| /src/crypto/external/apache2/openssl/dist/crypto/bio/ |
| bio_sock.c | 167 DWORD len_out = 0; local 175 &len_out, NULL, NULL) 177 || len_out != sizeof(bio_WSARecvMsg)) 183 &len_out, NULL, NULL) 185 || len_out != sizeof(bio_WSASendMsg))
|
| /src/external/bsd/iscsi/dist/src/lib/ |
| target.c | 692 int len_out = 0; local 760 (int *)(void *)&len_out, 2048, 0, TC_ERROR); 780 "Reject", text_out, &len_out, 2048, 793 text_out, &len_out, 798 text_out, &len_out, 817 if (len_out) { 819 &sess->sess_params.cred, text_out, len_out, 830 text_rsp.length = len_out; 850 if (len_out && iscsi_sock_msg(sess->sock, 1, (unsigned) len_out, 910 int len_out = 0; local [all...] |
| initiator.c | 2068 int len_out = 0; local 2145 PARAM_TEXT_PARSE(l, &sess->sess_params.cred, text_in, len_in, text_out, &len_out, TEXT_RESPONSE_TEXT_LEN, 0, TI_ERROR); 2147 if (len_out) { 2160 PARAM_TEXT_PARSE(l, &sess->sess_params.cred, text_out, len_out, NULL, NULL, TEXT_RESPONSE_TEXT_LEN, 1, TI_ERROR); 2162 iscsi_trace(TRACE_ISCSI_PARAM, "need to send %d bytes response back to target\n", len_out); 2163 text_cmd->length = len_out; 2164 memcpy(text_cmd->text, text_out, (size_t)len_out); 2196 int len_out = 0; local 2236 PARAM_TEXT_PARSE(l, &sess->sess_params.cred, text_in, len_in, text_out, &len_out, LOGIN_RESPONSE_TEXT_LEN, 0, LIR_ERROR); 2237 if (login_rsp.transit && len_out != 0) [all...] |
| /src/external/bsd/libevent/dist/ |
| evdns.c | 3653 size_t len_out; local 3657 len_out = strlen(path)+strlen(hostfile)+1; 3658 path_out = mm_malloc(len_out); 3659 evutil_snprintf(path_out, len_out, "%s%s", path, hostfile);
|
| /src/external/bsd/ntp/dist/sntp/libevent/ |
| evdns.c | 3651 size_t len_out; local 3655 len_out = strlen(path)+strlen(hostfile)+1; 3656 path_out = mm_malloc(len_out); 3657 evutil_snprintf(path_out, len_out, "%s%s", path, hostfile);
|