| /src/usr.bin/mkuzip/ |
| H A D | mkuz_blockcache.c | 43 struct mkuz_blk_info hit; member 63 if (lseek(fd, bcep->hit.offset, SEEK_SET) < 0) { in verify_match() 106 if (blkcache.first[h].hit.len == 0) { in mkuz_blkcache_regblock() 110 if (bcep->hit.len != bp->info.len) in mkuz_blkcache_regblock() 112 if (memcmp(bp->info.digest, bcep->hit.digest, in mkuz_blkcache_regblock() 122 I2J(bcep->hit.blkno), I2J(bcep->hit.offset), in mkuz_blkcache_regblock() 125 return (&bcep->hit); in mkuz_blkcache_regblock() 144 bcep->hit = bp->info; in mkuz_blkcache_regblock()
|
| /src/contrib/wpa/src/utils/ |
| H A D | radiotap.c | 238 int hit = 0; in ieee80211_radiotap_iterator_next() local 363 hit = 1; in ieee80211_radiotap_iterator_next() 386 hit = 1; in ieee80211_radiotap_iterator_next() 393 if (hit) in ieee80211_radiotap_iterator_next()
|
| /src/contrib/libarchive/libarchive/ |
| H A D | archive_read_support_format_warc.c | 842 const char *hit = xmemmem(buf, bsz, _marker, sizeof(_marker) - 1U); in _warc_find_eoh() local 844 if (hit != NULL) { in _warc_find_eoh() 845 hit += sizeof(_marker) - 1U; in _warc_find_eoh() 847 return hit; in _warc_find_eoh() 854 const char *hit = xmemmem(buf, bsz, _marker, sizeof(_marker) - 1U); in _warc_find_eol() local 856 return hit; in _warc_find_eol()
|
| /src/crypto/openssl/ssl/statem/ |
| H A D | statem_srvr.c | 521 if (s->hit) in ossl_statem_server13_write_transition() 595 } else if (s->hit || s->num_tickets <= s->sent_tickets) { in ossl_statem_server13_write_transition() 664 if (s->hit) { in ossl_statem_server_write_transition() 715 if (s->hit) { in ossl_statem_server_write_transition() 734 if (s->hit) { in ossl_statem_server_write_transition() 933 if (SSL_CONNECTION_IS_DTLS(s) && s->hit) { in ossl_statem_server_post_work() 1002 if (SSL_CONNECTION_IS_DTLS(s) && !s->hit) { in ossl_statem_server_post_work() 1027 if (SSL_CONNECTION_IS_DTLS(s) && s->hit) { in ossl_statem_server_post_work() 1062 if (!s->hit && !send_certificate_request(s)) { in ossl_statem_server_post_work() 1815 s->hit = 0; in tls_early_post_process_client_hello() [all …]
|
| H A D | extensions.c | 537 || (s->hit && (extctx & SSL_EXT_IGNORE_ON_RESUMPTION) != 0)) in extension_is_relevant() 964 if (sent && ret == SSL_TLSEXT_ERR_OK && !s->hit) { in final_server_name() 994 if (!s->hit) { in final_server_name() 1211 if (!s->server && s->hit) { in final_ems() 1287 if (!sent && SSL_CONNECTION_IS_TLS13(s) && !s->hit) { in final_sig_algs() 1335 if (!s->hit) { in final_key_share() 1394 && (!s->hit in final_key_share() 1405 if (!s->hit in final_key_share() 1657 || !s->hit in final_early_data()
|
| H A D | extensions_srvr.c | 140 if (!s->hit || SSL_CONNECTION_IS_TLS13(s)) { in tls_parse_ctos_server_name() 252 if (!s->hit) { in tls_parse_ctos_ec_pt_formats() 294 if ((!s->server || (s->server && !s->hit)) in tls_parse_ctos_sig_algs_cert() 319 if ((!s->server || (s->server && !s->hit)) in tls_parse_ctos_sig_algs() 336 if (s->hit) in tls_parse_ctos_status_request() 844 if (s->hit && (s->ext.psk_kex_mode & TLSEXT_KEX_MODE_FLAG_KE_DHE) == 0) in tls_parse_ctos_key_share() 1230 if (!s->hit || SSL_CONNECTION_IS_TLS13(s)) { in tls_parse_ctos_supported_groups() 1606 if (s->hit && !SSL_CONNECTION_IS_TLS13(s)) in tls_construct_stoc_server_name() 1952 if (!s->hit || !tls13_generate_handshake_secret(s, NULL, 0)) { in tls_construct_stoc_key_share() 1959 if (s->hit && (s->ext.psk_kex_mode & TLSEXT_KEX_MODE_FLAG_KE_DHE) == 0) { in tls_construct_stoc_key_share() [all …]
|
| H A D | statem_clnt.c | 130 if (s->hit) { in ossl_statem_client13_read_transition() 276 if (s->hit) { in ossl_statem_client_read_transition() 301 s->hit = 1; in ossl_statem_client_read_transition() 675 if (s->hit) { in ossl_statem_client_write_transition() 683 if (s->hit) { in ossl_statem_client_write_transition() 752 if (s->hit) { in ossl_statem_client_pre_work() 876 if (SSL_CONNECTION_IS_DTLS(s) && s->hit) { in ossl_statem_client_post_work() 889 if (wst == WORK_MORE_A && SSL_CONNECTION_IS_DTLS(s) && s->hit == 0) { in ossl_statem_client_post_work() 1433 if (s->hit && (s->session->cipher_id != c->id)) { in set_client_ciphersuite() 1596 s->hit = 0; in tls_process_server_hello() [all …]
|
| H A D | extensions_clnt.c | 1411 if (!s->hit) { in tls_parse_stoc_server_name() 1437 if (!s->hit) { in tls_parse_stoc_ec_pt_formats() 1737 if (!s->hit) { in tls_parse_stoc_alpn() 1830 if (!s->hit) in tls_parse_stoc_ems() 1968 if (!s->hit) { in tls_parse_stoc_key_share() 2097 || !s->hit) { in tls_parse_stoc_early_data() 2135 s->hit = 1; in tls_parse_stoc_psk() 2161 s->hit = 1; in tls_parse_stoc_psk()
|
| /src/contrib/arm-optimized-routines/string/arm/ |
| H A D | memchr.S | 109 cbz r2, 40f @ 0 length or hit the end already then not found 129 60: @ We're here because the fast path found a hit - now we have to track down exactly which word … 144 @ r0 currently points to the 3rd byte of the word containing the hit
|
| /src/usr.sbin/rpcbind/ |
| H A D | pmap_svc.c | 147 register struct pmaplist *hit = NULL; in find_service_pmap() local 154 hit = pml; in find_service_pmap() 158 return (hit); in find_service_pmap()
|
| /src/contrib/ldns/ |
| H A D | rdata.c | 538 uint8_t *hit_size, uint8_t** hit, in ldns_rdf_hip_get_alg_hit_pk() argument 544 if (! rdf || ! alg || ! hit || ! hit_size || ! pk || ! pk_size) { in ldns_rdf_hip_get_alg_hit_pk() 555 *hit = data + 4; in ldns_rdf_hip_get_alg_hit_pk() 566 uint8_t hit_size, uint8_t *hit, in ldns_rdf_hip_new_frm_alg_hit_pk() argument 584 memcpy(data + 4, hit, hit_size); in ldns_rdf_hip_new_frm_alg_hit_pk()
|
| H A D | str2host.c | 1579 const char *hit = str == NULL ? NULL : strchr(str, ' '); in ldns_str2rdf_hip() local 1580 const char *pk = hit == NULL ? NULL : strchr(hit + 1, ' '); in ldns_str2rdf_hip() 1581 size_t hit_size = hit == NULL ? 0 in ldns_str2rdf_hip() 1582 : pk == NULL ? strlen(hit + 1) : (size_t) (pk - hit) - 1; in ldns_str2rdf_hip() 1602 hit += 1; in ldns_str2rdf_hip() 1638 for (dp = data + 4; *hit && *hit != ' '; dp++) { in ldns_str2rdf_hip() 1640 if ((hi = ldns_hexdigit_to_int(*hit++)) == -1 || in ldns_str2rdf_hip() 1641 (lo = ldns_hexdigit_to_int(*hit++)) == -1) { in ldns_str2rdf_hip()
|
| /src/contrib/ldns/ldns/ |
| H A D | rdata.h | 453 uint8_t *hit_size, uint8_t** hit, 467 uint8_t hit_size, uint8_t *hit, uint16_t pk_size, uint8_t *pk);
|
| /src/crypto/openssl/doc/man3/ |
| H A D | SSL_CTX_sess_number.pod | 49 successfully reused is counted as a hit. In server mode a session successfully 50 retrieved from internal or external cache is counted as a hit.
|
| /src/sys/fs/nfsserver/ |
| H A D | nfs_nfsdcache.c | 616 int hit, ret = 0; in nfsrc_gettcp() local 624 hit = 1; in nfsrc_gettcp() 656 hit = 0; in nfsrc_gettcp() 666 hit = 0; in nfsrc_gettcp() 677 if (hit) { in nfsrc_gettcp()
|
| /src/contrib/unbound/contrib/ |
| H A D | fastrpz.patch | 214 + * This can hit a qname trigger and be done. */ 810 + * - there was a dispositive hit, be we have not recursed and are required 812 + * - we have a hit and have recursed, but later data such as NSIP could 815 + * @param[out] result describes the hit 816 + * or result->policy=LIBRPZ_POLICY_UNDEFINED without a hit 819 + * when the hit was found 1362 + /* No dispositive hit yet */ 1663 + /* Log the hit on the disabled zone, do not try the zone again, 1664 + * and restore the state from before the check to forget the hit 1672 + /* Complain about and forget client-IP address hit that is not [all …]
|
| /src/crypto/openssl/demos/sslecho/ |
| H A D | A-SSL-Docs.txt | 17 You can just hit carriage returns to accept the default values, except for "Common Name"; you
|
| /src/sys/contrib/openzfs/module/zfs/ |
| H A D | dmu_zfetch.c | 526 goto hit; in dmu_zfetch_prepare() 530 goto hit; in dmu_zfetch_prepare() 563 goto hit; in dmu_zfetch_prepare() 584 hit: in dmu_zfetch_prepare()
|
| /src/crypto/openssl/test/recipes/30-test_evp_data/ |
| H A D | evppbe_scrypt.txt | 40 # NB: this test requires more than 1GB of memory to run so it will hit the
|
| /src/contrib/bc/project/ |
| H A D | issue10.md | 5 I just hit a (small and unlikely to be triggered) problem when using the `-l` flag: 104 …bc (with an alias with -l) often enough to make a quick calculation that I hit it twice and had de…
|
| /src/contrib/tzcode/ |
| H A D | zdump.c | 722 hunt(timezone_t tz, time_t lot, time_t hit, bool only_ok) in hunt() argument 740 int rem_sum = lot % 2 + hit % 2; in hunt() 741 time_t t = (rem_sum == 2) - (rem_sum < 0) + lot / 2 + hit / 2; in hunt() 753 } else hit = t; in hunt() 755 return hit; in hunt()
|
| /src/usr.sbin/rpc.yppasswdd/ |
| H A D | yppasswdd_server.c | 256 int hit = 0; in find_domain() local 287 hit++; in find_domain() 294 if (hit > 1) { in find_domain()
|
| /src/stand/ficl/softwords/ |
| H A D | jhlocal.fr | 59 \ stack locals until we hit a delimiter
|
| /src/tools/tools/shlib-compat/ |
| H A D | shlib-compat.py | 112 self.hit = 0 116 total = self.hit + self.miss 120 ratio = '%f' % (self.hit/float(total)) 122 (name, self.hit, self.miss, ratio) 134 self.stats.hit += 1
|
| /src/contrib/ntp/html/hints/ |
| H A D | solaris.xtra.4095849 | 29 NTP. The only hit you might see is the way kernel precision timminig
|