/freebsd-current/crypto/openssl/crypto/pem/ |
H A D | pem_pkey.c | 109 int slen; local 174 } else if ((slen = ossl_pem_check_suffix(nm, "PRIVATE KEY")) > 0) { 176 ameth = EVP_PKEY_asn1_find_str(NULL, nm, slen); 186 && (slen = ossl_pem_check_suffix(nm, "PARAMETERS")) > 0) { 191 if (!EVP_PKEY_set_type_str(ret, nm, slen)
|
/freebsd-current/crypto/heimdal/lib/asn1/ |
H A D | der_put.c | 235 size_t slen = strlen(*str); local 237 if (len < slen) 239 p -= slen; 240 memcpy (p+1, *str, slen); 241 *size = slen;
|
/freebsd-current/lib/libc/rpc/ |
H A D | svc_vc.c | 126 socklen_t slen; local 150 slen = sizeof (struct sockaddr_storage); 151 if (_getsockname(fd, (struct sockaddr *)(void *)&sslocal, &slen) < 0) { 183 socklen_t slen; local 192 slen = sizeof (struct sockaddr_storage); 193 if (_getsockname(fd, (struct sockaddr *)(void *)&ss, &slen) < 0) { 205 slen = sizeof (struct sockaddr_storage); 206 if (_getpeername(fd, (struct sockaddr *)(void *)&ss, &slen) < 0) { 279 socklen_t len, slen; local 344 slen [all...] |
H A D | svc_dg.c | 107 socklen_t slen; local 142 slen = sizeof ss; 143 if (_getsockname(fd, (struct sockaddr *)(void *)&ss, &slen) < 0) { 149 xprt->xp_ltaddr.len = slen; 150 memcpy(xprt->xp_ltaddr.buf, &ss, slen); 333 size_t slen; local 354 slen = XDR_GETPOS(xdrs); 355 if (svc_dg_sendto(xprt->xp_fd, rpc_buffer(xprt), slen, 359 (socklen_t)su->su_srcaddr.len) == (ssize_t) slen) { 362 cache_set(xprt, slen); [all...] |
/freebsd-current/contrib/wpa/src/utils/ |
H A D | wpa_debug.c | 287 size_t slen = len; local 294 if (slen > 32) 295 slen = 32; 296 strbuf = os_malloc(1 + 3 * slen); 303 for (i = 0; i < slen; i++) 316 len > slen ? " ..." : ""); 317 bin_clear_free(strbuf, 1 + 3 * slen);
|
/freebsd-current/usr.sbin/bhyve/ |
H A D | usb_mouse.c | 325 uint16_t slen; local 442 slen = 2 + strlen(str) * 2; 443 udata[0] = slen; 446 if (len > slen) { 447 data->blen = len - slen; 448 len = slen; 455 data->bdone += slen;
|
/freebsd-current/contrib/wpa/wpa_supplicant/ |
H A D | rrm.c | 1045 u8 sid, u8 slen, const u8 *subelem) 1051 if (!slen) { 1057 if (slen > SSID_MAX_LEN) { 1059 "Invalid SSID subelement length: %u", slen); 1063 data->ssid_len = slen; 1067 if (slen != 2) { 1070 slen); 1083 if (slen != 1) { 1086 slen); 1108 if (!slen) { 1043 wpas_rm_handle_beacon_req_subelem(struct wpa_supplicant *wpa_s, struct beacon_rep_data *data, u8 sid, u8 slen, const u8 *subelem) argument [all...] |
H A D | interworking.c | 2854 const u8 *data, size_t slen, bool protected_response) 2880 elem->payload = wpabuf_alloc_copy(data, slen); 2895 u8 slen, num; local 2897 slen = *pos++; 2898 if (slen < 1 || slen > end - pos) { 2905 os_memcpy(url, pos, slen - 1); 2906 url[slen - 1] = '\0'; 2908 pos += slen - 1; 2916 const u8 *data, size_t slen, 2852 anqp_add_extra(struct wpa_supplicant *wpa_s, struct wpa_bss_anqp *anqp, u16 info_id, const u8 *data, size_t slen, bool protected_response) argument 2913 interworking_parse_rx_anqp_resp(struct wpa_supplicant *wpa_s, struct wpa_bss *bss, const u8 *sa, u16 info_id, const u8 *data, size_t slen, u8 dialog_token) argument 3095 u16 slen; local [all...] |
H A D | p2p_supplicant_sd.c | 696 u16 slen; local 727 slen = WPA_GET_LE16(pos); 729 if (slen > end - pos || slen < 2) { 735 tlv_end = pos + slen; 895 u16 slen; local 924 slen = WPA_GET_LE16(pos); 926 if (slen > end - pos || slen < 3) { 931 tlv_end = pos + slen; [all...] |
/freebsd-current/usr.sbin/makefs/ |
H A D | ffs.c | 657 size_t slen; local 659 slen = strlen(node->symlink) + 1; 660 if (slen >= (ffs_opts->version == 1 ? 663 ADDSIZE(slen); 680 size_t slen; local 714 slen = strlen(cur->symlink); 715 if (slen < UFS1_MAXSYMLINKLEN) { /* short link */ 716 memcpy(dinp->di_shortlink, cur->symlink, slen); 719 dinp->di_size = slen; 728 size_t slen; local [all...] |
/freebsd-current/contrib/llvm-project/llvm/lib/Support/ |
H A D | regcomp.c | 198 sopno slen; /* malloced strip length (used) */ member in struct:parse 271 #define HERE() (p->slen) 272 #define THERE() (p->slen - 1) 273 #define THERETHERE() (p->slen - 2) 274 #define DROP(n) (p->slen -= (n)) 324 p->slen = 0; 1458 assert(p->ssize >= p->slen + len); 1459 (void) memmove((char *)(p->strip + p->slen), 1461 p->slen += len; 1483 if (p->slen > [all...] |
/freebsd-current/contrib/wpa/src/common/ |
H A D | dpp_tcp.c | 1109 u16 slen; local 1130 slen = *pos++; 1132 slen > end - pos || slen < 2) 1135 next = pos + slen; 1138 if (slen != 8 || *pos != WLAN_EID_VENDOR_SPECIFIC || 1147 slen = WPA_GET_LE16(pos); 1149 if (slen > end - pos) 1152 resp = dpp_conf_req_rx(auth, pos, slen); 1306 u16 status, slen, comeback_dela local [all...] |
/freebsd-current/lib/libsecureboot/ |
H A D | vets.c | 784 size_t flen, slen, plen; local 791 if ((scp = read_file(sigfile, &slen)) == NULL) { 795 if ((po = decode_pem(scp, slen, &plen)) == NULL) { 834 unsigned char *sdata, size_t slen) 841 if (!vrfy(sdata, slen, hash_oid, mlen, pkey, vhbuf) || 881 size_t flen, slen, plen, hlen; local 886 if ((scp = read_file(sigfile, &slen)) == NULL) { 890 if ((po = decode_pem(scp, slen, &plen)) == NULL) { 1055 const char *hname, const char *s, size_t slen, const char *want) 1060 md->update(&mctx.vtable, s, slen); 831 verify_rsa_digest(br_rsa_public_key *pkey, const unsigned char *hash_oid, unsigned char *mdata, size_t mlen, unsigned char *sdata, size_t slen) argument 1054 test_hash(const br_hash_class *md, size_t hlen, const char *hname, const char *s, size_t slen, const char *want) argument [all...] |
/freebsd-current/contrib/ntp/sntp/libevent/test/ |
H A D | regress_bufferevent.c | 661 ev_socklen_t slen = sizeof(*localhost); local 672 tt_assert(bind(fd, sa, slen) == 0); 673 tt_assert(getsockname(fd, sa, &slen) == 0); 734 ev_socklen_t slen; local 769 slen = sizeof(ss); 770 if (regress_get_listener_addr(lev, sa, &slen) < 0) { 823 ev_socklen_t slen = sizeof(localhost); local 840 r = bufferevent_socket_connect(bev, (struct sockaddr *)&localhost, slen); 896 ev_socklen_t slen = sizeof(localhost); local 908 r = bufferevent_socket_connect(bev, (struct sockaddr *)&localhost, slen); 1150 ev_socklen_t slen; local [all...] |
/freebsd-current/contrib/libevent/test/ |
H A D | regress_bufferevent.c | 661 ev_socklen_t slen = sizeof(*localhost); local 672 tt_assert(bind(fd, sa, slen) == 0); 673 tt_assert(getsockname(fd, sa, &slen) == 0); 734 ev_socklen_t slen; local 769 slen = sizeof(ss); 770 if (regress_get_listener_addr(lev, sa, &slen) < 0) { 823 ev_socklen_t slen = sizeof(localhost); local 840 r = bufferevent_socket_connect(bev, (struct sockaddr *)&localhost, slen); 896 ev_socklen_t slen = sizeof(localhost); local 908 r = bufferevent_socket_connect(bev, (struct sockaddr *)&localhost, slen); 1150 ev_socklen_t slen; local [all...] |
/freebsd-current/contrib/nvi/regex/ |
H A D | regcomp.c | 67 sopno slen; /* malloced strip length (used) */ member in struct:parse 158 #define HERE() (p->slen) 159 #define THERE() (p->slen - 1) 160 #define THERETHERE() (p->slen - 2) 161 #define DROP(n) (p->slen -= (n)) 221 p->slen = 0; 1354 assert(p->ssize >= p->slen + len); 1355 (void) memcpy((char *)(p->strip + p->slen), 1357 (void) memcpy((char *)(p->stripdata + p->slen), 1359 p->slen [all...] |
/freebsd-current/contrib/lua/src/ |
H A D | lobject.c | 453 static void addstr2buff (BuffFS *buff, const char *str, size_t slen) { argument 454 if (slen <= BUFVFS) { /* does string fit into buffer? */ 455 char *bf = getbuff(buff, cast_int(slen)); 456 memcpy(bf, str, slen); /* add string to buffer */ 457 addsize(buff, cast_int(slen)); 461 pushstr(buff, str, slen); /* push string */
|
H A D | loslib.c | 303 size_t slen; local 304 const char *s = luaL_optlstring(L, 1, "%c", &slen); 306 const char *se = s + slen; /* 's' end */
|
/freebsd-current/tools/tools/net80211/wlaninject/ |
H A D | wlaninject.c | 437 int possible_match(struct ieee80211_frame *sent, int slen, argument 440 if (slen != glen) 465 int do_verify(struct ieee80211_frame *sent, int slen, void *got, int glen) argument 502 if (!possible_match(sent, slen, wh, glen)) 506 if (memcmp(sent, wh, slen) == 0) { 515 for (i = 0; i < slen; i++, ptr++, ptr2++) {
|
/freebsd-current/sys/netgraph/ |
H A D | ng_pred1.c | 100 int slen, int dlen); 617 Pred1Decompress(node_p node, u_char *source, u_char *dest, int slen, int dlen) argument 624 while (slen) { 626 slen--; 634 if (!slen) 642 slen--;
|
/freebsd-current/contrib/unbound/sldns/ |
H A D | str2wire.c | 552 size_t slen; local 566 slen = strlen(token); 569 slen >= 2 && 571 (token[slen-1] == '"' || token[slen-1] == '\'')) { 573 memmove(token, token+1, slen-2); 574 token[slen-2] = 0; 575 slen -= 2; 578 slen >= 2 && 582 memmove(token, token+1, slen 1949 size_t slen = strlen(str); local 2522 size_t slen; local 2556 size_t slen = strlen(str); local 2751 size_t slen = strlen(str); local [all...] |
/freebsd-current/sys/netsmb/ |
H A D | smb_trantcp.c | 487 int error, slen; local 500 slen = sap->sa_len; 501 if (slen < NB_MINSALEN) 522 int error, slen; local 529 slen = sap->sa_len; 530 if (slen < NB_MINSALEN)
|
/freebsd-current/sys/rpc/ |
H A D | clnt_rc.c | 420 size_t slen; local 514 slen = strlen(info) + 1; 518 * NAME_MAX - 7. However, "slen" includes the nul termination 521 if (slen <= 1 || slen > NAME_MAX - 6) 523 rc->rc_tlscertname = mem_alloc(slen); 524 strlcpy(rc->rc_tlscertname, info, slen);
|
/freebsd-current/crypto/heimdal/kadmin/ |
H A D | rpc.c | 205 ssize_t slen; local 210 slen = krb5_storage_read(sp, buf, tlen); 211 INSIST((size_t)slen == tlen); 213 slen = krb5_storage_write(msg, buf, tlen); 214 INSIST((size_t)slen == tlen); 793 ssize_t slen; local 798 slen = krb5_storage_read(sp, tmp + ilen, sizeof(tmp) - ilen); 799 INSIST((size_t)slen == sizeof(tmp) - ilen); 815 slen = krb5_storage_write(msg, buf, len); 816 INSIST((size_t)slen [all...] |
/freebsd-current/contrib/netbsd-tests/net/icmp/ |
H A D | t_ping.c | 149 socklen_t slen; local 178 slen = sizeof(pingee); 190 (struct sockaddr *)&pingee, &slen)) > 0) {
|