Lines Matching defs:serverfd

1287   curl_socket_t serverfd;
1307 serverfd = socket(socket_domain, SOCK_STREAM, 0);
1308 if(CURL_SOCKET_BAD == serverfd) {
1319 if(0 != setsockopt(serverfd, IPPROTO_TCP, TCP_NODELAY,
1332 sclose(serverfd);
1336 rc = connect(serverfd, &serveraddr.sa, sizeof(serveraddr.sa4));
1345 sclose(serverfd);
1349 rc = connect(serverfd, &serveraddr.sa, sizeof(serveraddr.sa6));
1360 sclose(serverfd);
1368 sclose(serverfd);
1375 return serverfd;
1401 curl_socket_t serverfd[2] = {CURL_SOCKET_BAD, CURL_SOCKET_BAD};
1429 serverfd[CTRL] = connect_to(ipaddr, ipport);
1430 if(serverfd[CTRL] == CURL_SOCKET_BAD)
1453 (serverfd[DATA] == CURL_SOCKET_BAD) &&
1482 if(serverfd[i] != CURL_SOCKET_BAD) {
1485 FD_SET(serverfd[i], &input);
1486 if(serverfd[i] > maxfd)
1487 maxfd = serverfd[i];
1492 FD_SET(serverfd[i], &output);
1493 if(serverfd[i] > maxfd)
1494 maxfd = serverfd[i];
1517 (serverfd[DATA] == CURL_SOCKET_BAD) && FD_ISSET(rootfd, &input)) {
1557 serverfd[DATA] = connect_to(ipaddr, req2->connect_port);
1558 if(serverfd[DATA] != CURL_SOCKET_BAD) {
1608 if(serverfd[i] != CURL_SOCKET_BAD) {
1610 if(len && FD_ISSET(serverfd[i], &input)) {
1612 rc = sread(serverfd[i], &readserver[i][toc[i]], len);
1615 shutdown(serverfd[i], SHUT_RD);
1646 if(serverfd[i] != CURL_SOCKET_BAD) {
1647 if(tos[i] && FD_ISSET(serverfd[i], &output)) {
1649 rc = swrite(serverfd[i], readclient[i], tos[i]);
1652 shutdown(serverfd[i], SHUT_WR);
1690 if(serverfd[i] != CURL_SOCKET_BAD) {
1693 shutdown(serverfd[i], SHUT_RD);
1698 shutdown(serverfd[i], SHUT_WR);
1718 if(serverfd[i] == CURL_SOCKET_BAD) {
1727 if(serverfd[i] != CURL_SOCKET_BAD) {
1730 sclose(serverfd[i]);
1731 serverfd[i] = CURL_SOCKET_BAD;
1765 if(serverfd[i] != CURL_SOCKET_BAD) {
1767 shutdown(serverfd[i], SHUT_RDWR);
1768 sclose(serverfd[i]);
1775 if((serverfd[i] != CURL_SOCKET_BAD) ||