/freebsd-current/lib/libc/sys/ |
H A D | sendmsg.c | 39 #pragma weak sendmsg macro 41 sendmsg(int s, const struct msghdr *msg, int flags) function 43 return (INTERPOS_SYS(sendmsg, s, msg, flags));
|
/freebsd-current/tools/test/stress2/misc/ |
H A D | sendmsg.sh | 29 # sendmsg(2) fuzz test. 32 # https://people.freebsd.org/~pho/stress/log/sendmsg.txt 39 sed '1,/^EOF/d' < $odir/$0 > $dir/sendmsg.c 40 mycc -o sendmsg -Wall -Wextra -O0 -g sendmsg.c || exit 1 41 rm -f sendmsg.c 47 /tmp/sendmsg 2>/dev/null 52 rm -f /tmp/sendmsg sendmsg.core 55 while pgrep -q sendmsg; d [all...] |
H A D | datagram2.sh | 90 len = sendmsg(sockfd, &mh, 0); 92 err(1, "sendmsg");
|
H A D | overflow3.sh | 79 if (sendmsg(sv[0], &hdr, 0) != 1) 80 err(1, "sendmsg");
|
H A D | socketpair.sh | 84 return sendmsg(unix_fd, &msgh, 0);
|
H A D | datagram3.sh | 91 len = sendmsg(sockfd, &mh, 0); 93 err(1, "sendmsg");
|
H A D | sendmsg2.sh | 91 ret = sendmsg(sv[0], &msg, 0); 92 if (ret == -1) { perror("sendmsg"); exit(1); } 110 if (ret == -1) { perror("sendmsg"); exit(1); }
|
/freebsd-current/tests/sys/netinet/ |
H A D | udp_io.c | 81 ATF_REQUIRE(sendmsg(s[1], &msg, 0) == sizeof(sbuf)); 116 ATF_REQUIRE(sendmsg(s[1], &msg, 0) == sizeof(sbuf));
|
/freebsd-current/crypto/heimdal/lib/roken/ |
H A D | sendmsg.c | 41 sendmsg(rk_socket_t s, const struct msghdr *msg, int flags) function 104 * Implementation of sendmsg() for WIN32 132 WSAMSG which is a much more direct analogue to sendmsg(). */
|
/freebsd-current/tools/regression/sockets/unix_cmsg/ |
H A D | t_cmsg_len.c | 81 if (sendmsg(fd, &msghdr, 0) < 0) { 82 uc_dbgmsg("sendmsg(2) failed: %s; retrying",
|
/freebsd-current/tools/regression/capsicum/syscalls/ |
H A D | misc.c | 76 if (sendmsg(sock, &msg, 0) == -1)
|
/freebsd-current/lib/libsys/ |
H A D | interposing_table.c | 56 SLOT(sendmsg, __sys_sendmsg),
|
/freebsd-current/contrib/pf/pflogd/ |
H A D | privsep_fdpass.c | 81 if ((n = sendmsg(sock, &msg, 0)) == -1) 82 warn("%s: sendmsg(%d)", __func__, sock); 84 warnx("%s: sendmsg: expected sent 1 got %ld",
|
/freebsd-current/tools/tools/net80211/w00t/redir/ |
H A D | buddy.c | 94 if (sendmsg(dude, &mh, 0) != (4 + len))
|
/freebsd-current/contrib/wpa/src/l2_packet/ |
H A D | l2_packet_privsep.c | 46 if (sendmsg(l2->fd, &msg, 0) < 0) { 47 wpa_printf(MSG_ERROR, "L2: sendmsg(cmd): %s", strerror(errno)); 84 if (sendmsg(l2->fd, &msg, 0) < 0) { 85 wpa_printf(MSG_ERROR, "L2: sendmsg(packet_send): %s",
|
/freebsd-current/crypto/openssl/include/internal/ |
H A D | ktls.h | 113 return sendmsg(fd, &msg, 0); 282 * The TLS_TX socket option changes the send/sendmsg handlers of the TCP socket. 330 return sendmsg(fd, &msg, 0);
|
/freebsd-current/tests/sys/kern/ |
H A D | unix_passfd_test.c | 178 return (sendmsg(sockfd, &msghdr, 0)); 190 "sendmsg: %zd bytes sent; expected %zu; %s", len, sizeof(ch), 469 ATF_REQUIRE(sendmsg(fd[0], &msghdr, 0) == -1); 475 ATF_REQUIRE(sendmsg(fd[0], &msghdr, 0) == 1); 488 ATF_REQUIRE(sendmsg(fd[0], &msghdr, 0) == 1); 537 "sendmsg: %zd bytes sent, errno %d", len, errno); 540 "sendmsg: %zd bytes sent, errno %d", len, errno); 657 ATF_REQUIRE_MSG(len != -1 , "sendmsg failed: %s", strerror(errno)); 660 "sendmsg: %zd bytes sent, expected < %lu", len, sendspace); 664 * sendmsg( [all...] |
/freebsd-current/contrib/wpa/src/crypto/ |
H A D | crypto_linux.c | 473 ret = sendmsg(skcipher->t, &msg, 0); 475 wpa_printf(MSG_ERROR, "%s: sendmsg failed: %s", 575 ret = sendmsg(skcipher->t, &msg, 0); 577 wpa_printf(MSG_ERROR, "%s: sendmsg failed: %s", 648 ret = sendmsg(skcipher->t, &msg, 0); 650 wpa_printf(MSG_ERROR, "%s: sendmsg failed: %s", 717 ret = sendmsg(skcipher->t, &msg, 0); 719 wpa_printf(MSG_ERROR, "%s: sendmsg failed: %s", 826 ret = sendmsg(skcipher->t, &msg, 0); 828 wpa_printf(MSG_ERROR, "%s: sendmsg faile [all...] |
/freebsd-current/contrib/netbsd-tests/net/fdpass/ |
H A D | fdpass.c | 81 while ((n = sendmsg(sock, &msg, 0)) == -1 && 87 err(1, "%s: sendmsg(%d)", __func__, fd); 93 errx(1, "%s: sendmsg: expected sent 1 got %ld",
|
/freebsd-current/contrib/netbsd-tests/lib/libc/sys/ |
H A D | t_kevent.c | 143 if (sendmsg(s[0], &m, 0) == -1) {
|
/freebsd-current/contrib/openbsm/bin/auditdistd/ |
H A D | proto_common.c | 85 if (sendmsg(sock, &msg, 0) == -1)
|
/freebsd-current/crypto/openssh/ |
H A D | monitor_fdpass.c | 90 while ((n = sendmsg(sock, &msg, 0)) == -1 && 92 debug3_f("sendmsg(%d): %s", fd, strerror(errno)); 96 error_f("sendmsg(%d): %s", fd, strerror(errno)); 101 error_f("sendmsg: expected sent 1 got %zd", n);
|
/freebsd-current/contrib/mandoc/ |
H A D | catman.c | 105 * It appears that on some systems, sendmsg(3) 113 if ((sz = sendmsg(fd, &msg, 0)) != -1 || 146 warn("sendmsg");
|
/freebsd-current/usr.bin/finger/ |
H A D | net.c | 143 if (sendmsg(s, &msg, 0) < 0) { 144 warn("sendmsg");
|
/freebsd-current/tools/regression/security/cap_test/ |
H A D | cap_test_capmode.c | 132 CHECK_NOT_CAPMODE(sendmsg, fd_socket, NULL, 0);
|