Searched refs:sa (Results 101 - 125 of 590) sorted by relevance

1234567891011>>

/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/llc/
H A Dllc_output.c27 * @sa: The MAC source address
34 const unsigned char *sa, const unsigned char *da)
42 rc = dev_hard_header(skb, skb->dev, ETH_P_802_2, da, sa,
33 llc_mac_hdr_init(struct sk_buff *skb, const unsigned char *sa, const unsigned char *da) argument
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/apparmor/include/
H A Daudit.h110 void aa_audit_msg(int type, struct common_audit_data *sa,
113 struct common_audit_data *sa,
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/tile/kernel/
H A Dcompat_signal.c139 __get_user(new_sa.sa.sa_flags, &act->sa_flags) ||
141 __copy_from_user(&new_sa.sa.sa_mask, &act->sa_mask,
144 new_sa.sa.sa_handler = compat_ptr(handler);
145 new_sa.sa.sa_restorer = compat_ptr(restorer);
152 __put_user(ptr_to_compat(old_sa.sa.sa_handler),
154 __put_user(ptr_to_compat(old_sa.sa.sa_restorer),
156 __put_user(old_sa.sa.sa_flags, &oact->sa_flags) ||
157 __copy_to_user(&oact->sa_mask, &old_sa.sa.sa_mask,
345 if (ka->sa.sa_flags & SA_ONSTACK) {
379 if (ka->sa
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/transmission/transmission-2.73/third-party/dht/
H A Ddht-example.c49 struct sigaction sa; local
53 sa.sa_handler = sigdump;
54 sa.sa_mask = ss;
55 sa.sa_flags = 0;
56 sigaction(SIGUSR1, &sa, NULL);
59 sa.sa_handler = sigtest;
60 sa.sa_mask = ss;
61 sa.sa_flags = 0;
62 sigaction(SIGUSR2, &sa, NULL);
65 sa
415 dht_blacklisted(const struct sockaddr *sa, int salen) argument
[all...]
H A Ddht.c217 static int send_ping(const struct sockaddr *sa, int salen,
219 static int send_pong(const struct sockaddr *sa, int salen,
221 static int send_find_node(const struct sockaddr *sa, int salen,
224 static int send_nodes_peers(const struct sockaddr *sa, int salen,
230 static int send_closest_nodes(const struct sockaddr *sa, int salen,
235 static int send_get_peers(const struct sockaddr *sa, int salen,
238 static int send_announce_peer(const struct sockaddr *sa, int salen,
242 static int send_peer_announced(const struct sockaddr *sa, int salen,
244 static int send_error(const struct sockaddr *sa, int salen,
354 is_martian(const struct sockaddr *sa) argument
655 blacklist_node(const unsigned char *id, const struct sockaddr *sa, int salen) argument
685 node_blacklisted(const struct sockaddr *sa, int salen) argument
744 new_node(const unsigned char *id, const struct sockaddr *sa, int salen, int confirm) argument
936 insert_search_node(unsigned char *id, const struct sockaddr *sa, int salen, struct search *sr, int replied, unsigned char *token, int token_len) argument
1278 storage_store(const unsigned char *id, const struct sockaddr *sa, unsigned short port) argument
1406 make_token(const struct sockaddr *sa, int old, unsigned char *token_return) argument
1431 token_match(const unsigned char *token, int token_len, const struct sockaddr *sa) argument
2268 dht_insert_node(const unsigned char *id, struct sockaddr *sa, int salen) argument
2282 dht_ping_node(struct sockaddr *sa, int salen) argument
2312 dht_send(const void *buf, size_t len, int flags, const struct sockaddr *sa, int salen) argument
2342 send_ping(const struct sockaddr *sa, int salen, const unsigned char *tid, int tid_len) argument
2362 send_pong(const struct sockaddr *sa, int salen, const unsigned char *tid, int tid_len) argument
2381 send_find_node(const struct sockaddr *sa, int salen, const unsigned char *tid, int tid_len, const unsigned char *target, int want, int confirm) argument
2410 send_nodes_peers(const struct sockaddr *sa, int salen, const unsigned char *tid, int tid_len, const unsigned char *nodes, int nodes_len, const unsigned char *nodes6, int nodes6_len, int af, struct storage *st, const unsigned char *token, int token_len) argument
2537 send_closest_nodes(const struct sockaddr *sa, int salen, const unsigned char *tid, int tid_len, const unsigned char *id, int want, int af, struct storage *st, const unsigned char *token, int token_len) argument
2584 send_get_peers(const struct sockaddr *sa, int salen, unsigned char *tid, int tid_len, unsigned char *infohash, int want, int confirm) argument
2614 send_announce_peer(const struct sockaddr *sa, int salen, unsigned char *tid, int tid_len, unsigned char *infohash, unsigned short port, unsigned char *token, int token_len, int confirm) argument
2644 send_peer_announced(const struct sockaddr *sa, int salen, unsigned char *tid, int tid_len) argument
2665 send_error(const struct sockaddr *sa, int salen, unsigned char *tid, int tid_len, int code, const char *message) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/rxrpc/
H A Dar-connevent.c337 struct sockaddr sa; member in union:__anon18955
339 } sa; local
360 msg.msg_name = &sa;
365 memset(&sa, 0, sizeof(sa));
366 sa.sa.sa_family = local->srx.transport.family;
367 switch (sa.sa.sa_family) {
369 msg.msg_namelen = sizeof(sa
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/transmission/libevent-2.0.20-stable/
H A Dutil-internal.h172 int evutil_socket_connect(evutil_socket_t *fd_ptr, struct sockaddr *sa, int socklen);
178 int evutil_resolve(int family, const char *hostname, struct sockaddr *sa,
245 struct evutil_addrinfo *evutil_new_addrinfo(struct sockaddr *sa,
258 /** Return true iff sa is a looback address. (That is, it is 127.0.0.1/8, or
260 int evutil_sockaddr_is_loopback(const struct sockaddr *sa);
264 Formats a sockaddr sa into a string buffer of size outlen stored in out.
268 const char *evutil_format_sockaddr_port(const struct sockaddr *sa, char *out, size_t outlen);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/pptpd/pptpd-1.3.4/
H A Dcompat.c175 struct sigaction sa; local
177 memset(&sa, 0, sizeof(sa));
178 sa.sa_handler = sigpipe_handler;
179 sigaction(signum, &sa, NULL);
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/um/kernel/
H A Dsignal.c46 if (!(ka->sa.sa_flags & SA_RESTART)) {
59 if ((ka->sa.sa_flags & SA_ONSTACK) && (sas_ss_flags(sp) == 0))
63 if (!(ka->sa.sa_flags & SA_SIGINFO))
78 &ka->sa.sa_mask);
79 if (!(ka->sa.sa_flags & SA_NODEFER))
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/powerpc/kernel/
H A Dsignal.c38 if ((ka->sa.sa_flags & SA_ONSTACK) &&
92 restart = !has_handler || (ka->sa.sa_flags & SA_RESTART) != 0;
158 if (ka.sa.sa_flags & SA_SIGINFO)
172 &ka.sa.sa_mask);
173 if (!(ka.sa.sa_flags & SA_NODEFER))
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/avahi-0.6.25/avahi-core/
H A Dsocket.c115 struct sockaddr_in sa; local
128 mdns_mcast_group_ipv4(&sa);
129 mreq.imr_multiaddr = sa.sin_addr;
189 static int bind_with_warn(int fd, const struct sockaddr *sa, socklen_t l) { argument
192 assert(sa);
195 if (bind(fd, sa, l) < 0) {
203 sa->sa_family == AF_INET ? "IPv4" : "IPv6");
209 if (bind(fd, sa, l) < 0) {
375 struct sockaddr_in6 sa, local; local
379 mdns_mcast_group_ipv6(&sa);
477 struct sockaddr_in sa; local
571 struct sockaddr_in6 sa; local
641 struct sockaddr_in sa; local
794 struct sockaddr_in6 sa; local
[all...]
H A Diface-pfroute.c131 struct sockaddr *sa =NULL; local
141 sa = (struct sockaddr *)cp;
145 cp += SA_SIZE(sa);
147 ADVANCE(cp, sa);
151 if(sa->sa_family != AF_INET && sa->sa_family != AF_INET6)
154 if (!(iface = avahi_interface_monitor_get_interface(m, (AvahiIfIndex) ifam->ifam_index, avahi_af_to_proto(sa->sa_family))))
157 raddr.proto = avahi_af_to_proto(sa->sa_family);
163 sa = (struct sockaddr *)cp;
165 if (sa
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/avahi-0.6.25/avahi-core/
H A Dsocket.c115 struct sockaddr_in sa; local
128 mdns_mcast_group_ipv4(&sa);
129 mreq.imr_multiaddr = sa.sin_addr;
189 static int bind_with_warn(int fd, const struct sockaddr *sa, socklen_t l) { argument
192 assert(sa);
195 if (bind(fd, sa, l) < 0) {
203 sa->sa_family == AF_INET ? "IPv4" : "IPv6");
209 if (bind(fd, sa, l) < 0) {
375 struct sockaddr_in6 sa, local; local
379 mdns_mcast_group_ipv6(&sa);
477 struct sockaddr_in sa; local
571 struct sockaddr_in6 sa; local
641 struct sockaddr_in sa; local
794 struct sockaddr_in6 sa; local
[all...]
H A Diface-pfroute.c131 struct sockaddr *sa =NULL; local
141 sa = (struct sockaddr *)cp;
145 cp += SA_SIZE(sa);
147 ADVANCE(cp, sa);
151 if(sa->sa_family != AF_INET && sa->sa_family != AF_INET6)
154 if (!(iface = avahi_interface_monitor_get_interface(m, (AvahiIfIndex) ifam->ifam_index, avahi_af_to_proto(sa->sa_family))))
157 raddr.proto = avahi_af_to_proto(sa->sa_family);
163 sa = (struct sockaddr *)cp;
165 if (sa
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/mn10300/kernel/
H A Dsignal.c67 __get_user(new_ka.sa.sa_handler, &act->sa_handler) ||
68 __get_user(new_ka.sa.sa_restorer, &act->sa_restorer) ||
69 __get_user(new_ka.sa.sa_flags, &act->sa_flags) ||
72 siginitset(&new_ka.sa.sa_mask, mask);
79 __put_user(old_ka.sa.sa_handler, &oact->sa_handler) ||
80 __put_user(old_ka.sa.sa_restorer, &oact->sa_restorer) ||
81 __put_user(old_ka.sa.sa_flags, &oact->sa_flags) ||
82 __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask))
269 if (ka->sa.sa_flags & SA_ONSTACK) {
312 if (ka->sa
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/h8300/kernel/
H A Dsignal.c117 __get_user(new_ka.sa.sa_handler, &act->sa_handler) ||
118 __get_user(new_ka.sa.sa_restorer, &act->sa_restorer))
120 __get_user(new_ka.sa.sa_flags, &act->sa_flags);
122 siginitset(&new_ka.sa.sa_mask, mask);
129 __put_user(old_ka.sa.sa_handler, &oact->sa_handler) ||
130 __put_user(old_ka.sa.sa_restorer, &oact->sa_restorer))
132 __put_user(old_ka.sa.sa_flags, &oact->sa_flags);
133 __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask);
309 if (ka->sa.sa_flags & SA_ONSTACK) {
351 if (ka->sa
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/libpcap-1.4.0/
H A Dpcap-nit.c197 struct sockaddr sa; local
200 memset(&sa, 0, sizeof(sa));
201 strncpy(sa.sa_data, device, sizeof(sa.sa_data));
202 ret = sendto(p->fd, buf, size, 0, &sa, sizeof(sa));
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/dhcp6/
H A Ddhcp6r.c68 struct server *sa; local
208 sa = (struct server *) malloc(sizeof(struct server));
209 if (sa == NULL) {
214 sa->serv = strdup(addr);
215 sa->next = NULL;
217 sa->next = iface->sname;
218 iface->sname = sa;
/netgear-R7000-V1.0.7.12_1.2.5/src/router/dhcp6/
H A Ddhcp6r.c68 struct server *sa; local
208 sa = (struct server *) malloc(sizeof(struct server));
209 if (sa == NULL) {
214 sa->serv = strdup(addr);
215 sa->next = NULL;
217 sa->next = iface->sname;
218 iface->sname = sa;
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/key/
H A Daf_key.c578 int pfkey_sockaddr_extract(const struct sockaddr *sa, xfrm_address_t *xaddr) argument
580 switch (sa->sa_family) {
583 ((struct sockaddr_in *)sa)->sin_addr.s_addr;
588 &((struct sockaddr_in6 *)sa)->sin6_addr,
605 struct sadb_sa *sa; local
611 sa = (struct sadb_sa *) ext_hdrs[SADB_EXT_SA-1];
612 if (sa == NULL)
641 return xfrm_state_lookup(net, DUMMY_MARK, xaddr, sa->sadb_sa_spi, proto, family);
682 struct sockaddr *sa,
688 struct sockaddr_in *sin = (struct sockaddr_in *)sa;
681 pfkey_sockaddr_fill(xfrm_address_t *xaddr, __be16 port, struct sockaddr *sa, unsigned short family) argument
716 struct sadb_sa *sa; local
1022 struct sadb_sa *sa; local
1873 u8 *sa = (u8 *) (rq + 1); local
2083 u8 *sa = (void *)(rq + 1); local
2147 struct sadb_address *sa; local
2267 struct sadb_address *sa; local
2376 parse_sockaddr_pair(struct sockaddr *sa, int ext_len, xfrm_address_t *saddr, xfrm_address_t *daddr, u16 *family) argument
2452 struct sadb_address *sa; local
3200 struct sadb_sa *sa; local
3341 u8 *sa; local
3369 u8 *sa; local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/testsuite/smbd/
H A Dse_access_check_utils.c68 SEC_ACCESS sa; local
80 init_sec_access(&sa, ace_list->mask);
84 sa, ace_list->flags);
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/net/
H A Ddummy.c44 struct sockaddr *sa = p; local
46 if (!is_valid_ether_addr(sa->sa_data))
49 memcpy(dev->dev_addr, sa->sa_data, ETH_ALEN);
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/scsi/
H A Dconstants.c209 int sa, len, cdb0; local
221 sa = (cdbp[8] << 8) + cdbp[9];
222 name = get_sa_name(variable_length_arr, VARIABLE_LENGTH_SZ, sa);
226 printk("cdb[0]=0x%x, sa=0x%x", cdb0, sa);
233 sa = cdbp[1] & 0x1f;
234 name = get_sa_name(maint_in_arr, MAINT_IN_SZ, sa);
238 printk("cdb[0]=0x%x, sa=0x%x", cdb0, sa);
241 sa
297 int sa, len, cdb0; local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/netatalk-2.2.5/libatalk/util/
H A Dsocket.c280 * @param sa (r) pointer to an struct sockaddr
285 const char *getip_string(const struct sockaddr *sa) argument
290 switch (sa->sa_family) {
293 const struct sockaddr_in *sai4 = (const struct sockaddr_in *)sa;
299 const struct sockaddr_in6 *sai6 = (const struct sockaddr_in6 *)sa;
318 * @param sa (r) pointer to an struct sockaddr
322 unsigned int getip_port(const struct sockaddr *sa) argument
324 if (sa->sa_family == AF_INET) { /* IPv4 */
325 const struct sockaddr_in *sai4 = (const struct sockaddr_in *)sa;
328 const struct sockaddr_in6 *sai6 = (const struct sockaddr_in6 *)sa;
346 apply_ip_mask(struct sockaddr *sa, int mask) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/dnsmasq-2.15/src/
H A Dforward.c230 if (!nowild && to->sa.sa_family == AF_INET)
255 if (to->sa.sa_family == AF_INET6)
298 unsigned short sflag = serv->addr.sa.sa_family == AF_INET ? F_IPV4 : F_IPV6;
307 if (serv->addr.sa.sa_family == AF_INET)
325 unsigned short sflag = serv->addr.sa.sa_family == AF_INET ? F_IPV4 : F_IPV6;
336 if (serv->addr.sa.sa_family == AF_INET)
441 if(udpaddr->sa.sa_family == AF_INET)
605 sflag = (start->addr.sa.sa_family == AF_INET) ? F_IPV4 : F_IPV6;/* Foxconn added by Max Ding, 07/06/2011 */
622 if(!(start->flags & SERV_LITERAL_ADDRESS) && (start->addr.sa.sa_family != udpaddr->sa
[all...]

Completed in 3579 milliseconds

1234567891011>>