Searched refs:sa_size (Results 1 - 25 of 30) sorted by relevance

12

/freebsd-13-stable/crypto/heimdal/lib/gssapi/krb5/
H A Daddress_to_krb5addr.c47 krb5_socklen_t sa_size = sizeof(sa); local
69 &sa_size,
/freebsd-13-stable/crypto/heimdal/kpasswd/
H A Dkpasswdd.c71 int sa_size,
97 msghdr.msg_namelen = sa_size;
147 int sa_size,
185 send_reply (s, sa, sa_size, NULL, &error_data);
193 int sa_size,
223 send_reply (s, sa, sa_size, &ap_rep_data, &krb_priv_data);
230 * (`sa', `sa_size') to `pwd_data'.
239 int sa_size,
259 reply_priv (auth_context, s, sa, sa_size, KRB5_KPASSWD_MALFORMED,
271 reply_priv (auth_context, s, sa, sa_size, KRB5_KPASSWD_MALFORME
69 send_reply(int s, struct sockaddr *sa, int sa_size, krb5_data *ap_rep, krb5_data *rest) argument
144 reply_error(krb5_realm realm, int s, struct sockaddr *sa, int sa_size, krb5_error_code error_code, uint16_t result_code, const char *expl) argument
190 reply_priv(krb5_auth_context auth_context, int s, struct sockaddr *sa, int sa_size, uint16_t result_code, const char *expl) argument
234 change(krb5_auth_context auth_context, krb5_principal admin_principal, uint16_t version, int s, struct sockaddr *sa, int sa_size, krb5_data *in_data) argument
432 verify(krb5_auth_context *auth_context, krb5_realm *realms, krb5_keytab keytab, krb5_ticket **ticket, krb5_data *out_data, uint16_t *version, int s, struct sockaddr *sa, int sa_size, u_char *msg, size_t len, krb5_address *client_addr) argument
579 process(krb5_realm *realms, krb5_keytab keytab, int s, krb5_address *this_addr, struct sockaddr *sa, int sa_size, u_char *msg, int len) argument
682 krb5_socklen_t sa_size = sizeof(__ss); local
[all...]
/freebsd-13-stable/crypto/heimdal/lib/krb5/
H A Daddr_families.c43 krb5_socklen_t *sa_size, int port);
85 krb5_socklen_t *sa_size,
94 memcpy(sa, &tmp, min(sizeof(tmp), *sa_size));
95 *sa_size = sizeof(tmp);
101 krb5_socklen_t *sa_size,
110 memcpy(sa, &tmp, min(sizeof(tmp), *sa_size));
111 *sa_size = sizeof(tmp);
152 ipv4_anyaddr (struct sockaddr *sa, krb5_socklen_t *sa_size, int port) argument
160 memcpy(sa, &tmp, min(sizeof(tmp), *sa_size));
161 *sa_size
83 ipv4_addr2sockaddr(const krb5_address *a, struct sockaddr *sa, krb5_socklen_t *sa_size, int port) argument
99 ipv4_h_addr2sockaddr(const char *addr, struct sockaddr *sa, krb5_socklen_t *sa_size, int port) argument
276 ipv6_addr2sockaddr(const krb5_address *a, struct sockaddr *sa, krb5_socklen_t *sa_size, int port) argument
292 ipv6_h_addr2sockaddr(const char *addr, struct sockaddr *sa, krb5_socklen_t *sa_size, int port) argument
339 ipv6_anyaddr(struct sockaddr *sa, krb5_socklen_t *sa_size, int port) argument
913 krb5_addr2sockaddr(krb5_context context, const krb5_address *addr, struct sockaddr *sa, krb5_socklen_t *sa_size, int port) argument
1010 krb5_h_addr2sockaddr(krb5_context context, int af, const char *addr, struct sockaddr *sa, krb5_socklen_t *sa_size, int port) argument
1072 krb5_anyaddr(krb5_context context, int af, struct sockaddr *sa, krb5_socklen_t *sa_size, int port) argument
[all...]
/freebsd-13-stable/sys/contrib/openzfs/include/sys/
H A Dsa.h82 uint16_t sa_size; member in struct:sa_bulk_attr
136 int sa_size(sa_handle_t *, sa_attr_type_t, int *);
H A Dsa_impl.h259 bulk.sa_size = SA_ATTR_LEN(sa, idx, attr, hdr); \
/freebsd-13-stable/crypto/openssh/
H A Dloginrec.h114 const unsigned int sa_size);
H A Dloginrec.c420 const unsigned int sa_size)
422 unsigned int bufsize = sa_size;
425 if (sizeof(li->hostaddr) < sa_size)
419 login_set_addr(struct logininfo *li, const struct sockaddr *sa, const unsigned int sa_size) argument
/freebsd-13-stable/crypto/heimdal/kadmin/
H A Dkadmind.c179 socklen_t sa_size = sizeof(__ss);
186 if(roken_getsockname(STDIN_FILENO, sa, &sa_size) < 0 &&
H A Dkadm_conn.c130 socklen_t sa_size = sizeof(__ss); local
137 s = accept(socks[this_sock], sa, &sa_size);
/freebsd-13-stable/contrib/ofed/opensm/libvendor/
H A Dosm_vendor_ibumad_sa.c342 uint32_t sa_size; local
402 p_sa_mad_data->attr_offset ? (sa_size = ib_get_attr_size(p_sa_mad_data->attr_offset)) : (sa_size = IB_SA_DATA_SIZE);
403 memcpy(p_sa_mad->data, p_sa_mad_data->p_attr, sa_size);
H A Dosm_vendor_mlx_sa.c431 uint32_t sa_size; local
490 p_sa_mad_data->attr_offset ? (sa_size = ib_get_attr_size(p_sa_mad_data->attr_offset)) : (sa_size = IB_SA_DATA_SIZE);
491 memcpy(p_sa_mad->data, p_sa_mad_data->p_attr, sa_size);
/freebsd-13-stable/contrib/tcpdump/
H A Dnfs.h361 uint32_t sa_size; member in struct:nfsv2_sattr
377 uint32_t sa_size; member in struct:nfsv3_sattr
H A Dprint-nfs.c268 sa3->sa_size = EXTRACT_32BITS(dp);
/freebsd-13-stable/crypto/heimdal/appl/telnet/telnetd/
H A Dtelnetd.c152 socklen_t sa_size; local
432 sa_size = sizeof (__ss);
433 if (getpeername(STDIN_FILENO, sa, &sa_size) < 0) {
462 doit(sa, sa_size);
/freebsd-13-stable/sys/dev/bhnd/siba/
H A Dsibavar.h157 uint32_t sa_size; /**< size */ member in struct:siba_addrspace
H A Dsiba_subr.c547 sa->sa_size = size;
H A Dsiba.c1110 *size = addrspace->sa_size - addrspace->sa_bus_reserved;
/freebsd-13-stable/sys/contrib/openzfs/module/zfs/
H A Dsa.c356 bulk[i].sa_size == bulk[i].sa_length) {
373 bulk[i].sa_size);
380 bulk[i].sa_size == bulk[i].sa_length) {
762 attr_desc[i].sa_size = length;
1518 error = zfs_uiomove((void *)bulk.sa_addr, MIN(bulk.sa_size,
2065 sa_size(sa_handle_t *hdl, sa_attr_type_t attr, int *size) function
2080 *size = bulk.sa_size;
2237 EXPORT_SYMBOL(sa_size); variable
H A Dzfs_sa.c201 error = sa_size(zp->z_sa_hdl, SA_ZPL_DXATTR(zfsvfs), &size);
/freebsd-13-stable/crypto/heimdal/kdc/
H A Dconnect.c254 krb5_socklen_t sa_size = sizeof(__ss); local
258 ret = krb5_addr2sockaddr (context, a, sa, &sa_size, port);
284 if(rk_IS_SOCKET_ERROR(bind(d->s, sa, sa_size))){
/freebsd-13-stable/sys/contrib/openzfs/module/os/linux/zfs/
H A Dzpl_xattr.c540 size_t sa_size; local
564 error = -nvlist_size(nvl, &sa_size, NV_ENCODE_XDR);
568 if (sa_size > DXATTR_MAX_SA_SIZE)
/freebsd-13-stable/sys/nfs/
H A Dnfsproto.h623 u_int32_t sa_size; member in struct:nfsv2_sattr
/freebsd-13-stable/sys/fs/nfs/
H A Dnfsproto.h862 u_int32_t sa_size; member in struct:nfsv2_sattr
H A Dnfs_commonsubs.c518 sp->sa_size = 0;
520 sp->sa_size = newnfs_xdrneg1;
522 sp->sa_size = txdr_unsigned(rdev);
524 sp->sa_size = txdr_unsigned(vap->va_size);
/freebsd-13-stable/crypto/heimdal/lib/hx509/
H A Dcert.c2444 * @param sa_size length of address
2458 /* XXX krb5_socklen_t */ int sa_size)
2465 if (sa && sa_size <= 0)
2452 hx509_verify_hostname(hx509_context context, const hx509_cert cert, int flags, hx509_hostname_type type, const char *hostname, const struct sockaddr *sa, int sa_size) argument

Completed in 702 milliseconds

12