| /src/crypto/external/bsd/heimdal/dist/lib/krb5/ |
| sock_principal.c | 48 socklen_t salen = sizeof(__ss); local 51 if (getsockname (sock, sa, &salen) < 0) { 56 ret = getnameinfo (sa, salen, hostname, sizeof(hostname), NULL, 0, 0);
|
| /src/external/mit/libuv/dist/src/unix/ |
| getnameinfo.c | 34 socklen_t salen; local 39 salen = sizeof(struct sockaddr_in); 41 salen = sizeof(struct sockaddr_in6); 46 salen,
|
| /src/lib/libc/rpc/ |
| bindresvport.c | 90 socklen_t salen; local 94 salen = sizeof(myaddr); 97 if (getsockname(sd, sa, &salen) == -1) 101 memset(sa, 0, salen); 111 salen = sizeof(struct sockaddr_in); 120 salen = sizeof(struct sockaddr_in6); 129 sa->sa_len = salen; 143 error = bind(sd, sa, salen); 157 if (getsockname(sd, sa, &salen) < 0)
|
| /src/tests/net/can/ |
| h_canutils.c | 97 socklen_t salen; local 120 salen = sizeof(struct sockaddr_can); 122 0, (struct sockaddr *)sa, &salen)) < 0) { 128 ATF_CHECK_MSG(salen == sizeof(struct sockaddr_can), 129 "recvfrom provided wrong size %d (!= %zu)", salen, sizeof(sa));
|
| t_can.c | 610 socklen_t salen; local 671 salen = sizeof(sa); 677 (struct sockaddr *)&sa, &salen)) < 0) { 688 ATF_CHECK_MSG(salen == sizeof(sa), 690 salen, sizeof(sa)); 699 (struct sockaddr *)&sa, &salen)) < 0) { 710 ATF_CHECK_MSG(salen == sizeof(sa), 712 salen, sizeof(sa));
|
| /src/lib/libwrap/ |
| rfc931.c | 92 volatile int salen; local 103 salen = sizeof(struct sockaddr_in); 108 salen = sizeof(struct sockaddr_in6); 160 memcpy(&our_query_sin, our_sin, salen); 173 memcpy(&rmt_query_sin, rmt_sin, salen); 188 salen) >= 0 && 190 salen) >= 0) {
|
| /src/crypto/external/bsd/heimdal/dist/kdc/ |
| kdc-replay.c | 123 krb5_socklen_t salen = sizeof(sa); local 155 &salen, 88);
|
| /src/lib/libutil/ |
| sockaddr_snprintf.c | 66 # define SALEN(sa) ((sa)->sa ## _len) 68 # define SALEN(sa) ((unsigned)sizeof(*sa)) 80 SALEN(sat), sat->sat_family, sat->sat_port, 93 SALEN(sin), sin->sin_family, sin->sin_port, 106 SALEN(sin6), sin6->sin6_family, sin6->sin6_port, 116 SALEN(sun), sun->sun_family, (int)sizeof(sun->sun_path), 129 SALEN(sdl), sdl->sdl_family, sdl->sdl_index, 145 size_t salen; local 171 salen = sizeof(*sat); 180 salen = sizeof(*sun) [all...] |
| /src/tests/net/tcp/ |
| t_tcp_connect_port.c | 198 socklen_t salen; local 223 salen = sizeof(su_srvr); 224 error = getsockname(lsock, &su_srvr.saddr, &salen); 228 ATF_REQUIRE_MSG(salen == (domain == PF_INET ? 254 salen = sizeof(su_clnt); 255 error = getsockname(csock, &su_clnt.saddr, &salen); 259 ATF_REQUIRE_MSG(salen == (domain == PF_INET ?
|
| /src/external/bsd/openldap/dist/libraries/libldap/ |
| os-local.c | 191 ber_socklen_t salen = sizeof(*sa); local 230 getpeername( s, (struct sockaddr *) sa, &salen ); 232 write( fds[1], sa, salen );
|
| /src/lib/libc/net/ |
| rcmd.c | 520 socklen_t salen; local 533 salen = sizeof(struct sockaddr_in); 544 salen = sizeof(struct sockaddr_in6); 580 if (bind(s, sa, salen) >= 0) 769 __ivaliduser_sa(FILE *hostf, const struct sockaddr *raddr, socklen_t salen, 826 rhost = __gethostloop(raddr, salen); 837 hostok = __icheckhost(raddr, salen, &ahost[1]); 848 rhost = __gethostloop(raddr, salen); 860 -__icheckhost(raddr, salen, &ahost[1]); 864 hostok = __icheckhost(raddr, salen, ahost) [all...] |
| /src/external/ibm-public/postfix/dist/src/smtp/ |
| smtp_connect.c | 185 SOCKADDR_SIZE salen = sizeof(ss); local 200 if (dns_rr_to_sa(addr, port, sa, &salen) != 0) { 306 return (smtp_connect_sock(sock, sa, salen, iter, why, sess_flags)); 312 int salen, 328 conn_stat = timed_connect(sock, sa, salen, var_smtp_conn_tmout); 333 conn_stat = sane_connect(sock, sa, salen);
|
| /src/external/ibm-public/postfix/dist/src/xsasl/ |
| xsasl_dovecot_server.c | 431 SOCKADDR_SIZE salen; local 470 salen = sizeof(ss); 471 if (getsockname(vstream_fileno(args->stream), sa, &salen) < 0 472 || sockaddr_to_hostaddr(sa, salen, &server_addr, 0, 0) != 0)
|
| /src/sys/kern/ |
| uipc_socket2.c | 1100 const int salen = asa->sa_len; local 1110 if (salen > MHLEN) { 1111 MEXTMALLOC(m, salen, M_NOWAIT); 1118 KASSERT(salen <= MHLEN); 1120 m->m_len = salen; 1121 memcpy(mtod(m, void *), asa, salen); local 1123 m->m_pkthdr.len = salen + m0->m_pkthdr.len;
|
| /src/sys/net/ |
| if_gre.c | 1123 socklen_t anylen, salen; local 1127 (addr = sockaddr_const_addr(sa, &salen)) == NULL) 1130 if (salen > anylen) 1133 return memcmp(anyaddr, addr, MIN(anylen, salen)) == 0;
|
| /src/crypto/dist/ipsec-tools/src/libipsec/ |
| pfkey.c | 2296 u_int salen = sysdep_sa_len(local); local 2304 len = sizeof(struct sadb_x_kmaddress) + PFKEY_ALIGN8(2*salen); 2314 memcpy(sa, local, salen); 2315 sa = (struct sockaddr *)((char *)sa + salen); 2316 memcpy(sa, remote, salen);
|
| /src/external/bsd/dhcpcd/dist/src/ |
| privsep-root.c | 381 socklen_t salen; local 400 len += ALIGN(sizeof(salen) * IFA_NADDRS); 436 buf += ALIGN(sizeof(salen) * IFA_NADDRS); 441 salen = sa_len((addr)); \ 443 salen = 0; \ 444 if (salen != 0) { \ 445 memcpy(sap, &salen, sizeof(salen)); \ 446 memcpy(buf, (addr), salen); \ 447 buf += ALIGN(salen); \ 1096 socklen_t salen; local [all...] |
| if-bsd.c | 1597 size_t salen = (size_t)RT_ROUNDUP(sa->sa_len); local 1598 size_t newlen = ctx->rt_missfilterlen + salen; 1599 size_t diff = salen - (sa->sa_len); 1621 ctx->rt_missfilterlen += salen;
|
| /src/external/bsd/openldap/dist/servers/slapd/back-ldap/ |
| monitor.c | 412 socklen_t salen = sizeof(sa); local 428 getpeername( socket, (struct sockaddr *)&sa, &salen );
|
| /src/usr.sbin/syslogd/ |
| tls.c | 2028 socklen_t salen; local 2053 salen = sizeof(struct sockaddr_in); 2059 salen = sizeof(struct sockaddr_in6); 2063 if (getnameinfo(ifa->ifa_addr, salen, ip, sizeof(ip),
|
| /src/crypto/external/bsd/heimdal/dist/lib/roken/ |
| getifaddrs.c | 927 size_t salen; local 933 salen = sizeof(struct sockaddr); 935 salen = sa->sa_len; 939 salen = SA_LEN(sa); 963 (*end)->ifa_addr = malloc(salen); 968 memcpy((*end)->ifa_addr, sa, salen); 1073 size_t salen; local 1079 salen = sizeof(struct sockaddr_storage); 1081 salen = sa->sa_len; 1085 salen = SA_LEN(sa) [all...] |
| /src/external/ibm-public/postfix/dist/src/posttls-finger/ |
| posttls-finger.c | 1032 static VSTREAM *connect_sock(int sock, struct sockaddr *sa, int salen, 1042 conn_stat = timed_connect(sock, sa, salen, conn_tmout); 1047 conn_stat = sane_connect(sock, sa, salen); 1143 SOCKADDR_SIZE salen = sizeof(ss); local 1152 if (dns_rr_to_sa(addr, state->port, sa, &salen) != 0) { 1171 SOCKADDR_TO_HOSTADDR(sa, salen, &hostaddr, (MAI_SERVPORT_STR *) 0, 0); 1176 return (connect_sock(sock, sa, salen, HNAME(addr), hostaddr.buf, state));
|
| /src/crypto/external/bsd/openssh/dist/ |
| readconf.c | 637 socklen_t salen; local 650 salen = sizeof(struct sockaddr_in); 653 salen = sizeof(struct sockaddr_in6); 663 if ((r = getnameinfo(ifa->ifa_addr, salen, addr, sizeof(addr),
|