Searched refs:salen (Results 1 - 25 of 37) sorted by relevance

12

/netbsd-6-1-5-RELEASE/lib/libc/rpc/
H A Dbindresvport.c93 socklen_t salen; local
97 salen = sizeof(myaddr);
100 if (getsockname(sd, sa, &salen) == -1)
104 memset(sa, 0, salen);
114 salen = sizeof(struct sockaddr_in);
123 salen = sizeof(struct sockaddr_in6);
132 sa->sa_len = salen;
146 error = bind(sd, sa, salen);
160 if (getsockname(sd, sa, &salen) < 0)
/netbsd-6-1-5-RELEASE/tests/fs/common/nfsrpc/
H A Dbindresvport.c90 socklen_t salen; local
94 salen = sizeof(myaddr);
97 if (getsockname(sd, sa, &salen) == -1)
101 memset(sa, 0, salen);
111 salen = sizeof(struct sockaddr_in);
120 salen = sizeof(struct sockaddr_in6);
129 sa->sa_len = salen;
143 error = bind(sd, sa, salen);
157 if (getsockname(sd, sa, &salen) < 0)
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/krb5/
H A Dsock_principal.c48 socklen_t salen = sizeof(__ss); local
51 if (getsockname (sock, sa, &salen) < 0) {
56 ret = getnameinfo (sa, salen, hostname, sizeof(hostname), NULL, 0, 0);
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/roken/
H A Dgetnameinfo_verified.c41 * Try to obtain a verified name for the address in `sa, salen' (much
49 getnameinfo_verified(const struct sockaddr *sa, socklen_t salen, argument
69 ret = getnameinfo (sa, salen, host, hostlen, serv, servlen,
93 ret = getnameinfo (sa, salen, host, hostlen, serv, servlen,
H A Dgetnameinfo.c97 getnameinfo(const struct sockaddr *sa, socklen_t salen, argument
H A Dgetifaddrs.c927 size_t salen; local
933 salen = sizeof(struct sockaddr);
935 salen = sa->sa_len;
939 salen = SA_LEN(sa);
963 (*end)->ifa_addr = malloc(salen);
968 memcpy((*end)->ifa_addr, sa, salen);
1073 size_t salen; local
1079 salen = sizeof(struct sockaddr_storage);
1081 salen = sa->sa_len;
1085 salen
[all...]
/netbsd-6-1-5-RELEASE/lib/libwrap/
H A Drfc931.c96 int salen; local
107 salen = sizeof(struct sockaddr_in);
112 salen = sizeof(struct sockaddr_in6);
169 memcpy(&our_query_sin, our_sin, salen);
182 memcpy(&rmt_query_sin, rmt_sin, salen);
197 salen) >= 0 &&
199 salen) >= 0) {
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/contrib/queryperf/missing/
H A Dgetnameinfo.c86 getnameinfo(sa, salen, host, hostlen, serv, servlen, flags)
88 size_t salen;
111 if (len != salen) return ENI_SALEN;
113 len = salen;
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/util/
H A Dmyaddrinfo.h199 #define SOCKADDR_TO_HOSTADDR(sa, salen, host, port, sock) \
202 _aierr = sockaddr_to_hostaddr((sa), (salen), (host), (port), (sock)); \
207 #define SOCKADDR_TO_HOSTNAME(sa, salen, host, service, sock) \
210 _aierr = sockaddr_to_hostname((sa), (salen), (host), (service), (sock)); \
H A Dmyaddrinfo.c40 /* int sockaddr_to_hostaddr(sa, salen, hostaddr, portnum, socktype)
42 /* SOCKADDR_SIZE salen;
47 /* int sockaddr_to_hostname(sa, salen, hostname, service, socktype)
49 /* SOCKADDR_SIZE salen;
138 /* .IP salen
582 int sockaddr_to_hostaddr(const struct sockaddr * sa, SOCKADDR_SIZE salen, argument
619 ret = getnameinfo(sa, salen,
633 int sockaddr_to_hostname(const struct sockaddr * sa, SOCKADDR_SIZE salen, argument
699 err = getnameinfo(sa, salen,
/netbsd-6-1-5-RELEASE/lib/libc/net/
H A Dgetnameinfo.c118 getnameinfo(sa, salen, host, hostlen, serv, servlen, flags)
120 socklen_t salen;
128 return getnameinfo_atalk(sa, salen, host, hostlen,
132 return getnameinfo_inet(sa, salen, host, hostlen,
135 return getnameinfo_link(sa, salen, host, hostlen,
148 getnameinfo_atalk(const struct sockaddr *sa, socklen_t salen, argument
207 getnameinfo_inet(sa, salen, host, hostlen, serv, servlen, flags)
209 socklen_t salen;
242 if (salen != afd->a_socklen)
501 getnameinfo_link(const struct sockaddr *sa, socklen_t salen, argument
[all...]
H A Drcmd.c508 socklen_t salen; local
521 salen = sizeof(struct sockaddr_in);
529 salen = sizeof(struct sockaddr_in6);
562 if (bind(s, sa, salen) >= 0)
750 __ivaliduser_sa(FILE *hostf, const struct sockaddr *raddr, socklen_t salen, argument
807 rhost = __gethostloop(raddr, salen);
818 hostok = __icheckhost(raddr, salen, &ahost[1]);
829 rhost = __gethostloop(raddr, salen);
841 -__icheckhost(raddr, salen, &ahost[1]);
845 hostok = __icheckhost(raddr, salen, ahos
901 __icheckhost(const struct sockaddr *raddr, socklen_t salen, const char *lhost) argument
949 __gethostloop(const struct sockaddr *raddr, socklen_t salen) argument
[all...]
/netbsd-6-1-5-RELEASE/crypto/dist/ipsec-tools/src/setkey/
H A Dparse.y956 int salen;
1002 salen = sysdep_sa_len(s->ai_addr);
1004 PFKEY_ALIGN8(salen));
1012 sizeof(m_addr), (caddr_t)sa, salen);
1016 salen = sysdep_sa_len(d->ai_addr);
1018 PFKEY_ALIGN8(salen));
1026 sizeof(m_addr), sa, salen);
1152 int salen;
1213 salen = sysdep_sa_len(s->ai_addr);
1215 PFKEY_ALIGN8(salen));
[all...]
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/contrib/idn/idnkit-1.0-src/tools/runidn/
H A Dstub.h91 idn_stub_getnameinfo(const struct sockaddr *sa, GNI_SALEN_T salen,
H A Dstub.c375 idn_stub_getnameinfo(const struct sockaddr *sa, GNI_SALEN_T salen, argument
378 static int (*fp)(const struct sockaddr *sa, GNI_SALEN_T salen,
386 return ((*fp)(sa, salen, host, hostlen, serv, servlen, flags));
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/contrib/idn/idnkit-1.0-src/wsock/wsock20/
H A Ddlldef.h122 _org_getnameinfo(LPVOID sa, DWORD salen, char* host, DWORD hostlen,
/netbsd-6-1-5-RELEASE/external/bsd/libbind/dist/irs/
H A Dgetnameinfo.c102 getnameinfo(sa, salen, host, hostlen, serv, servlen, flags)
104 size_t salen;
130 if (len != salen) return EAI_FAIL;
142 if (salen != afd->a_socklen) return EAI_FAIL;
/netbsd-6-1-5-RELEASE/external/bsd/tcpdump/dist/missing/
H A Dgetnameinfo.c100 getnameinfo(sa, salen, host, hostlen, serv, servlen, flags)
102 size_t salen;
124 if (sa->sa_len != salen)
137 if (salen != afd->a_socklen)
/netbsd-6-1-5-RELEASE/sys/compat/linux/common/
H A Dlinux_socket.c1467 const struct osockaddr *osa, unsigned int salen)
1474 if (salen == 1 || salen > UCHAR_MAX) {
1475 DPRINTF(("bad osa=%p salen=%d\n", osa, salen));
1481 if (salen > MLEN)
1482 MEXTMALLOC(m, salen, M_WAITOK);
1484 m->m_len = salen;
1486 if (salen == 0) {
1492 if ((error = copyin(osa, kosa, salen))) {
1466 linux_get_sa(struct lwp *l, int s, struct mbuf **mp, const struct osockaddr *osa, unsigned int salen) argument
[all...]
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kdc/
H A Dkdc-replay.c123 krb5_socklen_t salen = sizeof(sa); local
155 &salen, 88);
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/lwres/
H A Dcontext.c296 LWRES_SOCKADDR_LEN_T salen; local
320 salen = sizeof(sin);
328 salen = sizeof(sin6);
344 ret = connect(s, sa, salen);
H A Dgetnameinfo.c64 * sockaddr sa which is salen bytes long. The hostname is of length
163 lwres_getnameinfo(const struct sockaddr *sa, size_t salen, char *host, argument
194 if (len != salen)
207 if (salen != afd->a_socklen)
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/irs/
H A Dgetnameinfo.c54 * salen bytes long. The hostname is of length hostlen and is returned via
148 getnameinfo(const struct sockaddr *sa, socklen_t salen, char *host, argument
176 if (len != salen)
189 if (salen != afd->a_socklen)
/netbsd-6-1-5-RELEASE/external/bsd/openldap/dist/libraries/libldap/
H A Dos-local.c200 ber_socklen_t salen = sizeof(*sa); local
239 getpeername( s, (struct sockaddr *) sa, &salen );
241 write( fds[1], sa, salen );
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/smtp/
H A Dsmtp_connect.c179 SOCKADDR_SIZE salen = sizeof(ss); local
190 if (dns_rr_to_sa(addr, port, sa, &salen) != 0) {
271 SOCKADDR_TO_HOSTADDR(sa, salen, &hostaddr, (MAI_SERVPORT_STR *) 0, 0);
276 return (smtp_connect_sock(sock, sa, salen, SMTP_HNAME(addr), hostaddr.buf,
283 int salen, const char *name,
298 conn_stat = timed_connect(sock, sa, salen, var_smtp_conn_tmout);
303 conn_stat = sane_connect(sock, sa, salen);
282 smtp_connect_sock(int sock, struct sockaddr * sa, int salen, const char *name, const char *addr, unsigned port, const char *destination, DSN_BUF *why, int sess_flags) argument

Completed in 247 milliseconds

12