Lines Matching refs:peer
162 } peer;
186 } peer;
378 } peer;
382 sa.len.i=sizeof(sa.peer);
387 memset(&sa.peer, 0x00, sizeof(sa.peer));
389 ret=recvfrom(b->num,out,outl,0,&sa.peer.sa,(void *)&sa.len);
392 OPENSSL_assert(sa.len.s<=sizeof(sa.peer));
397 BIO_ctrl(b, BIO_CTRL_DGRAM_SET_PEER, 0, &sa.peer);
424 int peerlen = sizeof(data->peer);
426 if (data->peer.sa.sa_family == AF_INET)
427 peerlen = sizeof(data->peer.sa_in);
429 else if (data->peer.sa.sa_family == AF_INET6)
430 peerlen = sizeof(data->peer.sa_in6);
433 ret=sendto(b->num, (char *)in, inl, 0, &data->peer.sa, peerlen);
435 ret=sendto(b->num, in, inl, 0, &data->peer.sa, peerlen);
531 memcpy(&data->peer,to,sizeof(data->peer.sa_in));
535 memcpy(&data->peer,to,sizeof(data->peer.sa_in6));
539 memcpy(&data->peer,to,sizeof(data->peer.sa));
633 switch (data->peer.sa.sa_family)
641 if (IN6_IS_ADDR_V4MAPPED(&data->peer.sa_in6.sin6_addr))
669 peer,to,sizeof(data->peer.sa_in));
673 memcpy(&data->peer,to,sizeof(data->peer.sa_in6));
677 memcpy(&data->peer,to,sizeof(data->peer.sa));
684 memset(&(data->peer), 0x00, sizeof(data->peer));
688 switch (data->peer.sa.sa_family)
691 ret=sizeof(data->peer.sa_in);
695 ret=sizeof(data->peer.sa_in6);
699 ret=sizeof(data->peer.sa);
704 memcpy(ptr,&data->peer,(ret=num));
711 memcpy(&data->peer,to,sizeof(data->peer.sa_in));
715 memcpy(&data->peer,to,sizeof(data->peer.sa_in6));
719 memcpy(&data->peer,to,sizeof(data->peer.sa));
1144 /* The buffer was too small, this means the peer sent
1187 /* Test if peer uses SCTP-AUTH before continuing */