/third_party/curl/tests/server/ |
H A D | util.h | 94 int bind_unix_socket(curl_socket_t sock, const char *unix_socket,
|
/third_party/curl/lib/ |
H A D | asyn.h | 113 * This function is called from the multi_getsock() function. 'sock' is a 117 * in the 'sock' array) to wait for, read/write. 119 int Curl_resolver_getsock(struct Curl_easy *data, curl_socket_t *sock);
|
/kernel/linux/linux-5.10/kernel/ |
H A D | audit.c | 53 #include <net/sock.h> 91 struct sock *sk; 288 * Returns the sock pointer if valid, NULL otherwise. The caller must ensure 289 * that a reference is held for the network namespace while the sock is in use. 291 static struct sock *audit_get_sk(const struct net *net) in audit_get_sk() 695 struct sock *sk; in auditd_send_unicast_skb() 700 * copies of the namespace, the sock, and the portid; the in auditd_send_unicast_skb() 701 * namespace and sock aren't going to go away while we hold a in auditd_send_unicast_skb() 733 * @sk: the sending sock 746 static int kauditd_send_queue(struct sock *s 812 struct sock *sock = audit_get_sk(&init_net); kauditd_send_multicast_skb() local [all...] |
/kernel/linux/linux-6.6/kernel/ |
H A D | audit.c | 53 #include <net/sock.h> 89 struct sock *sk; 286 * Returns the sock pointer if valid, NULL otherwise. The caller must ensure 287 * that a reference is held for the network namespace while the sock is in use. 289 static struct sock *audit_get_sk(const struct net *net) in audit_get_sk() 692 struct sock *sk; in auditd_send_unicast_skb() 697 * copies of the namespace, the sock, and the portid; the in auditd_send_unicast_skb() 698 * namespace and sock aren't going to go away while we hold a in auditd_send_unicast_skb() 730 * @sk: the sending sock 743 static int kauditd_send_queue(struct sock *s 809 struct sock *sock = audit_get_sk(&init_net); kauditd_send_multicast_skb() local [all...] |
/kernel/linux/linux-6.6/include/linux/ |
H A D | skbuff.h | 864 struct sock *sk; 1314 static inline bool skb_fclone_busy(const struct sock *sk, in skb_fclone_busy() 1638 struct ubuf_info *msg_zerocopy_realloc(struct sock *sk, size_t size, 1646 int __zerocopy_sg_from_iter(struct msghdr *msg, struct sock *sk, 1656 int skb_zerocopy_iter_stream(struct sock *sk, struct sk_buff *skb, 3934 int __skb_wait_for_more_packets(struct sock *sk, struct sk_buff_head *queue, 3937 struct sk_buff *__skb_try_recv_from_queue(struct sock *sk, 3942 struct sk_buff *__skb_try_recv_datagram(struct sock *sk, 3946 struct sk_buff *__skb_recv_datagram(struct sock *sk, 3949 struct sk_buff *skb_recv_datagram(struct sock *s [all...] |
/foundation/communication/netstack/test/unittest/tls_test/client/ |
H A D | TlsSocketTest.cpp | 430 int sock = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
in HWTEST_F() local 431 EXPECT_TRUE(sock > 0);
in HWTEST_F() 440 int ret = connect(sock, reinterpret_cast<sockaddr *>(&addr4), sizeof(sockaddr_in));
in HWTEST_F() 443 TLSSocket testService(sock);
in HWTEST_F()
|
/foundation/communication/netstack/test/unittest/tlssocket/client/ |
H A D | TlsSocketTest.cpp | 430 int sock = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); in HWTEST_F() local 431 EXPECT_TRUE(sock > 0); in HWTEST_F() 440 int ret = connect(sock, reinterpret_cast<sockaddr *>(&addr4), sizeof(sockaddr_in)); in HWTEST_F() 443 TLSSocket testService(sock); in HWTEST_F()
|
/kernel/linux/linux-5.10/net/netfilter/ |
H A D | nfnetlink_cthelper.c | 19 #include <net/sock.h> 415 static int nfnl_cthelper_new(struct net *net, struct sock *nfnl, in nfnl_cthelper_new() 614 static int nfnl_cthelper_get(struct net *net, struct sock *nfnl, in nfnl_cthelper_get() 685 static int nfnl_cthelper_del(struct net *net, struct sock *nfnl, in nfnl_cthelper_del()
|
/kernel/linux/linux-5.10/net/sctp/ |
H A D | output.c | 38 #include <net/sock.h> 79 struct sock *sk; in sctp_packet_config() 413 struct sock *sk = head->sk; in sctp_packet_pack() 554 struct sock *sk; in sctp_packet_transmit()
|
/kernel/linux/linux-5.10/security/apparmor/ |
H A D | file.c | 564 struct socket *sock = (struct socket *) file->private_data; in __file_sock_perm() local 567 AA_BUG(!sock); in __file_sock_perm() 574 error = aa_sock_file_perm(label, op, request, sock); in __file_sock_perm() 578 last_error(error, aa_sock_file_perm(flabel, op, request, sock)); in __file_sock_perm()
|
/kernel/linux/linux-5.10/include/target/iscsi/ |
H A D | iscsi_target_core.h | 13 struct sock; 556 struct socket *sock; member 557 void (*orig_data_ready)(struct sock *); 558 void (*orig_state_change)(struct sock *);
|
/kernel/linux/linux-6.6/include/target/iscsi/ |
H A D | iscsi_target_core.h | 13 struct sock; 554 struct socket *sock; member 555 void (*orig_data_ready)(struct sock *); 556 void (*orig_state_change)(struct sock *);
|
/kernel/linux/linux-6.6/security/apparmor/ |
H A D | file.c | 550 struct socket *sock = (struct socket *) file->private_data; in __file_sock_perm() local 553 AA_BUG(!sock); in __file_sock_perm() 560 error = aa_sock_file_perm(subj_cred, label, op, request, sock); in __file_sock_perm() 565 request, sock)); in __file_sock_perm()
|
/third_party/node/deps/openssl/openssl/engines/ |
H A D | e_afalg.c | 828 int sock; in afalg_chk_platform() local 857 sock = socket(AF_ALG, SOCK_SEQPACKET, 0); in afalg_chk_platform() 858 if (sock == -1) { in afalg_chk_platform() 862 close(sock); in afalg_chk_platform()
|
/third_party/openssl/engines/ |
H A D | e_afalg.c | 828 int sock; in afalg_chk_platform() local 857 sock = socket(AF_ALG, SOCK_SEQPACKET, 0); in afalg_chk_platform() 858 if (sock == -1) { in afalg_chk_platform() 862 close(sock); in afalg_chk_platform()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/utils/ |
H A D | edit.c | 758 static enum edit_key_code edit_read_key(int sock) in edit_read_key() argument 766 res = read(sock, buf, 1); in edit_read_key() 1004 static void edit_read_char(int sock, void *eloop_ctx, void *sock_ctx) in edit_read_char() argument 1010 c = edit_read_key(sock); in edit_read_char()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/utils/ |
H A D | edit.c | 758 static enum edit_key_code edit_read_key(int sock) in edit_read_key() argument 766 res = read(sock, buf, 1); in edit_read_key() 1004 static void edit_read_char(int sock, void *eloop_ctx, void *sock_ctx) in edit_read_char() argument 1010 c = edit_read_key(sock); in edit_read_char()
|
/kernel/linux/linux-5.10/fs/hmdfs/comm/ |
H A D | connection.c | 757 // need to check and test: fput(tcp->sock->file); in connection_release() 758 if (tcp && tcp->sock) { in connection_release() 760 file_count(tcp->sock->file)); in connection_release() 761 sockfd_put(tcp->sock); in connection_release() 874 if (tcp && tcp->sock) { in hmdfs_disconnect_node() 875 kernel_sock_shutdown(tcp->sock, SHUT_RDWR); in hmdfs_disconnect_node() 876 hmdfs_info("shudown sock: fd = %d, refcount %ld", in hmdfs_disconnect_node() 877 tcp->fd, file_count(tcp->sock->file)); in hmdfs_disconnect_node() 983 tcp_sock_set_quickack(tcp->sock->sk, option); in set_conn_sock_quickack()
|
/kernel/linux/linux-6.6/fs/hmdfs/comm/ |
H A D | connection.c | 757 // need to check and test: fput(tcp->sock->file); in connection_release() 758 if (tcp && tcp->sock) { in connection_release() 760 file_count(tcp->sock->file)); in connection_release() 761 sockfd_put(tcp->sock); in connection_release() 874 if (tcp && tcp->sock) { in hmdfs_disconnect_node() 875 kernel_sock_shutdown(tcp->sock, SHUT_RDWR); in hmdfs_disconnect_node() 876 hmdfs_info("shudown sock: fd = %d, refcount %ld", in hmdfs_disconnect_node() 877 tcp->fd, file_count(tcp->sock->file)); in hmdfs_disconnect_node() 983 tcp_sock_set_quickack(tcp->sock->sk, option); in set_conn_sock_quickack()
|
/kernel/linux/linux-5.10/arch/um/drivers/ |
H A D | vector_user.c | 164 struct sockaddr_ll sock; in create_raw_fd() local 179 sock.sll_family = AF_PACKET; in create_raw_fd() 180 sock.sll_protocol = htons(proto); in create_raw_fd() 181 sock.sll_ifindex = ifr.ifr_ifindex; in create_raw_fd() 184 (struct sockaddr *) &sock, sizeof(struct sockaddr_ll)) < 0) { in create_raw_fd()
|
/kernel/linux/linux-5.10/tools/testing/selftests/cgroup/ |
H A D | test_memcontrol.c | 902 long current, sock; in tcp_client() local 908 sock = cg_read_key_long(cgroup, "memory.stat", "sock "); in tcp_client() 910 if (current < 0 || sock < 0) in tcp_client() 913 if (current < sock) in tcp_client() 916 if (values_close(current, sock, 10)) { in tcp_client() 935 * memory.current and memory.stat.sock are similar. 990 if (cg_read_key_long(memcg, "memory.stat", "sock ")) in test_memcg_sock()
|
/kernel/linux/linux-6.6/arch/um/drivers/ |
H A D | vector_user.c | 165 struct sockaddr_ll sock; in create_raw_fd() local 180 sock.sll_family = AF_PACKET; in create_raw_fd() 181 sock.sll_protocol = htons(proto); in create_raw_fd() 182 sock.sll_ifindex = ifr.ifr_ifindex; in create_raw_fd() 185 (struct sockaddr *) &sock, sizeof(struct sockaddr_ll)) < 0) { in create_raw_fd()
|
/kernel/linux/linux-5.10/net/xfrm/ |
H A D | xfrm_output.c | 27 static int xfrm_output2(struct net *net, struct sock *sk, struct sk_buff *skb); 506 int xfrm_output_resume(struct sock *sk, struct sk_buff *skb, int err) in xfrm_output_resume() 535 static int xfrm_output2(struct net *net, struct sock *sk, struct sk_buff *skb) in xfrm_output2() 540 static int xfrm_output_gso(struct net *net, struct sock *sk, struct sk_buff *skb) in xfrm_output_gso() 568 int xfrm_output(struct sock *sk, struct sk_buff *skb) in xfrm_output()
|
/kernel/linux/linux-5.10/security/tomoyo/ |
H A D | common.h | 35 #include <net/sock.h> 996 int tomoyo_socket_bind_permission(struct socket *sock, struct sockaddr *addr, 998 int tomoyo_socket_connect_permission(struct socket *sock, 1000 int tomoyo_socket_listen_permission(struct socket *sock); 1001 int tomoyo_socket_sendmsg_permission(struct socket *sock, struct msghdr *msg,
|
/kernel/linux/linux-6.6/security/tomoyo/ |
H A D | common.h | 35 #include <net/sock.h> 995 int tomoyo_socket_bind_permission(struct socket *sock, struct sockaddr *addr, 997 int tomoyo_socket_connect_permission(struct socket *sock, 999 int tomoyo_socket_listen_permission(struct socket *sock); 1000 int tomoyo_socket_sendmsg_permission(struct socket *sock, struct msghdr *msg,
|