/freebsd/contrib/bearssl/samples/ |
H A D | server_basic.c | 116 size_t sa_len; in host_bind() local 125 sa_len = sizeof sa4; in host_bind() 133 sa_len = sizeof sa6; in host_bind() 140 sa_len = p->ai_addrlen; in host_bind() 158 if (bind(fd, sa, sa_len) < 0) { in host_bind() 189 socklen_t sa_len; in accept_client() local 193 sa_len = sizeof sa; in accept_client() 194 fd = accept(server_fd, &sa, &sa_len); in accept_client()
|
/freebsd/lib/libc/net/ |
H A D | sctp_sys_calls.c | 126 if (at->sa_len != sizeof(struct sockaddr_in)) { in sctp_connectx() 136 if (at->sa_len != sizeof(struct sockaddr_in6)) { in sctp_connectx() 156 at = (struct sockaddr *)((caddr_t)at + at->sa_len); in sctp_connectx() 197 if (sa->sa_len != sizeof(struct sockaddr_in)) { in sctp_bindx() 218 if (sa->sa_len != sizeof(struct sockaddr_in6)) { in sctp_bindx() 243 sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len); in sctp_bindx() 263 if (setsockopt(sd, IPPROTO_SCTP, flags, sa, sa->sa_len) != 0) { in sctp_bindx() 266 sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len); in sctp_bindx() 428 while (((caddr_t)sa < lim) && (sa->sa_len > 0)) { in sctp_getpaddrs() 429 sa = (struct sockaddr *)((caddr_t)sa + sa->sa_len); in sctp_getpaddrs() [all …]
|
H A D | getifaddrs.c | 57 #define SA_LEN(sa) (sa)->sa_len 61 #define SA_RLEN(sa) ((sa)->sa_len ? (((sa)->sa_len + SALIGN) & ~SALIGN) : (SALIGN + 1))
|
H A D | getifmaddrs.c | 45 #define SA_RLEN(sa) ((sa)->sa_len ? (((sa)->sa_len + SALIGN) & ~SALIGN) : \
|
/freebsd/tests/sys/net/routing/ |
H A D | rtsock_common.h | 420 if (a->sa_len != b->sa_len) { in sa_equal_msg_flags() 421 snprintf(msg, sz, "len: %d vs %d", a->sa_len, b->sa_len); in sa_equal_msg_flags() 504 if (memcmp(a, b, a->sa_len)) { in sa_equal_msg_flags() 506 for (i = 0; i < a->sa_len; i++) in sa_equal_msg_flags() 751 ptr += ALIGN(((struct sockaddr *)ptr)->sa_len); in rtsock_add_rtm_sa() 756 memcpy(ptr, sa, sa->sa_len); in rtsock_add_rtm_sa() 768 ptr += ALIGN(((struct sockaddr *)ptr)->sa_len); in rtsock_find_rtm_sa() 784 int sa_len = ALIGN(((struct sockaddr *)ptr)->sa_len); in rtsock_calc_rtm_len() local 785 len += sa_len; in rtsock_calc_rtm_len() 786 ptr += sa_len; in rtsock_calc_rtm_len() [all …]
|
H A D | rtsock_print.h | 205 printf(" af=inet len=%d addr=%s", sa->sa_len, abuf); in sa_print() 211 printf(" af=inet6 len=%d addr=%s", sa->sa_len, abuf); in sa_print() 244 printf(" af=%d len=%d", sa->sa_family, sa->sa_len); in sa_print() 248 sa_print_hd(hdbuf, sizeof(hdbuf), ((char *)sa), sa->sa_len); in sa_print() 302 ptr += ALIGN(((struct sockaddr *)ptr)->sa_len); in rtsock_print_rtm() 338 ptr += ALIGN(((struct sockaddr *)ptr)->sa_len); in rtsock_print_ifa()
|
/freebsd/tools/tools/net80211/wlanwatch/ |
H A D | wlanwatch.c | 156 if (sa->sa_len == 0) in routename() 167 if (in.s_addr == INADDR_ANY || sa->sa_len < 4) in routename() 194 memcpy(&sin6, sa, sa->sa_len); in routename() 198 if (sa->sa_len == sizeof(struct sockaddr_in6) && in routename() 223 u_short *slim = s + ((sa->sa_len + 1) >> 1); in routename() 247 ( (!(sa) || ((struct sockaddr *)(sa))->sa_len == 0) ? \ 249 1 + ( (((struct sockaddr *)(sa))->sa_len - 1) | (sizeof(long) - 1) ) )
|
/freebsd/lib/libipsec/ |
H A D | policy_parse.y | 246 newaddr = malloc(res->ai_addr->sa_len); in parse_sockaddr() 252 memcpy(newaddr, res->ai_addr, res->ai_addr->sa_len); in parse_sockaddr() 324 + (src ? src->sa_len : 0) in set_x_request() 325 + (dst ? dst->sa_len : 0); in set_x_request() 358 memcpy(&pbuf[offset], addr, addr->sa_len); in set_sockaddr() 360 offset += addr->sa_len; in set_sockaddr()
|
H A D | ipsec_dump_policy.c | 224 sa2 = (struct sockaddr *)(p + sa1->sa_len); in ipsec_dump_ipsecrequest() 225 if (sizeof(*xisr) + sa1->sa_len + sa2->sa_len != in ipsec_dump_ipsecrequest() 292 if (getnameinfo(sa, sa->sa_len, buf, len, NULL, 0, niflags) != 0) in set_address()
|
H A D | pfkey.c | 372 + PFKEY_ALIGN8(src->sa_len) in pfkey_send_getspi() 374 + PFKEY_ALIGN8(dst->sa_len); in pfkey_send_getspi() 559 + PFKEY_ALIGN8(src->sa_len) in pfkey_send_delete_all() 561 + PFKEY_ALIGN8(dst->sa_len); in pfkey_send_delete_all() 1106 + PFKEY_ALIGN8(src->sa_len) in pfkey_send_x1() 1108 + PFKEY_ALIGN8(dst->sa_len) in pfkey_send_x1() 1244 + PFKEY_ALIGN8(src->sa_len) in pfkey_send_x2() 1246 + PFKEY_ALIGN8(dst->sa_len); in pfkey_send_x2() 1391 + PFKEY_ALIGN8(src->sa_len) in pfkey_send_x4() 1393 + PFKEY_ALIGN8(src->sa_len) in pfkey_send_x4() [all...] |
/freebsd/sys/rpc/ |
H A D | replay.c | 124 bcopy(addr, &rce->rce_addr, addr->sa_len); in replay_alloc() 186 && rce->rce_addr.ss_len == addr->sa_len in replay_find() 187 && bcmp(&rce->rce_addr, addr, addr->sa_len) == 0) { in replay_find() 243 && rce->rce_addr.ss_len == addr->sa_len in replay_setreply() 244 && bcmp(&rce->rce_addr, addr, addr->sa_len) == 0) { in replay_setreply()
|
/freebsd/sys/net/ |
H A D | route.h | 369 ( (((struct sockaddr *)(sa))->sa_len == 0) ? \ 371 1 + ( (((struct sockaddr *)(sa))->sa_len - 1) | (sizeof(long) - 1) ) ) 374 (((const struct sockaddr *)(a))->sa_len == ((const struct sockaddr *)(b))->sa_len) && \ 375 (bcmp((a), (b), ((const struct sockaddr *)(b))->sa_len) == 0))
|
H A D | if_ipsec.c | 588 src->sa_len != dst->sa_len) in ipsec_ioctl() 595 if (src->sa_len != sizeof(struct sockaddr_in)) in ipsec_ioctl() 601 if (src->sa_len != sizeof(struct sockaddr_in6)) in ipsec_ioctl() 879 bcopy(src, &isr->saidx.dst, src->sa_len); in ipsec_newpolicies() 880 bcopy(dst, &isr->saidx.src, dst->sa_len); in ipsec_newpolicies() 883 bcopy(src, &isr->saidx.src, src->sa_len); in ipsec_newpolicies() 884 bcopy(dst, &isr->saidx.dst, dst->sa_len); in ipsec_newpolicies() 891 sp[i]->spidx.src.sa.sa_len = in ipsec_newpolicies() 892 sp[i]->spidx.dst.sa.sa_len = in ipsec_newpolicies() 900 sp[i]->spidx.src.sa.sa_len = in ipsec_newpolicies() [all …]
|
H A D | rtsock.c | 126 ( (((struct sockaddr *)(sa))->sa_len == 0) ? \ 128 1 + ( (((struct sockaddr *)(sa))->sa_len - 1) | (sizeof(int) - 1) ) ) 1352 if (cp + sa->sa_len > cplim) { in rt_xaddrs() 1363 if (sa->sa_len == 0) { in rt_xaddrs() 1455 gw->sa_len); in cleanup_xaddrs_gateway() 1472 gw->sa_len); in cleanup_xaddrs_gateway() 1522 const int sa_len = sizeof(struct sockaddr_in); in cleanup_xaddrs_inet() local 1558 if ((dst_sa = (struct sockaddr_in *)alloc_sockaddr_aligned(lb, sa_len)) == NULL) in cleanup_xaddrs_inet() 1564 if ((mask_sa = (struct sockaddr_in *)alloc_sockaddr_aligned(lb, sa_len)) == NULL) in cleanup_xaddrs_inet() 1587 const int sa_len = sizeof(struct sockaddr_in6); in cleanup_xaddrs_inet6() local [all …]
|
/freebsd/contrib/bsnmp/lib/ |
H A D | support.h | 90 ( (!(sa) || ((struct sockaddr *)(sa))->sa_len == 0) ? \ 92 1 + ( (((struct sockaddr *)(sa))->sa_len - 1) | (sizeof(long) - 1) ) )
|
/freebsd/tests/sys/kern/ |
H A D | socket_msg_trunc.c | 57 rc = sendto(cs, buf, sz, 0, sa, sa->sa_len); in check_recvmsg() 94 rc = bind(ss, sa, sa->sa_len); in ATF_TC_BODY() 121 rc = bind(ss, sa, sa->sa_len); in ATF_TC_BODY() 146 rc = bind(ss, sa, sa->sa_len); in ATF_TC_BODY()
|
H A D | socket_msg_waitall.c | 74 ATF_REQUIRE_MSG(bind(s, sa, sa->sa_len) == 0, in close_test() 78 ATF_REQUIRE_MSG(getsockname(s, sa, &(socklen_t){ sa->sa_len }) == 0, in close_test() 90 memcpy(&p.sa, sa, sa->sa_len); in close_test()
|
/freebsd/crypto/heimdal/lib/roken/ |
H A D | getifaddrs.c | 221 sa->sa_len = ifa_sa_len(family, len); in ifa_make_sockaddr() 258 sa->sa_len = ifa_sa_len(family, len); in ifa_make_sockaddr_mask() 651 socklen_t sa_len; in rk_getifaddrs() local 662 sa_len = ifa_sa_len(AF_PACKET, rtapayload); in rk_getifaddrs() 664 sockaddr_size = NLMSG_ALIGN(sa_len); in rk_getifaddrs() 666 dlen += NLMSG_ALIGN(sa_len); in rk_getifaddrs() 668 memset(*sap, 0, sa_len); in rk_getifaddrs() 672 data += NLMSG_ALIGN(sa_len); in rk_getifaddrs() 933 salen = sa->sa_len; in getifaddrs2() 934 sz = max(sz, sizeof(ifr->ifr_name) + sa->sa_len); in getifaddrs2() [all …]
|
/freebsd/sys/net/route/ |
H A D | nhop_ctl.c | 707 memcpy(&nh->gw_sa, &nh_orig->gw_sa, nh_orig->gw_sa.sa_len); in nhop_copy() 728 memset(&nh->gw_buf[nh->gw_sa.sa_len], 0, sizeof(nh->gw_buf) - nh->gw_sa.sa_len); in nhop_set_direct_gw() 756 if (gw->sa_len > sizeof(nh->gw_buf)) { in nhop_set_gw() 758 gw->sa_family, gw->sa_len); in nhop_set_gw() 769 memcpy(&nh->gw_sa, gw, gw->sa_len); in nhop_set_gw() 770 memset(&nh->gw_buf[gw->sa_len], 0, sizeof(nh->gw_buf) - gw->sa_len); in nhop_set_gw() 1231 addrs_len += gw_sa->sa_len; in dump_nhop_entry() 1242 addrs_len += src_sa->sa_len; in dump_nhop_entry() 1251 error = SYSCTL_OUT(w, gw_sa, gw_sa->sa_len); in dump_nhop_entry() 1253 error = SYSCTL_OUT(w, src_sa, src_sa->sa_len); in dump_nhop_entry()
|
/freebsd/usr.sbin/mtest/ |
H A D | mtest.c | 142 assert(sua->sa.sa_len == sub->sa.sa_len); in su_cmp() 143 return (memcmp(sua, sub, sua->sa.sa_len)); in su_cmp() 588 &su.sa, su.sa.sa_len, fmode, n, &sources[0].ss) != 0) in process_cmd() 616 &su.sa, su.sa.sa_len, &fmode, &n, NULL) != 0) { in process_cmd() 725 su.sa.sa_len, &fmode, &nsrc, &sources[0].ss) != 0) { in process_cmd() 746 error = getnameinfo(&psu->sa, psu->sa.sa_len, in process_cmd()
|
/freebsd/contrib/llvm-project/lldb/source/Host/common/ |
H A D | TCPSocket.cpp | 237 socklen_t sa_len = address.GetLength(); in Listen() local 238 if (getsockname(fd, &address.sockaddr(), &sa_len) == 0) in Listen() 276 socklen_t sa_len = AcceptAddr.GetMaxLength(); in Accept() local 277 sock = AcceptSocket(fd, &AcceptAddr.sockaddr(), &sa_len, inherit, in Accept()
|
/freebsd/tests/sys/netinet/ |
H A D | tcp_connect_port_test.c | 183 error = bind(lsock, addr, addr->sa_len); in connect_loop() 200 ATF_REQUIRE_MSG(su_srvr.saddr.sa_len == (domain == PF_INET ? in connect_loop() 211 error = connect(csock, &su_srvr.saddr, su_srvr.saddr.sa_len); in connect_loop()
|
H A D | socket_afinet.c | 370 if (bind(s, sa, sa->sa_len) == 0) in child_bind() 379 if (bind(s, sa, sa->sa_len) == 0) in child_bind() 546 error = bind(sd[0], sinp, sinp->sa_len); in bind_connected_port_test() 551 error = getsockname(sd[0], sinp, &(socklen_t){ sinp->sa_len }); in bind_connected_port_test() 554 error = connect(sd[1], sinp, sinp->sa_len); in bind_connected_port_test()
|
/freebsd/contrib/bearssl/tools/ |
H A D | server.c | 72 size_t sa_len; in host_bind() local 80 sa_len = sizeof sa4; in host_bind() 88 sa_len = sizeof sa6; in host_bind() 95 sa_len = p->ai_addrlen; in host_bind() 132 if (bind(fd, sa, sa_len) < 0) { in host_bind() 173 socklen_t sa_len; in accept_client() local 175 sa_len = sizeof sa; in accept_client() 176 fd = accept(server_fd, (struct sockaddr *)&sa, &sa_len); in accept_client()
|
/freebsd/sys/netipsec/ |
H A D | key.c | 579 bcopy((s), &(idx)->src, ((const struct sockaddr *)(s))->sa_len); \ 580 bcopy((d), &(idx)->dst, ((const struct sockaddr *)(d))->sa_len); \ 593 bcopy((s), &(idx)->src, ((const struct sockaddr *)(s))->sa_len); \ 594 bcopy((d), &(idx)->dst, ((const struct sockaddr *)(d))->sa_len); \ 890 if (src->sa_len != dst->sa_len) in key_checksockaddrs() 895 if (src->sa_len != sizeof(struct sockaddr_in)) in key_checksockaddrs() 901 if (src->sa_len != sizeof(struct sockaddr_in6)) in key_checksockaddrs() 1722 len < 2 * paddr->sa_len || in key_msg2sp() 1723 paddr->sa_len > sizeof(isr->saidx.src)) { in key_msg2sp() 1736 sizeof(*xisr) + 2 * paddr->sa_len) { in key_msg2sp() [all …]
|