/third_party/ltp/utils/sctp/func_tests/ |
H A D | test_1_to_1_sendmsg.c | 5 * This file has test cases to test the sendmsg() call for 1-1 style sockets 151 /*sendmsg () TEST1: Bad socket descriptor, EBADF Expected error*/ in main() 152 count = sendmsg(-1, &outmessage, flag); in main() 154 tst_brkm(TBROK, tst_exit, "sendmsg with a bad socket " in main() 157 tst_resm(TPASS, "sendmsg() with a bad socket descriptor - EBADF"); in main() 159 /*sendmsg () TEST2: Invalid socket, ENOTSOCK Expected error*/ in main() 165 count = sendmsg(fd, &outmessage, flag); in main() 171 tst_brkm(TBROK, tst_exit, "sendmsg with invalid socket " in main() 174 tst_resm(TPASS, "sendmsg() with invalid socket - ENOTSOCK"); in main() 176 /*sendmsg () TEST in main() [all...] |
/third_party/rust/crates/nix/test/sys/ |
H A D | test_socket.rs | 76 recvmsg, sendmsg, setsockopt, socket, sockopt::Timestamping, in test_timestamping() 110 sendmsg(ssock, &iov1, &[], flags, Some(&sock_addr)).unwrap(); in test_timestamping() 443 sendmsg(s, &iov, &[cmsg], flags, Some(&sock_addr)) in gso() 772 recvmsg, sendmsg, socketpair, AddressFamily, ControlMessage, in test_scm_rights() 793 sendmsg::<()>(fd1, &iov, &[cmsg], MsgFlags::empty(), None).unwrap(), in test_scm_rights() 846 accept, bind, sendmsg, setsockopt, socket, AddressFamily, AlgAddr, in test_af_alg_cipher() 890 sendmsg::<()>(session_socket, &[iov], &msgs, MsgFlags::empty(), None) in test_af_alg_cipher() 891 .expect("sendmsg encrypt"); in test_af_alg_cipher() 906 sendmsg::<()>(session_socket, &[iov], &msgs, MsgFlags::empty(), None) in test_af_alg_cipher() 907 .expect("sendmsg decryp in test_af_alg_cipher() [all...] |
/third_party/musl/src/network/ |
H A D | sendmsg.c | 7 ssize_t sendmsg(int fd, const struct msghdr *msg, int flags) in sendmsg() function 31 return socketcall_cp(sendmsg, fd, msg, flags, 0, 0, 0); in sendmsg()
|
H A D | sendmmsg.c | 18 * unsigned int for the resulting msg_len, despite sendmsg in sendmmsg() 20 * sent by sendmsg to INT_MAX, so the assignment is safe. */ in sendmmsg() 21 ssize_t r = sendmsg(fd, &msgvec[i].msg_hdr, flags); in sendmmsg()
|
/third_party/ltp/testcases/network/stress/ns-tools/ |
H A D | ns-tcpserver.c | 293 char *sendmsg; /* pointer to the message to send */ in communicate_client() local 316 sendmsg = malloc(sndbuf_size); in communicate_client() 317 if (sendmsg == NULL) { in communicate_client() 333 sntbyte_size = send(sock_fd, sendmsg, sndbuf_size, 0); in communicate_client() 361 free(sendmsg); in communicate_client()
|
/third_party/libwebsockets/minimal-examples/ws-server/minimal-ws-raw-proxy/mount-origin/ |
H A D | example.js | 57 function sendmsg() 63 document.getElementById("b").addEventListener("click", sendmsg);
|
/third_party/libwebsockets/minimal-examples/ws-server/minimal-ws-server-timer/mount-origin/ |
H A D | example.js | 57 function sendmsg() 63 document.getElementById("b").addEventListener("click", sendmsg);
|
/third_party/libwebsockets/minimal-examples/ws-server/minimal-ws-server/mount-origin/ |
H A D | example.js | 57 function sendmsg() 63 document.getElementById("b").addEventListener("click", sendmsg);
|
/third_party/libwebsockets/minimal-examples/ws-server/minimal-ws-server-ring/mount-origin/ |
H A D | example.js | 56 function sendmsg() 62 document.getElementById("b").addEventListener("click", sendmsg);
|
/third_party/libwebsockets/minimal-examples/ws-server/minimal-ws-server-pmd/mount-origin/ |
H A D | example.js | 59 function sendmsg() 65 document.getElementById("b").addEventListener("click", sendmsg);
|
/third_party/libwebsockets/minimal-examples/ws-server/minimal-ws-broker/mount-origin/ |
H A D | example.js | 71 function sendmsg() 77 document.getElementById("b").addEventListener("click", sendmsg);
|
/third_party/ltp/utils/sctp/lib/ |
H A D | sendmsg.c | 3 * sendmsg.c 29 * sendmsg() interface. 67 return sendmsg(s, &outmsg, 0); in sctp_sendmsg() 105 return sendmsg(s, &outmsg, flags); in sctp_send()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | crypto_linux.c | 473 ret = sendmsg(skcipher->t, &msg, 0); in linux_af_alg_skcipher_oper() 475 wpa_printf(MSG_ERROR, "%s: sendmsg failed: %s", in linux_af_alg_skcipher_oper() 575 ret = sendmsg(skcipher->t, &msg, 0); in rc4_skip() 577 wpa_printf(MSG_ERROR, "%s: sendmsg failed: %s", in rc4_skip() 648 ret = sendmsg(skcipher->t, &msg, 0); in des_encrypt() 650 wpa_printf(MSG_ERROR, "%s: sendmsg failed: %s", in des_encrypt() 717 ret = sendmsg(skcipher->t, &msg, 0); in aes_128_cbc_oper() 719 wpa_printf(MSG_ERROR, "%s: sendmsg failed: %s", in aes_128_cbc_oper() 826 ret = sendmsg(skcipher->t, &msg, 0); in aes_unwrap() 828 wpa_printf(MSG_ERROR, "%s: sendmsg faile in aes_unwrap() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | crypto_linux.c | 473 ret = sendmsg(skcipher->t, &msg, 0); in linux_af_alg_skcipher_oper() 475 wpa_printf(MSG_ERROR, "%s: sendmsg failed: %s", in linux_af_alg_skcipher_oper() 575 ret = sendmsg(skcipher->t, &msg, 0); in rc4_skip() 577 wpa_printf(MSG_ERROR, "%s: sendmsg failed: %s", in rc4_skip() 648 ret = sendmsg(skcipher->t, &msg, 0); in des_encrypt() 650 wpa_printf(MSG_ERROR, "%s: sendmsg failed: %s", in des_encrypt() 717 ret = sendmsg(skcipher->t, &msg, 0); in aes_128_cbc_oper() 719 wpa_printf(MSG_ERROR, "%s: sendmsg failed: %s", in aes_128_cbc_oper() 826 ret = sendmsg(skcipher->t, &msg, 0); in aes_unwrap() 828 wpa_printf(MSG_ERROR, "%s: sendmsg faile in aes_unwrap() [all...] |
/third_party/musl/libc-test/src/functionalext/supplement/network/ |
H A D | sendmsg.c | 26 * @tc.desc : Test sendmsg to send messages through socket 51 retval = sendmsg(sockfd, &msg, 2); in sendmsg_0100() 53 t_error("sendmsg_0100 sendmsg error"); in sendmsg_0100()
|
/third_party/ltp/testcases/kernel/syscalls/ |
H A D | Makefile | 29 sched_getaffinity sched_setaffinity sendmsg setgroups setns sighold \
|
/third_party/alsa-lib/src/ |
H A D | socket.c | 68 ret = sendmsg(sock, &msghdr, 0 ); in snd_send_fd() 70 SYSERR("sendmsg failed"); in snd_send_fd()
|
/third_party/musl/src/passwd/ |
H A D | nscd_query.c | 73 if (sendmsg(fd, &msg, MSG_NOSIGNAL) < 0) in __nscd_query()
|
/third_party/musl/porting/liteos_a/user/src/passwd/ |
H A D | nscd_query.c | 73 if (sendmsg(fd, &msg, MSG_NOSIGNAL) < 0) in __nscd_query()
|
/third_party/ltp/testcases/kernel/syscalls/sendmsg/ |
H A D | sendmsg03.c | 7 * Test for race condition vulnerability in sendmsg() on SOCK_RAW sockets. 8 * Changing the value of IP_HDRINCL socket option in parallel with sendmsg() 89 sendmsg(sockfd, &msg, 0); in run()
|
/third_party/node/deps/openssl/openssl/include/internal/ |
H A D | ktls.h | 108 return sendmsg(fd, &msg, 0); in ktls_send_ctrl_message() 277 * The TLS_TX socket option changes the send/sendmsg handlers of the TCP socket. 325 return sendmsg(fd, &msg, 0); in ktls_send_ctrl_message()
|
/third_party/openssl/include/internal/ |
H A D | ktls.h | 108 return sendmsg(fd, &msg, 0); in ktls_send_ctrl_message() 277 * The TLS_TX socket option changes the send/sendmsg handlers of the TCP socket. 325 return sendmsg(fd, &msg, 0); in ktls_send_ctrl_message()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/l2_packet/ |
H A D | l2_packet_privsep.c | 46 if (sendmsg(l2->fd, &msg, 0) < 0) { in wpa_priv_cmd() 47 wpa_printf(MSG_ERROR, "L2: sendmsg(cmd): %s", strerror(errno)); in wpa_priv_cmd() 84 if (sendmsg(l2->fd, &msg, 0) < 0) { in l2_packet_send() 85 wpa_printf(MSG_ERROR, "L2: sendmsg(packet_send): %s", in l2_packet_send()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/l2_packet/ |
H A D | l2_packet_privsep.c | 46 if (sendmsg(l2->fd, &msg, 0) < 0) { in wpa_priv_cmd() 47 wpa_printf(MSG_ERROR, "L2: sendmsg(cmd): %s", strerror(errno)); in wpa_priv_cmd() 84 if (sendmsg(l2->fd, &msg, 0) < 0) { in l2_packet_send() 85 wpa_printf(MSG_ERROR, "L2: sendmsg(packet_send): %s", in l2_packet_send()
|
/third_party/ltp/testcases/kernel/syscalls/recvmsg/ |
H A D | recvmsg03.c | 79 if (sendmsg(sock_fd1, &msg, 0) == -1) { in client() 81 "sendmsg() failed to send data to server"); in client()
|