/dports/security/tor/tor-0.4.6.8/src/lib/crypt_ops/ |
H A D | crypto_cipher.c | 94 tor_assert(fromlen); in crypto_cipher_encrypt() 96 tor_assert(fromlen < SIZE_T_CEILING); in crypto_cipher_encrypt() 98 memcpy(to, from, fromlen); in crypto_cipher_encrypt() 99 aes_crypt_inplace(env, to, fromlen); in crypto_cipher_encrypt() 116 memcpy(to, from, fromlen); in crypto_cipher_decrypt() 117 aes_crypt_inplace(env, to, fromlen); in crypto_cipher_decrypt() 145 tor_assert(fromlen < INT_MAX); in crypto_cipher_encrypt_with_iv() 147 if (fromlen < 1) in crypto_cipher_encrypt_with_iv() 149 if (tolen < fromlen + CIPHER_IV_LEN) in crypto_cipher_encrypt_with_iv() 178 tor_assert(fromlen < INT_MAX); in crypto_cipher_decrypt_with_iv() [all …]
|
/dports/security/tor-devel/tor-0.4.7.2-alpha/src/lib/crypt_ops/ |
H A D | crypto_cipher.c | 94 tor_assert(fromlen); in crypto_cipher_encrypt() 96 tor_assert(fromlen < SIZE_T_CEILING); in crypto_cipher_encrypt() 98 memcpy(to, from, fromlen); in crypto_cipher_encrypt() 99 aes_crypt_inplace(env, to, fromlen); in crypto_cipher_encrypt() 116 memcpy(to, from, fromlen); in crypto_cipher_decrypt() 117 aes_crypt_inplace(env, to, fromlen); in crypto_cipher_decrypt() 145 tor_assert(fromlen < INT_MAX); in crypto_cipher_encrypt_with_iv() 147 if (fromlen < 1) in crypto_cipher_encrypt_with_iv() 149 if (tolen < fromlen + CIPHER_IV_LEN) in crypto_cipher_encrypt_with_iv() 178 tor_assert(fromlen < INT_MAX); in crypto_cipher_decrypt_with_iv() [all …]
|
/dports/lang/ruby26/ruby-2.6.9/ext/socket/ |
H A D | unixserver.c | 54 socklen_t fromlen; in unix_accept() local 57 fromlen = (socklen_t)sizeof(struct sockaddr_un); in unix_accept() 59 (struct sockaddr*)&from, &fromlen); in unix_accept() 68 socklen_t fromlen; in unix_accept_nonblock() local 71 fromlen = (socklen_t)sizeof(from); in unix_accept_nonblock() 73 (struct sockaddr *)&from, &fromlen); in unix_accept_nonblock() 99 socklen_t fromlen; in unix_sysaccept() local 102 fromlen = (socklen_t)sizeof(struct sockaddr_un); in unix_sysaccept() 103 return rsock_s_accept(0, fptr->fd, (struct sockaddr*)&from, &fromlen); in unix_sysaccept()
|
/dports/dns/idnkit2/idnkit-2.3/test/overflow/ |
H A D | test_overflow_utf32strncat.c | 201 size_t fromlen = idn__utf32_strlen(from); in main() local 214 if (idn__utf32_strncat(to, tolen, from, fromlen) != idn_success) in main() 222 if (idn__utf32_strncat(to, tolen, from, fromlen + 1) != idn_success) in main() 231 if (idn__utf32_strncat(to, tolen, from, fromlen + 1) in main() 241 if (idn__utf32_strncat(to, tolen, from, fromlen) in main() 251 if (idn__utf32_strncat(to, 1, from, fromlen) != idn_buffer_overflow) in main() 261 if (idn__utf32_strncat(to, tolen, from, fromlen) in main() 269 if (idn__utf32_strncat(to, 0, from, fromlen) != idn_buffer_overflow) in main()
|
H A D | test_overflow_utf32strncpy.c | 201 size_t fromlen = idn__utf32_strlen(from); in main() local 212 if (idn__utf32_strncpy(to, tolen, from, fromlen) != idn_success) in main() 218 if (idn__utf32_strncpy(to, tolen, from, fromlen + 1) != idn_success) in main() 224 if (idn__utf32_strncpy(to, tolen - 1, from, fromlen) in main() 231 if (idn__utf32_strncpy(to, tolen - 1, from, fromlen + 1) in main() 238 if (idn__utf32_strncpy(to, 0, from, fromlen) != idn_buffer_overflow) in main()
|
/dports/x11/wdm/wdm-1.28/src/wdm/ |
H A D | xdmcp.c | 190 int fromlen, in all_query_respond() argument 226 int fromlen, in indirect_respond() argument 381 int fromlen, in direct_query_respond() argument 402 int fromlen, in query_respond() argument 412 int fromlen, in broadcast_respond() argument 510 int fromlen, in forward_respond() argument 614 int fromlen, in send_willing() argument 640 int fromlen, in send_unwilling() argument 682 int fromlen, in request_respond() argument 885 int fromlen, in manage() argument [all …]
|
/dports/net/hostapd/hostapd-2.9/src/common/ |
H A D | ctrl_iface_common.c | 144 socklen_t fromlen, const char *input) in ctrl_iface_attach() argument 150 if (!sockaddr_compare(from, fromlen, in ctrl_iface_attach() 159 os_memcpy(&dst->addr, from, fromlen); in ctrl_iface_attach() 160 dst->addrlen = fromlen; in ctrl_iface_attach() 165 sockaddr_print(MSG_DEBUG, "CTRL_IFACE monitor attached", from, fromlen); in ctrl_iface_attach() 171 socklen_t fromlen) in ctrl_iface_detach() argument 176 if (!sockaddr_compare(from, fromlen, in ctrl_iface_detach() 179 from, fromlen); in ctrl_iface_detach() 191 socklen_t fromlen, const char *level) in ctrl_iface_level() argument 198 if (!sockaddr_compare(from, fromlen, in ctrl_iface_level() [all …]
|
/dports/net/hostapd-devel/hostap-14ab4a816/src/common/ |
H A D | ctrl_iface_common.c | 144 socklen_t fromlen, const char *input) in ctrl_iface_attach() argument 150 if (!sockaddr_compare(from, fromlen, in ctrl_iface_attach() 159 os_memcpy(&dst->addr, from, fromlen); in ctrl_iface_attach() 160 dst->addrlen = fromlen; in ctrl_iface_attach() 165 sockaddr_print(MSG_DEBUG, "CTRL_IFACE monitor attached", from, fromlen); in ctrl_iface_attach() 171 socklen_t fromlen) in ctrl_iface_detach() argument 176 if (!sockaddr_compare(from, fromlen, in ctrl_iface_detach() 179 from, fromlen); in ctrl_iface_detach() 191 socklen_t fromlen, const char *level) in ctrl_iface_level() argument 198 if (!sockaddr_compare(from, fromlen, in ctrl_iface_level() [all …]
|
/dports/security/wpa_supplicant/wpa_supplicant-2.9/src/common/ |
H A D | ctrl_iface_common.c | 144 socklen_t fromlen, const char *input) in ctrl_iface_attach() argument 150 if (!sockaddr_compare(from, fromlen, in ctrl_iface_attach() 159 os_memcpy(&dst->addr, from, fromlen); in ctrl_iface_attach() 160 dst->addrlen = fromlen; in ctrl_iface_attach() 165 sockaddr_print(MSG_DEBUG, "CTRL_IFACE monitor attached", from, fromlen); in ctrl_iface_attach() 171 socklen_t fromlen) in ctrl_iface_detach() argument 176 if (!sockaddr_compare(from, fromlen, in ctrl_iface_detach() 179 from, fromlen); in ctrl_iface_detach() 191 socklen_t fromlen, const char *level) in ctrl_iface_level() argument 198 if (!sockaddr_compare(from, fromlen, in ctrl_iface_level() [all …]
|
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/src/common/ |
H A D | ctrl_iface_common.c | 144 socklen_t fromlen, const char *input) in ctrl_iface_attach() argument 150 if (!sockaddr_compare(from, fromlen, in ctrl_iface_attach() 159 os_memcpy(&dst->addr, from, fromlen); in ctrl_iface_attach() 160 dst->addrlen = fromlen; in ctrl_iface_attach() 165 sockaddr_print(MSG_DEBUG, "CTRL_IFACE monitor attached", from, fromlen); in ctrl_iface_attach() 171 socklen_t fromlen) in ctrl_iface_detach() argument 176 if (!sockaddr_compare(from, fromlen, in ctrl_iface_detach() 179 from, fromlen); in ctrl_iface_detach() 191 socklen_t fromlen, const char *level) in ctrl_iface_level() argument 198 if (!sockaddr_compare(from, fromlen, in ctrl_iface_level() [all …]
|
/dports/net/wpa_supplicant_gui/wpa_supplicant-2.9/src/common/ |
H A D | ctrl_iface_common.c | 144 socklen_t fromlen, const char *input) in ctrl_iface_attach() argument 150 if (!sockaddr_compare(from, fromlen, in ctrl_iface_attach() 159 os_memcpy(&dst->addr, from, fromlen); in ctrl_iface_attach() 160 dst->addrlen = fromlen; in ctrl_iface_attach() 165 sockaddr_print(MSG_DEBUG, "CTRL_IFACE monitor attached", from, fromlen); in ctrl_iface_attach() 171 socklen_t fromlen) in ctrl_iface_detach() argument 176 if (!sockaddr_compare(from, fromlen, in ctrl_iface_detach() 179 from, fromlen); in ctrl_iface_detach() 191 socklen_t fromlen, const char *level) in ctrl_iface_level() argument 198 if (!sockaddr_compare(from, fromlen, in ctrl_iface_level() [all …]
|
/dports/sysutils/vector/vector-0.10.0/cargo-crates/krb5-src-0.2.4+1.18.2/krb5/src/lib/apputils/ |
H A D | udppktinfo.c | 282 struct sockaddr *from, socklen_t * fromlen, in recv_from_to() argument 309 msg.msg_namelen = *fromlen; in recv_from_to() 318 *fromlen = msg.msg_namelen; in recv_from_to() 350 if (fromlen != sizeof(struct sockaddr_in)) in set_msg_from_ip_pktinfo() 371 if (fromlen != sizeof(struct sockaddr_in)) in set_msg_from_ip_sendsrcaddr() 396 if (fromlen != sizeof(struct sockaddr_in6)) in set_msg_from_ipv6_pktinfo() 425 struct sockaddr *from, socklen_t fromlen, in set_msg_from() argument 457 socklen_t fromlen, aux_addressing_info *auxaddr) in send_to_from() argument 503 struct sockaddr *from, socklen_t *fromlen, in recv_from_to() argument 514 return recvfrom(sock, buf, len, flags, from, fromlen); in recv_from_to() [all …]
|
/dports/security/krb5/krb5-1.19.2/src/lib/apputils/ |
H A D | udppktinfo.c | 282 struct sockaddr *from, socklen_t * fromlen, in recv_from_to() argument 309 msg.msg_namelen = *fromlen; in recv_from_to() 318 *fromlen = msg.msg_namelen; in recv_from_to() 350 if (fromlen != sizeof(struct sockaddr_in)) in set_msg_from_ip_pktinfo() 371 if (fromlen != sizeof(struct sockaddr_in)) in set_msg_from_ip_sendsrcaddr() 396 if (fromlen != sizeof(struct sockaddr_in6)) in set_msg_from_ipv6_pktinfo() 425 struct sockaddr *from, socklen_t fromlen, in set_msg_from() argument 457 socklen_t fromlen, aux_addressing_info *auxaddr) in send_to_from() argument 503 struct sockaddr *from, socklen_t *fromlen, in recv_from_to() argument 514 return recvfrom(sock, buf, len, flags, from, fromlen); in recv_from_to() [all …]
|
/dports/x11/xdm/xdm-1.1.12/xdm/ |
H A D | xdmcp.c | 221 int fromlen, in all_query_respond() argument 278 int fromlen, in indirect_respond() argument 442 int fromlen, in direct_query_respond() argument 464 int fromlen, in query_respond() argument 475 int fromlen, in broadcast_respond() argument 695 int fromlen, in forward_respond() argument 843 int fromlen, in send_willing() argument 870 int fromlen, in send_unwilling() argument 913 int fromlen, in request_respond() argument 1111 int fromlen, in manage() argument [all …]
|
/dports/net/socat/socat-1.7.4.2/ |
H A D | xioread.c | 119 socklen_t fromlen = sizeof(from); in xioread() local 124 msgh.msg_namelen = fromlen; in xioread() 141 Recvfrom(pipe->fd, buff, bufsiz, 0, &from.soa, &fromlen); in xioread() 149 fromlen, strerror(errno)); in xioread() 177 if (fromlen != pipe->salen) { in xioread() 221 if (memcmp(&from, &pipe->peersa, fromlen)) { in xioread() 277 if (fromlen != pipe->fd[0].salen) { in xioread() 281 if (memcmp(&from, &pipe->fd[0].peersa.sa, fromlen)) { in xioread() 326 msgh.msg_namelen = fromlen; in xioread() 347 sockaddr_info((struct sockaddr *)&from, fromlen, in xioread() [all …]
|
/dports/security/gnome-ssh-askpass/openssh-6.6p1/ |
H A D | canohost.c | 50 socklen_t fromlen; in get_remote_hostname() local 55 fromlen = sizeof(from); in get_remote_hostname() 57 if (getpeername(sock, (struct sockaddr *)&from, &fromlen) < 0) { in get_remote_hostname() 65 ipv64_normalise_mapped(&from, &fromlen); in get_remote_hostname() 68 fromlen = sizeof(struct sockaddr_in6); in get_remote_hostname() 364 socklen_t fromlen; in get_sock_port() local 369 fromlen = sizeof(from); in get_sock_port() 372 if (getsockname(sock, (struct sockaddr *)&from, &fromlen) < 0) { in get_sock_port() 377 if (getpeername(sock, (struct sockaddr *)&from, &fromlen) < 0) { in get_sock_port() 385 fromlen = sizeof(struct sockaddr_in6); in get_sock_port() [all …]
|
/dports/games/chocolate-doom/chocolate-doom-3.0.1/src/ |
H A D | deh_text.c | 53 int fromlen, tolen; in DEH_TextStart() local 56 if (sscanf(line, "Text %i %i", &fromlen, &tolen) != 2) in DEH_TextStart() 65 if (!deh_allow_long_strings && tolen > TXT_MaxStringLength(fromlen)) in DEH_TextStart() 72 from_text = malloc(fromlen + 1); in DEH_TextStart() 77 for (i=0; i<fromlen; ++i) in DEH_TextStart() 81 from_text[fromlen] = '\0'; in DEH_TextStart()
|
/dports/games/crispy-doom/crispy-doom-crispy-doom-5.10.3/src/ |
H A D | deh_text.c | 56 int fromlen, tolen; in DEH_TextStart() local 59 if (sscanf(line, "Text %i %i", &fromlen, &tolen) != 2) in DEH_TextStart() 68 if (!deh_allow_long_strings && tolen > TXT_MaxStringLength(fromlen)) in DEH_TextStart() 75 from_text = malloc(fromlen + 1); in DEH_TextStart() 80 for (i=0; i<fromlen; ++i) in DEH_TextStart() 84 from_text[fromlen] = '\0'; in DEH_TextStart()
|
/dports/lang/guile2/guile-2.2.7/lib/ |
H A D | recvfrom.c | 33 socklen_t *fromlen) in rpl_recvfrom() argument 44 int frombufsize = (from != NULL ? *fromlen : 0); in rpl_recvfrom() 45 int r = recvfrom (sock, buf, len, flags, from, fromlen); in rpl_recvfrom() 53 else if (from != NULL && *fromlen == frombufsize) in rpl_recvfrom() 54 rpl_getpeername (fd, from, fromlen); in rpl_recvfrom()
|
/dports/lang/guile/guile-3.0.7/lib/ |
H A D | recvfrom.c | 33 socklen_t *fromlen) in rpl_recvfrom() argument 44 int frombufsize = (from != NULL ? *fromlen : 0); in rpl_recvfrom() 45 int r = recvfrom (sock, buf, len, flags, from, fromlen); in rpl_recvfrom() 53 else if (from != NULL && *fromlen == frombufsize) in rpl_recvfrom() 54 rpl_getpeername (fd, from, fromlen); in rpl_recvfrom()
|
/dports/devel/gnulib/gnulib-20140202-stable/lib/ |
H A D | recvfrom.c | 33 socklen_t *fromlen) in rpl_recvfrom() argument 44 int frombufsize = (from != NULL ? *fromlen : 0); in rpl_recvfrom() 45 int r = recvfrom (sock, buf, len, flags, from, fromlen); in rpl_recvfrom() 53 else if (from != NULL && *fromlen == frombufsize) in rpl_recvfrom() 54 rpl_getpeername (fd, from, fromlen); in rpl_recvfrom()
|
/dports/security/gnutls/gnutls-3.6.16/src/gl/ |
H A D | recvfrom.c | 33 socklen_t *fromlen) in rpl_recvfrom() argument 44 int frombufsize = (from != NULL ? *fromlen : 0); in rpl_recvfrom() 45 int r = recvfrom (sock, buf, len, flags, from, fromlen); in rpl_recvfrom() 53 else if (from != NULL && *fromlen == frombufsize) in rpl_recvfrom() 54 rpl_getpeername (fd, from, fromlen); in rpl_recvfrom()
|
/dports/lang/clisp/clisp-df3b9f6fdcff22832898e89a989eb499c0f842ed/src/gllib/ |
H A D | recvfrom.c | 33 socklen_t *fromlen) in rpl_recvfrom() argument 44 int frombufsize = (from != NULL ? *fromlen : 0); in rpl_recvfrom() 45 int r = recvfrom (sock, buf, len, flags, from, fromlen); in rpl_recvfrom() 53 else if (from != NULL && *fromlen == frombufsize) in rpl_recvfrom() 54 rpl_getpeername (fd, from, fromlen); in rpl_recvfrom()
|
/dports/security/shishi/shishi-1.0.2/gl/ |
H A D | recvfrom.c | 33 socklen_t *fromlen) in rpl_recvfrom() argument 44 int frombufsize = (from != NULL ? *fromlen : 0); in rpl_recvfrom() 45 int r = recvfrom (sock, buf, len, flags, from, fromlen); in rpl_recvfrom() 53 else if (from != NULL && *fromlen == frombufsize) in rpl_recvfrom() 54 rpl_getpeername (fd, from, fromlen); in rpl_recvfrom()
|
/dports/security/pkcs11-tools/pkcs11-tools-2.5.0/.gnulib/lib/ |
H A D | recvfrom.c | 33 socklen_t *fromlen) in rpl_recvfrom() argument 44 int frombufsize = (from != NULL ? *fromlen : 0); in rpl_recvfrom() 45 int r = recvfrom (sock, buf, len, flags, from, fromlen); in rpl_recvfrom() 53 else if (from != NULL && *fromlen == frombufsize) in rpl_recvfrom() 54 rpl_getpeername (fd, from, fromlen); in rpl_recvfrom()
|