/netbsd-6-1-5-RELEASE/lib/libc/rpc/ |
H A D | bindresvport.c | 93 socklen_t salen; local 97 salen = sizeof(myaddr); 100 if (getsockname(sd, sa, &salen) == -1) 104 memset(sa, 0, salen); 114 salen = sizeof(struct sockaddr_in); 123 salen = sizeof(struct sockaddr_in6); 132 sa->sa_len = salen; 146 error = bind(sd, sa, salen); 160 if (getsockname(sd, sa, &salen) < 0)
|
/netbsd-6-1-5-RELEASE/tests/fs/common/nfsrpc/ |
H A D | bindresvport.c | 90 socklen_t salen; local 94 salen = sizeof(myaddr); 97 if (getsockname(sd, sa, &salen) == -1) 101 memset(sa, 0, salen); 111 salen = sizeof(struct sockaddr_in); 120 salen = sizeof(struct sockaddr_in6); 129 sa->sa_len = salen; 143 error = bind(sd, sa, salen); 157 if (getsockname(sd, sa, &salen) < 0)
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/krb5/ |
H A D | sock_principal.c | 48 socklen_t salen = sizeof(__ss); local 51 if (getsockname (sock, sa, &salen) < 0) { 56 ret = getnameinfo (sa, salen, hostname, sizeof(hostname), NULL, 0, 0);
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/roken/ |
H A D | getnameinfo_verified.c | 41 * Try to obtain a verified name for the address in `sa, salen' (much 49 getnameinfo_verified(const struct sockaddr *sa, socklen_t salen, argument 69 ret = getnameinfo (sa, salen, host, hostlen, serv, servlen, 93 ret = getnameinfo (sa, salen, host, hostlen, serv, servlen,
|
H A D | getnameinfo.c | 97 getnameinfo(const struct sockaddr *sa, socklen_t salen, argument
|
H A D | getifaddrs.c | 927 size_t salen; local 933 salen = sizeof(struct sockaddr); 935 salen = sa->sa_len; 939 salen = SA_LEN(sa); 963 (*end)->ifa_addr = malloc(salen); 968 memcpy((*end)->ifa_addr, sa, salen); 1073 size_t salen; local 1079 salen = sizeof(struct sockaddr_storage); 1081 salen = sa->sa_len; 1085 salen [all...] |
/netbsd-6-1-5-RELEASE/lib/libwrap/ |
H A D | rfc931.c | 96 int salen; local 107 salen = sizeof(struct sockaddr_in); 112 salen = sizeof(struct sockaddr_in6); 169 memcpy(&our_query_sin, our_sin, salen); 182 memcpy(&rmt_query_sin, rmt_sin, salen); 197 salen) >= 0 && 199 salen) >= 0) {
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/contrib/queryperf/missing/ |
H A D | getnameinfo.c | 86 getnameinfo(sa, salen, host, hostlen, serv, servlen, flags) 88 size_t salen; 111 if (len != salen) return ENI_SALEN; 113 len = salen;
|
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/util/ |
H A D | myaddrinfo.h | 199 #define SOCKADDR_TO_HOSTADDR(sa, salen, host, port, sock) \ 202 _aierr = sockaddr_to_hostaddr((sa), (salen), (host), (port), (sock)); \ 207 #define SOCKADDR_TO_HOSTNAME(sa, salen, host, service, sock) \ 210 _aierr = sockaddr_to_hostname((sa), (salen), (host), (service), (sock)); \
|
H A D | myaddrinfo.c | 40 /* int sockaddr_to_hostaddr(sa, salen, hostaddr, portnum, socktype) 42 /* SOCKADDR_SIZE salen; 47 /* int sockaddr_to_hostname(sa, salen, hostname, service, socktype) 49 /* SOCKADDR_SIZE salen; 138 /* .IP salen 582 int sockaddr_to_hostaddr(const struct sockaddr * sa, SOCKADDR_SIZE salen, argument 619 ret = getnameinfo(sa, salen, 633 int sockaddr_to_hostname(const struct sockaddr * sa, SOCKADDR_SIZE salen, argument 699 err = getnameinfo(sa, salen,
|
/netbsd-6-1-5-RELEASE/lib/libc/net/ |
H A D | getnameinfo.c | 118 getnameinfo(sa, salen, host, hostlen, serv, servlen, flags) 120 socklen_t salen; 128 return getnameinfo_atalk(sa, salen, host, hostlen, 132 return getnameinfo_inet(sa, salen, host, hostlen, 135 return getnameinfo_link(sa, salen, host, hostlen, 148 getnameinfo_atalk(const struct sockaddr *sa, socklen_t salen, argument 207 getnameinfo_inet(sa, salen, host, hostlen, serv, servlen, flags) 209 socklen_t salen; 242 if (salen != afd->a_socklen) 501 getnameinfo_link(const struct sockaddr *sa, socklen_t salen, argument [all...] |
H A D | rcmd.c | 508 socklen_t salen; local 521 salen = sizeof(struct sockaddr_in); 529 salen = sizeof(struct sockaddr_in6); 562 if (bind(s, sa, salen) >= 0) 750 __ivaliduser_sa(FILE *hostf, const struct sockaddr *raddr, socklen_t salen, argument 807 rhost = __gethostloop(raddr, salen); 818 hostok = __icheckhost(raddr, salen, &ahost[1]); 829 rhost = __gethostloop(raddr, salen); 841 -__icheckhost(raddr, salen, &ahost[1]); 845 hostok = __icheckhost(raddr, salen, ahos 901 __icheckhost(const struct sockaddr *raddr, socklen_t salen, const char *lhost) argument 949 __gethostloop(const struct sockaddr *raddr, socklen_t salen) argument [all...] |
/netbsd-6-1-5-RELEASE/crypto/dist/ipsec-tools/src/setkey/ |
H A D | parse.y | 956 int salen; 1002 salen = sysdep_sa_len(s->ai_addr); 1004 PFKEY_ALIGN8(salen)); 1012 sizeof(m_addr), (caddr_t)sa, salen); 1016 salen = sysdep_sa_len(d->ai_addr); 1018 PFKEY_ALIGN8(salen)); 1026 sizeof(m_addr), sa, salen); 1152 int salen; 1213 salen = sysdep_sa_len(s->ai_addr); 1215 PFKEY_ALIGN8(salen)); [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/contrib/idn/idnkit-1.0-src/tools/runidn/ |
H A D | stub.h | 91 idn_stub_getnameinfo(const struct sockaddr *sa, GNI_SALEN_T salen,
|
H A D | stub.c | 375 idn_stub_getnameinfo(const struct sockaddr *sa, GNI_SALEN_T salen, argument 378 static int (*fp)(const struct sockaddr *sa, GNI_SALEN_T salen, 386 return ((*fp)(sa, salen, host, hostlen, serv, servlen, flags));
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/contrib/idn/idnkit-1.0-src/wsock/wsock20/ |
H A D | dlldef.h | 122 _org_getnameinfo(LPVOID sa, DWORD salen, char* host, DWORD hostlen,
|
/netbsd-6-1-5-RELEASE/external/bsd/libbind/dist/irs/ |
H A D | getnameinfo.c | 102 getnameinfo(sa, salen, host, hostlen, serv, servlen, flags) 104 size_t salen; 130 if (len != salen) return EAI_FAIL; 142 if (salen != afd->a_socklen) return EAI_FAIL;
|
/netbsd-6-1-5-RELEASE/external/bsd/tcpdump/dist/missing/ |
H A D | getnameinfo.c | 100 getnameinfo(sa, salen, host, hostlen, serv, servlen, flags) 102 size_t salen; 124 if (sa->sa_len != salen) 137 if (salen != afd->a_socklen)
|
/netbsd-6-1-5-RELEASE/sys/compat/linux/common/ |
H A D | linux_socket.c | 1467 const struct osockaddr *osa, unsigned int salen) 1474 if (salen == 1 || salen > UCHAR_MAX) { 1475 DPRINTF(("bad osa=%p salen=%d\n", osa, salen)); 1481 if (salen > MLEN) 1482 MEXTMALLOC(m, salen, M_WAITOK); 1484 m->m_len = salen; 1486 if (salen == 0) { 1492 if ((error = copyin(osa, kosa, salen))) { 1466 linux_get_sa(struct lwp *l, int s, struct mbuf **mp, const struct osockaddr *osa, unsigned int salen) argument [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kdc/ |
H A D | kdc-replay.c | 123 krb5_socklen_t salen = sizeof(sa); local 155 &salen, 88);
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/lwres/ |
H A D | context.c | 296 LWRES_SOCKADDR_LEN_T salen; local 320 salen = sizeof(sin); 328 salen = sizeof(sin6); 344 ret = connect(s, sa, salen);
|
H A D | getnameinfo.c | 64 * sockaddr sa which is salen bytes long. The hostname is of length 163 lwres_getnameinfo(const struct sockaddr *sa, size_t salen, char *host, argument 194 if (len != salen) 207 if (salen != afd->a_socklen)
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/irs/ |
H A D | getnameinfo.c | 54 * salen bytes long. The hostname is of length hostlen and is returned via 148 getnameinfo(const struct sockaddr *sa, socklen_t salen, char *host, argument 176 if (len != salen) 189 if (salen != afd->a_socklen)
|
/netbsd-6-1-5-RELEASE/external/bsd/openldap/dist/libraries/libldap/ |
H A D | os-local.c | 200 ber_socklen_t salen = sizeof(*sa); local 239 getpeername( s, (struct sockaddr *) sa, &salen ); 241 write( fds[1], sa, salen );
|
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/smtp/ |
H A D | smtp_connect.c | 179 SOCKADDR_SIZE salen = sizeof(ss); local 190 if (dns_rr_to_sa(addr, port, sa, &salen) != 0) { 271 SOCKADDR_TO_HOSTADDR(sa, salen, &hostaddr, (MAI_SERVPORT_STR *) 0, 0); 276 return (smtp_connect_sock(sock, sa, salen, SMTP_HNAME(addr), hostaddr.buf, 283 int salen, const char *name, 298 conn_stat = timed_connect(sock, sa, salen, var_smtp_conn_tmout); 303 conn_stat = sane_connect(sock, sa, salen); 282 smtp_connect_sock(int sock, struct sockaddr * sa, int salen, const char *name, const char *addr, unsigned port, const char *destination, DSN_BUF *why, int sess_flags) argument
|