/freebsd-10.1-release/sbin/dhclient/ |
H A D | privsep.h | 50 ssize_t buf_read(int sock, void *, size_t);
|
/freebsd-10.1-release/tools/regression/netinet/arphold/ |
H A D | arphold.c | 64 int sock; local 85 if ((sock = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP)) < 0) { 116 if (sendto(sock, message, sizeof(message), 0, 143 if (sendto(sock, message, sizeof(message), 0,
|
/freebsd-10.1-release/usr.sbin/rtadvd/ |
H A D | if.h | 40 extern struct sockinfo sock;
|
/freebsd-10.1-release/crypto/heimdal/appl/test/ |
H A D | gssapi_client.c | 42 do_trans (int sock, gss_ctx_id_t context_hdl) argument 62 write_token (sock, input_token); 63 write_token (sock, output_token); 80 write_token (sock, output_token); 92 write_token (sock, output_token); 100 proto (int sock, const char *hostname, const char *service) argument 156 if (getsockname (sock, (struct sockaddr *)&local, &addrlen) < 0 161 if (getpeername (sock, (struct sockaddr *)&remote, &addrlen) < 0 214 write_token (sock, output_token); 223 read_token (sock, input_toke [all...] |
/freebsd-10.1-release/contrib/pf/pflogd/ |
H A D | privsep_fdpass.c | 50 send_fd(int sock, int fd) argument 81 if ((n = sendmsg(sock, &msg, 0)) == -1) 82 warn("%s: sendmsg(%d)", __func__, sock); 89 receive_fd(int sock) argument 110 if ((n = recvmsg(sock, &msg, 0)) == -1)
|
/freebsd-10.1-release/tools/tools/mcgrab/ |
H A D | mcgrab.cc | 94 int sock; local 105 if ((sock = socket(AF_INET, SOCK_DGRAM, 0)) < 0) { 115 if (ioctl(sock, SIOCGIFADDR, &ifreq) < 0) { 125 if (setsockopt(sock, IPPROTO_IP, IP_ADD_MEMBERSHIP, &mreq, 132 if (setsockopt(sock, IPPROTO_IP, IP_MULTICAST_IF,
|
/freebsd-10.1-release/tools/tools/mctest/ |
H A D | mctest.cc | 100 int sock, backchan; local 114 if ((sock = socket(AF_INET, SOCK_DGRAM, 0)) < 0) { 125 if (ioctl(sock, SIOCGIFADDR, &ifreq) < 0) { 135 if (setsockopt(sock, IPPROTO_IP, IP_ADD_MEMBERSHIP, &mreq, 141 if (setsockopt(sock, IPPROTO_IP, IP_MULTICAST_IF, 153 if (bind(sock, (struct sockaddr *)&local, sizeof(local)) < 0) { 167 if (setsockopt(sock, SOL_SOCKET, SO_RCVTIMEO, &timeout, 173 if (recvfrom(sock, packet, pkt_size, 0, (struct sockaddr *)&recvd, 238 int sock, n =0; local 246 if ((sock 302 int sock; local [all...] |
/freebsd-10.1-release/contrib/subversion/subversion/libsvn_ra_svn/ |
H A D | streams.c | 47 apr_socket_t *sock; 143 status = apr_socket_timeout_get(b->sock, &interval); 153 apr_socket_timeout_set(b->sock, -1); 154 status = apr_socket_recv(b->sock, buffer, len); 155 apr_socket_timeout_set(b->sock, interval); 169 apr_status_t status = apr_socket_send(b->sock, buffer, len); 180 apr_socket_timeout_set(b->sock, interval); 191 pfd.desc.s = b->sock; 197 svn_ra_svn__stream_from_sock(apr_socket_t *sock, 202 b->sock 46 apr_socket_t *sock; member in struct:sock_baton_t 196 svn_ra_svn__stream_from_sock(apr_socket_t *sock, apr_pool_t *pool) argument [all...] |
/freebsd-10.1-release/crypto/heimdal/kdc/ |
H A D | hpropd.c | 78 krb5_socket_t sock = rk_INVALID_SOCKET; local 119 sock = STDIN_FILENO; 128 sock = STDIN_FILENO; 131 if (getpeername (sock, sa, &sin_len) < 0) { 142 HPROP_PORT), &sock); 145 if(getpeername(sock, sa, &sin_len) < 0) 171 ret = krb5_recvauth(context, &ac, &sock, HPROP_VERSION, NULL, 226 ret = krb5_read_message(context, &sock, &data); 230 ret = krb5_read_priv_message(context, ac, &sock, &data); 239 krb5_write_priv_message(context, ac, &sock, [all...] |
/freebsd-10.1-release/crypto/openssl/apps/ |
H A D | s_socket.c | 109 static int init_client_ip(int *sock, unsigned char ip[4], int port, int type); 110 static int init_server(int *sock, int port, int type); 111 static int init_server_long(int *sock, int port, char *ip, int type); 112 static int do_accept(int acc_sock, int *sock, char **host); 234 int init_client(int *sock, char *host, int port, int type) argument 241 return init_client_ip(sock, ip, port, type); 244 static int init_client_ip(int *sock, unsigned char ip[4], int port, int type) argument 288 *sock = s; 296 int sock; local 310 if (do_accept(accept_socket, &sock, 328 init_server_long(int *sock, int port, char *ip, int type) argument 381 init_server(int *sock, int port, int type) argument 386 do_accept(int acc_sock, int *sock, char **host) argument [all...] |
/freebsd-10.1-release/sys/compat/svr4/ |
H A D | svr4_socket.c | 73 struct sockaddr_un sock;/* Pathname for the socket */ member in struct:svr4_sockcache_entry 105 DPRINTF(("%s\n", e->sock.sun_path)); 106 *saun = e->sock; 132 if ((error = copyinstr(path, e->sock.sun_path, 133 sizeof(e->sock.sun_path), &len)) != 0) { 139 e->sock.sun_family = AF_LOCAL; 140 e->sock.sun_len = len; 145 DPRINTF(("svr4_add_socket: %s [%p,%d,%d]\n", e->sock.sun_path, 164 e->sock.sun_path, p, (int)e->dev, e->ino)); 183 e->sock [all...] |
/freebsd-10.1-release/tools/tools/netrate/http/ |
H A D | http.c | 96 int sock; local 98 sock = socket(PF_INET, SOCK_STREAM, 0); 99 if (sock < 0) { 107 if (connect(sock, (struct sockaddr *)sin, sizeof(*sin)) < 0) { 110 close(sock); 120 len = send(sock, buffer, strlen(buffer), 0); 124 close(sock); 136 len = recv(sock, buffer, BUFFER, 0); 140 close(sock); 147 close(sock); [all...] |
/freebsd-10.1-release/usr.sbin/ypbind/ |
H A D | yp_ping.c | 117 int sock = -1; local 124 PMAPVERS, timeout, &sock, RPCSMALLMSGSIZE, RPCSMALLMSGSIZE); 141 if (sock != -1) 142 (void)close(sock); 223 int sock, dontblock = 1; local 256 sock = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP); 257 clnt = clntudp_create(any, YPPROG, YPVERS, tv, &sock); 259 close(sock); 272 ioctl(sock, FIONBIO, &dontblock); 300 close(sock); [all...] |
/freebsd-10.1-release/contrib/wpa/src/utils/ |
H A D | eloop_none.c | 16 int sock; member in struct:eloop_sock 19 void (*handler)(int sock, void *eloop_ctx, void *sock_ctx); 62 int eloop_register_read_sock(int sock, argument 63 void (*handler)(int sock, void *eloop_ctx, 75 tmp[eloop.reader_count].sock = sock; 81 if (sock > eloop.max_sock) 82 eloop.max_sock = sock; 89 void eloop_unregister_read_sock(int sock) argument 97 if (eloop.readers[i].sock 389 eloop_wait_for_read_sock(int sock) argument [all...] |
/freebsd-10.1-release/crypto/heimdal/lib/krb5/ |
H A D | changepw.c | 73 rk_socket_t sock, 142 if (rk_IS_SOCKET_ERROR( sendmsg (sock, &msghdr, 0) )) { 165 rk_socket_t sock, 252 if (rk_IS_SOCKET_ERROR( sendmsg (sock, &msghdr, 0) )) { 269 rk_socket_t sock, 287 ret = recvfrom (sock, reply + len, sizeof(reply) - len, 316 ret = recvfrom (sock, reply, sizeof(reply), 0, NULL, NULL); 518 rk_socket_t sock; local 565 sock = socket (a->ai_family, a->ai_socktype | SOCK_CLOEXEC, a->ai_protocol); 566 if (rk_IS_BAD_SOCKET(sock)) 68 chgpw_send_request(krb5_context context, krb5_auth_context *auth_context, krb5_creds *creds, krb5_principal targprinc, int is_stream, rk_socket_t sock, const char *passwd, const char *host) argument 160 setpw_send_request(krb5_context context, krb5_auth_context *auth_context, krb5_creds *creds, krb5_principal targprinc, int is_stream, rk_socket_t sock, const char *passwd, const char *host) argument 266 process_reply(krb5_context context, krb5_auth_context auth_context, int is_stream, rk_socket_t sock, int *result_code, krb5_data *result_code_string, krb5_data *result_string, const char *host) argument [all...] |
/freebsd-10.1-release/contrib/tcp_wrappers/ |
H A D | workarounds.c | 125 int fix_recvfrom(sock, buf, buflen, flags, from, fromlen) 126 int sock; 137 if ((ret = recvfrom(sock, buf, buflen, flags, from, fromlen)) >= 0) { 165 int fix_getpeername(sock, sa, len) 166 int sock; 177 if ((ret = getpeername(sock, sa, len)) >= 0
|
/freebsd-10.1-release/crypto/openssh/ |
H A D | monitor_fdpass.c | 47 mm_send_fd(int sock, int fd) argument 82 pfd.fd = sock; 84 while ((n = sendmsg(sock, &msg, 0)) == -1 && 108 mm_receive_fd(int sock) argument 138 pfd.fd = sock; 140 while ((n = recvmsg(sock, &msg, 0)) == -1 &&
|
H A D | monitor.c | 634 mm_answer_moduli(int sock, Buffer *m) argument 664 mm_request_send(sock, MONITOR_ANS_MODULI, m); 671 mm_answer_sign(int sock, Buffer *m) argument 717 mm_request_send(sock, MONITOR_ANS_SIGN, m); 728 mm_answer_pwnamallow(int sock, Buffer *m) argument 800 mm_request_send(sock, MONITOR_ANS_PWNAM, m); 818 int mm_answer_auth2_read_banner(int sock, Buffer *m) argument 825 mm_request_send(sock, MONITOR_ANS_AUTH2_READ_BANNER, m); 832 mm_answer_authserv(int sock, Buffer *m) argument 850 mm_answer_authpassword(int sock, Buffe argument 882 mm_answer_bsdauthquery(int sock, Buffer *m) argument 912 mm_answer_bsdauthrespond(int sock, Buffer *m) argument 945 mm_answer_skeyquery(int sock, Buffer *m) argument 966 mm_answer_skeyrespond(int sock, Buffer *m) argument 994 mm_answer_pam_start(int sock, Buffer *m) argument 1007 mm_answer_pam_account(int sock, Buffer *m) argument 1028 mm_answer_pam_init_ctx(int sock, Buffer *m) argument 1045 mm_answer_pam_query(int sock, Buffer *m) argument 1079 mm_answer_pam_respond(int sock, Buffer *m) argument 1110 mm_answer_pam_free_ctx(int sock, Buffer *m) argument 1126 mm_answer_keyallowed(int sock, Buffer *m) argument 1340 mm_answer_keyverify(int sock, Buffer *m) argument 1432 mm_answer_pty(int sock, Buffer *m) argument 1499 mm_answer_pty_cleanup(int sock, Buffer *m) argument 1515 mm_answer_sesskey(int sock, Buffer *m) argument 1545 mm_answer_sessid(int sock, Buffer *m) argument 1563 mm_answer_rsa_keyallowed(int sock, Buffer *m) argument 1610 mm_answer_rsa_challenge(int sock, Buffer *m) argument 1648 mm_answer_rsa_response(int sock, Buffer *m) argument 1693 mm_answer_term(int sock, Buffer *req) argument 2038 mm_answer_gss_setup_ctx(int sock, Buffer *m) argument 2063 mm_answer_gss_accept_ctx(int sock, Buffer *m) argument 2093 mm_answer_gss_checkmic(int sock, Buffer *m) argument 2121 mm_answer_gss_userok(int sock, Buffer *m) argument [all...] |
/freebsd-10.1-release/tools/regression/netinet/tcpsockclosebeforeaccept/ |
H A D | tcpsockclosebeforeaccept.c | 120 int error, sock; local 125 sock = socket(PF_INET, SOCK_STREAM, 0); 126 if (sock < 0) { 139 if (connect(sock, (struct sockaddr *)&sin, sizeof(sin)) < 0) { 147 if (getsockname(sock, (struct sockaddr *)&sin_local, &slen) < 0) { 163 close(sock);
|
/freebsd-10.1-release/tools/regression/netinet/tcpsocktimewait/ |
H A D | tcpsocktimewait.c | 73 int error, sock; local 77 sock = socket(PF_INET, SOCK_STREAM, 0); 78 if (sock < 0) { 91 if (connect(sock, (struct sockaddr *)&sin, sizeof(sin)) < 0) { 98 if (shutdown(sock, SHUT_RDWR) < 0) { 106 close(sock);
|
/freebsd-10.1-release/tools/regression/netinet/tcpstream/ |
H A D | tcpstream.c | 88 int i, j, sock; local 92 sock = socket(PF_INET, SOCK_STREAM, 0); 93 if (sock == -1) 96 if (connect(sock, (struct sockaddr *) &sin, sizeof(sin)) == -1) 102 len = send(sock, buffer, i * sizeof(long), 0); 114 close(sock);
|
/freebsd-10.1-release/lib/libstand/ |
H A D | netif.c | 281 socktodesc(sock) 282 int sock; 284 if (sock >= SOPEN_MAX) { 288 return (&sockets[sock]); 324 netif_close(sock) 325 int sock; 327 if (sock >= SOPEN_MAX) { 331 netif_detach(sockets[sock].io_netif); 332 sockets[sock].io_netif = (struct netif *)0;
|
/freebsd-10.1-release/usr.sbin/ppp/ |
H A D | atm.c | 172 struct sockaddr_natm sock; local 180 sock.snatm_len = sizeof sock; 181 sock.snatm_family = AF_NATM; 182 strncpy(sock.snatm_if, iface, IFNAMSIZ); 183 sock.snatm_vpi = vpi; 184 sock.snatm_vci = vci; 193 if (connect(p->fd, (struct sockaddr *)&sock, sizeof sock) == 0)
|
/freebsd-10.1-release/usr.bin/procstat/ |
H A D | procstat_files.c | 292 struct sockstat sock; local 469 error = procstat_get_socket_info(procstat, fst, &sock, NULL); 473 protocol_to_string(sock.dom_family, 474 sock.type, sock.proto)); 482 if (sock.dom_family == AF_LOCAL) { 484 (struct sockaddr_un *)&sock.sa_local; 487 print_address(&sock.sa_local); 489 print_address(&sock.sa_peer); 491 print_address(&sock [all...] |
/freebsd-10.1-release/contrib/openbsm/bin/auditdistd/ |
H A D | proto_impl.h | 81 int proto_common_send(int sock, const unsigned char *data, size_t size, int fd); 82 int proto_common_recv(int sock, unsigned char *data, size_t size, int *fdp);
|