/freebsd-current/contrib/blocklist/lib/ |
H A D | blacklist.c | 62 const struct sockaddr *sa, socklen_t slen, const char *msg) 84 return bl_send(bl, internal_action, rfd, sa, slen, msg); 61 blacklist_sa_r(struct blacklist *bl, int action, int rfd, const struct sockaddr *sa, socklen_t slen, const char *msg) argument
|
H A D | bl.c | 314 socklen_t slen, const char *ctx) 320 switch (slen) { 331 __func__, (unsigned)slen, ctx); 336 memcpy(ss, sa, slen); 346 if (ss->ss_len != slen) { 349 __func__, ss->ss_len, (unsigned)slen, ctx); 350 ss->ss_len = (uint8_t)slen; 358 socklen_t slen, const char *ctx) 384 if (bl_getsock(b, &ub.bl.bl_ss, sa, slen, ctx) == -1) 388 ub.bl.bl_salen = slen; 313 bl_getsock(bl_t b, struct sockaddr_storage *ss, const struct sockaddr *sa, socklen_t slen, const char *ctx) argument 357 bl_send(bl_t b, bl_type_t e, int pfd, const struct sockaddr *sa, socklen_t slen, const char *ctx) argument [all...] |
/freebsd-current/tests/sys/netinet/ |
H A D | so_reuseport_lb_test.c | 131 socklen_t slen; local 149 slen = sizeof(addr); 150 error = getsockname(sds[0], (struct sockaddr *)&addr, &slen); 153 ATF_REQUIRE_MSG(slen == sizeof(addr), "sockaddr size changed"); 187 socklen_t slen; local 205 slen = sizeof(addr); 206 error = getsockname(sds[0], (struct sockaddr *)&addr, &slen); 209 ATF_REQUIRE_MSG(slen == sizeof(addr), "sockaddr size changed");
|
H A D | socket_afinet.c | 96 socklen_t slen; local 116 slen = sizeof(sin); 117 rc = getsockname(ss, (struct sockaddr *)&sin, &slen); 159 socklen_t slen; local 180 slen = sizeof(sin); 181 rc = getsockname(ss, (struct sockaddr *)&sin, &slen); 241 socklen_t slen; local 261 slen = sizeof(sin); 262 rc = getsockname(ss, (struct sockaddr *)&sin, &slen);
|
/freebsd-current/stand/libsa/ |
H A D | bootparam.c | 345 int slen; /* string length */ local 351 slen = ntohl(*lenp); 352 plen = (slen + 3) & ~3; 354 if (slen > *len_p) 355 slen = *len_p; 358 bcopy(datap, str, slen); 360 str[slen] = '\0'; 361 *len_p = slen;
|
/freebsd-current/usr.bin/locate/locate/ |
H A D | util.c | 83 int vlen, slen; local 110 slen = ch - c; 111 if ((p = malloc(sizeof(char) * (slen + 1))) 114 bcopy(c, p, slen); 115 *(p + slen) = '\0';
|
/freebsd-current/contrib/smbfs/lib/smb/ |
H A D | nb_name.c | 54 int slen; local 56 slen = namelen + sizeof(*snb) - sizeof(snb->snb_name); 57 snb = malloc(slen); 60 bzero(snb, slen); 62 snb->snb_len = slen;
|
/freebsd-current/sys/dev/bhnd/nvram/ |
H A D | bhnd_nvram_value_prf.c | 617 size_t slen; local 681 for (slen = 0; slen < sizeof(numbuf); slen++) { 695 slen++; 700 arg_size = slen; 745 for (i = slen; i < width; i++) 750 if (limit > nbytes && limit - nbytes >= slen) 751 memcpy(outp + nbytes, sptr, slen); 768 size_t slen; local [all...] |
/freebsd-current/contrib/wpa/wpa_supplicant/ |
H A D | hs20_supplicant.c | 462 size_t slen, u8 dialog_token) 473 icon->image = os_memdup(pos, slen); 476 icon->image_len = slen; 489 if (slen < 4) { 499 slen--; 501 if ((size_t) 1 + pos[0] > slen) { 508 slen -= 1 + pos[0]; 511 if (slen < 2) { 518 slen -= 2; 520 if (data_len > slen) { 460 hs20_process_icon_binary_file(struct wpa_supplicant *wpa_s, const u8 *sa, const u8 *pos, size_t slen, u8 dialog_token) argument 590 hs20_parse_rx_hs20_anqp_resp(struct wpa_supplicant *wpa_s, struct wpa_bss *bss, const u8 *sa, const u8 *data, size_t slen, u8 dialog_token) argument 904 u8 slen; local [all...] |
/freebsd-current/tools/tools/crypto/ |
H A D | ipsecstats.c | 92 size_t slen; local 95 slen = sizeof (ips); 96 if (sysctlbyname("net.inet.ipsec.ipsecstats", &ips, &slen, NULL, 0) < 0) 98 slen = sizeof (ahs); 99 if (sysctlbyname("net.inet.ah.stats", &ahs, &slen, NULL, 0) < 0) 101 slen = sizeof (esps); 102 if (sysctlbyname("net.inet.esp.stats", &esps, &slen, NULL, 0) < 0)
|
H A D | cryptostats.c | 62 size_t slen; local 64 slen = sizeof (stats); 65 if (sysctlbyname("kern.crypto_stats", &stats, &slen, NULL, 0) < 0)
|
/freebsd-current/usr.bin/random/ |
H A D | randomize_fd.c | 97 u_int slen; local 184 slen = i - (u_long)bufc; 185 n->len = slen + 2; 186 n->cp = (u_char *)malloc(slen + 2); 190 memmove(n->cp, &buf[bufc], slen); 191 n->cp[slen] = buf[i]; 192 n->cp[slen + 1] = '\0';
|
/freebsd-current/contrib/netbsd-tests/kernel/ |
H A D | t_kauth_pr_47598.c | 106 socklen_t slen; local 134 slen = sizeof(sa); 135 ATF_REQUIRE(getsockname(s, (struct sockaddr *)&sa, &slen)==0);
|
/freebsd-current/crypto/openssl/crypto/asn1/ |
H A D | f_string.c | 53 int num = 0, slen = 0, first = 1; local 99 if (num + i > slen) { 107 slen = num + i * 2;
|
H A D | f_int.c | 59 int num = 0, slen = 0, first = 1; local 108 if (num + i > slen) { 109 sp = OPENSSL_clear_realloc(s, slen, num + i * 2); 116 slen = num + i * 2;
|
H A D | a_d2i_fp.c | 121 long slen; local 160 inf = ASN1_get_object(&q, &slen, &tag, &xclass, diff); 180 } else if (eos && (slen == 0) && (tag == V_ASN1_EOC)) { 188 /* suck in slen bytes of data */ 189 want = slen; 230 if (off + slen < off) { 234 off += slen;
|
/freebsd-current/contrib/nvi/ex/ |
H A D | tag.h | 86 size_t slen; /* Search string length. */ member in struct:_tag
|
/freebsd-current/contrib/mandoc/ |
H A D | out.h | 54 tbl_strlen slen; /* calculate string length */ member in struct:rofftbl 57 void *arg; /* passed to sulen, slen, and len */
|
/freebsd-current/crypto/openssl/crypto/crmf/ |
H A D | crmf_pbm.c | 35 * |slen| SHOULD be at least 8 (16 is common) 41 OSSL_CRMF_PBMPARAMETER *OSSL_CRMF_pbmp_new(OSSL_LIB_CTX *libctx, size_t slen, argument 56 if ((salt = OPENSSL_malloc(slen)) == NULL) 58 if (RAND_bytes_ex(libctx, salt, slen, 0) <= 0) { 62 if (!ASN1_OCTET_STRING_set(pbm->salt, salt, (int)slen))
|
/freebsd-current/lib/libsecureboot/ |
H A D | libsecureboot-priv.h | 55 unsigned char *sdata, size_t slen);
|
/freebsd-current/contrib/netbsd-tests/net/mcast/ |
H A D | mcast.c | 172 connector(int fd, const struct sockaddr *sa, socklen_t slen) argument 174 assert(sizeof(ss) > slen); 175 memcpy(&ss, sa, slen); 188 int (*f)(int, const struct sockaddr *, socklen_t), socklen_t *slen, 223 *slen = ai->ai_addrlen; 274 socklen_t slen; local 276 s = getsocket(host, port, conn ? connect : connector, &slen, bug); 296 sendto(s, &msg, sizeof(msg), 0, (void *)&ss, slen); 318 socklen_t slen; local 320 s = getsocket(host, port, bind, &slen, bu 187 getsocket(const char *host, const char *port, int (*f)(int, const struct sockaddr *, socklen_t), socklen_t *slen, bool bug) argument [all...] |
/freebsd-current/crypto/openssh/ |
H A D | addr.h | 45 int addr_sa_to_xaddr(struct sockaddr *sa, socklen_t slen, struct xaddr *xa); 51 socklen_t slen);
|
H A D | kexgen.c | 148 size_t slen, hashlen; local 170 (r = sshpkt_get_string(ssh, &signature, &slen)) != 0 || 217 if ((r = sshkey_verify(server_host_key, signature, slen, hash, hashlen, 235 if ((r = sshbuf_put(kex->initial_sig, signature, slen)) != 0) 275 size_t slen, hashlen; local 343 &signature, &slen, hash, hashlen, kex->hostkey_alg)) != 0) 350 (r = sshpkt_put_string(ssh, signature, slen)) != 0 ||
|
/freebsd-current/contrib/netbsd-tests/net/net/ |
H A D | t_unix.c | 142 size_t slen; local 152 slen = len + OF + 1; 154 if ((sun = calloc(1, slen)) == NULL) 213 if ((sock_addr = calloc(1, slen)) == NULL) 215 sock_addrlen = slen; 233 for (size_t i = 0; i < slen - OF; i++)
|
/freebsd-current/sys/netgraph/ |
H A D | ng_parse.c | 723 int slen; local 725 if ((sval = ng_get_string_token(s, off, &len, &slen)) == NULL) 728 bcopy(sval, buf, slen + 1); 730 *buflen = slen + 1; 787 int slen; local 789 if ((sval = ng_get_string_token(s, off, &len, &slen)) == NULL) 791 if (slen + 1 > fi->bufSize) { 796 bcopy(sval, buf, slen); 798 bzero(buf + slen, fi->bufSize - slen); 890 int slen; local 911 const int slen = *((const u_int16_t *)(data + *off)); local 1099 int slen; local 1731 int slen; local 1815 ng_encode_string(const char *raw, int slen) argument [all...] |