Lines Matching refs:sockctrl
1044 SOCKET sockctrl; // keeps the socket ID for this control connection
1064 sockctrl = accept(listen_sock, (struct sockaddr *) &from, &fromlen);
1066 if (sockctrl != INVALID_SOCKET)
1096 rpcap_senderror(sockctrl, 0, PCAP_ERR_HOSTNOAUTH, errbuf, NULL);
1097 sock_close(sockctrl, NULL, 0);
1111 if (WSAEventSelect(sockctrl, NULL, 0) == SOCKET_ERROR)
1114 rpcap_senderror(sockctrl, 0, PCAP_ERR_HOSTNOAUTH, errbuf, NULL);
1115 sock_close(sockctrl, NULL, 0);
1118 if (ioctlsocket(sockctrl, FIONBIO, &off) == SOCKET_ERROR)
1121 rpcap_senderror(sockctrl, 0, PCAP_ERR_HOSTNOAUTH, errbuf, NULL);
1122 sock_close(sockctrl, NULL, 0);
1127 // Allocate a location to hold the value of sockctrl.
1130 // I guess we *could* just cast sockctrl to a void *, but that's
1138 rpcap_senderror(sockctrl, 0, PCAP_ERR_OPEN, errbuf, NULL);
1139 sock_close(sockctrl, NULL, 0);
1142 *sockctrl_temp = sockctrl;
1149 rpcap_senderror(sockctrl, 0, PCAP_ERR_OPEN, errbuf, NULL);
1150 sock_close(sockctrl, NULL, 0);
1160 rpcap_senderror(sockctrl, 0, PCAP_ERR_OPEN, errbuf, NULL);
1161 sock_close(sockctrl, NULL, 0);
1193 (void)daemon_serviceloop(sockctrl, sockctrl, 0,
1196 close(sockctrl);
1203 closesocket(sockctrl);
1224 SOCKET sockctrl; // keeps the socket ID for this control connection
1257 if ((sockctrl = sock_open(addrinfo, SOCKOPEN_CLIENT, 0, errbuf, PCAP_ERRBUF_SIZE)) == INVALID_SOCKET)
1272 activeclose = daemon_serviceloop(sockctrl, sockctrl, 1,
1275 sock_close(sockctrl, NULL, 0);
1293 SOCKET sockctrl;
1295 sockctrl = *((SOCKET *)ptr);
1303 (void)daemon_serviceloop(sockctrl, sockctrl, 0, nullAuthAllowed);
1305 sock_close(sockctrl, NULL, 0);