/external/wpa_supplicant_8/hostapd/ |
H A D | ctrl_iface.c | 45 socklen_t addrlen; member in struct:wpa_ctrl_dst 65 dst->addrlen = fromlen; 84 if (fromlen == dst->addrlen && 117 if (fromlen == dst->addrlen && 2065 (u8 *) dst->addr.sun_path, dst->addrlen - 2068 msg.msg_namelen = dst->addrlen; 2078 dst->addrlen);
|
/external/chromium_org/native_client_sdk/src/libraries/nacl_io/ |
H A D | kernel_proxy.cc | 1497 socklen_t* addrlen) { 1503 if (NULL == buf || NULL == addrlen) { 1516 error = handle->RecvFrom(buf, len, flags, addr, addrlen, &out_len); 1567 socklen_t addrlen) { 1586 error = handle->SendTo(buf, len, flags, addr, addrlen, &out_len); 1492 recvfrom(int fd, void* buf, size_t len, int flags, struct sockaddr* addr, socklen_t* addrlen) argument 1562 sendto(int fd, const void* buf, size_t len, int flags, const struct sockaddr* addr, socklen_t addrlen) argument
|
/external/dnsmasq/src/ |
H A D | rfc1035.c | 745 int addrlen; local 749 addrlen = INADDRSZ; 755 addrlen = IN6ADDRSZ; 805 if (!CHECK_LEN(header, p1, qlen, addrlen)) 807 memcpy(&addr, p1, addrlen);
|
H A D | forward.c | 478 socklen_t addrlen = sizeof(serveraddr); local 479 ssize_t n = recvfrom(fd, daemon->packet, daemon->edns_pktsz, 0, &serveraddr.sa, &addrlen);
|
/external/valgrind/main/coregrind/ |
H A D | m_libcfile.c | 786 Int my_connect ( Int sockfd, struct vki_sockaddr_in* serv_addr, Int addrlen ); 969 Int my_connect ( Int sockfd, struct vki_sockaddr_in* serv_addr, Int addrlen ) 977 args[2] = addrlen; 985 res = VG_(do_syscall3)(__NR_connect, sockfd, (UWord)serv_addr, addrlen); 991 sockfd, (UWord)serv_addr, addrlen);
|
/external/chromium_org/native_client_sdk/src/examples/demo/nacl_io_demo/ |
H A D | handlers.c | 998 socklen_t addrlen = sizeof(addr); local 1009 int result = connect(sock, (struct sockaddr*)&addr, addrlen);
|
/external/iputils/ |
H A D | clockdiff.c | 626 socklen_t addrlen = sizeof(myaddr); local 634 if (getsockname(sock_raw, (struct sockaddr*)&myaddr, &addrlen) == -1) {
|
/external/libnl/lib/ |
H A D | addr.c | 66 static const char *dnet_ntop(char *addrbuf, size_t addrlen, char *str, argument 74 if (addrlen != 2)
|
/external/chromium_org/third_party/libxml/src/ |
H A D | nanohttp.c | 859 int addrlen; local 866 addrlen = sizeof(struct sockaddr_in6); 871 addrlen = sizeof(struct sockaddr_in); 925 if (connect(s, addr, addrlen) == -1) {
|
H A D | nanoftp.c | 859 int addrlen = sizeof (struct sockaddr_in); local 923 addrlen = tmp->ai_addrlen; 951 addrlen = sizeof (struct sockaddr_in); 963 addrlen) < 0) {
|
/external/chromium_org/third_party/webrtc/base/ |
H A D | physicalsocketserver.cc | 136 socklen_t addrlen = sizeof(addr_storage); local 138 int result = ::getsockname(s_, addr, &addrlen); 151 socklen_t addrlen = sizeof(addr_storage); local 153 int result = ::getpeername(s_, addr, &addrlen);
|
/external/libxml2/ |
H A D | nanohttp.c | 864 int addrlen; local 871 addrlen = sizeof(struct sockaddr_in6); 876 addrlen = sizeof(struct sockaddr_in); 930 if (connect(s, addr, addrlen) == -1) {
|
H A D | nanoftp.c | 860 int addrlen = sizeof (struct sockaddr_in); local 924 addrlen = tmp->ai_addrlen; 953 addrlen = sizeof (struct sockaddr_in); 965 addrlen) < 0) {
|
/external/wpa_supplicant_8/hostapd/src/radius/ |
H A D | radius_client.c | 966 socklen_t addrlen, claddrlen; local 1023 addrlen = sizeof(serv); 1034 addrlen = sizeof(serv6); 1074 if (connect(sel_sock, addr, addrlen) < 0) {
|
/external/wpa_supplicant_8/src/radius/ |
H A D | radius_client.c | 966 socklen_t addrlen, claddrlen; local 1023 addrlen = sizeof(serv); 1034 addrlen = sizeof(serv6); 1074 if (connect(sel_sock, addr, addrlen) < 0) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/radius/ |
H A D | radius_client.c | 966 socklen_t addrlen, claddrlen; local 1023 addrlen = sizeof(serv); 1034 addrlen = sizeof(serv6); 1074 if (connect(sel_sock, addr, addrlen) < 0) {
|
/external/netperf/ |
H A D | nettest_xti.c | 1255 int addrlen; 3082 int addrlen; 3315 fprintf(where,"addrmax %d addrlen %d addrbuf %x\n", 3472 int addrlen; 4166 int addrlen; 4425 addrlen = sizeof(peeraddr_in); 4426 bzero((char *)&peeraddr_in, addrlen); 4551 int addrlen; 5564 int addrlen; 5720 addrlen 1250 int addrlen; local 3074 int addrlen; local 3463 int addrlen; local 4156 int addrlen; local 4540 int addrlen; local 5551 int addrlen; local [all...] |
/external/qemu/ui/ |
H A D | vnc.c | 56 size_t addrlen; local 69 addrlen = strlen(format) + strlen(host) + strlen(serv); 70 addr = g_malloc(addrlen + 1); 71 snprintf(addr, addrlen, format, host, serv); 72 addr[addrlen] = '\0'; 2096 socklen_t addrlen = sizeof(addr); local 2101 int csock = accept(vs->lsock, (struct sockaddr *)&addr, &addrlen);
|
H A D | vnc-android.c | 57 size_t addrlen; local 80 addrlen = strlen(format) + strlen(host) + strlen(serv); 81 addr = g_malloc(addrlen + 1); 82 snprintf(addr, addrlen, format, host, serv); 83 addr[addrlen] = '\0';
|
/external/compiler-rt/lib/tsan/rtl/ |
H A D | tsan_interceptors.cc | 1474 TSAN_INTERCEPTOR(int, connect, int fd, void *addr, unsigned addrlen) { argument 1475 SCOPED_TSAN_INTERCEPTOR(connect, fd, addr, addrlen); 1477 int res = REAL(connect)(fd, addr, addrlen); 1483 TSAN_INTERCEPTOR(int, bind, int fd, void *addr, unsigned addrlen) { argument 1484 SCOPED_TSAN_INTERCEPTOR(bind, fd, addr, addrlen); 1485 int res = REAL(bind)(fd, addr, addrlen);
|
/external/iproute2/doc/ |
H A D | api-ip6-flowlabels.tex | 190 struct sockaddr *addr, int *addrlen) 196 struct msghdr msg = { addr, *addrlen, 205 *addrlen = msg.msg_namelen;
|
/external/compiler-rt/lib/msan/ |
H A D | msan_interceptors.cc | 798 void *srcaddr, int *addrlen) { 801 if (srcaddr) srcaddr_sz = *addrlen; 802 SSIZE_T res = REAL(recvfrom)(fd, buf, len, flags, srcaddr, addrlen); 806 SIZE_T sz = *addrlen; 797 INTERCEPTOR(SSIZE_T, recvfrom, int fd, void *buf, SIZE_T len, int flags, void *srcaddr, int *addrlen) argument
|
/external/chromium_org/net/socket/ |
H A D | tcp_socket_win.cc | 860 socklen_t addrlen = sizeof(source_address); local 862 socket_, reinterpret_cast<struct sockaddr*>(&source_address), &addrlen);
|
/external/libsepol/src/ |
H A D | services.c | 1835 * `addrp' where `addrlen' is the length of the address 1841 size_t addrlen, sepol_security_id_t * out_sid) 1850 if (addrlen != sizeof(uint32_t)) { 1867 if (addrlen != sizeof(uint64_t) * 2) { 1839 sepol_node_sid(uint16_t domain, void *addrp, size_t addrlen, sepol_security_id_t * out_sid) argument
|
/external/compiler-rt/lib/msan/tests/ |
H A D | msan_test.cc | 821 socklen_t addrlen; local 822 EXPECT_UMR(getsockname(sock, (struct sockaddr *)&buf, &addrlen)); 824 addrlen = sizeof(buf); 825 res = getsockname(sock, (struct sockaddr *)&buf, &addrlen); 826 EXPECT_NOT_POISONED(addrlen); 828 EXPECT_NOT_POISONED(buf[addrlen - 1]); 829 EXPECT_POISONED(buf[addrlen]);
|