Searched refs:usock (Results 1 – 4 of 4) sorted by relevance
| /freebsd/crypto/krb5/src/lib/krad/ |
| H A D | client.c | 285 struct addrinfo usock, *ai = NULL; in krad_client_send() local 293 memset(&usock, 0, sizeof(usock)); in krad_client_send() 294 usock.ai_family = AF_UNIX; in krad_client_send() 295 usock.ai_socktype = SOCK_STREAM; in krad_client_send() 296 usock.ai_addr = (struct sockaddr *)&ua; in krad_client_send() 297 usock.ai_addrlen = sizeof(ua); in krad_client_send() 299 retval = request_new(rc, code, attrs, &usock, secret, timeout, retries, in krad_client_send()
|
| /freebsd/contrib/unbound/smallapp/ |
| H A D | unbound-control.c | 665 struct sockaddr_un* usock = (struct sockaddr_un *) &addr; in contact_server() local 666 usock->sun_family = AF_LOCAL; in contact_server() 668 usock->sun_len = (unsigned)sizeof(usock); in contact_server() 670 (void)strlcpy(usock->sun_path, svr, sizeof(usock->sun_path)); in contact_server()
|
| /freebsd/contrib/unbound/dnstap/ |
| H A D | unbound-dnstap-socket.c | 1190 struct sockaddr_un* usock = calloc(1, sizeof(struct sockaddr_un) + 1); in dtio_mainfdcallback() 1191 if(usock) { in dtio_mainfdcallback() 1193 if(getsockname(fd, (struct sockaddr*)usock, &ulen) != -1) { in dtio_mainfdcallback() 1194 log_info("accepted new dnstap client from %s", usock->sun_path); in dtio_mainfdcallback() 1195 id = strdup(usock->sun_path); in dtio_mainfdcallback() 1199 free(usock); in dtio_mainfdcallback() 1189 struct sockaddr_un* usock = calloc(1, sizeof(struct sockaddr_un) + 1); dtio_mainfdcallback() local
|
| /freebsd/contrib/unbound/services/ |
| H A D | listen_dnsport.c | 981 struct sockaddr_un usock; in create_local_accept_sock() local 989 usock.sun_len = (unsigned)sizeof(usock); in create_local_accept_sock() 991 usock.sun_family = AF_LOCAL; in create_local_accept_sock() 993 (void)strlcpy(usock.sun_path, path, sizeof(usock.sun_path)); in create_local_accept_sock() 1008 if (bind(s, (struct sockaddr *)&usock, in create_local_accept_sock()
|