/external/wpa_supplicant_8/src/utils/ |
edit.c | 758 static enum edit_key_code edit_read_key(int sock) 766 res = read(sock, buf, 1); 1004 static void edit_read_char(int sock, void *eloop_ctx, void *sock_ctx) 1010 c = edit_read_key(sock);
|
/bionic/libc/netbsd/ |
gethnamaddr.c | 533 int sock; local 537 sock = socket(AF_UNIX, SOCK_STREAM, 0); 538 if (sock < 0) { 542 setsockopt(sock, SOL_SOCKET, SO_REUSEADDR, &one, sizeof(one)); 546 if (TEMP_FAILURE_RETRY(connect(sock, 549 close(sock); 553 return fdopen(sock, "r+"); [all...] |
/external/wpa_supplicant_8/hostapd/ |
ctrl_iface.c | 952 static void hostapd_ctrl_iface_receive(int sock, void *eloop_ctx, 965 res = recvfrom(sock, buf, sizeof(buf) - 1, 0, 978 sendto(sock, "FAIL\n", 5, 0, (struct sockaddr *) &from, 1131 sendto(sock, reply, reply_len, 0, (struct sockaddr *) &from, fromlen); [all...] |
/external/openssh/ |
serverloop.c | 975 int sock; local 998 sock = tun_open(tun, mode); 999 if (sock < 0) 1001 c = channel_new("tun", SSH_CHANNEL_OPEN, sock, sock, -1, [all...] |
session.c | 183 int sock = -1; local 211 sock = socket(AF_UNIX, SOCK_STREAM, 0); 212 if (sock < 0) { 223 if (bind(sock, (struct sockaddr *)&sunaddr, sizeof(sunaddr)) < 0) { 233 if (listen(sock, SSH_LISTEN_BACKLOG) < 0) { 240 SSH_CHANNEL_AUTH_SOCKET, sock, sock, -1, 253 if (sock != -1) 254 close(sock); [all...] |
/external/wpa_supplicant_8/src/radius/ |
radius_client.c | 236 int sock, int sock6, int auth); 685 static void radius_client_receive(int sock, void *eloop_ctx, void *sock_ctx) 711 len = recv(sock, buf, sizeof(buf), MSG_DONTWAIT); 937 int sock, int sock6, int auth) 1000 sel_sock = sock; [all...] |
/external/chromium_org/net/tools/testserver/ |
testserver.py | [all...] |
/external/kernel-headers/original/linux/ |
skbuff.h | 236 struct sock *sk; 378 extern int skb_append_datato_frags(struct sock *sk, struct sk_buff *skb, [all...] |
/libcore/harmony-tests/src/test/java/org/apache/harmony/nio/tests/java/nio/channels/ |
SocketChannelTest.java | 2740 SocketChannel sock = ssc.accept(); local 2768 SocketChannel sock = ssc.accept(); local 2806 SocketChannel sock = ssc.accept(); local 3037 Socket sock = this.channel1.socket(); local 3081 SocketChannel sock = ssc.accept(); local 3127 SocketChannel sock = ssc.accept(); local [all...] |
/external/chromium_org/chrome_frame/test/ |
test_server.cc | 243 void SimpleWebServer::DidClose(net::StreamListenSocket* sock) { 246 Connection* c = FindConnection(sock);
|
/external/iproute2/doc/ |
api-ip6-flowlabels.tex | 144 setsockopt(sock, SOL_IPV6, IPV6_FLOWINFO_SEND, 157 setsockopt(sock, SOL_IPV6, IPV6_FLOWINFO, (void*)&on, sizeof(on));
|
/external/jmonkeyengine/engine/src/networking/com/jme3/network/kernel/tcp/ |
SelectorKernel.java | 311 Socket sock = remoteChan.socket(); local 312 sock.setTcpNoDelay(true);
|
/external/wpa_supplicant_8/src/ap/ |
iapp.c | 310 * @sock: File descriptor for the socket 314 static void iapp_receive_udp(int sock, void *eloop_ctx, void *sock_ctx)
|
/system/core/libnetutils/ |
dhcpclient.c | 342 static int send_message(int sock, int if_index, dhcp_msg *msg, int size) 347 return send_packet(sock, if_index, msg, size, INADDR_ANY, INADDR_BROADCAST,
|
/external/chromium_org/net/socket/ |
client_socket_pool_manager_impl.cc | 80 socks_pool_histograms_("SOCK"),
|
/external/chromium_org/third_party/openssl/openssl/crypto/bio/ |
bio.h | 718 int BIO_sock_error(int sock); 724 int BIO_accept(int sock,char **ip_port); 727 int BIO_set_tcp_ndelay(int sock,int turn_on); 729 BIO *BIO_new_socket(int sock, int close_flag); [all...] |
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
bio.h | 718 int BIO_sock_error(int sock); 724 int BIO_accept(int sock,char **ip_port); 727 int BIO_set_tcp_ndelay(int sock,int turn_on); 729 BIO *BIO_new_socket(int sock, int close_flag); [all...] |
/external/iputils/ |
traceroute6.c | 657 wait_for_reply(sock, from, to, reset_timer) 658 int sock; 669 FD_SET(sock, &fds); 687 if (select(sock+1, &fds, (fd_set *)0, (fd_set *)0, &wait) > 0) {
|
/external/openssl/crypto/bio/ |
bio.h | 718 int BIO_sock_error(int sock); 724 int BIO_accept(int sock,char **ip_port); 727 int BIO_set_tcp_ndelay(int sock,int turn_on); 729 BIO *BIO_new_socket(int sock, int close_flag); [all...] |
/external/openssl/include/openssl/ |
bio.h | 718 int BIO_sock_error(int sock); 724 int BIO_accept(int sock,char **ip_port); 727 int BIO_set_tcp_ndelay(int sock,int turn_on); 729 BIO *BIO_new_socket(int sock, int close_flag); [all...] |
/external/wpa_supplicant_8/src/l2_packet/ |
l2_packet_freebsd.c | 75 static void l2_packet_receive(int sock, void *eloop_ctx, void *sock_ctx)
|
l2_packet_pcap.c | 117 static void l2_packet_receive(int sock, void *eloop_ctx, void *sock_ctx)
|
/external/wpa_supplicant_8/src/wps/ |
http_client.c | 84 static void http_client_tx_ready(int sock, void *eloop_ctx, void *sock_ctx)
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/ |
test_urllib.py | 50 self.sock = FakeSocket(fakedata) [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/ |
test_urllib.py | 50 self.sock = FakeSocket(fakedata) [all...] |