Lines Matching defs:info

343     OSVERSIONINFOEX info;
352 memset(&info, 0, sizeof(info));
353 info.dwOSVersionInfoSize = sizeof(info);
354 info.dwMajorVersion = 10;
355 info.dwMinorVersion = 0;
364 info.dwBuildNumber = win_runtime_flags[i].build_number;
368 &info,
2308 struct ctl_info info;
2316 if (PyBytes_GET_SIZE(ctl_name) > (Py_ssize_t)sizeof(info.ctl_name)) {
2322 strncpy(info.ctl_name, PyBytes_AS_STRING(ctl_name),
2323 sizeof(info.ctl_name));
2326 if (ioctl(s->sock_fd, CTLIOCGINFO, &info)) {
2332 addr->sc_id = info.ctl_id;
2802 "_accept() -> (integer, address info)\n\
2806 For IP sockets, the address info is a pair (hostaddr, port).");
3410 "getsockname() -> address info\n\
3413 address family. For IPv4 sockets, the address info is a pair\n\
3414 (hostaddr, port). For IPv6 sockets, the address info is a 4-tuple\n\
3442 "getpeername() -> address info\n\
3445 info is a pair (hostaddr, port).");
3773 "recvfrom(buffersize[, flags]) -> (data, address info)\n\
3775 Like recv(buffersize, flags) but also return the sender's address info.");
3830 "recvfrom_into(buffer[, nbytes[, flags]]) -> (nbytes, address info)\n\
3832 Like recv_into(buffer[, nbytes[, flags]]) but also return the sender's address info.");
4575 /* Construct ancillary data block from control message info. */
4929 WSAPROTOCOL_INFOW info;
4937 result = WSADuplicateSocketW(s->sock_fd, processId, &info);
4941 return PyBytes_FromStringAndSize((const char*)&info, sizeof(info));
5213 WSAPROTOCOL_INFOW info;
5214 if (PyBytes_GET_SIZE(fdobj) != sizeof(info)) {
5217 "should be %zu bytes.", sizeof(info));
5220 memcpy(&info, PyBytes_AS_STRING(fdobj), sizeof(info));
5223 info.iAddressFamily, info.iSocketType,
5224 info.iProtocol) < 0) {
5230 FROM_PROTOCOL_INFO, &info, 0, WSA_FLAG_OVERLAPPED);
5236 family = info.iAddressFamily;
5237 type = info.iSocketType;
5238 proto = info.iProtocol;
5915 This only returns the port number, since the other info is already
5951 This only returns the service name, since the other info is already
5994 This only returns the protocol number, since the other info is
6056 WSAPROTOCOL_INFOW info;
6064 if (WSADuplicateSocketW(fd, GetCurrentProcessId(), &info))
6069 &info, 0, WSA_FLAG_OVERLAPPED);
8401 /* get{addr,name}info parameters */