/external/ipsec-tools/src/racoon/ |
session.c | 218 if (FD_ISSET(p->sock, &rfds)) 219 isakmp_handler(p->sock); 306 if (p->sock >= FD_SETSIZE) { 310 FD_SET(p->sock, &mask0); 311 nfds = (nfds > p->sock ? nfds : p->sock);
|
/external/kernel-headers/original/linux/ |
dccp.h | 369 extern int dccp_parse_options(struct sock *sk, struct sk_buff *skb); 438 * @dccps_role - Role of this sock, one of %dccp_role 475 static inline struct dccp_sock *dccp_sk(const struct sock *sk) 480 static inline struct dccp_minisock *dccp_msk(const struct sock *sk) 485 static inline int dccp_service_not_initialized(const struct sock *sk) 490 static inline const char *dccp_role(const struct sock *sk)
|
filter.h | 144 struct sock; 147 extern int sk_attach_filter(struct sock_fprog *fprog, struct sock *sk);
|
udp.h | 55 static inline struct udp_sock *udp_sk(const struct sock *sk)
|
/external/wpa_supplicant/ |
driver_atmel.c | 55 int sock; member in struct:wpa_driver_atmel_data 113 if (ioctl(drv->sock, ATMEL_WPA_IOCTL, &iwr) < 0) { 136 if (ioctl(drv->sock, ATMEL_WPA_IOCTL_PARAM, &iwr) < 0) { 472 drv->sock = socket(PF_INET, SOCK_DGRAM, 0); 473 if (drv->sock < 0) { 487 close(drv->sock);
|
driver_bsd.c | 33 int sock; /* open socket for 802.11 ioctls */ member in struct:wpa_driver_bsd_data 54 if (ioctl(drv->sock, SIOCS80211, &ireq) < 0) { 73 if (ioctl(drv->sock, SIOCG80211, &ireq) < 0) { 91 if (ioctl(drv->sock, SIOCS80211, &ireq) < 0) { 108 if (ioctl(drv->sock, SIOCG80211, &ireq) < 0) { 123 if (ioctl(drv->sock, SIOCGIFFLAGS, (caddr_t)&ifr) < 0) { 139 if (ioctl(drv->sock, SIOCSIFFLAGS, (caddr_t)&ifr) < 0) { 457 wpa_driver_bsd_event_receive(int sock, void *ctx, void *sock_ctx) 468 n = read(sock, buf, sizeof(buf)); 703 drv->sock = socket(PF_INET, SOCK_DGRAM, 0) [all...] |
driver_ipw.c | 35 int sock; member in struct:wpa_driver_ipw_data 108 if (ioctl(drv->sock, IPW_IOCTL_WPA_SUPPLICANT, &iwr) < 0) { 428 drv->sock = socket(PF_INET, SOCK_DGRAM, 0); 429 if (drv->sock < 0) { 443 close(drv->sock);
|
driver_hostap.c | 32 int sock; member in struct:wpa_driver_hostap_data 48 if (ioctl(drv->sock, PRISM2_IOCTL_HOSTAPD, &iwr) < 0) { 95 if (ioctl(drv->sock, PRISM2_IOCTL_PRISM2_PARAM, &iwr) < 0) { 258 if (ioctl(drv->sock, PRISM2_IOCTL_RESET, &iwr) < 0) { 467 drv->sock = socket(PF_INET, SOCK_DGRAM, 0); 468 if (drv->sock < 0) { 494 close(drv->sock);
|
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
driver_atmel.c | 54 int sock; member in struct:wpa_driver_atmel_data 112 if (ioctl(drv->sock, ATMEL_WPA_IOCTL, &iwr) < 0) { 135 if (ioctl(drv->sock, ATMEL_WPA_IOCTL_PARAM, &iwr) < 0) { 469 drv->sock = socket(PF_INET, SOCK_DGRAM, 0); 470 if (drv->sock < 0) { 484 close(drv->sock);
|
driver_bsd.c | 37 int sock; /* open socket for 802.11 ioctls */ member in struct:wpa_driver_bsd_data 58 if (ioctl(drv->sock, SIOCS80211, &ireq) < 0) { 77 if (ioctl(drv->sock, SIOCG80211, &ireq) < 0) { 95 if (ioctl(drv->sock, SIOCS80211, &ireq) < 0) { 112 if (ioctl(drv->sock, SIOCG80211, &ireq) < 0) { 127 if (ioctl(drv->sock, SIOCGIFFLAGS, (caddr_t)&ifr) < 0) { 143 if (ioctl(drv->sock, SIOCSIFFLAGS, (caddr_t)&ifr) < 0) { 460 wpa_driver_bsd_event_receive(int sock, void *ctx, void *sock_ctx) 471 n = read(sock, buf, sizeof(buf)); 706 drv->sock = socket(PF_INET, SOCK_DGRAM, 0) [all...] |
driver_ipw.c | 33 int sock; member in struct:wpa_driver_ipw_data 106 if (ioctl(drv->sock, IPW_IOCTL_WPA_SUPPLICANT, &iwr) < 0) { 424 drv->sock = socket(PF_INET, SOCK_DGRAM, 0); 425 if (drv->sock < 0) { 439 close(drv->sock);
|
/external/apache-http/src/org/apache/http/conn/ssl/ |
SSLSocketFactory.java | 278 final Socket sock, 294 ((sock != null) ? sock : createSocket()); 341 * @param sock the connected socket 347 public boolean isSecure(Socket sock) 350 if (sock == null) { 354 if (!(sock instanceof SSLSocket)) { 359 if (sock.isClosed()) {
|
/external/dropbear/ |
tcp-accept.c | 46 static void tcp_acceptor(struct Listener *listener, int sock) { 56 fd = accept(sock, (struct sockaddr*)&addr, &len);
|
cli-session.c | 77 void cli_session(int sock, char* remotehost) { 83 common_session_init(sock, remotehost); 297 close(ses.sock); 298 ses.sock = -1;
|
session.h | 44 void common_session_init(int sock, char* remotehost); 51 void svr_session(int sock, int childpipe, char *remotehost, char *addrstring); 56 void cli_session(int sock, char *remotehost); 92 int sock; member in struct:sshsession
|
svr-agentfwd.c | 47 static void agentaccept(struct Listener * listener, int sock); 98 static void agentaccept(struct Listener *UNUSED(listener), int sock) { 102 fd = accept(sock, NULL, NULL);
|
svr-x11fwd.c | 40 static void x11accept(struct Listener* listener, int sock); 101 static void x11accept(struct Listener* listener, int sock) { 111 fd = accept(sock, (struct sockaddr*)&addr, &len);
|
/external/opencore/oscl/oscl/osclio/src/ |
oscl_socket_accept.cpp | 98 OsclSocketI *sock = iAcceptedSocket; local 100 return sock;
|
oscl_tcp_socket.cpp | 145 OsclSocketI *sock = iAcceptMethod->GetAcceptedSocket(); local 146 if (!sock) 148 return OsclTCPSocketI::NewL(iAlloc, iSocketServ, sock, iObserver, aId);
|
/packages/apps/Email/src/com/android/exchange/ |
SSLSocketFactory.java | 282 final Socket sock, 298 ((sock != null) ? sock : createSocket()); 345 * @param sock the connected socket 351 public boolean isSecure(Socket sock) 354 if (sock == null) { 358 if (!(sock instanceof SSLSocket)) { 363 if (sock.isClosed()) {
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_sim_db.c | 66 int sock; member in struct:eap_sim_db_data 278 static void eap_sim_db_receive(int sock, void *eloop_ctx, void *sock_ctx) 284 res = recv(sock, buf, sizeof(buf), 0); 338 data->sock = socket(PF_UNIX, SOCK_DGRAM, 0); 339 if (data->sock < 0) { 349 if (bind(data->sock, (struct sockaddr *) &addr, sizeof(addr)) < 0) { 351 close(data->sock); 352 data->sock = -1; 359 if (connect(data->sock, (struct sockaddr *) &addr, sizeof(addr)) < 0) { 364 close(data->sock); [all...] |
/external/apache-http/src/org/apache/http/conn/ |
OperatedClientConnection.java | 121 * @param sock the unconnected socket which is about to 125 void opening(Socket sock, HttpHost target) 158 * @param sock the new socket for communicating with the target host, 168 void update(Socket sock, HttpHost target,
|
/external/ppp/pppd/plugins/rp-pppoe/ |
pppoe.h | 284 int sendPacket(PPPoEConnection *conn, int sock, PPPoEPacket *pkt, int size); 285 int receivePacket(int sock, PPPoEPacket *pkt, int *size); 296 void asyncReadFromEth(PPPoEConnection *conn, int sock, int clampMss); 297 void syncReadFromEth(PPPoEConnection *conn, int sock, int clampMss);
|
plugin.c | 190 int sock; local 197 sock = socket(AF_INET, SOCK_DGRAM, 0); 198 if (sock < 0) { 204 if (ioctl(sock, SIOCSIFMTU, &ifr) < 0) { 208 (void) close (sock);
|
/external/bluetooth/bluez/plugins/ |
hciops.c | 367 int sock, err; local 386 sock = socket(AF_BLUETOOTH, SOCK_RAW, BTPROTO_HCI); 387 if (sock < 0) { 398 if (setsockopt(sock, SOL_HCI, HCI_FILTER, &flt, 408 if (bind(sock, (struct sockaddr *) &addr, 416 ctl_io = g_io_channel_unix_new(sock); 424 return init_known_adapters(sock);
|