/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/ |
nntplib.py | 112 self.sock = socket.create_connection((host, port)) 113 self.file = self.sock.makefile('rb') 193 self.sock.sendall(line) 601 self.sock.close() 602 del self.file, self.sock
|
asynchat.py | 64 def __init__ (self, sock=None, map=None): 79 asyncore.dispatcher.__init__ (self, sock, map)
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/ |
nntplib.py | 112 self.sock = socket.create_connection((host, port)) 113 self.file = self.sock.makefile('rb') 193 self.sock.sendall(line) 601 self.sock.close() 602 del self.file, self.sock
|
asynchat.py | 64 def __init__ (self, sock=None, map=None): 79 asyncore.dispatcher.__init__ (self, sock, map)
|
/external/chromium_org/third_party/libjingle/source/talk/examples/peerconnection/client/ |
peer_connection_client.cc | 51 talk_base::Win32Socket* sock = new talk_base::Win32Socket(); local 52 sock->CreateT(family, SOCK_STREAM); 53 return sock;
|
/external/chromium_org/third_party/npapi/npspy/extern/nspr/md/ |
_unixos.h | 350 extern PRInt32 _MD_accept_read(PRInt32 sock, PRInt32 *newSock, 378 #define _MD_ACCEPT_READ(sock, newSock, raddr, buf, amount) _MD_accept_read(sock, newSock, raddr, buf, amount)
|
/external/dropbear/ |
packet.c | 64 written = write(ses.sock, buf_getptr(writebuf, len), len); 123 len = read(ses.sock, buf_getptr(ses.readbuf, maxlen), maxlen); 172 len = read(ses.sock, buf_getwriteptr(ses.readbuf, maxlen),
|
/external/ppp/pppd/ |
tty.c | 872 int sock, port = -1; local 899 sock = socket(PF_INET, SOCK_STREAM, 0); 900 if (sock < 0) { 908 if (connect(sock, (struct sockaddr *)&sad, sizeof(sad)) < 0) { 910 close(sock); 914 return sock; [all...] |
/external/chromium/chrome/browser/debugger/ |
devtools_remote_listen_socket_unittest.cc | 275 bool DevToolsRemoteListenSocketTester::Send(SOCKET sock, 278 int send_len = HANDLE_EINTR(send(sock, str.data(), len, 0));
|
/external/chromium/net/server/ |
http_server.cc | 189 HttpServer::Connection::Connection(HttpServer* server, ListenSocket* sock) 191 socket_(sock),
|
/external/iputils/ninfod/ |
ninfod_name.c | 308 if (setsockopt(sock, IPPROTO_IPV6, IPV6_LEAVE_GROUP, &nigroup, sizeof(nigroup)) < 0) { 335 if (setsockopt(sock, IPPROTO_IPV6, IPV6_JOIN_GROUP, &nigroup, sizeof(nigroup)) < 0) {
|
/external/nist-sip/java/gov/nist/javax/sip/stack/ |
IOHandler.java | 86 protected void putSocket(String key, Socket sock) { 87 socketTable.put(key, sock);
|
/external/wpa_supplicant_8/src/crypto/ |
random.c | 306 static void random_read_fd(int sock, void *eloop_ctx, void *sock_ctx) 315 res = read(sock, dummy_key + dummy_key_avail,
|
/external/wpa_supplicant_8/src/wps/ |
wps_upnp.c | 900 int sock = -1; local 908 sock = socket(AF_INET, SOCK_DGRAM, 0); 909 if (sock < 0) 913 if (ioctl(sock, SIOCGIFADDR, &req) < 0) { 925 if (ioctl(sock, SIOCGIFHWADDR, &req) < 0) { 940 close(sock); 944 if (sock >= 0) 945 close(sock); [all...] |
/external/qemu/android/ |
console.c | 97 Socket sock; /* socket used for communication */ member in struct:ControlClientRec_ 204 if (client->sock < 0) 207 qemu_set_fd_handler( client->sock, NULL, NULL, NULL ); 208 result = client->sock; 209 client->sock = -1; 223 client->sock = fd; 233 int sock; local 259 sock = control_client_detach( client ); 260 if (sock >= 0) 261 socket_close(sock); [all...] |
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/ |
test_support.py | 298 the 'sock' parameter (default is AF_INET, SOCK_STREAM), and binding it to 355 def bind_port(sock, host=HOST): 359 buildbot environment. This method raises an exception if the sock.family 360 is AF_INET and sock.type is SOCK_STREAM, *and* the socket has SO_REUSEADDR 369 if sock.family == socket.AF_INET and sock.type == socket.SOCK_STREAM: 371 if sock.getsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR) == 1: 375 if sock.getsockopt(socket.SOL_SOCKET, socket.SO_REUSEPORT) == 1: 379 sock.setsockopt(socket.SOL_SOCKET, socket.SO_EXCLUSIVEADDRUSE, 1) 381 sock.bind((host, 0) [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/ |
test_support.py | 298 the 'sock' parameter (default is AF_INET, SOCK_STREAM), and binding it to 355 def bind_port(sock, host=HOST): 359 buildbot environment. This method raises an exception if the sock.family 360 is AF_INET and sock.type is SOCK_STREAM, *and* the socket has SO_REUSEADDR 369 if sock.family == socket.AF_INET and sock.type == socket.SOCK_STREAM: 371 if sock.getsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR) == 1: 375 if sock.getsockopt(socket.SOL_SOCKET, socket.SO_REUSEPORT) == 1: 379 sock.setsockopt(socket.SOL_SOCKET, socket.SO_EXCLUSIVEADDRUSE, 1) 381 sock.bind((host, 0) [all...] |
/bionic/libc/kernel/common/linux/ |
skbuff.h | 107 struct sock *sk;
|
/external/android-clat/ |
netlink_msg.c | 108 * sock - socket to connect
|
/external/chromium/third_party/libevent/ |
evutil.h | 102 int evutil_make_socket_nonblocking(int sock);
|
/external/chromium_org/third_party/libevent/ |
evutil.h | 102 int evutil_make_socket_nonblocking(int sock);
|
/external/chromium_org/third_party/openssl/openssl/crypto/bio/ |
b_sock.c | 233 int BIO_sock_error(int sock) 248 i=getsockopt(sock,SOL_SOCKET,SO_ERROR,(void *)&j,(void *)&size); 828 int BIO_accept(int sock, char **addr) 870 ret=accept(sock,&sa.from.sa,(void *)&sa.len);
|
/external/ipsec-tools/src/racoon/doc/ |
FAQ | 84 means racoon will use /var/racoon/racoon.sock
|
/external/kernel-headers/original/linux/netfilter/ |
nfnetlink.h | 113 int (*call)(struct sock *nl, struct sk_buff *skb,
|
/external/openssl/crypto/bio/ |
b_sock.c | 233 int BIO_sock_error(int sock) 248 i=getsockopt(sock,SOL_SOCKET,SO_ERROR,(void *)&j,(void *)&size); 828 int BIO_accept(int sock, char **addr) 870 ret=accept(sock,&sa.from.sa,(void *)&sa.len);
|