Searched refs:salen (Results 1 - 23 of 23) sorted by relevance

/external/python/cpython2/Modules/
H A Dgetnameinfo.c89 getnameinfo(sa, salen, host, hostlen, serv, servlen, flags)
91 size_t salen;
117 if (len != salen) return ENI_SALEN;
119 len = salen;
/external/python/cpython3/Modules/
H A Dgetnameinfo.c89 getnameinfo(sa, salen, host, hostlen, serv, servlen, flags)
91 size_t salen;
117 if (len != salen) return ENI_SALEN;
119 len = salen;
/external/curl/lib/
H A Dhostip6.c74 GETNAMEINFO_TYPE_ARG2 salen,
80 int res = (getnameinfo)(sa, salen,
73 curl_dogetnameinfo(GETNAMEINFO_QUAL_ARG1 GETNAMEINFO_TYPE_ARG1 sa, GETNAMEINFO_TYPE_ARG2 salen, char *host, GETNAMEINFO_TYPE_ARG46 hostlen, char *serv, GETNAMEINFO_TYPE_ARG46 servlen, GETNAMEINFO_TYPE_ARG7 flags, int line, const char *source) argument
H A Dhostip.h138 GETNAMEINFO_TYPE_ARG2 salen,
H A Dmemdebug.h142 #define getnameinfo(sa,salen,host,hostlen,serv,servlen,flags) \
143 curl_dogetnameinfo(sa, salen, host, hostlen, serv, servlen, flags, \
H A Dsetup-os400.h52 curl_socklen_t salen,
/external/ltp/testcases/kernel/syscalls/getsockname/
H A Dgetsockname01.c72 socklen_t *salen; /* getsockname's 3rd argument */ member in struct:test_case_t
92 /* invalid salen test for aligned input */
95 "invalid aligned salen"}, {
96 /* invalid salen test for unaligned input */
99 "invalid unaligned salen"},
119 tdat[testno].salen));
/external/ltp/include/
H A Dsafe_net_fn.h28 char *tst_sock_addr(const struct sockaddr *sa, socklen_t salen, char *res,
/external/iputils/
H A Dtracepath6.c212 socklen_t salen; local
221 salen = sizeof(struct sockaddr_in6);
224 salen = sizeof(struct sockaddr_in);
227 salen = 0;
231 if (getnameinfo(sa, salen,
240 if (getnameinfo(sa, salen,
/external/libnl/lib/
H A Daddr.c691 * @arg salen Length of sockaddr structure buffer.
694 * specified abstract address. The salen argument needs to be set to the
701 socklen_t *salen)
707 if (*salen < sizeof(*sai))
712 *salen = sizeof(*sai);
719 if (*salen < sizeof(*sa6))
724 *salen = sizeof(*sa6);
804 socklen_t salen = sizeof(buf); local
806 err = nl_addr_fill_sockaddr(addr, (struct sockaddr *) &buf, &salen);
810 err = getnameinfo((struct sockaddr *) &buf, salen, hos
700 nl_addr_fill_sockaddr(struct nl_addr *addr, struct sockaddr *sa, socklen_t *salen) argument
[all...]
/external/ltp/testcases/kernel/syscalls/accept/
H A Daccept01.c61 socklen_t *salen; /* accept's 3rd argument */ member in struct:test_case_t
80 "invalid salen"}, {
83 "invalid salen"}, {
107 tdat[testno].salen));
/external/ltp/testcases/kernel/syscalls/bind/
H A Dbind01.c72 int salen; /* bind's 3rd argument */ member in struct:test_case_t
88 3, -1, EINVAL, setup0, cleanup0, "invalid salen"}, {
122 (s, tdat[testno].sockaddr, tdat[testno].salen));
/external/ltp/lib/
H A Dsafe_net.c23 char *tst_sock_addr(const struct sockaddr *sa, socklen_t salen, char *res, argument
76 sa->sa_family, salen);
/external/ltp/testcases/kernel/syscalls/connect/
H A Dconnect01.c75 int salen; /* connect's 3rd argument */ member in struct:test_case_t
95 3, -1, EINVAL, setup1, cleanup1, "invalid salen"}, {
137 (s, tdat[testno].sockaddr, tdat[testno].salen));
/external/ltp/testcases/kernel/syscalls/recvfrom/
H A Drecvfrom01.c85 socklen_t *salen; /* from address value/result buffer length */ member in struct:test_case_t
160 tdat[testno].salen));
/external/ppp/pppd/plugins/radius/
H A Dsendserver.c203 int salen; local
328 salen = sizeof (saremote);
331 (int) 0, &saremote, &salen);
/external/ltp/testcases/kernel/syscalls/getsockopt/
H A Dgetsockopt01.c78 int salen; member in struct:test_case_t
/external/ltp/testcases/kernel/syscalls/setsockopt/
H A Dsetsockopt01.c78 int salen; member in struct:test_case_t
/external/ltp/testcases/kernel/syscalls/sockioctl/
H A Dsockioctl01.c74 int salen; member in struct:test_case_t
/external/curl/packages/OS400/
H A Dos400sys.c262 Curl_getnameinfo_a(const struct sockaddr * sa, curl_socklen_t salen, argument
286 status = getnameinfo(sa, salen, enodename, nodenamelen,
/external/libevent/
H A Dhttp.c121 fake_getnameinfo(const struct sockaddr *sa, size_t salen, char *host, argument
4166 evutil_socket_t fd, struct sockaddr *sa, ev_socklen_t salen)
4172 name_from_addr(sa, salen, &hostname, &portname);
4247 struct sockaddr *sa, ev_socklen_t salen)
4251 evcon = evhttp_get_request_connection(http, fd, sa, salen);
4281 name_from_addr(struct sockaddr *sa, ev_socklen_t salen, argument
4289 ni_result = getnameinfo(sa, salen,
4304 ni_result = fake_getnameinfo(sa, salen,
4164 evhttp_get_request_connection( struct evhttp* http, evutil_socket_t fd, struct sockaddr *sa, ev_socklen_t salen) argument
4246 evhttp_get_request(struct evhttp *http, evutil_socket_t fd, struct sockaddr *sa, ev_socklen_t salen) argument
/external/valgrind/coregrind/m_syswrap/
H A Dsyswrap-generic.c1115 struct vki_sockaddr *sa, UInt salen )
1129 if ( sa == NULL || salen == 0 ) return;
1200 salen - sizeof(sa->sa_family));
/external/compiler-rt/lib/sanitizer_common/
H A Dsanitizer_common_interceptors.inc2142 INTERCEPTOR(int, getnameinfo, void *sockaddr, unsigned salen, char *host,
2145 COMMON_INTERCEPTOR_ENTER(ctx, getnameinfo, sockaddr, salen, host, hostlen,
2147 // FIXME: consider adding READ_RANGE(sockaddr, salen)
2153 REAL(getnameinfo)(sockaddr, salen, host, hostlen, serv, servlen, flags);

Completed in 1133 milliseconds