp, sizeof(totlen)); in nfssvc_exportstats() 1661 numRecs = (totlen - sizeof(struct nfs_export_stat_desc)) / sizeof(struct nfs_export_stat_rec); in nfssvc_exportstats()
|
| H A D | nfs_vfsops.c | 5599 uint totlen, count, numThreads; in nfs_vfs_sysctl() local 5819 totlen = sizeof(struct netfs_status) + (numThreads * sizeof(uint64_t)); in nfs_vfs_sysctl() 5824 return SYSCTL_OUT(req, NULL, totlen); in nfs_vfs_sysctl() 5826 if (req->oldlen < totlen) { // Check if caller's buffer is big enough in nfs_vfs_sysctl() 5832 nsp = kalloc_data(totlen, Z_WAITOK | Z_ZERO); in nfs_vfs_sysctl() 5881 error = SYSCTL_OUT(req, nsp, totlen); in nfs_vfs_sysctl() 5882 kfree_data(nsp, totlen); in nfs_vfs_sysctl()
|
| /xnu-8020.140.41/bsd/netinet6/ |
| H A D | ah_core.c | 1395 int totlen; in ah4_calccksum() local 1402 totlen = (ah.ah_len + 2) << 2; in ah4_calccksum() 1408 if (totlen > m->m_pkthdr.len - off || in ah4_calccksum() 1409 totlen > MCLBYTES) { in ah4_calccksum() 1414 if (n && totlen > MLEN) { in ah4_calccksum() 1425 m_copydata(m, off, totlen, mtod(n, caddr_t)); in ah4_calccksum() 1426 n->m_len = totlen; in ah4_calccksum() 1432 ah_update_mbuf(m, off, totlen, algo, &algos); in ah4_calccksum() 1437 advancewidth = totlen; in ah4_calccksum()
|
| H A D | ipsec.c | 3145 int totlen; in ipsec_dumpmbuf() local 3149 totlen = 0; in ipsec_dumpmbuf() 3155 totlen++; in ipsec_dumpmbuf() 3156 if (totlen % 16 == 0) { in ipsec_dumpmbuf() 3162 if (totlen % 16 != 0) { in ipsec_dumpmbuf()
|
| /xnu-8020.140.41/bsd/net/ |
| H A D | bpf.c | 3380 int totlen, curlen; in catchpacket() local 3394 totlen = hdrlen + MIN(snaplen, (int)pkt->bpfp_total_length); in catchpacket() 3395 if (totlen > d->bd_bufsize) { in catchpacket() 3396 totlen = d->bd_bufsize; in catchpacket() 3399 if (hdrlen > totlen) { in catchpacket() 3407 if (curlen + totlen > d->bd_bufsize) { in catchpacket() 3462 caplen = ehp->bh_caplen = totlen - hdrlen; in catchpacket() 3533 caplen = hp->bh_caplen = totlen - hdrlen; in catchpacket() 3540 d->bd_slen = curlen + totlen; in catchpacket()
|
| /xnu-8020.140.41/bsd/kern/ |
| H A D | kpi_mbuf.c | 1363 int totlen = 0; in mbuf_copyback() local 1373 totlen += mlen; in mbuf_copyback() 1399 totlen += mlen; in mbuf_copyback() 1423 if ((m_start->m_flags & M_PKTHDR) && (m_start->m_pkthdr.len < totlen)) { in mbuf_copyback() 1424 m_start->m_pkthdr.len = totlen; in mbuf_copyback()
|
| H A D | uipc_mbuf.c | 5757 m_devget(char *buf, int totlen, int off0, struct ifnet *ifp, argument 5767 epkt = cp + totlen; 5774 totlen -= 2 * sizeof(u_int16_t); 5781 m->m_pkthdr.len = totlen; 5784 while (totlen > 0) { 5793 len = MIN(totlen, epkt - cp); 5828 totlen -= len; 6081 int totlen = 0; local 6100 totlen += mlen; 6125 totlen -= mlen; [all …]
|
| /xnu-8020.140.41/bsd/netkey/ |
| H A D | key.c | 7770 int totlen; in key_getcomb_esp() local 7810 totlen = 0; in key_getcomb_esp() 7812 totlen += n->m_len; in key_getcomb_esp() 7815 if (totlen % l) { in key_getcomb_esp() 7820 for (off = 0; off < totlen; off += l) { in key_getcomb_esp() 7929 int totlen; in key_getprop() local 7952 totlen = 0; in key_getprop() 7954 totlen += n->m_len; in key_getprop() 7959 VERIFY(totlen <= UINT16_MAX); in key_getprop() 7960 prop->sadb_prop_len = (u_int16_t)PFKEY_UNIT64(totlen); in key_getprop()
|