Searched refs:addrbuf (Results 1 – 3 of 3) sorted by relevance
/external/strace/ |
D | net.c | 950 } addrbuf; local 961 if ((addrlen<2) || (addrlen>sizeof(addrbuf))) 962 addrlen=sizeof(addrbuf); 964 if (umoven(tcp, addr, addrlen, (char*)&addrbuf) < 0) { 970 printxval(addrfams, addrbuf.sa.sa_family, "AF_???"); 973 switch (addrbuf.sa.sa_family) { 977 } else if (addrbuf.sau.sun_path[0]) { 978 tprintf("path=\"%-.*s\"", addrlen-2, addrbuf.sau.sun_path); 980 tprintf("path=@%-.*s", addrlen-3, addrbuf.sau.sun_path+1); 985 ntohs(addrbuf.sin.sin_port), inet_ntoa(addrbuf.sin.sin_addr)); [all …]
|
/external/ipsec-tools/src/libipsec/ |
D | policy_parse.y | 111 static struct sockaddr *parse_sockaddr __P((struct _val *addrbuf, 375 parse_sockaddr(addrbuf, portbuf) in parse_sockaddr() argument 376 struct _val *addrbuf; in parse_sockaddr() 385 if ((addr = malloc(addrbuf->len + 1)) == NULL) { 398 strncpy(addr, addrbuf->buf, addrbuf->len); 399 addr[addrbuf->len] = '\0';
|
/external/ping/ |
D | ping.c | 576 char addrbuf[128]; in main_loop() local 657 msg.msg_name = addrbuf; in main_loop() 658 msg.msg_namelen = sizeof(addrbuf); in main_loop() 697 not_ours = parse_reply(&msg, cc, addrbuf, recv_timep); in main_loop()
|