/netbsd-current/crypto/dist/ipsec-tools/src/racoon/ |
H A D | ipsec_doi.c | 3707 case AF_INET6: 4023 case AF_INET6: 4107 case AF_INET6: 4198 saddr->sa_family = AF_INET6; 4327 saddr.sa.sa_family = AF_INET6; 4427 saddr.sa.sa_family = AF_INET6;
|
H A D | racoonctl.c | 845 return AF_INET6;
|
/netbsd-current/external/bsd/ntp/dist/ntpq/ |
H A D | ntpq-subs.c | 1573 case AF_INET6: 2115 af = AF_INET6; 2138 af = AF_INET6; 2160 af = AF_INET6; 2227 af = AF_INET6; 2249 af = AF_INET6;
|
/netbsd-current/sys/dist/pf/net/ |
H A D | pf_ioctl.c | 1464 if (rule->af == AF_INET6) { 1718 if (newrule->af == AF_INET6) { 2397 if (pp->af == AF_INET6) { 2518 if (pca->af == AF_INET6) { 3386 ph_inet6 = pfil_head_get(PFIL_TYPE_AF, (void *)AF_INET6); 3424 ph_inet6 = pfil_head_get(PFIL_TYPE_AF, (void *)AF_INET6);
|
/netbsd-current/external/bsd/nsd/dist/ |
H A D | options.c | 1835 if(addr->ss_family != AF_INET6) 1860 if(addr->ss_family != AF_INET6) 2252 if(inet_pton(AF_INET6, ip, &acl->addr.addr6) != 1) 2256 if(inet_pton(AF_INET6, p, &acl->range_mask.addr6) != 1) 2531 else if(family == AF_INET6) { 2639 if(ss->ss_family == AF_INET6) {
|
/netbsd-current/external/mpl/bind/dist/lib/isc/netmgr/ |
H A D | netmgr.c | 1552 case AF_INET6: 1577 case AF_INET6: 3212 } else if (sa_family == AF_INET6) { 3316 if (sa_family == AF_INET6) { 3364 if (sa_family == AF_INET6) { 3492 if (sa_family != AF_INET6) {
|
/netbsd-current/sys/netinet/ |
H A D | sctputil.c | 2835 if (addr->sin6_family == AF_INET6) { 2866 if (sa1->sa_family == AF_INET6) { 2892 if (sa->sa_family == AF_INET6) { 2935 lsa6.sin6_family = AF_INET6; 2940 fsa6.sin6_family = AF_INET6; 3462 if (ifa->ifa_addr->sa_family == AF_INET6) { 3494 /* else, not AF_INET or AF_INET6, so skip */
|
/netbsd-current/external/mpl/dhcp/bind/dist/lib/dns/ |
H A D | client.c | 292 result = isc_net_getudpportrange(AF_INET6, &udpport_low, &udpport_high); 328 case AF_INET6: 471 result = getudpdispatch(AF_INET6, dispatchmgr, socketmgr, 2001 family = AF_INET6; 2049 case AF_INET6:
|
/netbsd-current/external/apache2/mDNSResponder/dist/mDNSShared/ |
H A D | dnssd_clientstub.c | 1465 sa6.sin6_family = AF_INET6; 2374 if (!inet_ntop(AF_INET6, (const void *)&sr6->sin6_addr, target_str, sizeof (target_str))) 2379 if (!inet_ntop(AF_INET6, (const void *)&sl6->sin6_addr, source_str, sizeof (source_str)))
|
/netbsd-current/external/bsd/ipf/dist/tools/ |
H A D | ipfstat.c | 851 if (fp->fr_family != 0 && fp->fr_family != AF_INET6) 1932 } else if (use_inet6 && inet_pton(AF_INET6, s, &ip->in6)) { 1974 (void) inet_ntop(AF_INET6, &addr->in6, hostbuf, sizeof(hostbuf) - 1);
|
/netbsd-current/crypto/external/bsd/openssl.old/dist/apps/ |
H A D | s_client.c | 617 #ifdef AF_INET6 1059 #ifdef AF_INET6 1062 socket_family = AF_INET6;
|
/netbsd-current/external/bsd/libpcap/dist/ |
H A D | pcap-rpcap.c | 201 * byte-swapped, and to handle the fact that AF_INET6 has different 221 * AF_INET nor AF_INET6 families, 'sockaddrout' is not allocated and a 224 * than AF_INET or AF_INET6, so the RPCAP daemon sent a 'sockaddr_storage' 229 * format, but might have a different value for AF_INET6 than the value 265 * \warning This function supports only AF_INET and AF_INET6 address families. 300 /* Warning: we support only AF_INET and AF_INET6 */ 326 #ifdef AF_INET6 349 sockaddrout_ipv6->sin6_family = AF_INET6; 360 * It is neither AF_INET nor AF_INET6 (or, if the OS doesn't 361 * support AF_INET6, i [all...] |
/netbsd-current/crypto/external/bsd/openssl/dist/apps/ |
H A D | s_client.c | 504 #ifdef AF_INET6 964 #ifdef AF_INET6 967 socket_family = AF_INET6;
|
/netbsd-current/external/bsd/dhcpcd/dist/src/ |
H A D | if-options.c | 1236 if ((i = inet_pton(AF_INET6, p, &ifo->req_addr6)) == 1) { 1252 logerrx("invalid AF_INET6: %s", p); 1529 if (inet_pton(AF_INET6, arg, &ia->addr) != 1) { 1530 logerrx("invalid AF_INET6: %s", arg); 2297 if (inet_pton(AF_INET6, arg, &ifo->token) != 1) {
|
/netbsd-current/external/bsd/unbound/dist/util/ |
H A D | netevent.c | 543 #if defined(AF_INET6) && defined(IPV6_PKTINFO) && (defined(HAVE_RECVMSG) || defined(HAVE_SENDMSG)) 555 if(inet_ntop(AF_INET6, &r->pktinfo.v6info.ipi6_addr, 592 #endif /* AF_INET6 && IPV6_PKTINFO && HAVE_RECVMSG||HAVE_SENDMSG */ 599 #if defined(AF_INET6) && defined(IPV6_PKTINFO) && defined(HAVE_SENDMSG) 852 #endif /* AF_INET6 && IPV6_PKTINFO && HAVE_SENDMSG */ 932 addr->sin6_family = AF_INET6; 958 #if defined(AF_INET6) && defined(IPV6_PKTINFO) && defined(HAVE_RECVMSG) 1087 #endif /* AF_INET6 && IPV6_PKTINFO && HAVE_RECVMSG */ 4002 #if defined(AF_INET6) && defined(IPV6_PKTINFO) && defined(HAVE_RECVMSG)
|
/netbsd-current/external/cddl/osnet/dist/lib/libdtrace/common/ |
H A D | dt_printf.c | 572 } else if (inet_pton(AF_INET6, s, inetaddr) != -1) { 575 AF_INET6, &e)) != NULL)
|
/netbsd-current/external/bsd/ntp/dist/sntp/libevent/test/ |
H A D | regress_dns.c | 111 const char *b = evutil_inet_ntop(AF_INET6, &in6_addrs[i], buf,sizeof(buf)); 329 const char *b = evutil_inet_ntop(AF_INET6, &in6_addrs[0],buf,sizeof(buf));
|
/netbsd-current/external/bsd/openldap/dist/servers/slapd/ |
H A D | connection.c | 1507 if (peeraddr.sa_addr.sa_family == AF_INET6) { 1521 peeraddr_string = inet_ntop( AF_INET6,
|
/netbsd-current/sys/nfs/ |
H A D | nfs_subs.c | 1733 case AF_INET6: 1739 if (sin6_1->sin6_family == AF_INET6 &&
|
/netbsd-current/external/mpl/dhcp/dist/server/ |
H A D | mdb6.c | 1617 inet_ntop(AF_INET6, &(lease->addr), tmp_addr, 2744 inet_ntop(AF_INET6, &pool->start_addr,
|
/netbsd-current/sys/net/ |
H A D | rtsock_shared.c | 201 case AF_INET6: 566 case AF_INET6:
|
/netbsd-current/usr.sbin/syslogd/ |
H A D | tls.c | 861 if (r->ai_family == AF_INET6 2054 } else if (ifa->ifa_addr->sa_family == AF_INET6) {
|
/netbsd-current/external/ibm-public/postfix/dist/src/posttls-finger/ |
H A D | posttls-finger.c | 1052 #ifdef AF_INET6 1053 || sa->sa_family == AF_INET6
|
/netbsd-current/external/ibm-public/postfix/dist/src/cleanup/ |
H A D | cleanup_milter.c | 2151 #ifdef AF_INET6 2156 state->client_af = AF_INET6;
|
/netbsd-current/external/bsd/libbind/dist/resolv/ |
H A D | res_mkupdate.c | 641 if (inet_pton(AF_INET6, buf2, &in6a) <= 0)
|