/third_party/libwebsockets/lib/misc/ |
H A D | getifaddrs.c | 121 size_t salen; in getifaddrs2() local 127 salen = sizeof(struct sockaddr); in getifaddrs2() 129 salen = sa->sa_len; in getifaddrs2() 133 salen = SA_LEN(sa); in getifaddrs2() 149 (*end)->ifa_addr = lws_malloc(salen, "getifaddrs"); in getifaddrs2() 150 memcpy((*end)->ifa_addr, sa, salen); in getifaddrs2()
|
/third_party/libuv/src/unix/ |
H A D | getnameinfo.c | 34 socklen_t salen; in uv__getnameinfo_work() local 39 salen = sizeof(struct sockaddr_in); in uv__getnameinfo_work() 41 salen = sizeof(struct sockaddr_in6); in uv__getnameinfo_work() 46 salen, in uv__getnameinfo_work()
|
/third_party/nghttp2/src/ |
H A D | shrpx_quic.h | 112 const sockaddr *sa, socklen_t salen, 118 const sockaddr *sa, socklen_t salen, 122 size_t salen, const uint8_t *secret, size_t secretlen); 125 socklen_t salen, const uint8_t *secret, size_t secretlen);
|
H A D | shrpx_quic.cc | 296 const sockaddr *sa, socklen_t salen, in generate_retry_token() 304 token, secret, secretlen, version, sa, salen, &retry_scid, &odcid, t); in generate_retry_token() 316 const sockaddr *sa, socklen_t salen, in verify_retry_token() 324 secretlen, version, sa, salen, &dcid, in verify_retry_token() 333 size_t salen, const uint8_t *secret, size_t secretlen) { in generate_token() 339 token, secret, secretlen, sa, salen, t); in generate_token() 350 socklen_t salen, const uint8_t *secret, size_t secretlen) { in verify_token() 356 salen, 3600 * NGTCP2_SECONDS, in verify_token() 295 generate_retry_token(uint8_t *token, size_t &tokenlen, uint32_t version, const sockaddr *sa, socklen_t salen, const ngtcp2_cid &retry_scid, const ngtcp2_cid &odcid, const uint8_t *secret, size_t secretlen) generate_retry_token() argument 314 verify_retry_token(ngtcp2_cid &odcid, const uint8_t *token, size_t tokenlen, uint32_t version, const ngtcp2_cid &dcid, const sockaddr *sa, socklen_t salen, const uint8_t *secret, size_t secretlen) verify_retry_token() argument 332 generate_token(uint8_t *token, size_t &tokenlen, const sockaddr *sa, size_t salen, const uint8_t *secret, size_t secretlen) generate_token() argument 349 verify_token(const uint8_t *token, size_t tokenlen, const sockaddr *sa, socklen_t salen, const uint8_t *secret, size_t secretlen) verify_token() argument
|
/third_party/node/deps/uv/src/unix/ |
H A D | getnameinfo.c | 34 socklen_t salen; in uv__getnameinfo_work() local 39 salen = sizeof(struct sockaddr_in); in uv__getnameinfo_work() 41 salen = sizeof(struct sockaddr_in6); in uv__getnameinfo_work() 46 salen, in uv__getnameinfo_work()
|
/third_party/pulseaudio/src/pulsecore/ |
H A D | ipacl.c | 170 socklen_t salen; in pa_ip_acl_check() local 175 salen = sizeof(sa); in pa_ip_acl_check() 176 if (getpeername(fd, (struct sockaddr*) &sa, &salen) < 0) in pa_ip_acl_check() 186 if (sa.ss_family == AF_INET && salen != sizeof(struct sockaddr_in)) in pa_ip_acl_check() 190 if (sa.ss_family == AF_INET6 && salen != sizeof(struct sockaddr_in6)) in pa_ip_acl_check()
|
H A D | socket-client.c | 245 static int sockaddr_prepare(pa_socket_client *c, const struct sockaddr *sa, size_t salen) { argument 248 pa_assert(salen); 266 if (do_connect(c, sa, (socklen_t) salen) < 0) 272 pa_socket_client* pa_socket_client_new_sockaddr(pa_mainloop_api *m, const struct sockaddr *sa, size_t salen) { argument 277 pa_assert(salen > 0); 281 if (sockaddr_prepare(c, sa, salen) < 0)
|
H A D | socket-client.h | 38 pa_socket_client* pa_socket_client_new_sockaddr(pa_mainloop_api *m, const struct sockaddr *sa, size_t salen);
|
/third_party/ltp/testcases/kernel/syscalls/bind/ |
H A D | bind01.c | 29 socklen_t salen; member 35 EINVAL, "invalid salen" }, 51 TST_EXP_FAIL(bind(*tcase->socket_fd, tcase->sockaddr, tcase->salen), in verify_bind() 54 TST_EXP_PASS(bind(*tcase->socket_fd, tcase->sockaddr, tcase->salen), in verify_bind()
|
/third_party/python/Modules/ |
H A D | getnameinfo.c | 92 getnameinfo(sa, salen, host, hostlen, serv, servlen, flags) in getnameinfo() 94 size_t salen; 120 if (len != salen) return ENI_SALEN; 122 len = salen;
|
/third_party/pulseaudio/src/modules/rtp/ |
H A D | sdp.c | 130 i->salen = 0; in pa_sdp_parse() 171 i->salen = sizeof(struct sockaddr_in); in pa_sdp_parse() 189 i->salen = sizeof(struct sockaddr_in6); in pa_sdp_parse() 248 if (!i->origin || (!is_goodbye && (!i->salen || i->payload > 127 || !ss_valid || port == 0))) { in pa_sdp_parse()
|
H A D | module-rtp-recv.c | 401 static int mcast_socket(const struct sockaddr* sa, socklen_t salen) { in mcast_socket() argument 405 pa_assert(salen > 0); in mcast_socket() 461 if (bind(fd, sa, salen) < 0) { in mcast_socket() 508 if ((fd = mcast_socket((const struct sockaddr*) &sdp_info->sa, sdp_info->salen)) < 0) in session_new() 685 socklen_t salen; in pa__init() local 703 salen = sizeof(sa4); in pa__init() 709 salen = sizeof(sa6); in pa__init() 722 if ((fd = mcast_socket(sa, salen)) < 0) in pa__init()
|
H A D | sdp.h | 36 socklen_t salen; member
|
H A D | sap.c | 77 socklen_t salen = sizeof(sa_buf); in pa_sap_send() local 82 if (getsockname(c->fd, sa, &salen) < 0) { in pa_sap_send()
|
/third_party/node/deps/cares/src/lib/ |
H A D | ares__socket.c | 246 ares_socklen_t salen; in ares__open_connection() local 266 salen = sizeof(saddr.sa4); in ares__open_connection() 267 memset(sa, 0, (size_t)salen); in ares__open_connection() 275 salen = sizeof(saddr.sa6); in ares__open_connection() 276 memset(sa, 0, (size_t)salen); in ares__open_connection() 328 if (ares__connect_socket(channel, s, sa, salen) == -1) { in ares__open_connection()
|
H A D | ares_getnameinfo.c | 91 ares_socklen_t salen, int flags_int, in ares_getnameinfo_int() 101 if ((sa->sa_family == AF_INET) && (salen == sizeof(struct sockaddr_in))) { in ares_getnameinfo_int() 105 (salen == sizeof(struct sockaddr_in6))) { in ares_getnameinfo_int() 145 if (salen == sizeof(struct sockaddr_in6)) { in ares_getnameinfo_int() 190 ares_socklen_t salen, int flags_int, in ares_getnameinfo() 198 ares_getnameinfo_int(channel, sa, salen, flags_int, callback, arg); in ares_getnameinfo() 89 ares_getnameinfo_int(ares_channel_t *channel, const struct sockaddr *sa, ares_socklen_t salen, int flags_int, ares_nameinfo_callback callback, void *arg) ares_getnameinfo_int() argument 189 ares_getnameinfo(ares_channel_t *channel, const struct sockaddr *sa, ares_socklen_t salen, int flags_int, ares_nameinfo_callback callback, void *arg) ares_getnameinfo() argument
|
/third_party/ltp/testcases/kernel/syscalls/accept/ |
H A D | accept01.c | 39 socklen_t salen; /* accept's 3rd argument */ member 58 1, EINVAL, "invalid salen" 100 TST_EXP_FAIL2(accept(*tcase->fd, tcase->sockaddr, &tcase->salen), in verify_accept()
|
/third_party/ltp/testcases/kernel/syscalls/getsockname/ |
H A D | getsockname01.c | 72 socklen_t *salen; /* getsockname's 3rd argument */ member 92 /* invalid salen test for aligned input */ 95 "invalid aligned salen"}, { 96 /* invalid salen test for unaligned input */ 99 "invalid unaligned salen"}, 119 tdat[testno].salen)); in main()
|
/third_party/ltp/testcases/kernel/syscalls/connect/ |
H A D | connect01.c | 75 int salen; /* connect's 3rd argument */ member 95 3, -1, EINVAL, setup1, cleanup1, "invalid salen"}, { 155 (s, tdat[testno].sockaddr, tdat[testno].salen)); in main()
|
/third_party/curl/lib/ |
H A D | connect.h | 51 bool Curl_addr2string(struct sockaddr *sa, curl_socklen_t salen,
|
H A D | setup-os400.h | 57 socklen_t salen,
|
/third_party/ltp/testcases/kernel/syscalls/recvfrom/ |
H A D | recvfrom01.c | 85 socklen_t *salen; /* from address value/result buffer length */ member 160 tdat[testno].salen)); in main()
|
/third_party/musl/porting/linux/user/src/network/ |
H A D | lookup_name.c | 459 socklen_t salen, dalen; in lookup_name_ext() local 463 sa = &sa6; salen = sizeof sa6; in lookup_name_ext() 473 sa = &sa4; salen = sizeof sa4; in lookup_name_ext() 484 if (!getsockname(fd, sa, &salen)) { in lookup_name_ext()
|
/third_party/musl/src/network/ |
H A D | lookup_name.c | 527 socklen_t salen, dalen; in lookup_name_ext() local 531 sa = &sa6; salen = sizeof sa6; in lookup_name_ext() 541 sa = &sa4; salen = sizeof sa4; in lookup_name_ext() 552 if (!getsockname(fd, sa, &salen)) { in lookup_name_ext()
|
/third_party/pulseaudio/src/modules/raop/ |
H A D | raop-client.c | 706 socklen_t salen; in connect_udp_socket() local 717 salen = sizeof(sa4); in connect_udp_socket() 723 salen = sizeof(sa6); in connect_udp_socket() 739 if (connect(fd, sa, salen) < 0) { in connect_udp_socket() 763 socklen_t salen; in open_bind_udp_socket() local 780 salen = sizeof(sa4); in open_bind_udp_socket() 788 salen = sizeof(sa6); in open_bind_udp_socket() 821 ret = bind(fd, sa, salen); in open_bind_udp_socket()
|