/freebsd-13-stable/crypto/openssh/openbsd-compat/ |
H A D | openbsd-compat.h | 125 int mkstemps(char *path, int slen);
|
/freebsd-13-stable/usr.sbin/config/ |
H A D | mkmakefile.c | 697 int lpos, len, slen; local 706 slen = strlen(suff); 714 if (tp->f_fn[len - slen - 1] != '.') 716 if (strcasecmp(&tp->f_fn[len - slen], suff) != 0)
|
/freebsd-13-stable/usr.sbin/rpc.tlsservd/ |
H A D | rpc.tlsservd.c | 818 size_t slen; local 832 slen = i2t_ASN1_OBJECT(usern, sizeof(usern), val->type_id); 833 if (slen != strlen(rpctls_cnuseroid) || memcmp(usern, 834 rpctls_cnuseroid, slen) != 0)
|
/freebsd-13-stable/tools/regression/sockets/udp_pingpong/ |
H A D | udp_pingpong.c | 322 size_t slen; local 324 slen = sizeof(tcp->test_pkts[pnum]); 326 r = send(tcp->fds[fdidx], &tcp->test_pkts[pnum], slen, 0); 330 if (r < (ssize_t)slen) {
|
/freebsd-13-stable/contrib/libevent/test/ |
H A D | regress_dns.c | 374 ev_socklen_t slen; local 400 slen = sizeof(ss); 401 if (getsockname(sock, (struct sockaddr*)&ss, &slen) < 0) { 409 evdns_base_nameserver_sockaddr_add(base, (struct sockaddr*)&ss, slen, 0); 418 tt_int_op(slen2, ==, slen); 421 tt_int_op(slen2, ==, slen); 422 tt_mem_op(&ss2, ==, &ss, slen); 1986 ev_socklen_t slen; local 2007 slen = sizeof(ss); 2008 if (getsockname(fd, (struct sockaddr*)&ss, &slen)< [all...] |
/freebsd-13-stable/contrib/ntp/sntp/libevent/test/ |
H A D | regress_dns.c | 372 ev_socklen_t slen; local 398 slen = sizeof(ss); 399 if (getsockname(sock, (struct sockaddr*)&ss, &slen) < 0) { 407 evdns_base_nameserver_sockaddr_add(base, (struct sockaddr*)&ss, slen, 0); 416 tt_int_op(slen2, ==, slen); 419 tt_int_op(slen2, ==, slen); 420 tt_mem_op(&ss2, ==, &ss, slen); 1957 ev_socklen_t slen; local 1978 slen = sizeof(ss); 1979 if (getsockname(fd, (struct sockaddr*)&ss, &slen)< [all...] |
/freebsd-13-stable/contrib/unbound/sldns/ |
H A D | wire2str.h | 93 * @param slen: length of the string buffer. Adjusted at end. 96 * @return number of characters needed. Can be larger than slen. 98 int sldns_str_vprint(char** str, size_t* slen, const char* format, va_list args); 103 * @param slen: length of the string buffer. Adjusted at end. 105 * @return number of characters needed. Can be larger than slen. 107 int sldns_str_print(char** str, size_t* slen, const char* format, ...)
|
/freebsd-13-stable/lib/libsecureboot/openpgp/ |
H A D | opgp_sig.c | 233 unsigned char *sdata, size_t slen) 252 i = EVP_PKEY_verify(pctx, sdata, slen, mdata, mlen); 230 verify_digest(EVP_PKEY *pkey, const char *digest, unsigned char *mdata, size_t mlen, unsigned char *sdata, size_t slen) argument
|
/freebsd-13-stable/stand/libsa/ |
H A D | rpc.c | 112 void *sdata, size_t slen, void **rdata, void **pkt) 140 send_tail = (char *)sdata + slen; 111 rpc_call(struct iodesc *d, n_long prog, n_long vers, n_long proc, void *sdata, size_t slen, void **rdata, void **pkt) argument
|
/freebsd-13-stable/contrib/blacklist/bin/ |
H A D | conf.c | 1006 socklen_t slen; local 1012 slen = sizeof(lss); 1013 memset(&lss, 0, slen); 1014 if (getsockname(fd, (void *)&lss, &slen) == -1) { 1019 slen = sizeof(proto); 1020 if (getsockopt(fd, SOL_SOCKET, SO_TYPE, &proto, &slen) == -1) {
|
/freebsd-13-stable/sys/netgraph/ |
H A D | ng_ksocket.c | 316 int slen = 0; local 331 slen += snprintf(cbuf, cbuflen, "local/%s", pathtoken); 333 if (slen >= cbuflen) 343 slen += snprintf(cbuf, cbuflen, "inet/%d.%d.%d.%d", 349 slen += snprintf(cbuf + strlen(cbuf), 353 if (slen >= cbuflen)
|
/freebsd-13-stable/crypto/openssh/ |
H A D | ssh-agent.c | 300 size_t dlen, slen = 0; local 324 if ((r = sshkey_sign(id->key, &signature, &slen, 335 (r = sshbuf_put_string(msg, signature, slen)) != 0) 837 socklen_t slen; local 842 slen = sizeof(sunaddr); 843 fd = accept(sockets[socknum].fd, (struct sockaddr *)&sunaddr, &slen);
|
H A D | serverloop.c | 685 size_t blen, slen; local 733 (r = ssh->kex->sign(key_prv, key_pub, &sig, &slen, 736 (r = sshbuf_put_string(resp, sig, slen)) != 0) {
|
/freebsd-13-stable/crypto/openssl/engines/ |
H A D | e_capi.c | 823 DWORD slen; local 888 slen = RSA_size(rsa); 889 if (!CryptSignHash(hash, capi_key->keyspec, NULL, 0, sigret, &slen)) { 896 for (i = 0; i < slen / 2; i++) { 899 sigret[i] = sigret[slen - i - 1]; 900 sigret[slen - i - 1] = c; 902 *siglen = slen; 996 DWORD slen; local 1033 slen = sizeof(csigbuf); 1034 if (!CryptSignHash(hash, capi_key->keyspec, NULL, 0, csigbuf, &slen)) { [all...] |
/freebsd-13-stable/contrib/unbound/validator/ |
H A D | val_utils.c | 134 rrsig_get_signer(uint8_t* data, size_t len, uint8_t** sname, size_t* slen) argument 145 *slen = 0; 150 *slen = dname_valid(data, len); 151 if(!*slen) { 161 size_t* slen) 168 *slen = 0; 173 sname, slen); 160 val_find_rrset_signer(struct ub_packed_rrset_key* rrset, uint8_t** sname, size_t* slen) argument
|
/freebsd-13-stable/sys/dev/extres/clk/ |
H A D | clk.c | 252 size_t len, slen; local 260 slen = strlen(names[i]); 261 if (slen == 0) 263 len += slen + 1; 271 slen = strlen(names[i]) + 1; 272 bcopy(names[i], __DECONST(void *, outptr[i]), slen); 273 ptr += slen;
|
/freebsd-13-stable/contrib/file/src/ |
H A D | softmagic.c | 2130 size_t slen; local 2136 slen = MIN(m->vallen, sizeof(m->value.s)); 2140 if (slen > 0 && m->str_flags == 0) { 2142 idx = m->str_range + slen; 2146 m->value.s, slen)); 2157 if (slen + idx > ms->search.s_len) 2160 v = file_strncmp(m->value.s, ms->search.s + idx, slen, 2187 size_t slen = ms->search.s_len; local 2189 if (slen != 0) { 2190 copy = CAST(char *, malloc(slen)); [all...] |
/freebsd-13-stable/contrib/sendmail/src/ |
H A D | util.c | 211 size_t slen; local 220 slen = strlen(string); 221 if (length == 0 || slen < length) 222 length = slen; 1793 auto SOCKADDR_LEN_T slen; local 1846 slen = sizeof(sa); 1847 if (getsockname(fd, &sa.sa, &slen) < 0) 1875 slen = sizeof(sa); 1876 if (getpeername(fd, &sa.sa, &slen) < 0)
|
H A D | domain.c | 1189 size_t slen; 1197 slen = strlen(mxhosts[i]); 1198 if (len + slen + 2 > sizeof(buf)) 1206 p += slen; 1207 len += slen;
|
/freebsd-13-stable/lib/libkvm/ |
H A D | kvm_private.c | 573 int slen, unresolved; local 611 slen = snprintf(cp, ce - cp, "%s%s%c%s", prefix, 614 if (slen < 0 || slen >= ce - cp) 617 cp += slen + 1;
|
/freebsd-13-stable/contrib/llvm-project/llvm/lib/Support/ |
H A D | APInt.cpp | 499 size_t slen = str.size(); 506 slen--; 507 assert(slen && "String is only a sign, needs a value."); 513 return slen + isNegative; 515 return slen * 3 + isNegative; 517 return slen * 4 + isNegative; 522 // with a computation of roughly slen*64/20 and then adjust by the value of 530 = radix == 10? (slen == 1 ? 4 : slen * 64/18) 531 : (slen [all...] |
/freebsd-13-stable/lib/libc/rpc/ |
H A D | rpc_generic.c | 822 socklen_t slen; local 824 slen = sizeof (struct sockaddr_storage); 825 if (_getsockname(fd, (struct sockaddr *)(void *)&ss, &slen) < 0)
|
/freebsd-13-stable/contrib/tcpdump/ |
H A D | print-domain.c | 90 int bitlen, slen, b; local 98 slen = (bitlen + 3) / 4; 99 lim = cp + 1 + slen;
|
/freebsd-13-stable/contrib/mandoc/ |
H A D | out.c | 468 wsz = (*tbl->slen)(beg, tbl->arg); 494 totsz = (*tbl->slen)(dp->string, tbl->arg); 533 intsz += (*tbl->slen)(buf, tbl->arg);
|
/freebsd-13-stable/crypto/openssl/ssl/statem/ |
H A D | statem_lib.c | 536 size_t slen; local 557 slen = s->method->ssl3_enc->server_finished_label_len; 560 slen = s->method->ssl3_enc->client_finished_label_len; 564 sender, slen, 678 size_t slen; local 682 slen = s->method->ssl3_enc->server_finished_label_len; 685 slen = s->method->ssl3_enc->client_finished_label_len; 689 s->method->ssl3_enc->final_finish_mac(s, sender, slen,
|