/external/openssl/crypto/bio/ |
b_sock.c | 233 int BIO_sock_error(int sock) 248 i=getsockopt(sock,SOL_SOCKET,SO_ERROR,(void *)&j,(void *)&size); 828 int BIO_accept(int sock, char **addr) 870 ret=accept(sock,&sa.from.sa,(void *)&sa.len);
|
/external/wpa_supplicant_8/src/drivers/ |
rfkill.c | 53 static void rfkill_receive(int sock, void *eloop_ctx, void *sock_ctx)
|
/external/wpa_supplicant_8/src/utils/ |
edit.c | 758 static enum edit_key_code edit_read_key(int sock) 766 res = read(sock, buf, 1); 1004 static void edit_read_char(int sock, void *eloop_ctx, void *sock_ctx) 1010 c = edit_read_key(sock);
|
/hardware/ti/wlan/mac80211/ti-utils/ |
calibrator.h | 133 int nl_get_multicast_id(struct nl_sock *sock, const char *family,
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/ |
esd.h | 133 int esd_send_auth( int sock );
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/ |
esd.h | 133 int esd_send_auth( int sock );
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/ |
esd.h | 133 int esd_send_auth( int sock );
|
/external/chromium/chrome/browser/debugger/ |
devtools_remote_listen_socket_unittest.cc | 275 bool DevToolsRemoteListenSocketTester::Send(SOCKET sock, 278 int send_len = HANDLE_EINTR(send(sock, str.data(), len, 0));
|
/external/jmonkeyengine/engine/src/networking/com/jme3/network/kernel/tcp/ |
SelectorKernel.java | 311 Socket sock = remoteChan.socket(); local 312 sock.setTcpNoDelay(true);
|
/external/openssh/ |
monitor_wrap.c | 128 mm_request_send(int sock, enum monitor_reqtype type, Buffer *m) 137 if (atomicio(vwrite, sock, buf, sizeof(buf)) != sizeof(buf)) 139 if (atomicio(vwrite, sock, buffer_ptr(m), mlen) != mlen) 144 mm_request_receive(int sock, Buffer *m) 151 if (atomicio(read, sock, buf, sizeof(buf)) != sizeof(buf)) { 161 if (atomicio(read, sock, buffer_ptr(m), msg_len) != msg_len) 166 mm_request_receive_expect(int sock, enum monitor_reqtype type, Buffer *m) 172 mm_request_receive(sock, m); [all...] |
session.c | 183 int sock = -1; local 211 sock = socket(AF_UNIX, SOCK_STREAM, 0); 212 if (sock < 0) { 223 if (bind(sock, (struct sockaddr *)&sunaddr, sizeof(sunaddr)) < 0) { 233 if (listen(sock, SSH_LISTEN_BACKLOG) < 0) { 240 SSH_CHANNEL_AUTH_SOCKET, sock, sock, -1, 253 if (sock != -1) 254 close(sock); [all...] |
serverloop.c | 975 int sock; local 998 sock = tun_open(tun, mode); 999 if (sock < 0) 1001 c = channel_new("tun", SSH_CHANNEL_OPEN, sock, sock, -1, [all...] |
/external/wpa_supplicant_8/src/crypto/ |
random.c | 306 static void random_read_fd(int sock, void *eloop_ctx, void *sock_ctx) 315 res = read(sock, dummy_key + dummy_key_avail,
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/ |
test_support.py | 298 the 'sock' parameter (default is AF_INET, SOCK_STREAM), and binding it to 355 def bind_port(sock, host=HOST): 359 buildbot environment. This method raises an exception if the sock.family 360 is AF_INET and sock.type is SOCK_STREAM, *and* the socket has SO_REUSEADDR 369 if sock.family == socket.AF_INET and sock.type == socket.SOCK_STREAM: 371 if sock.getsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR) == 1: 375 if sock.getsockopt(socket.SOL_SOCKET, socket.SO_REUSEPORT) == 1: 379 sock.setsockopt(socket.SOL_SOCKET, socket.SO_EXCLUSIVEADDRUSE, 1) 381 sock.bind((host, 0) [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/ |
test_support.py | 298 the 'sock' parameter (default is AF_INET, SOCK_STREAM), and binding it to 355 def bind_port(sock, host=HOST): 359 buildbot environment. This method raises an exception if the sock.family 360 is AF_INET and sock.type is SOCK_STREAM, *and* the socket has SO_REUSEADDR 369 if sock.family == socket.AF_INET and sock.type == socket.SOCK_STREAM: 371 if sock.getsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR) == 1: 375 if sock.getsockopt(socket.SOL_SOCKET, socket.SO_REUSEPORT) == 1: 379 sock.setsockopt(socket.SOL_SOCKET, socket.SO_EXCLUSIVEADDRUSE, 1) 381 sock.bind((host, 0) [all...] |
/external/kernel-headers/original/linux/ |
skbuff.h | 236 struct sock *sk; 378 extern int skb_append_datato_frags(struct sock *sk, struct sk_buff *skb, [all...] |
/external/ppp/pppd/ |
tty.c | 872 int sock, port = -1; local 899 sock = socket(PF_INET, SOCK_STREAM, 0); 900 if (sock < 0) { 908 if (connect(sock, (struct sockaddr *)&sad, sizeof(sad)) < 0) { 910 close(sock); 914 return sock; [all...] |
/external/chromium_org/net/tools/testserver/ |
testserver.py | [all...] |
/bionic/libc/netbsd/ |
gethnamaddr.c | 533 int sock; local 537 sock = socket(AF_UNIX, SOCK_STREAM, 0); 538 if (sock < 0) { 542 setsockopt(sock, SOL_SOCKET, SO_REUSEADDR, &one, sizeof(one)); 546 if (TEMP_FAILURE_RETRY(connect(sock, 549 close(sock); 553 return fdopen(sock, "r+"); [all...] |
/external/wpa_supplicant_8/hostapd/ |
ctrl_iface.c | 952 static void hostapd_ctrl_iface_receive(int sock, void *eloop_ctx, 965 res = recvfrom(sock, buf, sizeof(buf) - 1, 0, 978 sendto(sock, "FAIL\n", 5, 0, (struct sockaddr *) &from, 1131 sendto(sock, reply, reply_len, 0, (struct sockaddr *) &from, fromlen); [all...] |
/libcore/harmony-tests/src/test/java/org/apache/harmony/nio/tests/java/nio/channels/ |
SocketChannelTest.java | 2740 SocketChannel sock = ssc.accept(); local 2768 SocketChannel sock = ssc.accept(); local 2806 SocketChannel sock = ssc.accept(); local 3037 Socket sock = this.channel1.socket(); local 3081 SocketChannel sock = ssc.accept(); local 3127 SocketChannel sock = ssc.accept(); local [all...] |
/external/wpa_supplicant_8/src/radius/ |
radius_client.c | 236 int sock, int sock6, int auth); 685 static void radius_client_receive(int sock, void *eloop_ctx, void *sock_ctx) 711 len = recv(sock, buf, sizeof(buf), MSG_DONTWAIT); 937 int sock, int sock6, int auth) 1000 sel_sock = sock; [all...] |
/external/chromium_org/third_party/npapi/npspy/extern/nspr/md/ |
_unixos.h | 350 extern PRInt32 _MD_accept_read(PRInt32 sock, PRInt32 *newSock, 378 #define _MD_ACCEPT_READ(sock, newSock, raddr, buf, amount) _MD_accept_read(sock, newSock, raddr, buf, amount)
|
/external/dropbear/ |
packet.c | 64 written = write(ses.sock, buf_getptr(writebuf, len), len); 123 len = read(ses.sock, buf_getptr(ses.readbuf, maxlen), maxlen); 172 len = read(ses.sock, buf_getwriteptr(ses.readbuf, maxlen),
|
/external/libppp/src/ |
ether.c | 685 struct sockaddr *sock = (struct sockaddr *)&ssock; local 689 if (getsockname(p->fd, sock, &sz) == -1) { 696 if (sock->sa_family == AF_NETGRAPH) {
|