/third_party/curl/tests/server/ |
H A D | util.c | 809 int bind_unix_socket(curl_socket_t sock, const char *unix_socket, in bind_unix_socket() argument 817 rc = bind(sock, (struct sockaddr*)sau, sizeof(struct sockaddr_un)); in bind_unix_socket() 862 rc = bind(sock, (struct sockaddr*)sau, sizeof(struct sockaddr_un)); in bind_unix_socket()
|
/third_party/curl/lib/vtls/ |
H A D | rustls.c | 634 curl_socket_t sock = Curl_conn_cf_get_socket(cf->next, data); in cr_adjust_pollset() local 645 Curl_pollset_add_out(data, ps, sock); in cr_adjust_pollset() 648 Curl_pollset_add_in(data, ps, sock); in cr_adjust_pollset()
|
H A D | bearssl.c | 753 curl_socket_t sock = Curl_conn_cf_get_socket(cf->next, data); in bearssl_adjust_pollset() local 754 if(sock != CURL_SOCKET_BAD) { in bearssl_adjust_pollset() 761 Curl_pollset_set_out_only(data, ps, sock); in bearssl_adjust_pollset() 764 Curl_pollset_set_in_only(data, ps, sock); in bearssl_adjust_pollset()
|
/third_party/libcoap/src/ |
H A D | coap_mbedtls.c | 236 result = (int)c_session->sock.lfunc[COAP_LAYER_TLS].l_write(c_session, in coap_dgram_write() 1405 ret = (int)c_session->sock.lfunc[COAP_LAYER_TLS].l_read(c_session, out, outl); 1433 ret = c_session->sock.lfunc[COAP_LAYER_TLS].l_write(c_session, 2084 c_session->sock.lfunc[COAP_LAYER_TLS].l_establish(c_session); 2269 c_session->sock.lfunc[COAP_LAYER_TLS].l_establish(c_session); 2300 c_session->sock.lfunc[COAP_LAYER_TLS].l_establish(c_session); 2344 c_session->sock.flags |= COAP_SOCKET_WANT_WRITE; 2369 c_session->sock.lfunc[COAP_LAYER_TLS].l_establish(c_session); 2419 c_session->sock.lfunc[COAP_LAYER_TLS].l_establish(c_session); 2449 c_session->sock [all...] |
/third_party/curl/lib/ |
H A D | gopher.c | 135 curl_socket_t sockfd = conn->sock[FIRSTSOCKET]; in gopher_do()
|
H A D | transfer.c | 1615 ((writesockindex == -1 ? CURL_SOCKET_BAD : conn->sock[writesockindex])) : in Curl_setup_transfer() 1616 conn->sock[sockindex]; in Curl_setup_transfer() 1624 CURL_SOCKET_BAD : conn->sock[sockindex]; in Curl_setup_transfer() 1626 CURL_SOCKET_BAD:conn->sock[writesockindex]; in Curl_setup_transfer()
|
H A D | curl_rtmp.c | 229 r->m_sb.sb_socket = (int)conn->sock[FIRSTSOCKET]; in rtmp_connect()
|
/third_party/alsa-lib/include/ |
H A D | aserver.h | 25 int snd_receive_fd(int sock, void *data, size_t len, int *fd);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/utils/ |
H A D | edit_readline.c | 73 static void edit_read_char(int sock, void *eloop_ctx, void *sock_ctx) in edit_read_char() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/utils/ |
H A D | edit_readline.c | 73 static void edit_read_char(int sock, void *eloop_ctx, void *sock_ctx) in edit_read_char() argument
|
/vendor/hisilicon/hispark_pegasus/demo/coap_demo/ |
H A D | coap_client.c | 119 session->sock.pcb = g_cliCtx->endpoint; in CoapClientSendMsg()
|
/third_party/libuv/src/unix/ |
H A D | udp.c | 1026 int uv_udp_open(uv_udp_t* handle, uv_os_sock_t sock) { in uv_udp_open() argument 1033 if (uv__fd_exists(handle->loop, sock)) in uv_udp_open() 1036 err = uv__nonblock(sock, 1); in uv_udp_open() 1040 err = uv__set_reuse(sock); in uv_udp_open() 1044 handle->io_watcher.fd = sock; in uv_udp_open()
|
/third_party/node/deps/uv/src/unix/ |
H A D | udp.c | 1074 int uv_udp_open(uv_udp_t* handle, uv_os_sock_t sock) { in uv_udp_open() argument 1081 if (uv__fd_exists(handle->loop, sock)) in uv_udp_open() 1084 err = uv__nonblock(sock, 1); in uv_udp_open() 1088 err = uv__set_reuse(sock); in uv_udp_open() 1092 handle->io_watcher.fd = sock; in uv_udp_open()
|
/third_party/node/deps/openssl/openssl/apps/include/ |
H A D | s_apps.h | 33 int init_client(int *sock, const char *host, const char *port,
|
/third_party/openssl/apps/include/ |
H A D | s_apps.h | 33 int init_client(int *sock, const char *host, const char *port,
|
/third_party/rust/crates/rust-openssl/openssl-sys/src/handwritten/ |
H A D | bio.rs | 62 pub fn BIO_new_socket(sock: c_int, close_flag: c_int) -> *mut BIO; in BIO_new_socket()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/drivers/ |
H A D | rfkill.c | 55 static void rfkill_receive(int sock, void *eloop_ctx, void *sock_ctx) in rfkill_receive() argument
|
H A D | driver_nl80211_monitor.c | 98 static void handle_monitor_read(int sock, void *eloop_ctx, void *sock_ctx) in handle_monitor_read() argument 108 len = recv(sock, buf, sizeof(buf), 0); in handle_monitor_read()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/drivers/ |
H A D | rfkill.c | 55 static void rfkill_receive(int sock, void *eloop_ctx, void *sock_ctx) in rfkill_receive() argument
|
H A D | driver_nl80211_monitor.c | 101 static void handle_monitor_read(int sock, void *eloop_ctx, void *sock_ctx) in handle_monitor_read() argument 111 len = recv(sock, buf, sizeof(buf), 0); in handle_monitor_read()
|
/third_party/python/Lib/ |
H A D | socketserver.py | 827 def __init__(self, sock): 828 self._sock = sock
|
/third_party/toybox/toys/pending/ |
H A D | tcpsvd.c | 74 static char *sock_to_address(struct sockaddr *sock, int flags) in sock_to_address() argument 81 if (!(status = getnameinfo(sock, len, hbuf, sizeof(hbuf), sbuf, in sock_to_address()
|
/third_party/toybox/generated/ |
H A D | globals.h | 192 int sock; member 709 int length, state, request_length, sock, sock1, status, retval, retries; member 1162 int sock; member
|
/third_party/openssl/test/helpers/ |
H A D | handshake.c | 1260 static int set_sock_as_sctp(int sock) in set_sock_as_sctp() argument 1274 (void)setsockopt(sock, IPPROTO_SCTP, SCTP_RTOINFO, in set_sock_as_sctp() 1278 (void)setsockopt(sock, IPPROTO_SCTP, SCTP_ASSOCINFO, in set_sock_as_sctp() 1288 tmpbio = BIO_new_dgram_sctp(sock, BIO_NOCLOSE); in set_sock_as_sctp()
|
/third_party/python/Modules/clinic/ |
H A D | _ssl.c.h | 626 "_wrap_socket($self, /, sock, server_side, server_hostname=None, *,\n" 635 _ssl__SSLContext__wrap_socket_impl(PySSLContext *self, PyObject *sock, 643 static const char * const _keywords[] = {"sock", "server_side", "server_hostname", "owner", "session", NULL}; in _ssl__SSLContext__wrap_socket() 647 PyObject *sock; in _ssl__SSLContext__wrap_socket() local 658 _PyArg_BadArgument("_wrap_socket", "argument 'sock'", (get_state_ctx(self)->Sock_Type)->tp_name, args[0]); in _ssl__SSLContext__wrap_socket() 661 sock = args[0]; in _ssl__SSLContext__wrap_socket() 687 return_value = _ssl__SSLContext__wrap_socket_impl(self, sock, server_side, hostname_obj, owner, session); in _ssl__SSLContext__wrap_socket()
|