/freebsd/crypto/heimdal/kpasswd/ |
H A D | kpasswdd.c | 71 int sa_size, in send_reply() argument 97 msghdr.msg_namelen = sa_size; in send_reply() 147 int sa_size, in reply_error() argument 185 send_reply (s, sa, sa_size, NULL, &error_data); in reply_error() 193 int sa_size, in reply_priv() argument 223 send_reply (s, sa, sa_size, &ap_rep_data, &krb_priv_data); in reply_priv() 239 int sa_size, in change() argument 259 reply_priv (auth_context, s, sa, sa_size, KRB5_KPASSWD_MALFORMED, in change() 271 reply_priv (auth_context, s, sa, sa_size, KRB5_KPASSWD_MALFORMED, in change() 280 reply_priv (auth_context, s, sa, sa_size, KRB5_KPASSWD_MALFORMED, in change() [all …]
|
/freebsd/crypto/heimdal/lib/krb5/ |
H A D | addr_families.c | 43 krb5_socklen_t *sa_size, int port); 85 krb5_socklen_t *sa_size, in ipv4_addr2sockaddr() argument 94 memcpy(sa, &tmp, min(sizeof(tmp), *sa_size)); in ipv4_addr2sockaddr() 95 *sa_size = sizeof(tmp); in ipv4_addr2sockaddr() 101 krb5_socklen_t *sa_size, in ipv4_h_addr2sockaddr() argument 110 memcpy(sa, &tmp, min(sizeof(tmp), *sa_size)); in ipv4_h_addr2sockaddr() 111 *sa_size = sizeof(tmp); in ipv4_h_addr2sockaddr() 152 ipv4_anyaddr (struct sockaddr *sa, krb5_socklen_t *sa_size, int port) in ipv4_anyaddr() argument 160 memcpy(sa, &tmp, min(sizeof(tmp), *sa_size)); in ipv4_anyaddr() 161 *sa_size = sizeof(tmp); in ipv4_anyaddr() [all …]
|
/freebsd/crypto/heimdal/lib/gssapi/krb5/ |
H A D | address_to_krb5addr.c | 47 krb5_socklen_t sa_size = sizeof(sa); in _gsskrb5i_address_to_krb5addr() local 69 &sa_size, in _gsskrb5i_address_to_krb5addr()
|
/freebsd/sys/dev/qat/qat_hw/qat_c4xxx/ |
H A D | adf_c4xxx_inline.h | 559 #define ADF_C4XXX_SA_SIZE_IN_BYTES(sa_size) (((sa_size) + 1) * 32) argument 565 #define ADF_C4XXX_FUNC_LIMIT(accel_dev, sa_size) \ argument 566 (ADF_C4XXX_SADB_SIZE_IN_WORDS(accel_dev) / ((sa_size) + 1))
|
H A D | adf_c4xxx_hw_data.c | 1233 u32 sa_size = 0; in c4xxx_init_aram_config() local 1322 sa_size = ADF_C4XXX_DEFAULT_SA_SIZE; in c4xxx_init_aram_config() 1327 sa_size = ADF_C4XXX_ALGO_GROUP1_SA_SIZE; in c4xxx_init_aram_config() 1331 (sadb_size % ADF_C4XXX_SA_SIZE_IN_BYTES(sa_size)); in c4xxx_init_aram_config()
|
/freebsd/sys/contrib/openzfs/include/sys/ |
H A D | sa.h | 82 uint16_t sa_size; member 136 int sa_size(sa_handle_t *, sa_attr_type_t, int *);
|
H A D | sa_impl.h | 259 bulk.sa_size = SA_ATTR_LEN(sa, idx, attr, hdr); \
|
/freebsd/crypto/heimdal/kadmin/ |
H A D | kadmind.c | 183 socklen_t sa_size = sizeof(__ss); in main() 190 if(roken_getsockname(STDIN_FILENO, sa, &sa_size) < 0 && in main()
|
H A D | kadm_conn.c | 130 socklen_t sa_size = sizeof(__ss); in spawn_child() local 137 s = accept(socks[this_sock], sa, &sa_size); in spawn_child()
|
/freebsd/contrib/ofed/opensm/libvendor/ |
H A D | osm_vendor_ibumad_sa.c | 342 uint32_t sa_size; in __osmv_send_sa_req() local 402 …p_sa_mad_data->attr_offset ? (sa_size = ib_get_attr_size(p_sa_mad_data->attr_offset)) : (sa_size =… in __osmv_send_sa_req() 403 memcpy(p_sa_mad->data, p_sa_mad_data->p_attr, sa_size); in __osmv_send_sa_req()
|
H A D | osm_vendor_mlx_sa.c | 431 uint32_t sa_size; in __osmv_send_sa_req() local 490 …p_sa_mad_data->attr_offset ? (sa_size = ib_get_attr_size(p_sa_mad_data->attr_offset)) : (sa_size =… in __osmv_send_sa_req() 491 memcpy(p_sa_mad->data, p_sa_mad_data->p_attr, sa_size); in __osmv_send_sa_req()
|
/freebsd/crypto/openssh/ |
H A D | loginrec.h | 116 const unsigned int sa_size);
|
H A D | loginrec.c | 402 const unsigned int sa_size) in login_set_addr() argument 404 unsigned int bufsize = sa_size; in login_set_addr() 407 if (sizeof(li->hostaddr) < sa_size) in login_set_addr()
|
/freebsd/crypto/heimdal/appl/telnet/telnetd/ |
H A D | telnetd.c | 152 socklen_t sa_size; in main() local 432 sa_size = sizeof (__ss); in main() 433 if (getpeername(STDIN_FILENO, sa, &sa_size) < 0) { in main() 462 doit(sa, sa_size); in main()
|
/freebsd/sys/dev/bhnd/siba/ |
H A D | sibavar.h | 156 uint32_t sa_size; /**< size */ member
|
H A D | siba_subr.c | 544 sa->sa_size = size; in siba_append_dinfo_region()
|
/freebsd/sys/contrib/openzfs/module/zfs/ |
H A D | sa.c | 356 bulk[i].sa_size == bulk[i].sa_length) { in sa_attr_op() 373 MIN(bulk[i].sa_size, bulk[i].sa_length)); in sa_attr_op() 380 bulk[i].sa_size == bulk[i].sa_length) { in sa_attr_op() 762 attr_desc[i].sa_size = length; in sa_build_layouts() 1527 *size = bulk.sa_size; in sa_size_locked() 1533 sa_size(sa_handle_t *hdl, sa_attr_type_t attr, int *size) in sa_size() function 1559 error = zfs_uiomove((void *)bulk.sa_addr, MIN(bulk.sa_size, in sa_lookup_uio() 2271 EXPORT_SYMBOL(sa_size);
|
H A D | zfs_replay.c | 1026 size_t sa_size; in zfs_replay_setsaxattr() local 1070 error = nvlist_size(nvl, &sa_size, NV_ENCODE_XDR); in zfs_replay_setsaxattr() 1074 if (sa_size > DXATTR_MAX_SA_SIZE) { in zfs_replay_setsaxattr()
|
H A D | zfs_sa.c | 205 error = sa_size(zp->z_sa_hdl, SA_ZPL_DXATTR(zfsvfs), &size); in zfs_sa_get_xattr()
|
/freebsd/crypto/heimdal/kdc/ |
H A D | connect.c | 254 krb5_socklen_t sa_size = sizeof(__ss); in init_socket() local 258 ret = krb5_addr2sockaddr (context, a, sa, &sa_size, port); in init_socket() 284 if(rk_IS_SOCKET_ERROR(bind(d->s, sa, sa_size))){ in init_socket()
|
/freebsd/contrib/tcpdump/ |
H A D | nfs.h | 358 nd_uint32_t sa_size; member
|
H A D | print-nfs.c | 244 uint32_t sa_size; member 285 sa3->sa_size = GET_BE_U_4(dp); in parse_sattr3()
|
/freebsd/sys/contrib/openzfs/module/os/linux/zfs/ |
H A D | zpl_xattr.c | 545 size_t sa_size; in zpl_xattr_set_sa() local 569 error = -nvlist_size(nvl, &sa_size, NV_ENCODE_XDR); in zpl_xattr_set_sa() 573 if (sa_size > DXATTR_MAX_SA_SIZE) in zpl_xattr_set_sa()
|
/freebsd/sys/nfs/ |
H A D | nfsproto.h | 620 u_int32_t sa_size; member
|
/freebsd/crypto/heimdal/ |
H A D | ChangeLog.2002 | 12 * kpasswd/kpasswdd.c (doit): initialise sa_size to size of 15 * kdc/connect.c (init_socket): initialise sa_size to size of
|