/dragonfly/sys/netinet/ |
H A D | ip_encap.c | 331 if (sp->sa_len > sizeof ep->src || dp->sa_len > sizeof ep->dst) in encap_attach() 333 if (sp->sa_len != dp->sa_len) in encap_attach() 344 if (ep->src.ss_len != sp->sa_len || in encap_attach() 362 bcopy(sp, &ep->src, sp->sa_len); in encap_attach() 364 bcopy(dp, &ep->dst, dp->sa_len); in encap_attach() 439 if (sp->sa_len > sizeof s || dp->sa_len > sizeof d) in mask_match() 443 if (sp->sa_len != ep->src.ss_len || dp->sa_len != ep->dst.ss_len) in mask_match() 451 for (i = 0 ; i < sp->sa_len; i++) { in mask_match() 460 for (i = 0 ; i < dp->sa_len; i++) { in mask_match() 467 s.ss_len = sp->sa_len; in mask_match() [all …]
|
/dragonfly/sys/net/gif/ |
H A D | if_gif.c | 551 if (src->sa_len != sizeof(struct sockaddr_in)) in gif_ioctl() 567 if (dst->sa_len != sizeof(struct sockaddr_in)) in gif_ioctl() 634 if (src->sa_len > size) in gif_ioctl() 636 bcopy((caddr_t)src, (caddr_t)dst, src->sa_len); in gif_ioctl() 666 if (src->sa_len > size) in gif_ioctl() 682 if (src->sa_len > size) in gif_ioctl() 691 if (src->sa_len > size) in gif_ioctl() 724 sc2->gif_pdst->sa_len != dst->sa_len || in gif_set_tunnel() 726 sc2->gif_psrc->sa_len != src->sa_len) in gif_set_tunnel() 762 bcopy((caddr_t)src, (caddr_t)sa, src->sa_len); in gif_set_tunnel() [all …]
|
/dragonfly/sys/kern/ |
H A D | uipc_syscalls.c | 397 if (*namelen > sa->sa_len) in kern_accept() 398 *namelen = sa->sa_len; in kern_accept() 437 int sa_len; in sys_accept() local 441 error = copyin(uap->anamelen, &sa_len, sizeof(sa_len)); in sys_accept() 474 int sa_len; in sys_extaccept() local 479 error = copyin(uap->anamelen, &sa_len, sizeof(sa_len)); in sys_extaccept() 512 int sa_len; in sys_accept4() local 521 error = copyin(uap->anamelen, &sa_len, sizeof(sa_len)); in sys_accept4() 1477 int error, sa_len; in sys_getpeername() local 1479 error = copyin(uap->alen, &sa_len, sizeof(sa_len)); in sys_getpeername() [all …]
|
/dragonfly/contrib/dhcpcd/src/ |
H A D | sa.h | 60 #define sa_len(sa) ((sa)->sa_len) macro 62 socklen_t sa_len(const struct sockaddr *sa);
|
H A D | sa.c | 99 sa_len(const struct sockaddr *sa) in sa_len() function 314 sa->sa_len = sizeof(struct sockaddr_in); in sa_fromprefix() 322 sa->sa_len = sizeof(struct sockaddr_in6); in sa_fromprefix() 417 len = MIN(sa1->sa_len, sa2->sa_len); in sa_cmp()
|
H A D | if-bsd.c | 100 #define RT_ADVANCE(x, n) (x += RT_ROUNDUP((n)->sa_len)) 295 .ifr_addr.sa_len = maclen, in if_setmac() 669 memcpy(dst, src, src->sa_len); in if_copysa() 697 memcpy(bp, (sa), (sa)->sa_len); \ in if_route() 698 bp += RT_ROUNDUP((sa)->sa_len); \ in if_route() 1355 memcpy(&sdl, rti_info[RTAX_IFA], rti_info[RTAX_IFA]->sa_len); in if_ifa() 1544 size_t salen = (size_t)RT_ROUNDUP(sa->sa_len); in if_missfilter0() 1546 size_t diff = salen - (sa->sa_len); in if_missfilter0() 1565 memcpy(cp, sa, sa->sa_len); in if_missfilter0() 1567 memset(cp + sa->sa_len, 0, diff); in if_missfilter0() [all …]
|
H A D | route.c | 79 const char *addre = (char *)dst + sa_len(addr); in rt_maskedaddr() 80 const char *netmaske = (char *)dst + MIN(sa_len(addr), sa_len(netmask)); in rt_maskedaddr() 84 dst->sa_len = addr->sa_len; in rt_maskedaddr()
|
/dragonfly/sbin/route/ |
H A D | route.c | 349 if (sa->sa_len == 0) in routename() 390 memcpy(&sin6, sa, sa->sa_len); in routename() 424 uint8_t *splim = (uint8_t *)sa + sa->sa_len; in routename() 514 memcpy(&sin6, sa, sa->sa_len); in netname() 1044 su->sa.sa_len = aflen; in getaddr() 1107 su->sa.sa_len = sizeof(*su); in getaddr() 1116 su->sa.sa_len = sizeof(*su); in getaddr() 1209 so_mask.sa.sa_len = aflen; in prefixlen() 1354 int olen = so_mask.sa.sa_len; in mask_addr() 1782 int size = sa->sa_len; in sockaddr() [all …]
|
/dragonfly/sys/net/ |
H A D | rtsock.c | 228 if (sa->sa_len == dst->sa_len && in rts_filter() 231 cp += RT_ROUNDUP(sa->sa_len); in rts_filter() 514 sizeof(sa->sa_len)) in route_ctloutput() 521 if (sa->sa_len < _SA_MINSIZE || in route_ctloutput() 524 cp += RT_ROUNDUP(sa->sa_len); in route_ctloutput() 1017 if ((cp + sa->sa_len) > cplim) { in rt_xaddrs() 1028 if (sa->sa_len == 0) { in rt_xaddrs() 1040 cp += RT_ROUNDUP(sa->sa_len); in rt_xaddrs() 1112 dlen = RT_ROUNDUP(sa->sa_len); in rt_msg_buffer() 1144 len += RT_ROUNDUP(sa->sa_len); in rt_msg_mbuf() [all …]
|
H A D | route.c | 386 if ((rt_mask(rt) != NULL && rt_mask(rt)->sa_len < 2)) { in rtredirect_oncpu() 925 bcopy(dst, ndst, dst->sa_len); in rtrequest1() 1130 len = imin(rt_key(rt0)->sa_len, rt_key(rt)->sa_len); in rt_fixchange() 1138 mlen = rt_key(rt->rt_parent)->sa_len; in rt_fixchange() 1139 if (mlen > rt_key(rt0)->sa_len) { in rt_fixchange() 1182 int dlen = RT_ROUNDUP(dst->sa_len), glen = RT_ROUNDUP(gate->sa_len); in rt_setgate() 1195 dst->sa_len == gate->sa_len && in rt_setgate() 1214 glen > RT_ROUNDUP(rt->rt_gateway->sa_len)) { in rt_setgate() 1385 shimlen = RT_ROUNDUP(shim->sa_len); in rt_setshims() 1520 len = sa->sa_len - offsetof(struct sockaddr, sa_data[0]); in sockaddr_print() [all …]
|
/dragonfly/tools/tools/net80211/wlanwatch/ |
H A D | wlanwatch.c | 151 if (sa->sa_len == 0) in routename() 160 if (in.s_addr == INADDR_ANY || sa->sa_len < 4) in routename() 190 memcpy(&sin6, sa, sa->sa_len); in routename() 194 if (sa->sa_len == sizeof(struct sockaddr_in6) && in routename() 219 u_short *slim = s + ((sa->sa_len + 1) >> 1); in routename()
|
/dragonfly/sbin/ifconfig/ |
H A D | af_inet.c | 181 if (getnameinfo(sa, sa->sa_len, src, sizeof(src), 0, 0, in in_status_tunnel() 189 if (getnameinfo(sa, sa->sa_len, dst, sizeof(dst), 0, 0, in in_status_tunnel() 203 memcpy(&addreq.ifra_addr, srcres->ai_addr, srcres->ai_addr->sa_len); in in_set_tunnel() 204 memcpy(&addreq.ifra_dstaddr, dstres->ai_addr, dstres->ai_addr->sa_len); in in_set_tunnel()
|
H A D | af_inet6.c | 471 if (getnameinfo(sa, sa->sa_len, src, sizeof(src), 0, 0, in in6_status_tunnel() 480 if (getnameinfo(sa, sa->sa_len, dst, sizeof(dst), 0, 0, in in6_status_tunnel() 494 memcpy(&addreq.ifra_addr, srcres->ai_addr, srcres->ai_addr->sa_len); in in6_set_tunnel() 495 memcpy(&addreq.ifra_dstaddr, dstres->ai_addr, dstres->ai_addr->sa_len); in in6_set_tunnel()
|
/dragonfly/sys/netgraph/ksocket/ |
H A D | ng_ksocket.c | 176 return (sa->sa_len < SADATA_OFFSET) ? 0 : sa->sa_len - SADATA_OFFSET; in ng_parse_generic_sockdata_getLength() 307 *buflen = sa->sa_len; in ng_ksocket_sockaddr_parse() 656 || msg->header.arglen < sa->sa_len) in ng_ksocket_rcvmsg() 718 || msg->header.arglen < sa->sa_len) in ng_ksocket_rcvmsg() 764 len = (sa == NULL) ? 0 : sa->sa_len; in ng_ksocket_rcvmsg() 1079 len = sizeof(*meta) + sizeof(*mhead) + sa->sa_len; in ng_ksocket_incoming() 1092 mhead->len = sizeof(*mhead) + sa->sa_len; in ng_ksocket_incoming() 1093 bcopy(sa, mhead->data, sa->sa_len); in ng_ksocket_incoming() 1180 len += sa->sa_len; in ng_ksocket_finish_accept() 1218 bcopy(sa, &resp_data->addr, sa->sa_len); in ng_ksocket_finish_accept()
|
/dragonfly/games/hunt/hunt/ |
H A D | hunt.c | 211 Daemon.sa_len = 0; in main() 242 if (connect(Socket, &Daemon, Daemon.sa_len) == -1) { in main() 332 is_current = (last_driver == -1 && Daemon.sa_len != 0 && in find_driver() 333 memcmp(&Daemon, &driver->addr, Daemon.sa_len) == 0); in find_driver() 386 if (connect(s, &driver->addr, driver->addr.sa_len) < 0) { in dump_scores()
|
H A D | list.c | 190 if (sendto(s, &msg, sizeof msg, 0, addr, addr->sa_len) == -1) in start_probe() 281 (ifr->ifr_addr.sa_len > sizeof(struct sockaddr) ? in probe_drivers() 282 ifr->ifr_addr.sa_len : sizeof(struct sockaddr)); in probe_drivers()
|
/dragonfly/sys/netgraph7/ksocket/ |
H A D | ng_ksocket.c | 178 return (sa->sa_len < SADATA_OFFSET) ? 0 : sa->sa_len - SADATA_OFFSET; in ng_parse_generic_sockdata_getLength() 309 *buflen = sa->sa_len; in ng_ksocket_sockaddr_parse() 679 || msg->header.arglen < sa->sa_len) in ng_ksocket_rcvmsg() 740 || msg->header.arglen < sa->sa_len) in ng_ksocket_rcvmsg() 787 len = (sa == NULL) ? 0 : sa->sa_len; in ng_ksocket_rcvmsg() 1115 sa->sa_len, M_NOWAIT); in ng_ksocket_incoming2() 1120 bcopy(sa, &stag->sa, sa->sa_len); in ng_ksocket_incoming2() 1206 len += sa->sa_len; in ng_ksocket_finish_accept() 1253 bcopy(sa, &resp_data->addr, sa->sa_len); in ng_ksocket_finish_accept()
|
/dragonfly/usr.bin/netstat/ |
H A D | route.c | 302 bcopy(sa, &addr, sa->sa_len); in size_cols_rtentry() 305 bcopy(sa, &mask, sa->sa_len); in size_cols_rtentry() 427 if (pt_u.u_sa.sa_len > sizeof (pt_u.u_sa)) in kgetsa() 428 kread((u_long)dst, (char *)pt_u.u_data, pt_u.u_sa.sa_len); in kgetsa() 586 sa = (struct sockaddr *)(RT_ROUNDUP(sa->sa_len) + (char *)sa); in np_rtentry() 712 slim = sa->sa_len + (u_char *) sa; in fmt_sockaddr() 769 bcopy(sa, &addr, sa->sa_len); in p_rtentry() 772 bcopy(sa, &mask, sa->sa_len); in p_rtentry()
|
/dragonfly/test/ifconf/ |
H A D | ifconf.c | 20 ((ifr)->ifr_addr.sa_len > sizeof(struct sockaddr) ? \ 22 (ifr)->ifr_addr.sa_len) : sizeof(struct ifreq))
|
/dragonfly/sbin/ipfw3/ |
H A D | ipfw3.h | 47 ( (!(sa) || ((struct sockaddr *)(sa))->sa_len == 0) ? \ 49 1 + ( (((struct sockaddr *)(sa))->sa_len - 1) | (sizeof(long) - 1) ) )
|
/dragonfly/usr.sbin/tcpdrop/ |
H A D | tcpdrop.c | 168 rv = getnameinfo(sa, sa->sa_len, hs->hs_host, sizeof hs->hs_host, in sockinfo() 181 memcpy(&addrs[TCPDROP_FOREIGN], fsa, fsa->sa_len); in tcpdrop() 182 memcpy(&addrs[TCPDROP_LOCAL], lsa, lsa->sa_len); in tcpdrop()
|
/dragonfly/usr.bin/truss/ |
H A D | syscalls.c | 327 (int)sa->sa_len, (int)sa->sa_family, &i, in print_arg() 328 6 * (int)(sa->sa_len - ((char *)&sa->sa_data - (char *)sa)), ""); in print_arg() 331 for (q = (u_char *)&sa->sa_data; q < (u_char *)sa + sa->sa_len; q++) in print_arg()
|
/dragonfly/usr.sbin/lpr/lpd/ |
H A D | lpd.c | 657 error = getnameinfo(f, f->sa_len, hostbuf, sizeof(hostbuf), NULL, 0, in chkhost() 661 error = getnameinfo(f, f->sa_len, hostbuf, sizeof(hostbuf), in chkhost() 687 error = getnameinfo(f, f->sa_len, hostbuf, sizeof(hostbuf), NULL, 0, in chkhost() 749 if (__ivaliduser_sa(hostf, f, f->sa_len, DUMMY, DUMMY) == 0) { in chkhost() 773 error = getnameinfo(f, f->sa_len, NULL, 0, serv, sizeof(serv), in chkhost()
|
/dragonfly/lib/libutil/ |
H A D | realhostname.c | 155 if (sa->sa_len == addrlen && in realhostname_sa() 168 if (!memcmp(sa, addr, sa->sa_len)) { in realhostname_sa()
|
/dragonfly/usr.bin/tftp/ |
H A D | tftp.c | 377 if (sendto(f, ackbuf, length, 0, peer, peer->sa_len) != length) in nak() 466 if (getnameinfo(sa, sa->sa_len, NULL, 0, a, sizeof(a), NI_NUMERICSERV)) in cmpport() 468 if (getnameinfo(sb, sb->sa_len, NULL, 0, b, sizeof(b), NI_NUMERICSERV)) in cmpport()
|