/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/xsasl/ |
H A D | xsasl_dovecot_server.c | 406 SOCKADDR_SIZE salen; local 445 salen = sizeof(ss); 446 if (getsockname(vstream_fileno(args->stream), sa, &salen) < 0 447 || sockaddr_to_hostaddr(sa, salen, &server_addr, 0, 0) != 0)
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/contrib/idn/idnkit-1.0-src/wsock/wsock20/ |
H A D | dllfunc.c | 555 getnameinfo(const struct sockaddr *sa, DWORD salen, argument 571 code = _org_getnameinfo(sa, salen, host, hostlen, 574 code = _org_getnameinfo(sa, salen, name, namelen,
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/bin/tests/system/lwresd/ |
H A D | lwtest.c | 552 int salen; local 564 salen = sizeof(sin); 574 salen = sizeof(sin6); 578 ret = getnameinfo(sa, salen, host, sizeof(host), NULL, 0, NI_NAMEREQD);
|
/netbsd-6-1-5-RELEASE/sys/kern/ |
H A D | uipc_socket2.c | 979 const int salen = asa->sa_len; local 989 if (salen > MHLEN) { 990 MEXTMALLOC(m, salen, M_NOWAIT); 997 KASSERT(salen <= MHLEN); 999 m->m_len = salen; 1000 memcpy(mtod(m, void *), asa, salen); local 1002 m->m_pkthdr.len = salen + m0->m_pkthdr.len;
|
/netbsd-6-1-5-RELEASE/external/bsd/tcpdump/dist/ |
H A D | print-isakmp.c | 343 int salen; local 376 salen = sa->sa_len; 380 salen = sizeof(struct sockaddr_in6); 382 salen = sizeof(struct sockaddr); 384 salen = sizeof(struct sockaddr); 387 if (memcmp(&ss, &cookiecache[i].iaddr, salen) == 0) 393 salen = sa->sa_len; 397 salen = sizeof(struct sockaddr_in6); 399 salen = sizeof(struct sockaddr); 401 salen [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/ntp/dist/libntp/ |
H A D | ntp_rfc2553.c | 291 getnameinfo (const struct sockaddr *sa, u_int salen, char *host, argument
|
/netbsd-6-1-5-RELEASE/external/bsd/libevent/dist/ |
H A D | http.c | 107 fake_getnameinfo(const struct sockaddr *sa, size_t salen, char *host, argument 2535 int fd, struct sockaddr *sa, socklen_t salen) 2540 name_from_addr(sa, salen, &hostname, &portname); 2594 struct sockaddr *sa, socklen_t salen) 2598 evcon = evhttp_get_request_connection(http, fd, sa, salen); 2650 name_from_addr(struct sockaddr *sa, socklen_t salen, argument 2658 ni_result = getnameinfo(sa, salen, 2670 ni_result = fake_getnameinfo(sa, salen, 2533 evhttp_get_request_connection( struct evhttp* http, int fd, struct sockaddr *sa, socklen_t salen) argument 2593 evhttp_get_request(struct evhttp *http, int fd, struct sockaddr *sa, socklen_t salen) argument
|
/netbsd-6-1-5-RELEASE/sys/net/ |
H A D | if_gre.c | 1149 socklen_t anylen, salen; local 1153 (addr = sockaddr_const_addr(sa, &salen)) == NULL) 1156 if (salen > anylen) 1159 return memcmp(anyaddr, addr, MIN(anylen, salen)) == 0;
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/contrib/idn/idnkit-1.0-src/tools/runidn/ |
H A D | resolver.c | 1019 ENTRY(getnameinfo)(const struct sockaddr *sa, GNI_SALEN_T salen, argument 1029 return (REAL(getnameinfo)(sa, salen, host, hostlen, 1036 code = REAL(getnameinfo)(sa, salen, name, namelen,
|
/netbsd-6-1-5-RELEASE/external/bsd/openldap/dist/include/ |
H A D | ldap_pvt.h | 164 int salen,
|
/netbsd-6-1-5-RELEASE/usr.sbin/syslogd/ |
H A D | tls.c | 2006 socklen_t salen; local 2031 salen = sizeof(struct sockaddr_in); 2037 salen = sizeof(struct sockaddr_in6); 2041 if (getnameinfo(ifa->ifa_addr, salen, ip, sizeof(ip),
|
/netbsd-6-1-5-RELEASE/crypto/dist/ipsec-tools/src/libipsec/ |
H A D | pfkey.c | 2310 u_int salen = sysdep_sa_len(local); local 2318 len = sizeof(struct sadb_x_kmaddress) + PFKEY_ALIGN8(2*salen); 2328 memcpy(sa, local, salen); 2329 sa = (struct sockaddr *)((char *)sa + salen); 2330 memcpy(sa, remote, salen);
|