/netgear-R7000-V1.0.7.12_1.2.5/src/router/iputils/libipsec/ |
H A D | libpfkey.h | 99 sysdep_sa_len (struct sockaddr *sa) argument 101 switch (sa->sa_family) 108 // log_print ("sysdep_sa_len: unknown sa family %d", sa->sa_family);
|
H A D | ipsec_dump_policy.c | 291 set_address(buf, len, sa) 294 struct sockaddr *sa; 301 if (getnameinfo(sa, sysdep_sa_len(sa), buf, len, NULL, 0, niflags) != 0)
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/busybox-1.x/networking/ |
H A D | pscan.c | 76 s = xsocket(lsap->sa.sa_family, SOCK_STREAM, 0); 83 if (connect(s, &lsap->sa, lsap->len) == 0) {
|
H A D | ping.c | 214 if (lsa->sa.sa_family == AF_INET6) 260 struct sockaddr sa; member in union:globals::__anon19917 339 /* sizeof(pingaddr) can be larger than real sa size, but I think 341 sz = xsendto(pingsock, pkt, size_pkt, &pingaddr.sa, sizeof(pingaddr)); 574 &source_lsa->sa, source_lsa->len)) 576 xbind(pingsock, &source_lsa->sa, source_lsa->len); 628 xbind(pingsock, &source_lsa->sa, source_lsa->len); 709 xmalloc_sockaddr2dotted_noport(&source_lsa->sa)); 714 if (lsa->sa.sa_family == AF_INET6) 791 if (source_lsa && source_lsa->sa [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/src/openvpn/ |
H A D | socket.h | 72 /*int dummy;*/ /* add offset to force a bug if sa not explicitly dereferenced */ 74 struct sockaddr sa; member in union:openvpn_sockaddr::__anon5018 571 switch (addr->addr.sa.sa_family) { 582 switch (lsa->dest.addr.sa.sa_family) { 606 switch(a1->addr.sa.sa_family) { 624 if(addr->addr.sa.sa_family != AF_INET) 632 switch(a1->addr.sa.sa_family) { 657 switch(addr->addr.sa.sa_family) { 676 switch(src->addr.sa.sa_family) { 765 switch (from_addr->dest.addr.sa [all...] |
H A D | win32.c | 130 obj->sa.nLength = sizeof (SECURITY_ATTRIBUTES); 131 obj->sa.lpSecurityDescriptor = &obj->sd; 132 obj->sa.bInheritHandle = FALSE; 385 struct security_attributes sa; local 387 if (!init_security_attributes_allow_all (&sa)) 390 ws->in.read = CreateEvent (&sa.sa, 592 struct security_attributes sa; local 598 if (init_security_attributes_allow_all (&sa)) 599 s->hand = CreateSemaphore(&sa [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/ubifs/ |
H A D | gc.c | 125 struct ubifs_scan_node *sa, *sb; local 128 sa = list_entry(a, struct ubifs_scan_node, list); 130 ubifs_assert(key_type(c, &sa->key) == UBIFS_DATA_KEY); 133 inuma = key_inum(c, &sa->key); 137 unsigned int blka = key_block(c, &sa->key); 163 struct ubifs_scan_node *sa, *sb; local 166 sa = list_entry(a, struct ubifs_scan_node, list); 168 typea = key_type(c, &sa->key); 175 return sb->len - sa->len; 182 inuma = key_inum(c, &sa [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/m68k/kernel/ |
H A D | signal.c | 133 __get_user(new_ka.sa.sa_handler, &act->sa_handler) || 134 __get_user(new_ka.sa.sa_restorer, &act->sa_restorer)) 136 __get_user(new_ka.sa.sa_flags, &act->sa_flags); 138 siginitset(&new_ka.sa.sa_mask, mask); 145 __put_user(old_ka.sa.sa_handler, &oact->sa_handler) || 146 __put_user(old_ka.sa.sa_restorer, &oact->sa_restorer)) 148 __put_user(old_ka.sa.sa_flags, &oact->sa_flags); 149 __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask); 770 if (ka->sa.sa_flags & SA_ONSTACK) { 830 regs->pc = (unsigned long) ka->sa [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/m68knommu/kernel/ |
H A D | signal.c | 121 __get_user(new_ka.sa.sa_handler, &act->sa_handler) || 122 __get_user(new_ka.sa.sa_restorer, &act->sa_restorer)) 124 __get_user(new_ka.sa.sa_flags, &act->sa_flags); 126 siginitset(&new_ka.sa.sa_mask, mask); 133 __put_user(old_ka.sa.sa_handler, &oact->sa_handler) || 134 __put_user(old_ka.sa.sa_restorer, &oact->sa_restorer)) 136 __put_user(old_ka.sa.sa_flags, &oact->sa_flags); 137 __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask); 558 if (ka->sa.sa_flags & SA_ONSTACK) { 599 regs->pc = (unsigned long) ka->sa [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/bluetooth/rfcomm/ |
H A D | sock.c | 356 struct sockaddr_rc *sa = (struct sockaddr_rc *) addr; local 360 BT_DBG("sk %p %s", sk, batostr(&sa->rc_bdaddr)); 379 if (sa->rc_channel && __rfcomm_get_sock_by_addr(sa->rc_channel, &sa->rc_bdaddr)) { 383 bacpy(&bt_sk(sk)->src, &sa->rc_bdaddr); 384 rfcomm_pi(sk)->channel = sa->rc_channel; 397 struct sockaddr_rc *sa = (struct sockaddr_rc *) addr; local 421 bacpy(&bt_sk(sk)->dst, &sa->rc_bdaddr); 422 rfcomm_pi(sk)->channel = sa 549 struct sockaddr_rc *sa = (struct sockaddr_rc *) addr; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/powerpc/sysdev/ |
H A D | ppc4xx_pci.c | 294 u32 sa; local 297 sa = (0xffffffffu << ilog2(size)) | 1; 298 sa |= 0x1; 302 writel(sa, reg + PCIL0_PTM1MS); 412 u32 lah, lal, pciah, pcial, sa; local 426 sa = (0xffffffffu << ilog2(size)) | 0x1; 434 writel(sa, reg + PCIX0_POM0SA); 440 writel(sa, reg + PCIX0_POM1SA); 496 u32 sa; local 503 sa 1527 u32 lah, lal, pciah, pcial, sa; local 1638 u64 sa; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/powerpc/kernel/ |
H A D | signal_32.c | 140 __get_user(new_ka->sa.sa_flags, &act->sa_flags) || 143 new_ka->sa.sa_handler = compat_ptr(handler); 144 new_ka->sa.sa_restorer = compat_ptr(restorer); 145 siginitset(&new_ka->sa.sa_mask, mask); 204 __get_user(new_ka->sa.sa_handler, &act->sa_handler) || 205 __get_user(new_ka->sa.sa_restorer, &act->sa_restorer)) 207 __get_user(new_ka->sa.sa_flags, &act->sa_flags); 209 siginitset(&new_ka->sa.sa_mask, mask); 276 __put_user(to_user_ptr(old_ka.sa.sa_handler), 278 __put_user(to_user_ptr(old_ka.sa [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/lib/ |
H A D | util_sock.c | 40 struct sockaddr sa; local 41 struct sockaddr_in *sockin = (struct sockaddr_in *) (&sa); 42 socklen_t length = sizeof(sa); 51 if (getsockname(fd, &sa, &length) < 0) { 63 struct sockaddr sa; local 64 struct sockaddr_in *sockin = (struct sockaddr_in *) (&sa); 65 socklen_t length = sizeof(sa); 70 if (getsockname(fd, &sa, &length) < 0) { 98 struct in_addr *client_inaddr(struct sockaddr *sa) argument 100 struct sockaddr_in *sockin = (struct sockaddr_in *) (sa); 1220 struct sockaddr sa; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/bftpd-1.6.6/ |
H A D | commands.h | 29 extern struct sockaddr_in sa;
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/parisc/include/asm/ |
H A D | signal.h | 144 struct sigaction sa; member in struct:k_sigaction
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/udf/ |
H A D | directory.c | 201 struct short_ad *sa; local 211 sa = (struct short_ad *)ptr; 212 if (sa->extLength == 0) 218 return sa;
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/asm-generic/ |
H A D | signal.h | 112 struct sigaction sa; member in struct:k_sigaction
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/powerpc/include/asm/ |
H A D | signal.h | 114 struct sigaction sa; member in struct:k_sigaction
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/netrom/ |
H A D | nr_dev.c | 134 struct sockaddr *sa = addr; local 137 if (!memcmp(dev->dev_addr, sa->sa_data, dev->addr_len)) 141 err = ax25_listen_register((ax25_address *)sa->sa_data, NULL); 148 memcpy(dev->dev_addr, sa->sa_data, dev->addr_len);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/forked-daapd-0.19/src/ |
H A D | raop.h | 15 struct sockaddr sa; member in union:sockaddr_all
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/ia64/include/asm/ |
H A D | signal.h | 146 struct sigaction sa; member in struct:k_sigaction
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/score/kernel/ |
H A D | signal.c | 131 if ((ka->sa.sa_flags & SA_ONSTACK) && (!on_sig_stack(sp))) 233 regs->regs[29] = (unsigned long) ka->sa.sa_handler; 234 regs->cp0_epc = (unsigned long) ka->sa.sa_handler; 240 ka->sa.sa_handler = SIG_DFL; 257 if (!(ka->sa.sa_flags & SA_RESTART)) { 276 sigorsets(¤t->blocked, ¤t->blocked, &ka->sa.sa_mask); 277 if (!(ka->sa.sa_flags & SA_NODEFER))
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/blackfin/kernel/ |
H A D | signal.c | 159 if (ka->sa.sa_flags & SA_ONSTACK) { 202 (struct fdpic_func_descriptor *) ka->sa.sa_handler; 206 regs->pc = (unsigned long)ka->sa.sa_handler; 217 ka->sa.sa_handler = SIG_DFL; 233 if (has_handler && !(ka->sa.sa_flags & SA_RESTART)) { 272 &ka->sa.sa_mask); 273 if (!(ka->sa.sa_flags & SA_NODEFER))
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iputils/racoon/ |
H A D | pfkey.c | 811 struct sadb_sa *sa; local 827 sa = (struct sadb_sa *)mhp[SADB_EXT_SA]; 864 pr->spi = sa->sadb_sa_spi; 870 sa->sadb_sa_spi, 1016 struct sadb_sa *sa; local 1039 sa = (struct sadb_sa *)mhp[SADB_EXT_SA]; 1087 && pr->spi == sa->sadb_sa_spi) { 1093 sa->sadb_sa_spi, 1099 msg->sadb_msg_satype, sa->sadb_sa_spi, 1253 struct sadb_sa *sa; local 1318 struct sadb_sa *sa; local 1459 struct sockaddr *sa = PFKEY_ADDR_SADDR(mhp[SADB_EXT_ADDRESS_DST]); local 1629 struct sadb_sa *sa; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iputils/setkey/ |
H A D | setkey.c | 428 struct sadb_sa *sa; local 431 if ((sa = (struct sadb_sa *)mhp[SADB_EXT_SA]) != NULL) { 432 if (sa->sadb_sa_state == SADB_SASTATE_DEAD) 511 struct sadb_sa *sa; local 525 if ((sa = (struct sadb_sa *)mhp[SADB_EXT_SA]) != NULL) { 526 printf(" %-1s", STR_OR_ID(sa->sadb_sa_state, sastate)); 527 printf(" %08x", (u_int32_t)ntohl(sa->sadb_sa_spi));
|