/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/sunrpc/ |
H A D | addr.c | 266 char addrbuf[RPCBIND_MAXUADDRLEN]; local 271 if (rpc_ntop4(sap, addrbuf, sizeof(addrbuf)) == 0) 276 if (rpc_ntop6_noscopeid(sap, addrbuf, sizeof(addrbuf)) == 0) 288 if (strlcat(addrbuf, portbuf, sizeof(addrbuf)) > sizeof(addrbuf)) 291 return kstrdup(addrbuf, GFP_KERNEL);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/ |
H A D | hostip6.c | 173 char addrbuf[128]; local 202 if((1 == Curl_inet_pton(AF_INET, hostname, addrbuf)) || 203 (1 == Curl_inet_pton(AF_INET6, hostname, addrbuf))) {
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/transmission/libevent-2.0.20-stable/sample/ |
H A D | http-server.c | 369 char addrbuf[128]; local 390 addr = evutil_inet_ntop(ss.ss_family, inaddr, addrbuf, 391 sizeof(addrbuf));
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/transmission/libevent-2.0.20-stable/ |
H A D | evdns.c | 545 char addrbuf[128]; local 550 addrbuf, sizeof(addrbuf))); 561 char addrbuf[128]; local 571 addrbuf, sizeof(addrbuf)), 589 addrbuf, sizeof(addrbuf))); 619 char addrbuf[128]; local 625 addrbuf, sizeo 848 char addrbuf[128]; local 1353 char addrbuf[128]; local 1460 char addrbuf[128]; local 2282 char addrbuf[128]; local 2451 char addrbuf[128]; local [all...] |
H A D | listener.c | 456 char addrbuf[1]; member in struct:accepting_socket 560 if (ext->AcceptEx(as->lev->fd, s, as->addrbuf, 0, 624 as->addrbuf, 0, as->buflen/2, as->buflen/2,
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iputils/ |
H A D | ping_common.c | 504 char addrbuf[128]; local 585 msg.msg_name = addrbuf; 586 msg.msg_namelen = sizeof(addrbuf); 625 not_ours = parse_reply(&msg, cc, addrbuf, recv_timep);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/zebra/bgpd/ |
H A D | bgp_debug.c | 172 char addrbuf[BUFSIZ]; local 178 addrbuf, BUFSIZ)); 183 addrbuf, BUFSIZ));
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/transmission/transmission-2.73/third-party/libutp/ |
H A D | utp.cpp | 91 char addrbuf[65];
variable 863 this, addrfmt(addr, addrbuf), (uint)length, conn_id_send, time, reply_micro, flagnames[flags],
1002 LOG_UTPV("%s: Sending RST id:%u seq_nr:%u ack_nr:%u", addrfmt(addr, addrbuf), conn_id_send, seq_nr, ack_nr);
1003 LOG_UTPV("send %s len:%u id:%u", addrfmt(addr, addrbuf), (uint)len, conn_id_send);
2504 // conn, addrfmt(conn->addr, addrbuf), conn_seed);
2522 LOG_UTPV("recv %s len:%u too small", addrfmt(addr, addrbuf), (uint)len);
2533 LOG_UTPV("recv %s len:%u version:%u too small", addrfmt(addr, addrbuf), (uint)len, version);
2538 LOG_UTPV("recv %s len:%u version:%u too small", addrfmt(addr, addrbuf), (uint)len, version);
2542 LOG_UTPV("recv %s len:%u id:%u", addrfmt(addr, addrbuf), (uint)len, id);
2558 // addrfmt(conn->addr, addrbuf), addrfm [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/dhcp6/ |
H A D | common.c | 584 static char addrbuf[8][NI_MAXHOST]; local 589 cp = addrbuf[round];
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/dhcp6/ |
H A D | common.c | 584 static char addrbuf[8][NI_MAXHOST]; local 589 cp = addrbuf[round];
|