/third_party/ltp/utils/sctp/func_tests/ |
H A D | test_1_to_1_recvfrom.c | 5 * This file has test cases to test the recvfrom () call for 1-1 style sockets 121 /*recvfrom () TEST1: Bad socket descriptor, EBADF Expected error*/ in main() 122 count = recvfrom(-1, message_rcv, msg_count, flag, in main() 125 tst_brkm(TBROK, tst_exit, "recvfrom with a bad socket " in main() 128 tst_resm(TPASS, "recvfrom() with a bad socket descriptor - EBADF"); in main() 130 /*recvfrom () TEST2: Invalid socket , ENOTSOCK Expected error*/ in main() 136 count = recvfrom(fd, message_rcv, msg_count, flag, in main() 143 tst_brkm(TBROK, tst_exit, "recvfrom with invalid socket " in main() 146 tst_resm(TPASS, "recvfrom() with invalid socket - ENOTSOCK"); in main() 148 /*recvfrom () TEST in main() [all...] |
/third_party/musl/src/network/ |
H A D | recvfrom.c | 4 ssize_t recvfrom(int fd, void *restrict buf, size_t len, int flags, struct sockaddr *restrict addr, socklen_t *restrict alen) in recvfrom() function 6 return socketcall_cp(recvfrom, fd, buf, len, flags, addr, alen); in recvfrom()
|
H A D | recv.c | 5 return recvfrom(fd, buf, len, flags, 0, 0); in recv()
|
/third_party/ltp/testcases/network/sockets/ |
H A D | ltpServer.c | 239 recvfrom(udpSocketHandle, message, MAX_MSG_LEN, 0, in ltp_udp_server_queue() 328 recvfrom(newSocket, message_received, MAX_MSG_LEN, in tcp_receive_buffer() 399 recvfrom(multiSocketHandle, message, MAX_MSG_LEN, 0, in ltp_multi_server_queue()
|
H A D | ltpClient.c | 388 recvfrom(rawSocket, packet, sizeof(packet), 0, in network_listener() 519 if (recvfrom in ping_network() 620 if (recvfrom in ltp_traceroute()
|
/third_party/musl/porting/linux/user/include/fortify/ |
H A D | socket.h | 36 ssize_t recvfrom(int fd, void* const buf __DIAGNOSE_PASS_OBJECT_SIZE0, size_t len, int flags, 40 "'recvfrom' " CALLED_WITH_SIZE_BIGGER_BUFFER) 49 return __DIAGNOSE_CALL_BYPASSING_FORTIFY(recvfrom)(fd, buf, len, flags, src_addr, addr_len);
|
/third_party/musl/include/fortify/linux/ |
H A D | socket.h | 36 ssize_t recvfrom(int fd, void* const buf __DIAGNOSE_PASS_OBJECT_SIZE0, size_t len, int flags, 40 "'recvfrom' " CALLED_WITH_SIZE_BIGGER_BUFFER) 49 return __DIAGNOSE_CALL_BYPASSING_FORTIFY(recvfrom)(fd, buf, len, flags, src_addr, addr_len);
|
/third_party/rust/crates/rustix/src/net/ |
H A D | send_recv.rs | 45 /// `recvfrom(fd, buf, flags, addr, len)`—Reads data from a socket and 54 /// [POSIX]: https://pubs.opengroup.org/onlinepubs/9699919799/functions/recvfrom.html 55 /// [Linux]: https://man7.org/linux/man-pages/man2/recvfrom.2.html 56 /// [Apple]: https://developer.apple.com/library/archive/documentation/System/Conceptual/ManPages_iPhoneOS/man2/recvfrom.2.html 57 /// [Winsock2]: https://docs.microsoft.com/en-us/windows/win32/api/winsock2/nf-winsock2-recvfrom 59 pub fn recvfrom<Fd: AsFd>( in recvfrom() functions 64 backend::net::syscalls::recvfrom(fd.as_fd(), buf, flags) in recvfrom()
|
H A D | mod.rs | 25 recv, recvfrom, send, sendto, sendto_any, sendto_v4, sendto_v6, RecvFlags, SendFlags,
|
/third_party/musl/libc-test/src/functionalext/fortify/ |
H A D | socket_ext.c | 120 * @tc.desc : test sendto and recvfrom normal condition 139 TEST(recvfrom(recvFd, buf, sizeof buf, 0, (void *)&sa, (socklen_t[]){sizeof sa}) == 1); in sendto_and_recvfrom_0010() 201 recvfrom(0, buf, data_len, 0, NULL, 0); in recvfrom_0010()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/l2_packet/ |
H A D | l2_packet_linux.c | 198 res = recvfrom(sock, buf, sizeof(buf), 0, NULL, NULL); in l2_packet_receive() 203 res = recvfrom(sock, buf, sizeof(buf), 0, (struct sockaddr *) &ll, in l2_packet_receive() 209 wpa_printf(MSG_EXCESSIVE, "l2_packet_receive - recvfrom: %s", in l2_packet_receive() 303 res = recvfrom(sock, buf, sizeof(buf), 0, (struct sockaddr *) &ll, in l2_packet_receive_br() 306 wpa_printf(MSG_DEBUG, "l2_packet_receive_br - recvfrom: %s", in l2_packet_receive_br()
|
/third_party/musl/libc-test/src/functionalext/supplement/network/ |
H A D | nameservercheck_server.c | 81 ret = recvfrom(udp6_socket, recvbuff, 1024, 0, (struct sockaddr *)&daddr, &addr_len); in main()
|
/third_party/python/Tools/demo/ |
H A D | mcast.py | 76 data, sender = s.recvfrom(1500)
|
/third_party/node/deps/openssl/openssl/ |
H A D | e_os.h | 391 # define recvfrom(a,b,c,d,e,f) recvfrom(a,b,(socklen_t)c,d,e,f) macro
|
/third_party/openssl/ |
H A D | e_os.h | 391 # define recvfrom(a,b,c,d,e,f) recvfrom(a,b,(socklen_t)c,d,e,f) macro
|
/third_party/rust/crates/rustix/tests/net/ |
H A D | connect_bind_send.rs | 255 rustix::net::recvfrom(&accepted, &mut response, RecvFlags::empty()).expect("recv"); in net_v4_sendto() 300 rustix::net::recvfrom(&accepted, &mut response, RecvFlags::empty()).expect("recv"); in net_v6_sendto() 335 rustix::net::recvfrom(&accepted, &mut response, RecvFlags::empty()).expect("recv"); in net_v4_sendto_any() 377 rustix::net::recvfrom(&accepted, &mut response, RecvFlags::empty()).expect("recv"); in net_v6_sendto_any()
|
/third_party/curl/lib/ |
H A D | setup-os400.h | 132 #define recvfrom Curl_os400_recvfrom macro
|
/third_party/ltp/testcases/network/multicast/mc_commo/ |
H A D | mc_recv.c | 93 recvfrom(s, buf, sizeof(buf), 0, in main() 95 perror("recvfrom"); in main()
|
/third_party/musl/libc-test/src/api/ |
H A D | sys_socket.c | 101 {ssize_t(*p)(int,void*restrict,size_t,int,struct sockaddr*restrict,socklen_t*restrict) = recvfrom;} in f()
|
/third_party/musl/libc-test/src/functional/ |
H A D | socket.c | 30 TESTE(recvfrom(s, buf, sizeof buf, 0, (void *)&sa, (socklen_t[]){sizeof sa})==1); in main()
|
/third_party/backends/sanei/ |
H A D | sanei_udp.c | 222 l = recvfrom(fd, buf, count, 0, (struct sockaddr *) &from, &fl); in sanei_udp_recvfrom()
|
/third_party/ltp/testcases/kernel/syscalls/bind/ |
H A D | bind05.c | 150 size = recvfrom(sock, &rand_index, sizeof(rand_index), 0, in test_bind()
|
/third_party/ltp/testcases/network/stress/ns-tools/ |
H A D | ns-udpclient.c | 42 #define RECVFROM_TIMEOUT 1 /* Timeout length of recvfrom() */ 320 if ((recvlen = recvfrom(sock_fd, recvbuf, MESSAGE_LEN, 0, in main() 329 "recvfrom() is timeout\n"); in main() 333 fatal_error("recvfrom()"); in main()
|
/third_party/toybox/lib/ |
H A D | net.c | 168 len = recvfrom(fd, buf, len, 0, (void *)sa, &sl); in xrecvwait() 169 if (len<0) perror_exit("recvfrom"); in xrecvwait()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/drivers/ |
H A D | netlink.c | 48 left = recvfrom(sock, buf, sizeof(buf), MSG_DONTWAIT, in netlink_receive() 52 wpa_printf(MSG_INFO, "netlink: recvfrom failed: %s", in netlink_receive()
|