/netbsd-src/sys/compat/netbsd32/ |
H A D | netbsd32_module.c | 52 size_t req_len; in modctl32_handle_stat() local 72 req_len = 1; in modctl32_handle_stat() 82 req_len += strlen(mi->mi_required) + 1; in modctl32_handle_stat() 89 req_len += strlen(mi->mi_required) + 1; in modctl32_handle_stat() 96 req = kmem_zalloc(req_len, KM_SLEEP); in modctl32_handle_stat() 111 used = strlcpy(req, mi->mi_required, req_len - off); in modctl32_handle_stat() 112 KASSERTMSG(used < req_len - off, "reqlist grew!"); in modctl32_handle_stat() 133 used = strlcpy(req, mi->mi_required, req_len - off); in modctl32_handle_stat() 134 KASSERTMSG(used < req_len - off, "reqlist grew!"); in modctl32_handle_stat() 175 size = uimin(req_len, out_s); in modctl32_handle_stat() [all …]
|
/netbsd-src/sys/kern/ |
H A D | sys_module.c | 121 size_t req_len; in handle_modctl_stat() local 141 req_len = 1; in handle_modctl_stat() 151 req_len += strlen(mi->mi_required) + 1; in handle_modctl_stat() 158 req_len += strlen(mi->mi_required) + 1; in handle_modctl_stat() 165 req = kmem_zalloc(req_len, KM_SLEEP); in handle_modctl_stat() 180 used = strlcpy(req, mi->mi_required, req_len - off); in handle_modctl_stat() 181 KASSERTMSG(used < req_len - off, "reqlist grew!"); in handle_modctl_stat() 202 used = strlcpy(req, mi->mi_required, req_len - off); in handle_modctl_stat() 203 KASSERTMSG(used < req_len - off, "reqlist grew!"); in handle_modctl_stat() 244 size = uimin(req_len, out_s); in handle_modctl_stat() [all …]
|
H A D | uipc_mbuf.c | 957 m_adj(struct mbuf *mp, int req_len) in m_adj() 959 int len = req_len; in m_adj() 981 mp->m_pkthdr.len -= (req_len - len); in m_adj() 954 m_adj(struct mbuf * mp,int req_len) m_adj() argument
|
/netbsd-src/external/mpl/bind/dist/bin/tests/system/tsiggss/ |
H A D | authsock.pl | 54 my ($version, $req_len) = unpack('N N', $buf); 56 if ($version != 1 || $req_len < 17) { 62 $client->recv(my $buf, $req_len - 8, 0); 71 if ($req_len != length($buf)+8) { 72 printf("Length mismatch %u %u\n", $req_len, length($buf)+8);
|
/netbsd-src/external/mpl/dhcp/bind/dist/lib/dns/ |
H A D | ssu_external.c | 132 unsigned int req_len; in dns_ssu_external_match() local 186 req_len = sizeof(uint32_t) + /* Format version */ in dns_ssu_external_match() 197 data = isc_mem_allocate(mctx, req_len); in dns_ssu_external_match() 199 isc_buffer_init(&buf, data, req_len); in dns_ssu_external_match() 201 isc_buffer_putuint32(&buf, req_len); in dns_ssu_external_match() 223 ret = write(fd, data, req_len); in dns_ssu_external_match() 225 if (ret != (ssize_t)req_len) { in dns_ssu_external_match()
|
/netbsd-src/external/mpl/bind/dist/lib/dns/ |
H A D | ssu_external.c | 126 unsigned int req_len; in dns_ssu_external_match() 180 req_len = sizeof(uint32_t) + /* Format version */ in dns_ssu_external_match() 191 data = isc_mem_allocate(mctx, req_len); in dns_ssu_external_match() 193 isc_buffer_init(&buf, data, req_len); in dns_ssu_external_match() 195 isc_buffer_putuint32(&buf, req_len); in dns_ssu_external_match() 217 ret = write(fd, data, req_len); in dns_ssu_external_match() 219 if (ret != (ssize_t)req_len) { in dns_ssu_external_match() 127 unsigned int req_len; dns_ssu_external_match() local
|
/netbsd-src/external/ibm-public/postfix/dist/src/global/ |
H A D | mail_trigger.c | 75 const char *req_buf, ssize_t req_len) in mail_trigger() argument 89 status = fifo_trigger(path, req_buf, req_len, var_trigger_timeout); in mail_trigger() 91 status = LOCAL_TRIGGER(path, req_buf, req_len, var_trigger_timeout); in mail_trigger() 93 status = LOCAL_TRIGGER(path, req_buf, req_len, var_trigger_timeout); in mail_trigger()
|
H A D | haproxy_srvr.c | 699 ssize_t req_len) in convert_v1_proxy_req_to_v2() argument 725 if ((err = haproxy_srvr_parse(req, &req_len, &non_proxy, &smtp_client_addr, in convert_v1_proxy_req_to_v2()
|
/netbsd-src/lib/libradius/ |
H A D | radlib.c | 166 (MD5Len)(h->req_len - POS_ATTRS)); in insert_request_authenticator() 190 (size_t)(h->req_len - POS_ATTRS)); in insert_message_authenticator() 309 h->pass_pos = (int)(h->req_len - padded_len); in put_password_attr() 325 if (h->req_len + 2 + len > MSGSIZE) { in put_raw_attr() 329 h->request[h->req_len++] = type; in put_raw_attr() 330 h->request[h->req_len++] = (unsigned char)(len + 2); in put_raw_attr() 331 (void)memcpy(&h->request[h->req_len], value, len); in put_raw_attr() 332 h->req_len += len; in put_raw_attr() 608 n = sendto(h->fd, h->request, h->req_len, 0, in rad_continue_send_request() 611 if (n != (ssize_t)h->req_len) { in rad_continue_send_request() [all …]
|
H A D | radlib_private.h | 82 size_t req_len; /* Length of request */ member
|
/netbsd-src/sys/arch/atari/dev/ |
H A D | ncr5380.c | 1809 u_long req_len; in scsi_dmaok() local 1821 req_len = reqp->xdata_len; in scsi_dmaok() 1830 if (req_len == 0) in scsi_dmaok() 1840 dm->dm_count = req_len; in scsi_dmaok() 1847 if ((req_len & 0x1) || ((u_int)req_addr & 0x3)) in scsi_dmaok() 1854 while (req_len) { in scsi_dmaok() 1855 if (req_len < in scsi_dmaok() 1857 phy_len = req_len; in scsi_dmaok() 1860 req_len -= phy_len; in scsi_dmaok() 1863 if (req_len) { in scsi_dmaok()
|
/netbsd-src/sys/arch/mac68k/dev/ |
H A D | ncr5380.c | 1769 u_long req_len; in scsi_dmaok() local 1775 req_len = reqp->xdata_len; in scsi_dmaok() 1784 if (req_len == 0) in scsi_dmaok() 1790 if ((req_len & 0x1) || ((u_int)req_addr & 0x3)) in scsi_dmaok() 1797 while (req_len) { in scsi_dmaok() 1798 if (req_len < in scsi_dmaok() 1800 phy_len = req_len; in scsi_dmaok() 1803 req_len -= phy_len; in scsi_dmaok() 1806 if (req_len) { in scsi_dmaok()
|
/netbsd-src/external/bsd/iscsi/dist/src/initiator/ |
H A D | iscsi-initiator.c | 320 int req_len; in targetop() local 348 req_len = length / tv.v[t].blocksize; in targetop() 349 if ((req_len * tv.v[t].blocksize) < length) in targetop() 350 req_len++; in targetop() 352 req_len, tv.v[t].blocksize, (uint8_t *) buf, writing) != 0) { in targetop()
|
/netbsd-src/crypto/external/bsd/openssl/dist/crypto/http/ |
H A D | http_client.c | 276 long req_len = 0; in set1_content() local 310 req_len = ftell(fp); in set1_content() 317 req_len = BIO_ctrl(req, BIO_CTRL_INFO, 0, NULL); in set1_content() 327 req_len > 0) in set1_content() 328 && BIO_printf(rctx->mem, "Content-Length: %ld\r\n", req_len) < 0) in set1_content()
|
/netbsd-src/external/gpl2/texinfo/dist/info/ |
H A D | echo-area.c | 1272 int req_len = strlen (request); in build_completions() local 1275 if (strncmp (request, completions_found[i]->label, req_len) == 0) in build_completions()
|
/netbsd-src/sys/dev/pci/ |
H A D | if_iwm.c | 5356 size_t req_len; in iwm_lmac_scan() 5361 req_len = sizeof(struct iwm_scan_req_lmac) + in iwm_lmac_scan() 5364 if (req_len > IWM_MAX_CMD_PAYLOAD_SIZE) in iwm_lmac_scan() 5366 req = kmem_zalloc(req_len, KM_SLEEP); in iwm_lmac_scan() 5367 hcmd.len[0] = (uint16_t)req_len; in iwm_lmac_scan() 5431 kmem_free(req, req_len); in iwm_lmac_scan() 5444 kmem_free(req, req_len); in iwm_lmac_scan() 5532 size_t req_len; in iwm_umac_scan() 5537 req_len = sizeof(struct iwm_scan_req_umac) + in iwm_umac_scan() 5541 if (req_len > IWM_MAX_CMD_PAYLOAD_SIZ in iwm_umac_scan() 5355 size_t req_len; iwm_lmac_scan() local 5531 size_t req_len; iwm_umac_scan() local [all...] |
/netbsd-src/external/bsd/wpa/dist/src/tls/ |
H A D | tlsv1_server_read.c | 50 const u8 *req, size_t req_len) in tls_process_status_request_item() argument 56 end = req + req_len; in tls_process_status_request_item()
|