| /src/lib/libwrap/ |
| fix_options.c | 57 socklen_t sslen; local 63 sslen = sizeof(ss); 64 if (getsockname(fd, (struct sockaddr *)(void *)&ss, &sslen) < 0) {
|
| /src/external/gpl3/gcc/dist/libgfortran/intrinsics/ |
| string_intrinsics_inc.c | 254 gfc_charlen_type sslen, const CHARTYPE *sstr, 259 if (sslen == 0) 262 if (sslen > slen) 267 last = slen + 1 - sslen; 274 start = slen - sslen; 280 for (i = 0; i < sslen; i++) 285 if (i == sslen)
|
| /src/external/gpl3/gcc.old/dist/libgfortran/intrinsics/ |
| string_intrinsics_inc.c | 254 gfc_charlen_type sslen, const CHARTYPE *sstr, 259 if (sslen == 0) 262 if (sslen > slen) 267 last = slen + 1 - sslen; 274 start = slen - sslen; 280 for (i = 0; i < sslen; i++) 285 if (i == sslen)
|
| /src/crypto/external/bsd/openssl/dist/test/ |
| tls-provider.c | 336 unsigned char *ss, size_t *sslen) 354 if (ctlen == NULL && sslen == NULL) 358 if (sslen != NULL) 359 *sslen = XOR_KEY_SIZE; 380 || !xor_derive(derivectx, ss, sslen, XOR_KEY_SIZE)) 393 unsigned char *ss, size_t *sslen, 409 if (sslen == NULL) 411 *sslen = XOR_KEY_SIZE; 427 || !xor_derive(derivectx, ss, sslen, XOR_KEY_SIZE))
|
| ectest.c | 2711 size_t sslen, t; local 2877 || !TEST_int_eq(EVP_PKEY_derive(pctx1, NULL, &sslen), 1) 2878 || !TEST_int_gt(bsize, sslen) 2879 || !TEST_int_eq(EVP_PKEY_derive(pctx1, buf1, &sslen), 1)) 2886 || !TEST_int_le(sslen, t) 2891 if (!TEST_mem_eq(buf1, sslen, buf2, t)) 2936 || !TEST_int_le(sslen, t) 2939 || !TEST_mem_eq(buf1, t, buf2, sslen))
|
| /src/external/bsd/tmux/dist/ |
| client.c | 454 size_t sslen; local 488 sslen = strlen(*ss) + 1; 489 if (sslen > MAX_IMSGSIZE - IMSG_HEADER_SIZE) 491 proc_send(client_peer, MSG_IDENTIFY_ENVIRON, -1, *ss, sslen);
|
| /src/lib/libskey/ |
| skeylogin.c | 80 int skeychallenge(struct skey *mp, const char *name, char *ss, size_t sslen) 91 snprintf(ss, sslen, OTP_FMT, SKEY_MAX_HASHNAME_LEN,
|
| /src/crypto/external/apache2/openssl/dist/test/ |
| tls-provider.c | 562 unsigned char *ss, size_t *sslen) 580 if (ctlen == NULL && sslen == NULL) 584 if (sslen != NULL) 585 *sslen = XOR_KEY_SIZE; 606 || !xor_derive(derivectx, ss, sslen, XOR_KEY_SIZE)) 619 unsigned char *ss, size_t *sslen, 635 if (sslen == NULL) 637 *sslen = XOR_KEY_SIZE; 653 || !xor_derive(derivectx, ss, sslen, XOR_KEY_SIZE))
|
| ectest.c | 3205 size_t sslen, t; local 3379 || !TEST_int_eq(EVP_PKEY_derive(pctx1, NULL, &sslen), 1) 3380 || !TEST_int_gt(bsize, sslen) 3381 || !TEST_int_eq(EVP_PKEY_derive(pctx1, buf1, &sslen), 1)) 3388 || !TEST_int_le(sslen, t) 3393 if (!TEST_mem_eq(buf1, sslen, buf2, t)) 3441 || !TEST_int_le(sslen, t) 3444 || !TEST_mem_eq(buf1, t, buf2, sslen))
|
| /src/usr.bin/rlogin/ |
| rlogin.c | 283 socklen_t sslen = sizeof(ss); local 284 if (getsockname(rem, (struct sockaddr *)&ss, &sslen) == 0
|
| /src/usr.sbin/inetd/ |
| inetd.c | 1173 socklen_t sslen = (*tolen < ss.ss_len) ? *tolen : ss.ss_len; local 1174 if (sslen > 0) 1175 memcpy(to, &ss, sslen); 1176 *tolen = sslen;
|