/xnu-2422.115.4/bsd/netinet/ |
H A D | ip_encap.c | 376 if (sp->sa_len > sizeof(ep->src) || dp->sa_len > sizeof(ep->dst)) { 380 if (sp->sa_len != dp->sa_len) { 395 if (ep->src.ss_len != sp->sa_len || 396 bcmp(&ep->src, sp, sp->sa_len) != 0 || 397 bcmp(&ep->srcmask, sm, sp->sa_len) != 0) 399 if (ep->dst.ss_len != dp->sa_len || 400 bcmp(&ep->dst, dp, dp->sa_len) != 0 || 401 bcmp(&ep->dstmask, dm, dp->sa_len) ! [all...] |
H A D | mptcp_usrreq.c | 446 *src_len = se->se_addr->sa_len; 448 error = copyout(se->se_addr, src, se->se_addr->sa_len); 456 *dst_len = se->se_addr->sa_len; 458 error = copyout(se->se_addr, dst, se->se_addr->sa_len);
|
H A D | raw_ip.c | 895 if (nam->sa_len != sizeof (struct sockaddr_in)) 935 if (nam->sa_len != sizeof(*addr))
|
/xnu-2422.115.4/bsd/net/ |
H A D | if_gif.c | 727 /* validate sa_len */ 731 if (src->sa_len != sizeof (struct sockaddr_in)) 737 if (src->sa_len != sizeof (struct sockaddr_in6)) 747 if (dst->sa_len != sizeof (struct sockaddr_in)) 753 if (dst->sa_len != sizeof (struct sockaddr_in6)) 811 sc2->gif_pdst->sa_len != dst->sa_len || 813 sc2->gif_psrc->sa_len != src->sa_len) { 819 if (bcmp(sc2->gif_pdst, dst, dst->sa_len) [all...] |
H A D | route.c | 205 #define equal(a1, a2) (bcmp((caddr_t)(a1), (caddr_t)(a2), (a1)->sa_len) == 0) 332 (sa)->sa_len < sizeof (struct sockaddr_in)) \ 338 (sa)->sa_len < sizeof (struct sockaddr_in6)) \ 657 if (sa->sa_len <= skip) 660 for (cp = base + (sa->sa_len - skip); cp > base && cp[-1] == 0; ) 663 sa->sa_len = (cp - base) + skip; 664 if (sa->sa_len < skip) { 666 panic("%s: broken logic (sa_len %d < skip %d )", __func__, 667 sa->sa_len, skip); 669 } else if (sa->sa_len [all...] |
H A D | ndrv.c | 285 nam->sa_len, M_IFADDR, M_WAITOK); 289 bcopy((caddr_t) nam, (caddr_t) np->nd_faddr, nam->sa_len); 905 if (result == 0 && sopt->sopt_valsize != ndrv_multi->addr.sa_len) 957 if (result == 0 && sopt->sopt_valsize != multi_addr->sa_len) 1015 if ((inAddr->sa_len == cur->addr.sa_len) && 1016 (bcmp(&cur->addr, inAddr, inAddr->sa_len) == 0))
|
H A D | kpi_interface.c | 1685 * size of SA(if_lladdr)->sa_len. 2166 copylen = (addr_size >= ifa->ifa_addr->sa_len) ? 2167 ifa->ifa_addr->sa_len : addr_size; 2170 if (ifa->ifa_addr->sa_len > addr_size) { 2193 copylen = (addr_size >= ifa->ifa_dstaddr->sa_len) ? 2194 ifa->ifa_dstaddr->sa_len : addr_size; 2197 if (ifa->ifa_dstaddr->sa_len > addr_size) { 2220 copylen = addr_size >= ifa->ifa_netmask->sa_len ? 2221 ifa->ifa_netmask->sa_len : addr_size; 2224 if (ifa->ifa_netmask->sa_len > addr_siz [all...] |
H A D | rtsock.c | 153 (x += ROUNDUP32((n)->sa_len)) 374 info.rti_info[RTAX_DST]->sa_len != sizeof (dst_in)) { 376 if (info.rti_info[RTAX_DST]->sa_len < 390 info.rti_info[RTAX_GATEWAY]->sa_len != sizeof (gate_in)) { 392 if (info.rti_info[RTAX_GATEWAY]->sa_len < 960 if ((cp + sa->sa_len) > cplim) 969 if (sa->sa_len == 0) { 1028 * Make sure to accomodate the largest possible size of sa_len. 1051 dlen = ROUNDUP32(sa->sa_len); 1118 * Make sure to accomodate the largest possible size of sa_len [all...] |
H A D | if.c | 795 ((const struct sockaddr *)(a1))->sa_len) == 0) 817 ifa->ifa_broadaddr->sa_len != 0 && 916 ifa->ifa_broadaddr->sa_len != 0 && 1025 cplim = ifa->ifa_netmask->sa_len + 1120 cplim = ifa->ifa_netmask->sa_len + 2328 ifr->ifr_addr.sa_len = sdl->sdl_alen; 2399 ifr->ifr_addr.sa_len < 16) { 2400 ifr->ifr_addr.sa_family = ifr->ifr_addr.sa_len; 2401 ifr->ifr_addr.sa_len = 16; 2404 if (ifr->ifr_addr.sa_len [all...] |
H A D | if.h | 500 ((ifr).ifr_addr.sa_len > sizeof (struct sockaddr) ? \ 502 (ifr).ifr_addr.sa_len) : sizeof (struct ifreq))
|
H A D | ether_inet6_pr_module.c | 199 if (proto_addr->sa_len < sizeof (struct sockaddr_in6))
|
H A D | raw_usrreq.c | 143 (bcmp((caddr_t)(a1), (caddr_t)(a2), a1->sa_len) == 0)
|
H A D | ether_inet_pr_module.c | 293 if (proto_addr->sa_len < sizeof (struct sockaddr_in))
|
H A D | ntstat.c | 139 if (src->sa_len > maxlen) return; 141 bcopy(src, dst, src->sa_len); 143 src->sa_len >= sizeof(struct sockaddr_in6)) 525 if ((sa = rt_mask(rt)) && sa->sa_len <= sizeof(desc->mask)) 526 memcpy(&desc->mask, sa, sa->sa_len);
|
/xnu-2422.115.4/tools/tests/xnu_quick_test/ |
H A D | socket_tests.c | 70 my_sockaddr->sa_len = my_len; 76 my_sockaddr->sa_len = my_len; 87 my_err = bind( my_socket_fd, my_sockaddr, my_sockaddr->sa_len ); 137 my_err = bind( my_child_fd, my_sockaddr, my_sockaddr->sa_len ); 147 my_err = connect( my_child_fd, my_sockaddr, my_sockaddr->sa_len ); 181 my_msghdr.msg_namelen = my_sockaddr->sa_len; 324 my_sockaddr->sa_len );
|
/xnu-2422.115.4/bsd/kern/ |
H A D | kpi_socket.c | 151 if (fromlen > sa->sa_len) 152 fromlen = sa->sa_len; 183 if (to->sa_len > sizeof (ss)) { 184 MALLOC(sa, struct sockaddr *, to->sa_len, M_SONAME, M_WAITOK); 191 memcpy(sa, to, to->sa_len); 213 if (to->sa_len > sizeof (ss)) { 214 MALLOC(sa, struct sockaddr *, to->sa_len, M_SONAME, 222 memcpy(sa, to, to->sa_len); 365 if (peernamelen > sa->sa_len) 366 peernamelen = sa->sa_len; [all...] |
H A D | uipc_syscalls.c | 540 socklen_t sa_len; local 542 /* save sa_len before it is destroyed */ 543 sa_len = sa->sa_len; 544 namelen = MIN(namelen, sa_len); 548 namelen = sa_len; 1420 socklen_t sa_len = 0; local 1429 sa_len = fromsa->sa_len; 1430 len = MIN((unsigned int)len, sa_len); 1921 socklen_t sa_len; local 1989 socklen_t sa_len; local [all...] |
H A D | kpi_socketfilter.c | 967 int sa_len = se->se_addr->sa_len; local 971 bcopy(se->se_addr, buf, sa_len); 979 if (bcmp(se->se_addr, buf, sa_len) != 0)
|
H A D | uipc_socket2.c | 997 int space = asa->sa_len; 1011 if (asa->sa_len > MLEN) 1016 m->m_len = asa->sa_len; 1017 bcopy((caddr_t)asa, mtod(m, caddr_t), asa->sa_len); 2486 MALLOC(sa2, struct sockaddr *, sa->sa_len, M_SONAME, 2489 bcopy(sa, sa2, sa->sa_len);
|
/xnu-2422.115.4/bsd/netkey/ |
H A D | key_debug.c | 473 + addr->sa_len); 566 ((struct sockaddr *)&spidx->src)->sa_len); 569 ((struct sockaddr *)&spidx->dst)->sa_len); 587 ((struct sockaddr *)&saidx->src)->sa_len); 590 ((struct sockaddr *)&saidx->dst)->sa_len); 740 printf("sockaddr{ len=%u family=%u", addr->sa_len, addr->sa_family);
|
H A D | key.c | 413 if (s) bcopy((s), &(idx)->src, ((struct sockaddr *)(s))->sa_len); \ 414 if (d) bcopy((d), &(idx)->dst, ((struct sockaddr *)(d))->sa_len); \ 415 if (s_s) bcopy((s_s), &(idx)->src_range.start, ((struct sockaddr *)(s_s))->sa_len); \ 416 if (s_e) bcopy((s_e), &(idx)->src_range.end, ((struct sockaddr *)(s_e))->sa_len); \ 417 if (d_s) bcopy((d_s), &(idx)->dst_range.start, ((struct sockaddr *)(d_s))->sa_len); \ 418 if (d_e) bcopy((d_e), &(idx)->dst_range.end, ((struct sockaddr *)(d_e))->sa_len); \ 431 bcopy((s), &(idx)->src, ((const struct sockaddr *)(s))->sa_len); \ 432 bcopy((d), &(idx)->dst, ((const struct sockaddr *)(d))->sa_len); \ 799 if (isrc->sa_len > sizeof(spidx.src) || 800 idst->sa_len > sizeo [all...] |
/xnu-2422.115.4/bsd/netinet6/ |
H A D | raw_ip6.c | 304 sa->sa_len != sizeof(struct sockaddr_in6)) 847 if (nam->sa_len != sizeof (struct sockaddr_in6)) 901 if (nam->sa_len != sizeof(*addr))
|
H A D | in6_pcb.c | 202 if (nam->sa_len != sizeof (struct sockaddr_in6)) { 410 if (nam->sa_len != sizeof (struct sockaddr_in6))
|
H A D | udp6_usrreq.c | 593 sa->sa_len != sizeof (struct sockaddr_in6)) 858 if (addr->sa_len != sizeof (struct sockaddr_in6)) {
|
/xnu-2422.115.4/bsd/nfs/ |
H A D | nfs_socket.c | 137 if (sa1->sa_len != sa2->sa_len) 138 return ((sa1->sa_len < sa2->sa_len) ? -1 : 1); 490 MALLOC(nso->nso_saddr, struct sockaddr *, sa->sa_len, M_SONAME, M_WAITOK|M_ZERO); 502 bcopy(sa, nso->nso_saddr, sa->sa_len); 521 ss.ss_len = sa->sa_len; 860 msg.msg_namelen = nso->nso_saddr->sa_len; 1223 bcopy(nso->nso_saddr, &ss, nso->nso_saddr->sa_len); 1286 bcopy(nso->nso_saddr, &ss, nso->nso_saddr->sa_len); [all...] |