Lines Matching full:sizeof
242 size=sizeof(int);
302 ret=(struct hostent *)OPENSSL_malloc(sizeof(struct hostent));
304 memset(ret,0,sizeof(struct hostent));
309 ret->h_aliases = (char **)OPENSSL_malloc(i*sizeof(char *));
312 memset(ret->h_aliases, 0, i*sizeof(char *));
317 ret->h_addr_list=(char **)OPENSSL_malloc(i*sizeof(char *));
320 memset(ret->h_addr_list, 0, i*sizeof(char *));
481 memset(&wsa_state,0,sizeof(wsa_state));
662 memset(&hint,0,sizeof(hint));
680 addrlen = res->ai_addrlen<=sizeof(server) ?
682 sizeof(server);
692 memset((char *)&server,0,sizeof(server));
695 addrlen = sizeof(server.sa_in);
725 ret=setsockopt(s,SOL_SOCKET,SO_REUSEADDR,(char *)&i,sizeof(i));
749 memset(&client.sa_in6.sin6_addr,0,sizeof(client.sa_in6.sin6_addr));
815 * sizeof(int) != sizeof(size_t). But would it work? Note that
840 sa.len.i=sizeof(sa.from);
841 memset(&sa.from,0,sizeof(sa.from));
843 if (sizeof(sa.len.i)!=sizeof(sa.len.s) && sa.len.i==0)
845 OPENSSL_assert(sa.len.s<=sizeof(sa.from));
880 if ((*p_getnameinfo.f)(&sa.from.sa,sa.len.i,h,sizeof(h),s,sizeof(s),
932 ret=setsockopt(s,opt,TCP_NODELAY,(char *)&on,sizeof(on));