/external/python/cpython2/Modules/ |
H A D | getnameinfo.c | 89 getnameinfo(sa, salen, host, hostlen, serv, servlen, flags) 91 size_t salen; 117 if (len != salen) return ENI_SALEN; 119 len = salen;
|
/external/python/cpython3/Modules/ |
H A D | getnameinfo.c | 89 getnameinfo(sa, salen, host, hostlen, serv, servlen, flags) 91 size_t salen; 117 if (len != salen) return ENI_SALEN; 119 len = salen;
|
/external/curl/lib/ |
H A D | hostip6.c | 74 GETNAMEINFO_TYPE_ARG2 salen, 80 int res = (getnameinfo)(sa, salen, 73 curl_dogetnameinfo(GETNAMEINFO_QUAL_ARG1 GETNAMEINFO_TYPE_ARG1 sa, GETNAMEINFO_TYPE_ARG2 salen, char *host, GETNAMEINFO_TYPE_ARG46 hostlen, char *serv, GETNAMEINFO_TYPE_ARG46 servlen, GETNAMEINFO_TYPE_ARG7 flags, int line, const char *source) argument
|
H A D | hostip.h | 138 GETNAMEINFO_TYPE_ARG2 salen,
|
H A D | memdebug.h | 142 #define getnameinfo(sa,salen,host,hostlen,serv,servlen,flags) \ 143 curl_dogetnameinfo(sa, salen, host, hostlen, serv, servlen, flags, \
|
H A D | setup-os400.h | 52 curl_socklen_t salen,
|
/external/ltp/testcases/kernel/syscalls/getsockname/ |
H A D | getsockname01.c | 72 socklen_t *salen; /* getsockname's 3rd argument */ member in struct:test_case_t 92 /* invalid salen test for aligned input */ 95 "invalid aligned salen"}, { 96 /* invalid salen test for unaligned input */ 99 "invalid unaligned salen"}, 119 tdat[testno].salen));
|
/external/ltp/include/ |
H A D | safe_net_fn.h | 28 char *tst_sock_addr(const struct sockaddr *sa, socklen_t salen, char *res,
|
/external/iputils/ |
H A D | tracepath6.c | 212 socklen_t salen; local 221 salen = sizeof(struct sockaddr_in6); 224 salen = sizeof(struct sockaddr_in); 227 salen = 0; 231 if (getnameinfo(sa, salen, 240 if (getnameinfo(sa, salen,
|
/external/libnl/lib/ |
H A D | addr.c | 691 * @arg salen Length of sockaddr structure buffer. 694 * specified abstract address. The salen argument needs to be set to the 701 socklen_t *salen) 707 if (*salen < sizeof(*sai)) 712 *salen = sizeof(*sai); 719 if (*salen < sizeof(*sa6)) 724 *salen = sizeof(*sa6); 804 socklen_t salen = sizeof(buf); local 806 err = nl_addr_fill_sockaddr(addr, (struct sockaddr *) &buf, &salen); 810 err = getnameinfo((struct sockaddr *) &buf, salen, hos 700 nl_addr_fill_sockaddr(struct nl_addr *addr, struct sockaddr *sa, socklen_t *salen) argument [all...] |
/external/ltp/testcases/kernel/syscalls/accept/ |
H A D | accept01.c | 61 socklen_t *salen; /* accept's 3rd argument */ member in struct:test_case_t 80 "invalid salen"}, { 83 "invalid salen"}, { 107 tdat[testno].salen));
|
/external/ltp/testcases/kernel/syscalls/bind/ |
H A D | bind01.c | 72 int salen; /* bind's 3rd argument */ member in struct:test_case_t 88 3, -1, EINVAL, setup0, cleanup0, "invalid salen"}, { 122 (s, tdat[testno].sockaddr, tdat[testno].salen));
|
/external/ltp/lib/ |
H A D | safe_net.c | 23 char *tst_sock_addr(const struct sockaddr *sa, socklen_t salen, char *res, argument 76 sa->sa_family, salen);
|
/external/ltp/testcases/kernel/syscalls/connect/ |
H A D | connect01.c | 75 int salen; /* connect's 3rd argument */ member in struct:test_case_t 95 3, -1, EINVAL, setup1, cleanup1, "invalid salen"}, { 137 (s, tdat[testno].sockaddr, tdat[testno].salen));
|
/external/ltp/testcases/kernel/syscalls/recvfrom/ |
H A D | recvfrom01.c | 85 socklen_t *salen; /* from address value/result buffer length */ member in struct:test_case_t 160 tdat[testno].salen));
|
/external/ppp/pppd/plugins/radius/ |
H A D | sendserver.c | 203 int salen; local 328 salen = sizeof (saremote); 331 (int) 0, &saremote, &salen);
|
/external/ltp/testcases/kernel/syscalls/getsockopt/ |
H A D | getsockopt01.c | 78 int salen; member in struct:test_case_t
|
/external/ltp/testcases/kernel/syscalls/setsockopt/ |
H A D | setsockopt01.c | 78 int salen; member in struct:test_case_t
|
/external/ltp/testcases/kernel/syscalls/sockioctl/ |
H A D | sockioctl01.c | 74 int salen; member in struct:test_case_t
|
/external/curl/packages/OS400/ |
H A D | os400sys.c | 262 Curl_getnameinfo_a(const struct sockaddr * sa, curl_socklen_t salen, argument 286 status = getnameinfo(sa, salen, enodename, nodenamelen,
|
/external/libevent/ |
H A D | http.c | 121 fake_getnameinfo(const struct sockaddr *sa, size_t salen, char *host, argument 4166 evutil_socket_t fd, struct sockaddr *sa, ev_socklen_t salen) 4172 name_from_addr(sa, salen, &hostname, &portname); 4247 struct sockaddr *sa, ev_socklen_t salen) 4251 evcon = evhttp_get_request_connection(http, fd, sa, salen); 4281 name_from_addr(struct sockaddr *sa, ev_socklen_t salen, argument 4289 ni_result = getnameinfo(sa, salen, 4304 ni_result = fake_getnameinfo(sa, salen, 4164 evhttp_get_request_connection( struct evhttp* http, evutil_socket_t fd, struct sockaddr *sa, ev_socklen_t salen) argument 4246 evhttp_get_request(struct evhttp *http, evutil_socket_t fd, struct sockaddr *sa, ev_socklen_t salen) argument
|
/external/valgrind/coregrind/m_syswrap/ |
H A D | syswrap-generic.c | 1115 struct vki_sockaddr *sa, UInt salen ) 1129 if ( sa == NULL || salen == 0 ) return; 1200 salen - sizeof(sa->sa_family));
|
/external/compiler-rt/lib/sanitizer_common/ |
H A D | sanitizer_common_interceptors.inc | 2142 INTERCEPTOR(int, getnameinfo, void *sockaddr, unsigned salen, char *host, 2145 COMMON_INTERCEPTOR_ENTER(ctx, getnameinfo, sockaddr, salen, host, hostlen, 2147 // FIXME: consider adding READ_RANGE(sockaddr, salen) 2153 REAL(getnameinfo)(sockaddr, salen, host, hostlen, serv, servlen, flags);
|