/freebsd-11-stable/lib/libc/net/ |
H A D | rcmdsh.c | 69 static char hbuf[NI_MAXHOST]; local 96 strncpy(hbuf, res->ai_canonname, sizeof(hbuf) - 1); 97 hbuf[sizeof(hbuf) - 1] = '\0'; 98 *ahost = hbuf;
|
/freebsd-11-stable/contrib/sendmail/src/ |
H A D | sasl.c | 249 char hbuf[NI_MAXHOST], pbuf[NI_MAXSERV]; local 267 hbuf, sizeof(hbuf), pbuf, sizeof(pbuf), niflags) != 0) 275 if (sm_strlcpy(hbuf, inet_ntoa(addr->sin.sin_addr), sizeof(hbuf)) 276 >= sizeof(hbuf)) 284 if (outlen < strlen(hbuf) + strlen(pbuf) + 2) 289 sm_snprintf(out, outlen, "%s;%s", hbuf, pbuf);
|
H A D | daemon.c | 119 ** host_map_lookup(map, hbuf, avp, pstat) 120 ** Convert the entry in hbuf into a canonical form. 3543 static char hbuf[MAXNAME + MAXAUTHINFO + 11]; local 3564 (void) sm_strlcpyn(hbuf, sizeof(hbuf), 2, RealUserName, 3567 sm_dprintf("getauthinfo: %s\n", hbuf); 3568 return hbuf; 3831 (void) sm_strlcpy(hbuf, "IDENT:", sizeof(hbuf)); 3832 cleanstrcpy(&hbuf[ 4061 char hbuf[MAXNAME + 1]; local [all...] |
H A D | headers.c | 201 char hbuf[50]; local 203 (void) expand(fvalue, hbuf, sizeof(hbuf), e); 204 for (p = hbuf; SM_ISSPACE(*p); ) 1121 char hbuf[MAXNAME + 1]; local 1135 name = hbuf; 1136 (void) sm_snprintf(hbuf, sizeof(hbuf), "%.80s", RealHostName); 1139 p = &hbuf[strlen(hbuf)]; [all...] |
H A D | parseaddr.c | 1982 char hbuf[MAXNAME + 1]; local 1995 hbuf[0] = '\0'; 2050 cataddr(hostp, tv - 1, hbuf, sizeof(hbuf), '\0', false); 2066 a->q_host = sm_rpool_strdup_x(e->e_rpool, hbuf); 2067 if (strchr(hbuf, '.') != NULL) 2070 hbuf); 2071 setstat(dsntoexitstat(hbuf)); 2073 else if (isascii(hbuf[0]) && isdigit(hbuf[ [all...] |
/freebsd-11-stable/sys/opencrypto/ |
H A D | gmac.c | 50 uint8_t hbuf[GMAC_BLOCK_LEN]; local 54 rijndaelEncrypt(agc->keysched, agc->rounds, zeros, hbuf); 56 h = gf128_read(hbuf); 60 explicit_bzero(hbuf, sizeof hbuf);
|
/freebsd-11-stable/usr.bin/pr/ |
H A D | pr.c | 188 char *hbuf; local 210 if ((hbuf = malloc((unsigned)(HDBUF + offst)*sizeof(char))) == NULL) { 216 ohbuf = hbuf + offst; 223 (void)memset(hbuf, (int)' ', offst); 263 prhead(hbuf, fname, pagecnt)) 312 free(hbuf); 316 free(hbuf); 348 char *hbuf = NULL; local 369 if ((hbuf = malloc((unsigned)(HDBUF + offst)*sizeof(char))) == NULL) { 373 ohbuf = hbuf 668 char *hbuf; local 821 char *hbuf = NULL; local [all...] |
/freebsd-11-stable/usr.sbin/traceroute6/ |
H A D | traceroute6.c | 360 char hbuf[NI_MAXHOST], src0[NI_MAXHOST], *ep; local 632 if (getnameinfo(res->ai_addr, res->ai_addrlen, hbuf, 633 sizeof(hbuf), NULL, 0, NI_NUMERICHOST) != 0) 634 strlcpy(hbuf, "?", sizeof(hbuf)); 636 "addresses; using %s\n", hostname, hbuf); 906 if (getnameinfo((struct sockaddr *)&Dst, Dst.sin6_len, hbuf, 907 sizeof(hbuf), NULL, 0, NI_NUMERICHOST)) 908 strlcpy(hbuf, "(invalid)", sizeof(hbuf)); 1285 char hbuf[NI_MAXHOST]; local 1509 char hbuf[NI_MAXHOST]; local [all...] |
/freebsd-11-stable/contrib/sendmail/libmilter/ |
H A D | example.c | 52 char hbuf[1024]; local 74 snprintf(hbuf, sizeof hbuf, "%s@%s", p, host); 75 smfi_addheader(ctx, "X-Archived", hbuf);
|
/freebsd-11-stable/usr.sbin/ctld/ |
H A D | discovery.c | 173 char hbuf[NI_MAXHOST], sbuf[NI_MAXSERV]; local 184 hbuf, sizeof(hbuf), sbuf, sizeof(sbuf), 192 if (strcmp(hbuf, "0.0.0.0") == 0) 194 ret = asprintf(&buf, "%s:%s,%d", hbuf, sbuf, 198 if (strcmp(hbuf, "::") == 0) 200 ret = asprintf(&buf, "[%s]:%s,%d", hbuf, sbuf,
|
/freebsd-11-stable/lib/libc/tests/resolv/ |
H A D | resolv_test.c | 96 char portstr[6], buf[1024], hbuf[NI_MAXHOST], pbuf[NI_MAXSERV]; local 110 memset(hbuf, 0, sizeof(hbuf)); 112 getnameinfo(res->ai_addr, res->ai_addrlen, hbuf, sizeof(hbuf), 115 "%p: reverse %s %s\n", self, hbuf, pbuf);
|
/freebsd-11-stable/usr.sbin/config/ |
H A D | mkoptions.c | 293 static char hbuf[MAXPATHLEN]; local 307 (void)strlcpy(hbuf, path(nbuf), sizeof(hbuf)); 308 return (hbuf);
|
/freebsd-11-stable/lib/libfetch/ |
H A D | http.c | 528 http_next_header(conn_t *conn, http_headerbuf_t *hbuf, const char **p) argument 541 if (hbuf->bufsize < conn->buflen + 1) { 542 if ((hbuf->buf = realloc(hbuf->buf, conn->buflen + 1)) == NULL) 544 hbuf->bufsize = conn->buflen + 1; 546 strcpy(hbuf->buf, conn->buf); 547 hbuf->buflen = conn->buflen; 568 len = hbuf->buflen + conn->buflen; 569 if (hbuf->bufsize < len + 1) { 571 if ((hbuf 1544 char hbuf[MAXHOSTNAMELEN + 7], *host; local [all...] |
H A D | common.c | 249 char hbuf[256], sbuf[8]; local 271 len = snprintf(hbuf, sizeof(hbuf), 275 if (len >= (int)sizeof(hbuf)) { 279 host = hbuf;
|
/freebsd-11-stable/lib/libc/resolv/ |
H A D | res_send.c | 1101 char hbuf[NI_MAXHOST]; local 1105 if (getnameinfo(address, alen, hbuf, sizeof(hbuf), 1107 strncpy(hbuf, "?", sizeof(hbuf) - 1); 1108 hbuf[sizeof(hbuf) - 1] = '\0'; 1113 string, hbuf, sbuf, strerror(error));
|
/freebsd-11-stable/usr.sbin/ndp/ |
H A D | ndp.c | 787 static char hbuf[NI_MAXHOST]; local 790 strlcpy(hbuf, ether_ntoa((struct ether_addr *)LLADDR(sdl)), 791 sizeof(hbuf)); 794 snprintf(hbuf, sizeof(hbuf), "%s", link_ntoa(sdl) + n); 796 snprintf(hbuf, sizeof(hbuf), "(incomplete)"); 798 return(hbuf);
|
/freebsd-11-stable/usr.bin/netstat/ |
H A D | inet6.c | 1312 char hbuf[NI_MAXHOST], *cp; local 1336 error = getnameinfo((struct sockaddr *)&sin6, sizeof(sin6), hbuf, 1337 sizeof(hbuf), NULL, 0, flags); 1340 (cp = strchr(hbuf, '.')) && 1343 strlcpy(line, hbuf, sizeof(line));
|
/freebsd-11-stable/contrib/apr/network_io/unix/ |
H A D | sendrecv.c | 820 void * hbuf=NULL, * tbuf=NULL; local 852 hbuf = malloc(parms.header_length); 857 hbuf = apr_palloc(sock->pool, parms.header_length); 861 memcpy((char *)hbuf + ptr, hdtr->headers[i].iov_base, 865 parms.header_data = hbuf; 938 if(hbuf) free(hbuf);
|
/freebsd-11-stable/sys/cddl/contrib/opensolaris/uts/common/zmod/ |
H A D | inflate.c | 32 * - Make hbuf[] unsigned char to match parameter type in inflate.c 394 hbuf[0] = (unsigned char)(word); \ 395 hbuf[1] = (unsigned char)((word) >> 8); \ 396 check = crc32(check, hbuf, 2); \ 401 hbuf[0] = (unsigned char)(word); \ 402 hbuf[1] = (unsigned char)((word) >> 8); \ 403 hbuf[2] = (unsigned char)((word) >> 16); \ 404 hbuf[3] = (unsigned char)((word) >> 24); \ 405 check = crc32(check, hbuf, 4); \ 579 unsigned char hbuf[ local [all...] |
/freebsd-11-stable/libexec/tftpd/ |
H A D | tftpd.c | 349 char hbuf[NI_MAXHOST]; local 355 hbuf, sizeof(hbuf), NULL, 0, 357 asprintf(&tempchroot, "%s/%s", chroot_dir, hbuf);
|
/freebsd-11-stable/usr.sbin/ypldap/ |
H A D | ldapclient.c | 72 char hbuf[NI_MAXHOST], sbuf[NI_MAXSERV]; local 75 if (getnameinfo(sa, sa->sa_len, hbuf, sizeof(hbuf), sbuf, 85 warn("connect to %s port %s (%s) failed", hbuf, sbuf, "tcp");
|
/freebsd-11-stable/crypto/openssh/ |
H A D | kex.c | 996 u_int8_t hbuf[2048], sbuf[2048], obuf[SSH_DIGEST_MAX_LENGTH]; local 1003 if (hlen < (512 / 8) || (u_int)hlen > sizeof(hbuf) || 1006 if (BN_bn2bin(host_modulus, hbuf) <= 0 || 1015 if (ssh_digest_update(hashctx, hbuf, hlen) != 0 || 1026 explicit_bzero(hbuf, sizeof(hbuf));
|
/freebsd-11-stable/contrib/tcsh/ |
H A D | ed.chared.c | 2155 Char *hbuf; local 2167 hbuf = NULL; 2179 hbuf = expand_lex(&hp->Hlex, 0, INT_MAX); 2180 cp = Strend(hbuf); 2181 bp = hbuf; 2201 hbuf = expand_lex(&hp->Hlex, 0, INT_MAX); 2202 cp = Strend(hbuf); 2203 bp = hbuf; 2231 xfree(hbuf); 2235 xfree(hbuf); [all...] |
/freebsd-11-stable/sys/contrib/zlib/ |
H A D | inflate.c | 25 * - Make hbuf[] unsigned char to match parameter type in inflate.c 460 hbuf[0] = (unsigned char)(word); \ 461 hbuf[1] = (unsigned char)((word) >> 8); \ 462 check = crc32(check, hbuf, 2); \ 467 hbuf[0] = (unsigned char)(word); \ 468 hbuf[1] = (unsigned char)((word) >> 8); \ 469 hbuf[2] = (unsigned char)((word) >> 16); \ 470 hbuf[3] = (unsigned char)((word) >> 24); \ 471 check = crc32(check, hbuf, 4); \ 640 unsigned char hbuf[ local [all...] |
/freebsd-11-stable/usr.sbin/rtadvctl/ |
H A D | rtadvctl.c | 885 char hbuf[NI_MAXHOST]; local 903 dname_labeldec(hbuf, sizeof(hbuf), 906 hbuf, sec2str(ltime, ssbuf));
|