Lines Matching refs:sock
399 SOCKET sock; // Listening socket
1203 static int set_non_blocking_mode(SOCKET sock) {
1205 return ioctlsocket(sock, FIONBIO, &on);
1294 static int set_non_blocking_mode(SOCKET sock) {
1297 flags = fcntl(sock, F_GETFL, 0);
1298 (void) fcntl(sock, F_SETFL, flags | O_NONBLOCK);
1306 static int64_t push(FILE *fp, SOCKET sock, SSL *ssl, const char *buf,
1324 n = send(sock, buf + sent, (size_t)k, 0);
1338 static int pull(FILE *fp, SOCKET sock, SSL *ssl, char *buf, int len) {
1351 nread = recv(sock, buf, (size_t) len, 0);
1394 n = pull(NULL, conn->client.sock, conn->ssl, (char *) buf, (int) len);
1408 return (int) push(NULL, conn->client.sock, conn->ssl,
1571 SSL_set_fd(conn->ssl, conn->client.sock) == 1 &&
1580 int sock;
1586 } else if ((sock = socket(PF_INET, SOCK_STREAM, 0)) == INVALID_SOCKET) {
1592 if (connect(sock, (struct sockaddr *) &sin, sizeof(sin)) != 0) {
1595 closesocket(sock);
1599 closesocket(sock);
1601 newconn->client.sock = sock;
2631 // Keep reading the input (either opened file descriptor fd, or socket sock,
2636 static int read_request(FILE *fp, SOCKET sock, SSL *ssl, char *buf, int bufsiz,
2642 n = pull(fp, sock, ssl, buf + *nread, bufsiz - *nread);
2709 SOCKET sock, SSL *ssl) {
2735 push(fp, sock, ssl, buffered, (int64_t) buffered_len);
2744 nread = pull(NULL, conn->client.sock, conn->ssl, buf, to_read);
2745 if (nread <= 0 || push(fp, sock, ssl, buf, nread) != nread) {
3393 (void) closesocket(sp->sock);
3434 SOCKET sock;
3450 } else if ((sock = socket(PF_INET, SOCK_STREAM, 6)) == INVALID_SOCKET ||
3454 setsockopt(sock, SOL_SOCKET, SO_REUSEADDR, &on,
3464 setsockopt(sock, SOL_SOCKET, SO_KEEPALIVE, (void *) &on,
3466 setsockopt(sock, SOL_SOCKET, SO_LINGER, (void *) &linger,
3468 bind(sock, &so.lsa.u.sa, so.lsa.len) != 0 ||
3469 listen(sock, 100) != 0) {
3470 closesocket(sock);
3476 closesocket(sock);
3481 listener->sock = sock;
3482 set_close_on_exec(listener->sock);
3786 static void close_socket_gracefully(SOCKET sock) {
3791 (void) shutdown(sock, SHUT_WR);
3792 set_non_blocking_mode(sock);
3800 n = pull(NULL, sock, NULL, buf, sizeof(buf));
3804 (void) closesocket(sock);
3813 if (conn->client.sock != INVALID_SOCKET) {
3814 close_socket_gracefully(conn->client.sock);
3887 forward_body_data(conn, NULL, conn->peer->client.sock, conn->peer->ssl);
3891 while ((n = pull(NULL, conn->peer->client.sock, conn->peer->ssl,
3923 conn->request_len = read_request(NULL, conn->client.sock, conn->ssl,
3979 DEBUG_TRACE(("grabbed socket %d, going busy", sp->sock));
4051 DEBUG_TRACE(("queued socket %d", sp->sock));
4065 accepted.sock = accept(listener->sock, &accepted.rsa.u.sa, &accepted.rsa.len);
4066 if (accepted.sock != INVALID_SOCKET) {
4070 DEBUG_TRACE(("accepted socket %d", accepted.sock));
4077 (void) closesocket(accepted.sock);
4094 add_to_set(sp->sock, &read_set, &max_fd);
4109 if (ctx->stop_flag == 0 && FD_ISSET(sp->sock, &read_set)) {