/external/wpa_supplicant_8/src/drivers/ |
driver_hostap.c | 218 struct ifreq ifr; local 233 memset(&ifr, 0, sizeof(ifr)); 234 snprintf(ifr.ifr_name, sizeof(ifr.ifr_name), "%sap", drv->iface); 235 if (ioctl(drv->sock, SIOCGIFINDEX, &ifr) != 0) { 247 addr.sll_ifindex = ifr.ifr_ifindex; 348 struct ifreq ifr; local 356 memset(&ifr, 0, sizeof(ifr)); [all...] |
/cts/hostsidetests/security/securityPatch/Bug-36730104/ |
poc.c | 569 struct ifreq ifr; local 571 memset(&ifr, 0, sizeof(ifr)); 572 strncpy(ifr.ifr_name, ifname, sizeof(ifr.ifr_name)); 573 ifr.ifr_name[IFNAMSIZ - 1] = 0; 575 ret = ioctl(s, SIOCGIFINDEX, &ifr); 577 return (ret == -1) ? 0 : ifr.ifr_ifindex;
|
/cts/hostsidetests/security/securityPatch/Bug-36817053/ |
poc.c | 919 struct ifreq ifr; local [all...] |
/cts/hostsidetests/security/securityPatch/Bug-36818198/ |
poc.c | 918 struct ifreq ifr; local [all...] |
/hardware/qcom/data/ipacfg-mgr/msm8998/ipacm/src/ |
IPACM_OffloadManager.cpp | 624 struct ifreq ifr; local 632 if(strnlen(if_name, sizeof(if_name)) >= sizeof(ifr.ifr_name)) { 638 memset(&ifr, 0, sizeof(struct ifreq)); 639 (void)strncpy(ifr.ifr_name, if_name, sizeof(ifr.ifr_name)); 642 if(ioctl(fd,SIOCGIFINDEX , &ifr) < 0) 644 IPACMERR("call_ioctl_on_dev: ioctl failed, interface name (%s):\n", ifr.ifr_name); 649 *if_index = ifr.ifr_ifindex;
|
IPACM_Main.cpp | 966 struct ifreq ifr; local 974 memset(&ifr, 0, sizeof(struct ifreq)); 976 (void)strlcpy(ifr.ifr_name, if_name, sizeof(ifr.ifr_name)); 978 if (ioctl(fd, SIOCGIFINDEX, &ifr) < 0) [all...] |
IPACM_ConntrackListener.cpp | 146 struct ifreq ifr; local 199 memset(&ifr, 0, sizeof(struct ifreq)); 200 ifr.ifr_ifindex = data->if_index; 201 if (ioctl(fd, SIOCGIFNAME, &ifr) < 0) 211 if (strncmp(ifr.ifr_name, [all...] |
IPACM_Netlink.cpp | 1603 struct ifreq ifr; local [all...] |
/external/dnsmasq/src/ |
helper.c | 353 struct ifreq ifr; local 354 ifr.ifr_ifindex = lease->last_interface; 355 if (ioctl(daemon->dhcpfd, SIOCGIFNAME, &ifr) != -1) 356 strncpy(buf->interface, ifr.ifr_name, IF_NAMESIZE);
|
forward.c | 644 struct ifreq ifr; local 686 if (!indextoname(listen->fd, if_index, ifr.ifr_name) || 687 !iface_check(listen->family, &dst_addr, ifr.ifr_name, &if_index)) 692 ioctl(listen->fd, SIOCGIFNETMASK, &ifr) == -1) 695 netmask = ((struct sockaddr_in *) &ifr.ifr_addr)->sin_addr; [all...] |
/external/ipsec-tools/ |
main.c | 105 struct ifreq ifr = {.ifr_flags = IFF_TUN}; local 116 if (ioctl(tun, TUNSETIFF, &ifr)) { 120 sprintf(*envp, "INTERFACE=%s", ifr.ifr_name);
|
/external/iputils/ |
ping.c | 326 struct ifreq ifr; local 329 memset(&ifr, 0, sizeof(ifr)); 330 strncpy(ifr.ifr_name, device, IFNAMSIZ-1); 339 if (ioctl(probe_fd, SIOCGIFINDEX, &ifr) < 0) { 344 imr.imr_ifindex = ifr.ifr_ifindex; 430 struct ifreq ifr; local 432 memset(&ifr, 0, sizeof(ifr)); 433 strncpy(ifr.ifr_name, device, IFNAMSIZ-1) [all...] |
arping.c | 820 static int check_device_by_ioctl(int s, struct ifreq *ifr) 822 if (ioctl(s, SIOCGIFFLAGS, ifr) < 0) { 827 if (check_ifflags(ifr->ifr_flags, device.name != NULL) < 0) 830 if (ioctl(s, SIOCGIFINDEX, ifr) < 0) { 841 struct ifreq *ifr0, *ifr, *ifr_end; local 842 size_t ifrsize = sizeof(*ifr); 891 for (ifr = ifr0; ifr <= ifr_end; ifr++) { 894 memcpy(&ifrbuf.ifr_name, ifr->ifr_name, sizeof(ifrbuf.ifr_name)) [all...] |
rarpd.c | 615 struct ifreq ifr; local 616 memset(&ifr, 0, sizeof(ifr)); 617 strncpy(ifr.ifr_name, ifname, IFNAMSIZ); 618 if (ioctl(pset[0].fd, SIOCGIFINDEX, &ifr)) { 622 ifidx = ifr.ifr_ifindex;
|
rdisc.c | 1105 struct ifreq ifreq, *ifr; local 1151 ifr = ifc.ifc_req; 1152 for (i = 0, n = ifc.ifc_len/sizeof (struct ifreq); n > 0; n--, ifr++) { 1153 ifreq = *ifr; 1160 if (ifr->ifr_addr.sa_family != AF_INET) 1168 strncpy(interfaces[i].name, ifr->ifr_name, IFNAMSIZ-1); 1170 sin = (struct sockaddr_in *)ALLIGN(&ifr->ifr_addr); [all...] |
/external/ltp/testcases/kernel/syscalls/sockioctl/ |
sockioctl01.c | 50 static struct ifreq ifr; variable in typeref:struct:ifreq 105 PF_INET, SOCK_DGRAM, 0, SIOCGIFFLAGS, &ifr, 111 EFAULT, setup3, cleanup1, "SIOCGIFFLAGS with invalid ifr"} 115 EFAULT, setup3, cleanup1, "SIOCSIFFLAGS with invalid ifr"} 242 ifr = *(struct ifreq *)ifc.ifc_buf;
|
/external/e2fsprogs/lib/uuid/ |
gen_uuid.c | 229 struct ifreq ifr, *ifrp; local 268 strncpy(ifr.ifr_name, ifrp->ifr_name, IFNAMSIZ); 270 if (ioctl(sd, SIOCGIFHWADDR, &ifr) < 0) 272 a = (unsigned char *) &ifr.ifr_hwaddr.sa_data; 275 if (ioctl(sd, SIOCGENADDR, &ifr) < 0) 277 a = (unsigned char *) ifr.ifr_enaddr;
|
/hardware/interfaces/tetheroffload/control/1.0/vts/functional/ |
VtsHalTetheroffloadControlV1_0TargetTest.cpp | 249 struct ifreq ifr = {}; local 250 strlcpy(ifr.ifr_name, name, sizeof(ifr.ifr_name)); 253 int ret = ioctl(sock, SIOCGIFFLAGS, &ifr, sizeof(ifr)); 255 return (ret == 0) && (ifr.ifr_flags & IFF_UP);
|
/external/openssh/ |
misc.c | 722 struct ifreq ifr; 754 snprintf(ifr.ifr_name, sizeof(ifr.ifr_name), "%s%d", tunbase, tun); 758 if (ioctl(sock, SIOCGIFFLAGS, &ifr) == -1) { 760 ifr.ifr_name, strerror(errno)); 764 if (!(ifr.ifr_flags & IFF_UP)) { 765 ifr.ifr_flags |= IFF_UP; 766 if (ioctl(sock, SIOCSIFFLAGS, &ifr) == -1) { 768 ifr.ifr_name, strerror(errno));
|
/external/curl/CMake/ |
CurlTests.c | 466 struct ifreq ifr; local 467 if(0 != ioctl(0, SIOCGIFADDR, &ifr))
|
/toolchain/binutils/binutils-2.25/include/opcode/ |
tic6x-control-registers.h | 39 CTRL(ifr, C62X, read, 0x2, 0x1d)
|
/external/toybox/toys/pending/ |
traceroute.c | 173 struct ifreq ifr; local 175 snprintf(ifr.ifr_name, IFNAMSIZ, "%s", TT.iface); 176 if (setsockopt(sock, SOL_SOCKET, SO_BINDTODEVICE, &ifr, sizeof(ifr)))
|
/system/core/init/ |
builtins.cpp | 91 struct ifreq ifr; local 94 strlcpy(ifr.ifr_name, interface, IFNAMSIZ); 100 ret = ioctl(s, SIOCGIFFLAGS, &ifr); 106 ifr.ifr_flags |= IFF_UP; 108 ifr.ifr_flags &= ~IFF_UP; 110 ret = ioctl(s, SIOCSIFFLAGS, &ifr);
|
/kernel/tests/net/test/ |
multinetwork_base.py | 203 ifr = struct.pack("16sH", iface, IFF_TAP | IFF_NO_PI) 204 ifr += "\x00" * (40 - len(ifr)) 205 fcntl.ioctl(f, TUNSETIFF, ifr)
|
/external/webrtc/webrtc/test/channel_transport/ |
udp_transport_impl.cc | [all...] |