/third_party/curl/lib/vssh/ |
H A D | wolfssh.c | 73 curl_socket_t *sock); 367 curl_socket_t sock = conn->sock[FIRSTSOCKET]; in wssh_connect() local 409 rc = wolfSSH_set_fd(sshc->ssh_session, (int)sock); in wssh_connect() 1018 curl_socket_t sock = conn->sock[FIRSTSOCKET]; in wssh_block_statemach() local 1022 fd_read = sock; in wssh_block_statemach() 1024 fd_write = sock; in wssh_block_statemach() 1133 curl_socket_t *sock) in wssh_getsock() 1138 sock[ in wssh_getsock() 1131 wssh_getsock(struct Curl_easy *data, struct connectdata *conn, curl_socket_t *sock) wssh_getsock() argument [all...] |
/third_party/alsa-lib/src/pcm/ |
H A D | pcm_shm.c | 640 int sock; in make_local_socket() local 642 sock = socket(PF_LOCAL, SOCK_STREAM, 0); in make_local_socket() 643 if (sock < 0) { in make_local_socket() 651 if (connect(sock, (struct sockaddr *) addr, size) < 0) { in make_local_socket() 655 return sock; in make_local_socket() 683 int sock = -1; in snd_pcm_shm_open() local 693 sock = result; in snd_pcm_shm_open() 703 err = write(sock, req, reqlen); in snd_pcm_shm_open() 714 err = read(sock, &ans, sizeof(ans)); in snd_pcm_shm_open() 742 shm->socket = sock; in snd_pcm_shm_open() [all...] |
/third_party/node/test/async-hooks/ |
H A D | test-udpwrap.js | 13 const sock = dgram.createSocket('udp4'); 23 sock.close(common.mustCall(onsockClosed));
|
/third_party/ltp/testcases/network/rpc/rpc-tirpc/tests_pack/rpc_suite/rpc/rpc_createdestroy_clnttcp_create/ |
H A D | rpc_clnttcp_create.c | 57 int sock = RPC_ANYSOCK; in main() local 70 clnt = clnttcp_create(&server_addr, progNum, VERSNUM, &sock, 0, 0); in main()
|
H A D | rpc_clnttcp_create_stress.c | 58 int sock = RPC_ANYSOCK; in main() local 76 clnttcp_create(&server_addr, progNum, VERSNUM, &sock, 0, 0); in main()
|
/third_party/rust/crates/nix/test/sys/ |
H A D | test_socket.rs | 269 let sockname = tempdir.path().join("sock"); in test_getsockname() 270 let sock = socket( in test_getsockname() 278 bind(sock, &sockaddr).expect("bind failed"); in test_getsockname() 279 assert_eq!(sockaddr, getsockname(sock).expect("getsockname failed")); in test_getsockname() 868 let sock = socket( in test_af_alg_cipher() 877 bind(sock, &sockaddr).expect("bind failed"); in test_af_alg_cipher() 882 setsockopt(sock, AlgSetKey::default(), &key).expect("setsockopt"); in test_af_alg_cipher() 883 let session_socket = accept(sock).expect("accept failed"); in test_af_alg_cipher() 963 let sock = socket( in test_af_alg_aead() 972 bind(sock, in test_af_alg_aead() [all...] |
/third_party/libcoap/src/ |
H A D | coap_dtls.c | 45 session->sock.lfunc[COAP_LAYER_TLS].l_close(session); in coap_dtls_close() 74 session->sock.lfunc[COAP_LAYER_TLS].l_close(session); in coap_tls_close()
|
/third_party/ltp/testcases/network/rpc/rpc-tirpc/tests_pack/rpc_suite/rpc/rpc_createdestroy_clntudp_bufcreate/ |
H A D | rpc_clntudp_bufcreate.c | 58 int sock = RPC_ANYSOCK; in main() local 76 &sock, 1024, 1024); in main()
|
/third_party/ltp/testcases/network/rpc/rpc-tirpc/tests_pack/rpc_suite/rpc/rpc_createdestroy_clntudp_create/ |
H A D | rpc_clntudp_create_stress.c | 59 int sock = RPC_ANYSOCK; in main() local 81 pertry_timeout, &sock); in main()
|
H A D | rpc_clntudp_create.c | 58 int sock = RPC_ANYSOCK; in main() local 76 &sock); in main()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/utils/ |
H A D | edit_simple.c | 26 static void edit_read_char(int sock, void *eloop_ctx, void *sock_ctx) in edit_read_char() argument 32 res = read(sock, buf, 1); in edit_read_char()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/utils/ |
H A D | edit_simple.c | 26 static void edit_read_char(int sock, void *eloop_ctx, void *sock_ctx) in edit_read_char() argument 32 res = read(sock, buf, 1); in edit_read_char()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/drivers/ |
H A D | driver_bsd.c | 52 int sock; /* socket for 802.11 ioctls */ member 124 if (ioctl(drv->global->sock, SIOCS80211, &ireq) < 0) { in bsd_set80211() 145 if (ioctl(drv->global->sock, SIOCG80211, ireq) < 0) { in bsd_get80211() 186 if (ioctl(drv->global->sock, SIOCG80211NWID, &ifr) < 0 || in bsd_get_ssid() 209 return ioctl(drv->global->sock, SIOCS80211NWID, &ifr); in bsd_set_ssid() 224 if (ioctl(drv->global->sock, SIOCGIFMEDIA, &ifmr) < 0) { in bsd_get_if_media() 243 if (ioctl(drv->global->sock, SIOCSIFMEDIA, &ifr) < 0) { in bsd_set_if_media() 306 if (ioctl(drv->global->sock, SIOCGIFFLAGS, &ifr) < 0) { in bsd_ctrl_iface() 323 if (ioctl(drv->global->sock, SIOCSIFFLAGS, &ifr) < 0) { in bsd_ctrl_iface() 621 return ioctl(drv->global->sock, SIOCS80211CHANNE in bsd_set_freq() 773 bsd_wireless_event_receive(int sock, void *ctx, void *sock_ctx) bsd_wireless_event_receive() argument 1211 wpa_driver_bsd_event_receive(int sock, void *ctx, void *sock_ctx) wpa_driver_bsd_event_receive() argument [all...] |
H A D | driver_hostap.c | 41 int sock; /* raw packet socket for driver access */ member 200 static void handle_read(int sock, void *eloop_ctx, void *sock_ctx) in handle_read() argument 206 len = recv(sock, buf, sizeof(buf), 0); in handle_read() 221 drv->sock = socket(PF_PACKET, SOCK_RAW, htons(ETH_P_ALL)); in hostap_init_sockets() 222 if (drv->sock < 0) { in hostap_init_sockets() 228 if (eloop_register_read_sock(drv->sock, handle_read, drv, NULL)) { in hostap_init_sockets() 239 if (ioctl(drv->sock, SIOCGIFINDEX, &ifr) != 0) { in hostap_init_sockets() 255 if (bind(drv->sock, (struct sockaddr *) &addr, sizeof(addr)) < 0) { in hostap_init_sockets() 260 return linux_get_ifhwaddr(drv->sock, drv->iface, own_addr); in hostap_init_sockets() 274 res = send(drv->sock, ms in hostap_send_mlme() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/drivers/ |
H A D | driver_bsd.c | 53 int sock; /* socket for 802.11 ioctls */ member 120 if (ioctl(drv->global->sock, SIOCS80211, &ireq) < 0) { in bsd_set80211() 141 if (ioctl(drv->global->sock, SIOCG80211, ireq) < 0) { in bsd_get80211() 184 if (ioctl(drv->global->sock, SIOCG80211NWID, &ifr) < 0 || in bsd_get_ssid() 207 return ioctl(drv->global->sock, SIOCS80211NWID, &ifr); in bsd_set_ssid() 222 if (ioctl(drv->global->sock, SIOCGIFMEDIA, &ifmr) < 0) { in bsd_get_if_media() 241 if (ioctl(drv->global->sock, SIOCSIFMEDIA, &ifr) < 0) { in bsd_set_if_media() 303 if (ioctl(drv->global->sock, SIOCGIFFLAGS, &ifr) < 0) { in bsd_get_iface_flags() 602 return ioctl(drv->global->sock, SIOCS80211CHANNEL, &creq); in bsd_set_freq() 622 bsd_route_overflow(int sock, voi argument 723 bsd_wireless_event_receive(int sock, void *ctx, void *sock_ctx) bsd_wireless_event_receive() argument [all...] |
H A D | driver_hostap.c | 41 int sock; /* raw packet socket for driver access */ member 200 static void handle_read(int sock, void *eloop_ctx, void *sock_ctx) in handle_read() argument 206 len = recv(sock, buf, sizeof(buf), 0); in handle_read() 221 drv->sock = socket(PF_PACKET, SOCK_RAW, htons(ETH_P_ALL)); in hostap_init_sockets() 222 if (drv->sock < 0) { in hostap_init_sockets() 228 if (eloop_register_read_sock(drv->sock, handle_read, drv, NULL)) { in hostap_init_sockets() 239 if (ioctl(drv->sock, SIOCGIFINDEX, &ifr) != 0) { in hostap_init_sockets() 255 if (bind(drv->sock, (struct sockaddr *) &addr, sizeof(addr)) < 0) { in hostap_init_sockets() 260 return linux_get_ifhwaddr(drv->sock, drv->iface, own_addr); in hostap_init_sockets() 275 res = send(drv->sock, ms in hostap_send_mlme() [all...] |
/third_party/node/deps/uvwasi/src/ |
H A D | fd_table.c | 62 uv_tcp_t* sock, in uvwasi_fd_table_insert() 166 entry->sock = sock; in uvwasi_fd_table_insert() 310 uv_tcp_t* sock) { in uvwasi_fd_table_insert_preopen_socket() 311 if (table == NULL || sock == NULL) in uvwasi_fd_table_insert_preopen_socket() 317 sock, in uvwasi_fd_table_insert_preopen_socket() 59 uvwasi_fd_table_insert(uvwasi_t* uvwasi, struct uvwasi_fd_table_t* table, uv_file fd, uv_tcp_t* sock, const char* mapped_path, const char* real_path, uvwasi_filetype_t type, uvwasi_rights_t rights_base, uvwasi_rights_t rights_inheriting, int preopen, struct uvwasi_fd_wrap_t** wrap) uvwasi_fd_table_insert() argument 308 uvwasi_fd_table_insert_preopen_socket(uvwasi_t* uvwasi, struct uvwasi_fd_table_t* table, uv_tcp_t* sock) uvwasi_fd_table_insert_preopen_socket() argument
|
/third_party/python/Lib/test/ |
H A D | test_ssl.py | 283 def test_wrap_socket(sock, *, 302 return context.wrap_socket(sock, **kwargs) 647 sock = socket.socket() 650 ssl.wrap_socket, sock, keyfile=CERTFILE) 653 ssl.wrap_socket, sock, server_side=True) 656 ssl.wrap_socket, sock, server_side=True, certfile="") 657 with ssl.wrap_socket(sock, server_side=True, certfile=CERTFILE) as s: 661 with socket.socket() as sock: 662 ssl.wrap_socket(sock, certfile=NONEXISTINGCERT) 665 with socket.socket() as sock [all...] |
/third_party/node/lib/ |
H A D | _http_client.js | 949 this.once('socket', (sock) => setSocketTimeout(sock, msecs)); 955 function setSocketTimeout(sock, msecs) { 956 if (sock.connecting) { 957 sock.once('connect', function() { 958 sock.setTimeout(msecs); 961 sock.setTimeout(msecs);
|
/third_party/toybox/porting/liteos_a/toys/net/ |
H A D | ifconfig.c | 439 struct sockaddr *sock = &ifre.ifr_hwaddr; in ifconfig_main() local 442 ptr = p = (char *)sock->sa_data; in ifconfig_main() 443 memset(sock, 0, sizeof(struct sockaddr)); in ifconfig_main() 445 if (!strcmp("ether", *++argv)) sock->sa_family = ARPHRD_ETHER; in ifconfig_main() 447 sock->sa_family = ARPHRD_INFINIBAND; in ifconfig_main() 452 if (!sock->sa_family || !argv[1]) help_exit("bad hw '%s'", *argv); in ifconfig_main() 473 if (sock->sa_family == ARPHRD_INFINIBAND && !strchr(ifre.ifr_name, '/')) { in ifconfig_main()
|
/third_party/toybox/toys/pending/ |
H A D | traceroute.c | 161 static void set_flag_dr(int sock) in set_flag_dr() argument 164 if ((toys.optflags & FLAG_d) && (setsockopt(sock,SOL_SOCKET, SO_DEBUG, in set_flag_dr() 167 if ((toys.optflags & FLAG_r) && (setsockopt(sock, SOL_SOCKET, SO_DONTROUTE, in set_flag_dr() 171 static void bind_to_interface(int sock) in bind_to_interface() argument 176 if (setsockopt(sock, SOL_SOCKET, SO_BINDTODEVICE, &ifr, sizeof(ifr))) in bind_to_interface() 180 static void resolve_addr(char *host, int family, int type, int proto, void *sock) in resolve_addr() argument 193 memcpy(sock, info->ai_addr, info->ai_addrlen); in resolve_addr()
|
/third_party/openssl/ohos_lite/include/openssl/ |
H A D | bio.h | 677 int BIO_sock_error(int sock); 684 int BIO_set_tcp_ndelay(int sock, int turn_on); 690 DEPRECATEDIN_1_1_0(int BIO_accept(int sock, char **ip_port)) 698 int BIO_sock_info(int sock, 708 int BIO_connect(int sock, const BIO_ADDR *addr, int options); 709 int BIO_bind(int sock, const BIO_ADDR *addr, int options); 710 int BIO_listen(int sock, const BIO_ADDR *addr, int options); 712 int BIO_closesocket(int sock); 714 BIO *BIO_new_socket(int sock, int close_flag);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/wps/ |
H A D | wps_upnp.c | 922 int sock = -1; in get_netif_info() local 930 sock = socket(AF_INET, SOCK_DGRAM, 0); in get_netif_info() 931 if (sock < 0) in get_netif_info() 935 if (ioctl(sock, SIOCGIFADDR, &req) < 0) { in get_netif_info() 948 if (ioctl(sock, SIOCGIFNETMASK, &req) < 0) { in get_netif_info() 960 if (ioctl(sock, SIOCGIFHWADDR, &req) < 0) { in get_netif_info() 975 close(sock); in get_netif_info() 979 if (sock >= 0) in get_netif_info() 980 close(sock); in get_netif_info()
|
/third_party/python/Lib/test/test_asyncio/ |
H A D | test_events.py | 787 sock = socket.socket() 788 self.addCleanup(sock.close) 790 MyProto, sock, ssl_handshake_timeout=support.LOOPBACK_TIMEOUT) 821 server_hosts = {sock.getsockbyname()[0] for sock in server.sockets} 837 sock = server.sockets[0] 838 host, port = sock.getsockname() 875 sock = server.sockets[0] 877 sock.getsockopt( 888 sock [all...] |
/third_party/libuv/test/ |
H A D | test-tcp-write-fail.c | 39 static void close_socket(uv_tcp_t* sock) { in close_socket() argument 43 r = uv_fileno((uv_handle_t*)sock, &fd); in close_socket()
|