/freebsd/lib/libc/rpc/ |
H A D | bindresvport.c | 78 socklen_t salen; in bindresvport_sa() local 81 salen = sizeof(myaddr); in bindresvport_sa() 84 if (_getsockname(sd, sa, &salen) == -1) in bindresvport_sa() 88 memset(sa, 0, salen); in bindresvport_sa() 98 salen = sizeof(struct sockaddr_in); in bindresvport_sa() 107 salen = sizeof(struct sockaddr_in6); in bindresvport_sa() 116 sa->sa_len = salen; in bindresvport_sa() 131 error = _bind(sd, sa, salen); in bindresvport_sa() 145 if (_getsockname(sd, sa, &salen) < 0) in bindresvport_sa()
|
/freebsd/crypto/openssh/openbsd-compat/ |
H A D | bindresvport.c | 62 socklen_t salen; in bindresvport_sa() local 68 salen = sizeof(myaddr); in bindresvport_sa() 70 if (getsockname(sd, sa, &salen) == -1) in bindresvport_sa() 74 memset(&myaddr, 0, salen); in bindresvport_sa() 80 salen = sizeof(struct sockaddr_in); in bindresvport_sa() 84 salen = sizeof(struct sockaddr_in6); in bindresvport_sa() 102 error = bind(sd, sa, salen); in bindresvport_sa()
|
H A D | rresvport.c | 64 socklen_t salen; in rresvport_af() local 71 salen = sizeof(struct sockaddr_in); in rresvport_af() 75 salen = sizeof(struct sockaddr_in6); in rresvport_af() 90 if (bind(s, sa, salen) >= 0) in rresvport_af()
|
/freebsd/tests/sys/kern/ |
H A D | socket_accept.c | 74 socklen_t salen; in ATF_TC_BODY() local 81 salen = 0; in ATF_TC_BODY() 82 ATF_REQUIRE(accept(l, (struct sockaddr *)&ret, &salen) > 0); in ATF_TC_BODY() 84 ATF_REQUIRE(salen == sizeof(struct sockaddr_in)); in ATF_TC_BODY() 94 socklen_t salen; in ATF_TC_BODY() local 100 salen = sizeof(struct sockaddr_in) + 2; in ATF_TC_BODY() 101 ATF_REQUIRE(accept(l, (struct sockaddr *)&ret, &salen) > 0); in ATF_TC_BODY() 102 ATF_REQUIRE(salen == sizeof(struct sockaddr_in)); in ATF_TC_BODY()
|
/freebsd/lib/libnetbsd/ |
H A D | sockaddr_snprintf.c | 116 size_t salen; in sockaddr_snprintf() local 138 salen = sizeof(*sun); in sockaddr_snprintf() 143 salen = sizeof(*sin4); in sockaddr_snprintf() 149 salen = sizeof(*sin6); in sockaddr_snprintf() 160 salen = sizeof(*sdl); in sockaddr_snprintf() 164 salen = sdl->sdl_slen + sdl->sdl_nlen + sdl->sdl_alen; in sockaddr_snprintf() 165 if (salen < sizeof(*sdl)) in sockaddr_snprintf() 166 salen = sizeof(*sdl); in sockaddr_snprintf() 183 if (a && getnameinfo(sa, (socklen_t)salen, addr = abuf, in sockaddr_snprintf() 213 (void)snprintf(nbuf, sizeof(nbuf), "%zu", salen); in sockaddr_snprintf() [all …]
|
/freebsd/lib/libcasper/services/cap_net/ |
H A D | cap_net.h | 64 socklen_t salen, char *host, size_t hostlen, char *serv, size_t servlen, 75 const struct sockaddr *sa, socklen_t salen); 83 const struct sockaddr *sa, socklen_t salen); 86 const struct sockaddr *sa, socklen_t salen); 102 #define cap_getnameinfo(chan, sa, salen, host, hostlen, serv, servlen, flags) \ argument 103 getnameinfo(sa, salen, host, hostlen, serv, servlen, flags) 124 const struct sockaddr *sa __unused, socklen_t salen __unused) in cap_net_limit_addr2name() 145 const struct sockaddr *sa __unused, socklen_t salen __unused) in cap_net_limit_connect() 152 const struct sockaddr *sa __unused, socklen_t salen __unused) in cap_net_limit_bind()
|
H A D | cap_net.c | 349 cap_getnameinfo(cap_channel_t *chan, const struct sockaddr *sa, socklen_t salen, in cap_getnameinfo() argument 359 nvlist_add_binary(nvl, "sa", sa, (size_t)salen); in cap_getnameinfo() 462 pack_sockaddr(nvlist_t *res, const struct sockaddr *sa, socklen_t salen) in pack_sockaddr() argument 472 nvlist_add_binary(nvl, "", sa, salen); in pack_sockaddr() 514 socklen_t salen) in cap_net_limit_addr2name() argument 517 pack_sockaddr(limit->cnl_addr2name, sa, salen); in cap_net_limit_addr2name() 524 socklen_t salen) in cap_net_limit_connect() argument 527 pack_sockaddr(limit->cnl_connect, sa, salen); in cap_net_limit_connect() 533 socklen_t salen) in cap_net_limit_bind() argument 536 pack_sockaddr(limit->cnl_bind, sa, salen); in cap_net_limit_bind() [all …]
|
/freebsd/sbin/setkey/ |
H A D | parse.y | 860 int salen; in setkeymsg_spdaddr() 905 salen = s->ai_addr->sa_len; in setkeymsg_spdaddr() 907 PFKEY_ALIGN8(salen)); in setkeymsg_spdaddr() 915 sizeof(m_addr), (caddr_t)sa, salen); in setkeymsg_addr() 919 salen = d->ai_addr->sa_len; in setkeymsg_addr() 921 PFKEY_ALIGN8(salen)); in setkeymsg_addr() 929 sizeof(m_addr), (caddr_t)sa, salen); in setkeymsg_addr() 961 int salen; in setkeymsg_addr() 1025 salen = s->ai_addr->sa_len; in setkeymsg_addr() 1027 PFKEY_ALIGN8(salen)); 838 int salen; setkeymsg_spdaddr() local 925 int salen; setkeymsg_addr() local 1046 int salen; setkeymsg_add() local [all...] |
/freebsd/sys/compat/linux/ |
H A D | linux.c | 592 int salen, bdom, error, hdrlen, namelen; in linux_to_bsd_sockaddr() local 597 salen = *len; in linux_to_bsd_sockaddr() 606 if (salen == sizeof(struct sockaddr_in6) - sizeof(uint32_t)) { in linux_to_bsd_sockaddr() 607 salen += sizeof(uint32_t); in linux_to_bsd_sockaddr() 612 kosa = malloc(salen, M_SONAME, M_WAITOK); in linux_to_bsd_sockaddr() 648 salen -= sizeof(uint32_t); in linux_to_bsd_sockaddr() 652 if (salen < sizeof(struct sockaddr_in)) { in linux_to_bsd_sockaddr() 656 salen = sizeof(struct sockaddr_in); in linux_to_bsd_sockaddr() 659 if (bdom == AF_LOCAL && salen > sizeof(struct sockaddr_un)) { in linux_to_bsd_sockaddr() 667 namelen = strnlen(name + 1, salen - hdrlen - 1) + 1; in linux_to_bsd_sockaddr() [all …]
|
/freebsd/contrib/tcp_wrappers/ |
H A D | socket.c | 144 int salen; in sock_hostaddr() local 149 salen = sin->sa_len; in sock_hostaddr() 151 salen = (sin->sa_family == AF_INET) ? sizeof(struct sockaddr_in) in sock_hostaddr() 154 getnameinfo(sin, salen, host->addr, sizeof(host->addr), in sock_hostaddr() 172 int salen, alen, err = 1; in sock_hostname() local 194 salen = sizeof(struct sockaddr_in); in sock_hostname() 199 salen = sizeof(struct sockaddr_in6); in sock_hostname() 205 err = getnameinfo(sin, salen, hname, sizeof(hname), in sock_hostname() 310 getnameinfo(sin, salen, hname, sizeof(hname), in sock_hostname()
|
/freebsd/tests/sys/netinet/ |
H A D | tcp_connect_port_test.c | 167 socklen_t salen; in connect_loop() local 192 salen = sizeof(su_srvr); in connect_loop() 193 error = getsockname(lsock, &su_srvr.saddr, &salen); in connect_loop() 197 ATF_REQUIRE_MSG(salen == (domain == PF_INET ? in connect_loop() 223 salen = sizeof(su_clnt); in connect_loop() 224 error = getsockname(csock, &su_clnt.saddr, &salen); in connect_loop() 228 ATF_REQUIRE_MSG(salen == (domain == PF_INET ? in connect_loop()
|
H A D | ip6_v4mapped_test.c | 221 socklen_t salen; in ATF_TC_BODY() local 244 salen = sizeof(su_srvr); in ATF_TC_BODY() 245 error = getsockname(lsock, &su_srvr.saddr, &salen); in ATF_TC_BODY() 249 ATF_REQUIRE_MSG(salen == sizeof(struct sockaddr_in), in ATF_TC_BODY() 333 socklen_t salen; in ATF_TC_BODY() local 350 salen = sizeof(sin); in ATF_TC_BODY() 351 error = getsockname(ls, (struct sockaddr *)&sin, &salen); in ATF_TC_BODY() 354 ATF_REQUIRE_MSG(salen == sizeof(struct sockaddr_in), in ATF_TC_BODY()
|
/freebsd/crypto/heimdal/lib/krb5/ |
H A D | sock_principal.c | 46 socklen_t salen = sizeof(__ss); in krb5_sock_to_principal() local 49 if (getsockname (sock, sa, &salen) < 0) { in krb5_sock_to_principal() 54 ret = getnameinfo (sa, salen, hostname, sizeof(hostname), NULL, 0, 0); in krb5_sock_to_principal()
|
/freebsd/crypto/heimdal/lib/roken/ |
H A D | getnameinfo_verified.c | 47 getnameinfo_verified(const struct sockaddr *sa, socklen_t salen, in getnameinfo_verified() argument 67 ret = getnameinfo (sa, salen, host, hostlen, serv, servlen, in getnameinfo_verified() 91 ret = getnameinfo (sa, salen, host, hostlen, serv, servlen, in getnameinfo_verified()
|
H A D | getifaddrs.c | 925 size_t salen; in getifaddrs2() local 931 salen = sizeof(struct sockaddr); in getifaddrs2() 933 salen = sa->sa_len; in getifaddrs2() 937 salen = SA_LEN(sa); in getifaddrs2() 961 (*end)->ifa_addr = malloc(salen); in getifaddrs2() 966 memcpy((*end)->ifa_addr, sa, salen); in getifaddrs2() 1071 size_t salen; in getlifaddrs2() local 1077 salen = sizeof(struct sockaddr_storage); in getlifaddrs2() 1079 salen = sa->sa_len; in getlifaddrs2() 1083 salen = SA_LEN(sa); in getlifaddrs2() [all …]
|
/freebsd/sbin/hastd/ |
H A D | proto_tcp.c | 523 socklen_t salen; in tcp_address_match() local 531 salen = sizeof(sa2); in tcp_address_match() 532 if (getpeername(tctx->tc_fd, (struct sockaddr *)&sa2, &salen) == -1) in tcp_address_match() 569 socklen_t salen; in tcp_local_address() local 574 salen = sizeof(sa); in tcp_local_address() 575 if (getsockname(tctx->tc_fd, (struct sockaddr *)&sa, &salen) == -1) { in tcp_local_address() 587 socklen_t salen; in tcp_remote_address() local 592 salen = sizeof(sa); in tcp_remote_address() 593 if (getpeername(tctx->tc_fd, (struct sockaddr *)&sa, &salen) == -1) { in tcp_remote_address()
|
/freebsd/tools/regression/netinet/udpzerobyte/ |
H A D | udpzerobyte.c | 57 test(int domain, const char *domainstr, struct sockaddr *sa, socklen_t salen) in test() argument 70 if (bind(sock_receive, sa, salen) < 0) in test() 76 if (connect(sock_send, sa, salen) < 0) in test()
|
/freebsd/contrib/openbsm/bin/auditdistd/ |
H A D | proto_tcp.c | 544 socklen_t salen; in tcp_address_match() local 552 salen = sizeof(sa2); in tcp_address_match() 553 if (getpeername(tctx->tc_fd, (struct sockaddr *)&sa2, &salen) < 0) in tcp_address_match() 643 socklen_t salen; in tcp_local_address() local 648 salen = sizeof(sa); in tcp_local_address() 649 if (getsockname(tctx->tc_fd, (struct sockaddr *)&sa, &salen) < 0) { in tcp_local_address() 667 socklen_t salen; in tcp_remote_address() local 672 salen = sizeof(sa); in tcp_remote_address() 673 if (getpeername(tctx->tc_fd, (struct sockaddr *)&sa, &salen) < 0) { in tcp_remote_address()
|
/freebsd/libexec/rpc.rwalld/ |
H A D | rwalld.c | 66 socklen_t salen; in main() local 86 salen = sizeof(sa); in main() 87 if (getsockname(0, (struct sockaddr *)&sa, &salen) < 0) { in main()
|
/freebsd/lib/libc/net/ |
H A D | rcmd.c | 560 __ivaliduser_sa(FILE *hostf, const struct sockaddr *raddr, socklen_t salen, in __ivaliduser_sa() argument 578 if (getnameinfo(raddr, salen, hname, sizeof(hname), NULL, 0, in __ivaliduser_sa() 622 hostok = __icheckhost(raddr, salen, in __ivaliduser_sa() 631 if (__icheckhost(raddr, salen, in __ivaliduser_sa() 637 hostok = __icheckhost(raddr, salen, buf); in __ivaliduser_sa() 680 __icheckhost(const struct sockaddr *raddr, socklen_t salen, const char *lhost) in __icheckhost() argument 697 salen = sin.sin_len; in __icheckhost() 702 if (getnameinfo(raddr, salen, h1, sizeof(h1), NULL, 0, in __icheckhost()
|
/freebsd/contrib/blocklist/lib/ |
H A D | blacklist.c | 48 blacklist_sa(int action, int rfd, const struct sockaddr *sa, socklen_t salen, in blacklist_sa() argument 55 rv = blacklist_sa_r(bl, action, rfd, sa, salen, msg); in blacklist_sa()
|
/freebsd/crypto/heimdal/appl/gssmask/ |
H A D | gssmaestro.c | 46 socklen_t salen; member 272 socklen_t salen = sizeof(sast); in wait_log() local 277 assert(sizeof(sast) >= c->salen); in wait_log() 284 ret = bind(fd, (struct sockaddr *)&sast, c->salen); in wait_log() 291 salen = sizeof(sast); in wait_log() 292 ret = getsockname(fd, (struct sockaddr *)&sast, &salen); in wait_log() 301 salen = sizeof(sast); in wait_log() 302 fd2 = accept(fd, (struct sockaddr *)&sast, &salen); in wait_log() 642 c->salen = res->ai_addrlen; in connect_client()
|
/freebsd/crypto/heimdal/kdc/ |
H A D | kdc-replay.c | 121 krb5_socklen_t salen = sizeof(sa); in main() local 153 &salen, 88); in main()
|
/freebsd/sys/compat/linuxkpi/common/include/linux/ |
H A D | socket.h | 37 kernel_connect(int sd, struct sockaddr *sa, size_t salen, int flags) in kernel_connect() argument
|
/freebsd/sys/rpc/ |
H A D | rpc_generic.c | 784 socklen_t salen; in bindresvport() local 792 salen = sa->sa_len; in bindresvport() 796 salen = sa->sa_len; in bindresvport() 821 sa->sa_len = salen; in bindresvport()
|