/freebsd-current/lib/libc/net/ |
H A D | rcmdsh.c | 68 static char hbuf[NI_MAXHOST]; local 95 strncpy(hbuf, res->ai_canonname, sizeof(hbuf) - 1); 96 hbuf[sizeof(hbuf) - 1] = '\0'; 97 *ahost = hbuf;
|
/freebsd-current/contrib/sendmail/src/ |
H A D | sasl.c | 249 char hbuf[NI_MAXHOST], pbuf[NI_MAXSERV]; local 267 hbuf, sizeof(hbuf), pbuf, sizeof(pbuf), niflags) != 0) 275 if (sm_strlcpy(hbuf, inet_ntoa(addr->sin.sin_addr), sizeof(hbuf)) 276 >= sizeof(hbuf)) 284 if (outlen < strlen(hbuf) + strlen(pbuf) + 2) 289 sm_snprintf(out, outlen, "%s;%s", hbuf, pbuf);
|
H A D | daemon.c | 119 ** host_map_lookup(map, hbuf, avp, pstat) 120 ** Convert the entry in hbuf into a canonical form. 3627 static char hbuf[MAXNAME + MAXAUTHINFO + 11]; /* EAI:ok? (as above)*/ local 3648 (void) sm_strlcpyn(hbuf, sizeof(hbuf), 2, RealUserName, 3651 sm_dprintf("getauthinfo: %s\n", hbuf); 3652 return hbuf; 3915 (void) sm_strlcpy(hbuf, "IDENT:", sizeof(hbuf)); 3916 cleanstrcpy(&hbuf[ 4145 char hbuf[MAXNAME + 1]; /* is (host)name in 'x' format? */ local [all...] |
H A D | headers.c | 202 char hbuf[50]; local 204 (void) expand(fvalue, hbuf, sizeof(hbuf), e); 205 for (p = hbuf; SM_ISSPACE(*p); ) 1174 char hbuf[MAXNAME + 1]; /* EAI:ok; restricted to short size */ local 1192 name = hbuf; 1193 (void) sm_snprintf(hbuf, sizeof(hbuf), "%.80s", RealHostName); 1196 p = &hbuf[strlen(hbuf)]; [all...] |
H A D | parseaddr.c | 2016 char hbuf[MAXNAME + 1]; /* EAI:ok */ local 2032 hbuf[0] = '\0'; 2087 cataddr(hostp, tv - 1, hbuf, sizeof(hbuf), '\0', true); 2103 a->q_host = sm_rpool_strdup_x(e->e_rpool, hbuf); 2104 if (strchr(hbuf, '.') != NULL) 2107 hbuf); 2108 setstat(dsntoexitstat(hbuf)); 2110 else if (isascii(hbuf[0]) && isdigit(hbuf[ [all...] |
/freebsd-current/sys/opencrypto/ |
H A D | gmac.c | 50 uint8_t hbuf[GMAC_BLOCK_LEN]; local 55 rijndaelEncrypt(agc->keysched, agc->rounds, zeros, hbuf); 57 h = gf128_read(hbuf); 61 explicit_bzero(hbuf, sizeof hbuf);
|
/freebsd-current/usr.sbin/ctld/ |
H A D | discovery.c | 107 char hbuf[NI_MAXHOST], sbuf[NI_MAXSERV]; local 118 hbuf, sizeof(hbuf), sbuf, sizeof(sbuf), 126 if (strcmp(hbuf, "0.0.0.0") == 0) 128 ret = asprintf(&buf, "%s:%s,%d", hbuf, sbuf, 132 if (strcmp(hbuf, "::") == 0) 134 ret = asprintf(&buf, "[%s]:%s,%d", hbuf, sbuf,
|
/freebsd-current/usr.bin/pr/ |
H A D | pr.c | 175 char *hbuf; local 197 if ((hbuf = malloc((unsigned)(HDBUF + offst)*sizeof(char))) == NULL) { 203 ohbuf = hbuf + offst; 210 (void)memset(hbuf, (int)' ', offst); 250 prhead(hbuf, fname, pagecnt)) 299 free(hbuf); 303 free(hbuf); 335 char *hbuf = NULL; local 356 if ((hbuf = malloc((unsigned)(HDBUF + offst)*sizeof(char))) == NULL) { 360 ohbuf = hbuf 655 char *hbuf; local 808 char *hbuf = NULL; local [all...] |
/freebsd-current/usr.sbin/traceroute6/ |
H A D | traceroute6.c | 351 char hbuf[NI_MAXHOST], src0[NI_MAXHOST], *ep; local 648 if (cap_getnameinfo(capdns, res->ai_addr, res->ai_addrlen, hbuf, 649 sizeof(hbuf), NULL, 0, NI_NUMERICHOST) != 0) 650 strlcpy(hbuf, "?", sizeof(hbuf)); 652 "addresses; using %s\n", hostname, hbuf); 901 if (cap_getnameinfo(capdns, (struct sockaddr *)&Dst, Dst.sin6_len, hbuf, 902 sizeof(hbuf), NULL, 0, NI_NUMERICHOST)) 903 strlcpy(hbuf, "(invalid)", sizeof(hbuf)); 1329 char hbuf[NI_MAXHOST]; local 1576 char hbuf[NI_MAXHOST]; local [all...] |
/freebsd-current/contrib/sendmail/libmilter/ |
H A D | example.c | 52 char hbuf[1024]; local 74 snprintf(hbuf, sizeof hbuf, "%s@%s", p, host); 75 smfi_addheader(ctx, "X-Archived", hbuf);
|
/freebsd-current/usr.bin/logger/ |
H A D | logger.c | 92 *hostname, hbuf[MAXHOSTNAMELEN], *pristr; local 187 hostname = hbuf; 188 (void )gethostname(hbuf, MAXHOSTNAMELEN); 247 char *p, *p0, *hs, *hbuf, *sbuf; local 249 hbuf = sbuf = NULL; 272 hbuf = (p == hs && *p == ':') ? NULL : p; 284 error = getaddrinfo(hbuf, sbuf, &hints, &res0);
|
/freebsd-current/lib/libc/tests/resolv/ |
H A D | resolv_test.c | 102 char portstr[6], hbuf[NI_MAXHOST], pbuf[NI_MAXSERV]; local 114 memset(hbuf, 0, sizeof(hbuf)); 116 getnameinfo(res->ai_addr, res->ai_addrlen, hbuf, sizeof(hbuf), 118 DBG("T%ld: reverse %s %s\n", threadnum, hbuf, pbuf);
|
/freebsd-current/contrib/bearssl/inc/ |
H A D | bearssl_pem.h | 124 const unsigned char *hbuf; member in struct:__anon139
|
H A D | bearssl_x509.h | 719 const unsigned char *hbuf; member in struct:__anon47 1038 const unsigned char *hbuf; member in struct:__anon49 1210 const unsigned char *hbuf; member in struct:__anon52
|
/freebsd-current/contrib/mandoc/ |
H A D | tbl_html.c | 123 char hbuf[4], vbuf[4]; local 195 (void)snprintf(hbuf, sizeof(hbuf), 197 hspans = hbuf;
|
/freebsd-current/usr.sbin/config/ |
H A D | mkoptions.cc | 286 static char hbuf[MAXPATHLEN]; local 302 (void)strlcpy(hbuf, fpath, sizeof(hbuf)); 304 return (hbuf);
|
/freebsd-current/lib/libfetch/ |
H A D | http.c | 529 http_next_header(conn_t *conn, http_headerbuf_t *hbuf, const char **p) argument 542 if (hbuf->bufsize < conn->buflen + 1) { 543 if ((hbuf->buf = realloc(hbuf->buf, conn->buflen + 1)) == NULL) 545 hbuf->bufsize = conn->buflen + 1; 547 strcpy(hbuf->buf, conn->buf); 548 hbuf->buflen = conn->buflen; 569 len = hbuf->buflen + conn->buflen; 570 if (hbuf->bufsize < len + 1) { 572 if ((hbuf 1588 char hbuf[MAXHOSTNAMELEN + 7], *host; local [all...] |
/freebsd-current/lib/libsecureboot/ |
H A D | verify_file.c | 618 unsigned char hbuf[br_sha256_SIZE]; local 623 hlen = ve_pcr_get(hbuf, sizeof(hbuf)); 625 hex = hexdigest(hexbuf, sizeof(hexbuf), hbuf, hlen);
|
/freebsd-current/lib/libc/resolv/ |
H A D | res_send.c | 1096 char hbuf[NI_MAXHOST]; local 1100 if (getnameinfo(address, alen, hbuf, sizeof(hbuf), 1102 strncpy(hbuf, "?", sizeof(hbuf) - 1); 1103 hbuf[sizeof(hbuf) - 1] = '\0'; 1108 string, hbuf, sbuf, strerror(error));
|
/freebsd-current/usr.bin/netstat/ |
H A D | inet6.c | 1320 char hbuf[NI_MAXHOST], *cp; local 1344 error = getnameinfo((struct sockaddr *)&sin6, sizeof(sin6), hbuf, 1345 sizeof(hbuf), NULL, 0, flags); 1348 (cp = strchr(hbuf, '.')) && 1351 strlcpy(line, hbuf, sizeof(line));
|
/freebsd-current/sys/contrib/zlib/ |
H A D | inflate.c | 25 * - Make hbuf[] unsigned char to match parameter type in inflate.c 428 hbuf[0] = (unsigned char)(word); \ 429 hbuf[1] = (unsigned char)((word) >> 8); \ 430 check = crc32(check, hbuf, 2); \ 435 hbuf[0] = (unsigned char)(word); \ 436 hbuf[1] = (unsigned char)((word) >> 8); \ 437 hbuf[2] = (unsigned char)((word) >> 16); \ 438 hbuf[3] = (unsigned char)((word) >> 24); \ 439 check = crc32(check, hbuf, 4); \ 605 unsigned char hbuf[ local [all...] |
/freebsd-current/usr.sbin/ypldap/ |
H A D | ldapclient.c | 71 char hbuf[NI_MAXHOST], sbuf[NI_MAXSERV]; local 74 if (getnameinfo(sa, sa->sa_len, hbuf, sizeof(hbuf), sbuf, 84 warn("connect to %s port %s (%s) failed", hbuf, sbuf, "tcp");
|
/freebsd-current/libexec/tftpd/ |
H A D | tftpd.c | 322 char hbuf[NI_MAXHOST]; local 328 hbuf, sizeof(hbuf), NULL, 0, 330 asprintf(&tempchroot, "%s/%s", chroot_dir, hbuf);
|
/freebsd-current/usr.sbin/ndp/ |
H A D | ndp.c | 891 static char hbuf[NI_MAXHOST]; local 894 strlcpy(hbuf, ether_ntoa((struct ether_addr *)LLADDR(sdl)), 895 sizeof(hbuf)); 898 snprintf(hbuf, sizeof(hbuf), "%s", link_ntoa(sdl) + n); 900 snprintf(hbuf, sizeof(hbuf), "(incomplete)"); 902 return(hbuf);
|
/freebsd-current/contrib/tcsh/ |
H A D | ed.chared.c | 2155 Char *hbuf; local 2167 hbuf = NULL; 2179 hbuf = expand_lex(&hp->Hlex, 0, INT_MAX); 2180 cp = Strend(hbuf); 2181 bp = hbuf; 2201 hbuf = expand_lex(&hp->Hlex, 0, INT_MAX); 2202 cp = Strend(hbuf); 2203 bp = hbuf; 2231 xfree(hbuf); 2235 xfree(hbuf); [all...] |