/freebsd-13-stable/crypto/heimdal/lib/gssapi/krb5/ |
H A D | address_to_krb5addr.c | 47 krb5_socklen_t sa_size = sizeof(sa); local 69 &sa_size,
|
/freebsd-13-stable/crypto/heimdal/kpasswd/ |
H A D | kpasswdd.c | 71 int sa_size, 97 msghdr.msg_namelen = sa_size; 147 int sa_size, 185 send_reply (s, sa, sa_size, NULL, &error_data); 193 int sa_size, 223 send_reply (s, sa, sa_size, &ap_rep_data, &krb_priv_data); 230 * (`sa', `sa_size') to `pwd_data'. 239 int sa_size, 259 reply_priv (auth_context, s, sa, sa_size, KRB5_KPASSWD_MALFORMED, 271 reply_priv (auth_context, s, sa, sa_size, KRB5_KPASSWD_MALFORME 69 send_reply(int s, struct sockaddr *sa, int sa_size, krb5_data *ap_rep, krb5_data *rest) argument 144 reply_error(krb5_realm realm, int s, struct sockaddr *sa, int sa_size, krb5_error_code error_code, uint16_t result_code, const char *expl) argument 190 reply_priv(krb5_auth_context auth_context, int s, struct sockaddr *sa, int sa_size, uint16_t result_code, const char *expl) argument 234 change(krb5_auth_context auth_context, krb5_principal admin_principal, uint16_t version, int s, struct sockaddr *sa, int sa_size, krb5_data *in_data) argument 432 verify(krb5_auth_context *auth_context, krb5_realm *realms, krb5_keytab keytab, krb5_ticket **ticket, krb5_data *out_data, uint16_t *version, int s, struct sockaddr *sa, int sa_size, u_char *msg, size_t len, krb5_address *client_addr) argument 579 process(krb5_realm *realms, krb5_keytab keytab, int s, krb5_address *this_addr, struct sockaddr *sa, int sa_size, u_char *msg, int len) argument 682 krb5_socklen_t sa_size = sizeof(__ss); local [all...] |
/freebsd-13-stable/crypto/heimdal/lib/krb5/ |
H A D | addr_families.c | 43 krb5_socklen_t *sa_size, int port); 85 krb5_socklen_t *sa_size, 94 memcpy(sa, &tmp, min(sizeof(tmp), *sa_size)); 95 *sa_size = sizeof(tmp); 101 krb5_socklen_t *sa_size, 110 memcpy(sa, &tmp, min(sizeof(tmp), *sa_size)); 111 *sa_size = sizeof(tmp); 152 ipv4_anyaddr (struct sockaddr *sa, krb5_socklen_t *sa_size, int port) argument 160 memcpy(sa, &tmp, min(sizeof(tmp), *sa_size)); 161 *sa_size 83 ipv4_addr2sockaddr(const krb5_address *a, struct sockaddr *sa, krb5_socklen_t *sa_size, int port) argument 99 ipv4_h_addr2sockaddr(const char *addr, struct sockaddr *sa, krb5_socklen_t *sa_size, int port) argument 276 ipv6_addr2sockaddr(const krb5_address *a, struct sockaddr *sa, krb5_socklen_t *sa_size, int port) argument 292 ipv6_h_addr2sockaddr(const char *addr, struct sockaddr *sa, krb5_socklen_t *sa_size, int port) argument 339 ipv6_anyaddr(struct sockaddr *sa, krb5_socklen_t *sa_size, int port) argument 913 krb5_addr2sockaddr(krb5_context context, const krb5_address *addr, struct sockaddr *sa, krb5_socklen_t *sa_size, int port) argument 1010 krb5_h_addr2sockaddr(krb5_context context, int af, const char *addr, struct sockaddr *sa, krb5_socklen_t *sa_size, int port) argument 1072 krb5_anyaddr(krb5_context context, int af, struct sockaddr *sa, krb5_socklen_t *sa_size, int port) argument [all...] |
/freebsd-13-stable/sys/contrib/openzfs/include/sys/ |
H A D | sa.h | 82 uint16_t sa_size; member in struct:sa_bulk_attr 136 int sa_size(sa_handle_t *, sa_attr_type_t, int *);
|
H A D | sa_impl.h | 259 bulk.sa_size = SA_ATTR_LEN(sa, idx, attr, hdr); \
|
/freebsd-13-stable/crypto/openssh/ |
H A D | loginrec.h | 114 const unsigned int sa_size);
|
H A D | loginrec.c | 420 const unsigned int sa_size) 422 unsigned int bufsize = sa_size; 425 if (sizeof(li->hostaddr) < sa_size) 419 login_set_addr(struct logininfo *li, const struct sockaddr *sa, const unsigned int sa_size) argument
|
/freebsd-13-stable/crypto/heimdal/kadmin/ |
H A D | kadmind.c | 179 socklen_t sa_size = sizeof(__ss); 186 if(roken_getsockname(STDIN_FILENO, sa, &sa_size) < 0 &&
|
H A D | kadm_conn.c | 130 socklen_t sa_size = sizeof(__ss); local 137 s = accept(socks[this_sock], sa, &sa_size);
|
/freebsd-13-stable/contrib/ofed/opensm/libvendor/ |
H A D | osm_vendor_ibumad_sa.c | 342 uint32_t sa_size; local 402 p_sa_mad_data->attr_offset ? (sa_size = ib_get_attr_size(p_sa_mad_data->attr_offset)) : (sa_size = IB_SA_DATA_SIZE); 403 memcpy(p_sa_mad->data, p_sa_mad_data->p_attr, sa_size);
|
H A D | osm_vendor_mlx_sa.c | 431 uint32_t sa_size; local 490 p_sa_mad_data->attr_offset ? (sa_size = ib_get_attr_size(p_sa_mad_data->attr_offset)) : (sa_size = IB_SA_DATA_SIZE); 491 memcpy(p_sa_mad->data, p_sa_mad_data->p_attr, sa_size);
|
/freebsd-13-stable/contrib/tcpdump/ |
H A D | nfs.h | 361 uint32_t sa_size; member in struct:nfsv2_sattr 377 uint32_t sa_size; member in struct:nfsv3_sattr
|
H A D | print-nfs.c | 268 sa3->sa_size = EXTRACT_32BITS(dp);
|
/freebsd-13-stable/crypto/heimdal/appl/telnet/telnetd/ |
H A D | telnetd.c | 152 socklen_t sa_size; local 432 sa_size = sizeof (__ss); 433 if (getpeername(STDIN_FILENO, sa, &sa_size) < 0) { 462 doit(sa, sa_size);
|
/freebsd-13-stable/sys/dev/bhnd/siba/ |
H A D | sibavar.h | 157 uint32_t sa_size; /**< size */ member in struct:siba_addrspace
|
H A D | siba_subr.c | 547 sa->sa_size = size;
|
H A D | siba.c | 1110 *size = addrspace->sa_size - addrspace->sa_bus_reserved;
|
/freebsd-13-stable/sys/contrib/openzfs/module/zfs/ |
H A D | sa.c | 356 bulk[i].sa_size == bulk[i].sa_length) { 373 bulk[i].sa_size); 380 bulk[i].sa_size == bulk[i].sa_length) { 762 attr_desc[i].sa_size = length; 1518 error = zfs_uiomove((void *)bulk.sa_addr, MIN(bulk.sa_size, 2065 sa_size(sa_handle_t *hdl, sa_attr_type_t attr, int *size) function 2080 *size = bulk.sa_size; 2237 EXPORT_SYMBOL(sa_size); variable
|
H A D | zfs_sa.c | 201 error = sa_size(zp->z_sa_hdl, SA_ZPL_DXATTR(zfsvfs), &size);
|
/freebsd-13-stable/crypto/heimdal/kdc/ |
H A D | connect.c | 254 krb5_socklen_t sa_size = sizeof(__ss); local 258 ret = krb5_addr2sockaddr (context, a, sa, &sa_size, port); 284 if(rk_IS_SOCKET_ERROR(bind(d->s, sa, sa_size))){
|
/freebsd-13-stable/sys/contrib/openzfs/module/os/linux/zfs/ |
H A D | zpl_xattr.c | 540 size_t sa_size; local 564 error = -nvlist_size(nvl, &sa_size, NV_ENCODE_XDR); 568 if (sa_size > DXATTR_MAX_SA_SIZE)
|
/freebsd-13-stable/sys/nfs/ |
H A D | nfsproto.h | 623 u_int32_t sa_size; member in struct:nfsv2_sattr
|
/freebsd-13-stable/sys/fs/nfs/ |
H A D | nfsproto.h | 862 u_int32_t sa_size; member in struct:nfsv2_sattr
|
H A D | nfs_commonsubs.c | 518 sp->sa_size = 0; 520 sp->sa_size = newnfs_xdrneg1; 522 sp->sa_size = txdr_unsigned(rdev); 524 sp->sa_size = txdr_unsigned(vap->va_size);
|
/freebsd-13-stable/crypto/heimdal/lib/hx509/ |
H A D | cert.c | 2444 * @param sa_size length of address 2458 /* XXX krb5_socklen_t */ int sa_size) 2465 if (sa && sa_size <= 0) 2452 hx509_verify_hostname(hx509_context context, const hx509_cert cert, int flags, hx509_hostname_type type, const char *hostname, const struct sockaddr *sa, int sa_size) argument
|