/freebsd/contrib/libpcap/ |
H A D | rpcap-protocol.c | 85 char sendbuf[RPCAP_NETBUF_SIZE]; /* temporary buffer in which data to be sent is buffered */ in rpcap_senderror() local 94 rpcap_createhdr((struct rpcap_header *) sendbuf, ver, RPCAP_MSG_ERROR, errcode, length); in rpcap_senderror() 100 if (sock_bufferize(error, length, sendbuf, &sendbufidx, in rpcap_senderror() 104 if (sock_send(sock, ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) < 0) in rpcap_senderror()
|
H A D | pcap-rpcap.c | 1234 rpcap_createhdr((struct rpcap_header *) sendbuf, in pcap_startcapture_remote() 1571 filter = (struct rpcap_filter *) sendbuf; in pcap_pack_bpffilter() 1637 rpcap_createhdr((struct rpcap_header *) sendbuf, in pcap_updatefilter_remote() 1894 rpcap_createhdr((struct rpcap_header *) sendbuf, in pcap_setsampling_remote() 1899 sampling_pars = (struct rpcap_sampling *) &sendbuf[sendbufidx]; in pcap_setsampling_remote() 2035 rpcap_createhdr((struct rpcap_header *) sendbuf, 0, in rpcap_doauth() 2038 rpauth = (struct rpcap_auth *) &sendbuf[sendbufidx]; in rpcap_doauth() 2055 if (sock_bufferize(auth->username, rpauth->slen1, sendbuf, in rpcap_doauth() 2064 if (sock_bufferize(auth->password, rpauth->slen2, sendbuf, in rpcap_doauth() 2072 if (sock_send(sockctrl, ssl, sendbuf, sendbufidx, errbuf, in rpcap_doauth() [all …]
|
/freebsd/contrib/libpcap/rpcapd/ |
H A D | daemon.c | 1364 rpcap_createhdr((struct rpcap_header *) sendbuf, 0, in daemon_msg_auth_req() 1705 rpcap_createhdr((struct rpcap_header *) sendbuf, ver, in daemon_msg_findallif_req() 1769 if (sock_bufferize(d->name, lname, sendbuf, &sendbufidx, in daemon_msg_findallif_req() 1903 rpcap_createhdr((struct rpcap_header *) sendbuf, ver, in daemon_msg_open_req() 2151 rpcap_createhdr((struct rpcap_header *) sendbuf, ver, in daemon_msg_startcap_req() 2551 rpcap_createhdr((struct rpcap_header *) sendbuf, ver, in daemon_msg_stats_req() 2554 netstats = (struct rpcap_stats *) &sendbuf[sendbufidx]; in daemon_msg_stats_req() 2668 sendbuf = (char *) malloc (sendbufsize); in daemon_thrdatamain() 2669 if (sendbuf == NULL) in daemon_thrdatamain() 2723 rpcap_createhdr((struct rpcap_header *) sendbuf, in daemon_thrdatamain() [all …]
|
/freebsd/tests/sys/netinet/ |
H A D | udp_dontroute.c | 59 const char* sendbuf = "Hello, World!"; in main() local 115 ret = sendto(s, sendbuf, strlen(sendbuf), 0, (struct sockaddr*)&dst, in main()
|
/freebsd/usr.sbin/bluetooth/btpand/ |
H A D | channel.c | 88 chan->sendbuf = malloc(chan->mtu); in channel_open() 89 if (chan->sendbuf == NULL) { in channel_open() 160 free(chan->sendbuf); in channel_free()
|
H A D | bnep.c | 649 p = chan->sendbuf; in bnep_send() 681 if (p + eh->len > chan->sendbuf + chan->mtu) in bnep_send() 693 iov[0].iov_base = chan->sendbuf; in bnep_send() 694 iov[0].iov_len = (p - chan->sendbuf); in bnep_send()
|
H A D | btpand.h | 103 uint8_t * sendbuf; member
|
/freebsd/contrib/ldns/ |
H A D | net.c | 684 uint8_t *sendbuf; local 688 sendbuf = LDNS_XMALLOC(uint8_t, ldns_buffer_position(qbin) + 2); 689 if(!sendbuf) return 0; 690 ldns_write_uint16(sendbuf, ldns_buffer_position(qbin)); 691 memcpy(sendbuf + 2, ldns_buffer_begin(qbin), ldns_buffer_position(qbin)); 693 bytes = sendto(sockfd, (void*)sendbuf, 696 LDNS_FREE(sendbuf);
|
/freebsd/tests/sys/kern/ |
H A D | unix_seqpacket_test.c | 1149 char *sendbuf; member 1181 ATF_REQUIRE(send(params->sock, ¶ms->sendbuf[off], len, in sending_thread() 1206 ATF_REQUIRE((params.sendbuf = malloc(RANDOM_TESTSIZE)) != NULL); in ATF_TC_BODY() 1208 ((long *)params.sendbuf)[i] = nrand48(¶ms.seed[0]); in ATF_TC_BODY() 1268 ATF_REQUIRE_MSG(0 == memcmp(params.sendbuf + off, recvbuf, len), in ATF_TC_BODY() 1280 free(params.sendbuf); in ATF_TC_BODY()
|
/freebsd/tests/sys/audit/ |
H A D | network.c | 50 static struct msghdr sendbuf, recvbuf; variable 858 init_msghdr(&sendbuf, &io1, &server); in ATF_TC_BODY() 865 ATF_REQUIRE((data_bytes = sendmsg(sockfd2, &sendbuf, 0)) != -1); in ATF_TC_BODY() 920 init_msghdr(&sendbuf, &io1, &server); in ATF_TC_BODY() 929 ATF_REQUIRE(sendmsg(sockfd2, &sendbuf, 0) != -1); in ATF_TC_BODY()
|