Searched refs:slen (Results 51 - 75 of 306) sorted by relevance

1234567891011>>

/freebsd-current/contrib/blocklist/lib/
H A Dblacklist.c62 const struct sockaddr *sa, socklen_t slen, const char *msg)
84 return bl_send(bl, internal_action, rfd, sa, slen, msg);
61 blacklist_sa_r(struct blacklist *bl, int action, int rfd, const struct sockaddr *sa, socklen_t slen, const char *msg) argument
H A Dbl.c314 socklen_t slen, const char *ctx)
320 switch (slen) {
331 __func__, (unsigned)slen, ctx);
336 memcpy(ss, sa, slen);
346 if (ss->ss_len != slen) {
349 __func__, ss->ss_len, (unsigned)slen, ctx);
350 ss->ss_len = (uint8_t)slen;
358 socklen_t slen, const char *ctx)
384 if (bl_getsock(b, &ub.bl.bl_ss, sa, slen, ctx) == -1)
388 ub.bl.bl_salen = slen;
313 bl_getsock(bl_t b, struct sockaddr_storage *ss, const struct sockaddr *sa, socklen_t slen, const char *ctx) argument
357 bl_send(bl_t b, bl_type_t e, int pfd, const struct sockaddr *sa, socklen_t slen, const char *ctx) argument
[all...]
/freebsd-current/tests/sys/netinet/
H A Dso_reuseport_lb_test.c131 socklen_t slen; local
149 slen = sizeof(addr);
150 error = getsockname(sds[0], (struct sockaddr *)&addr, &slen);
153 ATF_REQUIRE_MSG(slen == sizeof(addr), "sockaddr size changed");
187 socklen_t slen; local
205 slen = sizeof(addr);
206 error = getsockname(sds[0], (struct sockaddr *)&addr, &slen);
209 ATF_REQUIRE_MSG(slen == sizeof(addr), "sockaddr size changed");
H A Dsocket_afinet.c96 socklen_t slen; local
116 slen = sizeof(sin);
117 rc = getsockname(ss, (struct sockaddr *)&sin, &slen);
159 socklen_t slen; local
180 slen = sizeof(sin);
181 rc = getsockname(ss, (struct sockaddr *)&sin, &slen);
241 socklen_t slen; local
261 slen = sizeof(sin);
262 rc = getsockname(ss, (struct sockaddr *)&sin, &slen);
/freebsd-current/stand/libsa/
H A Dbootparam.c345 int slen; /* string length */ local
351 slen = ntohl(*lenp);
352 plen = (slen + 3) & ~3;
354 if (slen > *len_p)
355 slen = *len_p;
358 bcopy(datap, str, slen);
360 str[slen] = '\0';
361 *len_p = slen;
/freebsd-current/usr.bin/locate/locate/
H A Dutil.c83 int vlen, slen; local
110 slen = ch - c;
111 if ((p = malloc(sizeof(char) * (slen + 1)))
114 bcopy(c, p, slen);
115 *(p + slen) = '\0';
/freebsd-current/contrib/smbfs/lib/smb/
H A Dnb_name.c54 int slen; local
56 slen = namelen + sizeof(*snb) - sizeof(snb->snb_name);
57 snb = malloc(slen);
60 bzero(snb, slen);
62 snb->snb_len = slen;
/freebsd-current/sys/dev/bhnd/nvram/
H A Dbhnd_nvram_value_prf.c617 size_t slen; local
681 for (slen = 0; slen < sizeof(numbuf); slen++) {
695 slen++;
700 arg_size = slen;
745 for (i = slen; i < width; i++)
750 if (limit > nbytes && limit - nbytes >= slen)
751 memcpy(outp + nbytes, sptr, slen);
768 size_t slen; local
[all...]
/freebsd-current/contrib/wpa/wpa_supplicant/
H A Dhs20_supplicant.c462 size_t slen, u8 dialog_token)
473 icon->image = os_memdup(pos, slen);
476 icon->image_len = slen;
489 if (slen < 4) {
499 slen--;
501 if ((size_t) 1 + pos[0] > slen) {
508 slen -= 1 + pos[0];
511 if (slen < 2) {
518 slen -= 2;
520 if (data_len > slen) {
460 hs20_process_icon_binary_file(struct wpa_supplicant *wpa_s, const u8 *sa, const u8 *pos, size_t slen, u8 dialog_token) argument
590 hs20_parse_rx_hs20_anqp_resp(struct wpa_supplicant *wpa_s, struct wpa_bss *bss, const u8 *sa, const u8 *data, size_t slen, u8 dialog_token) argument
904 u8 slen; local
[all...]
/freebsd-current/tools/tools/crypto/
H A Dipsecstats.c92 size_t slen; local
95 slen = sizeof (ips);
96 if (sysctlbyname("net.inet.ipsec.ipsecstats", &ips, &slen, NULL, 0) < 0)
98 slen = sizeof (ahs);
99 if (sysctlbyname("net.inet.ah.stats", &ahs, &slen, NULL, 0) < 0)
101 slen = sizeof (esps);
102 if (sysctlbyname("net.inet.esp.stats", &esps, &slen, NULL, 0) < 0)
H A Dcryptostats.c62 size_t slen; local
64 slen = sizeof (stats);
65 if (sysctlbyname("kern.crypto_stats", &stats, &slen, NULL, 0) < 0)
/freebsd-current/usr.bin/random/
H A Drandomize_fd.c97 u_int slen; local
184 slen = i - (u_long)bufc;
185 n->len = slen + 2;
186 n->cp = (u_char *)malloc(slen + 2);
190 memmove(n->cp, &buf[bufc], slen);
191 n->cp[slen] = buf[i];
192 n->cp[slen + 1] = '\0';
/freebsd-current/contrib/netbsd-tests/kernel/
H A Dt_kauth_pr_47598.c106 socklen_t slen; local
134 slen = sizeof(sa);
135 ATF_REQUIRE(getsockname(s, (struct sockaddr *)&sa, &slen)==0);
/freebsd-current/crypto/openssl/crypto/asn1/
H A Df_string.c53 int num = 0, slen = 0, first = 1; local
99 if (num + i > slen) {
107 slen = num + i * 2;
H A Df_int.c59 int num = 0, slen = 0, first = 1; local
108 if (num + i > slen) {
109 sp = OPENSSL_clear_realloc(s, slen, num + i * 2);
116 slen = num + i * 2;
H A Da_d2i_fp.c121 long slen; local
160 inf = ASN1_get_object(&q, &slen, &tag, &xclass, diff);
180 } else if (eos && (slen == 0) && (tag == V_ASN1_EOC)) {
188 /* suck in slen bytes of data */
189 want = slen;
230 if (off + slen < off) {
234 off += slen;
/freebsd-current/contrib/nvi/ex/
H A Dtag.h86 size_t slen; /* Search string length. */ member in struct:_tag
/freebsd-current/contrib/mandoc/
H A Dout.h54 tbl_strlen slen; /* calculate string length */ member in struct:rofftbl
57 void *arg; /* passed to sulen, slen, and len */
/freebsd-current/crypto/openssl/crypto/crmf/
H A Dcrmf_pbm.c35 * |slen| SHOULD be at least 8 (16 is common)
41 OSSL_CRMF_PBMPARAMETER *OSSL_CRMF_pbmp_new(OSSL_LIB_CTX *libctx, size_t slen, argument
56 if ((salt = OPENSSL_malloc(slen)) == NULL)
58 if (RAND_bytes_ex(libctx, salt, slen, 0) <= 0) {
62 if (!ASN1_OCTET_STRING_set(pbm->salt, salt, (int)slen))
/freebsd-current/lib/libsecureboot/
H A Dlibsecureboot-priv.h55 unsigned char *sdata, size_t slen);
/freebsd-current/contrib/netbsd-tests/net/mcast/
H A Dmcast.c172 connector(int fd, const struct sockaddr *sa, socklen_t slen) argument
174 assert(sizeof(ss) > slen);
175 memcpy(&ss, sa, slen);
188 int (*f)(int, const struct sockaddr *, socklen_t), socklen_t *slen,
223 *slen = ai->ai_addrlen;
274 socklen_t slen; local
276 s = getsocket(host, port, conn ? connect : connector, &slen, bug);
296 sendto(s, &msg, sizeof(msg), 0, (void *)&ss, slen);
318 socklen_t slen; local
320 s = getsocket(host, port, bind, &slen, bu
187 getsocket(const char *host, const char *port, int (*f)(int, const struct sockaddr *, socklen_t), socklen_t *slen, bool bug) argument
[all...]
/freebsd-current/crypto/openssh/
H A Daddr.h45 int addr_sa_to_xaddr(struct sockaddr *sa, socklen_t slen, struct xaddr *xa);
51 socklen_t slen);
H A Dkexgen.c148 size_t slen, hashlen; local
170 (r = sshpkt_get_string(ssh, &signature, &slen)) != 0 ||
217 if ((r = sshkey_verify(server_host_key, signature, slen, hash, hashlen,
235 if ((r = sshbuf_put(kex->initial_sig, signature, slen)) != 0)
275 size_t slen, hashlen; local
343 &signature, &slen, hash, hashlen, kex->hostkey_alg)) != 0)
350 (r = sshpkt_put_string(ssh, signature, slen)) != 0 ||
/freebsd-current/contrib/netbsd-tests/net/net/
H A Dt_unix.c142 size_t slen; local
152 slen = len + OF + 1;
154 if ((sun = calloc(1, slen)) == NULL)
213 if ((sock_addr = calloc(1, slen)) == NULL)
215 sock_addrlen = slen;
233 for (size_t i = 0; i < slen - OF; i++)
/freebsd-current/sys/netgraph/
H A Dng_parse.c723 int slen; local
725 if ((sval = ng_get_string_token(s, off, &len, &slen)) == NULL)
728 bcopy(sval, buf, slen + 1);
730 *buflen = slen + 1;
787 int slen; local
789 if ((sval = ng_get_string_token(s, off, &len, &slen)) == NULL)
791 if (slen + 1 > fi->bufSize) {
796 bcopy(sval, buf, slen);
798 bzero(buf + slen, fi->bufSize - slen);
890 int slen; local
911 const int slen = *((const u_int16_t *)(data + *off)); local
1099 int slen; local
1731 int slen; local
1815 ng_encode_string(const char *raw, int slen) argument
[all...]

Completed in 246 milliseconds

1234567891011>>