/freebsd-13-stable/lib/libsecureboot/openpgp/ |
H A D | packet.h | 72 unsigned char *sdata, size_t sbytes, int flags);
|
H A D | opgp_sig.c | 278 * @param[in] sbytes 288 unsigned char *sdata, size_t sbytes, 316 sdata = ddata = dearmor((char *)sdata, sbytes, &sbytes); 318 rc = decode_packet(2, &ptr, sbytes, (decoder_t)decode_sig, sig); 466 size_t fbytes, sbytes; local 468 if ((sdata = read_file(sigfile, &sbytes))) { 474 sbytes, flags)) { 286 openpgp_verify(const char *filename, unsigned char *fdata, size_t fbytes, unsigned char *sdata, size_t sbytes, int flags) argument
|
H A D | opgp_key.c | 395 size_t fbytes, sbytes; local 402 sbytes = strlen(sdata); 405 (unsigned char *)sdata, sbytes, 0);
|
/freebsd-13-stable/crypto/openssl/include/internal/ |
H A D | ktls.h | 195 off_t sbytes = 0; local 198 ret = sendfile(fd, s, off, size, NULL, &sbytes, flags); 199 if (ret == -1 && sbytes == 0) 201 return sbytes;
|
/freebsd-13-stable/crypto/openssl/engines/ |
H A D | e_afalg.c | 413 ssize_t sbytes; local 451 sbytes = sendmsg(actx->sfd, &msg, 0); 452 if (sbytes < 0) { 478 sbytes = sendmsg(actx->sfd, &msg, 0); 479 if (sbytes < 0) { 485 if (sbytes != (ssize_t) inl) { 486 ALG_WARN("Cipher operation send bytes %zd != inlen %zd\n", sbytes,
|
/freebsd-13-stable/sys/kern/ |
H A D | kern_sendfile.c | 694 off_t off, sbytes, rem, obj_size, nobj_size; local 708 hdrlen = sbytes = 0; 1201 sbytes += space + hdrlen; 1217 sbytes += td->td_retval[0]; 1232 (*sent) = sbytes; 1271 off_t sbytes; local 1281 sbytes = 0; 1325 uap->nbytes, &sbytes, uap->flags, td); 1328 if (uap->sbytes != NULL) 1329 copyout(&sbytes, ua [all...] |
H A D | systrace_args.c | 1945 uarg[5] = (intptr_t)p->sbytes; /* off_t * */
|
/freebsd-13-stable/tests/sys/fs/fusefs/ |
H A D | read.cc | 795 off_t sbytes; local 818 ASSERT_EQ(0, sendfile(fd, sp[1], 0, bufsize, NULL, &sbytes, 0)) 840 off_t sbytes; local 856 ASSERT_NE(0, sendfile(fd, sp[1], 0, bufsize, NULL, &sbytes, 0));
|
/freebsd-13-stable/lib/libc/tests/sys/ |
H A D | sendfile_test.c | 880 off_t sbytes; local 891 error = sendfile(fd, client_sock, 0, 0, NULL, &sbytes, SF_FLAGS(0, 0)); 898 ATF_CHECK_EQ_MSG(pattern_size, sbytes, 899 "the value returned by sbytes does not match the expected pattern " 908 "Verify positive `sbytes` functionality (IPv4)"); 921 "Verify positive `sbytes` functionality (IPv6)"); 959 "Verify negative `sbytes` functionality (IPv4)"); 972 "Verify negative `sbytes` functionality (IPv6)");
|
/freebsd-13-stable/sys/compat/freebsd32/ |
H A D | freebsd32_misc.c | 2060 off_t offset, sbytes; local 2114 uap->nbytes, &sbytes, uap->flags, td); 2117 if (uap->sbytes != NULL) 2118 copyout(&sbytes, uap->sbytes, sizeof(off_t));
|
H A D | freebsd32_proto.h | 323 char sbytes_l_[PADL_(off_t *)]; off_t * sbytes; char sbytes_r_[PADR_(off_t *)]; member in struct:freebsd32_sendfile_args 1021 char sbytes_l_[PADL_(off_t *)]; off_t * sbytes; char sbytes_r_[PADR_(off_t *)]; member in struct:freebsd4_freebsd32_sendfile_args
|
H A D | freebsd32_systrace_args.c | 1842 uarg[6] = (intptr_t)p->sbytes; /* off_t * */
|
/freebsd-13-stable/sys/sys/ |
H A D | sysproto.h | 1045 char sbytes_l_[PADL_(off_t *)]; off_t * sbytes; char sbytes_r_[PADR_(off_t *)]; member in struct:sendfile_args 2458 char sbytes_l_[PADL_(off_t *)]; off_t * sbytes; char sbytes_r_[PADR_(off_t *)]; member in struct:freebsd4_sendfile_args
|